Study Document
...Science Education Law Policy and Social Justice Mother Tongue Instruction
The population of students receiving their instruction in another language apart from their mother tongue is increasing as a consequence of the increased migration. Indeed, as Bingol (2012) points out, “migration and language are clearly linked issues…. because the language of instruction in the schools is different from the language spoken at home, some arrangements must be done for these children in these bilingual situations” (1016). Quite a number of research studies conducted in the past indicate that learners could have better comprehension of curriculum in those instances whereby learning is firmly rooted in their mother tongue. This is particular the case in early learning. In one such study, it was found out that in early childhood classroom education, mother tongue was a key factor in the further advancement of the learning abilities of children (Awopetu, 2016). To a large extent,……
References
Awopetu, A.V. (2016). Impact of Mother Tongue on Children’s Learning Abilities in Early Childhood Classroom. Procedia - Social and Behavioral Sciences, 23, 58-63.
Busse, V., Cenoz, J., Dalmann, N. & Rogge, F. (2019). Addressing Linguistic Diversity in the Language Classroom in a Resource?Oriented Way: An Intervention Study with Primary School Children. Language Learning.
Bingol, A.S. (2012). Mother tongue instruction policies towards Turkish migrant children in Europe. Procedia - Social and Behavioral Sciences, 70, 1016-1023.
Mcmahon, T., Griese, E.R. & Kenyon, D.B. (2019). Cultivating Native American scientists: An application of an Indigenous model to an undergraduate research experience. Cultural Studies of Science Education, 14, 77-110.
Ozfidan, B. (2017). Right of Knowing and Using Mother Tongue: A Mixed Method Study. English Language Teaching; 10(12), 15-23.
Peyton, J.K. (2015). Language of Instruction: Research Findings and Program and Instructional Implications. Reconsidering Development, 4(1), 71-79.
Philips, J.S. (2015). The rights of indigenous peoples under international law. Global Bioethics, 26(2), 75-82.
Sahin, I. (2018). A look at mother tongue education in the context of the right to education. Educational Research and Reviews, 13(9), 343-353.
Study Document
...Science Private Security and Homeland Defense
Questions 2 and 3
Question 2:
The Intelligence Community is comprised of 17 agencies. These agencies work with Federal, State, Local, Tribal and Territorial partners to protect the homeland. Four of these agencies are intelligence elements of the Department of Defense Services – Army, Navy, Marine Corps and Air Force. Please pick ONE of these Department of Defense Services intelligence elements and explain its mission. In what ways does it contribute to the intelligence cycle? Provide examples.
The Department of Defense Services intelligence element that I selected in this particular case is the Defense Intelligence Agency (DIA). The stated mission of DIA is “provide intelligence on foreign militaries to prevent and decisively win wars” (DIA, 2020). Thus, it is important to note, from the onset, that this particular agency largely concerns itself with not only the gathering, but also the production of military intelligence. As……
References
Customs and Border Protection – CBP (2020). About CBP. Retrieved from https://www.cbp.gov/about
Department of Homeland Security – DHD (2016). Section 559 Pilot Program Donations Acceptance. Retrieved from https://www.dhs.gov/sites/default/files/publications/Customs%20and%20Border%20Protection%20-%20Section%20559%20Pilot%20Program%20Donations%20Acceptance%20-%20FY%202016.pdf
Defense Intelligence Agency – DIA (2020). Strategy. Retrieved from https://www.dia.mil/About/Strategy/
Keating, T.J. (2011). Joint and National Intelligence Support to Military Operations. Washington, DC: DIANE Publishing.
Office of the Director of National Intelligence (2020). Defense Intelligence Agency. Retrieved from https://www.intelligence.gov/index.php/how-the-ic-works/our-organizations/412-dia
U.S. Government Accountability Office – GAO (2020). U.S. Ports of Entry: Update on CBP Public-Private Partnership Programs. Retrieved from https://www.gao.gov/assets/710/704191.pdf
Study Document
...Science Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……
References
Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.
Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.
Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.
Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.
Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.
Study Document
Phenomenology and Grounded Theory Approaches
Both phenomenology and grounded theory are commonly used approaches to qualitative research in the social sciences. While grounded theory and phenomenology can sometimes be used simultaneously in ways that “slur” or “blur” the distinction between multiple qualitative methods, researchers … to the concept of symbolic interactionism (Starks & Brown Trinidad, 2007). The methods used for grounded theory approaches to research in the social science include observations and other ethnographic data collection techniques, coupled with open coding for data analysis (Creswell, 2013). Interviews are one of the most … an emerging theory is grounded in reality, while also showing how the observed experiences, populations, or phenomena reflect emerging theory in the social sciences.
Phenomenology differs from grounded theory in several key ways, including its philosophical orientation. Whereas grounded theory focuses more on sociological interactions among research ……
References
Baker, C., Wuest, J., & Stern, P. N. (1992). Method slurring: the grounded theory/phenomenology example. Journal of Advanced Nursing, 17(11), 1355–1360.doi:10.1111/j.1365-2648.1992.tb01859.x
Creswell, J. W. (2013). Qualitative inquiry and research design: Choosing among five approaches. eBook.
Norton, S.M. (2013). A phenomenological investigation into the self-efficacy beliefs of teachers who have presisted in the teaching profession. Liberty University Dissertation.
Starks, H., & Brown Trinidad, S. (2007). Choose Your Method: A Comparison of Phenomenology, Discourse Analysis, and Grounded Theory. Qualitative Health Research, 17(10), 1372–1380.doi:10.1177/1049732307307031
Suddaby, R. (2006). From the Editors: What Grounded Theory is Not. Academy of Management Journal, 49(4), 633–642.doi:10.5465/amj.2006.22083020
Wimpenny, P. & Gass, J. (2001). Interviewing in phenomenology and grounded theory: is there a difference? Journal of Advanced Nursing 31(6): 1485-1492.
Yalof, B. (2014). Marshaling resources. The Grounded Theory Review 13(1).
Study Document
… a wide array of potential climate-related risks (IPCC Working Group II, 2014). Moreover, the risks that are associated with…[break]…future climate-related hazards by applying science-based conservation strategies as discussed further below.
How can you apply this to your career as an emergency manager?
It is reasonable to posit ……
References
Edwards, F. L. (2011, Spring). Symposium: Preparing for climate change. The Public Manager, 40(1), 20-25.
IPCC Working Group II. (2014). Assessing and managing the risks of climate change. Retrieved from https://www.ipcc.ch/site/assets/uploads/2018/03/WGIIAR5_SPM_Top_Level_ Findings-1.pdf.
Labadie, J. R. (2011). Emergency managers confront climate change. Sustainability, 3, 1250-1264.
Leven, R. & Goldstein, Z. (2019). Kentucky is among the states blocking climate action. As weather gets more extreme, its residents — and U.S. taxpayers — are paying a price. Public Integrity. Retrieved from https://publicintegrity.org/environment/one-disaster-away/a-dangerous-disconnect-disaster-prone-states/ .
Mickus, J. (2017, June 1). A Sugar Creek chronicle: Observing climate change from a Midwestern woodland. Perspectives on Science and Christian Faith, 69(2), 110-114.
The Nature Conservancy. (2020). Pennsylvania climate solutions. Retrieved from https://www. nature.org/en-us/about-us/where-we-work/united-states/pennsylvania/stories-in-pennsylvania/pennsylvania-climate-solutions/.
Study Document
...Science Introduction
The elderly population, like every other population in the world today, can benefit from changes that have occurred in the world thanks to technological revolutions. The Internet, for instance, has allowed a virtual world to emerge that rivals the real world in terms of social opportunities. News spreads instantly thanks to the Internet, and people can communicate with one another and retrieve information more easily today than at any point in human history. Technology can thus be used to address some of the changes and challenges within the elderly population today. Those changes and challenges include changes in environment as the population moves into assisted living and combating isolation and depression, which can occur in this population. Likewise, because of the nature of the globalized world it is more likely that this population will be more diverse than it has been in the past, which means there will be……
References
Aging and Disability Services. (2013). Promote Healthy Aging. Retrieved from http://www.agingkingcounty.org/healthy_aging.htm
Baker, T. A. (2014). The importance of aging studies: Understanding the influence of diversity and culture. Age Culture Humanities: An Interdisciplinary Journal (1). Retrieved from http://ageculturehumanities.org/WP/the-importance-of-aging-studies-understanding-the-influence-of-diversity-and-culture/
Banks, M. R., Willoughby, L. M., & Banks, W. A. (2008). Animal-assisted therapy and loneliness in nursing homes: use of robotic versus living dogs. Journal of the American Medical Directors Association, 9(3), 173-177.
Brojeni, S. A., Ilali, E. S., Taraghi, Z., & Mousavinasab, N. (2019). Lifestyle and its related factors in elderly. Journal of Nursing and Midwifery Sciences, 6(1), 32.
Cornwell, E. Y., & Waite, L. J. (2009). Measuring social isolation among older adults using multiple indicators from the NSHAP study. Journals of Gerontology Series B: Psychological Sciences and Social Sciences, 64(suppl_1), i38-i46.
Landeiro, F., Barrows, P., Musson, E. N., Gray, A. M., & Leal, J. (2017). Reducing social isolation and loneliness in older people: a systematic review protocol. BMJ Open, 7(5), e013778.
Liu, S. J., Lin, C. J., Chen, Y. M., & Huang, X. Y. (2007). The effects of reminiscence group therapy on self-esteem, depression, loneliness and life satisfaction of elderly people living alone. Mid-Taiwan Journal of Medicine, 12(3), 133-142.
Moore, E. G., & Rosenberg, M. W. (2001). Canada's elderly population: the challenges of diversity. Canadian Geographer, 45(1), 145.
Study Document
… is part 3 of the quality and sustainability paper. Part 1 outlined the descriptive method of assessing quality and safety measures in nursing science. It was concluded that administrative data could be used to determine the effectiveness of quality or safety program since safety is the most … administrative data could be used to determine the effectiveness of quality or safety program since safety is the most fundamental aspect of nursing science (Twigg, Pugh, Gelder, & Myers, 2016). In part 2, analysis and application of safety programs were explored and Kenneth E. Waldenberg Health Care ……
References
Alenius-Smeds, L., Tishelman, C., Lindqvist, R. Runesdotter, S. & McHugh, M.D. (2016). RN assessments of excellent quality of care and patient safety are associated with significantly lower odds of 30-day inpatient mortality: A national cross-sectional study of acute-care hospitals. International Journal of Nursing Studies. Retrieved from http://dx.doi.org/10.1016/j.ijnurstu.2016 (06)005
Brasait?, I., Kaunonen, M., Martink?nas, A., Mockien?, V., & Suominen, T. (2016). Health care professionals’ skills regarding patient safety. Medicina, 52(4), 250-256. doi:10.1016/j.medici.2016.05.004
Campbell, R. J. (2008). Change Management in Health Care. The Health Care Manager, 27(1), 23-39. Retrieved from https://www.ncbi.nlm.nih.gov/pubmed/18510142
Hughes, R.G. (2007). "3 Barriers to quality improvement and quality improvement research." Institute of Medicine (IOM). Advancing quality improvement research: Challenges and opportunities: Workshop summary. doi:10.17226/11884.x
Lennox, L., Maher, L., & Reed, J. (2018). Navigating the sustainability landscape: a systematic review of sustainability approaches in healthcare. Implementation science: IS, 13(1), 27. doi:10.1186/s13012-017-0707-4
Stetler C.B., Ritchie J.A., Rycroft-Malone J. & Charns M.P. (2014) Leadership for evidence-based practice: strategic and functional behaviors for institutionalizing EBP. Worldviews on Evidence Based Nursing 11(4), 219–226.
Twigg, D. E., Pugh, J. D., Gelder, L., & Myers, H. (2016). Foundations of a nursing-sensitive outcome indicator suite for monitoring public patient safety in Western Australia. Collegian, 23(2), 167-181. doi:10.1016/j.colegn.2015.03.007
Study Document
… Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
1. Describe how the researcher addresses the following four areas in the selected journal article (Introduction, Literature Review, Methodology and Data Analysis:
……
References
Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.
Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.
Study Document
...Science The Telecoms Industry
In the study by Lai, Griffin and Babin (2009) entitled “How quality, value, image, and satisfaction create loyalty at a Chinese telecom,” the researchers used an integrative model to assess the relationship between multiple variables related to consumers’ experience of telecoms in China. The researchers conducted a survey of 118 Chinese telecommunications customers and found that service quality has a direct impact on value perception. Value and customer satisfaction, moreover, were found to determine the extent to which the customer would be loyal to the firm. Corporate image perceptions were also found to impact customer satisfaction. The researchers were able to conclude that customer satisfaction and service quality do make a substantial difference in determining whether customers will be retained or not.
Kim, Park and Jeong (2004) examined how a Korean telecommunications company focused on retaining customers in their article entitled “The effects of customer satisfaction and……
References
Angelova, B., & Zekiri, J. (2011). Measuring customer satisfaction with service quality using American Customer Satisfaction Model (ACSI Model). International journal of academic research in business and social sciences, 1(3), 232. Retrieved from http://hrmars.com/admin/pics/381.pdf
Boohene, R., & Agyapong, G. K. (2011). Analysis of the antecedents of customer loyalty of telecommunication industry in Ghana: The case of Vodafone (Ghana). International Business Research, 4(1), 229-240. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.662.3208&rep=rep1&type=pdf
Chu, P. Y., Lee, G. Y., & Chao, Y. (2012). Service quality, customer satisfaction, customer trust, and loyalty in an e-banking context. Social Behavior and Personality: an international journal, 40(8), 1271-1283.
Lai, F., Griffin, M., & Babin, B. J. (2009). How quality, value, image, and satisfaction create loyalty at a Chinese telecom. Journal of business research, 62(10), 980-986. Retrieved from shorturl.at/BMTY7
Lee, H. S. (2013). Major moderators influencing the relationships of service quality, customer satisfaction and customer loyalty. Asian Social Science, 9(2), 1. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.428.6730&rep=rep1&type=pdf
Liu, C. T., Guo, Y. M., & Lee, C. H. (2011). The effects of relationship quality and switching barriers on customer loyalty. International Journal of Information Management, 31(1), 71-79.
Khatibi, A. A., Ismail, H., & Thyagarajan, V. (2002). What drives customer loyalty: An analysis from the telecommunications industry. Journal of Targeting, Measurement and Analysis for Marketing, 11(1), 34-44. Retrieved from https://link.springer.com/content/pdf/10.1057/palgrave.jt.5740065.pdf
Kim, M. K., Park, M. C., & Jeong, D. H. (2004). The effects of customer satisfaction and switching barrier on customer loyalty in Korean mobile telecommunication services. Telecommunications policy, 28(2), 145-159. Retrieved from shorturl.at/imDEX
Study Document
… globe continue to stick to a pen-and-paper system, including those in developed nations such as America. This is an obstacle on the medical science path as well as gives rise to regression due to the waste caused by it. Besides patients paying the price through adverse health ……
Bibliography
Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.
Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions: https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/
DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.
Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).
Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.
IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.
Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.
Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.
We have over 150,000+ study documents to help you.
Sign Up for FREE