StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Haiti: Poverty Challenge
5 pages (1423 words) , Download 1 , Essay
Free
There needs to be emphasis on maintaining public order and security, economic stability, as well as modernizing the central bank and the Haitian Police force.... Haiti is referred to as the Republic of NGOs and it is with good reason, because of the limited capacity of the national government and weak institutions, NGOs created a quasi-private state within the state.... Studies have shown that after the earthquake in 2010, NGOs provided 70% of the national healthcare while 85% of the private schools were also NGO run....
Preview sample
Evolution of Seaport Shipping Container Security Since 9/11
10 pages (2579 words) , Download 2 , Research Paper
Free
here was a need of developing a maritime as well as a national security plan. ... The customs border protection of the US has a variety of mutual arrangements with countries in the world, for the main purpose of protecting and facilitating the global cargo trade18.... The paper "Evolution of Seaport Shipping Container security Since 9/11" focuses on the critical analysis and examination of the evolution of the seaport shipping container security, after the September 11th attacks....
Preview sample
1. the cold war 2.the most important events in American history of the last 33 years
4 pages (1000 words) , Download 2 , Essay
The active nature of the USA meant that policies within the country had to be changed in order to remain relevant in the cold war era.... The country.... ... ... The essay will focus on three personalities that played an integral role in shaping the nature in which the United States shaped their ideologies....
Preview sample
The HIPAA Privacy Standarts
21 pages (5250 words) , Download 2 , Research Paper
The paper "The HIPAA Privacy Standarts" discusses that Protected Health Information (PHI) is medical facts attained by crisis staffs during patient consideration and treatment or similar facts provided to HIPAA by another organization for the same reason.... ... ... ... Covered Direct Treatment Providers must offer the notification to the person, not after the date of first service deliverance (Standards the 14th April 2003 fulfillment date of the Privacy Rule) and excluding in an urgent situation, make a good faith attempt to acquire the person's written recognition of receipt of the notification....
Preview sample
The United Nations Charter
8 pages (2000 words) , Download 3 , Case Study
Free
However, the security Council was paralyzed to take any action due to the threatened veto by Russia.... Eventually the right action was taken, but the whole episode challenged the reliability of the entire international security system.... In 2006 the security Council took a resolution on the Protection of Civilians in Armed Conflicts.... Rules and laws have no value unless implemented and here comes the role of the security Council....
Preview sample
How Do International Organisations Shape Relations among States Today
7 pages (2023 words) , Download 2 , Assignment
Free
This integration was strengthened through the implementation of three institutional pillars: 1) European Communities; 2) Common Foreign and security Policy (CFSP), and 3) police and judicial cooperation in criminal matters as well as the acceptance of a single currency, the Euro.... The Common security Strategy of the North Atlantic Treaty Organization (NATO) and the European Union exemplifies this trend.... ATO & the EU: A Common security Strategy ...
Preview sample
Drones for Domestic video surveillance
4 pages (1000 words) , Download 3 , Research Paper
A typical surveillance role of drones that assist in enforcement of law and order is the monitoring of movements across the border.... People supporting drone usage argue that unarmed drones are harmless and do not threaten the security of the country.... The drones are discreet in their operations and hence can be useful for security apparatus....
Preview sample
How the Iranian Nuclear Program Affect the GCC Countries National Security
26 pages (7341 words) , Download 2 , Research Paper
This work called "How the Iranian Nuclear Program Affect the GCC Countries national security" describes the Iranian nuclear program as a serious issue among the GCC countries and the international community due to the fear that it could be propelled to produce nuclear weapons.... national security is the first priority in the survival of many countries.... military assets has maintained close relations with Iran and so at the moment, it does not view Iran as a threat to its national security (Perkovich, Radzinsky, and Tandler, 2012)....
Preview sample
2012 Budget Proposal
12 pages (3198 words) , Download 2 , Research Paper
Free
The main three purposes of The House of Representatives FY 2012 budget proposal is to (a) lift the crushing burden of debt; (b) guarantee health and retirement security for all Americans, especially seniors; and (c) strengthen the base of economic growth and creation of the jobs (Becker, 2011).... om (2011b), President Obama defended his new budget proposal emphasizing that the most difficult decisions about the nations biggest expenses, including Medicaid, Medicare and Social security, should be addressed by both Republicans and Democrats, but not be dictated by White House....
Preview sample
Labor Laws and Unions
3 pages (750 words) , Download 2 , Essay
AT&T also faces the risk of security breach that is unique to m-commerce.... Additionally, it should take heed of antitrust law and provide consumers with security they require when using the company's services.... The Act aims to establish rapid, efficient, national and global wire and radio communication.... It also requires these services to have adequate facilities at reasonable charges, for the purpose of the national defense....
Preview sample
Stalking Victimization in the United States
2 pages (500 words) , Download 2 , Essay
Free
It is behavior which causes harassment and fear and poses a threat to the security of victims and others.... It is behavior which causes harassment and fear and poses a threat to the security of victims and others.... There can be no doubt that Stalking Victimization in the United States constitutes a serious threat to social security.... To combat this crime, law enforcement and community agencies should coordinate responses to the victims needs, in terms of security, counseling, and legal aid....
Preview sample
What Is Identity Theft
16 pages (5232 words) , Download 2 , Essay
Free
While admitting that your company has had a breach of security may shake the confidence of your clients, refusing to recognize and deal with these situations only makes matters worse.... Palmer, the head of the Global security Analysis Lab, IBM's ethical hacking unit candidly responds to the problem of computer crime and identity theft as well as cyber terrorism: ... He recounts an personal instance of walking into what should have been a secured facility, never identifying himself, walking up to filing cabinets and walking out with his arms full of confidential material while the security guard on duty holds the door for him (Plamer, 2004)....
Preview sample
Is Asia primed for increased rivalry or greater co-operation
16 pages (4000 words) , Download 3 , Term Paper
Friedberg (1993/1994) presents a rather pessimistic analysis concerning any prospects of regional stability in Asia in his article “Ripe for Rivalry: Prospects of Peace in a Multi-polar Asia”.... Using IR theory to support the title of his paper, he contends that Asia does not.... ... ... ossess any of the factors that enabled NATO countries to remain stable and peaceful, while also enumerating several conditions that made potential instability and conflict in the region seem more likely....
Preview sample
Domestic Jurisdiction
22 pages (6140 words) , Download 3 , Essay
This paper ''Domestic Jurisdiction'' tells that All nations strive to achieve and maintain domestic jurisdiction because it defines them.... It is what gives them identity as a separate entity.... It is what sets them apart from the global community.... A nation can be likened to an individual who acts on his own accord....
Preview sample
Government Treatment of Its Citizens after an Attack of the Country
3 pages (946 words) , Download 2 , Essay
Free
The author states that then shortly after the 9/11 catastrophes, there were concerns from US security organizations as well as the American people that it might not be the best of ideas to have non-US-citizens acting as airport screeners.... In fact, it will certainly decrease air travel security by eliminating much of the experienced and trained workforce.... Perhaps they should start by letting their national government know they would like Japan to acknowledge and apologize for crimes committed by soldiers of this country in international wars....
Preview sample
Concepts of non-violence in response to 9/11: European options to influence US policy
20 pages (5000 words) , Download 2 , Essay
The end of the Cold War and the events of 9/11 have provided a catalyst for unprecedented challenges to the international order and national security policy.... Arguably the most important challenge has been the appropriate and most efficacious method to combat a transient and.... ...
Preview sample
George H.W. Bush Presidency
14 pages (3861 words) , Download 3 , Essay
Free
Bush selected lieutenants for national security who approached the world as a series of problems to be solved by practical intelligence.... Bush stated a legacy that is originally his own – that is a 'new world order, where diverse nations are drawn together in common cause to achieve the universal applications of mankind-peace and security, freedom, and the rule of law.... Bush stated a legacy that is originally his own - that is a "new world order, where diverse nations are drawn together in common cause to achieve the universal applications of mankind-peace and security, freedom, and the rule of law....
Preview sample
Americas Rationality (view) for Electing Obama as President
12 pages (3000 words) , Download 2 , Essay
Free
omeland security: ... bama was quite aware about the major and burning issues like the homeland security.... Obama basically focused on the security of airports, ports, and land borders.... He assured to concentrate on the security of the infrastructure of the nation.... It was the stance of Obama about Iraq that he would support Iraq to establish stability and security in Iraq.... enior and Social security: ...
Preview sample
Social Impacts of the War in Iraq
4 pages (1000 words) , Download 3 , Essay
Free
The government took it upon itself to enforce international law since the Iraqi dictatorship under Saddam Hussein had violated UN security Council resolutions (DeFronzo 2010).... This had the effect of wrecking havoc to the entire national budget by creating new economic demands for labor and goods....
Preview sample
Effect on US and EU by Israeli-Palestinian War and What Should Be Done
15 pages (3750 words) , Download 2 , Research Paper
Each plan is similar, which suggests the existence of two separate states with a recognized border along the present green line that divides both the states.... Third, Israel wants to ensure security along its 1967 borders.... The war between them continues to this day and there is no solution....
Preview sample
The Principle of Non-Refoulement at Sea
10 pages (3837 words) , Download 2 , Essay
Free
The paper "The Principle of Non-Refoulement at Sea" discusses that a few exceptions however hinder complete compliance with the provisions of non-refoulement, with national security dominating excuses given in the modern society ravaged by terrorism risks.... The most important factors of national security dominate the reasons for the denial of free entry of persons into a country.... Most important factors of national security dominate reasons of denial of free entry of persons into a country....
Preview sample
Introduction to International Relations
8 pages (2222 words) , Download 2 , Essay
Free
Admittedly, the American interest in the Far East is as old as the national security Council Report No.... NSC 68: United States objectives and programs for national security.... national security Council.... In addition, both the countries agreed that Russia was the main security concern for both the states.... So, the tenet of classical realism that states are usually guided by the logic of the national interest, ranging from survival, security, power and relative capabilities become paramount....
Preview sample
Drug and Substance Abuse
12 pages (3000 words) , Download 3 , Dissertation
Free
A statement from the United States international narcotic strategy, 90% get into the USA through the mexican border.... ccording to Gonzalez and Tienda 2004, the USA authorities and other governments are trying to fight drug peddling, it is believed that the less amount of drugs getting into the border the lower the possibility of people gaining access.... rugs from Colombia and USA take a long distance before they reach the border.... border Security: A Reference Handbook....
Preview sample
Federal Law Enforcement
7 pages (2130 words) , Download 3 , Coursework
Free
Included in the mission of the agency is to maintain a solid participation in the first line of defense in relation to the threats on the national security through information assimilation for the establishment of action and decision to counteract detrimental actions from different terrorist groups (“CIA Vision, Mission and Values” CIA). ... Included in the main objectives of the study is to be able to present the actions and improvements in security measures that are done by the different bureaus that are in charge of the law enforcement in the United States concentrating mainly in the Federal Bureau of Investigation, the United States Secret Service and the Central Intelligence Agency....
Preview sample
Political Development in Modern China
15 pages (3750 words) , Download 2 , Research Paper
Free
As a member of the UN security Council, it has remained focused on the principles of independence and in the avoidance of interference in other country's affairs.... It initially supported the UN in its security Council initiatives in Somalia, but when the operations became prolonged and bogged down, it became “increasingly critical of the mission's intrusive nature, and China abstained on each of the subsequent resolutions designed to provide multilateral forces in Somalia with a broader mandate” (Johnston & Ross, p....
Preview sample
Analysis of The Paradox that Is Pakistan: Ally and Enemy of Terrorism Article by Kfir
5 pages (1538 words) , Download 0 , Coursework
Free
Sectarianism in Pakistan is a hazard for the public as well as for national security.... The support given by Pakistan for hardline Islamists in both the country and the region has deep roots which were established by ethnic Pashtun ties that cross the Afghani-Pakistani border; and due to former President General Zia ul-Haq's actions to strengthen Islamists during the 1980s (Kronstadt: CRS 6).... The tribes especially in the border area of Waziristan, between Pakistan and Afghanistan, who were against the government and its anti-terrorism legislation, provided protection to extremists....
Preview sample
Inter-American Human Rights
14 pages (4240 words) , Download 1 , Case Study
Free
roviding security ... Most of the cases involving such crimes under national courts go undecided, which leads to the socialised idea that everything is accommodated in law; including absurd reification of human beings.... Although the law and its organisation, reparation and cohesion functions have tried to end impunity, it still remains a major challenge in ending social catastrophes, and this challenge has spilt over to inter-American court as presented by noncompliance by national courts under it (Organisation of American States 43)....
Preview sample
China in the 21st Century
16 pages (4098 words) , Download 2 , Thesis
Free
The paper "China in the 21st Century" focuses on the various aspects related to the field of intelligence.... It helps in gaining a lucid comprehension regarding the various kinds of methods employed by intelligence services for the reason of collecting information.... .... ... ... The investigative products with regard to the various intelligence communities are believed to be planned in order to offer the required kind of information with the intention of aiding the policymakers as well as the president regarding comprehension of the progress which further helps them to make improved decisions....
Preview sample
Threats to Global Security in Post-Cold War Period
16 pages (4466 words) , Download 3 , Essay
Free
The essay 'Threats to Global security in Post-Cold War Period" focuses on the critical analysis of the major issues in the threats to global security in the post-cold war period.... onflict and security in the Post-Cold War Global System: ‘Old and New Wars'.... Thus, the domestic aspects of the anti-war movements condition and limit the response of the State technically, yet do not limit it totally in application, but rather force it into more covert actions, higher secrecy, greater division in society related to police control and mass-surveillance, and aspects of domestic security that run far more extreme than many of the worst elements of modernist States, such as the secret police in the Soviet State and Eastern Block....
Preview sample
Effectiveness of the Current US Immigration Laws
11 pages (2750 words) , Download 2 , Research Paper
Free
1120 Km in US-mexican border which have encountered majority of the illegal immigrant crossing.... United States of America being one of the superpowers of the world has from the dawn of the 19th century been following the policies of strict immigration rules so that the country is safe from all types of international as well as domestic threats which could bolster adverse consequences to its national security.... Customs and border Enforcement (CBE) are the agencies within DHS which are in the charge of handling the former “duties and responsibilities, naturalization, asylum, and permanent residence functions; and border patrol duties”....
Preview sample
Social and Economic Impacts of Globalization
9 pages (2000 words) , Download 4 , Term Paper
Free
eall (2002) adds that policies promoted by the international financial and economic architecture are very important in strengthening international social inequalities since they urged weaker economies to reduce costs through reducing prices and wages, reflected in the aspects of worsening working conditions, reduced social security, extended working periods as well as increased casualness.... This also implies that such people becomes socially excluded rendering their lives and work security vulnerable to global economic changes (Beall, 2002). ...
Preview sample
Homeland Security and Emergency Management
8 pages (2000 words) , Download 2 , Research Paper
Free
ritical thinking in Homeland security and emergency management ... ritical thinking skills in Homeland security and emergency management ... The terrorist attacks that occurred in 2001 in the United States have greatly altered security and safety issues in the country.... The whole nation fully depends on Homeland security in ensuring that there is a decrease in the terrorism level in the United States.... It is therefore important for all stakeholders in Homeland security to develop the appropriate strategies necessary in dealing with uncertainties....
Preview sample
Interagency Networks
6 pages (1500 words) , Download 2 , Essay
Free
The political leaders and the national security staff continuously attempt to achieve consistency with limited success through the interagency process.... Affairs of the State: The Interagency and national security.... Department of Homeland security.... It is not viable for any single government entity to make any independent decisions, therefore there is the need for coordination between agencies to “synchronize instruments of national power” (O'Neil, 2006, p....
Preview sample
Was the Iraq War Handled Effectively
17 pages (4461 words) , Download 1 , Coursework
Free
ehrey argues that according to a national security strategy planned in 2002, before the invasion of Iraq in 2003, it stipulated that military force in Iraq was the only viable option and disregarded any international laws prescribing the appropriate rules of engagement on foreign land.... Westport, Conn: Praeger security International.... Praeger security International.... Instead of creating a government of national unity by also embracing Sunni politicians, who were previously in power, his government marginalized and alienated the Sunni in its decisions, by adopting a dictatorial system of government in an attempt to retaliate against the Sunni for their past oppressive acts and violation of human rights....
Preview sample
Setting up a new refinery in Panama
16 pages (4000 words) , Download 2 , Research Paper
Free
The two countries currently collaborate extensively on the three main issues affecting them: security of the canal, counter-narcotics effort and the Columbian border and the negotiations on a two way Free Trade Agreement (FTA).... Social Problems and challenges of investing in Panama International disputes The presence of organized illegal narcotics cartels in Colombia revolve within the remote border region with Panama.... Primarily, as mentioned above, oil power is particularly useful in remote areas where it is lack of regular electricity supply Energy security is the guarantee of a reliable and stable supply of energy at reasonable economic prices....
Preview sample
Legal and Technological Aspects of the Idea of Workplace Privacy
51 pages (9513 words) , Download 1 , Thesis
Employers find it crucial to monitor their workplaces due to fraud and theft, productivity, and security concerns that stem from the internal workforce either directly or indirectly.... This thesis "Legal and Technological Aspects of the Idea of Workplace Privacy" gives an in-depth review of employers' and employees' perspectives on the issue, and considers the complex nature of privacy in the workplace....
Preview sample
Learning a Foreign Language is an Asset in the Military
5 pages (1563 words) , Download 1 , Term Paper
Free
Gathering intelligence, also related to national security efforts, requires people who can speak more than just English especially when issues of intelligence-gathering are required.... Though not all of these departments appear to be directly involved in supporting military efforts, these job opportunities for foreign-language speakers do provide some form of support for military regimes and are vital to ensuring the national security of the United States.... security (The Economist)....
Preview sample
Women Rights
48 pages (12000 words) , Download 3 , Dissertation
Unlike many Africans under British and French colonial rule, the Congolese lacked a national ideology.... This paper aims to investigate the social and psychological effects of violence in conflict against women and girls in DRC.... Admittedly, both women and children (girls) suffer violations of human rights in conflicts, such as discrimination, unlawful killings, and abusive torture....
Preview sample
Rational Choices Inadequate in Explaining Foreign Policy Development
8 pages (2130 words) , Download 0 , Coursework
Free
Stability: International Journal of security and Development, 2(2), pp: 1-43.... In general context, national interests are reflected upon by leadership decision making process.... "Rational Choices Inadequate in Explaining Foreign Policy Development" paper deals with the fact that models related to rational choices are inadequate in explaining the policies that are related to foreign policy development....
Preview sample
The True Commencement of Human Trafficking
8 pages (2324 words) , Download 2 , Case Study
Free
Human trafficking has thrived licentiously on corruption since human traffickers used links with state officials, business persons, politicians, customs officials, police as well as border police to embolden human trafficking.... Human trafficking has thrived licentiously on corruption since human traffickers used links with state officials, business persons, politicians, customs officials, police as well as border police to embolden human trafficking.... Human trafficking thrives profligately on corruption since human traffickers use links with state officials, business persons, politicians, customs officials, police as well as border police to embolden human trafficking....
Preview sample
The US Foreign Policy and Nuclear Proliferation
6 pages (1807 words) , Download 2 , Research Paper
Free
The basic goal is to protect the security of the United States and its allies from attack or coercion by a hostile power.... (Carnesale & the Harvard Nuclear security Group 134) ... uring the Cold War nuclear weapons is at the center of the American security strategies.... (National Academy of Sciences 16-18) And so several post-Cold War policy studies have concluded that the security of the United States could be considerably enhanced by undertaking reductions to nuclear proliferations globally....
Preview sample
The Idea of the Arab Unity
10 pages (2713 words) , Download 2 , Essay
Free
The latter have clearly outlined legislation that govern the use of their security institution whenever there is the need.... Formulation of a common police body would heighten the security levels and ease pursuit of these criminals.... n addition to the enjoyment of a better security, the Arabs states are likely to benefit from resource mobilization and other infrastructural developments.... The above move would be a big boost to the security system within the Arab nation, thus fostering growth and enforcement of the legal system enhanced....
Preview sample
Social Science Theory and Methodology
10 pages (2678 words) , Download 2 , Essay
Free
In addition, the nearest land is very far away, meaning there are no cross-border minorities.... The United States foreign policy's objectives The objectives of the foreign policy of the United States include the following: The first one is that main objective is the protection of the physical security of the nation.... But the state of the security of the nation might be changed due to the threat of constant terrorism.... The second objective of the United States foreign policy is the protection of the physical security of the perceived major allies of friends of the United States of America....
Preview sample
Do Laws Increase or Diminish Our Freedom
8 pages (2257 words) , Download 2 , Essay
Free
How much restrictions can be placed on civil liberty and on what grounds is a cause for much debate however civil liberty can be restricted on grounds of national security, protection of morality and for protecting the rights of other individuals.... Governments may wish to maintain secrecy of operation in the name of national security.... It must be observed that even in the above examples; it can be seem how the excuses of national security, protection of morality and individual rights in a way intrude upon other liberties....
Preview sample
Electronic Health Records in the UK
5 pages (1576 words) , Download 2 , Research Paper
Free
The Beveridge account Social Insurance and Allied Services, advocated for all-inclusive health care as an element of a postwar government grand plan endorsing employment, housing, education and social security.... Electronic Health Records in the UK Britain's national Health Service was established at the onset of World War IIin the midst of a wide agreement that a Health care should be made accessible to all.... Nevertheless, the British were not successful in trouncing professional opposition to establish the NHS out of the pre-war assortment of limited national insurance, numerous charitable schemes, and charity care....
Preview sample
Crime Prevention and Comunity Safety
16 pages (4000 words) , Download 4 , Research Paper
Free
Crime prevention is extremely important for the safety and security of the public.... Crime prevention is extremely important for the safety and security of the public.... These strategies not only help the government in reducing the level of crimes but also help in generating the sense of security in the public living in any specific society. ... he ultimate goal of crime prevention is to provide the people with a reliable security by eradicating the element of crime from the country....
Preview sample
The Peoples Republic of China Use of Espionage against the US
10 pages (2500 words) , Download 2 , Term Paper
Free
The major security concern for US in the current decade is from China.... In America, many people of overseas origin are working in critical sectors including defense and security.... One of the major disadvantages of globalization is the threat to internal security while exchanging the workforce between countries as part of globalization.... hina has seven intelligence services out of which three; Ministry of State security (MSS), Military Intelligence Department (MID) and the Liaison Office of the General Political Department (LO/GPD) are focusing purely on US (IOSS Intelligence threat handbook, n....
Preview sample
Attributes of Modern Healthcare Systems and Their Challenges
10 pages (3308 words) , Download 2 , Essay
Free
Social security law in Italy.... The national Health Service (NHS) formed in 1948 with the intention of replacing the existing system (Walshe & Smith, 2011).... rinciples of national Health Service ... The countries with national health services have an easier time when controlling the supply of resources using rational mechanisms that are more explicit.... The lack of a fixed budget for government funding or the overall national healthcare spending makes it hard to say where the money saved from rationing will go (Blank, 2014, p....
Preview sample
Personal Information and Security Threats in Social Networking
8 pages (2000 words) , Download 2 , Essay
Free
The writer of this essay "Personal Information and security Threats in Social Networking" aims to discuss the privacy concerns in the context of problems reported from MySpace and Facebook which are the most popular sites among hundreds of similar sites.... As online social networking sites become more familiar, there have emerged some very serious concerns about the prospects of protecting personal information and the security threats involved which render these social networking sites vulnerable not only from predators and scam artists but from nosy employers and campus authorities....
Preview sample
Comparison of Healthcare in the United States with Japan
12 pages (3612 words) , Download 0 , Research Paper
Free
The best data collection and storage systems should create ease in recovery, consistence and guaranteed security, and avoidance of errors to the maximum expectations of the concerned parties (Brown, 2011).... "Comparison of Healthcare in the United States with Japan" paper contains a description of the Beveridge, Bismarck, national Health Insurance, and Out-of-Pocket models.... practices the national Health System approach.... escription of the Beveridge, Bismarck, national Health Insurance and Out-of-Pocket models ...
Preview sample
2101 - 2150 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us