StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Justice and Home Affairs
9 pages (2608 words) , Download 2 , Case Study
Free
It aims to improve procedures for the cross-border notification of documents, cooperation in the obtaining of evidence.... The objective of the agreement was to introduce genuine freedom of movement of persons without being controlled at internal borders, while providing for desperate measures in the areas of external border controls, visa policy, police cooperation and judicial cooperation in criminal affairs. ... he European Council of the 5 November 2004 has agreed to the use of qualified majority voting (QMV) and co-decision in the fields of asylum, illegal immigration and border control....
Preview sample
Education, Social Security and other Benefits for Young Children with Disabilities
8 pages (2184 words) , Download 2 , Essay
Free
The paper "Education, Social security and other Benefits for Young Children with Disabilities" describes that Medicaid is a healthcare program available for people of low incomes and limited resources.... Education, Social security and other Benefits for Young Children with Disabilities s Name ... Many young children with special needs are being cared for in education and social security settings across the United States.... In addition, there are several social security benefits for children with disabilities & their parents....
Preview sample
America and the end of the Cold War
4 pages (1000 words) , Download 2 , Research Paper
The end of the Cold War would eventually lead America to face other enemies and to reconsider national security.... ?? (“Notions of Security: Shifting Concepts and Perspectives”12) There were persistent concerns over Soviets infringing on the national security of these nations.... They felt that this would protect national security.... 4 Russia had a seat at the United Nations security Council that the Soviet Union held previously....
Preview sample
The Nature of Private Armed Security Guards to Terrorism within the State of Ohio
46 pages (10421 words) , Download 2 , Dissertation
The paper "The Nature of Private Armed security Guards to Terrorism within the State of Ohio" tells about the nature of private armed security guards to terrorism within the state of Ohio and changes that are proposed to increase the ability of the guards to address any act towards terrorism.... The culture of law and security enforcement has some similarities and some striking differences.... The Omnibus Diplomatic security and Anti-terrorism Act of 1986 defined the act of terrorism overseas in order to kill, conspire to kill or commit physical violence against a US citizen as a criminal act....
Preview sample
The Market and Social Order
13 pages (3743 words) , Download 2 , Assignment
Free
t unnecessarily drains off hundreds of billions of dollars away from the public coffer each year, preventing numerous types of societal investment, environmental security, and other public initiatives.... There must be collective national standards (Sen, 1996, pp.... Another argument for privatisation is that to privatise a company which isn't earning the way its suppose to be or has generated grave losses, when state-owned, means taking the burden of financing it off the shoulders and pockets of taxpayers, as well as freeing some national budget resources which may be subsequently used for something else....
Preview sample
America should/should not limit immigration
5 pages (1250 words) , Download 3 , Essay
It is also often referred to as a land of immigrants.... The early immigrants who came in waves and built this nation, were attracted by dreams of prosperity and freedom.... The perseverance and hard work of these early.... ... ... A potpourri of diverse cultures, religions and nationalities, America is unique in the breathtaking diversity of its population....
Preview sample
The Diplomatic Role of Residual US Forces in Iraq
7 pages (2046 words) , Download 2 , Research Paper
Free
An efficient united government was never created, Iraqi security troops have always been considered inadequate, despite of been prepared and equipped by the United States, now around 200,000 men proved their efficiency in current clashes against Shi'ite armies.... The rationality of the neo-conservative regalistic plans include security of feeble pro-American administrating government, local protection troops perpetually abased on the control of America, and some degree of stable military profession....
Preview sample
Components of the Economic Fabric of a Society
54 pages (10105 words) , Download 3 , Dissertation
Such topics include:Fundamental rights (freedom of association, collective bargaining, equality in employment), conditions of work, child labor, protection of women workers, hours of work, labor inspection, vocational guidance and training, social security protection, and occupational health and safety (Craig and Lynk, 2006, p.... According to International Labour Organisation, two major concerns in connection with labor and globalization have now arisen-how mobility imparted by globalization affects labor across national boundaries, and 'whether existing labor institutions would be sufficient to safeguard ....
Preview sample
HealthCare IT Executive Interview
3 pages (750 words) , Download 2 , Essay
The legal aspect is important in systems security, especially; with the development of HIPPA (Health Insurance Portability and Accountability Act).... Health Informatics Interview Name:  Institution:       Introduction Informatics or information systems denote a field in science that specializes in the investigation of the properties and structure of scientific information, which may not necessarily be specific to sciences....
Preview sample
Computer Crimes in the Modern World
8 pages (2479 words) , Download 1 , Term Paper
Free
To turn away the threat of hackers, firewalls should be utilized at the border of the network (Brenton & Hunt, 2002) and (Norton, 2001).... rom the perspective of computer crimes the basic need is to identify the security in terms of online and computer based working.... According to Laudon & Laudon (1999), the computer security is a group of activities which encompass the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer....
Preview sample
The Creation of a Corporate Security Management Strategy: Organizational Survival
12 pages (3000 words) , Download 2 , Research Paper
Free
The aim of this paper is the emerging risks and security management strategies in the 21st century is to provide the framework that decision-makers, especially senior management officers in multi-national corporations, can follow in establishing a unified corporate security management capability.... The main objective of this paper is to explore the emerging risks and security management strategies in the 21st century which has resulted in the increased interconnectedness....
Preview sample
Khomeini vs. the International Community
18 pages (4500 words) , Download 2 , Research Paper
Free
Bush believed that Iran presented an unusual and serious threat to American national security.... The US still considered Iran a nuclear security threat and soon after started to send border incursions into Iran (Linzer, 2005).... On the part of the US, Iran would always be considered a threat to democracy and to its peace and security.... Iranian foreign policy is also shaped by various elements, including the national environment, the regional environment, and the global environment (Rasmussen, 2009)....
Preview sample
An Analysis of the US Army in Strategic Management
5 pages (1584 words) , Download 0 , Essay
Free
Defense strategy planners target to attain a logical, continuing accord by formulating national security and military strategies.... Boone Bartholomees is Professor of Military History in the Department of national security and Strategy at the U.... On the wrong side, there has been fear of loosing important industries on the pretext of reducing cost of production, and taking the risk of endangering national security.... McShane was Director, national security Legal Studies in the Department of national security and Strategy at the Army War College. ...
Preview sample
United States Post 9/11 Policies in Relation to South Asia
11 pages (3153 words) , Download 2 , Essay
Free
The declaration of exit of US troops from Afghanistan does not seem to be a practical strategy as Obama's national security Advisor, Gen L.... Re Thinking the national security of Pakistan, Defense Journal, May, 2003 Akram, Zamir (2002).... As an outcome, the cross-border riot successfully demoralized the weak Karzai's government and Afghanistan's indigent community.... The Taliban and Al Qaeda leaders continue to be en-trenched along Pak-Afghan border areas and finding out safe shelters inside Pakistan....
Preview sample
Information Security, Types of Threats and Modes of Classification
7 pages (1750 words) , Download 2 , Assignment
Free
This information is of high value towards the national security, its leaders, its policies and other unavoidable conditions.... It could be to the nature of working, the purpose and objectives, the success met in terms of the citizens protection, other information of past events that are in no conflict with the national security(D.... his is followed by information from across the border.... Tthe reporter underlines that information security is an important aspect of the commercial and private organizations that deal directly with the customers....
Preview sample
International Relations Theories
6 pages (1500 words) , Download 2 , Essay
Free
Due to the absence of a suprastate or overarching Leviathan authority, states are placed in inevitable and perpetual competition, described as the security dilemma.... Thus, power and security requirements are paramount in attempting to define state interest and what motivates states to act.... ower and wealth supply the means for states to survive, to meet their security requirements, and thus to continue to compete in a system in which other states are necessarily either actual or potential threats....
Preview sample
Civilian Employment With the Us Army in Germany
15 pages (4050 words) , Download 2 , Dissertation
Free
The station is located 50 miles west of the Czech border.... This dissertation "Civilian Employment With the Us Army in Germany" focuses on the US army Stationed in Germany (Grafenwoehr) that is located in a serene locality approximately 60miles at the northeast of Nuremberg.... ...
Preview sample
Roles of Corrections Officers
2 pages (500 words) , Download 2 , Coursework
Free
hey perform tasks ranging from; searching prison cells for illegal items, locking prison cells and keeping the keys in good custody, observing the actions and character of inmates in order to control, discipline and provide security in the correctional and rehabilitation center (Stratton, West, & United States, 1972).... The inmates depend upon the staff to provide them with adequate security, maintain order and their safety in the prisons while the prison staffs depends upon the inmates to follow facility rule and provide work force labor (Stratton, West, & United States, 1972)....
Preview sample
How Private Security Companies are Doing Social Good and Benefitting Common Purposes
30 pages (8385 words) , Download 2 , Essay
This essay " How Private security Companies are Doing Social Good and Benefitting Common Purposes?... examines the legislation set up under the Private security Industry Act 2001 and defines the meaning of public purpose.... It investigates the role of private security in public works and the roles.... Therefore, the deployment of private security was very high, which declined during the depression days.... Once again, there was a significant increase in private security due to heightened emphasis on government security and an increase in plant security for the industry....
Preview sample
Export Control: International Traffic in Arms Regulations
9 pages (2250 words) , Download 2 , Research Paper
Free
The poise between export competitiveness and national security has been the subject of export controls controversy for decades.... he poise between export competitiveness and national security has been the subject of export controls controversy for decades.... The administration perceives the export of these services and articles as an essential component of protecting the national security and advancing foreign policy objectives.... he American administration perceives the export, re-transfers, and sale of defense services and defense articles as a core component of protecting the national security and enhancing foreign policy objectives....
Preview sample
American Conflicts
20 pages (7500 words) , Download 2 , Research Paper
Free
national security Adviser McGeorge Bundy told Johnson to change America's role into an active one, not a passive role because this might lead to a possible defeat (Wells, 2005).... America's sincerity to change mixes with “a peculiar strategic culture to shape American national security policy” (Metz, 2006, p.... Those in charge with national security have a fascination and obsession with technology, e.... The Hilsman report could not have convinced the Pentagon and the American military establishment because by 21 January, a South Vietnamese-United States action was conducted against the Viet Cong at Binh Hoa, just near the Cambodia border, in which an assault was directed at a Cambodian village wherein a number of villagers were killed or wounded before the original target was bombed and occupied....
Preview sample
Strategic Planning For The Improvement Of The Ems And Fire Departments
7 pages (2086 words) , Download 2 , Essay
Free
Second, there is a need for seamless integration between several Homeland security agencies in Carroll County.... The Office of the Homeland security leads these efforts. ... One of the most important of the county's goal is to ensure that the Fire and EMS departments are integrated and coordinated to effectively carry out the responsibilities assigned by Homeland security. ... CVESA (Carroll County Volunteer Emergency Services Association): the team that handles homeland security issues in Carroll County....
Preview sample
Cyber Terrorism in International Relations
39 pages (10286 words) , Download 4 , Research Paper
This research paper "Cyber Terrorism in International Relations" focuses on cyber-terrorism as one of the most dangerous forms of terrorism in the present era.... "Cyber terrorism" appeared after the spread of information technology, the use of computers, and the Internet.... ... ... ... The paper starts the discussion on the nature of terrorism in general and cyber terrorism in particular, where aggression, intimidation, and the threat of material or moral by using electronic means issued by states or individuals against human rights or religion....
Preview sample
Feasibility of a Denuclearised North Korea
8 pages (2466 words) , Download 2 , Essay
Free
North Korea may, indeed, denuclearise if South Korea accepts to reduce its conventional forces along the demilitarised zone, which would ensure their border security.... Five members of the Six Party Talks, the US, China, Russia, Japan, and South Korea, have all expressed their wish for a denuclearised Korean Peninsula, while the UN security Council (UNSC) continues to impose sanctions aimed at deterring North Korea from advancing its nuclear programme.... Also, in the event that South Korea – North Korea relations improve, however unlikely this may be, South Korea may become an important ally in easing security concerns about threats posed by US troops in South Korea, while enhancing economic and political stability in the North....
Preview sample
A Comparison Of National Support During World War II And The Vietnam War
9 pages (2349 words) , Download 2 , Essay
Free
According to Griswold del Castillo, the status of mexican Americans became elevated as they stood shoulder to shoulder with white males as brothers in arms within the war, those left at home taking on factory positions and moving through social barriers because of necessity.... World War II and mexican American civil rights.... With the events of Pearl Harbor, there was a need to publicly support the idea of protection, homelands, while removed from the main continent, had been severely threatened with many deaths resulting from the attack by the Japanese air assault and the country was fueled by thoughts of vengeance and security for those actions....
Preview sample
International relation theory
10 pages (2500 words) , Download 2 , Essay
The neorealist dominates the international relations with a sense of security and the neo-liberals view it from a wider perspective of human relations.... It focuses on security, integration of states and conflicting nature of the international politics in respect to the political economy and cooperation between the states....
Preview sample
American Foreign Policy: The Truman Doctrine
10 pages (2698 words) , Download 0 , Essay
Free
?Presidential doctrines: national security from Woodrow Wilson to George W.... The Iron Curtain border was accepted by the Americans however they were not ready for anymore expansion of the Soviet sphere of influence.... Also he stated that the threat to the “free people” was a threat to the security of United States.... ruman Doctrine is believed to have also led to the concept of collective security.... Their responsive policy of containment to the expansionist policy of Soviet Union created a disorder and security threats within the world for the following 45 years....
Preview sample
Illegal Immigration in the UAE
64 pages (16000 words) , Download 2 , Dissertation
While globalization has given rise to global labor markets and national interdependence, these elements have also coauthored fluid movements throughout regions.... While migrant workers are not a new phenomenon, reasons compelling them to pursue work and lives beyond their national borders are diverse (UNHCR, 2009)....
Preview sample
Effective Planning and Management of Emergencies
3 pages (750 words) , Download 3 , Case Study
Free
As a corporate security manager, I shall ascertain the deficiencies like lack of resources in terms of equipment, supplies, trained personnel or items that require rectification to face the emergency.... As a corporate security manager I shall ascertain the deficiencies like lack of resources in terms of equipment, supplies, trained personnel or items that require rectification to face the emergency (Gibson, 2007).... o conclude as a Corporate security Manager I shall take proactive steps in order to ensure the security of the corporate assets....
Preview sample
Answering the question
4 pages (1000 words) , Download 2 , Essay
Peri Fletcher describes the mexican village of Nazipauro as a “transnational community.... This argument implies that states are at liberty to take strangers in or out to protect national and individual interests of the foreign country (Carens, 267).... Name Tutor Task Date “Answering the questions” Joseph Carens begins his essay by asking about the moral grounds of which affluent western democracies can exclude poor immigrants, just seeking to cross borders in order to get ahead....
Preview sample
The Code of Ethics of the American Association for Respiratory Care
6 pages (1593 words) , Download 0 , Assignment
Free
15); respect the patients' trust and safeguard the privacy and security of this information” (par.... 18) and “in order to assure the highest quality care to all patients, the ethical caregiver must have a clear idea of the potential for abuse when discrimination occurs within the areas of class, color, race, gender, age, handicap, culture, religion, creed, ethnicity, sexual orientation, national origin, politics or any other factor that will make a human-being unique” (par....
Preview sample
The Effect of World Agribusiness Trade on Arizona, or American Southwest
20 pages (5000 words) , Download 2 , Essay
Free
The objective of the agreement is to improve local and regional economies on both sides of the border from an international perspective.... Clearly, the entire process around agribusiness is important as it creates employment and food security (Moss et al.... Furthermore, the document will also focus on trade agreements, food security and security disputes associated with agribusiness in Arizona as well.... Fundamentally, Arizona trade agreements in international agribusiness entails improving predictability and security for importing and exporting participants....
Preview sample
Homeland Defense, History of
10 pages (2500 words) , Download 2 , Case Study
HOMELAND DEFENSE Name of the Student Course Outline Name of School Email Address of the Student Due Date Introduction Interest recently has developed within the national security institution of the United States that the natural defense from attack traditionally provided by the desirable geographic isolation of the nation, long boundaries with vast oceans to the east and west and established fellow citizens to the north and south, could be approaching its end (Jordan, 2002)....
Preview sample
Justice and Home Affairs
9 pages (2609 words) , Download 2 , Essay
Free
The objective of the agreement was to introduce genuine freedom of movement of persons without being controlled at internal borders, while providing for desperate measures in the areas of external border controls, visa policy, police cooperation and judicial cooperation in criminal affairs. ... he European Council of the 5 November 2004 has agreed to the use of qualified majority voting (QMV) and co-decision in the fields of asylum, illegal immigration and border control....
Preview sample
Contributing factors/components of national space policy
4 pages (1000 words) , Download 2 , Essay
As a result “overall space policy directives have slowly been transformed from a cold-war emphasis that marginalized the economic and commercial implications of space activities into a truly integrated policy that recognizes the maturity of many space applications, sophisticated industrial capabilities, the globalization of space technologies and the importance of the space infrastructure to both civilian uses and security concerns”.... As an example, the national Aeronautics and Space Administration Authorization Act of 2005 was a policy that was directed towards making sure that NASA retained sufficient employee talent to put into place the planned exploration goals....
Preview sample
Challenges in the Technology Industry
8 pages (2104 words) , Download 2 , Essay
Free
ncreasing importance of the security issues: companies specializing in information technology should prove that their products are able to provide sufficient level of security.... ising security issues concerns. ... and unauthorized access to the commercial information due to the viruses, worms, DoS attacks and other security breaches. ... xtensive but controversial national and international regulation of the industry; standardization of particular software products. ...
Preview sample
Health Care for All Americans
6 pages (1987 words) , Download 4 , Essay
Free
To attain good health care for all Americans, the government should adopt the President's Plan that emphasizes on stability as well as health security to all of the US citizens (Anonymous 1).... Increased stability and security will lead to end of discrimination against people with existing conditions.... The Obama Plan: Stability and security for All Americans.... If America can set a national high-risk pool program that would provide coverage to hundreds of thousands of Americans with chronic, costly, and severe illnesses which otherwise make them uninsurable in the individual market....
Preview sample
Domestic and Foreign Intelligence Services
9 pages (2000 words) , Download 3 , Research Paper
Free
The author states that both domestic intelligence services of United States and United Kingdom have common jurisdiction in relation to national security.... ntelligence Services play important roles to national governments across the globe since they offer essential information that is used to make key decisions in relation to national security threats.... national security threats may arise from domestic, foreign and military and hence the need for national intelligence services....
Preview sample
The Purpose of Determining the Main and the Basic Problems of the United States of America
8 pages (2000 words) , Download 3 , Essay
Free
For that purpose, it is stated that the presidents would be compared and judged on the basis of their domestic policies, their views and efforts on national security and also their characters coupled with their means and ways of presidential politics.... The national security is easily explained as the relationship between the internal relations of the nation with the external threats.... He had an exquisite achievement in terms of national security when he officially finished the US involvement in Vietnam War....
Preview sample
The role of the CIA in the government of Cheddi Jagan (1950-1960)
4 pages (1000 words) , Download 2 , Essay
The Central Intelligence Agency (CIA) was formed under provisions of the national security Act in the year 1947 after several other security organs such the National Intelligence Authority and the CIG lost their significance and political good will hence leading to their.... The primary function which the agency was charged with was to coordinate issues pertaining to the country's intelligence as well as disseminating information related to national security....
Preview sample
The Impact of IT on the Health Service in Britain
5 pages (1634 words) , Download 2 , Essay
Free
However, these centers are not linked with SWAN, while this could depend upon the security of the National Health Service (NHS) network along with confidentiality of patient records that include all of its related information.... Information Technology in the British national Health Service The Great Britain has announced the facts and figures about rapid growth in information technology related aspects in health sector.... Additionally, this report estimates about major spending that resulted in expansion of the NHS (national Health Service)....
Preview sample
Large Multi-National Corporation and Exchange Rate Risk
2 pages (769 words) , Download 2 , Essay
Free
In general terms, the civil warfare that continues in this nation due to the Holy War makes it a security risk for any company due to suicide bombers and other Para-military activity.... The security Stock Exchange and the U.... As the paper "Large Multi-national Corporation and Exchange Rate Risk" tells, the value of the monetary sale for the company and its distribution channels is accepted by the fluctuation in the exchange rate....
Preview sample
A Global Defense Policy for the United States
13 pages (3382 words) , Download 3 , Admission/Application Essay
Free
national security strategy is a well laid down program prepared by the security and defense department of the United States and addressed to the congress highlighting the security approach of the government (Colucci 37).... hrough the enactment of the Goldwater-Nichols act, the national congress made it mandatory for the federal government to provide a periodical overview of national security strategies, highlighting some of the current security challenges and the mitigation measures that the government has adopted....
Preview sample
Electronic Medical Record Systems
13 pages (3340 words) , Download 0 , Research Paper
Free
hough there has been increased use of EHRs due to the various benefits, there are concerns that some physicians are reluctant to implement the systems due to security and legal risks associated with the digital health records (Sittig & Singh, 2011).... security breaches jeopardize the privacy of patients when confidential medical record information is accessed by unauthorized individuals (Kopala & Mitchell, 2011).... The hospital has a number of security policies in place....
Preview sample
Immigration Reform in the U.S. Concerning Illegal Aliens
5 pages (1250 words) , Download 2 , Research Paper
national security, as well as internal security and order maintenance (Garcia 2005).... raudulently obtain identity documents, taxpayer identification numbers, social security numbers, or engage in identity theft in order to obtain a job from employment entities.... The media reports on various national and international groupsattempting to interfere in our elective processes....
Preview sample
Counter-Terrorism Strategies & Plans of the USA
11 pages (2750 words) , Download 4 , Assignment
Free
Other areas of action include border security, immigration, and cyber security.... involved in counterterrorism efforts include the diplomatic institutions, economic, financial, information propagation, military, intelligence agencies, homeland security, and law enforcement agencies.... counterterrorism efforts lies in adherence to the national core values, building of security partnerships, and building of a culture of resilience.... ome of the domestic programs include Department of Homeland security, Department of Justice, and National Counterterrorism Centre....
Preview sample
The Policies and Procedures That Govern the Hiring Practices
6 pages (1828 words) , Download 2 , Article
Free
This Act requires the companies to list the security measures that comprise the creation of the dangerous chemical lists along with the setting up of the first aid kits (Catholic Charities Spokane, 2012).... In the US, it is the Employment Retirement Income security Act that controls all benefits plans provided to the employees (Catholic Charities Spokane, 2012) From the interview, it was further identified that at Catholic Charities, family medical leaves is unpaid until and unless the employee has accumulated paid leave (Catholic Charities Spokane, 2012) The other policies and procedures governing the hiring practices at Catholic Charities include employment of relatives....
Preview sample
Immigration and Asylum Law
12 pages (3000 words) , Download 2 , Essay
Free
Thus, the reasonability of removal should take precedence as to give the asylum seeker sufficient protection unless otherwise the country has course for pursuing public interest or national security.... In addition, the court would not estop a deportation order if continued stay of the said deportee would threaten national security or the rights of other native even if it will affect the deportee's family or private life (Rebecca, 2007, p106).... Where a person is under the umbrella of asylum, his refuge county shall owe him the duty of skill and care so as to assure his security, protection and legal advice....
Preview sample
International Law and Institutions
6 pages (1250 words) , Download 2 , Essay
Free
The security Council has primary responsibility for a maintenance of international peace and security.... Since the 1990s not only has the security Council agreed to authorize humanitarian intervention, there have also been interventions without authorization from the security Council such as the intervention in Northern Iraq, Somalia, Bosnia, etc.... he 2 exceptions to this are firstly, the individual or collective self-defence – Article 51 - and secondlys where the UN security Council may order use of force in response to a threat to or a breach of international peace or an act of aggression and where none of the 5 permanent members of the security Council use their veto....
Preview sample
International Law and Institutions
6 pages (1678 words) , Download 1 , Essay
Free
The paper "International Law and Institutions" describes that the UN can be no more effective than the political will of its member states – particularly the permanent members to the security Council with their right of veto -- to mobilize, equip and fund it.... he 2 exceptions to this are firstly, the individual or collective self-defence – Article 51 - and secondlys where the UN security Council may order use of force in response to a threat to or a breach of international peace or an act of aggression and where none of the 5 permanent members of the security Council use their veto....
Preview sample
1601 - 1650 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us