StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Border Security: How do we secure the southern border
4 pages (1000 words) , Download 3 , Essay
rom an it takes a village philosophy, in which all citizens and local governments of the country must work together to improve national security, new and progressive training seminars should be conducted to help local government leadership along the southern border to deal with illegal foreign traffic.... Despite any current defects in establishing a more secure southern border, there are several methods available to enhance border security which will be analyzed in detail. ...
Preview sample
Piagets Theory of Cognitive Development: an Appreciation
5 pages (1250 words) , Download 3 , Essay
Free
Number] Piaget's Theory of Cognitive Development: an appreciation Man takes pride of his intellect which according to him separates him from the rest of the animal kingdom.... I have now gain a better appreciation of not only Piaget's notions but also of how to critically examine the development of the mind....
Preview sample
Issues Related to Security Interoperability and Operations
8 pages (2000 words) , Download 1 , Case Study
Free
This case study "Issues Related to security Interoperability and Operations" focuses on the issues faced by Banking Solutions Inc, a number of them are related to security, interoperability, and operations.... More importantly, the best IT security controls would be the one giving way to the promotion of objectives as well as measurable progress indicators in aspect like information security, item progress, and operations among others....
Preview sample
Traditional taxonomy of intelligence sources / national security
4 pages (1000 words) , Download 3 , Assignment
In principle, there is the traditional and the target centric models of collecting intelligence and information.... Thus, as a prospective analyst it would be critical.... ... ... A collector or stakeholder of intelligence and information, as a direct interest in the data that is collected and would have some degree or bias or Expressly, all these taxonomies and types of intelligence in terms of data collection and analysis namely traditional and target centric differ retrospectively....
Preview sample
Security and idententy
4 pages (1000 words) , Download 2 , Essay
Free
Societal security and national identity In the modern world, Security is no longer perceived only as military security of the state.... Moreover, nations are imaginary communities and national identities, which are the most important references object of the societal security.... security is an ambiguous term servicing all people and the affairs of a nation.... Although security is used to refer to protection of the state, it is broadened to include not only military, but also political, economic, societal, and environmental aspects....
Preview sample
Homeland security preparedness
12 pages (3000 words) , Download 2 , Essay
) To use the intelligence gathered, for making decision relating to national security that can lead to more effective and efficient utilization of the available economic and military resources of United States of America.... he whole idea of using the umbrella term ‘home land security' for defining security efforts to protect United States against terrorist attacks gained currency after the deadly and dastardly terrorist attacks on World Trade Center....
Preview sample
Is social security a ponzi scheme
5 pages (1250 words) , Download 2 , Essay
Social security is a system of welfare wherein the current working generation contributes money which is used for the people who have now retired.... When the present workers retire, they will be the beneficiaries and the contributions would be Simply put, in the Social security program funds are contributed by the working people and are used by people who have retired.... Thus Social security is largely a pay-as-you-go program.... et us now shift focus on Social security....
Preview sample
Security Sector Reform
8 pages (2302 words) , Download 1 , Assignment
Free
In the general sense, security is a concept similar to safety.... In the paper 'security Sector Reform' the author briefly explains the concept of 'security sector reform' and 'weak states'.... In the general sense, security is a concept similar to safety.... Explain briefly the concept of security sector reform and weak s.... How could security sector reform offer a way forward in weak s?... EANING OF security SECTOR REFORMS AND ITS PROCESS ...
Preview sample
Negotiations Journal
30 pages (7500 words) , Download 6 , Essay
In order to facilitate the process of understanding and create value in the eyes of the employer, I worked to emphasize the many benefits that my employment brought to the company; as well as some of the many highlights of my career up until that point that were highly beneficial to the firm and their profit margin....
Preview sample
Network Security
7 pages (1750 words) , Download 3 , Term Paper
Free
Evaluation of the functionality of the plan was placed on the hands of the national security Agency and the National Bureau of Standards.... The National Institute of Standards and Technology together with the national security Agency designed the Common Criteria Evaluation and Validation Scheme whose main objective was to offer a basis for the evaluation of IT products' security properties.... The rapid growth of networking has also come with its own challenges, mainly in the area of network security....
Preview sample
Food Security in Brazil
7 pages (2383 words) , Download 3 , Essay
Free
The paper "Food security in Brazil" states that the fact that food insecurity remains an unending issue, it is advisable to take note of the Brazilian Economy, understanding better how trade and better business helps boost the current level of food production.... The final part gives the recommendations that, if adopted, will significantly increase food security in Brazil.... Food security in Brazil     By         Location Table of Contents Food security in Brazil Table of Contents 2 ...
Preview sample
Appreciating Communication as a Key to Human Understanding
7 pages (2015 words) , Download 1 , Essay
Free
When real communication or when communication is received, this is just the start of understanding, acceptance, and full appreciation of the message or idea or concept.... When real communication or when communication is received, this is just the start of understanding, acceptance and full appreciation of the message or idea or concept.... inally, with knowledge comes appreciation....
Preview sample
Integrated Physical Security: Fraud and Information Security
18 pages (4500 words) , Download 2 , Case Study
Free
These as well comprise local, state and national administration structures and personal offices where we work, the schools where our kids are educated, the hospitals where we get a treatment and the shopping malls where we shop (Allenby, 1998).... This paper will discuss the integrated physical security, and define the factors to be considered when providing integrated physical security protection for a high, rise multi-tenanted office building in an inner-city location, parts of which are in use 24 hours a day, seven days a week....
Preview sample
Soft Security Issues
6 pages (1687 words) , Download 1 , Case Study
Free
2003, Improving the Practice of national security Strategy: A New Approach for the Post-Cold War World.... Arguably, they also have a moral and national imperative to advance the values on which society and system of government are based.... The paper 'Soft security Issues' presents security issues that play an important role in international relations and a global order.... Approaches to security Issues security issues play an important role in international relations and a global order....
Preview sample
Deep Physical IT Security
10 pages (2724 words) , Download 0 , Essay
Free
From this essay "Deep Physical IT security" it can be noted that the Defense in Depth represents the application of the Rational Choice theory where the Protection in Depth theory mainly entails the representation of the engineering principle which seeks to avoid the single point form of failure.... Physical security can be described as the protection of personnel and hardware together with software from physical actions or any other events which have the potential to cause serious loss and damages to the organization....
Preview sample
Systems Approach to Physical Security
10 pages (3286 words) , Download 1 , Literature review
Free
The paper "Systems Approach to Physical security" highlights that generally, physical security controls should be approached as an integrated system, which is premised on Systems Theory since no single layer can effectively accomplish all security needs.... Fennelly (2012) defines physical security as an integrated combination of security measures intended for disallowing unauthorized access to equipment, facilities and resources....
Preview sample
Guidelines for Martin Luther by Martin Marty
6 pages (1750 words) , Download 2 , Book Report/Review
Free
A writer of the paper "Guidelines for Martin Luther by Martin Marty" claims that Martin Marty, an American religious scholar, in his book Martin Luther expeditiously describes the life of Martin Luther as one of the most renowned, influential, revered global figures.... ... ... ... Martin Luther lived most of his entire life within the realms of religion in Wittenberg....
Preview sample
Methods of Auditing Construction Equipment Depreciation
4 pages (1000 words) , Download 2 , Essay
Methods of Auditing Construction Equipment Depreciation (Add (Add (Add Date) Methods of Auditing Construction Equipment Depreciation Introduction It is necessary for business concerns to record the consumption of fixed assets over time for the purpose of reflecting their reducing value and thereby analyzing actual state of affairs of the organization....
Preview sample
Case Studies (Laura Martin)
4 pages (1000 words) , Download 2 , Research Paper
They are mostly employed in security firms, banks, mutual funds, hedge funds, pension funds and insurance companies.... They scrutinize the financial reports of a company, and conduct interviews with the management and industry professionals.... Executives who aim to achieve sound....
Preview sample
Contemporary Private Security
4 pages (1000 words) , Download 3 , Research Paper
Free
It is probably only through legislation that such a national security standard will be attained.... ranted, there will be challenges involved which include the issue of national security which cannot be entrusted to private firms.... Document "Modern Private security" describes according to security InfoWatch, one of the biggest problems facing modern private security services is standardization.... However, the problem of high demand is insufficient for supply, which has led to problems on the part of security companies....
Preview sample
Historical Cost Principle, Asset Impairment and Depreciation
4 pages (1076 words) , Download 2 , Essay
Free
The "Historical Cost Principle, Asset Impairment and Depreciation" paper explains why the historical cost principle is used to account for long-lived assets and how the cost basis is determined.... Historical cost principle values assets at the original cost of acquisition.... .... ... ... Depreciation with the corresponding principle, which is the allocation of the asset cost to periods upon which that particular asset is in use....
Preview sample
Social Security System
4 pages (1000 words) , Download 2 , Essay
From a lay man's point of view, Social security is a simple pension scheme.... But there is more to the Social security System than a mere pension arrangement.... The economic gait is that Social security is a mechanism whose functioning ensures the provision of revenue for disfavored members of the society such as the old, the handicapped, the ill and the unemployed, so as to enable them meet up with basic necessities.... Like the Balance of Payment (BOP) and the business cycle, the Social security System experiences many set backs but there exists a Social security problem....
Preview sample
Social Security and How It Works
8 pages (2292 words) , Download 0 , Essay
Free
"Social Networks In International and national security.... The paper 'Social security and How It Works' is a pathetic variant of the essay on social science.... Originally the term social security was used to describe any curriculum with the intention of helping individuals with inadequate monetary resources.... Social security is one of the most accepted federal programs, yet most people do not know much about it and how it works....
Preview sample
Fixed Assets and Depreciation for a Company
7 pages (1936 words) , Download 0 , Essay
Free
The paper ''Fixed Assets and Depreciation for a Company'' is a wonderful example of Finance & Accounting essay.... Asset has been defined as anything tangible or intangible which can be possessed and helps in the generation of economic value is being termed as assets.... ... ... ... The paper ''Fixed Assets and Depreciation for a Company'' is a wonderful example of Finance & Accounting essay....
Preview sample
Homeland Security of the US
11 pages (3057 words) , Download 1 , Case Study
Free
In response to the attacks of September 11, 2001 President Bush authorized the national security Agency (NSA) to conduct warrantless surveillance on international communications into or out of the U.... “Legal authorities supporting the activities of the national security Agency described ... The paper "Homeland security of the US" describes that the DHS works with the U.... The DHS also works with the country's economic and industrial sectors to develop a range of vulnerability assessment tools to meet their unique security challenges....
Preview sample
NSA Information Security Standards
3 pages (750 words) , Download 2 , Research Paper
Free
Conclusion The E-Government Act, which was enacted by the 107 Congress and signed into decree by the President in 2002, acknowledges the significance of data security to the economic and national security of the United States.... National Policy on the Use of the Advanced Encryption Standard to Protect National Security Systems and national security Information.... national security Agency Institution Name Instructor Course Date The national security Agency (NSA) is United States' cryptologic institution....
Preview sample
Financial Analysis of Damiani Group
5 pages (1510 words) , Download 3 , Assignment
Free
From the paper "Financial Analysis of Damiani Group " it is clear that generally, the return on assets and common equity has been negative over the past 3 years.... The year 2008 was a bonanza for the company as it derived positive returns in that year.... .... ... ... Damiani Group was founded by Enrico Damiani in Italy, back in 1924 aiming to deliver a wide range of jewelry products....
Preview sample
Marketing - Don Martin Ltd
5 pages (1390 words) , Download 2 , Case Study
Free
The paper "Marketing - Don Martin Ltd" states that it is recommended for the company adopts and implement an effective management approach.... This will ensure that employees are well supervised and as a result prevent theft cases that are suspected to emanate from the employees.... ... ... ... Don Martin Ltd....
Preview sample
Low cost airline
48 pages (12000 words) , Download 5 , Dissertation
The following dissertation is focused on the idea of a low-cost airline.... As it is stated here, a low-cost airline or carrier (also known as a no-frills or discount airline) is an airline that proposes small costs for that airline and excludes many services made for passengers.... .... ... ... Doganis defines low-cost airlines as airlines ‘' that modeled themselves as Southwest''....
Preview sample
Marian Anderson Speech
5 pages (1579 words) , Download 1 , Essay
Free
rom the above it is clear that Martin Luther King Jr performance at the Lincoln Memorial was remarkable and the moral aspects of it caused a national reconciliation and acknowledgment of racial inequality.... This work called "Marian Anderson Speech" describes a speech as if it was by Marian Anderson where she reflects on Martin Luther King Jr....
Preview sample
Information Security Managment
20 pages (5000 words) , Download 2 , Essay
he appraisal of the organization will guarantee that the organization gets to be more secure and more trustworthy and that all the security risks are distinguished and wiped out.... The IT office directed a security review inside the firm to use the methodology and guaranteed successful evaluation of the usage of meetings surveyed by the different departmental heads2.... The group that surveyed the security and trustworthiness of the association and made recommendations included: ...
Preview sample
Civil Right vs. National Security Case Study: Padilla/Hamdi vs. Rumsfeld
15 pages (3750 words) , Download 2 , Case Study
national security Case Study Padilla/ Hamdi vs.... Rumsfeld [Full name] [Student Registration Number] Introduction Since the compromise of national security witnessed during the September 11 attacks on US soil, tough measures to counter terrorism continue to find their way in national security policies inside and outside the country.... In several cases before the courts, the federal government has been found in contravention of the provisions of the constitution, which raises questions on the practicality of providing national security without compromising civil rights (Picarelli 1)....
Preview sample
The Provisions of the Security Laws in Australia
33 pages (9211 words) , Essay
Nobody downloaded yet
The paper "The Provisions of the security Laws in Australia" explores the private security sector in every state.... In Glass Pty Ltd v Rivers Locking Systems Pty Ltd 120 CLR 516, the court stated that the failure by private security agents might lead to criminal and civil liability for their actions.... Section 462A of the Crimes Act provides that security agents have no greater power than a citizen's arrest.... Section 15 of the security and Investigation Agents Act 1995 states that a security agent should not act in a way that exceeds the powers assigned to them....
Preview sample
Security of Information in Government Organisations
15 pages (4187 words) , Download 3 , Essay
Free
There was evident need for information to be protected and the need for national security saw the invention of much more complex and more technologically advanced means of preserving computer security (Peter, 1998).... "security of Information in Government Organisations" paper states that persistent weaknesses in information systems and applications persist in intimidating the privacy, reliability, and accessibility of important information as well as the systems that are used to uphold the maneuvers....
Preview sample
Security and Economic Challenges in Nigeria
10 pages (2728 words) , Download 0 , Case Study
Free
o effectively meet the security challenges facing Nigeria today, there is need to have a competent legal framework for national security that facilitates efficient budget allocation to meet the defense and national security needs.... These activities are a threat to the sustainability of the Nigeria economy and with increasing scale, they continue to become a threat to national security.... With the rising security challenges, there is a growing appetite to commercialize national security spearheaded by bureaucrats and security actors, leading to loss of funds....
Preview sample
Factors Affecting Security for Turkey
18 pages (4517 words) , Download 1 , Essay
Free
In line with this security discourse, Turkey's broadened security agenda in 1990s identified Islamism and Kurdish separatism as major security threats while use of national security was seen as vital in shaping political process by the military establishment.... This paper ''Factors Affecting security for Turkey'' tells that Turkey has for a long time been a beacon of stability between Europe and the Middle East.... The recent security threat has been the New Year gun attack that was blamed on Jihadist group Islamic State that targeted revelers at an exclusive nightclub on the waterfront....
Preview sample
National Bank of Abu Dhabi
5 pages (1250 words) , Download 2 , Essay
An analysis of the national Bank of Abu Dhabi's profit and loss statement, we can figure out that the bank's interest income, operating and other incomes have constantly been rising for the last year offsetting the increase in operating expenses and causing the net profit to rise. ...
Preview sample
Ned Kelly and Nations Culture
3 pages (750 words) , Download 2 , Essay
Whether he's viewed as larrikin Kelly, murderer Kelly, gentleman Kelly or heroic Kelly, he remains a lasting symbol of our Australian national identity. ... Ned Kelly is one of Australia's best known historical personalities, highly revered by painters, writers, musicians, and film makers....
Preview sample
Information System Security Plans
5 pages (1621 words) , Download 4 , Research Paper
Free
Speaking of DoD's, its main purpose and function is coordinating as well as supervising the federal agencies and government's function that are concerned with national security.... Apart from these three organizations, DoD coordinate and supervise the four national intelligence agencies or services including the Defense Intelligence Agency (DIA), the national security Agency (NSA), the National Geospatial-Intelligence Agency (NGA), and the National Reconnaissance Office (NRO) (“Department of Defense: Directive,” 2011)....
Preview sample
Energy as It Relates to Security, the Environment and Marine Transportation
6 pages (1634 words) , Download 2 , Thesis Proposal
Free
Energy security is often associated with the national security in the context of availability of oil and natural resources for the consumption purpose.... nergy sources can be termed as the leading factors behind assuring national security to almost every economy in the world.... With energy security becoming a major concern for many economies, the research topic holds great relevance in terms of underpinning the worth and importance of energy sources and resources in ensuring national security in the context of the environment and marine transportation (Yergin, 2011) ...
Preview sample
Security Management
17 pages (4250 words) , Download 3 , Research Paper
Following attacks of 9/11 and other series of attacks and threats of attacks, security features in buildings and sites have become important.... engineers endeavor to use the best skills that ensure optimum building and site security, Information Technology is the other area that IT experts spend a lot of time and resources trying to protect organization information.... security sector of an organization is never an exception.... The executive decision makers of organizations often have the interest to know the impact of security on the bottom-line operations of the firm....
Preview sample
Cornwall UK - Place on the Margin
11 pages (2750 words) , Download 2 , Research Paper
Free
Certain national bodies like English Heritage and national Trust have utilized Cornish interests to inculcate the Cornish heritage that has an element of Currishness in it.... erhaps the greatest success of the revivalists has been the adoption of “Trelawney”, as the national anthem of Cornwall.... This may have been the reason for the absence of a viable political party in Cornwall like the Scottish national party founded in 1928 or Plaid Cymru of 1925. ...
Preview sample
About Sallie martin
2 pages (500 words) , Download 2 , Essay
Free
Martin and Dorsey became the co-founders, and organizers of the national Convention of Gospel Choirs and choruses serving as the vice-president till her death.... She is credited with ushering in of spiritual music to the masses always referred to as, “The Mother of Gospel” by the national Convention of Gospel Choirs and Choruses....
Preview sample
International Security and the State
10 pages (2537 words) , Download 0 , Essay
Free
That is why national security has traditionally been understood as acquiring, using and deploying military force so as to achieve national security goals.... This paper ''International security and the State'' tells that Globalization has been defined as the process of integration and interaction among governments, people, nations, or companies.... lobalization and international security cannot be separated.... There is a growing number of literatures that shows how security has become complex and multidimensional....
Preview sample
Social Security Taxation
8 pages (2367 words) , Download 2 , Term Paper
Free
The paper "Social security Taxation" states that some of the recommendations include raising the retirement age, reducing benefits for the high earners, covering social security for all newly hired government employees, recalculating the cost of living assessment levels and using longevity indexes.... SOCIAL security TAXATION SOCIAL security TAXATION INTRODUCTION One of the key revenues for the government, taxation refers to the charges levied on specific or general masses by the government, for the provision of social welfare, health and recreation facilities, infrastructure and other services....
Preview sample
The Price Puzzle of the Insensitivity of Consumer Prices
5 pages (1475 words) , Download 0 , Essay
Free
there is a national border between them, this phenomenon does not hold true and the equivalent distance because of national borders ( as calculated by the study) could be upto 1700- 20,000 miles in explaining the prices between two countries( Rebelo, Sergio.... Thus, it seems that rather than physical distance, national borders play a more important role in explaining the consumer prices. ... If you ask a layman what the price of one commodity, imported to USA from China, would be and most probably the answer which you will get is the prices in dollars multiplied by the exchange rate and add the transportation cost and the profit margin....
Preview sample
Qatar National Cement Company
11 pages (2799 words) , Download 1 , Case Study
Free
The paper "Qatar national Cement Company" is a perfect example of a finance and accounting case study.... national Cement Company is located in Qatar and is ranked amongst the best companies regarding sales and production.... The paper "Qatar national Cement Company" is a perfect example of a finance and accounting case study.... national Cement Company is located in Qatar and is ranked amongst the best companies regarding sales and production....
Preview sample
Effectiveness of the Department of Homeland Security
8 pages (2000 words) , Download 3 , Research Paper
Free
In the paper 'Effectiveness of the Department of Homeland Security' the author analyzes the responsibilities of the Department of Homeland Security as far as prevention and emergency response by preventing terrorism and enhancing national security.... The first major responsibility of DHS is safeguarding the United States by preventing terrorism and enhancing national security (Charvat, 2012).... Effectiveness of the Department of Homeland security ...
Preview sample
Network Security Fundamentals, Security Threats, and Issues
4 pages (1234 words) , Download 4 , Case Study
Free
As the paper "Network security Fundamentals, security Threats, and Issues", the Internet is a huge network of networks, as well as for reason that its basic design is intrinsically insecure and unsafe.... security consists of tools, technologies, measures, and laws used to ensure the safety of resources.... At the present, security has become one of the biggest issues outlined by information technology firms and business organizations which connect their domestic Local Area Networks (LANs) and Wide Area Networks (WANs) to the Internet....
Preview sample
The Application of Nicklinson Versus Ministry of Justice
6 pages (1598 words) , Download 1 , Report
Free
This occurs because the appreciation margin of the UK's incompatibility of different sections and article of the law.... ith reference to the first appeal, the court made a ruling that questioning of the current assisted suicide law on its compatibility with Article 8 it is for the United Kingdom to make a decision because it does not fall within the appreciation margins of United Kingdom (Dignity in Dying 2009).... On the first appeal of the compatibility of the law with article 8, the assisted suicide law falls in the United Kingdom appreciation....
Preview sample
951 - 1000 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us