StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Worker Rights/Working Conditions
2 pages (500 words) , Download 2 , Essay
Free
Polygraph tests given to employees to determine their engaging in these “unhealthy” activities outside of work place and time would tend to invade into the employees' individual privacy, cause prejudice to them and their job security, without any great and commensurate benefit to the employer or co-workers....  The national Law Journal.... “A Matter of Some Weight” (The national Pulse), ABA Journal, American Bar Association...
Preview sample
Introduction to Windows Security and Vulnerabilities
9 pages (2776 words) , Download 2 , Essay
Free
The paper "Introduction to Windows security and Vulnerabilities" states that with newer versions of the patches being released as research progresses, there is an increased need that users to consistently update their antivirus software in order to protect themselves from security threats.... Practical Windows security Contents Introduction to windows security and vulnerabilities 3 The use of remote procedurecall 5 CVE- 2003-0352 7 Mitigating Factors 9 security solutions 9 Conclusion 10 Reference List 12 Introduction to windows security and vulnerabilities A Windows system is prone to security threats once it is used as an internet server....
Preview sample
Cyber security
1 pages (250 words) , Download 2 , Coursework
Free
In this scenario, getting Cyber security Cyber security Affiliation If someone asked you for advice on what he or she should do first to get started onIntrusion Detection, what would you recommend?... However, if an organization does not have a security expert to strictly keep an eye on a honeypot the organizations has, at finest, built a susceptible platform that is not checked regularly as well as at worst, a platform that can be occupied and employed by any hacker to attack other systems....
Preview sample
Information security management framework
1 pages (250 words) , Download 5 , Research Paper
Free
In this context, security policies are usually written documents, which are supposed to lay out the precise requirements or rubrics that must be adhered to by the employees.... It is an overall description of the Topic: Information security Management Framework security Policies, Standards and Guidelines So that information can be protected, organizations and businesses are supposed to execute regulations and controls concerned with safeguarding of information as well as the systems used for the storage and processing the information....
Preview sample
IT security threats
1 pages (250 words) , Download 2 , Research Paper
Free
One of the threats to IT according to CERT (Computer Emergency Response Team) program is the insider threat (from employees, contractors or even business partners) since they are in a better position to access the information system of the organization without detection.... ... ...
Preview sample
PRJ1 Security Tool
3 pages (750 words) , Download 2 , Assignment
PRJ1 the security Tool Ethereal is the old name, as now this popular is known as Wire shark.... 2007) Likewise, the tool enables a security professional to view all the traffic that is currently being passed on and from the network by configuring the Ethernet adapter in promiscuous mode....
Preview sample
Security and Control Systems Technology
11 pages (3193 words) , Download 0 , Essay
Free
Cyberspace and national security: Threats, opportunities, and power in a virtual world.... The paper "security and Control Systems Technology" discusses that besides developing new systems, the existing systems also get improved continually.... Computer scientists who come from different fields such as the center for IT security, privacy, and accountability have developed a similar matching application for the present version of the Android Smartphone operating system....
Preview sample
The National Curriculum Review
8 pages (2410 words) , Download 2 , Essay
Free
This essay "The national Curriculum Review" shows that to raise citizens full of dignity, the government should put much effort into the development of their intelligence and creativity.... On the one hand, there is a clear differentiation between the national Curriculum and the general school curriculum.... The national Curriculum is on the way of its development and it is often claimed that it is appropriate for it to cover more subjects; to draw more conclusions and cover more school time than it does now....
Preview sample
The Definition of Intellectual Property
36 pages (10621 words) , Essay
Nobody downloaded yet
The paper "The Definition of Intellectual Property" states that it was only in the sixteenth and seventeenth centuries that the argument was forwarded by artists and inventors that they should hold particular rights to their handiwork to be motivated to use more time and energy in creation.... ... ...
Preview sample
Security issues in Online games
18 pages (4500 words) , Download 2 , Thesis
Free
This thesis deals with the security issues in online gaming, gives background information and tells its history.... This paper analyses in detail the security, tries to compare the different kinds of threats to cyber security, the pole who pose a threat, how to identify them and how to solve the security issues that exists in online games.... security Issues in Online Gaming by 24/09 Contents 3 Introduction 4 Background 6 History of Online Games 6 Business Model of Online Games 7 Massive Multiplayer Online Games 8 The need of security 9 Different kind of people who threaten security....
Preview sample
How does Kofi Anan Define Security In His 2005 Report In Larger Freedom
8 pages (2266 words) , Download 1 , Report
Free
The focus of the report "How does Kofi Anan Define security In His 2005 Report In Larger Freedom?... is on How Anan's definition of security differs from other conceptions of security and on such aspect as freedom from want/from fear, freedom to live in dignity.... How does Kofi Anan define security in his 2005 report “In Larger Freedom: Toward Development, security and Human Rights for All?... ?? How might this definition differ from other conceptions of security? ...
Preview sample
Nation Branding Issues
2 pages (583 words) , Download 2 , Essay
Free
ast but importantly, Japan is one of the countries considered secure in terms of terrorist attacks, as well as minor security problems.... This makes it a neutral country, which when investing or visiting does not fear security problems (Dinnie 16).... The FISC security guidelines developed by Japan, in addition, have made improvements in security issues.... This is an area Japan can use to brand the country, as security becomes one consideration of many people as well as investors....
Preview sample
Que Onda Urban Youth Culture and Border Identity. BOOK
4 pages (1000 words) , Download 2 , Essay
Notably, this is the political principle that concerns specific issues, which descends from the ways of self-actualization that characterized the.... ... ... In addition, the politics of identity has lowered economic development in the region.... Therefore, it is a scenario that calls for strict adherence to the principles of leadership, other than the personal perception. ...
Preview sample
Security Threats That Face People Online
4 pages (1013 words) , Download 2 , Essay
Free
security the paper delves into the concept of online security which is indeed a very fundamental concern in the present world.... The paper "security Threats That Face People Online" delves into the concept of online security which is indeed a very fundamental concern in the present world.... There is a need to realize a stronger user security and device identification and limit much of the insecurity.... The paper identifies some of the security threats that face people online....
Preview sample
Human Security: Relevance to Japanese Foreign Policy
9 pages (2646 words) , Download 2 , Essay
Free
Thus Japan is stated to have contributed 22,900 million yen for the UN Trust Fund for national security.... The author of the paper "Human security: Relevance to Japanese Foreign Policy" is of the view that the era of globalization has denoted greater involvement of many nations and people in the well-being of fellow humans regardless of their affiliation to a nationality.... Over the years nationalism has been denoting the contours of security....
Preview sample
Consequences of an Older Population
8 pages (2000 words) , Download 2 , Research Paper
Free
Issues to be explored includes the possible increased burden on the younger population to compensate for health care cost and lost income, housing needs, and a lesser population contributing to Social security.... Issues to be explored and discussed would include the possible increased burden on the younger population to compensate for health care cost and lost income, housing needs, and a lesser population contributing to Social security, which will be supporting a larger population....
Preview sample
Importance of Information Security in E-Commerce
12 pages (3000 words) , Download 6 , Essay
Free
The essay "Importance of Information security in E-Commerce" focuses on the critical analysis of the importance of information security in e-commerce from the technological, management, and organizational perspective.... It is crucial for companies engaging in or considering e-commerce activities to audit their business processes to check for any vulnerabilities and implement required security solutions in their e-commerce plan.... Rapid deployment of their cyber security measures helps to provide added security to their online resources such as e-commerce websites....
Preview sample
Sino-American Relations
8 pages (2085 words) , Download 2 , Essay
Free
Accordingly, nothing less than the security and prosperity of the Asia-Pacific region in the decades to come (Levine 92) is at stake in the often complex and multi-faceted Sino-American relations (Sino-American relations).... A major worrisome security problem for China in Asia is the Republic of China ("ROC") on Taiwan.... n the field of international security, the focal point of Sino-American relations is North Korea.... On China's part, it has tried to dissuade Pyongyang from developing nuclear weapons and has stressed its opposition to Pyongyang's withdrawal from the Nuclear Non-Proliferation Treaty and voted to refer North Korea's noncompliance with its International Atomic Energy Agency obligations to the United Nations security Council (Sino-American relations)....
Preview sample
Psychology Order and Treatments
3 pages (750 words) , Download 2 , Essay
Professor Topic: Patient 1: Ignatius Zobraculangan (Bipolar 1 Disorder) Ignatius Zobraculangan, 22 years old, is recently diagnosed of bipolar 1disorder.... This kind of psychological illness is strongly influenced by biological causes and is often exacerbated by environmental influence.... ... ...
Preview sample
Sample Cyber Security Profile
4 pages (1000 words) , Download 2 , Essay
Free
One of the most crucial elements to understanding within the realm of security is the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element As society progresses to 21st security, the concept of security becomes a critical element in a very advanced world.... ne of the most crucial elements to understand within the realm of security are the User Domain, one of seven domains in an IT infrastructure, is considered to be the domain most at risk for attack and compromise, primarily due to the inherent weakness of the human interaction element....
Preview sample
Mexican Muralists: Orozco, Rivera, Siqueiros
1 pages (250 words) , Download 2 , Book Report/Review
Free
The murals they painted represented the mexican's struggle in searching for their identity, as well as liberty and justice and their sense or origin.... His themes revolve on the plight of the working man and the mexican.... Your Name Your Subject/Course April 20, 2011 mexican Muralists: Rivera, Orozco and Siqueiros Mexico produced three important people in art.... They are also called the Big Three in mexican painting culture....
Preview sample
Security, Privacy and Ethics
3 pages (750 words) , Download 4 , Term Paper
Free
The author states that with the implementation of an effective security mechanism we can gain a great deal of confidence while using these systems at home or marketplace.... This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems.... On the other hand, they also cause many issues regarding security, privacy, and ethical attacks.... ID # security, Privacy and Ethics Introduction At the present, the use of modern technologies such as information systems, computer networks and databases has become essential for the business organizations....
Preview sample
Capitalization requirement and efficiency
28 pages (7000 words) , Download 2 , Essay
The operational practices and the strategies of Islamic banks are based on the principles of Sharia law – this is the general rule that characterizes the methodology of function of modern Islamic banks.... The principles of Sharia law offer to the Islamic banks an advantage.... ... ... s the Conventional banks – where the principles of morality and equality are not widely applied; however, it seems that managers in Islamic banks have to face a series of functional problems which are developed mostly because of the lack of effective interpretation of Sharia This issue is highlighted in the study of Ahmed et al....
Preview sample
Cultural Integration in Cross-Border Mergers and Integration
12 pages (3484 words) , Download 3 , Coursework
Free
The paper "Cultural Integration in Cross-border Mergers and Integration" describes that the area of cross-cultural adaptation in mergers and acquisitions is more and more gaining impetus not only because cross-border M&As are increasing in number, but they are also increasing in complexity....
Preview sample
Homeland Security: Overcoming Centralization, Complacency, and Politics
10 pages (2861 words) , Download 2 , Research Paper
Free
The paper "Homeland security: Overcoming Centralization, Complacency, and Politics" highlights that generally, the US has been on a continuous verge to fight against global terrorism and other issues that have been threatening the nations including the US.... This article explores the concept of homeland security with reference to the facets including Centralization, Complacency and Politics.... With the changing perspective of the global scenario, the issue of overcoming centralization, complacency and politics within the domain of homeland security has emerged as a key concern of the policy domain in the United States....
Preview sample
Qualification Requirements of Security Personnel in the UK
32 pages (8000 words) , Download 2 , Dissertation
The dissertation 'Qualification Requirements of security Personnel in the UK' estimates the current provided and required qualification standards appropriately aligned to meet the demands of the roles in which the UK frontline security staff are employed.... The researched security companies do not have substantive training programs to regularly upgrade the skills of the security personnel.... The security companies consider on-the-job training as an additional expense instead of taking as a way to increase the capability of security personnel to appropriately meet the security threats....
Preview sample
How to Synergize the Works of Internal Auditors and External Auditors
14 pages (3500 words) , Download 3 , Research Paper
Free
The third role of internal auditors according the Institute of Internal Auditors is the evaluation of information security as well as the associated risks.... This research paper 'How to Synergize the Works of Internal Auditors and External Auditors' explores how to synergize the works of Internal Auditors and External Auditors in listed companies....
Preview sample
Food Insecurity among Australian Children
6 pages (2018 words) , Download 1 , Case Study
Free
Recent research done on food security in the country indicates that one in seven Australians faces food insecurity and that an entire population of approximately 650000 citizens in the country each month relies on foodstuffs supplied by the food bank.... ood security happens when the entire population at all times have social, economic and physical access to safe and nutritious food that is adequate to meet food preference and dietary needs.... The advocacy and policy arms of the Foodbank have initiated plans that have ensures awareness are raised and that the general public are full educated on the issues both national and state levels on concerns related to food security, agriculture, and nutrition that directly impacts on the population they offer services to them....
Preview sample
Effective Physical Security
3 pages (904 words) , Download 2 , Essay
Free
This essay "Effective Physical security" discusses the development and implementation of light/modified duty programs that are dependent on the cooperative efforts of all stakeholders (employers, employees, insurers, and health practitioners).... ... ... ... Development of this program will entail having all systems in order to ascertain that all stakeholders in the workplace agree, comprehend, and know what and how to act in the case of an accident/ incident....
Preview sample
Kanbula National Park
9 pages (2576 words) , Download 1 , Term Paper
Free
This paper "Kanbula national Park" aims to provide an exposition about the characteristics of the Kanbula national Park; determine the impact of Lijiaxia Hydro Power Plant on the ecological process within Kanbula national Park and; propose several ways of wildlife and forest management while taking into consideration the present condition of the Kanbula national Park.... The Impact of Lijiaxia Hydro Power Plant on Kanbula national Park The of your Institute Kanbula national Park is considered to be one of the wonderful sites of China....
Preview sample
Materials Handling Systems
49 pages (12592 words) , Download 3 , Coursework
This paper ''Materials Handling Systems'' tells that All stores, units or bulk, packed, or loose have to be handled by men or machines.... Proper handling of goods is as important as correct packing because much damage can occur due to improper handling.... An important objective of all store operators is to minimize deterioration....
Preview sample
Wireless Network Security - Cloud Computing Network
3 pages (750 words) , Download 3 , Personal Statement
Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology.... Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology.... This did not auger well with the ethics of data computing, privacy and security....
Preview sample
IT infrastructure security
10 pages (2000 words) , Download 2 , Term Paper
Free
The following paper "IT infrastructure security" explores the penetration testing which is termed as the authorized and proactive attempt to evaluate IT infrastructure security.... enetration testing is termed as the authorized and proactive attempt to evaluate IT infrastructure security by safely making attempts to exploit the possible system vulnerabilities, including service application flaws, OS, risky end-user behavior and even configurations....
Preview sample
Technical and Formal Security
4 pages (1159 words) , Download 3 , Research Paper
Free
The paper "Technical and Formal security" discusses that сyber-criminals are intelligent as well as organized.... Full Paper Information security Cyber-criminals are intelligent as well as organized.... We have divided security into two aspects i.... technical and formal security.... Technical System security After identifying the purpose, there is a requirement of identify weaknesses or vulnerabilities along with impact and types....
Preview sample
Management Guidelines and Information Security for IT Projects
6 pages (1577 words) , Download 2 , Assignment
Free
Information security the term ‘information security' has been explained by Schneider in 2009, as, protecting the information and information systems from unauthorized access, use, disruption, or destruction.... The paper "Management Guidelines and Information security for IT Projects" evaluate the developed database; therefore, keeping in view the topic, I have not only compared the database with the requirements of the agency as well as best practices and features of a high-quality database....
Preview sample
Information Technology in the Business: Schneider National
9 pages (2720 words) , Download 2 , Case Study
Free
The other issue is security of the systems IT infrastructure are very fragile and any security breach may fault the whole system (Frost, 2014).... "Information Technology in the Business: Schneider national" paper evaluates the case study of Schneider national, a major trucking company that was established in the 1980s and took root of transformation when the regulations in the industry were weakened, establishing its business strategies....
Preview sample
Internship at children national centerye
2 pages (500 words) , Download 2 , Essay
Free
Patients who inherit the sickle cell gene form both parents (homozygous) are subject to severe sickle cell crises (Osborn, 2010, pg Internship at national Children Center 10/5/13 Internship at national Children Center Cooper Jovan is 17 years old boy diagnosed with HBSC....
Preview sample
Network Security Questions
2 pages (500 words) , Download 3 , Assignment
Free
When installations are done based on the default settings of the system, there is no regard for network security and the default configuration is not reset.... otnet are pieces of malware, which infect victims by contacting Assignment, Computer sciences and Information technology Network security Questions Question How to mitigate Configuration WeaknessesIn order to mitigate the weaknesses with network configuration, the first step is to identify the causes.... auses of configuration weaknessesWhen installations are done based on the default settings of the system, there is no regard for network security and the default configuration is not reset....
Preview sample
The Effects of Pesticides and Fertilizers on Food Security
7 pages (2253 words) , Download 0 , Report
Free
This paper ''The Effects of Pesticides and Fertilizers on Food security'' tells that According to WHO, food security is achieved when all individuals have social, economic access to safe, sufficient, as well as a nutritious food that can meet the people's dietary needs as well as preferences of food for a healthy.... Several components constitute food security, and these are food distribution, food access, food supply stability, as well as food use....
Preview sample
Security versus privacy
3 pages (750 words) , Download 3 , Essay
Free
Uyen Ton 14 May 2011 Airplane security versus Human Privacy Since the devastating terrorist attacks in America on September 11, 2001, the American government and Department of Homeland security have done everything in their power to assure that citizens and government officials alike do not experience a similar catastrophe as the one on that ill-fated September morning.... Due to other attempted attacks, such as the bombing that was averted on Christmas Day on an airplane over Detroit, Michigan, the Department of Homeland security has increased security measures in airports throughout the world....
Preview sample
Founding a new nation
5 pages (1250 words) , Download 2 , Essay
Awareness programs and other basic necessities as education, health and security will be the responsibility of the mayors as finance ministers and process design implementers.... Founding a New Nation Name Date The island is newly found and the count of people is very less to inherit a constitution from a huge country....
Preview sample
Balance in the Administration of Justice and Security
6 pages (1818 words) , Download 2 , Essay
Free
BALANCE IN THE ADMINISTRATION OF JUSTICE AND security the balance in administration of justice and security has been a major global problem.... (2011) In The Balance: The Administration of Justice and national security in Democracies.... The legal procedures in border crossing and airport security has also aided in the balance in the administration of justice and security.... Everybody has to have a passport if he wants to cross the border to another country....
Preview sample
National Income Determination
1 pages (250 words) , Download 4 , Assignment
Free
It is therefore clear that confidence in economic agents is an national Income Determination al Affiliation) Media on consumer and investor confidence Consumer confidence refers to the economic indicator that measures how consumers understand and interpret the current economic situation and what they expect.... Money, finance, and national income determination....
Preview sample
Postal and Shipping Sector of the Homeland Security
7 pages (1750 words) , Download 2 , Assignment
Free
The Sector is also guided by the need to provide a sole interagency crisis message managing system for the transfer of national security and emergency preparedness information.... This paper "Postal and Shipping Sector of the Homeland security" focuses on the sector is a vital element of the US economy....  Postal and Shipping Sector of the Homeland security ... he naational security and emergency preparedness policy guides the ativities of the DHS Postal and Shipping Sector....
Preview sample
The Influence of Computer Games on the Ethics, Economic Aspects and Social Issues
19 pages (5548 words) , Download 4 , Essay
Free
According to the 2008 report of NRDC (national Resources Defense Council) the yearly consumption of USA's gaming consoles is equal to the annual electricity consumption of San Diego city.... This paper "The Influence of Computer Games on the Ethics, Economic Aspects and Social Issues" addresses the concept and effectiveness of computer games, ethical implications, environmental, economic, societal, global, and cultural considerations associated with computer games....
Preview sample
Why Do Children Behave Aggressively
23 pages (5750 words) , Download 2 , Research Paper
The study 'Why Do Children Behave Aggressively' proved null hypothesis that infants behave differently in the presence of parent or caretaker, depending upon the influence that authoritative person has over the kid, as well as the child's past disciplinary experiences imposed by the supervisor.... ...
Preview sample
Business Plan for AquaBlu, the Premier Online Swimwear Company
31 pages (8792 words) , Download 2 , Dissertation
The dissertation "Business Plan for AquaBlu, the Premier Online Swimwear Company" focuses on the critical analysis of the major items of the business plan for AquaBlu, the premier online swimwear company.... AquaBlu will be selling swimwear products to female markets between 16 and 40.... ... ... ...
Preview sample
What Are the Main Problems That Teachers and Learners Face in Teaching and Learning Pronunciation in a Classroom
24 pages (6000 words) , Download 2 , Case Study
This paper "What Are the Main Problems That Teachers and Learners Face in Teaching and Learning Pronunciation in a Classroom?... focuses on the fact that language is the most human of all human activities.... It enters naturally, and essentially, into virtually everything in a given speech community....
Preview sample
Intelligent Building and Security Manager
11 pages (3389 words) , Download 0 , Term Paper
Free
"Intelligent Building and security Manager" paper defines intelligent building, highlights some benefits of intelligent building, and discusses the role, threats, and other responsibilities of security managers in fulfilling their specified expectations.... Intelligent Building and security Manager ... The intelligent buildings are complex in nature and it is important to acknowledge safety and security requirements of the building stakeholders such as buildings' users (Kolokotsa et al....
Preview sample
National Sports Day in Qatar
5 pages (1250 words) , Download 2 , Essay
Free
Tha author states that the market research problem is 'how to get more information on why the staff and students did not attend the national Sports Day event at the college.... To answer this question one will need to get more information on why the national Sports Day at the college was not successful and how to improve it next time  ... Sheikh Hamad bin Khalifa Al Thani declared that every Tuesday of the month of February is to be observed as the national Sports Day....
Preview sample
14751 - 14800 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us