StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Internet Censorship in China
6 pages (1708 words) , Download 1 , Essay
Free
The government, therefore, has the right to ensure that no material on the internet is a threat to national security or one that could subvert the power of the government or undermine national security or honor.... Social media websites such as facebook and twitter are often blocked by the government in what the government says is interests of national security.... The government therefore has the right to ensure that no material in the internet is a threat to national security or one that could subvert the power of the government or undermine national security or honour....
Preview sample
International Developments of New Zealand Policies to Disability and Aging People
13 pages (3766 words) , Download 2 , Coursework
Free
This, as Ronald & John, (2002) notes is done through the strategies o increasing the income for the older people from social security funds, free Medicare provisions and Medicaid.... "The Supplemental security Income Program, " in Means-Tested Programs, in the United States.... Moreover, the same provision defines a disabled person as one with visual, hearing, speech or physical disabilities, intellectual disabilities, psychiatric disabilities, multiple disabilities, and or other disabilities (national Bureau of Statistics, 2007)....
Preview sample
Urban Planning Cultures in the Developing Countries
8 pages (2000 words) , Download 2 , Coursework
Free
national political contexts make a difference to the scope of local politics and the type of government agency operating in the urban arena.... Furthermore, just as in Europe, these operate at two distinct levels: first the level of national/regional economic development planning; and second, the level of regional/local physical development planning....
Preview sample
The Bedford Boys and D-Day Invasion
5 pages (1250 words) , Download 2 , Research Paper
In company with our brave Allies and brothers-in-arms on other Fronts, you will bring about the destruction of the German war machine, the elimination of Nazi tyranny over the oppressed peoples of Europe, and security for ourselves in a free world (Garamone).... The Bedford Boys and D-Day Invasion The D-Day Invasion, was one of the greatest and riskiest military invasions of all time....
Preview sample
The D-Day Invasion: the Greatest and Riskiest Military Invasions
5 pages (1250 words) , Download 0 , Research Paper
Free
In company with our brave Allies and brothers-in-arms on other Fronts, you will bring about the destruction of the German war machine, the elimination of Nazi tyranny over the oppressed peoples of Europe, and security for ourselves in a free world (Garamone). ... They were a cross section of the kind of men who had grown up in the Depression and enlisted in the national guard because they truly believed in the idea of America and were willing to defend that idea with their very lives. ...
Preview sample
Suicide Prevention within High Security Hospital
16 pages (4000 words) , Download 3 , Research Paper
Free
This paper "Suicide Prevention within High-security Hospital" focuses on the fact that skill acquisition is whereby one learns connections of events in the course of a long period of time.... Suicide Prevention within High security Hospital ... They must participate in group activities, meet friends and socialize (national Institute of Mental Health in England 2006)....
Preview sample
The American Identity Crisis
4 pages (1000 words) , Download 2 , Essay
If one reads the opinion pages in such American national news publications as Newsweek, Time, U.... These are the times that try men's souls.... So begins the first essay in a series of writings by Thomas Paine called The Crisis.... .... News and World Report and The New York Times, things are much the same in our own time....
Preview sample
Social Contexts of Disability
11 pages (3399 words) , Download 3 , Essay
Free
Concerns regarding security and safety, ageing and physical and emotional support are required by both PWDs as well as the healthy population.... This may be either on account of lack of availability of adequate opportunities, infrastructure or resources or the plain lack of national level policy initiatives on the part of the government to promote the inclusion of such people within all spheres of life.... Although considerable and significant efforts are made both at the local as well as national levels to afford personalized treatment to PWDs they are often ignored on account of lack of trained health care providers....
Preview sample
Role of UNSC in Enforcing the WMD Treaties
33 pages (8958 words) , Coursework
Nobody downloaded yet
UNSC operates under the UN Charter and its main goal is to maintain international peace and security.... Weapons of Mass Destruction (WMD) are a threat to international peace and security due to the damages and deaths that they may cause if used.... he United Nations security Council (UNSC) is one of the organs that were established under the UN charter.... Its primary role is to maintain international peace and security at all times....
Preview sample
Non-Malicious HIPAA Violations
6 pages (1788 words) , Download 3 , Essay
Free
Hipaa: A Practical Guide to the Privacy and security of Health Data.... : national Academies Press, 2009.... As the author of the paper "Non-Malicious HIPAA Violations" argues, when HIPAA-Health Insurance Portability and Accountability Act was incepted in 1996, the internet was still in its early stages, and with the evolution of the internet, the Act had to be updated periodically (Fernald 26)....
Preview sample
Liberation Tigers of Tamil Eelam
11 pages (2750 words) , Download 2 , Term Paper
Free
Protection of human rights by ensuring that national security and public safety were taken into consideration was a critical attribute altogether.... International security 32 (4) (March 2008): 86–89.... Terrorism and homeland security: an introduction with applications.... At Any Cost: national Liberation Terrorism....
Preview sample
Trends in Hospital Information Systems
7 pages (2037 words) , Download 2 , Research Paper
Free
The derailed widespread growth of Computerized Information systems with respect to automation of healthcare information is attributable to notable barriers ranging from financial constraints, slow and tedious data input, resource issues, ethical and security issues, Incompatibility between systems, and skepticism.... Derailed widespread growth of Computerized Information System with respect to automation of healthcare information is attributable to notable barriers ranging from financial constraints, slow and tedious data input, resource issues, ethical and security issues, Incompatibility between systems and skepticism....
Preview sample
Critical Appraisal of Technology Transfer Mechanisms between US, UK, Europe, Middle and Far East
19 pages (5694 words) , Download 0 , Essay
Free
Gravity with gravitas: A solution to the border puzzle.... The mechanisms for technology transfer include the Cooperative Research and Development Agreements or CRADA (Department of Homeland security, 2012).... Licensing agreement is also a mechanism in technology transfer (Department of Homeland security, 2012).... This understanding sets-up a framework of cooperation between agencies and it facilitates operations and the sharing of resources (Department of Homeland security, 2012)....
Preview sample
The Patriot Act and Outsourcing
5 pages (1250 words) , Download 2 , Essay
Groups such as national Reform Association, and NACOC were furious at the government who could use wiretaps for forty-eight hours without obtaining a search warrant.... Twenty-five days later, still reeling with shock, Americans and people around the world received another blow: the U....
Preview sample
The Merits of Privatization
2 pages (500 words) , Download 3 , Research Paper
Free
Privatizations should only be considered as the most viable option for bring prosperity without compromising on national security and country's future.... The government is installed for maintaining law and order, security and to bring the prosperity to all the sections of the society....
Preview sample
The Structure of Domestic Legal System in Australia
10 pages (2716 words) , Download 0 , Research Paper
Free
There issues of trade law, indigenous issues, refugees' policies, terrorist threats, environmental protection and security at regional and international level.... insburg (2006) observes that, the international law has been a system that has been used for maintaining peace and security.... There are structures like UN security Council that provide measures against a breaching state.... It can also authorize the use of force if necessary to restore peace and security....
Preview sample
Role of Media in Forming Australias National Identity
6 pages (1843 words) , Download 0 , Essay
Free
Having escaped from a low security prison, he is unwillingly traveling to see his dying mother.... This paper ''Role of Media in Forming Australia's national Identity'' tells that Present-day Australia is a multicultural society, the national identity of which is still in the process of formation.... This paper sets out to analyze the modern influences that are shaping the cultural and national identity of Australian society with the emphasis on media....
Preview sample
America and It's Independent State
13 pages (3250 words) , Download 2 , Essay
Free
security.... But when a long train of abuses and usurpations pursuing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to provide new Guards for their future security.... That birth was unique, not only in the immensity of its later impact on the course of world history and the growth of democracy, but also because so many of the threads in our national history run back through time to come together in one place, in one time, and in one document: the Declaration of Independence,” (Using NARA p....
Preview sample
Turkeys Prospect of Becoming an EU Member
20 pages (6185 words) , Download 1 , Coursework
Free
The third subject lies in the geopolitical and security repercussions associated with Turkey's geographic extent (Oborune & Zalel, 2011).... Furthermore, Diez (2005) asserted that Turkey as an EU member will ensure the security of energy supply by virtue of its bordering the world's leading producers of crude oil.... Moreover, the talks should also integrate Turkey as partner to the Common security and Defense policy framework of the EU.... Turkey cooperation with EU through the Common security and defense Policy program will aid in showcasing Turkey's defense and security assets within the highly unstable Islamic states....
Preview sample
The Appearance of the Internet
6 pages (1538 words) , Download 2 , Essay
Free
Snowden worked for the government (CIA and national security Agency) and stole secret documents of strategic value to expose them through media.... Where is the line between national security and security of an average citizen and his private life?... The paper "The Appearance of the Internet" discusses that many young and inexperienced users overwhelmed with the possibility of the Internet upload tons of their private photos to social networks and reveal their hobbies, friends and places they visit easily....
Preview sample
Total confinement
5 pages (1250 words) , Download 4 , Term Paper
Supermax Prisons contain small units which guarantee prison wardens the highest level of security for inmates who have been convicted for high profile crimes.... The reason behind the control units is to ensure long term, isolated shelter for inmates who pose the highest security....
Preview sample
Patient verification
3 pages (750 words) , Download 2 , Research Paper
Alternatively, the patient can physically present a document of identification like a driver's license or social security card.... The Joint Commission of the United States made improvement of patient identification accuracy its focus in the national Patient Safety Goals introduced in 2003 (Marie, 2009).... The national Priorities Partnership and national database of nursing quality indicators show that patient misidentification poses as one of the most serious risks to the safety of patients....
Preview sample
US Foreign Policy and the Syrian Conflict
10 pages (3813 words) , Download 0 , Literature review
Free
However, with the support of Iran and Russia, the Assad regime was able to block all the attempts by the United States to seek the right to provide support to the rebels in Syria through the UN security Council.... Although the Assad regime is at the forefront, the continued survival of the regime is due to Russia and China, two UN security Council permanent members who have stood strongly behind the Iranian regime.... Clearly, Russia seeks to maintain a system where the values of the UN will be respected and national integrity and territorial sovereignty can be upheld in all situations and contexts....
Preview sample
How Have Cell Phones Changed Us Socially
8 pages (2311 words) , Download 1 , Report
Free
Cell phones provide entertainment according to 52% of Teens, and security to about 80% (Harris Interactive 3).... Studies show that the key reason why most people obtain cellular phones is security concerns (Haddon 9).... However, cell phones also give false sense of security.... 80% of the population believe that cell phones are a source of security as people can get reassurance of the well being of their loved ones and call for help in case of emergencies and danger (Geser 5)....
Preview sample
Analysis of Terrorist Attacks in International Law
11 pages (2750 words) , Download 2 , Research Paper
Free
These three branches of law are particularly tailored to address the rights of individuals during difficult times such as a public emergency, challenges to national security, and periods of violent conflict.... here is another right which is the so-called Right of Hot Pursuit under which in May 1836, US forces under General Gaines invaded mexican territory in order to pursue marauding Indians, who had infiltrated into US and committed many crimes and were escaping to Mexico....
Preview sample
Green Gardens Event Management Planners
4 pages (1426 words) , Download 0 , Case Study
Free
ource and procure security measures for the people attending the event. ... he crowd management exercise will be conducted by the security team from the Abu Dhabi police security personnel and other appointed volunteers. ... mergencies such as first Aid, fire breakout, and criminal activities will be handled with the help of Abu Dhabi security Officers.... ll these exercise will be controlled by the operational events management team who will be responsible for and mandated with declaring security procedures....
Preview sample
The Role That Economic Sanctions Have In Diplomacy
10 pages (2735 words) , Download 2 , Essay
Free
national security objectives, other foreign policy objectives, ... he national security objectives also can be applied to international security, such as that enforced by the UN.... hortly after the first Gulf War, the security Council of the United Nations arranged for the implementation of economic sanctions on the country of Iraq.... This security Council represents the world's major powers, with special powers granted to those members who were on the Allies' side during the Second World War....
Preview sample
Citizenship and Immigration
10 pages (2928 words) , Download 0 , Essay
Free
Job security became an issue as people feared that they would be unable to get jobs due to the large number of immigrants.... he issue of security also comes to play in the country.... The Jeffersonian Republic split into two parties, that is, the Democratic Republicans and the national Republicans. ... According to Semite, slavery justified exclusion from national citizenship (Samito 14).... A series of reforms in this era purposed to create an American society with a common national identity....
Preview sample
Transmigration of People Across the Globe
7 pages (2114 words) , Download 3 , Essay
Free
When the man refused to obey and was about to go in forcefully, the nurses had no choice other than to call the security personnel to stop his further advancement.... Meanwhile the security staff came and intervened.... There was some verbal heated exchange with the security staff.... The man did not heed to the reconciliatory attempt of the well-trained security personnel. ... New York: national Leage for Nursing ...
Preview sample
Writing Assigment
15 pages (3750 words) , Download 2 , Essay
As per the bible, the first murder of a human being happened when Cain was killed by his brother Abel.... Men have killed humans for revenge, protection, honor,.... ... ... The middle ages and the Wild West provides stories of duels and shootouts for the sake of honor.... Even laws and statutes allowed death penalty or capital punishment if found to be justified....
Preview sample
Arab Charter as it Relates to the European Human Rights
9 pages (3225 words) , Download 2 , Essay
Free
This article seeks to ensure free press in Arab states since the restriction on the right to information may only aim at ensuring national security and morals in the society.... Article 14 guarantees the right to liberty and security and prohibits the individuals from searches, arbitrary arrests and detention without trial (Child Rights International Network, 2013).... Similarly, Article 5 of ECHR provides for the right to liberty and security (Shelton & Wright-Carozza, 2013)....
Preview sample
The principle of non-refoulement. Practical usage of the non-refoulement principle
15 pages (3750 words) , Download 2 , Essay
Free
In accordance with the testing system suggested by James Hathaway and Colin Harvey12, it is relevant to determine for the country if an asylum seeker endangers the national security.... The exclusion of refugee is possible in case a refugee “has been convicted by a final judgment of a particularly serious crime” and he violates national security.... Therefore, the following forms of appeal are appropriate for provision responsible bodies and institutions: “an appeal against the decisions of the border Agency, Immigration and Asylum Tribunals, the Special Appeals Commission another bodies involved in the process”9....
Preview sample
The Security Systems Basis for Design in Gold Storage Facility
10 pages (2908 words) , Download 0 , Term Paper
Free
"The security Systems Basis for Design in Gold Storage Facility" paper states that using electronic surveillance is of the essence in the current technocratic society.... The security of a facility is very significant for the protection of assets, monies, precious metals, personnel, private information and of other customers' welfare as well.... But due to lack of knowledge/ technology in the area of security management, many gold storage facility encounter breaches to their security, resulting in armed robbery, theft and the like....
Preview sample
The Serious Road Traffic Accidents Worldwide
44 pages (10144 words) , Download 2 , Dissertation
Road traffic injuries also represent significant financial costs to developing countries with injuries costing about 1-2% of the gross national product (WHO, 2013).... Nonetheless, reports from various countries indicate success stories in the prevention of road accidents, mostly assisted by coordinated national efforts....
Preview sample
Regans Economic Strategy and Policy
16 pages (4349 words) , Download 2 , Essay
Free
Reagan's strategy was perhaps best encapsulated in NSC national security ... eeting of the national security Planning group, the president and his closest advisers ... In a section of a draft national security document that elicited no ... ational security Council process to collapse.... ining of international waters, and sponsored UN security Council Resolution 598, ... harged that the security Councils' handling of each of these issues reflected animus ...
Preview sample
Effective Collaboration and the Ideal Scenario
15 pages (3750 words) , Download 4 , Essay
Free
security should no longer reside in achieving a bachelor's degree and depending upon the education represented therein to carry the holder through life, (at least for people with normal learning process), but the greater challenge is how to make the most out of individuals with learning disabilities, how to help them achieve their potential and become productive citizens of the country.... security would exist in knowing that suitable educational opportunity is available at all times to assist with any necessary or desirable changes....
Preview sample
The Economic Liberalization Movements in Egypt and Syria
11 pages (2936 words) , Download 1 , Term Paper
Free
The author of the paper titled "The Economic Liberalization Movements in Egypt and Syria" discusses the view that the process of economic liberalization visible in much of the Middle East during the past twenty years represents a retreat of the state.... .... ... ... When Bashar Assad because President of Syria, he 'inherited control over one of the poorest countries in the Middle East, saddled by one of the highest rates of annual population growth in the region, negative economic growth (-1....
Preview sample
Analysis of American Identity
11 pages (2750 words) , Download 2 , Assignment
Free
One of the basis on which Johnson's program built upon FDR's program was social security and social benefits.... FDR had brought in the Social security Act and Johnson improved on this by introducing Medicare, great reforms in education, civil rights, and ‘elimination of poverty' programs.... After independence people began to form a national identity as those belonging to a single nation.... Even though feminine identity and biological determinism is still an issue, the gap is getting closer towards a national identity....
Preview sample
What Can Be Done about Iran's Nuclear Program
10 pages (2860 words) , Download 0 , Literature review
Free
t the same time, the countries seeking nuclear weapons will continue to suggest in their defence that their nuclear arsenal is a strategic or defensive weapon which is only to be used if their national security is threatened (Paulikas, 2006).... It has also created some very important questions for any student of politics, economics, sociology, current affairs as well as contemporary international affairs such as why countries feel that nuclear weapons are required for their security and why nuclear proliferation is a global issue....
Preview sample
European Court of Justices Activism in European Integration
11 pages (2750 words) , Download 2 , Essay
Free
uropean integration can be seen as a complex process both structurally and procedurally and it seeks to advance the welfare as well as security of a “transnational society” that comes under their jurisdiction (Puchala 1999:318).... The subsequent trade integration within the European continent also has benefitted “peace and security,” which further accentuated the benefits of integration of European nations (17).... In yet another demonstration of its activism, the ECJ has broken “newer grounds” by extending its jurisdiction also into the ‘Second Pillar' and established its competence for reviewing the legal validity of instruments that are adopted into the framework of the Common Foreign and security Policy, as can be evidenced from the recent case of ECOWAS (6)....
Preview sample
Violence in America
10 pages (2500 words) , Download 3 , Term Paper
The Republicans maintained that the national government was sovereign.... Thus, the national government would work with state governments in protecting the status and rights of American... American Civil War The American civil war lasted from 1861 to 1865 and led to death of hundreds of thousands of Americans....
Preview sample
The Value of the Internet for Terrorists - ALQAEDA
26 pages (6500 words) , Download 2 , Dissertation
The mass media, policymakers, and even security agencies while focusing on the proliferating threat of cyber-terrorism, have paid insufficient attention to the more routine uses made of the Internet.... It is imperative that the security agencies continue to improve their ability to study and monitor terrorist activities on the Internet, and explore measures to limit the usability of this vulnerable medium by modern terrorists....
Preview sample
External Forces of Cross-Border Restructuring in Airline Industry
9 pages (2633 words) , Download 2 , Essay
Free
The essay "External Forces of Cross-border Restructuring in Airline Industry" focuses on the critical analysis of the major issues in the external forces of cross-border restructuring in the airline industry.... Running Head: Restructuring in Airline Industry External Forces That Have Brought Cross border Restructuring In Airline Industry [Name of Institution] ... The global collaboration of EU and Japan to restructure the cross border airline industry results in the: ...
Preview sample
The US Role in Solving Climate Change
7 pages (2215 words) , Download 2 , Research Paper
Free
Climatic Changes as Economic and security Challenges Global changes in climate caused by the greenhouse effect lead to grave economic consequences.... (2009) Climate change and security: examining China's challenges in a warming world.... national economic competitiveness along with sustainability, as suggested by Sahlberg and Oldroyd, are the key factors of the nation's prosperity and development (Sahlberg & Oldroyd, 2010, p....
Preview sample
The Issues in Contemporary Hong Kong Policy
7 pages (2147 words) , Download 1 , Research Proposal
Free
In the previous year, the news of revolution in Hong Kong evoked attention from global community to the development of democracy in this place on the border of China.... Their appearance was a result from both the failures of social security in managing city's economic problems (Chan) and inability to define the direction of “high politics,” or foreign affairs and national issues (Poon 107).... Social security Policy in Hong Kong: From British Colony to China's Special Administrative Region....
Preview sample
Social Welfare Policy
38 pages (9500 words) , Download 3 , Essay
Premium+
The writer of the present research would conduct a detailed, in-depth analysis of the health care system organization background in the US, discussing its history and changing factors, with further forming a particular original policy regarding the chosen topic.... ... ... ... The health care system of the United States of America is one of the most complicated and advanced systems in the world....
Preview sample
Illegal Immigrant Deportation Practiced in the United States
5 pages (1433 words) , Download 2 , Essay
Free
Immigration is not a threat to national security the United States.... 2008 References “Deaths on the border.... security guards at main offices or private institutions, police officers, and officers like airport security agents are having policing right which they misuse to trouble immigrants.... The problems caused by the immigrated people are found to be trivial compared to the other security problems....
Preview sample
Major Influences That Have Shaped Foreign Policy in the USA
14 pages (3500 words) , Download 2 , Dissertation
Free
economy and security plans.... Under the Bush regime, it had also defied its allies and their warnings, and had gone ahead in declaring war against Iraq and Afghanistan, citing security reasons.... The question in the arena of international relations relates to the general attributes of the so called ‘domestic roots' that help to shape US foreign policies; the democratic aspects in the behaviour of US towards other countries, globally; and whether its national concerns and ...
Preview sample
The Police Interaction with the Criminal Justice System
12 pages (3000 words) , Download 2 , Term Paper
Free
Before 1820, the safety and security of citizens were taken care by private security agencies in the western society.... After the introduction of Policing system most of the security measures were performed by the police teams and they were under the direct payroll of government.... Previously the urban policing was initialized to fulfill the issues related to public security only.... In the modern world security has become one of the most important factor and police-men are provided all sort of equipment required to keep the society peaceful and safe....
Preview sample
The Invisible Hand of Cowen and Tabarrok
12 pages (3128 words) , Download 2 , Essay
Free
He believed that during the period of recession, the government should buy security bonds in order to reduce aggregate demand since this reduces the flow of money amongst the citizens.... For industries elated with defense, politicians feel that it is vital to protect such industries because they mean a lot to the security of a country.... These concepts are; national income, Gross Domestic Product, Economic growth, inflation and full employment....
Preview sample
3601 - 3650 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us