StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Outstanding patient care issue
7 pages (1750 words) , Download 3 , Research Paper
Free
A health care association should assess its safety planning efforts with respect to care and treatment of patients before a serious breach to security occurs, rather than waiting for an event that compromises safety and makes a patient's outcomes and life well publicized.... Improve patient security by persuading them to enquire or report strange happenings other than planned....
Preview sample
Job Specifics of a Social Worker from a Multipurpose Social Service Agency
24 pages (6050 words) , Case Study
Nobody downloaded yet
The paper "Job Specifics of a Social Worker from a Multipurpose Social Service Agency" recommends such an algorithm of actions: identifying issues, sharing hypotheses, establishing goals, developing, identifying, and rehearsing steps, focusing, sharing ending feelings, and saying goodbye, etc.... ...
Preview sample
The Liberal Political Tradition
6 pages (2087 words) , Download 1 , Term Paper
Free
The primary object and objective of social policy was thus security- the security of property rather than of the life circumstances of the poor' (Wolin.... This crucial rather obsessive security concern overlooked even the distributional pattern of property on the basis of gender.... ‘Provision of limited security for an indefinite period may be incompatible with full rights of citizenship' (Hayek....
Preview sample
Dark Tourism
6 pages (1711 words) , Download 1 , Literature review
Free
In many cases, the dark tourist sites are tied to the national identity, which may give the visitor a feeling of triumph that they had survived the event or it might give the sense of pilgrimage making the site important to the tourist.... This literature review "Dark Tourism" focuses on a form of culture that involves people visiting places of death, human tragedy, and other forms of atrocities done to people in the world....
Preview sample
The Morality of Indigenous Health
8 pages (2315 words) , Download 0 , Literature review
Free
For instance, the 2001 national Drug Strategy Household Survey, established that 45 percent of aboriginal individuals who smoked on a daily basis were 14years and above.... ustralian Bureau of Statistics (2006) national Aboriginal and Torres Strait Islander Health Survey: Australia, 2004-05....
Preview sample
Analysis of Symptoms of Post Traumatic Stress Disorder
6 pages (1500 words) , Download 3 , Assignment
Free
According to the national Center for PTSD, medication is used to “ameliorate posttraumatic reactions and to prevent the later development of PTSD” (par.... Because the amygdala has been impaired, the individual is unable to stop their reaction to the trigger, which creates a constant level of fear for the individual (national Center for PTSD, 2009, 2011).... The national Center for PTSD (2009, 2011) suggests that there are many areas of the body to consider when providing medication....
Preview sample
Identifying Threats and Vulnerabilities to Computer
6 pages (1836 words) , Download 1 , Report
Free
The case study provides an example of how security lapses can occur and expose the system's vulnerabilities.... This paper looks into the threats and vulnerabilities that the event exposed and examines the security principles that were broken.... Assessment Computer security Program Matriculation number Word Count: 1526 words Contents 3 Introduction 4 Identifying Threats and Vulnerabilities 4 ... xamination of the security Principles Broken 4 ...
Preview sample
How the African and Native Americans Contributed to the Colonial American History
3 pages (935 words) , Download 4 , Essay
Free
The paper "How the African and Native Americans Contributed to the Colonial American History" discusses that generally speaking, the two minor groups contributed immensely to the activities of colonial America through their inputs and struggle for freedom.... ... ... ... The arrival of black Africans into the American continent ushered a new episode into the history of the continent, this group of immigrants later gained freedom with the abolition of the slave trade and slavery in the continent....
Preview sample
Fixed Base Operator
10 pages (2500 words) , Download 3 , Essay
Free
Citizenship details in multi-national operations to ensure compliance with laid down regulations.... It is the policy of most aviation companies to provide equal employment opportunity to all individuals regardless of their race, creed, color, religion, sex, age, national origin, disability, military and veteran status, sexual orientation, marital status, or any other characteristic protected by state or federal law.... ll recruiting, hiring, training, promotion, compensation, and other employment related programs are provided fairly to all persons on an equal opportunity basis without regard to race, creed, color, religion, sex, age, national origin, disability, military and veteran status, sexual orientation, marital status or any other characteristic protected by law; ...
Preview sample
Integration Theory and Policy Development in the EU
8 pages (2391 words) , Download 2 , Case Study
Free
There appears to be little attention given to placing the cross border dialogue at the heart of the political structure.... With regards to security, integration gives rise to a border between the economically wealthier states and those regions that are deprived or unstable outside it.... Here too more powers rest with the national executives of the states and their advisory boards.... Ozone policies and other environmental polices are less concerned with national interests and are proposed with a wider public interest....
Preview sample
Economics of Race and Gender
7 pages (1919 words) , Download 2 , Essay
Free
Moreover, in many parts of the world, the poorest people still live in isolation from the governments and do not get the right to speak, right to socials security and the right to vote.... Lastly, a woman shall not work outside if she believes that despite her job is paying higher than her husband's job but does not have much prospects of growth and does not provide social security benefits but the same is not true for the job of her husband (Andersen & Taylor, pp....
Preview sample
Pharmaceutical Patents: An Emerging Global Health Problem
2 pages (500 words) , Download 2 , Essay
Free
Therefore, in order to realize more just global health results, health approaches should be motivated by the main concerns of public health and should consider more general health policy conditions, such as the requirements of certain national health institutions.... The paper "Pharmaceutical Patents: An Emerging Global Health Problem" will begin with the statement that one of the major challenges in global health today is the development of innovative medical technologies and guaranteeing their distribution in less developed countries (LDCs)....
Preview sample
Current Scale, Scope and Diversity of Hospitality Industry in the United Kingdom
11 pages (3188 words) , Download 0 , Assignment
Free
At the same time, the safety and security concern has also increased due to several terrorist activities.... Thus, increased security measures are adopted by the UK government so as to ensure safe journey and stay of the guests (Numphud, “Industry Insight: The Hospitality Industry – The Answer to Unemployment?... The security system of the hotels and restaurants should be more efficient so that the guests do not have to face dangerous situation....
Preview sample
Installing and Administering IPSec
9 pages (2549 words) , Download 3 , Term Paper
Free
This paper "Installing and Administering IPSec" presents an introduction of a security standard, called, IPSec and its capabilities in ensuring secure communication in the network.... IPSec basically uses a combination of protocols such as Authentication Header, Encapsulating security Payload, etc.... Each protocol plays its part in improving the security, integrity, and confidentiality of communication by using different algorithms for encryption and authentication....
Preview sample
Hierarchy of Needs by Maslow
6 pages (1842 words) , Download 2 , Essay
Free
o start with, the Maslow's theory groups the human needs into five groups namely the physiological needs, safety and security needs, social needs, esteem needs and self actualization needs that are attained sequentially from the physiological to self actualization.... After satisfying the basic needs, human beings feel the need for security in order to carry out their different daily operations.... For instance, an employee can switch from the need of job security to the need of promotion when there is an available vacancy in the organization....
Preview sample
How Aircraft Carriers Helped the US in WWII
7 pages (2222 words) , Download 3 , Research Paper
Free
aircraft carrier forms a vital part of the American security force.... The use of aircraft in the World War II was part of a national grand strategy.... The paper "How Aircraft Carriers Helped the US in WWII" describes that the use of aircraft and aircraft carriers during the war was a political decision that underwent a lot of discussion among the congress members, and they finally agreed on the issue of utilising these devices in the war....
Preview sample
Growing Demands: Industrial Farming
5 pages (1446 words) , Download 0 , Case Study
Free
This was causing a stir in the country as the food security was threatened.... With the production of herbicide tolerant crops, the food security of the country was safe.... According to the USDA statistics, the emergence of HT crops was a preferred solution to food security, as noted from the data (USDA 16).... This shows an immense development in food security, as the acreage continued to rise.... This is a way of ensuring food security is enhanced....
Preview sample
Lakota Woman by Mary Crow Dog
7 pages (1750 words) , Download 2 , Book Report/Review
Free
ltimately, national memory of Sioux warriors, males as well as females, overcome such compensating strategies.... ocusing on the effect of the American Indian Movement on Mary and other Indian people and how did non-AIM Indians on the Pine Ridge reservation view AIM, we should state that AIM was extremely important concerning collective representation of national idea of Native Indians across the US, especially states like South and North Dakota.... urthermore, while Mary was drinking and doing drugs, as well as shoplifting with her Native Americans females, AIM represented to them a strong idea of collective unity, not on the level of separate tribes, but on the national level of civil rights activity....
Preview sample
Medical Malpractice: When Can Patients Sue a Hospital for Negligence
2 pages (500 words) , Download 2 , Essay
Free
An essay "Medical Malpractice: When Can Patients Sue a Hospital for Negligence?... outlines that in most cases, nurses, medical technicians, and paramedics are hospital employees but the same does not necessarily apply to doctors who at times use hospital premises to offer their services.... ... ...
Preview sample
Native American Lands under Siege: The Endless Fight against Colonization
1 pages (538 words) , Download 2 , Literature review
Free
This review "Native American Lands under Siege: The Endless Fight against Colonization " discusses an auction that is forcing the Lakota tribes to raise $6 to $10 million to save Pe' SLA.... This review analyzes this auction as part of the enduring fights against modern forms of colonization.... ....
Preview sample
Liberty, Equality, Power - a History of the American People
2 pages (635 words) , Download 2 , Essay
Free
The paper "Liberty, Equality, Power - a History of the American People" tries to find out how did the wartime mobilization affect American politics, what was important about the 1944 presidential election, and what were the provisions of the GI Bill.... ... ... ... Mobilization is a word that was first used in a military context in the 1850s....
Preview sample
Terrorism Enforcement: 9/11 Aftermath
7 pages (1935 words) , Download 2 , Research Paper
Free
The then president of the United States of America issued secret orders to intensify surveillance programs headed by the national security Agency (NSA).... A few months after the 9/11 event, the then Bush administration and Congress worked closely in putting up vital adjustments to the Department of Homeland security.... The private and public sector agreed to work together where federal agents and airport security staff performed searches to individuals for explosives and weapons which could be used for terrorism activities....
Preview sample
Impact of Personal Finance on UK Housing Market
8 pages (2000 words) , Download 2 , Essay
Free
However, huge crisis was seen in both the household and rental category during 1999 to 2003 due to factors like low income of the individuals, legal inability to purchase the housing property, instability in the tenure of security ownership and also the highly geared financial exposure caused by the price variations.... Taking this in account, many security companies has started developing different models which would help to increase the asset management value and also keeping track of securities derivative....
Preview sample
Clinical Depression in Later Life
16 pages (4745 words) , Download 0 , Research Paper
Free
The national Institute of Mental Health claims that at any one time, 10% of people are clinically depressed.... The national Institute of Mental Health claim that at any one time 10% of people are clinically depressed.... he American national Institute of Mental Health ( 2013) also describes how older people can suffer from ischemia , that is restricted blood flow as older blood vessels may stiffen and slow blood from flowing normally to reach the organs including the brain....
Preview sample
The Rapid Globalisation of Trade
6 pages (1749 words) , Download 3 , Essay
Free
“Food security has improved over the past four decades.... national spending and national employment remain government priorities, and protectionism can help to create solutions for national business by taxing extra-national business.... his fosters a sort of crisis atmosphere in which protectionism is reassessed so as to shield threatened national industries, and may set up barriers within domestic organizations, as mentioned, without the formation of a global union structure or an accurate understanding of the global economics that underlie such current trends as outsourcing labor....
Preview sample
Regulating Saudi Cities and Challenges of Jeddah Urbanization
46 pages (11500 words) , Download 4 , Dissertation
Premium+
According to the recent national Population Census of 2010, the population has risen from 22.... The urban percentage of the national population reached 87% in 2010 (UN-Habitat 2011).... The paper 'Regulating Saudi Cities and Challenges of Jeddah Urbanization' gives detailed information about institutional and spatial strategies aimed at containing urban growth and public space in Jeddah while providing an assessment of the programs' strengths and weaknesses....
Preview sample
Discussion Board
2 pages (500 words) , Download 2 , Research Paper
Free
This flexible nature has enabled Southwest Airlines to purchase the highest number of 737-700s (Bundgaard, Bejjani & Helmer, 2006)The use of information technology has never the less created the risks of security breaches.... espite strict regulations, Apple has come under numerous security breaches where its data was hacked and exposed.... One of the worst security breaches surfaced when a group of hackers exposed several thousand owners of iPad, making them vulnerable to spam marketing and hacking....
Preview sample
Identity Formation and the Borderlands
6 pages (1589 words) , Download 2 , Book Report/Review
Free
The term “border” brings to mind the war between these tow countries which culminated in the annexation of Texas to the US in the 19the century.... For her, any kind of border is to be transgressed. ... A border is a dividing line, a narrow strip along a steep edge.... In the aforementioned lines, Anzaldua describes in the language of her poetry, the risks involved in choosing to live at the border and becoming a crossroads. ...
Preview sample
Important events in the US history
2 pages (500 words) , Download 4 , Assignment
Free
in the 1960s; and limited to their own units within the security forces became history after the country settled for the black president (BBC News 1).... The attempt on the life of US President Ronald Reagan is one of the most important events in the country's history over the past 33 years....
Preview sample
Suffering of Women in the Holocaust
2 pages (500 words) , Download 2 , Essay
Free
They were promised that they would be provided food and security, but they suffered from the worst genocide and torture.... The essay "Suffering of Women in the Holocaust" focuses on the critical analysis of the suffering of women in the Holocaust, Philippine, and Cuban concentration camps....
Preview sample
Negative Impact Of Outsourcing On Economy
10 pages (2500 words) , Download 2 , Research Paper
Free
Effects on security the other effects of outsourcing are general and have their own effects that are to the country and business communities.... As had been explained in the paper, there are claims pointing out that most of the corporate put their interest first instead of job security of their local workers (Lazarus, 2004).... security threat and confidentiality The information about companies is seen to be the lifeblood, which keeps companies running....
Preview sample
Social and Public Value in the Public Sector
16 pages (4316 words) , Download 0 , Research Proposal
Free
i) security and concerns; great work is required to convince the end users that the system is safe. ... b) Information security related to the increased use of smart mobile phone devices to access the Internet (e.... he authors(Guo, Wang & Zhu) outline that are many changes in the information technology developments; in relation to gadgets such as phones and this has brought in the greatest concern about ‘information security'.... Kank (2010) went further and spilt this attacks into four broad categories which included the; mobile malignant codes threat, attacks aimed at the vulnerable points of mobile applications, the attacks aimed at mobile platforms and the ones that result from one accessing the networks without giving consideration to security (Kim & Kang 2009, p....
Preview sample
Intel Sucess: Osama Bin Laden
1 pages (319 words) , Download 3 , Assignment
Free
The exercise involved the CIA and the national security Council of the President.... The killing of Osama showed a great degree of intelligence by the CIA and other security councils.... The security Council then embarked on locating his residence....
Preview sample
The Falkland War between Great Britain and Argentina
10 pages (2905 words) , Download 0 , Case Study
Free
The war was somewhat unexpected since it not only involved a great power state, Great Britain with a minor player, Argentina but also it occurred in a period when there were sufficient past lessons to learn from such as the Falkland crisis of 1770 and there were new tools and systems designed to safeguard against interstate and international conflict and prevention of any breach of global peace and coexistence such as the United Nations security Council2....
Preview sample
Unseen Aspects of Illegal Migration
3 pages (750 words) , Download 2 , Essay
Free
In addition, there should be more security measures on the borders of the nation.... The number of illegal immigrants in the US has reached nearly 12 million, as Passel states in Pew Hispanic Center.... Presently, the records prove that 25% of all agricultural jobs are done by illegal immigrants....
Preview sample
Defining Power in the Contemporary Period
7 pages (2009 words) , Download 2 , Essay
Free
The paper "Defining Power in the Contemporary Period" presents that changes in power are now shifting from national aspects of holding a specific amount of weight to globalization.... Introduction Changes in power are now shifting from national aspects of holding a specific amount of weight to globalization.... In return, this is creating a change in opportunities and challenges among different national orders, specifically because of the shift in power that is occurring in the 21st century....
Preview sample
New Policy Statements- HIPAA
2 pages (500 words) , Download 2 , Assignment
Free
eviewing the Policy The organization or company whose policies regarding information security need to be reviewed is in the business of insurance and deals with health insurance.... Although the present policy of the company ensures high level of security but still it should structure a new policy.... ccording to the new information security policy statement of Heart-Healthy Insurance a fresh user should be provided access only after meeting the above mentioned security standards laid down in the policy statement....
Preview sample
Qatari Women in IT
15 pages (3750 words) , Download 2 , Research Paper
Free
The information is stored in a data center for security.... ob security in the IT Sector ... ob security in the IT sector is rapidly gaining stronghold as organizations continue to appreciate the need for information technology in maintaining competitiveness in the market as well as to offer effective services at minimal cost.... Rather than the conventional view of job security as having the confidence that the particular job will be present in future and that the employees will continue earning their daily bread in it, the new perspective for IT job security in Qatar is based on the fact that new discoveries open up opportunities for IT professionals....
Preview sample
Should Stem Cell Research be Unbound
17 pages (4250 words) , Download 3 , Research Proposal
Free
This paper highlights that stem cells mark the beginning of our life on earth.... They consist of the undifferentiated cells which proceed to develop into the 220 different types of cells, contained in the human body.... In 1998, researchers initiated a way of harvesting stem cells from embryos.... ...
Preview sample
The Increasing Importance of Complexity in International Relations
12 pages (3000 words) , Download 2 , Essay
Free
International relations as a field is assuming greater importance as the world continues to globalize and the economic, political and security interests of the states become increasingly interdependent.... The Increasing Importance of Complexity in International Relations Introduction International relations as a field is assuming greater importance as the world continues to globalize and the economic, political and security interests of the states become increasingly interdependent....
Preview sample
The Increasing Importance of Complexity in International Relations
16 pages (3958 words) , Download 2 , Report
Free
International relations as a field are assuming greater importance as the world continues to globalize and the economic, political, and security interests of the states become increasingly interdependent.... The Increasing Importance of Complexity in International Relations Introduction International relations as a field is assuming greater importance as the world continues to globalize and the economic, political and security interests of the states become increasingly interdependent....
Preview sample
United Arab Emirates in the International Market
8 pages (2000 words) , Download 2 , Thesis
Free
border conflicts are also evident in the federation.... here are also political and security threats facing the federation.... he federation must also resolve some political and security issues that it is facing.... UAE has a good investment atmosphere which can easily be overturned by political and security instability.... The UAE: Political and security Issues....
Preview sample
Informatics Continues to Change Nursing in Different Ways
5 pages (1540 words) , Download 3 , Coursework
Free
This comes in different forms, including the patient's medical records, their privacy, security, and confidentiality, which matter a lot in nursing ethics.... Another issue is about the confidentiality and security of the patients' personal data on the system.... According to the nursing informatics, code of ethics, the confidentiality, and security of patients' medical records on computers is their right.... In nursing informatics, data security has three different aspects....
Preview sample
Globalisation Impact on Multinational Enterprises
6 pages (1761 words) , Download 3 , Coursework
Free
Cases, and Readings in Cross-border Management, McGraw-Hill ... This recruitment function in a MNC will be quite different from the recruitment in a national firm, with regional factors being the strong criterion.... national or indigenous firms will normally be established by recruiting the ‘sons' and the ‘daughters', that is, citizens of a particular country, while MNCs will have a mix of employees from many countries taking into account both the national and regional factors....
Preview sample
Financial Markets and Institutions, Part 2
5 pages (1250 words) , Download 2 , Essay
Another, type of security is an equity security also known as stock.... Most of the business prefer to give stock more than debit security if they require money, nevertheless the required fund sometimes might not be financially able to make a periodic payments on interest for the debt securities (Madura, 2012)....
Preview sample
Economics of Slavery and Its Impact on Nation
2 pages (652 words) , Download 2 , Essay
Free
In the essay 'Economics of Slavery and Its Impact on Nation,' the author analyzes slavery as an economic factor in America since its colonization by European powers in the 16th and 17th centuries.... The colonies were originally worked through the indenture system.... ... ... ... The author states that a need for more workers than Europe could provide was the primary economic reason for slavery....
Preview sample
Antitrust Laws
4 pages (1000 words) , Download 2 , Coursework
The national systems that are unstable do not offer good business environment.... Ethical Climate: - The organizations while operating in a specific national system require adapting to the cultural sense of right and wrong in order to avoid the possibility of committing a wrong just to repel all of the society (Payne & Raiborn, 1997)....
Preview sample
Issue of Obesity in Australia
7 pages (2424 words) , Download 1 , Coursework
Free
As defined by the national Institute of Health, it is a body mass index of >30 (WHO, 2000; ACSM, 2006).... Thus it can be said that great hazards are being posed to the national care system of Australia by this chronic disease (Duckett 2007; Hearn 2006; Willis et al 2009). ... With the help of these advertisement campaigns the Australian national Healthcare system can decrease its expenses on the diseases which are increasingly being caused by obesity (Willis et al 2009; Hearn 2006). ...
Preview sample
Communitarianisms Impact on the Crime Prevention Policy of the New Labour Party
9 pages (2535 words) , Download 2 , Coursework
Free
The argument is that, in its zeal to reduce crime through its "modernization" agenda, applied to public service delivery, and the consequent emphasis on performance in the reduction of crime, the government is neglecting the institution-building task of constituting new security governance in the community.... ‘It may be that the nation state is not necessarily the most appropriate unit of analysis through which to study comparative crime prevention policies, as it draws attention to the role of national governments rather than local governments and municipal authorities as well as market-based innovations and the role of civil society....
Preview sample
What the European Union Ought to Be Like
10 pages (2473 words) , Download 2 , Essay
Free
Foreign and security policy.... There was to be a common adopted foreign and security policy.... Countries that choose to become members make a major sacrifice to forego some of their national sovereignty in order to agree on social, political and economic policies which are of common interest.... This is evidenced by the member states' laws and national policies which are equally bound by the EU institutions and regulations....
Preview sample
32401 - 32450 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us