Premium Essay

Adherance

In:

Submitted By cheweyjojo
Words 826
Pages 4
Research Critique of
Adherence to Walking or Stretching, and Risk of Preeclampsia in Sedentary Pregnant Women

Grand Canyon University: NRS-433V
1/12/14

Research Critique of “Adherence to Walking or Stretching, and Risk of Preeclampsia in Sedentary Pregnant Women”
Introduction
This paper is to critique a study of adherence to walking or stretching during pregnancy in high risk women who were sedentary and had previously experienced preeclampsia. The introduction of this article does give a sense of the importance of the problem area. This four-year study investigates the effects of walking or stretching on the incidence of preeclampsia and reports on adherence to the intervention and on the secondary outcomes of changes in resting heart rate (HR), resting blood pressure and weight gain.
Problem Statement
The purpose of the study was to compare a walking exercise to a stretching exercise program during pregnancy in high-risk women who were sedentary and had previous history of preeclampsia. The problem was clearly stated and was a feasible researchable problem. The problem had significance for nursing and for the medical profession and might improve practice and education. While the researcher does a good job of stating why the problem is important, it could have been helpful for him to list numbers of people who are affected by preeclampsia and complications of the disease itself.

Purpose and Research Questions

The research questions were clear by much inquiry. The research questions were: (a) Will previously sedentary pregnant women adhere to an exercise program for 40 minutes a day 5 times a week in the latter half of pregnancy? (b) Is there a difference in adherence to a walking program or a stretching exercise program? (c) How does adherence to walking or stretching change with the advance of pregnancy? And (d) which exercise is more effective

Similar Documents

Premium Essay

Abortion

...FACULTY OF ADMINISTRATIVE SCIENCE AND POLICY STUDIES ADM501- ORGANIZATIONAL BEHAVIOR AM228/AM225 SEMESTER MARCH 2014-JUNE 2014 MOVIE REVIEW GUIDELINES: 1. Students are required to do a movie review based on the topics covered in the scheme of work. 2. Students need to form their own group maximum of 3 people per group- It’s a group work assessment. 3. The movie review requires to be formatted as follows: a. Must be according to the questions provided in this guidelines. b. Assignment must be presented in a typed format. b. The content of the review must be typed using Times New Roman font, font size 12. c. Each question or heading must be clearly indicated in bold Times New Roman font, font size 12. d. Spacing between lines should be double spacing. e. All sources of references (3 minimum) must be acknowledged using APA style. f. Insert the paging number at the bottom right of each page as well. g. Citation is compulsory in the assignment i.e. (Shane and Bohlander, 2013) etc. h. The review should not exceed15 pages. 4. Based on the movie that you have watched answer the following questions: a) Write a short synopsis of the movie (shall not exceed 150 words). (5 marks) b) Identify any 4 (FOUR) issues/problems revealed in the movie. (20 marks) c) Explain how the issues/problems identified relate to the study of organizational behavior. (30 marks) d)...

Words: 567 - Pages: 3

Premium Essay

Nuud Ipad

...As people we all have a social identity, to me it is defined as the way we interact with our fellow humans, to our colleagues all the way down to the group of friends we associate with. It contributes to an explanation of all of our behaviors. There is a sense of group conformity to certain rules that are placed amongst by each other, this affects how we define ourselves within the group and how others define us. In a group like this there is constant competition because of the inherent human need to be on top, which in turn creates new conformities to be followed. An important aspect in our social identity is our relationship with technology. We use it to identify ourselves in different ways and another way to compete. With the rapid advancement of technology there is always the next best product out, leaving the availability to always try to be on top. Identifying ourselves with technology seems like a far out idea but is one in which we have brought upon ourselves. When we see someone with an ipad we see it as a sign of luxury and wealth. Having this product you are saying to the world that you are worth the name this product gives, and if two people have the same product the next step up is who has the better accessories. It is in this way that technology has become a social norm, where before it was only the privileged with these advancements we now see it everywhere. This where we draw the social norms from in which we feel compelled to comply with. Having social normalities...

Words: 1692 - Pages: 7

Premium Essay

Social Norms

...against humanity and war crimes.” The LRA originated in Uganda in the 1980’s to serve Kony’s main motive to overthrow the Ugandan government. However, in 2006 the organization dispersed in other countries such as the Democratic Republic of Congo, South Sudan, and the Central African Republic because of the Juba Peace Talks movement. It is estimated that Kony’s LRA killed approximately 2,500 people and holds about 4,000 members, most of which are children. “Its members are known for hacking off the lips and ears of their victims, looting villages and burning huts, and stealing clothes and medicine from the communities they terrorize” Through a structural funtionalist’s perspective, the focus is geared more towards the adherance to a normative belief system. They believe in an individual blame; that is deviant behavior is a result of inadequate socialization. Inadequate socialization accounts for any possible factor including education, type of authoritative system, economical background, and social restrictions. As a structural functionalist theorist, one may say that the probable factors that led tyrants such as Kony to their deviant ways is the fact that they were not exposed to positive influences or other resources which, in turn, narrowed their mindset to only thinking that the only way to progress to a higher level in society is to obtain manpower in any way possible. Psychologically, he was possibly feeling a sense of powerlessness due to his discontentment...

Words: 1900 - Pages: 8

Free Essay

Tft2

...= data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity plan of protecting the organization from exposure to internal and external threats ADHERANCE TO SECURITY POLICY GOALS: * Information Security Training = new users will be required to complete information security training modules as a requirement for employment * Receipt of Information Security Policy = new users will be supplied with, and must sign for, a copy of the...

Words: 2279 - Pages: 10

Premium Essay

Rfid Research Paper

...Radio Frequency Identification Uses in Inventory Management By: Jared Farnsworth, LAT In the fall of two thousand two I was introduced to radio frequency identification or RFID while I was doing my advanced individual training (AIT) for the military in Fort Lee, Virginia. At this time RFID was still in its infancy and not too many people were using RFID at this time. Not really too much was known about the benefits that it provided for inventory management either. The military was in the beginning stages of development and found it useful to link all of the databases at every military installation to make inventory control that much more reliable. Throughout my career in the military I used the RFID system quite a bit, mainly for inventory management. I used it for the control of medical equipment for the Army hospital that I was attached to. Everything had to be documented since all the supplies were highly vital to the proper running of the hospital. Other uses for the RFID system are for loss prevention, tracking inventory replenishment, managing work-in progress, and the removal of production waste through lean management. However certain problems do exist with the RFID system such as misuses and privacy issues. Over the next few paragraphs the benefits and problems with the RFID system will be discussed. “Theft and loss prevention and price markdown management are two of the most promising uses for radio frequency...

Words: 2687 - Pages: 11

Premium Essay

Connections Ii

...GENERAL SERVICES ADMINISTRATION REGION xx Order Identification Number: XX ###XXX#T5 Client Agency Name STATEMENT OF WORK (SOW) CONNECTIONS II CONTRACT DATE: (dd mm yyyy) 1.0 General. Title of Task 2.0 Points of Contact. Client Representative (CR) name address 1 address 2 city, state, zip phone & fax email Alternate Client Representative (ACR) name address 1 address 2 city, state, zip phone & fax email Client's Security Officer (Complete this section if clearances are involved, listing the clearance level needed, otherwise enter N/A.) name address 1 address 2 city, state, zip phone & fax email GSA Customer Service Representative (CSR / COTR) Contact Name Agency Name Address Contact #’s email GSA Contracting Officer Contact Name Agency Name Address Contact #’s email GSA Invoice Address Address GSA Client Acceptance Invoice Address Address 3.0 Introduction, Overview, or Background. This section provides background and descriptions of the Agency's organizational structure, where the services are to be provided, the importance of the software development effort, any previous efforts germane to this effort, and the hardware and software resources in use. This section could also include agency or organization specific information about government furnished items, working hours, federal holidays, and a glossary to define terms used within the body of the work statement. Provide a short description of the requirements without including the...

Words: 5615 - Pages: 23

Premium Essay

Dell Porter

...Domestic Information Export Finance Reserve Bank of India Foreign Exchange Department Central Office, Mumbai RBI/2004-05/153 DBOD IECS No. 35/04.02.02/2004-05 Dated September 1, 2004 The Chairmen/Chief Executives of all Commercial Banks Dear Sir, Master Circular on EXPORT CREDIT IN FOREIGN CURRENCY As you are aware, in order to have all current instructions on a subject at one place, the Reserve Bank of India had issued a Master Circular IECD No. 7/04.02.02/2002-03 dated July 1, 2003 on the captioned subject, which is now updated as on 1st July, 2004. A copy of the revised Master Circular is enclosed. It may be noted that the Master Circular consolidates and updates all the instructions contained in the circulars listed in the Appendix, in so far they relate to providing export credit in foreign currency by banks to the borrowers. Yours faithfully, Sd/(A. SREEKUMARAN) General Manager Encls. : As above (Details of the Master Circular given below) Master Circular EXPORT CREDIT IN FOREIGN CURRENCY CONTENTS 1. Pre-Shipment Export Credit 1.1 Pre-shipment Credit in Foreign Currency (PCFC) 1.1.1 Definition 1.1.2 General 1.1.3 Scheme 1.1.4 Source of Funds for Banks 1.1.5 Spread 1.1.6 Period of Credit 1.1.7 Disbursement of PCFC 1.1.8 Liquidation of PCFC Account 1.1.9 Cancellation/Non-execution of Export Order 1.1.10 Running Account Facility for All Commodities 1.1.11 Forward Contracts 1.1.12 Sharing of EPC under PCFC 1.1.13 Supplies from One EOU/EPZ/SEZ Unit to Another EOU/EPZ/SEZ...

Words: 6006 - Pages: 25

Premium Essay

Antiretrovirals

...Antiretroviral Therapy Guidelines for HIV-Infected Adults and Adolescents Including Post-exposure Prophylaxis May 2007 NACO Ministry of Health & Family Welfare Government of India Assessment and Management of HIV-Infected Person No Is HIV infection confirmed? Send to ICTC for confirmation of HIV status Yes       Perform history taking and physical examination (see p 9 ) Evaluate for signs and symptoms of HIV infection or OIs and WHO clinical staging (see p 10) Provide appropriate investigations/treatment of OIs (see p 13 ) If pregnant, refer to PPTCT Screen for TB Screen for STI Identify need for:   CTX prophylaxis (see p 16 ) ART (see p 18 ) No Pre ART care (see p 15 ) Yes        Give patient education on treatment and adherence (see p 54 ) Arrange psychosocial, nutrition and community support (see p 56) Start ART, (see p 19 ) Arrange follow-up + monitoring (see p 25 ) Assess adherence every visit Provide positive prevention advice and condoms Provide patient information sheet on the ART regimen prescribed (see annex 7, 8) Antiretroviral Therapy Guidelines for HIV-Infected Adults and Adolescents Including Post-exposure Prophylaxis May 2007 NACO National AIDS Control organisation Ministry of Health and Family Welfare Government of India with support from CDC . Clinton Foundation . WHO TAble of T A b l e o f Acronyms and Abbreviations Introduction....... ..........................................................................................

Words: 42414 - Pages: 170

Free Essay

Islamic Khilafah

...How the Khilafah was Destroyed Abdul Qadeem Zallum How the Khilafah was destroyed Al - Khilafah Publications Suite 298, 56 Gloucester Road, London SW7 4UB email: info@khilafah.com website: http://www.khilafah.com 1421 AH / 2000 CE ISBN 1 899574 050 Translation of the Qur’an It should be perfectly clear that the Qur’an is only authentic in its original language, Arabic. Since perfect translation of the Qur’an is impossible, the term ‘Translation of the Meaning of the Qur’an (TMQ) has been used, as the result is only a crude meaning of the Arabic text. Sayings of Prophet Muhammad (saw) appear in bold swt - subhanahu wa ta’ala saw - sallallahu ‘alaihi wa sallam ra - radhi allaho anha’ AH - After Hijrah CE - Common Era Printed and Bound by- De-Luxe Printers, London NW10 7NR. website: http://www.de-luxe.com email: de-luxe@talk21.com ii Contents The struggle between Islam and Kufr The conspiracies of the European countries against the Islamic State Arousing the nationalist chauvinism and the separatist tendencies The missionary and the cultural invasion The attempt at introducing the Western constitutional rules Adopting the Western laws The impact of the cultural and legislative invasion The Allies’ attempt at enticing Jamal Pasha Mustafa Kemal works towards the withdrawal of the State from the war and the signing of a peace treaty The capitulation of the Ottoman State The British attempt to destroy the Khilafah through political and legal actions The British alter...

Words: 68220 - Pages: 273

Premium Essay

Bbm Is Here

...Praise for Succeeding with Agile “Understanding the mechanics of an agile process is just not enough. Mike Cohn has compiled a superb and comprehensive collection of advice that will help individuals and teams with the intricate task of adopting and adapting agile processes to fit their specific challenges. This book will become the definitive handbook for agile teams.” —Colin Bird, Global Head of Agile, EMC Consulting “Mike Cohn’s experience working with so many different organizations in the adoption of agile methods shines through with practical approaches and valuable insights. If you really want agile methods to stick, this is the book to read.” —Jeff Honious,Vice President, Innovation, Reed Elsevier “Mike Cohn has done it again. Succeeding with Agile is based on his experience, and all of our experience, with agile to date. He covers from the earliest days of the project up to maturity and offers advice for the individual, the team, and the enterprise. No matter where you are in the agile cycle, this book has something for you!” —Ron Jeffries, www.XProgramming.com “If you want to start or take the next step in agile software development, this book is for you. It discusses issues, great solutions, and helpful guidelines when scaling up in agile projects. We used the guidelines from this book extensively when we introduced agile in a large, FDA-regulated department.” —Christ Vriens, Department Head of MiPlaza, part of Philips Research “If making the move to agile has always...

Words: 194469 - Pages: 778

Free Essay

Thomas

...How We Know What Isn't So The Fallibility of Human Reason in Everyday Life Thomas Gilovich THE FREE PRESS A Division of Macmillan, Inc. NEW YORK To Karen and liana Contents Acknowledgments 1. Introduction vn 1 PART ONE Cognitive Determinants of Questionable Beliefs 2. Something Out of Nothing: The Misperception and Misinterpretation of Random Data 3. Too Much from Too Little: The Misinterpretation of Incomplete and Unrepresentative Data 4. Seeing What We Expect to See: The Biased Evaluation of Ambiguous and Inconsistent Data 9 29 49 PART TWO Motivational and Social Determinants of Questionable Beliefs 5. Seeing What We Want to See: Motivational Determinants of Belief 6. Believing What We are Told: The Biasing Effects of Secondhand Information 7. The Imagined Agreement of Others: Exaggerated Impressions of Social Support 75 88 112 Contents PART THREE Examples of Questionable and Erroneous Beliefs 8. Belief in Ineffective "Alternative" Health Practices 9. Belief in the Effectiveness of Questionable Interpersonal Strategies 10. Belief in ESP 125 146 Acknowledgments 156 PART FOUR Where Do We Go from Here? 11. Challenging Dubious Beliefs: The Role of Social Science Notes Index 185 195 214 Four people made unusually significant contributions to this work and deserve special thanks. Lee Ross commented on drafts of many of the chapters and provided a number of his uniquely...

Words: 80718 - Pages: 323

Premium Essay

Tata Motors Ar 2011-12

...CONTENTS CORPORATE OVERVIEW (1-31) Board of Directors Senior Management Corporate Information Chairman’s Statement Designed to Deliver Product Range Global Presence Milestones Winners From Tata Motors Customer Satisfaction Green Mobility Human Resources Corporate Social Responsibility FINANCIAL HIGHLIGHTS (32-45) Pace in Performance Summarised Balance Sheet and Statement of Profit and Loss (Standalone & Consolidated) Fund Flow Statement Subsidiary Companies: Financial Highlights Financial Statistics STATUTORY REPORTS (46-122) Notice Directors’ Report Management Discussion and Analysis Report on Corporate Governance Awards and Achievements FINANCIALS Standalone Financials (123-168) Auditors’ Report Balance Sheet Profit and Loss Statement Cash Flow Statement Notes to Accounts Consolidated Financials (169-206) Auditors’ Report Balance Sheet Profit and Loss Statement Cash Flow Statement Notes to Accounts Attendance Slip and Proxy Form ANNUAL GENERAL MEETING Date: Friday, August 10, 2012 Time: 3.00 p.m. Venue: Birla Matushri Sabhagar, 19, Sir Vithaldas Thackersey Marg, Mumbai 400 020. 2 6 7 8 12 14 16 18 20 22 24 26 28 Tata Motors began operations in 1945. Since that time, we have remained committed to our values and our stakeholders. We have maintained a consistent focus on strengthening our organisation, and expanding our presence. Today, through our subsidiaries and associate companies, we already operate in the UK, South Korea, Thailand, Spain and South Africa. Our forays...

Words: 105500 - Pages: 422

Premium Essay

Microbiology Made Ridiculously Simple

...Preface A well-developed knowledge of clinical microbiology is critical for the practicing physician in any medical field. Bacteria, viruses, and protozoans have no respect for the distinction between ophthalmology, pediatrics, trauma surgery, or geriatric medicine. As a physician you will be faced daily with the concepts of microbial disease and antimicrobial therapy. Microbiology is one of the few courses where much of the "minutia" is regularly used by the practicing physician. This book attempts to facilitate the learning of microbiology by presenting the information in a clear and entertaining manner brimming with memory aids. Our approach has been to: 4) Create a conceptual, organized approach to the organisms studied so the student relies less on memory and more on logical pathophysiology. The text has been updated to include current information on rapidly developing topics, such as HIV and AIDS (vaccine efforts and all the new anti-HIV medications), Ebola virus, Hantavirus, E. coli outbreaks, Mad Cow Disease, and brand-new antimicrobial antibiotics. The mnemonics and cartoons in this book do not intend disrespect for any particular patient population or racial or ethnic group but are solely presented as memory devices to assist in the learning of a complex and important medical subject. We welcome suggestions for future editions. 1) Write in a conversational style for rapid assimilation. 2) Include numerous figures serving as "visual memory tools" and summary charts...

Words: 117402 - Pages: 470