StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Operational Mentoring Liaison Teams in Ohio
7 pages (2047 words) , Download 1 , Case Study
Free
The Operational Mentor and Liaison mission is crucial to the strategic success in Afghanistan but contains certain countless challenges that need to be addressed as International Security Assistance Force (ISAF) tends to transfer accountability to Afghan national security Forces (ANSF).... The paper "Operational Mentoring Liaison Teams in Ohio" states that the OMLT program and the Ohio State Partnership with Hungary play a decisive role as a part of NATO-ISAFs strategy related to security assistance mission in Afghanistan....
Preview sample
The Famous an Augustinian Monk
1 pages (318 words) , Download 1 , Essay
Free
The paper entitled 'The Famous an Augustinian Monk' presents Martin Luther who was an Augustinian monk who later instigated the Protestant Reformation.... He was born on 10 November 1483 in Germany.... He entered university at the age of eighteen and successfully completed a degree in Philosophy....
Preview sample
Overview of the Market Failure
11 pages (2750 words) , Download 2 , Literature review
Free
Therefore, by desiring peace and unity, such men could therefore appoint a ruler among them who would guarantee their defense and security.... A Leviathan state is only obligated to offer security to its citizens without interfering with their lives.... The colonialists were receptive of the idea behind a strong national government, mainly motivated by their experience with unending instabilities and disorganization among states under the Articles of Confederation....
Preview sample
H&M Organizational Strategy
12 pages (3310 words) , Download 0 , Case Study
Free
The second level management includes the department heads for design and buying, accounts, finance, interior design and display, communication, logistics, IT, security, IR, HR, advertising, expansion, and Corporate Social Responsibility.... Clothes design has not traditionally been one of the Sweden's sources of national competitive advantage.... One would have expected such a large multi-national to have its design office in cities such as Milan or Paris....
Preview sample
Modern World History
3 pages (750 words) , Download 2 , Essay
Consistent with the expectation that the great powers would cooperate to manage world affairs, China was promised a seat on the United Nations security Council along with France and the Big Three.... The UN was used as the 'main tool' of foreign relations on the supranational level controlled by national governments.... In 1945, the UN represented a supranational level - a political body that exerted influence upon several national governments....
Preview sample
How to Resolve an Ethnic Conflict- Case Study of Bosnia
3 pages (750 words) , Download 2 , Research Paper
This gave them an institution that guarantees their security and makes laws that govern the state.... Powerful communities in a multiethnic society can form cartels in order to control the minorities and deprive them of their share of national resources.... Other factors such as economic factors and weak national institutions had little impact among the causes of the Bosnia war.... The country conducted national elections that established a government of three presidents....
Preview sample
Wind Power as an Alternative to Fossil Fuels
2 pages (500 words) , Download 2 , Essay
Free
n conclusion, the development of wind turbine technology can reduce air pollution and climate change, whilst provide national security and jobs for its citizens.... ocially benefits of wind farms include that they provide ‘energy security'.... When the wind blows, it pushes up against the blades, which makes them spin, which powers a generator to produce electricity (national Energy Education Project)....
Preview sample
History of the Dominican republic
2 pages (500 words) , Download 2 , Essay
Free
He controlled the national budget, the Congress, and the security forces, in addition to skillfully manipulating the political process.... He assassinated his opponents and instructed his security forces to fire at protesters.... Balaguer was a major intermediary between the national elite, the Dominican people, and the United States.... The Dominican Republic: A national History....
Preview sample
Journal opinion artical
3 pages (750 words) , Download 2 , Essay
Taking security measures by posting additional police personnel will serve as a stop-gap arrangement and it is not going to solve the problems on a permanent footing.... The attackers always have the advantage of surprise element and in a big campus if one or two police personnel are posted nothing tangible is going to happen from the security point of view.... ?? (USA Law…)Thus this law and order problem gives rise to serious economic implications as more security personnel will have to be employed at all levels....
Preview sample
ITM 501 MoD 5 SLP Information networks as enterprise glue
3 pages (750 words) , Download 2 , Essay
Besides, the entire Information Technology (IT) industry also largely rely on the above discussed technological products for the purpose of keeping information systems more intact as well as secured (national Science Foundation, n.... ITM 501 MOD 5 SLP Information Networks as "Enterprise Glue" Introduction The trend of using mass technological devices is augmenting at a rapid speed due to booming internet age (Jakobs, 2000; Rajaraman, 2013)....
Preview sample
Effects of Terrorism on World Population
3 pages (750 words) , Download 2 , Essay
Politically, terrorism evokes war and the usual costs of war: military-related deaths (as evidenced by Operating Enduring Freedom), restrictions on personal liberties (as evidenced by the Patriot Act of 2001), and decreased trust in governments and public officials to provide safety and security to the nation.... Politically and economically, the cost of national defense skyrocketed after the terrorist attacks, which, as economic Paul Krugman notes, is a result of the 'political program enabled by terrorism' (Balogun 115)....
Preview sample
Public Pension Replacement Rates
2 pages (500 words) , Download 2 , Essay
Free
Public Pension Replacement Rates Name and Number Date Submitted Abstract Given the information that Social security in the U.... Public Pension Replacement Rates and Number Submitted Given the information that Social security in the U.... Countries that have higher replacement rates generally spend a larger share of their national resources on Social security pensions for retirees” (Reno and Lavery, 2007, 3).... “Social security and Retirement Income Adequacy....
Preview sample
Stalking Victimization in the United States
2 pages (500 words) , Download 2 , Essay
Free
It is behavior which causes harassment and fear and poses a threat to the security of victims and others.... It is behavior which causes harassment and fear and poses a threat to the security of victims and others.... There can be no doubt that Stalking Victimization in the United States constitutes a serious threat to social security.... To combat this crime, law enforcement and community agencies should coordinate responses to the victims needs, in terms of security, counseling, and legal aid....
Preview sample
Strategic Marketing Plan Case Study
19 pages (4750 words) , Download 3 , Case Study
This report opts to come up with an efficient marketing strategy for the market leader in the casual dining industry, Applebee International, Inc.... In order to do so, this report uses strategic marketing tools to assess the external and internal environment of the business organization.... ... ...
Preview sample
The Need to Control the Increasing Burden of Diabetes and Other Non-Communicable Diseases
8 pages (2534 words) , Download 0 , Literature review
Free
The countries are inclined to self-interest, such as addressing HIV infections to foster national security, rather than donating for the global public good. ... WHO should consult and collaborate with the member states while supporting and encouraging global and national actions.... Experts, advocates and health ministries can provide their ethical and epidemiologic principles on global politics into the debate and clear the tension between international health and national interests (Drager & Fidler, 2007). ...
Preview sample
Next Generation Air Transport System
8 pages (2000 words) , Download 2 , Research Paper
Free
Lastly, it is expected to meet the increasing needs of national security by ensuring that traveler's safety is assured.... o undertake it effectively FAA had to collaborate with the Joint Planning and Development office (JPDO) and national Aeronautics and Space Administration (NASA).... Other key components are digital non-voice communication, advanced networking, network-enabled, network-centric operation, and a layered adaptive security system (Boehm-Davis, 2008)....
Preview sample
The Best Environmental Management Practices
8 pages (2279 words) , Download 2 , Essay
Free
I thought volunteering as wasting of time, but from my experience with national security for Clean Air, I have come to appreciate it.... In order for the national security for Clean Air to improve on its environmental compliance and performance, the following key elements should be considered, while developing the environmental management system, it should be founded upon a clearly documented policy that is communicable.... Being an environmental ambassador, national security for Clean Air was the perfect organization for my volunteer program....
Preview sample
Achieving Sustainable Development in Construction
14 pages (3500 words) , Download 5 , Essay
Free
It requires integration of sustainable development with environmental issues through the implementation of complex policies so that a balance could be maintained between economic development, environmental security and social stability.... It requires integration of sustainable development with environmental issues through the implementation of complex policies so that a balance could be maintained between economic development, environmental security and social stability....
Preview sample
International Law Issues
16 pages (4000 words) , Download 3 , Essay
Free
5 Offences of war crimes are thus restated in Article 8 of the Rome Statute of 1998 and informed by the experiences of war, the Rome Statute casts a wide net intended to ensure that both anticipated and unanticipated acts against international and national customs are caught by the Rome Statute 1998.... 5 This is particularly true in cases where the actions taken on the premises create a security risk for the receiving state.... International humanitarian laws would be more effective if states would be more committed to the safety and security of their respective citizens over national sovereignty....
Preview sample
Explain & discuss the stages of the online buying process from a consumer & site owner perspective
2 pages (500 words) , Download 3 , Essay
Free
Due to this, the company should ensure that the providing security indicators that will make the consumer confident that his or her money is secure if they use the site.... rivacy and Identity ProtectionAfter a customer is contented about the security of the online buying website, they then try to establish that their privacy is protected.... ethods of PaymentDue to the issues of security, online buyers mostly use the best means of online payment....
Preview sample
Mobile Health Application
2 pages (500 words) , Download 4 , Research Paper
Free
edscape is a medical app most used by physicians, nurses and medical students due to its Mobile Health Application Insert Insert security and Privacy Threats on Mobile Health Technologies Introduction Mobile health technologies are software application programs formulated to offer health services via mobile phones (smartphones) and tablets (Remedy Health Media, 2014).... Despite all the benefits acquired from the app, it also has disadvantages especially on security and privacy threats....
Preview sample
Why is the Notion of Identity so Important for the Constructivist Approach
10 pages (2500 words) , Download 2 , Term Paper
Free
Cultural norms and national security: police and military in post-war Japan.... Cultures of antimilitarism: national security in Germany and Japan.... The culture of national security: norms and identity in world politics.... Berger (1998) has approached the relation of identity with culture to the wider context of a state's domestic political-military culture, relating it to defence, security, and the use of military power in international matters....
Preview sample
Arab Charter as it Relates to the European Human Rights
9 pages (3225 words) , Download 2 , Essay
Free
This article seeks to ensure free press in Arab states since the restriction on the right to information may only aim at ensuring national security and morals in the society.... Article 14 guarantees the right to liberty and security and prohibits the individuals from searches, arbitrary arrests and detention without trial (Child Rights International Network, 2013).... Similarly, Article 5 of ECHR provides for the right to liberty and security (Shelton & Wright-Carozza, 2013)....
Preview sample
The Concept of Consistency
4 pages (1278 words) , Download 2 , Speech or Presentation
Free
From the paper "The Concept of Consistency " it is clear that John Higgins may issue preference shares to raise capital for the limited company.... These shares are called preference shares since they enjoy certain rights that ordinary shareholders do not enjoy.... ... ... ... According to the accruals concept, expenses and revenues should be shown in the profit and loss account as they have been incurred rather than as they have been paid....
Preview sample
The Importance of Air Transport for the Cities and Regional Development in Poland
17 pages (4661 words) , Download 0 , Research Proposal
Free
Most of all, the firmly held principle of national sovereignty over airspace has succeeded in deterring liberalization, while considerations of national security have also served as an effective excuse.... Considerations of the so-called protection o national security raised costs for domestic consumers and this rendered domestic services raised costs for domestic consumers and this rendered domestic air service less competitive.... ?Fears and Foes: security and Insecurity in an Evolving Global Political Economy....
Preview sample
Crime Problem from an Historical Perspective
1 pages (250 words) , Download 2 , Essay
Free
In Russia, after protests from the society against crimes raised, the government took serious actions and made a Federal security Service (FSB) which now investigates crimes of national and international scope and provides security to the civil society.... Russians are ranked 6th in crime rates and ranked 1st in criminal justice system which is 134% more than United States whereas the crime rate of....
Preview sample
Gun Control as a Complex Issue
1 pages (313 words) , Download 4 , Assignment
Free
Whatever the argument, the common denominator is that security at a personal and societal level is vital.... Regulation and monitoring of guns are essential to ensure that the right to bear arms does not jeopardize personal and public security.... Uncontrolled gun ownership and use could extend to encompass national threats, an aspect that the legal structure should address....
Preview sample
Wilkies Act of Whistleblowing
13 pages (3690 words) , Download 0 , Case Study
Free
Andrew Wilkie was a security expert for the Australian Government, only a week before the American government launched its invasion into Iraq in March 2003 (Wilkie, 2013, par.... The PIDA oversight rests with the Inspector General of security and Intelligence and the Commonwealth Ombudsman....
Preview sample
Reaction Paper
4 pages (1000 words) , Download 2 , Essay
Gender and Islam Name: Institution: REACTION PAPER GENDER AND ISLAM Women and Gender in Islam is a book by Leila Ahmed that critically discusses the position of women in Islam.... It is my opinion that the title does not encapsulate honesty and in full details what Leila Ahmed puts into the work....
Preview sample
International Accounting Standard and Financial Reporting Standard Applied on BRITIVC Plc
12 pages (3250 words) , Download 2 , Essay
Free
This report "International Accounting Standard and Financial Reporting Standard Applied on BRITIVC Plc" highlights key areas of financial statements - Revenues, Earnings per share, Property, Plant, and Equipment especially in regards to the quality of the data provided to lenders and investors.... ...
Preview sample
The Power of Branding - How Brand Equity Rules the World
25 pages (6250 words) , Download 2 , Article
The present discourse 'The Power of Branding - How Brand Equity Rules the World' on the example of world-famous trademarks shows how a corporation promote new products, create a powerful market domination, and sustain a corporation through both economic downturns and the effects of poor publicity....
Preview sample
Florida Department of Management Service
4 pages (1157 words) , Download 3 , Case Study
Free
The paper "Florida Department of Management Service" describes that the use of IP security that acts as a filter for traffic going through the administrator of the network ensures the security of information amidst large web traffic.... The security mechanisms include IP security and a virtual private network.... It makes it possible for users on public networks like the internet to access private networks while at the same time ensuring the security, functionality, and management of such private networks....
Preview sample
Most Important Economic Indicators
4 pages (1141 words) , Download 2 , Essay
Free
Even though the material growth can be calculated to some extent by the expansion of national output, earnings as well as payments, if the economy develops rapidly, it can result in short as well as long-term difficulties.... national income as well as production could rise, if these individuals were on job....
Preview sample
Web Server Application Attacks
3 pages (750 words) , Download 3 , Assignment
ession security Vulnerabilities.... Designing an information security policy is the first step towards the implementation of information security (Danchev 3).... A security policy acts as a centralized crucial document that will help in eliminating the risk of security breaches by securing the confidential information stores from getting disclosed to unauthorized persons....
Preview sample
Management information system
2 pages (500 words) , Download 5 , Case Study
Free
Name of the Author Name of the Professor Course 16 June 2011 Securing Communication Channels The integrated solution is required for providing security of communication channels on a business-to-business exchange and it will emphasize on three categories.... In order to implement security, the first category is the senior management that will create a security policy in the system, which will highlight possible threats and vulnerabilities of these communication channels....
Preview sample
Home Care in the United States - Home and Community Based Medicaid Services
3 pages (1091 words) , Download 2 , Essay
Free
The paper "Home Care in the United States - Home and Community Based Medicaid Services" observes programs that include services such as case management, homemakers, home health aides, personal care, adult day health rehabilitation, and respite care among others.... ... ... ... To enable states to provide more comprehensive long-term care services the Department of Medicaid Services (DMS), through the Secretary of the US Department of Health and Human Services (HHS), are allowed to grant waiver programs to provide Medicaid recipients with home and community-based services through an array of home and community-based programs....
Preview sample
Computer laws in US. Computer Fraud and Abuse Act
5 pages (1250 words) , Download 3 , Research Paper
Free
Penalties under CFAA Offense Minimum sentence Maximum sentence Getting national security information 10 year 20 years Unauthorized access in government computer 1 year 10 years Knowing access and damage 1 year 10 years Knowing access and reckless damage 5 years 20 years Trafficking in passwords 1 year 10 years Extortion involving threats of damage computer 5 years 10 years Theofel v.... Cyber security Enhancement Act This Act is abbreviated as ACSEA, it was enacted in 2002 along with the Homeland security Act in 2002....
Preview sample
Prevention of Financial Frauds
1 pages (250 words) , Download 2 , Assignment
Free
This paper presents evidence related to how such deceitful criminal activities have threatened the financial security of millions of people around the globe already.... This paper presents evidence related to how such deceitful criminal activities have threatened the financial security of millions of people around the globe already.... From frauds planned on a large-scale and committed to weaken the roots of national economy to small-scale financial frauds like fake lotteries and work at home plots, this criminal issue has largely succeeded in building many holes in the net of financial security which was once strong and meant to preserve the public protective....
Preview sample
Differences and Comparison between Private Law and Public Law
4 pages (1255 words) , Download 2 , Essay
Free
In public law, conventional parts of the rules and regulations include rules and regulations of the constitution, executive rules, rules and regulations governing levies and tariffs, institutional rules, and rules on delinquency, and social security.... Rules and regulations on social security comprise those governing indemnity systems.... These two types of business law are involved in maintaining governance and in doing so offer security to the significance of effective leadership....
Preview sample
Types of Network Attacks
4 pages (1000 words) , Download 4 , Research Paper
Free
The National Cyber Alert System for the US government and private sectors identified in recent past that all types of network attacks utilize security vulnerabilities (Yang, 1997) and nearly half of all the security threats from the Internet go unreported.... This does not mean that the responsible people have given up on coordinating the appropriate response to cybersecurity and no further efforts are made to raise awareness about the issue of security threats and types of network attacks....
Preview sample
Free Radius Distribution for Linux OS
2 pages (608 words) , Download 3 , Research Paper
Free
The most significant use of Free Radius as a security program is for the specialized Wi-Fi networks.... It produces its security certificates and is compatible with all protocols used (Urpi, 13).... The paper "Free Radius Distribution for Linux OS" critically analyzes the major issues on the free radius distribution for Linux OS....
Preview sample
Structure of Culture Shock
18 pages (4996 words) , Download 3 , Essay
Free
able of Contents Concept of ‘Culture Shock' 2 Before Travel 2 The Disintegration Stage 3 Reintegration 4 Adjustment 5 Reverse Culture Shock 6 Best Coping Mechanisms 6 Part 2 8 Dimensionalizing Cultures: The Hofstede Model in Context 8 Self Analysis: The implications of national culture 10 David Kolb Learning Styles Inventory 12 Cultural Differences 14 References 16 Adrian, F.... Police also realize that the national image is at stake when a foreigner lodges a complaint and will do their best to ensure that their problems are resolved quickly in order to avoid complaints being lodged by the embassy resulting in their supervisors coming to scrutinise their work....
Preview sample
Medicine and Law - Harold Fredrick Shipman
7 pages (1883 words) , Download 0 , Assignment
Free
The paper "Medicine and Law - Harold Fredrick Shipman " highlights that the assailant used a white Mustang that was later found abandoned in Atlanta, Georgia.... Fingerprints of James Earl Ray were found on the white mustang, beer cans, and binoculars.... .... ... ... Harold Fredrick Shipman was a convicted English serial killer....
Preview sample
The Impact of Culture on International Marketing
59 pages (14750 words) , Download 5 , Research Paper
This research paper "The Impact of Culture on International Marketing " examines the impact of culture on the formulation and the application of an international marketing strategy.... This paper examines how successful companies adapted their strategies.... ... ... ... International marketing has assumed new dimensions....
Preview sample
The United States War on Terrorism
10 pages (2752 words) , Download 2 , Essay
Free
Indirect effects include increased security measures in busy public places such as airports leading to delays, emotional trauma due to reports and images released on the terrorist attacks on the press, significant drops in stock values and stereotype suffered by those who profess the Muslim religion.... The FBI works with an aim of becoming the leader for the small justice department within the United States, the international security forces and like-minded partners (“Quick Facts,” 2011)....
Preview sample
Justifying Demands of France during the Two World Wars
7 pages (2040 words) , Download 2 , Essay
Free
During negotiations, France insisted on the following demands: control over the left bank of the Rhine, the occupation and status of Saar under French control, the organization of the League of Nations to aid France in case of a German attack, reparations from Germany, and promised guarantees of French security, and the return of territories to France (Florinsky 1934: 335).... All these demands had one goal in mind - to ensure France's security against the German threat....
Preview sample
Tesco Plc Financial Reporting
11 pages (3110 words) , Download 0 , Assignment
Free
mployees of any company use accounting information to assess company's profitability and the impact on their future remuneration and job security.... ROSS PROFIT margin ... It measures the margin on sales which a company is gaining (Investopedia 2016).... Below is Tesco's gross profit margin from 2011....
Preview sample
Thomas Hobbes vs John Locke
6 pages (1500 words) , Download 3 , Essay
Free
In other words, the state of nature, as described, is one which fails to guarantee or establish any degree of security or legitimate and stable leadership over a community. ... The essay "Thomas Hobbes vs John Locke" focuses on the critical analysis of the philosophical positions of Thomas Hobbes and John Locke....
Preview sample
Relative Merits of the Capital Asset Pricing Model
8 pages (2319 words) , Download 3 , Case Study
Free
The CAPM model is valid for the security market which satisfies the assumptions of CAPM.... Due to the emerging security market of Greece and Pakistan, the CAPM Model fails to prove the relationship between risk and return.... uropean security Market 7 ... reek security Market 8 ... akistani security Market 9 ... igure 1: The security Market Line ... he above figure shows the security market line (SML) and Rf is the risk free rate of return which lies at the conjoint of return and SML. ...
Preview sample
How effective Natural Resource Funds in Russia, Kazakhstan and Azerbaijan
16 pages (4000 words) , Download 2 , Term Paper
Free
Introduction Stabilization Fund of Russia national Fund of the Republic ofKazakhstan ... Second, establishment of a fund provides a safeguard against the so-called “Dutch Disease”, which entails inflationary pressures and appreciation of the national currency as a result of the inflow of sizable revenues from the export of natural resources.... The early phase of an oil windfall has been managed prudently as part of the revenues has been saved in the national Fund whose balance is above $5 billion....
Preview sample
26201 - 26250 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us