StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Security in Public Transport
4 pages (1000 words) , Download 4 , Essay
Further, a recent survey of both users and non-users of public transport indicates that, after service and reliability, over 50 percent of respondents felt personal security should be the priority area for improvement.... While concern for personal security is not necessarily born during the time spent on board the train or bus, witnessing anti-social behaviour, criminal damage and graffiti can cause more discomfort or insecurity besides isolated routes and the walk home from the bus or train during the night hours....
Preview sample
Finance - Healthy Hearts Cardiff
10 pages (2500 words) , Download 2 , Assignment
Free
Compare Fred's current position with his potential new position regarding profitability, break even and margin of safety.... If the prices are lowered, the break even point increases to 24,278 units and also the margin of safety reduces to 22.... Moreover, classifying the costs as fixed and variable, assist the company in conducting breakeven analysis and the margin of safety (Samuels et al, 2000).... First, the operating margin is 8 % for Healthy Hearts, whereas it is 10 % for the other....
Preview sample
ExxonMobil Security Recovery Plan
10 pages (2715 words) , Download 3 , Essay
Free
ursuant with the requirements stipulated in the US Department of national security (USDNS), the six essential elements in the preparedness cycle included planning, organizing, training, equipping, exercising, and evaluating and improving.... S Department of national security.... The following telephone numbers should always be ready and all personnel should be advised of these numbers in cases of emergency: MOST IMPORTANT TELEPHONE NUMBERS: EPCRA HOTLINE 1-(800) 424-9346 and national RESPONSE CENTER 1-800-424-8802....
Preview sample
Frederick Douglass and Martin Luther King, Jr
2 pages (500 words) , Download 3 , Research Paper
Free
Through it, his national fame grew.... On his election as the Montgomery Improvement Association president, he said that God must be kept at the forefront, and all people had to act like Christians.... ... ... ... In his statement, he indicated that the Christian faith is founded on love....
Preview sample
Aviation Security Requirements
2 pages (623 words) , Download 4 , Essay
Free
The essay "Aviation security Requirements" focuses on the critical analysis of the major issues in the requirements of aviation security.... Aviation security refers to all safety measures and regulations applied in airports to safeguard aircraft, airport staff, and passengers from criminal activities.... Due to the significance of this industry to a country, security is one of the primary concerns associated with aviation.... everal steps have been taken to heighten security in the aviation industry....
Preview sample
The Development of Security Domains
17 pages (4770 words) , Download 1 , Term Paper
Free
The paper 'The Development of security Domains' presents the rate of internet access which has augmented at a significant pace in the global context.... In the present modern era 'Information security Management', has been one of the most crucial factors with the help of which organizations can ensure their efficiency and effectiveness.... Information security Management Introduction In the early 21st century, the rate of internet access has augmented at a significant pace in the globalcontext....
Preview sample
Security of Information in Government Organizations
15 pages (3750 words) , Download 5 , Essay
Free
The paper is based on the importance and critical aspects of information security in government organizations.... Through information security, government organizations can secure information from broad variety of threats so as to certify steadiness, lesser risks and higher commercial prospects.... The purpose of information security for government organizations is to confirm stability of governance and decrease information loss or damage by inhibiting and reducing the effect of security misconducts or breaches....
Preview sample
Information systems security incident
8 pages (2000 words) , Download 2 , Essay
Free
o fulfill this mission the operational framework for security of the software,hardware and data associated with information systems is defined based on ISO 17799.... CONOP outlines the key players, their roles and responsibilities in the event of information security incident.... The CONOP is defined to control the information & financial loss, for business continuity, security policy review and security awareness program.... Concepts of Operations Project Information Systems security Incident This paper defines CONOP for ‘B Concepts'....
Preview sample
Analysis of How to Win Friends and Influence People by Dale Carnegie
7 pages (1750 words) , Download 3 , Book Report/Review
Free
According to researches, it has been proven that 70% to 80% employees are not motivated by monetary benefits and increment but by appreciation and compliment.... Give sincere and honest appreciation ... he second principle emphasizes on giving sincere appreciation to others.... Therefore, before assigning new tasks, a leader must often review the previous performance and provide honest praise and appreciation. ... This point can be linked to the previous point, appreciation must be made in front of everyone but mistakes must be pointed out indirectly or in a private place....
Preview sample
How to Win Friends and Influence People
7 pages (1840 words) , Download 2 , Book Report/Review
Free
According to researches, it has been proven that 70% to 80% employees are not motivated by monetary benefits and increment but by appreciation and compliment.... Give sincere and honest appreciation iii.... The second principle emphasizes on giving sincere appreciation to others.... Therefore, before assigning new tasks, a leader must often review the previous performance and provide honest praise and appreciation.... This point can be linked to the previous point, appreciation must be made in front of everyone but mistakes must be pointed out indirectly or in a private place....
Preview sample
Information Technology in the Business: Schneider National
9 pages (2720 words) , Download 2 , Case Study
Free
The other issue is security of the systems IT infrastructure are very fragile and any security breach may fault the whole system (Frost, 2014).... "Information Technology in the Business: Schneider national" paper evaluates the case study of Schneider national, a major trucking company that was established in the 1980s and took root of transformation when the regulations in the industry were weakened, establishing its business strategies....
Preview sample
Is Nationalism a Rational Phenomenon
4 pages (1000 words) , Download 3 , Coursework
Free
The fight for political independence and national awakening is known to be cruel to humanity but at the same time heroic. ... It's a non-rational phenomenon for the achievement of ideological goals by its adherents, who can feel their illusory exclusiveness compared to national minorities.... Nationalism is the particular attitude that all the members of a country posses when they think about the national identity they have.... Nationalism is the particular attitude that all the members of a country posses when they think about the national identity they have, (Tamir, Y....
Preview sample
Database Security
12 pages (3394 words) , Download 3 , Coursework
Free
The paper "Database security" states that generally, database security needs stem from the requirement to protect data.... Therefore, specific measures can be recommended for specific security concerns.... Organizations need to establish and maintain security measures that address application-level concerns.... Database security Database security Introduction A database can be described as a compilation of logically consistent data that bears inherent meaning....
Preview sample
Homeland Security in the USA
12 pages (3000 words) , Download 2 , Term Paper
Free
This paper, Homeland security in the USA, stresses that on September eleven 2001, nineteen al-Qaeda terrorists hijacked four passenger airlines and intentionally crashed two of them into the Twin Towers in NYC.... According to the paper, the homeland security can simply be defined as an established role of the government to prevent terrorism within the US, reduce America's susceptibility to terrorism and minimize the damage and subsequently recover from the occurrence of such attacks....
Preview sample
Emotional intelligence and appreciative inquiry to promote quality
1 pages (250 words) , Download 6 , Research Paper
Free
This has led to increasing complexities in clinical and leadership roles in healthcare settings that need change.... Advances in bio-medical procedure are an example of an issue that is.... ... ... Apparently, as afar as balancing quality and efficiency of a nurse is concern, there is a need for integrating appropriate capabilities to ensure consistency of all nurses in Emotional intelligence and Appreciative inquiry to promote quality Issue: Bio-medical advances The transformed contemporarysociety has brought in many changes in health care setting....
Preview sample
National Health Service
8 pages (2323 words) , Download 4 , Research Paper
Free
The main idea of the paper under the title "national Health Service" touches on national Health Service which availed comprehensive health services for improving mental and the physical health of the people via the prevention or diagnosis and the treatment of illness.... national HEALTH SERVICE Introduction Established in 1948, the objective of national Health Service (the NHS) was to avail comprehensive health services for improving mental and the physical health of the people via the prevention or diagnosis and the treatment of illness....
Preview sample
Perseverance by Martin Luther King
4 pages (1245 words) , Download 2 , Assignment
Free
Royale national Institute for Blind People.... In the paper 'Perseverance by Martin Luther King' the author discusses a virtue that entails the ability to endure many adversaries towards the attainment of a goal.... This is something Helen Keller showed in her own life journey.... We all know that Helen Keller wrote many poems and stories....
Preview sample
The United Nations in Maintaining International Peace and Security
9 pages (2635 words) , Download 0 , Literature review
Free
As the paper "The United Nations in Maintaining International Peace and security" outlines, the UN mission in global peacekeeping and security began in the year 1948.... Since 1948, the UN has been involved in 53 missions with 40 of them created by the security Council between 1988 and 2000.... UN in maintaining international peace and security ... ow effective is the UN in maintaining international peace and security? ...
Preview sample
Social Security
5 pages (1250 words) , Download 3 , Essay
units such as households and firms.... Macroeconomics deals with the aggregates, it concentrates on the behavior of all households together, all firms together, total output of all goods and services, movements of the total price level and total employment. ... ... mployment is one of the main areas that macroeconomics is concerned with, because it is one of the determining factors in a nation's growth....
Preview sample
DB6,DQ1 Selling Receivables , and DQ2 Use of Depreciation
1 pages (250 words) , Download 2 , Essay
Free
DQ1 Selling receivables is often referred to as factoring.... Factoring involves the purchase of account receivables by the lender, generally without recourse to the borrower, which means that if the purchaser of goods does not pay for them, the lender rather than the seller of the goods takes the loss (Besley & Brigham, 2000)....
Preview sample
CH Energy Main Competitor
40 pages (10000 words) , Download 2 , Research Paper
The paper 'CH Energy Main Competitor' analyzes CH energy group, which presently owns 100% equity in Central Hudson Gas and electric corporation and the Central Hudson Enterprises Corporation.... Central Hudson Gas and Electric Corporation is a distribution and transmission based business unit.... ...
Preview sample
Information Security Management Standards
13 pages (3711 words) , Download 4 , Report
Free
This report "Information security Management Standards" discusses the system that my organization has settled upon, highlighting all its features and how this new security plan will ensure that the organization does not lose or have data distorted from an invasion or crushing of the system.... In a world where there are more security threats to information, there is an increased need for investment into and implementation of security controls in an organization....
Preview sample
Dubai Airport Security Program
10 pages (2500 words) , Download 2 , Research Paper
Free
In the paper 'Dubai Airport security Program' the author analyzes how to take drastic actions to reduce and prevent these attacks and the effect of future situations.... Dubai Airport security Program ... However, weak security will always expose the nation to a threat to the safety of the plane or those that uses it, passengers.... ll airports around the world have a detailed program on how security is handled to ensure that passengers and cargos arrive at their destinations safely without being hurt or harmed by any means possible....
Preview sample
How to reform the United Nations security council
1 pages (250 words) , Download 4 , Essay
Free
Your Name here here here Date here How to Reform the United Nations security Council?... The United Nations security Council holds a very important position in the stance of peace in the world.... The organization of the United Nations security Council has been well put together to work not only for the countries involved but the council members as well.... here here here here How to Reform the United Nations security Council?...
Preview sample
Multi-national Organization Analysis: Wal-Mart
16 pages (4400 words) , Download 0 , Case Study
Free
Despite having thousands of stores in foreign markets, the company has been involved in numerous cases of misunderstandings in regard to local and national laws in foreign markets.... In some countries, the ambivalence of regulations, particularly with respect to local and national laws, has had an adverse effect on the profitability and efficiency of the company.... The paper 'Multi-national Organization Analysis: Wal-Mart" is a great example of a management case study....
Preview sample
International Financial Management: Movements of Chinese Yuan against US Dollars
8 pages (2000 words) , Download 2 , Assignment
Free
In China, there are two types of lobbies which play a significant role in the currency appreciation and depreciation.... Obama remained quite successful in keeping the value of Yuan appreciated during his tenure, however, this appreciation growth rate got stagnant in 2012 due to which he had to officially start off the dialogues over the value of Yuan.... After that there has been a considerable appreciation observed in Chinese Yuan such that it broke the psychological level of CNY6....
Preview sample
What is Denoted by the Word Security
11 pages (3235 words) , Download 0 , Essay
Free
Various concepts of security have revolved around human security, national security, collective security, shared security, bio security, cooperative security, information systems security and sustainable security (Soltani & Yusof, 2012).... Wolfers (1952) defines security in the context of national security.... Using Wolfers' (1952) concept, Baldwin (1997) identifies different contexts or ecosystems within which security aims to denote threats and fears, namely identity security, environmental security, social security, national security, economic security and military security....
Preview sample
Homeland Security in the United States
5 pages (1421 words) , Download 1 , Case Study
Free
etting the homeland national security right is among the most challenging tasks in Washington.... It will ensure that they are a trustworthy partner in building defenses and national resilience that are active layered.... From the paper "Homeland security in the United States" it is clear that defending the country against its enemies is the first and a significant commitment of the United States government.... In order for the threats to be thwarted, one of the major arsenals that are used is homeland security....
Preview sample
Security Risk and Threat
6 pages (2018 words) , Download 0 , Essay
Free
The paper states that information security management requires both the threat assessment and the risk assessments.... security risks assessment is the term used to describe the procedures involved in the evaluation of the possibility of the occurrences of factors that affects the objectives using the information technology system.... The security risk assessment access the organization based on the attackers perspective.... It gives an analysis that can allow the company to access and enhance their security positions....
Preview sample
Explaining the Balance-of-Payments Sheet
7 pages (1750 words) , Download 2 , Essay
Free
Foreign exchange is considered as a transaction made by citizens, organizations and businesses within a country with foreigners, hence, it is included in the national summary to keep track and calculate transactions with other countries.... an appreciation (Marin 149).... permanent Simply put, the interest rate parity is the no-arbitrage relationship or condition that equates the difference between domestic and foreign interest rates to the expected change in the exchange rate or the forward exchange rate margin (Chen 198)....
Preview sample
Technology of Information Security
3 pages (750 words) , Download 3 , Essay
Technology of Information security Name Institution Technology of Information security Introduction The use of cryptography is a necessity for the consequence of the revolution of information in the world today.... Data encryption is regarded as a national issue by governments because it majorly...
Preview sample
In Praise of Margins
4 pages (1000 words) , Download 2 , Essay
Free
In Ian Frazier's 'In Praise of Margins', the author mainly talks about his life as a child, and how he had 'margins' where together with his friends he would do different things.... These marginal activities according to Ian, to older people, can be viewed as a waste of time.... ... ... ... From this research it is clear that Ian Frazier provides different examples of himself while still a kid, engaging in various marginal activities....
Preview sample
The Ideas of Martin Luther King
10 pages (2526 words) , Download 2 , Essay
Free
Always a strong worker for civil rights for members of his race, King was, by that time, a member of the executive committee of the national Association for the Advancement of Colored People, the leading organization of its kind in the nation.... He was ready, to accept the leadership of the first great Negro nonviolent demonstration of contemporary times in the United States, abruptly a boycott was met by fury in Montgomery's white community and that brought national attention to the problem of segregation....
Preview sample
Network Security Planning
2 pages (500 words) , Download 2 , Research Paper
Free
It entails establishing a security baseline for securing the main management planes in an organization.... Furthermore, network security planning also aims at.... This is made possible through developing additional security design aspects that are inevitable for the enhancement of control, visibility, and general safety Network security planning Introduction Network security planning entails developing best practices and measures for protecting the network infrastructure....
Preview sample
Food Insecurity in Pakistan
9 pages (2862 words) , Download 2 , Essay
Free
Sociologists assailed that these socio-economic problems demand government to systematically integrate food security to broader issues of human security (Chen and Kates, 1994).... It will also attempt to provide evaluative recommendations to shape more efforts toward human security.... Sociologists and ecologists assailed that Pakistan's problem on food security are rooted on turtle-paced rural development, poor adaptation on climate change in the face of natural calamities, poverty, lack of transparent governance, mis-prioritization of government services, political unrest and lack of opportunities for education, specially the marginalized families....
Preview sample
External Threats to Homeland Security
6 pages (1844 words) , Download 2 , Essay
Free
n the 21st century, the US military forces have to be prepared to counter an increasingly wide spectrum of threats to the national security.... The US needs to be extra careful regarding these indigenous terrorist groups since they pose an immediate danger to the national security.... It needs to get its act together, formulate a new agenda and engage in its efforts of strengthening the national security with renewed vigor.... In the modern technological age, cyber security is another important area of the national security network....
Preview sample
United Nations Main Responsibilities to International Community
9 pages (2808 words) , Download 3 , Essay
Free
It is imperative to move away from collective to regional security.... Ghebremeskel (2002), on the other hand, argues that failure is a by-product of the United Nations' failure to appreciate the difference between peacemaking and collective security on the one hand, and its continued determination to adopt international as opposed to regional peacekeeping and conflict management efforts, on the other. ... 27-32) notes, Ghali's primary objection to the United Nations' traditional approach to the aforementioned security responsibilities is the assumption of a disconnect between conflict prevention, resolution and peacekeeping....
Preview sample
Martin Luther King's Letter from Birmingham Jail
5 pages (1250 words) , Download 2 , Essay
Unfortunately, according to his own words "some have been outright opponents, refusing to understand the freedom movement and misrepresenting its leader era; an too many others have been more cautious than courageous and have remained silent behind the anesthetizing security of stained-glass windows....
Preview sample
China's Dangerous Overvaluation
2 pages (500 words) , Download 2 , Article
Free
Author highlights the times when appreciating Yuan was a desired proposition for China to help the domestic consumption and Summary of the Article The article is about the appreciation of Yuan against other currencies and starts with the news of recent slide in Yuan valueagainst US Dollar.... Author indicates that any further appreciation in the currency would actually be more harmful for the country because the overall level of debt has been creeping up in the economy which would ultimately hurt the domestic consumption in China....
Preview sample
Quick Lube Corporation
2 pages (621 words) , Download 3 , Essay
Free
Although franchises demonstrated rapid-growth the profit margin was instable.... In the essay 'Quick Lube Corporation' the author looks at the largest franchise.... The Quick Lube Corporation utilized a business format franchise.... Utilizing this format provided Herget with the ability to oversee company policies (agency theory)....
Preview sample
Security Planning and Assessment
5 pages (1446 words) , Download 0 , Case Study
Free
The study "security Planning and Assessment" critically analyzes the main issues on security planning and assessment in the company.... One of the most important aspects of security assessment and planning is the human impact that employees and other casual contacts have on the security of an organization.... security threats are often thought of as external, physical threats such as robbery or terrorism, but major organizational losses stem from the "misuse of equipment and facilities, careless handling of raw materials and finished goods, sloppy documentation and poor inventory controls" (ASIS International, 2008, p....
Preview sample
Martin Luther: On Christian Liberty
2 pages (500 words) , Download 2 , Essay
Free
Born in 1483, and subsequently a German monk and a scholarly theologian, Martin Luther contributed significantly to the meaning of Christianity and to the Reformation.... Though his seminal work was addressed to Pope Leo X, Luther's purpose was to harmonize Christian values by making them accessible to people equally and by attacking religious hierarchies that corrupted what he viewed as the essential nature of Christianity....
Preview sample
Martin Luther King (Business Ethics)
3 pages (750 words) , Download 2 , Essay
(Name) (Assignment) (Date) 1.... Loving your enemies ‘Loving your enemies' is an inspirational speech delivered by Martin Luther King focusing on the whole mankind as his audience.... In his speech he highlighted the essence of love and the impacts of hatred on human lives.... ... ... ... Though the idea of loving enemies sounds impractical, it can be practiced by altering our perceptions....
Preview sample
Security Policy Analysis
1 pages (250 words) , Download 3 , Essay
Free
intelligence community law sourcebook: A compendium of national security related laws and policy documents (2011 ed.... In terms of authority and responsibilities, the Secretary of Homeland security, the Partnership Advisory Council for critical infrastructure, the.... rivate sector and other federal agencies, are empowered to conduct high level cyber security risk assessment on a sector by sector sequence, develop procedures for certain critical infrastructure, identify performance issues and implement plans for restoration....
Preview sample
Security Operations in the United States since September 11, 2001
18 pages (4500 words) , Download 3 , Term Paper
Free
However, the DHS has not successfully developed a border security measures that support US domestic and national security goals (Barry, 2011).... Border control has now been improved as a mission for securing national security (Barry, 2011).... The government's response after the 9/11 attacks indicate a persistent pattern of action which includes the rounding up of immigrants when threats to the national security are seen.... Entering into private contracts have also proven to be complicated undertakings for Americans as the security operations post 9/11 has forced businesses to carry out their decisions based on issues of national security (Krishnamurthy, 2001)....
Preview sample
Current Trends in Information Security
8 pages (2475 words) , Download 2 , Essay
Free
The paper "Current Trends in Information security" examines the significant current threats to information security and the most important controls that WebCenter should be considered as a priority to mitigate the risks of these threats being realized.... The primary objectives of information security are; integrity, confidentiality, and availability.... Trends in Information security ... urrent threats to information security 3 ...
Preview sample
National and Regional Tourism Planning
7 pages (5399 words) , Download 2 , Coursework
Free
The paper "national and Regional Tourism Planning" highlights that tourism is not planned in the sense that it is not just an industry but a movement which involves many unseen things.... national and Regional Tourism Planning Introduction Tourism for many nations not only provides an entry into the global economy, but also helpsto alleviate poverty, and can assist other economic sectors (Fayall 2005).... This took place under the sponsorship of the World Tourism Organization (WTO 2005), in Djerba, Tunisia, bringing together over 140 delegates from some 45 countries, drawn from representatives of the scientific community, various United Nations agencies, the tourism industry, NGOs, national tourism offices, national and local governments....
Preview sample
Information Security of Business
3 pages (750 words) , Download 2 , Term Paper
This is the age of information technology and the information is one thing that is going to transfer while conducting businesses, no matter what and with information comes the issue of security.... Information security essentially requires that the genuine parties to a transaction are identified, the actions they are allowed to perform are determined and their actions are limited to only those that are necessary to initiate and complete the transaction....
Preview sample
Successful information security management
9 pages (2250 words) , Download 5 , Research Paper
Free
Successful information security management involves an amalgamation of prevention, detection and response in order to deploy a strong security defense.... security has become an encircling issue for designers and developers of the digital world.... A system should also be able to counter incidents and raise proper procedures in case an information security incident occurs.... Information security incident handling takes a stride forward in the information security management procedure....
Preview sample
Security in Aviation
3 pages (766 words) , Download 8 , Assignment
Free
In the paper 'security in Aviation,' the author looks at several agencies in charge of the security details.... security in Aviation Assignment # words M2 Some of the roles listed below are done by more than one security agency and each works for a specified duration.... he airport's security operations officers working together with the intelligence services take charge in case of a bomb threat or any hijacking of the aircraft....
Preview sample
1701 - 1750 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us