StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Performance and Reward Management
3 pages (750 words) , Download 2 , Assignment
It is also required for a host of other reasons including workers compensation, the privileges and benefits they are entitled to, and their savings.... Organizations also need to collect HR data in.... ... ... er to increase their eligibility for projects; some clients require the contractors to have a lot of employees and a well-established setup in order to assign them the contract....
Preview sample
History and Growth of Health Information Systems
9 pages (2706 words) , Download 2 , Essay
Free
The development of Electronic Health Information has led to the rise in privacy and security concerns.... The health care industry has realized that the security concerns of the patients should not be overlooked.... ntroduction: The development of Electronic Health Information on a global scale has also led to the rise in privacy and security concerns.... The health care industry has realized that security concerns of the patients should not be overlooked....
Preview sample
Did Churchill's Wartime Coalition Government 'Create' the Welfare State
10 pages (2779 words) , Download 2 , Essay
Free
A welfare state is a state that assumes health and social security responsibility for its citizens.... This was to be as a security during the interwar years and industrial depression.... The labour party that took power in 1945 only implemented the report, which also proposed the formation of a comprehensive national Health Service (Jefferys 1991, pp.... In addition, Churchill's government set up the national milk scheme, a project, meant for mothers who earned not more than $2 per week (Lowe 1990, 160)....
Preview sample
Public Utility News Articles
5 pages (1250 words) , Download 2 , Essay
The uniqueness of public utility sector makes it one of the most vulnerable constitutes of national economy, this is the major introduced in the article “Priority Required for Utility security” published in Washington Times.... security of public utility sector raises major life dependent issues.... The continuity of service provided by public utility institutions in not questioned by the majority of citizens, however, the supply system might turn out to be the most sensitive part of the national economy....
Preview sample
Engineering Products in North America
9 pages (2250 words) , Download 2 , Case Study
Free
(eds) Transnational Management: Text, Cases and Readings in Cross border Management.... Uppermost among these is the increase in competition between plants which arguably reduces the degree of security of each plant and, therefore, also of job security.... However, in other areas, variations in the nature of the law, institutions and national cultures meant that differences in practices persisted.... (1996) 'Managing flexibility in the food and industry: a cross-national comparative case study of European multinational companies', European Journal of Industrial Relations, 2(2): 153-72....
Preview sample
See attachment
4 pages (1000 words) , Download 2 , Admission/Application Essay
-Mexico border has increased tremendously.... Due to the rising influx of illegal entrants, the Congress has been prompted to implicitly express increasing concerns due to the implications of rising illegal immigration on the country's It is notable that illegal immigration through the border with Mexico has persisted for many years, but the recent surge in illegal immigrations into the United States has led many analysts including the government to express concerns that the immigration trend might be influenced by some unhidden motives....
Preview sample
Human Resource Management in Europe
12 pages (3000 words) , Download 6 , Essay
As business become more global and the workforce ever more diverse the issue of 'People management' becomes increasingly important for leaders, managers and their organizations.... Models and frameworks have been developed and described for dealing with human resource in different cultural settings....
Preview sample
The Problems of Corruption, Civil Wars, Terrorism and Conflicts in El Salvador
7 pages (1750 words) , Download 2 , Term Paper
Free
This type of accusation will lessen public confidence in the security forces already evolving from a history of corruption.... In an Overseas security Advisory Council (OSAC) report of April 2009, El Salvador was ranked as one of the ten most violent countries in the world.... In August of 2008 the national police chief resigned after two close advisers were accused of corruptions and links with drug traffickers.... Joel Millman of the Wall Street Journal reporting on the national election in March 2009, wrote that of the forty thousand Salvadoran immigrants who received voting credentials three hours after the polls were opened only approximately five hundred showed up to vote. ...
Preview sample
British Social Policy
4 pages (1000 words) , Download 2 , Essay
Starting from the Old Poor Law (established by Elizabethan Act in 1572) which provided the relief to the poor (provision for work, help to immigrations and compulsory poor rate), and up to the current social security benefits (child support, unemployment, income support, and pensions), the social policy has gone though the number of reforms which have changed the delivery of the social and financial assistance.... The key elements of the welfare state after 1948 included social security, health, housing, education and welfare of children....
Preview sample
The Evolution of Concept, Planning, and Execution in US military Joint Operations
9 pages (2233 words) , Download 1 , Coursework
Free
The joined forces were effectuated on 2nd March when the first US Marine Division moved towards the Iraqi troops after crossing the border.... he joined forces were effectuated on 2nd March when the first US Marine Division moved towards the Iraqi troops after crossing the border.... ational military and security strategy explains the work of the military in the advancing the state's course of action and policies.... Then, in 2002, United Nations security Council collectively established an artillery restriction, and also freezed the assets that Bin Laden owned, together with those of al-Qaeda....
Preview sample
Student Motivation for Choosing to Study a BTEC First Diploma
26 pages (6500 words) , Download 2 , Research Paper
The author of the following research paper "Student Motivation for Choosing to Study a BTEC First Diploma" states that one of the most appealing features of the public services is the opportunities it provides for careers in a number of services such as fire, ambulance, army, navy, and police.... ...
Preview sample
Ethical Consideration in Foreign Policy
9 pages (2559 words) , Download 0 , Essay
Free
Foreign policies are meant to protect a country's national interests, ideological goals, national security, and economic prosperity.... However, in the past, especially during the Cold War, and throughout history, power has been used in the international scene to push forward national interests and agendas, sometimes without any regard to the nations and people they may directly or indirectly affect.... In the increasingly smaller global community, "national interests" do not necessarily mean that they are good for the international community....
Preview sample
American Experience
10 pages (3001 words) , Download 1 , Term Paper
Free
Without a sense of security through a trust that the police are available as a source of protection, members of that community have a cultural adaptation toward survival based on need, whether those needs are in line with lawful social ... In regard to a feeling of security as provided by police protection, 60% of Caucasian-Americans believed they were secure, however only 29% of African-Americans felt secure (Roth, 1994, p.... Defining homicidal purposes based on skin color will never be as relevant as creating culturally defined social groups within the American experience based on common social elements that can then begin to relate commonalities within the national identity in order to truly understand how the motivations towards homicide can be addressed....
Preview sample
Events, Hospitality and Tourism Dynamics
10 pages (2500 words) , Download 2 , Essay
The major factors that are important considerations in achieving ideas of political stability include: constitutionalism, respect for rights and freedom of people, democratic political system with free and fair elections, employment and improved living standards of people, transparency and accountability, food security, diplomatic relations with other countries, and good governance (Bhagwati 2002)....
Preview sample
Do Human Right Exist and What Is the Purpose of the Rule of Law
9 pages (2374 words) , Download 4 , Coursework
Free
They do so in the name of maintaining national security, defending civilization and advancing the revolution of economic progress.... Today we witness police states and military dictatorships that justify their actions by appealing to the necessities of socialist revolution, national security, or both.... mexican President Vicente Fox ... Human right can exist as a shared norm of actual human moralities, as a justified moral norm supported by strong reasons, as a legal right at the national level, or as a legal right within international law....
Preview sample
Contemporary Society & Social Futures
4 pages (1000 words) , Download 2 , Essay
Technological advance has seen the old surveillance techniques like use of identification cards and border surveillance be replaced by new methods, including CCTV, mobile tracking, and DNA tracking (SSN, 2013).... Who else can access such private information from security databases?... There is a high risk of the public in case of security monitoring, and consumers, in consumer surveillance, being susceptible to information leaks (Lyon, 1994)....
Preview sample
Conflict Resolution in North Korea
23 pages (5750 words) , Download 3 , Research Paper
The Korean Peninsula shares a 650 – mile border to the North with China along the Yalu and Tuman rivers and a 10 – mile border with Russia along the extreme northwest.... Today, the Korean Peninsula remained fractured when the war in Korea ended in 1953 after an armistice and many regard North Korea as having maintained a posture that continues to threaten regional and global peace and security....
Preview sample
Health Information Exchange Organizations
8 pages (2000 words) , Download 2 , Essay
Free
rivacy and security ... The organization observes the privacy and security standards set by the Health Insurance Portability and Accountability (HIPPA).... Standards and certification facilitate the meaningful use of EHRs through interoperability, usability and security of health information. ... ) security ... HR products should provide sophisticated technical abilities to maintain the security and confidentiality of patient information....
Preview sample
Understanding United States Rights and How They Reflect on the Individual
3 pages (750 words) , Download 3 , Essay
Free
No greater threat: America after September 11 and the rise of a national security state.... This Article provides for a proposal of an Amendment by two-thirds of the Congress, or through national convention.... The first amendment has been used as a resource for asserting the right to speak and criticize anything and everything....
Preview sample
Americas Current and Likely Future Role in Transnational Crime
13 pages (3746 words) , Download 4 , Research Paper
Free
"In 1986, President Ronald Reagan signed national security Directive No.... 221, making drug enforcement a national security priority" (Lee & Leduc, 1996 p.... “The porous ness of the border with Mexico, which has recently become a major trading partner for the United States, in particular reinforces peoples perception that the nation is not in the control of its destiny” (Petrie & Reuter, n.... “While there are no reliable statistics, the World Bank and International Monetary Fund (IMF) estimate roughly that the cross-border flow of global illicit proceeds (money laundering) related to corruption, criminal activities, and tax evasion is about 3-5 percent of the world's Gross Domestic Product (GDP)” (Luna, February 2009)....
Preview sample
Journalism, Mass Media and Communication
3 pages (750 words) , Download 2 , Essay
John Brinkley is one of American most controversial personalities of the 19th century who ventured in different professional fields and practiced as a medical doctor and a journalist.... .... ... ... Journalism, Mass Media and Communication Name Student Instructor Institution Date John Brinkley advertising strategies John Brinkley is one of American most controversial personalities of the 19th century who ventured in different professional fields and practiced as a medical doctor and a journalist....
Preview sample
Strategy Plan for American Airlines
18 pages (4970 words) , Download 7 , Research Paper
Free
At the same time, AA takes serious steps toward their business practices responsibility that is focused on the safety and security of their customers as well as their employees, ethical governance.... At the same time, AA takes serious steps toward their business practices responsibility that are focused on the safety and security of their customers as well as their employees, ethical governance, and environmental actions.... This could be done through route network optimization, competitive pricing, cost structuring, safety and security, and many more....
Preview sample
Security Measures at U.S. Airports Before and After the Terrorist Attacts
10 pages (2500 words) , Download 2 , Research Paper
Free
security measures in United s' airports before and after the 9/11 attacks The terrorist attacks that shook the United s (US) and the whole world on September 11, 2001 prompted the US government to enact several new laws to improve airline and passenger safety.... Bush signed the Aviation and Transportation security Act (ATSA) on November 19, 2001 (Etzioni, 2003, pg, 52).... The enactment of this law meant a huge overhaul in the airport infrastructure across the nation with the establishment of the Transportation security Administration (TSA)....
Preview sample
Agent Robert Hanssen Case
14 pages (4306 words) , Download 0 , Essay
Free
Premium+
However, their failure may be disastrous to the counterintelligence agency and national security.... He accessed classified national security information for digital and hard copies that were subject to limited control and monitoring over the 20-year period.... Based on these findings, Leggit et al (2011) demonstrated that personnel security measures should be implemented in such situations targeted at protecting sensitive national security information against espionage....
Preview sample
Letters Arts and Sciences themes DIVERSITY and ETHICS and their relationship to globalization
12 pages (3000 words) , Download 2 , Research Paper
An important aspect of real leadership is the close by association amongst the leader and the follower that governs the accomplishment of the leader's task.... But, lacking motivation, participation, and reassurance from both parties, the rapport agonizes and this leader-follower.... ... ... However, leaders, especially, must exert additional work to reach out to supporters so as to start and progress this cooperation that is essential to the attainment of the objectives. ...
Preview sample
Constitutional Engineering
9 pages (2243 words) , Download 2 , Essay
Free
The conflict persisted until 1994, when a ceasefire was signed under the guidance of the Organization for security and Cooperation in Europe's (OSCE) Minsk Group.... This observation could be extended to Ukraine's former prime minister and head of the national bank, who, after failing to act on his election promises, was ultimately forced to relinquish his premiership to a leader of the opposition group that was alleged to have made an assassination attempt on him....
Preview sample
Impact of President Nixons Visit to China
22 pages (5797 words) , Download 1 , Case Study
The paper "Impact of President Nixon's Visit to China" is a great example of a politics case study.... Over long periods of time, there has been the need to establish good relationships between nations in order to improve trade between those nations or for peacemaking.... This kind of activity that involves negotiations between the representatives of countries in trying to reach a common goal for the benefit of the participating countries is called diplomacy....
Preview sample
Why is the Notion of Identity so Important for the Constructivist Approach
10 pages (2500 words) , Download 2 , Term Paper
Free
Cultures of antimilitarism: national security in Germany and Japan.... Cultural norms and national security: police and military in post-war Japan.... The culture of national security: norms and identity in world politics.... For instance, Wendt (1992; 1994; 1999) observes culture of border-state community as a lead factor of state identity.... While the very notion of state identity appears to mean unproblematic and fixed border between the self and other states, Wendt's approach hints that the borders of the self might enlarge to include other states....
Preview sample
Reproductive Rights and Welfare as Issues Facing American Families
10 pages (2500 words) , Download 2 , Essay
Free
Analyzing its efficiencies, the author touches questions of government programs, social education, private efforts, public awareness, and unemployment assurance as direct contributors to the level of social welfare, underlining the role of social security programs for maintaining of Americans' prosperity.... Instead, there is an evident proof of social security programs' orientation on help for representatives of middle and upper-middle classes and non-significant help for those people below the poverty line....
Preview sample
Dignity in Elderly care
80 pages (20000 words) , Download 4 , Essay
Premium+
Dignity is a comprehensive subject, which is predisposed to vary within the context of ethical and diverse cultural backgrounds.... It encompasses various intrinsic values ranging from freedom to love.... ... ... ... The term ‘dignity' derived from the Latin word dignitas or dignus that means worthy, can be defined as “quality of being worthy of honour” or “a sense of self-importance” (Collins Language....
Preview sample
Miami International Airports Airside and Landside
6 pages (1640 words) , Download 2 , Research Paper
Free
It houses the US customs and border protection that clears arriving international flights including charter, cargo, and private.... Customs and border Protection's passport control.... Above all, he is also responsible for all Airside Operations at MIA, including aircraft gate and apron control, the security and safety of aircraft , airside motor vehicle decal program, construction, cargo, aircraft parking, ramp, passenger loading bridges, access (FAA, 2013), Flight Information Display System (FIDS) and, motor vehicles and pedestrian traffic on the Aircraft Operations Area (AOA)....
Preview sample
Perceptions on the Use of the Automatic Identification System in Enhancing Kuwaiti Coast Operations
37 pages (9959 words) , Download 2 , Thesis
The systems, particularly the AIS Class A, have provided a wide range of benefits such as effective vessel identification and the provision of accurate information to national security forces and the Vessel Traffic Management Systems, or VTMS.... side from national security, the AIS can also make its contribution to environmental protection and procedures that require the rescue of vessels vulnerable to threats or attacks (Norris 2006).... Regulations to utilise AIS in all vessels fall under the international standards of improving the safety and security among maritime transporters through the provision of information regarding locations and vessel identities....
Preview sample
How Might Hegemons Encourage the Proliferation of Regimes among Other States
11 pages (3023 words) , Download 2 , Essay
Free
Superior technological capability within the United States hegemony as well as coordination and support from allied partners, such as former UK Prime Minister Tony Blair (as one example), allowed the United States to extend its political influences outside of the United States border and intrude on the activities and lifestyles of foreign citizens to fulfil the self-protectionist objectives of the hegemon.... Hence, though a somewhat subjective assertion, hegemons cause the proliferation of regimes when Realist-based self-protectionism threatens the cultural, religious, or economic security of another institution....
Preview sample
Which European Country Is the Most Democratic
7 pages (1750 words) , Download 2 , Research Paper
Free
The monarchical rulership does not have considerable clout as decision-maker such as that found in the United Kingdom, a country where the Queen can effectively declare war and make monumental decisions regarding national security.... Lijphart (1999) further emphasizes these same characteristics that must exist in order to consider a national governmental and political structure as genuinely democratic.... The Netherlands maintains a House of Representatives similar to American federalist/democratic systems in which members represent multiple parties with differing values that represent the interests, individually, of diverse national constituency (McGarry and O'Leary 1993)....
Preview sample
Influence of Media on Society and Organisation
17 pages (4250 words) , Download 3 , Term Paper
Free
Organisational policy, in this instance, often involved forbidding journalist employees from enacting lawsuits against secretive American government in an effort to better suit the interests of global social stakeholders about the consequences of Iraqi allegations of tyrannical government behaviours that could, theoretically, impact the welfare and security of global society.... Through collaboration and consultation with global media ownership and journalists, this would secure more cohesiveness under the concept of globalisation that would have significant social, financial and reputational security that is necessary in a world where homogenization of culture is becoming a legitimate and measurable phenomenon....
Preview sample
Beheading of Two American Journalists
12 pages (3441 words) , Download 1 , Case Study
Free
national security Council confirmed the video of Foley's execution to be authentic. ... The paper "Beheading of Two American Journalists" is devoted to the ISIS group that has been sending violent messages to their alleged enemies, especially the US, implicating direct terrorism acts....
Preview sample
Laboratory Information Management Systems Evaluation
9 pages (2585 words) , Download 3 , Admission/Application Essay
Free
According to Sunquest Innovations, the Sunquest Information Systems abides by the federal security laws and gives forward looking statements and results, for example, operation and lab results.... This makes the Sunquest Information Systems a valid and reliable system for laboratory owners and the general national Health Service (Wood, 105)....
Preview sample
Steve Wozniak as Co-Fonder of Apple
5 pages (1547 words) , Download 2 , Essay
Free
His father was an engineer in the Lockheed Martin, a security and IT organization of the US and his mother was a housewife.... At that time, he started to team up with Steve Jobs to create ‘Blue Boxes' which permit individuals to ‘make long distance call' (A&E Television Networks, 2011) & (national Inventors Hall of Fame, 2002).... These inventions helped to make revolution in the computer market (Massachusetts Institute of Technology, 2007) & (national Inventors Hall of Fame, 2002)....
Preview sample
A Freedom Fighter or Terrorist
8 pages (2000 words) , Download 2 , Essay
Free
In 1968 while Saddam was chief of internal security as well as the head of the Revolutionary Command Council, he participated heavily in the coup led by his cousin and he was an undercover agent always secretly searching for those opposing his cousin and intimidating them or even at times killing them.... He was known to have rape rooms, have his opponents tormented to death, his political foes had at most times witness the killing of their children so as to create fear and intimidation and also the mass killing by security personnel of non-violent demonstrators in the street resulting in blood baths all over....
Preview sample
Evaluation of effect of Air Disasters on Air Travelling Population
11 pages (3422 words) , Download 1 , Research Paper
Free
If we search the root cause of these problems it is security and Safety.... 0 = the null hypothesis is: these accidents are lead to major changes in the security system and safety measures in the Aviation Industry. ... So, blaming the security was as expected but as they all know, the measures taken by the industry and the government was extremely great to prevent these problems in future, it was easy to manage the situation.... ) Poor security control ...
Preview sample
The United States War on Terrorism
10 pages (2752 words) , Download 2 , Essay
Free
Indirect effects include increased security measures in busy public places such as airports leading to delays, emotional trauma due to reports and images released on the terrorist attacks on the press, significant drops in stock values and stereotype suffered by those who profess the Muslim religion.... The FBI works with an aim of becoming the leader for the small justice department within the United States, the international security forces and like-minded partners (“Quick Facts,” 2011)....
Preview sample
Causes and Consequences of Migration
7 pages (2176 words) , Download 1 , Literature review
Free
Generally, high influx of refugees can cause security concerns in the local areas in the form of increased crime, theft, and terrorism, among other criminal activities, in particular (Casimiro, Hancock & Northcote, 2007).... As discussed above, the influx of refugees in a given area might result into scarcity or more strain on the local social amenities such as food, water, electricity, transport, health, education, security and government administration between the two groups (Van Hear, 2014)....
Preview sample
Systems of administration in criminal justice organizations
9 pages (2250 words) , Download 3 , Essay
Free
Truly as reviewed above the closed system policy has caused miscarriages of justice very often but matters of high level national security are better contained within the closed structures of the FBI and the DEA.... Whereas the average small police station in a small community can afford an open system in its organisation, the task of the FBI and the DEA is more complex and they have security agendas making it imperative for them to keep a low public profile....
Preview sample
The 14 Points Plan by Woodrow Wilson
7 pages (1977 words) , Download 0 , Term Paper
Free
This will create security and peace among all nations.... Serbia should be given security and freedom to enter the sea.... They should also be given security and freedom to enter the sea.... It should be able to identify its own national policies and political developments.... national groups should be provided independence and authority.... A national league should be formed in order to protect mutual guarantee of territorial integrity and political independence....
Preview sample
Violence in the Work place
4 pages (1000 words) , Download 4 , Article
The figures were obtained from the national labor bureau.... In this paper, I will discuss measures taken by the Board of Nursing (BON) and other professional organizations to address the problem.... The.... ... ... of this document analyzes BON approach to violence in the workplace by considering BON Nursing Practice Act (NPA) in dealing with the problem and the efficiency of the approach. ...
Preview sample
Workplace Drug Screening Opinion Paper
4 pages (1000 words) , Essay
Nobody downloaded yet
“Substance abuse can be a significant problem in the workplace, contributing to impaired productivity and job performance, increased accidents and injuries, violations of security, theft of company property, and diminished employee morale.... “These guidelines are pertinent to drug testing done under the following circumstances – pre-placement assessment, job transfer evaluation, periodic mandatory medical surveillance, post-incident/accident, for-reasonable-suspicion/cause, and random testing of those in safety- and security-sensitive positions, special work fitness examinations, and monitoring of employees who are under treatment for drug abuse, including alcohol, as a condition of continuing employment....
Preview sample
China and It Prioritise Improving its Relationship with the ASEAN Countries over its Relationship with the US
17 pages (4706 words) , Download 0 , Essay
Free
Finally, the bloc has an objective of promoting its trans-border and intra-border defenses through the ASEAN Defense Industry Collaboration, which has gained much support from international organizations and nations including the United States (Far Eastern Economic Review, 1996). ... This is because of the variables involved in any social factors in a typical PEST analysis, which of course includes a trans-border movement of people for the exhibition of social identifies....
Preview sample
Developments and Achievements of Pakistan in Different Spheres
10 pages (2882 words) , Download 2 , Coursework
Free
This paper outlines human rights in Pakistan, relationships with the USA, the religion of Pakistan, nuclear weapons in Pakistan, Pakistan's national security establishment and Strength of economy.... he latest worry for Pakistans national security Establishment: ... ??Reuters Photo/Jason Reed Two events in the past fortnight represent worrying developments for Pakistans national security establishment.... The developments in Iraq, the 9/11 terrorist attacks that rattled America in the year 2001,and the subsequent rise in global terrorism, whose base is in Afghanistan and the border districts of Pakistan, has brought this country to the international scene....
Preview sample
Successes, Failures and Politicization of Aid in Somalia 1991-2012
12 pages (3502 words) , Download 2 , Dissertation
Free
The security situation has not improved much for aid workers in the country.... Most aid groups seek the same ends – safety and security for the Somalis (Gartenstein-Ross, 2009).... In the end, the most appropriate means to manage the situation refers to the strengthening of the TFG and legitimizing it in order to secure internal and external security; the TFG can also secure improved conditions for the people within normal parameters (Menkhaus, 2007)....
Preview sample
Henry Kissinger
12 pages (3000 words) , Download 4 , Essay
Kissinger also served the Johnson administration as a part-time foreign adviser ("Henry") When Nixon was elected President of the United States in 1968, he appointed Kissinger as his full-time national security adviser.... Being the national security adviser to Nixon's administration, he had concentrated on gaining power for the United...
Preview sample
3351 - 3400 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us