StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Human Rights, Global Wrongs
9 pages (2754 words) , Download 0 , Essay
Free
They automatically shift their mind-set towards executing harmful actions against those who threaten their security and the survival of their group.... This essay "Human Rights, Global Wrongs" explores the external and internal factors that predispose well-adjusted individuals with no personality or serious clinical psychological distress to commit the heinous crimes of genocide against humanity....
Preview sample
Event Management: Australian Rules Football
10 pages (2500 words) , Download 2 , Book Report/Review
Free
This enable the event itself to be well coordinated, with the safety and security of both fans and athletes being of obvious importance (Nicholson & Pearce, 2001).... In the paper 'Event Management: Australian Rules Football' the author provides a brilliant case study to analyze various management fundamentals....
Preview sample
IT Project Management and Information Technology
11 pages (2865 words) , Download 2 , Assignment
Free
Such projects created in the field of IT need a lot of security in order to secure the vital information of the users online.... The paper "IT Project Management and Information Technology" presents the duty of the managers in IT project management to come with the best methodologies to run the project....
Preview sample
The Home in Which We Are All Intended to Have a Right
12 pages (3112 words) , Download 1 , Coursework
Free
One is not in any way supposed to be forced out of his/her own home, unless the act is in the protection of the security of the state, but if that is not the case, a person is supposed to move out on his/her own accord (Mumford, 2000, p.... This coursework "The Home in Which We Are All Intended to Have a Right" focuses on the modern painting that has now reached the levels of entering into collaborations with architecture....
Preview sample
Sysytems and Operations
12 pages (3000 words) , Download 3 , Essay
Explore how the government supports the strategic development of information technology and e-business. ... ... igital economy is such an economy that has the base of.... ... ... In this world where the usage of mobile phones, laptops, satellite navigations, digital cameras and etc.... have increased to a higher extent making the economy more of a digital one instead of traditional. ...
Preview sample
Managing the New Enterprise
11 pages (2750 words) , Download 2 , Essay
Free
Information security: Protecting the global enterprise.... The author examines key elements of a 'business plan' of the new product and concludes that raising equity finance in relation to Peter ideas such as from venture capitalists and business angels are advantageous to entrepreneurs....
Preview sample
Space Strategies and Legislation in Real Estate Development
11 pages (2750 words) , Download 2 , Research Proposal
Free
raighead, G (2009), High-Rise security and Fire Life Safety, Butterworth -Heinemann ... The paper 'Space Strategies and Legislation in Real Estate Development' focuses on real estate, which has a major impact on the world economy due to the property tax revenue.... This is because every person or business requires a structure for shelter, business and so on....
Preview sample
Female Gangs
12 pages (3000 words) , Download 4 , Research Paper
Traditionally, gangs have been associated with male youths, and research on female gangs has not been conducted in the same magnitude and.... ... ... For long, females have been considered to be inferior to males, which is among the reasons they have been portrayed as featuring only in minimal roles in gangs (Fishman, 1988)....
Preview sample
Urban Policy Planing
14 pages (3500 words) , Download 2 , Term Paper
Free
These ties after developing contribute to making of the whole place much more livable and also contribute greatly to the well being and security of the community as a whole (Kweon, Sullivan, and Wiley, 1998).... This research is being carried out to provide a thorough understanding of how the implementation of the park would positively affect the communities especially children and how it can become an important source for generating capital at the local level....
Preview sample
Effects of social networks among youth
7 pages (1750 words) , Download 4 , Research Paper
It's key to success is it being one of the easiest and fastest way for the youth to communicate with each other and the world at large.... The.... ... ... Social networking websites today doesnt only allow one to connect with their friends, it also helps in meeting new friends, sharing pictures, and keeping up with the latest updates in people's lives....
Preview sample
A Corporate Communication Plan
12 pages (3000 words) , Download 4 , Term Paper
Moreover, the different issues and business conditions of a company i.... .... BT Group plc would be evaluated in the paper.... Furthermore, the different objectives and importance of public.... ... ... The paper would provide a detailed process of establishing communication between companies and its different publics....
Preview sample
Treatment or Punishment: Better Option to Reduce Child Abuse
10 pages (2745 words) , Download 1 , Report
Free
1) According to Swedish Law passed in 1979, children are entitled to care, security and good upbringing.... This report "Treatment or Punishment: Better Option to Reduce Child Abuse" discusses the punishment as well as the treatment aspects for the parents and figure out which one is more appropriate as well as suitable for reducing the incidents of child abuse....
Preview sample
Possible Solutions to Global Warming
12 pages (3512 words) , Download 1 , Coursework
Free
(2011) Measuring energy security: Trends in ... An analysis of the strengths and weaknesses of the proposed solutions to climate change shall be done in the "Possible Solutions to Global Warming" paper with a focus on environmental direct action and financing of low energy, carbon access in Africa as possible solutions to global warming....
Preview sample
Relationship between Cognitive Skills and Academic Achievement
11 pages (3042 words) , Download 1 , Coursework
Free
Early attachment security: relations with cognitive skills and academic achievement.... In the "Relationship between Cognitive Skills and Academic Achievement," paper relationship that exists between cognitive ability and academic performance in the student is evaluated to ascertain whether higher cognitive abilities increase the overall academic performance of an individual....
Preview sample
Challenges & Opportunity: Cross-Culture Management
11 pages (2750 words) , Download 4 , Essay
Free
In case of collectivist society, people prefer to live within secure environment of strong cohesive groups and expect social security in return of their loyalty (Kirsch, Chelliah and Parry, 2012).... In this paper, the researcher is performing the role of HR head for a company that is eying for business expansion in the target cultures of China, Nigeria, and Brazil....
Preview sample
Strategic Human Resource Management
14 pages (3500 words) , Download 3 , Essay
Free
he Universalistic approach: In describing the universalistic approach, Harlod Doty and John Delery define Strategic HRM initiatives as being procedures that convert traditional HR operations into a definite number of “acceptable” HR policies that seek to entrench selective hiring practices and employment security, and focus on implementing decentralised decision making, in-depth employee training, and the realisation of high pay levels (Bhatnagar 2007a)....
Preview sample
Character Analysis of Dr Hannibal Lecter from Movie Silence of the Lambs
13 pages (3455 words) , Download 2 , Movie Review
Free
For example, the character in the movie is lodged in a maximum security prison but in the assessment this aspect has been ignored.... The paper "Character Analysis of Dr Hannibal Lecter from Movie Silence of the Lambs" describes that it is a normal human tendency to become subjective in certain matters, especially after a social worker establishes a personal relationship with a client....
Preview sample
Kindness and care as a major theme in Children Literature
12 pages (3000 words) , Download 4 , Essay
Free
Mary's attitude towards her Grandma shows her concern towards her Grandma's security and contentment.... This essay talks about the main theme in the children's literature.... The author discusses this topic based on description of Shiloh Season by Phyllis Reynolds Naylor, Crash by Jerry Spinelli, A Year Down Yonder by Richard Peck and Out of the Dust by Karen Hesse....
Preview sample
Organizations and Behaviour to the Success of the Organization
12 pages (3051 words) , Download 3 , Research Proposal
Free
The employee feels better when aspects such as job safety, job security, and health insurance are provided.... This research proposal 'Organizations and Behaviour to the Success of the Organization' discusses the best practices that will facilitate the management in decision-making....
Preview sample
Advanced Computer Architecture
8 pages (2000 words) , Download 4 , Case Study
Free
The i3 processor also comes with a deeper security protection as compared to other microprocessors in this series (Intel, n.... This paper "Advanced Computer Architecture" focuses on the fact that microprocessors are also recognised as modernised 'Central Processing Units' (CPUs)....
Preview sample
Analysis of Dr Hannibal Lecter: Comparing and Contrasting of Two Practice Theories
11 pages (3025 words) , Download 1 , Case Study
Free
For example, the character in the movie is lodged in a maximum security prison but in the assessment this aspect has been ignored.... This case study "Analysis of Dr Hannibal Lecter: Comparing and Contrasting of Two Practice Theories" discusses both Social Exchange Theory and Motivational Theory that are appropriate in the case of the client to assess as well as devise the strategies for his intervention....
Preview sample
Satellite Systems and Internet Access
11 pages (2934 words) , Download 2 , Literature review
Free
They keep track of several artificial objects sent to the orbit for security reasons.... This paper ''Satellite Systems and Internet Access'' tells that a satellite is an artificial object positioned in the orbit in order to improve communication across different parts of the globe....
Preview sample
On the Concept of Moral Panic
10 pages (2677 words) , Download 2 , Report
Free
In his 1972 seminal text titled “Folk Devils and Moral panics,” Stanley Cohen introduces the concept of “moral panics” and even though he does not expound on the usage of the term “panic,” it is clear that he intended its conventional meaning—a spontaneous and massive feeling of anxiety among people arousing great demands for security (Garland 2008, p....
Preview sample
Human Development in Relation to Kathryn Michal
11 pages (2987 words) , Download 1 , Case Study
Free
Additionally, it's noted that “Attachment is seen as an emotional anchor and it is a source of security.... "Human Development in Relation to Kathryn Michal" paper Bowlby's attachment theory and how the theory helps one understand her behavior as well as her development.... The author then compares and relates her development to Bronfenbrenner's ecological theory....
Preview sample
Ethics of War and Peace in Medieval and Contemporary Islamic Tradition
14 pages (3500 words) , Download 2 , Research Paper
Free
Both, jihad and Just War are simultaneously adapting demands of international society for security and realities of the modern world.... The researcher of this paper states that this research paper discusses the ethics of war in Islamic and Western traditions.... The basis of the research paper is a brief overview of the main theories of war....
Preview sample
Rare earth-Business Globalization
7 pages (1750 words) , Download 2 , Research Paper
China, India, Brazil and Malaysia figured as the major rare earth producers in 2009, in that order, with China dominating the supply scene producing 97% of the total.... ... ... roduction, as illustrated in Table-3, a scrutiny of which reveals that countries like USA, Russia and Australia, have the capability to become potential full-scale producers of rare earths (Humphries,6)....
Preview sample
Performance-Based Reward Systems are Unsuitable for the Public Sector
8 pages (2841 words) , Download 1 , Essay
Free
As such Mann (2006) predicted that people with high public service motivation would not rely on salary, job security, or extrinsic rewards.... This paper "Performance-Based Reward Systems are Unsuitable for the Public Sector" evaluates the appropriateness of performance-based rewards system in the public sector....
Preview sample
Personal Development and Careers
10 pages (2500 words) , Download 2 , Essay
Free
Learning and training experiences can also bring about favorable changes in one's behavior; for example, it can increase employee morale with which job satisfaction and security can be obtained.... This essay focuses on explaining of the several statements, such as: importance of communication in the workplace, learning is the process of acquiring knowledge through experience and the question Why would managers want to change employees' attitudes....
Preview sample
Female Circumcision in Africa
10 pages (2500 words) , Download 3 , Research Paper
Free
An individual's rights to security, physical integrity, and health are also violated, the right to freedom from cruel and torture, degrading or inhumane treatment, and the right to life are violated when the method leads to death (WHO par.... The author of this paper "Female Circumcision in Africa" comments on the social problems of Africans....
Preview sample
The Possible Dangers of Too Much Information Conveyed
9 pages (2665 words) , Download 2 , Literature review
Free
(2008) indicated that such issues as who has the right to information, who handles the information, is the information being handled properly and what security measures are in place are of high concern in the area of bioethics, and specifically, for Mascalzoni, genomics, as genomics implicates concerns that the information obtained might fall into the wrong hands and be used against the participant to deny insurance, employment and may lead to other methods of discrimination....
Preview sample
The Impact of Lobbying on Standard Setting in Accounting
9 pages (2250 words) , Download 3 , Essay
Free
Investment bankers and security analyst that put pressure on companies to show grow for the formers' interest were also blamed as evidenced by bloated revenue and understated expense in relation to time by acceleration and delay respectively (Wyatt 2004, p.... Standard setting is the enactment or improvement of accounting standards for financial reporting....
Preview sample
TOYOTA: Information Management Systems
10 pages (2500 words) , Download 2 , Research Paper
Free
Thus, these business systems need to be strongly protected in order to offer constant security and competence of improved safety of business assets from any possible damage.... This report presents a comprehensive analysis of some of the main attributes of the business information management and new technology systems' influence on the business of Toyota Motors....
Preview sample
Global Marketing Management, PEST Analysis of Japan
8 pages (2673 words) , Download 4 , Case Study
Free
Whenever a company is seeking to entrench its roots into another overseas market, it, at first, considers the state of security of that country.... The paper "Global Marketing Management, PEST Analysis of Japan" discusses that Japan is big and hosts a huge population with a large pool of potential customers....
Preview sample
Drivers Licenses and Gay Marriages
10 pages (2500 words) , Download 2 , Term Paper
Free
Drivers licenses by then used a similar format to issue this documents, all the way to use of drivers licenses with more or less similar information content and security features, just but to mention a few.... The paper 'Driver's Licenses and Gay Marriages' generally discusses the issue of full faith and credit in relation to gay marriages and their provision in the constitution....
Preview sample
Russia and China - Comparison of Economic Development Strategies
14 pages (3500 words) , Download 2 , Research Paper
Free
There was a mutual association between the huge farms as well as the household plots as production on the plots supplement the salary as well as food security of the workers.... This essay explores the difference between Russia and China economic systems.... After the collapse of the USSR, Russia preferred the neoliberal transition strategy (NLTS), which was based on individual plans to change....
Preview sample
Logistics Management
10 pages (2500 words) , Download 3 , Essay
Free
Tracking goods in transit enhances the security of goods, which attracts more customers.... In the current competitive environment, businesses require speed in delivery, design, concept, and production.... This will give them a competitive edge over their rivals by increasing customer satisfaction....
Preview sample
The Role of Regulators in Providing Regulations for Effective Alcohol Marketing Across United Kingdom
13 pages (3250 words) , Download 2 , Research Paper
Free
For example, each company has to inform the authorities of any major campaign that is to take place at least one week in time to ensure that there is no collation and the authorities know of the event so that they can ensure safety and security.... This essay identifies some of the theories of regulations by Baldwin et al and how they affect the marketing industry specifically the beer marketing industry in the United Kingdom....
Preview sample
Work Motivation Theories
12 pages (3327 words) , Download 4 , Coursework
Free
The rewards include fringe benefits, base pay, awards, job security, good working tools and an association with a prestigious organization.... The coursework "Work Motivation Theories" describes the main motivation theories.... This paper outlines the goal-setting theory, equity theory, features of Goal Setting Theory, limitations of the Theory, job satisfaction, foster respect, and trust with their managers....
Preview sample
Evaluation of leadership theories
11 pages (2750 words) , Download 4 , Research Proposal
Free
The researcher will, therefore, have to discus confidentiality limits giving the participants information concerning how their data will be put into use and also know the law of the state, as well as taking practical security measures.... It is evident from the research that the behavioral theories seek to identify what the leader can do to improve leadership skills and not seek the inborn capabilities and traits of the leader in leading a team, and this essentially what happens in the CCS Group....
Preview sample
Building Your Company's Vision by Jim Collins & Jerry Porras
12 pages (3000 words) , Download 4 , Assignment
Free
sychic feedback like security, pride in work, satisfaction, recognition and acceptance ... In the paper 'Building Your Company's Vision by Jim Collins & Jerry Porras' the author talks about his vision or his organization's vision but over the years the term has been diversified and is real meanings have been lost....
Preview sample
Optimization of Personal Online Profile E-Commerce Module
11 pages (3186 words) , Download 1 , Assignment
Free
ata security and Theft of Info ... The paper "Optimization of Personal Online Profile E-Commerce Module" discusses the main metrics and indicators that can be used to promote accessibility online and easy identification of the writer's profile, how the writer can improve his online profile through this project titled 'MyProfile'....
Preview sample
Relations between IT Professionals and Society
12 pages (3116 words) , Download 1 , Term Paper
Free
In this regard, it is important to highlight that technological advancements' main objective is to improve living standard by eliminating or minimising the threats posed by issues, such as diseases and security.... The paper 'Relations between IT Professionals and Society' presents ethics which are highly essential for professional conduct....
Preview sample
The Software and Hardware Components of the Watson Supercomputer
9 pages (2775 words) , Download 2 , Case Study
Free
The paid subscription of the server comes with the major benefits such as free upgrades, security fixes, patches and technical support.... The paper 'The Software and Hardware Components of the Watson Supercomputer' presents IBM Watson which is an artificially designed, intelligent system, which is named for the IBM founder Thomas J....
Preview sample
Construction management
11 pages (2750 words) , Download 5 , Assignment
As a function of planning and engaging this particular project, the firm has undergone a thorough risk analysis with respect to some of the likely eventualities and how they might impact upon project cost, completion dates, and impacts to third parties (namely those residents on.... ... ... Accordingly, the following sections will help to define the way this risk analysis has been performed, how these risks are ranked, and the steps and considerations that it been taken as a function of seeking to ameliorate them within the scope of the project One of the considerations that was taken with respect to this particular project concerns the dangers and potential hazards of deconstructing the old pipeline....
Preview sample
What Is the Arab World
13 pages (3656 words) , Download 1 , Essay
Free
ccording to Sowel (2004:34) , conflicts that the West and most Middle East in the Arab World have very little to do with production of weapons of mass destruction and danger to security but it is an activity to control, reshape and remap these countries and be in charge of resources....
Preview sample
Students Experiences of Social Media
11 pages (2750 words) , Download 2 , Essay
Social media is a broad expression for internet-based tools used in laptops, personal computers and smart phones (Jobber, 2012, p.... 3).... Some experts believe that social media is an.... ... ... Recent trends show that employers are blocking the access of social media in organizations because it can lead to distraction of People believe that social media is a platform, where employees can get themselves recreated and enjoy their time (Billett, 2006, p....
Preview sample
Training and development
12 pages (3000 words) , Download 4 , Essay
Event planning is an integral part of event management, and it includes budgeting, fixing dates, booking event site, acquiring legal licenses and permits, managing transportation, developing a theme for the event, arranging facilities like chairs and speakers, and co-ordinating event support, decor, catering, security, emergency tams, and cleanup....
Preview sample
Green It and Business Strategization for Epson Australia
15 pages (3750 words) , Download 3 , Essay
Free
However, the balance between amount of recycled good and amount of finished products in demand is not present resulting in stock build-up and pulling down financial security of the company's operations since an important amount of funds is diverted to storage and transportation of recycled goods in and to markets that hold buying potential for them. ...
Preview sample
Supply Chain Management
9 pages (2806 words) , Download 3 , Research Proposal
Free
This ensures that the results are channeled through the right channels and utilized within the intended field of study, therefore, ensuring security of information (Lawrence and Lorsch, 2000).... The paper "Supply Chain Management " highlights that lean supply chain requires integration on cost measures across the supply chain and within asset management efficiencies....
Preview sample
Relationship between Infant-Directed Speech and Word Segmentation
10 pages (2500 words) , Download 2 , Research Paper
Free
It creates a sense of comfort and security that they can use to develop their linguistic abilities.... The writer of this paper will examine the relationship between infant-directed speech and word segmentation and provide critical arguments and relevant literature to support claims made regarding the research topic....
Preview sample
170601 - 170650 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us