StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Bombs in America, Civil Liberties and Securities
7 pages (1971 words) , Download 1 , Essay
Free
Also, the essay will focus on how a balance can be put in place between civil freedoms and the national security.... The paper "Bombs in America, Civil Liberties and Securities" states that safeguarding individual liberty does not always compromise the state's security.... In the past few decades, increased bomb attacks and threats have left Americans in a worrying state about their general security.... Bombs in America Affiliation In the past few decades, increased bomb attacks and threats have left Americans in a worrying state about their general security....
Preview sample
The Identification and Analysis of the Economic, Political and Social Issues Facing the US
11 pages (3330 words) , Download 3 , Essay
Free
In 2008 and 2009, the government of the United States invested billions of dollars in stock security procurement, making the U.... At the same time, political actors throughout the different branches of government continue to create new fiscal policies that do not meet with long-term economic growth or national fiscal security.... Since political actors in government are not clearly identifying a priority goal of establishing consumer security, corporate actors can appeal to the psycho-social attributes of consumers by taking a more visible and active role in pressuring and coercing government policy regarding business and international fiscal policies....
Preview sample
Financial Contingency Planning: Sources of Funding Paper
7 pages (1844 words) , Download 2 , Research Paper
Free
The major contributor of the funds must be the government, since national security is important in safeguarding the United States economy from terrorist attracts.... Bond issuance procedure is always accompanied by the call for patriotism and accountability in the American security system.... The United States' defense department has about 52 grants that are issued to the public to ensure that matters of security and military are managed effectively according to the expectations of the citizens....
Preview sample
Practices for the Student Body at Hope High School in Arkansas
8 pages (2437 words) , Download 1 , Case Study
Free
There is, however, the possibility that juveniles are not afforded the same rights in such an instance as their adult contemporaries when personal items are searched that could disclose contents that border on self-respect issues.... Two of these needs tiers include establishment of security as well as a sense of belonging in order to develop higher functioning skills such as self-esteem development (Weiten & Lloyd, 2005).... The ability of educators, through a simple rights statement, satisfies their ethical and moral obligations and also builds both security and belonging....
Preview sample
Virus of Tribalism and Nature of Modern Warfare
16 pages (4660 words) , Download 2 , Essay
Free
Thus, twenty first century political warfare now involves violence, where the state has to fight against a section of its own civic populace that can be delineated in terms of national, ethnic, or even religious differences.... The paper "Virus of Tribalism and Nature of Modern Warfare " tries to find out whether the proliferation of ethnic and sectarian conflict, together with the rise of intra-state war poses a challenge to the comprehensiveness of international relations theories....
Preview sample
How the Events of September 11, 2001, Influenced on World Markets
8 pages (2000 words) , Download 2 , Coursework
Free
Another provision that is potentially offending to privacy rights is Section 505, which authorizes the government “to obtain records from a communications provider by issuing its own administrative subpoena, called a national security Letter (NSL), to seek a variety of information about the customers of communications providers, including telephone companies and Internet service providers ”(Herman, 2005, p.... The national security Agency (NSA) began warrantless wiretapping, without judicial oversight, in 2002 under the tutelage of President George Bush, seemingly in violation of the Foreign Intelligence Surveillance Act, which required court orders before engaging in such surveillance....
Preview sample
Analyze the Conventional Wisdom Regarding the Iliegal Immigration Debate
5 pages (1250 words) , Download 2 , Essay
Arguments against illegal immigration Barbed-wire fences and border security As pointed out, the conventional wisdom regarding the illegal immigration debate is influenced by anti-illegal immigration arguments.... In addition, those who are not in favor of illegal immigration argue that the illegal immigration must be considered as an international problem, not as a regional or national problem....
Preview sample
EU Integration and Citizenship Law
33 pages (8250 words) , Download 3 , Dissertation
EU is, however, a work in progress and while it is done with such tasks as border control and economic integration, the Union has to move on to the more difficult areas – home affairs, immigration, defense, among others – which have strong social dimensions.... The author of the essay highlights that EU integration and creation of citizenship law give rise to fears of conflicts over national identities.... The problem becomes even more complicated after EU approved the Maastricht Treaty establishing the Citizenship-of-the-Union law, which many perceive as an attempt to reconfigure and supersede the national citizenship and identities of member states....
Preview sample
Law Enforcement Paper
3 pages (750 words) , Download 2 , Essay
The current American police and security agencies have undergone many transformations in the last three hundred years.... The changing security needs during the period is major motivation for security transformations in the country.... Currently, security demand in the United States has increased tremendously due to internal and external threats ranging from drug abuse to terrorism.... According to Uchida (2004), the modern features that define American internal security such as community policing, crime prevention and hierarchical police command originate from British law enforcement agencies....
Preview sample
Information Technology and Electronic Commerce
26 pages (7429 words) , Download 4 , Essay
Background research and studies have tried to enhance security but it is still the biggest challenge for security professionals and businesses.... Threats and impacts including the impact on different aspects are discussed along with real-world scenarios that are mentioned in terms of physical and online stealing of identities, online attacks by hackers, and impacts of social networking sites if they misuse information or do not provide correct security measures....
Preview sample
Fighting Drug Trafficking in the Caribbean
8 pages (2224 words) , Download 3 , Thesis
Free
This proximity has provided excellent conditions for cross border criminal activities leading to the drug trade going past its national jurisdiction.... border inspection; drug traffickers have become more innovative.... However, with pressure mounted by the international community, and availability of funds such as the Caribbean basin security fund to aid, in the fight against drug trafficking, most countries have responded well with developing of newer policies, and adopting international recommendation on how to fight drug trafficking to aid the fight (Figueira, 2004)....
Preview sample
Theories and Methods
28 pages (7395 words) , Download 3 , Thesis
This paper ''Theories and Methods'' tells that This chapter is divided into two parts.... The first part will focus on the theoretical framework to test hypotheses and the second part will discuss all aspects of the research methodology including possible hurdles that may affect the outcome of this academic endeavour....
Preview sample
Globalization and Cultural and Language Diversity
5 pages (1505 words) , Download 2 , Essay
Free
The effect on culture and language is to further undermine the internal, national productive capacity, social security and democratic integrity of these countries ... The essay "Globalization and Cultural and Language Diversity" focuses on the critical analysis of the effect of globalization on the culture and language of the people of Brazil, Africa, and the United States....
Preview sample
Politics International Security Why did North Korea aquire Nuclear Weapns
14 pages (3500 words) , Download 2 , Essay
Nations, young and small, rich and poor, have been playing cat and mouse, and carrot and stick in this game called the Nuclear game.... This statement will be provided explanation in the evidences forthcoming. ... ... his paper will study the facts and circumstances surrounding the acquisition of nuclear weapons by North Korea....
Preview sample
Health Information Exchange
5 pages (1561 words) , Download 2 , Essay
Free
The sharing of this information is aimed at maintaining individual confidentiality, privacy and security, while providing a faster and more effective way of sharing health-related information for the benefit of both patients and HIOs (AHIMA).... errick et al also describe the issues of security threats to the system of HIE.... It is worth noting that some of the challenges of identifying and implementing the right infrastructure and design are linked to privacy and security issues (e....
Preview sample
Political Science
4 pages (1268 words) , Download 0 , Essay
Free
Additionally, if the government should spend money, then it should be only for enforcing contracts, maintaining essential infrastructure as well as enhancing national security.... The Republicans are also of the opinion that illegal immigrants undermine the country's values, culture and pose a threat, both economically and in regard to security, to American citizens.... They also perceive big governments as wastage of national resources and insist that limited government participating in issues could foster economic productivity, individual freedom and ultimately self-reliance....
Preview sample
Analysis of the Evolution of Strategic Intelligence Beginning in WWII
3 pages (1053 words) , Download 2 , Essay
Strategic intelligence involves acquiring information about military strategy and operation plans at the national level.... This also set up the foundation for the formation of government intelligence units such as the Central Intelligence Agency (CIA) as well as the national Intelligence Agency (NSA)....
Preview sample
American Cultural Analysis, Modern Imperialism and the Spread of American Capitalism
9 pages (2540 words) , Download 2 , Essay
Free
Unilateral military action has been justified in the wake of the attacks of September 11th and the most obvious case of this unilateralism was the decision by the United States to invade Iraq in 2003 after UN security Council approval – a traditional international “seal of approval” for military action – was denied.... International security, 43:1, 185-198.... In Defense of the national Interest.... Constructing national Interests: The United States and the ...
Preview sample
NGOs are an Effective Force in Processes of Conflict Resolution and Healing: Discussion and Analyses
12 pages (3000 words) , Download 2 , Article
Free
Morgenthau (1978) offers that many political actors in democratic societies will improperly balance moral imperatives such as social freedom against the moral philosophy of national security and longevity.... NGOs ensure that such balances exist and that the needs of political power attainment or state security do not supersede the human rights agenda and thus establish further justice by assisting in repairing moral integrity for the people. ... It also serves as a forum for arbitration and criticism whereby member or non-member representatives can express their own unique national agenda for consideration by global players....
Preview sample
Doing Business in Saudi Arabia
6 pages (1500 words) , Download 2 , Assignment
Free
Thirdly, the paper will specify governmental, compliance management and security requirements concerning the Kingdom of Saudi Arabia.... Thirdly, the paper will specify governmental, compliance management and security requirements concerning the Kingdom of Saudi Arabia, which will feature prominently while making the decision of whether or not to do business in the country.... The governmental, compliance management and security requirements about Saudi Arabia Among the governmental and compliance requirements that American businesses should consider while deciding as to whether to do business in Saudi Arabia or not, is the fact that they are required to establish a contact with a person or a company that will facilitate the American business representative to obtain a business visa....
Preview sample
Role of Airpower in Current Security
15 pages (4158 words) , Download 3 , Essay
Free
The national security Study Group, also recognized as the Hart-Rudman Commission, is emotional with thinking at length and imaginatively about how these countries should give for its countrywide security in the primary district of the 21st century.... The essay "Role of Airpower in Current security" focuses on the critical analysis of the major role of airpower in current security.... Running Head: AIR POWER PLAY Air Power Play of What Role Does Air Power Play In The Current security Context ...
Preview sample
US Military Presence
11 pages (3014 words) , Download 1 , Literature review
Free
Even though Pentagon attempted to downplay the effect of the reductions on national security, it is clear that cancellation, premature termination and delays of programs including F-22 and the next generation cruiser considerably delayed any fielding of newer military technologies while trying to focus on programs that were more relevant in Afghanistan and Iraq.... There are also the prevailing challenges in cyberspace that have resulted from undercover activities targeting industrial and national security elements and from cyber-attack risks on the basic infrastructure of the US....
Preview sample
World Politics, Power and Ethics: Conflicting Realities, Contrasting Theories
10 pages (2500 words) , Download 4 , Essay
Free
For example, the leader of the mexican Zapatista revolution, has drawn attention to the limitations of the conventional definition of ‘war' (Marcos, 67).... The individual leaders of the US have only a peripheral role in determining the foreign policy of the nation as is evident from the fact that the policy of America has been consistently in tune with American supremacy, ideology of the domination of the strongest, and the “national interest” as is explained in the national security Strategy documents of the US (The White House, 7)....
Preview sample
Poorhouses in California
5 pages (1250 words) , Download 2 , Essay
These houses were established as a means of housing the poor and homeless.... With the growing need for more such houses, specific legislations were instituted which outlined the process and requirements of.... ... ... The federal government of the United States also introduced legislations to safeguard and support the welfare of such individuals....
Preview sample
The International Law Allows Pre-emptive Self-Defense
11 pages (3277 words) , Download 0 , Term Paper
Free
The United States attacked Iraq on grounds that the nation was harboring nuclear weapons that were a threat to America's national security.... national security.... national security (Van den hole 72).... Under the Bush administration, the use of preemptive force became a national security strategy following the 9/11 terrorist attacks.... The national security Strategy of the United States of America, September 2003....
Preview sample
History of Honduras
5 pages (1250 words) , Download 0 , Term Paper
Free
Before its discovery by the Spaniards, the warlike Jicaques and Lencas, Paya hunters and fishermen, and the mexican Amerindian traders inhabited it.... border issues with El Salvador came to a resolution in 1992 by the agreement signing between the two countries.... The last disputed border section became demarcated in 2006.... aving the highest homicide rate in the hemisphere, the countries civic and political leaders should seek new approaches and measures to improve the citizen's security thus exercising their democratic rights....
Preview sample
The Admissions Committee at University School of Medicine
28 pages (7000 words) , Download 3 , Admission/Application Essay
My volunteerism spirit was inspired by a deep understanding of the problems faced by the people of my background - the mexican American community.... The writer of this essay " The Admissions Committee at University School of Medicine" discusses type a brief letter on a subject outside of medicine, which has been an area of great interest to him....
Preview sample
American and British Democracy in Managing the Oil Crisis
8 pages (1996 words) , Download 1 , Essay
Free
These solutions are characterized by doubtful prospects since they do not appropriately consider the dollar costs, national security and environmental costs of their activities.... Challenges associated with energy involve sufficiency, security, sustainability as well as the cost of energy where the prices of hydrocarbons during the recession that occurred recently in Europe and the US created a situation where costs transport and electricity as well as gas at the center of numerous debates. ...
Preview sample
Global Issue: Human Trafficking
8 pages (2000 words) , Download 4 , Research Paper
Free
uman trafficking also portends serious implications for international and national security, particularly due to the fact that trafficking in women has now become attractive to organized crime groups (Anonymous, 2003).... One of them is its threat to border integrity as millions of women are transported across national borders annually, mainly under false pretext.... These trends will have serious implications on the victims' health, border integrity, global security, and economic costs of implementing anti-trafficking measures....
Preview sample
Investigating Terrorism: Political Surveillance
4 pages (1000 words) , Download 3 , Essay
Free
The paper will discuss the challenges encountered by security intelligence organizations in their attempt to use the concept of political surveillance in detecting and preventing terrorism as well as indentifying potential terrorists.... The paper will also discuss the challenges encountered by security intelligence organizations in their attempt to use the concept of political surveillance in detecting and preventing terrorism as well as indentifying potential terrorists....
Preview sample
Classical and Structural Realism
16 pages (4000 words) , Download 2 , Essay
Free
The use of power such as military capabilities can be seen as a means to obtain national security and not for the sake of increasing power alone.... Instead of viewing US as a power driven nation, it can now be seen as only trying to ensure that it achieves a high level of national security.... Without a central authority to guarantee states' security, a self-help system exists, where states must rely upon their own means to protect their interests....
Preview sample
Policymakers and Service Providers of Welfare
16 pages (5170 words) , Download 0 , Literature review
Free
Therefore, the services in all neighborhoods have to be diversified with not just banks, shopping, and post office facilities, but also with services such as security services, and home care for senior citizens (Brink, 1988).... Helping Disabled People to Work: A cross-national study of social security and employment provisions, Social security Advisory Committee research paper number 8, London: The Stationery Office. ... Some national governments have put in place elaborate welfare models for meeting the need of these people....
Preview sample
The Benefits Of A Fully Funded Social Security System
5 pages (1250 words) , Download 0 , Term Paper
Free
The paper "The Benefits Of A Fully Funded Social security System" is aimed at defining the structure of the social security system with respect to its prevalence to present and also in the future.... The Benefits Of A Fully Funded Social security System ... Social security System 2 ... enefits of Social security System 2 ... uture of Social security System 3 ... the ‘Safety Net' in Social security 9 ...
Preview sample
Billing and Collections in Healthcare
5 pages (1563 words) , Download 2 , Case Study
Free
Lastly, patent driven healthcare where the healthcare facility needs to ensure the security of their financial information.... If a decision is arrived at to turn delinquent accounts over, to a collection agency, precaution should be taken when selecting the agency Walshe and Smith (65-67) point out that a legitimate collection agency must be a member of a national trade association, for instance the Consumer Data Entry Association and American Collectors Association....
Preview sample
The Perception of Character and the Dangers of Trust
7 pages (1750 words) , Download 2 , Research Paper
Free
Americans did it every week when they watched Jack Bauer from the television program 24 make decisions for national security reasons that flew in the face of what most would consider righteous.... However, the moral code changed for some because of the effects of the experience of seeing the nation attacked in such a direct manner as was done through the hi-jacking of planes and running them into national monuments (White 87)....
Preview sample
Strengths and Weaknesses of National and International Trials
12 pages (3153 words) , Download 0 , Essay
Free
The case of Darfur in Sudan was brought to the ICC by the UN security Council but the lack of cooperation from Khartoum necessitated the issuance of a warrant of arrest against President Omar al- Bashir (Holmes, 2009, 213).... nother major weakness of the ICC comes from the refusal to cooperate by three UN security council members.... The paper "Strengths and Weaknesses of national and International Trials" will begin with the statement that in the history of the world, instruments of justice both at the national and international levels have held trials for people believed to have committed violent crimes or condoned it....
Preview sample
The Caribbean Crisis
5 pages (1378 words) , Download 0 , Essay
Free
Chair of Executive Committee of national security Council, Robert Kennedy Member of Executive Committee of national security Council October 1962 ... national Resources Defense Council.... The paper "The Caribbean Crisis" tells that a blockade could solve this problem, but only if done right....
Preview sample
Kennedy and the Cuban Missile Crisis
8 pages (2355 words) , Download 3 , Essay
Free
here is however some evidence which points to Kennedy not acting out of purely concerns about national security according to writers such as Ronald Steel2 and James Nathan3.... He hadn't acted totally independently, but had quickly established the Executive Committee of the national security Council, which included the young Robert Kennedy, which was able to come up with alternate opinions and possible options.... Only if Kennedy had been first of all been concerned with his political future rather than national security could his actions be considered as reckless....
Preview sample
Policing and Justice in Dubai
4 pages (1000 words) , Download 0 , Research Paper
Free
Women also work in Dubai police department such as in inquiries, criminal investigation and airport security.... Kuwait State security is responsible to solve security related issues.... resently, Dubai police is making best efforts to achieve highest international standards in terms of performance, education, follow ups, training, maintaining security and launching best initiatives for local community.... All departments have different authority personnel such as national Guard is responsible to conduct duties on oil fields, utilities and borders....
Preview sample
How Russia Viewed the Bush Presidency
6 pages (1500 words) , Download 2 , Term Paper
Free
The second round of NATO enlargement, for example, provided further fuel to the Russian belief that the US is prepared to ignore Russian security perceptions and Russian interests.... President Vladimir Putin's position was clear right from the beginning that main criterion in assessing the situation in Iraq should be the weapons inspectors findings, which must be presented to the United Nations security Council.... Only hours after the first American missiles landed on Iraqi territory, Russian President Vladimir Putin made a public declaration, condemning the onset of the US invasion as a “great political error” and the Mult-National Forces must respect the national sovereignty international law and that such action can only be sanctioned the UN security Council....
Preview sample
To what extent have the fair-trade initiatives increased standard of living in West Africa
15 pages (3750 words) , Download 2 , Research Paper
Free
The need to facilitate balanced growth in all trade, and to eliminate cross-border currency restrictions are two specific aims of the IMF (Jonnaid, 1998).... Cross-border roadblocks, interference by customs officials, and expensive formalities at border posts in the region seem to hamper trade: thus the intentions of ECOWAS are countered by the reality on the ground of officials and local authorities seeking to extend their own power and wealth....
Preview sample
Trilateral Commission
6 pages (1500 words) , Download 2 , Essay
Free
These goals include; poverty eradication and maintaining security in the three regions1.... In light of this, the organization witnesses the contemporary world superseding the national influences and looks at the world as a common arena for finding solutions to political and economic challenges facing the individual states.... Even though, it is vital to nurture greater integration among all the world states, Japan, and Western countries, in light of their immense significance to the global economy and their remarkable international ties, bears an exceptional responsibility for cultivating effective collaboration, both in regard to achieving the national goals and in pursuit of the general world....
Preview sample
The Nigerian Military in Its Fight against Militant Groups
4 pages (1000 words) , Download 1 , Essay
Free
he military forces also intends to improve their skills in interpersonal relations since part of their task is the Civil-Military Relation as basic component of confidence building measure for national security (Ogdah, 2012: 30-89).... national security is not just the mitigation or stopping of violence.... The ideals of national security are certainly aimed to developing a vibrant national economy and healthy political climate in partnership with the citizenry (Ogdah, 2012: 30-89)....
Preview sample
Management: Six Sigma Deployment
12 pages (3408 words) , Download 0 , Report
Free
The company has obtained the greatest ISO certification (ISO 27001: 2005) in information security, which is ranked as the greatest standard of quality information protection and security.... The selection system adopted by the delegated committee of the Lloyd's register, that offered the ISO (27001: 2005) depended upon precise criteria, which entailed reviewing the acquired skills of employees, workshops and training courses offered to the employees, and a detailed review of mechanisms and policies of applied processes in order to know how far needs of standard levels of information security have been implemented (Ammari, 2011)....
Preview sample
A Brief History of the FBI
6 pages (1777 words) , Download 1 , Report
Free
Having established sub-offices in many large cities of the country including several offices near the mexican border, the Bureau virtually undertook the task to coordinate and control of activities of all state police departments.... The 9//11 events changed the main priorities of FBI's activity and shifted to grant more attention to the national security insurance, laying foundations for the so called war on terror....
Preview sample
Breast Cancer Patient Protection Act - Pros and Cons
12 pages (3499 words) , Download 3 , Research Paper
Free
The bill amends the Employee Retirement Income security Act of 1974 (ERISA), the Public Health Service Act, and the Internal Revenue Code to ensure a group health plan that facilitates medical and surgical benefits so that inpatient (and in the case of a lumpectomy, outpatient) are provided coverage and radiation therapy for breast cancer treatment (govtrack.... (national Cancer Institute, 2011) Breasts are modified skin glands located between the clavicles and sixth to eighth rib on the chest wall, and develop from the mammary ridge in the embryo....
Preview sample
Maritime Piracy in Nigeria - Causes, and Lack of Control
22 pages (6454 words) , Download 2 , Dissertation
The paper "Maritime Piracy in Nigeria - Causes, and Lack of Control" tells a surge of maritime piracy along the waters of Africa has raised concerns about security among the international community.... According to Nigeria's Maritime security Task Force on Acts of Illegality in Nigerian Waters, between 2003 and 2008 there were at least 293 attacks on Nigerian fishing vessels....
Preview sample
Investigations and Digital Forensics
7 pages (1750 words) , Download 3 , Term Paper
Free
urthermore, aggravating all the aforementioned factors of traditional intelligence is a tenuous relationship between national security intelligence and law enforcement intelligence.... national security intelligence continues to experience substantial changes since the mid 20th century.... Cybercrime is a threat to local, national and global economic and security interests.... Defense & security Analysis, 19 (3), 241-264. ... Prioritizing internet security....
Preview sample
Targets for Cyberterrorism
42 pages (10500 words) , Download 3 , Research Paper
Krasarvin further pointed out that it was in 1997 that the term 'cyberterrorism' was first pointed out by a senior research fellow at the Institute for security and Intelligence in California named Barry Collin.... This research will begin with the statement that there were many developments and discoveries during the 20th and 21st centuries, with rapid changes characterizing this era....
Preview sample
Foreign Military Intervention in the Middle East
8 pages (2532 words) , Download 0 , Essay
Free
According to Amnesty International, 2010, the focus by Washington and local elites on the safety of the public and the security of state arose to the disadvantage of the cause of human rights; this was coupled with widespread and rampant serious human rights abuses the region.... Rebel debates and voices are repressed by the powerful intelligence and security services throughout the region as state power is maintained.... Those that speak up are arrested and detained without trial and are further subjected to torture and other ill-treatments by security authorities who abuse human rights without consequences (Shafir, 2002)....
Preview sample
2251 - 2300 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us