StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
US Drone Warfare - for or against Humanity
3 pages (925 words) , Download 2 , Essay
The paper "US Drone Warfare - for or against Humanity" discusses that 'covert drone strikes are one of President Obama's key national security policies'.... The basic aim, as exposed by any other national security policy, seems to aid the secured homeland for residents of a country on a long-term basis....
Preview sample
Fighting Drug Trafficking in the Carribbean: Jamaica and Trinidad
3 pages (1000 words) , Download 1 , Annotated Bibliography
Free
This is a comprehensive review prepared for the US Congress of American efforts to curb the production of illicit drugs primarily in Latin America, and their flow into the US threatening citizen security there with their harmful medical effects and association with crime, both organized and otherwise.... The Obama administration has broadened the focus on citizen security and institution-building to get local populations and governments more involved in anti-drug trafficking activities....
Preview sample
Globalization - Containerization
1 pages (250 words) , Download 2 , Case Study
Free
Even though CBP has in past been able to counter security threats posed by containerization trade significantly in the past, there has been rising fear that the increasing international trade through ocean transportation might endanger national security.... Thus, there has been an opinion that the international trade needs to be slowed down to ensure the national security is not compromised.... However, it is possible to look after the national security without slowing down the international trade through employment of advanced technology on sensors....
Preview sample
Regardless of Computer or Network Security
12 pages (3219 words) , Download 5 , Assignment
Free
Anonymous Hackers Targeted By FBI, Homeland Security For Potential national security Threat .... The focus of this paper "Regardless of Computer or Network security" is on the driving forces behind most hackers' actions.... The internet has further made it easy for hackers to go beyond borders with Chinese hackers gaining access to the American government or security information.... Possible security vulnerabilities exist and hackers are always on the lookout....
Preview sample
The United Nations Mission In Sierra Leone
6 pages (1500 words) , Download 2 , Essay
Free
This Sierra Leone conflict began after the fighters of the Revolutionary United Front, with support from Charles Taylor's National Patriotic Front started an assault on the east of Sierra Leone back in March 1991, just a few kilometers from the common border with Liberia.... This Sierra Leone conflict began after the fighters of the Revolutionary United Front (RUF), with support from Charles Taylor's National Patriotic Front (NPF) started an assault on the east of Sierra Leone back in March 1991, just a few kilometers from the common border with Liberia....
Preview sample
Cross-Cultural Experiences of Syrian Refugees
11 pages (3137 words) , Download 0 , Report
Free
national security.... Since the Lebanese border with Syria was closed, Germany has been receiving Syrian refugees in hundreds of thousands.... The Syrian refugee crisis and its impact on the security of the U.... order security of the Committee on the Judiciary, House of Representatives, One ...
Preview sample
Health Delivery Systems
7 pages (2166 words) , Download 3 , Essay
Free
89) do not yet signify a totally logical as well as concentrated program on quality as well as security; however, they have offered a sturdy foundation for additional growth.... This paper sheds light on the resemblance as well as variation between the quality of national Health Service of the United Kingdom and America, and different approaches to dealing with the health services requirements of citizens of each country.... Public health insurance initiatives will expand to the extent private initiatives contract, but the likelihood of a national, one-size-fits-all programme becomes more remote with each passing year” (Singh, 2007, p....
Preview sample
National Sovereignty and International Organizations
13 pages (3250 words) , Download 2 , Essay
Free
Its responsibility also includes settling border and land disputes between nations when referred to it.... In fact, the very purpose of the launching of the UN was severely defeated with the formation of the security Council in which certain member nations were endowed with veto powers.... To pass a resolution in the security Council, 9 out of 15 members should vote in favor but when the US resolution to attack Iraq was defeated in the final vote in the Council, the Bush Administration, defying the UN will, declared war on Iraq but well before that, it forced the world nations to accept its point of view....
Preview sample
The Italian American Experience by Louis Gesualdi
4 pages (1000 words) , Download 2 , Term Paper
This left Americans without hope of getting high ranks in the security systems.... number Date The Italian America Experience Introduction The Italian immigrants started invading America between 1880 and1920.... It was reported that over four million immigrants from Italy had entered United States....
Preview sample
Can the war on terror be understood in terms of realism
9 pages (2250 words) , Download 2 , Essay
Free
The realists compare the personal security to national security and say that the only difference between national and personal security is the level at which they are enjoyed.... While personal security is individual the national security is actually enjoyed at the national level.... While realism insists that there are threats to security, it also provides that it is upon the state to protect personal and national security of the individuals....
Preview sample
Different Forms of Government
40 pages (9231 words) , Download 1 , Assignment
From the paper "Different Forms of Government" it is clear that in the US a very organized voting system is present.... The election of president involves the public where as in order to pass a bond in the senate a separate election system is present which includes props and bonds.... ... ... ... Bonds are issued by the government in order to support certain projects....
Preview sample
Criminal Justice Systems in the United States, France and Malaysia
15 pages (4005 words) , Download 0 , Term Paper
Free
These national systems have gone through significant changes over the course of history.... The paper "Criminal Justice Systems in the United States, France and Malaysia" has compared the criminal justice system of the United States, France and Malaysia.... ... ... ... It is essential to state that criminal justice refers to the system of institutions and justice regimes meant to deter crime and uphold social control (Dammer & Albanese, 2013)....
Preview sample
JP Morgan Chase - Elements of a Valid Contract
5 pages (2062 words) , Download 2 , Essay
Free
but only relies on the data security provided under 'section 5 of the Federal Trade Commission (FTC) Act for deceptive and unfair practices'.... The SEC as a regulator, mandates public companies to divulge relevant 'financial and other information to the public' so that investors can retrieve the said basic facts and use the same to decide on whether they would 'buy, sell, or hold a particular security' (SEC, n.... The SEC as a regulator, mandates public companies to divulge relevant “financial and other information to the public” so that investors can retrieve the said basic facts and use the same to decide on whether they would “buy, sell, or hold a particular security” (SEC, n....
Preview sample
Women Benefits under the Affordable Care Act
3 pages (970 words) , Download 2 , Essay
Free
Women who had insurance that did not offer adequate financial and coverage security are also considered in this rule.... Women in the middle class who had considerably better security and others, who had proper insurance, now have better security cover under the new Act (Selker and Wasser 123)....
Preview sample
Description of policy currently under force
5 pages (1250 words) , Download 2 , Essay
Free
) The sectors which are in need for immediate attention include civil support staff, maintenance, aviation, engineering, medical, transportations, communications, security and logistics.... ) Improve the ability of the National Guards and reserves to improvise the overall security measures.... The United States national Guards are a part of the United States reserve military force.... he primary main function of the national Guards is to aid the armed forces during emergency and support the state government during war....
Preview sample
Most important event in the history of America
5 pages (1250 words) , Download 2 , Essay
Free
Christopher points out that the month of October 2001 witnessed a 29% fall in all legal migrants to US, and the illegal crossing through the Southwest border came down by 54%.... American people have lost their feeling of security despite the best efforts made by the government in its domestic and international policies.... This Act made it possible for the police to enhance both domestic and international surveillance through various statutes like Foreign Intelligence Surveillance Act, Immigration and Naturalization Act, Wiretap Act, and Bank security Act....
Preview sample
The Role of the European Union Single Market for the Development of International Business
32 pages (8000 words) , Download 3 , Essay
The author examines the establishment process of European Union Single Market in the EU, the main purposes of setting up a Single European Union Market, the benefits and advantages of European Union Single Market in different sectors especially in international business activities.... ... ... EU business and citizens would be better supported and informed when they are visiting another EU nation to study, work and set up a company or to do a business....
Preview sample
Key Causes of the Middle East Instability Since the End of the Second World War
49 pages (12250 words) , Download 3 , Research Paper
This study will trace the events pertaining to the region's security and stability, from the end of the Second World War when Britain relinquished control over it as a colonial power.... In the course of the narrative, this essay shall analyze the underlying reasons why the region has the history it had....
Preview sample
The Refugee Question and the European Court of Human Rights
20 pages (5559 words) , Download 2 , Term Paper
Free
Word Count 2,500 SECTION A Introduction The refugee status is a very difficult, albeit a very delicate It is a situation wherein the security of individuals is locked into an unbreakable paradox in which it is partly dependent on, and partly threatened by, the state.... Finally, Article IV of the ECHR also states that “Everyone has the right to liberty and security of person”.... The new perspective of the United Nations Human Committee on Rights states that human security is linked to the security concerns of individuals and communities and also to a wider range of threats including, but not focused on, physical violence....
Preview sample
Is Code-Switching: Limited Linguistic Knowledge, or a Useful Discourse Device
7 pages (2017 words) , Download 2 , Essay
Free
Communication is a major issue within the mexican-American community.... or example, some people who claim mexican heritage while living in the United States may have very real fears.... It is certain that many mexican families disagree with the current state of affairs in Mexico and how the drug cartels are killing people all over.... One excerpt from “an important contribution… to Spanglish culture [was] made by [a] mexican American in the ‘50s: the novel Pocho, by Jose Antonio Villareal, [quoted here]: ...
Preview sample
Disadvantages of Homosexuals Identifing Themselves in the US Military
5 pages (1250 words) , Download 1 , Research Paper
Free
If having an openly homosexual soldier in this environment could disrupt harmonious combat or special ops readiness, the risks to successful mission accomplishment are significant and could jeopardize (potentially) national security.... Related directly to national security are the politically-motivated disadvantages to having a homosexual serviceperson identify himself.... Senator John McCain, a stout opponent of repealing Don't Ask, Don't Tell, argued that such disclosure was an intolerable risk to national security....
Preview sample
Current Events and the U.S Diplomacy
4 pages (1000 words) , Download 2 , Assignment
Free
As a result, the United States decided the assist the Afghanistan by providing the country with billions of dollars for the reconstruction of Afghan national security Forces. ... ?Presidential doctrines: national security from Woodrow Wilson to George W.... As a matter of fact, this strategic relation has brought about security forces from both countries coming together to intensify their skills so as to fight the alleged Al Qaeda movement who have posed security threats to both countries....
Preview sample
The Caspian Sea Region
35 pages (9063 words) , Download 2 , Essay
hese include the following research questions which will guide this analysis: Accordingly, these questions and many more will guide our analysis of the role of intelligence in energy security in the Caspian Sea region.... The paper "The Caspian Sea Region" highlights that propelled to the international fore through the discovery of natural resources, the fall of communism, and the Soviet Union, the formerly socialist countries of the Caspian Sea region are now players in the global economic oil market....
Preview sample
American Empire, Oil and Global Dominance
28 pages (7000 words) , Download 3 , Essay
Iraq was not at all a threat to the United State's national security.... However, every time America had a solid argument which is presented to the world and made it appear to everyone that America's involvement is imperative either for its own security and defense or for the betterment of this world as a whole, let alone the consideration for devastations it brings to the world and innocent people on whom the war either declared or undeclared is imposed.... The question that is raised by the world is that is it necessary for America to harm others in order to maintain its peace and security, or behind such arguments, the US is nurturing and fostering the concept of maintaining the US power and dominance over the world by controlling the world oil reserves and influencing the major oil-producing countries....
Preview sample
IT Ethical Issues
4 pages (1229 words) , Download 0 , Essay
Free
Computer Crime Survey conducted by the Computer security Institute confirmed that the threat from computer crime and information security breaches continued unabated, and that the financial toll was mounting.... Even by enacting the rights violation such as the digital divide, cybercrime, digital security has increased thus affecting people's lives either directly or indirectly (Walters, 2001). ... (2001) Privacy and security: An Ethical Analysis, Computers and Society, 31, 2, 8- ...
Preview sample
Medical Data Security
8 pages (2000 words) , Download 2 , Research Paper
Free
Medical Data security Lecturer: RELATED WORK It should be d that hierarchical access control via encryption is not anew idea.... This study mainly focused on a small number of general interns (three using the EMR and three not using).... The basis of statistical analysis was the comparison of the EMR encounters with the paper chart encounters....
Preview sample
American Policies in the Middle East
10 pages (2887 words) , Download 2 , Essay
Free
Foreign – re: Western – troops on the border with Iran are very threatening for the theocratic republic of Iran and the invasion in 2003 has exacerbated already tense relations between Iran and the United States.... The US invasion of Iraq was controversial for a variety of reasons, the not least of which was the fact that the invasion did not first receive United Nations security Council approval: an important condition in international relations which effectively legitimizes decisive political action....
Preview sample
Doctrines in the US
4 pages (1000 words) , Download 3 , Essay
The advances in technology pose an even bigger threat to the security of the citizens of the United States as well as peace and stability on the international stage.... Name: Professor: Course: Date: Doctrines in the US The Monroe doctrine and the Washington Neutrality Proclamation are some of the doctrines that that had the isolationist tone that had been adopted by America as it shaped its foreign policy....
Preview sample
The Importance of Homeland Security and Adequate and Effective Disaster Planning and Management
9 pages (2541 words) , Download 3 , Coursework
Free
This coursework describes the importance of homeland security and adequate and effective disaster planning and management.... Homeland security Introduction The Inter 35 W Mississippi River Bridge (I-35W) opened in 1967 and the bridge was 907 feet long with 14 spans and the amount of vehicles that averagely passed through the bridge was 140,000 in 2007 making it the second busiest highway in Minneapolis.... The response of the Department of Homeland security and emergency management team (HSEM) was marvelous in the collapse of the I-35 W Bridge and worthy of commendation, while about 50 agencies were there for the rescue and recovery operations (DHS, 2007)....
Preview sample
Role of DHS to Enhance Special Operations Force Structure
3 pages (750 words) , Download 3 , Essay
The DHS is working to establish a detailed report of its achievements through investments in interagency forums like border Enhancement Security Task Force (BEST) and Integrated border Enforcement Team (IBET).... 1) facilitating the border security intelligence information, (2) facilitating the sharing of resources like equipments and personnel (3) serving as a tool for deconfliction.... Components of DHS also included joint operations as a means to integrate federal border security efforts....
Preview sample
Changes in the International Order
8 pages (2137 words) , Download 1 , Coursework
Free
It soon became an International Society that sought to maintain order throughout the world and changed the nature of International Relations by peacefully resolving border disputes.... According to Waltz all States are essentially seekers of security looking to maximize their own safety at all times.... The United Nations had unprecedented authority derived from its security Council of Superpowers in contrast with the League of Nations....
Preview sample
Meaningful Use Concept in Healthcare
5 pages (1444 words) , Download 3 , Essay
Free
The concept of meaningful use is based on a number of vital health outcome priorities which include but not limited to improved population and public health; enhanced privacy and security of patient medical information; superior quality, efficiency, safety and minimized health disparities; enhanced care coordination; and increased engagement of patients and their families in the care (“Policymaking, Regulation”, 2012).... Privacy and security issue is one of the biggest concerns associated with meaningful use of EHR that bothers healthcare leaders, policy makers and personnel....
Preview sample
Role of Medicaid
12 pages (3365 words) , Download 2 , Research Paper
Free
The program's supplemental health coverage assists many poor and elderly households to access health care and provides financial security by shielding them from the exorbitant costs of health care.... It was formed in 1965, under Social security Act.... Besides Medicaid, programs like Supplemental Income and Social security Insurance give financial support to people living with HIV.... Additionally, the Congress and the Social security Administration ‘s Health Care Finance Administration (HCFA ) is always in the forefront in collaborating with Medicaid....
Preview sample
Violence Against Refugees
8 pages (2000 words) , Download 4 , Essay
Free
It is a situation wherein 'the security of individuals is locked into an unbreakable paradox in which it is partly dependent on, and partly threatened by, the state.... It is a situation wherein 'the security of individuals is locked into an unbreakable paradox in which it is partly dependent on, and partly threatened by, the state.... Word Count 2,500 SECTION A Introduction The refugee status is a very difficult, albeit a very delicate It is a situation wherein 'the security of individuals is locked into an unbreakable paradox in which it is partly dependent on, and partly threatened by, the state....
Preview sample
Physical security assessment on the VA medical center
12 pages (3000 words) , Download 3 , Assignment
Free
The author of the paper provides an interview with the institution's security the institution was particularly under-staffed as pertains to security.... This project 'Physical security assessment on the VA medical center' entails a physical security assessment on the VA medical center in Birmingham.... The project involved two main parts: going through all areas of the buildings within the institution and checking for security devices such as locks....
Preview sample
The Security of Access Management Systems
46 pages (10251 words) , Download 3 , Dissertation
This dissertation "The security of Access Management Systems" focuses on freedom from any sort of danger or fear.... security is one of the most important aspects of an access management system since the login credentials of the users need to be safeguarded with security measures.... The different forms of security have been categorized into three divisions.... Each of these aspects has a different degree of security related to it....
Preview sample
Mediation Efforts in the Arab-Israeli Conflict
19 pages (5288 words) , Download 7 , Research Paper
Free
(1985) Power & Principle: Memoirs of a national security Advisor New York: Farrar, Straus & Giroux Coombs, C.... The Arab-Israeli conflict comes with two main thing that are fundamental to negotiations are land concessions and security (Eisenberg and Caplan, 2010).... The United States' position as a mediator was steeped in the UN security Council Resolutions 242 and 338.... This way, lands could have been transferred from the Israelis to the relevant Arab groups in a manner that would not have threatened Israel's security....
Preview sample
Privacy, Security and Trust Issues with E-Health Systems
12 pages (3568 words) , Download 1 , Literature review
Free
The paper 'Privacy, security and Trust Issues with E-Health Systems' is a comprehensive variant of the literature review on health sciences & medicine.... The privacy, security, and trust of information stored in the e-health system are increasingly becoming an issue that is gaining growing concern.... The paper 'Privacy, security and Trust Issues with E-Health Systems' is a comprehensive variant of the literature review on health sciences & medicine....
Preview sample
Countering Terrorism: Examining the Tactics of Rendition and Extraordinary Rendition of the US
12 pages (3499 words) , Download 1 , Term Paper
Free
esearch indicates that terrorism and terrorist groups have always been the focus of the departments of US, which include ‘executive branch agencies (for example, the State Department, CIA, and FBI) as well as Congressional bodies – including the Senate Select Committee on Intelligence and the Congressional Research Service' (The national security Archive, 2001). ... ??The September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon and the abortive attack (possibly aimed at the White House or Camp David) that resulted in the crash of a jetliner in Pennsylvania has resulted in a new and extraordinary emphasis by the Bush administration on combating terrorism' (The national security Archive, 2001)....
Preview sample
Trade Union Activity
24 pages (6301 words) , Download 1 , Essay
All members to play an active and prominent role for the sake of national democracy.... The national political economies in which they are embedded are being eroded by simultaneous economic internationalization and decentralization of employer strategies, rapid British integration, and a neo-liberal reassertion of the primacy of markets.... Promotion, redundancy, the calculation of piece rates, the installation of new machinery, are all now covered in various industries by national Working Rule Agreements....
Preview sample
American Association of Retired Persons
8 pages (2106 words) , Download 1 , Term Paper
Free
The organization referred to this campaign as the future campaign and it involves children talking about health care of the state and financial security.... Further, this organization influenced the congress by resting radical transformations to Social security in 2005 (Frederick, 2011).... ARP designed the ‘Divided We Fail' slogan to deal with healthcare and financial security.... (2011): One nation under AARP: The fight over Medicare, social security, and America: university of California Press ...
Preview sample
Peacekeeping and Collective Security
11 pages (3210 words) , Download 3 , Essay
Free
This essay "Peacekeeping and Collective security" accounts using historical examples for the differences between peacekeeping and collective security, and compares these concepts to those outlined by Boutros Boutros.... Freedom from its cold-war constraints may have gone a bit to the UN security Council's head.... Running Head: peacekeeping and collective security Using historical examples account for the differences between peacekeeping and collective security....
Preview sample
Argument in Support of Illegal Immigrants receiving Social Services
4 pages (1000 words) , Download 2 , Essay
Free
Empowered by the “border Protection, Anti-Terrorism, and Illegal Immigration Control Act, 2005” the American administration has received authority to restrict illegal immigrants from receiving social services.... This huge population that does not have any legal right to reside and enjoy the benefits as offered by the nation is also considered to be threats against economic and social security of common US citizens (Colton-Sonnenberg 2-3)....
Preview sample
Evolution of the American Presidential Elections
11 pages (2784 words) , Download 0 , Essay
Free
Case in point is the reinstatement of the lifetime Secret Service protection of former presidents and their families probably due to the increase in global insecurity and terrorism that makes them high priority targets due to their understanding of security and intelligence protocols and strategies.... Before these elections, the United States operated under the 1781 Articles of Confederation that gave the Confederation Congress the powers to run the national government....
Preview sample
HRM Practices in Security 24-7 Ltd
12 pages (3414 words) , Download 3 , Essay
Free
The paper "HRM Practices in security 24-7 Ltd" states that employee development programs have always been one of the best sources of attraction for employees of the company because these help increase employee retention, which is beneficial for the employers.... This report describes in detail two of the main HRM practices implemented in the chosen company, security 24/7 Ltd: employee benefits and employee development.... HRM Practices in the Chosen Organization Introduction This report describes in detail two of the main HRM practices implemented in the chosen company, security 24/7 Ltd: employee benefits and employee development....
Preview sample
Tecnicas Medioambientales Tecmed Issues
6 pages (2375 words) , Download 2 , Case Study
Free
It was granted license to operate by the mexican government, effective until 1998.... 9 Furthermore, the mexican authorities failed to maintain a reasonable proportionality between the interest protected (i.... he subsequent actions of the mexican authorities in shutting down operations therefore showed a lack of good faith and transparency, thereby violating its FET obligation.... The Tribunal's view of the actions of the mexican authorities have been perceived as within reason, in reaction to the circumstances then unfolding, and consistent with the constraints inherent in a democratic state in response to the actions conducted by the protesters....
Preview sample
Nuclear Weapon and Cold War
10 pages (2500 words) , Download 3 , Essay
The United States government started to take an active role in the world and the security of the nation instead of maintaining its isolationist views.... The United States government enacted organizations, policies, plans, and treaties to insure the safety and security of themselves and their allies, therefore taking on a very untraditional role.... At the end of the Second World War, the major concern was the containment of communism and the security of the United States and its allies....
Preview sample
Supreme Court Case of Korematsu
7 pages (1795 words) , Download 3 , Essay
Free
he decision of the court which was delivered by Justice Black and which had a 6-3 decision was the affirmation of the conviction order for Korematsu where it sided with the government about its national security and prevention of espionage.... This was strictly a matter of national security and the lives of the millions of Americans and hence would not be treated as just merely a constitutional or human rights issue as the plaintiff wanted.... The court's opinion on this issue was it could not separate the issue of detention and that of the exclusion order as they were one and the same and the military must have had good reasons to detain those individuals as a matter of national security....
Preview sample
Political and Geo-Political Controversies of the Modern World
9 pages (2571 words) , Download 1 , Assignment
Free
hy is ‘human security' in tension with ‘national security'?... uman security is not always compatible with national security for the primary reason that nation-states are artificial constructs while universality in humanity is a natural concept.... Given the looming threat of nuclear warfare, the whole human race could be annihilated if two powerful nations engage in war for ‘national security'.... To cite an example from contemporary politics, the American led invasion of Iraq is projected by the Bush Administration to be in the interests of Americans and their security....
Preview sample
Social Security Trust Fund
5 pages (1322 words) , Download 0 , Essay
Free
According to research findings of the paper 'Social security Trust Fund', the level to which the Social security Fund is able to exist at the current and project rate of payouts is terminal, but with the correct policy and some painful policy, the case for Social security is not nearly so bleak.... Understanding the Social security Trust fund and the means by which it operates, manages debt, and has evolved over the past years to represent what we see today is an extremely important facet of understanding the future of governmental finance, taxation and prospects for retirement both for the current generation of retirees as well as our own generation....
Preview sample
1301 - 1350 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us