StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Offshore oil in gulf of mexico
4 pages (1000 words) , Download 2 , Essay
Name: Instructor: Course: Date: Offshore Oil in Gulf of Mexico The offshore oil in the mexican gulf off the coast of the United States is one of the major oil and natural gas producing regions in the world.... The transformation of the offshore oil industry off the mexican Gulf can be attributed to technological transformations and brisk entrepreneurship.... Though the oil mining along the mexican gulf is economically beneficial, it significantly contributes to environmental degradation....
Preview sample
The Elements of President Barack Obamas Administrative Proposals
9 pages (2357 words) , Download 1 , Case Study
Free
The president recognized the need for cyber security and declared cyber crime as one of the most serious economic and national security challenges facing America.... he Cyber-security Internet Policy ... Americans need to bank, shop learn and communicate online without being subjected to security threats including their accounts being hacked and identity stolen.... He recognized the fact that the prosperity of the country in 21st century depends on how the administration tackles that security threat. ...
Preview sample
The US position in the two Iraq wars
30 pages (7500 words) , Download 2 , Essay
The relationship between the US and Iraq in the post-Cold War era has been marked by a shift in US foreign policy, which has culminated in two wars, namely Operation Desert Storm and Operation Iraqi Freedom.... The focus of this paper is to critically evaluate the position of the.... ... ... It is submitted at the outset that the difference in the US approach in the two Iraq wars is intrinsically correlated to the political backdrop....
Preview sample
Current economic issues
11 pages (2750 words) , Download 3 , Book Report/Review
This crackdown leads to new labor organization that is of significant effect on the fiscal policies that were pushed and implemented by the Bush administration; with pointers on problems that pertained to the proposed privatization of Social security; reduction in social spending (by the Federal government), and tax cuts that were administered for the wealthy....
Preview sample
RHETORICAL ANALYSIS
5 pages (1250 words) , Download 5 , Essay
Most of them suggest that a border is protect only when no person crosses illegitimately and on cases when illegal imports slips through.... realizes that needing a secure border launches an incredible standard.... Hence, the question that most politicians have been ignoring is the amount permeability acceptable through the border.... The aim of this rhetorical analysis is to shade more light on the Arizona immigration laws that dispute the direct analogy or ideology held by politicians on how the border should be secured....
Preview sample
9/11 Attacks - Defining Moment in Intelligence History
7 pages (1978 words) , Download 1 , Case Study
Free
As at 2008, the intelligence department through the national security Agency has been able to obtain over 56,000 emails from citizens.... ‘national security Policy Responses to the 9/11 Attacks.... inally, another primary cause attributed to the 9/11 attacks is the weak border and immigration control laws.... Before the 9/11 attacks, the border Security was not a concern for the government.... Overall, the weak border and immigration control laws made a significant contribution to the attacks since tracking of the terrorists would have been possible....
Preview sample
Emergency Preparation and Response in the World of Corporate Security
15 pages (3750 words) , Download 2 , Essay
The role of corporate security for emergency preparedness and management of.... sk situations is determined through a study of existing norms, corporate security providing companies, security departments within companies, threat and risk assessment.... General practices and guidelines are suggested for increased security control within a company by overcoming In “Emergency Preparation and Response in the World of Corporate security” I have carefully studied the fundamental security problems faced by corporate America....
Preview sample
Syria Crisis, Liberalism versus Realism
11 pages (3369 words) , Download 2 , Essay
Free
The clash of ideologies: Middle Eastern politics and American security.... The national Interest, 111, pp.... The paper "Syria Crisis, Liberalism versus Realism" states that liberalism argues that stability can be secured through an international system where active interest is taken in international politics....
Preview sample
Enforced Democracy under American Occupation
12 pages (3443 words) , Download 3 , Essay
Free
Occupation technically ended with the signing of a security Treaty in 1951 that permitted the maintenance of large U.... The moral goal of Hakko Ichiu, construed by the Japanese national religion of Shintoism, was a perceived mandate of manifest destiny for Japan as the first created Asian state, to bring the corners of the world together under kodo, the unity of the Imperial Way, in subservience to the divine Emperor....
Preview sample
US Homeland Security Department Activity
5 pages (1250 words) , Download 0 , Research Paper
Free
The paper "US Homeland security Department Activity" discusses CBRN Countermeasures Programs that were instituted to identify and prioritize requirements by various multi-agency users, as well as to seek competitively technological solutions to counter the employment of terrorist CBRN materials.... US Homeland security Department Activity ... Through a partnership between DHS and the American Standard Institute for the management and maintenance of a security standards database, the CNBRC program catalogs all approved standards....
Preview sample
What is the Role of the State in Your Life in Society
8 pages (2297 words) , Download 0 , Essay
Free
"What is the Role of the State in Your Life in Society" paper argues that the state plays an integral role in the provision of healthcare, education, and security.... This is through financing the education, health, and security systems aimed at ensuring effectiveness in the delivery of services.... The state provides security to the properties either individually owned or owned by the state.... education, security) in your answer....
Preview sample
A Realistic Definition of Realism
10 pages (2908 words) , Download 0 , Report
Free
Neoclassical Realism rejects national security as the sole aim of foreign policy, with nations instead trying to change the international system to their own ideals and preferences.... said in a speech in 2004 that for all America's idealism, its one and only objective since 9/11 is national security.... In a broad sense, interests of nations are easy to define: security of their territories and populations and meeting the material needs of their people....
Preview sample
Information Technology Auditing and Assurance
8 pages (2297 words) , Download 1 , Report
Free
he United States is currently considering the use of the Social security Number (SSN) as a patient identifier.... he Need for Accomplishing the security of Information Systems ... The ultimate goal of Information Systems security (ISS) is to try and protect our information systems and information from these attacks. ... nformation Systems security helps ensure that our information systems are protected from any unauthorized modification or access while helping the legitimate system users in accessing their information....
Preview sample
Privacy and Confidentiality of Patients Information
4 pages (1399 words) , Download 5 , Case Study
Free
Various laws are applied to security and information storage, for instance, health care systems should implement or enact procedures to allow an access to patients' information only to the authorized people (who have the right to use the information) or reveal the information with the objective which it was gathered for (Van, 2009).... Health care systems should also have security measures to prevent an unlawful or illegal access to patients' records and where it is possible to process the information storage in a manner that the person's identity is not visible from the record's face....
Preview sample
Psychological and Sociological Impact of the Anthrax Attack in 2001
13 pages (3674 words) , Download 2 , Research Paper
Free
The paper "Psychological and Sociological Impact of the Anthrax Attack in 2001" highlights that the security aspect of the world is undergoing a paradigm shift due to increasing terrorist acts.... The severity and seriousness of the threat is echoed in the words of the former UN Secretary General, Kofi Annan - “Our world must take bio-security much more seriously […] It would be comparatively easy for terrorists to cause mass death by using agents such as anthrax or weaponized smallpox....
Preview sample
Biometric Technology
13 pages (3568 words) , Download 0 , Research Proposal
Free
Some of the healthcare issue this research would address is first the issue to do with patients' medical information security.... Authentication through biometric verification is increasingly becoming common in healthcare field, the corporate world and public security systems.... The two driving forces behind the increasing demand of biometric technologies are security and convenience (Krawczyk & Jain, 2005).... In the security field, it is used to detect people who could be having criminal record history....
Preview sample
Are the United States and Its Allies Winning the War in Afghanistan
10 pages (3025 words) , Download 0 , Essay
Free
The UN security Council condemned the Taliban for making Afghanistan a safe haven for Al-Qaeda, Osama bin Laden, and supported the course to oust the Taliban regime.... By 2006, the United States forces handed over the security of Afghanistan to NATO-deployed forces through integrating twelve thousand of their twenty thousand soldiers with 20,000 soldiers from NATO.... The United States and allied forces in Afghanistan are in the last preparation of handing over the mandate of security to Afghan security forces....
Preview sample
International Management Issues
12 pages (3000 words) , Download 3 , Assignment
International Management Issues NAME: AFFILIATION: UNIVERSITY: International Management Issues Introduction Shoprite: A South African Supermarket Chain Shoprite or Checkers is a South African supermarket chain that has its head office in Cape Town.... ... ... ... The store is the largest in Africa and has stores in 18 countries....
Preview sample
Managing Competing Agendas
4 pages (1000 words) , Download 3 , Assignment
n addition to overseeing the department, the chief information officer is responsible for designing the its policy outline for information technology, including areas such as enterprise architecture, investment planning, accessibility, security and privacy, and records management (Venkatesh, Hoehle, &Aljafari, 2014).... For instance, the security field has a strong framework, which incorporates the Federal Information security and Management Act of 2002 (FISMA), technology guidance on safety and privacy that remains to be covered in the policies of the department....
Preview sample
Ukraine. United States Minitary Involvement
17 pages (4250 words) , Download 2 , Research Paper
Free
The national security of Ukraine is practically manhandled by United States military force.... Ukraine has an ideal strategic location due to its position between the borders of the European Union on the east, border of Russia on the west, to the north it has the Belarus border and on its south The Black Sea.... Ukraine has the longest border with Russia which is about 2063 kilometers long, and the shortest border with Slovakia which is merely 98 kilometers long....
Preview sample
Economics of Mexican Cartel Behavior
12 pages (3509 words) , Download 2 , Essay
Free
The paper "Economics of mexican Cartel Behavior" explores how mexican drug cartels work to reduce competition and increase profits.... "Think Again: mexican Drug Cartels.... The high cost of maintaining such a robust prison system is ultimately visited upon the taxpayers who in turn penalize themselves twice; once by removing an able bodied worker from the streets and placing them behind bars and twice for incurring a tax bill of at least 40,000 dollars per year in housing, providing medical care, and tending to the security needs that such a prisoner entails. ...
Preview sample
Humanitarian Intervention-The Responsibility to Protect Development
12 pages (3000 words) , Download 3 , Essay
Free
?? Hence, NATO breached the international law when it used force without the consent of the UN security Council and this places the organization outside legality.... The humanitarian intervention is attributed to the role played by the UN security Council in promoting international peace and security through authorization of military force to respond to severe atrocities.... The humanitarian intervention plays effective roles in conflict resolution in peacekeeping through collective interventions by the UN as well as regional bodies sanctioned by the UN security Council....
Preview sample
The Role of the United Nations High Commissioner for Refugees in Yemen Crisis
7 pages (2404 words) , Download 1 , Case Study
Free
NDSS United Nations Department for Safety and security ... The officer was responsible for briefing us on the security issues on the ground so as to ensure that our inspection process was successful and effective.... With regard to food security and nutrition, the Commission in conjunction with the WFP delivered rations of sugar, rice, oil and pulse that would serve the Yemen refugees for 2 months.... rom the findings of the team regarding the situation on the ground, it was imperative to improve the security situation in the camps so as to deal with the emerging criminality in the camps....
Preview sample
Critical Evaluation of Crime as a Social Problem
11 pages (3074 words) , Download 2 , Coursework
Free
The most common types of criminal activities which are reported to the security agents are for example and not limited to burglary, rape, homicide, carjacking, kidnapping as well as drug and human trafficking.... This essay is a critical evaluation of crime as a social problem in the society a well as the measures that can be put into place to ensure that the vice is contained for the welfare and the security of citizens in the world.... Probably, the arms found their way into the wrong hands of illegal forces who pose a great risk to the security of civilians as well as government forces that are out to maintain law and order....
Preview sample
A Counter-Terrorism Strategy
8 pages (2404 words) , Download 3 , Case Study
Free
The paper 'A Counter-Terrorism Strategy' presents the word or phenomenon which seems to have attracted all the limelight to itself is: Terrorism.... The magnitude of gravity which is associated with this word has been felt on various occasions and in numerous places over the years.... ... ... ... Terrorism is an attempt to achieve (or prevent) political, social, economic or religious change by the actual or threatened use of violence against another person or another persons' property; the violence (and threat thereof) employed therein is aimed partly at destabilizing an existing political or social order....
Preview sample
The Economic Downturn Effects on I.T Projects in Singapore
12 pages (3000 words) , Download 2 , Case Study
Free
The government of Singapore believes that by boosting its investment in operational and security technologies, efficiency would be created to safeguard the economy and its associated elements such as border security compliance (Business Monitor International 2009). ... In a bid to improve security, Singaporean officials visited many Israeli companies for consultation on adopting viable measures to thwart these vulnerabilities.... security measures like video analytics, light weight X-Ray machines, biological detectors, chemical detectors, explosive detectors, blast containment and protective computer equipments were some of the equipment recommended from their analysis....
Preview sample
Social and Political Contribution of Cuban Americans
6 pages (1500 words) , Download 2 , Term Paper
Free
at Texas-Mexico border.... This is as compared to 49 percent of mexican Americans, 61 percent of Anglo Americans and 50 percent of Puerto Ricans (Bogardus 67). ... 17 percent have completed college education compared to 6 percent of mexican Americans, 8 percent of Puerto Americans and 20 percent of the total US population (Orozco 15).... According to Bogardus (82), Cuban Americans enjoy greater economic security than other Hispanic groups....
Preview sample
Air Traffic Control Security before 9/11 and after 9/11
11 pages (2750 words) , Download 1 , Thesis Proposal
Free
"Air Traffic Control security before 9/11 and after 9/11" paper discusses the measures taken by the department of homeland security in ensuring that the air territory is well protected and avoid a repeat of the 9/11.... The paper proposes the security measures taken to prevent leakage of information.... The department of homeland security is only able to prevent these vicious acts from happening by preventing unauthorized acquisition of chemical, biological, nuclear material and any other radiological equipment that can be used by terrorists to bring down the US....
Preview sample
Personal Identity Theft
44 pages (11000 words) , Download 3 , Dissertation
The objective of paper "Personal Identity Theft" is to come up with a sensitization framework of educating the public on identity theft and to establish ways of preventing the crime.... To achieve this, this paper will give a background of the crime, articulating the forms in which it could be executed....
Preview sample
Culture Analysis and Its Application in Business in Mexico
22 pages (5500 words) , Download 2 , Essay
Mexico is an ancient county situated in North America sharing its border with United States of America.... owever, most mexican villagers are yet observed to pursue the older way of living in order to maintain the preliminary culture.... This study mainly highlights the culture of Mexico and its impact on the varied individual aspects namely food habits, clothing styles, customs, ethical issues, languages, religious, family life and so on....
Preview sample
Introduction to Business Law
6 pages (2069 words) , Download 1 , Assignment
Free
This assignment "Introduction to Business Law" discusses a civil law system, the North American Free Trade Agreement, the International Labour Organization, conditions under which a member state may adopt a safeguard measure and the International Centre for the Settlement of Investment Disputes.... ...
Preview sample
Information Technology Technologies in the Provision of Clinical HealthCare
2 pages (599 words) , Download 2 , Essay
Free
Cybersecurity will assist guard businesses and consumers will bring important infrastructures on which the economy relies, and improve national security.... The government is justified in telling the private sector how to enhance or improve cyber security because there is an urgent need to protect and secure our processors/computers, financial institutions, confidential information on national security, and other significant aspects of the government's infrastructure (Heiman, 2003)....
Preview sample
New Pentagon Map that Seeks to Erase the Gap
6 pages (1666 words) , Download 1 , Literature review
Free
The Core is composed of nations that exhibit globalization characteristics of liberal media practices, network connectivity, liberal business and financial policies, and a collective sense of security, while the Gap has “thin” or “absent” globalization factors, and so they have widespread political repression, poverty, disease, mass murder, and conflicts.... Barnett contends that the Gap is globally disconnected, so they have no stake in partaking in globalization or protecting it, thereby threatening peace and security in the Core....
Preview sample
Neorealist and Neoliberal Alternatives to U.S. - Russian Security Cooperation
14 pages (3500 words) , Download 2 , Essay
Free
ight from the Cold War days, policy formulation in United States and Russia (then USSR) pivoted around the concept of balance of power where national security held the center stage.... ecause of improved border security almost all terrorist attacks takes place outside the political boundaries of United States.... - Russian security Cooperation Contents Introduction 2 US – Russian relations as perceived by neorealists and neoliberals 3 ... While neorealism essentially believes that international political situation is inherently anarchic and the only chance of survival a state has is through striking an acceptable balance of power, neoliberalism postulates the world is a community of nations where collective security should be the goal which can be attained through rational harmonization of sovereign interests of member nations (Calhoun 2002)....
Preview sample
Will President Barack Obama Change the Direction of US Foreign Policy
16 pages (4554 words) , Download 2 , Essay
Free
national security Directive 26 (NSD, 2 October 1989) as well as NSD45 (20 August 1990) of Bush senior merely reflected the continual of the American conventional security interest.... It was believed that countries like North Korea, Iraq and Iran were engaged in acquiring Weapons of Mass Destruction (WMD), which would result in posing a serious threat on the national security of the US13.... While he also announced that remaining 35000 to 50000 soldiers will continue to render their services until December 2011for maintaining peace in the country and will be engaged in training Iraqi security component and protecting civilians along with battling with terrorist groups in the country21....
Preview sample
NSA's Surveillance Program and Impact on Privacy and Civil Liberties
5 pages (1490 words) , Download 0 , Essay
Free
surveillance programs which he named as “Systematic Surveillance of Innocent Citizens” by disclosing some secret intelligence documents of the national security Agency (NSA).... gency, national security.... The Judge were of the view that non-availability of Telephony metadata could become the reason of any mishap in the US and therefore ruled it as legal to enable the NSA to carry on its mission of security and benefit of US nation by eliminating terrorism inside and outside USA (Agency)....
Preview sample
Comparision/contrast
2 pages (500 words) , Download 2 , Essay
Free
The similarity between the two presidents extends to their use of national security and official communication institutions and instruments to achieve their objectives as regards war and the supposed fight for liberty and national security.... national security was incontrovertibly linked to the halting of communism's spread.... Using the liberty, democracy, freedom and national security argument, Kennedy embroiled the United States in a war which it could not win....
Preview sample
Constitutional Challenges Associated With Investigating Cybercrimes
10 pages (2500 words) , Download 3 , Term Paper
Free
Also, since cybercrimes entails cross-border activities and threats, the place of national constitution is put into perspective as investigations of these crimes would most likely call for international cooperation and engagement of international law enforcement efforts.... Cross-border cooperation among nation-states can be achieved through mutual legal assistance treaties.... However, these developments have presented the world with new types of threats that can potentially compromise security, privacy, and safety of the internet users....
Preview sample
The Importance of Computer Security
9 pages (2327 words) , Download 3 , Essay
Free
The paper "The Importance of Computer security" states that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks that are acceptable and which are not.... Computer security is a primordial concern of all types of organizations.... Hence, academicians and computer security professionals undertake various studies to address this issue thoroughly and creatively.... Both of the studies featured in this essay are similar in the sense that these studies are aimed towards enhancing computer security in organizations....
Preview sample
Gated Communities and Segregation in The Tortilla Curtain by T.C. Boyle
6 pages (1882 words) , Download 1 , Book Report/Review
Free
The other couple is the mexican illegal immigrants, Candido and his pregnant wife America Rincon, who enter the American borders illegally wanting to achieve the American Dream of a prosperous life, but live in an awful condition in a makeshift camp deep in the Topanga Canyon.... His transformation into a racial bigot who wants the mexican immigrants out of his life and his community, achieves completion, when Delaney with a gun in his hand and a paranoiac mind “becomes the flag-bearer of white racial anxiety in contemporary Los Angeles....
Preview sample
Personal Data Privacy
11 pages (2944 words) , Download 3 , Research Paper
Free
Consumers can only judge their credibility by security seals or their international presence around the globe.... For instance, if a security breach occurs in one of the databases of these organizations, millions of records related to customer personal information and most importantly, credit card numbers will be in control of cyber criminals and hackers.... Moreover, some implemented counter measures in terms of web site privacy policy and access of law enforcement agencies, privacy on social networking sites, real world security breaches and surveys will be discussed....
Preview sample
Breakup of Yugoslavia from 1991-1995
35 pages (8750 words) , Download 2 , Case Study
This thesis, Breakup of Yugoslavia from 1991-1995, explores and analyzes the breakup of Yugoslavia and identifies the sources of internal threats to national security and what this has meant to the international order.... It also the beginning of new threats to national security: national conflicts and secessionist movements.... Thus the threat to national security no longer centered primarily on conflicts between states but shifted somewhat toward conflicts within states....
Preview sample
Select one of the topics
5 pages (1250 words) , Download 2 , Essay
These plans are majorly on intention of making significant impact on the present geopolitical landscape.... But the most important relationship United States needs to make.... ... ... It is not necessary for the two countries to have a positive relationship but even having an even relationship that based on animus and doubt....
Preview sample
Cross Cultural Factors Needed for Cross Border Mergers and Acquisitions
62 pages (9690 words) , Download 14 , Capstone Project
This project "Cross Cultural Factors Needed for Cross border Mergers and Acquisitions" discusses several cases of cross-border M&A which clearly describes the cultural factors that have affected their success many times proving the merger or the acquisition to be a disaster.... Cross-border mergers and acquisitions (M&A) play a significant role in foreign direct investment (FDI).... However, in the practice of cross-border M&A, the organizations concerned generally come across cultural disparities and variances....
Preview sample
Gun Violence in Arkansas
19 pages (5133 words) , Download 2 , Research Proposal
Free
However, a major source of contention stems from the Second Amendment, which legalizes gun ownership for security and sporting events (Faria, 2012).... Gun violence has precipitated high costs to the society and security concerns in the form of gun-related homicides, accidental shootings and suicide cases among the young people and the older members of the population alike.... In lieu of the constitutional provision, anybody who is a member of an orderly militia, who contributes to the security of any state within the country or individuals who want firearms for their own safety are at liberty to own guns (Mcinerny, 2013)....
Preview sample
Trans-National Corporations and Their Host Governments
13 pages (4690 words) , Download 1 , Coursework
Free
This business coursework "Trans-national Corporations and Their Host Governments" concentrates on how on the complex arena of international business, transnational corporations or TNCs are the world's largest economic institutions.... TRANS-national CORPORATIONS AND THEIR HOST GOVERNMENTS Background In the complex arena of international business, transnational corporations or TNCsare the world's largest economic institutions....
Preview sample
Legal Aspects of Derivatives
14 pages (3500 words) , Download 2 , Essay
Free
the Argentine office of the mexican incorporated bank will try to overcome the hurdles associated with the foreign exchange payments restrictions imposed by the government of Argentina, perhaps through recourse to its head office or by using other means at its disposal.... When the event of force majeure affects payment obligations under a credit support document, only the non- affected party or the Argentine office of the mexican bank is allowed to terminate the agreement....
Preview sample
The current New Mexico Medicaid and the New Mexico Medicaid Modernization
10 pages (2500 words) , Download 3 , Research Paper
Free
It caters to individuals identified by the Social security Administration as disabled without regard to “substantial gainful activity” as well as those individuals with a recent attachment to the work force – those with enough earnings in a quarter to meet the SSA's definition of a qualifying quarter.... WDI is also available to those individuals who have has Social security Insurance and Medicaid due to the initial receipt of Social security Disability Insurance (SSDI) benefits, until Medicare entitlement....
Preview sample
Local Law Enforcement Involvement in Joint Terrorism Task Forces
11 pages (2865 words) , Download 2 , Research Paper
Free
Cross border movement of people and weaker security, features at the entry points have enabled terrorists to sneak weapons of mass destructions into the country.... The task forces thus consist of different stakeholders to the security of the country.... The task force on security will therefore include the local community, lawmakers and the local law enforcement possibly the police force.... This way, the formulate policies that they can easily implement thus upholding the security situation....
Preview sample
Mandatory Military Service
4 pages (1214 words) , Download 2 , Speech or Presentation
Free
Mandatory military training will be a great boost to national security especially for Arab countries in the Gulf region (Kuwait, Oman, Iran, Qatar, Saudi Arabia, Kuwait, Bahrain and United Arab Emirates) which are in constant clashes thereby making the regions politically unstable (Bahgat 79).... Apart from these two threats, Arab countries in the gulf region are endowed with rich oil deposits, a treasure that is of interest to the rest of the world; therefore, heralding a national security threats both externally and internally....
Preview sample
1351 - 1400 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us