StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Newly Established Nations in World Wars
5 pages (1250 words) , Download 2 , Essay
The World War II created new opportunities for colonies to preserve their self-identity and national spirit.... The large-scale death and destruction exacted by World War 1 destroyed the security that had made current history a comfortable approach to international politics.... Usually, the common sense of war concerns the questions of national safety, and usually accepted and accomplished not on the basis of choice, but on the bases of force connected with the bureaucratic system....
Preview sample
Down East Spud Busters National Distribution Program
1 pages (250 words) , Download 2 , Research Paper
Free
The author of this paper "Down East Spud Busters national Distribution Program" touches upon the company's activities within the distribution program.... Down East Spud Busters' national Distribution ProgramCompany goalsTo improve their product line to sell more potato productsProcess higher value potato productsExpand the company's marketImplement a new distribution strategyIn the distribution program, the company plans to hire sales associates who will receive the products from the centre and sell them to different clients in a specific region....
Preview sample
Conflict among Nations and the Globalization Influence on this Issue
8 pages (2371 words) , Download 2 , Essay
Free
Today, no walls can separate humanitarian or human rights crises in one part of the world from national security crises in another…We have entered the Third Millennium through a gate of fire,” said Kofi Annan, (2001), taken from (Clarke, 2003, p.... People are more concerned with their independence, freedom, religion, customs and most of all, national economies.... Poor countries are today seeing their much-guarded national economies being destroyed by the fast spreading globalisation and it unnerves them....
Preview sample
Post Colonial Intervention in Somalia
15 pages (3750 words) , Download 3 , Essay
Free
The AU also aimed at not only assisting in the execution of the national security, but also Stabilization Plan of Somalia, especially the successful reestablishment and training Somali security forces.... As introduced above, the mission of AMISOM included defeating the areas under the control of Al-Shabaab, securing liberated areas as well as “providing support to institutionalize Somalia's national security and Stabilization Plan (NSSP).... For instance, CARE, which was associated with delivery of food supplies, used $100,000 per month for security to distribute the emergency relief....
Preview sample
Information Technology Security Management and Its Impact on Business Success
12 pages (3355 words) , Download 0 , Thesis
Free
"Information Technology security Management and Its Impact on Business Success" paper designs and implements server protocols that will satisfy the business needs as well as maintain the security and integrity of the organization's critical and confidential data.... This has helped in the determination of the required infrastructure (WSDG, 2009) INFORMATION TECHNOLOGY security MANAGEMENT AND ITS IMPACT ON BUSINESS SUCCESS ... ) To produce a report containing the High risk factors involved in IT security management and recommend ways of improvement....
Preview sample
The Nature of the Psychological Contract
35 pages (9604 words) , Download 8 , Essay
They have remained constant and include good wages, leadership roles, appreciation, recognition, achievement, job security, and interesting work.... The paper "The Nature of the Psychological Contract" describes that there is a difference in the expectations of Gen Yers.... They seek faster career progression and prefer challenging tasks....
Preview sample
Security, Crimes, Compliance and Continuity of IT in Enterprises
9 pages (2580 words) , Download 1 , Case Study
Free
This case study "security, Crimes, Compliance and Continuity of IT in Enterprises" analyzes Amazon.... om with particular reference given to the firm's data protection policy, information security vulnerabilities, risk management, network security, internal control and compliance.... Therefore, it is inevitably important for the company to establish advanced systems to improve network security and protect confidential customer information....
Preview sample
Change in Public Safety within Massachusetts
4 pages (1000 words) , Download 0 , Case Study
Free
Commission on national security 69). ... Commission on national security.... Road Map for national security: Imperative for Change : the Phase Iii Report of the U.... Commission on national security/21st Century.... Massachusetts has instituted a statewide Law Enforcement Mobilization Plan that directly derives from the establishment of multi-discipline, multi-jurisdictional forums (Office of the Homeland security 2)....
Preview sample
The Monetary Policy Measures
9 pages (2250 words) , Download 2 , Term Paper
Free
he national government could instigate the aggregate economic output through injecting lumpsum amount of money within the nation, since government expenditures, G, hardly depend upon the rates of interest and is rather considered as an exogenous factor.... hus, there are two effective measures that the national government could adopt – firstly, increase the amount of government expenditure and secondly, lower the tax rates.... hough the rate of interest was almost ineffective during that point of time, the national government utilized this increased supply of money to promote public sector investments so that the rate of unemployment in the nation also lowered drastically from 19% in 1938 to 14....
Preview sample
Renting versus Buying a Home
5 pages (1250 words) , Download 2 , Essay
Free
Housing is one of the major basic necessities that human beings require for the purposes of protection against harsh environmental conditions such as cold,wind, hot weather among others as well as provision of security and privacy.... Housing is one of the major basic necessities that human beings require for the purposes of protection against harsh environmental conditions such as cold, wind, hot weather among others as well as provision of security and privacy....
Preview sample
The Economic Considerations Of Information Security And Its Management
3 pages (750 words) , Download 2 , Essay
The economic considerations of information security and its management.... Most of the studies acknowledged that a lot of security systems were failed due to some misplaced reasons.... The economic considerations of information security and its management.... Most of the studies acknowledged that a lot of security systems were failed due to some misplaced reasons.... In all of these cases, the technical considerations of security are less important than the economic considerations (Anderson & Schneier, 2008), (NIST, 2010) and (Anderson & Moore, 2007)....
Preview sample
Vsphere 4.1 and the security enhancements of it
3 pages (750 words) , Download 2 , Essay
and its security Enhancements vSphere ™ 4.... and its security Enhancements: A Reflective Paper Your Name goes here Professional Specialization Professor Name of you professor Introduction Virtualization, being a cost effective and most viable methodology of implementing cloud network infrastructures has to offer lot of promise and assurance to IT industry, IT professionals and businesses.... However, the network security remains a topmost consideration for manager at all levels and a solution viability and dependability proportionate the level of security it ensures....
Preview sample
Identification of a Contemporary Management Issue
5 pages (1250 words) , Download 2 , Term Paper
Free
The paper 'Identification of a Contemporary Management Issue' presents the issue of job satisfaction and motivation as effectively addressed by managers remain to be a continuing concern.... Lack of appropriate motivation has been proven to lead to a lack of job satisfaction.... ... ... ... The current discourse has effectively achieved its aim of presenting issues relevant to the lack of job satisfaction and motivation as a contemporary management issue through the use of current events that were published on the subject....
Preview sample
Origin Enterprises plc
5 pages (1250 words) , Download 2 , Assignment
Free
Origin Enterprises plc specialises on the field of food and agri- nutrition which is listed on AIM and IEX (OIZ).... he manufacturing and distribution operation of the agro nutrition division is based in the United Kingdom, Norway, Poland and the Ireland.... ... ... ...
Preview sample
Direct Marketing Channels
10 pages (2737 words) , Download 0 , Report
Free
nline security threats ... The security of such information is crucial to the company.... urthermore, employee information, processing of credit card transactions, other e-commerce activities and interaction with the public through social media space are threatened by the possibility of security breach.... Although companies are in a greater control of protecting physical data files the same level of security cannot be guaranteed to online data systems....
Preview sample
Project Risk Management with Reference to the Stage of Planning in Building/Property Development
14 pages (3500 words) , Download 2 , Assignment
Free
Fast recovery of the investment ensures margin of safety to the business.... ?? profit margin is 25% ... rofit margin @ 25% 71,603 ... Contingency @ 5% is added in line with the pricing practice, which will serve as a margin for negotiation also. ...
Preview sample
The Importance of Security in a Corporate Building
8 pages (2000 words) , Download 2 , Assignment
Free
In the essay 'The Importance of security in a Corporate Building' the author describes how he and his group mates organized a security teaching camp for the children in their community.... They wanted to help children understand the importance of security in a corporate building.... The author says that awareness regarding other aspects that come under the security person was also thoroughly discussed.... he Importance of security in a Corporate Building ...
Preview sample
The Utilization of Health Management Information Systems within the National Health Service
8 pages (2476 words) , Download 4 , Essay
Free
This essay "The Utilization of Health Management Information Systems within the national Health Service" to identify the pros and cons in the employment of such a system concentrating mainly on the discussion of its impact on managers and clinicians.... national, regional and institutional projects abound to bring the shared Electronic Patient Record (EPR) into being and to support the care process with order communication and decision support techniques (Berg, 2004, p....
Preview sample
The Impact and Treatment of Security Threats by the State in The Hunger Games
8 pages (2270 words) , Download 0 , Essay
Free
"The Impact and Treatment of security Threats by the State in The Hunger Games" paper analyses this trilogy from the points of human security, the terrorist threat for the state, and the elements of revolutionary success, although, this story has other dimensions.... In this context, the central topic of hunger refers to the problem of human security, which breaks normal relations in society and increases the gap between rich and poor in it.... Assess the impact and treatment of security threats by the in The Hunger Games In its essence, the story written by Suzanne Collins is a dystopia in the circumstances of totalitarian political regime....
Preview sample
What are The Pressures For and Against a Common EU Immigration Policy
12 pages (3000 words) , Download 3 , Research Paper
Free
he populist and security centered arguments, still argue that the European Union is infact a victim to exploitation.... This was all attempts to stop a certain element of the immigrant hopefuls so as to avoid risking the country's security. ... By seeking homes and security, the illegal immigrants would be able to survive in an environment that is humanly suitable and free from exploitation and discrimination in hands of the locals.... Immigration Policy and security pp....
Preview sample
Can the Security Dilemma in International Politics be Overcome
6 pages (1674 words) , Download 1 , Essay
Free
This essay analyzes chances of security dilemmas in international politics during conflicts between countries and discusses how they can be overcome.... The security dilemmas in international politics can also be overcome, when the countries act through the IOs to gain legitimacy to their actions.... Can the security dilemma in international politics be overcome?... That is, when countries to protect their territorial integrity and/or to dominate other countries indulge in aggressive actions, the security aspects will come into the picture....
Preview sample
Sources on Criminal Justice and Security Management Investigation
5 pages (1355 words) , Download 0 , Annotated Bibliography
Free
This annotated bibliography "Sources on Criminal Justice and security Management Investigation" seeks to analyze ways in which an organization can minimize crime and increase security through research.... Sources on Criminal Justice and security Management Research Sources on Criminal Justice and security Management Research Criminal justice and security management are major concerns in any society today.... The emergence of security industry has contributed positively to crime reduction in society....
Preview sample
The Military-Industrial Complex of America
6 pages (1771 words) , Download 2 , Essay
Free
This habit is constantly refreshed by "defense pressure groups" that lobby on behalf of the MIC to heighten the public's awareness of increasing threats to national security (Bruntin).... However, on a national basis, the money might be better spent to provide more jobs than through military contractors.... ver since President Eisenhower gave his 1961 farewell address and warned the public of the looming Military-Industrial Complex (MIC), the issue of the civilian industrial component of the national defense system has had the nation's attention....
Preview sample
Programs of Social Care for Homeless Persons
12 pages (3282 words) , Download 2 , Coursework
Free
Apart from its intensive application, care programs are used extensively at local and national government levels.... In this regard, social care programs should begin at the family level and extends towards the reach of extensive community and national utilization.... Integration into the mainstream means showing them appreciation and concern; hence allowing them to socialize and participate in constructive social activities.... In this regard, foster care givers considered improving the teenager's mental and emotional status through appreciation and affectionate relationship (Monahan and Toselane 142)....
Preview sample
Tourism Development Centers on the Threat of Terrorism
8 pages (2000 words) , Download 3 , Research Paper
Free
This paper looks into safety and security in airports in relation to tourism.... This paper looks into safety and security in airports in relation to tourism.... Therefore, safety and security in airports is paramount for smooth running of tourism sectors in all regions of the world that are considered as tourist destinations.... This paper looks into safety and security in airports in relation to tourism.... The travel and tourism sector have considerably been bruised at various levels, accompanied by growing concerns on safety and security of destinations....
Preview sample
Bilingual Education, Oil, and the Navajo Nation
5 pages (1250 words) , Download 2 , Research Paper
In the United States, though English has not been endorsed as the official national language, most schools if not all in the U.... Name Tutor Institution Subject Code Introduction The Navajo nation of the Navajo people; an area of a semi autonomous population of native American governed region of approximately 27000square miles in northeastern Arizona, southeast of Utah and to the northwest of New Mexico....
Preview sample
Rational in Buying
19 pages (4750 words) , Download 2 , Case Study
Free
This paper "Rational in Buying" first takes a look at the role of brands and its position within the 4Ps of marketing, before evaluating its influence on the various demographics.... The 4 Ps of marketing refer to Product, Place, Promotion, and Price.... ... ... ... Branding is all about creating differences....
Preview sample
Future State Of Social Security As A Government Program
4 pages (1000 words) , Download 3 , Case Study
Free
The paper "Future State Of Social security As A Government Program" is focused on the study of the current, and future state of Social security as a government program and the reasons as to why this type of government insurance should become mandatory rather than compulsory for its members.... A brief history of the American social security program will be included in the paper because it is important to understand the company history before we delve deeper into what has caused the financial problems of this particular welfare system....
Preview sample
The Future of Artificial Intelligence
85 pages (21250 words) , Download 11 , Essay
The emerging technology and programming techniques related to Artificial Intelligence has continued to advance and provide new data in the quest to building a viable and working artificially intelligent machine.... Through the introduction of viable neural networking solutions, this has made the possibilities even more possible....
Preview sample
The Strategy of Zappos Regarding Building Consumer Trust
6 pages (1700 words) , Download 2 , Essay
Free
These items include assurance, brand, belief, care, choice, confidence, certainty, familiarity, hope, reputation, security, truth and obligation.... This is done through undergoing a small security test and provision of the login details, if one passes the security test.... In addition, security for an individual's personal data is replicated in the security questions a subscriber should fill for identification....
Preview sample
Security Features for Helping Secure a Computer Network
5 pages (1562 words) , Download 2 , Research Paper
Free
"security Features for Helping Secure a Computer Network" paper investigates various security features such as the use of effective antiviruses, the development of effective firewalls, the use of passwords, and dedicated manipulation of the user interface.... In retrospect, the security of a database ensures the efficient use of the computer network.... Users of the computer network must therefore employ strategic features to ensure the efficiency of the network and integrity of the data stored on the database through the employment of effective and dedicated security features....
Preview sample
Compare and Contrast Martin Amis in the Palace of the End with Latif Yahia The Devil's Double
7 pages (1949 words) , Download 2 , Essay
Free
The author of the paper titled "Compare and Contrast Martin Amis in the Palace of the End with Latif Yahia The Devil's Double" compares the two books which majorly advance the story of political detractors who are established by the dictatorial regimes.... .... ... ... Sexual immorality is yet another theme that compares both the story, In the Palace of the End by Martin Amis and The Devil's Double by Latif Yahia....
Preview sample
Food Security in the Developed and Developing Worlds
7 pages (2115 words) , Download 1 , Coursework
Free
The author of this coursework "Food security in the Developed and Developing Worlds" describes food security in different countries and 6 factors impacting food security and circumstances with regard to addressing food security.... The official United Nation definition of food security is that it means the 'availability of adequate world food supplies of basic foodstuffs to sustain a steady expansion of food consumption and to offset fluctuations in production and prices' (Food and Agricultural Organizations of the United Nations, 2003, p....
Preview sample
Ethical Issues in Business DB
1 pages (250 words) , Download 2 , Essay
Free
Monetary exchange is therefore acceptable as signs of appreciation and is treated as an ethical behavior.... Behaviors that are consistent with a culture are for example considered ethical in the culture while those sets of behavior that contradicts cultural orientations are perceived to be....
Preview sample
New States of Eurasia: Emerging Issues of Politica and Security
14 pages (4086 words) , Download 0 , Case Study
Free
"New States of Eurasia: Emerging Issues of Politica and security" paper evaluates the characteristics that make these territories prone to conflict and if the instability these states face is bound to last forever or if there is the hope of resolving the factors that contribute to the instability.... Therefore, in viewing the political and economic environment as well as external security of South Caucasus and Central Asia, all the other interlocking states and neighboring countries have to be put in consideration as elements with an effect on the future of the region (Aslund, 2013). ...
Preview sample
X Limited - Classified Statement of Financial Performance and Statement of Financial Position
4 pages (1050 words) , Download 0
Free
et margin ... These ratios include profit margin, return on assets and return on equity.... The company's profit margin improved from 19.... The paper 'X Limited - Classified Statement of Financial Performance and Statement of Financial Position' is an engrossing example of a finance & accounting report....
Preview sample
How Are Questions of Language, Place and National Identity Inter-Related in Literary Texts
11 pages (2860 words) , Download 2 , Essay
Free
In the paper 'How Are Questions of Language, Place, and national Identity Inter-Related in Literary Texts' the author will explore issues of language, place, and national identity that are manifest within Thomas' Collected poems and Roddy Doyle's Paddy Clarke Ha Ha Ha.... How are questions of language, place and national identity inter-related in literary texts? ... In this essay, I will explore issues of language, place and national identity that are manifest within Thomas' Collected poems and Roddy Doyle's Paddy Clarke Ha Ha Ha. ...
Preview sample
Corporate Finance of Redrow Plc and Balfour Beatty
8 pages (2582 words) , Download 2 , Case Study
Free
Apart from that, a major portion of the current assets are quick assets which is definitely a matter of appreciation.... Although the profit margin has been quite low in these years, still in the wake of financial downturn the performance is worth an appreciation.... After the year 2007, the company had been making losses both in ‘return on total assets' and profit margin' ratios.... However in 2009, the company's profit margin had seen a further steep downturn....
Preview sample
Main Features of the Current Reforms to the National Health Service
8 pages (2317 words) , Download 5 , Coursework
Free
This coursework "Main Features of the Current Reforms to the national Health Service" based to outline the main feature of the current reforms to the NHS based on the 2010 White Paper.... The 2010 White Paper has detailed more features of the current reforms to the national Health Service.... This paper sets out the long-term vision of the government for the future of The national Health Service.... Basically, the 2010 White Paper exhibits reforms of the national Health Service with features such as a system that makes the patients the heart of all the activities carried out by the national Health Service....
Preview sample
Are Liberty and Security Mutually Exclusive, or Mutually Supportive
3 pages (750 words) , Download 2 , Essay
Your Name Prof's Name Date Are Liberty and security Mutually Exclusive, or Mutually Supportive?... One of the fundamental issues of many western democracies is the apparent conflict between freedom and security: governments sometimes use security as a pretense to control people's actions for their own gain, while at other times imagining it to be their very real moral responsibility to protect its citizens regardless to the cost of liberty.... A careful analysis of theory and practice of security, however, indicates that security is not opposed to liberty, and in fact augments it when used judiciously, but that there is a fine tipping point after which security begins to impinge on liberty rather than support it....
Preview sample
Data Security Solution for the Design Studio One Company
7 pages (1832 words) , Download 3 , Case Study
Free
The aim of this paper is to research a Data security Solution requested by the executive management team of the 'Design Studio One' company.... The data security technology solution will give strategic implications of the information technology solution on the business for the next three years.... The company is a need for establishing security procedures including data monitoring periodically.... The aim of this paper is to provide a Data security solution for a company....
Preview sample
The Problem of Cyber Security in North Korea and China
1 pages (382 words) , Download 7 , Assignment
Free
The paper presents Cyber security as a twenty-first-century problem.... This follows a cyber-security breach that was witnessed recently by Sony Pictures Entertainment Inc.... It is increasing and, as a result, many companies are losing their assets.... Cyber-attacks are also seen as a weapon used by states against other countries....
Preview sample
Management and Information Security - Project Management Body of Knowledge
8 pages (2258 words) , Download 0 , Assignment
Free
The object of analysis for the purpose of this paper "Management and Information security - Project Management Body of Knowledge" is the Project Management Body of Knowledge as a collection of processes and various knowledge areas which are involved in the project management discipline.... Running Header: Management and Information security ... anagement and Information security ... t also involves creation of security policies on which the security programs of the organisation are founded....
Preview sample
Job Satisfaction and Management Motivation in the UK
5 pages (1467 words) , Download 0 , Essay
Free
ob security ... From the study, it was revealed that the factors most regarded as contributory to job satisfaction in 2010 were: interesting work, job security, and appreciation for work well done (Spicer, 2010).... ull appreciation of work done ... This is consistent with Spicer's findings that acknowledged appreciation for work as a significant motivating factor that contributes to job satisfaction. ...
Preview sample
Human Rights Declaration by United Nations
19 pages (5035 words) , Download 0 , Essay
Free
Human rights' existence may be as legal or natural rights in both international and national law2.... In addition, these rights do not bind to any country, but they are employed as people's standards of concern and they are the basis of every country's national constitution....
Preview sample
Principles of Taxation Law
7 pages (1750 words) , Download 2 , Case Study
However this claim for tax credit is subject to the condition that the sale to the entity must be a taxable supply and was not subjected to any margin scheme.... Goods and Services Tax similar to the Value added Tax (VAT) prevalent in European jurisdictions is an indirect broad based consumption tax....
Preview sample
Cybercrime, Privacy, and Security Concepts in the Film WarGames
8 pages (2178 words) , Download 0 , Movie Review
Free
This movie review "Cybercrime, Privacy, and security Concepts in the Film WarGames" presents one of the films depicting IT/computer networks narrative position, which involves hacking of security systems by a teenager and his accomplices to benefit themselves out of the networks violations.... This film represents a form of black hat hacking, where the individuals are involved in tampering with the security and privacy of other computer systems intentionally, in order to benefit inappropriately....
Preview sample
Clayton Industries Analysis
6 pages (1613 words) , Download 0 , Case Study
Free
This was due to certain preference for national brands by the Europeans, designs that did not fit to European expectations, and stiff price competition from Asian competitors (Bartlett and Barlow 3).... The paper "Clayton Industries Analysis" is a perfect example of a case study on management....
Preview sample
Problems Confronting Less-Developed Nations
5 pages (1512 words) , Download 2 , Essay
Free
The down turned economy could be wrested and with the multinationals coming in followed by the small and medium size enterprises, which in turn could mean currency appreciation.... The essay "Problems Confronting Less-Developed Nations" focuses on the critical analysis of the major issues on the problems confronting less-developed nations that are emblematic, with many of its strands twisted together, thereby enhancing its impact....
Preview sample
The Security Issues that are Faced by a Particular Organization
8 pages (2281 words) , Download 1 , Case Study
Free
The paper 'The security Issues that are Faced by a Particular Organization' presents networking which is an important aspect for any organization.... Networking in any organization is vital and it should be done ensuring that all the necessary security measures are put in place. ... his paper intends to analyze the security issues that are faced by a particular organization, and provide solutions to curb the problem. ... he company has no security policy in regards to their network....
Preview sample
6451 - 6500 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us