Research Methods Essays (Examples)

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … relationship based on points of contact between individuals who are connected in an integrated social network. Group therapy and art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic interventions, … a German word meaning “pattern,”……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … relationship based on points of contact between individuals who are connected in an integrated social network. Group therapy and art therapy are also methods used in Gestalt psychology.
Although the phrase may seem out of vogue, Gestalt psychology underwrites a lot of contemporary psychotherapies and therapeutic interventions, … a German word meaning “pattern,”……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Stem Cell Transplants Treat Alzheimers And Parkinsons Disease

Pages: 5 (1386 words) Sources: 7 Document Type:Research Paper Document #:32127824

… therapy for those with Parkinson’s disease. But lifestyle changes, approved drugs, and surgical operations can be recommended to address symptoms. Nevertheless, stem cell research has shown a lot of promise in helping to restore and regenerate destroyed brain tissues and is, therefore, currently being tested to help … approach in the treatment of Alzheimer’s and Parkinson’s diseases. It also investigates the possible drawbacks of using the approach.
Introduction
Expectations from medical research to come up with a breakthrough treatment for the most widely-occurring neurodegenerative ailments in the French population, namely, Parkinson's Disease (PD) and Alzheimer's … the disease impacting around one to two percent of individuals aged above 70 years. While its causes are yet to be determined, several research scholars claim the disease emerges as a reaction to non-genetic…[break]…pathways include paracrine effects, immune-modulation, differentiation, and proliferation. Pre-clinical body of research on stem cells shows that the benefits and……

References

References

Alzheimer’s Association. (2015). 2015 Alzheimer\\\\'s disease facts and figures. Alzheimer\\\\'s & Dementia, 11(3), 332-384. doi:10.1016/j.jalz.2015.02.003.

Bali, P., Lahiri, D., Banik, A., Nehru, B., & Anand, A. (2017). Potential for Stem Cells Therapy in Alzheimer’s Disease: Do Neurotrophic Factors Play Critical Role? Current Alzheimer Research, 14(2), 208-220. doi:10.2174/1567205013666160314145347

Goodarzi, P., Aghayan, H. R., Larijani, B., Soleimani, M., Dehpour, A. R., Sahebjam, M., … Arjmand, B. (2015). Stem cell-based approach for the treatment of Parkinson\\\\'s disease. Medical journal of the Islamic Republic of Iran, 29, 168.

Herberts, C. A., Kwa, M. S., & Hermsen, H. P. (2011). Risk factors in the development of stem cell therapy. Journal of Translational Medicine, 9(1). doi:10.1186/1479-5876-9-29

Hwang, S., Gill, S., Pathak, S., & Subramanian, S. (2018, March 30). A Comparison of Stem Cell Therapies for Parkinson Disease | Published in Georgetown Medical Review. Retrieved June 11, 2019, from  https://gmr.scholasticahq.com/article/3420-a-comparison-of-stem-cell-therapies-for-parkinson-disease 

Railton, D. (2019, February 18). Stem cells: Therapy, controversy, and research. Retrieved June 11, 2019, from  https://www.medicalnewstoday.com/articles/200904.php 

The Research Journal. (2017, September 20). Alzheimer\\\\'s and Parkinson\\\\'s - the current state of research. Retrieved June 11, 2019, from  https://www.pasteur.fr/en/research-journal/reports/alzheimer-s-and-parkinson-s-current-state-research 

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… months has shown, if the economy were to suddenly close down, there would be no riders. Uber drivers would be left without support.
methods of Addressing the Problem
Malos, Lester and Virick (2018) argued that because Uber drivers are not technically “employees” of Uber the company has ……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… this paper, the processes information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It … These audits may assume the form of new enhancement/ installation auditing, routine auditing, unplanned, spontaneous auditing, or audits performed in non-office hours.
Auditing methods adopted in this regard may encompass automated audit instruments such as off-the-rack security auditing systems or auditor-developed instruments, or even manual review methods like auditing checklists and social engineering attack checklists.
Audit processes involve several steps. According to 3D Networks, auditing is a 7-step process (Suduc … becoming increasingly challenging; however, security auditors have automated audit tools at their disposal to facilitate the process.
Conclusion
A variety of different security methods may be adopted. The choice of……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Indigenous Health Of Australians Closing The Gap Prime Ministers

Pages: 8 (2442 words) Sources: 15 Document Type:Research Paper Document #:36662199

...Research methods 1. Introduction
Early 2008, representatives from indigenous health organizations, the Aboriginal and Torres Strait Islander Social Justice Commissioner, and the commonwealth government of Australia, signed an agreement that was meant to ensure that all the relevant stakeholders cooperate to ensure indigenous and non-indigenous Australians have equality in life expectancy and health status by 2030 (Human Rights and Equal Opportunity Commission 2008).
For quite a long time, it has been known that indigenous people in Australia have a disadvantage in terms of health. Many organizations and activists have over the years been trying to bridge the gap in health status between them and non-indigenous Australians and the signing of the agreement was a huge milestone that served two purposes. It raised public awareness on the matter and it helped to lay down plan for the achievement of parity in health status (Pholi, Black, & Richards, 2009).
The plan behind achieving health……

References

Bibliography

AIHW. (2011, May 5). Life expectancy and mortality of Aboriginal and Torres Strait Islander people. Retrieved from Australian Institute of Health and Welfare:  https://www.aihw.gov.au/reports/indigenous-australians/life-expectancy-and-mortality-of-aboriginal-and-to/contents/summary 

AIHW. (2019, July 17). Deaths in Australia. Retrieved from Australian Institute of Health and Welfare:  https://www.aihw.gov.au/reports/life-expectancy-death/deaths/contents/life-expectancy 

Altman, J. C., Biddle, N., & Hunter, B. H. (2009). Prospects for ‘Closing the Gap’ in Cocioeconomic Outcomes for Indigenous Australians? Australian Economic History Review, 49(3), 225-251.

Biddle, N. (2019, February 14). Four lessons from 11 years of Closing the Gap reports. Retrieved from The Conversation:  https://theconversation.com/four-lessons-from-11-years-of-closing-the-gap-reports-111816 

Biddle, N., & Taylor, J. (2012). Demographic Consequences of the ‘Closing the Gap’ Indigenous Policy in Australia. Popul Res Policy Rev, 31, 571–585.

COAG. (n.d.). National Indigenous Reform Agreement. Council of Australian Governments.

Crikey. (2012, September 25). Black government expenditure — it’s a white thing. Retrieved from Crikey:  https://www.crikey.com.au/2012/09/25/black-government-expenditure-its-a-white-thing/ 

Department of Prime Miniter and the Cabinet. (2008). Closing the Gap-Prime Minister\\\\\\'s report 2018. Australian Government.

Studyspark

Study Document Study Document

Exploring The Issue In Evaluating Adult Learning

Pages: 8 (2390 words) Sources: 6 Document Type:Research Paper Document #:65651598

… students may be unnecessarily and unfairly struggling with classes because university teachers fail to use evaluations that are conducive to adult learning. The research question this paper poses is this: What are some ways to evaluate adult learning? This paper will describe the literature on this subject, … skills, too, that have a real world application that adult learners will appreciate.
Thus, instructors at the university-level should be considering alternative evaluation methods so as to be more appealing to and supportive of adult learners, who are not children and thus should not be taught in ……

References

References

Fenwick, T. J., & Parsons, J. (2009). The art of evaluation: A resource for educators and trainers. Thompson Educational Publishing.

Forrest III, S. P., & Peterson, T. O. (2006). It\\\\\\'s called andragogy. Academy of management learning & education, 5(1), 113-122.

Hase, S., & Kenyon, C. (2000). From andragogy to heutagogy. Ulti-BASE In-Site.

Howatt, W. A. (1999). Journaling to self-evaluation: A tool for adult learners. International Journal of Reality Therapy, 8(2), 32-34.

Knowles, M. (1984). Andragogy in action. San Francisco: Jossey-Bass.

Moss, D., & Van Duzer, C. (1998). Project-Based Learning for Adult English Language Learners. ERIC Digest.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… the least informed or least prepared individuals and are typically the number one threat/risk to a system’s security. They are targeted through phishing methods and unless trained to know better can make an organization extremely vulnerable. The same goes for protecting their own data and maintaining their ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Depression And Social Media

Pages: 8 (2464 words) Sources: 13 Document Type:Research Paper Document #:12318199

… has more than doubled. This coincides with the rise of social media and the social media usage among adolescents, according to the Pew research Center, which finds that 95% of teens have access to a smart phone and 45% of teens say they are online “all the … demographic raises serious questions, such as: Is there a relationship between social media use and loneliness among young adults, ages 15-25?
Statement of research Question and Significance
The research question for this proposal is: Does social media make people lonely—particularly those who are between the ages of 15-25?
The significance of this ……

References

Works Cited

Andreassen, Cecilie Schou, Ståle Pallesen, and Mark D. Griffiths. \\\\\\\\\\\\"The relationship between addictive use of social media, narcissism, and self-esteem: Findings from a large national survey.\\\\\\\\\\\\" Addictive behaviors 64 (2017): 287-293.

Bandura, A. “Toward a psychology of human agency: Pathways and reflections.”  Perspectives on Psychological Science 13.2 (2018): 130-136.

Chester, Jeff, and Kathryn Montgomery. \\\\\\\\\\\\"No escape: Marketing to kids in the digital age.\\\\\\\\\\\\" Multinational Monitor 29.1 (2008): 11.

Greenberg, P. The Growing Economic Burden of Depression in the U.S. 2015. Retrieved from  https://blogs.scientificamerican.com/mind-guest-blog/the-growing-economic-burden-of-depression-in-the-u-s/ 

Klinenberg, Eric. \\\\\\\\\\\\"Is loneliness a health epidemic?.\\\\\\\\\\\\" New York Times (2018): SR8.

Lim, Xin Jean, et al. \\\\\\\\\\\\"The impact of social media influencers on purchase intention and the mediation effect of customer attitude.\\\\\\\\\\\\" Asian Journal of Business Research 7.2 (2017): 19-36.

Lohmann, R. What\\\\\\\\\\\\'s Driving the Rise in Teen Depression? 2019. https://health.usnews.com/wellness/for-parents/articles/2019-04-22/teen-depression-is-on-the-rise

Mayo Clinic. “Depression.” MayoClinic, 2019.  https://www.mayoclinic.org/diseases-conditions/teen-depression/symptoms-causes/syc-20350985

Studyspark

Study Document Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by … proprietary information, it can generate numerous risks or threats to the owner/possessor of the information. Cyber espionage is carried out through various exploitation methods or techniques on individual computers, networks or the Internet. Some of these techniques or methods include the use of malicious software and computer viruses like Trojan horses and spyware. This practice basically entails intentional activities to infiltrate or … intelligence gathering approach and strategy for national security decisions. However, cyber espionage remains a form of cyberattack, which is legally and ethically unacceptable.
research……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".