Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
19 pages (5165 words)
, Download 6
, Research Proposal
Free
This paper ''Customer Boycotts'' tells us that the proposed research study aims at addressing the various factors associated with customers' participation in boycotts.... The tendency of customer boycotts has increased to a great extent as a depiction of consumer activism against the unethical business functions....
7 pages (1750 words)
, Download 2
, Research Paper
Eleven days after the September 11, 2001, terrorist attacks, then-President Bush appointed the first-ever director of the nascent Office of Homeland security.... A year later, with the passage of the Homeland security Act by Congress in November 2002, the Department of Homeland security (DHS) formally came into being as a standalone (Kemp, 2012, p.... omeland All the national efforts to protect America from external and internal threats are currently included under homeland security....
Currently, it is the mexican National Museum of History.... odernization and its effect upon the mexican Revolution
... the mexican Revolution was influenced by among other things, the rapid modernization on Mexico.... This came to be known as the mexican revolution.
... The presidency is at the top of the mexican political system.... The country of Mexico is located on the Southern border of the United States....
6 pages (1869 words)
, Download 3
, Research Paper
Free
Taking the broadest perspective Dominic Corva argues that the militarization of the mexican border and the 'war on drugs' are both reflective of the death of liberalism in America both domestically and internationally.... The Human Geography of the Drug trade between Mexico and the United s Introduction The following discussion of human geography will focus on the the impact of drug trafficking across the mexican border with the United States.... the mexican border has always been problematic for the United States....
9 pages (2384 words)
, Download 2
, Research Paper
Free
This research paper "Policy Issue: national Population Control" discusses alternative policies that will yield better results when they are implemented on a proper basis.... national Population Control Public Administration- Policy Analysis-Analytical paper that will analyze and make a recommendation on a policyissue-national POPULATION CONTROL
...
The reporter states that existence of different employees and employers from different age groups has with time brought about different challenges as well as benefits to any given workplace.... There is need to have a balanced workforce where each one in the workforce feels appreciated for their contribution....
5 pages (1250 words)
, Download 2
, Research Paper
Homeland Security provides border and transportation security, 2.... Donna Purcell Order 541145 27 May 2011 Homeland security: The States, In Relation to Exercise, Design, and Evaluation.... “security risk, financial worries, and Mother Nature will always be on the horizon.... ?? There are many things that Homeland security does to protect us.... They provide infrastructure security and analysis of the information....
For the corporations, governments and other non-state bodies that engage in these illegal actions, they always engage in espionage, financial theft and some other cross-border crimes (Santanam, Sethumadhavan and Virendra 2011).... The paper "Corporate security Breaches" tells that corporations are incorporated bodies that consist of a tremendously large number of shareholders, and in which the actual ownership of the entity can be transferred at any moment without the approval of other shareholders....
One of the major features of cyber warfare is the ability to attack even Attacks on national security through the use of Internet and computers Attacks on national security through the use of Internet and computers “Cyber warfare or information warfare involves units organized along nation-state boundaries, in offensive and defensive operations, using computers to attack other computers or networks through electronic means”(Billow & Chang, 2004, p.... America like countries are currently tightening security measures against information warfare....
he main usage today of wireless technology is for the usage of internet so much that both Wireless security: An Overview As we move ahead into the 21st century , the wireless medium of communication and connection is becoming the preferredchoice for everyone who use technology.... None the less for any of the activities performed over the internet every user wants privacy and security.... security of the connection ensures the integrity and originality of the data and assures the user that his information is safe....
The new research has the following general theoretical advances that include studies on the impact of informal policy networks in the realm of national security, experts that share a common understanding to influence policymakers, treat securitization, and studies on Security Sector Reform.... Barak and Gabriel (1) state that Security Sector consists of intelligence agencies, military industries, paramilitary forces, internal security, police forces, coast guards, border guards, and the military constitute....
"Security in Government: What Constitutes the Australian national security Architecture" paper examines the policy statement delivered by then Prime Minister in December 2008.... The policy has created a paradigm shift where there has been restructuring, the creation of new authorities, and new roles....
The paper "The Ethical Issues of Information security " looks at the ethical issues of information security as well as the various legislations that have been made to guarantee information security to individuals as well as to organizations and the empirical theories that explain behavior.... Information security is a very sensitive issue because of the ethical issues that are raised as areas of concern.... Attacks that have been directed at information assets have heightened the need for information security....
This assignment "Practical UNIX security" shows that Unix is the operating system that was foremost developed in the 1960s and is under regular development since that time.... unning Head: UNIX security UNIX security Unix is the operating system which was foremost developed in 1960s and is under regular development since that time.... UNIX security is the way of protecting a UNIX or any other Unix-like operating system (Ross Seth T....
18 pages (5110 words)
, Download 0
, Literature review
Free
The capital markets make use of financial information in setting security prices (Xie, Davidson III & DaDalt, 2003).... Advances in communications and technology have brought lands that were distant closer and made it important to leverage good business ideas and product innovations across national borders....
6 pages (1500 words)
, Download 2
, Research Paper
Free
Breakdown of cross border energy trades has cast a sharp light on the efficacy of the institutions that regulate or govern this particular trade.... This research paper discusses the energy security in the Middle East by focusing on various aspects such as energy security threats as well as global issues that are associated with energy security.... Energy security is defined by the international energy agency as the uninterrupted availability of energy sources at a reasonable price....
This paper looks at the history behind the entrance of women in the working sphere, the personalities that make a great leader.... It considers the reasons behind the disproportioned number of women leaders, by examining the development of segregation issues in the workplace .... ... ... According to Breakwell and Tytherleigh, there are four main characteristics that VCs should have, namely the academic-related, business-related, managerial/leadership, and personal characteristics....
The analysis identifies the main stakeholders that will attend at the national Convention event while defining the concerns and interest they have.... The analysis will define the organization through explaining its main missions and vision as well as the areas that it covers.... ...
8 pages (2000 words)
, Download 4
, Research Paper
Free
This paper analyses the demographic imbalance in the UAE and the security threats that it poses.... The Demographic Imbalance in the UAE and security Threats Introduction The United Arabs Emirates population composition represents a unique phenomenon unlike any other in the world.... This paper analyses the demographic imbalance in the UAE and the security threats that it poses.... million (National Bureau of Statistics, 2012; UAE Defence & security Report , 2011)....
7 pages (1750 words)
, Download 2
, Research Paper
Free
? In the higher elevations of the park, there exist mexican jays, Northern goshawks, and yellow-eyed juncos.... Saguaro national park became a national monument in the year 1933 following a presidential proclamation by Herbert Hoover.... Moreover, of great significance is Saguaro national Park, formerly Saguaro national Monument, which is the focus of this paper.... History of Saguaro national Park Saguaro national Parkis made of 91,327 acres and is made up of two separate sections namely the Rincon Mountain District (Saguaro East) and the Tucson Mountain District (Saguaro West) (Shannontech....
5 pages (1562 words)
, Download 2
, Research Paper
Free
This research paper "Medical Coder as a Profession" is about a profession that affects everyone once in their life and the complex structured regulations of medical coding which are easily capable of driving us crazy.... Medical coders are not the people who get in touch directly with the patients....
TSC has undergone several changes to improve national coordination at the local level.... The paper "The Role of Thusong Community Centre in Advancing Development to Communities" states that the role of TSCs (Thusong Service Centers) is to market government services, particularly in providing information relevant to communities where they are located....
This essay "Substance Abuse Among Adults of Varying Social Classes" examine the prevalence of these issues within society and illustrates the importance of understanding on the part of the social worker in bringing about positive effective change within the home.... ... ... ... It is common knowledge that substance abuse can have serious effects on the care and raising of children within the home where one or both parents are involved in substance abuse activity....
The study analyzes The Changing Perception of a Woman's Physical Image Post World War 1.... From the start of the industrial age, women have been a part of advertising and modern fashion industry.... There are many ways that woman's physical image get stereotyped.... ... ... ... This study discovers The Fashion Industry and the Role of the Media in Shaping These Perceptions....
From the paper "Social security Reform Platform" it is clear that the latter approach to taxation would also work because of the fact that the rates will largely depend on one's income status.... (President Bush, 2) Given that social security, reform is an agenda for many interest groups in the company, then it is essential to sieve some of the sources of this information so as to come up with a comprehensive and balanced social reform plan.... Introduction The Social security system has been one of the most discussed and critically analyzed areas of US policy....
The CAPM model relates the risk and the return of a market based on mathematical estimations to serve as a tool for the investors in predicting the risk associated with any investment.... There is a linear relation between the expected return from the assets and its risk or beta.... ... ... The paper "Capital Asset Pricing Model and Evaluation of Fama-Macbeth Regressions" is a perfect example of a report on finance and accounting....
The aim of the current essay is to provide critical analysis of the online materials found on the subject of security scanners as prescribed by the TSA that there is a need to 'use whole-body imaging scanners as a primary screening measure on travelers passing through airport security checkpoints.... Schauer asserted that 'critics of security screening acknowledge that doses from backscatter X-ray systems are very low and safe for an individual' (Radiological Society of North America par....
This essay "Interventions Towards Food security in India" is about the problem of food insecurity that persists in India, even though it is a food surplus and food grains exporting country.... But through public intervention methods, importantly through Public Distribution System, Kerala has done considerable successful interventions in food security, though the problem has not been solved fully.... Interventions towards Food security in India- a case of Kerala in South India Introduction Earlier, food availability and stability were considered the good indicators for measuring food security in any country and hence, achievement of self sufficiency was given higher priority in the food policies of the developing countries....
This shows the impact of media on national security and how it becomes hard to curb insecurity.... According to this work, issues concerning national security relate very much to media because digital media contributes very much to ways of curbing insecurity and also contributes to increased insecurity.... nline Publishing 5 War and Media Propaganda 5 Government Manipulation on the media 6 Television and Global Insecurity 7 Digital Media, Behavior Change and impact on national security 8 Countering unethical use of digital media in national security 9 Conclusion 10 References 11 Introduction Rise in information technology in the current world makes a huge contribution to increased use of digital media as means of communication....
9 pages (2604 words)
, Download 4
, Research Paper
Free
The paper "Introduction to Network security" states that networks from the time of their birth have come a long way.... UNNING HEAD: NETWORK security Network security Threats and Vulnerabilities of a network Type here 2/28 Contents RUNNING HEAD: NETWORK security 1 Threats and Vulnerabilities of a network 1 Type your name here 1 2/28/2011 1 Contents 2 Abstract 4 Problem Statement 4 Research and Analysis 5 Introduction to Network security 5 Why Network security?...
5 pages (1250 words)
, Download 2
, Research Paper
Free
The main Hispanic groups include mexican Americans, Puerto Ricans, Latin Americans, and African Americans.... The main Hispanic groups include mexican Americans, Puerto Ricans, Latin Americans, and African Americans.... mexican Americans is the largest Hispanic group living in the USA.... It constitutes 14 million of people of mexican ancestry, or 64% of the Hispanic population living in America.... Also, there are big mexican Americans communities living in Chicago and New York, Florida, North Carolina, Georgia, Alabama....
40 pages (10000 words)
, Download 4
, Research Paper
The paper 'The Potential for Commodity for the Future of Thailand' looks at rice, which is considered as the globally most consumed food grain and it can easily be figured out that pressure of demand on the production of rice would be touching its zenith in years to come.... ... ... ... The author states that the main problem to rice like other food grains is to keep pace with the rising demand at the backdrop of a declining area of cultivation....
8 pages (2000 words)
, Download 3
, Literature review
Free
It is a matter of national security and safe borders make up for safer cities.... In modern times the border patrolling has become a challenge and requires high degree of accuracy.... In past the border monitoring was conducted through manual means of physical check posts or the placing of an entire military unit.... The best form of border surveillance involves minimal human intervention which comes in form of installing of wireless sensor networks that detect the motion in the vicinity and respond accordingly....
As the sickness rate at JCUH has been fluctuating between 7% and 8%, this is clearly above the national average and makes it of particular concern.... The aim of the paper "Features Of The Employee Absence Management" is to identify how much of absenteeism attributed to sickness and to identify the most suitable methods to reduce absenteeism at the James Cook University Hospital site of Sovereign Hospital Services, a branch of Carillion PLC....
This paper ''The Demographic Imbalance in the UAE and security Threats'' tells that the United Arabs Emirates population composition represents a unique phenomenon unlike any other in the world.... The Demographic Imbalance in the UAE and security Threats Introduction The United Arabs Emirates population composition represents a unique phenomenon unlike any other in the world.... This paper analyses the demographic imbalance in the UAE and the security threats that it poses....
An essay "Employee is at Liberty: The Employment Rights" outlines that an employee is at liberty to dismiss an employee at any time.... Whether or not that dismissal is fair depends on the grounds for that dismissal.... The relevant provisions are found in the Employment Rights Act 1996.... ... ...
Previously, the UK had been content to rely on visa application and approvals but the opening of border in Europe with the collapse of the Soviet Union, the destruction of the Berlin Wall and the Yugoslavian War meant that more and more persons would be fleeing these areas in search of political asylum.... The focus was on the strengthening of borders, and in the discussions on the various asylum Bills, there was an undercurrent of residual fears that Europe's inherently weak borders were compromising the UK's border controls....
Once, Nicki even walked out on her and was accused of Mariah Carey of threats of physical harm, urging the latter to hire more security (Bio True story, 2013).... Because of this she got the avid support of the three biggest names in rap music, namely Kanye West (who said he was blown away by her style); Jay-Z, who worked with her in “Shakin' It 4 Daddy” and Lil Wayn, whom Nicki considers her “sensei” (O'Connor, 2010) Nicki was able to reach a national audience in 2012 when she performed at the Super Bowl alongside pop superstar Madonna during the halftime show....
In the research paper “Training and Older Workers” the author discusses aging and the acquisition of computer skills, how training can be adapted to a target audience composed of older individuals, compare the methods for teaching older and younger trainees.... .... ... ... The author deals with the need for using different methods for teaching and working with the older generation....
6 pages (1675 words)
, Download 0
, Literature review
Free
Under the leadership of Santa Anna, the 1500-man Mexican army defeated a 3000-man army from Spain which had attacked with the intention of removing the mexican government from power.... They also managed to communicate their dissatisfaction with French occupation and it is the knowledge that Agustin de Iturbide had about the needs and preferences of the insurgents that enabled him to negotiate for the mexican independence.... ew Spain was later to become the independent mexican nation (Archer 85)....
14 pages (3748 words)
, Download 2
, Research Paper
Free
The paper "History of the mexican Trains Ferrocarriles" highlights that generally, current projections show that the proposed system would cost Mexico around twenty-five billion United States dollars and would be complete by the year 2015 (Arizona Central).... History of the mexican Trains "Ferrocarriles" History and Political Science 14 May Table of Contents Introduction 3 Background of the mexican Railway 5 Expansion under Porfirio Diaz 7 Nationalization under Diaz 8 the mexican Revolution and After 9 Struggle for Survival 10 Privatization and the Future 13 Future Projections 15 References 16 Introduction Infrastructure is vital to the economic development of any nation....
In the paper 'Beveridge's Social security' the author looks at William Beveridge, an English economist, who propounded the 'Social Insurance and Allied Services' in 1942, which was inclusive of his take on social security.... Social insurance can help a great deal in stabilizing one's income and it thus brings about social security by satisfying 'wants'.... He felt that the State should offer no opportunity for the individual to take up other means of income, and must provide adequate opportunities and security for service for the individual to grow and experience social security....
The aim of this work is to devvelop a methodology that will lead to a high level solution using MPLS (Multi protocol layer switch) for VPN as a new technique related to security.... These new techniques will lay the foundation for solving the mentioned issues from a different angle, which is expected to improve the security and QoS of the existing approach.... he paper will involve an understanding of the current security implications of VoIP, and to run VoIP in a safe, secure manner....
That is, according to the NRF, all the responsibilities and resources are aligned at all levels so that no level is overwhelmed during crises (Office of Homeland security 2002).... This paper "Overview: The national Response Framework" discusses lists all the appropriate national, local, and domestic approaches to dealing with any incidents with regards to structures, response organization, and peoples' roles.... The paper considers the strengths of the national Response Framework....
66 pages (10711 words)
, Download 1
, Research Proposal
From the paper "Assisted Suicide" it is clear that assisted suicide is a very complex subject with both sides presenting strong arguments in their favour.... England and Wales, right from the Middle-Ages, have always banned the concepts of committing suicide and assisted suicide.... ... ... ... Under the present UK laws, a physician under certain conditions can give orders to withdraw or withhold life-supporting systems to a patient....
"Analysis of Information security of Health Record Systems" paper takes a look at the importance of these technologies how applicable they are in medical institutions and if there are any recommendations that should be kept to ensure security and confidentiality of a patient's records.... Patients express less concern about the threat of security of their EHR records as the benefit of clinical use of computerized systems far outweighs the security risk involved....
7 pages (2014 words)
, Download 2
, Research Paper
Free
This resarch paper "Social security" discusses the Social security Act that has been functional since the 1930s and has not only benefited those who have retired, but it even benefits the dependants of those who have retired including children and spouses.... Social security Social security Introduction President Roosevelt created a committee for the purpose of Economic security during the period of 1930s, this committee coined an act recognized as the Social security Act and during the era of 1935, this act became part of US constitution....
This report "Information Systems security" discusses a database that would include tenants and the building managers.... Database security al Affiliation: Section I: Users Data Access Needs The users for this database would include tenants andthe building managers.... ection II: security Plan
... As such, the company ought to put in place structures that will ensure information security in two main ways, (1) authentication and authorization, and (2) general policies and procedures.
...
105 pages (26250 words)
, Download 2
, Research Paper
In this paper, a qualitative study will be conducted primarily using interviews to examine how couples in long-term marital relationships are able to sustain the romance between them.... This research will seek to identify particular details and romantically disposed behaviors.... ... ... ... Romantic love is one of the key factors determining our quality of life, and marital satisfaction in particular....
This paper, Initial Response, with Training Requirements, and Resources Needed, stresses that the initial response plan will identify the personnel who have the ability to supervise the initial response to the fire.... In addition, the supervisor will be responsible for overseeing the training of the personnel....