StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Ethnic Cleansing
3 pages (787 words) , Download 4 , Essay
Free
The process involved elimination of minority communities who were considered as a threat to national security (Glenny 120).... Nazism and the Balkan war are some examples of national cleansing that may have resulted directly from nationalism.... The French ideology of assimilation is a good example of ethnic cleansing that was imposed to protect the national interest of French citizens.... Westernization can therefore, be considered as a form of nationalism that avoids national cleansing as their sole means of promoting the interests of a particular society....
Preview sample
Womans eyes an american history
2 pages (500 words) , Download 2 , Essay
Free
First, I would take the pot of the porridge out of fireplace.... The porridge had been cooking all night over embers and would still be warm.... I will serve this with molasses, which I.... ... ... Then, I would check to see if there was any meat left from supper, so that it is eaten before it is spoiled....
Preview sample
Personal Savings and Insurance
5 pages (1250 words) , Download 2 , Essay
evaney, Anong and Whirl (2007:176-177) suggests at the very primitive reason behind an individual's or a family's savings is financial security which guarantees safety for the basic necessities for living.... There is also a need of financial security for unexpected emergencies, illness or unemployment.... The improving economic conditions nationally and internationally and recovery from recession is encouraging people to spend more and save a smaller proportion of the income because the economy is doing very well and they can rely on their spending and previous investments for financials security....
Preview sample
Social Movements and the Development Process
16 pages (4362 words) , Download 2 , Essay
Free
They also demanded security for all the prostitutes who were working and living in the country (Tarrow, 2004).... The people within the Asian region have usually extend their family networks for the purposes of security and establishing locally based credit systems which are informal (Bayat, 2000).... An example of the mobilization processes that occurred in Asia was the “yellow revolution” which took place within the Philippines involving incidents of nationalism along with national disintegration for the purpose of democratizing their country (Tilly, 2001)....
Preview sample
The US-China Taiwan Crisis
8 pages (2565 words) , Download 3 , Essay
Free
To further establish this, the Chinese government was able to retain the seats they held at the UN with five members still sitting at the security Council.... The relationship approached developed the Taiwan Relations Act, which persuaded both sides to create mutual security treaties, as opposed to separating as a nation.... The persuasion was followed with a sense of security that could be used for those in East Asia (Goldstein, Schriver, 147: 2001)....
Preview sample
Criminal Laws and Law of Tort
4 pages (1112 words) , Download 2 , Article
Free
ue to some recent issues surrounding plant security, Bug has to address some concerns both with a focus on short and long-term solutions.... Since Bug has at least two full shifts, the lighting and security for night shift workers must be addressed.... If security is present, then the rounds made by the guards should be increased, even if the company has to purchase some type of motorized vehicle.... Both the vendor and employees who were victimized can claim reasonable apprehension of imminent harm because Bug knew its lighting and security process were not fully operational....
Preview sample
The Transacting Out of a Business Function to Be Performed by Another Company
8 pages (2298 words) , Download 5 , Term Paper
Free
employee generally incurs heavy expenses due to heavy taxes on account of social security, medical facilities, health insurance, etc.... Fourth, security problems: Before a firm decides on outsourcing, it has to bear full responsibility for all the actions of its employees; this sometimes proves to be a problem for the firm because when these employees are transferred to another country due to off-shoring, their legal status changes.... This creates security and legal problems that ought to be dealt with through the legal agreement between the firm and the third-party organization....
Preview sample
Recent Cyber-Attacks That Have Affected Businesses across the World
6 pages (1873 words) , Download 0 , Essay
Free
Cyber security ... A few viruses, for example, Conficker, spread through a system of computers (remote access) by abusing gaps in the system security or by joining a tainted USB drive to a computer (Kawanaka, Matsumaru & Rokugawa, 2014).... The Australian Government has made moves to animate more prominent enthusiasm toward cyber security among businesses, however the expansive number of offices and organizations included in the conveyance of the National Cyber security Program can make it troublesome for firms to know where to strive for direction....
Preview sample
Where would Globalization be without Outsourcing
5 pages (1250 words) , Download 2 , Essay
Free
The procedures have the potential to deal with the behind the border issues and resembles the role of European Court of Justice.... Another recent development is supranational institutions was the development of European security and Defense Policy.... Contents Contents 2 Globalization 3 Role of the nation 3 Recent developments in supra-national institutions 4 Recent developments in international policy and treaty making 5 Possible institutional future 6 Significance of the anti-globalization protest movement 6 References 8 Globalization The United Nations Economic and Social Commission have put forward a different definition of globalization....
Preview sample
Identity Theft Through Unsecure Wireless Networks
6 pages (1821 words) , Download 2 , Literature review
Free
It is quite evident that a walk with a Wi-Fi enabled phone or laptop it's easy to steal internet, this is just because most of the network have no security.... Disable remote administration, this helps you prevent hackers from unilateral changing your network security settings.... Use of firewall, this is where a number of integrated collection of security measures are made in order to prevent unauthorized electronic access to a networked computer system....
Preview sample
Illegal Immigrants Should Receive Social Services
3 pages (750 words) , Download 4 , Assignment
Free
Alambrista and the US-Mexico border: Film, Music, and Stories of Undocumented Immigrants.... These reasons are illegal immigrants pay taxes, offer cheap labor, and pay taxes on social security, Medicare, and unemployment insurance.... he fact that illegal immigrants contribute towards the Social security and Medicare directly to support older US citizens is the other ground on which they should be supported to enjoy social services.... The fact that illegal immigrants are not authorized to enjoy social security and Medicare services makes it humane that they be considered for other social services....
Preview sample
America and World War One
4 pages (1155 words) , Download 2 , Essay
Free
However, the letter threatened not only America's economic interests, but also sovereignty because Germany was ready to assist Mexico in usurping all mexican territories annexed by America.... The 20th century remains an important period in American history following groundbreaking events at the local, national, and international levels, which contributed to America's rise to the summit of the world.... America and World War One The 20th century remains an important period in American history following groundbreaking events at the local, national, and international level, which contributed to America's rise to the summit of the world....
Preview sample
Curtin Hospital Information Management Strategic Plan
15 pages (4134 words) , Download 0 , Coursework
Free
The strategic plans also help in creating a framework that will be used by the department in acquiring the necessary health information technology that will aid in it managing health information and ensuring that this digital format information is on hand whenever it is needed while constantly maintaining the very highest standards of confidentiality, data integrity as well as security. ... o become a model of effective hospital information management through the use of technological and human resources and in the process guarantee the trust and security of patients, while assuring honest and ethical best practices. ...
Preview sample
Network Systems and Technology
12 pages (3270 words) , Download 2 , Term Paper
Free
Moreover, for maintaining and monitoring the network, we will discuss network security features that will be implemented in this proposed network.... Likewise, RADIUS is a security protocol and a “de facto standard protocol for authentication servers” (Remote Authentication Dial In User Service security.... 2007) that is based on a client/ server architecture and RADIUS server stores security information.... By acquiring the RADIUS server, Jan and Kim will have the following advantages: Data related to security will be distributed on the network and may include several devices that may interact with the security data....
Preview sample
The four basic health care system models
1 pages (250 words) , Download 7 , Essay
Free
In contrast, national Insurance Model contains some components of both Bismarck and Beverage models involving private-sector providers where the beneficiaries are able to negotiate for the services rendered at the best and affordable prices (Health Disparities Conference & Wallace, 2008).... However, the health care cost within the national care model is regulated by the government especially adopted in Canada and South Korea....
Preview sample
A Transnational Corporation Influence on the World Economy
19 pages (4750 words) , Download 4 , Case Study
Free
company in Mexico, started an income continuity plan designed to counteract the sharp decline in wages usually experienced by mexican retirees ("Corporate Social Responsibility in Latin America," 2001).... echnology transfer relates very closely to the movement of corporations across national borders.... International investment contributes to the national income of the country also via an increase in government income.... These include the national income per capita, amount of human capital, barriers to trade, and "institutional development, which captures factors such as the rule of law, the degree of corruption, the quality of public management, the protection against property rights infringements and discretionary government interference" (2004, p....
Preview sample
Identity Theft in the Organization
12 pages (3000 words) , Download 3 , Research Paper
Free
dentity theft is defined as a situation in which a person steals the whole identity of a person that he or she has studied for some time; it may be the identification number or social security number.... This is especially in hospitals where the patients use their social security numbers and in financial institutions.... Installing the aforementioned security system would help to control the employees since they will be afraid of manipulating the clients' information and cannot visit sites that may help them to get malicious motives on the client's information (Henk, Tilborg, & Jajodia, 2011, p....
Preview sample
Patient Rights and Ethical Issues: The Significance of the Nuremberg Code and Belmont Report
7 pages (2078 words) , Download 3 , Essay
Free
Hence, the national Research Act of 1974 was passed into law to strengthen the protection of human participants in clinical studies.... This gave way to the creation of the national Commission for the Protection of Human Subjects of Biomedical and Behavioral Research that was legislated to classify the ethical principles biomedical and behavioral research encompassing human subjects.... They are also tasked to strictly oversee that research studies are following their guidelines (national Commission on the Protection of Human Subjects of Biomedical and Behavioral Research)....
Preview sample
The Significance of the Nuremberg Code and Belmont Report
7 pages (2077 words) , Download 0 , Report
Free
Hence, the national Research Act of 1974 was passed into law to strengthen the protection of human participants in clinical studies.... This gave way to the creation of the national Commission for the Protection of Human Subjects of Biomedical and Behavioral Research that was legislated to classify the ethical principles biomedical and behavioral research encompassing human subjects.... They are also tasked to strictly oversee that research studies are following their guidelines (national Commission on the Protection of Human Subjects of Biomedical and Behavioral Research). ...
Preview sample
Development of GIS in Qatar
15 pages (3927 words) , Download 3 , Essay
Free
ata security ... he strategically pertinent national GIS database's security has to be handled in-house, and the GIS software does not really have much to offer in this light.... Towards this end, the Center for GIS (CGIS) and the national Steering Committee were formed in 1990.... Acting upon these recommendations, the state do Qatar established a national Steering Committee for GIS, and its center.... ith a top-bottom approach, Qatar followed a country-wide GIS policy and created a national GIS Steering Committee made up of top executives in government hailing from different agencies, and a Center for GIS....
Preview sample
Book Review for Dr Fukuyamas Book; The Origins of Political Order
5 pages (1250 words) , Download 2 , Book Report/Review
Free
Dr Fukuyama's book is a blend of social biology, anthropology, political science and biology.... In his book, Fukuyama has examined political systems back from Pre-human times up to the time of the French Revolution.... Fukuyama has also outlined major political history.... ... ... ... Fukuyama has also outlined major political history and history from the time of principal civilization movements up to modern institutions....
Preview sample
Marketing strategy and activities of an organisation
18 pages (4500 words) , Download 4 , Assignment
Free
This research aims to evaluate and present elements of marketing process such as product, price, place and promotion.... This essay also explores the benefits and costs of marketing orientation of BT and macro and micro environmental factor influencing marketing decisions.... .... ... ... This research is the best example of comparison of marketing products and services to businesses rather than consumers....
Preview sample
Reasons for the Occurrence of Osteoporosis
4 pages (1000 words) , Download 0 , Research Paper
Free
As more citizens continue to age and live longer, the national figures of the elderly who suffer from osteoporosis will continue to increase. ... he national Institute of health estimates that 25 million people in the U.... alone have Osteoporosis, while the national Osteoporosis Foundation estimates that 10 million people in the United States over the age of 55 have Osteoporosis....
Preview sample
Barack Hussein Obama
4 pages (1000 words) , Download 2 , Research Paper
Barack Hussein Obama is the 44th President of the United States.... He is leading America at a very difficult time in this nation's history.... The country and much of the world is suffering through the worst economic retraction in 80 years.... Unemployment, mounting government debt and rising poverty are just a few of the problems that President Obama is facing right now....
Preview sample
The Public Health Infrastructure, and the Status of World
4 pages (1000 words) , Download 2 , Essay
he Afghanistan government should aim towards food security, with priority sited on the eradication of food contagion; inclusive and sustainable water plans to ensure secure drinking water and cleanliness to prevent both chemical and microbial pollution, and endorsement of health teaching, vaccination and provision of vital medicine (Wright, 2009).... The various applicable programs in Afghanistan are; Meeting basic health care wants, mainly in rural regions, putting up primary health infrastructures, planning and monitoring, endorsing research and methodology progress, control of contagious diseases, national free health systems, protecting defenseless groups, meeting the town health problem, decreasing health risks from ecological effluence and hazards, and meeting basic health care wants, mainly in rural regions ...
Preview sample
Thomas Hobbes vs John Locke
6 pages (1500 words) , Download 3 , Essay
Free
In other words, the state of nature, as described, is one which fails to guarantee or establish any degree of security or legitimate and stable leadership over a community. ... The essay "Thomas Hobbes vs John Locke" focuses on the critical analysis of the philosophical positions of Thomas Hobbes and John Locke....
Preview sample
Predictors of socio-cultural and psychological adjustment of Polish immigrants in the UK
24 pages (6000 words) , Download 2 , Essay
The study obtains some information from 100 Polish residents in Britain with the hope of determining if their educational status.... ... ... The outcomes of the research strongly demonstrates that the ability of Polish immigrants to adjust to life in Britain is a matter of many factors, which include but not icted to ability to speak fluent English, socio-cultural factor, psychological factor, level of education, relationship with the host nationals and the relationship with co-nationals....
Preview sample
12 Billion Pounds NHS Computer Scheme Project
12 pages (3000 words) , Download 2 , Essay
Free
national Health Service has been giving independent service, offered by each hospital.... national Health Service has been giving independent service, offered by each hospital.... national Health Service has been giving independent service, offered by each hospital....
Preview sample
Hospital Health Information Systems: Are Failures Problems of the Past
8 pages (2492 words) , Download 1 , Coursework
Free
It supports the national Programme for information technology, which is a significant e-health initiative that can improve the provision of health care.... It supports the national Programme for information technology, which is a significant e-health initiative that can improve the provision of health care.... ublic health organizations such as national Health Service need well-planned information systems to make maximum use of the growing supply of data related to health (Williams, Nicholas & Huntington, 2003)....
Preview sample
Business and Technical Challenges for Transitioning Cloud Computing in Blah-Blah Telecoms
8 pages (2302 words) , Download 2 , Case Study
Free
Information security Management Executive Summary The report is based on understanding the business and technical challenges for transitioning cloud computing in Blah-Blah Telecoms.... There are four key challenges that must be considered by Blah-Blah Telecoms consisting of recognition of services, relocation of infrastructure, safeguarding of information security and new application challenges.... In order to mitigate the issues, there is a need to undertake various approaches by Blah-Blah Telecoms such as relocation roadmap, integration of the existing applications with cloud and implementation of security measures among others....
Preview sample
The Impact of Globalisation on the Changing Role
22 pages (5500 words) , Download 2 , Essay
This essay analyzes that globalization has many implications upon various nations.... Although there are many nations who are open and ready to jump into the globalization bandwagon, there are still some nations that are reluctant to adapt to the trend.... ... ... ... This essay looks deeper into the underlying reasons why the French State to some extent shies away from the idea of globalization....
Preview sample
Establishment of Law about Internet Censorship
4 pages (1346 words) , Download 0 , Essay
Free
Internet censorship would guarantee social morality and national security (Silverman and Maass 1).... Internet censorship establishes guidelines that guarantee security for online property.... In establishing this law, governments seek to protect public morality and enhance security of intellectual property and individuals.... Subject to these benefits, various corporates and national leaders are seeking to establish a law that will enable the federal government to censor the internet....
Preview sample
The Launch of the United Nations Millennium Development Goals in Tackling Poverty
8 pages (2452 words) , Download 0 , Essay
Free
The majority of these workers have jobs that lack the communal security and protection nets that protect against times of lesser financial demand, and they are usually powerless to produce adequate investments to compensate tough times.... ‘World Trade Organization and the Millennium development Goals: The Role of Multilateral Trade Negotiations in Achieving Food security for the Worlds Most Vulnerable Populations, The'....
Preview sample
Tourism Concepts
5 pages (1250 words) , Download 2 , Research Paper
It is the largest man made Aquatic Park in America (national Park Services, 2009).... It has numerous museums and other cultural places (national Park Services, 2009).... Also, there is Cabrillo national Monument that is the historical exhibition of Juan Rodeiguez Cabrillo and World War 2.... (national register of Historic places, 2007)....
Preview sample
Influence of Cultural Differences on Communication Process between Korean Culture and American Culture
9 pages (2250 words) , Download 2 , Research Paper
Free
ndividualism is “the opposite of collectivism; together they form on of the dimensions of national cultures.... The paper "Influence of Cultural Differences on Communication Process between Korean Culture and American Culture " describes that high-context Korean citizens are more likely to employ indirect communication strategies than their low-context US American counterparts....
Preview sample
The Main Features of Fascist Political Thought
8 pages (2000 words) , Download 2 , Research Paper
Free
Italian fascism advanced an ideology of extreme nationalism, secular idealism and national rejuvenation.... Additionally, it drew upon corporatist ideas of harmony through hierarchy and advocated national efficiency.... ascism, like similar movements elsewhere in Europe, sought to give its ideology legitimacy by claiming that its origins lay in an ancient and more glorious national past.... The ethos of the Italic race and the traditions of ancient Rome, evoked in the mysticism and ritual surrounding much of fascist public display, provided the regime with the national roots of official culture....
Preview sample
Organizational Change Plan - Part II
4 pages (1000 words) , Download 2 , Essay
Electronic Medical record can be divided in to EMR standards that include the patient privacy and security issues, the EMR infrastructure that include the telecommunication systems (Rodrigues, 2010).... Organizational change plan- part II Name: University: Abstract: Electronic medical record (EMR) systems offer opportunities for managing clinical and medical data in ways that aim at improving patient health care....
Preview sample
Design a Security System of Smith Brooks Company
12 pages (3000 words) , Download 0 , Case Study
Free
"Design a security System of Smith Brooks Company" paper argues that with the enlisted security devices and orientation explained, a solid security system as such is strong and autonomous such that the Smith Brooks organization has little worry over the safety of its infrastructure and products.... As pertaining to data security, a firewall needs to be installed at the administration facility since it links the organization with the outside world through the internet....
Preview sample
The Security System Design to the Smith-Brooks Company
13 pages (3250 words) , Download 0 , Case Study
Free
The paper "The security System Design to the Smith-Brooks Company" presents various threats that the Smith-Brooks company faces and the threat detection system for countering these threats.... This will help the company to greatly reduce its vulnerability to security threats.... security engineering design aims to provide mitigation strategies to protect assets, including people, information, and property (Dandy et al.... Such developments include the design, installation, and commissioning of physical security systems in line with the overall objectives of the security strategy....
Preview sample
Impact of Nationalism and Imperialism on International Security
13 pages (3250 words) , Download 0 , Literature review
Free
The author of this paper "Impact of Nationalism and Imperialism on International security" will make an earnest attempt to assess the impact that the phenomena of nationalism and imperialism, specifically in the 20th Century, have had on international security.... The paper focuses on instances where either phenomenon has disrupted international peace and security.... The core of the argument within the paper of international security will be limited to its traditional sense- lack of or presence of military conflict....
Preview sample
The Benefits and Risks Associated with Linking Development and Security
9 pages (2250 words) , Download 0 , Essay
Free
This essay "The Benefits and Risks Associated with Linking Development and security" discusses policymakers and practitioners that perceive development and security as interdependent and interlinked.... Tt=he shortcomings and implications of linking security to economic development have not understood.... On the other hand, security can be defined as a defense posture that has been characterized by the ability to overcome or resists 'destructive action or hostile action' from external or/and internal aggressions (Paleri 2008)....
Preview sample
A Security Plan for the Smith-Brooks Corporation
12 pages (3000 words) , Download 0 , Case Study
Free
This case study "A security Plan for the Smith-Brooks Corporation" discusses the design and plan of an efficient PSPS that follows a systematic methodology.... The plan should be able to evaluate the security design to determine how well it attains the purposes.... Therefore, organizations require flexible systematic approaches in the application of security elements to address security conditions....
Preview sample
Drone Warfare and the Poststructuralist Approaches to Security
12 pages (3000 words) , Download 1 , Essay
Free
This essay "Drone Warfare and the Poststructuralist Approaches to security" investigates the recent rise in drone warfare.... Drone exposes the integral recruitment process for young pilots at gaming conventions, redefining ideologies of warfare and what 'going into war' means today....
Preview sample
Evaluation of Staff Training Program on Nurses Especially in the Emergency Department
15 pages (4291 words) , Download 0 , Literature review
Free
This vibrant environment and its likelihood for violent disruption have emergency room workers, physicians, hospital management and security professionals (Bourgeois, 2004).... isk assessment programs are important programs especially in institutions identified as bearing security risk factors and other risk signals.... he essential staffing levels required to ensure security of health care staff may also be considered as apparent.... he essential staffing levels required to ensure security of health care staff may also be considered as apparent. ...
Preview sample
Law and Ethics in Nursing Practice
10 pages (2782 words) , Download 4 , Case Study
Free
The Federal Patient Self-Determination Act of 1990 defines an Advance Care Directive as “a written instruction --- recognized under state law, relating to the provision of care when the patient is incapacitated” (Arizona Department of Economic security web site).... rizona Department of Economic security....
Preview sample
The United States in the 1920s and the 1950s
5 pages (1322 words) , Download 9 , Assignment
Free
The main issue of this era was inflation, the rise in consumer prices, in indirect business taxes as well as social security taxes.... Americans were worried about their domestic security, for which Truman and Eisenhower took measures and created a policy to declare it to public that America is prevailing and independent. ... Harding was appointed as an operational assistant to president and was inherited huge national and international issues....
Preview sample
Contrast between Japanese Ninja Anime and American Ninja Cartoon
4 pages (1000 words) , Download 2 , Essay
Free
Teenage mutant Ninja Turtles is a Japanese fictional film that portrays the story of four fictional characters filmed by Americans.... Naruto the Movie: Ninja Clash in the Land of Snow is a Japanese action movie, based on anime and manga, that uses animated characters.... his paper compares and contrast Japanese anime ninja to the American cartoon ninja....
Preview sample
Advertisement or Commercial Engaging a Value System in order to Sell
3 pages (750 words) , Download 2 , Essay
Free
Advertisement is an important component in marketing and business management.... ithout advertisement, it is like marketing in the dark because consumers and customers would hardly notice the presence of goods and services.... .... ... ... Advertisement is an important component in marketing and business management....
Preview sample
Analysis of the Mode of Communication Used by Police Officers Law and Order Show
6 pages (1500 words) , Download 1 , Assignment
Free
"Analysis of the Mode of Communication Used by Police Officers Law and Order Show" paper states that at the workplace, one needs to communicate effectively to be able to work in the most efficient manner.... If the flow is broken or disrupted, the progress of the work is hindered.... .... ... ... One of the most major forms of communication used was the internet....
Preview sample
Methods That Could Be Used by an Organization in Order to Expand Overseas
4 pages (1172 words) , Download 2 , Essay
Free
From the paper "Methods That Could Be Used by an Organization in Order to Expand Overseas" it is clear that exchange rate exposure pertaining to transactional elements occurs owing to cyclical variations in the rate of currency involved which leads to loss of business and revenue.... ... ... ... The process of international expansion is made possible by the business corporations depending on certain premises like conducting trades related to exporting of commodities to foreign nations, through rendering investment in business units created in foreign territories, opening up of new production units in the foreign locations....
Preview sample
29701 - 29750 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us