Thematic Analysis Essays (Examples)

Study Document

Cyber Espionage

Pages: 16 (4895 words) Sources: 24 Document Type:Case Study Document #:27491269

… behavior for intelligence gathering though it potentially damages relations between nation-states?” The qualitative case study examined existing studies on this issue and employed thematic analysis to analyze the data. The study found that cyber espionage is an acceptable state behavior since it plays a key role in cyber … improve their cyber and modern warfare capabilities through enhanced intelligence gathering. [31: Michael Connell & Sarah Vogler, “Russia’s Approach to Cyber Warfare”, CNA analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf]
Probable Errors in analysis or Decision-making
As shown in the analysis, existing data provides explanations for the acceptability of cyber espionage as a state behavior based on three major themes or patterns. These themes … establish appropriate countermeasures. While these themes help to answer the research question, the employed research methodology and design could have included errors in analysis or decision-making. The qualitative case study design could result in errors in analysis……

References

Bibliography

Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018.  https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf 

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Biblical Text And God S Character

Pages: 8 (2389 words) Sources: 5 Document Type:Research Proposal Document #:46963717


Research question 2
Definition of terms 2
Literature review 2
Liberationist hermeneutics 2
Principles guiding hermeneutic liberationist 3
Methodology 4
Search procedure 4
analysis of the literature 5
Expected outcomes 5
Influence by third-parties 6
Timeline 6
References 7
Introduction
In Judaism and Christianity, the Bible is ……

References

References

Elliott, John E. \\\\\\"Oppression, Exploitation and Injustice in the Old Testament: The View from Liberation Theology.\\\\\\" International Journal of Social Economics, Vol. 19, No. 10/11/12 (1992): 15-52.

Hayes, John H., and Carl R. Holladay. Biblical exegesis: a beginner\\\\\\'s handbook. Westminster John Knox Press, 2007.

Klein, William W., Craig L. Blomberg, and Robert L. Hubbard Jr. Introduction to biblical interpretation. Zondervan Academic, 2017.

Pontifical Biblical Commission. The Interpretation of the Bible in the Church: Address of His Holiness Pope John Paul II and Document of the Pontifical Biblical Commission. Libreria Editrice Vaticana, 1993.

Thiselton, Anthony C. Hermeneutics: an introduction. Wm. B. Eerdmans Publishing, 2009.

Thomas, James, and Angela Harden. \\\\\\"Methods for the thematic synthesis of qualitative research in systematic reviews.\\\\\\" BMC medical research methodology 8, no. 1 (2008): 45.

Tikito, Iman, and Nissrine Souissi. \\\\\\"Meta-analysis of systematic literature review methods.\\\\\\" International Journal of Modern Education and Computer Science 11, no. 2 (2019): 17.

West, Gerald O. \\\\\\"Locating \\\\\\'Contextual Bible Study\\\\\\' within biblical liberation hermeneutics and intercultural biblical hermeneutics.\\\\\\" HTS Theological Studies 70, no. 1 (2014): 1-10.

Study Document

Drug Abuse

Pages: 8 (2545 words) Sources: 21 Document Type:literature review Document #:24528043

… search strategies used as well as the selection criteria for the literature searches. It then discusses the findings of the literature review in thematic terms and presents a conclusion summarizing what has been learned.
Methods & Search Strategies
The databases utilized for this literature review were accessed ……

References

References

Baggio, S., Spilka, S., Studer, J., Iglesias, K., & Gmel, G. (2016). Trajectories of drug use among French young people: Prototypical stages of involvement in illicit drug use. Journal of Substance Use, 21(5), 485-490.

Bonyani, A., Safaeian, L., Chehrazi, M., Etedali, A., Zaghian, M., & Mashhadian, F. (2018). A high school-based education concerning drug abuse prevention. Journal of education and health promotion, 7.

Chu, Y. W. L. (2015). Do medical marijuana laws increase hard-drug use?. The Journal of Law and Economics, 58(2), 481-517.

Downes, D. (2017). The drug addict as a folk devil. In Drugs and politics (pp. 89-97). Routledge.

Goodchild, M., Nargis, N., & d\\'Espaignet, E. T. (2018). Global economic cost of smoking-attributable diseases. Tobacco control, 27(1), 58-64.

Grant, C. N., & Bélanger, R. E. (2017). Cannabis and Canada’s children and youth.  Paediatrics & child health, 22(2), 98-102.

Herbert, A., Gonzalez-Izquierdo, A., McGhee, J., Li, L., & Gilbert, R. (2016). Time-trends in rates of hospital admission of adolescents for violent, self-inflicted or drug/alcohol-related injury in England and Scotland, 2005–11: population-based analysis. Journal of Public Health, 39(1), 65-73.

Henkel, D., & Zemlin, U. (2016). Social inequality and substance use and problematic gambling among adolescents and young adults: a review of epidemiological surveys in Germany. Current drug abuse reviews, 9(1), 26-48.

Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384


3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview Questions 13
3.4 Sample Population 13
3.5 Ethical Considerations 14
3.6 Data analysis Plan & Rationale 15
4 Contributions to Theory or Practice and their Significance 16
5 Ethical Issues and Methods to Address 17
6 … party. Moreover, no financial incentives or bribes will be offered to any research participants to be involved (Queirós, Faria, & Almeida, 2017).
Data analysis Plan & Rationale
Data analysis in a qualitative study is largely dissimilar to a quantitative study. Data analysis is the systematic organization and amalgamation of the research data and the testing of the research hypothesis by capitalizing on those data. What … as well as summarizing the data and delineating them in meaningful terms (Saunders, Lewis, and Thornhill, 2015). From a quantitative standpoint, the data analysis process will begin by transcribing the interview responses obtained from the……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Study Document

Cyber Espionage

Pages: 6 (1662 words) Sources: 8 Document Type:Research Paper Document #:11946972

… participants will be utilized for the purposes of this study only.
Data obtained from the interviewees and the publications will be analyzed through thematic analysis. The thematic analysis will entail constant comparison and triangulation of the data to identify emerging themes that answer the research question. While the research design will ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

Cyber Espionage

Pages: 7 (2040 words) Sources: 5 Document Type:Research Paper Document #:12891464

… participants will be utilized for the purposes of this study only.
Data obtained from the interviewees and the publications will be analyzed through thematic analysis. The thematic analysis will entail constant comparison and triangulation of the data to identify emerging themes that answer the research question. While the research design will ……

References

Bibliography

Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013.  https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf " target="_blank" REL="NOFOLLOW">

Study Document

What Followers Can Learn From Their Leaders During Crisis

Pages: 10 (2861 words) Sources: 5 Document Type:Research Paper Document #:13609293

… via email and allocating a two-week return period. The interview data gathered was then coded to eliminate identifying information and then analyzed via thematic analysis.
Table 1. Interviewees
Interviewee code
Profession
Position
Region/department of work
Int – 1
Sheriff Officer
Deputy
Miami-Dade
Int – 2
Sheriff Officer
Deputy
……

References

References

Birnbaum, T., & Friedman, H. H. (2014). Ezra and Nehemiah: Lessons in Moral and Spiritual Leadership. Available at SSRN 2390230.

Carrington, D. J., Combe, I. A., & Mumford, M. D. (2019). Cognitive shifts within leader and follower teams: Where consensus develops in mental models during an organizational crisis. The Leadership Quarterly, 30(3), 335-350.

Harter, J. (2019). Why Some Leaders Have Their Employees\\\\\\' Trust, and Some Don\\\\\\'t. Workplace. Gallup.

Hofmeyr, K., Cook, J., & Richardson, A. (2011). How leaders generate hope in their followers. South African Journal of Labour Relations, 35(2), 47-66.

Kranke, D., Gin, J., Der-Martirosian, C., Weiss, E. L., & Dobalian, A. (2020). VA social work leadership and compassion fatigue during the 2017 hurricane season. Social Work in Mental Health, 18(2), 188-199.

Patton, C. (2017). What made Nehemiah an effective leader?. Journal of Applied Christian Leadership, 1(1), 8-14.

Rogers, A. P., & Barber, L. K. (2019). Workplace intrusions and employee strain: the interactive effects of extraversion and emotional stability. Anxiety, Stress, & Coping, 32(3), 312-328.

Skeet, A. (2020, April 4). Ethical Followership in Times of Crisis. Markkula Center for Applied Ethics, Santa Clara University.

Study Document

Program Logic Model

Pages: 6 (1769 words) Sources: 8 Document Type:question answer Document #:91645810

...Thematic analysis 1) What social problem did the program seek to address?
The social problem that the program sought to address was the need to reduce risky sexual behaviors among teenage youths. Risky sexual behavior is common among teens (Chapin, 2001) and programs that focus on educating teens about reducing risks associated with sex can be a way to address the issue (Walsh-Buhi et al., 2016). However, there is a need to understand teens’ perspective and for adults to be able to relate to what teens are going through in order to help convey the message about risk (Kerpelman, McElwain, Pittman & Adler-Baeder, 2016). For that reason, the program aimed to find a way to help bridge the gap between adult educators and youths and the idea of using young parents as peer educators to talk to teens about sex and preventing teen pregnancy was the focus of the program in the……

References

References

Bandura, A. (2018). Toward a psychology of human agency: Pathways and reflections.  Perspectives on Psychological Science, 13(2), 130-136.

Bickel, R., Weaver, S., Williams, T., & Lange, L. (1997). Opportunity, community, and teen pregnancy in an Appalachian state. The Journal of Educational Research, 90(3), 175-181.

Chapin, J. (2001). It won't happen to me: The role of optimistic bias in African American teens' risky sexual practices. Howard Journal of Communication, 12(1), 49-59.

Damon, W. (1984). Peer education: The untapped potential. Journal of applied developmental psychology, 5(4), 331-343.

Kerpelman, J. L., McElwain, A. D., Pittman, J. F., & Adler-Baeder, F. M. (2016). Engagement in risky sexual behavior: Adolescents’ perceptions of self and the parent–child relationship matter. Youth & Society, 48(1), 101-125.

Sciolla, A., Ziajko, L. A., & Salguero, M. L. (2010). Sexual health competence of international medical graduate psychiatric residents in the United States. Academic Psychiatry, 34(5), 361-368.

Stakic, S., Zielony, R., Bodiroza, A., & Kimzeke, G. (2003). Peer education within a frame of theories and models of behaviour change. Entre Nous: The European Magazine for Sexual and Reproductive Health, 56, 4-6.

Walsh-Buhi, E. R., Marhefka, S. L., Wang, W., Debate, R., Perrin, K., Singleton, A., ... & Ziemba, R. (2016). The impact of the Teen Outreach Program on sexual intentions and behaviors. Journal of Adolescent Health, 59(3), 283-290.

Study Document

Hand Hygiene And Infection In Hospitals

Pages: 7 (2096 words) Sources: 2 Document Type:Article Critique Document #:82779888

… Sciences, 8(1), 108.
1. Describe how the researcher addresses the following four areas in the selected journal article (Introduction, Literature Review, Methodology and Data analysis:
The purpose of the study is to support the World Health Organization hand hygiene campaign against healthcare associated infections (HAIs). The study aims … making use of a standardized survey questionnaire of the WHO. The main purpose of the descriptive research survey was to facilitate observation, description, analysis and also documenting elements of situation as it naturally takes place. In this regard, the perceptions regarding HAI and hand hygiene were the … professionals were included in the sample of the study and in total 87 of them participated in the study.
In regard to data analysis, SPSS statistical software version 17 was utilized for purposes of the statistical analysis of the gathered data. Descriptive statistics and inferential non-parametric Chi-square test was employed. With respect to……

References

References

Joshi, S. C., Diwan, V., Tamhankar, A. J., Joshi, R., Shah, H., Sharma, M., ... & Lundborg, C. S. (2012). Qualitative study on perceptions of hand hygiene among hospital staff in a rural teaching hospital in India. Journal of Hospital Infection, 80(4), 340-344.

Tan Jr, A. K., & Jeffrey Olivo, B. S. (2015). Assessing healthcare associated infections and hand hygiene perceptions amongst healthcare professionals. International Journal of Caring Sciences, 8(1), 108.

Study Document

Application Of Quality And Safety Concepts

Pages: 11 (3179 words) Sources: 8 Document Type:Case Study Document #:72132391

… actual HIT employment in the areas of patient safety and healthcare quality. The authors classified 41 research works through the use of inductive thematic studies with open coding. They utilized 3 pre-established groups, namely, prevention, action, and identification. Coding helped create 3 more groups, namely, challenges, location, … general IT on account of its particular focus and possibly more inflexible and limiting standards and framework. AST (Adaptive Structuration Theory) improves IT analysis, especially in case of new adoption. Based on the 1984 Structuration Theory of Gidden, Poole and…[break]…assess community-based telemonitoring or remote monitoring of patients … and analyzing data to compare how well an intervention is being implemented against expected results”. Therefore, this involves “the routine collection, review and analysis of data, either generated by digital systems or purposively collected, which measure implementation fidelity and progress towards achieving intervention objectives”. The content of, ……

References

Bibliography

Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.

Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions:  https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/ 

DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.

Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).

Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.

IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.

Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.

Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.

 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".