StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Labour Policy of Inclusion
16 pages (4338 words) , Download 2 , Essay
Free
During the same period there has been an extensive widening of national and international recognition of human rights which have been entrenched to become part of claims for justice through social care and welfare provision.... "Labour Policy of Inclusion" paper highlights the principal significance of inclusion and theorizing beyond disabilities, children with disabilities are social agents, seeking to exercise autonomy and choice, to assert values and identity, and influence the institutional and political culture....
Preview sample
A Feminist Examination of Pride and Prejudice
11 pages (3226 words) , Download 3 , Research Paper
Free
The paper "A Feminist Examination of Pride and Prejudice" discusses that generally, Mr.... Darcy's affections for Elizabeth, and vice versa, are based on a mutual intrigue into, and respect for, the other's intellect, with the status being a second thought.... ... ... ... The writing of history, as well as the writing of stories, has served to transform the female stereotype into the female archetype, in which 'contemporary industrial society's version of her is docile, soft, passive, nurturant, vulnerable, weak, narcissistic, childlike, incompetent, masochistic, and domestic, made for child care, home care, and husband care' (MacKinnon 530)....
Preview sample
Homeland Security Capstone
11 pages (3078 words) , Download 2 , Essay
Free
During the transition of the George Herbert Walker Bush, and the Bill Clinton Administrations there was not much help given to Bill Clinton's national security Advisor, Sandy Berger.... Bush had appointed Condoleezza Rica to become the national security Advisor in his administration.... Bush taking office on January 20, 2001, Berger set up many meetings between Condoleezza Rice, and his national security team.... Berger wanted Rice to be informed about the state of the nation's security at the time she assumed her post as the national security Advisor to George W....
Preview sample
Consumer Buying Behavior at Selected Durban Shopping Malls
17 pages (3921 words) , Download 0 , Research Paper
Free
ntroductionOver the last few decades, the retailing sector in South Africa has witnessed tremendous growth with the country's GNI (gross national income) per capita hitting US$ 6,100 (Piotrowicz & Cuthbertson, 2015).... Given that the Durban shopping targets local, national and international consumers, relevant business strategies can be recommended that can be useful in assessing personal variables that enhance consumers' attraction to shopping malls....
Preview sample
Concepts in Homeland Security
4 pages (1000 words) , Download 2 , Assignment
Free
The national security Letter (NSL) power, 18 U.... national security Letters.... This research will begin with the statement that DHS and FBI are partners in homeland security.... According to the research findings, DHS was established under the Homeland security Act 2002, and thus, plays its part in combating security threats in the country.... Concepts in Homeland security ... DHS and FBI are partners in homeland security....
Preview sample
Risk and Resilience Among Children Who Have Been Sexually Abused
42 pages (10538 words) , Download 2 , Thesis
In fact, according to data from the fact sheet of the national Center for Victims of Crime: Child Sexual Abuse, there an actual number of child abuse cases in the United States is definitely more than the 90,000 cases reported annually.... The aim of the "Risk and Resilience Among Children Who Have Been Sexually Abused" research is to determine which of the three factors – environmental, personality or social – can best determine a victim's degree of resilience towards his or her experience of child sexual abuse....
Preview sample
Li-ion battery multi-stage charger with power factor correction for mobile phone
40 pages (10000 words) , Download 2 , Essay
The main essence of this project would be the development of a project proposal in details that illustrate how compact and small battery chargers for Li-ion batteries could be achieved.... Largely, this would involve extensive study of the rectifier from the mains together with the.... ... ... By developing this multi-stage charger, it would be expected that in combination to the simulation of the circuit by using PSIM and Design, the ase of implementing the circuit into hardware would be reduced; thus, enabling the introduction of a multiprocessor to control the battery's charging process (Liu, 2013....
Preview sample
The Social Security Act
4 pages (1000 words) , Download 2 , Research Paper
Free
The goal of this research paper is to critically examine the Social security Act as a social welfare policy example.... The writer of this paper suggests that the social security program is quite effective in fighting poverty and has been highly lauded by the masses.... he Social security Act ... These include: Old-Age, Survivors, and Disability Insurance (OASDI) also referred to as Social security; Unemployment Insurance as discussed earlier; Workers' Compensation; and Temporary Disability Insurance....
Preview sample
Network Security Fundamentals
5 pages (1543 words) , Download 3 , Essay
Free
The paper "Network security Fundamentals " discusses that the company and the CISO need to adopt a plan that should ensure tighter information security for the customers.... Having trusted third party vendors to provide encrypted data and other information security is recommended.... Network security Network security 0 Introduction The improving technology has led to massive investments in financial services that have seen many people accessing organizations' services at their convenient places....
Preview sample
Mexicans Are Taking Jobs from America
5 pages (1519 words) , Download 2 , Essay
Free
The economic matters entail how the mexican intrusion into American jobs has affected the American economy as a whole; immigrants should contribute as much as $10 billion to the American economy each year.... Some Mexicans effectively slip across the border but that does not mean they will be successful once they get to America.... From the paper "Mexicans Are Taking Jobs from America" it is clear that both the American and mexican governments need to see how they will handle the issue....
Preview sample
Leisure and recreation
12 pages (3000 words) , Download 2 , Essay
Leisure and recreation has been an inseparable part of our existence even since humanity came into being.... It has been intricately interwoven into all aspects of our lives in some form or the other.... Although the definition and idea of "recreation "is very subjective, yet the primary goal that everyone looks for is "self-entertainment"....
Preview sample
Open Markets, Closed Borders
1 pages (250 words) , Download 3 , Assignment
Free
Relationship between the department of Defense and department of Homeland security regarding the issue of border security.... here exists as cooperative relationship between the DoD and homeland security where they engage in matters of complementarities (Wise, 2006).... If there is a breach or any issue by the coastal line security and safety, then the homeland security would initiate the response at the signal of the DoD personnel....
Preview sample
The effect of the U.S. Subprime Crisis to the China commercial banks in 2008-2013
42 pages (10500 words) , Download 2 , Dissertation
The sub-prime mortgage crisis that originated in the United States of America basically started from August 2007 and had transformed the financial markets around the world.... A careful analysis of the sub-prime crisis reveals that it was created from the slump in housing prices that created a ‘bubble' of expectations among investors....
Preview sample
Measuring National Identity for the UAE National and Resident Consumers
38 pages (9921 words) , Download 3 , Essay
'Measuring national Identity for the UAE national and Resident Consumers' measures the national identity of UAE consumers.... Dmitrovic and Vida (2010) have identified gaps in the literature and report that there is a paucity of research on national identity and its consequences for consumer behavior and marketing decisions.... One such gap reported is the failed attempt by most researchers to find the impact of self-identity on the construction of national identity....
Preview sample
Reducing Injuries in the Workplace
64 pages (16000 words) , Download 2 , Dissertation
The aim of the research study "Reducing Injuries in the Workplace" is to investigate the issue of occupational safety and the reduction of injuries, illnesses and accidents in the workplace and to critically review the relevant literature about workplace safety, injuries and their causes.... ... ...
Preview sample
Research Report on Internet Security
13 pages (3782 words) , Download 3 , Report
Free
This report ''Research Report on Internet security'' is acquired a brief idea about different security threats that exist in internet and how these threats can be dealt with and tells how to develop a network which can operate even if main segments of communication network crash....
Preview sample
Loans in the Islamic Banking System
20 pages (5000 words) , Download 4 , Research Paper
Free
This paper "Loans in the Islamic Banking System" focuses on the fact that the development of Islamic banking in the international market has been primarily related to the need for supporting the local needs of individuals and firms that were interested in keeping their funds under the Sharia law....
Preview sample
Importance of Autonomy and Conduct of a Lawyer
16 pages (4341 words) , Download 0 , Essay
Free
A lawyer should not be totally immune from liability that may arise from being incompetent as this gives them a false sense of security (Rhode 2003). ... From the paper "Importance of Autonomy and Conduct of a Lawyer" it is clear that a duty to act allows lawyers to conform to demands for accountability for their clients: on the other hand lawyers who decide to refuse clients cannot avoid consequences for their choices....
Preview sample
Compare Conflict Resolution Techniques in two Different Cultures, such as American and Mexican
6 pages (1500 words) , Download 2 , Term Paper
Free
the mexican culture is a collectivist culture with a high level of power-distance and fear of uncertainty Running head: CONFLICT RESOLUTION Conflict Resolution.... the mexican culture is a collectivist culture with high level of power-distance and fear of uncertainty.... s for the mexican culture, it belongs to collectivist cultures.... the mexican culture is a collectivist culture with high level of power-distance and fear of uncertainty....
Preview sample
Development without Security and Security without Development
8 pages (2279 words) , Download 2 , Essay
Free
The paper "Development without security and security without Development" discusses that fragile societies are incapable of supporting any form of development and are known as fragile states.... an there be development without security and security without development?... For some it may be the amount of resources available to the society, for some it is freedom of the masses, for others peace and security and for some it may be equitable distribution of income....
Preview sample
Criminal Justice Security Management
20 pages (5149 words) , Download 0 , Research Paper
Free
The paper "Criminal Justice security Management" states that generally speaking, the building that contains assets for a pharmaceutical company has to be included in the list of high-risk assets within the facility that needs to have their security boosted.... This chapter is important for this question because the description of this project has clearly stated that there is vital information technology equipment such as computers that has to be incorporated into the whole system of security provision....
Preview sample
Social Responsibility and Executive Leadership
15 pages (4162 words) , Download 3 , Essay
Free
Additionally, the relationship marketing model and the strengthening of the interpersonal dimension of partnered business relationships could be internalised, using the firm's intranet or other internal communications systems to reinforce that the business is strengthening relationships to provide workers with better long-term job security.... “America in the 19th century was a society of economic scarcity where economic growth and the accumulation of aggregate wealth were primary national goals” (Hay and Gray, 1974, p....
Preview sample
Knowledge Management
16 pages (4000 words) , Download 3 , Essay
Globalization and internationalization have brought about a revolution in communications and organizations are finding it difficult to capture and retain knowledge.... This has caused the knowledge management system (KMS) to be redefined.... Through information technology, KMS has.... ... ... able to capture the explicit knowledge but the knowledge embedded in the organization process and embodied in the people remains untapped (Bhardwaj & Monin, 2006)....
Preview sample
Security Measures
9 pages (2553 words) , Download 2 , Essay
Free
This essay "security Measures" claims that security is of extreme importance to everyone and this has been identified as such in everyday affairs in society.... This importance is consistent with Maslow's need hierarchy in which security represents one of the lower order needs that need to be satisfied before others can be dealt with.... It meant that the security industry had to be even more alert to ensure the safety of the disabled in moving around and to ensure that employees were not discriminated against....
Preview sample
Analysis of Articles about the Education and Method of Teaching
8 pages (2000 words) , Download 5 , Assignment
Free
Using the national Research Councils conception of learning as a framework for analysis, this article considers strategies to achieve this goal by first presenting findings from a case study that examined the training of a sample of preservice teachers who were both educated in high-stakes learning classrooms as well as taught to be early educators in these same environments....
Preview sample
Corporate Governance and Its Impact on Financial Performance of Companies
54 pages (10107 words) , Download 4 , Dissertation
The paper "Corporate Governance and Its Impact on Financial Performance of Companies" states that the various financial scandals resulted on account of misappropriation of accounts and funds including top British banks such as Barclays Bank for the Libor scandal.... ... ... ... The term corporate governance has been discussed widely in corporate literature....
Preview sample
E-Commerce and the Value Proposal
24 pages (6000 words) , Download 2 , Essay
In the paper 'E-Commerce and the Value Proposal ' the author analyzes e-commerce businesses of Sainsbury's including ASDA and Tesco with respect to catering the needs and the preferences of the customers.... The company is operating its business across different geographical locations.... ... ... ...
Preview sample
Information Security Risk Assessment Framework
15 pages (3750 words) , Download 12 , Annotated Bibliography
Free
The act recognized the importance of information security to economic and national security interests of U.... (2009) Assessing PKI: Risk Assessment of a national security Infrastructure.... Information Technology reporting and metrics has two issues that are paramount: regular reporting and effective IT security metrics.... A formalized IT security reporting framework is necessary for adoption by a regulated institution.... The framework should provide operational information and oversight in all sectors in IT security in relation to risk management framework....
Preview sample
The US. V. Mexican War
3 pages (750 words) , Download 2 , Essay
Mexican, or also known as the mexican-American, War was one which was just in occurring, or should not have occurred in the first place.... After surveying the mexican government, it now becomes... According to "The Us-mexican War" website, the war would last between the two nations from 1846 until 1848.... It states, "No nation ever existed without some sense of national destiny or purpose," (Manifest: Intro)....
Preview sample
Samsung Customers Perceptions on Branding
34 pages (8500 words) , Download 2 , Case Study
The paper "Samsung Customers' Perceptions on Branding" examines how the customer experience, satisfaction and loyalty can influence customer perceptions towards the Samsung brand, explains the concept of branding and related variables that drive brand success, brand value.... ... ... ... The evaluations of the Samsung brand may differ across cultures, and this may be worth investigating to increase the external validity of the findings of this research....
Preview sample
Internet of Things and Internet Security
12 pages (3115 words) , Download 4 , Case Study
Free
This is often termed as ‘for sake of national security ‘by almost every nation.... The paper "Internet of Things and Internet security" illuminates gadgets that are becoming smart and powerful and connectivity is no longer a problem.... Despite the advantages offered by the internet, there are growing concerns regarding security issues.... PROJECT INTERNET security SUBMITTED BY: EXECUTIVE SUMMARY Internet, the most publicized as well as the largest communication network in the world, isnot owned or centrally controlled by any organization or government....
Preview sample
Communication Security
3 pages (750 words) , Download 4 , Essay
The present essay "Communication security" discusses the applications of fuzzy error correction in communication security.... he application of fuzzy cryptography can offer an excellent support for potential enhancement of network communication error correction and security.... It is an admitted fact that the application of next-generation security mechanisms has offered much better support and network security which have improved the security of a communication network....
Preview sample
Security Roles Analysis
13 pages (3386 words) , Download 0 , Research Proposal
Free
The paper "security Roles Analysis" offers an analysis of five different security vacancies.... The exploration of the above vacancies indicates that the security docket in global organizations is a large component that has different levels of responsibilities.... This report offers a critical evaluation and exploration of different security responsibilities in the market.... In this case, the report offers an evaluation of five different security vacancies as advertised....
Preview sample
Why International Students Prefer Co-National Friendship Groups
5 pages (1533 words) , Download 0 , Coursework
Free
While Australian students were found to be individualistic in their encounters, students from non Western countries need for a sense of belonging was rooted from the need of security as depicted by their interdependence nature.... Non-Western students placed value to how other people felt in the process of communication thereby gaining a sense of security (Tan & Goh 2006). ... The paper "Why International Students Prefer Co-national Friendship Groups" is a perfect example of education coursework....
Preview sample
International Workshop on Security Protocols
8 pages (2344 words) , Download 1 , Report
Free
This report "International Workshop on security Protocols" presents a sequence of operations that make sure data is protected.... College security protocols The term security protocols refers to a sequence of operations that make sure data is protected.... There are various types of security protocols which include SSL (secure sockets layer) and TLS (transport layer security). ... he following can be identified as the main components of security protocols: ...
Preview sample
The Concepts of Food Security
16 pages (4486 words) , Download 0 , Research Paper
Free
The paper "The Concepts of Food security" discusses that the reforms in the agricultural trading system under the WTO regime is focusing on liberalizing policies, creating an open market environment for trade, and creating a sustainable environment for agricultural trade.... uestion: The Impact of International Economic Changes in International Food security, Particularly in Developing Countries ... ne of the major challenges facing the global economic system is food security....
Preview sample
Cloud Computing Security
6 pages (1851 words) , Download 8 , Dissertation
Free
From the paper "Cloud Computing security" it is clear that at present, the use of cloud computing has turned into an attractive trend.... There are numerous security issues associated with cloud computing.... ID # Cloud Computing security Cloud computing is an attractive information technology (IT) trend which ensures the implementation of the utility computing model broadly using Virtualization technologies.... In this scenario, Hamlen, Kantarcioglu and Khan discuss a wide variety of security problems in a cloud computing environment....
Preview sample
Critically evaluate the operational activity of Singapore Airlines
15 pages (3750 words) , Download 2 , Essay
Free
The airline also entered into agreements with national Geographic and UnitelClassica for in flight entertainment.... The problem statement for this study is to critically evaluate how the operational activity of Singapore Airlines contributes to its success.... The analysis of the operational strategies of the company reveals considerable good practices being pursued by the organization....
Preview sample
The Environmental Impact Assessment
10 pages (3114 words) , Download 0 , Essay
Free
nvironmental impact Assessment in developing countries: An opportunity for greater environmental security?... national park service ... This paper ''The Environmental Impact Assessment'' tells that The environment is beneficial in controlling the impact of diseases on the people....
Preview sample
Constitutionality of Search and Seizure of Electronic Devices at the Boarder, without a Warrant
18 pages (4885 words) , Download 0 , Research Paper
Free
It is hence in conflict with the fourth amendments on the basis of ensuring national security.... and many other governments have made huge progress to ensure their national security and public safety.... The decisions held at the higher courts give more weight to warrantless searches of electronic devices at the border.... Unlike border entry points to other countries, this has been the norm of United States at the border....
Preview sample
School Safety and Security
2 pages (500 words) , Download 4 , Case Study
Free
The report 'School Safety and security' examines safety and security, which are two vital features that enhance the learning process in a school set up.... The school administration must have an effective crisis plan to help handle either a security or safety breach in a school.... The author of the paper states that addressing security and safety issues in schools requires the participation of various stakeholders with the view to developing an effective plan of action, one that protects the interests of both the learners and the safety of the other stakeholders involved....
Preview sample
The Intersection between Security and Risk Management
8 pages (2344 words) , Download 0 , Report
Free
Areas of security practices might be regarded civic security, national security or private security, but merging of these fields are increasing within the present political and social environment. ... This paper ''The Intersection between security and Risk Management'' tells that The security industry functions within a multi-disciplines having risk management as an essential domain of knowledge within security.... security has embraced the application of risk management, especially a probabilistic threat approach to gauge risk....
Preview sample
The Influence of British Eurosceptic Tabloids on Public Opinion
48 pages (10820 words) , Download 2 , Dissertation
This paper ''The Influence of British Eurosceptic Tabloids on Public Opinion'' tells us that as the European Union (EU) gathered power did the interest of public view in Europe about the EU.... In the 1960s, the 11970sand the 191980sthe development for the European project had depended more or less on the European populations....
Preview sample
Changes in the HSBCs Capital Structure and Financial Sources
17 pages (4250 words) , Download 2 , Assignment
Free
n important feature of the HSBC Holdings plc was sponsoring of cross-border distribution of debt market capital and equity capital market dealings.... Such cross-border distribution included America Movil's 8 billion Mexican peso bond; Khazanah Nasional of Malaysia's US$750 million Islamic exchangeable 'Sukuk'; Emaar Economic City's US$680 million IPO in Saudi Arabia; and Shui On Land's US$876 million IPO in Hong Kong. ... To mitigate the challenge of extremism, the bank conducts regular security reviews for the safety of its staff, properties and information....
Preview sample
Information Security
4 pages (1241 words) , Download 0 , Assignment
Free
This paper ''Information security'' tells that Information is a virtual asset of an organization and protecting it is as crucial as protecting its most valuable resources.... The loss of a laptop that has contained an abundance of information about thousands of people is an example of an IT security threat that creates a loss of intellectual property and it can be sued in the US courts against the loss.... Discussion Questions Information security, decision support system, OLTP and OLAP ……………………....
Preview sample
Company's Security Plan Activities
5 pages (1467 words) , Download 0 , Essay
Free
The paper 'Company's security Plan Activities' is a convincing variant of an essay on management.... security refers to protection from harm and the degree of resistance from such threats(Bruce 26).... security in any entity has a higher profile due to the reason that security risks have become complex.... ecurity in any entity has a higher profile due to reason that security risk have become complex.... There are too many threats to security such as acts of terrorism, organized crimes and all this calls for a sound security operational plan....
Preview sample
Human Resource Management
60 pages (15000 words) , Download 4 , Essay
Work related stress is caused by various factors, some of which are categorized as pressure from work, environment, circumstances, pressure from staff, patients or the NHS organization (due to directives.... ... ... The literature focuses on stress itself, the causes and circumstances inside the NHS, the healthcare workers and their environment, effects of stress on the healthcare workers, and categories of work related stress....
Preview sample
Role of Cyber Security in Controlling the National Threat of Cybercrime
7 pages (2081 words) , Download 2 , Report
Free
This report "Role of Cyber security in Controlling the National Threat of Cybercrime" discusses cybercrime has become a critical threat that has been affecting organizations and individuals in different nations.... Role of Cyber security in Controlling the National Threat of Cybercrime Table of Contents Introduction 3 3 Motivation of the Actors 4 Role of CyberSecurity 5 Suggested Methods to Stop Cybercrime 8 Conclusion 9 References 11 Introduction In recent times, it is observed that information technology has been developing rapidly....
Preview sample
Food Security in Sub-Saharan Africa
5 pages (1326 words) , Download 4 , Article
Free
The paper "Food security in Sub-Saharan Africa" reports that food insecurity as a result of drought, famine, political instability, economical inadequacy, conflicts, and HIV has exposed 38 million African people to immediate threats of stability, security, and peace.... This research paper analyses the article titled, 'Food security in Sub-Saharan Africa' written by a researcher at the Institute of security Studies (ISS), Jenny Clover....
Preview sample
How to Build a Fraud Prevention System
68 pages (17000 words) , Download 3 , Dissertation
This study 'How to Build a Fraud Prevention System' evaluates profiles of fraudsters and informs about prevention strategies that can be employed by companies to avoid such kind of happenings.... Banking and insurance sectors are attractive places for fraudsters.... ... ... ... The author states that fraudsters are internal as well as external perpetrators but most often, they are from the same companies where they commit frauds....
Preview sample
13301 - 13350 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us