StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
E-Coaching: A Platform for the Strategic Alignment of Learning and Human Resource Development in UAE
76 pages (19000 words) , Download 3 , Dissertation
Classical human resource management is concerned in performing various administrative tasks directly dealing with recruitment, retention, development and utilisation of human resources for the organisation (Mohapatra, 2009).... ... ... ... Coaching is recognized as an effective and efficient tool in enhancing employees' performance (Bennett and Bush 2009; Sherman and Freas 2004)....
Preview sample
Computer Crime and Security
6 pages (1594 words) , Download 2 , Essay
Free
The paper "Computer Crime and security" discusses that the imperatives of not recording network access information will be stressed upon all employees.... The incident was terribly worrisome as these files contain sensitive data such as patients' social security, insurance and credit card numbers, not to mention home and place of employment addresses and contact information.... Accessing confidential files which contained social security and credit card numbers immediately indicated that there was a criminal intent to the transgression and that the attacker either intended to sell the information for the purposes of facilitating credit card fraud or identity theft....
Preview sample
The Strategies Used by Paramedics in Handling Stress
20 pages (5380 words) , Download 4 , Essay
Free
I feel angry at whatever the cause sometimes, and it could be lack of security or anything.... This paper ''The Strategies Used by Paramedics in Handling Stress'' tells us that the purpose of this research is to identify and evaluate the strategies used by paramedics in handling stress....
Preview sample
Virgin Atlantic Airways
18 pages (4500 words) , Download 5 , Essay
Free
This paper tells that Virgin Atlantic Airways has been on the cutting-edge of innovative implementations since its creation by entrepreneur Richard Branson in 1984.... The airline company has been especially focused on guest satisfaction and has been able to, therefore, report high-profit margins in the past year....
Preview sample
Security Essentials 1.5
4 pages (1000 words) , Download 2 , Essay
Historical versions of nations as different as self-sufficient tribal traditions and capitalistic urban settlements can offer a security devotee plentiful security-associated data.... Early settlements in the United States secured themselves from potential and unpredictable dangers using diverse inventive Contemporary society confronts security experts with distinct and frequently unprecedented security-associated concerns.... The security sector was known as a growth sector even before 9/11 (Clifford, 2003)....
Preview sample
Internet Security Advantages
7 pages (1888 words) , Download 0 , Essay
Free
The paper "Internet security Advantages" states that the internet has become both an advantage and disadvantage over the last decade.... With the prevalence of Artificial Intelligence-powered attacks, a shortage of IT security talent, and an explosion of Internet-connected devices, it's going to take the speed of machines to counteract this perfect storm of increased internet threats.... We have ventured into an era of cyber-security when individuals and corporates depend heavily on machine learning algorithms as a first step defense against hackers....
Preview sample
Ethical perspectives: Alahmad, Freidman vs Drucker, Murphy
48 pages (12000 words) , Download 2 , Essay
The researcher of this paper tells that the concept of business management has transformed significantly over the last few years.... New ideas have generated in the mode of operation of the business and the idea of ethics has crept in the business.... .... ... ... The article studies the different ideas provided on business ethics by noted management authorities like Alahmad, Friedman, Drucker and Murphy....
Preview sample
Security and Risk Management
8 pages (2000 words) , Download 1 , Literature review
Free
This paper "security and Risk Management" discusses the industrial revolution in the 18th and 19th centuries that has changed the structure of the society greatly and gave rise to concerns with regard to security, safety, and health.... security Risk Management is part of the Risk management process.... security risk management in industrial establishments has been increasingly considered as a part of the risk management strategies....
Preview sample
Rational Choice Theory Explainaning Cyber Terrorism
6 pages (1911 words) , Download 2 , Research Paper
Free
There are however many security-based definitions of cyber terrorism and their consideration can coin a comprehensive meaning.... There are however many security based definitions of cyber terrorism and their consideration can coin a comprehensive meaning.... One of such examples is the provisions of software by technology firms for managing internal security threats.... Based on the assumption that criminals are rational in their evaluation into a crime, separating the target from the criminals by enhancing security measures on networks would increase the cost of cyber terrorism and make it irrational for the criminals (Vito, Maahs and Holmes, 2006; Samaha, 2005)....
Preview sample
Pakistan National Conservation Strategy
13 pages (3525 words) , Download 2 , Research Paper
Free
The paper "Pakistan national Conservation Strategy" discusses that health, including sexual and reproductive health, has different cultural perceptions and various determinants.... DPI was founded in August 1992 on the recommendation of the Pakistan national Conservation Strategy (NCS), also called Pakistan's Agenda 21.... The NCS placed Pakistan's socio-economic development within the context of a national environmental plan.... ontribute to building up national research capacity and infrastructure. ...
Preview sample
The Role of Information Security Policy
4 pages (1250 words) , Download 2 , Essay
Free
The paper "The Role of Information security Policy" discusses that the formation of a logical tree can be in place to show the relationship of all these policy documents of the organization hence forming a complete Information Management Policy for the organization.... Information systems security policies are the central repository that protects the assets of an organization by addressing threats.... This has made many organizations prioritize developing information security policies to avoid damage....
Preview sample
Aviation Security and Restore the Public's Confidence in Air Travel
7 pages (2126 words) , Download 3 , Term Paper
Free
TSA, responsible for aviation security, is now within the DHS Directorate of border.... TSA, responsible for aviation security, is now within the DHS Directorate of border and Transportation Security (ACI-NA, 2003).... The paper 'Aviation security and Restore the Public's Confidence in Air Travel' presents the suicide attacks on the World Trade Center and the Pentagon, and the plane crash outside Pittsburgh, marked September 11, 2001, as the date of the most severe terrorist attack....
Preview sample
Mericans: Mexican Americans Issues
3 pages (762 words) , Download 2 , Essay
Free
The essay "Mericans: mexican Americans Issues" focuses on the critical analysis of the major issues in mexican Americans in the movie Mericans.... Analyzing a story or any other literary work is one of the core topics or units that are deeply looked into in any faculty related to literature studies....
Preview sample
The National Territory of Cuba
6 pages (1691 words) , Download 1 , Essay
Free
The paper "The national Territory of Cuba" highlights that Cuba is an attractive tourist destination for tourists from all over the world.... The national territory of Cuba includes the island of Cuba (nearly 95 percent of the total territory), the Isle of Youth, and around 1.... After the revolution, several governmental organizations created theatre and dance groups, opened museums, and established art schools as well as a national film industry....
Preview sample
Identity Theft and Networking Security
7 pages (2104 words) , Download 1 , Term Paper
Free
This term paper "Identity Theft and Networking security" evaluates several case studies where information security in the health sector has been breached.... It also discusses network security and Health Information governance.... Identity theft and Networking security ... etwork security 5 ... dentity theft and Networking security ... In the recent past, there have been increased incidences of breach of security for health information systems....
Preview sample
Rational Emotive Behavior Techniques
2 pages (726 words) , Download 4 , Assignment
Free
From the paper "Rational Emotive Behavior Techniques" it is clear that the basis of the 'who told you' technique is social constructionism or the idea that the way people experience themselves and their situation is developed through culturally motivated social interaction.... ... ... ... Rational Emotive Behavior (REBT) is a comprehensive, philosophical, active-directive and empirically based psychotherapy....
Preview sample
Information Security Protocols
8 pages (2729 words) , Download 1 , Coursework
Free
This coursework "Information security Protocols" critically evaluates and explores two protocols used to secure computer systems.... To provide enough security to protocols, there needs to be a clear verification procedure by the use of a systematic approach.... To provide proper security to such applications, there is a need to develop various security protocols.... security protocols provide protection to communication that exists within a hostile environment....
Preview sample
National Fire Department Census Quick Facts
2 pages (500 words) , Download 2 , Assignment
Free
The essay 'national Fire Department Census Quick Facts' will look at the Fire department, which provides vital services that touch the lives of millions of citizens at vulnerable and noteworthy times.... national Fire Department Census Quick Facts The Fire department provides vital services that touch the lives of millions of citizens everyday at vulnerable and noteworthy times.... The budget cuts across machinery, fire engines, fire education, servicing of the existing engines and machinery, emergency cases (national Academy of Engineering, 1970)....
Preview sample
Access Security
2 pages (656 words) , Download 2 , Assignment
Free
This paper ''Access security'' tells us that access security refers to ensuring the security of data by limiting access to those who only have the permissions to access them.... Access security allows people to access data that they need to do their jobs, and nothing more than that.... It also includes access to security reporting systems.... Semantic security pertains to preventing the release of unprotected information that happens when the organization releases several documents that do not have individual protection....
Preview sample
Security and Loss Prevention
4 pages (1000 words) , Download 2 , Assignment
security and Loss Prevention 24 May 2012 security significantly affects the loss prevention program of any company.... The research centers on the importance of establishing a comprehensive control program.... The research includes a study on installing fraud reduction procedures....
Preview sample
National Identity, Transnationalism and Global Interconnectedness
9 pages (2433 words) , Download 2 , Term Paper
Free
The author discusses identity and national belonging in the 21st century, using Rana Dasgupta's Tokyo canceled as a primary text.... He examines how the thought or idea of national belonging strives much to keep going in representations of the offshore.... national identity, transnationalism and global interconnectedness national identity is an identity or sense of a person to belong toone nation or state.... Different studies have shown that national identity can result from common points in daily lives of the people such as; their national symbols, national colors, language, national consciousness, culture, blood ties and cuisine (Cameron 2004, p....
Preview sample
The Case of Cross-Border Chemicals
1 pages (250 words) , Download 2 , Case Study
Free
The environmental issues have revealed a [Due The Case of Cross-border Chemicals Introduction I am Mohamed Aballa, the Prime Minister of Rantania.... I am pleased to have joined everybody today with the intent of addressing the environmental issues surrounding electricity generation, use of agricultural pesticides (TCP), protection of endangered animal species, prevention of pollution, and food security in the towns of Lamar, Aldor, Pell, Rantania, and New Aldonia....
Preview sample
Computer Security and Identifying Cybercrime
9 pages (2597 words) , Download 2 , Research Paper
Free
The author of the paper "Computer security and Identifying Cybercrime" will begin with the statement that after entering into the twenty-first century, there have emerged a large number of new technological revolutions and inventions, which have impacted the ways of life to a great extent.... Up till now a large number of security threats have been emerged in the world of computing, however the identity theft is believed to be the most critical computer crime among all of them....
Preview sample
Intelligence Challenges in Homeland Security
2 pages (500 words) , Download 3 , Essay
Free
However, public participation may post a threat to national security as not all information is supposed to be shared, it is essential to make people aware of the need for intelligence collection.... Therefore, the intelligence community needs to balance the extent of their activities in ensuring that they respect civil liberty and at the same time have an edge in intelligence Intelligence Challenges in Homeland security 26th June How should the intelligence community balance civil liberties and security in intelligence activities?...
Preview sample
USA Intellectual Property Law
19 pages (5106 words) , Download 0 , Assignment
Free
Without proof that the alleged infringer had access to the copyrighted work, then the plaintiff must show “striking similarity” between the copyrighted elements of the original and the allegedly copied work so as to preclude the possibility of independent creation [Ferguson v national Broadcasting Co....
Preview sample
Letter to the Senate about National Identity Card
1 pages (374 words) , Download 3 , Essay
Free
Simply because we already have tools in place that effectively create national identities based on pieces of identification such as social security cards, driver's licenses, and state ID cards all of which effectively ensure that most American end up carrying one or more photo IDs.... It is stopped by effective security measures and the sacrifices made by hardworking men and women out to stop it with positive intelligence gathering and old-fashioned detective work....
Preview sample
National Cholesterol Education Program
4 pages (1000 words) , Download 3 , Essay
Considering people at risk of a heart attack or stroke, cholesterol guidelines issued by the national Cholesterol Education Program (NCEP) are divided into four risk categories: "high-risk and very high-risk", "moderately high-risk", "moderate risk", and "lower risk" (Barrett, 2006)....
Preview sample
Empires, Nations, and Families in North American West
6 pages (1772 words) , Download 0 , Assignment
Free
During this period, slaves did not have specific owners who forced them to stay within their property under their watch, authority, and security.... The assignment "Empires, Nations, and Families in North American West" concerns patriarchal families, the Jefferson government's legislation, the role of blacks in the abolition of the death penalty, the circumstances that forced Native Americans to sell captives from their own tribes to European....
Preview sample
Using Red Pike in National Health Service
6 pages (1951 words) , Download 0 , Term Paper
Free
It is a classified cipher that leads to improvement of security in the health system.... The cipher provides some additional protection because access to some NHS data requires authentication, which has a focus on improved security.... Thomas, Harrison, Zhao, and Chen (2012) identify that the cipher is capable of allowing the security of diverse and large networks; whereby NHS is engaging in electronic communications.... There is the security of the data from different organizational structures....
Preview sample
Cloud Computing Security
15 pages (4272 words) , Download 2 , Coursework
Free
(2012) explain that to secure data, Cryptography has been utilized by many organizations to security the breaches experienced in the cloud computing services.... This paper 'Cloud Computing security' classifies and identify the cloud computing security concern and solutions and ultimately propose recommendations to breach insecurity after giving an overview of the current security status in the computing technology.... loud computing security 4 ...
Preview sample
Dubai ECONOMIC SECURITY
7 pages (1750 words) , Download 2 , Research Paper
After the Dubai government suffered a big economic blow during the period of global recession, economic security is one of the.... This is a big threat and promises an economic crisis in future unless the government takes control of its spending and focuses on economic generation rather than spending, which will pose danger on its economic security....
Preview sample
Violation of Federal Security Law
5 pages (1580 words) , Download 3 , Assignment
Free
The registration forms used describe the business and its properties, the security the company seeks to offer, information about the company's management, and financial statements duly certified by independent auditors (SEC, 'Laws that Govern').... The registration forms used describe the business and its properties, the security the company seeks to offer, information about the company's management, and financial statements duly certified by independent auditors (SEC, “Laws that Govern”). ...
Preview sample
Managing Secuity in Prisons
8 pages (2248 words) , Download 2 , Research Paper
Free
"Managing security in Prisons" paper concentrates on various issues that regard the prison areas in nations across the entire world.... However, it is pertinent for the various administrations to design their jails in such a way that physical security and serenity in the jail surrounding are upheld.... Managing security in Prisons Task: Managing security in Prisons Introduction This document concentrates on various issues that regard to the prison areas nations across the entire world....
Preview sample
International Trade Law, Food Security
16 pages (4571 words) , Download 0 , Research Paper
Free
There are lots of security reasons that the people will be aware of like national security, country security, and so on.... here are lots of security reasons that the people will be aware of like the national security, country security, and so on.... The paper "International Trade Law, Food security" states that generally, WTO has not been found to be a major contributor to agriculture and plays a primary role in ensuring that the food and nutritional security of developing countries has been met....
Preview sample
Genetically Modified Foods for Global Food Security
6 pages (1871 words) , Download 2 , Essay
Free
The paper " Genetically Modified Foods for Global Food security" discusses that the world continues to face immense food insecurity with many people still facing starvation, malnutrition and under-nutrition.... Outline Genetically Modified Foods for Global Food security 2.... Opening paragraphs: The current issues on global food security ... Thesis: With the criticisms against GM foods proven to be mere fears, GM foods should be adopted globally as an effective strategy to enhance food security. ...
Preview sample
Principles of Information Security
5 pages (1454 words) , Download 0 , Assignment
Free
The assignment "Principles of Information security" focuses on the critical analysis of the main principles of information security.... The report by Ernst & Young's 12th Annual Global Information security Survey identifies information securities as a vital virtue.... The information risks normally prevail both externally and within the organization, whereby external security risks prevail on the organizational networks and websites, this includes threats such as malware, spyware, pharming, phishing, and website attacks....
Preview sample
Security Dimention of Population Composition in the UAE
11 pages (3007 words) , Download 1 , Research Proposal
Free
It therefore poses a threat to the national security in the UAE.... 2012, The Risks that Foreign Labor Poses to UAE national security, Zayed Military College, Abu Dhabi. ... "security Dimension of Population Composition in the UAE" paper tries to find the state of security in the UAE and the reasons for the insecurity in this country.... The contribution made by the composition of the population is analyzed as part of the reasons for the state of security in this country....
Preview sample
The Basics of the National Stock Exchange Products
7 pages (1750 words) , Download 3 , Research Paper
Free
The system has helped increase in trading speed, thus saving time; it has also managed to incorporate the critical aspect of security in its functioning.... Detailed information on the total order depth in a security, the best buys and sells available in the market, the quantity traded in that security, the high, the low and last traded prices are available through the various market screens at all points of time.... ) security transaction cost of 0....
Preview sample
Security findemental (contract security guard service selection exercise)
2 pages (500 words) , Download 2 , Essay
Free
The memorandum hereby provides the results for recruiting the security supervisors with an immediate effect for the rotating shifts in the organization.... Researches Library and museum studies   09 April 10-April security Staff Contract Report From The Manager security Department ABC Company USATo The Manager The Human Resource Department ABC Company USASir,Subject: Recommendation for security guard service contract....
Preview sample
The History of Information Security
5 pages (1436 words) , Download 2 , Term Paper
Free
The following paper under the title 'The History of Information security' gives detailed information about security that has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers.... The history of information security stretches back to ancient periods, and it began with the creation of a bureaucracy in the administration competition.... The History of Information security from Ancient Egypt to Present day Information security has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers....
Preview sample
Transportation Security in the United States
6 pages (1717 words) , Download 2 , Research Paper
Free
This research paper "Transportation security in the United States" highlight the major security changes which have occurred in the transportation system of the USA after the attack of 9/11.... The study of the security system of all forms of transportation was considered in the paper.... In terms of the security issues at ports, the maritime transport act was introduced to provide more security in the ports and to decrease the case of smuggling and entry of terrorists....
Preview sample
Understanding IT security and its impact to organizations
15 pages (3750 words) , Download 2 , Research Paper
Free
This paper presents how an Information security Management System Framework can affect or impact an organization.... It also capitalizes and makes effective use of the experiences and knowledge obtained by other authors to form its own assessment of the practicality of implementing an Information security Management Systems framework in an organization.... This study attempts to compare the effort with actual tangible benefits using the experiences of organizations as described by various authors in implementing Information security Management System frameworks....
Preview sample
Mobile Security Issues
26 pages (7649 words) , Download 2 , Research Proposal
This paper ''Mobile security Issues'' has presented a detailed analysis of mobile security issues.... This paper has discussed a number of security issues from different perspectives.... Computing Capabilities 16 Internet Access 16 Bluetooth 16 Mobile device security in the context of Business Organizations 17 BYOD Trend and security Issues 19 Unknown third-party access via mobile apps 20 Difficult to track data 21 Challenging data management and segregation 21 Devices can be stolen 22 Recommendations 22 Improve Authentication Mechanisms 22 Install and Update firewall in mobile devices 23 Malware Risk Management 23....
Preview sample
Wireless Security Policy
5 pages (1250 words) , Download 2 , Assignment
Free
Wireless security Policy.... Wireless security Policy Wireless security Policy Wireless security Policy A wireless network may be described as the wireless connectivity of computer networks generally using, but not limited to, radio waves.... This paper will address a wireless security policy for a medium sized banking organization, highlighting the policy overview, purpose, scope, applicability and security requirements....
Preview sample
Cyber-Security Issues
13 pages (3587 words) , Download 2 , Assignment
Free
The assignment "Cyber-security Issues" focuses on the critical analysis of the student's ideas on the issues concerning cybersecurity.... According to Moore (2017), Equifax needed Intrusion Detection System (IDS) and he suggests lack of security knowledge was the main factor for the data breach and more power should be given to risk management teams or hire third-party audits with a good reputation to manage their security policies.... Your only senior cyber-security specialist, who was with the company for 2 years, just quit and has a better job with a major competitor for a substantial increase in pay and less hours....
Preview sample
Security Concerns in Cloud Computing
5 pages (1566 words) , Download 4 , Research Paper
Free
The paper "security Concerns in Cloud Computing" describes that the storage of cloud computing requires a lot of space, in fact, humongous data centers where data is collected and managed.... These data centers pose several threats and security risks that may impact these data storage machines.... A minor security incident or misconfiguration can lead to a system failure or unavailability.... Martin Sandler, who is a director of HP systems security Lab says, “People often think of virtualization as adding to security problems, but it is fundamentally the answer to a lot of those problems,” (Anthes, 2010)....
Preview sample
Cloud Computing and Security
7 pages (2187 words) , Download 4 , Term Paper
Free
This paper ''Cloud Computing and security'' tells us that the paradigm of cloud computing has evolved from a talented business idea.... Cloud Computing and security In the last few years, the paradigm of cloud computing has evolved from a talented business idea to one of the rapidly developing tools of information technology all over the world.... Accordingly, communication security is a particular concern which users contemplate when thinking about using cloud computing structure (Binning), (Hanna) and (Marston, Li and Bandyopadhyay)....
Preview sample
Social Security Program
2 pages (500 words) , Download 2 , Essay
Free
The effect Social security program The United s social welfare program has been formed both by long standing conventions and by changing budgetary and social conditions.... That is, the contributory financing of social protection projects might guarantee that security was accessible as a matter of great with an open assistance approach whereby just those persons in need might be qualified for profits.... Current structure The Office of the Chief Actuary (OCACT) arranges and coordinates a system of actuarial gauges and examines relating to the SSA-managed retirement, survivors and handicap protection programs and supplemental security pay program and to anticipated changes in these projects....
Preview sample
Economic Order and Democracy
17 pages (4250 words) , Download 3 , Essay
Yet the Christian vision f a more democratized economic order is not grounded only on moral commitment or some utopian vision f a cooperative commonwealth.... There is a substantial body f evidence showing that economic losses caused by worker participation can be offset by gains in productivity made possible by it....
Preview sample
Lowering Standards of American Public Education
4 pages (1363 words) , Download 2 , Essay
Free
Education Decline Is Jeopardizing Its national security').... Education Decline Is Jeopardizing Its national security”).... It is often viewed that high-quality education forms a correlation with national security.... According to the report provided by the Council of Foreign Relation, based on the US Education Reform and national security states “Human capital will determine power in the current century, and the failure to produce that capital will undermine America's security,” (The New York Times “In Public Education, Edge Still Goes to Rich”)....
Preview sample
14351 - 14400 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us