StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Victims of Terrorism, Hate Crimes & Racial Profiling
5 pages (1250 words) , Download 2 , Assignment
It has broadened the ideas and knowledge of the Department of Homeland security who work together with police, intelligence and immigration agencies to fight terrorism (Doerner, 2012).... The Justice Departments' federal Bureau of Investigations which is the leading agency dealing with matters of terrorism and the Department of Homeland security and the local agencies have strongly been involved in the fight against terrorism....
Preview sample
Theodore Roosevelt
8 pages (2000 words) , Download 3 , Essay
Free
He recognized that business development was critical to the larger security of the United States; at the same time, he was absolutely convinced that business development and nature conservation could co-exist peacefully.... Issues such as war, health, and social security dominate presidential histories.... Thus, while the lands might be protected from economic exploitation, there was no mention of national parks or development for public use....
Preview sample
The effect of national culture on Commitment forms within international joint venture
40 pages (10000 words) , Download 3 , Essay
Implications of national culture for the work-related values and attitudes of their multi-cultural workforce and measures that managers normally take to create a homogenous organisational culture and thus reduce the effect of national culture ... ble surrounding the implications of national culture for the work-related values and attitudes of multi-cultural workforces Ali (1986) considers this question in his article ‘Labor Migration in the Arab Gulf States: pattern, trends and problems'....
Preview sample
US Interest in Asia
12 pages (3000 words) , Download 2 , Research Paper
Free
The apparent threat, as emanating from China's rise, is evident in a statement made by the governor of Japan (America's chief ally in the East Asian region) Shintaro Ishihara in 2001, “In light of China's rising economic and military might, as well as its territorially expansionist policies that directly threaten this island nation, Japan can no longer risk placing its security entirely in the hands of another power.... The change in power structure owing to the emergence of a new global and regional power raises a challenge and creates regional and global instability, thus posing a danger for overall security....
Preview sample
Exploring Military Education
3 pages (750 words) , Download 2 , Assignment
Professor Joan Johnson-Freese is also the former chair of national security Affairs at the war college, Newport in the Department of Defense Alfred, M.... Lifelong Learning on Either Side of the border: The Effects of Government Policy on Adult Education In The Netherlands And Belgium....
Preview sample
The Arab Gulf States Domestic Stability
12 pages (3000 words) , Download 4 , Essay
President Jimmy Carter once said, is integral to the national security of Western nations, chief amongst which is the United States.... The Arab Gulf states operate in a volatile and changing security environment.... After the September 11 attacks on the United States, the 2003 Iraq war, and the more recent preoccupation with Iran's nuclear program have generated new concerns about ways to enhance the security of the states of the Gulf Cooperation Council (Saudi Arabia, Kuwait, Bahrain, Qatar, the United Arab Emirates, and Oman)....
Preview sample
International Relations Today: Concepts and Applications
12 pages (3569 words) , Download 0 , Literature review
Free
For example, national security is an essential and important national interest.... As the attack took place on the US soil, it was highly essential for the then government to protect their citizen from future possible such attacks through its national security policy and support for international war on terror; through private news television channels, the government received unprecedented support for its action for protecting citizens (Ozeren et al.... For this purpose, many American satellite channels, which are mainly owned by private individuals, depicted Saddam Hussein as ‘tyrant' and ‘despotic' ruler in Iraq; similarly, it was also broadcasted and propagated that the regime of Saddam Hussein was a real and imminent threat to the global peace and security especially to US and Western countries (Tejel 164)....
Preview sample
Global Water Scarcity and Security
13 pages (3920 words) , Download 0 , Term Paper
Free
This term paper "Global Water Scarcity and security" presents water, being a valuable resource in life, that should be used and made available to all the residents of urban areas.... Global Water Scarcity and security ... lobal Water Scarcity and security ... For instance, water scarcity will affect agricultural yields, threatening the global food security.... Water security in one blue planet: twenty-first century policy challenges for science....
Preview sample
Network Security and Its Business Impact in Educational Institutions
56 pages (10316 words) , Download 2 , Dissertation
This dissertation "Network security and Its Business Impact in Educational Institutions" analyzes that the business impacts of combined wireless and wired network security in educational institutions.... Research is conducted with the help of a questionnaire that is generated to collect the responses of respondents on the issue of security needs for wired and wireless networks.... The research is set in colleges in the context of improvising the security of the college network....
Preview sample
Assignment 1: The Cold War and U.S. Diplomacy
3 pages (750 words) , Download 3 , Assignment
After negotiations soured, Stalin dispatched troops near the Turkish border, and Turkey called Washington for assistance (Merrill, 2006, p.... Through the Yalta and Potsdam conferences, Stalin mentioned Soviet security needs to rationalize demands for joint control with Turkey of the Straits of the Dardanelles....
Preview sample
Voting Behavior
6 pages (1693 words) , Download 2 , Essay
Free
oreign policy and national security items ... Table five on the attitudes that voters had towards abortion based on issues of foreign policy and national security items also has various indications.... Weingast states that in terms of national security, democrats stood a better chance of providing national security because they opposed war which was reflected in Obama himself (220).... It also shows that the national security was stable. ...
Preview sample
Domestic and Regional Factors
10 pages (2428 words) , Download 2 , Research Paper
Free
for its national security.... Nevertheless, Japan still considered the United States to be is closest friend and ally, and the primary keeper of its national security.... A basic tension between Washington and Tokyo in recent years has been the US' desire that Japan do more in terms of providing for its own national security, and take on a greater role in global security.... While other developed countries were spending big on military technologies and deployments, Japan remained largely unencumbered by this, and the United States performed many of its national security functions....
Preview sample
Nicaraguan War: Sandinistas Vs. Contras (1981-1990)
4 pages (1000 words) , Download 2 , Research Paper
Free
This alignment, along with a continuous supply of weapons flowing across the border to communist rebels in El Salvador, provoked several forms of US action (Chiet).... The war was fought on both a northern and southern front, with most of the US support coming from the Honduran border (Chiet).... In 1983, Reagan stated: "There can be no question: the security of all the Americas is at stake in Central America.... Third was to establish security for America and its allies against Cuba and the Soviet Bloc, and the fourth and final goal was to support dialogue and negotiation within and between Central American countries in order to resolve problems (Prevost 6)....
Preview sample
Violent Non-State Actors
4 pages (1566 words) , Download 3 , Dissertation
Free
national security in the previous years has not yet been defined (Zartman, 2009).... The United States however, has played a role in the promotion of national security by targeting the violent non state actors due to its widely publicized war on terror.... USAF Institute for national security Studies.... he country prevented the militants from getting outside assistant by ensuring the border is well managed.... VNSAs study is considered vital to security in the world....
Preview sample
Strategic Capabilities of UAE Police to Combat Card Fraud
80 pages (10260 words) , Download 2 , Essay
As a result, many industrialized countries and countries that have advanced economies are trying to deal with these crimes as they impact directly the nation's businesses and indirectly on the operations of these governments in how they manage their national finances.... The paper "Strategic Capabilities of UAE Police to Combat Card Fraud" highlights that the proposed research will examine one of a number of growing crimes that are perpetrated over the Internet via the World Wide Web (WWW)....
Preview sample
Can the International Community Do Anything about Global Terrorism
11 pages (2750 words) , Download 2 , Research Paper
Free
rinello, M 2005, national security Strategy of Preemption, viewed 15 April, 2012 < http://www.... It requires the relevant authorities to tighten border security and transport and cross border infrastructures to minimize the targets vulnerability and to limit the subsequent attack impacts.... xchanging operational and policy information (in case of a cross-border incident); ... Surprisingly, America, the sole super power of the world, completely disregarded the UN mandate by not obtaining approval from the United Nations' security Council; the Council Members were not taken into confidence and America toppled the Saddam regime....
Preview sample
The New Deal, a Socialist Program That Saved Capitalism
5 pages (1250 words) , Download 2 , Essay
The New Deal, a Socialist Program That Saved Capitalism Instructor name Date The era of the New Deal in America is perceived by many to be primarily a social and works program designed to alleviate suffering caused by the Great Depression and confined to the 1930's.... ... ... ... The earliest beginnings of the New Deal occurred during the 1920's though, officially, it started in 1933 and its effects reached far into the 1960's....
Preview sample
Why Afghanistan Is Failed State
7 pages (1907 words) , Download 1 , Case Study
Free
This will ensure that countries like Pakistan, which border Afghanistan, have political stability, which will provide favourable atmosphere for stabilizing Afghanistan. ... Such a state is also unable to perform its basic security and development duties.... The political indicators of vulnerability of a country becoming a failed state include criminalization and de-legitimization of the state; progressive deterioration of public services; wide spread violation of human rights; security apparatus as state within a state; rise of factionalized elites and intervention of other states or external factors. ...
Preview sample
How is war understood in the Realist theoretical tradition
4 pages (1000 words) , Download 3 , Outline
Realism is one of the most important positivist theories which focus on state security and power Introduction The end of Cold War brought about an inevitable focus on the concept of war and conflict in the study of international relations and several significant theoretical perspectives emerged.... ??1 It is pertinent to establish that state security and power above other states are the essential components of the realist theoretical tradition regarding war and conflict....
Preview sample
9/11 Terrorist Attacks
7 pages (1750 words) , Download 3 , Essay
Free
It may have forever changed how American people, as opposed to the Government, viewed the issue of national security.... Despite mounting concerns of terrorism in the national security circles, especially regarding biological agents, the general public was still basking in post Cold War optimism.... "Everyday Americans, especially those who in the past have favored social spending or individual rights over security and defense," began to get seriously concerned about "what the potential magnitude and effects of future attacks might be....
Preview sample
Role of American Hegemony
11 pages (3155 words) , Download 2 , Essay
Free
Other hegemonic principles include the security and travel systems and plans which are fixed and cannot be changed by the president.... When addressing issues of security, the president is considered the last and powerful centre of security because he is the commander in chief of the armed forces.... or instance, the president bedroom is wired with security features that make privacy impossible.... An incident that occurred in the white house when the president's wife accidentally activated the security button attached to the switch indicates the power of hegemonic practices in interfering with the president's life (Puchala, 2005, p....
Preview sample
Legitimacy and the International Nuclear Order
16 pages (4000 words) , Download 2 , Essay
Free
:The requirements of Deterrence” IN “Military Policy and national security” (William W Kaufmann, edn) Princeton: Princeton University Press. ... New, alternative strategies are being developed in the interest of world security – such as arms control and the nuclear non proliferation treaty.... They question the legitimacy of existence of these weapons and the credibility and guarantees associated with nuclear deterrence and offer the view that nuclear weapons are here to stay, however nuclear deterrence is likely to be moderated and refined through other arms control strategies such as nuclear arms reduction and the reorganization of conventional warfare strategies in ensuring global security....
Preview sample
Preparing for Future Terrorism Responses
9 pages (2250 words) , Download 3 , Research Paper
Free
?American national security and civil liberties in an era of terrorism.... Since the September 11, terror attack in United States, the homeland security official is worried with the possibility of this terror group's possibility to use detonation of a “dirty bomb.... ?Homeland security: Principles and practice of terrorism response.... There was also a letter addressed to the national Enquirer of the American media, Inc.... ?? In fact, in the year 2002, the Sandia national Laboratories' tests confirmed that the powder found in the letters was never weaponized (Williams and Viotti, 2012)....
Preview sample
The African American experience in colonial and antebellum North America
2 pages (500 words) , Download 3 , Term Paper
Free
The child father was required to provide security to the church wardens of the parish where the child shall be taken care of and any complaints from the wardens reported to the relevant county courts (Bacon 43).... The Negroes who did not have land had right to be given land, but not more than 40 acres and given security by the US military until they can provide for their security.... Since the Negros had secured their freedom, they were encouraged to enlist in the United States national army to contribute towards national building (Sherman 2)....
Preview sample
The History of Excavation and Interpretation at Great Zimbabwe
13 pages (3572 words) , Download 2 , Essay
Free
Indeed in many respects, it is difficult to differentiate between LOMA and the hated Internal security Act of South Africa.... The use of wide-ranging emergency regulations together with other security legislation and a non-justiciable Declaration of Rights had created a legal framework which effectively eliminated individual freedoms.... The new nation itself faced serious political, security and economic challenges from both within and without....
Preview sample
The Policy of Containment during the Cold War
8 pages (2261 words) , Download 2 , Essay
Free
The development of market-oriented economy and democratic functioning of the political system within the former communist states clearly proved the level-headedness of the US national security planners in post World War II scenario (Mitrovich, 1964:1).... Between 1948 and 1956, the US officials could successfully develop an effective national security doctrine that could reduce the influence of USSR on Eastern Europe and that too without indulging into a war....
Preview sample
A Business Proposal to Modify a Law
6 pages (1833 words) , Download 2 , Essay
Free
(Sioros, 2000) Under such parameters it is not possible to operate in this region but as you can understand from the above discussion that the aim and the basic rationale of this business is basically aligned with the fundamental concepts of social and national security thus this business can well be stated as a social approach.... The company operates in different manners including development of Titan CCTV software and looks for direct clients or partners to integrate the customers existing CCTV assets with the latest technology, so as to provide custom solutions for the specific security needs of clients....
Preview sample
Regime Change in Libya since 1951
6 pages (2068 words) , Download 2 , Essay
Free
The United Nations security Council as at then comprised of the following members, Colombia, Gabon, and Lebanon, Nigeria, Portugal, South Africa, France, United Kingdom, United States, Brazil, Germany, India, China, and Russia; as of February 26th, 2011.... According to the United Nation security Council (UNSC) statement of February 26, 2011, widespread and systematic attacks took place in Libya leading to fears that it might lead to crimes against humanity (UNSC, 2011)....
Preview sample
International Business: The conference at Bretton Woods
12 pages (3000 words) , Download 3 , Essay
Free
Productivity has increased very significantly since the opening of the mexican economy, while at the beginning of the eighties it was decreasing at a rate of 0.... Apart from regulating imports, tariff and trade barriers are used for protecting domestic employment, protecting consumers, protecting infant industries, protecting national security etc.... Sometimes unregulated imports may often cause threats to national security.... All these things are happening because of the threats raised by some imported items on national security....
Preview sample
Emergency Humanitarian Assistance
17 pages (4250 words) , Download 2 , Assignment
Free
Accidents such as Chernobyl or Fukushima affected communities that have banned nuclear projects in their territory; unfortunately, radioactivity does not stop at the border, and it does not need a visa to affect the environment and people from neighboring states.... Caribbean security on the Eve of the 21st Century.... The Trinidad and Tobago Defence Force: Origin, Structure, Training, security and Other Roles.... The Centre for Research on the Epidemiology of Disasters defines disasters as unforeseen events that cause great damage, destruction and human suffering, which overwhelms local capacity, necessitating national or international level assistance....
Preview sample
Just War or Just Peace
10 pages (2728 words) , Download 0 , Literature review
Free
nited Nations, specifically the United Nations security Council.... his essay will focus upon the realities and challenges behind the question of national sovereignty pertaining to the morality of humanitarian intervention.... This is applicable on a national level, as well as on an individual basis.... national sovereignty.... The inhabitant of any individual country would not desire their national borders to be violated by agents or armies of another country for their own national interests, and thus should not impose the same fate on less powerful countries....
Preview sample
International Marketing Management Coursework
30 pages (12333 words) , Download 3 , Coursework
The economic sovereignty and economic security of the developing countries are confronted with enormous pressure and stern challenges.... To find a road of development that suits the national conditions.... The reason why China can achieve so much in such a short span of time and in a constantly changing international environment is because China has found its own road of development, suitable to its national conditions, namely building socialism with Chinese characteristics....
Preview sample
Theories of Power Transfer
6 pages (2043 words) , Download 2 , Essay
Free
The primary goal of every state is its own security and survival which is best guaranteed best by military power.... According to this theory, every state is a rational actor who will always watch out for its own interest and ensure its security.... In the pursuit of its own security, every state will do everything to build up its resources, so that more resources will mean more power for the state.... However, this build-up will trigger an increase in the opposing state's security, which will result in relative gains only (Thies, 2004). ...
Preview sample
The Cooperation of China and the United States
6 pages (1668 words) , Download 2 , Essay
Free
he establishment of the fusion alternative world also poses security and identity issues that hurt the integrity of the US national structure.... The fact also remains that this will lead to higher chances of leak of important security information of the country through the foreign intelligence operating within it.... While trotting on its way to achieve its goals like creating more employment and bringing in financial security, America needs to talk to its people and make them take part in the processes that bring in this change....
Preview sample
Nurse Reinvestment Act
7 pages (1910 words) , Download 3 , Research Paper
Free
There were competing interest which have difference of opinion about the funding with national security and the economy.... Often, there are differences in opinion on what should be funded - competing interests, as you suggest, with national security and the economy overall.... The findings impact the national legislative agenda.... The Bill also provides funding for national, state, and local advertising campaigns that encourage careers in nursing....
Preview sample
Cyber Intelligence and Privacy Breach
6 pages (1573 words) , Download 2 , Essay
Free
national security Agency works for the purpose of identifying and mitigating the threats faced in terms of terrorist activities.... Cyber Intelligence and Privacy breach Brief Background: national security Agency works for the purpose of identifying and mitigating the threats faced in terms of terrorist activities.... By the end of the hearing, the court announced that the practices of national security Agency did not violate any major civil rights or privacy rules majorly (LIPTAK)....
Preview sample
The 2003 United States Incursion of Iraq
5 pages (1280 words) , Download 0 , Essay
Free
This is because the realist theory addresses matters relating to national security.... Risks to national security can originate from troubled countries, whose heads may defy rules to develop weapons of mass production, offer them to non-administration officials, and instigate an attack on unsuspecting people or countries (Ricks 23).... A country's national security is the utmost priority from a realist perspective.... Nation security may entail getting an essential natural resource or preventing against attackers....
Preview sample
Evolution of Federal Taxation in the United States
10 pages (2500 words) , Download 3 , Research Paper
Free
Costs for the mexican war were covered in large part by tax revenues and customs collection.... The government needs to generate its own revenue in order to support critical services such as Social security.... Given the situation, the federal government embarked on a program to offer the working class coverage by creating programs such as the Social security program.... President Roosevelt, under the New Deal, began the ambitious move towards a Social security program....
Preview sample
Post September Climate & Changing German Foreign Policy
30 pages (7500 words) , Download 2 , Research Paper
For example, the events of September 11 resulted in a seismic shift in US foreign policy focusing on national objectives as evidenced by the legally weak justifications for Operation Iraqi Freedom that were ultimately rooted in a foreign policy desperate for payback (Schoenbaum, 2006, p....
Preview sample
Development of International Policy Statement in Canada
6 pages (1669 words) , Download 3 , Essay
Free
It also involves the implementation of national security Policy and updating of the domestic strategy of the Canadian Forces to protect the local citizens.... ?? The country has recognized that its security, prosperity and quality of living are greatly influenced by drastic global transformations.... These three categories have overlapping objectives which tackles Canada's relationship with North America, defense and international security, trade and commerce, international assistance, the new multilateralism, and making a difference (CIPS, 2005). ...
Preview sample
Cyber Breaches in Different Companies
11 pages (2992 words) , Download 1 , Term Paper
Free
This paper ''Cyber Breaches in Different Companies'' is about the companies which are required to use extremely secure and authentic software programs to ensure the security of customers and their personal information to ensure their trust in their services and products in the short term as well as in the long term; considers the cyber breaches in eight different companies.... A cyber security breach affected nearly forty three thousand to fifty five thousand customers of Bartell Hotels in 2014....
Preview sample
Persuasion and Public Opinion
9 pages (2250 words) , Download 3 , Assignment
Free
However, in case of mails and social security there would be no significant changes in duties (Yan, 2013).... Consequently, the national government had to undergo a shutdown which affected thousands of government officials whereas most of the important government services were delayed (Sahadi, 2013).... This was also rejected by the Democrats which eventually setup the ground for the national government shutdown (Yan, 2013).... For instance, a 3 to 4 week national US government shutdown can cause $55 billion cost to the economy (Yan, 2013)....
Preview sample
Public Policy - Prescription Drug Abuse
16 pages (4000 words) , Download 3 , Essay
national studies indicate that a youngster is more inclined to have mishandled a professionally prescribed pill than an unlawful road.... ... ... Numerous teenagers think professionally prescribed medications are sheltered on the grounds that they were recommended by a specialist....
Preview sample
Candidate Vetting for the United Nations Human Rights Council
9 pages (2250 words) , Download 2 , Research Paper
Free
Another main human rights structure is the independent national security Ethics Commission (CNDS) which looks into allegations of misconduct by law enforcement officials (U.... This was partly remedied in June 2000 with the creation of national security Ethics Commission (CNDS) which had the authority to investigate alleged abuse by prison officers as well.... In October 2007, another independent body was created for inspection of places of detention, which encompass prisons, psychiatric hospital wards, and border detention facilities (Amnesty International, 2007)....
Preview sample
Media reaction paper
4 pages (1000 words) , Download 2 , Essay
What makes Fitzsimmons perspective rare though is that he also proposes that helping the immigrants within the border is the solution.... Immigration Reform Issue: A Reaction on a Media Piece One of the most pressing issues that are currently gripping in nation is that of immigration reforms....
Preview sample
Proposed Amendment to County Comprehensive Plans
5 pages (1343 words) , Download 2 , Assignment
Free
On another level, as noted earlier, it is also reasonable to ask whether MPP – D47, addresses national interests and national security goals.... Therefore, of necessity both national security interests and local well being will be assessed.... Locally produced food greatly reduces the consumption of, and need for, foreign oil: As such it directly addresses a national security priority.... Locally grown food is a national security priority and MPP – D47 addresses that issue and provides a partial solution to the problem....
Preview sample
Computer Security Information Risk Assessment & Security Management
4 pages (1000 words) , Download 3 , Essay
In today's world Computers are used to store and process a variety of confidential information like financial data, records of criminals and the crimes committed by them, medical history of patients, social security data, a company's personnel and payroll data, inventory and sales data, weather data, troops deployment data, missile deployment data, satellite surveillance obtained topographical data, etc.... Nowadays, almost every person having a vehicle loan, a housing loan, a credit or debit card, and automated teller machine card, a social security number, a passport, a driving license, a telephone connection, etc, has to provide detailed personal information to the agency or authority, which provides that particular facility or service....
Preview sample
Effect of Cultural Globalization on National Identities
10 pages (2928 words) , Download 1 , Case Study
Free
They argue that the primary agent for the globalization of culture is international mass media that is responsible for the continuous flow of trans border images that link people in the whole world.... There is also an increased number that travel for economic purposes and some flee their countries for security reasons.... "Effect of Cultural Globalization on national Identities" paper argues that Australian government has become more stringent in the media and events that are not in line with the country's traditions....
Preview sample
Teacher's Unions
3 pages (750 words) , Download 3 , Research Paper
Free
Firstly, they provide legal protection to teachers in terms of job security.... Firstly, they provide legal protection to teachers in terms of job security.... Since the NEA and AFT allocate large sums of money for political lobbying in order to gain a monopoly of educational spending, teachers from these unions are able to earn more and gain job security over private sector teachers.... Teachers' unions such as the national Education Association (NEA) and the American Federation of Teachers (AFT) give several benefits to teachers....
Preview sample
The Public Good in the US
12 pages (3123 words) , Download 3 , Term Paper
Free
In the case of Libya, the US should take a more decisive military approach in an attempt to dislodge Muammar al-Gadhafi from power and allow a new regime to dictate its own future—however, this intervention should be extremely limited, with a set timeline for withdrawal and no mission of rebuilding or security that involves anything beyond civilian agencies.... In addition, the US should attempt to form a blockade coalition with Turkey, Israel, Iraq, and Lebanon to keep Syria contained and outcast by its neighbors until the regime changes, as Syria's revolution needs to succeed in order to bring a real sense of security to the Middle East....
Preview sample
1851 - 1900 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us