Technical Writing Essays (Examples)

Studyspark

Study Document Study Document

Sex Gender And Work Segregation In Cultural Industries

Pages: 2 (671 words) Sources: 2 Document Type:Essay Document #:72867739

… tend to find work in jobs such as production coordination, marketing and PR. Men tend to be found in more creative roles and technical jobs. While the authors claim that stereotypes are the reason for this workplace segregation, Hoffman and Hurst suggest that role schemas actually precede … affected by change and people respond to those changes. More women are entering into roles traditionally reserved for men. There are women occupying technical roles and serving as production heads, making executive decisions. There are women directors and writers. Meanwhile families are changing, and there are more ……

References

Works Cited

Hesmondhalgh, David, and Sarah Baker. \\"Sex, gender and work segregation in the cultural industries.\\" The Sociological Review 63 (2015): 23-36.

Hoffman, Curt, and Nancy Hurst. \\"Gender stereotypes: Perception or rationalization?.\\" Journal of personality and social psychology 58.2 (1990): 197.

Studyspark

Study Document Study Document

Boys Dont Cry 1999 Transgenderism

Pages: 3 (790 words) Document Type:Movie Review Document #:25718786

… Don’t Cry depicts the challenges faced by a young man in the 1990s attempting to transition from female to male. Transgenderism is the technical term used to describe someone who was born a particular anatomical sex, but identifies as the opposite gender. The film shows the difficulty ……

Studyspark

Study Document Study Document

Ethics And Health Information

Pages: 8 (2462 words) Sources: 6 Document Type:Term Paper Document #:87876213

...Technical writing Managing Medical Records and the Implementation of Tools and Safeguards Required within HIS
Introduction
Few practices are more important in managing health information systems than managing medical records, safeguarding patients’ medical history, and ensuring that all end users of medical information technology are approved and trained. Some of the biggest factors in security breaches are end users themselves (Rhee, Kim & Ryu, 2009). This is why training of staff on how to use equipment and the importance of protecting passwords is so important (Jackson, 2018). However, the system itself should have system protections built-in that can protect against end user mistakes—protections such as double security via multi-factor authentication (Crossler & Posey, 2017). This paper will discuss the programming language and relational databases that should be used to accommodate security needs for the HIS, the information tools and safeguards required to protect it, the security needed for electronic health records, an……

References

References

Campbell, R. J. (2004). Database Design: What HIM Professionals Need to Know.

Perspectives in Health Information Management 2004, 1:6 (August 4, 2004). Retrieved from  http://library.ahima.org/xpedio/groups/public/documents/ahima/bok1_024637.hcsp?dDocName=bok1_024637 

Crossler, R. E., & Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem. Journal of The Association for Information Systems, 18(7), 487-515.

Donovan, F. (2018). Judge Gives Final OK to $115M Anthem Data Breach Settlement. Retrieved from https://healthitsecurity.com/news/judge-gives-final-ok-to-115m-anthem-data-breach-settlement

HealthIT.gov. (2018). Health Information Privacy, Security, and Your EHR. Retrieved from  https://www.healthit.gov/providers-professionals/ehr-privacy-security 

The IMIA Code of Ethics for Health Information Professionals. (n.d.). Retrieved from http://www.imia medinfo.org/new2/pubdocs/Ethics_Eng.pdf

Jackson, R. (2018). Pulling strings. Retrieved from  https://iaonline.theiia.org/2018/Pages/Pulling-Strings.aspx 

Prince, B. (2013). Programming Languages Susceptible to Specific Security Flaws: Report. Eweek, 12.  Retrieved from  https://www.eweek.com/security/programming-languages-susceptible-to-specific-security-flaws-report

Studyspark

Study Document Study Document

Adolescent Psychosocial Assessment

Pages: 10 (2865 words) Sources: 8 Document Type:Case Study Document #:54875989

… socially acceptable ways. The socializing process is so important that it has a major effect on all kinds of behavior, including skills of technical nature. Most of the boys of teenage age in the U.S. feel that they won't be compatible with their social group before they ……

References

References

Alexander Jr, R. (2010). The Impact of Poverty on African American Children in the Child Welfare and Juvenile Justice Systems. In Forum on Public Policy Online (Vol. 2010, No. 4). Oxford Round Table. 406 West Florida Avenue, Urbana, IL 61801.

Belgrave, F. Z., & Allison, K. W. (2009). African American psychology: From Africa to America. Los Angeles: Sage.

Brittian A. S. (2012). Understanding African American Adolescents\\\\\\' Identity Development: A Relational Developmental Systems Perspective. The Journal of black psychology, 38(2), 172–200.  https://doi.org/10.1177/0095798411414570 

Chávez, R. (2016). Psychosocial development factors associated with occupational and vocational identity between infancy and adolescence. Adolescent Research Review, 1(4), 307-327.

Crain, W. C. (2014). Theories of development: Concepts and applications. Harlow, Essex: Pearson.

Fernandes-Alcantara, A. L. (2018). Vulnerable Youth: Background and policies.Congressional Research Service

Newman, B. M., & Newman, P. R. (2015). Theories of human development. Psychology Press.

Reubins, B. M., &Reubins, M. S. (2014). Pioneers of child psychoanalysis: Influential theories and practices in healthy child development. London: Karnac.

Studyspark

Study Document Study Document

Counterintelligence Issues Within The United States

Pages: 18 (5457 words) Sources: 29 Document Type:Research Paper Document #:72238996

… as Nolan (1997) shows it is dangerous to think of counterintelligence as a security exercise because it is literally nothing of the sort. writing from the standpoint of private industry, Nolan (1997) states explicitly that “while security seeks to protect a firm's assets by a combination of ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. "The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles." Bachelor's thesis, Università Ca'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Cohen, Shlomo. 2016. "Are There Moral Limits to Military Deception?." Philosophia 44 (4): 1305-1318.

Coyne, John, Peter Bell, and Shannon Merrington. 2013. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2 (10): 27-37.

Erskine, Toni. 2004. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. "Strategic denial and deception." International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… as Nolan (1997) shows it is dangerous to think of counterintelligence as a security exercise because it is literally nothing of the sort: writing from the standpoint of private industry, Nolan (1997) states explicitly that “while security seeks to protect a firm's assets by a combination of … chains, 3) counter the exploitation of the US economy, 4) defend American democracy against foreign influence, and 5) counter foreign intelligence cyber and technical operations (4). These objectives differ from the 2018-2022 National Counterintelligence and Security Center Strategic Plan. Under Director William R. Evanina, integration of CI ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

Royale Racing RP16

Pages: 6 (1922 words) Sources: 7 Document Type:Essay Document #:41916637

...Technical writing The Impact of Royale Racing on Race Club Engineering
Introduction
Royale Racing was established in 1968 by Bob King in Great Britain. The company produced single seater race cars until 1987 when the company closed its production facility. King had had some experience in working on speedway cars in New Zealand in his youth and after returning to Great Britain he opened a car lot, selling road cars. His father owned a motor showroom, which is where King learned to take his interest in cars in the first place (Ward). Operating his own lot, he acquired a used Elva on a trade-in and kept it around with the intention of racing the car—but the car caught the attention of other consumers and because he had experience in the speedway, he found that he had a skill set that was in demand in a niche market in England. Thus, he soon……

References

Works Cited

1973 Royale RP16 Formula Ford.  https://bringatrailer.com/listing/1973-royale-rp16/ 

“About Royale Racing.” Royale FCS Competition Services.  http://www.racingcarsforsale.co.uk/frameset-royale.htm 

Brazilian Formula Ford.  http://www.driverdb.com/standings/152-1970/cars/ 

Lawrence, Paul. Nowhere to Hide: The Story of Royale Racing Cars. TFM Publishing, 2001.

“Royale.”  http://www.f3history.co.uk/Manufacturers/Royale/royale.htm?LMCL=nU3Mya 

Royale Race Tires. “About Us.” http://www.royaleracetires.com/about-us/

Ward, Ian. “Royale Racing.” The World of Automobiles, volume 17. Pennsylvania State University, 1974.

Studyspark

Study Document Study Document

Field Experience Report Observation In The Deaf Classroom

Pages: 9 (2606 words) Sources: 8 Document Type:Essay Document #:99266210

… the federal authorities to measure student progress is the NAEP. They measure academic progress in a range of areas, including mathematics, reading, geography, writing, history, and the arts (Hombo, 2003’ Malik et al., 2018).
The social development with the education of the deaf happens through extra-curricular tasks, ……

References

References

Guardino, C., & Antia, S. D. (2012). Modifying the classroom environment to increase engagement and decrease disruption with students who are deaf or hard of hearing. Journal of Deaf Studies and Deaf Education, 17(4), 518-533.

Hombo, C. M. (2003). NAEP and No Child Left Behind: Technical challenges and practical solutions. Theory into Practice, 42(1), 59-65.

Jeffries Jr., R. L. (2010). A Case Study of a Teacher Implementing Guided Reading in a Deaf Classroom. ProQuest LLC.

Malik, A. M., Rashid, M., Awan, M. Y., & Alvi, I. B. (2018). The Role of Architecture in the Identification of Obstacles and Spatial Solutions to Inclusive Education. UMT Education Review (UER), 1(2), 39-58.

Renard, M. (1999). Les sourds dans la ville: surdités et accessibilité. ARDDS (Association pour la réadaptation et la défense des devenus-sourds).

Romano, A.M. (2013). Observing a Residential School for the Deaf: Identifying Factors in Creating a Deafcentric Environment. (The Honors Program, Gallaudet University).

Staten, F. D. (2011). Examining the influence of the residential school for the deaf experience on deaf identity. (Doctor of Philosophy thesis, University of Iowa).

Van Gent, T., Goedhart, A. W., Knoors, H. E., Westenberg, P. M., & Treffers, P. D. (2012). Self-concept and ego development in deaf adolescents: a comparative study. Journal of deaf studies and deaf education, 17(3), 333-351.

Studyspark

Study Document Study Document

Electronic Health Records EHR

Pages: 8 (2498 words) Sources: 4 Document Type:Essay Document #:76313206

...Technical writing Introduction
An electronic health record (EHR) is a person's authentic health record that is shared among various agencies and offices (Hasanain, 2014). The role of EHRs is getting to be expanding persuasive as progressively tolerant data winds up computerized and bigger quantities of customers express a need to have portable access to their health records. It is an electronic form of a patient's paper record. EHRs offer the upside of making data about patient consideration accessible, in a protected way, to numerous approved clients (Kierkegaard, 2019). In spite of the fact that EHRs change in content and usefulness, they are regularly intended to incorporate the therapeutic and treatment accounts of the patient, just as the patient's findings, meds, vaccination dates, radiology pictures, and lab and test results, among other data. EHRs can possibly coordinate data from various sources and give a progressively thorough perspective on patient consideration despite the fact……

References

References

Gagnon, D., Simonyan, E.K., Ghandour, G., Godin, M., Labrecque, M., Ouimet, M.R. (2016). Factors influencing electronic health record adoption by physicians: A multilevel analysis, Int J Inform Manage, 36, pp. 258-270.

Hasanain, H. (2014). Cooper Solutions to overcome technical and social barriers to electronic health records implementation in Saudi public and private hospitals, J Health Inform Dev Ctries, pp. 46-63.

Kierkegaard, P. (2019). Electronic health record: Wiring Europe\\\\'s healthcare: Computer Law & Security Review. 27 (5): 503–515.

Murphys, E.V., & Yale, J. (2014). Clinical decision support: effectiveness in improving quality processes and clinical outcomes and factors that may influence success. Biol Med; 87, pp. 187–97.

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

… of restricted institutional capability, unsuitable credit policies, unpredictable interest rates, poor institutional management, inadequate rules and regulations, insufficient capital and liquidity levels, inappropriate writing of financial loans, negligence in credit evaluation, intrusion by the government, in addition to inadequate monitoring by the national monetary authority (Kithinki, 2010). ……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".