StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Scientific paper on a specific management issue
10 pages (2500 words) , Download 2 , Assignment
he managements of companies all over the world that are not national firms anymore but have subsidiaries in numerous countries are rapidly becoming multi-national enterprises.... The national culture of the country that a subsidiary is operating in sets the standard for acceptable social behavior and this affects the sourcing of workers making a study of the national culture important to the establishment of subsidiaries as well as their operation....
Preview sample
Finance Analysis at the Safe Bulkers and Diana Shipping Inc
11 pages (2786 words) , Download 0 , Case Study
Free
n indicative term sheet/offer letter mentioning the key terms and conditions of the envisaged financing (amount, tenor, repayment schedule, spread/margin, fees, security package, covenants, major clauses etc).... These seven drivers are revenue, operating margin, cash tax rate, incremental capital expenditure, investment in working capital, cost of capital, and the competitive advantage period (Bender & Ruth 2008).... Though it is necessary that a company for instance cut back on operating margin, it should not do so to the detriment of quality delivery so as not to lose in the competitive advantage period when name brand becomes important to clients....
Preview sample
Comparison of Security Features in DB2 and MS Access
5 pages (1307 words) , Download 3 , Research Paper
Free
This paper ''Comparison of security Features in DB2 and MS Access'' tells us that database security is an important aspect that ensures that data availability, integrity, and confidentiality are enhanced at all times in a relational database.... This paper will compare some of the security features in DB2 and MS access from IBM and Microsoft Corporation respectively.... Comparison of security features in DB2 and MS access of Learning Introduction Database security is an important aspect that ensures that data availability, integrity and confidentiality are enhanced at all time in relational database....
Preview sample
International Outsourcing: Incentives, Benefits, and Risks
6 pages (1871 words) , Download 3 , Assignment
Free
Monitor national trade policies of member countries ... If the exporter fails to hedge against these risks, then the exporter would surely lose out in the event of a sharp currency appreciation happening all too suddenly.... s explained by Pietersz (2005), an exporter faces falling sales or shrinking gross margin when its domestic currency appreciates.... Shrinking gross margin is caused by the lower value of the customer currency against the domestic currency....
Preview sample
Mobile Phones, IT-Security and E-commerce
10 pages (2500 words) , Download 3 , Essay
Free
"Mobile Phones, IT-security and E-commerce" paper examines key points on the use and the advances of mobile phones, e-commerce, and IT-security aiming to explain their development internationally.... Mobile phones, IT-security and E-commerce Introduction Cell phones were primarily introduced in order to respond to specific needs – mainly for helping professionals to communicate when there is no phone available and a critical business issue needs to be discussed....
Preview sample
The UK Defence Industry
27 pages (8745 words) , Research Paper
Nobody downloaded yet
These manufacturers are provided with sufficient updated data by the Defence Equipment and Support Principal security Advisor team (DE&S PSA) regarding guidance and continuity policies.... The team provides sufficient advisory support to reduce the continuity and security risks (GOV....
Preview sample
Policy Issue: National Population Control
9 pages (2384 words) , Download 2 , Research Paper
Free
This research paper "Policy Issue: national Population Control" discusses alternative policies that will yield better results when they are implemented on a proper basis.... national Population Control Public Administration- Policy Analysis-Analytical paper that will analyze and make a recommendation on a policyissue-national POPULATION CONTROL ...
Preview sample
Managing Security at the Workplace
16 pages (3500 words) , Download 2 , Essay
Free
An essay "Managing security at the Workplace" outlines that apart from natural calamities and criminal actions, technology dangers are very common.... security has become a major concern in the global arena.... Community centers to households, factories to recreation areas, all suffer from a threat to their security.... Managing security at the Workplace ... ver the years, security has become a major concern in the global arena....
Preview sample
Zara's Company Situation Analysis
4 pages (1315 words) , Download 5 , Essay
Free
Financial Ratio Analysis - Inditex Profitability Gross profit margin of the company is fairly high – 59%, which implies that the company has effective outsourcing manufacturing strategy and has good relationships with suppliers.... Based on the rising revenues and margin data, it is possible to conclude that Inditex is at the growth phase of the life cycle, while Benetton, the GAP, and H&M are at maturity and stability phase, as their revenues and margins are declining....
Preview sample
ABC Company
6 pages (1500 words) , Download 3 , Research Paper
Free
The other reason is poor debt collection, the company's accounts statement indicates that the net accounts receivable were still very high with a small margin having been collected compared to the previous period's accounts.... 9 For a 40 percent gross margin on the new product the company can set the selling price at Initial cost = 10.... 9 40% margin = (0.... 3 To find out the contribution margin for each product and the break-even points for the product we carry out the following calculation....
Preview sample
Bollywood film New York: a national approach
7 pages (1750 words) , Download 2 , Essay
Free
Bollywood film “New York a national approach Introduction: While several Hollywood films have dealt with the of terrorism and specifically the 9/11 incident with its consequent impact upon innocent victims, “New York” is the first Indian film to explore this subject.... The national element may be clearly noted, because all of the major characters in the film are Asian, despite the story taking place in a foreign country....
Preview sample
Technology Advance and Networks Security
6 pages (1920 words) , Download 1 , Coursework
Free
This paper "Technology Advance and Networks security" will provide an in-depth view of security threats.... In essence, computer security deals with computer-related assets that are subject to a variety of threats and for which various measures are taken to protect those assets.... Many organizations are aware of the dangers of computer-related crime and are taking measures to ensure network security in an effort to safeguard their valuable data and that of their clients....
Preview sample
Best Practices for Network Security
4 pages (1276 words) , Download 2 , Research Paper
Free
The paper "Best Practices for Network security" discusses that expansion of security services to cloud networks has 'added to the sales revenue and business growth by which there has been an increase in the investment in innovation and product development.... Best Network security is the top answer for establishments, community libraries, internet shops, institutes, academies, and other solicitations where the manager has to safeguard and uphold a lot of system PC terminals situated in poles apart places....
Preview sample
Canadian Economy over the Last Two Years
6 pages (1715 words) , Download 1 , Case Study
Free
n the preamble of the Act creating the central bank, the main functions were: 1) to regulate credit and currency in the best interest of the economic life of the nation; 2) to control and protect the external value of the national monetary unit; 3) to mitigate by its influence fluctuations in the general level of production, trade, prices; and employment, and, 4) to promote the economic and financial welfare.... ?? The policies of the bank are implemented on the national level and together with the government fiscal policy constitute the Canadian economic policymaking mechanism....
Preview sample
Martin Scorceses The Gangs of New York
4 pages (1000 words) , Download 2 , Movie Review
Martin Scorcese's "Gangs of New York" was a masterpiece of cinematic artistry, and brought to life a subculture and a time that is little covered in the movies.... Most of the movies covering the Civil War refer to the battles at the Mason-Dixon line or into the South, from "Gone With The Wind" in 1939 to "Glory," featuring the black Massachusetts division under the leadership of Colonel Robert Shaw, played by Matthew Broderick (1989). ...
Preview sample
Martin Luther and Peace With God
2 pages (500 words) , Download 3 , Essay
Free
This essay explores Martin Luther and his main concerns.... He believed the Catholic Church stunted the education, growth, and knowledge of the peasants.... Without the ability to read, or write, the poor were subject to the teachings of the Catholic Church.... ... ... ... Without the knowledge of salvation by Faith alone and peasants were convinced that buying indulgences would get them to heaven....
Preview sample
Operating Systems - Hardening and Security
8 pages (2172 words) , Download 1 , Case Study
Free
The paper "Operating Systems - Hardening and security" presents NextGard technologies that specialize in network consulting services and face a number of network security vulnerabilities and risks.... With nearly 250 employees in 5 countries, the organization currently faces a number of security challenges.... Operating Systems: Hardening and security Operating Systems: Hardening and security ... extGard technologies specialize in a number of network consulting services and are as a result faced with a number of network security vulnerabilities and risks....
Preview sample
Computer Security of Unix
5 pages (1304 words) , Download 1 , Assignment
Free
The author of the "Computer security of Unix" paper focuses on the critical analysis of the major issues in computer security tools.... Computer security ... er File security ... ithin the various user groups some operating systems provides an additional future to protect files further on per file basis, the security properties that can be set at this point are auditing, permissions and ownership....
Preview sample
Role of National Training Awards
6 pages (1921 words) , Download 2 , Essay
Free
The essay "Role of national Training Awards" focuses on the critical analysis of the major issues in the role of 'national Training Awards', analyzing and approval of individuals and organizations that have accomplished exceptional business and personal achievement through an endowment in training.... ?        The case study ‘national Training Awards' published in People Management magazine, September 15, 2005 talks about NTAs analyzing and approval of individuals and organizations that have accomplished really exceptional business and personal achievement through endowment in training....
Preview sample
Business & International Trade
4 pages (1000 words) , Download 2 , Assignment
This is called an appreciation because one unit of the currency will buy more units of other currencies.... The domestic firms that would gain from an appreciation of the country's currency are: • Importers and exporters in the UK of foreign raw materials and components, for whom the domestic currency cost, of these imports will be falling — this increases their competitiveness.... This was because, although the import price of cars was falling due, to the appreciation of the euro against the US dollar, they were not selling them more cheaply to European consumers....
Preview sample
Analysis of Strategic Factors for Microsoft Corporation
5 pages (1250 words) , Download 4 , Research Paper
Free
There are also threats to information security when making online purchases. ... 2%; operating margin stood at 34.... 5% and Net profit margin stood at 24.... perating margin ... et profit margin ... This paper 'Analysis of Strategic Factors for Microsoft Corporation' aims at analyzing the strategic factors that currently affect Microsoft's business....
Preview sample
Information Security Management of Zayed Air
11 pages (3439 words) , Download 0 , Case Study
Free
"Information security Management of Zayed Air" paper focuses on Zayed Air a small, low-cost airline operating whose head office and operations are in the Dubai International Airport.... The security management of Human Resources 2.... Organization and roles and responsibilities of information and security modules Zayed Air Information security Management Proposal ... The security management of Human Resources ...
Preview sample
The Key Challenges Posed by Globalisation for National Governments
5 pages (1468 words) , Download 1 , Literature review
Free
Also, there are cyber-terrorists who use viruses to bring down web sites or strike at security loopholes in commercially important software at any computer host.... Such Internet empowered citizens raise the greatest global security and developed challenges of the twenty-first century which governments cannot easily contain.... The paper "The Key Challenges Posed by Globalisation for national Governments" is an outstanding example of a business literature review....
Preview sample
Dr. Martin Luther Kings Famous Speech
1 pages (419 words) , Download 4 , Essay
Free
The paper entitled 'Dr.... Martin Luther King's Famous Speech' examines and summarizes Dr.... Martin Luther King's famous speech which took place at the Lincoln Memorial in Washington D.... .... August 28, 1963.... Among the points addressed will be the manner in which he establishes credibility....
Preview sample
Bussines Accounting
4 pages (1000 words) , Download 2 , Essay
Business Accounting Table of Contents Scenario 1- 3 Scenario 2- 4 Scenario 3- 6 Scenario 4- 8 Scenario 5- 9 Reference 11 Bibliography 12 Scenario 1- The devastating floods in major cotton producing countries like Pakistan and China, and the ban of cotton exports by India, due to rise in the domestic cotton prices, implies that the supply of cotton will fall....
Preview sample
Security Planning and Assessment - terrorism
5 pages (1250 words) , Download 2 , Essay
The threat from terrorism or any other kind is real and serious and we need to consider security planning.... If we think our organization might be vulnerable or affected by an attack, we should carry out an impact assessment and apply appropriate protective security measures.... A properly conducted risk assessment should give you a good idea of the likely threat to your organisation and indicate precautions you need to take; seek advice from your local police Counter Terrorism security Adviser (CTSA) on the threat and appropriate protective measures....
Preview sample
Merging Companies
4 pages (1776 words) , Download 3 , Essay
Free
The paper "Merging Companies" tells us about the voluntary fusion of two companies on broadly equal terms into one new legal entity.... The firms that agree to merge are roughly equal in terms of size, customers, and scale of operations.... ... ... ... Mergers and acquisitions have had an important impact on the business environment for over 100 years....
Preview sample
Financial Analysis of Marvel Toys Pvt Ltd
12 pages (3673 words) , Download 2 , Research Paper
Free
In APA Format By Executive summary, Introduction, Discussion, Complete Financial Analysis of the Firm covering Cash Flow Analysis, Ratio Analysis, Analysis from a Long Term Creditor's point of view, Examining the Collateral security offered by the Firm, Recommendation to the Loan Granting Bank, Other Factors to be Considered, Conclusion, Decisions, References, Presentation.... The financial analysis includes: 1) Cash Flow analysis 2) Ratio analysis and 3) Analysis by a long term creditor 4) Examining the collateral security to be offered by the firm in case loan is granted for the firm....
Preview sample
National Westminster Bank vs Barclays Bank Personal Loans
5 pages (1552 words) , Download 2 , Essay
Free
On the other hand, the secured loan is the loan acquired after rendering property or any other collateral as security to stand in place of the loan acquired.... This is a type of loan granted by banks over security of one or more asset.... In most cases, this loan is offered to people who offer houses or even personal vehicles as their security or collateral, which means that customers with these assets are the only individuals entitled to the loan....
Preview sample
Importance of Social Networking Security
13 pages (3643 words) , Download 2 , Essay
Free
The paper "Importance of Social Networking security" discusses that paper proposed some security solutions for the social networking security structure enhancement.... This research will offer deep insight into social networking security vulnerabilities and possible solutions to avert them.... Social Networking security Institute Table of Contents Table of Contents 2 3 2- Introduction 4 3- Social Networks 4 4- SocialNetworks and security Threats 5 ...
Preview sample
Principles of Computer System Design: Security
6 pages (1705 words) , Download 1 , Book Report/Review
Free
As the paper "Principles of Computer System Design: security" tells, the Thompsons' rigged compiler is a deadly attack that is almost impossible to detect.... security ... alware such as Key loggers are difficult to evade, but using simple tricks and ways of obfuscating passwords are plausible intervention to the security problem Key loggers pose (Gawrock and International Conference Future of Trust in Computing, 2008).... Whereas computer users do not expect advertisers to mine their data and use them for marketing, ad servers operation in multiple domains (more than one website) are a security threat as they can help gather significant amount of information about users....
Preview sample
Food Security, Climate Change, and Population Growth Issues
6 pages (1731 words) , Download 2 , Assignment
Free
The author of the paper "Food security, Climate Change, and Population Growth Issues" will begin with the statement that the growth and prosperity of a country are directly proportional to its policies, effective implementation of these policies, and achievement of the desired results.... Analysis of Growth Area ity's Aurora Precinct Structure Plan in Light of Food security, Climate Change and Population Growth Issues Name University Introduction Growth and prosperity of a country is directly proportional to its policies, effective implementation of these policies and achievement of the desired results....
Preview sample
Global Health: The Impact of Chronic Poverty and Climate Change
8 pages (2354 words) , Download 3 , Assignment
Free
This will comprise new reporting formats, for instance, measuring externalities amid sectors and amid transnational and national health impacts, which are subject to the broad public and external analysis.... Generally, appreciation should be shown to the extent under which good health improves workforce productivity, elevates learning capacity, supports sustainable environment and habitats, strengthens communities and families, and adds to social inclusion, a decline to poverty reduction and security....
Preview sample
The National Curriculum for Science in England
14 pages (4467 words) , Download 2 , Term Paper
Free
Life in jungles without opportunity in an undeveloped economy and without a social security system in place under uncaring hereditary rulers can be tough.... This term paper "The national Curriculum for Science in England" focuses on the issues related to education now traversing national boundaries and the national political will often desires excellence in science education.... Science education is a high priority for all nations because excellence in science is likely to influence national prosperity....
Preview sample
Marketing Strategies of Mercin Daviro
9 pages (2511 words) , Download 2 , Essay
Free
The paper "Marketing Strategies of Mercin Daviro" discusses that the automotive market experienced strong sales growth has continued in most segments in 2004, particularly for four-wheel drives, people-movers and light commercial vehicles, pointing to another record year for total vehicle sales.... ...
Preview sample
Malcolm X and Martin Luther King
3 pages (750 words) , Download 2 , Essay
The turbulent era of the civil rights movement of the 1950s and 1960s propelled Malcolm X and Martin Luther King Jr.... to the forefront of the political activity.... History has viewed these two leaders as possessing a fundamental difference in approach and differing goals in their fight for racial equality....
Preview sample
The UN Security Council
10 pages (2595 words) , Download 2 , Essay
Free
The paper "The UN security Council " highlights that generally, delineating within developing countries is indicated in the Climate Change Convention which acknowledges the special needs of developing countries that are also vulnerable to climate change.... In instances where citizens of a state suffer gross human rights violations from their own government and the security Council remains inactive, the military intervention of another state is often the only hope for the suffering populations....
Preview sample
Marin education fund scholarship
2 pages (500 words) , Download 2 , Essay
Free
Even though my family thinks highly of education and its benefits, there had been some inconveniences that led me to take some time off exclusively for the care of my parents after school.... ... ... Most of my schoolmates have already started their college education, but the fact that both my parents have a disability that prevents them from having a regular forty hour a week job....
Preview sample
Information Security Governance - Blackboard Inc
13 pages (3748 words) , Download 2 , Assignment
Free
The author of this study "Information security Governance - Blackboard Inc" discusses the information security problems facing the company, cost, and bandwidth issues of the company.... Some suggestions for the security of the company's network are required.... Information security Governance: a.... New established enterprises' practices are affected by the Data security standards, PATRIOT acts and Sarbanes-Oxley act etc....
Preview sample
Impact of Globalization on National Economies
12 pages (3000 words) , Download 6 , Case Study
Free
They also suffer social security problems....  «Impact of Globalization on national Economies» ... Globalisation facilitates worldwide economic integration of separate national economies into one global economy by allowing free trade and free movement of capital between cross borders.... It interconnects the national economies of different countries through foreign trade, foreign investment, and transfers of financial and other resources....
Preview sample
'Enforcing Community Law Rights Before National Courts
8 pages (2178 words) , Download 2 , Case Study
Free
This case study "'Enforcing Community Law Rights Before national Courts" presents the legislation that provides a remedy only to those employees who had been working, for the same employer for at least three years.... he remedy available to Ms Mandy is that, she can initially approach the national court for redressal, for injustice done to her due to the violation of EU regulations.... In the remote instance of the national court not ruling in her favour, she can approach the European Court of Justice. ...
Preview sample
American National Government
4 pages (1362 words) , Download 0 , Essay
Free
This paper ''American national Government '' tells that Recent legislation has required that insurance companies cover contraceptives as part of preventative health care services.... Political Science - American national Government - Reflection Paper Recent legislation has required that insurance companies be required to cover contraceptives as part of preventative health care services.... national Catholic Reporter....
Preview sample
Information Security: Principles and Practice
6 pages (1648 words) , Download 0 , Assignment
Free
As the paper "Information security: Principles and Practice" outlines, Project Management Body of Knowledge is an amalgamation of processes and knowledge areas.... Heading: Information security ... uring the analysis phase of SecSDLC, dedicated teams facilitate in ensuring that valid initial analysis of all security plans or agendas, with their known threats are unveiled.... It is also at this phase that the analysis of existing permissible matters affecting the design of security mechanisms is indentified....
Preview sample
Security for Consumers Doing Online
6 pages (1798 words) , Download 0 , Literature review
Free
The author of the paper "security for Consumers Doing Online" will begin with the statement that recently, online shopping or e-shopping as a business technology has presented a universal platform for selling as well as purchasing goods and services and promoting vital organizational processes.... s there sufficient security for consumers when they do online ... In this regard, the argument essay seeks to examine whether there is sufficient security for consumers when they do online....
Preview sample
National Health Service: 1979 and Beyond
11 pages (2283 words) , Download 1 , Coursework
Free
epartment of Health and Social security (1976) Sharing resources for health in England: report of the resource allocation working party.... The author of the paper titled "national Health Service: 1979 and Beyond" details the changes that the national Health Service has undergone and how far these changes have shifted the health service from its underlying principles from the year 1979.... national Health Service (NHS 1979 and Beyond The national Health Service (NHS) is the public health care system of the United Kingdom and was established in the year 1948....
Preview sample
Airport Security: Explosives Detection Systems
3 pages (914 words) , Download 6 , Assignment
Free
"Airport security: Explosives Detection Systems" paper examines the means of detecting explosives materials in airports ranging from small to big quantities.... security checks are done on airline passengers, checked luggage, hand-carried baggage, and cargo containers.... Aviation security holds a significant part in preventing smuggling and terrorism.... The methods are mainly based on 3 principles: 1) Reasonable efforts must be exhausted to prevent terrorist access to airports; 2) Terrorists who can penetrate the initial security screening will still go through weapons detection procedures and explosives detection systems, and; 3) Aircraft systems and structure should be built in a way that minimizes any damage that could result from blasts and raises the chances of passenger survival (Marshall & Oxley 2009, p....
Preview sample
Security in Educational Institutions
2 pages (581 words) , Download 3 , Case Study
Free
In the paper 'security in Educational Institutions,' the author analyzes the case of a student, Cho Seung-Hui, who opened fire in a dormitory and classroom building killing 32 people before committing suicide.... These loopholes are the inaccessibility of the state and local police forces from getting information about illegal gun sales due to the gun lobby as well as the disdain of the security forces for abiding by the sale of firearms to people on federal watch lists of terrorism suspects....
Preview sample
Differences Between Institutionalism and Rational Choice Theory
6 pages (1500 words) , Download 2 , Essay
Free
nstitutionalism on the other hand focuses on the varied national, organizational, and sometimes the cultural, contexts within which capitalism operates (C.... f national Variation", Review of International Studies 26 (2000), 509-32; and J.... ysman, "The Myths of a 'Global Economy': Enduring national Foundations and ... n national contexts also allows institutionalists to envisage more diverse futures for the ...
Preview sample
Determinants of an Exchange Rate
9 pages (2000 words) , Download 2 , Essay
Free
In an open economy which includes foreign trade the product market is represented by the equation: C+ I+G+(X-M) =C+S+T but exports (X) are assumed to be constant and imports (M) is a function of national income Y.... For example, in a market involving dollars and pounds whereby the dollar is the domestic currency and the pound is the foreign currency, an increase in demand for foreign currency (pound) results in depreciation of the domestic currency (dollar) while an increase in supply of foreign currency leads to appreciation of the dollar until equilibrium is reached (Sercu and Uppal, 1995). ...
Preview sample
Database Security and Privacy Principles
1 pages (415 words) , Download 3 , Essay
Free
The paper "Database security and Privacy Principles" tells us about standards, security, and compliance policies.... What are the 3 Principles of Information security?... The basic tenets of information security are confidentiality, integrity, and availability.... Every element of the information security program must be designed to implement one or more of these principles.... Several laws relating to database security and privacy have been promulgated in different countries across the world....
Preview sample
3901 - 3950 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us