StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Main Concerns of the Risk Management
11 pages (2750 words) , Download 2 , Assignment
Free
According to this assignment, three methodologies that are useful in risk assessment/management are the Maritime security Risk Analysis Model, Operational Risk Management, and CARVER, which is Criticality, Accessibility, Recoverability, Vulnerability, Effect, and Recognizability.... Three methodologies that are useful in risk assessment/management are the Maritime security Risk Analysis Model, Operational Risk Management, and CARVER, which is Criticality, Accessibility, Recoverability, Vulnerability, Effect and Recognizability....
Preview sample
The Use of Information Security Standards in Tackling Card Fraud in Nigeria
15 pages (4427 words) , Download 0 , Research Paper
Free
The paper "The Use of Information security Standards in Tackling Card Fraud in Nigeria" is an outstanding example of an information technology research paper.... Card Fraud in Nigeria Versus IT security Measures Table of Contents I.... Better IT security Technology ... Workability & Practicality of Using Better IT security ... Convenience versus security ... Duties and Responsibilities of Bank IT security ...
Preview sample
Is the Patriot Act Shockingly Unpatriotic
6 pages (1987 words) , Download 2 , Research Paper
Free
For the sake of national security, the Bush administration insisted that they must take a stand to resist terrorists that threaten America.... For the sake of national security, the Bush administration insisted that they must take a stand to resist terrorists that threaten America.... Patriot Act intrudes upon the privacy of Americans, promotes censorship, initiates racial profiling, and lastly takes the issue of national security too far.... There is no doubt that national security is essential, but is it not overblown by the Bush administration?...
Preview sample
How migration transforms societies
5 pages (1250 words) , Download 3 , Essay
Free
This event portrays the global terror war, where Muslim minorities were subjected to racism in Western countries, simultaneously hindering national security.... It has been assumed that increased political salience of dual citizenship, is inter-linked with national security (Castles, Haas and Miller 81).... The cross-border population movements considerably degrade the market power in terms of maintaining welfare states, managing labor markets and regulating corporations....
Preview sample
The Impact of Terrorism on Tourism
18 pages (4500 words) , Download 2 , Dissertation
Free
The tourism industry has become the target point for terrorism activities in the international scale owing to the slag of security and alertness.... Terrorism and Protection Activities of Tourism Industry In regards to the increase in the level of terrorism operations the service companies like hotels and transport companies are becoming well alert and in fact strategizing their security operations for the same.... These companies have to render a security outlook to both their internal staff and also on the visiting population from different countries to maintain their repute....
Preview sample
Analysis of a Political Ad of the US President Barack Obama
4 pages (1177 words) , Download 2 , Assignment
Free
Lastly, despite the president's promises on enforcing tougher gun control (GC) policies by outlawing semi-automatic weapons and enforcing more accountability in the handling of guns, more cases of gun violence in the country demonstrate Obama's liberal approach to national security.... The is still far from being settled despite the president's new approach to enhance national production, exports, and job creation for the millions of unemployed youth.... Despite the fact that the president prioritizes the national economy, there has not been any serious change along these lines....
Preview sample
Defining Terrorism and Victims of Terrorism
22 pages (6254 words) , Download 3 , Essay
In the meantime, Nada's border permit applicable to Switzerland was revoked.... The paper "Defining Terrorism and Victims of Terrorism" reports that in a majority of EU states, counterterrorism resolutions passed by the UN's security Council conflict with human rights protections accorded by the European Convention on Human Rights and domestic laws.... There have been a number of formal complaints in national courts claiming that the UN security Council resolutions or domestic laws implementing these counterterrorism resolutions encroach upon inalienable human rights protections under EU and/or national laws....
Preview sample
An Evaluation of Emergency Plan for Hurricanes and Natural Disasters
5 pages (1250 words) , Download 2 , Research Paper
Natural disaster can be termed as the naturally occurring incidents that leave their devastating effects on the lives of human beings causing irreversible damages to them and to their properties due to uncertain and abnormal changes in the atmospheric conditions.... Physical.... ... ... s that occur naturally hold an important position in bringing that changes that lead to major naturally occurring incident that leave their adverse but negative effects on human population resulting in huge number of other damages and fatalities (Alexander, 2002)....
Preview sample
Gun Control Issue
5 pages (1398 words) , Download 8 , Essay
Free
he gun control debate in America is a rivalry between individual liberty and public security.... orade argues that there is the need for effective gun control mechanisms for ensuring public security and maintenance of law and order.... Rather, they should perceive that the holding of guns by ordinary citizens threatens the security of innocent people in the society.... The first limitation on gun rights in the American history occurred as the national Firearms Acts of 1934....
Preview sample
Managing Diversity in a Global Economy
3 pages (1003 words) , Download 2 , Essay
Al-Qaeda can be identified as the greatest example of religious symbolizing and oppression due to which most security and other organization have symbolized Muslims as a terrorist.... The author of the "Managing Diversity in a Global Economy" paper argues that as a global manager is important that after a critical analysis and evaluation of the political risk the organization should ensure policies and ways to overcome the risk in the long run....
Preview sample
Structure of Culture Shock
18 pages (4996 words) , Download 3 , Essay
Free
able of Contents Concept of ‘Culture Shock' 2 Before Travel 2 The Disintegration Stage 3 Reintegration 4 Adjustment 5 Reverse Culture Shock 6 Best Coping Mechanisms 6 Part 2 8 Dimensionalizing Cultures: The Hofstede Model in Context 8 Self Analysis: The implications of national culture 10 David Kolb Learning Styles Inventory 12 Cultural Differences 14 References 16 Adrian, F.... Police also realize that the national image is at stake when a foreigner lodges a complaint and will do their best to ensure that their problems are resolved quickly in order to avoid complaints being lodged by the embassy resulting in their supervisors coming to scrutinise their work....
Preview sample
Outsourcing of American Jobs to Foreign Countries
5 pages (1250 words) , Download 2 , Research Paper
“Offshore outsourcing in the services sector is a major shift in how our economy operates, and it will have serious impacts on the tragedy of economic growth, national security, the distribution of income, and the workforce” (Hira and Hira, 2008, p.... In addition to that, outsourcing endangers the national security interests....
Preview sample
Why Did George Bush Win the 2004 Election
9 pages (2626 words) , Download 0 , Case Study
Free
His influence went beyond major and minor policy decisions (be those on tax cuts, steel tariffs, stem-cell research or private investment accounts for Social security) but he was also thought to be the mastermind behind a campaigning and governing philosophy that saw the real and direct application of core policies in politics.... in the period of the national conventions (July) until September first week, public opinion about the reelection of President Bush was divided but tilted slightly in his favor, the reason that the pre-campaign opinion was divided can be attributed to the nature of recent trends in American politics....
Preview sample
Forensic Science and Security
11 pages (3168 words) , Download 0 , Report
Free
This paper ''Forensic Science and security'' tells that For most people, forensics science is an interesting but confusing field of study which is full of intrigue and mystery.... FORENSIC SCIENCE AND security ... Some of the examples of forensic science encompass the employment of gas chromatography in the identification of seized drugs, laser Raman spectroscopy to identify microscopic paint fragments, and DNA profiling to assist in the identification of a murder suspect (Owen, 2000), This essay will focus on forensic science and security and it will support the statement: technology is the key in forensic science....
Preview sample
Immigration and Customs Enforcement Agency
6 pages (1500 words) , Download 2 , Research Proposal
Free
The probability of facing classified records is also eminent since some of the matters under evaluation are comprised under the perception of national security.... The border line between Mexico and US offers a better insight over the challenges pertaining drugs and illegal immigrants.... The same may be achieved upon the evaluation of a border line of the Canada and US.... Considering a practical exemplification of the concern, the border line between Mexico and United States may offer a better insight over the challenges pertaining drugs and illegal immigrants....
Preview sample
Health are System of Qatar as One of Best in the Global Scenario
17 pages (4250 words) , Download 3 , Research Paper
Free
ocial security expenditure on health as percentage of general government expenditure on health ... This prompted the monarch to transfer 25 percent of its oil revenues to the national budget. ... The national medical professionals are well qualified and experienced; the hospitals and the healthcare centers are broadly and uniformly spread.... atar's national Health Authority has made immense improvements towards the provision of world-class healthcare to its citizens....
Preview sample
Marketing Audit and Marketing Objectives of British American Tobacco Company
12 pages (3837 words) , Download 4 , Assignment
Free
Mead and Andrews (2009) outlines ome of the factors that contribute to this significant threat as the high excise tax differentials across markets, weaker border controls, regulatory changes such as plain packaging and high compliance costs.... The company can mitigate the threat through formation of anti-illicit trade that will coordinate efforts in controlling the counterfeits and collaborate with border control and enforcement agencies in controlling the threat (Holt and Wigginton 2002). ...
Preview sample
Criminology
4 pages (1000 words) , Download 2 , Research Paper
This is a question that relates to the society we live in and exist interdependently.... This in essence means that no society can be said to be on its own without collaborating with other.... ... ... There are various reasons that have been brought forward by sociology scholars such as cultural diversity, economic activities that bring about peaceful co-existence of different social classes in a society....
Preview sample
Imagery of Alfonso Cuaron in Children of Men
4 pages (1075 words) , Download 3 , Research Paper
Free
The parallels show the nature and impact of terror, the violence committed by governments in the name of national security, and love and goodwill as a suitable solution. ... igure 4 shows caged refugees and riot police working under government orders in an effort to ensure “national security” in the film.... Following this specter of military cruelty is the main characters bewilderment at the mention of Homeland security (Bruce, n.... For instance, when characters, Theo, Miriam, and Kee travel by bus to the Homeland security Bexhill Refugee Camp, there is a set of images mirroring the 2003 torture photos of American soldiers abusing inmates at Abu Ghraib Prison....
Preview sample
Covert Intelligence Operations
13 pages (4167 words) , Download 2 , Essay
Free
Covert intelligence operations are intended to collect and generate information about the capabilities and intentions of other nations perceived to be a threat to the state's security.... The information is sourced to evaluate and present it to policymakers to determine the next possible actions and responsibility for the state's security management.... 3 Introduction Covert intelligence operations are intended to collect and generate information about the capabilities and intentions of other nations perceived to be a threat to the state's security....
Preview sample
Insurgency International Context
27 pages (6750 words) , Download 2 , Essay
Insurgency when managed as an organized movement could over though the existing regimes by employing wide range of tactics like protests, terrorism, attacks and violation During the last two decades, the world community has been witnessing substantial rise in insurgency in different parts of the world that pose great challenges in terms of security and maintenance of political stability at global level....
Preview sample
Nations Cannot Fight Terrorism Being Terrorists Themselves
9 pages (2727 words) , Download 1 , Essay
Free
First, he argues, because of existing language within the UN security Council resolutions on Iraq, which is also publicly espoused by the British government and secondly, the invasions are an act of self-defense which international law permits.... It contains explicit provisions prohibiting any nation from using military force without consent of the security Council.... ??Hans Blix's Briefing to the security Council.... soil but resulted in severe repercussions regarding not just national but the global economy as well....
Preview sample
Al Qaidas Next Major Domestic Attack on the USA
17 pages (4250 words) , Download 2 , Essay
Free
security and risk assessment professionals must always adopt proactive measures to anticipate, defend against, and preempt new types of terrorist threats.... PROBLEM… AMERICAN POLICE OR security …… AMBULANCE … BOMB …….... According to the essay, the new Al-Qaida field commander was calling for Muslims in America to leave the country, especially New York and Washington, anticipating a major terror attack after September 11, 2001....
Preview sample
Gun Control in the US
8 pages (2280 words) , Download 2 , Research Paper
Free
Increasing gun related crimes in the United States create relevant challenges against national security and individual freedom.... So the excessive use of firearms among the criminals, mentally ill persons and children create some relevant questions about national security and it needs strict regulation.... Unrestrained gun use among the children has become a serious issue and it will question the existence of national security.... Therefore, it is obvious that both Federal and State governments should establish strict regulations against unrestrained gun use to maintain national security and peace....
Preview sample
American Supreme Court
56 pages (10693 words) , Download 4 , Essay
The paper "American Supreme Court" highlights that turning to the issue of diversity, Supreme Court Justices must be cognizant of how their judgments affect all Americans.... Courts are the only last resort for the marginalized seeking justice and protection from their government.... .... ... ... The Supreme Court comprises nine justices (the chief justice and eight other associate judges) whose are all presidential appointees under the censorship of the senate....
Preview sample
Issues Arising in International Human Relations Management
8 pages (2000 words) , Download 3 , Essay
2] Since IHRM is concerned with personnel at multi-national companies, it involves managing three types of employees which include home country employees, host country employees and third country employees.... International human resource management involves human resource management functions such as staffing, assortment, guidance and growth, performance assessment and firing at the international level....
Preview sample
Terrorism in the 21st century is very different than terrorism in the 20th century
22 pages (5500 words) , Download 3 , Research Paper
In the past, acts of terrorism, which can be defined as attacks on civilian targets rather than military targets, were often committed as part of a campaign of independence or to achieve a.... ... ... They were often geographically limited and did not cause large-scale civilian casualties.... Today, terrorism is a global threat motivated by a very different ideology and is much more deadly....
Preview sample
American Neo Conservatism and the World Order
14 pages (3500 words) , Download 2 , Essay
Free
security Council Resolution 687 to cease all development of weapons of mass destruction.... security Council resolutions that call for the complete destruction of Saddam's weapons of mass destruction and an end to all efforts to develop or produce more chemical, biological or nuclear weapons (Waller 2002, 1).... n 2004, Radak Sikorski, who had been in Afghanistan following the Russian occupation inn the country, in writing for the national Review, acknowledged America's success in Afghanistan, surmised that two things could go wrong there (Sikorski 2004, 1)....
Preview sample
How Australia Can Assist Its South Pacific Neighbors
12 pages (2928 words) , Download 0 , Assignment
Free
These countries are still developing and cannot provide national security protection to their people.... Australia recognizes that national security in the globalized world is of great importance as countries are facing several threats encompassing their national borders.... A combination between national security and health department has created a good rapport to achieve surveillance objectives which entail ongoing scrutiny of every pattern of the Zika Virus occurrence and transmission of disease for effective control....
Preview sample
Corrections in Criminal Justice System
7 pages (1750 words) , Download 3 , Research Paper
Free
It also analyzes the classifications of prisons and the security levels that define these classifications.... It would also be critical to analyze the classifications of prisons and the security levels that define these classifications.... These corrections officers would be responsible for the security, custody and well being of inmates in the given state correctional facility.... The academy trainees would be instructed on institutional policies, operations and regulations and also on procedures for custody and security....
Preview sample
Proven Practices for Securing Website against Distributed Denial of Service Attacks
16 pages (4172 words) , Download 3 , Research Paper
Free
One of the security research expert or advisors, Mr Sean Paul spoke on media about this incident and named it as ‘the future of cyber protests'.... Later, the assumptions made by the security expert were true, as again same type of attack was organized and time was the target was a credit card industry.... A security consultancy organization has completed a survey on major security issues for network operators.... The website that were compromised by these attacks do not have solid security defence against this type of attack but the core systems do have a solid framework of security controls with up to date technology....
Preview sample
Enhancements to Aviation Safety
24 pages (6000 words) , Download 5 , Research Paper
According to the Federal Aviation Administration (FAA): NextGen is 'a comprehensive overhaul of the United States' national Airspace System which makes air travel more convenient and dependable, ensures safe flights'.... This research will begin with the statement that the nature of the aerospace industry increases the need to minimize operational risk....
Preview sample
Professional Requirements for Medical Professionals
6 pages (1767 words) , Download 4 , Research Paper
Free
The national Board of Medical Examiners administers these examinations to the students in the United States.... This paper "Professional Requirements for Medical Professionals " investigates the academic requirements, career outlook, and potential income of studying medicine as a career in addition to the talents and personal attributes necessary to succeed as a physician....
Preview sample
The Mentally Disturbed: To Jail or Not to Jail
9 pages (2617 words) , Download 2 , Research Paper
Free
This regards the security of the offenders while serving their terms in these jails.... The increased number of mental offenders in American jails from 1980s to 2004 raises several questions on the security and care of these inmates (American Correction Association).... Cases of suicide, increased indiscipline and anger escalation are the most notable problems associated with these offenders making their control and security while behind the bars a question for discussion (Barge)....
Preview sample
Network Security: A Vital Element in Todays Booming Commerce
12 pages (3000 words) , Download 2 , Coursework
Free
The author of the present paper "Network security: A Vital Element in Todays Booming Commerce" brings out that as humanity progresses to the 21st century, the internet has become the pathway for modern technology.... Network security: a vital element in today's booming commerce As humanity progresses to 21st century, internet has become the pathway for modern technology.... Authentication is vital security concern, and takes place at two levels known as machine-level and user-level (Hancock 243)....
Preview sample
Impacts of Space Age in America
6 pages (1630 words) , Download 0 , Essay
Free
Another equally significant move was the creation of the National Aeronautics and Space Administration to oversee the security of the country thereby protecting it from any external attacks coming from the use space technologies by other countries (McDougall 77).... The United States prioritizes its security that the two among many other countries presented major security threats to the country.... The national Defense Education Act of 1958 was one such legislation that sought to enhance education in the country by encouraging learners in schools to pursue science and mathematics in order to encourage the production of space scientists and engineers....
Preview sample
Basic Rules Need to Be Followed in Order to Ensure the RA9 Filing Scheme
19 pages (5012 words) , Download 0 , Assignment
Free
The owner of the security interest in the collateral would have to have certain jurisdiction where possessory-type collateral is located.... i) The owner of the security interest in the collateral would have to have certain jurisdiction where possessory type collateral is located governs rules of perfection; ... This would fall under the ambit of certificated security, meaning a method of securing interest that is stands for a certificate.... This has been defined as security....
Preview sample
Universal healthcare
7 pages (1750 words) , Download 5 , Essay
Free
The health care services are typically financed by the government through mandatory payroll/social security contributions, general taxations or a combination of both for example general tax based funding is used in United Kingdom, Australia, Canada, Denmark, Sweden, Cuba, Italy and Brazil (Tsounta 2009).... Some of the other countries in which insurance system is used provide insurance to the people who cannot provide insurance to themselves through social security systems....
Preview sample
Aid to Families with Dependent Children
8 pages (2000 words) , Download 3 , Essay
Free
It entails improving safety and feelings of security and reducing any element of fear that might arise.... By the time President Clinton took over power in 1993, there was a national consensus that traditional open-ended welfare had failed.... By the time President Clinton took over power in 1993, there was a national consensus that traditional open-ended welfare had failed (Neckerman, 89).... In the book “Moving to Opportunity insightfully”, Briggs and Popkin argue persuasively for a major national commitment rental housing in safe and livable neighborhoods (Briggs et....
Preview sample
Osteopathic Medicine: Healing with no danger
2 pages (500 words) , Download 3 , Essay
Free
cience has changed our lives ensuring security and comfort.... Osteopathic Medicine: Healing with no danger This brief article stitches the idea of grounding Osteopathic Medicine as naturalscience of anatomical physiology in integration of naturotheraphy, traditional practice of alternative medication and psychological support to the patients in the pursuit of a promising careerOrder#: 151456Deadline: 2007-02-02 15:58Style: LMALanguage Style: English UKPages: 2Sources: 3Writer ID: 6746Science has changed our lives ensuring security and comfort....
Preview sample
The Significance Symbolism of Terrorism
4 pages (1165 words) , Download 0 , Essay
Free
The security measures comprised exceptional seaport and airport security, visa examination, border services and immigration protocols.... The symbolism of the terrorism combined with its absolute scale led US to war and suddenly changed the American security.... Counterterrorism in United States changed from its law enforcement mode to security mode.... fter the attack of September 11, steady plans were proposed to refurbish the American homeland security....
Preview sample
American Government and Politics
12 pages (3000 words) , Download 4 , Essay
Name: Instructor: Course: Date: Short Essay Questions Question 1 Control over the criminal justice system influenced the ability of the politicians to make policy during reconstruction since there were numerous commissions set to identify the sources of policies like state and none-state policies....
Preview sample
American Occupation in Japan
5 pages (1250 words) , Download 2 , Essay
Name: Instructor: Task: Date: American Occupation in Japan The American occupation in Japan from 1945 until 1952 proved to be a historical success (Tsutsui 265).... It is worth denoting that the Americans immensely rationalized the Japanese government, and gave Japan the foundation after the Second World War demise....
Preview sample
The Consequences of Chernobyl's Disaster and the New Policy of Social Defense
35 pages (8750 words) , Download 3 , Dissertation
This research study is being carried out to examine defence policies prior to the Chernobyl disaster, the Chernobyl disaster itself and its consequences, and the social policy changes implemented in response to the disaster, to demonstrate by virtue of a case study of the Chernobyl disaster that crises induce defence policy changes as homeland security is heightened....
Preview sample
The Emergence of Japan as the Dominant Force
15 pages (3933 words) , Download 1 , Case Study
Free
A unique combination of strength and fragility underlines Japanese national security.... Towards the end of the twentieth century, the expansion of Japan's regional economic presence consequently gave the country greater influence over the security and foreign policy decisions of its neighbours.... In the 1990s, the most important change in Japanese foreign policy was the increasing emphasis on the Asia-Pacific region for agreement on security matters, economic cooperation and promotion of mutual understanding....
Preview sample
The military relationship between Qatar and the United States
15 pages (3750 words) , Download 2 , Essay
Similarly, the states in the Middle East have been seeking to relate with the United States in a manner that promotes their political, security, and economic interests.... In Post-World War II period, the United States has been seeking to maintain relations with the Middle East based on prevailing interests, mainly supply of oil and promoting security and democracy in the region.... Like any state in the world, the United States has been seeking to maintain a foreign policy that helps it to assert itself in the international arena, as well as promote its national interests (Looney 2009)....
Preview sample
Mitigation and Business Impact
10 pages (2868 words) , Download 6 , Case Study
Free
n Recovery efforts, The National Response Plan, in the United States, dictates how the resources, which are provided by the Homeland security Act of 2002, will be used.... There are essential emergency functions wherein the National Response Plan had mentioned and this includes: “transportation, communications, public works and engineering, firefighting, information and planning, mass care, resource support, health and medical services, search and rescue, hazardous materials, food and energy” (‘United States Department of Homeland security Press Office, National Response Plan ,' 2005)....
Preview sample
Liberalism in International Political Economy Compared with Marxism and Realism
13 pages (3250 words) , Download 3 , Research Paper
Free
Liberalism also differs from Neorealism because it emphasises the importance of markets and commerce in the growth and development of the economy, whereas for Neorealism national security and defence is important for the growth and development of the economy.... Liberalism and Neorealism Liberalism focuses more on economics fuelled by the markets and is less-controlled by the government, whereas Neorealism focuses more on nationalistic goals and in obtaining a thriving economy due to the need for a stable national security and defence....
Preview sample
Why Are US Health Care Costs So High
9 pages (2990 words) , Download 2 , Research Paper
Free
Also, while security is something important, it should not be highly considered compared to the health of the common citizen.... This research paper "Why Are US Health Care Costs So High" discusses health as something important for a given nation.... This means that it would be necessary that a proper method for financing healthcare should be formulated towards ensuring there is a proper health structure for the entire world....
Preview sample
The Creation of Structures to Integrate Illegal Immigrants
4 pages (1000 words) , Download 2 , Research Paper
Free
This is because most illegal immigrants by virtue of their limitations to movements and restrictions of their rights are not able to operate freely to undertake high level terror and criminal acts that compromise on national security (McCarthy, 2001).... The first has to do with the argument of security reasons whiles the second has to do with improper national planning policy.... First, it is argued that the continuous stay of people whose information cannot be accounted for constitutes a major security threat to the country....
Preview sample
2301 - 2350 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us