StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Comparison of Two Crime Reduction Strategies
9 pages (2512 words) , Download 1 , Coursework
Free
NYPD and other security agencies are demanding to increase their financial resources from the State and local government to meet enhanced security requirements at border areas, key assets, airports and seaport as well as for critical infrastructure.... They are draining away a huge budget towards security measure that would otherwise be spent on public welfare of the society.... They are draining away a huge budget towards security measure that would otherwise be spent on public welfare of the society....
Preview sample
War as a Strategic Tool of Policy
16 pages (3963 words) , Download 2 , Essay
Free
Although it did not initiate the war, Israel had the objective of preserving its national security, which was made possible by occupying the Golan Heights and Sinai Peninsula.... According to Vego, they can vary from 'preserving national territorial integrity and political sovereignty to preserving one's own or breaking up the opposing alliance/coalition.... According to Vego, they can vary from “preserving or restoring national territorial integrity and political sovereignty to preserving one's own or breaking up the opposing alliance/coalition, or forcing the opposition to cease its support for a rebellion in one's state”....
Preview sample
Radio-Frequency Identification Chip Implant
8 pages (2386 words) , Download 1 , Essay
Free
Based on the views of the proponents and the opponents on the use of the chip technology on humans, this paper analysis the dilemma on whether the benefits of RFID chip implants for individuals, organizations and/or the broader community outweigh the security and privacy concerns with RFID chip implants.... Some of the cited disadvantages lie on the security of the information as well as infringement to a person's privacy.... Those against the chip technology raise concerns on issues that such as health risks posed by the existence of the chip on human body, security risks and invasion into a person's privacy among other concerns (Masters & Michael, 2005)....
Preview sample
Terrorism Research Paper
5 pages (1250 words) , Download 2 , Research Paper
Name Institution Instructor Course Date Terrorism Introduction International terrorism is for a long time one of the most serious threat in both the foreign and domestic security of the world security.... The united states need to use the all the tools, that are at its disposal including the international diplomacy, corporation and constructive engagement to economic sanctions in order to convert physical security and military force towards eliminating the vice....
Preview sample
The US Civil Liberties Implications of Counterterrorism Policies
7 pages (1885 words) , Download 1 , Essay
Free
he controversy of the national security Agency ... In 2005, there were many reports that claimed that the national security Agency (NSA) was trying to eavesdrop on telephone calls that were made between people in the U.... security: Public Opinion in the Context of the Terrorist Attacks on America....
Preview sample
Grandparents raising their Grandchildren: Key findings in the United States
7 pages (2110 words) , Download 2 , Essay
Free
Grandparents experience self renewal through their grandchildren and giving them the sense of security by helping them grow in their self confidence, self identity, self respect and self esteem brings happiness and utmost satisfaction to the grandparents.... Even if grandparent is raising the child and giving him social and financial security, their natural parents can come on any giving day and ask for the custody and that's legal.... Adoption gives the status of parent and child's natural parents are no longer termed as his parents and will also provide support to grandparent from Social security or the federal adoption subsidy program....
Preview sample
Globalization and Its Impact of Drug Trafficking
9 pages (2523 words) , Download 2 , Research Paper
Free
Along with violence there has been a greater vulnerability towards security and rights along with increased sexual exploitation, forced prostitution as well enhanced recruitment into the armed groups5.... The second objective was aligned towards improving the security situation with retrieving of the large areas that were under the control of illegal armed groups.... This pattern lacks in the ability to integrate specific as well as complimentary competencies at each national unit6....
Preview sample
Reddix Hospital
8 pages (2000 words) , Download 3 , Essay
There is an ever increasing stress and emphasis on all health care organizations to ensure patient security, efficiency, and cost-effectiveness, balance the quality of care, and better health care that has driven them towards a more thorough and effective management of medical knowledge and information that has been derived from biomedical research.... nother area that Reddix lacks that it does not possess a secure and safe information security system, which is extremely necessary to ensure that all the clinical data is encrypted and encoded so that it can be protected from misuse....
Preview sample
Government Intervention in International Trade
9 pages (2250 words) , Download 2 , Literature review
Free
rotecting national security ... he concept of free trade suggests that the citizen of a particular country is free to conduct any business activities within or across the national border.... ational security is of primary concern for the governments.... Therefore, the government intervene with the private companies to ensure that the overall security of the country is maintained.... These regulations are in terms of maintaining strict security, proper checking of the passengers and their belongings, restrictions of items that can be taken across borders, etc (Martineau, 2000)....
Preview sample
The Role of the State in Arab Economies
12 pages (3297 words) , Download 0 , Coursework
Free
In most Arab nations, the redistribution policies aim to enhance regime security by maintaining the balance that exists between various social groups and societal classes.... To ensure that security is maintained, redistribution policies are enforced under duress. ... They are awarded differently based on their significance as regards the “security map” in the eyes of the authoritarian regime.... They were appointed based on security reasons, as rewards for loyalty or their achievements while in the service of the state or as a means by which allegiances could be established between certain social groups....
Preview sample
Activities of System Security
11 pages (2868 words) , Download 0
Free
The paper "Activities of System security" is a perfect example of a report on information technology.... The paper "Activities of System security" is a perfect example of a report on information technology.... ctivities of system security ... Therefore, the need to upgrade the networks, security systems, hardware's and software's has to be met.... However, the key issue here is the security of the system and it integrates the communication networks, software and hardware's....
Preview sample
The American Leader's View on the Partition Debates in the Israel War of 1948 and Its Aftermath
2 pages (700 words) , Download 0 , Essay
Free
efforts to reach a Middle East peace settlement are based on UN security Council Resolutions and have been based on the premise that as Israel takes calculated risks for peace the United States will help minimize those risks.... ( Carol3-10) The United States may regard Israel as its primary ally in the Middle East, based on common democratic values, religious affinities, and security interests....
Preview sample
Rights Associated With Free Movement
11 pages (2605 words) , Download 2 , Essay
Free
Rights of residence Member states will issue the right of residence to nationals of the member states who are not enjoying other provisions of the community law which has been provided that they themselves and the their family members are covered by medical insurance in respect of all the risks in the host member state and have sufficient resources, which will be able to sustain them and avoid being a burden to the social security system of the host member state during their period of residence....
Preview sample
Motivation for the Iraq War
13 pages (3487 words) , Download 1 , Case Study
Free
Was this war motivated by noble causes, such as the spread οf democracy, the stabilization οf the Middle-Eastern region, the issue οf national security, and the neutralization οf weapons οf mass destruction, or was it really about the unspoken quest for oil, to secure US business interests in the region, the vendetta between Saddam and the Bush family, or the attempt by the Bush Administration to capitalize on popularity brought about by fighting the War on Terrorism. ... nother supposed motivation for the Iraq War is the issue οf national security....
Preview sample
Current Problems in Electronic Healthcare Records Implementation
13 pages (3571 words) , Download 6 , Research Paper
Free
Other standard's initiatives include: the standardization of healthcare vocabularies; transport through email protocols that are secure; services through transparent and accessible application programming interfaces (API's); privacy and security through the implementation of standards set out by the National Institute of Standards and Technology (NIST).... Other factors that need to be reviewed include: the information security policy template; EHR workflow process mapping and implementation and the workflow redesign templates....
Preview sample
Sociocultural influences on conflict resolution and post-war reconstruction
15 pages (3750 words) , Download 2 , Research Paper
Elsewhere, there have been various peace-building projects, national building programs, political mediations and other post war and conflict reconstruction programs that are being undertaken by international bodies like the United Nations and other regional or supranational agencies....
Preview sample
Americas View on 9/11
10 pages (2500 words) , Download 3 , Research Paper
Free
northern border; and authorized disclosure of foreign intelligence information obtained in criminal investigations to intelligence and national security officials” (Perl 6-10). ... Congress has passed the aviation security Act, creating the Transportation security Administration, which in turn implements stricter guideline on passenger and luggage screening.... “Deportations as a whole rose by 104 percent from 2001 to 2010, according to data from the Department of Homeland security....
Preview sample
The Vulnerability of Cyber Attacks on the Financial and the Energy Sectors
14 pages (4421 words) , Download 1 , Thesis Proposal
Free
The major concern in this case is that, due to the power failure the national security system will get affected and might break down.... They can not afford to risk their security of operational and financial proceedings on the hands of cyber predators.... Their dependence on IT based technology and over exposure to cyber world needs very strict security measures to get protected from cyber attacks.... Hence, there is lot of concern shown from the Government and the management authorities on the security structure of the financial sector in every economy to stay protected from cyber attacks....
Preview sample
Policing and Terrorism: Muslims in the United Kingdom
83 pages (9971 words) , Download 1 , Thesis
While the issue of counter-terrorism, idealistically encompasses a vast range of philosophical observation and scope to reflect reflective approaches to the problem, most of the nations interpret it as cultivation over means of armed security process and defend the ways of extreme violence in terms of more extreme violence.... Apart from introducing immediate changes in the context of national and international policymaking, it also is important that discriminative outlook should be replaced by empathetic observation of the situation....
Preview sample
Community Needs Assessment for the Population of Little Havana
12 pages (3000 words) , Download 5 , Essay
Free
In terms of adequacy of protective services, the area is under the jurisdiction of the Florida Department of Law Enforcement, and there are three security facilities located within Little Havana itself classified as law enforcement and public safety facilities.... The community is in need of better security services.... There is also a Social security Administrative Office in the west of Little Havana charged with the responsibility of streamlining social security issues....
Preview sample
Media Journal of Politics
7 pages (2429 words) , Download 0 , Article
Free
Cross-border integration can result into a dirty environment and assist in cleaning up.... There are increased efforts to reduce carbon emissions as a result of cross-border trade.... ? Keeping with the current demands devoid of cross-border trade will affect more negative effect to the environment than positive.... The domestic cause of carbon emissions is much more as compared to the results of international cross-border trade....
Preview sample
Military Intervention since the End of the Second World War
10 pages (2824 words) , Download 2 , Essay
Free
Thus, military intervention in Afghanistan, despite the massive loss of life among British servicemen, was essential for the national security of the country because it allowed for the pursuit of al Qaeda and its affiliates to their base of operations where their power was considerably reduced (Gall, 2011).... The power of Britain was unrivalled by any other nation and this ensured the security of not only the nation, but also of all its colonies and protectorates....
Preview sample
The National Health Service and the Risk Assessment Techniques
15 pages (3750 words) , Download 3 , Research Paper
Free
he Secretaries of State for Health and Social security (1989) recommended this participatory approach of risk assessment and most importantly the needs of the service user to be put in to consideration all the health care personnel should be equipped with a personal care plan that should serve as a guiding tool.... Perkins should have been informed on her security situation.... t is always important in primary prevention in the organization in order to ensure that the patient is adequately informed in order to ensure that she understands the security issues surrounding her....
Preview sample
What are the consequences of a state break-up in the Arabian Gulf from USA prospuctive
1 pages (250 words) , Download 2 , Essay
Free
The nature of GCC changed however since US invasion of Iraq in 2003 and its objective became more economy-oriented rather than providing security to civilians.... The United States has always encouraged Gulf countries to act collectively and enforce security measures against Qaeda-affiliated military groups acting in Syria.... has to support GCC in order to maintain security and eliminate Islamic State of Iraq (ISIS) which poses a threat to its national and international security....
Preview sample
International Relations and Globalisation
6 pages (1751 words) , Download 1 , Essay
Free
This process includes trade, economic development, and environmental, social policy and security matters.... ''The EU will ensure that the issue of human rights, democracy, security, and the rule of law will be included in all future meetings and discussions with third countries and at all levels.... The new development policy strategy gives new consequences because the previous strategy was published in November 2000: the stronger consensus on the Millennium Development Goals, the security context after the terrorist attacks on 11 September and the increased impact of globalisation in a new perspective....
Preview sample
Oklahoma Medicaid Program and Affordable Care Act
12 pages (3402 words) , Download 3 , Dissertation
Free
Amendments to the Social security Act were passed in 1971 and 1972 creating Supplemental Social security Income and nearly all beneficiaries also received Medicaid.... national and Oklahoma Medicaid April 25, Contents Contents 2 Introduction Beginning in 1966 Medicaid was a program funded by one billion dollars, and has now grown to a program with expenditures reaching hundreds of billions....
Preview sample
South Koreas Strategy in Response to North Koreas Nuclear Weapon
14 pages (3500 words) , Download 2 , Research Paper
Free
Furthermore, whilst South Korea's strategic approach to national security always took account of North Korea's nuclear weapons programme; Son highlights the point that for South Koreans the protection of the US “nuclear umbrella” prevented any notion of undertaking pre-emptive strikes (Son, 2006, p.... owever, the recent military attacks on the South Korean island have served to reshape South Korean policy and assumptions regarding North Korea in terms of national security....
Preview sample
The Ticking Time Bomb
15 pages (3750 words) , Download 3 , Term Paper
Free
However, he insists that there be a well defined line between matters regarding national security and civil liberties.... The relevant authorities should no be so preoccupied by their desire to maintain national security to the extent that they impinge on the civil liberties of the suspected terrorist.... It behaves this way with regards to discharging its mandated tasks of mainly maintaining Israeli national security.... Furthermore, proponents of torture cite that the risks to a single individual should no the accorded higher regard as to the importance of national security....
Preview sample
The ticking time bomb
12 pages (3000 words) , Download 3 , Term Paper
Free
However, he insists that there be a well defined line between matters regarding national security and civil liberties.... The relevant authorities should no be so preoccupied by their desire to maintain national security to the extent that they impinge on the civil liberties of the suspected terrorist.... It behaves this way with regards to discharging its mandated tasks of mainly maintaining Israeli national security.... Furthermore, proponents of torture cite that the risks to a single individual should no the accorded higher regard as to the importance of national security....
Preview sample
Police and the Community
5 pages (1534 words) , Download 2 , Essay
Free
Question 3 Similarities Community oriented policing as a philosophy that encourages organizational strategies, which hold up the organized use of problem-solving techniques and partnerships, to tackle the immediate factors that give rise to public security issues.... The security issues are social disorders, crime as well as fear of crime.... These issues are mostly related to the enforcement of security, law, and order.... A statesman refers to a diplomat or politician who has had a long, as well as respected duty at the national or international level....
Preview sample
Naval Ground Strategy
2 pages (634 words) , Download 2 , Assignment
Free
n September 2002, the bush administration issued its national security strategy, which advocated for use of force to get rid of any apparent challenge to US global hegemony.... n line with his argument, the security of a large and expanding system of international trade in the 20th century would depend on the creation of a transnational consortium of naval power (i.... In fact, due to its dominance in the world order, many nations view the US as a threat to world security with many anti-US nations and terror organizations fighting back....
Preview sample
Cloud Computing Regulations and Law
5 pages (1250 words) , Download 0 , Term Paper
Free
Under the Act, federal agencies can make use national security letters(administrative subpoenas) to gather foreign intelligence hence can request client information from other third parties or cloud providers.... national security officials, as well as law enforcement, agents have an issue in giving information stored by the cloud before the court.... Some of the concerns that have arisen include data security issues and data breach issues.... Some of the concerns that have arisen include data security issues and data breach issues....
Preview sample
Health Care Dysfunctions and Their Solutions
6 pages (1829 words) , Download 3 , Essay
Free
Many US citizens who live near the US - Canadian border often will cross the border to fill medical prescriptions.... Funding for the existing government health care systems is declining due to the same reasons that Social security is facing implosion.... uring the last national election, Oregon placed on its ballot a state wide comprehensive health care program....
Preview sample
Globalization, Multinational Corporations and U.S. Hegemony
9 pages (2250 words) , Download 2 , Research Paper
Free
and Mexico; so much so that in 1997, when less than a quarter of mexican banks were foreign owned, the current situation is that most of the major banks in Mexico are owned by a few global corporations in Wall Street while none are owned by Mexicans (www.... According to the research findings, it can, therefore, be said that multinational corporations have a considerable impact at local, regional and national levels.... Such cultural domination is viewed as a particularly dangerous process because it produces a homogenization of culture in line with dominant countries such as the United States – “the fundamental concepts of a society's national image are remodeled in the American image” (White, 1983, p 120)....
Preview sample
Globalization with Social Issues and Public Policy
11 pages (3364 words) , Download 0 , Assignment
Free
Security threats; it is an evident fact that the advent of globalization has seen increased instances of newly emerging threats to national security.... It has also emerged that globalization manifests itself in diverse dimensions ranging from political, health, economic, security, socio-economic and cultural among others.... Secondly, there is the emergence of international crime, for instance global terrorism which make some national governments to greatly depend on international bodies like the UN security council....
Preview sample
Home Land Security: Measures Suggestible to Establish an Effective Media Relations Capability
9 pages (2250 words) , Download 2 , Term Paper
Free
Homeland security and Communication (College) Homeland security and Communication Introduction Potential communication channels are very crucial for effectively dealing with the events before, during, and after a disaster scenario.... FEMA is a national emergency response team that works with the mission to support the citizens and first responders in order to mitigate all hazards.... Hence, cooperative disaster response operations with established national agencies like FEMA would greatly assist crisis communication team to mitigate the dreadfulness of the disaster....
Preview sample
Influence of Pictures in Support of Popular Opinion of War
8 pages (2050 words) , Download 2 , Essay
Free
The agitated interest groups and emotional civilians could not withstand the provocative messages contained in the pictures and hence urged the governments to join the War in order to ensure national security (Allan, 2003).... The mass media fueled the popular opinion on War through showing the pictures of enemy weapons and analyzing how such weapons posed a great threat to their stability and security.... Pictures of women being raped by soldiers during war prompted feminist groups to urge the nation to join in the war while those containing images of burning property prompted the humanitarian groups to join urge the national governments to take military action against countries that breached civilian rights (Dowling, 2006)....
Preview sample
Uprisings in Bahrain and Syria
12 pages (3000 words) , Download 2 , Research Paper
The main demands included disbanding of incumbent national Assembly, a new constitution modeling Bahrain as a constitutional monarchy ruled by the Khalifa family and formation of a commission to investigate and revoke the politically motivated naturalization of aliens (Bassiouni, Rodley and Al-Awadhi 75)....
Preview sample
Influence and contribution to the psychology of women by Karen Horney
8 pages (2226 words) , Download 4 , Essay
Free
We exchange security for opportunity and then feel anxious and insecure.... James Huffman puts a great stress that the sense of threat and the inferiority complex that have influenced the American character from the beginning of our history, which has resulted in a compensatory self-idealization and a search for national glory....
Preview sample
The Rise of Al-Qaeda
10 pages (2500 words) , Download 3 , Research Paper
Al-Qaeda is the biggest menace to the security of the United States of America.... Name Professor Course Date Gerges, Fawaz A.... The Rise and Fall of Al-Qaeda.... Oxford: Oxford University Press, 2011.... "P.... 9-38" Al-Qaeda remains the West's greatest threat according to the commentators and analysts....
Preview sample
Canada as a Liberal Middle Power in International Relations
6 pages (1500 words) , Download 2 , Literature review
Free
Additionally, the Canadian-US border policies have always taken the approach of openness but with the Harper regime, the border has thickened in favour of security.... As such, it has historically focused on issues such as peacekeeping, human security, development and multilateralism (Pratt, 1988).... Canada argued against the concept of collective security and stressed that the role of the League was not punishment but conciliation and mediation....
Preview sample
How Police, Doctors and Philosophers Help to Solve Crimes
5 pages (1424 words) , Download 1 , Essay
Free
The ministry has total accountability for law, order and public security.... Women officers work in definite police departments, such as inquiries, airport security and criminal investigation.... The national police have a basic responsibility for sustaining public order, as well as preventing and investigating crimes.... Candidates of the national Guard, usually attends the Kuwaiti Military College, where they get specialized guard training....
Preview sample
Labor Relation Law and The Railway Labor Act
15 pages (3750 words) , Download 2 , Essay
Free
he corollary effect on job security for the union members.... erceived these changes as a threat to job security.... The contract guarantees job security for all ... In an attempt to suppress undue advantage, the national Labor Relations Board was established as the overseer.... The national Labor Relations Law and The Railway Labor Act ... The national Labor Relations Board is a five person appointed federal agency ...
Preview sample
Elements of Film Thinking - Touch of Evil
5 pages (1526 words) , Download 2 , Movie Review
Free
The paper "Elements of Film Thinking - Touch of Evil" argues that film is a triumph of style and technique.... Touch of Evil was promoted as a crime-thriller.... However, it is fair to claim that the film overlaps several genres.... For example, there are obvious film noir characteristics.... ... ...
Preview sample
Public Policy And Administrative Communication
4 pages (1000 words) , Download 3 , Admission/Application Essay
Free
For instance, illegal mexican immigration has adversely impacted American employment sector for the past few decades.... Generally, administrative responsibility mainly includes security, transport, budgeting and cost control, EMS policies and objectives, and environmental management programs.... Politics is beneficial to establish a social set up and national identity which are essential for the viable operation of a country.... However, effective politics of administrative reforms can have great influence on national affairs....
Preview sample
The Health Challenges of African-Americans
12 pages (3000 words) , Download 2 , Term Paper
Free
edicare is a federal government funded insurance program for disabled young adults, persons above the age of 65, and those with permanent disabilities who become eligible for Social security.... edicaid is a national state-run health program that is designed to provide health care for low-income children, working families, and people with disabilities.... This was the first national report to document health disparities between majority and minority populations in the United States....
Preview sample
Study of Diego's Medical History
42 pages (10274 words) , Download 3 , Research Paper
While organizations are not required to fully employ all the methods and objects of assessment contained within the assessment, a couple of procedures have been identified for security associated controls deployed from within.... The paper "Study of Diego's Medical History" tells the Relevance of the Assessment Case in Handling Diego's Case....
Preview sample
The New Politics of Public Policymaking
7 pages (2014 words) , Download 2 , Coursework
Free
The result of these policies came in the form mexican – American and Native – American groups and unions which managed to accomplish significant motives in the long run.... The movement also demanded security rights against domestic violence and rape. ... In the early 70s, national Health Insurance bill was enacted, which was financed by the federal revenues and taxes.... national Library of Medicines, 2013). ... national Library of Medicines, 2013). ...
Preview sample
Living in the Long Emergency
4 pages (1206 words) , Download 2 , Essay
Free
This path is the best to long-term security in favor of a get rich quick mentality and in most cases luck leads that mentality leads to getting something for nothing (Kunstler 321).... The national government is most likely going to lose influence and credibility and regional coalition of states....
Preview sample
Are Whistle Blowers Heroes or Traitors
4 pages (1000 words) , Download 3 , Essay
Free
lexandra Marks in her article “national security vs.... whistle-blowing” talks about whistle blowing from unusual perspective: whistle blowers can put the national security of the United States under risk through raising the secrets and making them available to the public.... In British citizens are less concerned with national security, but the problem still exists. ... “national security vs.... For those without a firm religious grounding, the fall from public grace can be particularly hard since security and success at work tend to be two of their most important psychological safety nets (Andersen, 20)....
Preview sample
2851 - 2900 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us