StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Contemporary security challenges facing GCC (Gulf Cooperation Council)
2 pages (500 words) , Download 3 , Essay
Free
Internal security among GCC member states is threatened by issues such.... a) In terms of external stability of the region, the current instability and conflict being witnessed in Iraq and the tensions it has with Iran and the Contemporary security Challenges Facing GCC Due Outline Introduction a.... What is the security perspective of the GCC states?... Merge efforts to boost identity, security definition, and outside support dependency....
Preview sample
Virgin Media UK
13 pages (3772 words) , Download 2 , Essay
Free
The following paper 'Virgin Media UK' presents Virgin Mobile as a mobile brand, that is in use in eight different business licensees operating in different geographies around the world.... The different mobile licensees act as independent business entities.... ... ... ... Virgin Mobile has traction in the United States, in Canada, in Australia, Poland, Colombia, Chile, Mexico, France, the United Kingdom, and South Africa....
Preview sample
Financial Investment- Formulas of Compound Interest, Taxable Income, and Annual Depreciation
4 pages (945 words) , Download 0 , Assignment
Free
The paper 'Financial Investment- Formulas of Compound Interest, Taxable Income, and Annual Depreciation' is an outstanding example of a finance & accounting assignment.... Compound Interest Formula; A= P (1+r/n) not Whereby, P=principal amount, r= annual interest rate, t= no.... of years, A= expected accumulated amount, n= no....
Preview sample
Absorption and Marginal Costing
7 pages (2164 words) , Download 2 , Assignment
Free
he profitability of products and divisions are determined on the basis of contribution margin ... In the paper 'Absorption and Marginal Costing' the author explains the two costing methods and their different results.... He discusses how the absorption costing method manipulates profits....
Preview sample
Marginal Publishing and Artists
8 pages (2528 words) , Download 0 , Literature review
Free
As much every individual was unique in his way of thinking, the Bettler's goal was to make potential consumers have the same perception of goods being advertised thus there was just a small margin for variability (Lehni, & Rollo Press 2011, p.... This literature review "Marginal Publishing and Artists" sheds some light on the work of Ernst Bettler, a fictional designer of Swiss origin that was invented by Christopher Wilson in 2000 in a publication in 'Dot Dot Dot' magazine of visual culture....
Preview sample
Social Security and the Downfalls of Early Retirement
12 pages (3000 words) , Download 2 , Essay
"Millions of Americans are approaching one of the most important financial decisions of their lives: to begin receiving Social security benefits at age 62, or defer those benefits until older," (Dalton, 6/06).... As a means of providing a certain level of financial assistance to those who have entered the later years of their live, US President Franklin Delano Roosevelt, in one of his acts as commander-in-chief, enacted a social help doctrine that would be commonly known as Social security....
Preview sample
Define security and loss prevention and list resources
1 pages (250 words) , Download 2 , Personal Statement
Free
security is provided by the following: armed forces (police and military), law enforcement agencies (Central Investigation Agency) and.... The conventional methods used to control crime include: barriers, alarm systems and private security officers. ... fter recent terrorist attacks, new ways of providing security have surfaced.... Methods of providing security which were not priory Define security And Loss Prevention And List Resources al Affiliation) Define security and loss prevention and list resourcesSecurity refers to the use of conventional methods to decrease the probability of occurrence of crime or criminal activities (Purpura, 1984)....
Preview sample
Awards in Quality Management
6 pages (1541 words) , Download 0 , Assignment
Free
erimeter security ... MW aimed at Physical security: the Key Element of Information Assurance, and Perimeter Defense: the First Bastion of Physical security.... To combat these challenges, they take an integrated approach using Perimeter security Planning Software Tools, a fully installed geospatial design, aiding Scenario Based Threat and Vulnerability Analysis, and helping security Planners making cost-effective and reliable operational security designs using a Step-By-Step logical process....
Preview sample
The National Curriculum, and Bilingualism - A Review and Summary of Mitchell, Hooper and Brumfit
11 pages (3267 words) , Download 2 , Essay
Free
This essay "The national Curriculum, and Bilingualism - A Review and Summary of Mitchell, Hooper, and Brumfit" covers five important areas of pupils' knowledge about language (KAL): language as a system, language learning/development, language variation by use and by user and language change.... The national Curriculum, and Bilingualism - A Review and Summary of Mitchell, Hooper and Brumfit (1994) Current paper provides summary and review of the study by Mitchell, Rosamond and other writers titled as “Knowledge about language” from Southampton University in England....
Preview sample
Homework in Economic Processes
2 pages (667 words) , Download 2 , Assignment
Free
It relates to the growth of MNC by evaluating the stages that an international product has to go through, thus revealing product decline and appreciation as a result of competition.... This will see appreciation in US dollar demand for Argentina pesos will decrease, while its supply will increase.... The demand for British pounds will increase, while the supply for British pound for sale will decrease, the equilibrium value of the British pound will increase thus signifying an appreciation in the value of the British pound....
Preview sample
A Letter to Martin Luther King
6 pages (1665 words) , Download 2 , Essay
Free
This essay "A Letter to Martin Luther King" focuses on the segregation laws of the South that are no longer in place as a result of your efforts, and it has become a part of US law that discriminatory practices are legally punishable, in actuality, many black people remain cruelly oppressed.... ... ...
Preview sample
Johnsons State of the Nation and Roosevelt Inaugural Addresses
5 pages (1445 words) , Download 3 , Essay
Free
Viewed as a promulgation of his election promises during the campaign, Johnson laid his plans to eliminate the suffering of the American citizens through empowering them and eliminating security threats.... FDR also introduced the social security program that enabled the poor and the needy in the society especially the elderly to access quality healthcare services.... Different presidents have adopted different plans and these have been communicated through the state of the nation address within the senate chamber or through a national address following the swearing-in....
Preview sample
User Access Verification and Security
5 pages (1364 words) , Download 1 , Assignment
Free
This report "User Access Verification and security" presents the international Travel Agency as an organization with HQ in London and two other remote sites in Paris and Rome.... ser Access Verification and security ... The organization branches are connected together through three routers that enable communication....
Preview sample
Intercultural Negotiation between US, Canada, and Japan
8 pages (2125 words) , Download 0 , Literature review
Free
Most negotiation platforms fail because of lack of appreciation and using the wrong communication skills. ... Culture is a broad field in human socialization that entails aspects like; religion, values, beliefs and social organization of an ethical group or organization.... Culture guides the behavioral performance of any human being because there are principles in various cultures that....
Preview sample
Capital Structure and Corporate Financing Decisions
13 pages (4097 words) , Download 0 , Assignment
Free
Three core factors that participate in shaping up the ROE are net profit margin, total asset turnover and lastly equity multiplier.... In respect of net profit margin, Company A has showed a bit slow results such that it could not produce even 1% net profit margin.... 7% net profit margin is generated by Company B.... et Profit margin ...
Preview sample
Non-rational Escalation of Commitment
2 pages (719 words) , Download 2 , Case Study
Free
In the paper 'Non-Rational Escalation of Commitment,' the author aims to consider a discussion where commitments are likely to be escalated.... Ted has had a demanding, but a well-paid job in a corporate finance firm but he and his wife Kate have decided to move to St.... Louis to start a poorly paying job....
Preview sample
Photographer Robert Mapplethorpe
10 pages (2942 words) , Download 2 , Essay
Free
national attention when it was included in The Perfect Moment, a traveling exhibition funded by the U.... national Endowment for the Arts (NEA), a government funding agency.... Celant (1993) for instance, while alluding to the erotic nature of the photos, takes a far more aesthetic position, viewing the photographs as contributing historically and artistically to the appreciation of black cultural mythology--an area widely ignored....
Preview sample
Constructing Pro-Forma Statements (Heartland Express)
10 pages (2500 words) , Download 2 , Term Paper
Free
The gross profit margin is an analyzing tool which assists in identifying how effectively and efficiently the company is utilizing its raw materials, variable cost related to labor and fixed costs such as rent and depreciation of property plant and equipment.... The company under consideration is Heartland Express, a renowned name and a considered leader in the United States when it comes to transportation and logistics....
Preview sample
Describing a Model Project to Upgrade Faculty Security
10 pages (2717 words) , Download 5 , Research Paper
Free
The paper "Describing a Model Project to Upgrade Faculty security" focuses on the critical analysis and description of a model project to upgrade security at a facility.... security is a broad perception that is purposed at creating a state in which illegal persons cannot gain admission.... Physical security is a component of the extensive concept of safety that is objected at protecting a variety of resources like personnel, facilities as well as company data kept in physical media managed by a corporation....
Preview sample
Proposal: Adding a new administrative assistant postition for the security division
4 pages (1000 words) , Download 2 , Essay
RESEARCH PROPOSAL Topic: Name: Institution: Professor: Date due Title: Adding a new administrative assistant position for the security division of Tec Firm.... Therefore, as such, the increased population demand better and improved services to meet its meet its mission of being the number one leader in security solutions in the region.... It is also noted that the proposal will assist restore confidence in the X security company thus creating a better public image thus improving the chemistry....
Preview sample
Finance in the Hospitality Industry
12 pages (3000 words) , Download 2 , Term Paper
Free
TEC Higher national Diploma in Hospitality Management ... It will also discuss about gross profit and net profit margin , current ratio and quick ratio and debtors and creditors turnover by solving an illustrated problem.... This is high profit-margin industry in UK, and the large-chain restaurants are even having 200 percent mark-up on drinks and foods.... ross Profit margin Ratio ... et Profit margin ... ross Profit margin = Gross Profit * 100/ sales = £62,645 * 100/ £ 157,165= 40% ...
Preview sample
The Great Depression
5 pages (1250 words) , Download 4 , Essay
Free
The security and Exchange Commission (SEC) came up in 1934 to rebuild the trust of the citizens on the stock exchange due to the enormous depression.... Further, he restricted consumption through trade controls and rationing; the manufacture of machinery and armaments improved the Gross national Product of Germany.... The national Industrial Recovery Act (NIRA) was an American statute that wanted to authorize the US president to permit cartels and monopolies and regulate the industry, with an aim of achieving economic recovery (Schultz 77)....
Preview sample
Title and Security
4 pages (1000 words) , Download 2 , Essay
This writer has made forays into the various aspects governing property law in the UK context, such as - undue influence and misrepresentation, tracing and the various other aspects surrounding the highly intricate aspects of application and interpretation of these laws which.... ... ...
Preview sample
Survey on Security in Electronic Voting Systems
8 pages (2206 words) , Download 3 , Essay
Free
This paper ''Survey on security in Electronic Voting Systems'' tells that The Article on E-Voting using Double-Blind Identity-Based Encryption explains a model that uses double-blind encryption based on the user identity.... The disadvantages of the system: The main disadvantages of the system are the security issues involved in electronic voting.... The security of the scheme is ensured by the correct counting of all valid votes.... The article on secure e-voting with blind signature proposes an e-voting for use in a general election that utilizes cryptographic techniques to ensure the security of the voting process....
Preview sample
Arch Communications Group
4 pages (1000 words) , Download 2 , Essay
Free
Based on EBITDA, Arch has a 33% cash flow margin in 1995, however, based on its free cash flow, this margin drops to an astounding –294 percent.... This paper talks about Arch Communications Group which, founded in 1986, was valued to be the third largest communications company in the United States in 1995 offering paging services and equipment to a subscriber base of 2,006,000 on local, regional, and nationwide levels....
Preview sample
Sunripe Marketplace - a Private Label Strategy
11 pages (2874 words) , Download 3 , Coursework
Free
unripe's product assortment included fresh produce (60%), deli (14%), meat (14%), bakery (10%) and national dairy brands (2%).... unripe's value-added-salads generate the highest gross margin of 65%.... The Great Atlantic & Pacific Company (A&P) positioned its private labels as a low cost alternative to national brands.... The average gross margin for the retailer in the private label category was 41 percent.... o increase the gross margin on its most popular products; Cacklebury Max, Charcoal Beef and Pink Lady Pork by 10 percent in the next one year. ...
Preview sample
National Competitive Advantage
8 pages (2093 words) , Download 2 , Case Study
Free
This paper "national Competitive Advantage" discusses traditional economic policies alone that may not help the firms or the nation to increase their competitive power in the current world.... The firms or governments should follow it in order to sustain their competitive power in the market....
Preview sample
Security as a Priority in the Satisfaction of Human Needs
8 pages (2350 words) , Download 0 , Essay
Free
The paper "security as a Priority in the Satisfaction of Human Needs" discusses that security just like any other value is restricted by limited resources and as such it cannot be offered at all costs because a compromise has to be reached so that the other needs can be satisfied as well.... security at all costs is not an ethical justification to safeguard the community if it compromises the other values.... security Foundations ...
Preview sample
A Service-Oriented System for Distributed Data Querying: MOTO Company
26 pages (6500 words) , Download 2 , Assignment
The following report 'A Service-Oriented System for Distributed Data Querying: MOTO Company' summarizes the existing data of the client MOTO Company.... The author has used vast resources as an international consulting firm.... He looks at various locations.... ... ... ... The author has focused on a marketing outlook....
Preview sample
Guerilla insurency and insecurity in Colombia: the Revolutionary Armed Forces of Colombia
12 pages (3000 words) , Download 2 , Essay
Free
The result was widespread torture and murder of hundreds of guerrillas, all in the name of maintaining national security.... Deshazo, Mendelson, & Mclean (2009) give the example of 1978, when the Colombian president with the approval of security statute in Colombia gave the military the mandate to detain and interrogate guerrillas and other criminals.... For example, in April 2012, the FARC released 10 members of the security forces that the group had been keeping hostage (ibid)....
Preview sample
The Various Types of Nations or Nationalism
8 pages (2422 words) , Download 1 , Coursework
Free
The doubts now placed on the multicultural policy of the government stemmed from security issues that emerged, especially after 9/11 and the emerging threats of terrorism.... nder what sorts of circumstances may ethnic belonging and civic-national belonging come into conflict consequently undermining the unifying force of civic nationalism? ... ETHNIC AND CIVIC national BELONGING ... 38%, embraces civic national belonging and they are constituted mostly by baby boomers, tertiary-educated and the secular....
Preview sample
Statutory Audits, Information Security and the Digital Divide
9 pages (2625 words) , Download 2 , Research Paper
Free
This paper examines the role of information security professionals in controlling risks in a period of fast IT growth and the role of corporate governance and statutory audit in ensuring that those systems are working.... With more information circulating with the bridging of the digital divide, there is a need for information security professionals to play a proactive role in the company....  “Information security is the vehicle through which the organization's information assets are secured” (Whitman & Mattord, 2010, p....
Preview sample
Smartphones and the Security of the Data in Them
7 pages (1868 words) , Download 0 , Term Paper
Free
The paper "Smartphones and the security of the Data in Them" discusses information regarding ways of securing and protecting your smartphones, both physically and its data.... With the information gathered regarding multiple security threats that are currently present and looming today, we can say that there is a significant issue regarding smartphones and the security of the data.... A Survey of the Current of security in Smartphones A Survey of the Current of security in Smartphones In recent times, a multitude of technological advancements have developed within society such as modern personal computers, networks, and very advanced mobile smartphones....
Preview sample
A Survey of the Current State of Security in Smartphones
6 pages (1869 words) , Download 2 , Term Paper
Free
The author of the paper titled "A Survey of the Current State of security in Smartphones" identifies and analyzes the kinds of attacks that could affect a smartphone, and look at current literature regarding available security options for smartphones.... A Survey of the Current of security in Smartphones A Survey of the Current of security in Smartphones In recent times, a multitude of technological advancements have developed within society such as modern personal computers, networks, and very advanced mobile smartphones....
Preview sample
Financial Statements - Sullivan Barrett Pty Ltd
6 pages (1532 words) , Download 0 , Case Study
Free
) Gross profit margin ... GP margin = {Gross profit/sales} * 100 ... he Gross profit margin sown was attributed to the revenue received form the Toy, Book and gaming sales.... The company, being its initial financial period, has reported a significant high profit margin.... ) Net Profit margin ...
Preview sample
Different Skills Knowledge and Personal Attributes Requirements for a Security Manager
9 pages (2460 words) , Download 0 , Term Paper
Free
The paper "Different Skills Knowledge and Personal Attributes Requirements for a security Manager" highlights that security is broad, and the way society views the state of well-being is different.... Different security areas require different skills knowledge and personal attributes requirements.... security is the resistance to and protection from danger or harm.... security has a positive and a negative dialogue....
Preview sample
Is International Relations Simply International History If Not Why
4 pages (1000 words) , Download 2 , Essay
These global challenges range from security issues, environmental issues and natural calamities that call for international aid.... International relations has enabled the solving of issues such as those related with globalisation, international security especially concerning terrorism, preservation and conservation of the environment particularly global warming, political issues, economical issues and human rights violation especially in nations where genocides have occurred....
Preview sample
Transfer Principle Use
5 pages (1406 words) , Download 3 , Essay
Free
Therefore, appropriate adjustments should be performed to the data used in computing the gross margin to make sure that ‘similar' gross margins are compared.... If the gross margin earned by Associated Enterprise 2 is within this range, then its transfer price will be considered arm's length....
Preview sample
Identify the next great idea in Homeland Security
3 pages (750 words) , Download 6 , Assignment
Free
Investigate and enhance the processing of the complaints forwarded by the public concerning the Department of Homeland security (DHS).... Promote leadership to DHS's equal employment opportunity policy programs to make the DHS have structure of Federal agency, and as the communication mechanism with the public in matters of security concern (Forest, 2006).... Investigate and enhance the processing of the complaints forwarded by the public concerning the Department of Homeland security (DHS)....
Preview sample
What Is the Role of the State in Your Life in Society
7 pages (1750 words) , Download 2 , Assignment
Free
It is in this context that it is stated, “human security directly confronts the moral dilemma of national security, a dilemma that expresses a conflict between the rights of states and the rights of human beings by giving priority to individual security” (Tadjbakshs and Chenoy, 2007, p.... Many a time individual security gets overridden by notions of state security as was witnessed in the US during the Bush regime when there was an outcry that “a national security agenda” was being pushed forth “at the expense of individual rights” (Hertel and Libal, 2011, p....
Preview sample
The National Educational Technology Standards for Teachers
6 pages (1832 words) , Download 1 , Essay
Free
The paper "The national Educational Technology Standards for Teachers" highlights that it is apparent that a number of effects in today's learning environment have brought effective teaching, assessment and criticism to the vanguard of educational and institutional agendas (JISC, 2010).... This paper explores the use of one of the national Educational Technology Standards (NETS) for Teachers: ... Additionally, teachers can use summative tests such as national tests and final exams after instructions have been given....
Preview sample
Managing Change in the Urology Department of a National Health Service Hospital in England
10 pages (2500 words) , Download 20 , Essay
Free
Herzberg theory will help the practitioners in identifying individual responsibilities, advancement and growth, job security, working conditions and achievement (Sachau, 2007:379).... This paper "Managing Change in the Urology Department of a national Health Service Hospital in England" explores that the main challenge emanates from the Department of Urology which is struggling to respond to external pressures for change.... This paper will begin with the statement that the mission of the national Health Service in England is to sustain continuous improvement in the delivery of health care services....
Preview sample
Organisational Change Management
12 pages (3000 words) , Download 2 , Dissertation
This method can be best understood by understanding the meaning of both of the words The first word, appreciation, refers to the recognition of contributions or attributes of people and things that surround us.... Table of Contents Executive summary 2 Introduction 2 Definition 4 Discovery 6 Dream 7 Design 8 Destiny 10 Conclusion 10 References 12 Executive summary D2, an automobile component manufacturing company, is facing a major economic turndown due to which a plant is set to be closed down and employees be made redundant....
Preview sample
Economics of the Dot Com Model vs the Multichannel Mode
18 pages (4500 words) , Download 2 , Essay
Free
Internet banking and e-business applications require ensuring a high level of security and integrity of the data for the transactions to be trustworthy.... n the first stage competence trust is established through the trust and security-based mechanisms that are embedded in e-commerce technologies, to provide speed and real-time accurate information. ... The online spending habits are on the rise on account of its ease of use, for both the seller as well as the buyer, and an improvement in security features for such transactions....
Preview sample
Curriculum Development Related to Information Security Policies and Procedures
3 pages (750 words) , Download 3 , Case Study
security policy comprises in the form of a document or rules that specify the statement ‘What must be done' in order to assure security measures in the system or the network For providing improved functionality for the organization, policies and procedures must be defined.... A security policy comprises in the form of a document or rules that specify the statement ‘What must be done' in order to assure security measures in the system or the network....
Preview sample
SWOT Analysis of Jupiter
13 pages (3492 words) , Download 1 , Report
Free
Given that partners could turn out to be competitors, partners in joint ventures may treat each other with suspicion, as harbouring ill motives, Jupiter must ensure its potential partner's ethical and legal practices comply with national and international standards.... The other dimension of national cultures in this model is uncertainty avoidance, which simply implies the extent to which a society accepts and tolerates uncertainty and ambiguity (Hofstede, Hofstede & Minkov, 2010)....
Preview sample
The Impact of Mobile Devices on Cyber Security
3 pages (928 words) , Download 4 , Essay
Free
Cyber security is a menace that will continue to thrive and cause harm to consumers of different technological products, as long as technology shall continue to be used.... The level of technological growth in the past decade has been unprecedented, and the security threats.... hus, at such an age where The paper 'The Impact of Mobile Devices on Cyber security" is a cogent example of a term paper on technology.... The level of technological growth in the past decade has been unprecedented, and the security threats currently experienced have come as a threat to many....
Preview sample
Digital Communication
14 pages (4027 words) , Download 2 , Essay
Free
In the perspective of security management, KLM is taking all the measures possible to protect its digital communication channels.... It does this by providing communication privacy that ensures security for customers information.... Also, there are security measures in place that take into consideration the transaction integrity especially by guaranteeing aircraft transaction delivery.... n the other hand, digital communication has disadvantages such as a security problem....
Preview sample
Internet Security Technologies: Lessons of Password and Patch Management
3 pages (966 words) , Download 2 , Essay
The essay "Internet security Technologies: Lessons of Password and Patch Management" focuses on the critical analysis of the major lessons learned from password and patch management in terms of Internet security technologies.... Internet security is a hot topic that outlines different steps to adopt.... In this scenario, one of the fundamental realities following internet security is that the web technology itself is not considered a reliable architecture....
Preview sample
The Place of Public Police in Contemporary Security
15 pages (4240 words) , Download 2 , Essay
Free
The paper "The Place of Public Police in Contemporary security" highlights that the Police remain a relevant service in modern society just a much as they were in medieval times.... Running Head: The Place of Public Police in Contemporary security THE PLACE OF PUBLIC POLICE IN CONTEMPORARY security Institution: ... Another change has come about because of the fact the citizens have over the years taken the responsibility of ensuring their own security through private security firms and vigilante groups formed to protect neighborhoods (Neocleous, 2004). ...
Preview sample
6401 - 6450 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us