StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Internal weaknesses that impacted the Islamic Societies during the Crudades and Mongol Wars
12 pages (3000 words) , Download 2 , Essay
Free
3 Moreover, during the course of the 13th century, the military problems in Syrian Franks had become more challenging, further weakening the security of the Syrian Islamic society.... Islamic Societies during the Crusades and Mongol Wars ... he Crusades comprised of military units from the Roman Catholics all over the Western Europe, under no unified command....
Preview sample
Why did the U.S. government target Hiroshima and Nagasaki in 1945
9 pages (2250 words) , Download 2 , Research Paper
Free
International security 10(2): 121-40.... In August 1945 two atomic bombs were dropped on Japan by the United States, killing at least 115,000 people with another 100,000 being injured (Bernstein 1995, 135).... The targets for these bombs were Hiroshima and Nagasaki rather than more military targets such as Tokyo....
Preview sample
Web Services Technology and Information Systems
11 pages (2750 words) , Download 3 , Essay
Free
“An Integrative Study of Information Systems security Effectiveness.... The main objective of this following research is to probe whether the implementation of Web services technology could create a distinction within system development.... The research will also explain how and why web services reveal innovative techniques of creating software....
Preview sample
Undocumented nurse medical errors
14 pages (3500 words) , Download 3 , Essay
Free
She might not do what I ask her though because of her fear for her job security and sense of shame.... The researcher will state the practical problem, identify the most important ethical questions and the theoretical bases for his analysis, discuss arguments and counterarguments, including their specific ethical concepts and supporting facts, name options, and choose and explain his final decisions....
Preview sample
The Mechanism of Insurance Companies for Insurance of Business
12 pages (3000 words) , Download 3 , Literature review
Free
This review "The Mechanism of Insurance Companies for Insurance of Business" explains the conceptual framework and theoretical underpinning of Insurance and its basic principles in relation to explaining the mechanism of underwriting and pricing Marine insurance by an insurance company.... ... ... ...
Preview sample
Samsung Mobile Company
11 pages (2750 words) , Download 4 , Essay
Free
For example the legal framework on security and privacy of information will dictate the kind of applications used within a company's information systems.... Samsung Mobile Company.... ... uring an information audit, existing documents and human resources are evaluated to determine whether they effectively contribute to the attainment of the company's goals and objectives....
Preview sample
Criminal Justice: Effectiveness of multiagency partnerships in crime reduction
10 pages (2500 words) , Download 3 , Essay
Free
This paper analyses the effectiveness of multiagency partnerships in crime prevention and reduction.... Multiagency partnerships in crime reduction can be referred as the alliances formed between two or more crime prevention organizations to reduce crimes of a particular nature.... ... ... ... The researcher states that it is not necessary that multiagency partnerships are always formed domestically....
Preview sample
Business Ethics at Toyota
10 pages (2500 words) , Download 4 , Case Study
Free
The ethical standards should never be compromised, especially in case of manufacturing and construction sector, as the safety and security of the consumers are at stake (Tran, 2010).... The paper "Business Ethics at Toyota" introduces the root cause of unethical issues and solutions to the issue of unintended acceleration at Toyota....
Preview sample
Organisations and Behaviour: Structure and Taylorist Methods and McGregor Theory
10 pages (2500 words) , Download 2 , Assignment
Free
Safety Needs: - When an employee can satisfy his security and safety needs, then his safety needs are satisfied.... The author identifies the issues arising from the hierarchal Structure and Taylorist methods, analyzes McGregor theory and management styles followed by the company before and after the changes....
Preview sample
Business Project Management
11 pages (2750 words) , Download 2 , Essay
Free
Information Management & Computer security, 7(1): 23-29.... The paper 'Business Project Management' aims to point out the relationship between time, cost and quality and the critically evaluate the techniques used to demonstrate the balance of time, cost and quality using critical path method, calculation of the return on investment and quality management....
Preview sample
Electronic Documentation in Health Sector
8 pages (2000 words) , Download 2 , Research Paper
Free
Privacy as well as security in the management of electronic health records forms a basic consideration in implementing the desired EHRs.... Electronic Documentation in Health Sector.... There is the need in the modern day practice to embrace information technology and advanced nursing practices in order to realize the current as well as future nursing needs within the society....
Preview sample
Sociology - How does advertising function as a system of indoctrination
12 pages (3000 words) , Download 3 , Essay
Free
Marx believed that religion gives mankind a peace and a security in his time of need, that is, if a man is in pain and wants to get rid of his pain, he must come close to God who provides him solace by producing illusions of a happy after life (“Marx, 1843”).... Advertising is a marketing tool which creates artificial needs and wants in the minds of consumers or convinces them about certain views by creating illusions....
Preview sample
Comparing and Contrasting of Two Practice Theories
8 pages (2000 words) , Download 3 , Essay
Free
For example, the character in the movie is lodged in a maximum security prison but in the assessment this aspect has been ignored.... The client chosen for this report is a character named Dr.... Hannibal Lecter from the movie trilogy, The Silence of the Lambs (1991), Red Dragon (2002) and Hannibal (2003)....
Preview sample
The Connections Between Consumption, Identity, Taste And Style
8 pages (2000 words) , Download 2 , Essay
Free
Increased levels of security among the rich class have created more opportunities for the rich to live in highly secluded areas safe from congestion (Adams 2003, p.... Consumption is the amount of a product that a consumer is willing and has the ability to purchase at a specific point in time....
Preview sample
Role of Social Media in Online Travel Information Search
13 pages (3250 words) , Download 2 , Essay
Free
Differentiating the trust in ecommerce and s-commerce: the moderating role of privacy and security concerns.... This paper “Role of social media in online travel information search” will discuss the role of the social media in online travel information search.... It will focus on the social media aligned with eTravel, mostly in terms of how the social media impacts on decisions of travelers....
Preview sample
Infant-Toddler Environment Rating Scale
11 pages (2957 words) , Download 2 , Essay
Free
Here is entirely different from the busy activity area, create a family-like atmosphere, people have a sense of security.... This essay "Infant-Toddler Environment Rating Scale" discusses teachers that should be early learning supporters, collaborators, and guides, in other words, the interaction between children's effort and teacher's support which guarantees the full development of a child....
Preview sample
International Controversy That Exists between India and Italy
9 pages (2893 words) , Download 2 , Research Paper
Free
Praeger security International, 2007.... The paper "International Controversy That Exists between India and Italy" states that The Law of the sea: multilateral treaties: (1996) mentions that states ought to be open based on their approach to ensure that the supremacy of each state as guided by their respective constitutions are upheld....
Preview sample
Green Cloud Computing
14 pages (3724 words) , Download 0 , Assignment
Free
he other myth is that the need of being discrete in the secrets of the organization therefore leading to, incorporation of tight security that prevents the company from conducting off shore cloud providers.... The paper "Green Cloud Computing" is a great example of an assignment on information technology....
Preview sample
The Role of Information Technology Infrastructure Library
12 pages (3444 words) , Download 4 , Essay
Free
This area also provides the IT department guidelines on evaluating the present level of IT and IT security within the organization.... The paper "The Role of Information Technology Infrastructure Library" states that the Information technology Infrastructure Library was started as a government initiative in the United Kingdom to solve the poor quality of service provided to government departments by IT service providers....
Preview sample
Amazons Core Value Proposition
13 pages (3549 words) , Download 2 , Essay
Free
Storefront e-business model involves companies that combine transaction processing, security, online payment and information storage in a database created to enable merchants sell their products on the Web (Deitel, Deitel and Nieto 72; Anumba, and Ruikar 13).... The paper 'Amazon's Core Value Proposition' presents an analysis of e-business models employed in the operations of Amazon, QXL Ricardo plc, and Daum....
Preview sample
Organisations and Behaviour
11 pages (3026 words) , Download 2 , Assignment
Free
The paper "Organisations and Behaviour" will begin with the statement that organizational structure is generally described as the responsibility and the power that is allocated systematically among the members and the way the work procedures are carried out.... ... ... ... The organizational structure includes the nature of the varied layers of the hierarchy, centralization of authority, and horizontal integration....
Preview sample
IT Strategy at COM Air
11 pages (2985 words) , Download 3 , Case Study
Free
The redesign in the governance system will although take some time but its effective implementation will lead to the final objective of making the security of data foul proof.... This case study "IT Strategy at COM Air" aims at the analysis and evaluation of a regional carrier airline....
Preview sample
IT Leveraging at the Operational Level in Barclays Bank
10 pages (2705 words) , Download 0 , Case Study
Free
It focuses more on security to keep the clients details safe.... The paper "IT Leveraging at the Operational Level in Barclays Bank" is an outstanding example of an information technology case study.... Organizations, both large-sized and small-sized are leveraging opportunities offered by information technology to extend their market reach within the global business environment....
Preview sample
The Issue and Challenges of E-business and E-commerce
10 pages (2786 words) , Download 2 , Essay
Free
Internal management process – deals with employee training, some electronic security systems, submitting reports and other types of information in electronic version.... The paper "The Issue and Challenges of E-business and E-commerce" states that businesses save money and reduce their expenses while a customer saves time....
Preview sample
Social Media: Facebook Campaign for Women Drivers in Saudi Arabia
12 pages (3531 words) , Download 1 , Case Study
Free
econdly, there is the security and privacy that the account ensures by requiring a particular log in, a password, and optional privacy settings regulating the number of people that can access personal posts and information about the individual.... The paper 'Social Media: Facebook Campaign for Women Drivers in Saudi Arabia' states that Facebook is one of these avenues acquiring a wide range of social capital, which shaped the rise of the Arab Spring and is now raising the concern on driving by the women of Saudi Arabia....
Preview sample
Media Framing of Human Trafficking
13 pages (3617 words) , Download 0 , Case Study
Free
Sex trafficking has also been framed in the nationalisation frame, whereby the media representations demonstrate that human trafficking is a global issue that affects countries together with their security regimes.... This paper ''Media Framing of Human Trafficking'' seeks to demonstrate how media has turned out to be part of the soiled system with the naturalized practices of social actors, perpetuating unawareness about the problem of human trafficking towards the general public....
Preview sample
Population Growth and Water Resources
10 pages (2831 words) , Download 2 , Research Paper
Free
Water security and Peace: A Synthesis of Studies Prepared Under the PCCP- Water ... This research paper "Population Growth and Water Resources" presents population growth that has reduced the limited water resources that are currently available.... As the population continues to grow, there is an urgent need to address this issue since it can affect the very survival of mankind....
Preview sample
Epsom Road Building Design
11 pages (2846 words) , Download 0 , Assignment
Free
However, security measures are required when using this concept.... However security measures are required when using this concept.... The paper "Epsom Road Building Design" describes that the use of insulation concepts is important in terms of ensuring that energy is saved and the building is sustainable....
Preview sample
The Diverse Factors Bringing about Workplace Risks
12 pages (3266 words) , Download 0 , Term Paper
Free
orodzicz, E 2005, Risk, crisis and security management, Wiley, New York.... This term paper "The Diverse Factors Bringing about Workplace Risks" discusses the risks of injury and ill health affecting most of the workers.... This careful examination of the diverse factors bringing about workplace risks is called risk assessment....
Preview sample
Ulysses Grant, Elements of an Effective Leader
10 pages (2928 words) , Download 2 , Research Paper
Free
As he battled with throat cancer at 62 with an empty pocket, he took pain writing his memoirs to ensure his family's financial security.... The paper "Ulysses Grant, Elements of an Effective Leader" asserts that Ulysses Grant, the great general of the Civil War, and the 18th and youngest president of the US did succeed in uniting the nation and in improving the situation of the marginalized African American in the US....
Preview sample
The Process of Developing E-Commerce
12 pages (3233 words) , Download 3 , Term Paper
Free
security is also a challenge to e-commerce.... In this paper "The Process of Developing E-Commerce", various issues concerning e-business have been explored in relation to how these can be integrated into the business plan of the online store.... The focus has been given to thinking about the benefits and challenges of e-business....
Preview sample
Outsourcing for IT and Software Development Industry
13 pages (3554 words) , Download 2 , Essay
Free
This essay "Outsourcing for IT and Software Development Industry" presents a detailed analysis of outsourcing and its potential advantages.... This paper also discusses insourcing.... I have selected the IT industry for explaining the preference of outsourcing and insourcing.... ... ... ... The trend of outsourcing is emerging in the fields of information technology....
Preview sample
Organizational Background and Justification for Participation
12 pages (3229 words) , Download 2 , Research Paper
Free
Given that this case contests the previous court ruling in favor of the state, where an abuse of human rights against a citizen was alleged, the organization has intense interest in ensuring that the rulings of the lower courts were right in law so that greater justice and legal security may be realized....
Preview sample
The Effects of Social Media in Todays Society
10 pages (2883 words) , Download 3 , Research Paper
Free
?What is some security Consideration to keep identity safe? ... The paper "The Effects of Social Media in Today's Society" discusses that social media has a great number of benefits to all its users as it gives them a single platform to interact with each other.... Life would be very different if there was no such platform....
Preview sample
Labour Law Contract, Gratuity Calculation, Arbitrary Dismissal
11 pages (2936 words) , Download 2 , Essay
Free
The questioner is not obliged to vacate the accommodation unless she received her full payment or the payment of the same in the Ministry of Labour treasury as security until the case is decided by the competent court.... The paper "Labour Law Contract, Gratuity Calculation, Arbitrary Dismissal" states that the first question in this section was linked with Labour Law....
Preview sample
The Logistical Processes at Tate & Lyle Plc
10 pages (3296 words) , Download 2 , Essay
Free
Its limitations include high variable costs, ground handling, security in the ground, weight constraints, airports may be far from the exporters, and it is vulnerable to poor weather conditions.... The paper "The Logistical Processes at Tate & Lyle Plc" tells that Tate & Lyle PLC is one of the world's largest renewable food and industrial ingredients manufacturers....
Preview sample
The Implications of E-business on Frontier Markets
9 pages (2592 words) , Download 0 , Research Proposal
Free
These include factors such as; lack of security, huge cost of setting up user resistance due to trust issues and other factors such as the high cost of internet and telecommunication infrastructure in emerging markets. ... The paper "The Implications of E-business on Frontier Markets" is an information technology research proposal....
Preview sample
Internet and Corporate Communication
10 pages (2626 words) , Download 2 , Research Paper
Free
Notably, the internet platform offers a virtual data storage space whose privacy and security remains a major area of concern.... This paper ''Internet and Corporate Communication'' tells us that there have been tremendous changes in communication channels in the wake of the advent of the internet platform....
Preview sample
Mathematical Concepts and Processes in Storytelling
10 pages (2522 words) , Download 0 , Report
Free
JB integration is support, for example, remote message processing and security module for enterprise for better interaction.... The paper "Mathematical Concepts and Processes in Storytelling" discusses that the first technology used in Java is serialization.... It is applicable to convert the state of the object into a byte stream so that persistency for objects is received on the network....
Preview sample
Impact of Technology on Society
10 pages (2744 words) , Download 3 , Essay
Free
The use of telephone technology has ensured security in many countries and helped to deal with emergencies.... The paper "Impact of Technology on Society" describes that despite the negative challenges telephone technology causes to society, it has improved communication due to its availability....
Preview sample
Pollution Control and Monitoring
9 pages (2755 words) , Download 0 , Literature review
Free
This literature review "Pollution Control and Monitoring" sheds some light on the monitoring and surveillance of both the environment and food for hazards so that problems can be identified and detected early to address hazards arising from global climate change.... ... ... ... Different types of electronic wastes can be tackled by effective recycling methods; this will help tackle this problem....
Preview sample
Political Environment in Britain in Movies
11 pages (3161 words) , Download 2 , Essay
Free
Moreover, there is no job security; the workers are dismissed on baseless grounds.... The essay "Political Environment in Britain in Movies" focuses on the critical analysis of the two videos, which puts into perspective the political environment that exists in Britain.... Renowned director Ken Loch directs the videos....
Preview sample
The Computer Is Certainly the Most Amazing Achievement of Modern Men
10 pages (2887 words) , Download 2 , Essay
Free
security: In this field a computer program fixed in about each weapon.... The paper "The Computer Is Certainly the Most Amazing Achievement of Modern Men" states that we can enjoy much more facilities that were never ever seen in the past.... This paper has discussed some of the important aspects of computers throughout our life....
Preview sample
Health and Illness in the Older Adult
10 pages (2847 words) , Download 0 , Assignment
Free
Due to respect for older person's dignity, beliefs security as well as full human rights, it led to Mrs.... The paper "Health and Illness in the Older Adult" is an outstanding example of health sciences and medicine assignment.... Older adults are part of the population segment that requires special health education efforts because their needs are unique and characteristics have not been put into consideration when the existing health programs were being designed, implemented and evaluated....
Preview sample
The Community Development Theory and Practice
11 pages (3072 words) , Download 0 , Assignment
Free
?? safety and security ... This paper ''The Community Development Theory and Practice '' tells that Organizing and arranging areas for settlements always starts by using the strategies and knowledge of physical planning.... Physical planning combined with community designing is a product of evaluating other disciplines....
Preview sample
The French Lieutenant's Woman
13 pages (3014 words) , Download 3 , Essay
Free
Like Dickinson and Sarah, Cal finds freedom in isolating himself from others; at the end of the book, he finds the ultimate freedom in allowing himself to be beaten, isolating himself from kindness, humanity, and security to find fulfilment. ... The paper "The French Lieutenant's Woman" discusses that Cal and Emily Dickinson's Selected Poems are, superficially, three substantially different texts....
Preview sample
The Global Oil Demand and Supply
15 pages (3925 words) , Download 0
Free
A derivative market does demand some security against the potential of price fluctuations such as the futures positions.... The paper 'The Global Oil Demand and Supply' is a wonderful example of a finance and accounting report.... Based on the fact that the global economy is expected to rise up to 4....
Preview sample
International Financial Markets
11 pages (3002 words) , Download 0
Free
security analysis and portfolio management.... Five companies namely Land securities group plc, BT group plc, Marks and Spencer group plc, Mondi Plc and Bunzl plc are considered for creating a portfolio.... Though portfolio will be considered with two stocks out of the total five probable stocks, still these five companies have....
Preview sample
The Role of Procedure in Managing Both Individual and Collective Conflict
11 pages (2903 words) , Download 3 , Essay
Free
It is the means to change, the means by which our social values of welfare, security, justice and opportunities for personal development can be achieved.... From the paper "The Role of Procedure in Managing Both Individual and Collective Conflict" it is clear that the conflicts should be dealt with very carefully because the Workers' Unions could take part in such conflicts and this might lead to a totally different dimension....
Preview sample
Health, Safety and Environmental Management
10 pages (2695 words) , Download 0 , Assignment
Free
They should identify and consider how to act on likely situations that may arise in case of a system failure, security violation, chemical misuse and the daily custom of operation not been followed.... .... ... ... The paper "Health, Safety, and Environmental Management" is a good example of an assignment on business....
Preview sample
170351 - 170400 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us