Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The idea of this research emerged from the author's interest and fascination in how do the national security Council (NSC) and The Assistant to the President for national security Affairs (APNSA) operate?... Introduction The national security agency (NSA) is the U.... On the other hand, the assistant to the president for national security affairs APNSA is the senior most official in the executive office of the president who serves as the chief advisor stationed in the white house to the president of the United States on national security issues....
11 pages (2750 words)
, Download 2
, Research Paper
Free
or many years the Federal Government has attempted to assist the elderly and all others who are unable by reason of infirm health to earn an income, via Social security.... (King, 2007) In line with Social security benefits, the Federal Government also made provision for Medicare in 1965, a mainstream health insurance program for the elderly.... ocial security and the Elderly
... Social security reform has never taken specific aim at the elderly and may account for the current status of impoverished elderly Americans....
However, in some instances, international security Council tend to use coercive economic sanctions or armed force as a way of preventing further conflicts within countries or across the borders (Air Force Research Inst, 2012, 35).
... Nevertheless, the international community has outlawed them even though neither affects the peace as well as security of humanity in the real sense (Australia, 2013, 57).
... hrough the international law, forces from other nations become key security forces by training local forces to take responsibility for their local security....
he national security in Saudi Arabia has been of high interest from the instability in Iraq and the nuclear threat from Iran.... Most of the deportees are Ethiopians who have been accused by the Saudi government for crossing into the country through the southern border that separates it with Yemen.... The border patrol on both Yemeni and Saudi Arabias side should be increased to ensure that the southern border is not the place where drugs, aliens and arms are smuggled into the kingdom....
It did so to the Iraq too, creating an impression that it has weapons of mass destruction that pose a threat to the security of its region.... Since these terrorist groups were major threat to the security of the United States, Iraq was made to be justified target for preemptive actions.... It was not Iraq that had been posing security threat to the American nation, due to its supposed alliance with the Islamic militant groups.... security Interests in Central Asia Reassessed....
As Putnam suggested, in recent times, a comprehensive scholarly as well as eminent elucidation has developed around evident turn-downs in multi-ethnic social contribution, chiefly in the developed countries (Putnam, 2000).... Various scholars.... ... ... te anxiety about the fact that whatever sense of a communal field or civil society which witnessed its presence in the past times, is providing with a route to a new-fangled trend of social autonomy as well as distrust....
Even though the governments may use the federal government to reduce illegal trades in order to maximize on the amount of taxes it collects, this promotes businesses whose markets are put at risk by counterfeits and illegal transactions which are expensive (European Center for security Studies, 2010, 103).... Such businesses can therefore form groups that will affect state politics involving matters such as security, taxes and infrastructure.... European Center for security Studies, (2010), Federalism and Decentralization: Perspectives for the Transformation Process in Eastern and Central Europe, Oslo: LIT Vertag, Print....
The principle bars the country from exercising control and prosecuting the perpetrator outside its border.
... The study into transnational crimes brings the dualisms in transnational criminology to surface that shed light on the social and political sciences of the legal and criminological framework across the border.... ritics argue that war is also a transnational crime; however, transnational criminology challenges this by saying that war involves crossing the border but it is an entirely different case, whereby countries use force and arms in order to resolve conflicts, however during time of war, there is widespread unrest in a country and its framework is affected and is rendered suspended till the war finally comes to an end....
Canada's economic and national security relationships with its southern neighbor grew too much closer in the mid twentieth century, as a succession of Canadian governments saw greater North American integration as essential for national security and economic growth.... Additional changes in the federal Old Age Pensions Act and issues like old age security in 1949 resulted in some of the Department of Public Welfare's financial responsibility being shared with the federal government....
The paper "Cubas Criminal Justice System" states that underlying the tenets of Marxism-Leninism is the notion that the inherent strength of a government lies with the people.... In order to impact a rule by the people, there must be a complete revolution.... .... ... ... Located in the Caribbean between the Caribbean Sea and the North Atlantic Ocean and only 150 km south of Key West, Florida is the Republic of Cuba....
We will by statute incorporate the European Convention on Human Rights into UK law to bring these rights home and allow our people access to them in their national courts.... he law, introduced in February 2005, obliged people born outside the European Union and who only had a six-months to one year visa to seek special permission from the Home Ministry to marry even if their partner was a British or an EU national....
“World War II”, the writer submits, “fundamentally changed national institutions and behavior, immensely affecting most Americans; history's greatest armed conflict proved as much a turning point in personal lives as in world affairs.... It not only inflicted worldwide devastation, destruction, dismay and damage at a massive scale, but also cost millions both in men and material leaving....
policy towards the Soviet Union was more officially codified in 'NSC 68: United States Objectives and Programs for national security'.... When the Berlin Wall started to fall in November 1989, it represented the beginning of the end of a nearly 45 year conflict.... All over Eastern Europe, millions of people cried out for freedom....
8 pages (2431 words)
, Download 1
, Literature review
Free
Too much power is depicted in surveillance tools which national security can justify.... There is an imagination of individuals having working lives that are limited, from their early twenties and sixties, after which they are expected to retire on a combination of state social security, corporate pensions, and personal savings.... But if international security replaced the concept, then there would be less to enforce choice and mobility restrictions of citizens....
s such, the rapid pace of this process in the previous two decades along with the digital revolution has meant that 'cross-border flows (of trade, investment, migrants, cultural artifacts, environmental factors, etc) have reached unprecedented levels'.... However, notwithstanding the theoretical importance of international law-making in areas such as human rights and as a check on autocratic state power, these measures are only as effective as their practical enforceability, which some commentators have challenged in light of competing for political interests the international level, arguing that customary law has effectively been replaced by national concerns in inter-state relations (Dixon, 2007: p....
The unity program of the organization involves various involves various divisions such as reorientation, restoration, economic security, education and self-defense.... Economic security as a basic unity program, involves the freedom of economic slavery from the racists.... Based on the objectives, establishment, unity programs, and national concerns, the party can be worthwhile to work for.... Moreover, the organization is flexible and takes into account regional, national and local conditions of the members....
6 pages (1822 words)
, Download 2
, Research Paper
Free
prosperous alliance with the security forces from Yemen.... In the case of Anwar al-Alwaki, he was linked to al-Qaeda and was seen as a threat to the security of the U.... security.... However, the Supreme Court has asserted that the due process does not guarantee American citizens to act in unlawful manner in that it allows procedural security that rely on particular circumstances.... In such incidence, the security operations of the United States was at risk, therefore, due process considers the facts of military combat (Department of Justice, 2012)....
xample 2: Former national security Adviser Rear Admiral John Ms and his involvement in 1986s military Iran-Contra affair.... revent the use of national security considerations as a reason for not prosecuting foreign bribery; and,
... Political capital is often effective when the government desires to introduce an unpopular law with short-term costs and long-term benefits, such as health care or social security reforms other works of government ....
News among family members separated by border, front lines and movement restrictions were facilitated, and travel between the occupied Golan and the Syrian Arab Republic, between Israel and Lebanon, and between locations in the Palestinian territory, were facilitated among family members.... Eventually, UNHCR hopes to explore areas of legislation so that protection may be better guaranteed for refugees and asylum seekers, in the form of asylum-seeker visas, social security legislation, and amendments to border procedures.
...
From the paper "Criminology: security, Policing and the State" it is clear that parents of young people are deeply concerned about their children becoming addicted to drugs, due to peer influences or the free and easy availability of drugs at very low prices.... Moreover, article 5 of the European Convention of Human Rights states that everyone has the “right to liberty and security of reason.... The proliferation of criminal activity is a threat to the internal security and safety of the country's citizens....
9 pages (2250 words)
, Download 3
, Research Paper
Free
Carrying an extra burden will slow down anyone in a race.... And as the load increases, the more weighed down, tired, and exasperated one gets.... Just when America thinks that the economy and the health care system have hit an all-time low, more bad news to exasperate the problem mounts.... Childhood obesity rates have hit epidemic proportions....
Both the New Orleans Office of Emergency Preparedness and the Louisiana Office of Homeland security and Emergency Preparedness (LOSHEP) lacked enough personnel and experience in disaster management (Cooper & Block, 2007).... Private fire-fighting companies and security companies helped in evacuation, rescue, and search missions.... The Department of Homeland security must ensure coordination in future disaster response by integrating the services of the military who have more capabilities....
7 pages (1750 words)
, Download 3
, Research Paper
Free
This article explores the freedom of expression under the following divisions: laws regarding freedom of expression; limits to freedom of expression and national security and freedom of expression.... The other provision is on the grounds of protecting the national security, maintaining public order or protecting public health.... These requirements should be prescribed by law and are essential in democratic societies for the purpose of national security, public safety or territorial integrity....
Today piracy has developed as an international security problem, in recent times in the waters of the Horn of Africa, but the waters of China sea, India, and then Caribbean.... Piracy attacks in African region, including those on American ships, have fetched the international consideration to the extended problem of piracy in the area....
15 pages (3750 words)
, Download 3
, Research Paper
Free
United national security Council Resolution 688(1991), 5 April 1991, 1-2 United Nations.... As a result, instead of recommending urgent movement, he advised the security Council of three potential courses of action: to expand, abolish, or to reduce the UNAMIR mission.... Even though it was aware of the humanitarian crisis and massacres occurring in Rwanda, the security Council voted to reduce UNAMIR from its original mandated strength of 2,548 to about 270 (LaRose-Edwards 1994, 18)....
Another stakeholder group is the Chinese government that has interests to protect for issues of national security, regardless of whether American businesses support these practices.... Certain areas of the business model tested non-compliance and found effective security provisions for consumers in the process while also satisfying the business needs.... Establishing offshore hosting capabilities for consumer privacy and security is one example of where flexibility and cost reallocations are necessary to achieve business goals while also striking a balance with other stakeholders having diverse needs....
The number of illegal migrants, penetrating through the mexican border to the U.... The significance of these goals is well demonstrated by the mexican peso crisis.... In many countries the economic recovery began in 90-ies and was interrupted by the mexican peso collapse of late 1994.... Brazil and Argentina followed the mexican crisis.... In contrast, the countries of Southeast Asia took the path of protectionism and national security of economy....
A large literature has evolved from these experiences, emphasizing the wasteful aspects of inappropriate purchasing, poor management, quality control and security, unnecessary prescriptions, and poor patient compliance.... he Action Program on Essential Drugs (DAP) was established to support countries in developing national policies for the rational use of drugs....
This new development of the single currency follows five steps: a stronger role for the European Council; a common acceptance within the monetary Community of the goals of each national monetary policy; a coordinated intervention by the European Central Banks to defend a country under pressure by speculative capital movements, either by loans or by sharing the burden of interest rates etc....
security costs rise especially when dealing with such activism.
... national Academy of Sciences, animals are used in testing cosmetic safety because they provide vital data for evaluating the hazardous potential of the cosmetic products used by humans.... Others campaign through legal means such as; The national Association for Biomedical Research (USA) (Davies, 8).
...
Syrian crisis is a good example of how hegemonic forces are played in in balancing between peace and security of a particular region.... Despite opposition from various military heads, the Catholic pope and the United Nations security Council, the Obama administration pushed forward it its bid to end the stalemate in the Syrian region.... The united states have also advocated for an international diplomacy through the United Nations security Council to condemn the Syrian government to end the bloodshed in their country....
The multiplicity of the nuclear weapons that are scattered all over the world supports this argument, as does the security dilemma, the human nature, the modernity and rationality (Shapiro, 2007).... he security dilemma conjectures that the war is inevitable owing to the uncertainty of another state's intentions and actions.... For instance, the 1983 NATO exercise that the security system of Russia believed to be real.... Conversely, sufficient deterrents exists in the form of the security negotiations, agreements and threat of public dissatisfaction such as the UK public's reaction to the war in Iraq....
To begin with, the national security issue has risen to an appreciable level.... As such, the national security policy has well been taken care of.... ating back to the Gulf War in 1990, the US was the leader of a multilateral coalition that was sanctioned by the UN security Council against Iraq in search for Kuwait liberation.... The United Nations also help in this by fostering security internationally.... He further adds that there will be no boundaries in issues to do with Israel's security.
...
The ideas of New Right tinted on necessity of providing ‘Welfare State', which should offer ‘safety net' such as health, education, hospitals, social security, pensions, public transport as well as social services to the citizens of the state (Hughes, 1998).
... The New Right thought also has influence on National Health Services (NHS), police and military because higher intensity of unemployment requires improved level of social security (Earlham Sociology Pages, 2011).
...
The moral goal of Hakko Ichiu, construed by the Japanese national religion of Shintoism, was a perceived mandate of manifest destiny for Japan as the first created Asian state, to bring the corners of the world together under kodo, the unity of the Imperial Way, in subservience to the divine Emperor....
8 pages (2000 words)
, Download 2
, Research Paper
Free
For over fifty years NATO has been involved in aspects related to direct military defense and security of its member states and has succeeded in neutralizing the might of the radical political forces including those that existed within the friendly states.... he sole purpose of NATO was to ensure collective security and freedom of its member states, through political and military means, which implied preventing the grouping of powers from joining hands with opposing camps, or collective defense whereby all the member states agree to protect and defend their fellow members against the invasion of external parties....
Bargaining by the union ensures that the needs of the workers are met concerning job security, where the union has bargained for job security for life after six years of employment.... This is in order to keep the union running and the dues vary from one place to the next based on the national and local unions' requirements....
9 pages (2503 words)
, Download 2
, Research Paper
Free
The equipment can detect and inform the authorities of any imminent threats to national security.
... Analysts argue that despite the view by the western countries that human rights should not be violated, things change when it comes to issues of national security.... “Balancing national security and Human Rights: Assessing the Legal Response of Common Law Nations to the Threat of Terrorism.... epartment of homeland security have taken quite a number of measures to counter terrorist, this includes, anti-terrorism and counter-terrorism programs....
In these times of risks and economic crisis, there is the need to be fully aware of the laws governing authority, training, accountability and licensing requirements for both security personnel and officers in various organizations.... he origins of private security in the United States, on the other hand, has transcended over time for the ultimate goal of protection.... he nature of the functions and activities that encompass private security companies and officers are critical in terms of ensuring protection of human lives and properties under their specific accountability....
42 pages (10092 words)
, Download 5
, Research Paper
This research paper "Terrorism: What is It" was undertaken to study what terrorism is.... Terrorism cannot be described by one single definition.... The most authentic and acceptable one is should have the characteristics of fear-generating, coercive political violence without any legal or moral limits....
Yet the few formations that were kept at an approximation of full strength and readiness remained those most likely to be involved in small wars reminiscent of the old Indian campaigns--particularly the troops along the mexican border.... The most vigorous army chief of staff in the years following World War General Douglas MacArthur, reinforced this emphasis on a mobile army preparing for small colonial and border wars.... he Congresses and chief executives in the 1920s and 1930s prevented the design of the national Defense Act from attaining fruition....
Human resource management in cross-border mergers and acquisitions.... Progressive changes in technology and its applications, creating new opportunities, but also producing ethical dilemmas such as over-surveillance, data security and privacy laws etc.... Multi-national corporations are experiencing higher pressures to be accountable to their stakeholders and their demands as seen in the cases of BP Oil Spill (affecting environmentalists, governments, general public, NGOs and special interest groups), Facebook security regulations (affecting consumers, governments) and Apple human rights violation for working conditions (affecting governments, NGOs, consumers)....
Employers find it crucial to monitor their workplaces due to fraud and theft, productivity, security concerns which stem from internal workforce either directly or indirectly.... With the advent and rapid proliferation of technology, the world has become a smaller place where accelerated communication and networking has nearly removed the personal boundaries in all aspects of life....
On the other hand, national security discourse, as a tradition of governance, represents terrorism.... national security discourse comprises and represents the creation of an advantaged area where the state provides terrorism meaning.
... The paper "Definition and Significance of Representation" discusses that representation, as exemplified by post-feminism and terrorism, is an instrument within which power, knowledge, and language overlap or interconnect as a component of the discursive processes that validate the state....
Seeing human rights as a common standard and guaranteeing rights in the political, social and economic realms, the Universal Declaration of Human Rights promotes the right to life, liberty and the security of the person (3), prohibits slavery (4), torture (5) and promotes the right to legal recognition before the law (6).... Due to the absence of a suprastate or overarching Leviathan authority, states are placed in inevitable and perpetual competition, described as the security dilemma....
14 pages (3995 words)
, Download 2
, Research Paper
Free
In the case of the US-mexican border, such policies are highly proposed since it is termed as porous.... he instability of the mexican political system, in addition to the political power and wealth held by drug cartels in Mexico enables money laundering between the US and Mexico to continue (Guerrero 2008, n.... ell, M 2014, “Trafficking Networks and the mexican Drug War,” Cambridge Journals.... The two-thousand mile border shared by Mexico and the US makes a perfect entry point for smuggling of drugs into the US.
...
Correspondingly, most of the countries in the Asia-Pacific region have re-examined their national security and foreign policies in order to enhance the working relations.... Several countries of the Asia-Pacific region have depended on its conventional military power, diplomatic influences and nuclear umbrella in order to attain their security needs.... Contextually, several countries around the world have improved their defense security system with the aim of political as well as social stability....
owever it is worthy to understand that consular offices are beginning to win back the influence they had when it came to high level politics with security and border control issues standing as their principal areas of concern.... Consular offices are beginning to get back the role they played in high level politics with issues about security and border control as their major centre on activities.... The focus here has been on the improvement of exchange of information with the hope that it could later act the basis to have a real understanding of cross border movements throughout the world....
5 pages (1250 words)
, Download 2
, Research Paper
Free
But, they are forced to suppress the rights of few to uphold the concept of national security.... In the light of this argument legal authorities of the US are allowing special services to uphold national security against all costs.... But, they are forced to suppress the rights of few to uphold the concept of national security.... In addition, criminal law helps the State in prosecuting people with charge of murder, terrorism, domestic violence and many other crimes (Hart, 1958) Anti-Terrorism Law This breed of law is a sub-division of criminal law and is developed in order to control cross border terrorism....
They present a routine approach that is utilized in enhancing the security of a region.... The development of solutions aimed at eliminating the imminent problems presented diseases involves conducting information gathering in seeking to provide facts about the condition causing security threats.... Analysis of the information involves evaluation and structuring of source materials in a way which enhances the understanding of policy makers in order to develop and recommend a course of actions to avert the security threat....