StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Concept of Modern State
9 pages (2000 words) , Download 2 , Essay
Free
This treaty is considered one of the important milestones in history of the contemporary system of nation-states: the Peace recognised fixed national boundaries and the sovereignty of states within their territories.... In the paper 'The Concept of Modern State' the author focuses on the nature of the modern state as a type of political organization....
Preview sample
The Impact of IT on the Hotel Industry
12 pages (3000 words) , Download 2 , Case Study
Free
security is multifaceted and touches several fronts.... These are just some of the wide range of security concerns that hotels grapple with.... “Tiny security cameras fitted in all parts of hotels are programmed such that they can be controlled from one central point” (p101).... The tiny cameras are made to look like part of the lighting but they are for security purposes and are all programmed. ... Better security is also another key contribution of Information Technology in the hotel industry....
Preview sample
Mumbai Attacks
6 pages (1500 words) , Download 2 , Assignment
Free
At the time of attack both the hotels was covered with Marine Commandos, national security and Rapid Command Force.... Terrorist attack in this country highlighted its security and crisis management problem.... India's police and security system were often co ordinate poorly.... Moreover the security system of the country was influenced by the political leaders and structure of India.... Different legal and legislative bodies were involved to look after the security system India (Rath, 2010)....
Preview sample
Nursing informatics
9 pages (2250 words) , Download 4 , Essay
Free
The basic goal is to gather data once, then utilize it numerous times (TechTarget, 2011; Centers for Medicare & Medicaid Services, 2012; national Institutes of Health, 2006).... In other words, the use of an EHR system is the next step in the continuous development of healthcare sector that can reinforce the link between healthcare service providers and patients, because the data, and the appropriate and timely accessibility of it, allow health service providers to provide better care and make better decisions (TechTarget, 2011; Centers for Medicare & Medicaid Services, 2012; national Institutes of Health, 2006)....
Preview sample
Process of Effective Communication
7 pages (1882 words) , Download 5 , Essay
Free
OMMUNICATION security: ... ommunications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients ... OMMUNICATION IN security SETTING PAPER: ... ommunication in security setting paper includes: ... ays to improve communication in the security workplace. ... MPACT OF VERBAL AND NON VERBALTYPES OF COMUNICATION USED IN security ORGINIZATIONS: ...
Preview sample
Game theory about north Korea
13 pages (3250 words) , Download 2 , Research Paper
The seemingly inerasable line dividing Korea was created by the cold war in 1948 with the Democratic People's Republic of Korea (North Korea) established under the former Soviet Union on the 9th of September and the Republic of Korea (South Korea) on the 15th of August under.... ... ... 1-2)....
Preview sample
Hi-Tech Industries - Net Present Value of the Project
7 pages (1836 words) , Download 0 , Case Study
Free
The initial investment layout is estimated to be £ 12 million, which is the entire cost of installing the component.... Sales increase from year 1 to year 2 by 1.... times, but in.... ... ... The paper 'Hi-Tech Industries - Net Present Value of the Project' is a forceful example of a finance & accounting case study....
Preview sample
Law Enforcement
6 pages (1774 words) , Download 1 , Assignment
Free
he principal reason as to why law enforcers cannot speak openly without potential repercussions from the employers is because they are supposed to uphold effective operation of security structures (Rosenthal 530-532).... If the law enforcers were to speak openly about everything regarding their work, then this would jeopardize security and risk causing panic among members of the community.... Further, the public relies on law enforcement agencies and their personnel to have total control about matters concerning security....
Preview sample
Key Insights into Organizational Behavior
6 pages (1652 words) , Download 3 , Essay
Free
The paper "Key Insights into Organizational Behavior" describes that lack of trust or poor communication, there are always methods by which to improve the organizational structure and leadership philosophy to ensure that change when implemented, does not meet with significant resistance.... ... ... ...
Preview sample
Comparative Issues in Local Government Accounting
17 pages (4830 words) , Download 2 , Essay
Free
Indeed, in case of a national budget with extremely high costs for a specific sector, such as the investments on defense purposes, accountability would be problematic, since the exact terms of the relevant agreement are not permitted to be revealed, for reasons of national security.... Describe the various purposes, as discussed in the literature, of budgeting for national governments.... Techniques used in the private sector can be used by governments for managing resources at national level....
Preview sample
Strategic Management of Kone Company
10 pages (2918 words) , Download 3 , Essay
Free
There are untapped markets which can be explored by this organization with new products like security systems based on advanced technology, escalators or elevators in new designs, etc.... KONE can also emphasize on incorporating new products in the system like security systems, etc....
Preview sample
Motivation of Employees
7 pages (2002 words) , Download 3 , Essay
Free
any researchers have found that in spite of any theory of employee motivation, the high motivation among them invariably depends on interesting work, pay, good working conditions, appreciation that they receive from their superiors, and job security.... While managers motivate by providing guidelines, encouragement and appreciation, leaders walk the talk and work along with the employees to spread their motivation to others....
Preview sample
Virus of Tribalism and Nature of Modern Warfare
16 pages (4660 words) , Download 2 , Essay
Free
Thus, twenty first century political warfare now involves violence, where the state has to fight against a section of its own civic populace that can be delineated in terms of national, ethnic, or even religious differences.... The paper "Virus of Tribalism and Nature of Modern Warfare " tries to find out whether the proliferation of ethnic and sectarian conflict, together with the rise of intra-state war poses a challenge to the comprehensiveness of international relations theories....
Preview sample
Costco Wholesale Corporation: Financial Analysis
13 pages (3250 words) , Download 5 , Research Paper
Free
Cost of equity can be calculated using the CAPM model: E(R) = Rf + beta(i) (E(Rm) – Rf) where Rm = expected market return Rf = risk free rate beta(i) = beta of the security The rate on US 10 year Treasury yield curve was 3.... In the paper “Costco Wholesale Corporation: Financial Analysis” the author analyzes the business model of the company....
Preview sample
International Finance - Debt and Equity Financing
16 pages (4044 words) , Download 3 , Coursework
Free
A bond is basically a loan in the form of a debt security [3].... The weighted average cost of the Vagabond plc, before consideration of the project, is calculated in the paper "International Finance - Debt and Equity Financing".... he weighted average cost of capital of the company is the weighted average of the various sources of finance used by the company....
Preview sample
Development of International Economic Organizations
20 pages (5000 words) , Download 3 , Coursework
Free
The treaty calls for economic and monetary union and a move towards political union with common foreign and security policy. ... In addition, moves should be made towards a political union with common foreign and security policy, as well as judicial cooperation (Johnston, 2007). ... here are political perspectives of REI as well according to which security as well as the stability of the region is assured. ... U's Foreign and security Policy agenda: ...
Preview sample
Situation analysis focusing on the key internal factors
10 pages (2500 words) , Download 2 , Essay
There is a great demand for contactless payment in Europe and other part of the world, whether at major retailers, parking or grocery stores.... Mobile money transfer.... ... ... This is a strategy that will see contactless payment achievable on iPhone 6 and iPhone 6 plus for select food and beverage concession....
Preview sample
Investment and Portfolio Analysis of Apple Inc
9 pages (2693 words) , Download 2 , Essay
Free
However, the operating profit and net margin of the company has increased at an annual rate of 0.... This is much higher than any fixed income security or deposit rates.... For instance, as the US economy is on the right track of economy progress most apparent from appreciation of dollar and slowing of quantitative easing program, many investors and analysts are betting that this recovery of world's biggest economy might trigger a short to medium term bull runs....
Preview sample
Sustainability and Environmental Issues
8 pages (2400 words) , Download 1 , Term Paper
Free
However, these benefits have only benefited agribusiness while on the other hand causing severe harms on environment and health, degrading the base of resources that human beings relies on as well as placing energy, water, and climate security under great risk.... Intra-generation and inter-generation responsibility (equal rights) include providing for national, racial, and other equality for both current and future generations towards a healthy environment and social justice....
Preview sample
Business Plan for Bed and Breakfast
6 pages (1863 words) , Download 2 , Term Paper
Free
The paper "Business Plan for Bed and Breakfast" proposes a bed and breakfast business be situated in Tybee Island.... The core objective of the proposed business is to become one of the leading and most preferred temporary lodging centers in Tybee Island.... ... ... ... The business intends to capitalize on personalized services, and its unique location to attract new customers....
Preview sample
The Factors Driving the Employee Discontent
6 pages (1899 words) , Download 2 , Dissertation
Free
According to Wigdor & House (2006) this theory by Herzberg proposed that employees' job satisfaction starts from intrinsic motivators, like recognition, advancement, and the likes, while on the other hand, employee dissatisfaction is usually a result of missing extrinsic motivation factors or the hygiene factors, that include pay, security, conditions, and so on (Wigdor & House, 2006).... pay, security, and fringe benefits we see that over the previous 3 fiscal years (2007-2010) there was a decrease in typical intrinsic motivators (opportunities of advancement, statewide hiring, and promotion freeze)....
Preview sample
Managing Oil Price Risk with Derivatives
38 pages (10423 words) , Download 3 , Coursework
Certainly, oil does not happen to be the only commodity that is vulnerable to price volatility, still, the governments tend to take the oil price volatility quite seriously owing to the pivotal role it plays in the national economies (Bacon & Kojimi 2008).... This coursework "Managing Oil Price Risk with Derivatives" elaborates on how the oil price risks can be managed with derivatives....
Preview sample
Reducing the Employees Cost of Health
18 pages (5165 words) , Download 2 , Research Paper
Free
According to the national Institute of Alcohol Abuse and Alcoholism (NIAAA), millions of people in the United States have become victims.... Hyattsville (MD): Centers for Disease Control and Prevention, national Center for Health Statistics.... xit Notification (PDF–747 KB) Washington: national Academy of Sciences, Institute of Medicine, 2009 [accessed 2012 Jan 10]. ... Department of Health and Human Services, Centers for Disease Control and Prevention, national Center for Chronic Disease Prevention and Health Promotion, Office on Smoking and Health, [accessed 2012 Jan 10]. ...
Preview sample
Deviant Act: Timing People in Public in Real Life
12 pages (3000 words) , Download 2 , Essay
Free
In these cases, it is better to offer them some pleasant words of appreciation and gratitude instead of giving extra amounts as tips.... An essay "Deviant Act: Timing People in Public in Real Life" reports that deviant act is such a delicate topic, which needs to be researched with great consideration and effort....
Preview sample
Friendship in William Shakespeare's Timon of Athens
12 pages (3000 words) , Download 2 , Research Paper
Free
As Michael Martin suggests, the societal structures relaxed in the Renaissance have contributed to the appreciation of the qualities of friendship during the period.... The Life of Timon of Athens, one of the most obscure and difficult works by William Shakespeare, celebrates the ideas of friendship in the Renaissance....
Preview sample
Taste, The Good, The Bad and The Ugly
14 pages (3692 words) , Download 3 , Essay
Free
n assessing something or someone as in 'good taste' an important component is one that involves an appreciation of the acceptable quantity for the thing to present to others; that is, emphasising the socially acceptable, 'correct' amount of something.... "Taste, The Good, The Bad and The Ugly" paper uses empirical data to explore, with reference to the works of Piere Bourdieu's Distinction: A social critique of the Judgement of Taste (1984), why in our postmodern society it does makes sense to discuss fashion in terms of good and bad taste....
Preview sample
Independence of an Expert Witness in the English Legal System
12 pages (3327 words) , Download 0 , Coursework
Free
They have to show a conscious appreciation to the requirements of the system as they prepare the report independently and present to the court.... The paper "Independence of an Expert Witness in the English Legal System" discusses that in case the independence of the witness is noted to have been influenced, there are consequences that may come with it....
Preview sample
Rationale for Transfer to George Washington University
2 pages (500 words) , Download 3 , Admission/Application Essay
Free
An author of this essay provides a justification essay applying for transfer to George Washington University.... As the author puts it, "my decision to apply and hopefully transfer to George Washington University was mainly attributed to my keen interest in taking up a major in International Business"....
Preview sample
Situational Theory: Rationale for Theory Selection
1 pages (250 words) , Download 2 , Article
Free
A paper "Situational Theory: Rationale for Theory Selection" reports that situational theory of leadership as proposed and developed by Hershey and Blanchard explains the importance of determining leader and subordinate maturity to successfully execute plans within organizations.... ... ... ... Rationale according to the situational theory is that for an organization to function properly, leaders must recognize their leadership styles and identify the maturity level of the subordinates to come up with management solutions appropriate for the educational attainment and skill set, experiences, work attitudes and self-confidence of all parties involved....
Preview sample
Should the Government Regulate Computer Games Nationally
5 pages (1414 words) , Download 2 , Research Paper
Free
The paper "Should the Government Regulate Computer Games Nationally" highlights that the overall responsibility of regulating video content is an issue best left to the industry and its community.... No causal link established between violent video game exposure and aggressive thinking or behavior....
Preview sample
Human Rights and the Ethiopian Government
4 pages (1000 words) , Download 2 , Essay
hese authority figures are retaining such abusive control over the Ethiopian population by citing terrorist plots and other security threats that will legitimately let officials detain 'suspects' and interrogate them for purposes that actually bear no relation to actual national security.... The EPRF was busy coercing voters into a repeat result from the 2000 election with abusive tactics that the HRW researchers explain as "government officials and security forces in much of Ethiopia mak[ing] routine use of various forms of human rights abuse to deter and punish dissent" (Ibid....
Preview sample
The Problem of Cyber Attacks
5 pages (1282 words) , Download 0 , Case Study
Free
Keith Alexander, CEO of national security Agency said "Id like to say that our networks are secure, but that would not be correct.... n the book written by Richard Clark and Robert Knake called the Cyber War: The Next Threat to national security and What to do about it, they explain how a major cyber attack on the United States could cripple the economy and leave thousands of people dead.... Their dependency on IT based technologies and the resultant increased exposure to cyber attacks requires very strict security measures in order protect them from such attacks....
Preview sample
Foreign Intelligence Surveillance Act
4 pages (1000 words) , Download 3 , Essay
The Foreign Intelligence surveillance Act has come over heated debates lately especially with regards to treatment of American and foreign citizens in overseas countries.... A clear elaboration of the appropriateness and jurisdiction of the Act has often eluded most people.... This.... ... ... This section is found within the first title within the Act....
Preview sample
Impact of Interest Rates on Exchange Rates
6 pages (1780 words) , Download 2 , Essay
Free
It can be seen that as there is an increase in interest rate, the rate of return on investments also increases which leads to an increase in the appreciation of the Australian Dollar.... The article states that if the RBA decides to uphold its current policy during the second-half of the year, and talk down speculation for higher borrowing costs; the marked appreciation in the local currency may dampen the outlook for future growth....
Preview sample
The Role of ICANN in Internet Governance
16 pages (4435 words) , Download 2 , Essay
Free
Among the sections of the laws, which may intersect with the national law are privacy, cyber security, intellectual property and enforcement of the law (Kohl 10).... Web management policy issues may include among other factors, freedom of the internet, privacy, e-commerce, cyber security property, and intellectual property. ... Questions of internet use include network security, spam, and cybercrime.... ther factors related to cybercrime, security, and internet stability in which recommendations implied that there were no defined methods of multinational cooperation on the subjects....
Preview sample
9/11 and the effects on western civilization
6 pages (1500 words) , Download 3 , Term Paper
Free
The airports were closed down for days as security measures were enhanced, leading to increase in cost of air travel system.... The September 11 terrorist attacks had a huge impact on the security measures and transformation at the American airports.... The Aviation and Transportation security Act was signed into law as well as a new Transportation security Administration (TSA) was established whose main aim was to offer protection to the America's transportation system and maintain freedom of commerce and movement....
Preview sample
War and State Sovereignty
10 pages (2601 words) , Download 2 , Essay
Free
It has remained both a critical element of the preservation of global peace and security and more so a protection of weak nations against strong ones.... Aggressive, oppressive, or disintegrated states might lead in threats to regional and international security and peace.... efensive realism theory is an umbrella phrase for numerous theories regarding international politics and foreign policy which was builds on Robert Jervis's works about the security predicament and also to a small degree on Kenneth Waltz's balance of power concept (neo-realism)....
Preview sample
America Is not Over
9 pages (2297 words) , Download 2 , Thesis
Free
The paper "America Is not Over" discusses that the series of drastic national security measures that were implemented worldwide as a response to the terrorist attacks of 9/11 reflect political dynamics that run counter to the hyper-globalizers' predictions of a borderless world.... The series of drastic national security measures that were implemented worldwide as a response to the terrorist attacks of 9/11 reflect political dynamics that run counter to the hyperglobalizers' predictions of a borderless world....
Preview sample
Analysis of United States v. James Herman OHagan Case
2 pages (500 words) , Download 2 , Case Study
Free
The misappropriation theory having been proved to apply to this case is designed to "protect the integrity of the securities markets against abuses by 'outsiders' to a corporation who have access to confidential information that will affect the corporation's security price when revealed, but who owe no fiduciary to that corporation's shareholders.... (b) To use or employ, in connection with the purchase or sale of any security registered on a national securities exchange or any security not so registered, any manipulative or deceptive device or contrivance in contravention of such rules and regulations as the [Securities and Exchange] Commission may prescribe as necessary or appropriate in the public interest or for the protection of investors....
Preview sample
Health Information Confidentiality
2 pages (500 words) , Download 3 , Assignment
Free
Some patients still exhibit fear towards the current information security systems with the belief that their privacy could be breached through the various gaps that exists in the systems (Hebda & Czar, 2013).... It is important for various institutions to embrace different security.... strategies such as appointing security officers on Private Boards and IRBs, who would assess the needs for data protection and implement staff training among other solutions....
Preview sample
Emergency Management 670
2 pages (500 words) , Download 2 , Essay
Free
Journal of Homeland security & Emergency Management, 5 (1), 22-25.... Journal of Homeland security & Emergency Management, 4 (3), 21-23.... Balancing the risks, benefits, and costs of homeland security.... Homeland security Affairs, 7 (16), 12-15.... However, according to the national Emergency Management Association (2011), due to budgetary restraints, these can be used in varying proportions for each of the responses....
Preview sample
Four Key Elements of Hurricane Katrina
3 pages (1002 words) , Download 2 , Essay
Free
Both the New Orleans Office of Emergency Preparedness and the Louisiana Office of Homeland security and Emergency Preparedness (LOSHEP) lacked enough personnel and experience in disaster management (Cooper & Block, 2007).... Private fire-fighting companies and security companies helped in evacuation, rescue, and search missions.... The Department of Homeland security must ensure coordination in future disaster response by integrating the services of the military who have more capabilities....
Preview sample
Supervision and Leadership in Tourism and Hospitality
5 pages (1598 words) , Download 0 , Essay
Free
The most important are to ensure that security of the tourist site area is heightened.... Tourists can comfortably visit areas where security is maximized.... No one would risk hi/her life to visit a site that has security issues even if they have the interesting tourist attraction.... Therefore, the Hillary's Boat Harbor environment should contain maximized security....
Preview sample
Strategies for Protecting Human Rights from Record Examination of the UN in Action on Terrorism
20 pages (5699 words) , Download 2 , Essay
Free
conomic, social and cultural rights in countering terrorism (security Council resolution 1566, 2004) 5 4.... However, the robustness of this observance in practice should be ascertained by an examination of the records pertaining to the records of the committees of the UN security Council, which are tasked with the implementation of counter-terrorist measures.... From these he deemed terrorism to be best described as any action that is intended to cause death or serious bodily harm to civilians, for the purpose of intimidating a population or to coerce a government or international organisation to do or abstain from doing any act (security Council resolution 1566, 2004)....
Preview sample
Design Methods and Technology
6 pages (1645 words) , Download 3 , Essay
Free
This essay "Design Methods and Technology" is about the use of robots in security.... Many lives have been lost in the maintenance of security, and the use of technology can reduce the toll to a significant minimum.... security is managed by people and therefore embracing robots is a welcome venture that will reduce the cost of employing more people on the ground.... Financial Report On Robotic Project Presented by Foundation Department Introduction The use of robots in security is gaining wide acclaim throughout the world....
Preview sample
Thinking design from the outside in
16 pages (4000 words) , Download 2 , Essay
In order to fully appreciate the qualities and characteristics of a specific designed object, it has been argued that one must have an idea of the many aspects involved.... These include the way the object is expected to be used within the human world – for example whether or.... ... ... it has any functionality, what that functionality might be and how well it performs its job – as well as how it functions for or in a particular cultural group....
Preview sample
Model Location (Jaimaica) Versus Target Location (Cambodia)
4 pages (1000 words) , Download 2 , Research Paper
Model Location (Jamaica) Versus Target Location (Cambodia) Introduction The promotion of the health and wellbeing of people has been a goal that every government has sought to achieve.... This is because it takes a very healthy and strong population to turn the workforce of a nation into productivity (Guerrant and Mcauliffe, 2006)....
Preview sample
Orientalism, the Veil and Representations of Muslim Women
5 pages (1250 words) , Download 2 , Research Paper
Orientalism, the veil and representation of Muslim Women Name: Institution: Orientalism refers to the depiction or imitation of certain aspects of the Asian or Eastern cultures among the Westerners by people like designers, writers, and artists.... Veil, on the other hand, refers to the dressing of a particular group of people, especially the Muslim women....
Preview sample
Critical Analysis of Evisceration of a Roebuck with a Portrait of a Married Couple
6 pages (1582 words) , Download 1 , Essay
Free
national Gallery Catalogues.... London: national Gallery, 1970.... The paper "Critical Analysis of Evisceration of a Roebuck with a Portrait of a Married Couple" analyzes the work of art, focuses on subjective matters such as form, giving the definition of the term "interpretation"....
Preview sample
Health and Safety of the UK Citizens
6 pages (1736 words) , Download 2 , Essay
Free
In another case, a man swimming in a pond which was infected with leptospirosis virus called Weil's Disease was overwhelmed with such miasma and drowned to his death ( Darby v national Trust).... arby v national Trust (2001) PIQR 372 ... The paper "Health and Safety of the UK Citizens" discusses that the company is overwhelmingly guilty of negligence and failure to exercise due care under the UK Torts Act, the law on nuisance, and the Occupiers Liability Act 1984, and its warnings clearly lack compulsion....
Preview sample
21551 - 21600 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us