StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Industrial Espionage and Strategic Installations
8 pages (2322 words) , Download 0 , Essay
Free
The Electronic Intrusion Threat to national security and Emergency Preparedness Telecommunications.... national security and Emergency Preparedness.... The transmitter adds to the security of the operation by allowing the spy to monitor the conversations from a remote location, but the RF signal it generates also increases the probability that it will be detected by a competent TSCM technician.... t is essential to develop performance metrics in employing countermeasures because it can help determine the efficiency of such standards in security....
Preview sample
The Origin of Government Involvement in Health Care Delivery in the United States
4 pages (1000 words) , Download 2 , Assignment
Free
egislation was passed by the congress in 1965 that established the Medicare as title 18and Medicaid program as title 19 of the social security act found in page 3. ... itle 18 that refers to Medicare in thesocial security act allocatedhealth insurance for the aged and disabled.... he social security act amended the Medicare legislation in 1965.... This was under title two of the social security act.... nother component of the social security act is title 19....
Preview sample
Nordstrom as an American Based Company
6 pages (1660 words) , Download 0 , Case Study
Free
Thus, it makes it possible for the country to get goods from areas outside the border.... The paper "Nordstrom as an American Based Company" discusses that the company can choose to invest more in the improvement of their services rather than choosing to expand their current store....
Preview sample
To Incarcerate or Rehabilitate: Does Anything Really Work
5 pages (1250 words) , Download 4 , Essay
The system largely ignores all minimum standards of hygiene, medical care, and security.... uring the recent years, crime policies in US states and on the national level have focused on incarceration: longer sentences, "mandatory minimum sentencing," the reduction of time off for good behavior, and the abolition of parole....
Preview sample
The Role of Evidence in the Detection of Cases in the UAE
17 pages (4758 words) , Download 0 , Research Paper
Free
According to the Dubai security and Traffic Indicator, indicates crime rates decreased significantly in 2012, by 37.... The project can indeed be a quantum leap for the country with regard to maximizing security. ... The national has seven emirates, namely Ajman, Abu Dhabi, Dubai, Ras al-Khaimah, Fujairah, Umm al-Quwain and Sharjah (Library of Congress 2007).... The DNA database is a product of DNA profiling done in 2006 to unify national DNA database containing genetic information of UAE nationals and expatriates....
Preview sample
Businesses and their impact in Spanish speaking countries
15 pages (3750 words) , Download 2 , Essay
he aim of the paper is to analyze and understand effect of PEMEX on the mexican economy and society in general.... The company is a 100% government subsidiary with one-third incomes mainly from the taxes and dividends for the government.... The company maintains.... ... ... PEMEX has suffered due to its non-flexible annual capital budget to adapt to changes in the international oil and oil related product prices....
Preview sample
Waldens Clinical Psychology Program: Competencies, Strengths and Weaknesses
4 pages (1000 words) , Download 9 , Term Paper
Free
The course is also not recognized by the Association of State and Provincial Psychology Boards/national Register (ASPPB/NR).... The University must make prudent efforts to ensure that the American Psychology Association and the Association of State and Provincial Psychology Boards/national Register (ASPPB/NR) accredit the disciplines in Clinical and Counseling psychology.... According to the American Psychological Association, only 31 states recognize the Nationally Certified School Psychologist (NCSP) designation, which recognizes professional competency in school psychology at a national, rather than State, level....
Preview sample
Technology and Nature of Surveillance
6 pages (1915 words) , Download 0 , Essay
Free
This fact begs a number of questions including whether the government should disclose how surveillance metadata is used and whether national security can be used as an excuse to infringe on individual rights and freedoms (ACLU, 2016).... For instance, the national security Agency (NSA) has been collecting metadata, which is a term used to describe data or information related to one's communications.... Lack of accountability also means that the information gathered can be used for reasons other than national security reasons, thereby putting the security of the populace at risk....
Preview sample
The Five Levels in Hierarchy of Needs by Maslow
12 pages (3169 words) , Download 2 , Essay
Free
Looking at whether or not the child has food security, shelter security, and safety and finding ways in which to secure their basic needs will open up the possibility for gaining ground for the next levels as they relate to supporting a successful adult.... As the child is entering a period in which self awareness of complex ideas and abstract thoughts are becoming increasingly defined and evaluated, finding acceptance in a gang atmosphere provides the self with a sense of security that might not have been possible in within the community previous to the strength of the attachment to the gang....
Preview sample
The Reasons for and the Effects of Bahamian Emigration to Florida
8 pages (2148 words) , Download 2 , Term Paper
Free
This term paper "The Reasons for and the Effects of Bahamian Emigration to Florida" talks about gross-domestic product ratio, unemployment rate, and poverty factor of Caribbean countries.... All these reasons forced the people to be desperately willing to enter the United States.... ... ... ... America has been home to thousands of migrants....
Preview sample
Aircraft Emergency Response
8 pages (2323 words) , Download 2 , Essay
Free
The paper "Aircraft Emergency Response" highlights that the sophistication of the equipment used by an organization is unimportant unless the individual is prepared to deal with the unexpected, system failure.... Preparing for the unexpected is vital to successful emergency response planning.... ...
Preview sample
The history of North American frontiers from the ninth century to the opening of the nineteenth
4 pages (1000 words) , Download 2 , Term Paper
Free
The main concern of the paper is the way the North Frontier influenced the relationships development in America.... It is claimed that relations between Indians and Indians, Indians and Europeans and Indians and Americans were rather challenging.... ... ... ... In order to deal with complexities, it was necessary for Americans to develop a policy of tolerance, egalitarianism and conditions for further independence development....
Preview sample
Introduction to Emergency Planning and Operations; Types of Emergencies and Disasters
4 pages (1000 words) , Download 4 , Essay
Although this is the case, a multifaceted policy in terms of emergency planning and preparedness is required to be able to continuously protect the population and prevent cases such as the 2002 earthquake disasters in New York and the Midwest (Department of Homeland security, 2008).... There are different actions and policies that can be related to both the local and national responses and plans.... ncluded in the most important policies implemented in the different states and localities in the United States is the national Response Framework....
Preview sample
American Crime Literature: Hard-Boiled Detectives vs Kinsey Milhone
2 pages (670 words) , Download 2 , Essay
Free
The essay "American Crime Literature: Hard-Boiled Detectives vs Kinsey Milhone" focuses on the critical, and thorough analysis of the major comparative features of two kinds of American crime literature, namely "hard-boiled" detectives, and Kinsey Milhone.... ... ... ... American crime novels started in reaction to the British murder mysteries and soon developed their own identity as the hard-boiled school of writing....
Preview sample
LLM in Project Finance PPP - Risk Mitigation
16 pages (4021 words) , Download 0 , Coursework
Free
The 6 political indicators used under the failed stated index are state legitimacy, public service, human rights and rule of law, security device, factionalised elite, and external intervention.... Four major legal and political risk factors that are worse considering when investing in developing countries include legislative and regulatory systems, political security, economic security, and centralised infrastructure systems.... Again, using metrics provided by institutions like the Fund for Peace, it is possible to quantify the extent of political security in almost all developing countries in the world....
Preview sample
Post Traumatic Stress Disorder
5 pages (1250 words) , Download 3 , Research Paper
Moreover, girls more than boys experience the condition due to the lack of a security figure to protect them from adverse conditions (Schiraldi, 2000).... Name Professor Course Date Introduction Individuals undergo several challenges that present the difficulties witnessed challenging their lifestyle adaptations....
Preview sample
Articles of Confederation and the US Constitution
5 pages (1250 words) , Download 2 , Essay
There is the need for a strong and central national government.... S/he can sue the national government if s/he feels that his/her rights are violated.... he issues are between the states and the national government.... he States and national GovernmentThe issues are between the states and the national government.... The states provide the national government the means to stay alive.... Hence, provisionally the states are in a position to dictate terms to the national government....
Preview sample
A Detailed Management Plan In Cases of Natural Disasters
6 pages (1696 words) , Download 1 , Essay
Free
Running Head: security and Privacy A Detailed Management Plan In Cases of Natural Disasters Introduction People respond differently to emergencies and disasters depending on various factors which influence their behavior.... The first thing that security and management personnel should do to protect the patients' records when natural disaster, like hurricane, strikes is to be ready with emergency operating records.... Training personnel for emergency response during disasters aim to contribute to the achievement of the organization's goals by ensuring safety and security of the resources of the organization including the patients....
Preview sample
Tackling Violence against NHS Staff
4 pages (1000 words) , Download 2 , Essay
Staff and security personnel need to be trained, but the assessment of training needs becomes a difficult issue due to this variability, despite the fact that the quality of delivery is extremely important for the service providers.... It is astonishing to note, as has been reported by White (2003) in a given year of 2001 to 2002, these incidences rose by 13% from that of the previous year pulling the count up to 95, 501, which has been referred to in the national Audit Office documentation based on surveys in NHS acute care, England Ambulance Trusts, and NHS mental health....
Preview sample
Development of Cloud Computing Technology
4 pages (1301 words) , Download 7 , Thesis
Free
Private clouds are recommended for organizations requiring advanced security and privacy measures.... The private cloud is administered exclusively for only a single organization, in order to maintain a strict level of security Full Paper Development of Cloud Computing Every organization selects the best possible cloud computing deployment method as pertheir business requirements and compatibility factors.... Private clouds are recommended for organization requiring advanced security and privacy measures....
Preview sample
Economic and Political Environment, Trade and Investment Opportunities in the United Kingdom
11 pages (2904 words) , Download 0 , Case Study
Free
The United Kingdom is a fundamental member in the United Nations (UN) occupying a permanent seat on the United Nations security Council.... It is also a member of the Western European Union (WEU), the North Atlantic Treaty Organization (NATO) and the Organization for security and Co-operation in Europe (OSCE).... Some sanctions on political trade may also be placed, targeting certain countries, in order to promote and maintain international security and peace (Smith, 2012)....
Preview sample
The Dangers of Spam
5 pages (1422 words) , Download 2 , Research Paper
Free
From the paper "The Dangers of Spam" it is clear that spam is increasing at an alarming level in the prevailing times and continues to increase security risks at a personal and national level.... Roper advises that internet users should be communicated the relevance of installing anti-spam security software on their systems.... security Threats of Spam 4.... Roper advises that internet users should be communicated the relevance of installing anti-spam security software on their systems....
Preview sample
Legal Implications of Construction Decisions: Converting a Country House into a Hotel
10 pages (2901 words) , Download 2 , Assignment
Free
The Landlord and Tenant Act 1954 regulate the rights and responsibilities of tenants and landlords who are in business property agreements, and provides that the tenant of the business property has a security of tenure until the end of the lease agreement.... Eau Claire: national Business Institute.... The Planning Act 2008 provides for the establishment of the Infrastructure Planning Commission and its functions, and also provides the national significance of town and country planning (Gregory, 2014)....
Preview sample
The London Brigade and Rescue Planning Team
6 pages (1772 words) , Download 0 , Assignment
Free
The National fire framework gives them the power to do this through auditing and advising people to upgrade the fire security in the region.... Constructions of such buildings will improve the security of the people.... Resilience brings together different people concerned with the security of the region.... The paper "The London Brigade and Rescue Planning Team " states that generally speaking, the London Fire Brigade and Rescue team work hand in hand with the requirements of the national framework....
Preview sample
Positive and Negative Benefits of War
11 pages (3239 words) , Download 1 , Essay
Free
The paper "Positive and Negative Benefits of War" juxtaposes promoting of research and development, boost economic development vs death, psychological disorders, injuries, environmental pollution, destruction of property, breaks up families, destroys family patterns, and eliminate essential services....
Preview sample
Burma: Military Rule in the 1990s
6 pages (1715 words) , Download 1 , Essay
Free
erious tensions brewed around the Burma-Bangladesh border due to persecution and forceful eviction by the military of the Burmese Muslims.... Around 30,000 refugees gathered around the border of China and Burma.... As a result the number of refugees along the Burmese –Thai border had risen alarmingly.... hen the SLORC came into power they announced that they were here to perpetuate National Sovereignty, bring about law and order, provide security and bring about the well being of the people....
Preview sample
United States Health Care Reform and Accountable Care Organizations
12 pages (3000 words) , Download 2 , Research Paper
Free
At the government level the national Practitioner Databank has been set up, in addition to other forums for the measurement and reporting of the quality of healthcare provision.... national Library of Medicine, national Institutes of Health, Vol....
Preview sample
Persuasive Paper Part 3: Disadvantages, Answers with Visuals
1 pages (250 words) , Download 2 , Research Paper
Free
The employees have a job security, and they can meet their family's demanding obligations (Neuson, 2006).... The bill was meant to give employees the flexibility needed to attend to pressing medical needs that affect the employees themselves or close relatives.... Assuredly, while American workers have benefited from....
Preview sample
Legal Implications of Electronic-Commerce
11 pages (3262 words) , Download 5 , Essay
Free
This may work in preserving the integrity of the information being transmitted but could contravene national security issues.... Law makers often struggle with finding the right balance between consumer privacy and national security.... ayment and security 4 ... ayment and security ... Safeguards are imperative in this area because security of private information can be compromised.... Therefore, three major legal issues may emanate from online transactions: confidentiality of consumer information, accuracy of the information as well as lack of security of the data (Iachello & Abowd, 2000)....
Preview sample
United Nations Disaster Management Training Program
6 pages (1500 words) , Download 2 , Case Study
Free
The case study "United Nations Disaster Management Training Program" states that James is a senior manager at a firm but is constantly in conflict with one of the junior staff, Irene, who is apparently a clever employee and has often offered ideas, which are conflicting with James point of view.... ....
Preview sample
Comparing and Contrasting Development in Germany and Kenya
5 pages (1250 words) , Download 3 , Research Paper
Free
The HDI puts together national income and economic measure with life expectancy and education to come up with a reliable rating (Taylor 376).... It is highly industrialized and populous country with the largest national economy in Europe.... People cannot produce enough to contribute to the national development.... The poor are unable to contribute to the national development while they depend on the government for the scarce resources. ...
Preview sample
Bioterrorism
2 pages (500 words) , Download 3 , Research Paper
Free
The Centers for Disease Control and Prevention (CDC) defines bioterrorism as “the deliberate release of viruses, bacteria, or other germs (agents) used to cause illness or death in people, animals, or plants” (Centers for Disease Control and Prevention, 2007, par.... 1).... From.... ... ...
Preview sample
Public health science slp 15
11 pages (2750 words) , Download 2 , Essay
Medical technology has recently been renamed as Clinical Laboratory Science.... It involves the examination of blood, tissue and body fluids to provide results to an attending physician who is treating patients.... Degrees in the field are offered worldwide from an Associate to Doctoral level.... ...
Preview sample
Scripts and Counterscripts
2 pages (500 words) , Download 3 , Essay
Free
They rule us every day and give a false sense of security, thus free of all threats.... It promises false security, tells us that if we are safe then we are happy.... Potential dangers of individuals and societies passively subscribing to dominant scripts, it comprises of therapeutics, technology, consumerist and militarism....
Preview sample
International Political Economy
8 pages (2562 words) , Download 0 , Essay
Free
While every nation remains vulnerable to the impacts of climate change, developing countries will bear the greatest burdens due to their limited capacities to prepare and develop strategies to address the consequences of the greater frequency and severity of weather conditions, spread of infectious diseases, increasing sea levels and reduced food and water security (IPCC, 2007). ... International security.... International security, Vol.... Different nations have opted out of multilateral frameworks to act on their own because they do not desire to subscribe to the general principles of conduct that are being enforced or negotiated or because in some instances, they consider those principles inimical to their national interests....
Preview sample
Formation of Groups of Interest
8 pages (2367 words) , Download 3 , Essay
Free
Examples of business interest groups in the United States include the national Association of manufacturers and the U.... Examples include the American Farm Bureau Federation, the national Farmers Union, The peanut Growers Group, The American Dairy Association, and the national Soybean Association (Bardes, Shelley, & Schmidt, 2008).... Examples of these groups include the national Audubon Society, the national Wildlife Federation, the Environmental Defense Fund, Nature Conservancy, Earth First, and the Greenpeace Society among others (Bardes, Shelley, & Schmidt, 2008)....
Preview sample
Wealth of nations by Adam Smith
4 pages (1000 words) , Download 2 , Term Paper
Free
Written by Adam Smith in 1776,readers of today find the book “Wealth of Nations” almost impenetrable since the language used is flowery and the terminologies are outmoding yet wander into digressions.... n spite of that, this book is one of the world's most important books because it did for economics what Newton and Darwin did for physic and biology....
Preview sample
Crime prevention through environmental design
4 pages (1000 words) , Download 3 , Essay
Combating crime has always been the primary goal of every nation as it aims to provide its citizens a national security.... ccording to the National Crime Prevention Institute, the Crime prevention through environmental design or CPTED is an effective design of the natural environment that may decrease incidents of crime and strengthen the security of the people living in the community....
Preview sample
Contemporary Society and Animal Rights
11 pages (2750 words) , Download 4 , Essay
Free
The intention of this study is to investigate how well the animal rights are protected from abusement in the nowadays society.... An author of this paper claims that In the recent world, animals have been seen as the most affected creatures in the world.... ... ... ... It has always been a disagreement by much organization and individual into whether non –human animals have rights and what is meant by animal's rights....
Preview sample
An Analysis of Robert V. Remini's Andrew Jackson Versus the Cherokee Nation
3 pages (750 words) , Download 3 , Essay
In addition to this national sentiment against the proposed Indian Removal Act, various individuals that politically represented the Cherokees – John Ross, John Ridge and Major Ridge – sought audience with Jackson on a possible compromise regarding the looming Indian removal, but to no avail (51-53)....
Preview sample
Mergers and Takeovers
14 pages (3750 words) , Download 0 , Report
Free
First of all, a merger or takeover involving a foreign company can be deemed as compromising national security and therefore, dangerous to society; a prime example is ... Heightened national security Threatens Global M&A. ... There is no threat to national security because Amoco is of U.... The tea sector does not constitute a national security zone by any stretch of ... There is no question of national security being compromised because both companies are based in the U....
Preview sample
How institutional and cultural issues impact International HRM
9 pages (2250 words) , Download 2 , Essay
Free
The identities of cross-border structures are strengthened, and the power of organisations operating only within the nation state is weakened.... State involvement in Europe has underlying social security provision.... national culture; the role of the international hr manager; the problem of integration; the entry of multinational corporations (MNCs) in China; corporate governance in Siemens ?... On the other hand, International HRM examines the way in which international organisations manage their human resources across these different national contexts....
Preview sample
Overview and Industry Trends & Prospects of General Dynamics
4 pages (1000 words) , Download 2 , Essay
General Dynamics is renowned for its manufacturing expertise as well as in being The company offers a range of solutions and services that are mainly related to the security systems for important national infrastructure, Marine Systems, Armoured Fighting Vehicle (AFV) technology and other defence and security related services....
Preview sample
Web Server Application Attacks
3 pages (750 words) , Download 3 , Assignment
ession security Vulnerabilities.... Designing an information security policy is the first step towards the implementation of information security (Danchev 3).... A security policy acts as a centralized crucial document that will help in eliminating the risk of security breaches by securing the confidential information stores from getting disclosed to unauthorized persons....
Preview sample
Chile Mining Industry
8 pages (2454 words) , Download 0 , Case Study
Free
he main ethical issue within the organisation is the tendency of management to neglect the worker's rights towards the job security and minimum wages (DesJardins and McCall, 2014).... This situation imposes a great threat towards the physical safety, security and the social life of the workforce (Reuters, 2014).... Government's participation in this process will also ensure the protection of organisational transparency and worker rights towards the workplace safety and security....
Preview sample
The U.S Occupation of Japan (1945-1952)
11 pages (2750 words) , Download 3 , Essay
Free
s a sign of the significance of the occupation through the formation of the constitution, the article nine of the constitution has remained prominent in the political arena despite the struggle of some conservative elites in seeking to revive it to give Japan greater leeway to security.... Additionally, the United States government promised a bilateral security pact with Japan.... American-Japanese security agreements, past and present.... The excessive concentration of power both economic and political made it easier for conspirators to hijack national policy for their gains....
Preview sample
The New Mecca by George Saunders
5 pages (1250 words) , Download 2 , Essay
George Saunders presents a narration about his life in Dubai highlighting the wrong conceptions that most people have about the city and how these misconceptions are the root cause of the violence today.... .... ... ... Many people around the globe have developed an attitude about the new place they had never gone before....
Preview sample
Native American Religious Studies
5 pages (1250 words) , Download 2 , Essay
The main theme of Professor Keith Basso's non-fiction book “Wisdom Sits in Places: Landscape and Language among the Western Apache” is a superb exploration of the language of the Western Apache.... It is a wonderful read of his ethno- linguistic study of the interwoven.... ... ... onship between language and landscape among the Apaches of Cibecue, on the Fort Apache Reservation in central Arizona, a linguistic ethnography about "landscape and language among the Western Apache....
Preview sample
The Realignment of American Democracy since the 1960s
5 pages (1250 words) , Download 0 , Book Report/Review
Free
The paper "The Realignment of American Democracy since the 1960's" discusses the book "All in the Family" by Robert Self that traces the evolution of the political right and its fundamental position for the traditional male family and for conservative values in opposition to a rising liberal tide....
Preview sample
Concepts of Operations Project
4 pages (1000 words) , Download 2 , Essay
here should be a framework within which computer security incidents are to be handled to safeguard high level severity.... The Chairperson of the Misuse Committee determines the company's designated Information Resource security Guidelines Coordinator that will participate in the misuse Committee.... Week One GoalMission Statement B Concept Company's mission statement toward the development of an Information Systems security Incident is to protect communications and promote standards that give them a unique advantage....
Preview sample
27901 - 27950 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us