Research Methods Essays (Examples)

Studyspark

Study Document Study Document

Strategic Marketing Plan For Lemon Thirst Energy Drink

Pages: 11 (3288 words) Sources: 10 Document Type:Research Paper Document #:54106401

… needs of the consumer and enhance the community and the society at the same time via the use of eco-friendly production and marketing methods.
Vision:
The vision of the Lemon Thirst Beverage Company is to become a leader in the manufacturing of healthy and nutritious drinks in ……

References

References

Ahmed, R. R., Vveinhardt, J., Streimikiene, D., & Awais, M. (2016). Mediating and Marketing factors influence the prescription behavior of Physicians: An Empirical Investigation. Amfiteatru Economic Journal, 18(41), 153-167.

Al-Shaar, L., Vercammen, K., Lu, C., Richardson, S., Tamez, M., & Mattei, J. (2017). Health effects and public health concerns of energy drink consumption in the United States: a mini-review. Frontiers in public health, 5, 225.

Barney, J. B., & Hesterly, W. S. (2010). Strategic management and competitive advantage: Concepts and cases (pp. 4-25). Upper Saddle River, NJ: Prentice-Hall.

Freeman, B., Kelly, B., Vandevijvere, S., & Baur, L. (2016). Young adults: beloved by food and drink marketers and forgotten by public health?. Health promotion international, 31(4), 954-961.

Hitt, M. A., Ireland, R. D., & Hoskisson, R. E. (2012). Strategic management cases: competitiveness and globalization. Cengage Learning.

Kotler, P., & Armstrong, G. (2010). Principles of marketing. Pearson education.

Kunst, A. (2019). Energy drinks consumption: consumers of energy drinks in the United States in 2018. Statista.

Mahajan, S. (2020). Sports And Energy Drinks Market Size & Share Analysis Report, 2019-2026.

Studyspark

Study Document Study Document

Formulating An Effective National Response To Ebola In Nigeria

Pages: 17 (5038 words) Sources: 20 Document Type:Research Paper Document #:83371879

… deadly diseases in the world, but the Ebola virus disease (alternatively “EVD” or “Ebola”) is among the most virulent and lethal. Although intensive research is underway, there is no cure currently available for Ebola and the death toll attributable to this disease continues to increase. To date, … Review of the Relevant Literature
Chapter Introduction
This chapter provides a review of the relevant literature concerning the Ebola virus disease, including transmission methods, symptoms, diagnosis, and current treatment strategies. In addition, this chapter provides an analysis concerning ways to identify optimal emergency management strategies for Ebola ……

References

References

Allam, M. F. (2014, September). Ebola hemorrhagic fever: Case fatality rate 90%? Central European Journal of Public Health 22(3), 207-210.

Allam, M. F. & Vonka, V. (2015, March). Ebola virus disease: Temperature checks for travelers? Central European Journal of Public Health, 23(1), 84.

Brand, J. E. & Stela, D. (2014, October). Ebola is here: Knowledge, identification, and appropriate infection control are key. American Nurse Today, 9(10), 37-39.

Brown, G. (2015, Winter). Ebola in America: An epidemic or a pandemic? ABNF Journal, 26(1), 3-5.

Ebola. (2019). Doctors without Borders. Retrieved from https://www.doctorswithout borders.org/what-we-do/medical-issues/ebola.

Ebola outbreak. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/history/2014-2016-outbreak/index.html .

Ebola virus disease. (2019). U.S. Centers for Disease Control and Prevention. Retrieved from  https://www.cdc.gov/vhf/ebola/index.html .

Hancock, M. (2019, September). After Ebola. African Business, 422, 56-58.

Studyspark

Study Document Study Document

Recruitment Of Talented Employees

Pages: 4 (1315 words) Sources: 4 Document Type:Research Paper Document #:52942441

… to young employees who are regular consumers of social media. According to one HR expert, “Social media profiles have become standard tools for research and evaluating talent. Instead of looking only at candidates’ résumés, thoroughly vet…[break]…are increasingly transient but good employees will be more interested in remaining ……

References

References

Bajic, E. (2013). The 6 steps for retaining good employees. Forbes. Retrieved from:

https://www.forbes.com/sites/elenabajic/2013/07/15/the-6-steps-for-retaining-good- employees/#63a92aa5721f

Fallon, N. (2016). 6 steps for learning how to recruit the best talent. Business News Daily.

Retrieved from:  https://www.businessnewsdaily.com/6252-tips-for-recruiters.html 

Keller, S. & Meaney, (2017). Attracting and retaining the right talent. McKinsey. Retrieved

from:  https://www.mckinsey.com/business-functions/organization/our-insights/attracting - and-retaining-the-right-talent

Williams, D. & Scott, M. (2012). Five ways to retain employees forever. Harvard Business

Review Retrieved from:  https://hbr.org/2012/11/five-ways-to-retain-employees

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

… security over wireless communication systems (Ijemaru et al., 2018). There are several security susceptibilities and shortcomings linked with wireless communication networks.
Based on research conducted by Laeeq (2011), the survivability of wireless communications is associated to the protection mechanism of wireless communications and toughness or strength against … combat this wireless communication security is the physical layer security. Imperatively, security solutions are dealt with in dissimilar layers. For instance, spread-spectrum modulation methods are utilized at the PHY layer to alleviate jamming of any communication channels, authentication instruments are carried out at the link layer to ……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Impact Of Phobias

Pages: 14 (4238 words) Sources: 12 Document Type:Research Paper Document #:96563573

...Research methods Abstract
Phobias are a kind of anxiety disorder that can make an individual to experience extreme irrational fear regarding a situation, object, or living creature. Phobias should not be confused with normal fears since phobias are linked to a particular situation or object and they are persistent for 6 or more months. In this paper, we will describe what a phobia is and offer the differentiation of phobias from normal fear. We will then provide the diagnosis criteria for phobias as indicated in the DSM-5 manual. The 4Ds will be analyzed as they relate to phobia and the models of abnormality will be discussed. Treatment, history, culture, and prognosis will form the later part of the paper.
Description
According to Sutherland, Middleton, Ornstein, Lawson, and Vickers (2016) a phobia is defined as a type of anxiety disorder that makes an individual experience extreme irrational fear about a living creature, situation,……

References

References

Campos, D., Mira, A., Bretón-López, J., Castilla, D., Botella, C., Baños, R. M., & Quero, S. (2018). The acceptability of an internet-based exposure treatment for flying phobia with and without therapist guidance: patients’ expectations, satisfaction, treatment preferences, and usability. Neuropsychiatric disease and treatment, 14, 879.

Carleton, R. N., Thibodeau, M. A., Weeks, J. W., Teale Sapach, M. J. N., McEvoy, P. M., Horswill, S. C., & Heimberg, R. G. (2014). Comparing short forms of the Social Interaction Anxiety Scale and the Social Phobia Scale. Psychological assessment, 26(4), 1116-1126. doi:10.1037/a0037063

Erceg-Hurn, D. M., & McEvoy, P. M. (2018). Bigger is better: Full-length versions of the Social Interaction Anxiety Scale and Social Phobia Scale outperform short forms at assessing treatment outcome. Psychological assessment, 30(11), 1512-1526. doi:10.1037/pas0000601

Goetter, E. M., Frumkin, M. R., Palitz, S. A., Swee, M. B., Baker, A. W., Bui, E., & Simon, N. M. (2018). Barriers to mental health treatment among individuals with social anxiety disorder and generalized anxiety disorder. Psychological Services, No Pagination Specified-No Pagination Specified. doi:10.1037/ser0000254

Halldorsdottir, T., & Ollendick, T. H. (2016). Long-term outcomes of brief, intensive CBT for specific phobias: The negative impact of ADHD symptoms. Journal of Consulting and Clinical Psychology, 84(5), 465-471. doi:10.1037/ccp0000088

Hirsch, J. A. (2018). Integrating Hypnosis with Other Therapies for Treating Specific Phobias: A Case Series. American Journal of Clinical Hypnosis, 60(4), 367-377.

Leitenberg, H., Agras, W. S., Barlow, D. H., & Oliveau, D. C. (1969). Contribution of selective positive reinforcement and therapeutic instructions to systematic desensitization therapy. Journal of Abnormal Psychology, 74(1), 113-118. doi:10.1037/h0027063

Probst, T., Berger, T., Meyer, B., Späth, C., Schröder, J., Hohagen, F., . . . Klein, J. P. (2019). Social phobia moderates the outcome in the EVIDENT study: A randomized controlled trial on an Internet-based psychological intervention for mild to moderate depressive symptoms [Press release]

Studyspark

Study Document Study Document

Effect Of Digital Marketing On Competitiveness Of Automobile Companies

Pages: 7 (2171 words) Sources: 8 Document Type:Research Paper Document #:71991463

Introduction
In the research article “Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya” by Eva Nkatha Kigunda, the objective was to assess how digital … return on investment (ROI) is still insignificant. Digital marketing strategies are mainly used in maintaining the current customer pool for the dealers. The research article is a standard-structured paper that included a literature review under chapter two, pages 8-25. In this paper, a critique of the literature … one, which contains the topic, aim, and scope of the study. The scope of the study is the Kenyan automobile industry and the research conducted review in Nairobi, and the neighboring towns of Rongai, Athi River, Kiambu, and Thika. The study focused on social media marketing, search … The study focused on social media marketing, search engine marketing, and email marketing. This notwithstanding, the author has included some of the crucial research questions in……

References

References

Evans, M.P., 2007. Analysing Google rankings through search engine optimization data. Internet research, 17(1), pp.21-37.

Galvan, J.L. and Galvan, M.C., 2017. Writing literature reviews: A guide for students of the social and behavioral sciences. Routledge.

Kaplan, A.M. and Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 53(1), pp.59-68.

Kigunda, E. N. 2017. Effect of Digital Marketing on Competitiveness of Automobile Companies in Kenya (Doctoral dissertation, United States International University-Africa).

Kimani, B., 2012. When social media does the marketing. Management magazine, (36-37).

Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.

Ngulube, P., Mathipa, E.R. and Gumbo, M.T., 2015. Theoretical and conceptual frameworks in the social and management sciences. Addressing research challenges: Making headway in developing researchers, pp.43-66.

Wong, L.L.C., 2016. Challenges and expectations: Preparing postgraduate students to write literature reviews. In International Conference of the Spanish Association of Applied Linguistics (AESLA), 2016. University of Alicante.

Studyspark

Study Document Study Document

Benefits Of Lifting Weights For Women Between The Ages Of 25 40

Pages: 6 (1869 words) Sources: 7 Document Type:Research Paper Document #:41970293

… idea of lifting weights by discussing how it can improve health and who the role models are for women today. It discusses prior research on women’s health, then describes new findings from recent research that shows the benefits of lifting weights for women. It shows the benefits as relating to improved mood, increased confidence, and improved physical ……

References

References

Choi, P. Y. (1992). The psychological benefits of physical exercise: Implications for women and the menstrual cycle. Journal of Reproductive and Infant Psychology, 10(2), 111-115.

Clapp III, J. F. (2000). Exercise during pregnancy: a clinical update. Clinics in sports medicine, 19(2), 273-286.

Dressler, W. W. (1985). Extended family relationships, social support, and mental health in a southern black community. Journal of health and social behavior, 39-48.

Guntzviller, L. M., King, A. J., Jensen, J. D., & Davis, L. A. (2017). Self-efficacy, health literacy, and nutrition and exercise behaviors in a low-income, Hispanic population. Journal of immigrant and minority health, 19(2), 489-493.

Lavallee, M. E., & Mansfield, L. A. (2013). Weightlifting training gives lifelong benefits. ACSM\\\\\\'s Health & Fitness Journal, 17(2), 34-36.

Lowery, K. (2019). Where Are The Ladies?: The Social and Cultural Reasons Why Women Still Shy Away From Weights in 2018 (Doctoral dissertation).

Rogers, P. & Fogoros, R. (2019). A Fundamental Guide to Weight Training. Retrieved from  https://www.verywellfit.com/weight-training-fundamentals-a-concise-guide-3498525 

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

… system whereby customer data, secure payment gateways and intricate customer data needs to be protected needs the attention of network engineers and appropriate methods to determine a particular node in which to send traffic using both response time of nodes and the amount of available connections between ……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

Investigative Conclusion And Testimony

Pages: 9 (2819 words) Sources: 6 Document Type:Research Paper Document #:77583608

… were emailed to the personal email of Mr. Belcamp by the accused himself. Computer forensics is a scientific process in which case verified methods and approaches are used in an attempt to gather, preserve, or retrieve important data in formats acceptable in a court of law. There ……

References

References

Adam, C. (2016). Forensic Evidence in Court: Evaluation and Scientific Opinion. Hoboken, NJ: John Wiley & Sons.

Casey, E. (Ed.). (2009). Handbook of Digital Forensics and Investigation. Burlington, MA: Academic Press.

Maras, M. (2014). Computer Forensics: Cybercriminals, Laws, and Evidence (2nd ed.). Burlington, MA: Jones & Bartlett Publishers.

Newman, R.C. (2007). Computer Forensics: Evidence Collection and Management. New York, NY: CRC Press.

Reddy, N. (2019). Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations. New York, NY: Springer.

U.S. Department of Justice (2018). Reporting Intellectual Property Crime: A Guide for Victims of Copyright Infringement, Trademark Counterfeiting, and Trade Secret Theft. Retrieved from  https://www.justice.gov/criminal-ccips/file/891011/download 

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

… them, gives them more opportunities to learn in different ways and formats, and allows them to communicate with people in a variety of methods.
Virtual technology also facilitates team collaboration for learners. Kahai, Carroll and Jestice (2007) found that virtual worlds assists learners in communication, sharing knowledge, ……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".