Research Questions Essays (Examples)

Study Document

Discriminating Between Phenomenology And Grounded Theory Qualitative

Pages: 7 (2226 words) Sources: 7 Document Type:Case Study Document #:86692193

Phenomenology and Grounded Theory Approaches
Both phenomenology and grounded theory are commonly used approaches to qualitative research in the social sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between … sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between multiple qualitative methods, research in education should ultimately focus their attention on the best method for exploring single, focused research questions and their real-world applications (Baker, Wuest, & Stern, 1992, p. 1355). Grounded theory has been described as a “practical method for conducting research” that shows how people construct meaning about their social world (Suddaby, 2006, p. 633). Therefore, grounded theory is sociological in origin and linked … in origin and linked to the concept of symbolic interactionism (Starks & Brown Trinidad, 2007). The methods used for grounded theory……

References

References

Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x 

Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.

Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.

Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031 

Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020 

Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.

Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).

Study Document

Qualitative Methods In Education Research

Pages: 6 (1944 words) Sources: 7 Document Type:Essay Document #:88925548

Background of the Issue
Parental involvement has long been established as an important variable in student achievement along various outcome parameters. Prior research has shown that parental involvement can lead to the cultivation of strong reading habits (Castro, Exposito-Casas, Lopez-Martin, et al., 2015), student self-esteem and … with other governmental, human service, and community organizations (Ma, Shen, Krenn, et al., 2015). Therefore, one of the most important subjects in educational research and educational administration is parental involvement. research need to learn how to increase parental involvement in meaningful ways, ways that yield desired outcomes for individual students and also for the … to increase parental involvement in meaningful ways, ways that yield desired outcomes for individual students and also for the school and community. Furthermore, research need to learn the best ways of increasing parental involvement while taking into account the socioeconomic and cultural diversity among the population.
Because ………

References

References

Benner, A.D., Boyle, A.E. & Sadler, S. (2016). Parental Involvement and Adolescents’ Educational Success: The Roles of Prior Achievement and Socioeconomic Status. Journal of Youth and Adolescence 45(6): 1053-1064.

Castro, M., Esposito-Casas, E., Lopez-Martin, E., et al. (2015). Parental involvement on student academic achievement: A meta-analysis. Educational Research Review 14(2015): 33-46.

Creswell, J.W. & Poth, C.N. (2018). Qualitative Inquiry Research Design. Los Angeles: SAGE.

Hill, N.E., Witherspoon, D.P. & Bartz, D. (2016). Parental involvement in education during middle school: Perspectives of ethnically diverse parents, teachers, and students. The Journal of Educational Research 111(1): 12-27.

Ma, X., Shen, J., Krenn, HY., et al. (2016). A meta-analysis of the relationship between learning outcomes and parental involvement. Educational Psychology Review 28(4): 771-801.

Park, S. & Holloway, S. (2018). Parental Involvement in Adolescents\\' Education: An Examination of the Interplay among School Factors, Parental Role Construction, and Family Income. School Community Journal 28(1): 9-36.

Ule, M., Zivoder, A. & duBois-Reymond, M. (2015). ‘Simply the best for my children’: patterns of parental involvement in education. International Journal of Qualitative Studies in Education 28(3): 329-348.

Study Document

Alzhemier S Prevention Healthcare

Pages: 6 (1871 words) Sources: 3 Document Type:Research Article Chart Document #:28350849

research Article Chart
Criteria and Defining Characteristics
Article 1:
Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., … study?
· What is the scope of the study?
· What is the rational for the study?
· What is the hypothesis or research question?
· What key concepts and terms are noted?
· Is a review of the literature provided?
The purpose of this study is … the incidence of dementia may have a significant impact on healthcare costs and the general encumbrance of dementia
There is no hypothesis or research question
The key concepts and terms noted include mild cognitive impairment and dementia
A review of the literature is provided
The purpose of …
The rationale of the study is that dietary factors have been linked to cognitive function in older individuals.
There is not hypothesis or research question delineated in the article……

References

References

Abraham, R. P., Denton, D. A., Al?Assaf, A. S., Rutjes, A. W., Chong, L. Y., Malik, M. A., & Tabet, N. (2015). Vitamin and mineral supplementation for prevention of dementia or delaying cognitive decline in people with mild cognitive impairment. Cochrane Database of Systematic Reviews, (10).

Kwok, T. C. Y., Lam, L. C. W., Sea, M. M. M., Goggins, W., & Woo, J. (2012). A randomized controlled trial of dietetic interventions to prevent cognitive decline in old age hostel residents. European journal of clinical nutrition, 66(10), 1135.

Dangour, A. D., Whitehouse, P. J., Rafferty, K., Mitchell, S. A., Smith, L., Hawkesworth, S., & Vellas, B. (2010). B-vitamins and fatty acids in the prevention and treatment of Alzheimer\\'s disease and dementia: a systematic review. Journal of Alzheimer\\'s disease, 22(1), 205-224.

Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… provide the context for this study is discussed as well as a review of existing literature on the topic. A qualitative case study research design based on the Just War Theory will be utilized to conduct this research. Data will be collected from professionals in international relations and cyber security as well as existing publications on recent cyber espionage activities by … of professionals within this field and examine existing cases on cyber espionage by China and Russia.
To identify an appropriate representative sample, the research will utilize purposive sampling approach. Individuals within the research’s professional networks will be contacted and approached to participate in the study based on their knowledge and expertise on the phenomenon being studied. … based on their knowledge and expertise on the phenomenon being studied. Some of the potential ethical issues that could emerge include privacy of research participants and confidentiality. These issues will……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf 

Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).

Georgieva, I. “The Unexpected Norm-Setters: Intelligence Agencies in Cyberspace.” Contemporary Security Policy (2019).

Hjortdal, M. “China’s Use of Cyber Warfare: Espionage Meets Strategic Deterrence.” Journal of Strategic Security 4, no. 2 (2011).

Libicki, M. “The Coming of Cyber Espionage Norms.” 9th International Conference on Cyber Conflict, 2017.  https://ccdcoe.org/uploads/2018/10/Art-01-The-Coming-of-Cyber-Espionage-Norms.pdf 

National Counterintelligence and Security Center. “Foreign Economic Espionage in Cyberspace.” Office of the Director of National Intelligence, 2018.  https://www.dni.gov/files/NCSC/documents/news/20180724-economic-espionage-pub.pdf 

Rubenstein, D. “Nation State Cyber Espionage and its Impacts.” Washington University in St. Louis, December 2014.  https://www.cse.wustl.edu/~jain/cse571-14/ftp/cyber_espionage/ 

Weissbrodt, D. “Cyber-Conflict, Cyber-Crime, and Cyber-Espionage.” Minnesota Journal of International Law 22, no. 2 (2013).

Study Document

Biblical Text And God S Character

Pages: 8 (2389 words) Sources: 5 Document Type:Research Proposal Document #:46963717

The character of God as revealed in the Biblical text
Table of Contents
Introduction 1
Goal of this research 2
research question 2
Definition of terms 2
Literature review 2
Liberationist hermeneutics 2
Principles guiding hermeneutic liberationist 3
Methodology 4
Search procedure 4
Analysis … Bible Study' within biblical liberation hermeneutics and intercultural biblical hermeneutics." HTS Theological Studies 70, no. 1 (2014): 1-10.] [3: Genesis 9:20-27]
The goal of this research
This study is meant to determine the character of God as revealed in the biblical text, under the hermeneutic liberationist lenses of reading … meant to determine the character of God as revealed in the biblical text, under the hermeneutic liberationist lenses of reading the Bible. This research seeks to explore how contextual biblical hermeneutics, in general, can be put in conversation with the historical-critical (original context) of the approach.
research question
To help in meeting the study goal, this research……

References

References

Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.

Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.

Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.

Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.

Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.

Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.

Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.

West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.

Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… Intelligence
CI Literature Review
Introduction
The aim of this examination of the literature is to fill the wide gap that remains in counterintelligence research regarding an appropriate ethical standard that can guide and foster an ethical culture, as called for by Bellaby (2012) and Valentine (2016). The … by Bellaby (2012) and Valentine (2016). The purpose of this review is to identify the lessons that have been learned and presented by research on this topic, and to identify an appropriate theoretical framework for assessing the way forward. The research question for this study is: How can the US counterintelligence enterprise support collaboration among the various USIC members and the private sector in … intelligence professionals must “act in good faith even with those who are their adversaries” (4). Yet, this point is not supported by all research, including Cohen (2016), who argues that there are no moral limits on……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… of Cloud Computing within an Accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 research Problem 5
1.4 research questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review 6
2.1 Cloud Computing …
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 research Approach and Design 12
3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data Analysis Plan & Rationale 15
4 Contributions to Theory or Practice and … of day and from varying geographical areas. Ultimately, this provides the organization with a competitive advantage because the business operations continue running smoothly.
research Problem
In the present day, the advancement of……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Study Document

Domestic Extremism And Terrorism

Pages: 12 (3640 words) Sources: 12 Document Type:Research Paper Document #:16554681

Proud Boys vs Antifa War of Words
Introduction and research Question
When it comes to domestic extremism, there are groups on both the Right and the Left of the socio-political spectrum in America. … great deal of similarities. This paper looks at two extremist groups in particular—Antifa on the Left and Proud Boys on the Right. The questions this paper poses are: What is the nature of Antifa and how does Proud Boys mirror the group from the opposite spectrum? How … to stop their spread overall since they naturally feed upon one another and the invective that they both communicate.
Conclusions
To answer the research questions, it has been shown that Antifa and Proud Boys are essentially two sides of the same coin. Both represent the extreme sides of … by a three-pronged approach using a public health method, governmental collaboration, and a change in laws regarding the expression……

References

References

Breger, M. L. (2017). Reforming by re-norming: How the legal system has the potential to change a toxic culture of domestic violence. J. Legis., 44, 170.

Beinart, P. (2017). The rise of the violent left. Retrieved from  https://www.theatlantic.com/magazine/archive/2017/09/the-rise-of-the-violent-left/534192/ 

Brockhoff, S., Krieger, T. & Meierrieks, D. (2014). Great expectations and hard times: the (nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7), 1186-1215.

Brown, D. (2017). Proud boys founder. Retrieved from  https://www.portlandmercury.com/blogtown/2017/12/12/19540403/proud-boys-founder-wants-to-trigger-the-entire-state-of-oregon-by-helping-patriot-prayers-joey-gibson-win-the-oregon-person-of-the-year- p

Cramer, E. P., Choi, Y. J., & Ross, A. I. (2017). Race, Culture, and Abuse of Persons with Disabilities. In Religion, Disability, and Interpersonal Violence (pp. 89-110). Springer, Cham.

Dalgaard-Nielsen, A. (2016). Countering violent extremism with governance networks. Perspectives on Terrorism, 10(6), 135-139.

DeCook, J. R. (2018). Memes and symbolic violence:# proudboys and the use of memes for propaganda and the construction of collective identity. Learning, Media and Technology, 43(4), 485-504.

Doyle, E. (Ed.). (2018). Antifa and the Radical Left. Greenhaven Publishing LLC.

Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

...Research questions The FBI, Counterproliferation, and Weapons of Mass Destruction
The United States government significantly increased activities in programs involved in the protection of the nation and the world against weapons of mass destruction (WMD) in 2009 and 2010. The Obama Administration, in December 2009, gave a presidential policy directive aimed at countering biological threats with a focus on infectious illnesses whether such threats were manmade or natural. It was the second such directive the Administration had issued. The Quadrennial Defense Review in 2010 emphasized on how WMD’s proliferation was a threat to global security. In April of the same year, the Administration unclassified the Nuclear Posture Review for the first time and it was released alongside the Strategic Arms Reduction Treaty. The treaty was aimed at lowering the number of deployable US and Russian weapons. Representatives drawn from all over the world met in May with a goal of renewing the……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Study Document

FBI Drugs And WMDs

Pages: 11 (3378 words) Sources: 13 Document Type:Research Paper Document #:66505511

… counterproliferation strategy that would inevitably become the plan to stop the spread and usage of WMDs by terrorists against America. As the primary research question of this study is “In what ways can the nonproliferation regime connect and collaborate with homeland security as a way to improve … Fentanyl Smuggling." US Att'ys Bull. 66 (2018): 57.]
Conclusion
The FBI’s counterproliferation strategy can be successful if it follows the recommendations of the scholars and research cited herein: their recommendations are to engage in greater collaboration with other nations in the international community; engage in covert operations to track ……

References

Bibliography

Arnold, Aaron and Daniel Salisbury, “The Long Arm,” Belfer Center, 2019.  https://www.belfercenter.org/publication/long-arm 

Carter, Ashton B. "Overhauling counterproliferation." Technology in Society 26, no. 2-3 (2004): 257-269.

The Commission to Assess the Organization of the Federal Government to Combat the Proliferation of Weapons of Mass Destruction. “Combating Proliferation of Weapons of Mass Destruction,” Washington, D.C., 1999.

FBI. “COINTELPRO.”  https://vault.fbi.gov/cointel-pro 

FBI Counterproliferation Center. “About.”  https://www.fbi.gov/about/leadership-and-structure/national-security-branch/fbi-counterproliferation-center 

Fischer, Rowena Rege. “Guide to the Study of Intelligence: Counterproliferation,” Journal of U.S. Intelligence Studies 21, no. 1 (Winter 2014-15), 78-82.

Liow, Joseph Chinyong. "The Mahathir administration's war against Islamic militancy: operational and ideological challenges." Australian Journal of International Affairs 58, no. 2 (2004): 241-256.

Manchikanti, Laxmaiah, Jaya Sanapati, Ramsin M. Benyamin, Sairam Atluri, Alan D. Kaye, and Joshua A. Hirsch. "Reframing the prevention strategies of the opioid crisis: focusing on prescription opioids, fentanyl, and heroin epidemic." Pain physician 21, no. 4 (2018): 309-326.

Join thousands of other students and

"spark your studies".