StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Employers Obligations under the 4th Edition of FIDIC Red Book
49 pages (10745 words) , Download 2 , Thesis
Clause 26 of the Red Book gives the legal framework which requires the contractor to comply with all national laws, ordinances, laws, regulations, bye-laws of any local authority for execution and completion of works and for remedying the defects found later.... This thesis "The Employers Obligations under the 4th Edition of FIDIC Red Book" discusses the version of Conditions of Contract for Works of Civil Engineering Construction in 1957....
Preview sample
What is Denoted by the Word Security
11 pages (3235 words) , Download 0 , Essay
Free
Hence, the value of national security to a nation varies from a country to the other depending on the extent of security the country has already established.... Various concepts of security have revolved around human security, national security, collective security, shared security, bio security, cooperative security, information systems security and sustainable security (Soltani & Yusof, 2012).... Wolfers (1952) defines security in the context of national security....
Preview sample
Porfirian Diaz and his role in the Mexican Revolution
14 pages (3500 words) , Download 2 , Research Paper
Free
The author of the paper "Porfirian Diaz and his role in the mexican Revolution' aims to consider a regime that created so many underpinnings for 1910 Revolution in Mexico.... Porfirian Diaz and his role in the mexican Revolution Introduction Many countries have the experience of Revolutions.... The agrarian reform evokes a vivid turmoil in the mexican society and in some regions rebellions were very active, while in other regions these rebellions remained quite tranquil....
Preview sample
Exploring Ethics by Steven Cahn
18 pages (4803 words) , Download 0 , Assignment
Free
The paper "Exploring Ethics by Steven Cahn" discusses that one of the biggest faults with the death penalty is that it's a poor man's justice and it never applied equally and fairly in all cases.... This reflects the fact that society its-self is never fair.... ... ... ... In response to Bedau's concerns over the deterrence of the death penalty, Van Dan Haag states that the legal system proportions threatened penalties to the gravity of crimes, both to do justice and achieve deterrence....
Preview sample
The Brand Strategies which Toyota May Adopt to Improve Tarnished Brand Image
13 pages (3250 words) , Download 3 , Term Paper
Free
Most of the security concerned individuals stated that they will altogether stop buying Toyota's products as they are outsourcing most of their automobile manufacturing.... Most of the security concerned individuals stated that they will altogether stop buying Toyota's products as they are outsourcing most of their automobile manufacturing.... However, on the other hand, the companies like Toyota, Ford, Honda, GM, Fiat etc offer same ranges of cars and consumer have lower switching cost (national Academy of Sience,2011)....
Preview sample
Blank Page Media UK Private Limited Management and Organization Structure
26 pages (6863 words) , Download 3 , Assignment
The paper "Blank Page Media UK Private Limited Management and Organization Structure" states that Dot Comm Unity aims to strengthen links between industry & colleges/universities by offering brief sets prepared by our willing clients to the students.... ... ... ... JUNCTURE PRODUCTIONS – A partnership firm having a documented and registered Partnership Deed among the board of directors of BLANK PAGE MEDIA UK PRIVATE LIMITED (henceforth referred to as BPM UK Private Limited)....
Preview sample
Computer Security Policies
4 pages (1000 words) , Download 4 , Essay
To further enhance our capabilities aside from our modern infrastructure and certified personnel, our company has started the “road map” to ISO 17799/27001 – Code of Practice for Information security Management and Information security Management Systems certification.... This is a globally-recognized information security certification that ensures a company practices globally-accepted and best practices in information security – all our corporate policies are based on this ISO standards....
Preview sample
Whether an Administrative Security Protection Board Is Valid or Not
11 pages (2647 words) , Download 0 , Case Study
Free
The national interest, in this case is the matter of national security.... The federal laws allow the government to take any measure for the purposes of national security.... This means that the funding for the program is may impact positively on the issues of national security in future. ... It is also important to note that the government has the powers to make decisions for the purposes of national security.... However, the border security legislation amendment act 2002 gives the government power to ensure that the border is protected....
Preview sample
Canthaxanthin in Salmon
26 pages (7308 words) , Download 2 , Research Paper
The paper "Canthaxanthin in Salmon" highlights that the members of the countries are becoming more aware of the potential dangers that they are exposing their citizens by allowing the continued access of the people to products that are genetically modified.... .... ... ... The policymakers in the entire process of genetic modification are eager to simulate their findings on the effects of genetically modified food on real people....
Preview sample
Preparedness Homeland Security
7 pages (1802 words) , Download 2 , Assignment
Free
The paper "Preparedness Homeland security" describes that the need for a National Incident Management System ( NIMS ) became even more apparent after the September 11 attacks on the twin towers of World Trade centr and other targets of strategic importance ( W.... HOMELAND security: NATIONAL INCIDENT MANAGEMENT SYSTEM (NIMS) Introduction: The National Incident Management System NIMS is the system for the coordination of emergency preparedness and incident management among the various federal, state and local agencies of United States of America....
Preview sample
Security Operations Management Practicum
2 pages (500 words) , Download 2 , Assignment
Free
This paper "security Operations Management Practicum" focuses on the adjudicative process which is cross-examination and careful weighing of a person's correct and reliable information either about his or her past or present life.... In line with Guideline F regarding Financial Considerations, if a behaviour (financial debt) happens in a circumstance that is unlikely to recur and does not cast doubt on individual's current reliability, good judgment or trustworthiness, such a condition could lead to mitigating a security concern (Herbig12)....
Preview sample
International Security and the State
6 pages (1523 words) , Download 1 , Essay
Free
This essay "International security and the State" discusses the end of the Cold War and the fall of the two-block system.... International security and the state ... Consequently, the aftermath of the Cold War was characterised by more instability, more security challenges and international conflicts8. ... The nature of security in the world is much more stabilised as compared to the cold war era.... Moreover, US invasion of Iraq is also a major security threat to the world11....
Preview sample
Vietnam Market Competitive Pricing
40 pages (10000 words) , Download 2 , Assignment
The following assignment entitled "Vietnam Market Competitive Pricing" concerns the AK underwear company which is based in Vietnam that aims to produce high-quality men and women underwear and home clothes.... It mostly concentrates on the young adults.... .... ... ... It has two product divisions, Rock for men and Annie for women....
Preview sample
The Department of the US Homeland Security
6 pages (1727 words) , Download 2 , Research Paper
Free
he United States' technological infrastructure serves as a backbone behind the progress of the country's national security, economic and social activities.... The paper "The Department of the US Homeland security" describes that to ensure that the country's CIKR is protected from terrorist attacks, it is important to encourage each of the stakeholders to actively participate in the development and implementation of the NIPP framework.... the Department of Homeland security was created and has been challenged in terms of finding ways to strengthen its local and state security against terrorism (The National Strategy for the Physical Protection of Critical Infrastructure and Key Assets, 2003, p....
Preview sample
Strategic Perspective - Zara Report
15 pages (3750 words) , Download 6 , Essay
Strategic Perspective - Zara Report Executive Summary The global fast fashion industry is one of the fastest growing segments, which significantly tends to create fiercely competitive environment.... The organisations in this respective industry seek to integrate exceptional business strategies in order to attain the competitive position among the growing number of competitors....
Preview sample
Legal Order of European Community
11 pages (3162 words) , Download 2 , Essay
Free
Among other things, this challenge posed for the EU the problem of mutual management of its common border, which also belongs to the category of problems that states have before them.... However, another peculiarity of the legal order of the EU in this connection is represented by the policy of cross-border co-operation which, instead of assignment to borders of a strictly dividing function, works to connect rather than separate border area communities....
Preview sample
Security to Socially Conventional Issues
2 pages (821 words) , Download 0 , Research Paper
Free
"security to Socially Conventional Issues" paper argues that social security is given to people by the government when they do not earn enough money to fulfill their basic needs like food and clothes or when they face some major problems like torture.... In the segregation act, the government has given equal rights and complete social security to blacks.... Social security is a program through which governments give security to socially conventional issues such as poverty, old age, disability, unemployment, etc, and social security is everyone's right....
Preview sample
Computer Network Security
5 pages (1250 words) , Download 2 , Case Study
Free
This essay discusses that network security is continuously evolving and becoming a challenging aspect for organizations maintaining highly sensitive and customer data.... From this paper, it is clear that network security appliances are implemented for providing three fundamental functions i.... Some of the most commonly adopted security appliances are Firewalls and Intrusion Detection Systems.... Computer Network security ...
Preview sample
Globetrotting Hotels Security Management
9 pages (2620 words) , Download 3 , Coursework
Free
From the paper "Globetrotting Hotels security Management" it is clear that hotels are a typical area for fingerprint biometrics to get hold of ongoing security guarantee, for the reason that on average, lost keys and cards cost them approximately $ 2 each day for each room.... Table of Contents Table of Contents 2 Executive Summery 3 Introduction 3 Need of Technology 4 Globetrotting Hotels security Management 6 Globetrotting Hotels Online Payment Technology 8 ...
Preview sample
Mexican Chicago Critique
4 pages (1129 words) , Download 2 , Essay
Free
The author based her thesis on the revolutionary content of the mexican ethnic group between 1916 and 1939.... For example, based on the revolutionary context of origin of the mexican in Chicago between 1916 and 1930, Arredondo believes that these Mexicans did not merely form part of the ethnic groups that worked to be assimilated into a city with long history of absorbing newcomers. ... Whereas her argument concerning gendered racialization becomes more detailed when she presents the basically negative effect of Male Mexican behavior on the mexican women while tackling gender relations in chapter 4, she increases the chances of promoting gender stereotypes....
Preview sample
Internet and National Boundaries
10 pages (2962 words) , Download 0 , Research Paper
Free
Internet has promoted trans-border communication and particularly with the current trends of globalization.... As Berger (2009) argues, unfortunately, the use of Internet as a potential force to promote the good of trans-border relationship can backfire.... Looking at the past interconnections, it is possible to say that Internet has led to constructive ideas and trend that will shape the current and future inter-border communication and interaction....
Preview sample
Rational Choice Theory
7 pages (1750 words) , Download 4 , Term Paper
Free
The author examines the theory of Rational Choice which has influenced the evolution of criminal law, crime prevention systems and law enforcement practice.... The theory, founded on Jeremy Bentham's Principles of Utility, asserts that individuals who are involved in crime are rational actors .... ...
Preview sample
Computer Security
9 pages (2250 words) , Download 2 , Research Paper
Free
The paper gives detailed information about the computer security.... Therefore, computer system security is considered to be the vital aspect of any organization.... Computer security ... Therefore, computer system security is considered to be the vital aspect in any organization (Armor2net Software Ltd.... Furthermore, web based technology and digital companies make it simple to collect, incorporate, and share business information, offering new fears regarding the suitable usage of customer details, the safety of individual confidentiality, as well as the security of intellectual property of the organization (Armor2net Software Ltd....
Preview sample
Protecting the border
2 pages (500 words) , Download 2 , Essay
Free
“No system depending on a strict regard for the rule of law Protecting the border Throughout the history of America, people of differing ideologies have generally agreed on immigration controls.... Those who favor amnesty for illegal aliens, specifically those crossing the southern border do not seem to realize that a crime has been committed and not, as they might have you believe, one without a victim.... The massive numbers of illegal aliens pouring across mainly the southern border has and continues to cause substantial economic, social and physical harms to legal citizens....
Preview sample
Oil, Transition and Security in Kazakhstan
3 pages (924 words) , Download 5 , Assignment
Another weakness confronted by Kazakhstan is the high-cost variable of traveling across the border at the local and international levels.... 203)Pollution, lack of educational institutions and poor border security issues are other noticed weaknesses of the country.... In the paper 'Oil, Transition and security in Kazakhstan' the author discusses Kazakhstan, rich in oil, gas and mineral resources, which utilized foreign investment throughout the Russian Empire and acquired many mining properties developed by foreign companies....
Preview sample
State Laws versus National supremacy
6 pages (1500 words) , Download 4 , Essay
Free
hey cite lack of federal enforcement and security reasons as the main reasons they defy the constitution and act on behalf of the National government.... This paper is aimed at providing a comparative study of State Laws versus national supremacy.... This will continue causing debates and conflicts within state and national government.... State Laws versus national supremacy ... Supremacy Clause is available in Article six of the American national constitution....
Preview sample
The Impact of the English as Second Language Student-Centred Approach on Saudi Students and Teachers
112 pages (35781 words) , Download 3 , Literature review
Premium+
The paper "The Impact of the English as Second Language Student-Centred Approach on Saudi Students and Teachers" empirically reviews the literature of student-centered and teacher-centered approaches.... The latter is the teaching approach used in Saudi Arabia in writing lessons.... ... ... ... Based on the results of the Marton and Saljo phenomenographic study conducted during the 1970s, a novel research tradition arose, which is the student-centered approach (Blumberg, 2012)....
Preview sample
Chief Security Officer
8 pages (2092 words) , Download 2 , Assignment
Free
The paper "Chief security Officer" discusses that the security of important documents in learning institutions is a factor that should never be ignored.... The chief security officers serving in the institutions of higher learning should establish measures that enhance reduced cases of cyber-crimes.... The issue of security is a primary concern in all developmental plans.... In essence, before establishing an enterprise or an institution, it is necessary to ensure that effective security mechanisms are put in place....
Preview sample
Wars and Territorial Expansion in Securing Rational Efforts of the State
6 pages (1749 words) , Download 2 , Essay
Free
The reasons for engagement in war and expansion of territories for different nations were diverse with the first reasons being the security dilemma.... According to analysis of different wars that transpired within different areas of the world, the major reason for efforts to expand territories and take part in warfare was purely to make the nation or kingdom have more security compared to its enemies.... security was considered the most imperative aspect for any leadership mainly in the yester years since no permanent boundaries had been in place, as evident today where boundaries have been predetermined....
Preview sample
Involvement of the U.S Military in Border Protection and the Drug Policy Since 1960s
4 pages (1000 words) , Download 4 , Essay
Free
The United States has adopted various border protection and drugs policies since 1960s that have affected the global community in diverse ways.... Military in border Protection and the Drug Policy Since 1960s Facilitator: The United s has adopted various border protection and drugs policies since 1960s that have affected the global community in diverse ways.... Involvement of the U S Military in border Protection and the Drug Policy Since 1960s Introduction The United States' borders are extensively guarded following effective legislations that target safeguarding Americans....
Preview sample
Security Concerns for America
4 pages (1000 words) , Download 2 , Essay
Perimeter security, alarms, guards, response planning, and intelligence gathering are all considered to be counter-terrorism.... SurveillanceThe combination of technology and our nation's need for security has changed the way surveillance is conducted, as well as the ease with which it is justified....
Preview sample
The Contract Law of Australia
15 pages (3750 words) , Download 3 , Article
Free
In the article 'The Contract Law of Australia' the author discusses the issue when seller shall not be liable for loss or damage due to delay in the manufacture, shipment, or delivery resulting from any cause beyond seller's direct control or due to compliance with any regulations, orders.... ... ...
Preview sample
Knowledge and Information Security
8 pages (2083 words) , Download 2 , Essay
Free
The paper "Knowledge and Information security" tells us about cybercrime.... Research Exercises PTR220 Knowledge and Information security Trimester 2, 2008 Research Exercise Week 2's topic, en d Cyber crime, provides anoutline of specific Internet-based crime.... It will introduce the threat to information security as seen through the eyes of an attacker, and will cover: ... range of counter-measure and their efficacy in protecting knowledge and information security relating to the individual ...
Preview sample
The Social Security Program
1 pages (250 words) , Download 2 , Essay
Free
This essay talks about the most efficient run program in all state oriented activities in the United States - social security program which It is legally established in America's constitution as the Social security Act in 1935 and deals with the monitoring process of social welfares of its citizens.... A major lead in the implementation of the Pension Social security program is that it provides additional funds to cater for other essential needs being monitored by the federal government for the sake of its citizens....
Preview sample
Horror Remakes
37 pages (9250 words) , Download 2 , Dissertation
Introduction ... The horror genre has been an indisputably popular one for a very long time.... Audiences get thrills from being scared.... That said, horror films are much more than a means for delivering cheap thrills.... .... ... ... Introduction ... The horror genre has been an indisputably popular one for a very long time....
Preview sample
Security Issues of Bitcoin
5 pages (1371 words) , Download 1 , Essay
Free
The paper "security Issues of Bitcoin" discusses security problems associated with bitcoin.... According to Schouwenberg, a security researcher of Kaspersky Labs, Criminals pose threat to Bitcoins because it is almost impossible to trace them after stealing Bitcoin, so it is easy to spend it after stealing.... Despite the implementation of several security measures, the risk of theft is high.... Bitcoin - security Issues – IT professional and society ....
Preview sample
Oil Discovery and its effect on democratic growth in Ghana
20 pages (5000 words) , Download 2 , Essay
Oil companies who led the explorations were Kosmos Energy of US and Tullow Oil of UK under the supervision of Ghana national Petroleum Corporation (GNPC).... The average living standards in this region lag far behind those in the real world.... As the world faces a new millennium and countries....
Preview sample
National Response Plan
1 pages (360 words) , Download 3 , Essay
Free
The essay under the title "national Response Plan" states that emergency management in the United States of America has drastically taken another direction, which is relatively new to many agencies, following the danger posed by future terrorist attacks.... The federal government, therefore, created a national Response Plan which was considered an all-discipline and all-hazards plan (Bullock et al, 2012).... The main aim behind the establishment of the national Response Plan was to create a single and comprehensive framework that involves almost all government levels in managing domestic incidences....
Preview sample
Evolution and Relevance of the United Nations Security Council
9 pages (2541 words) , Download 1 , Essay
Free
The paper "Evolution and Relevance of the United Nations security Council" states that the UN body has taken sides, particularly during the Cold War.... Evolution and Relevance of the United Nations security Council (UNSC) Since its inception, the United Nations has always played an active role in peace building and peace keeping across the globe.... Through the United Nations security Council (UNSC), which currently consists of 15 members, it has made revolutionary resolutions in the past and it continues to oversee global peace and understanding (United Nations security Council, 2015)....
Preview sample
National Programme for IT
4 pages (1000 words) , Download 3 , Essay
The British government offered eight big contracts in IT to different organizations so that they could develop IT systems in Europe's largest public sector organization, national Health Service [NHS].... These are NASPS, NISPS national application service providers (NASPS) will be responsible for delivering national application.... PS will have the responsibility of delivering the local aspects of national care record service (NCRS)....
Preview sample
Aviation Security Requirements
2 pages (623 words) , Download 4 , Essay
Free
The essay "Aviation security Requirements" focuses on the critical analysis of the major issues in the requirements of aviation security.... Aviation security refers to all safety measures and regulations applied in airports to safeguard aircraft, airport staff, and passengers from criminal activities.... Due to the significance of this industry to a country, security is one of the primary concerns associated with aviation.... everal steps have been taken to heighten security in the aviation industry....
Preview sample
The Transportation Security Administration Agency
6 pages (1579 words) , Download 2 , Research Paper
Free
The national security was at a stake after such incident.... The private agencies were beyond reach of general public so the decision of implementation of a federal body in all types of transportation systems has eased the work method and it has ensured the national security and public safety.... he TSA as known as the national security providing agency in the U.... The paper 'The Transportation security Administration Agency' focuses on a federal department agency for security in the U....
Preview sample
Is Authentic Leadership More of Developed Than Born
21 pages (6626 words) , Download 6 , Dissertation
This dissertation "Is Authentic Leadership More of Developed Than Born" discusses how transformational leadership is developed.... Associates require preparedness to develop leadership skills.... It deals with increased performance due to trust given by subordinates to their leaders.... .... ... ...
Preview sample
Doctors without Borders
7 pages (1911 words) , Download 2 , Assignment
Free
They always evaluate the nature of the situation, security and the kind of aid required.... It also involves measuring the level of security within the area where the problem has occurred (Suen 55).... The paper 'Doctors without Borders' seeks to evaluate an organization that was founded in France and comprises of doctors who travel to different countries to offer medical help....
Preview sample
Human Security and the Face of War in United Kingdom
6 pages (1726 words) , Download 0 , Essay
Free
The proponents of security dispute the relevance of the concept of national security by asserting that the proper focus for security should be the individual.... The proponents of human security dispute the relevance of traditional concept of national security by asserting that the proper focus for security should be the individual rather than the state.... This paper ''Human security and the Face of War in United Kingdom'' tells us that human security refers to an emerging paradigm for comprehending worldwide vulnerabilities....
Preview sample
Humanitarianism and Security
9 pages (2250 words) , Download 2 , Essay
Free
The link between security and development has also been an issue of concern to many.... Block 4: Humanitarianism and security 7.... he link between security and development has also been an issue of concern to many.... Specific issue of concern has been the role the international communities have in providing security for individuals in the developing world.... umanitarianism, institutional development and security ...
Preview sample
Mobile Application Security Issues
12 pages (2975 words) , Download 1 , Case Study
Free
The paper "Mobile Application security Issues" overviews mobile security issues associated with all layers of the 'OSI model', recent threats along with their behavior and triggers that led them to successfully breach the network or mission-critical data of an enterprise.... The security of mobile devices is now one of the most critical success factors for an enterprise and 'Information Technology' decision-makers.... As mobile applications and mobile devices are now ubiquitous in the corporate market, they bring a vast variety of security concerns with them....
Preview sample
The Doctrine of National Sovereignty
10 pages (2500 words) , Download 2 , Term Paper
Free
The charter's idea was to ensure that there will be prevailing peace, justice and the security is not endangered.... ?The United Nations, peace and security from collective security to the responsibility to protect.... The author of this term paper "The Doctrine of national Sovereignty" points out that sovereignty is base on having the authority that is independent over the set geographical area.... The Doctrine of national Sovereignty ...
Preview sample
Industrial Security Plan
7 pages (1860 words) , Download 3 , Assignment
Free
"Industrial security Plan" paper examines a set of procedures set forth to protect workers in an industrial setting.... security officers carry out industrial safety plan implementation and they have responsibilities and roles pertaining to safety inspections, safety training, and policy development.... Industrial security Plan al Affiliation) Introduction An industrial safety plan is a set of procedures set forth to protect workers in an industrial setting....
Preview sample
Domestic Crime Rate and the Right to Bear Arms
16 pages (4000 words) , Download 2 , Research Paper
Free
The Second Amendment to the US Constitution declares that a well – regulated Militia is essential for preserving the security of a free state.... The Second Amendment to the US Constitution declares that a well – regulated Militia is essential for preserving the security of a free state....
Preview sample
13501 - 13550 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us