StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
US Immigration Policy
4 pages (1177 words) , Download 3 , Essay
Free
In 1950, the Internal security Act was passed which specifically bans any communist from entering the United States.... The Immigration Act of 1924 effectively regulated the influx of immigrants through the imposition of quotas which are based on the national origins of applicants....
Preview sample
The Historical Evolution Within the Liberal Internationalism
9 pages (2385 words) , Download 1 , Essay
Free
These include the first liberal internationalism that is mainly identified with the League of Nations and the numerous and attendant commitments that were made to the liberal principles associated with free trade, self determination in the national aspect and security that is collectively provided.... It required an international institution that had international responsibilities to provide international security and peace.... It is this that led to the Veto system that made it possible for the five permanent members present in the security Council the power to veto (Article 27 of the UN Charter)....
Preview sample
The Role of Tourism in Mexico
8 pages (2181 words) , Download 3 , Term Paper
Free
This according to him would enhance revenue collection with a margin of 6% annually.... The trend also ensures that adequate food is produced and this has got a long term benefits to the country based on the fact that it enables it to have a reliable food security systems. ... This limits instances if embarrassment and the feeling of being mishandled by security authorities (World Tourism Organization 43-47). ... The industry has also affected other sectors of the economy such as the ministry dealing with agriculture a scenario, which has boosted food security in the country....
Preview sample
Software Market and Piracy
7 pages (1960 words) , Download 1 , Essay
Free
The essay "Software Market and Piracy" focuses on the majority interesting new occurrence that has developed in the software market, software with capability of being redistributed, modifications and access to source codes.... ... ... ... The interesting new occurrence that has developed in the software market, software with capability of being redistributed, modifications and access to source codes, 'The open Source Software' has generated a noticeable widely felt popularity and impact....
Preview sample
Law of business association.Understanding company law
9 pages (2250 words) , Download 2 , Case Study
Free
The interest of the director is to increase the profit margin of the business.... The Australian security & Investment Commission, which implements the corporate act, requires the company to provide disclosure documents.... The company directors are required to have lodged a prospectus to the Australian security & Investment Commission.... The company will have to satisfy the profit and security test that the Australian Stock Exchange will carry out....
Preview sample
The Leading Online Stores Based in the UK
9 pages (2250 words) , Download 2 , Book Report/Review
Free
ite of security ... Website navigation should be improved to a certain extent and there should be minimum security issues for customers while they checkout.... Customers should be safely dealt with by providing better security while they're shopping or viewing products.... Recommendations to rectify this include keeping a low profit margin for some time and investing in producing clothes for middle class residents of the UK....
Preview sample
Cloud Computing: Technologies and Strategies of Ubiquitous Data Center
8 pages (2335 words) , Download 2 , Essay
Free
With ever growing security breaches, data theft, and data misuse by third parties, SpotifyTM would have to implement strong security management technology to protect subscriber data.... It can be done by implementing Information System Management, System Access Control, or Telecommunication security technique which ensures data integrity, data confidentiality, and protection from unauthorised access by third parties.... By implementing SCM companies like HP and Walmart have been able to cut cost and increase their profit margin....
Preview sample
The Corporate Bond Market
8 pages (2095 words) , Download 0
Free
t is a corporate bond with no underlying security attached to it.... arties who already hold the firm's security such as stockholders, holders of convertible notes and bond holders. ... Prospectus is a type of document which states the conditions and terms set by a company when it issues the debt security.... inancial intermediaries usually tend to charge a small profit margin when providing loans....
Preview sample
Doing Business in the Midst of Cultural Change: South Africa: Specific Industry Analysis
19 pages (4750 words) , Download 2 , Essay
Free
These high rates have reduced the demand for services and business consultancies of the company and hence reduced the profit margin of the company (Blomstrom and Lundahl 302).... In this context the South African government has created the national Small Business Advisory Council which advices different business organisations, both domestic and international to increase their growth paths in the country.... Another important policy has been the Proud South African policy: “Proudly South African is a Buy Local Campaign launched by government, organised business, organised labour and community organisations (represented in the national Economic Development and Labour Council) to boost job creation by promoting South African companies and locally made products....
Preview sample
FIN 300 - Principles of Finance for the Private Sector 1-8
4 pages (1000 words) , Download 2 , Essay
This is because shareholder maximization is long term while profit maximization is short term (Lupa 2011). ... ... ccording to Ramcharran (2011) liquidity implies how fast an asset can be.... ... ... Current assets are more liquid than noncurrent assets.... Retailers link the customers and wholesalers....
Preview sample
Advantages and Disadvantages of Activity Based Management on the Example of Profitability of Galvanized Pallet Nails
4 pages (1000 words) , Download 2 , Essay
Free
The paper examines the advantages and disadvantages of activity-based management on the example of profitability of Galvanized Pallet Nails and gives the calculation of pallets profitability and total activity based costing.... ... ... The author concludes that activity-based management has been a success overtime despite some setbacks....
Preview sample
International Finance Case
5 pages (1250 words) , Download 2 , Case Study
Merck & Co.... Inc.... Merck Sharp and Dohme International (MSDI) is considering replacing its semiautomatic inspection equipment with a new automatic photo electric sensing inspection equipment which functions electronically to measure the number and size of the particles in the.... ... ... The proposed equipment is efficient in materials and labor costs, it would eliminate human variability that caused ampules spoilage and had a capacity of 6 million, 25% more than MSDI had anticipated in 1988....
Preview sample
Spain Economy and the Situation in the United States
6 pages (1622 words) , Download 2 , Essay
Free
The paper "Spain Economy and the Situation in the United States " discusses that Europe is currently considered the largest economy at the moment while the United States is recognized as the largest and one of the most technologically advanced nations.... ... ... ... The economy is dominated by large public institutions controlling all sectors and monopoly was prevalent....
Preview sample
Huella Online Travel
2 pages (500 words) , Download 9 , Case Study
Free
Moreover, online payment security issue was a huge challenge because did not understand the security measures that the online site provided.... The population did not trust Huella when it turned to online security especially the security measures put in place to ensure safety of their finances.... he consumers should be assured of the online security payment details to remove the notion of security concerns related to the mode of payment....
Preview sample
Corporate Crime, Corporate Deviance: Why No Outrage
9 pages (2250 words) , Download 2 , Research Paper
Free
y favorite scene, which I found to be incredibly powerful, was when Norma Rae, having just been threatened and verbally assaulted, then was being escorted out by security, made an heroic effort.... The national Institute of Occupational Safety and Health calculated that 880,000 workers were exposed to cancer-causing and other dangerous chemicals at work, during that time period (Federation of Universal Rights, 211).... immy Carter was President of the US, at the time, and he used his time to office to establish a national energy policy that included conservation, price control and technology....
Preview sample
President Obama's Proposal to Boost Taxes for the Wealthy
4 pages (1000 words) , Download 2 , Research Paper
Taxes provide services for all Americans through Social security and Medicare.... We are facing increasing costs for Social security and Medicare as well.... In addition to increased expenses from wars and social programs comes the increasingly expensive mission of providing homeland security for America.... There isn't enough we can cut if we are not going to touch defense, homeland security and social security....
Preview sample
Personal Encryption: Should We Permit It
4 pages (1000 words) , Download 2 , Research Paper
Files with weak passwords and security measures are also prone to being accessed.... [Enter name] [Enter [Enter Subject] [Enter Date] Personal Encryption: Should We Permit It?... The era of capitalism and globalization has brought about phenomenal change in the flow of information around the world....
Preview sample
New Technology in Business
17 pages (4448 words) , Download 3 , Assignment
Free
This research-based report will provide a deep insight into the overall business enhancement, web-based business implementation, web hosting, main business changes for company operations and critical security recommendations and network considerations.... This research based report will provide a deep insight into the overall business enhancement, web based business implementation, web hosting, main business changes for company operations and critical security recommendations and network considerations. ...
Preview sample
Governance, Accountability and Audit
17 pages (5060 words) , Download 3 , Essay
Free
The conventional opinion was that gatekeepers such as the external auditors, security analysts and the credit rating agencies had avoided their duties and allowed dishonest conducts in the organisation.... The contribution of security analysts was also quite contentious in the collapse of Enron.... The security analysts had failed to predict the upcoming disaster of Enron.... Even though the security analysts observed indications about Enron's deteriorating financial performance, they passed the decision about Enron's financial aptness....
Preview sample
Types of Equality
5 pages (1465 words) , Download 0 , Essay
Free
Addressing inequality issues need an approach which is multisectoral approaches, for example including sectors like education, health, social, security as well as the legal sector.... nother challenge is that of weak coordination and supervision mechanism initiated at the national level.... The countries also lack the right infrastructure, staffing, requisite institutional, and other support that might be needed both in the national and sub-national levels to implement the equality programs. ...
Preview sample
The Clash among Civilizations: The Greatest Threat to Humanity in the Twenty-First Century
5 pages (1565 words) , Download 0 , Report
Free
The clash of civilizations must be resolved as this only aggravates the problem with regard to security as it continues to create violent conflicts in many nations all over the world.... Fortunately, at this time, the third world war never came but there are always security threats posed at both the national and global levels.... What are the reasons behind the West's belief that it is Islam who continuously threaten the global security whereas Muslims in the same manner considers the West as the threat to their existence?...
Preview sample
Capitalism Is a Force for Social Progress
6 pages (1915 words) , Download 2 , Essay
Free
The collective intelligence will soon become the final economic source of security in global economies.... The paper "Capitalism Is a Force for Social Progress" states that capitalism is a force for social progress in that people tend to fill the gap left by the unfair distribution of wealth....
Preview sample
Northeast of England and Scotland economic situation and government measures
9 pages (2250 words) , Download 2 , Essay
Free
1017), the stability and prosperity of the powerful state and international trade are considered significant to the security and national economic development.... The government helped to expand employment right across the national economy in Scotland and northeast England, but it was significant where private sector job creation was weak.... 149) indicates that the payment out of the banks undermined the national business environment and challenged the account of national economic transportation....
Preview sample
Establishing and Maintaining a Payroll System
6 pages (1812 words) , Download 0 , Case Study
Free
The payroll system is designed to ensure information security and confidentiality.... ayroll staff record employees' data and prepare relevant documents; they are also responsible for information security and confidentiality.... The security procedures should be devised in order to safeguard personal information of the employees.... It is also required to perform regular audit of the information security procedures and make changes and improvements accordingly. ...
Preview sample
Political and Legal Influences of Cyber Wars
6 pages (1818 words) , Download 0 , Essay
Free
This is due to the fact that cyber war is thought of more as a national security threat than a public security threat.... This is the reason why most countries are coming up with strategies that are focused on countering national security threats such as cyber wars. ... (2011), Cyber Warfare: Techniques, Tactics and Tools for security Practitioners.... (2013), Recent Developments and Revelations Concerning Cyber security and Cyberspace: Implications for International Law....
Preview sample
Limits of the UNs Human Rights Agenda
8 pages (2283 words) , Download 2 , Essay
Free
International human right principles and national laws protect only those NGOs (Nongovernmental organizations) genuinely involved in human rights.... Mr Annan said that the invasion was not sanctioned by the UN security Council or in accordance with the UN's founding charter (MacAskill & Borger, 2004).... It failed to ensure safety and security to the lives and properties of the innocent Palestinian people from the hands of Israel.... United Nations security Council passed a resolution mandating the imposition of a no-fly zone over Libya, and ‘all necessary measures short of an occupation force', to halt Gaddafi's continuing attacks on rebel forces....
Preview sample
The World in My Image
6 pages (1852 words) , Download 2 , Research Paper
Free
The paper "The World in My Image" describes that subsequently, almost every country is becoming relevant at the international level because they are putting the advantages gained into use by equipping their individual securities, which collectively transfer to international security.... Relevance of current international structure to individual and international security From the image painted about the current international system so far, it has been seen that there are two major levels on international system and these are the individual level and the international levels....
Preview sample
Definition American Government
5 pages (1471 words) , Download 0 , Assignment
Free
Finally, the sanctity of criminal justice investigations and issues of national security are also often offered as reasons for restricting press freedoms in America.... Some of the social concerns that often cause a balancing of interests are implicated when dealing with fair trial issues, terrorism, and other significant state or national interests. ... Some well-known political action committees are associated with the national Rifle Association, the American Medical Association, and the American Bar Association....
Preview sample
British Economic Interests
6 pages (1671 words) , Download 2 , Essay
Free
Cultural and national identity is always associated with the currency of a country.... The idea of sovereignty and national uniqueness is the key factor of the British state.... The Conservative party was initially the party of Europe, conceiving Europe as an enterprise which was very much in the security and economic interests of the British state, as well as a new external challenge to replace the Empire.... 1995, Identity, Integration and security: Solving the Sovereignty Puzzle in E....
Preview sample
Removing the Phrase In God We Trust
4 pages (1874 words) , Download 2 , Essay
Free
The Early Retirement Ages Should Be Raised For Social security ... For many Americans, this is a time to collect social security, something which we all pay into throughout our working lives.... Many Americans will not have a choice but to go on working, until such time that they are actually able to legitimately retire and collect social security. ... These same individuals are relying heavily on the promise of the collection of social security at age 65....
Preview sample
Future Trends in Global Supply Chain Management Strategy
12 pages (3056 words) , Download 0 , Literature review
Free
In the coming times, companies and their supply chain partners will pay more attention to privacy, data protection, and web security (Gripsrud, 2006). ... (1973), the costs of logistics in the United States (US) encompassed around 15 per cent of the gross national product....
Preview sample
Military Intervention since the End of the Second World War
10 pages (2824 words) , Download 2 , Essay
Free
Thus, military intervention in Afghanistan, despite the massive loss of life among British servicemen, was essential for the national security of the country because it allowed for the pursuit of al Qaeda and its affiliates to their base of operations where their power was considerably reduced (Gall, 2011).... The power of Britain was unrivalled by any other nation and this ensured the security of not only the nation, but also of all its colonies and protectorates....
Preview sample
Political Life of President Richard Nixon
7 pages (2093 words) , Download 0 , Essay
Free
His strong anti-Communist stance earned him a place on the House Committee on Un-American Activities where he gained national attention largely due to the ‘Red Scare' enveloping the country at that time.... This high-profile meeting, dubbed the ‘Kitchen Debate,' vaulted Nixon to national prominence.... wo of his more obvious blunders included sending the national Guard to break up a peaceful protest at Kent State in 1970 which resulted in the deaths of four students and the spraying of pesticides on Marijuana fields in the Southern U....
Preview sample
Banking in Qatar
8 pages (2091 words) , Download 0 , Case Study
Free
Presently the Qatar banking system includes 14 commercial banks out of which seven are national and seven foreign along with one specialised bank.... The banking system of Qatar was dominated by foreign bank branches till the mid-1960s when the first national bank, Qatar national Bank, was established in 1965, which was a joint venture capital shared equally between the public and Government of Qatar.... During this period three national banks were established....
Preview sample
Human Rights, Law and Police Ethics in Ireland and India
20 pages (5000 words) , Download 3 , Essay
The purpose of this Paper is to carry out a comparative analysis of securing human rights through Law and their protection through the Police Force in the Republic of Ireland and the Republic of India.... India is compared to Ireland in these respects because there is a good amount of similarities between these countries and also a great deal of differences between them....
Preview sample
Critical Thinking
5 pages (1250 words) , Download 2 , Book Report/Review
Free
On the one hand, it is better to consider a national ID card as a civil liberty and to look for positive sides of this innovative measure of national security.... There are many ways to support our right for anonymity, but there are no less rights to support our rights for security and national safety.... In this case, there is an evident loss of a certain degree of anonymity, but on the other hand, there is an evident increase of security option....
Preview sample
Spending Cuts of Local Authorities by the British Government
7 pages (1967 words) , Download 2 , Essay
Free
Government expenditures in public and national security have risen significantly over the years (Pettinger, 2010).... On the contrary, reducing security and red tapes measures would not affect the productivity of the state to that extent.... An argument could be raised that spending cuts would deprive local citizens from acquiring adequate health and security facilities.... Moreover, if this rate of spending cuts of local authorities continuous, than the private sector will completely take over government bodies of health and security....
Preview sample
The View That Relationships between States Lack Order
8 pages (2034 words) , Download 2 , Essay
Free
But one cannot totally disregard the liberal internationalists, as the world order is moving ahead with positive changes in governments' perceptions and outlooks to the causes of humanity, as explained through the national security strategy of the UK, widening its focus to include risks to citizens and ways of life from global terrorism, nuclear weapons, conflicts and failed states, pandemics and trans-national crimes (Bromley, 2009).... Applying the limit of universal jurisdiction is a debatable issue as a number of states have agreed that there is a clash between the territorial and national principles, on the one hand and the principle of universality on the other....
Preview sample
Immigration Reform in the U.S. Concerning Illegal Aliens
5 pages (1250 words) , Download 2 , Research Paper
national security, as well as internal security and order maintenance (Garcia 2005).... raudulently obtain identity documents, taxpayer identification numbers, social security numbers, or engage in identity theft in order to obtain a job from employment entities.... The media reports on various national and international groupsattempting to interfere in our elective processes....
Preview sample
Federal Prosecution of Foreign Terrorists
6 pages (1677 words) , Download 2 , Case Study
Free
In order to manage the challenge of dealing with classified or sensitive evidence that implicates national security effectively, several statutes are applied.... Another Act that is useful is the Classified Information Procedures Act, which establishes pre-trial, trial and appellate procedures intended to protect national security information from improper or unnecessary disclosure while ensuring the defendant's rights are protected.... Federal criminal trial of foreigners especially the Islamic terrorist could turn political leading to demonstrations against the United States which could cause security risk for the trial itself....
Preview sample
Oil Drilling on Federal Land
6 pages (1680 words) , Download 2 , Research Paper
Free
The proponents of onshore exploration justify their actions as those of seeking energy security by making use of the country's mineral reserves.... This is achieved though exploration of the natural resources, which is vital the country's energy and economic security (Alleman 2).... This does not pan out as promising towards achieving the proponents' energy security for America.... Exploration into federal lands by oil and gas companies does not guarantee energy security for the United States....
Preview sample
Expanding into the European Market by Abercrombie and Fitch
12 pages (3326 words) , Download 6 , Essay
Free
The paper "Expanding into the European Market by Abercrombie and Fitch" states that the company has its origin rooted in the United States and is known for offering classic, preppy, or casual wear.... A&F is a premium luxury brand that targets teenagers and young adults.... ... ... ... Its expansion into European markets has generated high revenue margins....
Preview sample
Political and Economic Systems of India and Japan
14 pages (3500 words) , Download 2 , Essay
Free
ne more subject, which connects India and Japan jointly, is receiving enduring association in the UN security Council.... In his tour to New Delhi Japanese Prime Minister Junichiro Koizumi advised New Delhi to effort out a normal two-sided approach for protecting enduring membership in the UN security Council.... Its major political parties are Bharatiya Janata Party, Indian national Congress (INC), Communist Party of India, Communist Party of India-Marxist Janata Dal (United), and numerous provincial and small national parties (Online, 2005)....
Preview sample
Information Managment Challenges for Ford Motor Company
41 pages (10500 words) , Download 4 , Research Paper
This paper, Information Managment Challenges for Ford Motor Company, will examine the challenges Ford faces by striving to create greener products, utilizing technology to create a better product and prove to consumers that the company promotes the ideals of a cleaner, healthier world.... ... ... ...
Preview sample
Server Administration Policies
3 pages (874 words) , Download 2 , Essay
Free
Issues such as security breaches, loss of network links, and disk crashes are prevented through measures that are taken on an emergency footing, which is meant to avoid loss of data.... The Oxford Data Center ensures the safety of its data centers by physically securing its location with card-reader door locks and monitoring it on a 24-hour basis with help of recorded video surveillance and security cameras.... TSU has a policy compelling all servers in the university to register with IT security, which facilitates risk assessment....
Preview sample
London Stock Market and Capital Budgeting
11 pages (2750 words) , Download 2 , Essay
Investment is a risky business.... Many people prefer to work as employees because they do not have the courage to gamble with the their money.... For, it is not a laughing matter to borrow large sums of money to invest one's inheritance or life's savings to open a restaurant, a grocery store, a bookstore, a manufacturing company and the like....
Preview sample
Well-Being of Living in the GCC Persian Gulf
7 pages (1750 words) , Download 2 , Case Study
Free
The case study "Well-Being of Living in the GCC Persian Gulf" aims to analyze the formulation of economic, financial, trade, customs, tourism regulations trade, legislation, and administration; the fostering of science and technology in the mining, agriculture, and animal industry in The Gulf Cooperation Council....
Preview sample
British Foreign Policy in Regard to Libyan Revolution 2011
9 pages (2270 words) , Download 1 , Assignment
Free
The NTC's declare interest in integrating militia into the defense forces of the state is indisputable in tandem with security concerns of the state.... Concurrently, this will result in accomplishing the twin objectives of availing militiamen with opportunities for employment and bolstering the country's underdeveloped security capabilities.... The assisting in the equipping and training of the Libyan security and the police force regardless of the fact that the NTC remains reticent to include outsiders in its security affairs at the present state....
Preview sample
HUMINT Intellegence Effectivness during the War on Terror
7 pages (1750 words) , Download 3 , Research Paper
Free
This behavior has left the national security of the U.... security agents relies more on using HUMINT intelligence than technological means of intelligence collection (Ainsworth 2008, 99).... The security agents attain crucial information via interrogation of the detainees and elicitation of data or information from unwitting individuals.... In case a captured extremist or terrorist refuses to reveal crucial information about terror plans and activities, security agents use interrogation technique to obtain the required information....
Preview sample
Current Trends in American Market Steel Prices
17 pages (4791 words) , Download 1 , Report
Free
Political issues and security conditions in developing markets in the Middle East and North Asia ... hough imports increased, local industries still enjoyed growth but what was not able to cash in on the national demand (“Global steel industry trends”, 2006).... he implementation of protective tariff measures for the American steel industry detailed in section 201 caused the appreciation of steel prices and consequently domestic steel prices in 2002....
Preview sample
24801 - 24850 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us