Research Process Essays (Examples)

Studyspark

Study Document Study Document

How To Use Employee Referrals To Increase Workforce But Still Be

Pages: 10 (3022 words) Sources: 5 Document Type:Research Paper Document #:50167640

How to Use Referrals to Identify Diverse Candidates for a Job
Table of Contents
Introduction 2
research Findings 3
Theoretical Framework 4
Findings of Literature research 6
Case 8
Conclusion 11
Bibliography 12
Introduction
As Frank (2018) points out, over 33% of all US employees obtained their job with … to look closely at the relationship between the referring source and the referral. HR should also be careful about how it conducts the process of recruiting candidates: instead of asking for referrals, it may better obtain a diverse staff by asking employees for leads (Ranade, 2020). This … search strategies like deliberately asking for diverse referrals or even for leads instead of referrals can help reduce the risk of non-diverse hires.
research Findings
The theory used to assess the findings for this research was agency theory, which is used to explain the relationship between agents and principles. The theory helps……

References

Bibliography

Bussin, M., & Christos, D. (2018). Blind hiring not as crazy as it sounds. HR Future,  2018(Sep 2018), 36-39.

CBS News (2017). Retrieved from  http://www.cbsnews.com/videos/meet-bozoma-saint-john-the-woman-tasked-with-fixing-ubers-image/ 

Eisenhardt, K. M. (1989). Agency theory: An assessment and review. Academy of management review, 14(1), 57-74.

Frank, L. (2018). How to Use Employee Referrals Without Giving Up Workplace Diversity. Retrieved from  https://hbr.org/2018/03/how-to-use-employee-referrals-without-giving-up-workplace-diversity 

Jensen, M., & Meckling, W. (1976) Theory of the firm: Man- agerial behavior, agency costs, and ownership structure. Journal of Financial Economics, 3, 305-360.

Larcker, D. F., & Tayan, B. (2017). Governance Gone Wild: Epic Misbehavior at Uber Technologies. Rock Center for Corporate Governance at Stanford University Closer Look Series: Topics, Issues and Controversies in Corporate Governance No. CGRP-70, 18-3.

Payscale. (2018). Retrieved from  https://www.payscale.com/data/job-referral s

ProActive Solutions. (2020). Agency theory. Retrieved from http://knowledgegrab.com/learners-zone/study-support/performance-management-review/framework-introduction-to-hrm/agency-theory/

Studyspark

Study Document Study Document

Domestic Terrorism And Extremist Groups

Pages: 13 (3981 words) Sources: 12 Document Type:Research Paper Document #:80039324

...Research process Right and Left Wing Terror Groups in America
1
Extremism in the U.S. is on the rise, based on the rise in polarization throughout the country as the Left and the Right become more and more opposed to one another ideologically, politically, socially, and emotionally. There is a strong rift between the two and little sense of common ground. Much of this rise has come on the heels of the rise in social media use, which allows individuals to promote their views to the rest of the world in a way that was literally unheard of prior to the digital revolution (Freberg, Graham, McGaughey & Freberg, 2011). As social media use has essentially risen exponentially since its inception in the 2000s, the level of ideologically-driven Influencers in the space is a reflection and facilitator of the level of extremism in the United States.
As both the popularity of groups like……

References

References

Barnett, B. A. (2015). 20 Years Later: A Look Back at the Unabomber Manifesto.  Perspectives on Terrorism, 9(6), 60-71.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Costello, M., & Hawdon, J. (2018). Who are the online extremists among us? Sociodemographic characteristics, social networking, and online experiences of those who produce online hate materials. Violence and gender, 5(1), 55-60.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Hamm, M &Spaaj, R. (2015). Lone wolf terrorism in America: Using knowledge of radicalization pathways to forge prevention strategies. U.S. Department of Justice. Retrieved from  https://www.ncjrs.gov/pdffiles1/nij/grants/248691.pdf 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Studyspark

Study Document Study Document

Gestalt Theory

Pages: 9 (2559 words) Sources: 3 Document Type:Research Paper Document #:29092375

… word signifying a pattern or shape. The roots of Gestalt therapy can be traced to Max Wertheimer, who studied human perceptual illusions. Wertheimer’s research led to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed … to a holistic view of the human psyche that provided a necessary counterpoint to the fragmented, reductionist, and structuralist views that prevailed in research psychology. Gestalt therapy emerged after blending the principles of Gestalt with the goals of psychotherapy. In particular, Gestalt therapists like Frederick “Fritz” Perls … a German word meaning “pattern,” or “shape,” and Wertheimer provided some empirical support for his theory first by publishing the results of his research in human perception. Wertheimer studied a phenomenon called apparent motion, a type of visual illusion that occurs when watching a film reel (Woldt … include Wolfgang Kohler, who is……

References

References

Corey, G. (2016). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.

Levine, T. B. Y. (2012). Gestalt Therapy: Advances in Theory and Practice. New York, NY: Taylor & Francis.

Woldt, A. L., & Toman, S. M. (2005). Gestalt Therapy: History, Theory, and Practice. Thousand Oaks, CA: SAGE Publications.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… the past, lost much to these crimes and, hence, must come up with plans to prevent such future occurrences. In this paper, the process information technology security audits entail and how such audits enhance organizational IT security will be dealt with. According to research on the subject, IT security auditing constitutes a significant step in the safeguarding of corporate data against cybercrime, data breaches, and fraud. It … information systems from such physical threats.
The controls include different kinds of locks, hardware insurance coverage, and coverage of information recreation costs, having process in place for everyday data and information system backups, tested, state-of-the-art disaster recovery interventions, and rotation and off-site backup data storage in a … and public-key cryptography, several information systems continue to be at risk of internal as well as external attacks. Security setups are a time-consuming process and do not play any part in helpful output;……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

The Differences In Religions And Their Burial Rituals

Pages: 10 (2909 words) Sources: 8 Document Type:Research Paper Document #:18018467

… are common. The precise steps in the preparation of the body are:
1. Covering the body with a sheet to await the cleansing process.
2. Uncovering the body once the process is ready to be begun
3. Using water to purify the body, either by submersion or by water poured from three buckets
4. … Roman Catholic religion, the deceased will receive a Requiem Mass, which includes prayers for the dead at the foot of the altar. A process would begin at the house of the deceased, with the priest reading the De Profundis and sprinkling the deceased with holy water. In … De Profundis and sprinkling the deceased with holy water. In my own experience, this practice is not done anymore and instead of a process from the house, the family arranges with a funeral service to prepare the body for a layout (a wake), where a priest……

References

Works Cited

Brener, Anne. Mourning and Mitzvah: A Guided Journal for Walking the Mourner’s Path Through Grief to Healing. Jewish Lights/Turner Publishing, 2017.

Goldstein, Z. “The Jewish Burial.” https://www.chabad.org/library/article_cdo/aid/368092/jewish/The-Burial.htm

Goodman, Arnold M.  A Plain Pine Box: A Return to Simple Jewish Funerals and Eternal Traditions. Ktav Publishing House, 2003.

Reform Judaism.  https://www.funeralwise.com/customs/jewish/reform/ 

Sheikh, Aziz, and Abdul Rashid Gatrad, eds. Caring for Muslim patients. Radcliffe Publishing, 2008.

Siddiqui, Abdul Hamid. Sahih Muslim. Peace Vision, 2012.

Toner, Patrick. "Extreme Unction." The Catholic Encyclopedia. Vol. 5. New York: Robert Appleton Company, 1909.

Wilde, Melissa J. Vatican II: A sociological analysis of religious change. Princeton University Press, 2018.

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

… assault-style weapons (65% vs. 31%) and high-capacity magazines (63% vs. 35%)” (Gramlich and Schaeffer, 2019). These perspectives routinely pronounce themselves in the electoral process. To a large extent, pro-gun voters appear to be convinced that one of the most effective ways of protecting and promoting their gun … weight to gun ownership rights in political decisions. The impact pro-gun organizations like the NRA have in as far as the general election process is concerned cannot also be overstated. This is more so the case given their tendency to make hefty contributions to their politicians of ……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Optimizing Health Information Systems

Pages: 12 (3717 words) Sources: 16 Document Type:Research Paper Document #:99273225

… Health Information Systems
Although the merger of two comparably sized companies competing in the same industry is a relatively commonplace business strategy, the process is fraught with obstacles and challenges and a significant percentage of merged entities fail outright because of these problems (Murphy, 2019). These types … for evaluating the success of the implementation of a system by incorporating two professional organization standards are followed by a summary of the research and important findings about the challenges and issues involved are presented in the paper’s conclusion..
A. Discussion and analysis of health information systems
… Summary of advantages and disadvantages of a system.
A health information system is defined by Abouzhar (2009) as an "integrated effort to collect, process, report and use health information and knowledge to influence policy-making, program action and research" (p. 578). Although health information systems may differ significantly in terms of configurations and capabilities,……

References

References

Abouzhar, C. & Boerma, T. (2009, August). Health information systems: The foundations of public health. Bulletin of the World Health Organization, 83(8), 578-583.

Cresswell, K. & Aziz, S. (2013, May). Organizational issues in the implementation and adoption of health information technology innovations: An interpretative review. International Journal of Medical Informatics, 87(5), 73-86.

Drazen, E. L. (2006, February). Maximizing the benefits of health care information systems. Journal of Medical Systems, 10(1), 51-56.

Kruse, C. S. & Smith, D. (2017, July). Security techniques for the electronic health records. Journal of Medical Systems, 41(8), 127.

Kumar, V. (2011). Impact of health information systems on organizational health communication and behavior. The Internet Journal of Allied Health Sciences and Practice, 9(2), 37-44.

McGrail, K. M. & Black, C. (2009, August). Access to data in health information systems. Bulletin of the World Health Organization, 83(8), 563-569.

Murphy, M. L. (2019, March). Mastering accounting for business combinations: Mergers and acquisitions present challenges that finance can overcome by staying involved with the deal and preparing in advance of the closing. Journal of Accountancy, 227(3), 24-27.

NAHQ code of ethics for healthcare quality. (2019). National Association for Healthcare Quality. Retrieved from  https://nahq.org/about/code-of-ethics .

Studyspark

Study Document Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… counterproliferation strategy that would inevitably become the plan to stop the spread and usage of WMDs by terrorists against America. As the primary research question of this study is “In what ways can the nonproliferation regime connect and collaborate with homeland security as a way to improve … infiltration of organizations and enemy groups has always been a mainstay of U.S. intelligence. From COINTELPRO to today, covert action is an important process in preventing cells or groups from taking steps to undermine or attack the interests of America. [8: The Commission to Assess the Organization … Fentanyl Smuggling." US Att'ys Bull. 66 (2018): 57.]
Conclusion
The FBI’s counterproliferation strategy can be successful if it follows the recommendations of the scholars and research cited herein: their recommendations are to engage in greater collaboration with other nations in the international community; engage in covert operations to track ……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019. https://www.belfercenter.org/publication/long-arm

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Studyspark

Study Document Study Document

Healthcare Provider Shortage

Pages: 9 (2590 words) Sources: 7 Document Type:Research Proposal Document #:93189886

… have worked toward identifying short-term and long-term…[break]…policymakers in the county to develop and enact regulatory proposals for increase in scope of practice. The process of developing and enactment of the proposals will take a duration of one year. Upon enactment of such regulations, the organization should partner … months to one year. The required resources for the implementation of this proposed plan include technological equipment, financial resources for lawmaking and other process, and educational and training resources.
Project Evaluation
A critical aspect toward determining the effectiveness of this proposed plan is examining the achievement of … resources.
Project Evaluation
A critical aspect toward determining the effectiveness of this proposed plan is examining the achievement of measurable outcomes. The evaluation process will be carried out periodically i.e. once every quarter after the implementation of the proposed solution. First, the evaluation will measure the number ……

References

References

Antonelli, A.F. (2019, May 14). Does America Have a Physician Shortage – or Are Our Doctors ‘Just Bad at Managing Time’? Retrieved August 5, 2019,  https://www.advisory.com/daily-briefing/2019/05/14/physician-shortage 

Daly, R. (2018, May 22). Healthcare Workforce Shortage Worsening: Senators. Retrieved August 5, 2019, from  https://www.hfma.org/topics/news/2018/05/60811.html 

Desmon, S. (2019, March 1). Doctors in Short Supply in Rural Maryland. Baltimore Sun. Retrieved August 5, 2019, from  https://www.baltimoresun.com/bal-id.rural01mar01-story.html 

Heath, S. (2019, July 11). What Clinician Recruitment Tactics Say About the Physician Shortage. Retrieved August 5, 2019, from https://patientengagementhit.com/news/what-clinician-recruitment-tactics-say-about-the-physician-shortage

Merritt Hawkins. (2019). 2019 Review of Physician and Advanced Practitioner Recruiting Incentives. Retrieved August 5, 2019, from  https://www.merritthawkins.com/uploadedFiles/merritthawkins_2019_incentivereview.pdf 

Western Maryland Health System and Allegany County Health Department. (2011, November). Allegany County Community Health Needs Assessment. Retrieved August 5, 2019, from http://www.alleganyhealthplanningcoalition.com/pdf/ACHD%20Community%20Health%20Needs%20Assessment.pdf

Wolford, H.B. (2018, May 28). Allegany County Sees Shortage of Health Care Workers. Time News. Retrieved August 5, 2019, from https://www.times-news.com/news/local_news/allegany-county-sees-shortage-of-health-care-workers/article_28b1030d-4403-5d84-aa26-fe17d61b8561.html

Studyspark

Study Document Study Document

Right Of Informed Refusal For Minors

Pages: 9 (2623 words) Sources: 4 Document Type:Research Paper Document #:16932208

… to examine the arguments in support of and against allow minors to make end-of-life decisions for themselves, followed by a summary of the research and important findings concerning this issue in the conclusion.
Review and Analysis
On the one hand, there are increasing calls to allow young … emphasize that, “Informed consent should be seen as an essential part of health care practice; parental permission and childhood assent is an active process that engages patients, both adults and children, in their health care” (p. 30).
Rather than relying on an arbitrary demarcation date concerning legal … in that developmental maturation allows, over time, for increasing inclusion of the child’s and adolescent’s opinion in medical decision-making in clinical practice and research” (2016, p. 30). This observation suggests that the ability of minors to participate in their health care decisions exists along a continuum ranging … status, though, essentially ends when……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Bryden, J. (2016, February 25). Medical help in dying should be widely available, with few restrictions: Report. The Canadian Press, 6.

Hursthouse, R. & Pettigrove, G. (2018, Winter). Virtue ethics. The Stanford Encyclopedia of Philosophy. Retrieved from  https://plato.stanford.edu/archives/win2018/entries/ethics-virtue .

Katz, A. L. & Webb, S. A. (2016, August). Informed consent in decision-making in pediatric practice. Pediatrics, 138(2), 30-37.

Lemmens, C. (2009, September). End- of- life decisions and minors: do minors have the right to refuse life preserving medical treatment? A comparative study. Medical Law Review, 28(3), 479-497.

Physician-assisted suicide. (2019). CNN. Retrieved from https://www.cnn.com/2014/11/26/us/ physician-assisted-suicide-fast-facts/index.html.

Salsberry, P. J. (1999, January 1). Caring, virtue theory, and a foundation for nursing ethics. Scholarly Inquiry for Nursing Practice, 6(2), 155-160.

Williams, Z. (2012, October 25). Early puberty: why are kids growing up faster? The Guardian. Retrieved from  https://www.theguardian.com/society/2012/oct/25/early-puberty-growing-up-faster .

Join thousands of other students and

"spark your studies".