StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Proposal of Anti-discrimination of Mexican Americans in the South
5 pages (1250 words) , Download 2 , Research Paper
the mexican ethnic groups have long been subject to racial discrimination in one form or the other such as the popular association of mafia and drug culture with the Mexicans (E-RACE, 2011).... Perhaps the greatest influx of these racial and ethnic groups has been in the South of the United States where hundreds of thousands of people cross the border each year in search of better job opportunities and living standards.... The most notable of these movements of Latinos and Hispanics originates from Mexico which is just south of the United States border....
Preview sample
Security management
3 pages (750 words) , Download 7 , Research Paper
Free
The absence of these social cankers left global and national security organizations with very little to work about other than protecting nations in times of war and against invasion by enemies (Koduah, 2001).... However today, global and national security has taken very complex and dynamic trends.... Recognize and critically analyze the various forms of liability associated with the security management industry.... Provide cost effective measures for architectural security design for facilities, airport security, and critical in fractures....
Preview sample
Food Security and Climbing Food Prices in Nigeria
11 pages (2661 words) , Download 0 , Coursework
Free
The paper "Food security and Climbing Food Prices in Nigeria" highlights that unequal distributions of wealth and existence of politicians who monopolise the industries make it hard for the World Bank to achieve set by the United Nations MDGs and end the problem with the lack of food security.... The government of Nigeria is one of the important actors in the global food security problem to make sure sustainable development can be accomplished in their own country....
Preview sample
Homeland Security Advisory System
3 pages (750 words) , Download 2 , Research Paper
Homeland security Advisory System (Institution's Name) 13th July 2013 Homeland security Advisory System Introduction As part of efforts dealing with terrorism threats and addressing other security concerns within the United States, it was perceived necessary and beneficial to create the Department of Homeland security, especially after the terrorist attack on 11th September, 2001.... According to Alperen (2011), the Department of Homeland security is a cabinet department within the United States federal government and its is mainly mandated with the task of protecting the territories of the United States and strategically responding to potential natural disasters, terrorist attacks, and man-made attacks to ensure that they do not occur or possibly reduce the severity....
Preview sample
Effectiveness Of Federal Information Security
36 pages (9000 words) , Download 4 , Research Paper
The paper "Effectiveness Of Federal Information security" discusses whether the risk to information technology systems in Federal Agencies and the IT industry between 2002 and 2005 has been decreased as a result of implementing the Federal Information security Management Act of 2002.... After the computer security act of 1987, there was a strong need to formulate a standard Department of Defense (DoD) policy for security certification and accreditation federal information systems....
Preview sample
Internet Crimes Against Children
16 pages (4000 words) , Download 2 , Case Study
Free
The anonymity created from the benefits of Internet technology provides a false sense of security and secrecy for both the perpetrator and the victim.... he national program on Internet Crimes against Children (ICAC) educates the people about Internet safety.... The national Center for Missing & Exploited Children (NCMEC) conducted a study on four different areas of victimization against children....
Preview sample
Social Aspects of Alcohol Uses
18 pages (4500 words) , Download 4 , Research Paper
Free
As a result, this absenteeism by employees comes with a significant cost to employers, social security system, and employees.... national Academies Press.... Social Inequalities In Alcohol Consumption And Alcohol-Related Problems In The Study Countries Of The Eu Concerted Action gender, Culture And Alcohol Problems: A Multi-national Study Alcohol and Alcoholism, I26-I36....
Preview sample
Business-To-Business Performance of MobiTrends
16 pages (4639 words) , Download 0 , Thesis
Free
Indeed, technology today supports the Australian economy significantly, with a recent survey showing that increased national output, real wages, consumption, employment and real investment is credited to technological development.... rembley, C, & Trembley, V 1996, “Firm Success, national Status, and Product Line Diversification: An Empirical Examination,” Review of Industrial Organisation, Vol....
Preview sample
The Differences in Consumer Behavior in an E-commerce Environment
38 pages (10077 words) , Download 4 , Dissertation
The paper "The Differences in Consumer Behavior in an E-commerce Environment" describes that there are four major types of consumer behaviour which are impulsive buying, variety seeking, limited decision making and extensive decision making consumer buying behaviour.... ... ... ... The remaining 15% preferred traditional shops....
Preview sample
Homeland Security
2 pages (500 words) , Download 2 , Assignment
Free
Looking at the United States, the shared border with Canada and Mexico alone is about seven hundred miles (Armstrong, 2011).... Creation of a safer border environment is therefore needed without impacting negatively on the business going on here which employs a huge chunk of the population.... To enhance security, the government liaises with CBP border patrols agents as well as marine and air agents who are mandated with the task of ensuring that the borders are safe (Homeland Security, 2013)....
Preview sample
Information securtiy
12 pages (3000 words) , Download 2 , Essay
First part deals with a general discussion about information security.... An introduction is given as to what information security.... Then, the importance of designing an information security policy has been discussed.... Information security in different fields has been considered.... Legislatures like Canadian Law and HIPAA have been Some lines have dedicated to explain the ISO/IEC 17799:2005 standard of information security policy....
Preview sample
Acceptance of the Mexican-Americans and the American-Jews
7 pages (2145 words) , Download 3 , Research Paper
Free
This research paper "Acceptance of the mexican-Americans and the American-Jews" will explain and evaluate the cultures of the mexican-Americans and the American-Jews while focusing on their characteristics.... Cultural Awareness, Understanding, and Acceptance Task: Introduction (Section A) I will explain cultures of the mexican–Americans and the American-Jews in my home state.... Section B the mexican-Americans culture Religion Mexican Americans have harnessed and utilized religion as a cultural resource and an instrument for social, civic, and political empowerment and protest....
Preview sample
Port Security Problems
6 pages (1852 words) , Download 0 , Coursework
Free
This coursework "Port security Problems" gives a critical analysis of the challenges that developing countries face while implementing various international legislation, regarding port security.... The security of the ports is of paramount importance if the international community has to succeed in promoting commerce.... Introduction: This paper gives a critical analysis on the challenges that developing countries face, while implementing various international legislations, regarding port security....
Preview sample
Practical UNIX Security
8 pages (2298 words) , Download 3 , Assignment
Free
This assignment "Practical UNIX security" shows that the widespread use of computing technology has facilitated small, medium, and corporate organizations to achieve goals efficiently.... Moreover, hardware security modules taken into consideration for securing highly classified data.... In spite of securing the networks and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to intrude into the network....
Preview sample
Fashion - Mexican Culture
2 pages (500 words) , Download 6 , Essay
Free
the mexican culture over the past few decades has undergone significant transformations.... the mexican clothing is among the most captivating aspects.... The authentic Mexican garments have played a significant role in portraying the mexican culture.... There are aspects that define the mexican culture.... the mexican culture Introduction the mexican culture over the past few decades has undergone significant transformations....
Preview sample
The Challenges of Selecting, Creating, Developing and Managing a Multi-Cultural Team
16 pages (6973 words) , Download 0 , Literature review
Free
With the advent of globalization and cross border knowledge transfer, propensity of expanding business operation in different cultural environments has exponentially increased for companies (Weatherley, 2006; Zakaria et al.... On the other hand, ‘Hygiene factors' are extrinsic work related factors like job security, work conditions, fringe benefits and salaries.... 69-86) stated that “An effective member of a multicultural team is able to establish an interpersonal relationship with a foreign national via exchange of verbal and non verbal levels of behaviour-exhibit intercultural competence”....
Preview sample
Private Banks and Wealth Management Firms
19 pages (5149 words) , Download 2 , Essay
ovement The movementtment Capital is taking place across national Frontiers, as ore and more countries are implementing Economic Reforms and offer protection to Foreign Investors, thus interconnecting the World's markets.... This paper ''Private Banks and Wealth Management Firms'' tells us that the Rule of 80:20 or the Pareto Principle provides an important guideline for effective managers within the wealth management industry....
Preview sample
Cross-Border Mobility of Public Sector Workers
10 pages (2500 words) , Download 2 , Coursework
Free
The paper 'Cross-border Mobility of Public Sector Workers' evaluates one of the basic European integration rules, which is the rule of free cross-border movement of workers.... CROSS border MOBILITY OF PUBLIC SECTOR WORKERS Critical Analysis of the ment The public service exception to free movement of workers can be said to be somewhat vague and inconsistent, and therefore not truly effective.... One of the basic European integration rules is the rule of free cross-border movement of workers....
Preview sample
Learning, Training, and Development - Strategic Approach of the Coca Cola Beverage Industry
16 pages (4000 words) , Download 3 , Case Study
Free
The theorist calls security of job as the safety factor which is the fourth one in his list of motivational factors.... For decades, the industry has been the sponsor of supreme events and ceremonies including Olympic Games, World Cups, G-8 conferences and other domestic, national and international ceremonies.... Though, with the inclusion of various rival beverage companies at national and international levels, the Coca Cola Industry has to face the situation of perfect competition, yet the product is as popular today as it was in the time of its monopoly over the whole beverage industry....
Preview sample
The Intersection between Security and Risk Management
8 pages (2318 words) , Download 0 , Case Study
Free
The Australian Security Intelligence Organization (ASIO) was established by the government of Australia under the parent agency of the attorney general's office; to provide the country with national security through reacting to matters such as foreign interference, sabotage, espionage, politically motivated violence and any attacks geared towards the country's defence system.... There also exists other government entities such as the national security Committee of Cabinet (NSC), which is a cabinet committee that makes important decisions on defence matters, intelligence and national security issues....
Preview sample
General Rule for Nationals of Member States
6 pages (1500 words) , Download 2 , Case Study
Free
The author states that Article 46(1) states that the provisions of the chapter and measures taken in pursuance thereof shall not prejudice the applicability of provisions laid down by law, regulation or administrative action providing for special treatment for foreign nationals on grounds of public policy, public security or public health.... Article 39(3) sets out the rights attaching to freedom of movement of workers in the EU stating that they are subject to limitations justified on grounds of public policy, public security or public health....
Preview sample
A Global Water Crisis
16 pages (4196 words) , Download 2 , Essay
Free
??The Emerging Water Crisis and its Implications for Global Food security”, World Hunger Year, (n.... Fierce national competition over water resources has prompted fears that water issues contain the seeds of violent conflict.... According to the article “Water- The Crisis of 21st Century” (2007) 32% of national boundaries are formed by water and 300 zones all over the world have been identified as “potential water conflict zones. ...
Preview sample
Organization Assets Physical Security
10 pages (3015 words) , Download 1 , Research Paper
Free
The paper "Organization Assets Physical security" highlights that physical security control can be provided by both natural barriers or artificially engineered barriers.... Artificially engineered barriers must be developed in a way that they will correspond to the security system in place.... Organizations recognize the aspect of security as important in assuring their best interests.... security professionals have established that risks arise from the existing threat as well as the vulnerability of an asset which can result in the destruction or loss of the assets....
Preview sample
Organisations&Behaviour
18 pages (4500 words) , Download 2 , Assignment
Organizational structure is defined as the manner in which the organization arranges its people and activities in order to fulfil the overall organizational objectives.... The planning of organizational structure contributes positively to the efficiency and profitability of the.... ... ... It can be viewed as the way in which responsibilities and power are allocated to the different individuals within an organization and how work process are carried out by the employees....
Preview sample
The Impact of E-Commerce on the Airline Industry: British Airways
44 pages (10397 words) , Download 3 , Dissertation
This dissertation "The Impact of E-Commerce on the Airline Industry: British Airways" could perfectly demonstrate that Electronic commerce is a very important outcome of globalization which now has become almost indispensable to human life.... ... ... ... The trend in Retained Earning between 1996-97 and 2009-10 30 Chapter 5 – Conclusion and Recommendations 32 References 34 Organization for Economic Cooperation and Development....
Preview sample
Foreign Exchange and Interest Rate Volatility Risks
19 pages (4750 words) , Download 2 , Essay
Free
WRM focuses on enterprise-wide risk exposure which adhere to the risk tolerance of the company's security holders.... Coco Cola is the best illustration of how multi national companies employ operational systems and financial instrument for management of their foreign –exchange exposures....
Preview sample
Different Perspectives in Security
7 pages (2053 words) , Download 0 , Essay
Free
A stable and growing economy become major concerns for national security particularly in the long run in traditional security concepts.... This essay "Different Perspectives in security" discusses security as an important component for an effective international relations policy particularly defense policy.... Various scholars view security from three perspectives namely traditional security, critical security, and human security....
Preview sample
Mexican Immigration Today
5 pages (2063 words) , Download 0 , Assignment
Free
A typical example was the mexican Cession.... Hence, the mexican Govt.... the mexican or the Latino immigration is a later phenomenon .... The same is the case with the mexican Immigrants of today, especially the illegal immigrants.... They cross over the border with the United States, in search of jobs, when life in their own country gets miserable.... "mexican Immigration Today" paper argues that the difference in standards of living in the US and in the poor countries connected with the United States economically or politically is tremendous....
Preview sample
Security Sector Reform and Weak States
8 pages (2302 words) , Download 2 , Essay
Free
This essay "security Sector Reform and the Weak States" explains briefly the concept of "security sector reform" and "weak states" and how could 'security sector reform' offer a way forward in "weak states".... The discussion in this essay is fully related to the above definition, which needs to explore concepts of security sector reforms and 'weak state'.... Additionally how these reforms would have an impact towards pushing these weak states forward The security Sector Reforms, in particular, has been thoroughly defined by the United Nation International Research and Training Institute for the Women Advancement....
Preview sample
A Tainted Justice System: Corruption in Social and Criminal Justice Divisions
20 pages (5000 words) , Download 2 , Research Paper
Free
Corruption and the mexican political system: Continuity and change.... If aspects of judiciary that rule over judgments of crime scene investigations, security, and techniques for case analysis, collection, and preservation of data from these scenes, decisions in relation to institutions of correction, and incarceration are viewed, it can be revealed that all of the above provided causes could be easily highlighted, but not easily eliminated.... The causes of corruption: A cross-national study....
Preview sample
The British Prison System
33 pages (8250 words) , Download 3 , Case Study
Premium+
Although there is a lower percentile of incarceration in Japan and in other national areas as well, there are many reasons in behind this and they are not all associative with lower crime rates.... The main points that will be more fully investigated are how well the prison systems in either country actually deter crime and what measures are utilized by each to keep repetitive criminal actions from reoccurring....
Preview sample
The Mexican Americans Coexistence Story
3 pages (750 words) , Download 0 , Essay
Free
"the mexican Americans Coexistence Story" paper discusses their migration from Mexico to America before the twentieth century to this day, their struggles in America, their language, their relationship with Americans, and their modern-day activities and religion.... he conflict between the migrants and the mexican president occurred when the new president, Lopez de Santa Anna put control measures on trade between the United States and the Anglos living in Mexico....
Preview sample
Federal required security within federal buildings
7 pages (1750 words) , Download 2 , Research Paper
Federal government facilities and buildings' security is of utmost importance as it not only affects the daily activities of the federal government, but it also affects the safety, health, and well-being of federal employees as well as the public at large.... Unfortunately, over the years, federal government This paper delves into this topic of federal security within federal buildings.... Federal facilities' security includes physical security assets for example security guards (both contracted and federally employed), close-circuit television cameras, and barrier material (Smith, 2)....
Preview sample
Conflict of 1918 in Finland
15 pages (4291 words) , Download 2 , Essay
Free
It was after February Revolution that both the political groups started assembling security forces on their sides so they could fight for power (Smith 1955; Katkov 1967).... ?national Review, 55,23, 27.... From the paper "Conflict of 1918 in Finland" it is clear that The Civil War in Finland can be rooted in the problems which were brought down by Russification....
Preview sample
The US Security Has Relatively Increased under the Department of Homeland Security
5 pages (1250 words) , Download 0 , Research Paper
Free
hrough this study, it has been established that under the department of homeland security the US security has relatively increased.... national security of any given state is paramount to the defense of its sovereignty and safeguard of territorial integrity against foreign threats whether masterminded within or without it boarders.... From these security missions it can be understood that US views terrorism as the greatest threat to its national security....
Preview sample
Impact of Inflation on Social Security
6 pages (1796 words) , Download 2 , Term Paper
Free
The paper "Impact of Inflation on Social security" highlights that at present the COLA adjustments are based on the change in the CPI-W.... Social security is a comprehensive federal program that provides workers and their dependents with, among other incomes, retirement income and disability income.... Social security on a national level was conspicuous by its absence in the United States until President Franklin Delano Roosevelt signed the Social security Act in 1935....
Preview sample
Is Total Quality Management Enough For Competitive Advantage
32 pages (8000 words) , Download 2 , Research Paper
The author of this research paper "Is Total Quality Management Enough For Competitive Advantage" states that globalisation is a contemporary phenomenon that has paved the way for the for the movements and flows of goods, people and services across borders enabling exchanges and transfer of knowledge....
Preview sample
Marketing Plan and Plan Report for the New Master Programme
18 pages (4500 words) , Download 2 , Outline
Free
In upward order these are: accessibility, lifestyle, personal security issues, affordability, employability, and prospects quality of course.... The paper "Marketing Plan and Plan Report for the New Master Programme" states that the true indicator of the success of this New Programme campaign will be realised at the end of semester two 2007 as enrolments level off for the year, and some further promotion paves the way for semester one 2006....
Preview sample
Homeland Security
3 pages (750 words) , Download 2 , Assignment
The author of this assignment "Homeland security" touches upon the American state security.... Homeland security has assumed absolute priority in view of the two wars.... Very significant changes have taken place in the security systems and procedures at all ports of entry and exit as well as at all domestic transportation points in order to check and nullify any potential threat.... The security breach that occurred at the Newark International Airport on Sunday, January 3, 2010, brings home the harsh reality of the potential human and systems failure simultaneously (Wilson, FOXNews....
Preview sample
Mexican Healthcare system
4 pages (1000 words) , Download 2 , Article
health care system The history of the mexican Healthcare system dates back the late 18th century, when the Cabanas Hospital was established.... the mexican Social Security Institute (IMSS) was established in 1943 to cater for the welfare of all employees in the private sector and their dependants within the country, which works as a tripartite system involving the joint funding by the employer, the federal government and the employee.... mexican Healthcare system Date mexican Healthcare system History of the health care system in Mexico and its comparison to the U....
Preview sample
Promoting Information Security in Banking Solutions Inc
5 pages (7946 words) , Download 1 , Case Study
Free
This case study "Promoting Information security in Banking Solutions Inc" focuses on the major information security issue faced by Bank Solutions Inc.... Skipping some item processing facilities poses an information security risk to both customers and the institution.... Multiple Projects based on 2 case studies scenarios Affiliation PROJECT CASE STUDY GAP ANALYSIS Summary of security Issues ... One of the major information security issue faced by Bank Solutions Inc....
Preview sample
Fraudulent Practices and Sarbanes Oley Act
11 pages (2916 words) , Download 2 , Essay
Free
Inadvertently, this followed by a major confidence lapse on security exchanges where the investors were concerned.... The paper "Fraudulent Practices and Sarbanes –Oley Act" discusses an investigation launched to look into the frauds of companies like World Com, Global Crossing, and Enron following which the Senate approved the SOX act in an attempt to prevent history from repeating itself....
Preview sample
Importance of Human Health and Safety in Workplace
20 pages (6126 words) , Download 3 , Term Paper
Free
om/en/surveys/security-climate/ [Accessed February 07, 2013].... Moreover, the collapse of the smoke detection system in the ‘class D' cargo compartments was also a major factor behind the accident (national Transportation Safety Board, 1997).... The "Importance of Human Health and Safety in Workplace" paper emphasizes on determining the significance of human error in accidents, presents the importance of safety climate surveys tool in an organization, and assesses the usefulness of accident ratio studies in predicting accident trends....
Preview sample
National Strategy for Counter-terrorism
4 pages (1000 words) , Download 5 , Essay
Free
“Military Support to Law Enforcement Agencies along the United States Southwestern border.... f it is part of a broader insurgent the terrorism, the counter insurgent doctrine may be partly based on the counter-terrorism, but economical, political and other measures that may tend to focus more on the security breach or insurgency than the actual terror act.... If it is part of a broader insurgent the terrorism, the counter insurgent doctrine may be partly based on the counter-terrorism, but economical, political and other measures that may tend to focus more on the security breach or insurgency than the actual terror act....
Preview sample
Marketing And Social Network
14 pages (3500 words) , Download 3 , Thesis
Free
, "What Anyone Can Know: The Privacy Risks of Social Networking Sites," IEEE security and Privacy, vol.... , (October, 2008), Visual Ethics: Ethical Issues in Visual Research, national Centre for Research Methods, p (21) Van den Bulte, C.... The aim of this study is to determine the relationship of marketing, or in specific, viral marketing and social networks with each other with the help of a sound theoretical framework....
Preview sample
The Health Issues and Global Food Security
5 pages (1540 words) , Download 1 , Essay
Free
The paper "The Health Issues and Global Food security" explores the health issues due to malnutrition.... Addressing Somalia's problems needs to focus on various dimensions, but the crucial factor at stake is the country's security.... THE ISSUE OF GLOBAL FOOD security (SOMALIA) by of the of the of the School 5 January, Introduction ... ood security is a crucial issue that links with health factors in any population.... Food security is recognized to be achieved when everyone has physical and economic access to acquire adequate, safe, and nutritious food all the time, so that their dietary needs and food preferences are met to achieve an active and healthy life (Bhargava, 2006, p....
Preview sample
Need for Bootstrapping in SMEs in the Context of Global Financial Crisis
11 pages (3430 words) , Download 0 , Coursework
Free
This paper ''Bootstrap Finance'' tells us that every business needs to estimate the development and start-up costs involved.... There is every possibility to start a small business with little capital (Neugebauer and Spies, 2012).... Bootstrapping is the activity, which can enable a business to start-up with a small start upon capital....
Preview sample
Permission marketing is intrusive advertising: The issues surrounding junk mail and Spam
27 pages (6750 words) , Download 2 , Essay
This essay describes the usage of the Spam in the advertisement.... Proponents of permission-based emails argue that the receiver can simply hit the delete button or use an opt-out option listed in the electronic advertisement if they do not want to view the email.... ... ... ... A common complaint among Internet users is the consistent use of bulk e-mailing referred to as “Spam....
Preview sample
Network Security
18 pages (4500 words) , Download 2 , Annotated Bibliography
Free
The author gives a large overview of Jackson, Chris "Network security auditing", Harrington Jan "Network security: A Practical approach", Douglas Comer “Computer Networks and Internets” and other works on the topic of network security.... Current annotated bibliography includes Winkler Vic "Securing the Cloud: Cloud Computer security Techniques and Tactics", Chey Cobb "Network security for dummies", Cole Eric "Networking security bible", Donahue Gary Network Warrior" and other books on the stated topic....
Preview sample
Environmental Security
6 pages (1500 words) , Download 4 , Essay
Free
This paper focuses on environment security, a concept that allows policy makers to establish a bridge between thought and action so as to replenish natural resources that are destroyed by human mismanagement or negligence.... Environmental security Introduction Environment is an essential part of every facet of human life.... This paper focuses on environment security, a concept that allows policy makers to establish a bridge between thought and action so as to replenish natural resources that are destroyed by human mismanagement or negligence....
Preview sample
13251 - 13300 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us