StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Resource Development vs Conservation In Alaska
24 pages (6000 words) , Download 2 , Term Paper
Mining industry is one of the bedrock economic activities in Alaska.... Unlike other economic activities, mining contributes heavily to economic development of Alaska in terms of providing jobs, accelerating other service industries, contributing to enhancement of infrastructure and contribution of royalties to state and local government of Alaska....
Preview sample
Fire Safety Strategy for Students Academic Building
25 pages (7010 words) , Article
Nobody downloaded yet
The paper "Fire Safety Strategy for Students Academic Building" discusses that the constructional elements of the buildings should have a minimum of 60-minutes for the fire resistance time.... For the higher fire risk areas, the minimum time should be 30-minutes for effective fire resistance.... ....
Preview sample
Cultural, National Identity and Globalization
8 pages (2195 words) , Download 1 , Essay
Free
This paper 'Cultural, national Identity and Globalization' explores the concepts cultural and national identities, and the process of globalization and its impact on different cultures worldwide.... Cultural and national identities are very important for individuals in a given state as they create a sense of belonging and togetherness among members of a particular society.... Cultural, national Identity and Globalization Cultural and national identities are very important for individuals in a given state as they create a sense of belonging and togetherness among members of a particular society....
Preview sample
Does Victimology Awareness Help the Security Manager
12 pages (3286 words) , Download 3 , Essay
Free
The essay "Does Victimology Awareness Help the security Manager?... focuses on the critical analysis of whether victimology awareness helps the security manager.... While many companies and individuals have turned to technology for security management, professionals in the field must have broad perspectives on both perpetrators and victims to fulfill their tasks.... The study of victimology is valuable and critical for effective planning of protocol as well as forming a good security team....
Preview sample
Modern Internet Security Issues
7 pages (1849 words) , Download 3 , Research Paper
Free
The paper "Modern Internet security Issues" analyzes the major modern Internet security issues.... Owing to the unimaginably high traffic of information exchange conducted over the Internet it is only natural and inevitable that security threats emerge, whether they are related to the medium of communication.... Internet security and Section # of Internet security As the global world get smaller and our relevance of function spans over countries, transgressing any physical borders, the need for direct, frequent and immediate communication has made communication over the internet far more than popular: it has made it a necessity....
Preview sample
Homeland Security: Preparedness & Prevention
7 pages (1750 words) , Download 3 , Assignment
Free
The divide between foreign and domestic agencies is stark and cooperation has been low to the detriment of national security facing new threats and a joint intelligence command is essential (9/11 Commission Report, 2004: pp.... Even existing risks must be continually re-assessed and classify them according to their threat levels compared with the benefits of mitigating or responding to them with a complete plan Homeland security - Preparedness & Prevention ...
Preview sample
Information Technology Threats and Security
6 pages (1757 words) , Download 1 , Assignment
Free
From the paper "Information Technology Threats and security" it is clear that The threats are explored like a virus, malware, malicious activities, etc.... The growing demand for dependency on information technology requires the high demand for the prevention of threats and improved security as McCarthy (2013) founded in his work on E-authentication.... Information Technology (IT) Threats and security Introduction: Information Technology and the features provided by IT are at its peak in today's age....
Preview sample
Data Privacy and Security
8 pages (2228 words) , Download 1 , Essay
Free
This essay "Data Privacy and security" presented some of the important features of computer security those need to be maintained for the sake of effective security management.... In view of the fact that the use of computer networks has turned out to be persistent, the thought of computer security system extended to point out problems covered in the way of networked use of computers and data resources.... DATA PRIVACY AND security Data Privacy and security Affiliation Table of Contents Why Protection?...
Preview sample
Career Demands and Opportunities in Homeland Security
4 pages (1000 words) , Download 2 , Essay
Free
This would encompass national security theories and the challenges associated with international politics, warfare and terrorism.... Hence, homeland security remains increasingly significant in an environment facing increasing threats to private and national security. ... Professionals in this department could work at directorates of border and Transportation Security, Science and Technology, Emergency Preparedness and Response, Information Analysis and Infrastructure Protection....
Preview sample
Nigerian Mission to the United Nations Security Council 2010 2011
6 pages (1747 words) , Download 2 , Essay
Free
The paper "Nigerian Mission to the United Nations security Council 2010 – 2011" tells us about proceedings of the March 2011 security Council meeting, attended by Ambassador Joy Ogwu, Nigeria's Permanent Representative to the United Nations and the Minister of Foreign Affairs of Nigeria, Mr.... 7 – Nigerian Mission to the United Nations security Council – This report outlines proceedings of the March SecurityCouncil meeting, attended by Ambassador Joy Ogwu, Nigeria's Permanent Representative to the United Nations and the Minister of Foreign Affairs of Nigeria, Mr....
Preview sample
SECURITY OF EHR
1 pages (250 words) , Download 2 , Article
Free
Advances and Current State of the security and Privacy in Electronic Health Records: Survey from a Social Perspective by Antonio Tejero and Isabel De La Torre addresses the use of electronic health records in terms of their introduction and their current state in the medical and.... he authors point out that electronic health records (EHRs) are part of the Article Summary al Affiliation: Article Summary Advances and Current of the security and Privacy in Electronic Health Records: Survey from a Social Perspective by Antonio Tejero and Isabel De La Torre addresses the use of electronic health records in terms of their introduction and their current state in the medical and health sector....
Preview sample
Reasons and Main Regions of American Expansion
8 pages (2246 words) , Download 2 , Essay
Free
n the year 1833, a portion of the mexican Republic, namely, Texas refused to continue as a part of Coahuila; and declared independence.... n the year 1833, a portion of the mexican Republic, namely, Texas refused to continue as a part of Coahuila; and declared independence.... A number of reasons were present for this rapid reduction in the percentage of the mexican inhabitants of these regions.... Subsequently, the border was to pass north of the Arkansas and then onwards to the south bank of the Arkansas....
Preview sample
Security Informatics
3 pages (750 words) , Download 2 , Essay
Why do firms share information that could be embarrassing about their security state?... This effectively brings us to the first reason why firms share information regarding their security state.... To strengthen one's information security numerous organizations recognized a key factor being the gathering, analysis and sharing of information related to the actual, as well as all unsuccessful attempts at, computer security beaches....
Preview sample
US history: national simbols
5 pages (1250 words) , Download 2 , Essay
Free
he Lincoln Memorial, located on the national Mall in Washington, D.... he statue of Liberty national Monument represents the friendship between France and America.... he national World War II Museum ... Stephen Ambrose, a professor of history in the University of New Orleans, founded the national World War II Museum Foundation in New Orleans in 1991.... eaufort national Cemetery ... he national Cemetery was established by President Abraham Lincoln in 1863....
Preview sample
Medical Digital Image Transmission
4 pages (1000 words) , Download 2 , Essay
he universally accepted standard for teleradiological applications is the American College of Radiology/national Electrical Manufacturers Association (ACR/NEMA) standard DICOM (Digital Imaging and Communications in Medicine).... The universally accepted standard for teleradiological applications is the American College of Radiology/national Electrical Manufacturers Association (ACR/NEMA) standard DICOM (Digital Imaging and Communications in Medicine)....
Preview sample
The National Flood Insurance Program: the Goal of Mitigation
8 pages (2000 words) , Download 2 , Essay
Free
Managing Homeland security Managing Homeland security Goes Here al Affiliation Goes Here Explain the four phases of emergency planning (i.... n emergency manager typically has a bachelor's degree in public policy or (newest graduates) homeland security.... FEMA's mitigation division has the responsibility to administer the national Flood Insurance Program.... An example of mitigation is the administering of the national Flood Insurance Program....
Preview sample
The Issue of Security and Privacy Data
1 pages (397 words) , Download 2 , Assignment
Free
This assignment " The Issue of security and Privacy Data" discusses many conveniences that internet offers like remote access and a quicker way of accomplishing tasks.... The assignment analyses security over the internet which is a tricky affair and information passed over different networks.... The issue of security and privacy can be easily addressed by the federal government having central servers and records being accessed only by ascertained health practitioners with proper security credentials allowing them access to the records (Gunter and Terry, 2005)....
Preview sample
Analysis of Different Job Description within the Australian Security Specialty
10 pages (2772 words) , Download 0 , Term Paper
Free
ccording to Seek (2016 b), the security specialist plays an essential role by working as part of the local and national security consulting team on several number of projects.... Contrary, the security specialist works as part of the local and national security concerning the team.... The paper "Analysis of Different Job Description within the Australian security Specialty " is a remarkable example of a term paper on management.... The paper "Analysis of Different Job Description within the Australian security Specialty " is a remarkable example of a term paper on management....
Preview sample
The Development Information Security
25 pages (6250 words) , Download 5 , Essay
This essay describes increasing trend of digitized information, globalization of markets and resources has accelerated the incident of data loss and security issues.... Consequently, this ever-increasing security threat has led to the development of numerous information security standards.... security risks for large, small or medium enterprises are alike.... For SMEs, there is an increased need for security framework in order to ensure a reliable and secure IT infrastructure....
Preview sample
The Vital National Interest of the United States
6 pages (1576 words) , Download 1 , Assignment
Free
Within this context, the situation in Afghanistan became uncontrollable and most of the al-Qaida leaders were able escape to the border areas of Pakistan.... The military involvement is inevitable in Afghanistan because Taliban is powerful enough to conduct counterattacks and the leaders of al-Qaida made use of the Pak-Afghani border as a shelter.... On the other side, the interim government in Afghanistan was helpless because it was facing a number of internal and external problems like corruption, illegal trade of opium, underdeveloped economy and security breach....
Preview sample
Should racial profiling at U.S. borders target people of color to exploit whites' fears
4 pages (1000 words) , Download 2 , Essay
Free
border often targets people of color in order to exploit white's fears.... border ... border and its statistics. ... border often targets people of color in order to exploit white's fears. ... border often targets people of color in order to exploit white's fears. ... border, as argued by some researchers, remains a means of exploiting white fears.... border.... border have become more sensitive and prejudiced regarding certain races and groups of people....
Preview sample
Avoiding Burnout in Community College Technical Educators
33 pages (8250 words) , Download 2 , Term Paper
Further, the teaching of online courses present new issues that community college educators have to additionally deal with The faculty members in community colleges are usually masters-degree holders, middle-aged, experienced, and belong to national professional associations though they may not have published their own works....
Preview sample
National Statistics of Enlarging RON
5 pages (1649 words) , Download 0 , Report
Free
The project was outsourced to private parties and data security risks existed.... The project was outsourced to private parties and data security risks existed.... This had inherent risks because the civil service unions feared that data security was put at risk and the task was too complicated to be delivered on time.... Even a minor security lapse can lead to personal information being available to public (Bennett, 2007).... The paper "national Statistics of Enlarging RON" presents that the Registration Online (RON) was a highly ambitious project undertaken without proper planning both at the administrative and the technical level....
Preview sample
National Culture and Financial Systems
9 pages (2250 words) , Download 2 , Essay
Free
This paper 'national Culture and Financial Systems' aims at examining the two practical elements of culture and business.... The first part is about the impact of culture at the national, firm and personal level.... national Culture and Financial Systems ... The first part is about the impact of culture at the national, firm and personal level.... The research will go further and apply important models in cultural analysis to examine the different cultures in the United States and Germany and how it affects the national, firm and personal behaviour of units in the two nations....
Preview sample
Principles of Information Security
9 pages (2250 words) , Download 2 , Essay
Free
This paper 'Principles of information security' analyzes the state of an information system in a company before proposing various issue-specific policies capable of enhancing the efficiency and effectiveness of the system.... Principles of information security Introduction Information is one of the most important assets in most organizations.... The buildings enjoy adequate security from the private security firm the hospital hires to guard its premises throughout the city....
Preview sample
Security Risk Management
16 pages (4409 words) , Download 0 , Literature review
Free
The paper "security Risk Management" is an outstanding example of a management literature review.... The study will elaborate mainly focus on the issues related to security and risk management but first, the research will define the meaning of the terms risk and how the issues of risks can be managed in any given organization or society.... The paper "security Risk Management" is an outstanding example of a management literature review.... The study will elaborate mainly focus on the issues related to security and risk management but first, the research will define the meaning of the terms risk and how the issues of risks can be managed in any given organization or society....
Preview sample
Information Security in Cloud Computing
6 pages (1803 words) , Download 2 , Essay
Free
The focus of this paper "Information security in Cloud Computing" is on the concept of cloud computing that is based on software as a service (SaaS), for example, Web 2.... INFORMATION security PROJECT REPORT ... nformation security in cloud computing ... nformation security issues related to cloud computing ... There lacks the measurements on how to access and analyze the security level of the service provider in a formal manner....
Preview sample
Homeland Security #6
2 pages (500 words) , Download 2 , Essay
he evaluation process will not disclose any information about the security status of the country.... Lastly, the evaluation does not act as an assessment of the accountability and competence of the security officials but aims at assessing the level of effectiveness of the private gun...
Preview sample
Legal Powers of the United Nations Security Council in Iraq-Kuwait Situation
9 pages (2376 words) , Download 0 , Essay
Free
Therefore if the Security Council was aware of what was to follow, they had evidence that proved that Iraq troops were amassing near the Kuwait border, what actions did they take to protect world peace and security according to Article 24 of the Charter?... The paper "Legal Powers of the United Nations security Council in Iraq-Kuwait Situation" states that the Western powers used Iraq as a testing ground for the chemical weapons that were used during the Iran-Iraq war and also shows that nothing was done to stop the situation....
Preview sample
Security through Authentication and Encryption
8 pages (2233 words) , Download 4 , Coursework
Free
It is also not very appreciable to use encryption as national security by interfering with foreign intelligence operations since it threats and is imposed as a control in many countries.... In this case country like United States finds authentication to regulate mechanisms like shutter control so as to provide an equitable balance between economic considerations and national security concerns.... The paper "security through Authentication and Encryption" states that authentication while encrypting the data allows any organization to get security over the network, thereby utilizing its resources without any hassle or threat of being attacked by the hacker....
Preview sample
Data Privacy and Security
8 pages (1750 words) , Download 4 , Research Paper
Free
This essay discusses that at the present computer security has become a very critical issue.... security refers to the technique to discover as well as stop illicit utilization of our secret information or computer.... ata Privacy and security ... However, at the present computer security has become a very critical issue.... Additionally, security refers to the technique to discover as well as stop illicit utilization of our secret information or computer....
Preview sample
Russian-British Economic and Trade Co-operations
49 pages (10772 words) , Download 2 , Dissertation
The dissertation "Russian-British Economic and Trade Co-operations" analyzes the Russian-British economic and trade co-operations in terms of existing situations and perspectives.... Since the fall of the Soviet Union, Russia has emerged as one of the powerhouses in the scenario of global trade.... ...
Preview sample
Mexican immigrants undocumented
15 pages (3750 words) , Download 2 , Essay
Every year refugees and immigrants flock to shores, airports and borders of the well-developed countries like the United States, United Kingdom, and Sweden, among others in large numbers to seek new residence for various reasons (Civian, 1994).... Social workers dealing with this.... ... ...
Preview sample
Cloud-Based Computing Security
7 pages (2090 words) , Download 4 , Essay
Free
The paper "Cloud-Based Computing security" highlights that Data security, in particular data protection from unauthorized access, is becoming more crucial as an increasing number of enterprises trust their database systems.... Moving the enterprises' data and applications away from their servers and facilities is an effective way to improve reliability and security.... Table of Contents: Introduction: security Overview: Computing Resources and Cloud Computing: How security Issues Impact upon Cloud Computing: CurrentTrends: ...
Preview sample
The Patriot Act: Security vs. Civil Liberties
4 pages (1000 words) , Download 2 , Research Paper
Free
Presidential Power in national security Fisher's article deals with the actions taken by President Bush following 9/11, and the similar actions of previous presidents: “If an emergency occurs and there is no opportunity for executive officers to seek legislative authority, the executive may take action--sometimes in the absence of law and sometimes against it--for the public good” (2009, p 348).... Presidential power in national security: a guide to the president-elect....
Preview sample
Physical Security Principles Paper
5 pages (1250 words) , Download 3 , Essay
People developed various physical security systems from time to time to guard their valuables.... Some of the common physical security measures taken by the people includes storing valuables under lock and.... locking the houses, employing security personnel to guard ground, building, factories and other governmental or commercial establishments and surveillance.... With the advent of new IT enabled security technologies, the ancient physical security products are becoming he physical security market in US alone is more than $120 billion alone and with the changing global living ways the market is expected to grow 8 percent annually by the year 2010....
Preview sample
Stakeholder and Management: National Paint
6 pages (1622 words) , Download 0 , Coursework
Free
s a primary stakeholder, the basic concerns of the employees of every company are among others the rates of pay, the respect they accord and accorded to them as well as job security.... "Stakeholder and Management: national Paint" paper discusses national Paint's stakeholders in a way that relates to their involvement in which they operate.... he national Paint is one of the largest paints and coating producing companies in the world....
Preview sample
Viral Marketing and Social Networking
29 pages (8261 words) , Download 2 , Thesis
This thesis "Viral Marketing and Social Networking" to determine the relationship of marketing, or in specific, viral marketing and online social networks with each other with the help of a sound theoretical framework and form a study that points out dimensions that ensure a testable hypothesis.... ...
Preview sample
Security Technology
8 pages (2000 words) , Download 3 , Essay
Free
security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required.... ersonal Experience Essay Introduction security technology is an important part of any business, enabling businesses to protect their assets while reducing the amount of physical labor and time that is required.... security cameras are one aspect of business security that is commonly used across many different business types....
Preview sample
Security Risk Management Process in the Organization
6 pages (1710 words) , Download 2 , Essay
Free
The paper "security Risk Management Process in the Organization" describes the process for analyzing needs identified through a risk assessment and evaluates how many courses of action should be developed to eliminate, reduce, or mitigate risk and contribution of the transfer of knowledge between the security assessment team and firm's staff.... A security risk assessment plays a very important role in the security management process as it provides information concerning the risks, threats and assets to an organization....
Preview sample
Hispanic American Diversity
8 pages (2140 words) , Download 2 , Research Paper
Free
f the four major ethnic groups in the USA, only Mexico shares a geographical border which is nearly 2.... Patrolling the border is a problem especially due to movement of illegal immigrants from Mexico.... The proximity and length of the shared (and mostly open) border still results even today in legal and illegal immigration into US soil.... It is more of a territorial migration rather than a cross-border one in this case.... The paper "Hispanic American Diversity" highlights that mexican and Dominican Americans tend to visit their homeland often, the former due to proximity, and the latter to re-settle back in their homeland and also to start some business or invest in property....
Preview sample
Cloud Computing Virtualisation Security Threats
6 pages (1944 words) , Download 1 , Literature review
Free
Is Network security the Major Component of Virtualization Security.... The purpose of this paper is to present an overview of the various virtualization security vulnerabilities plus threats that are particular to hypervisors.... Because the hypervisor sits between the guest system and the OS it is important that the component is given maximum security (Tyson T.... Cloud Computing Virtualization security Threats Virtualization is now common all through the world and without it, the cloud environment would perhaps have a totally different form (Abdul, 2012)....
Preview sample
Security Management
9 pages (2317 words) , Download 2 , Report
Free
Reflection of Department of homeland security the Department of Homeland Security provides security services.... The paper "security Management" discusses roles required to ensure design, evaluation, implementation of security programs, resources required for each duty, a reflection of the department of homeland security, evaluation of qualified trusted suppliers, physical security plan, etc.... In the implementation of new data security procedures and policies, the finance, human resource, security, and operations departments need to work together....
Preview sample
Metabolic Disease or Food Insecurity
8 pages (2286 words) , Download 3 , Essay
Free
This essay "Metabolic Disease or Food Insecurity" focuses on the current food security plans and will also provide recommendations, and a distinctive approach to overcome the existing issue.... Part 2 Introduction: According to the United Nations food security can be defined as: ‘all people at all times, hav[ing] both physical and economic access to the basic food they need' (United Nations, 2013).... The issue of food security is undoubtedly an important and complex one which is also at risk because of many factors....
Preview sample
Privacy and Security of Health Data
7 pages (1940 words) , Download 5 , Research Proposal
Free
The research "Privacy and security of Health Data" provides a viable solution to counter the security threats posed to the EMR systems so as to maintain the confidentiality of patients' data records, to investigate the ways in which medical data records are insecurely obtained.... The records should be treated with utmost confidentiality and security.... Lack of practical approach with respect to security measures has severely affected the security of medical data....
Preview sample
Information Security Management
10 pages (2755 words) , Download 3 , Essay
Free
The paper ''Information security Management'' tells that there are many approaches for information security assessment, the challenge is to find a set of approaches that fits the unique circumstances of an Accounting Company.... The TMA01 evaluation reveals that the references to various vital aspects of information security.... On the whole, with the lack of rigor, one can say that the firm faces many different information security risks, and the challenge is to find an approach that best surfaces these risks for Accounting Company, given the state of TMA01 and the current circumstances of the firm....
Preview sample
National Income Determination
5 pages (1447 words) , Download 3 , Term Paper
Free
The paper "national Income Determination" highlights that the production method is used when output figures are given, the income method is used when income earned by factors of production are known and the third expenditure method in case final expenditures are noted.... The national income may not always be a true indicator of the quality of life and the average standard of living, at times it may mislead.... The two important contributors to national income are GNP and GDP which have their effects on the total figure....
Preview sample
Ethical Justification of Security in Protection of Communities
8 pages (2326 words) , Download 0 , Essay
Free
The paper "Ethical Justification of security in Protection of Communities" describes that to reduce the effects of environmental degradation such as pollutions and illegal fishing, the paper has proposed that security functions should be delivered by established state-based security institutions.... Tarlock (1992) ascertains that from a moral and ethical perspective, community-based protection instruments are a perfect manifestation of duty to mutual aid by the state security agencies....
Preview sample
Mexican History in the 18th-19th Centuries
10 pages (2732 words) , Download 2 , Essay
Free
ew taxes were imposed upon the mexican masses and this was largely unwelcomed by the public with cases of denial of tax.... With the treaty of Cordoba in august 24 1821, Spain recognized Mexico as an independent nation to be known as the mexican empire.... In a series of revolt which followed for two years, the political picture became instable and ultimately established the military commander Antonio Lopez de Santa Anna, who was responsible for bringing down the mexican empire, as the president of Mexico....
Preview sample
Legal Powers of the United Nations Security Council in Iraq-Kuwait Situation
12 pages (3047 words) , Download 0 , Coursework
Free
"Legal Powers of the United Nations security Council in Iraq-Kuwait Situation" paper argues that the role of the security Council is to ensure that peace and security were restored back to Kuwait and that Iraq did not interfere with other countries affairs and peace.... Running Header: Legal powers of the United Nations security Council in Iraq-Kuwait situation ... egal powers of the United Nations security Council in Iraq-Kuwait situation Introduction ...
Preview sample
14101 - 14150 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us