Ten steps to writing an essay
Topic For A Research Paper About Coffee
Featured Post
Conscious and subconscious information processing Essay
Cognizant and subliminal data preparing - Essay Example Numerous analogies have been made to portray the cognizant brain. One successful ...
Thursday, August 27, 2020
Conscious and subconscious information processing Essay
Cognizant and subliminal data preparing - Essay Example Numerous analogies have been made to portray the cognizant brain. One successful representation may be the telescope. Our cognizant brain glances through it and sees a specific item in center, unconscious of the world outside of that telescope focal point. Accordingly cognizance is restricted to a little range, despite the fact that it fills its need. Another analogy for the cognizant brain would be an ice shelf. The cognizant psyche is a glimpse of something larger that reaches out of the sea. The cognizant brain sees the world from data got from the subliminal beneath, and from the physical world around it. Subliminal quality actually implies underneath the limit of cognizance, or that piece of the brain that lies just beneath the degree of cognizant reasoning. In the case of the telescope, while the cognizant brain is glancing through the little opening, the inner mind is recording the impressions while likewise scanning memory banks for authenticating data. The inner mind goes about as an individual secretary who records cognizant information and who likewise recovers applicable recollections from the oblivious brain. It acts like the RAM (arbitrary access memory) in a PC. It channels and holds data to guide it to its vital applications. A functioning inner mind recognizes examples to foreordain cognizant reasoning and conduct. For instance, when we are first figuring out how to drive a vehicle, our cognizant mindfulness must be amazingly engaged so as to get familiar with the ability. When we have figured out how to drive, the cognizant psyche goes on autopilot, and the inner mind do minates, doing the driving for us. The manner in which the psyche works is far not quite the same as the manner in which cognizant brain works. While the cognizant brain is objective, depending on rationale and strict reasoning, the inner mind is abstract, handling the subconscious and representative significance of words and symbolism. Accordingly it is the psyche mind that holds sentiments and pictures from
Saturday, August 22, 2020
Summary Assignment Example | Topics and Well Written Essays - 500 words
Synopsis - Assignment Example The creators work with Elizabeth Brainerd depends on two theories. Initially, serious businesses don't have segregation, so if there should arise an occurrence of an exogenous stun (expanded exchange) the impact of separation is unimportant. Furthermore, in less serious ventures, extent of segregation is more, so in the event of the equivalent exogenous stun narrowing the sex wage hole would be significant. Since hypothetically, the pay differential in serious enterprises is nil, by accommodating expanded exchange, the creators could process the sex wage hole in concentrated businesses. The study covering the period 1977-94 utilized information from Current Population Survey. The populace involved people matured 18 to 64 and functioning as full time. First log compensation of all people was relapsed on training, age, agesqaured and nonwhite sham variable. At that point the lingering sex wage hole was figured from contrast in normal remaining wages for male and female at industry leve l. The business level outcomes were coordinated to exchange level outcomes, with exchange estimated as import shares. The discoveries show that an expansion in import share prompts decrease in sexual orientation wage hole in concentrated businesses. Anyway by and large increment in exchange negatively affect relative wages of ladies. These outcomes can likewise be considered on decrease in unionization and not segregation sway.
Friday, August 21, 2020
Police Essay Topics
Police Essay TopicsPolice essay topics are very specific. They must fall within a few broad categories of questions and answers. Some of the more common questions that are asked by police and other law enforcement professionals include, 'What is the difference between law enforcement and the military?' and 'What can be done to combat crime?'Another common question that is asked by people who are not in law enforcement is 'What is justice?' The answers to these questions are important, because they help you in your career. These topics are also important for anyone who wants to be a police officer.Some of the most important skills a police officer needs to know are how to read a criminal's face. You need to be able to read and understand body language. You need to know how to look at people and what their eyes are telling you. You need to know what they are saying.When it comes to taking down criminals and doing so safely, police officers are faced with situations where they have to u se lethal force. Some crimes are violent, some are nonviolent, and some are complicated. You need to know the appropriate techniques to use when you have to make a decision about using force.The type of police officer that you become will affect a lot of things. You need to understand that you may never see the inside of a jail cell. You may never see someone go to prison. You may never see an arrest warrant issued.You must be able to look at the big picture of what your police career will be like. While your career will change greatly, you must be able to stay focused on the goal of becoming a police officer. You need to be able to keep up with current events and try to learn about the job from news reports. Youmust learn about new technology as well as old technology.The point of police essay topics is to help you in your career. You can choose to either focus on the benefits of being a police officer or how dangerous a career it is. Depending on your skill set, you can focus on d ifferent topics to help you narrow down your career path.There are many choices you can make when deciding what type of police officer you would like to be. If you are serious about your career, you should learn as much as you can about the job and the challenges involved in it. You can find information from many sources online or through public databases.
Monday, May 25, 2020
Primary Physical And It Security Threats - 1731 Words
Primary Physical and IT Security Threat to Organizations Name of Course Your Full Name Name of Institution Abstract This paper is written in the form of an advice by a chief security officer to the CEO of a company. It shows the general physical and IT threats that a company is faced with and how it can be dealt with. The study shows that there are physical threats that affect a firmââ¬â¢s computer hardware. This includes threats to the hardware itself and threats to the premises and intermediary systems. IT threats includes threats to data security and breaches to the system. This can be handled through a strategic approach that involves risk assessment, formulation of an IT security plan and its implementation. Introduction Information is an important aspect of every organization. Information technology (IT) is a tool for competitive advantage and it is important for the efficient and effective utilization of resources in an organization. Therefore, keeping information within our IT infrastructure and Information Systems is an important part of ensuring that we achieve the main goals of our investments into the IT systems and processes. In this paper, the Chief Security Officer of an organization outlines the primary challenges of physical security threats and IT security threats. The scope of the paper will cover the two individually and collectively. The paper will show ways of balancing the two threats and achieving the best and optimal results in using a firmââ¬â¢sShow MoreRelatedPublic Safety Communications Security Awareness Guide774 Words à |à 4 Pages Public Safety Communications Security Awareness Guide There are growing concerns that our current emergency response communications systems have flaws that place first responders at risk. Some of the problems include unsecure communication network systems, facilities, and a lack of security awareness that compromise critical information. Despite efforts to procure innovative technologies to improve security, limited access from disruptions continue and affect how emergency responders addressRead MoreThe Vulnerability Of Network Infrastructure Vulnerabilities1436 Words à |à 6 Pages Security services are an integral part of any network design. Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. This section provides an overview of common network infrastructure vulnerabilities, essential network security concepts analysis and present. It illustrates the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. This paperRead MoreSecurity : A Critical Management Function1421 Words à |à 6 PagesCCJS 345 Intro to Security Management Project 2: Paper on Security Roles 11 September 2014 ââ¬Æ' Security is a critical management function in most businesses. Where security strategies and operations were almost unheard of 35 years ago, there are now vice presidents of loss prevention and even chief security officers (CSOs) at most multi-national corporations who report directly to the chief executive officer (CEO) or the chief operating officer (COO). In most instances, the security position has becomeRead MorePrinciples of Information Security 4th Ed Chapter 1 Review Questions801 Words à |à 4 PagesKevin Kovack Chapter 1 Review Questions 1. What is the difference between a threat agent and a threat? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is openRead MoreThe Basic Components Of A Public Key Infrastructure1107 Words à |à 5 Pages. Public Key Infrastructure (PKI) provides the framework services, technology, protocols, and standards that manage strong information security systems. Without a public key infrastructure, public key technology is not generally suitable for large-scale enterprise deployment. The purpose of a public-key infrastructure is to manage keys and certificates, which are used for documentation, entitlements, authentication, and confidentiality. Through managing keys and certificates, an organizationRead MoreIs4550 Week 5 Lab1611 Words à |à 7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreNational Security in Foreign Policy645 Words à |à 3 Pagesinstruments are used, the primary objective of states in outlining their foreign policies is to maximise their national security. â⬠¢ States can go about maximising national security through different means such as by military force, economic prosperity and/or the general welfare of its people. â⬠¢ Difficult to analyse to what extent national security is a primary objective of states ââ¬â theories of IR will help explain statesââ¬â¢ motives and how they go about maximising state security, if it is their prime objectiveRead MoreA Brief Note On Terrorism And The European Charter Of Human Rights1073 Words à |à 5 PagesItââ¬â¢s noted that the greatest threat Europe faces isnââ¬â¢t cyberwarfare, cyber terrorism, or espionage, but rather software and hardware failure. (Information Management Journal, 2015). One of the key challenges to resolving infrastructure weakness is that each country approaches it differently. In recent years, cybersecurity was an intermediary international concern in Europe and privacy was the principal concern for Europeans. On the Internet, Europeans promote the ââ¬Å"right to be forgottenâ⬠and theyRead MoreComptia a+972 Words à |à 4 Pages1. Actions that can damage an asset A threat: Flood, earthquake, severe storms. 2. Laws to protect private financial information * Federal information security management act(FISMA) * Sarbanes Oxley act (SOX) * Gramm leach Bliley act(GLBA) * Health insurance portability and accountability act(HIPAA) * Childrenââ¬â¢s internet protection (CIPA) * Family educational rights and privacy act (FERPA) 3. Parts of layered security that supports confidentiality * Defining organizationRead MoreThreats, Vulnerabilities And Risks1673 Words à |à 7 Pages 3 Threats, Vulnerabilities and Risks 3.1 Vulnerabilities According to Rufi (2006) the vulnerabilities in any network are divided into three primary weaknesses; technology vulnerabilities, configuration vulnerabilities and security policy vulnerabilities. However, the companyââ¬â¢s network suffers from a number vulnerabilities that fall under these three primary weaknesses and other kinds of vulnerabilities includes: â⬠¢ Technology vulnerabilities: according to Rufi (2006) TCP/IP protocols are naturally
Friday, May 15, 2020
E Commerce And Its Impact On The Music Industry - 1977 Words
Music industry has always been a very competitive and intensive area in retail as well as e-commerce. Additionally, music is considering to be part of creative humanââ¬â¢s life, therefore the growth in the music industry has never slow down in terms of business. Talking about E-commerce and benefits of the Internet, there are million ways for people to search for music, such as ITunes, Cd players, mp3 players, YouTube and so on. Spotify created to satisfy the customer need in the fastest and the most convenience way, since the demand of the online music streaming industry is relatively very high. Besides, there are several developments in the industry that change the global perspective which eventually will affect Spotify. Back in time, people usually have to paid for every single songs and albums to listen to the music that they wanted. However, with Spotify, helping people to save extra money by monthly subscription for unlimited amount of music and records. Along with the development of technology devices such as mobile phone, tablets, and music player, allows people to have access into music everywhere and anywhere. Additionally, these devices offer application as a tool for people to keep up with the fast pace music trend. Spotify is known as one of the greatest app that continuously adding new artists, new songs and albums into their libraries to ensure that their customers donââ¬â¢t miss out on anything thatââ¬â¢s going on in the industry. Different types of customers enjoyShow MoreRelatedBusiness Skills for Ecommerce1474 Words à |à 6 PagesRDI/EDEXCEL Level 4 BTEC Higher Nationals Computing and Systems Development Business Skills for e-Commerce Assignment Tutor: Steve Presland 1 Introduction This assignment will enable you to apply the business skills needed to design an eCommerce solution for a music production company. You will need to consider the organisation and processes of the company and consider what the impact of the Internet and e-Commerce has been on the company. Answers to the tasks will demonstrate: 1: An understanding ofRead MoreThe Pirate Bay1481 Words à |à 6 Pagesto other peer-to-peer (P2P) e-commerce sites like Napster and Kazaa. The company faces scrutiny but has avoided closure by modifying business practices and finding legal loopholes regarding copyright protection (Laudon amp; Traver, 2010). The case study Internet Piracy: The Pirate Bay analyzes the company and its place in the history of e-commerce, and reveals startling effects of P2P sites on the music industry. P2P Business Model The Pirate Bay is a P2P e-commerce business model that allowsRead More Internet - Challenges of B2B and B2C E-commerce Essay1291 Words à |à 6 Pagesand B2C E-commerce E-commerce ââ¬Å"is the exchange of money for goods or services between companies and/or end consumersâ⬠(Hemond-Wilson). The most common image of e-commerce ââ¬Å"is that of a web-based catalogue from which buyers can order products and the sellers can receive paymentâ⬠(Hemond-Wilson). E-commerce has two main forms, which are business-to-business, and business to consumer. B2B e-commerce ââ¬Å"is business which is conducted between businesses via some electronic meansâ⬠and B2C e-commerceRead MoreThe Piracy Of The Pirate Bay1747 Words à |à 7 Pagesmalicious methods. According to Lewis, (1985), Software piracy is the illicit copying of the operating instructions and applications programs, which make computers work, is a large and growing industry. The Pirate Bay is part of a European social and political movement that opposes copyrighted content and demands that music, videos, TV shows, and other digital content be free and unrestricted. In the words of the P irate Party, ââ¬Å"the Pirate Bay is a unique platform for distributing culture between regular peopleRead MoreOnline Piracy: Threat to the Entertainment and Software Business1315 Words à |à 6 PagesOnline piracy is being a threat to the business of the music, movie, and software industries. From Dictionary.com (n.d.), the definition of piracy is the unauthorized reproduction or use of a copyrighted book, recording, television program, patented invention, trademarked product. The focus of this paper is in the music, software, and e-book industries. Importance of Online Piracy to the Field of International Management The problem with online piracy is that companies are being affected by itRead MoreIndustry Prospects And Attractiveness : Amazon Prime Service Gaining Subscribers1636 Words à |à 7 PagesIndustry Prospects and Attractiveness Amazon Prime Service Gaining Subscribers Last year in 2014, Amazon Prime subscriptions increase by an exceptional at 53%, with its stronger growth across the global markets than within the U.S. An estimate of Prime subscribers could be around 35 to 40 million globally at the end of 2014. What special about it is the subscription offers free shipping along with unlimited access to video contents. It could be comparable to Netflix and that streaming content isRead MoreHow Is the Internet Reshaping What We Mean by Culture?1436 Words à |à 6 Pagesis safe to say that the majority of North Americans own a home computer with Internet access. With the Internet in regards to culture and the impact on individuals is quite fascinating. It seems anyone with a computer is tempted daily with opportunities that can be ethically questionable. A teenager for instance who would never shoplift can download music or movies off the Internet for no charge. Some argue, Change is good but dealing with such a powerful and compelling cyber-en tity that hasRead MoreEssay How Is The Internet Reshaping Culture1362 Words à |à 6 Pagesis safe to say that the majority of North Americans own a home computer with Internet access. With the Internet in regards to culture and the impact on individuals is quite fascinating. It seems anyone with a computer is tempted daily with opportunities that can be ethically questionable. A teenager for instance who would never shoplift can download music or movies off the Internet for no charge. Some argue, Change is good but dealing with such a powerful and compelling cyber-entity that hasRead MorePerformance Indicators And Customer Satisfaction1377 Words à |à 6 PagesINDIA. International Journal of Arts and Commerce, 2(2). Retrieved from http://www.ijac.org.uk/images/frontImages/gallery/Vol._2_No._2/3.pdf Mr. Sumit Agarwal is a research scholar at the Institute of Commerce and Management at Jiwaji University, Dr. Deepak Singh is faulty member and lastly, Dr. K S Thakur is a Professor and Dean at the same university. Agarwal, Singh and Thakur states that call centers can be considered one of the fastest growing industries in the world, also, to be considered theRead MoreThe Three Major Factors Fueling International Technological Growth1271 Words à |à 6 Pagestelecommunications, and e-commerce. The internet has the capability to generate international market expansion and future international growth for firms. It has evolved into a mechanism that can be used to capture new international market opportunities. Due to transactional and communication capabilities, the internet has become an efficient and effective conduit for global trade and international market expansion (Matthew Kleiner, 2008). Telecommunications The telecommunications industry is divided into
Wednesday, May 6, 2020
After A Separation Of Several Centuries, Attitudes Between
After a separation of several centuries, attitudes between the sexes have changed either significantly or rather little in either direction depending on where one resides. In Shakespeareââ¬â¢s time, women were considered little more than property to be exchanged between her father and her possible husband to be. Those women who wish to escape such burdens had little other options. All they had was other disinheritance or the convent. Katherine Baptista in The Taming of the Shrew tried to fight such emotion oppression on her own terms the best way she knew how, by being so feisty and untampered that many men chose to run away from here. It would take another man willing to be paid to attempt to win her so that another can marry her sisterâ⬠¦show more contentâ⬠¦To him, it was a means to an end. Money was all that mattered to him. That may have changed at the end of the play but it is hard not to consider that putting Katherine through such tactics to ââ¬Å"tame herâ ⬠was not as burdensome for him considering what he would have to gain later. This passage makes us believe that love is secondary to his goals in finding marriage and when Lucentio finds him and arranges an offer, it is too tempting to refuse despite the challenges that face him with Katherine. Perhaps we see this violent and brutal streak in Petruchio before Katherine and he even meet, as the play begins with Petruchio striking his servant Grumio and with Grumio warning everyone what was to come: I pray you, sir, let him go while the humour lasts. O my word, an she knew him as well as I do, she would think scolding would do little good upon him: she may perhaps call him half a score knaves or so: why, that s nothing; an he begin once, he ll rail in his rope-tricks. I ll tell you what sir, an she stand him but a little, he will throw a figure in her face and so disfigure her with it that she shall have no more eyes to see withal than a cat. You know him not, sir. (I.ii.106-11 4) While he does not strike Katherine physical as he does with Grumio, it still implies if it came to that (which it almost does), he would not have any issues with doing so. He may not have needed to resort to physicalShow MoreRelatedSymbolic Inequality In A Jury Of Her Peers Essay1670 Words à |à 7 Pages Symbolic Inequality The oppression of women throughout the centuries can be seen in many literary sources. The system from which women experienced misogyny and oppression is a social structure known as patriarchy. Furthermore, in A Jury of Her Peers, symbolism conveys the patriarchy of the Nineteenth Century. First, it is imperative that one knows what exactly patriarchy is: ââ¬Å"a social system in which power is held by men, through cultural norms and customs that favor men and withhold opportunityRead MoreGender Inequality Within The Workplace1323 Words à |à 6 Pagesbe resolved? By the breakdown of historical events and documents, the economic analysis of the issue, and the use of education to raise a new generation of unbiased workforce, possible solutions can be composed that could minimize the gap in pay between the genders. History Women have been fighting for years to gain the rights that men possess. Since the 1800ââ¬â¢s women have gained the right to own property, divorce, and vote but they do not receive the same pay for doing the same work. The SenecaRead MoreDifferences Between Singapore And Malaysia1253 Words à |à 6 PagesSingapore and Malaysia were both similarly colonized by the British. However, their development after independence differed in many ways. In this paper, I will examine, with help from resources provided in the course and minimal research, how their colonial experiences affected their political and social development after independence. After which, investigating the depth of influence their colonizers had, and why, differing racial ideologies had the greatest impact on their development. MalaysiaRead MoreJohn Steinbeck s Harvest Gypsies 1664 Words à |à 7 Pagesthe expansion of industrialization during the 1900ââ¬â¢s. This brought about the publication of several works that challenged the governmentââ¬â¢s policies. As Upton Sinclair addresses in The Jungle, industry workers were refused the basic human rights that the government vowed to protect. Harvest Gypsies, written by John Steinbeck just 30 years later, brought rural farmersââ¬â¢ grievances into the picture after their land was destroyed during the Dust Bowl. The rhetoric used in these works criticizes theRead MoreThe Beatles Were The Influential Rock Band Group Formed971 Words à |à 4 PagesThe Beatles were the most influential rock band group formed in the twentieth century in Liverpool, England, in 1960. There were four members in this group. John Lennon was born October 9, 1940 in Liverpool, England and he died on December 8, 1980 in New York. Richard Starkey was born on July 7, 1940 in Dingle, Liverpool. James McCartney was born on June 18, 1942 in Liverpool, England and George Harrison was born February 25, 1943 also in Liverpool, England and he died November 30, 2001, Los AngelesRead More2.) To What Extent Did The Coming Of The Harlem Renaissance1483 Words à |à 6 Pagesidentity. They were showing America that they could do as much as whites could and do it as good. The Harlem Renaissance gave influence to the future black writers of America. This time was an inspiration for all not just the black people. There were several forms of arts, as in visual. Many paintings, sculptures and other types of artistic craft were created. There also was also jazz, it is still a very popular genre of music. The Harlem Renaissance has also been seen as the center of the African AmericanRead MoreThe Modern Gro SS Es Schauspielhaus1489 Words à |à 6 Pagesbuildings are how they strive to replicate the goals and ambitions of their architects and patrons in a way beneficial to society as a whole. Modernism is a term that was invented in response to the architectural movement starting around the early 20th century to explain the dramatic changes in both technology and society. It was mainly in response to the industrial revolution which created urban cities changing the way people lived and worked. Modern architecture began to experiment with more modern conceptsRead MoreThe Cheese And The Worms : The Cosmos Of A Sixteenth Century Miller1525 Words à |à 7 PagesThe Cheese and the Worms: The Cosmos of a Sixteen th Century Miller (1976) written by Carlo Ginzburg was centered on Domenico Scandella, well known as Menocchio, a sixteenth-century miller from the village in the Friuli region of northeastern Italy. He was the defendant of Catholic heresy trial that occurred in 1584-1585 and again in 1599. Menocchio had many dangerous ideologies of the church, which reject an abundance of theological concepts and practices of its time. He was a literate peasant, whoRead MoreThe Bluest Eye And Marxism : Race Creates Vulnerability1554 Words à |à 7 Pageswill want to find evidence of some sort that they are indeed not so. In The Bluest Eye, Mr. Yacobowski expresses subdued hostility towards the bookââ¬â¢s young protagonist to improve his self-esteem about his own social status. He exhibits his sense of separation from Pecolaââ¬â¢s position through the use of race, communicating, through the lens of Marxism, the idea that white proletariansââ¬â¢ oppression of the black race is simply a way for them to create the illusion that they are above another; in reality, theRead MoreThe Birth Of The Pregnancy1524 Words à |à 7 Pagesmother consumes the placenta after the birth. This is supposed to retain the vitamins and minerals that were present while the woman was pregnant and is a way to continue to give the same vitamins and minerals to the infant for a time after the birth. Standards of care in labor and delivery at hospitals around the country have changed over the years, from the way medication is administered, when doctors will induce labor, to what happens to the baby immediately after birth which is different in every
Tuesday, May 5, 2020
Social Networking In Business Samples â⬠MyAssignmenthelp.com
Question: Discuss about the Social Networking In Business. Answer: Reflection report This research was beneficial for me to enhance my knowledge regarding social networking in business. From the introduction part, I have gained my understanding regarding background of social networking. In this way, it is analyzed that social networking is key element of business practices. Since, it creates platform for company to make contact digitally with stakeholders like subsidiary, suppliers, business colleagues, and customers (Sekaran and Bougie, 2016). This experience was beneficial to make contact with stakeholders through digital channels. From the literature review, I have developed my understanding of advantages of using social media in business practices. In this way, it can be evaluated that a social network is a beneficial technique which is used to create awareness about the product and services with the existing and potential customers (Leonardi, et. al., 2013). I have also observed that company uses social networking to get feedback of customer about the products quality. Since, it will aid to decline expenses and efforts as well as enables the company to focus on another aspect of the business. This learning has not only motivating to use social media in business practices but also enhances my marketing skills as it was beneficial for me to get success in the short and long-term. During this chapter, I have also increased my knowledge regarding disadvantages of using social media in business practices. In this way, I have learned that uses of the social network can create theft and fraud due to confidentiality of the business at risk. Moreover, it is analyzed that a large number of cyber crimes is rising due to a social network which creates complexities within an organization (Bryman and Bell, 2015). This experience was beneficial for me because I will take care of these disadvantages when implementing the digital marketing strategy at the workplace. As a result, it can be beneficial for me to become a good manager within the reputed organization. This chapter was also significant for me as it has gained my learning that social networking practices are time-consuming that may influence the functioning of other business operation. In this way, it is also assessed that competitors may take benefits of business information which are presented over the social network (Denscombe, 2014). As per this research, it is analysed that research question is made by the researcher to meet the research objectives (Myers, 2013). Along with this, I have learned that hypothesis is built to assess the relationship between two variables i.e. independent and dependent. This experience has not only enhances my research skills but also created my depth understanding regarding research. From the research design, I have analysed that mixed research design can be implemented in the data collection method as per the research needs. It is analysed that mixed research design can be used in both qualitative and quantitative research techniques (Batjargal, et. al., 2013). This experience was also beneficial for me to use research design in future research for the company. As a result, it will provide me growth within an organization. During the study of research methodology, I have developed my understanding of the interpretivism research philosophy. This research philosophy will be used for this research in order to create the ways by which researcher implement distinct techniques to target the research limitation and issues (Luo and Zhong, 2015). As a result, it enhances my research skill and also builds competency to use different tools during the research. In addition, I have also learned that data can be pooled to assess the benefits and limitation of exercising social network in business. I have also gained my understanding regarding approaches of research in which I have observed that there are two kinds of research approaches named qualitative and quantitative. This understanding is significant for me to execute the research approach in research plans. As a result, these approaches are significant to gain the required information about research issue. Through data collection method, I have pointed that there are two distinct methods to gathering the information regarding research concern named primary and secondary. In this way, it can be evaluated that there are different sources of using primary and secondary data (Wagner, 2017). Further, it can be stated that primary data is a raw form of data in which researcher gather directly collect the data from participants whereas secondary data is second-hand data that are collected from secondary sources (Ho, 2014). These data are beneficial for me to obtain the reliable and valid information regarding digital media research within an organization. During the study of research procedure and techniques, I have analysed that random sampling is effective to assess the data and eliminate the biases from survey through a questionnaire. It is also analysed that explanatory research ensures that research will be done in a systematic way (Zikmund, et. al., 2013). It is also pointed that research time framework is used to meet the different activities in a sequence and appropriate way (Wagner, 2017). This research experience was effective for me to implement the each activity within a specified time framework. This research has developed by knowledge about ethical consideration. In this way, I have learned that ethical consideration makes sure that each activity will be performed without harming the interest of respondents. Consequently, I am able to complete the research in an ethical manner. From this research, I have increased my understanding regarding research limitation. In this way, it can be evaluated that there is a different limitation of this research named shortage of available time for conducting the research, inadequate access to data and shortage of resources to obtain the research (Schaltegger and Wagner, 2017). This was beneficial for me to create effective research plan hence I can grow my professional life. References Batjargal, B., Hitt, M. A., Tsui, A. S., Arregle, J. L., Webb, J. W., and Miller, T. L. (2013) Institutional polycentrism, entrepreneurs' social networks, and new venture growth,Academy ofManagement Journal,56(4), pp. 1024-1049. Bryman, A., and Bell, E. (2015)Business research methods. USA: Oxford University Press. Denscombe, M. (2014)The good research guide: for small-scale social research projects. UK: McGraw-Hill Education. Ho, J. K. K. (2014) A Research Note on Facebook-based questionnaire survey for academic research in business studies,European Academic Research,2(7), pp. 9243-9257. Leonardi, P. M., Huysman, M., and Steinfield, C. (2013) Enterprise social media: Definition, history, and prospects for the study of social technologies in organizations,Journal of Computer?Mediated Communication,19(1), pp. 1-19. Luo, Q., and Zhong, D. (2015) Using social network analysis to explain communication characteristics of travel-related electronic word-of-mouth on social networking sites,Tourism Management,46, pp. 274-282. Myers, M. D. (2013)Qualitative research in business and management. USA: Sage. Schaltegger, S., and Wagner, M. (Eds.). (2017)Managing the business case for sustainability: The integration of social, environmental and economic performance. UK: Routledge. Sekaran, U., and Bougie, R. (2016)Research methods for business: A skill building approach. USA: John Wiley and Sons. Wagner, M. (Eds.). (2017)Managing the business case for sustainability: The integration of social, environmental and economic performance. UK: Routledge. Zikmund, W. G., Babin, B. J., Carr, J. C., and Griffin, M. (2013)Business research methods. USA: Cengage Learning.
Subscribe to:
Posts (Atom)