Personal Narrative Essays (Examples)(Examples)

Studyspark

Study Document Study Document

Healthcare Scientific Merit

Pages: 11 (3267 words) Sources: 8 Document Type:Paper Document #:78470537

… in the study, and this makes it necessary to formulate strategies to address such ethical concerns. In this study, there was no existing personal relationship between the researchers and the participants. Some of the healthcare professionals had been introduced to some of the researchers in professional settings. … (Sanjari et al., 2014). One of the ways participants may be harmed in a study like this is when sensitive information such as personal medical information gets leaked or mishandled. The study has taken steps to protect participants from such risk. The identity of the participants is … remains confidential. Further, the researchers took caution to get written consent from the participants in the study (Doekhie et al., 2018).
Qualitative employ narrative and multi-pronged interviews to get an account of experiences. This research study employed such tools, and the exercise posed an ethical challenge because ……

References

References

Brook, R. H., & Vaiana, M. E. (2015). Using the knowledge base of health services research to redefine health care systems. Journal of general internal medicine, 30(10), 1547-1556.

Cutcliffe, J. R., & McKenna, H. P. (1999). Establishing the credibility of qualitative research findings: the plot thickens. Journal of advanced nursing, 30(2), 374-380.

Doekhie, K. D., Strating, M. M., Buljac?Samardzic, M., van de Bovenkamp, H. M., & Paauwe, J. (2018). The different perspectives of patients, informal caregivers, and professionals on patient involvement in primary care teams. A qualitative study. Health Expectations, 21(6), 1171-1182.

Eccles, M., Grimshaw, J., Walker, A., Johnston, M., & Pitts, N. (2005). Changing the behavior of healthcare professionals: the use of theory in promoting the uptake of research findings. Journal of clinical epidemiology, 58(2), 107-112.

Leedy, P.D. & Ormrod, J. E. (2019). Practical research: Planning and design, 12th edition. Pearson Education, Hudson Street, NY.

Sanjari, M., Bahramnezhad, F., Fomani, F. K., Shoghi, M., & Cheraghi, M. A. (2014). Ethical challenges of researchers in qualitative studies: The necessity to develop a specific guideline. Journal of medical ethics and history of medicine, 7.

Swan, J., Clarke, A., Nicolini, D., Powell, J., Scarbrough, H., Roginski, C., ... & Taylor-Phillips, S. (2012). Evidence in Management Decisions (EMD): advancing knowledge utilization in healthcare management.

Thomas, D. R. (2017). Feedback from research participants: are member checks useful in qualitative research?. Qualitative Research in Psychology, 14(1), 23-41.

Studyspark

Study Document Study Document

Symbolic Frame Of Organizational Analysis Walt Disney Company

Pages: 7 (2089 words) Sources: 7 Document Type:Case Study Document #:13456127

… its members.
Second, the symbolic frame allows for nuance. Especially in a large, heterogeneous company, individual members will perceive events according to their personal interpretation of the symbols. The symbols nevertheless create a sense of unity amid the diversity within the organization.
Third, symbols have an especially … of certainty, or to find meaning, hope, or value in any situation.
Fourth, organizational processes and singular events become part of the ongoing narrative or story. Rituals, ceremonies, and archetypal heroes provide members with a sense of deep meaning that motivates their engagement and performance over time.
… stories anew to keep the brand relevant to people from disparate…[break]…or members. Disney’s business model is in part based on the use of narrative taken from the folktales and legends of yore, encased in particular cultures or religious traditions. Just as storytelling traditionally functions as a means ……

References

References

“About the Walt Disney Company,” (2020). Retrieved from:  https://thewaltdisneycompany.com/about/ 

Boguszewicz-Kreft, M., Kreft, J. & Zurek, P. (2019). Myth and storytelling: The case of the Walt Disney Company. Myth in Modern Media Management and Marketing. DOI: 10.4018/978-1-5225-9100-9.ch002

Bohas, A. (2014). Transnational firms and the knowledge structure: The case of the Walt Disney Company. Global Society 29(1): 23-41.

Bolman, L.G. & Deal, T.E. (2013). Reframing organizations. John Wiley & Sons.

Di Giovanni, E. (2014). Cultural otherness and global communication in Walt Disney films at the turn of the century. The Translator 9(2): 207-223.

Forbes, W. & Watson, R. (n.d.). Destructive corporate leadership and board loyalty bias. Retrieved from:  https://www.city.ac.uk/__data/assets/pdf_file/0005/56372/2A_Forbes.pdf 

Wasko, J. (2001). Challenging Disney myths. Journal of Communication Inquiry 23(3): 237-257.

Studyspark

Study Document Study Document

Drug Abuse

Pages: 8 (2545 words) Sources: 21 Document Type:literature review Document #:24528043

… Drug Abuse on School Children Aged 10 To 18 in Developed Countries (U.S., Canada, France, England, Germany, Italy, Russia, Australia, Japan and China): narrative Literature Review
Introduction
The problem addressed in this literature review is that in developed countries around the world, drug abuse among school children … because their bodies and minds are still developing and when drugs are introduced to their systems, the impact can be devastating to them personal in physical and mental health terms (Stockings et al., 2016). Yet all around the developed world this is happening. Children are being brought … produce. But what is the impact of those drugs on these nations? That is what needs to be explored in more detail. This narrative literature review identifies the methods and search strategies used as well as the selection criteria for the literature searches. It then discusses the ……

References

References

Baggio, S., Spilka, S., Studer, J., Iglesias, K., & Gmel, G. (2016). Trajectories of drug use among French young people: Prototypical stages of involvement in illicit drug use. Journal of Substance Use, 21(5), 485-490.

Bonyani, A., Safaeian, L., Chehrazi, M., Etedali, A., Zaghian, M., & Mashhadian, F. (2018). A high school-based education concerning drug abuse prevention. Journal of education and health promotion, 7.

Chu, Y. W. L. (2015). Do medical marijuana laws increase hard-drug use?. The Journal of Law and Economics, 58(2), 481-517.

Downes, D. (2017). The drug addict as a folk devil. In Drugs and politics (pp. 89-97). Routledge.

Goodchild, M., Nargis, N., & d\\'Espaignet, E. T. (2018). Global economic cost of smoking-attributable diseases. Tobacco control, 27(1), 58-64.

Grant, C. N., & Bélanger, R. E. (2017). Cannabis and Canada’s children and youth.  Paediatrics & child health, 22(2), 98-102.

Herbert, A., Gonzalez-Izquierdo, A., McGhee, J., Li, L., & Gilbert, R. (2016). Time-trends in rates of hospital admission of adolescents for violent, self-inflicted or drug/alcohol-related injury in England and Scotland, 2005–11: population-based analysis. Journal of Public Health, 39(1), 65-73.

Henkel, D., & Zemlin, U. (2016). Social inequality and substance use and problematic gambling among adolescents and young adults: a review of epidemiological surveys in Germany. Current drug abuse reviews, 9(1), 26-48.

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… Career, and Awards
One of the most famous of Gaddis’ works…[break]…ruled, during the 1930s, into a gargantuan extension of his own pathologically suspicious personal.”[footnoteRef:13] Stalin used terror and coercion to purge dissent. The Gulag Archipelago, experienced personal by Solzhenitsyn after he dared to criticize Stalin’s decisions during WW2, was a prime example of Stalin’s totalitarianism. It was this totalitarianism that … inevitable. Stalin made the Cold War inevitable and thus Gaddis places the blame for the Cold War squarely on Stalin: “He alone pursued personal security by depriving everyone else of it: no Western leader relied on terror to the extent that he did.”[footnoteRef:17] Stalin was the virus ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… and comportment of Mr. Belcamp. Towards this end, persons of interest would be a few of Mr. Belcamp’s friends and neighbors.
Provide a narrative description of the interview setting and the intended process, before, during, and following the interview
The interview would comprise of four basic stages. … terms, the results of the investigation could provide the basis for legal action with the options available for the organization being inclusive of: personal devices subpoena, permanent injunction, or just a restraining order.
Section II
Question 1: Identify, for the lab, what digital or non-digital evidence you … Belcamp. I will also clearly indicate that there are other reasons to believe that copies of the source code were emailed to the personal email of Mr. Belcamp by the accused himself. Computer forensics is a scientific process in which case verified methods and approaches are used ……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Cognitive Theory Clinical Social Work Practice

Pages: 7 (2210 words) Sources: 11 Document Type:question answer Document #:73366521

… Social work practice is anchored on the important, perhaps pivotal, notion that overall human behavior is usually the sum of both environmental and personal realities. Though yet to be developed thoroughly into a formal and widely accepted paradigm, the cognitive learning perspective draws from several perspectives including … Provide a theory driven problem statement and assessment of the client system in the environment.
Problem statement: If the client (Mr. Jackson) lacks personal strength (as shown by his physical weakness, chronic depression, and cognitive impairment) as well as environmental resources (as exhibited by his few friends, … time to being an extra or critical resource for the client when needed. In contrast, if the client has strong environmental resources and personal strengths (D), the social worker should probably only limit his/her activities to emotional support, offering suggestions, and direct referrals. If the client’s environmental … should probably only limit his/her……

References

Bibliography

Adefolalu, A. O. (2018). Cognitive-behavioural theories and adherence: Application and relevance in antiretroviral therapy. South Afr J HIV Med., 762.

Bandura A. Organizational applications of social cognitive theory. Aust J Manage. 1988;13(2):275–302. https://doi.org/10.1177/031289628801300210 [Google Scholar]

Berlin, S. B. (1987). Cognitive behavioral interventions for social work practice. National Association of Social Workers, Inc.

Gitterman, A., & Heller, N. (2011). Integrating Social Work Perspectives and Models with Concepts, Methods and Skills with Other Professions’ Specialized Approaches. Clinical Social Work Journal, 204-211.

Gonzalez-Prendes, A. (2012). Cognitive-behavioral practice and social work values: A critical analysis. Journal of Social Work Values and Ethics.

National Association of Social Workers. (1996). Code of Ethics. Retrieved from http://www.naswdc.org/pubs/code/code.asp.

Nevill, D. (2014). Positive Interventions: Developing a Theoretical Model to Guide Their Development and Use. Master of Applied Positive Psychology (MAPP) Capstone Projects.

Parks, A. C., & Biswas-Diener, R. (2013). Positive interventions: Past, present, and future. In T. Kashdan & J. Ciarrochi (Eds.), Mindfulness, acceptance, and positive psychology: The seven foundations of well-being (pp.140-165). Oakland, CA: New Harbinger Publications

Studyspark

Study Document Study Document

What Is Cybercrime And How To Deter It

Pages: 7 (2243 words) Sources: 5 Document Type:Research Paper Document #:58559500

… cybercrime. IBM’s first computer arrived in the 1950s, but it was an enormous machine—and cybercrime did not really become a possibility until the personal computer began to hit the market in the 1970s (Computer Hope, 2019). As businesses and organizations began to more operations online, individuals began … organizations began to more operations online, individuals began to see an opportunity to exploit weak supports to gain access over company data, individual personal information, or access to financial accounts. Cybercrime has grown into a highly sophisticate and complex industry that is constantly pushing the boundaries and ……

References

References

Computer Hope. (2019). When was the first computer invented? Retrieved from  https://www.computerhope.com/issues/ch000984.htm 

Crane, C. (2019). 33 alarming cybercrime statistics you should know in 2019. Retrieved from  https://www.thesslstore.com/blog/33-alarming-cybercrime-statistics-you-should-know/ 

Schjølberg, Stein. (2017). The History of Cybercrime (1976-2016). Books on Demand.

Statista. (2020). Global digital population. Retrieved from  https://www.statista.com/statistics/617136/digital-population-worldwide/ 

Taylor, R. W., Fritsch, E. J., Liederbach, J., Saylor, M. R., & Tafoya, W. L. (2019). Cyber crime and cyber terrorism. NY, NY: Pearson.

Studyspark

Study Document Study Document

Assessment Activity Language Assessment

Pages: 6 (1926 words) Sources: 8 Document Type:Essay Document #:97194304

… impairment
· The articulation of work?sentence and the critical difference score
· The percentage of happenings for phonological error and their patterns
? personal Evaluation: (What would be the strengths and weaknesses of using this test with deaf/hard of hearing students?)
Strengths
This assessment instrument provides clinicians … 2000). The tool has supplemental qualitative tasks which help for in-depth interpretation of the scores, thus help clinicians develop treatment plans that are personal to the individual.
Weaknesses
Interpreting the…[break]…scores, and equivalents of age
? personal Evaluation: (What would be the strengths and weaknesses of using this test with deaf/hard of hearing students?)
Strengths
· It is a reliable ……

References

References

Bond, L. A. (1996). Norm-and criterion-referenced testing. Practical Assessment, Research, and Evaluation, 5(1), 2.

Carrow-Woolfolk, E. (2014). Test for auditory comprehension of language (4th ed.). Austin, TX: PRO-ED.

Carrow-Woolfolk, E., & Allen, E. A. (2014). TEXL: Test of expressive language. Austin, TX: PRO-ED.

Fudala, J.B. & Stegall, S. (2017). Arizona-4: Arizona Articulation and Phonology Scale, Fourth Revision. Western Psychological Services.

Fudala, J.B. (2000). Arizona Articulation Proficiency Scale (3rd ed.). Los Angeles, CA: Western Psychological Services.

Haug, T. (2005). Review of sign language assessment instruments. Sign Language & Linguistics, 8(1-2), 61-98.

Maller, S., Singleton, J., Supalla, S., & Wix, T. (1999).  The development and psychometric properties of the American Sign Language Proficiency Assessment (ASL-PA). Journal of Deaf Studies and Deaf Education, 4(4), 249-269.

Pizzo, L., & Chilvers, A. (2019). Assessment of Language and Literacy in Children Who Are d/Deaf and Hard of Hearing. Education Sciences, 9(3), 223.

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

...Personal narrative Enterprise Risk Management in Wells Fargo during the Pandemic
Introduction
As Beasley (2020) points out, enterprise risk management (ERM) is especially needed during the COVID 19 pandemic because of the “number of different, but interrelated risks spread all across most organization” (p. 2). COVID 19 is not just a factor that has impacted one business or industry. It has impacted all businesses and all industries in different ways. Grocery chains like Kroger, for instance, have seen increased demand. Restaurants on the other hand have seen business dry up due to mandated quarantine orders. Small business owners and large corporations have filed for bankruptcy. All of this impacts the banking sector and Wells Fargo specifically because of its role in managing loan products, using interest rates to attract savers, and offering investment advice. “No single risk associated with the COVID-19 pandemic crisis can be managed in isolation,” as Beasley (2020) points……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

Psychology

Pages: 5 (1482 words) Sources: 8 Document Type:question answer Document #:99253146

...Personal narrative Psychology
Question 1
What differentiated the control group from the two experimental groups and the two experimental groups from each other?
The aim of the experiment is key to differentiating all the groups involved: groups A, B, and control. Festinger and Carlsmith (1959) were trying to identify the occurrence of cognitive dissonance in the experiment through the motivations of the groups, thereby proving the validity of their theory over the behaviorist and reinforcement approach. The main difference between all the groups is the motivation/level of dissonance experienced. The control group experienced no dissonance, as they were not required to lie about the experimental procedure nor offered monetary compensation; the other groups were, however, motivated to lie via monetary compensation. Groups A and B are further differentiated by their level of “induced dissonance” through the amount of monetary compensation offered to them: group A received $1, which is significantly less than……

References

References

Cherry, K. (2020). The Incentive Theory of Motivation. Retrieved from:  https://www.verywellmind.com/the-incentive-theory-of-motivation-2795382 

Festinger, L., & Carlsmith, J. M. (1959). Thoughts out of tune. Journal of Abnormal and Social Psychology, 58, 203-210.

Izuma, K., & Murayama, K. (2019). The neural basis of cognitive dissonance. In E. Harmon-Jones (Ed.), Cognitive dissonance: Reexamining a pivotal theory in psychology (p. 227–245). American Psychological Association.  https://doi.org/10.1037/0000135-011 

Legg, T. (2019). Cognitive dissonance: What to know. Retrieved from:  https://www.medicalnewstoday.com/articles/326738#overview 

McLeod, S. (2018). Cognitive dissonance. Retrieved from  https://www.simplypsychology.org/cognitive-dissonance.html 

Northrup, C. (2018). 4 ways to reduce cognitive dissonance. Retrieved from:  https://www.drnorthrup.com/4-ways-to-reduce-cognitive-dissonance/ 

Silverman, K., Jarvis, B. P., Jessel, J., & Lopez, A. A. (2016). Incentives and motivation. Translational Issues in Psychological Science, 2(2), 97–100. DOI:10.1037/tps0000073 Retrieved from:  https://sci-hub.tw/10.1037/tps0000073 

Van Kampen, H. S. (2019). The principle of consistency and the cause and function of behaviour. Behavioural processes, 159, 42-54. Retrieved from:  https://scihub.tw/https://doi.org/10.1016/j.beproc.2018.12.013

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".