StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The economic consequences for Ukraine in joining the Russia-Belarus-Kazakhstan customs union
60 pages (15000 words) , Download 3 , Thesis
This thesis will look at the overall status of the Customs Union created by three countries in 2010: Russia, Kazakhstan and with Belarus, which joined later in that year.... .... ... ... The focus will be on the Ukraine, its current economic status, how it is faring as an outsider to the union right now and what the repercussions, for good or bad, might be should it also join the Customs Union (CU)....
Preview sample
What is European Security
20 pages (5000 words) , Download 2 , Essay
The concept of security has become.... The level at which security influences the rules and the policies of the European authorities but also of the member states is being differentiated under the influence of the political, social and One of the most important difficulties when trying to develop effective security schemes has been the identification of the conditions under which these schemes will operate; another issue in regard to the above initiative is the understanding of the needs that these schemes will serve....
Preview sample
Operations Management
14 pages (3500 words) , Download 4 , Assignment
Free
Accenture has also employed ISO (international standardization for organisations) standards like ISO 14001 for environment standards, ISO 27001 series for information security measures.... Research and evidence indicate that HR practices of one country may not be equally effective in other locations, due to the impact of national culture, societal beliefs and communication differences....
Preview sample
An Overview Of The Law
13 pages (3000 words) , Download 2 , Essay
Free
As at now, the law, to some extent, has been rendered ineffectual following the admission by the national government that only some sections of the statute would be put into effect when it was enacted in effect in 2010.... An essay "An Overview Of The Law" reports that the law seeks fair treatment in recruitment programs carried out by the government and the private sector, by diffusing the notions based on discriminatory factors such as age, marital status, spirituality or faith, gender, and sexual orientation....
Preview sample
Performance of ITV1 Through the Firms Strategic Analysis
11 pages (2750 words) , Download 2 , Research Paper
Free
It should be noted though that these benefits seem to be differentiated according to a firm's market position and the conditions of the market, for example the competition, the performance of the national economy and so on.... The current paper focuses on the strategic decisions of ITV1, an important competitor in the British TV industry....
Preview sample
Transportation Security Administration
2 pages (500 words) , Download 2 , Assignment
Free
The author of this assignment "Transportation Security Administration" focuses on the Customs border Protection which is among the largest and very complex department from within the Homeland Security.... In this day and age, technologies are being used to enhance the security of the US border including TSA Pre-Check system, Risk-based security, RBS and next-generation A2X-Ray units that assist border officers to identify any incoming threats....
Preview sample
Learning Organization and Human Motivation
10 pages (2500 words) , Download 3 , Essay
Free
heory X: Work is inherently distasteful; most people are not ambitious, motivation is only at physiological and security levels, most people are self-centred, resist change and are unintelligent (Envision, 1998 – 2005). ... This essay "Learning Organization and Human Motivation" shall critically examine learning theories and how they apply to the modern workplace in the light of the statement that the manager who wants a commitment from employees is advised to provide them with lots of learning opportunities....
Preview sample
The Prudence of Numerous Perspectives on Organizational Change
13 pages (3432 words) , Download 2 , Essay
Free
elznick, suggest five pertinent imperatives of the organism model, security, stability of authority and information, stability of informal relations with the organization, continuity of policy and the uniformity of outlook (Grieves 2010, p.... This essay "The Prudence of Numerous Perspectives on Organizational Change" evaluates the diverse drivers for change, it evaluates external and internal drivers....
Preview sample
Homeland Security
4 pages (1000 words) , Download 2 , Coursework
Free
According to the research, Federal Emergency Management Agency or FEMA is an organization created with the US Department of Homeland security.... Homeland security ... epartment of Homeland security or DHS is a cabinet department within the United States that was as a reaction to the 9/11 terrorist attack.... ederal Emergency Management Agency or FEMA is an organization created with the US Department of Homeland security.... he National Infrastructure Protection Plan or NIPP is plan developed by the Department of Homeland security....
Preview sample
Human rights among the dominican republic and haitian border
8 pages (2000 words) , Download 2 , Research Paper
Free
Study on Dominican-Haitian border human rights violation Chapter Introduction Background information Immigration has been a common practice within the human cultures where people move from and into other countries on such grounds as search of employment, as refugees or asylum seekers or even for trade.... Chapter 2: Literature review In an analysis of the increased violation of human rights by the Dominicans towards the Haitians a along the border, Cloud noted that migration of persons from Haiti have been gradual and at alarming rates in the past....
Preview sample
BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK
1 pages (250 words) , Download 4 , Research Paper
Free
Every border troop controls and BORDER SURVEILLANCE USING WIRELESS SENSOR NETWORK Introduction Border patrol systems have lately got interest to tackle the concerns regarding national security.... Conventional boundary patrol system comprises security checkpoints along with border troops.... Every border troop controls and watches a specific segment of the border.... The troops guard the border according to prearranged route as well as the time interval (Ammari 12)....
Preview sample
What has been the impact of World Bank upon development in the south
15 pages (3750 words) , Download 4 , Essay
Free
The SAPs have failed because they have always overlooked the microeconomic factors of risk in the adjustment.... n Ghana the macroeconomic reforms designed to save the economies of the countries were not backed by specific measures for removal of the constraints.... ... ... ... What has been the impact of World Bank upon development in the south?...
Preview sample
Terrorism and Internal Security
8 pages (2402 words) , Download 0 , Annotated Bibliography
Free
Perl concludes by pointing out that terrorism has become a global phenomenon, and the US policymakers are currently facing the challenge of capitalizing on global collaboration and support without overlooking other crucial national security issues in the nation.... The paper "Terrorism and Internal security" discusses that researchers have pointed out that terrorism is adopting new trends towards loosely organized terrorist groups such as the AL Qaeda, which are posing a greater threat to nations compared to the traditional terrorist units....
Preview sample
Globalization and Security
5 pages (1499 words) , Download 0 , Assignment
Free
Terrorism became a threat to global security rather than national security due to the progress of globalization Globalization has been discussed far and wide to have both positive and negative impact on the global society.... The fast changing global system is rapidly eroding the old boundaries between foreign and domestic affairs, and those between economics and national security.... national security and foreign policy interests, as well as the long-term needs of most of the world's people....
Preview sample
Network Security setup
7 pages (1985 words) , Download 2 , Research Paper
Free
The necessary security measure here is installation of updated anti-spyware and antivirus.... Running Header: Network security setup Part security layers outline for Richman investment IT infrastructure domain ... The necessary security measure here is installation of updated anti-spyware and antivirus.... Protection communication, system hardening and proper positioning of the workstations are also critical security measure at this stage2....
Preview sample
Whats So Great about Money
24 pages (6000 words) , Download 2 , Research Paper
In this paper, What's So Great about Money?... you will be engaged by the heroic efforts of volunteers such as Julia Butterfly Hill and the conductors for the Underground Railroad, who achieved success by volunteering time but not money.... Julia Butterfly Hill acted out and climbed up a tree to live....
Preview sample
Lobby Groups Lobbying the EU on Behalf of British Fishermen
10 pages (2992 words) , Download 0 , Case Study
Free
The aim of conducting education programs is to promote controlled fishing that will ensure an increase in fish production and financial security for people in the fishing industry.... The study "Lobby Groups Lobbying the EU on Behalf of British Fishermen" focuses on the critical multifaceted and thorough analysis of the main types of actors involved in lobbying the EU on behalf of British fishermen and develops an appropriate strategy for such an actor....
Preview sample
Evolution of Corporate Social Responsibility
9 pages (3112 words) , Download 4 , Essay
Free
Unstable business periods may intensify the need for CSR to ensure social harmony, security and stability.... The paper "Evolution of Corporate Social Responsibility" describes that CSR should be implemented conscientiously with a good sense of balance between working towards the welfare of stakeholders and staying within budget so as not to upset the company's finances....
Preview sample
Mysticism and Its Phenomenon in the Culture
12 pages (3492 words) , Download 1 , Essay
Free
eightened security, the resolution of personal problems, favorable modifications in behavior, ... The essay "Mysticism and Its Phenomenon in the Culture" explains mysticism as a mystery at work in humans and mostly among those with deep religious orientation.... ... ... ... As conclusion, mysticism is already ingrained in man's culture as history reveals....
Preview sample
Overtime Practices in Germany
12 pages (3008 words) , Download 0 , Case Study
Free
There will be social security contributions. ... The paper 'Overtime Practices in Germany' is an affecting example of a case study on human resources.... The term of wages and benefits can be said to vary considerably among industries and depending on whether or not the company is subjected to a collective bargaining environment....
Preview sample
The Relevance of Organisational Change
10 pages (2500 words) , Download 2 , Essay
Free
) Sense of loss: According to Riches (1998), employees in an organisation undergoing change experience a sense of loss, either because they are actually facing tangible loss in terms of losing incentives or, intangible, emotional losses like losing a valued colleague to right-sizing, or even losing the sense of security that familiar procedures brought to them, which have now been totally transformed into the unfamiliar....
Preview sample
Current Threats to the UK Security
8 pages (2145 words) , Download 2 , Essay
Free
____________ ID: ________ _________ Current threats to UK security the most significant threats to which UK is confronted today started in 2002 when the UK's Economic and Social Research Council (ESRC) realized the presence of security intimidations in 'International' as well as 'Northern Ireland Domestic terrorism'.... Britain at that time was either over confident of the national security or may be it did not consider the terror attacks and International terrorism due to which it made a mistake of ignoring threats from Al-Qaeda....
Preview sample
Governance for security
14 pages (3500 words) , Download 2 , Essay
QUESTION #1: In the light of the privatisation and fragmentation of security, is there any value in insisting that internal security is a public good that should be provided by the state?... Historically, Weber's theory is positioned at a time when the modern State was first mobilizing its police force on military organization patterns in the defense of domestic security.... The State security forces can be categorized as domestic and related to police forces or international and related to military forces....
Preview sample
Why Humans Need More Effective Communication
14 pages (3500 words) , Download 3 , Research Paper
Free
Secondly, security and protection are next in the list of needs that humans endeavor to fulfill.... The paper 'Why Humans Need More Effective Communication' intends to draw conclusions that the way we communicate develops our doings and form our habits, and hence – our character and personality....
Preview sample
Does the Restorative Justice System Work in the English Criminal Justice System
55 pages (13750 words) , Download 4 , Research Paper
The focus of this paper is to critically evaluate whether a restorative justice system works in the English criminal legal system.... In doing so, this paper will evaluate the utility of a restorative justice system by considering the implications of the process for victims and offenders.... ... ...
Preview sample
The Position of Management and Leadership
13 pages (3798 words) , Download 1 , Assignment
Free
One of the most apparent similarities is the fact that both the position of management and leadership require certain similar skills for instance: Proper inter-personal skills, which can also be referred as proper social skills.... The success of business organizations in the.... ... ... The paper 'The Position of Management and Leadership' is a great example of a management assignment....
Preview sample
How can US Small business survive in a Global Economy
34 pages (8500 words) , Download 2 , Research Proposal
Preview sample
Knowledge Management, Organizational Trust, and Innovation in UAE
13 pages (3744 words) , Download 3 , Essay
Free
It has received an elevation from the status of an organisational asset to that of a national asset.... The paper "Knowledge Management, Organizational Trust, and Innovation in UAE" deals with knowledge management as a relatively modern concept in the domain of business.... It refers to the integration of the knowledge of the individual members of an organization into organizational knowledge....
Preview sample
Mexican Trade and Exports
10 pages (2500 words) , Download 2 , Research Paper
It is presently much simpler to market items into the mexican market, provided that just four import protocols are required for a home or overseas enterprise to purchase items or services abroad and bring them into the nation to worth increase or to sell.... Name Institution Course Instructor Date mexican Trade and Exports Trade is a significant apparatus in the legislators' economic growth toolbox.... From the time of North American Free trade Agreement (NAFTA) endorsement, and provided the harmonization of the US and mexican markets, joint trade has developed exponentially, attaining a record mark of $400 billion in 2010....
Preview sample
Food Security in Brazil
6 pages (2073 words) , Download 1 , Coursework
Free
This work "Food security in Brazil" describes the management of food and food security in Brazil.... In general, the report will help to come up with better methods of food management and thus increase food security.... Food security in Brazil     By         Location Table of Content Food security in Brazil ABBREVIATIONS/Acronyms 3 ... ccording to the World Health Organization website, The World Food Summit of 1996 sough to define food security noting that it exists “when all people at all times have access to sufficient, safe, nutritious food to maintain a healthy and active life”....
Preview sample
Difference in Practices of Ethnic Entrepreneurship
11 pages (3052 words) , Download 3 , Essay
Free
ehavior and characteristics of ethnic entrepreneurs has caused much debate, many academics have stamped their authority on the subject by declaring five, six or even more than ten key characteristics of an entrepreneur, in many cases this research contradicts one another and these characteristics differ across national boundaries....
Preview sample
Security Service
11 pages (2876 words) , Download 3 , Essay
Free
Intelligence and national security, Volume 5 Issue 4 1990, Routledge Publisher. ... The national security Strategy: Implications for he UK intelligence community:http://cicentre.... This essay "security Service" is about the body that is charged with the responsibility of ensuring the security of the UK citizens.... The security service is a composition of several coordinated roles that are mandated to ensure that security is prevalent within the nation....
Preview sample
Effectiveness of Management Training in Saudi Arabia SMEs
19 pages (5685 words) , Download 3 , Essay
Free
As suggested by Enderwick (2003) nations might now have to choose between liberty and security. ... audi Arabian SMEs consist of more than 55% of the total national industry.... Generally, the paper "Effectiveness of Management Training in Saudi Arabia SMEs" argues effectiveness of the transfer of training is defined by consensus between participants and their senior management, better communication, teamwork, and decision making....
Preview sample
Chinese Monetary and Exchange System Reform
45 pages (11250 words) , Download 2 , Dissertation
These are very necessary measures for accommodating freedom of cross-border capital flows and can provide China chances of making meaningful progress in banking reform in the next three to five years.... This dissertation concerns the reform of the Chinese monetary and exchange system....
Preview sample
Adopting Linear Wireless Sensor Networks for Border Monitoring
9 pages (2609 words) , Download 1 , Literature review
Free
It is a matter of national security and safe borders make up for safer cities.... In modern times the border patrolling has become a challenge and requires high degree of accuracy.... n modern times the border patrolling has become a challenge and requires high degree of accuracy.... In past the border monitoring was conducted through manual means of physical check posts or the placing of an entire military unit.... The best form of border surveillance involves minimal human intervention which comes in form of installing of wireless sensor networks that detect the motion in the vicinity and respond accordingly....
Preview sample
Asia-Pacific Security
11 pages (2941 words) , Download 0 , Article
Free
This article ''Asia-Pacific security'' is a documented speech of the U.... secretary had several proposals for the continuity and success of the region, by mentioning critical issues such as technology, security, effective governance and educational institutions. ... Eventually, China supported a statement and resolution mandate from the UN security Council, requiring a significant sanction regime.... The role of East Timor's security institutions in national integration and disintegration....
Preview sample
Learning Plan for Autistic Children
14 pages (4019 words) , Download 4 , Assignment
Free
The second level is his security needs that would serve to reduce his nervousness and create a conducive learning environment.... The paper "Learning Plan for Autistic Children" highlights that the section has thoroughly reviewed the learning outcomes with children with autism taking into account the three theories of learning namely behaviorism, cognition, and humanistic approach....
Preview sample
What drives social entrepreneurs
10 pages (2500 words) , Download 3 , Research Proposal
Social entrepreneurs are featured in such documentaries recognized nationally as the “New Heroes” documentary by the Public.... ... ... Long-standing fellowship programs supported by such philanthropies as the Draper Richards Foundation, the Catherine Reynolds Foundation, and Skoll Foundation, and sponsored by the Echoing Green Foundation and Ashoka Social entrepreneurship (SE) in most countries is defined as an activity that aims to advance the human life and seek a solution to the social problem....
Preview sample
Network Security Best Practices
8 pages (2287 words) , Download 3 , Essay
Free
From the paper "Network security Best Practices" it is clear that Regular maintenance of a network is vital to its security.... Based on the best practices for a secure network listed above, a company should then review and update its security policy.... The document should never be considered complete, as threats are continually adapting, and in this way, so should the security policy.... Network security Best Practices Bryant Wiersema July 28, ISSC421 B002 Sum 13 Backherms American Public I....
Preview sample
Cyber Security and Business
6 pages (1500 words) , Download 4 , Term Paper
Free
Cybersecurity is very significant in that it will assist guard business and consumers, will bring important infrastructures on which the economy relies on, and improve national security.... Cybersecuirty will assist guard business and consumers, will bring important infrastructures on which the economy relies on, and improve national security.... The government is justified in telling the private sector how to enhance or improve cyber security because there is urgent need to protect and secure our processors/computers , financial institutions, confidential information on national security and other significant aspects of the governments infrastructure (Kirby n....
Preview sample
China's Development - From the Early Modern to the Modern Period
12 pages (3564 words) , Download 4 , Essay
Free
Paper presented ath the Regional Conference on national Poverty Reduction Strategies, organized by the World Bank and the United Nations Development Programme (UNDP).... The paper "China's Development - From the Early Modern to the Modern Period" argues that China is a vastly growing country and the world has not recognized this....
Preview sample
Management and Information Security
12 pages (3359 words) , Download 0 , Assignment
Free
The paper "Management and Information security" is a perfect example of an assignment on management.... In order to achieve full access control, with respect to information security, two approaches are taken simultaneously (ProProfs, 2005).... The paper "Management and Information security" is a perfect example of an assignment on management.... In order to achieve full access control, with respect to information security, two approaches are taken simultaneously (ProProfs, 2005)....
Preview sample
Photomontage in the 20th Century
38 pages (9500 words) , Download 2 , Essay
The purpose of this essay 'Photomontage in the 20th Century' is to illustrate initial rapport of this art and advertising by comparing their core and their influence on the society in artistic and commercial levels, and estimating the role of heavily signified graphic arts as a communication tool....
Preview sample
Paiute Native Americans and Mexican Americans in Nevada
4 pages (1375 words) , Download 2 , Research Paper
Free
The paper "Paiute Native Americans and Mexican Americans in Nevada" states that the evidence supports the precept that the Native American Tribe of the Paiute and the mexican Americans of Nevada can be successfully compared for associations due to regional native heritages.... The purpose of this study is to find similarities between the Paiute Native American tribe and the mexican American heritage within Nevada.... the mexican American population comprised 73% of the Latino population in the year 2000, and by 2006 increased to 78% (Timko, 2007)....
Preview sample
Consumption of Natural Resources
19 pages (4750 words) , Download 3 , Essay
The world's natural resources have been the object of debate for some time because they can be depleted.... This is where the issue of consumption comes in.... The world's developed countries are notorious for their excess consumption.... This implies that most of them may diminish their resources....
Preview sample
Learning Plan for Autistic Children
14 pages (4019 words) , Download 3 , Essay
Free
The second level is his security needs that would serve to reduce his nervousness and create a conducive learning environment.... This paper "Learning Plan for Autistic Children" examines the learning needs of an autistic child and the theories that form the basis of select learning environments with the view of creating an aptest learning environment for specific special needs of a child....
Preview sample
The Impact of Subsidies on the Cotton Sector in Mali
23 pages (6370 words) , Research Paper
Nobody downloaded yet
According to Crandall (2015), cotton production here is a whole production system that is also the backbone of food security.... The paper "The Impact of Subsidies on the Cotton Sector in Mali" is aimed at investigating the impact of cotton subsidies on the Malian Cotton sector....
Preview sample
Business Intelligence and Business Environment
24 pages (6000 words) , Download 3 , Research Paper
The author of the present paper "Business Intelligence and Business Environment" points out that the current business environment is highly dynamic and complex in nature where every business organization is struggling to attain competitive advantages.... ... ... ... The organizations in the globalized era are facing significant challenges and problems arising from the external environment....
Preview sample
Corprorate Social responsibility: a case study: IKARE
40 pages (10000 words) , Download 2 , Essay
The objective of this study is to do an extensive research into the need for and significance of corporate social responsibility with particular reference to the private equity sector.... The corporate initiatives of IKARE, the CSR initiative of IK Investment Partners, have been.... ... ... IKARE presently dedicates its full resources to the Stamp Out Sleeping Sickness campaign launched in Uganda....
Preview sample
Marketing Plan for Apple Inc
28 pages (7000 words) , Download 2 , Research Paper
This paper discusses Apple Inc.... which has recently launched its latest IT soft wares including iPhone 3 G, iPod, and iMusic as its fresh products.... Its marketing management department aims to present these products at international markets by developing a comprehensive strategic scheme.... ... ...
Preview sample
13001 - 13050 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us