1) La descarga del recurso depende de la página de origen
2) Para poder descargar el recurso, es necesario ser usuario registrado en Universia


Opción 1: Descargar recurso

Detalles del recurso

Descripción

It is common practice in organizational research to apply policy analysis to better understand how an enterprise is approaching and addressing a particular topic of interest. The approach to policy analysis commonly used is known as the Coding Approach. The Coding Approach is a highly qualitative process that involves the manual identification of relevant policy documents, the manual review of these documents to identify the key features of the topic, and the manual identification of the significance of these features as it relates to the policy documents. This process can generates rich insights into policies and how the topic of interest is being approached and viewed by the Stakeholder of the enterprise. This process however is a manually intensive process and is subject to the bias of the expert/s reviewing and analyzing the documents. My study proposes a new approach towards policy analysis that uses the Coding Approach as its template, but applies Machine Learning Techniques, such as Natural Language Processing and Data Mining Algorithms, together with a highly structured form of Case and Cross Case Analysis to identify documents that are related to the topic of interest, to categorize these documents, to surface the key features of the topic, to calculate the significance of these features as reflected by the documents and to draw inferences about the key features and its significance as it relates to the policy documents. This new approach provides a mixed methods approach that marries the best of both quantitative and qualitative techniques towards document analysis. This approach also reduces the amount bias that can be injected from the experts analyzing the documents, and thus guarantees an almost consistent result from document analysis regardless of the experts performing the analysis. For my study I applied my mixed methods approach to analyzing the policy documents of the Military Health Enterprise MHS, to understand how well the MHS 's policies were addressing the delivery of psychological services to service members and their families. This study is important to the MHS for two reasons. With the reductions of the US Military presence in Afghanistan and Iraq there are large numbers of veterans returning who may have various forms of PTSD, who will requires varying types and levels of care. The other reason why this study is important to the MHS is due to the recent scandals (Walter Reed, 2007 & VA, 2014) it has faced specifically around to the health care services it was supposed to provide to service members. Now its crucial for the MHS to understand the disconnect between its policies and what's actually being implemented. This study will provide the MHS with a non-bias review of what are the features of significance from a policy point of view in regards to the delivery of psychological services to service members and their families.

Pertenece a

DSpace at MIT  

Autor(es)

Plmanabhan, Jaya Prasad - 

Id.: 69521846

Idioma: eng  - 

Versión: 1.0

Estado: Final

Tipo:  154 pages - 

Palabras claveEngineering and Management Program. - 

Tipo de recurso: Thesis  - 

Tipo de Interactividad: Expositivo

Nivel de Interactividad: muy bajo

Audiencia: Estudiante  -  Profesor  -  Autor  - 

Estructura: Atomic

Coste: no

Copyright: sí

: M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.

Formatos:  154 pages - 

Requerimientos técnicos:  Browser: Any - 

Fecha de contribución: 08-ene-2017

Contacto:

Localización:
* 963232581

Otros recursos que te pueden interesar

  1. Optimizing resource allocation in a portfolio of projects related to technology infusion using heuristic and meta-heuristic methods In today's competitive environment, manufacturing companies are under constant pressure to improve p...
  2. Using object process methodology to develop interfaces and smart electronic procedures for simulated telerobotic operations This thesis addresses two questions: 1) How should an existing space telerobotic simulator be extend...
  3. Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems With increased Internet connectivity and the advent of the industrial Internet, cyber-physical syste...
  4. Management and governance of external developer platforms - at the example of Akamai, Inc. and Uber Technologies, Inc. How do companies manage and govern external developer platforms? Drawing on platform ecosystem, prod...
  5. Applying tradespace exploration methods for the design of value-robust microgrids Microgrids enhance resilience in power distribution by providing the capability to be islanded from ...

Otros recursos de la mismacolección

  1. Optimizing throughput architectures for speculative parallelism Throughput-oriented architectures, like GPUs, use a large number of simple cores and rely on applica...
  2. Computational bounce flash for indoor portraits Portraits taken with direct flash look harsh and unflattering because the light source comes from a ...
  3. Identifying patients at high risk of death with novel computational biomarkers The accurate assessment of a patient's risk of adverse events remains a mainstay of clinical care fo...
  4. Neural adaptive video streaming with pensieve Client-side video players employ bitrate adaptation algorithms to cater to the ever-growing QoE requ...
  5. Large scale applications of 2D materials for sensing and energy harvesting In this project we demonstrate the fabrication and characterization of printed reduced graphene oxid...

Aviso de cookies: Usamos cookies propias y de terceros para mejorar nuestros servicios, para análisis estadístico y para mostrarle publicidad. Si continua navegando consideramos que acepta su uso en los términos establecidos en la Política de cookies.