StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
American History - 12
7 pages (1750 words) , Download 2 , Essay
On 17 June, 1972, in order to gather information against Nixon's political adversaries, an attempt was made to bug the Democratic national Committee's campaign offices at the Watergate complex.... Nixon left his mark on the domestic and international scene.... However, Nixon's legacy is centered on his abuse of power in the Watergate scandal....
Preview sample
Obsessive-Compulsive Disorder
4 pages (1000 words) , Download 3 , Research Paper
The recent report conducted by the national Institute for Mental Health revealed that approximately 3% of Americans have OCD disorder (Rachman and de Silva, 2009).... According to the national Institute for Mental Health report, the OCD disorder affects boys between the age of 6 and 15 years, while girls, the disorder tends to manifest mostly between the age of 20 and 30 years.... The most common symptom of the disorder, according to national Alliance of Mental Illness (2012), is that, individuals suffering from OCD tend to double-check things excessively and repeatedly....
Preview sample
Peace Process: American Diplomacy and the Arab-Israeli Conflict since 1967 By William B. Quandt
6 pages (1500 words) , Download 2 , Book Report/Review
Free
he deep knowledge that Quandt possessed was not merely acquired by book reading but the personal involvement and participation in both Nixon and national security Council.... This paper aims to summarize the ideas and views of Quandt as they appeared in Peace Process and to evaluate the text and assess its contribution to the understanding of 'Middle East Politics'....
Preview sample
The Syrian Civil War and the Regional Stability
4 pages (1000 words) , Download 2 , Essay
The conflicts has been sparkled by the Syrian Civil War; thus creating national disasters in the Middle East.... Name: Lecturer: Course: Date: The Syrian Civil War and the Regional Stability Introduction The Syrian Civil War is an enduring armed conflict between the Ba'ath Party government and those seeking to overthrow it....
Preview sample
Internet and Our Information Privacy
9 pages (2801 words) , Download 0 , Literature review
Free
ecently, News reports revealed that the national security Agency collects and analyzes internet and telephone communication data from millions of Americans (GonChar 2013).... In countries threatened by terrorism, concerns for privacy are put aside in pursuit of national security.... While the government's responsibility for national security is larger than the responsibility to guard and maintain internet privacy.... onChar, M 2013, What Is More Important: Our Privacy or national security?...
Preview sample
The Societal Implication of USA PATRIOT Act
8 pages (2255 words) , Download 1 , Research Paper
Free
Privacy, Technology and national security.... The Patriot Act has enhanced security by granting security agencies more power to gather intelligence.... It has enhanced security by granting security agencies more power to gather intelligence.... Balancing security needs and individual rights is necessary.... In responses, the Congress came up with a law that extended the ability of government to obtain intelligence, improved information sharing between security agencies and enhance relationships between law enforcement agencies (Litt, 2013 p....
Preview sample
The role of the family health practitioner:an advanced nursing practice framework
7 pages (1750 words) , Download 4 , Essay
Free
In a research article by Wilson, Pearson and Hassey (2002), the barriers in developing the nurse practitioner role in primary care in the United Kingdom were deliberated, listing job and financial security, training and scope of responsibility of nurses, and structural and organizational barriers as main obstructions.... Still, doubts and discrimination are evident in fully accepting the role of nurse practitioners as caused by job security, issues in nursing capabilities and constraints in the system....
Preview sample
The Effectiveness of Women in/outside Government
5 pages (1250 words) , Download 2 , Research Paper
Social Welfare Advocacies On her efforts to alleviate the plight of the people, she headed the Task Force on national Health Care Reform as First Lady in 1993 8 when she was the First Lady.... Hilary proposed the first national health care program but was not approved....
Preview sample
The Effectiveness of Women in/outside Government: Hilary Clinton and Clara Barton
8 pages (2000 words) , Download 2 , Research Paper
Free
She also visited Africa to meet with women who promote food security.... When she attends international fora on food security or health, she comes as guest and expresses the policy of US on such campaigns and concerns.... n her efforts to alleviate the plight of the people, she headed the Task Force on national Health Care Reform as First Lady in 1993 8 when she was the First Lady.... Hilary proposed the first national health care program but was not approved....
Preview sample
Organizations in the US Related to Justice and Their Duties
5 pages (1377 words) , Download 0 , Term Paper
Free
The whole nation has a focus on ensuring proper immigration, law enforcement, security and public safety.... Police officers among other careers in the field can work in shift because security needs to be provided throughout the day and night.... There are several international and national organizations concerned with issues regaining criminal justice....
Preview sample
The North Atlantic Treaty Organization After the End of the Cold War
12 pages (3000 words) , Download 3 , Research Paper
Free
The two most important objectives of the NATO since 1991 has been: to expand its membership beyond North America and Western Europe to include post-communist nations and those siding with the Soviet bloc during the Cold War; and, to act as an engaged and, if need be, aggressive multilateral organization reacting to threats to international peace and security, especially where intervention or action is inhibited at the level of the United Nations (UN).... ??[a]n agreement between two or more states to work together on mutual security issues....
Preview sample
Monitoring Mental Health Environments
6 pages (2116 words) , Download 0 , Literature review
Free
Community nurses in Melbourne should ensure through training that all the schools, workplaces as well as institutions provide the quality of the social surroundings and material security is always available to health as the physical environments (Lehtinen, 2008).... national evaluation (2004–2008) of the Stronger Families and Communities Strategy....
Preview sample
Cloud Computing and Virtualization
6 pages (1682 words) , Download 1 , Essay
Free
However, it is important to note that cloud computing is still undergoing evolution, and thus its definitions, technologies, use-cases, risks and benefits will be spiritually debated by the public and private sectors (European Network and Information security Agency-ENISA 2012). ... The major risk with the providers of cloud computing is mistrust in data security as well as privacy by users and the organizational inertia or cultural resistance to involve in data sharing and change the conventional ways of working in health IT centres, and thus raises data security issues....
Preview sample
Trafficking in Illegal Drugs and Persons
6 pages (1500 words) , Download 2 , Essay
Free
United States of America political tenacity to prevent illegal drug and trafficking continues to face internal contradictions between the antidrug and foreign relations.... .... ... ... The problem appears to be very contriving in nature in the nations where the production of drugs has become a part of their economy and social policies....
Preview sample
Illegal Trafficking and Terrorism
6 pages (1818 words) , Download 0 , Report
Free
This report "Illegal Trafficking and Terrorism" discusses foreign policies by the American Government to combat terrorist activities, drug, and trafficking menace that have to be formulated taking into consideration national laws, social and economic conditions pertaining to Canada, France, and Iran....
Preview sample
Argues on Americas War in Afghanistan
9 pages (2250 words) , Download 2 , Research Paper
Free
It follows then that there must have been some sort of action taken against the individuals who perpetrated these attacks, and in great part the swift actions taken in response to the World Trade Center bombings were justified as a means of national security.... Even as the war in the Middle East was initially justified as a means of national security, the United States' longevity and continued presence has proved to be largely problematic.... While ultimately the war in the Middle East remains a complex question with no clearly definable answer, it ultimately seems that at this point the United States should withdraw its military presence in the Middle East and concentrate on national security within the country....
Preview sample
Modern nation-state and transnational entities
6 pages (1500 words) , Download 3 , Essay
Free
The border between U.... The council of the European Union deals with foreign and security policies that are a concern for EU member states.... Nation states refer to the political units comprised of national groups.... Democracy And Federalism In The European Union And The United States: Exploring Post-national Governance....
Preview sample
Analysis of Traditional and Contemporary International Relations
10 pages (2500 words) , Download 2 , Coursework
Free
The paper "Analysis of Traditional and Contemporary International Relations" highlights that Waltz's central theory of neo-realism in international relations is underpinned by the proposition that the system of international politics is inherently dependent on a system of anarchy.... ... ... ... In focusing on the international politics as a whole state system as opposed to individual state level factors, Waltz avoids assumptions about human nature and morality and power in international politics, which is arguably exemplified by the contemporary role of diplomats within the globalisation paradigm (Coles, 2000)....
Preview sample
Rules of Engagement in Terrorism Threats
16 pages (4000 words) , Download 3 , Literature review
Free
‘The shooting of Jean Charles De Menezes: new border politics?... Furthermore, the paper would draw suggestions concerning the protection of civilians and facts pertaining to the use of force by the security forces during high-level of terrorist attacks.... Furthermore, the paper would draw suggestions concerning the protection of civilians and facts pertaining to use of force by the security forces during high-level of terrorist attacks.... rotection of Civilians and the Use of Force by the security Forces ...
Preview sample
Healthy People, Healthy Places, the Challenge for Public Health
6 pages (2085 words) , Download 2 , Essay
Free
The paper "Healthy People, Healthy Places, the Challenge for Public Health" highlights that public health in its simplest meaning is promoting the well-being of the mass population.... There have been tremendous advancements in the 21st century due to globalisation, technological changes.... ... ...
Preview sample
Health Care Incentive Act of 2011
8 pages (2327 words) , Download 2 , Essay
Free
Such rights include liberty, life, security, dignity, justice, equality of opportunity and privacy.... This essay "Health Care Incentive Act of 2011" discusses the Health Care Incentive Act of 2011 otherwise known as the United States national Health Care Act of 2011 is a bill that was introduced in the House of Representatives by Issa, a representative in the house from the state of California.... According to Colander (64), the act intends to create a single-payer, universal system of health care in the United States, an equivalent of the Canadian Medicare, the national Health Service of the United Kingdom; the national Insurance Health Bureau of Taiwan among other such examples....
Preview sample
The effects of illegal immigration in Britain and France
12 pages (3000 words) , Download 2 , Research Paper
Illegal immigration is a term that is adopted to defer to those people to embark on migration across the borders of a country, or a situation whereby foreign nationals reside in a given nation, and in a manner that violates the laws that govern the immigration policies of the.... ... ... The issue of illegal immigration is highly prevalent among the residents of poor nations to head to richer nations....
Preview sample
Computer Hacking
15 pages (4260 words) , Download 2 , Research Paper
Free
The report very well describes the importance of hacking and portrays that it can play a major role in the security of home as well as office systems and networks.... Since myths and truth have a very sleek difference between each other, therefore, users often mix up both the ideas related to computer security and hacking.... Every phenomenon has two perspectives; likewise, nowadays hacking can be for either maintaining security or tampering with the security....
Preview sample
What is the use of the study of Intelligence in international relations
20 pages (5000 words) , Download 2 , Essay
After the Second World War, one British official described intelligence as the “missing dimensions” in the study of international relations.... But after the end of the Second World War and in the context of the Cold War, there has been increasing realization of the vital.... ... ...
Preview sample
Four Fundamental Cyber Security Components
13 pages (3743 words) , Download 3 , Essay
Free
When a principle instructs the vendor to direct or educate the employees on information system security the concerned employees feel that their contribution to the company is valued.... The paper "Four Fundamental Cyber security Components" discusses that information confidentiality enables the organization's sensitive information to be a secret so that it does not fall into the hands of unauthorized persons, for example, competitors.... yber security is said to be a big issue for business costing not only lost revenue but damaged reputations and lost custom....
Preview sample
Limits to the Power of the Security Council
18 pages (5017 words) , Download 2 , Essay
Free
In March 1991, Resolution 688 of the SC held that the “internal repression” to which the Iraqi population were being subjected to, as well as the cross-border flow of refugees, was a threat to “international peace and security in the region”.... The author of the paper titled "The Limits to the Power of the security Council" examines whether the limitations exist to the exercise of powers of the Council, and if so, how they work to enable the security Council to better achieve its objectives....
Preview sample
The reaction of Surviving Maximum Security
2 pages (500 words) , Download 2 , Essay
Free
For an average person like me who has little idea about prison life, especially the American prison system and culture, this documentary entitled "Surviving Maximum security" has given me a clear picture what it feels like being there on the prison's "inner sanctum" (not that I would want to commit a crime just to experience that).... For an average person like me who has little idea about prison life, especially the American prison system and culture, this documentary en d "Surviving Maximum security" has given me a clear picture what it feels like being there on the prison's "inner sanctum" (not that I would want to commit a crime just to experience that)....
Preview sample
The French Revolution
2 pages (500 words) , Download 4 , Essay
Free
In the new document, all citizens are supposed to be guaranteed the rights of “liberty, property, security, and resistance to oppression.... To begin with, in 1789, the national Constituent FRENCH REVOLUTION The French Revolution was one of the most significant historical events in the history of the world.... To begin with, in 1789, the national Constituent Assembly abolished feudalism in France....
Preview sample
Final research: Terrorism
15 pages (3750 words) , Download 2 , Research Paper
They cannot be told apart from other individuals in their societies and this creates a situation where it has become difficult for the security agencies to put a strict surveillance on them.... In some parts of the world, there are Christian terrorist groups whose aim is to force the non-Christians in their societies to convert to the faith and among the most prominent of these groups is the national Liberation Front of Tripura, which is a Christian group in India (Gordon 2008)....
Preview sample
The New York Stock Exchange: Origin and History
5 pages (1607 words) , Download 0 , Report
Free
By the end of 1792, in an attempt to break the monopoly of the security auctioneers, twenty-four prominent brokers and merchants signed an agreement to avoid public auctions, to deal exclusively with each other and to operate on a minimal commission of a quarter %.... By establishing a formal organization, conforming to rules of conduct and banning ‘wash sales': fraudulent transactions which manipulated the market, security trading was finally systematized....
Preview sample
U.S. foreign policy
24 pages (6000 words) , Download 2 , Essay
The United States foreign policies have always been considered controversial – whether they are viewed as an American or as a foreigner.... These policies have primarily been based on American and democratic interests being pursued beyond American shores.... ... ... ... This expansion was also meant to empower its competition with the United Kingdom and the Soviet Union, countries which were, at that time, considered to be more influential and more financially stable nations than the US....
Preview sample
Derivatives: Their Economic and Financial Rationale
23 pages (6289 words) , Download 1 , Coursework
In some parts of the world where derivatives are not traded in their exchanges (such as the few national exchanges in Third World countries), investors, whether domestic or foreign, are often reluctant to come in and therefore these stock markets lag behind others.... This work called "Derivatives: Their Economic and Financial Rationale" describes issues concerning futures and options, as well as to the other types – namely, swaps and forwards....
Preview sample
Ethics, Corruption and Economic Freedom
7 pages (2264 words) , Download 0 , Assignment
Free
heory X and Theory Y (McGregor) - The average person dislikes work and will avoid it if possible, people must be controlled, directed or threatened with punishment, the average person prefers to be directed, avoids responsibility, is unambitious and wants security, work is as natural as play or rest, workers can be motivated using positive incentives, the average person seeks out responsibility. ... Hygiene factors (job dissatisfiers): company policy, supervision, working conditions, interpersonal relations, salary and benefits, job security ...
Preview sample
Roosevelts New Deal
5 pages (1372 words) , Download 0 , Essay
Free
?? Riding the wave of public enthusiasm and support, and “feeling energized by the speed with which Congress had responded to his banking legislation, by March 16 Roosevelt asked Congress to consider a plan for a national agriculture program15.... This paper ''Roosevelt's New Deal'' tells that As a response to the Great Depression, the New Deal was a total failure....
Preview sample
Soviet Union Invasion of Afghanistan
4 pages (1000 words) , Download 3 , Research Paper
Free
Also, in 2010, USA planned to “Afghanize” the battle by increasing the number and size of Afghanistan's national security forces.... And thirdly, the soviets worked hard on building a good competent Afghan army so they could be handed the job of Afghan security.... In 2001, a “security sector” reform was introduced in order to create a better Afghan security force structure.... Afghan national policy was introduced, led by Germany, in order to transform and renovate the security sector of Afghanistan....
Preview sample
United States Negotiation with the Taliban
7 pages (1750 words) , Download 2 , Research Paper
Free
High illiteracy levels leads to high rates of unemployment which is a threat to national security.... eterioration of the security levels due to proliferation of illegal fire arms and other dangerous weapons. ... eterioration of security since the Taliban regime hosted the AI-Qaeda a terrorist group responsible for the 9/11 bombing of the World Trade centre in New York....
Preview sample
US Foreign Policy during the Cold War
6 pages (1500 words) , Download 4 , Essay
Free
NSC 68 written under direction of national security Advisor Paul Nitze was a combination of all the three earlier three proposals: the main features of the policy were to assist Europe and other under-developed areas to recover from a poor economy and devise a new economy (mixture of Marshall Plan and Containment) and purchase, build a stock of strategic materials and take a string military stance (Dulles).... However Containment did stabilize international commerce in the US and promoted national security....
Preview sample
The Significance of the Luxembourg Crisis
8 pages (2000 words) , Download 1 , Case Study
Free
It's pointed out that West European governments have sought to establish a system wherein there will be a careful balance of their sovereignty while at the same time pursuing prosperity and security among themselves.... Specifically, West European governments have sought to establish a system wherein there will be a careful balance of their sovereignty while at the same time pursuing prosperity and security among themselves (Wallace 1999).... t was compromised because it was working around the conditions attached to the Marshall Plan Aid of the American Administration, the provisions of security through the Atlantic Alliance and the re-integration of (West) Germany in the regional system....
Preview sample
Three Letters to the Editor
6 pages (2100 words) , Download 0 , Coursework
Free
What it will do is squander the benefits of having huge oil reserves just across the border under the control of a true and trusted ally and put the seas at risk from the supertankers that will carry that oil to Asia. ... The letter ended with another generalization; that the hesitance is “flawed policy on both security and environmental grounds.... But instead of seizing the opportunity to improve American energy security and reduce the 17-plus percent unemployment rate in the construction trades, his dissembling is pushing Canada into the arms of the Chinese. ...
Preview sample
The Electronic Health Record Related to Patient Errors
33 pages (9553 words) , Download 2 , Coursework
From the paper "The Electronic Health Record Related to Patient Errors" it is clear that there are various measures and regulations that the government has put in place to ensure healthcare is improved in the country through the implementation of this health information technology.... ... ... ... The ubiquity of information technology in the 21st century has transformed virtual industries....
Preview sample
The Role of the United Nations
12 pages (2999 words) , Download 2 , Research Paper
Free
Cases as US complaint in 1980 when American diplomats in Tehran were detained, case related to dispute between Tunisia and Libya on the border establishment on the continental shelf, cases of Rwanda and Yugoslavia are few examples of the contentious cases that were brought to International Court of Justice for the purpose of arbitration.... Along with this agency, role of principle organs like security Council and International Court of Justice will be critically analyzed....
Preview sample
Strategic IT Plan: The Walgreens Company
10 pages (2579 words) , Download 3 , PowerPoint Presentation
Free
rivacy and security ... he successful deployment of Health Information Technology depends on healthcare privacy and security.... Multiple aspects of privacy and security are governed by state legislation and the existing national legislation such as CFR 42 Part 2 and HIPAA.... Department of Health and Human Services are all working to address the era of electronic health information and the implications of privacy and security as well as creating recommendations for policy makers....
Preview sample
The Flesh and the Spirit in American Literature
7 pages (1250 words) , Download 2 , Essay
Free
Bradstreet describes the role of religion in life of ordinary citizens and the role of Puritan values in national identity.... This research paper 'The Flesh and the Spirit in American Literature' examines the works of American literature, which shows that the nature of man and the nature of things occur in securing to all those who are sharers with one another in the same language....
Preview sample
Fostering Peace Through International Institutions
5 pages (1250 words) , Download 2 , Essay
Free
Through the mandate of its security Council and secretariat, the United Nations has often sent peace keeping forces to war torn areas to restore peace4.... In nationalism, citizens take up some national identities that differentiate them from other nationals.... In some cases, clashes in national identities may lead to misunderstandings and conflicts.... To this end, the role of achieving balance in international and national relations has largely been left to international institutions....
Preview sample
Nursing Informatics: A Detailed Review
11 pages (3228 words) , Download 0 , Term Paper
Free
"Nursing Informatics: A Detailed Review" paper argues that because of explosive strides in information technology and the huge body of medical knowledge amassed, controlling medical errors and healthcare costs is paramount in the healthcare professions, including nursing.... ... ... ... Issues have been identified and a lot of thought processes already is being involved in informatics to address the above issues....
Preview sample
Implications of an Intelligence Success or Failure
8 pages (2000 words) , Download 2 , Assignment
Free
Pike, director of Global security Organization was of the view that since proposed attacks was planned in the year 1995 therefore; agencies had to plan to thwart the action of terrorist.... Functional Responsibilities of Prominent Intelligence Agencies of USA Air force Intelligence Agency: The Air force intelligence agency provides expertise in warfare information, command and control warfare, security, foreign weaponry systems and technology (Gill & Phythian, 2006)....
Preview sample
International Relations in the Kingdom of Saudi Arabia
11 pages (3325 words) , Download 0 , Case Study
Free
2005, national security in Saudi Arabia, Praeger Security ... A number of prolonged border conflicts were resolved including a significant restructure of the border with Yemen (Cordesman, 2003, p.... Steered by a foreign policy that mainly emphasizes on Arab unity, Islamic harmony as well as peaceful concomitance, the Kingdom has developed to become a strong supporter for peace, security and constructive collaboration all over the globe. ...
Preview sample
Australias Mandatory Detention Policy
4 pages (1502 words) , Download 0 , Essay
Free
While mandatory detention continues to stir debate among detractors and supporters, the bottom line is to protect the Australian border and maintain the integrity of its immigration system.... llow me to discredit the statement that people arriving by plane to Australia are treated fairly at the Australian border control point as opposed to those arriving by boat.... epartment of Immigration and border Protection 2012, Fact Sheet 82 – Immigration Detention, Australia. ...
Preview sample
War Is the Health of the State
5 pages (1308 words) , Download 2 , Essay
Free
In this story, author reflected that while there are so much theoretical concepts about democracy, freedom, national security, there remains a large majority who are poor, hungry and sick.... former war veteran, historian wrote this scholarly work to relate to Americans the their story of violent conflicts, injustices amongst tribes, inequality and the nature of national pride which has somehow negatively impact to the world's order as it assumed the authority as police for international security management....
Preview sample
Symbolic Terrorism
5 pages (1250 words) , Download 2 , Research Paper
Free
The main line of the symbolic struggle is the drawing a border between “we” and “they”.... It seems that this border naturally appears between the society that endured a terrorist attack and the terrorists who apply awful measures and kill innocent citizens.... Richmond explains: “terrorism in its contemporary form can perhaps be described as “beyond war” in these terms, in the sense that although it aims at material injury, its key objective is to impact the virtual, to undermine the belief in the virtuous on behalf of the victim, to attack the symbolic, and to undermine the very assumptions of the target population (particularly relate to their security)” (Richmond, 2003, p....
Preview sample
2451 - 2500 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us