StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Impact of Job Insecurity on Employee Performance and Commitment
8 pages (2809 words) , Download 0 , Literature review
Free
This last definition might be referring to issues such as: paid annual leaves and/or holidays; maternity at work; health and safety at the workplace; employment injury and/or sickness benefits; and social security, among others.... ut job security, note Yahaya et al.... High job security level means there is a small chance of one becoming unemployed.... 2010), argued that job security is one of the key factors that influence employee job commitment and performance....
Preview sample
The CSI Computer Crime and Security Survey
1 pages (424 words) , Download 2 , Essay
Free
As the paper 'The CSI Computer Crime and security Survey' tells, the Computer security Institute (CSI) Computer Crime and security Survey for 2008 as reported by Robert Richardson, CSI Director outlined the latest important facts and trends in regard to network and computer crime.... The study was conducted from over 500 respondents – security professionals - and has concerned itself primarily with the area of losses to cybercrime....
Preview sample
National Identity as a Social Construction
10 pages (2690 words) , Download 0 , Essay
Free
As the paper "national Identity as a Social Construction" tells, in Britain, there exist separate national identities for various individuals like the Welsh, the Irish, and the English.... All these individuals with separate national identities do have an overarching identity with the UK.... national identity refers to the type of attachment that individuals hold with regard to their own nation.... iscuss the Argument that national Identity is a Social Construction. ...
Preview sample
Capital Structure of CNG Travel Group PLC
7 pages (1750 words) , Download 2 , Case Study
Free
Brian Rafferty is managing director and co-founder of Taylor Rafferty Associates, the world's largest independent financial communications firm specializing in assisting non-US companies with their cross-border investor relations and capital markets communications.... CNG is pleased to announce that national carrier CSA Czech Airlines has become the latest airline to sign up as a CNG affiliate partner, joining others such as C-Trip, KLM, America West, and Jet Airways India....
Preview sample
International Trade - Mexican Corn Trade, Performances, and Policies
9 pages (2644 words) , Download 1 , Case Study
Free
The cultivation of Corn has a long association with the mexican country.... It is found that corn cultivation in the mexican country involves around 3 million producers.... These 3 million producers operating in the mexican landscape of corn cultivation contributes to 8 percent of the total population of Mexico.... It is observed that the corn trades of the mexican region being included in the North American Free Trade Agreement made the country focus more on labor-intensive farming practices....
Preview sample
Impact of the 11th of September on Arab American Identity
10 pages (2500 words) , Download 3 , Research Paper
Free
Some of the initiatives were operation PENTTBOM (Pentagon Twin Tower Bombing incident), national security Exit-Entry Registration System (NSEERS), the Absconder Apprehension Initiative, and the voluntary interview program (Hussain 122).... The body initially had a mandate to track planes that were a threat to US national security.... Closing down airports was one of the methods used to check for planes that posed a threat to national security....
Preview sample
The 2004 Madrid Train Bombings and Its Effect on the Homeland Security Operations
6 pages (1738 words) , Download 0 , Term Paper
Free
According to Peteran (2006), the 2004 Madrid bombings are among notable terrorist attacks following the September 11 Bomb attacks on US that offer the department of Homeland security the insights and new perspectives into the risks, techniques and vulnerabilities.... As the paper "The 2004 Madrid Train Bombings and Its Effect on the Homeland security Operations" outlines, the 2004 Madrid train bombings which are also referred to as the 11-M, were almost instantaneous and coordinated terror bombings against four commuters systems in Madrid....
Preview sample
Benefits of the Electronic Medical Records for Patients and Providers
2 pages (500 words) , Download 0 , Essay
Free
onfidentiality, as well as security issues, also arise with EHR; therefore, patients may feel that their confidential information may not be handled with care.... Therefore, health care practitioners, when handling patients' information should employ security technologies (Dick, Steen, and Detmer, 1997)....
Preview sample
Personal Narrative about Visiting a National Park
10 pages (2500 words) , Download 2 , Essay
Free
The author of this essay "Personal Narrative about Visiting a national Park" describes reasons for visiting a park, brief history of it, the experience of camping, traveling on the boats and great experience.... In this personal narrative, I will give an account of my visit to the national park and what I saw there.... In this personal narrative, I will give an account of my visit to the national park and what I saw there.... The encounters I went through while in the national park will also be explained in this paper. ...
Preview sample
National federation of independent business vs. sebelius(2012)
4 pages (1000 words) , Download 2 , Essay
The first issue involved the constitutional validity of the Congressional law requiring the states to make a choice between losing Medicaid funding from the federal government and upholding the Obamacare (national Federation of Independent Business vs.... On the other hand, the second issue involves the constitutionality of the Congressional law that pushes for the obtaining of health insurance by all citizens and imposing penalties for those who fail to comply (national Federation of Independent Business vs....
Preview sample
Branding Across Borders
7 pages (1978 words) , Download 2 , Assignment
Free
Traditional methods of joining the international market involve the growth parameter whereby a small firm gradually develops and expands into cross border trade through time and process.... The two strategies are quite different and they border on diverse considerations of business approach and tact....
Preview sample
Types of Hospital Acquired Infections based on National Health Service
6 pages (1765 words) , Download 3 , Case Study
Free
The paper "Types of Hospital Acquired Infections based on the national Health Service" focuses on the control of hospital transmitted infections at national Health Service organisations.... The national Health Service organizations initiated a sensitization of everybody in the community about the importance of cleaning hands through the “clean your hands” campaign.... The national Health Service is working hard towards maintaining high standards of cleanliness and hygiene in the hospitals in the United Kingdom....
Preview sample
Analysis of Serial Murder Profiling
6 pages (1685 words) , Download 0 , Literature review
Free
“Stalking in America: Findings from the national ... national Institute of ... This review "Analysis of Serial Murder Profiling" discusses some of the criminal profiles developed in the 1960s and 70s.... On the basis of the above, therefore, it may be noted that by profiling, the police can more easily categorize the likelihood of criminal activity....
Preview sample
Opposition to Medical Marijuana
11 pages (3050 words) , Download 3 , Essay
Free
A former director of Director of national Organization for the Reform of Marijuana Laws (NORML), Keith Stroup, addressed the true motivation of the push to legalize marijuana for medicinal use as far back as 1979 when he gave a speech at Emory University audience that "medicinal marijuana would be used as a red herring to give marijuana a good name" (Souder, and Zimmer).... Two national Highway Traffic Safety Administration reports revealed that while alcohol is still far and away the drug most commonly abused in accidents, marijuana is firmly in second place....
Preview sample
Johnsons State of the Nation and Roosevelt Inaugural Addresses
5 pages (1445 words) , Download 3 , Essay
Free
Viewed as a promulgation of his election promises during the campaign, Johnson laid his plans to eliminate the suffering of the American citizens through empowering them and eliminating security threats.... FDR also introduced the social security program that enabled the poor and the needy in the society especially the elderly to access quality healthcare services.... Different presidents have adopted different plans and these have been communicated through the state of the nation address within the senate chamber or through a national address following the swearing-in....
Preview sample
National Literacy Strategy and Numeracy Strategy
14 pages (3822 words) , Download 5 , Essay
Free
This way the database is highly criticized for privacy and security matters.... The paper "national Literacy Strategy and Numeracy Strategy" states that generally speaking, education in the United Kingdom has been portrayed as in a state of crisis by critics and some parts of the media.... According to Tony Blair, the answer to all the national problems of Britain comes down to the single word 'education' (Trowler, 2003).... According to Tony Blair the answer to all the national problem of Britain comes down to a single word “education” (Trowler, 2003). ...
Preview sample
How Can Websites Design Be Improved by the Study of Ergonomics
28 pages (8242 words) , Download 3 , Research Paper
This research paper "How Can Websites Design Be Improved by the Study of Ergonomics" discusses the primary reasons for lacking the ergonomics in website designs using a small sample of 30 respondents.... The conclusions and subsequent recommendations may not be generalized for all the websites.... ...
Preview sample
Social Policy With Reference to Social Security
11 pages (2000 words) , Download 2 , Essay
Free
Social Policy With Reference to Social security ... William Beveridge was appointed by the wartime Government to review Social security Policy.... The national Health Service was set up to combat Disease. ... This essay looks at the social conditions that existed for each οf the political parties and the welfare policy approaches that each party adopted in relation to the NHS....
Preview sample
Rational Choice Theory
12 pages (3000 words) , Download 4 , Essay
Rational Choice Theory is commonly justified with a discussion of the choice behavior of one or more individual decision-making operatives.... The focus on the individual is consequentially the central component of the Rational Choice debate (Elster, 1986).... The rational choice theorist contend that the individual agent is “typical” or “representative” of a larger group....
Preview sample
Aviation Safety and Aviation Security
1 pages (261 words) , Download 26 , Essay
Free
The author of this essay "Aviation Safety and Aviation security" comments on the differences and similarities between safety and security.... Aviation security specifically deals with ensuring that the passengers have a safe flight.... Airport security personnel are authorized and instructed to individually check every passenger and his luggage to make sure there is no risk of terrorism that is prevailing in the air these days, especially after the unfortunate event of 9/11....
Preview sample
The New International Economic Order
8 pages (2633 words) , Download 2 , Essay
Free
The need of the hour was an international action which would restructure each economy, linking the different sectors of the economy with each other in a mutual reinforced arrangement that is to sum it up helping in creating an integrated national economy.... This paper ''The New International Economic Order'' tells that During the last 65 years, the world economy has walked steadily on the path of economic liberalization where it has experienced the fall in tariffs with the establishment of the GATT (General Agreement on Tariffs and Trade) in 1947....
Preview sample
Management of Information Technology Resources and Information Security
7 pages (2520 words) , Download 1 , Case Study
Free
The author of the paper 'Management of Information Technology Resources and Information security' will reflect on a case study involving Robert, a Client Manager for Biomed Devices in Perth.... This paper is an information security mapping case study and aims at identifying the importance of information to companies and society in general, discuss concepts, values, and techniques that relate to information security, and present advantages, threats, and susceptibilities linked to various IT environments....
Preview sample
Review of National Sport Effort By Carter
10 pages (2500 words) , Download 2 , Research Paper
Free
The paper "Review of national Sport Effort By Carter" states that participation in sports contributes immensely to building sustainable communities.... A Critique on Carter Report: Review of national Sport Effort and Resources, Introduction and Executive Summary, Patrick Carter, March 2005 Introduction ... The paper tries to make a critique on the Carter report of 2005 which has been considered as a land mark in the history of Sports England as it made genuine efforts to co-ordinate both the private and public sector enterprises to build up a new national Sports Foundation....
Preview sample
Security Risk Management in the UK
13 pages (3746 words) , Download 5 , Essay
Free
The essay "security Risk Management in the UK" focuses on the critical analysis of the development of a framework that can be used to effectively manage security risks.... Module security Risk Management Module 09BS555/2 Stanley Thomas I.... security Risk in whatever form and in whatever industry poses as a real problem that threatens the very survival of the company.... Thus, it is not only imperative to be managed well but the operating and maintenance component of any security events should be the taken as a step to improve the security Risk System....
Preview sample
The Language and Use of Acceptable Usage Policy
7 pages (1991 words) , Download 2 , Essay
Free
Keeping in view the growing number of reported hacking activities, it is highly essential that safety and security of virtual activities and access should be enhanced to more advanced level.... lobally, hacking and other illegitimate activities have increased security threat for virtual organizations and users as well.... Computer security Handbook.... %22Computer+security+Handbook%22.... Proceedings of the Third Collaborative Research Symposium on security E-Learning Internet and Networking....
Preview sample
Security Camera Installation at Marbarisa Apartments
6 pages (1729 words) , Download 2 , Essay
Free
The paper "security Camera Installation at Marbarisa Apartments" discusses that the tremendous benefits enjoyed by the tenants after the installation of the camera would be dominant over the cost of the security measures.... A basic step to give Marbarisa Apartments a safe and secure environment and to maintain its prestigious status proposal for security camera installation is being set forth.... Camera surveillance will make the residents and the police more confident about the security situation of the apartment....
Preview sample
American Academy of Physicians Assistants
4 pages (1000 words) , Download 2 , Essay
Through such a comprehensive plan, the organization intends to achieve an acceleration of reforms both at the national and at the state levels majoring on increased access to healthcare and a reduction in costs (American Academy of Physician Assistants (AAPA).... This is a society that was founded in the year 1968 to bring together physician assistants and sure, it brings together over 100,000 certified PA's....
Preview sample
Information Technology and Information System Security
8 pages (2320 words) , Download 1 , Coursework
Free
This coursework "Information Technology and Information System security" presents Information Technology that is changing at a high pace.... Due to the spreading of news about the latest computer viruses, information attacks, and new vulnerabilities as well as updates needed for operating systems as circulated across the globe, it becomes necessary for individuals to develop appropriate security mechanisms to protect their computer systems and information resources against threats....
Preview sample
Is Security at All Costs an Ethical Justification to Protect the Community
8 pages (2138 words) , Download 0 , Assignment
Free
Therefore, the value of need to increase national security for a country differs and depends on how much security the country has and how much more is needed.... “national security as an Ambiguous Symbol”, in: Wolfers, A.... national security.... The paper "Is security at All Costs an Ethical Justification to Protect the Community" states that the community attaches high value to security bearing in mind the threats they would undergo while trying to pursue their other values in life and are therefore ready to forego other value....
Preview sample
Network Security
12 pages (3097 words) , Download 2 , Research Paper
Free
The paper "Network security" tells us about client machine.... Dan Farmer and Wietse Venema, Internet security, Addison Wesley Longman, 1996, ISBN 0-201-63497-X ... Chris McNab, Network security Assessment: Know Your Network, Second Edition, O'Reilly, 2007, ISBN: 0-596-51030-6...
Preview sample
The National Girls and Women in Sports Day
2 pages (500 words) , Download 2 , Term Paper
Free
The national Girls and Women in Sports Day (NGWSD) is a day celebrating the participation and achievement of women in sports, and is celebrated across the United States.... Hyman died of Marfans Syndrome while playing in a volleyball tournament in Japan in 1986, and in her memorial the national day of recognition and celebration has carried on until the present day.... The theme for the 2011 national Girls and Women in Sports Day is “Title IX at 40: In it for the Long Run”....
Preview sample
Terrorism and Homeland Security Quiz
4 pages (1000 words) , Download 2 , Assignment
Free
uicide attack involves activities that individuals or groups carry out to kill civilian and security forces in order to achieve a set goal.... Terrorism and Homeland security.... The five types of force multipliers in terrorism are: religion, media, transitional support, technology and recruitments as discussed....
Preview sample
United Nations' Role in the 21st Century
10 pages (2655 words) , Download 3 , Essay
Free
The UN (United Nations) was founded in 1945 October 24th by 51 states dedicated to maintaining peace via international collaboration and joint security.... The security Council prime duty is to maintain international security and peace.... The Secretariat performs the administrative and substantive work of the UN as guided by the security Council, General Assembly as well as other structures.... In a progressively complex global security background, where traditional methods of brokering reconciliation were not sufficient for culminating chaotic internal intra-state skirmishes, the United Nations was enforced to re-assess its function as an international peace enforcement establishment....
Preview sample
National Science Teachers Association Standards
6 pages (1694 words) , Download 2 , Report
Free
This paper is about national Science Teachers Association Standards.... The national Research Council wrote these standards in 1995, these standards were the work of 22 scientific societies and over 18,000 individuals contributed their knowledge to help produce these standards.... NSTA STANDARDS NSTA is the abbreviation for national Science Teachers Association Standards.... The national Research Council wrote these standards in 1995, these standards were the work of 22 scientific societies and over 18,000 individuals contributed their knowledge to help produce these standards....
Preview sample
British National Identity in Design
8 pages (2177 words) , Download 1 , Case Study
Free
This paper "British national Identity in Design" discusses the issue and particularly illustrates how theories based on design can be utilized to appreciate the significance of British national identity.... British national Identity in Design Introduction The fashion scene in Britain is typified by opposing sides; Cool Britannia versus Rule Britannia, punk versus pageantry, or anarchy versus monarchy.... The interplay between fashion design and ‘Britishness' redresses an omission in fashion theory that has been present for a long period and one that has been lost in the thought of gender, race, and social class than with national identity (Goodrum, 2005)....
Preview sample
Globalisation: Proliferation of American Hegemony
8 pages (2311 words) , Download 2 , Coursework
Free
This work called "Globalisation: Proliferation of American Hegemony" describes the views of the US political, social, cultural, and economic values dominating national traditions.... General notion of Americanization embraces the views of the US political, social, cultural, and economic values dominating national traditions.... Friedman (1999) talks about “global village” in which capital, technology, and information cross national borders....
Preview sample
Evaluation the International Criminal Tribunal for the Former Yugoslavia
14 pages (3500 words) , Download 3 , Research Paper
Free
he UN security Council Resolution established the International Criminal Tribunal for the former Yugoslavia or the ICTY in 1993.... They have to establish new institutional arrangements for self-regulation in order to ensure security, political participation and economic development after empire.... Sixth, was the fact that a number of UN security Council Resolutions and a European Council Declaration on Yugoslavia of 27 June 1992 had referred to ‘the former' Yugoslavia....
Preview sample
CritiqueThe Analysis of the United Nations and WIPO
2 pages (753 words) , Download 2 , Essay
Free
The United Nations was formed between member states to maintain peace and security, develop friendly relationships among nations and promote social progress within 51 countries.... The United Nations security Council at some time enacts sanctions meant to benefit only its members at the expense of other non-members.... typical example is the formation of the UN security Council.... This was to promote peace and security in the world after World War II....
Preview sample
Management Rational Decision Making Process
10 pages (2500 words) , Download 5 , Assignment
Free
The paper 'Management Rational Decision Making Process' discusses staff performance appraisal and employee motivation, based on objective-setting, as well as elements of product life cycle's and break-even analysis, which should be understood by the entrepreneurs.... ... ... ... Even with automation happening in every segment of the organization, the decision-making process still rests with the humans....
Preview sample
Electronic Medical Record
1 pages (250 words) , Download 3 , Article
Free
Without preset and uniform standards, goals such as establishing national level networks of healthcare services and systems cannot be achieved (Hoffman, 2009).... Hospital Computing and the Costs and Quality of Care: A national Study.... Due to several critical policy and healthcare issues, US policy makers want to creat and use digitalized or electronic media for the purpose of storing and retrieving medical data storage....
Preview sample
The Evolution of School and College Campus Security
8 pages (2000 words) , Download 2 , Research Paper
Free
This research paper "The Evolution of School and College Campus security" highlights that among the most general problems that a university or campus is required to address is Campus security.... Reportedly, security management's concern is the protection of a building and its assets.... security is a critical issue for many organizations such as commercial, private, educational or government institution.... The Evolution of School and College Campus security ...
Preview sample
Theory of Defense and Achieving an Effective Security Function
10 pages (2631 words) , Download 0 , Essay
Free
The paper "Theory of Defense and Achieving an Effective security Function" discusses that the challenges of today's world have led to the development of different models for physical security.... After the great world wars and mini-world wars, the concept of security started to emerge.... The need for security has widened all over the globe (Rothschild, 1995).... hysical security 5 ... chieving An Effective security Function....
Preview sample
Convergence of Physical and Information Security
11 pages (2866 words) , Download 4 , Research Paper
Free
This paper ''Convergence of Physical and Information security'' shows that the objectives are look into the overall trend in the surroundings, the challenges faced and recommendation supported by the ground research that has been conducted in recent times with regard to the affectivity of the convergence.... This comes along with various conditions and pre requisites (Purpura 2011, 161); security concern is one of the most concerning one with regard to its usage and applicability....
Preview sample
International Taxation and Multi National Companies
10 pages (2500 words) , Download 3 , Research Paper
Free
Income shifting and corporate taxation: the role of cross-border intra-firm transfers.... The author of this research paper "International Taxation and Multi-national Companies" states that the ever-changing operating and regulatory environments, new business models, new information technologies and competition have a big impact on the overseas branches and operations of MNCs.... Multi-national Companies (MNCs) have been making use of global tax strategies and constantly changing tax regulations to manage its multiple and complex objectives on a global scale....
Preview sample
Corporate Governance Principles of National Grid Transco
12 pages (3426 words) , Download 2 , Essay
Free
The essay "Corporate Governance Principles of national Grid Transco" focuses on the critical analysis of the corporate governance expectations based on practices undertaken by national Grid Transco.... national GRID TRANSCO Contents Introduction 3 Discussion 4 Theories of corporate governance 4 Board of director's composition 6 Compliance with expected practice 8 ... In this study corporate governance framework of a particular firm will be thoroughly analyzed known as national Grid Transco....
Preview sample
American Dream in American Literature
6 pages (1719 words) , Download 4 , Essay
Free
It is a reality based on the proclamation in the closing line of the American national Anthem "the land of the free, and the home of the brave.... The Gross national Product jumped to $500 billion after the war as against $200 billion in 1940.... The paper "American Dream in American Literature" discusses that Gatsby talked a lot about the past, and I gathered that he wanted to recover something, some idea of himself perhaps, that had gone into loving Daisy....
Preview sample
The Introduction of Management Techniques and National Culture
14 pages (3500 words) , Download 2 , Research Paper
Free
Extrinsic rewards are external to the job and include such aspects like pay, benefits, working conditions, job security, etc.... Multi-national Companies in particular take good care of their employees or that is the kind of impression they wish to circulate around.... Expanding business operations beyond national boundaries, while continuing the commitment to local markets requires more complex business structures.... In one such recent example, a German national, transferred for a project to a location in India was initially very reluctant to join here as he found that his salary is being considerably reduced, but after working for about six months he refused to go back and offered to work under same salary....
Preview sample
Information Security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring
6 pages (1826 words) , Download 0 , Assignment
Free
The purpose of this discussion "Information security - the Difficulty in Estimating the Probability of a Threat or Attack Occurring" is to provide the reader with a more informed understanding of the standard of due care in information security in relation to due diligence.... Information security is the aspect of keeping and protecting information from unauthorized access, presentation, modification, and even destruction, which would attribute to huge losses mostly in organizations....
Preview sample
Company Analysis of Free Standing Company - National Bank of Egypt
10 pages (2946 words) , Download 0 , Essay
Free
The essay 'Company Analysis of Free Standing Company - national Bank of Egypt' is devoted to the analysis of the activity of the national Bank of Egypt - the main public financial institution of Egypt and the main regulator in the banking system of the country.... This report will analyze national Bank of Egypt as a free standing company and then the characteristics of national Bank of Egypt will be compared with the views of Mira Wilkin with respect to free standing company. ...
Preview sample
Modern American Drama
12 pages (3275 words) , Download 2 , Essay
Free
Brick's ‘exceptional friendship' with Skipper questions conventional ideas about his own sexuality ,but Maggies practicality demands that their pretence of marriage should be sustained because of the financial security it provides them both with.... This paper ''Modern American Drama'' tells us that as fine pieces of literature, both Death of a Salesman and Cat on a Hot Tin Roof demonstrate the dreadful lives of men in this distressing world....
Preview sample
16301 - 16350 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us