Search
Skip to Search Results- 4GAPSSHRC
- 3Alberta Health and Wellness
- 3Vallianatos, H.
- 2Cash, Sean B.
- 2Cortus, Brett
- 2Goddard, Ellen
- 34Graduate and Postdoctoral Studies (GPS), Faculty of
- 34Graduate and Postdoctoral Studies (GPS), Faculty of /Theses and Dissertations
- 8Toolkit for Grant Success
- 7Toolkit for Grant Success/Successful Grants (Toolkit for Grant Success)
- 7Nursing, Faculty of
- 7Oil Sands Research and Information Network (OSRIN)
-
2003
This article employs poststructuralism to deconstruct the bodies of athletes of colour, which are viewed as genealogical representations of power that have their roots in eighteenth and nineteenth century bio-racist discourses. The central premise of this article is that overtime, the body of the...
-
(Re)Imagining inclusion in ways that foster belonging in the lives of disabled children and youth
(Re)Imagining inclusion in ways that foster belonging in the lives of disabled children and youth
Download2021-12-13
For the greater part of the twentieth century, thanks in part to disability rights movements around the world, disabled children and youth have increasingly been afforded access to community spaces, such as schools and classrooms; and activities, such as inclusive recreation programs, alongside...
-
2008
A retrospective study was performed using the case files of women shelter users to profile and describe the factors that are associated with homelessness in the women population in Edmonton, Alberta, Canada. Case files (660) were extracted by selecting every fifth file in each group (one group...
-
A Pediatric Nurse Practitioner's initiative to support parents of children undergoing neurosurgical care: The Neurosurgery Kids Fund Website Evaluation
DownloadFall 2014
Parent with children undergoing neurosurgery need access to specialized information as well as support resources. The public is becoming more active in managing their own health care and they often turn to the Internet as a starting point in their quest for health information resources. The...
-
Spring 2017
I explored how play and playfulness changed across the lifespans of an international sample of adults aged 18 to 70. My research study was informed by phenomenological methodology and used interviews as a means of data collection. Participants were recruited from a number of platforms, including...
-
2013-01-01
Steadman, R., Nykiforuk, Candace I.J., Vallianatos, H.
This article examines the illness and recovery experiences and perceptions of physically active middle aged and older adults participating in hiking groups. These perceptions are examined within the local milieu of their group and the larger social context of biomedical norms of healthy older...
-
Spring 2020
The population of older adults in Ghana is growing rapidly, and is projected to increase two-fold over the period 2015 to 2050. Despite the unprecedented growth, not much is known about the living conditions and wellbeing of older Ghanaians, in part due to a paucity of research in this area. This...
-
1997
Alberta Health, Health Surveillance
The Alberta Oil Sands Community Exposure and Health Effects Assessment Program was developed to ensure that a long-term, systematic approach to data gathering was implemented that would improve our knowledge about the link between the environment and human health. The purpose of the pilot study...
-
An experimental investigation of the impact of fat taxes: Price effects, food stigma, and information effects on economic instruments to improve dietary health
DownloadFall 2009
This thesis investigates how a tax and warning label on less healthy snack food products may affect consumer behaviour when the imposition of the tax is a source of consumer information. A survey that included choice experiments was implemented in supermarkets. Participants were asked to choose...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...