Research Essays (Examples)

Studyspark

Study Document Study Document

Gun Violence Among African American Community

Pages: 8 (2377 words) Sources: 9 Document Type:Research Paper Document #:47528781

… how to react when functions have been compromised.
Keys Traits
The characteristics of the policy are as follows:
· Restricting access to ammunition: Research has demonstrated beyond doubt that there are benefits linked to restricted access to ammunition. The policy recommends extending the background checks for the … taken effect (Schopper, Lormand & Waxweiler, 2006).
The results from the approach can be impressive because the recommendations are the brainchild of appropriate research. Coordination of agencies charged with crime prevention is a complex affair. The intervention measures are equally tricky. Those trusted with preventing crime incidents ……

References

References

Armstrong, M., & Carlson, J. (2019). Speaking of trauma: The race talk, the gun violence talk, and the racialization of gun trauma. Palgrave Communications, 5(112).  https://doi.org/10.1057/s41599-019-0320-z 

Maxson, C. L., Hennigan, K, and D. C. Sloane. (2003). For the sake of the neighborhood? Civil gang injunctions as a gang intervention tool in Southern California. In Scott H. Decker, Ed. Policing Gangs and Youth Violence. Belmont, CA: Wadsworth/Thomson Learning

Morris, S. (2018). Mass shootings in the US: There have been 1,624 in 1,870 days. The Guardian.  https://www.theguardian.com/us-news/ng-interactive/2017/oct/02/america-mass-shootings-gun-violence 

Payne, B. K. (2006). Weapon bias: split-second decisions and unintended stereotyping. Curr Directions Psychological Sci, 15(6), 287–291.

Roman, J. K. (2013).Race, justifiable homicide, and stand your ground laws: Analysis of FBI supplementary homicide report data. Retrieved from  http://www.ncjrs.gov/App/publications/abstract.aspx?ID=265405 

Schopper, D., Lormand, J. D.,&Waxweiler, R (eds). (2006).Developing policies to prevent injuries and violence: guidelines for policy-makers and planners. Geneva, World Health Organization.

Tate, J., Jenkins, J., Rich, S., Muyskens, J., Elliott, K., Mellnik, T., &Williams, A. (2016).How the Washington Post is examining police shootings in the United States. The Washington Post.

Tita, G. E., Troshynski, E., & Graves, M. (2007). Strategies for reducing gun violence: The role of gangs, drugs, and firearm accessibility. Research Report: National Crime Prevention Centre (NCPC). Retrieved from  https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/rdcng-gn-vlnc/rdcng-gn-vlnc-eng.pdf

Studyspark

Study Document Study Document

Manufacturing Systems In Automotive Industry

Pages: 12 (3647 words) Sources: 16 Document Type:Research Paper Document #:87931381

...Research Introduction
A manufacturing system includes four different components together with the production machine, material handling system, computer control system, and human resources (Lee, 1998). In recent times, due to the technological advancement, automation of manufacturing systems has continued to become prevalent. A key aspect in the contemporary automotive manufacturing systems and automotive industries is automation. An automated manufacturing system alludes to an intersected or interrelated system of material processing stations with the capability of automatically processing an extensive range of part types simultaneously under computer control. Imperatively, the system is not just interlinked by a material transport system but also interconnected by a communication network for assimilating all aspects of manufacturing. This sort of system portrays flexibility in handling, routing, processes, and changing of tools. Also, an automated manufacturing system demonstrates key features, including a high magnitude of automation, integration, and flexibility (Swamidass, 2000). This paper examines the four different……

References

References

Boone, L. E., Kurtz, D. L., & Khan, M. H. (2009). Contemporary business. Hoboken: John Wiley & Sons.

Chui, M., George, K., Manyika, J., Miremadi, M. (September 2017). Human + machine: A new era of automation in manufacturing. McKinsey & Company.

Deng, W., Luo, Q. (2012). Advanced Technology for Manufacturing Systems and Industry. New York: Pearson.

Groover, M. P. (2007). Fundamentals of modern manufacturing: materials processes, and systems. John Wiley & Sons.

HR Cloud. (2020). HR Automation - The Future of Human Resource Process Management. Retrieved from:  https://kissflow.com/hr-process/ 

Joshi, V., Adhikari, M. S., Patel, R., Singh, R., Gehlot, A. (2018). Industrial Automation: Learn the current and leading-edge research on SCADA Automation. New Delhi: Pearson.

Krar, S. F., & Gill, A. (2003). Exploring advanced manufacturing technologies. Industrial Press, Inc.

Ladet, P., & Vernadat, F. (Eds.). (2013). Integrated manufacturing systems engineering. Springer.

Studyspark

Study Document Study Document

Why College Athletes Should Be Paid

Pages: 5 (1459 words) Sources: 6 Document Type:Research Paper Document #:49619734

… paying college athletes, so as to strongman the opposing argument. Then, a recommendation will be made, wherein my argument is backed with the research and the counterarguments are refuted in turn.
Why College Athletes Should be Paid
De Piccioto (2019) notes that college athletics generates a tremendous ……

References

References

Bokat-Lindell, S. (2019). Should College Athletes Be Allowed to Get Paid? Retrieved From  https://www.nytimes.com/2019/10/01/opinion/california-student-athletes-paid.html 

De Piccioto, E. (2019). Should College Athletes Get Paid? Retrieved From  https://www.theperspective.com/debates/sports/college-athletes-get-paid/ 

Gaydos, R. (2019). California governor signs bill allowing college athletes to capitalize on image, name and likeness. Retrieved From  https://www.foxnews.com/sports/ncaa-paid-players-california-bill-law 

Lemmons, M. (2017). College Athletes Getting Paid? Here Are Some Pros And Cons. Retrieved From  https://www.huffpost.com/entry/college-athletes-getting-paid-here-are-some-pros-cons_b_58cfcee0e4b07112b6472f9a 

Siegfried, J. J. (2015). The Case for Paying College Athletes. American Economic Association, 29(1), 115-138. Retrieved From  https://www.aeaweb.org/articles?id=10.1257/jep.29.1.115 

Yankah, E. (2015). Why N.C.A.A. Athletes Shouldn’t Be Paid. Retrieved From  https://www.newyorker.com/sports/sporting-scene/why-ncaa-athletes-shouldnt-be-paid 

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … a German word meaning “pattern,” or “shape,” and Wertheimer provided some empirical support for his theory first by publishing the results of his research in human perception. Wertheimer studied a phenomenon called apparent motion, a type of visual illusion that occurs when watching a film reel (Woldt … include Wolfgang Kohler, who is……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Digital Era And Taxation

Pages: 4 (1249 words) Sources: 5 Document Type:Research Paper Document #:83562315

To Choose an Accounting Topic That Would Be Excellent for A Dissertation.
Research Topic
Taxation in the digital era is an excellent topic for a dissertation because there is an ongoing debate on whether digital companies … heavily on intangible assets, big data, and which is hard to value (Sand- Zantman, 2018). Given this fact, there is a need to research problems that tax accountants face when taxing digital profits.
The above topic is relevant when examined from the technological perspective because of two … terms of market presence. So, if digital taxes are not taxed effectively, revenue gaps will start to emerge, and revenue bases will shrink.
Research Problem
Taxation Issues in the Digital Era
Sand- Zantman (2018) highlighted four features of digital businesses that makes taxation of digital profits difficult. … it was expected that sellers would bear all the burden, but part of the levy may be……

References

References

Committee of Experts on International Cooperation in Tax Matters. (2019). Tax Issues related to the Digitalization of the Economy: Report (E/C.18/2019/CRP.12).  https://www.un.org/esa/ffd/wp-content/uploads/2019/04/18STM_CRP12-Work-on-taxation-issues-digitalization.pdf 

Katz, R. (2015). THE IMPACT OF TAXATION ON THE DIGITAL ECONOMY.  https://www.itu.int/en/ITU-D/Conferences/GSR/Documents/GSR2015/Discussion_papers_and_Presentations/GSR16_Discussion-Paper_Taxation_Latest_web.pdf 

Pemerathna, A. (2016). Economic impact of digital taxation: A case on information communication technology industry Sri Lanka. SSRN Electronic Journal.  https://doi.org/10.2139/ssrn.2910328 

Sand-Zantman, W. (2018). Taxation in the Digital Economy. https://www.orange.com/fr/content/download/47110/1371114/version/1/file/Rapport%20TAXATION-VF-Mai2018.pdf

Sestakova, M. (2018, February). Tax Challenges of the Digital Economy [Paper presentation]. Management Challenges in the 21st Century, Bratislava, Slovakia.

Studyspark

Study Document Study Document

Impact Of Culture On Domestic Violence

Pages: 12 (3547 words) Sources: 21 Document Type:Research Paper Document #:31105337

… does and why nearly half of all black women will experience domestic violence at some point in their lives (Institute for Women’s Policy Research, 2017). This paper will discuss the impact of culture on domestic violence in the black community and what the implications of this issue … the impact of culture on domestic violence in the black community and what the implications of this issue are for policy, practice and research.
Background
Every
minute in America approximately 20 people experience a domestic violence situation (NCADV, 2017). The majority of those who experience this type … domestic violence situation (NCADV, 2017). The majority of those who experience this type of violence, are, according to the Institute for Women’s Policy Research (2017), black women: the Institute shows that 40% of black women experience domestic violence, which is defined as the problem of abusive behavior … of black stereotypes without realizing……

References

References

Adorno, T. & Horkheimer, M. (2007). The culture industry: Enlightenment as mass deception. Stardom and celebrity: A reader, 34, 2007.

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.  https://doi.org/10.1177/1745691617699280 

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Cashmore, E. (2006). The Black culture industry. Routledge.

Coleman, L. (1974). Carl Van Vechten Presents the New Negro. Studies in the Literary Imagination, 7(2), 85.

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Champaign, IL: Springer.

Davis, A. (2012). The Meaning of Freedom. San Francisco, CA: City Light Books.

Decker, J. L. (1993). The state of rap: Time and place in hip hop nationalism. Social Text, (34), 53-84.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … a German word meaning “pattern,” or “shape,” and Wertheimer provided some empirical support for his theory first by publishing the results of his research in human perception. Wertheimer studied a phenomenon called apparent motion, a type of visual illusion that occurs when watching a film reel. The … is credited with saying “the……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Strategic Marketing Plan For Lemon Thirst Energy Drink

Pages: 11 (3288 words) Sources: 10 Document Type:Research Paper Document #:54106401

...Research Introduction
The American soft drink market has been gradually shrinking over the last two decades due to health concerns. Many health experts are warning against sugary and carbonated drinks, so the sales have naturally reduced. And several reports are showing that those who are no longer taking sugary and carbonated drinks are turning to alternative drinks such as teas, natural juices, water, and so on. This has resulted in the steady growth of healthier non-carbonated drinks (Al-Shaar et al., 2017). Among the many alternative drinks recording, steady growth in energy drinks.
The energy drink market has seen steady growth since its launch in the United States in the year 1997. According to Kunst (2019), since energy drinks were launched in the United States in 1997, the market or segment has grown steadily at an annual rate of about 20 percent every year. The market is now valued at over 53……

References

References

Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.

Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.

Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.

Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.

Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.

Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.

Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.

Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

...Research Weapons of Mass Destruction
1
An electro-magnetic pulse (EMP) attack could crash the American economy and bring virtually every industry to a standstill—such is the reliance of modern business upon the digital infrastructure. Thus, considering an EMP attack is something that government should take very seriously. As more and more of the world becomes dependent upon cyber infrastructure for the maintenance of other systems, the complexity of the security services of a country grows and intensifies. Is it possible therefore that there is an overreliance upon technology and that this overreliance can actually compromise a country’s progress and increase its risk of falling into ruin should a sudden attack like an EMP attack hit where it hurts most? Absolutely—and both state and non-state actors know that, which is why either one could conduct a high altitude EMP attack upon the US. The consequences would be devastating.
Non-state actors are just……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Join thousands of other students and

"spark your studies".