StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Urban African American High School Students
14 pages (3659 words) , Download 3 , Essay
Free
This essay "Urban African American High School Students" is about systemic models of influences in urban African American adolescents' development and has highlighted indigenous supportive factors that could also promote academic achievement in these individuals.... ... ... ... For example, parental involvement in school, expectations of academic achievement, and perceptions of less-democratic family decision-making styles have been shown to have positive effects on cognitive (e....
Preview sample
Establishment of Contractual Terms for Transactions Completed Online in Australian Law
15 pages (3638 words) , Download 0 , Essay
Free
This is because Australian firms including Internet Service providers are not obligated by any law to warranty the security of online transactions.... The last legal risk with online transactions is repudiation of a contract where the contractual parties have to agree on the authentication as well as the security procedures to be utilized in forming the contract.... However, even though the contractual parties may agree to different contract terms, characteristically the private key holder is responsible for any loss ensuing in case the security of the private key is compromised....
Preview sample
Is Microfinancing Empowering Women In South America
10 pages (3156 words) , Download 2 , Research Paper
Free
The eight empowerment indicators that were used are; economic security, mobility, political involvement, legal awareness, participation in household decision making, and according to descriptive statistical results collected, more than half of this indicators were met (Inter-American Bank, 2012).... Microfinancing has been an important part of the national developments systems similar to other systems such as the communications systems or the electrical development grid (Zawdie & Saad, 2011)....
Preview sample
Risk Assessment-Computing and Technology Building
15 pages (4434 words) , Download 0 , Term Paper
Free
The same result would be achieved if “fire safety programmes/security” is in placed and people are fire safety conscious.... 2007, Encyclopedia of security Management, Butterworth-Heinemann, US ... The cost/benefit analysis involves determining the variations between fire prevention and protection cost and its benefits over a specific period (national Research 1997, Council p.... Aviation fuels with improved fire safety: a proceedings, national Academies Press, US ...
Preview sample
Derivatives And Risk Management
11 pages (2750 words) , Download 4 , Essay
Free
A derivative is a security whose price is derived from one or more other assets.... Many speculators in the financial markets pay little attention to the fundamental value of a security but instead they focus more on the price fluctuations i.... This arrangement assures a hedge for the party with a security with a floating rate while giving the party with a more conservative asset the change to make speculative gains from interest rate variations (Bank of England, 2012, np)....
Preview sample
Retention Procedures in Jamie Olivers Restaurant
14 pages (3939 words) , Download 2 , Essay
Free
Some of the ways in which they can be motivated to avoid being discouraged or giving up during their training is by treating them with respect and offering reasonable payment to those who are performing well; thus, guaranteeing security (Condrey 2010, pp.... ccording to Herzberg, managers eliminate dissatisfaction by offering supportive supervision, creating a culture of dignity and respect, ensuring that the salaries are competitive, offering job security, fixing obstructive policies, and providing rational job status (Murugan 2007, pp....
Preview sample
Presidential Power as a Unique Kind of Personal Authority
9 pages (2537 words) , Download 3 , Research Paper
Free
However, Lincoln's original reasoning centered on the attempt to reestablish the security of the Union, and to prevent its destruction.... He writes, “Thus the American people began their work of western conquest as a separate and individual people, at the moment when they sprang into national life....
Preview sample
Political Violence: Left-Wing versus Right-Wing
7 pages (2081 words) , Download 0 , Research Paper
Free
wing to the latest analysis of the Department of Homeland security and the new assessment by the Office of Intelligence, the extreme right (those who are hate-oriented, majorly the anti-government groups, or those who are dedicated to work towards a single issue) emerges to be a legitimate threat that the federal government law enforcement must properly deal with....
Preview sample
Criminal Justice for Mentally Sick Offenders
35 pages (9432 words) , Download 3 , Coursework
The paper "Criminal Justice for Mentally Sick Offenders" investigates mental health acts for the special people, going through a lower state of mind, as well as in the need of proper assessment, treatment, rehabilitation, and aftercare owing to a conflict with the law.... ... ... ... Proposals have also been discussed to reform the mental health act so that people may be provided with the maximum benefits, which are an important part of our society....
Preview sample
Main Aspects of Economics and Features of Working Internationaly
8 pages (2136 words) , Download 1 , Essay
Free
The other security implication of India's economic revival would be in the ground of energy security.... As India's energy needs grow dramatically, India's basic security interest would clearly lie in ensuring a free, uninterrupted flow of energy to fuel its economic growth.... In practice these "obstacles" are usually policies or democratic processes that act on behalf of working people, labor rights, environmental protection, human rights, consumer rights, social justice, local culture, and national sovereignty”....
Preview sample
Public International Law
8 pages (2543 words) , Download 1 , Assignment
Free
very state is interested in security and a stable environment for its development.... It's the security Council.... The security Council is paralyzed when it comes to such well-known to international community issues as Afghanistan, Iraq, Chechnya....
Preview sample
Politics of the Middle East - Final Exam
15 pages (3750 words) , Download 2 , Essay
Name Instructor Course Date Politics of the Middle East Part I – Saudi Arabia The Kingdom of Saudi Arabia epitomizes the epicenter of the Islamic Religion through the presence of the religion's two most holy cities Mecca and Medina within its borders.... Hence, the kingdom's practice of Islam is enforced to the fullest through both governance and Islamic religious etiquette....
Preview sample
The EPIC ADT Application
13 pages (3591 words) , Download 2 , Essay
Free
It offers the hospital and patients' data security.... Such an advantage reduces the inspection time of patients' files and offers a better opportunity of maintaining data security.... The creation of the patient account can take into consideration the patient either using an identification tool like the national identity cards or equitable tools or use of I....
Preview sample
Impact of Poverty on Society
9 pages (2415 words) , Download 4 , Research Paper
Free
Before the liberalization of trade, cross-border trade generated a lot of tax revenues.... Apart from policy creation, some interventions such as value framework creation, economic sustained growth building, strengthening of financial systems and international monetary systems, employment creation, poverty eradication, social welfare improvement, mitigating and managing global risks, global security and sustainability ensuring, and building of institutions that are effective in a society that is empowered can help in solving poverty issues....
Preview sample
Compare and Contrast Dependency Theory and Neoliberalism
10 pages (2500 words) , Download 4 , Essay
Free
According to Nye and Keohane, the trends in globalization in respect to national and international security environment and culture and society they need military strength in order to stand.... This paper, Compare and Contrast Dependency Theory and Neoliberalism, stresses that the role of the neoliberals and dependency theories in the international relations and economic activities is significant....
Preview sample
Total War and Society between 1789 and 1945
12 pages (3000 words) , Download 2 , Dissertation
Free
The study 'Total War and Society between 1789 and 1945' has centered upon the twentieth century and mostly relate to the effects of the Second World War of 1939 to 1945 on the naval fronts and battlefields, while the social and economic spheres remained largely unexplored.... ... ... ... The author states that the eighteenth century was subsequently labeled as the 'age of war' by observers of history....
Preview sample
Succession Planning: Insurance for the Organization's Future
11 pages (3341 words) , Download 0 , Report
Free
national Civic Review, 101(2), 44-50. ... The paper "Succession Planning: Insurance for the Organization's Future" is a perfect example of a report on management.... This report provides an analysis of the role played by succession planning as insurance for an organization's future....
Preview sample
Charlotte Perkins Gilmans' Herland and Arthur Millers' Death of a Salesman
8 pages (2023 words) , Download 0 , Book Report/Review
Free
Miller's work is a critique of the contemporary society since he covertly condemns national and even global dreams such as success, prosperity and happiness as unattainable for all.... This book review "Charlotte Perkin's Gilman's Herland and Arthur Miller's Death of a Salesman" discusses literary works such as Charlotte Perkin's Gilman's Herland and Arthur Miller's Death of a Salesman tackle and perpetuate these themes by creatively showing how they affect people's lives....
Preview sample
The history of computer crimes
5 pages (1250 words) , Download 2 , Term Paper
rom 1970 to 1972, Albert the Saboteur created problems for the national Farmers Union Service Corporation of Denver.... Since the dawn of the computer and technological age, computer crimes have evolved just as intricately and as surely as the advancements and upgrades in computer technology....
Preview sample
The Impact of Race, Gender, and Political Views on Psychological Counseling
6 pages (1792 words) , Download 3 , Essay
Free
In the same way, charges of unprofessional and unethical worries with politics would arise leading to resignation, unstable job security, and frustration to the psychological therapist.... Psychological therapists should always practice within the confines training, level of education, competence, supervised experience, relevant professional experience, and their national or state professional qualifications....
Preview sample
Operational Planning and Control
5 pages (1250 words) , Download 0 , Term Paper
Free
Local industry is at times required to be protected and national security concerns are to be addressed as well.... In the paper 'Operational Planning and Control' the author analyzes how effectively a company uses its resources and maximizes production as per the market needs to meet its targets....
Preview sample
Canadas investment in the BRIC nations
12 pages (3000 words) , Download 2 , Essay
Free
It also has few threats to its security, thus can afford to spend relatively little on national defense (Pereira 2).... In the paper 'Canada's investment in the BRIC nations' the author analyzes BRIC as an acronym for the combined economies of Brazil, Russia, India and China.... He states that in the next fifty years, the four countries would be wealthier than most of the current dominating economic powers....
Preview sample
Effects of Child Abuse on Physical and Psychological Development
14 pages (3500 words) , Download 3 , Assignment
Free
or them to have a meaningful, relevant and productive childhood, their health, safety and security should be ensured.... he Third national Incidence Study of Child Abuse and Neglect (Sedlak & Broadhurst, as cited in Kesner & Robinson, 2002) indicated that schools report more cases of child abuse and neglect than any other institution.... The national Society for the Prevention of Cruelty to Children (NSPCC) decided to create a training pack for such courses with the aim ‘Child protection in initial teacher training tutor pack', given to trainee teachers as basic introductory information to prepare them for their role in protecting children from abuse....
Preview sample
The Potential Hazards and Costs of Manager's Decision of Choosing to Outsource a Function
12 pages (3452 words) , Download 2 , Essay
Free
The author of the paper "The Potential Hazards and Costs of Manager's Decision of Choosing to Outsource a Function" will begin with the statement that globalization has placed immense responsibility and need on the part of organizations to devise competitive means of operations.... ... ... ... Organizations now try to focus on their core competencies and get external service providers for their supplementary functions to gain instant access to their expertise, service levels, and synergistic benefits from the partnership of the two....
Preview sample
E-Government and E-Services
23 pages (5750 words) , Download 2 , Case Study
Services are provided promptly and at the convenience of the user and they include, access to national and municipal registries, access to investor information, online payment and money transfer, booking of traveling tickets and hotel rooms (Rutherford, 2008).... This case study describes E-government and E-services....
Preview sample
Deforestation in the United Kingdom
8 pages (2000 words) , Download 3 , Essay
Free
It also addresses rules that need to be reinforced in trade sector, energy sector, agriculture sector, food security, and development cooperation in order to ensure a coherent policy response to address deforestation and forest degradation.... national Convention on Climate Change was implemented in 2008 with the aim of acknowledgment of contribution of emissions from deforestation and degradation of forests to global man made gas emissions from greenhouses....
Preview sample
Drug Trafficking and Organised Crime in the United Kingdom
33 pages (9728 words) , Download 5 , Dissertation
NDFOC which is a major organization fighting against this rising menace claims on its website that 'Transnational organized crime is considered as one of the major threats to human security, impeding the social, economic, political and cultural development of societies worldwide....
Preview sample
Al-Qaeda in Southeast Asia
21 pages (5000 words) , Download 2 , Essay
The author discusses the security implications for the Australian government and the preventative measures that could be taken to thwart any terrorist attacks.... This fact should be kept in mind by Australian security agencies, while drawing awareness campaigns and security measures, for far too often western intelligence tends to portray these Islamic groups to indulge in terrorist activities for terror's sake....
Preview sample
Minority Leadership in the Military
10 pages (2697 words) , Download 3 , Research Paper
Free
Groups also provide a feeling of security to its members, and members feel that their interests will be protected in a group.... Cyber warfare is a new field altogether and military leaders are now working in this area to sort out ways to strengthen the security infrastructure of the country (Corrin, 2011).... Military leaders honored for cyber security efforts....
Preview sample
Negative Aspects of Social Networking Sites
9 pages (2394 words) , Download 1 , Report
Free
Using the above information it is easy to estimate the social security number of any person who is registered on Face book (Das and Sahoo, 2011).... According to a study conducted by Internet security firm Web root, it was seen that 2 out of 10 people use basic information like pet's name, birth date as password which are easily visible on social networking sites (BBC, 2010).... According to national Crime Prevention Council, it was seen that 43 % of the teenagers have been victims of cyber bullying in the last year....
Preview sample
Is Investment a Matter of Evaluating Risk or Simply Luck
18 pages (4500 words) , Download 3 , Essay
Free
Analysts use tools and charts to display changes and historical security prices.... The charts display volume of activities and prices within the security; however, at times analysts display only the price action (Lepper & Iyengar, 2006).... It is proven that the price changes in the security represent a shift in supply against demand (Sodelind, Suden, & Palme, 2005).... uflo and Saez (2009) and Thaler and Benartzi (2007) define fundamental analysis as a method that evaluates a security measure that attempts to measure the intrinsic value through related financial, economic, and quantitative and qualitative concepts....
Preview sample
Environmental Audit
6 pages (1697 words) , Download 2 , Essay
Free
(2005) also points out how there will not be much of strict hierarchy inside the MNC, as all the employees from the Managing Director to a security guard will enjoy openness and it will visible in every part of their interactions.... That is, by introducing convertibility of the national currency and liberalizing both current and capital accounts of her balance of payments, Russia fully exposed herself to globalization....
Preview sample
Media Politicization in the United Arab Emirates
6 pages (1732 words) , Download 3 , Essay
Free
Every region maintains control over its oil and mineral resources, local economic issues, inter-emirate trade and some aspects of local and regional security.... The Cabinet controls and manages the Federation on a daily basis, and the Federal national Council, the major advisory body, constitute a link between the Council and the Cabinet, as FNC officials are expected to provide consulting services to emirate leaders and make queries to the Cabinet, even though FNC has no legislative rights....
Preview sample
Recruitment and retention plan for entry level officers
2 pages (500 words) , Download 4 , Research Paper
Free
Thus, a successful recruitment plan must overcome any recruit's perceived career limitations with the following incentives: a purposeful job, a stimulating set of responsibilities, a collegial working environment, reasonable pay and benefits, opportunities for career advancement, and job security.... The Equal Employment Opportunity: Affirmative Action ensures police agencies do not discriminate on the basis of race, gender, color, religion, or national origin....
Preview sample
Health and Homelessness
12 pages (3000 words) , Download 4 , Essay
Free
There is a need for national recognition, especially when it comes to the health needs of the homeless.... 2010, ‘Evidence based public health: a review of the experience of the national Institute of Health and Clinical Excellence (NICE) of developing public health guidance in England', Social Science and Medicine, vol....
Preview sample
Managing the Employment Relationship
17 pages (4250 words) , Download 2 , Research Paper
Free
The issues that are usually brought forward by the employees are concerning selection and promotion based on merit, job security, generous employment benefits, fair salaries, and the adoption of a formal equal opportunity policy (Hyman & Mason, 1995). ... For workers it brings greater employment security and better work conditions....
Preview sample
Ethical Issues of Information Technology
16 pages (4780 words) , Download 7 , Essay
Free
In the whole of information systems management, whatever its name, the new technology radically reshapes life styles, at the same time creates challenges in the areas of privacy, property, security and individual identity (Information systems, 2007). ... However the law of the Internet touches upon a broad array of legal issues, covering nearly the entire legal landscape, including: domain name disputes, piracy of works, privacy and security of information, online defamation, First Amendment rights, pornography, enforceability of e-signatures, personal jurisdiction, contract law and click-through agreements, interference with and unlawful access to computer systems and criminal law. ...
Preview sample
The SAS Event Management Company
9 pages (2498 words) , Download 2 , Assignment
Free
The company should provide a slot for the security of the clients in the particular venues.... Other activities include celebration ceremonies such as national holidays and graduations parties.... In other scenarios, the company should put into consideration the national goals such as those set by the government concerning the preservation of the environment so as to derive the policies....
Preview sample
Climate Change News Media Coverage
13 pages (3675 words) , Download 0 , Term Paper
Free
She explained to Reuters that cuts in emissions helped to reduce poverty, build energy, food, water security, and improve public health for communities that are vulnerable.... 2011, Managing climate risks or risking a managerial climate: state, security and governance in the international climate regime, International Relations 2011 25: 330, DOI: 10.... Cities have to adapt to flood risk owing to climate change at national, international, regional, and community level....
Preview sample
What Is Shadow Banking System
10 pages (2778 words) , Download 1 , Essay
Free
It performs other activities such as underwriting debt and capital funds, acts as a link between security issuer and public investors, making markets and facilitating mergers with other associations.... A vertical link connects all shadow banks which constitute of credit hedge funds, money market mutual funds, security lenders and structured investment vehicles.... Additionally, through creation of securitized loans, part of security instruments may remain in the balance sheets of regular banks and the other, in other regular....
Preview sample
International Marketing Strategy
10 pages (2733 words) , Download 2 , Assignment
Free
ay: This want helps in satisfying physiological, security, and egoistic needs.... The underlying need of general security is also high on the list of priorities in the suggested need hierarchy of Maslow. ... Safe working conditions issue from the security need.... In addition, the work force will have job security, which will create a satisfying place to work....
Preview sample
Multi-sensory Impairments Affecting Children's Development
9 pages (2250 words) , Download 3 , Essay
Free
The aim of my professional practice is to become well versed in terms of how to support pupils with multi-sensory impairments.... My initial concern regarding two particular pupils was that due to cognitive, visual, and physical impairment, they had restricted opportunities to learn and develop.... ....
Preview sample
Sustainable Enterprise: Monitoring System
19 pages (6351 words) , Download 3 , Essay
Free
How can we provide sufficiency, security, good lives to all people? ... The Qantas Management System also for the most part focuses on occupational health and security, competency development and equal opportunities for employees.... he aspect reflects a level of security personnel training concerning human rights aspects relevant to operations ... uman rights training for security personnel ... umber of hours and security personnel ...
Preview sample
Vernacular Building - Influence of Human Surroundings on Buildings
22 pages (6336 words) , Download 2 , Essay
The paper "Vernacular Building - Influence of Human Surroundings on Buildings" highlights that generally speaking, the idea of the vernacular building can certainly be done today so long as certain concessions to the current environment are observed.... ... ... ... Vernacular architecture, in describing buildings, can range from simple primitive shelters to large building types that have a large open concept and, many times, are made up of several different architectural influences....
Preview sample
Disaster Health Management in a Community
15 pages (4323 words) , Download 0 , Assignment
Free
The strategy may include rapid, surveillance and security response.... y terming disaster a social phenomenon, disaster is depicted as a complex social construct whose occurrence and impacts extend beyond the functioning of one specific community of the functional areas or the local or national level.... hereby, disaster as a social phenomenon was interpreted in terms of social-cultural or cross-national aspects of phenomena.... According to Perry (2014), in 2005, social researchers later reviewed the dimension of their typology of disaster as social phenomena by integrating the regional, national, segmental or local community aspects....
Preview sample
An International System of Recognizable Human Rights: Conflicts of Ethics
16 pages (4000 words) , Download 2 , Research Paper
Free
Cross border enforcement of what are essentially context based rights leads to a disregard for sovereignty and potentially a violation of a nation's right to self-determination.... The Iraq War and the War on Terror have been promoted as a human rights issue, but have brought with them the "exceptional measures of racial profiling, security arrest warrants, indefinite detentions, torture, deportation, and so on" (Denike, 2008, p.... "Human rights should be wider than, and independent of, civil rights: they should provide a basis for the recognition of the dignity of human beings who do not belong together to the same political community, but only, so to speak, to the essential community of mankind, and they should be protected when the national solidarity does no longer apply, or conflicts with one another, as in the case of war" (Balibar 2007, p....
Preview sample
Heuristic versus Systematic Processing of Online Privacy Policy
10 pages (2541 words) , Download 1 , Research Paper
Free
This research paper "Heuristic versus Systematic Processing of Online Privacy Policy" presents how and why individuals mindlessly respond to a privacy policy provided by online media.... As it turns out, familiarity plays a powerful role in determining Internet user's acceptance of privacy policy....
Preview sample
Reclaiming the Ideals of Civil Liberty and Rebuilding American Democracy
26 pages (8188 words) , Download 2 , Term Paper
The paper "Reclaiming the Ideals of Civil Liberty and Rebuilding American Democracy" critically analyzes the downsizing of government, decentralizing political organizations, and building stakeholder frameworks that lead to real participation in government organizations and decisions by citizens....
Preview sample
'Gendered' realm' of international politics
13 pages (3250 words) , Download 2 , Article
Every time that a female president or national leader is elected, it is considered a historic event.... ut how liberated is the female especially when it come to leadership' How can the female voice be heard if there are no representatives of the fairer sex in national and international institutions where the heavy decisions are made' It shall be examined to what extent international relations are 'gendered', meaning, does the simple fact of being a woman work against one who aspires to be involved in international relations. ...
Preview sample
Staffing and Recruitment of the United States Military
10 pages (2500 words) , Download 2 , Term Paper
Free
The author states that recruitment in the military is a serious business which includes the security and national interests of any nation.... It's a very serious business which includes the security and national interests of any nation.... ntelligence/security/Information Operations: This department has the responsibility for handling intelligence information to determine the activities of the enemy in order to prevent them for completing their mission....
Preview sample
8851 - 8900 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us