Research Process Essays (Examples)

Studyspark

Study Document Study Document

How To Use Employee Referrals To Increase Workforce But Still Be

Pages: 10 (3022 words) Sources: 5 Document Type:Research Paper Document #:50167640

How to Use Referrals to Identify Diverse Candidates for a Job
Table of Contents
Introduction 2
research Findings 3
Theoretical Framework 4
Findings of Literature research 6
Case 8
Conclusion 11
Bibliography 12
Introduction
As Frank (2018) points out, over 33% of all US employees obtained their job with … to look closely at the relationship between the referring source and the referral. HR should also be careful about how it conducts the process of recruiting candidates: instead of asking for referrals, it may better obtain a diverse staff by asking employees for leads (Ranade, 2020). This … search strategies like deliberately asking for diverse referrals or even for leads instead of referrals can help reduce the risk of non-diverse hires.
research Findings
The theory used to assess the findings for this research was agency theory, which is used to explain the relationship between agents and principles. The theory helps……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

...Research process Right and Left Wing Terror Groups in America
1
Extremism in the U.S. is on the rise, based on the rise in polarization throughout the country as the Left and the Right become more and more opposed to one another ideologically, politically, socially, and emotionally. There is a strong rift between the two and little sense of common ground. Much of this rise has come on the heels of the rise in social media use, which allows individuals to promote their views to the rest of the world in a way that was literally unheard of prior to the digital revolution (Freberg, Graham, McGaughey & Freberg, 2011). As social media use has essentially risen exponentially since its inception in the 2000s, the level of ideologically-driven Influencers in the space is a reflection and facilitator of the level of extremism in the United States.
As both the popularity of groups like……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Governments Procurement Methods In Integrated Public Service

Pages: 8 (2291 words) Sources: 6 Document Type:Research Paper Document #:45996468

… the government to involve the private sector and the general public in the provision of public services. There are conflicting views regarding the process of negotiation, participation by the public and private financiers, and accountability. In recent days, a lot of research has been focusing on the implementation of PPPs. The Public-Private Partnership programs have been put to use in both developed and developing countries.
… and many have been adopted or tried. There are also case studies that have been widely used elsewhere. These initiatives have stimulated further research in PPPs. The result has been the development of new PPP models, frameworks, issues to do with concession, project financing, risk management, allocation, … While there have been numerous efforts to streamline PPPs, efforts to streamline their framework have been random.
Further, the development trends of PPP research are still unclear. There has been some research to establish the……

References

Bibliography

Duff, V. (2020). What is organizational integration? Retrieved from  https://smallbusiness.chron.com/organizational-integration-82053.html 

Friedman, S. (2016). Successful public/private partnerships from principles to practices. Washington, DC: Urban Land Institute.

Ma, L., Li, J., Jin, R., &Ke, Y. (2019). A holistic review of public-private partnership literature published between 2008 and 2018. Advances in Civil Engineering. Retrieved from  http://downloads.hindawi.com/journals/ace/2019/7094653.pdf 

PrivacySense. (2016). Public sector. Retrieved from  http://www.privacysense.net/terms/public-sector/ 

Reddy, C. (2016). Staff training: Importance, benefits, advantages, and disadvantages. Retrieved from  https://content.wisestep.com/staff-training-importance-benefits-advantages-disadvantages/ 

Sekhri, N., Feachem, R., & Ni, A. (2011). Public-private integrated partnerships demonstrate the potential to improve health care access, quality, and efficiency. Health Affairs, 30(8).

Studyspark

Study Document Study Document

Gun Violence Among African American Community

Pages: 8 (2377 words) Sources: 9 Document Type:Research Paper Document #:47528781

… highly technical phrases would then be avoided whenever possible (Schopper, Lormand&Waxweiler, 2006). Mental health professionals will also be included in the policy development process. The trauma of a community may be an outcome of the violent experience. The trauma may predispose violence, in turn, promoting a vicious … how to react when functions have been compromised.
Keys Traits
The characteristics of the policy are as follows:
· Restricting access to ammunition: research has demonstrated beyond doubt that there are benefits linked to restricted access to ammunition. The policy recommends extending the background checks for the … taken effect (Schopper, Lormand & Waxweiler, 2006).
The results from the approach can be impressive because the recommendations are the brainchild of appropriate research. Coordination of agencies charged with crime prevention is a complex affair. The intervention measures are equally tricky. Those trusted with preventing crime incidents ……

References

References

Armstrong, M., & Carlson, J. (2019). Speaking of trauma: The race talk, the gun violence talk, and the racialization of gun trauma. Palgrave Communications, 5(112).  https://doi.org/10.1057/s41599-019-0320-z 

Maxson, C. L., Hennigan, K, and D. C. Sloane. (2003). For the sake of the neighborhood? Civil gang injunctions as a gang intervention tool in Southern California. In Scott H. Decker, Ed. Policing Gangs and Youth Violence. Belmont, CA: Wadsworth/Thomson Learning

Morris, S. (2018). Mass shootings in the US: There have been 1,624 in 1,870 days. The Guardian.  https://www.theguardian.com/us-news/ng-interactive/2017/oct/02/america-mass-shootings-gun-violence 

Payne, B. K. (2006). Weapon bias: split-second decisions and unintended stereotyping. Curr Directions Psychological Sci, 15(6), 287–291.

Roman, J. K. (2013).Race, justifiable homicide, and stand your ground laws: Analysis of FBI supplementary homicide report data. Retrieved from  http://www.ncjrs.gov/App/publications/abstract.aspx?ID=265405 

Schopper, D., Lormand, J. D.,&Waxweiler, R (eds). (2006).Developing policies to prevent injuries and violence: guidelines for policy-makers and planners. Geneva, World Health Organization.

Tate, J., Jenkins, J., Rich, S., Muyskens, J., Elliott, K., Mellnik, T., &Williams, A. (2016).How the Washington Post is examining police shootings in the United States. The Washington Post.

Tita, G. E., Troshynski, E., & Graves, M. (2007). Strategies for reducing gun violence: The role of gangs, drugs, and firearm accessibility. Research Report: National Crime Prevention Centre (NCPC). Retrieved from  https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/rdcng-gn-vlnc/rdcng-gn-vlnc-eng.pdf

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … a German word meaning “pattern,” or “shape,” and Wertheimer provided some empirical support for his theory first by publishing the results of his research in human perception. Wertheimer studied a phenomenon called apparent motion, a type of visual illusion that occurs when watching a film reel (Woldt … include Wolfgang Kohler, who is……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Gestalt Therapy Counseling Psychology History And Interventions

Pages: 7 (2051 words) Sources: 8 Document Type:Research Paper Document #:37769060

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … a German word meaning “pattern,” or “shape,” and Wertheimer provided some empirical support for his theory first by publishing the results of his research in human perception. Wertheimer studied a phenomenon called apparent motion, a type of visual illusion that occurs when watching a film reel. The … is credited with saying “the……

References

References

Brownell, P. (2016). Contemporary Gestalt therapy. In D. J. Cain, K. Keenan, & S. Rubin (Eds.), Humanistic psychotherapies: Handbook of research and practice (p. 219–250). American Psychological Association.  https://doi.org/10.1037/14775-008 

Cherry, K. (2019). Gestalt psychology overview. Very Well Mind. Retrieved from:  https://www.verywellmind.com/what-is-gestalt-psychology-2795808 

Covey, G. (2017). Theory and practice of counseling and psychotherapy, enhanced, 10th edition. Cengage.

Jacobs, L. (1989). Dialogue in Gestalt theory and therapy. The Gestalt Journal 12(1): 1-25. Retrieved from:  http://www.gestaltpsychotherapie.de/jacobs1.pdf 

Kepner, E. (n.d.). Gestalt group processes. Retrieved from:  http://www.elementsuk.com/libraryofarticles/gestalt.pdf 

Oaklander, V. (1994). Gestalt play therapy. In O’Connor, K.J. & Schaefer, C.E. (Eds.). Handbook of play therapy. John Wiley & Sons, pp. 143-156.

Rock, I. & Palmer, S. (1990). The legacy of Gestalt psychology. Scientific American 263(6): 84-91.

Yontef, G. & Jacobs, L. (n.d.). Gestalt therapy. Retrieved from:  https://pdfs.semanticscholar.org/1211/3bf06e5fa3208fea4330873403ae65b0891c.pdf

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the process information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It … information systems from such physical threats.
The controls include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having process in place for everyday data and information system backups, tested, state-of-the-art disaster recovery interventions, and rotation and off-site backup data storage in a … and public-key cryptography, several information systems continue to be at risk of internal as well as external attacks. Security setups are a time-consuming process and do not play any part in helpful output;……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

The Differences In Religions And Their Burial Rituals

Pages: 10 (2909 words) Sources: 8 Document Type:Research Paper Document #:18018467

… are common. The precise steps in the preparation of the body are:
1. Covering the body with a sheet to await the cleansing process.
2. Uncovering the body once the process is ready to be begun
3. Using water to purify the body, either by submersion or by water poured from three buckets
4. … Roman Catholic religion, the deceased will receive a Requiem Mass, which includes prayers for the dead at the foot of the altar. A process would begin at the house of the deceased, with the priest reading the De Profundis and sprinkling the deceased with holy water. In … De Profundis and sprinkling the deceased with holy water. In my own experience, this practice is not done anymore and instead of a process from the house, the family arranges with a funeral service to prepare the body for a layout (a wake), where a priest……

References

Works Cited

Brener, Anne. Mourning and Mitzvah: A Guided Journal for Walking the Mourner’s Path Through Grief to Healing. Jewish Lights/Turner Publishing, 2017.

Goldstein, Z. “The Jewish Burial.” https://www.chabad.org/library/article_cdo/aid/368092/jewish/The-Burial.htm

Goodman, Arnold M.  A Plain Pine Box: A Return to Simple Jewish Funerals and Eternal Traditions. Ktav Publishing House, 2003.

Reform Judaism.  https://www.funeralwise.com/customs/jewish/reform/ 

Sheikh, Aziz, and Abdul Rashid Gatrad, eds. Caring for Muslim patients. Radcliffe Publishing, 2008.

Siddiqui, Abdul Hamid. Sahih Muslim. Peace Vision, 2012.

Toner, Patrick. "Extreme Unction." The Catholic Encyclopedia. Vol. 5. New York: Robert Appleton Company, 1909.

Wilde, Melissa J. Vatican II: A sociological analysis of religious change. Princeton University Press, 2018.

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

… assault-style weapons (65% vs. 31%) and high-capacity magazines (63% vs. 35%)” (Gramlich and Schaeffer, 2019). These perspectives routinely pronounce themselves in the electoral process. To a large extent, pro-gun voters appear to be convinced that one of the most effective ways of protecting and promoting their gun … weight to gun ownership rights in political decisions. The impact pro-gun organizations like the NRA have in as far as the general election process is concerned cannot also be overstated. This is more so the case given their tendency to make hefty contributions to their politicians of ……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types … for evaluating the success of the implementation of a system by incorporating two professional organization standards are followed by a summary of the research and important findings about the challenges and issues involved are presented in the paper’s conclusion..
A. Discussion and analysis of health information systems
… Summary of advantages and disadvantages of a system.
A health information system is defined by Abouzhar (2009) as an "integrated effort to collect, process, report and use health information and knowledge to influence policy-making, program action and research" (p. 578). Although health information systems may differ significantly in terms of configurations and capabilities,……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Join thousands of other students and

"spark your studies".