StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
The Israel-Palestine Conflict
9 pages (2542 words) , Download 2 , Research Paper
Free
This research paper "The Israel-Palestine Conflict" is about the conflict which remains to be an unfolding narrative, the conclusion to which has yet to be determined.... Generations of civilians have died amidst this protracted war, victims of the limitless capacity of human beings for violence....
Preview sample
Main Causes of the Arab Spring in 2011-2012
10 pages (2763 words) , Download 0 , Case Study
Free
According to the report, most of the Arab governments had failed to offer a quality service in the fields' human security, education, as well as health, and nutrition.... Therefore, the search for state security with no consideration of human security brought about suboptimal outcomes for both the citizens and the government.... In consequence, the stability pillars in Arab tyrannies; the government control over the economy as well as the military-security complex were extremely shaken....
Preview sample
A People and a Nation: A History of the United States
2 pages (500 words) , Download 2 , Essay
Free
This paper discusses some of the most important American values, how they have been instilled in me and the reasons why they are significant in my life as an American.... American values mean something different from the psychological perspective, whether they are intrinsic or extrinsic.... .... ...
Preview sample
Social implication of medical issues; case scenario millers family
10 pages (2500 words) , Download 3 , Essay
Free
In this paper "Social implication of medical issues; case scenario millers family", the writer looks at a scenario of a family affected by a problem.... The paper concentrates on one of the family members named Lucy and see how the family environment is affecting her.... .... ... ... At the point when a relative gets sick, whether for a week, for a couple of months, or with a long haul or terminal ailment, every individual has a response and the whole family unit has a response....
Preview sample
The Use of Insulin Pumps in Children
24 pages (6000 words) , Download 2 , Literature review
The literary review 'The Use of Insulin Pumps in Children' demonstrates safety, convenience, and other benefits of this therapy as an adequate treatment for type 1 diabetes in young patients.... The author believes that officials should take steps to make this treatment cheaper and more affordable....
Preview sample
Systemic Management - RasGas
12 pages (3481 words) , Download 0 , Case Study
Free
At Aramco also, the same virus called “Shamoon” and “Disstrack” were used, which do not steal data but destroy and render data irrecoverable, according to researchers at Israeli security firm, Seculert (Zetter, 2012).... Seculert, the security firm states that such targeted attacks are commonly used against companies in the same vertical (Walker, 2012).... This is confirmed by a report which states that security incidents in the oil and gas sector has increased by 179% in 2013 and the resultant financial losses have soared by 470 percent (IQPC, 2014)....
Preview sample
Discussion Questions and Participation Questions
4 pages (1000 words) , Download 2 , Essay
Corporations have to pay attention to the security measures to ensure the information being transferred is not hacked on.... Customers expect their personal information to be 100% secure when they perform a purchase transaction over the internet with a business entity.... The same is true for....
Preview sample
Discuss whether the information provided in Citic Pacific Limited Stock
5 pages (1250 words) , Download 2 , Essay
This is basically aimed at making a decision as to whether the information presented in the financial statements is credible and sufficient enough to make.... ... ... Some of the information which is essential for making sound decision by the investors include Chairman's review of the business performance, auditors' report, overview of the business by the Directors as well as Understanding of the information provided in the annual reports therefore not only offers an opportunity to the investors to assess as to how the company performed in the past but how it will perform in the future....
Preview sample
Healthcare Coverage and Cost-Sharing
9 pages (2788 words) , Download 2 , Report
Free
In addition, to enhance better and high quality services, public health services in different states should have compulsory health insurance and national health services financed through tax.... The paper "Healthcare Coverage and Cost-Sharing" discusses the healthcare coverage and cost-sharing as one of the problems associated with the current US healthcare system by examining various aspects influencing access to healthcare services, financing, and costs of healthcare....
Preview sample
Group Decision Making
6 pages (1673 words) , Download 2 , Essay
Free
s the leader of the group of security personnel, one was faced with a situation where one of the group members, a security personnel, who was scheduled for regular work on a 10:00 PM to 6:00 AM slot, requested for a change in schedule due to emergency reasons.... His wife called in early at 8:00 AM and informed the appropriate channels that the security personnel had to undergo immediate surgery for appendectomy.... he Shift Sergeant is fully aware of the schedules of all security personnel....
Preview sample
The Implications Of Bilateral Investment Treaties On Sustainable Economic Development
7 pages (1750 words) , Download 3 , Literature review
Free
BITs became popular in early 1990s as the need for economic cooperation among countries grew.... The current involvement of this paper will be to analyze the existing literature on BIT.... The paper will involve carrying out literature review on BIT and sustainable development.... ... ... ... According to the report for the last forty years, many nations have been involved in activities that are aimed at promoting and protecting foreign investments for economic benefits....
Preview sample
Government and the Economy
3 pages (1072 words) , Download 2 , Essay
Free
Payroll taxes have increased with the introduction of Medicare in 1965, and the periodic increases in Social security taxes.... Such expenses largely include Social security, Medicare, Medicaid, and to a lesser extent expenses on food stamps, retirement and disability payments, etc.... Their expenses cover capital outlay on new projects and maintenance of existing infrastructure, salaries, and wages, education, libraries, health services provisions, employment security, Police and Fire fighting services, expenses on correctional institutions, waste management, development of parks and recreation, the judiciary and legal aid, expenses on utility service establishment and maintenance, etc....
Preview sample
The Influence of Social on Interpersonal Depression
6 pages (1500 words) , Download 2 , Research Paper
Free
In investigations evaluating views of existing social support, adults with attachment security have revealed more current social support than adults with lower attachment security (Bernardon, 2011).... Furthermore, according to Prior and Glaser (2006), respondents with attachment security have been discovered to be more prone to look for support in moments of distress and need and to be more contented with their social support system than respondents with weak attachment security....
Preview sample
A Global Comparison of Health Care Information Technology
2 pages (500 words) , Download 2 , Essay
Free
Results from a national scorecard on U.... WP4 national Policies and Strategies.... The aim of the paper 'A Global Comparison of Health Care Information Technology' is to analyze the evolution of Health Care Information Technology (HIT) as a breakthrough in today's modern world in providing high-quality care that is readily accessible for the people without the long waiting period....
Preview sample
Whither Information Governance
17 pages (5094 words) , Download 3 , Essay
Free
The paper "Whither Information Governance?... the threats to information and privacy in a world that is increasingly reliant upon technology.... As a resulе, the need to safeguard, protect, and promote informational freedom and privacy stand as a fundamental need that is not likely to decrease soon....
Preview sample
I will upload my instructior
2 pages (500 words) , Download 2 , Essay
Free
One strongly believes that due to the enormity of available information on the topic of “The causes and risk factors of binge drinking in adolescent and young adult”, the research on the appropriate journal articles for the indicated topic generated a lot of available.... ... ... One just had to determine the appropriateness of the sources depending on the authoritative nature of the research and whether the article was published in journals, as required. ...
Preview sample
Summarizing Four Articles
4 pages (1000 words) , Download 2 , Essay
Community policing is a strategy that can be applied to address the issue of crime and deterioration of neighborhood security by the law enforcement agencies.... However, community policing on its own is not fully effective, where the support of the other integrated and auxiliary....
Preview sample
Case Study Analyses
3 pages (750 words) , Download 2 , Essay
To begin with, being a large organisation helped the employees to have job security because it was harder to lose their job in a large organisation such as Wal-Mart.... However, it is necessary to note that this seems to have changed since in the recent days, Wal-Mart has had various issues with its employees where many employees complain of being overworked, underpaid and that they don't have job security anymore....
Preview sample
The problem of corruption in Liberia
5 pages (1250 words) , Download 2 , Essay
The problems have been several, for instance, the cross border insurgencies, together with the lack of interest from the international donors which have resulted in lack in funding (Stromberg, 1998).... any of the studies on the topic of resettlement and repatriation emphasise the security conditions and the importance of guaranteeing protection for the refugees.... In late 1992 there were reports of security problems, especially in the northern Lofa County, and as a result UNHCR and NGOs were unable to reach the Sierra Leonean refugees in that area....
Preview sample
Module 1 and Journal Article Review 1
4 pages (1000 words) , Download 2 , Essay
Traditional lifestyle is adapted by most mexican families, but this did not spare them from the effects of a growing aging population.... The dilemma of having the people gain personal choice and at the same time protecting the national interest would require more studies on social preferences and a solution to fill in employment supply....
Preview sample
Week1 Knowledge paper
4 pages (1000 words) , Download 2 , Essay
The US, though cautious, was willing to accommodate the Soviets by giving them control of the countries on their western border that would serve as a buffer against Germany and would become their satellite states.... The factories that turned out airplanes and guns were retooled to produce automobiles and home appliances....
Preview sample
Role of the European Union
9 pages (2720 words) , Download 0 , Article
Free
he European Union has also focused on cross-border infrastructure development.... Initially remitted mainly with free trade in steel and coal, the union's policy concern has extended to include monetary, security, agricultural, environmental, regional, foreign, social, immigration matters, among others.... he union has also played a key role in foreign policy matters through its Common Foreign and security Policy.... In formulating and implementing policies, the Common Foreign and security Policy stipulates that all the member states should agree unanimously on the appropriate course to take regarding a particular agenda....
Preview sample
Models to Examine the Adoption of e-Government Services
32 pages (8474 words) , Download 5 , Literature review
The review "Models to Examine the Adoption of e-Government Services" studies factors that govern technology adoption.... Among others, there is UTAUT - a model that encompasses maximum factors found to have significant influence over the adoption of technology.... ... ... ... The advent of the internet witnessed a manifold jump in IT....
Preview sample
Human resource management in UK government
18 pages (4500 words) , Download 2 , Essay
There was a particularly vociferous chorus of complaints about this in the years that followed local government reorganisation, with the result that successive Governments have attempted to impose controls on local authority staff numbers: a national 'manpower watch' was introduced in the 1970s....
Preview sample
The Role of Trade in the Roman Economy
4 pages (1325 words) , Download 0 , Essay
Free
Lighthouses were built for security purposes, and the Roman Navy asserted its dominance to eliminate any threats from pirate ships.... As a matter of fact, many nations depended on the Roman Empire to provide security.... The paper "The Role of Trade in the Roman Economy" describes that the Roman economy was prosperous due to its strong trade ties....
Preview sample
Breast Cancer Risk in America
7 pages (2087 words) , Download 1 , Essay
Free
However, the national Cancer Institute researchers are yet to conclude their evidence concerning underarm antiperspirants, and the risk of developing breast cancer.... ?Journal of the national Cancer Institute, 99(23), 1782-1792. ... This paper "Breast Cancer Risk in America" focuses on the fact that there are about 232,570 new cases of invasive breast cancer in America according to the American Cancer Society....
Preview sample
The Church Administration
9 pages (2235 words) , Download 1 , Essay
Free
The security guards also provide security to the clergy when necessary.... During special events, the church administration accesses the security of the events, and if necessary it may request more security from government agents in charge of security.... This has been achieved through the employment of personnel who have experience in security matters to act as security guards....
Preview sample
Book Report on The Immortal Life of Henretta Lacks
4 pages (1000 words) , Download 2 , Essay
Free
It is a security standards and safeguards for the use of electronic health care information as well as the creation of the privacy standards for protected health information.... The book is about the life of Henrietta Lacks, an African American who born on August 2, 1920 and died on October 4, 1951....
Preview sample
Equity in Juniper Networks Inc
9 pages (2250 words) , Download 2 , Case Study
Free
While production of products that can access networks such as the above-mentioned routers, the company also entered the enterprise and security space in 2004 to address the concerns of many businesses and individuals regarding online security as well as the provision of Web 2....
Preview sample
Emotion Regulation in Infancy
8 pages (2251 words) , Download 0 , Literature review
Free
The foundation of the attachment behaviour often depends on an infant's assessment of a number of environmental signals, resulting in subjective experience of insecurity or even security.... The security experience is in this case the objective of the attachment system, which is therefore essentially an emotional experience regulator....
Preview sample
Current Development in the Robotics Industry
12 pages (3251 words) , Download 5 , Essay
Free
The purposes of the stakeholders are; one, look at the impact of the technology in the future development of the country economically, socially and on security needs of the country.... These offers trigger economic growth in an era that needs security for services.... Solutions towards the challenges indentified were incorporation of reliable and continuous operations in human environment, privacy, security, interoperability, acceptability and trust....
Preview sample
Effect of First World War on the Psychoanalytic Movement
5 pages (1451 words) , Download 1 , Essay
Free
The World War 1 resulted to termination of the movement's international congresses because of security concern.... Most of the countries in Europe participated in the war, which limited the security and the number of members who were available for the congress (Makari 44).... The disagreements among the leaderships of various nations in Europe and the United States hindered their citizens from travelling to rival territories in order to promote safety and security....
Preview sample
Values and Concepts with Specific Reference to Palliative Care
21 pages (5733 words) , Download 4 , Essay
The paper "Values and Concepts with Specific Reference to Palliative Care" discusses that clinical pathways bring in a refreshing approach to the dissemination of clinical excellence in palliative care.... Within it, one can develop a number of sub-models that would address specific requirements....
Preview sample
The Manifestation of Race, Ethnicity, and Faith in British Education
11 pages (2750 words) , Download 2 , Literature review
Free
Since the 1980s, the leading cultural fundamentalist group of the New Right in the United Kingdom has not just disparaged and ridiculed such policies, but has aimed to enforce its own chauvinistic and racist perspective of British national identity on England's and Wales's national Curriculum (Pathak 2008).... In terms of faith, Velikonja stresses the relevance of faith in making sense of national identity (Cairns, Gardner & Lawton 2004).... This domain of faith also symbolises one of the most vital forces in the formation of politics and national identity, particularly without the other more dynamic forces (Cairns et al....
Preview sample
Effective Anti-Racist Guidelines in the British Education System
12 pages (3000 words) , Download 2 , Literature review
Free
Since the 1980s, the leading cultural fundamentalist group of the New Right in the United Kingdom has not just disparaged and ridiculed such policies, but has aimed to enforce its own chauvinistic and racist perspective of British national identity on England's and Wales's national Curriculum (Pathak 2008).... In terms of faith, Velikonja stresses the relevance of faith in making sense of national identity (Cairns, Gardner & Lawton 2004).... This domain of faith also symbolises one of the most vital forces in the formation of politics and national identity, particularly without the other more dynamic forces (Cairns et al....
Preview sample
The Underground Railroad
7 pages (1750 words) , Download 4 , Research Paper
Free
The idea of transporting slaves across the border was by hiding them under cargo and carried goods, which was passing in and out of the border.... The movement was very efficiently managed by the black people in the region of Cincinnati, Ohio (national Park Service 1998).... Garrison's members were more religious people who after two decades supported Utopian communities and women's rights (national Historical Landmark 1998)....
Preview sample
Features of Employment Relations Systems and their Impact on the Position of Women in Labour Markets
6 pages (1500 words) , Download 2 , Essay
Free
Over period, this tool has acted as a medium through which employees gain access to various benefits, obligations and rights that are related to employment with respect to social security and laws of labour.... This is a challenge that is described by the International Labour Office's Director as follows: “The State has a key role to play in creating an enabling institutional framework to balance the need for flexibility for enterprises and security for workers in meeting the changing demands of a global economy....
Preview sample
Purchase Using Biometric Information
15 pages (4065 words) , Download 0 , Research Paper
Free
It should have equal security protocol as the finger print reader.... It should have equal security protocol as the finger print reader.... Three security goals are met after designing the protocol and include:Resistance against third party attacks and impersonationAuthentication amongst the group membersThe actual identity anonymity The level of anonymity: The cryptographic hash function is applied by PT.... It should have equal security protocol as the finger print reader....
Preview sample
Threat Scenarios for Shadowmiles Limited
9 pages (2414 words) , Download 0 , Case Study
Free
This paper "Threat Scenarios for Shadowmiles Limited" tells that Shadowmiles Limited is a world leader in providing digital identity and security technologies.... As such, in order to continue operating with the current technologies and maintain security, organizations need to heighten their defense approaches.... About Shadowmiles Limited Shadowmiles Limited is a world leader in the provisioning of digital identity and security technologies....
Preview sample
Information Technology: How it shaped the Military Force
8 pages (2363 words) , Download 3 , Research Paper
Free
This paper then aims to discuss how information technology (IT) has changed the daily lives of the enlisted men and women serving in conflict torn areas in terms of communication, organizational security and development, skills development, housing and medical.... This paper then aims to discuss how information technology (IT) has changed the daily lives of the enlisted men and women serving in conflict torn areas in terms of communication, organizational security and development, skills development, housing and medical....
Preview sample
International Business Management
3 pages (780 words) , Download 1 , Assignment
Free
In many countries, security concerns have caused a serious impact on the travel industry.... Furthermore, many countries have failed to tackle security problems because not all states have the same view of security risks.... Secondly, the US could help countries vulnerable to a terrorist attack in solving security issues.... The US could offer expert advice on guaranteeing travel security.... here are various national differences that affect the operations of cruise lines....
Preview sample
Poverty and Children in the United States
9 pages (2250 words) , Download 5 , Essay
Free
In fact, numerous organizations of national and international repute are currently working towards this education and population control.... Furthermore, an organization by the name of national Center for Child in Poverty and numerous such organizations are putting efforts to improve the quality and probability of success for these special individuals.... national Center for Child in Poverty (NCCP), in collaboration with W....
Preview sample
Causal Factors and Pathophysiology of Atrial Fibrillation
8 pages (2410 words) , Download 4 , Research Paper
Free
ational Collaborating Centre for Chronic Conditions (2006) Atrial Fibrillation: national Clinical Guideline for Management in Primary and Secondary Care.... The focus of this paper "Causal Factors and Pathophysiology of Atrial Fibrillation" is on atrial fibrillation (AF), a widespread type of arrhythmia globally affecting nearly 34 million people aged 75 and over (Chugh et al, 2014)....
Preview sample
International Law Framework
9 pages (2239 words) , Download 1 , Essay
Free
The border agency of UK will expect them to immediately leave the UK.... For example, it might be the case of entrepreneur visa (Tier 1) or have been employed with a UK border Agency.... It requires the knowledge of the national dominant language plus culture, and the promise of the applicant to obey and follow the country's laws.... he legal process of nationality by virtue of which a non-citizen can be a citizen or a national of a country is called naturalization....
Preview sample
Evaluation of Two Articles Describing the Best Way to Educate American Children
5 pages (1369 words) , Download 0 , Essay
Free
"Evaluation of Two Articles Describing the Best Way to Educate American Children" paper analizes "Child's Play' article by Sheryl Nance-Nash from Stanford University, and 'Enhancing Academic Performance by Strengthening Class-Inclusion Reasoning' by Robert Pasnak, Willa Cooke, and Hendricks.... ... ...
Preview sample
Illegal Immigration in America
1 pages (295 words) , Download 0 , Essay
Free
In an ideal situation, the national government controls border crossings and movements within the states.... However, the national government does not put any restrictions on border crossing, or movements and this makes entity states to make laws that address these issues....
Preview sample
Poverty and Education
14 pages (3500 words) , Download 6 , Essay
Free
hile, as noted, poverty is often treated as a national phenomenon and studied from a national economic perspective, this research will examine the phenomenon from the family and child perspective.... overty, in other words, adversely impacts national economic performance and the solution lies in education.... This has been seen in analyses of national Educational Longitudinal Surveys (NELS) and High School and Beyond surveys (Darling and Hammond, 1998)....
Preview sample
Workplace Discrimination
10 pages (3089 words) , Download 1 , Coursework
Free
Muslim may be asked to undergo the analogous pre-employment security checks which are also applicable to other applicants for the same job position.... security Management, 51, 105+. ... security Management, 51, 105+. ... or instance, if a company engages a Sikh individual of South Asia origin, it should clearly warn to its employees and managers that religious based discrimination or national origin will not be tolerated at any cost by the company in any features of employment including while hiring....
Preview sample
Trumans Decision to Drop the Atomic Bombs on Japan
8 pages (2194 words) , Download 3 , Research Paper
Free
The uranium 235 bomb was previously tested in the mexican desert14 as he trinity project, and was found to be effective; though the ‘little boy' and ‘fat man' were the first and last atomic bombs to be used in war.... A question might have lingered in his mind about the plutonium 239 that had already been tested in the mexican desert24.... Argonne national Library.... national Archives (a).... national Archives (b)....
Preview sample
Cyber Law: Silk Road Market Place
12 pages (3113 words) , Download 0 , Term Paper
Free
The act is also associated with the federal Cyber security Practice Board and is responsible for developing as well as updating information security regulations (“Congress.... upervise security policies and procedures ... evelop a national program that will conduct cyber security education to learners ... Operate as a centre for Federal's security information ... This Act requires that each federal agency be responsible for conducting an annual independent audit of all its information security programs and procedures and table results of these audits ....
Preview sample
36151 - 36200 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us