StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Letter from Birmingham Jail by Martin Luther King, Jr
3 pages (750 words) , Download 3 , Essay
The essay 'Letter from Birmingham Jail by Martin Luther King, Jr' analyzes a letter written by a fierce fighter against racial segregation during his imprisonment and addressed to religious leaders.... Epistola popularized the practical actions that the movement led by him carried out.... ... ... ...
Preview sample
Maritime and Port Security Initiatives by Federal Agencies
10 pages (2711 words) , Download 5 , Research Paper
Free
The United States Coast Guard and national Defense: A History from World War I to the Present, (Jefferson, N.... The paper "Maritime and Port security Initiatives by Federal Agencies" states that the legislature that supports the operations of the federal agencies is the Trade Act of 2002 which allows CBP to receive an electronic transmission of cargo data hours prior to their departure from foreign ports.... With this, port security has become a critical area of debate for the US Congress and in the department of homeland security....
Preview sample
Assessment For The Financial Accounting
22 pages (5500 words) , Download 2 , Essay
The report "Assessment For The Financial Accounting" presents the detailed fundamental analysis of two companies, namely, "Tullow Oil Plc" and "EasyJet Plc".... This analysis primarily uses results from the financial statements of both these companies as inputs.... ... ... ... Financial statements reveal the true position of a company, and by doing so, they also allow an analyst to judge the capability of the management team....
Preview sample
National Policy Issue - Immigration Reform
4 pages (1000 words) , Download 2 , Research Paper
Free
he bill calls for higher border security in the form of greater border patrol agents.... pponents claim that President Obama cannot be trusted to enforce border security.... The essay "national Policy Issue - Immigration Reform" analyzes an immigration reform, which has been in the news lately owing to the effects that the midterm elections will have on it.... national Policy Issue: Immigration Reform I....
Preview sample
Technological Issue in Homeland Security
8 pages (2124 words) , Download 2 , Term Paper
Free
national security.... The author discusses how information technology has impacted Homeland security.... , Homeland security Department makes use of technology since, without using technology, dealing with terrorism could be a predicament.... Homeland security Department makes use of technology since, without using technology, dealing with terrorism could be a predicament.... On the side of Homeland security, the internet has been an excellent tool since it has assisted the department in identifying individuals who are terrorists through the use of biometric technology....
Preview sample
Network Security and Its Main Aspects
8 pages (2303 words) , Download 1 , Term Paper
Free
This work concentrates on network security and its main aspects.... This term paper deals with data protection, privacy, and network along with information security by lessening IT costs at large.... In this similar context, 'Cloud Computing security' is fundamentally described as a set of standardized procedures that are designed to deliver the utmost security as well as information assurance within the environment of cloud computing....
Preview sample
Security at a Weapons Manufacturing Plant
1 pages (373 words) , Download 3 , Case Study
Free
The author of the paper under the title "security at a Weapons Manufacturing Plant " argues in a well-organized manner that for top-secret activities, it would be wise to leave the security concerns to the allocated security team (Gerstein, 2013).... Employees should have security cards for areas they are allowed to access.... They improve accountability and the security of manufactured products and the manufacturing procedures....
Preview sample
Computer Security or Ethical Issue
9 pages (2494 words) , Download 2 , Research Paper
Free
This research paper "Computer security or Ethical Issue" shows that due to the amazing efficiency of a computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance.... OMPUTER security Computer security Affiliation Executive Summary Due to the amazing efficiency of computer system, every business feels the need to utilize computer technology inside the business infrastructure to enhance its operational performance....
Preview sample
Job Security in relation to Japan and India
12 pages (3000 words) , Download 2 , Assignment
Free
The project seeks to make a comparative analysis of the conditions of job security in India and Japan.... In both nations, the governments have played an active role in ensuring the security of workers Job security in relation to Japan and Indi ... ob security in India 3 ... ob security in Japan 5 ... ob security- Comparison between India and Japan 8 ... he project seeks to make a comparative analysis of the conditions of job security in India and Japan....
Preview sample
Security Technologies for Online Payments
5 pages (1413 words) , Download 2 , Literature review
Free
The paper "security Technologies for Online Payments" describes that geolocation identifies the location of the user and alerts the system if any anomalies are found between the information retrieved from geolocation and the data entered by the customer.... There are several security technologies that are adopted by organizations to ensure smooth execution of online payments without any exposure or leakage of data to unreliable third parties.... security Technologies in E-commerce According to figures from Ali (2011), cyber crimes cost Britain around 27 billion pounds every year....
Preview sample
Accounting questions
2 pages (500 words) , Download 3 , Assignment
Free
It leads to higher gross profit margin when costs of purchases are rising with time.... The main reason why temporary accounts are closed at the end of an accounting period is because the accounts relates to investment transactions in the particular periods and needs to reflected in the income statements of the specific periods in which the transactions occurred as....
Preview sample
Effect of Cultural Globalization on National Identities
10 pages (2928 words) , Download 1 , Case Study
Free
He says that globalization and national culture have a supportive relationship where one frequently reinforces the other.... There is also an increased number that travel for economic purposes and some flee their countries for security reasons.... "Effect of Cultural Globalization on national Identities" paper argues that Australian government has become more stringent in the media and events that are not in line with the country's traditions....
Preview sample
Analysis of Security of the Airport
10 pages (2500 words) , Download 3 , Research Paper
Free
Security of the airport is of paramount importance as it entails the security of the passengers, the air crafts, the crew, the nation and a huge amount of individual, organizational and national property.... ecurity of the airport is of paramount importance as it entails the security of the passengers, the aircrafts, the crew, the nation and a huge amount of individual, organizational and national property.... This essay "Analysis of security of the Airport" discusses the new security measures of air travelers and airport employees....
Preview sample
Career Prospects in National and International Human Rights
6 pages (1500 words) , Download 2 , Assignment
Free
In the paper 'Career Prospects in national and International Human Rights ' the author analyses how to prepare for a career in human rights.... Career prospects in national and international human rights of the of the 4 February Career prospects in national and international human rights ... career in national and international human rights has become quite challenging with the rapid increase of human rights violations worldwide....
Preview sample
Security Risk Model for Westfield Parramatta
8 pages (2238 words) , Download 0 , Case Study
Free
The paper 'security Risk Model for Westfield Parramatta» is an informative variant on case study on management.... Commercial organizations rely on evidence-based security risk models to structure their security systems.... The security risk models based on variables are developed with the objective of incorporating security variables to identify the risk posed by people visiting the organization.... security Risk Model for Westfield Parramatta ...
Preview sample
JP Morgan Chase Proposal Analysis
7 pages (1750 words) , Download 2 , Essay
Free
This essay talks about the in-house software development process to solve one of JP Morgan Chase challenges in cyber security.... Proposal analysis Introduction JP Morgan Chase wishes to use an in house software development process to solve one of its challenges in cyber security.... he process of developing software to deal with the problem of cyber security is as important as the outcome.... he ownership that JP Morgan Chase will have over the resulting software product is of great importance to the security of data and information in the company....
Preview sample
A Nation Creates and Develops Identity through Its Stories and Arts
4 pages (1046 words) , Download 0 , Essay
Free
This paper explains the concept of national unity and disregarding some personal or cultural prejudice.... The work of Zollar is a true demonstration of how dance can be used for national cohesion and building.... n a nutshell, McMains tries to explain the concept of national unity by demonstrating that; national unity involves disregarding some personal or cultural prejudice and appreciating and tolerating other cultures.... Most importantly, McMains is clearly shows that dance is a very powerful tool in realization of national unity....
Preview sample
Terrorism as a Threat to Global Security
9 pages (2444 words) , Download 0 , Essay
Free
?The national security strategy of the United States of America.... The paper 'Terrorism as a Threat to Global security' states that the world is still grappling with the question of how to devise the best structures to curb terrorism.... This paper examines the notion that terrorism poses the greatest security threat to global security.... New multilateral approaches for fighting terrorism were adopted in reaction to the unprecedented Alqaeda attack that confirmed terrorism to be a new danger to global security....
Preview sample
Data Security Breaches in Small and Medium Enterpises
8 pages (2410 words) , Download 0
Free
As large businesses have more resources and greater IT budgets for data security protection measures, SMEs become more attractive and easier catch for hackers.... There is wide array of threats of data security.... The paper "Data security Breaches in Small and Medium Enterprise" is a great example of a report on information technology.... As large businesses have more resources and greater IT budgets for data security protection measures, SMEs become more attractive and easier to catch for hackers....
Preview sample
Social Security of Refugees in the UK
2 pages (1146 words) , Download 3 , Essay
Free
The paper "Social security of Refugees in the UK" claims the UK provides refugees with a registration, which helps them to enjoy rights equal to the other citizens.... citizens in terms of health and social security.... fter retirement, they get social security funds as a benefit.... As a result, they cannot obtain any social security funds.... have an absolute right to the national Hospital Services (NHS), which includes free medical treatment and care....
Preview sample
Interpretation of Martin Luther King's Letter from Jail
5 pages (1250 words) , Download 2 , Essay
Free
Martin Luther King's "A letter from Birmingham jail" was a response to the statement published by fellow eight clergymen from Alabama who criticized Martin Luther for participation and organization of the protest against Birmingham segregation.... ... ... ... Martin Luther King's letter was actually an effort to criticize the church and the white moderators, and to defend himself from such accusations....
Preview sample
Importance of Information Security in E-Commerce
12 pages (3000 words) , Download 6 , Essay
Free
The essay "Importance of Information security in E-Commerce" focuses on the critical analysis of the importance of information security in e-commerce from the technological, management, and organizational perspective.... It is crucial for companies engaging in or considering e-commerce activities to audit their business processes to check for any vulnerabilities and implement required security solutions in their e-commerce plan.... Rapid deployment of their cyber security measures helps to provide added security to their online resources such as e-commerce websites....
Preview sample
The Importance of Computer Security
9 pages (2330 words) , Download 3 , Literature review
Free
The paper "The Importance of Computer security " highlights that Ashgapour stated that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks which are acceptable and which are not.... Computer security is a primordial concern of all types of organizations.... The challenges to preserving and safeguarding computer security are tremendous.... Hence, academicians and computer security professionals undertake various studies to address this issue thoroughly and creatively....
Preview sample
Maritime Security Law and Policy References
4 pages (1000 words) , Download 0 , Annotated Bibliography
Free
In this reading, Identifying the important role technology plays in efficiently applying the maritime law is recognized plainly to give the readers an idea as to how sophisticated yet highly efficient the process of keeping the national security of every nation through the maritime law intact and well strengthened.... From this book, a deep realization on the relationship of the European Union with the United States could be realized through the application of the maritime law that both administrations of the said countries consider to be important on the idea that this is an issue of national security....
Preview sample
Math Problems
6 pages (1214 words) , Download 2 , Speech or Presentation
ertain costs can be omitted because the analysis is based upon margin contribution.... Complete all requirements for each problem and submit your work by email in a Word document no later than 6 PM (PST), Mar.... ... ... Management follows a pricing policy of manufacturing cost plus 60 percent....
Preview sample
Security, Interoperability, and Operations in Bank Solutions, Inc
5 pages (1580 words) , Download 2 , Case Study
Free
This paper "security, Interoperability, and Operations in Bank Solutions, Inc.... analyses issue around the organization's system, based on results from its internal report, and recommend IT security controls and government regulations and standards that can safeguard the company's data.... Effective governance offers leadership for the availability and implementation of necessary frameworks for the operations and security of a system (Grajek & Pirani, 2012)....
Preview sample
Project in colombia
4 pages (1000 words) , Download 2 , Essay
The project is likely to benefit Colombia in a number of ways while the investors target a substantial profit margin.... Project in Colombia Name: Institution: The Free Trade agreement between Colombia and the United States technically permits cross border trading between the two countries without intense restrictions....
Preview sample
The Issue of Security and Privacy Data
1 pages (397 words) , Download 2 , Assignment
Free
This assignment " The Issue of security and Privacy Data" discusses many conveniences that internet offers like remote access and a quicker way of accomplishing tasks.... The assignment analyses security over the internet which is a tricky affair and information passed over different networks.... The issue of security and privacy can be easily addressed by the federal government having central servers and records being accessed only by ascertained health practitioners with proper security credentials allowing them access to the records (Gunter and Terry, 2005)....
Preview sample
Finance - Expanding Business and Increasing Income
5 pages (1395 words) , Download 2 , Case Study
Free
The need to expand every time volume expands is being met by the increased expansion of the fleet, however, such expansion seems to erode the margin.... 8 Gross margin 54,993.... From the paper "Finance - Expanding Business and Increasing Income", the changes in the economic conditions as well as the business requirements of the customers of CCL; may not be able to sustain its profitability for a longer period of time and, hence, may default due to constrained cash flows....
Preview sample
Organizational Security
5 pages (1250 words) , Download 2 , Essay
Free
rganizational security ... Current security management & ethical issues of information technology.... Information security and ethics: Social and organizational issues.... From this paper, it is clear that the IT technician is a very valuable member of staff....
Preview sample
Mobile Security Issues
26 pages (7649 words) , Download 2 , Research Proposal
This paper ''Mobile security Issues'' has presented a detailed analysis of mobile security issues.... This paper has discussed a number of security issues from different perspectives.... Computing Capabilities 16 Internet Access 16 Bluetooth 16 Mobile device security in the context of Business Organizations 17 BYOD Trend and security Issues 19 Unknown third-party access via mobile apps 20 Difficult to track data 21 Challenging data management and segregation 21 Devices can be stolen 22 Recommendations 22 Improve Authentication Mechanisms 22 Install and Update firewall in mobile devices 23 Malware Risk Management 23....
Preview sample
The Main Problem of Ensuring Financial Security for Teachers
2 pages (759 words) , Download 3 , Coursework
Free
The author of "The Main Problem of Ensuring Financial security for Teachers" paper divides the principle problem into manageable sub-problems.... Therefore, the most pressing question is in this economically challenged culture, how can I provide the teachers more financial security?... Students Response: Providing financial security for teachers is the underlying problem and the goal of the research is to identify the best approach to achieve such an objective (Brace, 2008)....
Preview sample
Computer Security from the Attack
5 pages (1324 words) , Download 2 , Case Study
Free
This case study ''Computer security from the Attack'' tells that from the attack techniques that have been analyzed through the attack trees created, it further concludes that simpler attacks are more effective and efficient over technical data decryption models such as use of brute force.... security Assumption Physical location access is restricted to only 43 minutes, which is far less time to carry access the encrypted files.... Computer security Threat Modeling Attack goals The attack goal in to access and view sensitive encrypted files stored in Alice's laptop located in her workspace....
Preview sample
Rudiger Dornbuschs model
4 pages (1000 words) , Download 2 , Essay
Meanwhile, in order to generate expectation of appreciation, the nominal exchange rate overdepreciates (overshoots), so as the domestic currency becomes undervalued that it is expected to appreciate in the future.... Using the money demand equation1, the UIP condition2 and the PPP condition3, the model uses [where yt is the national income, i* is the international interest rate (exogenous) and p* is the international price level (also exogenous)]: ...
Preview sample
Current Demographics of National Basketball Players Association
5 pages (1492 words) , Download 3 , Essay
Free
The paper "Current Demographics of national Basketball Players Association" states that the national Basketball Players Association has evolved over the years from its inception in 1954.... The national Basketball Players Association is an organization that was founded in 1954.... Running Head: national BASKETBALL PLAYERS ASSOCIATION Introduction The national Basketball Players Association is an organization that was founded in 1954....
Preview sample
Comparing the Ideas and Actions of Martin Luther King Jr., and Malcolm X
6 pages (1824 words) , Download 0 , Report
Free
The national Association for the Advancement of Colored People (NAACP), the Urban League and the Southern Christian Leadership Conference formed by Dr.... This report "Comparing the Ideas and Actions of Martin Luther King Jr.... and Malcolm X" discusses Martin Luther King's strategies that seemed in accordance with religion, Malcolm X's journey took a very different path....
Preview sample
National Self-Determination in Europe
9 pages (2527 words) , Download 2 , Essay
Free
hus, the normative characteristic of the European idea - in fact the European idea itself - was fundamentally lost from sight as the stress was on practical logic and national interests.... It is shown how the principles of democracy, integration and national autonomy are in clash with each another.... The paper "national Self-Determination in Europe" highlights that there is a growing distrust among national publics and leaders that national diversity is under threat from the integration process....
Preview sample
Capstone Simulation: Finance
4 pages (1276 words) , Download 0 , Essay
Free
All other competitors enjoyed an appreciation in their share price – however small, over the period except for Baldwin who saw a decline to $31.... The level of profitability is defined by the net profit margin.... However, the gross profit margin provides important information on the contribution made to fixed cost as well as other operating costs.... The company's contribution margin is higher than the competition but there is room for improvement through the expansion of its production capacity....
Preview sample
The Importance of Computer Security
9 pages (2327 words) , Download 3 , Essay
Free
The paper "The Importance of Computer security" states that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks that are acceptable and which are not.... Computer security is a primordial concern of all types of organizations.... Hence, academicians and computer security professionals undertake various studies to address this issue thoroughly and creatively.... Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations....
Preview sample
Lifespan Development: The Case of Martin Luther King Jr
9 pages (2710 words) , Download 7 , Essay
Free
The essay "Lifespan Development: The Case of Martin Luther King Jr.... critically analyzes a lifespan development, based on the case of Martin Luther King Jr.... Born in Georgia on January 15, 1929, Martin Luther King Jr.... is known as one of the most influential people of the 20th century.... ...
Preview sample
The ability of individuals to enforce their rights under EU law before national courts
10 pages (2500 words) , Download 2 , Essay
Free
Hence, individual may derive benefits from these privileges and can directly employ European legislations before European and national courts.... N ( Edward Elgar Publishing 2011) Sinaniotis, D, The Interim Protection of Individuals before the European and national Courts.... In “CIA security v.... The defendants who were also in security system trade claimed that the plaintiff was barred from selling security system in Belgium by virtue of the ban set by the degree....
Preview sample
Transportation Security in the United States
6 pages (1717 words) , Download 2 , Research Paper
Free
This research paper "Transportation security in the United States" highlight the major security changes which have occurred in the transportation system of the USA after the attack of 9/11.... The study of the security system of all forms of transportation was considered in the paper.... In terms of the security issues at ports, the maritime transport act was introduced to provide more security in the ports and to decrease the case of smuggling and entry of terrorists....
Preview sample
Data Security in Travel Trade
8 pages (2426 words) , Download 2 , Essay
Free
Criminals/terrorist can easily use such data for vicious acts like identity theft and can create a great threat for the national security.... From the paper "Data security in Travel Trade" it is clear that everyone in this society has complete right to protect his/her information both from a professional and personal perspective.... To provide further protection to the travelers, 'new regulations, such as Payment Card Industry Data security Standards (PCI DSS), were being enacted....
Preview sample
Martin Luther and Reformation, Frederick the Great, Anti-Semitism
4 pages (1000 words) , Download 2 , Assignment
Free
The paper "Martin Luther and Reformation, Frederick the Great, Anti-Semitism" discusses that anti-semitism is considered unique among the world hatred when combined in four aspects that include confusion – under this aspect; there is little agreement on the reasons for people to hate the Jews....
Preview sample
Development of a New Security Plan
1 pages (250 words) , Download 2 , Assignment
Free
As the paper outlines, the increasing cases of cybercrimes led to the introduction of the National Institute of Standards and Technology that has helped in designing cyber security guidelines aimed at providing critical infrastructure for protecting the cyber space from any attack....
Preview sample
Evolution of the Homeland Security Agency
1 pages (310 words) , Download 2 , Essay
Free
The essay 'Evolution of the Homeland security Agency' concerns the use of ALVIN autonomous driving system in Homeland security Agency.... Use of unmanned ground vehicles would help the agency to curb cases of a robbery that have been witnessed targeting its transportation vehicles hence compromising the security of confidential data records in transit.... According to Zegart, several homeland security drivers have been dead by robbers while on duty over the past decades....
Preview sample
Cyber security
3 pages (750 words) , Download 2 , Coursework
Cyber security Name Institution Topic 1 Cultural values as viewed in the static sense represent the heritage and traditional norms that govern behavior in society.... In addition guidelines regarding security of both data collected and user should be addressed.... Consequently, security measures such as encryptions and firewall software are to be applied in the company's computer server system (Criddle)....
Preview sample
Martin Luther King, Jr: Letter from a Birmingham Jail
3 pages (750 words) , Download 5 , Essay
Here it will be examined: the context of the letter he wrote (the situation that led to King's writing) entitled.... A Letter from a Birmingham Jail, as well as the content of the letter; the focus on King's main points and what is most profound about what King writes; and finally, the achievements of the Civil Rights movement....
Preview sample
Homeland Security - Response & Recovery
4 pages (1000 words) , Download 3 , Essay
You are a senior leader of a federal agency that has just declared a disaster event that apparently has resulted in significant loss of life.... You have just reviewed the response plan for your organization and are prepared to set it in motion.... Noticeably absent from the plan is any treatment of how the response team should deal with the psychological challenges of dealing with significant loss of life....
Preview sample
Purchasing National Products
8 pages (2228 words) , Download 1 , Assignment
Free
In the paper "Purchasing national Products' the author discusses the issue that it is crucial to buy goods produced by your own country to support its economy and increase the level of prosperity.... Why Purchasing national Products is Important for Our Country's Economy Over the last few decades many economists have championed free trade.... n order to make people buy national products it is important to explain the economical origins that lead to the conclusion that purchasing domestic goods is the best way to develop national economy....
Preview sample
2651 - 2700 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us