StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Effective Physical Security
3 pages (904 words) , Download 2 , Essay
Free
This essay "Effective Physical security" discusses the development and implementation of light/modified duty programs that are dependent on the cooperative efforts of all stakeholders (employers, employees, insurers, and health practitioners).... ... ... ... Development of this program will entail having all systems in order to ascertain that all stakeholders in the workplace agree, comprehend, and know what and how to act in the case of an accident/ incident....
Preview sample
How Weakness of The League of Nations Contributed to the Collapse of Versailles System
8 pages (2351 words) , Download 1 , Essay
Free
he League of Nation was a global body formed after the end of the First World War with the aim to maintain peace between the accepted members and to provide them with proper security.... The two major aims of the league were to deal with the unfortunate disputes between the member nations and to stop war and this was known as collective security.... The key principle behind maintaining peace between nations was collective security.... For instance, if one nation attacks another, then according to the principle of collective security, all the member nations are likely to respond collectively in order to protect the victim country....
Preview sample
CB Hart Law Firm: An Information Security
11 pages (3153 words) , Download 2 , Report
Free
This report "CB Hart Law Firm: An Information security" presents information security as a key factor to assist in establishing the integrity of information.... As a law firm, it is important to handle any security issue with a lot of care to completely avoid compromising data.... unning Head: CB HART LAW FIRM: AN INFORMATION security REPORT CB Hart Law Firm: An Information security Report Insert Date: CB Hart Law Firm Executive summary The company being a Law firm involves handling of important information on cases that determines the verdicts before the judges....
Preview sample
Absorption and Marginal Costing
10 pages (2500 words) , Download 3 , Assignment
Free
The paper 'Absorption and Marginal Costing' examines a procedure of costing which incorporates only variable manufacturing costs.... These variable manufacturing costs are taken into account in the form of direct labor, direct materials, and variable manufacturing overheads.... ... ... ... The author states that in reality, the technique of marginal costing takes into consideration the behavioral features of costs by segregating the costs into fixed and variable elements....
Preview sample
A Forensic Investigative Response Approach for Suspected Security Breach
6 pages (1736 words) , Download 3 , Case Study
Free
The paper "A Forensic Investigative Response Approach for Suspected security Breach" summarizes that the security advisor should monitor all business systems for any security lapses, document the entire episode of hacking and list the security incidents, educate employees about security awareness.... Of late, wide-scale cyber-attacks have buttressed that security and safety safeguards of ICT (information and communication technology) in many infrastructures are not adequate as the aimed attacks perused by talented individuals or organizations....
Preview sample
Homeland Security for the Port of Baltimore
7 pages (1959 words) , Download 2 , Essay
Free
The paper "Homeland security for the Port of Baltimore" discusses that the security schemes and strategies the MPA develops have to be approved by the Captain of the Port, appointed by the U.... Homeland security The Port of Baltimore, in the of Maryland, the eighth largest port of the UnitedStates, handles around 22 million tons of cargo in a year.... With so much at stake, it is no doubt crucial to consider all possible threats a place like Port Baltimore may be vulnerable to and be prepared with measures to ensure the safety of the city, the people involved, the property and the security of the whole country....
Preview sample
Role of Transportation Security Agency in Protecting American Skies
44 pages (10046 words) , Download 1 , Thesis
This thesis "Role of Transportation security Agency in Protecting American Skies" aims at identifying the impact and influence of the Transportation security Agency in protecting American Skies.... This requires a thorough analysis of the literature pertaining to the Transportation security Agency.... The next chapter talks about the past and presents analysis over the policies, approaches, impact and influence of the Transportation security Agency in a critical manner....
Preview sample
Amazon: Cash Flows
5 pages (1509 words) , Download 0 , Case Study
Free
The security Exchange Commission (SEC) requires the companies to present their financial information to investors through various documentations termed as ‘filings'.... On the other hand, Amazon provides a summary of its operations through the use of filings as required by security Exchange Commission (SEC).... ross margin (Operating profit) 2,451,000 2,799,000 ...
Preview sample
Business Implications of Security on the Internet
3 pages (750 words) , Download 3 , Essay
Business Implications of security on the Internet Name: Course: Instructor: Date: Business Implications of security on the Internet The internet has transformed the way in which most businesses operate.... However, security on the internet is a major concern because it is not always guaranteed.... In instances where cyber security is breached or compromised, the internet can have far-reaching negative implications on businesses....
Preview sample
Conservation of State and National Parks
23 pages (5750 words) , Download 3 , Research Paper
The author of this research paper states that a national park is a natural or semi-natural land which is reserved.... However, in most cases, the national parks are under the national governments hence.... Yellowstone national Park was among the first parks to be established in 1872.... The protection and the conservation of the national parks in the U.... are under the national Parks Conservation Association (NPCA)....
Preview sample
Nike: Financial Performance
4 pages (1223 words) , Download 3 , Essay
Free
Nike has maintained the efficiency of the company's operations over the two years and has maintained a margin of approximately 45%.... ross Profit margin ... he Gross Profit margin represents the efficiency and effectiveness of the company's production facilities and the management.... The stability of the gross profit margin also denotes the stability of the accounting policies being followed by the company.... et margin ...
Preview sample
The Competitive Advantage of Nations
6 pages (1599 words) , Download 2 , Essay
Free
influence, authority, and focus has diminished Weak transitional “security Blanket” Retraining system Pension security Health insurance access and mobility Unnecessary cost of doing business.... This framework is known as Porter's ‘diamond' of national Competitive Advantage.... Differences in national values, culture, economic structures, institutions, and histories all contribute to competitive success....
Preview sample
Network Security The Past, Present, and Future
13 pages (3250 words) , Download 3 , Research Paper
Free
According to the findings, it can, therefore, be said that the aim of ceasing any undesired intrusion in one's system is encapsulated by one of the most vital areas of computer sciences- Network security.... Title: Network security – The Past, Present, and Future.... Introduction to Network security ... The aim of ceasing any undesired intrusion in one's system is encapsulated by one of the most vital areas of computer sciences- Network security....
Preview sample
Financial and Managerial Accounting: PepsiCo
7 pages (1750 words) , Download 3 , Case Study
Free
ross Profit margin ... perating Income margin ... he Gross Profit margin is a vital measure from an investment's point of view as it represents the efficiency of the company's production facilities and the management.... Pepsi has maintained the gross profit margin over 50% for the last three years and leads the industry as provider of one of the highest margins as compared to its competitors (Bloomberg, 2010).... Pepsi has more or less a consistent operating margin over the three years....
Preview sample
Construction Economics
7 pages (1750 words) , Download 2 , Assignment
Free
The rise in prices within the national and local construction industry indicates that the economy heavily relies on the construction industry.... The high levels of inflation result to reduced customer spending and low profit margin for companies.... The construction industry is among the most essential industry in the global economy....
Preview sample
Financial Analysis of Netflix
5 pages (1607 words) , Download 3 , Essay
Free
The cost of sales has also risen but looking at the overall gross profit margin, we see a rising trend.... 1 Profit margin, % 7.... Profit margins have reduced in 2011 as compared to 2010 but the overall trend is of increase in the profit margin....
Preview sample
National Identity Construction in Everyday Life
13 pages (3686 words) , Download 3 , Essay
Free
That means that Muslims and Middle East will be more acceptable and far better choice for the example of correlation between religion and national identity.... The paper "national Identity Construction in Everyday Life" describes that national identity is a complex mechanism that is affected by different factors every day.... People form their national views and relate their existence with the existence of the nation that surrounds them....
Preview sample
Immovable Magic
8 pages (2082 words) , Download 1 , Literature review
Free
This literature review "Immovable Magic" focuses on the article by Jaervinen that looks at Bourdieu's work with regard to gender inequality.... It seeks to look at some broader issues.... The article evaluates the issue of gender inequality and looks at how various inequalities are achieved.... ....
Preview sample
US Presidential Debates 2012
9 pages (2438 words) , Download 3 , Research Paper
Free
When questioned about who would do a better job in handling terrorism and national security, Obama received 64% and Romney 36%.... Works Cited Arquilla, John, “Fight Night,” FP national security Online, Rational Security, 10/22/2012, http://www.... OUTLINE OF BARACK OBAMA'S FOREIGN POLICY SUCCESSES The Obama/Biden website shows how he has ended the war in Iraq, returning control and security to the people of Iraq so that they can conduct their affairs on their own....
Preview sample
The Role of Information Security Policy
5 pages (1455 words) , Download 1 , Coursework
Free
The author of "The Role of Information security Policy" paper explores the various measures a company can take to safeguard its information theft and other elements.... Information security is vital to a company since it stores most of its information in large servers, which have the capacity of storing large amounts of data.... The role of information security policy Information security policy refers to the practice of protecting valuable information and data from unauthorized individuals or corporations who wish to disclose, disrupt or destroy the reputation of the company....
Preview sample
Political Science - Nations vs States vs Nation-States
2 pages (500 words) , Download 3 , Essay
Free
Nonetheless, the state people still share the sentiment of national harmony and form diverse nations.... Nations versus States versus Nation-States [Course] [Professor] Nations versus States versus Nation-States The terms, nation and state, are sometimes used interchangeably.... The ‘One Nation, One State' principle by the 28th U....
Preview sample
Dunkin Brands, Inc - Financial Ratios, Industry Performance, Cash Flow, Corporate Governance
9 pages (1700 words) , Download 0
Free
Hence, the stock is undervalued, and is therefore expected to deliver value to an investor over the next year with the expected appreciation on the share price. ... ross profit margin ... Looking at the company's profitability, there was no significant change in terms of gross profit margin and return on assets ratios....
Preview sample
The Effects of CPTED on the Incidence and Fear of Crime
9 pages (2636 words) , Download 0 , Essay
Free
In the modern world, security is of crucial importance to any individual, organization or even a country.... This paper will look into the role played by the incorporation of security hardware, the design of the site and psychology in developing a crime free environment. ... This approach is valid because it integrates security in our structures and the built environment.... This organization further asserts that such integration creates a discreet security system hence influencing the psychological condition of the potential criminal in that it creates the impression that one is being watched the preventive aspect hence....
Preview sample
Corporate Finance and Derivatives
11 pages (2750 words) , Download 2 , Assignment
Free
The security or the mortgages on these loans were the houses that these borrowers were using the home loans to buy. ... he pension fund paid annual premiums (say 2% of the notional principal amount of $ 150 million) to AIG in return for which AIG contracted to pay for any losses that would accrue to CalPERS in the event of default on its mortgage based security bonds. ... Risk, Crisis and security Management.... multi-national corporation operating in different countries of the world is exposed to the foreign exchange risk....
Preview sample
The Issue of Security in an Organization
6 pages (1582 words) , Download 2 , Coursework
Free
The paper "The Issue of security in an Organization " highlights that any form of revision that is to be carried out on the policies developed should be done at the management's discretion also bearing in mind the changes that take place in the I.... The issue of security in an organization is something that should be treated very carefully.... This is particularly because there are a lot of associated repercussions in the event that there is a lapse in a firm's security policies....
Preview sample
Why do uae nationals don't use public transportation
4 pages (1000 words) , Download 3 , Research Paper
As such, many are completely out of order and closed down, while some have inadequate power (national Editorial, 2014).... The transport sector comprises both the private and public sector.... For a functional transport sector, there has to be a unique balance between the private and public sector....
Preview sample
Three Main Aspects of Privacy
5 pages (1281 words) , Download 2 , Essay
Free
Through the use of satellites, human agents and other technologies, governments are able to keep a close eye on what people are doing in public and therefore avert possible security breaches and as a result terrorist activities.... From the paper "Three Main Aspects of Privacy" it is clear that privacy in private essentially means the right to be left alone whenever one is in his or her own protected space....
Preview sample
Financial ratios analysis
4 pages (1000 words) , Download 2 , Essay
The company Marks and Spencer's is one of the biggest retailers in the United Kingdom, providing quality and stylish clothing and home products to consumers.... They are currently employing about 75,000 people in the United Kingdom and abroad.... They recently launched a five-year.... ... ... According to this plan, they will not send any waste to landfill by 2012....
Preview sample
Network Security as a Business Benefit
6 pages (1701 words) , Download 3 , Case Study
Free
The paper "Network security as a Business Benefit" develops the assumption every organization needs its own proper security system to maintain its reputation.... Network security refers to any activities designed to protect your network.... NETWORK security S.... # Table of Contents Page Introduction to Network security 3 2 Role of Network security: How does it protects you 4 3 Concept of network security 4 4 Types of Attack System 6 5 Network security as a Business Benefit 9 6 security Management 9 7 Summary 10 8 References 12 NETWORK security Network can be defined as 'any set of interlinking lines resembling a net, for example, ‘a network of Roads '....
Preview sample
Assessment of the Criteria DTAs&DTLs
9 pages (2690 words) , Download 2 , Research Paper
Free
Dukes, 1972, Interperiod tax allocation, earnings expectations and the behavior of security prices, Accounting Review vol.... Net Profit margin, Current Ratio, Total Asset Turnover and Debt Ratio are used to analyze the performances of both companies in three years.... et Profit margin ... et Profit margin ... et Profit margin ... et Profit margin ... et Profit margin ... et Profit margin ...
Preview sample
Information Security Strategy for Jashoppers Core Business
3 pages (890 words) , Download 7 , Case Study
Free
The paper "Information security Strategy for Jashopper's Core Business" identifies strategy objectives for information security that will meet the needs of Jashopper and relevant constraints in developing and implementing information security strategy for Jashopper.... Information security is the protection of information and systems from unauthorized access, disclosure, modification, destruction, or disruption (Steve, 2008)....
Preview sample
The United Nations Mission In Sierra Leone
6 pages (1500 words) , Download 2 , Essay
Free
8 Due to continued conflict between the rebels and the government, the UN security Council gave nod for the establishment UNAMSIL (United Nations Mission in Sierra Leone).... On February 7, 2000, the security Council revised the mandate of UNAMSIL by adding more tasks.... The Mission can be said to have been extremely successful as it completed its duties as assigned by the UN security Council.... 20 Faced with this reality, the UN security Council brought in a new mission—the United Nations Integrated Office for Sierra Leone (UNIOSIL)....
Preview sample
Supply Chain Security after 9/11
6 pages (1895 words) , Download 2 , Essay
Free
The paper "Supply Chain security after 9/11" discusses that we should not blame our security mismanagement as a terrorist attack, and should focus more on improving security procedures so that all security threats or attacks could be made impossible for the opposite enemy entity.... Then they will have to ensure that shipment is safely secured with locks, security code systems, or through tamper-proof seals.... Running Head: Supply Chain security after 9/11 "Supply Chain security after 9/11" of Institute] Tables of Content Tables of Content 2 ...
Preview sample
British Airways and Virgin Atlantic
4 pages (2053 words) , Download 2 , Essay
Free
Innovation in production technologies and computerized system of services is the main advantage of Virgin Atlantic obtain a strong market position because the technological advances maximizes security of customers and fasten the process of informational interchange.... Virgin Atlantic has to spend its own resources in order to meet the requirements focusing on technological efforts, security and internet support.... It should be well aware of national market and have specializing units in direct marketing, marketing services, public relations, and research....
Preview sample
Impact of National Culture on Organisational Culture
4 pages (1484 words) , Download 2 , Literature review
Free
The complexity and the differences that arise between organisational and national culture gives rise to entities which are beyond expectation.... The paper "Impact of national Culture on Organisational Culture" states that the effects of cultural differences between organizations and nations are not new to the world of business, but, what is important is the appropriate management and handling of these issues.... mpact of national Culture on Organisational Culture Table of Content Introduction 3 Literature Review 3 Conclusion 7 Reference 7 Bibliography 10 Introduction The topic in question here is “Effects of difference between organisational cultures of global companies and the cultures of countries in which they operate”?...
Preview sample
The Nature Of Surveillance, Surveillance Implications for Security
6 pages (2067 words) , Download 0 , Coursework
Free
The paper "The Nature Of Surveillance, Surveillance Implications for security " is a great example of information technology coursework.... Surveillance practices and technologies are extensively used in various sectors that include security and police force, companies, hospitals, organizations, government, and retail stores among other places.... The paper "The Nature Of Surveillance, Surveillance Implications for security " is a great example of information technology coursework....
Preview sample
Does social security adversely affect savings
4 pages (1000 words) , Download 2 , Essay
The Social security program has been encouraged by many financial agencies, and many countries around the world have reflected their aptitude towards the adoption of similar program, for offering incentives to its local retired officers.... The program Social security has offered an assurance to the individuals that, they'll be offered possible financial assistance after the end of professional services. ... But, if we monitor the financial activities around, we observe that the local banks are in much better position to offer interest on that particular amount after maturity, as compare with the government's social security taxes....
Preview sample
Practical Apps in Cyber Security Management
8 pages (2381 words) , Download 3 , Report
Free
This report "Practical Apps in Cyber security Management" presents information obtained during Gap analysis as one of the most essential assets required by Bank Solutions, Inc.... Practical Apps in Cyber security Management Bank Solutions, Inc - Gap Analysis Introduction Information obtained during Gap analysis isone of the most essential assets required by Bank Solutions, Inc.... The recovery plan works irrespective of the situation whether it is a national calamity or a mere power blackout. ...
Preview sample
Conservation of State and National Parks
23 pages (5801 words) , Download 2 , Research Paper
The paper "Conservation of State and national Parks" highlights that representing the National Park System has to expand extensively in order to fully represent the classic landscapes, ecosystems, and the variety of the American history and culture in full range.... The national parks in the US are faced with several major issues which include; insufficient funds, crumbling history, wildlife management, foreign invaders, adjacent development, climate change, water shortage, air pollution, poor infrastructure, all-terrain vehicles (ATV), and the visitor's experience....
Preview sample
The Security Sector in the Arab World
6 pages (1677 words) , Download 2 , Essay
Free
The paper "The security Sector in the Arab World" describes that the security sector in the Arab world is among the most influential in almost all the aspects of life within this region.... The Syrian security forces seized the opportunity to further stabilize Lebanon during the Lebanese war of 1982, which drove the PLO out of the country.... As a result of Israel being pressured into withdrawing, the Syrian security forces were able to consolidate their power in Lebanon and effectively come to dominate it....
Preview sample
Network Security through the protocol
6 pages (2455 words) , Download 2 , Essay
All the data which are sent in the network are transferred in the form of packets.... For example, when you send a mail across the internet the mail transfers in the form of packets.... These packets are transferred through the protocol.... Internet uses the Transmission control protocol (TCP)....
Preview sample
Risk Assessment for Effective Physical Security
8 pages (2018 words) , Download 2 , Essay
Free
The paper "Risk Assessment for Effective Physical security" justifies the point physical security threats are as detrimental to an organization as non-physical attacks.... It is imperative that risk assessment be conducted on the various security measures that can be undertaken.... Physical security threats are great for all organizations.... Physical security is important for companies that have an information technology system that stores the organization's sensitive data....
Preview sample
Evaluation of Data and System Security
3 pages (750 words) , Download 2 , Coursework
Classically, computer security has been about systems of prevention.... An organisation or company has to have security in place to protect it from attacks.... The difficulty in getting this right depends upon the company and its products, if it manufactures then there is an added problem building security into its Information Technology and Telecoms (IT & T) structure on the shop floor which is not present if it is something like a bank or college which has a whole set of differing demands on security and who and where to watch for major attacks....
Preview sample
Financial Analysis Emerald Energy Plc
9 pages (2815 words) , Download 2 , Case Study
Free
enerally, the higher the value of the ratio, thelarger is the margin of safetythatthe company possesses to cover short-term debts.... The gross profit margin, operating profit margin, and net income as a percentage of total turnover present a realistic view of the firm's ability to generate profits.... The gross profit margin, operating profit margin and net income as a percentage of total turnover presents a realistic view of the firm's ability to generate profits....
Preview sample
The Impact of Totalitarian Dictatorship upon National Cinemas: The Case of Nazi Germany
18 pages (4742 words) , Download 2 , Essay
Free
azi Germany and national Cinema ... After the groundbreaking research of the 1970s, scholars have from then on broadened the range to take in not just other totalitarian states but also liberal democracies where cinema was employed to endorse social solidarity and national harmony (Brockmann 269).... Movies about Nazi heroes, like Hitlerjunge Quex and Hans Westmar were careless propagandistic efforts that depicted the conflict between Communists and national Socialists as a moral struggle and portrayed their main characters sacrificing their lives for the movement (Welch 150-151)....
Preview sample
Will National and Global Democracy Survive
11 pages (3273 words) , Download 2 , Essay
Free
This essay "Will national and Global Democracy Survive" aims to develop sound and well-documented answers to the possible impact of the collapse of the Internet and the effect this would have on globalization, specifically in international politics and democracy.... Without the Internet, Will national and Global Democracy Survive?... In order to empirically assess the potential effects of the collapse of the Internet to democratic institutions on the national and international levels, two research questions would be tested in the study using methodologies applied in social research....
Preview sample
National Integrated Ballistic Information Network
2 pages (500 words) , Download 4 , Essay
Free
In the essay 'national Integrated Ballistic Information Network' the author analyzes NIBIN, the acronym for national Integrated Ballistic Information Network.... NIBIN is the acronym for national Integrated Ballistic Information Network.... In 1999, the Bureau of Alcohol Tobacco and Firearms initiated NIBIN....
Preview sample
Collective security as an approach to peace
4 pages (1000 words) , Download 2 , Essay
While this is rightly the assumption of collective security apparently, there are other underlying political and economic factors that.... The failure and inefficiency of collective security to deter wars is evident from the wars throughout the history in general and in the recent history in Collective security movements, organizations, and agencies turn a deaf ear to the pain and plight of mass-murder and ethnic cleansing of the Rohingya Muslims in Burma....
Preview sample
EISA: Evaluating and Meeting the Security Needs
2 pages (500 words) , Download 2 , Research Paper
Free
Various researches have proven that the employees in the department contribute a whole lot to the security of the department's information asset.... The paper gives an analysis of the information security EISA: Evaluating and Meeting the security Needs Number The security of an organization's information technology infrastructureis highly crucial.... Various researches have proven that the employees in the department contribute a whole lot to the security of the department's information asset....
Preview sample
The Concept of International Security in the Global Era
9 pages (2596 words) , Download 2 , Term Paper
Free
They offer people some kind of ‘the best world', and the new transnational and electronic media are trying to distract people from the negative consequences of globalization and national civil tasks, destroying the people's loyalty to their states.... The paper 'The Concept of International security in the Global Era' presents the discussion of the question of international security in the global era.... The main question to be answered is whether the concepts of international security should be expanded beyond the notions of military force....
Preview sample
4851 - 4900 results of 192556 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us