Single Session Therapy(SST)
Single Session Therapy Single session therapy (SST) dates as far back to Freud along with many other well-known therapists such as Donald Winnicott and Milton Erikson have all reported on single session work. However it was not until Moshe Talmon, clinical psychologist, reviewed the records of and followed up those clients who ceased […]
Barriers in the adoption of information systems
Barriers in the adoption of information systems REVIEW OF THE LITERATURE Introduction In a global business environment increasingly fraught with uncertainty, challenge and opportunity, those involved with formulating corporate strategy continue to strive to achieve competitive advantage. In the 1990s the Internet really blossomed, Dot-Coms were the ephemeral rage, and information systems became […]
Formation of adipocere
Formation of adipocere Introduction Various studies have been conducted to analyze and determine how adipocere is formed. For example, Takatori (1996) investigated the meachanism of adipocere formation and its relation to other biochemical reactions, whereas Forbes, Stuart, & Dentl (2002) investigated the identification of adipocere in grave soils. The authors further enhaned their research in […]
An Essay on Communication and IT
Communication and IT 1. Introduction The importance of communication in an organization is so vehement that no organization can succeed without properly considering into account the communication means, their effectiveness and the ways to improve it. The goal of communication is to approach, as closely as possible, a common understanding of the message sent […]
Sample Dissertation: Data Security Management in the Public Sector in UK
DATA SECURITY MANAGEMENT IN THE PUBLIC SECTOR IN UK CHAPTER I: INTRODUCTION Introduction The recent slew of high-level data security scandals has brought data protection and data security in particular into the spotlight, and to the attention of enforcement authorities as well as the public. Any organisation handling personal data should therefore take data security […]
You must be logged in to post a comment.