Study Document
… needs of the consumer and enhance the community and the society at the same time via the use of eco-friendly production and marketing methods.
Vision:
The vision of the Lemon Thirst Beverage Company is to become a leader in the manufacturing of healthy and nutritious drinks in ……
References
Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.
Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.
Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.
Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.
Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.
Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.
Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.
Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.
Study Document
… deadly diseases in the world, but the Ebola virus disease (alternatively “EVD” or “Ebola”) is among the most virulent and lethal. Although intensive research is underway, there is no cure currently available for Ebola and the death toll attributable to this disease continues to increase. To date, … Review of the Relevant Literature
Chapter Introduction
This chapter provides a review of the relevant literature concerning the Ebola virus disease, including transmission methods, symptoms, diagnosis, and current treatment strategies. In addition, this chapter provides an analysis concerning ways to identify optimal emergency management strategies for Ebola ……
References
Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.
Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.
Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.
Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.
Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.
Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .
Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from https://www.cdc.gov/vhf/ebola/index.html .
Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.
Study Document
… to young employees who are regular consumers of social media. According to one HR expert, “Social media profiles have become standard tools for research and evaluating talent. Instead of looking only at candidates’ résumés, thoroughly vet…[break]…are increasingly transient but good employees will be more interested in remaining ……
References
Bajic, E. (2013). The 6 steps for retaining good employees. Forbes. Retrieved from:
https://www.forbes.com/sites/elenabajic/2013/07/15/the-6-steps-for-retaining-good- employees/#63a92aa5721f
Fallon, N. (2016). 6 steps for learning how to recruit the best talent. Business News Daily.
Retrieved from: https://www.businessnewsdaily.com/6252-tips-for-recruiters.html
Keller, S. & Meaney, (2017). Attracting and retaining the right talent. McKinsey. Retrieved
from: https://www.mckinsey.com/business-functions/organization/our-insights/attracting - and-retaining-the-right-talent
Williams, D. & Scott, M. (2012). Five ways to retain employees forever. Harvard Business
Review Retrieved from: https://hbr.org/2012/11/five-ways-to-retain-employees
Study Document
… security over wireless communication systems (Ijemaru et al., 2018). There are several security susceptibilities and shortcomings linked with wireless communication networks.
Based on research conducted by Laeeq (2011), the survivability of wireless communications is associated to the protection mechanism of wireless communications and toughness or strength against … combat this wireless communication security is the physical layer security. Imperatively, security solutions are dealt with in dissimilar layers. For instance, spread-spectrum modulation methods are utilized at the PHY layer to alleviate jamming of any communication channels, authentication instruments are carried out at the link layer to ……
References
Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.
Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from: http://users.jyu.fi/~timoh/TIES327/WPLS.pdf
Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.
GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from: https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/
Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.
Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.
IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.
Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.
Study Document
...Research methods Abstract
Phobias are a kind of anxiety disorder that can make an individual to experience extreme irrational fear regarding a situation, object, or living creature. Phobias should not be confused with normal fears since phobias are linked to a particular situation or object and they are persistent for 6 or more months. In this paper, we will describe what a phobia is and offer the differentiation of phobias from normal fear. We will then provide the diagnosis criteria for phobias as indicated in the DSM-5 manual. The 4Ds will be analyzed as they relate to phobia and the models of abnormality will be discussed. Treatment, history, culture, and prognosis will form the later part of the paper.
Description
According to Sutherland, Middleton, Ornstein, Lawson, and Vickers (2016) a phobia is defined as a type of anxiety disorder that makes an individual experience extreme irrational fear about a living creature, situation,……
References
Campos, D., Mira, A., Bretón-López, J., Castilla, D., Botella, C., Baños, R. M., & Quero, S. (2018). The acceptability of an internet-based exposure treatment for flying phobia with and without therapist guidance: patients’ expectations, satisfaction, treatment preferences, and usability. Neuropsychiatric disease and treatment, 14, 879.
Carleton, R. N., Thibodeau, M. A., Weeks, J. W., Teale Sapach, M. J. N., McEvoy, P. M., Horswill, S. C., & Heimberg, R. G. (2014). Comparing short forms of the Social Interaction Anxiety Scale and the Social Phobia Scale. Psychological assessment, 26(4), 1116-1126. doi:10.1037/a0037063
Erceg-Hurn, D. M., & McEvoy, P. M. (2018). Bigger is better: Full-length versions of the Social Interaction Anxiety Scale and Social Phobia Scale outperform short forms at assessing treatment outcome. Psychological assessment, 30(11), 1512-1526. doi:10.1037/pas0000601
Goetter, E. M., Frumkin, M. R., Palitz, S. A., Swee, M. B., Baker, A. W., Bui, E., & Simon, N. M. (2018). Barriers to mental health treatment among individuals with social anxiety disorder and generalized anxiety disorder. Psychological Services, No Pagination Specified-No Pagination Specified. doi:10.1037/ser0000254
Halldorsdottir, T., & Ollendick, T. H. (2016). Long-term outcomes of brief, intensive CBT for specific phobias: The negative impact of ADHD symptoms. Journal of Consulting and Clinical Psychology, 84(5), 465-471. doi:10.1037/ccp0000088
Hirsch, J. A. (2018). Integrating Hypnosis with Other Therapies for Treating Specific Phobias: A Case Series. American Journal of Clinical Hypnosis, 60(4), 367-377.
Leitenberg, H., Agras, W. S., Barlow, D. H., & Oliveau, D. C. (1969). Contribution of selective positive reinforcement and therapeutic instructions to systematic desensitization therapy. Journal of Abnormal Psychology, 74(1), 113-118. doi:10.1037/h0027063
Probst, T., Berger, T., Meyer, B., Späth, C., Schröder, J., Hohagen, F., . . . Klein, J. P. (2019). Social phobia moderates the outcome in the EVIDENT study: A randomized controlled trial on an Internet-based psychological intervention for mild to moderate depressive symptoms [Press release]
Study Document
Introduction
In the research article “Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya” by Eva Nkatha Kigunda, the objective was to assess how digital … return on investment (ROI) is still insignificant. Digital marketing strategies are mainly used in maintaining the current customer pool for the dealers. The research article is a standard-structured paper that included a literature review under chapter two, pages 8-25. In this paper, a critique of the literature … one, which contains the topic, aim, and scope of the study. The scope of the study is the Kenyan automobile industry and the research conducted review in Nairobi, and the neighboring towns of Rongai, Athi River, Kiambu, and Thika. The study focused on social media marketing, search … The study focused on social media marketing, search engine marketing, and email marketing. This notwithstanding, the author has included some of the crucial research questions in……
References
Evans, M.P., 2007. Analysing Google rankings through search engine optimization data. Internet research, 17(1), pp.21-37.
Galvan, J.L. and Galvan, M.C., 2017. Writing literature reviews: A guide for students of the social and behavioral sciences. Routledge.
Kaplan, A.M. and Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), pp.59-68.
Kigunda, E. N. 2017. Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya (Doctoral dissertation, United States International University-Africa).
Kimani, B., 2012. When social media does the marketing. Management magazine, (36-37).
Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.
Ngulube, P., Mathipa, E.R. and Gumbo, M.T., 2015. Theoretical and conceptual frameworks in the social and management sciences. Addressing research challenges: Making headway in developing researchers, pp.43-66.
Wong, L.L.C., 2016. Challenges and expectations: Preparing postgraduate students to write literature reviews. In International Conference of the Spanish Association of Applied Linguistics (AESLA), 2016. University of Alicante.
Study Document
… idea of lifting weights by discussing how it can improve health and who the role models are for women today. It discusses prior research on women’s health, then describes new findings from recent research that shows the benefits of lifting weights for women. It shows the benefits as relating to improved mood, increased confidence, and improved physical ……
References
Choi, P. Y. (1992). The psychological benefits of physical exercise: Implications for women and the menstrual cycle. Journal of Reproductive and Infant Psychology, 10(2), 111-115.
Clapp III, J. F. (2000). Exercise during pregnancy: a clinical update. Clinics in sports medicine, 19(2), 273-286.
Dressler, W. W. (1985). Extended family relationships, social support, and mental health in a southern black community. Journal of health and social behavior, 39-48.
Guntzviller, L. M., King, A. J., Jensen, J. D., & Davis, L. A. (2017). Self-efficacy, health literacy, and nutrition and exercise behaviors in a low-income, Hispanic population. Journal of immigrant and minority health, 19(2), 489-493.
Lavallee, M. E., & Mansfield, L. A. (2013). Weightlifting training gives lifelong benefits. ACSM\\\\\\'s Health & Fitness Journal, 17(2), 34-36.
Lowery, K. (2019). Where Are The Ladies?: The Social and Cultural Reasons Why Women Still Shy Away From Weights in 2018 (Doctoral dissertation).
Rogers, P. & Fogoros, R. (2019). A Fundamental Guide to Weight Training. Retrieved from https://www.verywellfit.com/weight-training-fundamentals-a-concise-guide-3498525
Study Document
… system whereby customer data, secure payment gateways and intricate customer data needs to be protected needs the attention of network engineers and appropriate methods to determine a particular node in which to send traffic using both response time of nodes and the amount of available connections between ……
References
Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.
Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.
Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web: https://www.liquidweb.com/kb/understanding-load-balancing/
Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.
Study Document
… were emailed to the personal email of Mr. Belcamp by the accused himself. Computer forensics is a scientific process in which case verified methods and approaches are used in an attempt to gather, preserve, or retrieve important data in formats acceptable in a court of law. There ……
References
Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.
Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.
Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.
Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.
Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.
U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from https://www.justice.gov/criminal-ccips/file/891011/download
Study Document
… them, gives them more opportunities to learn in different ways and formats, and allows them to communicate with people in a variety of methods.
Virtual technology also facilitates team collaboration for learners. Kahai, Carroll and Jestice (2007) found that virtual worlds assists learners in communication, sharing knowledge, ……
References
Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.
Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.
Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.
Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.
Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.
Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).
Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from https://www.albany.edu/lap/Papers/technology%20use.htm
Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.
We have over 150,000+ study documents to help you.
Sign Up for FREE