StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Fair Value vs. Historical Cost
4 pages (1000 words) , Download 0 , Research Paper
Free
Whatever might have been the intension of the management it is clear that fair valuation not only reflect the market touch but can be presented to bring a true and fair picture as was reflected by Land security Group. ... he choice between fair valuation and historical valuation is a complex issue, but has to be considered in right perspective as was appreciated by the management of Land security Group.... But the management was prudent to introduce adjusted EPS devoid of capital appreciation impact....
Preview sample
Organizational Security and Management Research
4 pages (1256 words) , Download 0 , Essay
Free
he said occurrence can be compared to the process of privatization in the trade industry wherein, the different organizations and infrastructures aside from the support that can be achieved from the state and national security establishes groups and sectors within the organizational structure to be able to protect the operation.... The paper "Organizational security and Management Research" presents an article that is related to the privatization of the protection and security operations in relation to the process of the maintenance of security within the organizational system....
Preview sample
Mobile Devices Security
8 pages (2280 words) , Download 2 , Literature review
Free
The paper ''Mobile Devices security'' tells that During the contemporary period, it can be observed that the use of mobile devices is prevalent and growing rapidly as users heavily depend on them to communicate and perform other different business activities.... The advancement in technological development has made it possible to access the internet over mobile devices but the issue of security from cyber attacks is of greater importance in this case.... The main problem highlighted in the report is that the security system of mobile devices is not that effective since this is an emerging phenomenon....
Preview sample
Problems and Risks with Information Security in the modern world
38 pages (9500 words) , Download 4 , Research Paper
The researcher of the paper operates mainly based on research questions which can be stated as follows: What is the nature of information security?... What are the problems and risks that are encountered in information security?... The study intends to examine the nature of information security.... It also seeks to determine the various problems and risks that information security is dealing with.... Likewise, the study aims to identify some of the theories that are proposed in order to address the concerns and issues pertinent to information security....
Preview sample
Book Express - Security Risk Management Options
22 pages (4209 words) , Business Plan
Nobody downloaded yet
The paper 'Book Express - security Risk Management Options' is a convincing variant of a business plan on management.... There are major threats that face specific organization key among them being a security risk.... A security risk may involve the facilities, hardcopy and softcopy documents, tools, equipment, and personnel.... The paper 'Book Express - security Risk Management Options' is a convincing variant of a business plan on management....
Preview sample
Poverty and the World Food Security
5 pages (1250 words) , Download 2 , Essay
Free
This essay describes the controversial issue of poverty and it's connections to the world food security.... Source Evaluation Source Evaluation Poverty and the world food security Poverty and world food security is a sensitive issue that is raising concerns across all levels from policy makers, to the local public individuals.... In the subject, of assessing the conditions of poverty and food security, this article is exceptionally extensive, and it also assesses the relation between the two factors....
Preview sample
Activities of System Security
11 pages (2868 words) , Download 0
Free
The paper "Activities of System security" is a perfect example of a report on information technology.... The paper "Activities of System security" is a perfect example of a report on information technology.... ctivities of system security ... Therefore, the need to upgrade the networks, security systems, hardware's and software's has to be met.... However, the key issue here is the security of the system and it integrates the communication networks, software and hardware's....
Preview sample
Information Security
22 pages (5897 words) , Download 1 , Case Study
This case study "Information security" focuses on the best practices for the IT systems of an IT solutions firm called Check Point Software Technologies Ltd.... Supporting different categories of software plus combined hardware and software products as well as services designed for IT security, providing a portfolio of data security, network security alongside other management solutions.... A large portion of the network security solutions offered by the company comply with the manner of operation of an NXG platform, that offers an integrated security architecture; centralized and real-time security updates; central enforcement and management of security policy....
Preview sample
Research Methodology - Research Findings of Etisalat Telecorporation
14 pages (3843 words) , Download 5 , Dissertation
Free
The profitability over the years have been measured using the performance results like gross profit margin, earnings before interest tax depreciation and amortization, operating profits, net profits and net revenues earned.... The gross profit margin, pre (EBITDA) profit margin, operating profit margin and net profit margin were compared over the period of 2006 to 2012 and a possible trend was found in the performance of Etisalat as a result of IT outsourcing....
Preview sample
Homeland Security and Critical Infrastructure Protection
8 pages (2068 words) , Download 1 , Book Report/Review
Free
In my opinion, this book holds immense value as is contributes greatly in the provision of national security and Homeland Security.... he provision of national security means the protection given to the national interests of the nation through the federal government and I think this book provides access to the national interests of the country to the students and the public citizens.... The review "Homeland security and Critical Infrastructure Protection" provides an expert opinion on the overall infrastructure and how it is currently and in the future should be protected....
Preview sample
Security in the 21st Century: Globalisation, Regionalisation and Individualisation of Security
6 pages (1664 words) , Download 1 , Article
Free
The "security in the 21st Century: Globalisation, Regionalisation, and Individualisation of security" paper states that in its widest and scholarly term, security is defined in the modern world as being a special kind of politics in which particular developments are threats constructed socially.... In its widest and scholarly term, security is defined in the modern world by Buzan and Weaver as being a special kind of politics in which particular developments are threats constructed socially as they have an existential characteristic of covering values as well as the property of human groups whereby they call for urgent measures....
Preview sample
The Canada Movie Industry Analysis
9 pages (2385 words) , Download 1 , Case Study
Free
In the case of appreciation of the value of the Canadian dollar of the depreciation of the US dollar, or both occurrences, the exchange rate index between the two currencies rise and thus leads to accessibility of films from distributors at reduced cost.... No trade association has been developed to serve the needs of the distributors and instead the function has been left to the US national Association of Theatre Owners.... augh, Thomas, Ezra Winton and Michael Brendan Baker, Challenge for Change: Activist Documentary at the national Film Board of Canada....
Preview sample
The German Football National
7 pages (2159 words) , Download 2 , Term Paper
Free
One of these events is the latest Libya turmoil that has seen Germany not taking sides in the supporting of the UN security Council.... The paper under the title 'The German Football national' focuses on Germany sports which form some of the most popular sports globally.... Moments after it was created, football rose in popularity in Germany and to this there was the 1903 German Cup as well as the 1908's national games.... Following the period of the WWII, the German Football national Team was barred from taking part in the international competitions....
Preview sample
Victim Offender Interaction Theory Coined by Marvin Wolfgang
2 pages (678 words) , Download 2 , Essay
Free
Based on these assumptions, possible targets for planned crimes are therefore easily determined, such places as banks, jewelry shops, and superstores among other places that handle a lot of money daily should therefore complicate their security setups or reduce the amount of money they handle....
Preview sample
Poster: National Risk of Civil Emergencies
7 pages (2080 words) , Download 0 , Report
Free
he National Risk Assessment and national security Assessment would be more effective if they could relocate emerging risks into the NRR more expediently prior to their impact being felt.... There is still ongoing work on the interpretation of national security risks and any adjustments to the understanding of the risks which will be summarized in 2015 national security Strategy. ... yber security ... The paper "Poster: national Risk of Civil Emergencies" is a wonderful example of a report on management....
Preview sample
The System Administrators of MegaCorp: Security Goals
12 pages (3298 words) , Download 2 , Assignment
Free
The paper "The System Administrators of MegaCorp: security Goals" focuses on the security of network infrastructure.... It is indispensable to conduct security tests before conducting infrastructure.... To ensure adequate security of the network infrastructure, network devices must be configured safely and are accessed securely.... Enhancing security in System Administration Introduction Operating systems are often regarded as software that provides greater access towards various hardware resources like computer system....
Preview sample
Political Views of Martin Luther King and Friedrich A.Hayek
4 pages (1000 words) , Download 2 , Essay
Free
In conclusion, Friedrich examines contemporary policies such as taxation, healthcare, social security, housing, natural resources, urban planning and education in the same light of principles developed in his earlier studies.... This essay aims to bring brief overview of the political and social views of two of the greatest thinkers of last century, in the persons of Martin Luther King and Friedrich Hayek....
Preview sample
The Rookie Chief Information Security Officer
10 pages (2903 words) , Download 3 , Case Study
Free
The study "The Rookie Chief Information security Officer" provides a quality assurance received by the vendor - ISO certified, employee protection for employee areas, three information security policies that could be developed and practiced within the organization for data security assurance.... The Rookie Chief Information security Officer Overview Information Technology (IT) is essentially the execution of computers and telecommunication tools in order to store, transfer and operate data especially in large business organizations or enterprises....
Preview sample
Computer security
1 pages (250 words) , Download 2 , Assignment
Free
The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector.... Identifiers for CVE reports are unique identities that are allocated to publicly known vulnerabilities to information security.... Each identifier, College: Computer security What is the basic purpose behind the CVE?... The main purpose of the Common Vulnerabilities and Exposures site is to provide a platform that provides synchronized information on all vulnerabilities in the information security sector....
Preview sample
Homeland Security
3 pages (750 words) , Download 2 , Assignment
Homeland security Name Professor Institution Course Date Homeland security 1.... Accidents In order to make sure that various kinds of accidents posing as a threat to homeland security are controlled, there is a significant need to employ pre-incident or safeguard controls.... Some of the best safeguarding controls that homeland security may employ include provision of resources and training.... For example, various terrorism acts end up causing loss of lives and properties (Department of Homeland security, 2007)....
Preview sample
Practical Windows Security
10 pages (2500 words) , Download 2 , Assignment
Free
Domain Controllers are employed for security verification call like that logging in, permission scrutiny, etc.... Practical Windows security WINDOWS DOMAIN STRUCTURE Table of Contents Introduction Windows Domain Structure is a view or ized admittance to a lot of networks or computer components by simply utilizing a particular password and user name.... Domain Controllers are employed for security verification call like that logging in, permission scrutiny, etc....
Preview sample
Integration of Facility and Security Managers
8 pages (2307 words) , Download 0 , Case Study
Free
The paper 'Integration of Facility and security Managers' presents the real estate industry that is one of the dynamic and high-value industries.... Facility management and security are some real estate functions that are likely to realize the benefits of integration.... acility management and security are some real estate functions that are likely to realize the benefits of integration.... Therefore, this paper examines how the concepts behind integration of facility and security managers....
Preview sample
The Financial Analysis from 2006 to 2010 of Kellogg
14 pages (4380 words) , Download 2 , Research Paper
Free
June 13, security Analysis Report of Kellogg (stock ticker K Introduction The purpose of this paperis to study the stock of Kellogg by analyzing the 5 year financial history of the firm.... They also provide the possessor a share in a Kellogg's profits by means of capital appreciation of the security or dividend payments.... This expected future return to the investor consists of both capital gains (share price appreciation) and dividends.... Calculation of cost of equity Cost of Equity = ((Stock Price appreciation+ Dividend for Next Year) / Current Share Price)) + Dividend Growth Rate ((1....
Preview sample
International Human Resource Management
11 pages (3477 words) , Download 6 , Essay
Free
The Social security Administration and performance management.... International HR Performance Management & Marriot Experience IHRM deals with workers that are either national, expatriate, third country nationals (Dowling Festing, & Engle, 2008).... Whilst appreciating differences, the company can also utilize differences by valuing multiculturalism and intra-national diversity.... These also note that despite cross-national differences, people have commonalities....
Preview sample
Are International Conferences a Viable Route to Environmental Security
10 pages (2845 words) , Download 2 , Essay
Free
From crisis to strategy: new thinking on national security.... Due to globalization, the whole world is considered as a single market and national boundaries become less important.... This essay "Are International Conferences a Viable Route to Environmental security?... is about environmental change due to human encroachment upon nature which is a major threat to human security.... International security and environmental security is the most important issue in a global context....
Preview sample
The Importance of Safety and Security in Private Business
4 pages (1000 words) , Download 2 , Research Paper
Free
The author of this essay highlights the importance of safety and security in private business.... Admittedly, security management plan and agent contingency are essentials to enable the management to bounce back immediately from the rapid developments.... Although government authorities professed that the national economy is regaining balance but business security is sustainably confronted with threats of terrorism, ecological imbalance, criminalities, trading relations, fluctuation of prices, instability of forex, and labor or political unrest....
Preview sample
Finance-Valuation Measure Analyses Coca Cola Companys Pepsi Product
13 pages (3453 words) , Download 1 , Case Study
Free
2009 net profit margin of 0.... The DuPont chart's left side demonstrates the details that underlie the ratio net profit margin, and a detailed analysis/examination of this section reveal areas that require cost reductions to be effected in order to improve the net profit margin of the company. ... et profit margin ... ross profit margin ... he ROE is equal to the product of three ratios according to the DuPont formula and these ratios involve profit margin, which is attained by dividing net profit by sales, Assets-turnover ratio which is obtained by dividing sales by total assets, and the leverage ratio attained by dividing total assets by beginning net worth normally approximated to be equal with one plus debt to equity ratio....
Preview sample
The Changing Role of National oil companies in the international energy Market
32 pages (8000 words) , Download 3 , Dissertation
Having control over these oil reserves has also brought about greater pressure for oil companies, mostly pressure in relation to their national roles and responsibilities, especially those which relate to supply and demand, globalization challenges, physical security, and international oil competition.... The Changing Role of national Oil Companies in the International Energy Market Chapter I: Introduction to the Study 1.... national oil companies have recently made a major impact on the international market, and these contributions have managed to assist countries in securing higher profits and in powering their industries....
Preview sample
Martin Luther Kings Last March
5 pages (1250 words) , Download 2 , Essay
Free
An essay "Martin Luther King's Last March" reports that notably, Luther and his team held a march to the capital D.... to present their grievance to the government.... The story is told by Shamar Thomas, who was a veteran sergeant of the Marine Corps.... ... ... ... The story is about the civil rights movement in the United States, where Martin Luther Kings organized a mass protest for the poor people....
Preview sample
Network and Data Security of the Building
3 pages (990 words) , Download 2 , Essay
Free
The paper "Network and Data security of the Building" discusses that generally speaking, security professionals are important in the world as they concern themselves on the importance of physical security and provide remedies to the security situation.... This document intends to explain physical security measures that would improve or boost the security situation in and within a given facility....
Preview sample
Why the United Nations Security Council Supported an Intervention in Libya but Not Syria
6 pages (1767 words) , Download 0 , Essay
Free
The purpose of this essay "Why the United Nations security Council Supported an Intervention in Libya but Not Syria" is to critically assess the strategic and international humanitarian law arguments for why the UNSC supported intervention in Libya but not Syria.... ), the decision by the UN security Council to support intervention in Libya and not Syria is based on the endorsement by the United Nations World Summit held in 2005.... N security Council Varying Decision in Libya and Syria: Strategic and International Humanitarian Law Arguments ...
Preview sample
Identification - Exophora and Esphora
9 pages (7184 words) , Download 3 , Essay
Free
The attitudinal lexis represents various degrees of appreciation and feeling.... The paper "Identification - Exophora and Esphora" discusses that the analyzed texts are One of the Best Movie "Gifts" I've gotten This Year, a positive review of the movie Little Miss Sunshine, and The Simpsons movie: A mixed blessing, a negative review of the film The Simpsons....
Preview sample
Company's Security on the Internet
16 pages (4856 words) , Download 2 , Case Study
Free
The study "Company's security on the Internet" concludes that the organization made multiple modifications within the security features of its networks for attaining the trust and the preference of its business partners, and took measures to prevent any possible attacks from unauthorized sources.... Contextually, the study aimed at determining the importance of integrating an appropriate security system to the network structure of XYZ Ltd.... security on the Internet Alicia Glenn Information Technology 9 Aug The presence of an effective Information Technology (IT) structure is a mandate for every organization....
Preview sample
The Position of Security Manager in Corporate Security
11 pages (3103 words) , Download 0 , Term Paper
Free
The paper "The Position of security Manager in Corporate security" states that as employers seek people to fill various job positions they expect that the people that will come to fill in these positions will fulfill the job descriptions of these positions.... Although a corporation can operate without a security manager the role of this professional is an integral part of the running of a corporation, and it is imperative, especially for organizations that can easily be targeted such as banks or organizations that are custodians of sensitive information....
Preview sample
Information Security: Law and Policy
4 pages (1073 words) , Download 2 , Case Study
Free
Information security is critical and necessary within any organization.... Information security is critical and necessary within any organization.... nformation security in an organization involves ensuring that only people with rights to read, change, broadcast and use it have access to it.... The need for information security is to primarily protect information from any unauthorized party.... Government and organizational policies dictate the implementation of an information security system....
Preview sample
Possible Ways of Art Management
8 pages (2102 words) , Download 2 , Coursework
Free
Area records an average profit margin of 70-80% for its operations each year.... Maintaining good contacts with customers is security for his business in future.... This is for the purpose of security and social norms.... The restaurant has good security through natural and techno-surveillance.... No attempted case of burglary has reported due to the good security.... aintaining good contacts with customers is a security for his business in future....
Preview sample
A Change Initiative at a Security Company
6 pages (1724 words) , Download 2 , Term Paper
Free
The objective of this paper is to assess the current system at a security Company to determine which particular aspect needs change.... In this case of this security Company, the possible resistance could be a combination of emotional and social.... t A security Company ... he objective of this essay is to assess the current system at a security Company to determine which particular aspect needs change.... It is in this regard that this essay is written to present pertinent changes in organizational processes or systems to adjust to the requirements of efficiency in assuring compliance to attendance protocols of a security Company. ...
Preview sample
What Significance Do Media Systems Have for the Construction of National Identities
8 pages (2399 words) , Download 2 , Assignment
Free
unning Head: Media and national Identity Media and national Identity [Institute's Media and national Identity Introduction Over the past few decades, media has emerged as one of the biggest forces on the planet, which can change or play an important in changing the minds and hearts of the people and even the boundaries and landscapes of countries.... Despite the fact that the government shut down the internet in the last week of January but the media had done the damage in creating a sense of urgency to protect the nation and national identity in the hearts and minds of Egyptians, millions who came on the streets and remained there until they achieved what they wanted to achieve....
Preview sample
Information Assurance and Computer Security
6 pages (1705 words) , Download 3 , Report
Free
This report "Information Assurance and Computer security" discusses protecting the internet and computer system of an organization as essential for the survival of the organization.... This is the most challenging part while establishing the security of a computer system (Vacca, 2014).... t is therefore difficult to develop a standard security system that can protect from future threats.... Creation of a security solution for a company is not easy task, and depends on the needs and vulnerability of the company....
Preview sample
Safe and Secure: Security Management
3 pages (750 words) , Download 0 , Essay
Free
Social engineering is the term used to refer to the methods that samurai and crackers, - both terms used to refer to hackers that can be hired to carry out legal hacking jobs - use in order to gain access to confidential information, especially from government sites that contain confidential financial and national security information.... This essay "Safe and Secure: security Management" discusses the value of information that refers to the difference that exists between the value of the project with information and the value of the project without information, coupled with the cost incurred in the acquisition of the information....
Preview sample
The Department of Homeland Security
3 pages (750 words) , Download 2 , Assignment
The paper 'The Department of Homeland security' focuses on one of the most comprehensive and sweeping agencies ever created in US history.... Falling under the umbrella of Homeland security are responsibilities as diverse as narcotics trafficking to natural disasters.... This model assures greater cooperation between diverse independent organizations as they relate to such issues as immigration, border security, and search and rescue.... The Counter-Narcotics Enforcement Department is also an agency whose function is redundant with the DEA and is additionally difficult to justify their inclusion in Homeland security, except to interrupt terrorist's cash flow....
Preview sample
Network Security
4 pages (1000 words) , Essay
Nobody downloaded yet
Spoofing, phishing and other security breaches occur all over the network that has a direct connectivity with the internet.... There are also open security breaches by tapping in on the information from the client or the server using sniffing technologies.... etwork security should take care of some or all of these security issues....
Preview sample
Business accounting
4 pages (1000 words) , Download 2 , Essay
The performance of a business organization is quantitatively reflected in its financial statements.... Ascertaining the financial health of a company has become important to different decision makers like managers, stockholders, potential investors and creditors.... ... ... ... As such, it becomes important to evaluate the financial situation of Northern and Southern branches to identify their relative strengths and weaknesses....
Preview sample
Knowledge and Information Security Plan
15 pages (4465 words) , Download 2 , Essay
Free
The "Knowledge and Information security Plan" paper proposes a strategic security plan for an organization recent security audit highlights private silence of deficiencies in incident response, disaster recovery and business continuity, and social engineering exploitation of personnel.... With the aforementioned holdings at risk and the recommendations put forth in this security plan, it can be concluded that employee empowerment through information security management is paramount to its success....
Preview sample
Information Security Management
10 pages (2755 words) , Download 3 , Essay
Free
The paper ''Information security Management'' tells that there are many approaches for information security assessment, the challenge is to find a set of approaches that fits the unique circumstances of an Accounting Company.... The TMA01 evaluation reveals that the references to various vital aspects of information security.... On the whole, with the lack of rigor, one can say that the firm faces many different information security risks, and the challenge is to find an approach that best surfaces these risks for Accounting Company, given the state of TMA01 and the current circumstances of the firm....
Preview sample
Why is Security so Difficult to Define
8 pages (2204 words) , Download 2 , Coursework
Free
This work "Why is security so difficult to define?... describes the aspects of security process with regard to politics in today's complex world.... The author takes into account an explanation as to why security in today's world is difficult to define due to many factors.... From this work, it is clear about the Cold War era, lack of security due to racial and ethnic issues.... But since homo-sapiens is the most advanced and complex living beings on the planet, security has come to have many connotations....
Preview sample
Relationship Between Domestic Law and the European Convention
5 pages (1350 words) , Download 2 , Essay
Free
There is an association between margin of appreciation and the judicial restraint.... There are factors affecting the scope of margin of appreciation which are balanced under the articles in the convention.... Works Cited Aria-Takahashi, Y, The margin of appreciation doctrine and the principle of proportionality in the jurisprudence of the Echr, Intersentia nv, 2002, pg.... C, The margin of appreciation: interpretation and discretion under the European convention on human rights: Council of Europe, 2000, pg....
Preview sample
Resp. Aircraft Operator Security Threats
2 pages (500 words) , Download 2 , Essay
Free
Aircraft security Scenario one Regarding the case of airline baggage handler, he was not supposed to give the passenger his phone back directly because of security reasons.... In this case, therefore, it was unethical for the airline baggage handler to give the phone directly to the passenger, and he should have handed it to the relevant authorities who include security officials, so that they would hand it to the passenger.... General aviation security aircraft, hangars, fixed-base operations, flight schools, and airports....
Preview sample
Effectiveness Of Transport Security Administration
4 pages (1000 words) , Download 2 , Essay
Free
The paper "Effectiveness Of Transport security Administration" describes air transport has become a necessity throughout the globe.... With millions of passengers traveling to different parts of the world daily, security has become a vital part of the air transport industry.... In the latest attack on a Russian plane, security officials suspected a bomb to be the cause.... Effectiveness of Transport security Administration ...
Preview sample
Terrorism and Railway Security
10 pages (2500 words) , Download 3 , Research Paper
Free
n this context, the Railroad Transportation Security Risk Assessment and national Strategy US Code (USC 1161) states that the funds allocated for the railway security needs to ensure train control systems and computers that are used for operations in the industry.... Terrorism and Railway security ... oopholes or Weaknesses in the Current security Arrangements of US Railway 10 ... The attacks were a significant chain of events as it transformed the structures of interstate relations, redefined the identity of enemies and friends as well as changed the perceptions of security computations at large....
Preview sample
2351 - 2400 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us