StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Discovery, Deceit Ingenuity that Lead to the Atomic Bomb
5 pages (1250 words) , Download 0 , Book Report/Review
Free
Indeed, where national security and national interests are involved, keeping technology a secret or containing such information is practically impossible.... eep in their homeland, the Nazi regime had set up a high security military laboratory site for the manufacturing of heavy water (Sheinkin 148)....
Preview sample
International Law Commission
9 pages (2402 words) , Download 1 , Essay
Free
??At present the five powers with vetoes on the security Council are interpreting that job more widely than ever before.... Its 15 judges, nominated for nine years by the security Council and confirmed by the General Assembly, are picked to reflect the variety of the worlds legal systems.... ?     (d)     Jurisdiction with regard to crimes committed outside national territory; ...
Preview sample
The Position of Atypical Workers in EU
8 pages (2000 words) , Download 2 , Essay
Free
The working timing of a worker, whether regular or part time, should not affect their standards of work, conditions of work or security at work.... espite these legislations, the uncertainty surrounding job security and provisions of an atypical job remain.... ‘Agency and temporary workers to get more job security', The Guardian, London. ... These regulations were powerful and impactful because they were transmitted to the national norms of all the EU Member States and thus, these rights gained more recognition. ...
Preview sample
Advocates of Human Rights and Champions of Countrys and Citizens Safety
5 pages (1250 words) , Download 3 , Research Paper
Free
v) the right not to be deprived of liberty and security of the person except in accordance with a procedure prescribed by law and with various safeguards (Article 5); ... ??The derogation is made in respect of the extended powers of arrest and detention of suspected terrorists, pending deportation, according to the Anti-terrorism, Crime and security Act, 2001, which was passed in the wake of the terrorist attack on New York on 11 September 2001,” (Clayton, 2003, p....
Preview sample
The Argument Gun Laws
5 pages (1381 words) , Download 0 , Coursework
Free
The main reason for the controversy apparently stems from the Second Amendment, which reportedly states that: 'A well-regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed'.... The main reason for the controversy apparently stems from the Second Amendment, which reportedly states that: “A well-regulated Militia, being necessary to the security of a free State, the right of the people to keep and bear Arms, shall not be infringed” (Legal Information Institute par....
Preview sample
Should schools require their students to wear a school uniform
5 pages (1250 words) , Download 3 , Essay
According to the national Center of... One of the issues that most concerned him was discipline and violence in schools.... He stated the following: ¨ …And if it means that teenagers will stop killing each other over.... ... ... How would you feel if your child were attacked over clothing?...
Preview sample
Globalization and Economic Benefits to the Human Kind
4 pages (1000 words) , Download 2 , Essay
Free
But in every case, the resources in question are much too expensive or polluting, or, in the case of "clean coal," too imaginary to make a difference in protecting either our national security or the global climate (Gore, p.... This paper argues that the extent of damage caused by globalization in subjects such as morality, human rights and freedom is more than that caused in the economic and political circles....
Preview sample
Key Transitions and Conflicts in Baseball
5 pages (1276 words) , Download 4 , Essay
Free
Furthermore, there was no work security as players were sacked frequently with little or no explanations. ... The national association of baseball players, NABBP in 1868 found irregularities in the game as some star players were paid secretly or indirectly while other players did not get paid....
Preview sample
Severe Punishment
4 pages (1220 words) , Download 4 , Term Paper
Free
But when it comes to terrorism, national security concerns should be paramount.... The paper "Severe Punishment" tells us about the death penalty.... Some people believe that the death penalty like severe punishment is the only option available at present to prevent hard-core criminals from killing innocent people....
Preview sample
Urban Change in Saudi Arabia
7 pages (1839 words) , Download 0 , Outline
Free
The PPA as the owner of the ITCC complex, in its capacity developed the recreation, security and the compound service facilities through the help of Al Ra'idah Investment Company, which is also the Agency's investment arm.... The compound has eight towers which are equipped with the latest monitoring and security technologies, communication networks, data transfer cables and back-up dynamo that automatically operates.... Moreover, there are external courts, waterworks, security systems and service area within the compound....
Preview sample
Health Disparity between Australias Non-Indigenous and Indigenous People
6 pages (1639 words) , Download 0 , Essay
Free
national programs should be based on a sense of equality rather than selective planning.... national training programs that are directed to indigenous health professionals should be prioritized.... A long-term national health care plan for the indigenous population should be put in place in such a way that a multifaceted approach will be used throughout the implementation process....
Preview sample
The Libyan Civil War
8 pages (2000 words) , Download 4 , Essay
Free
Again, because of the protests several civilians were killed by the security forces that far more accelerated the heat of the situation and militants, tribal people joined the protest that gave the shape of the revolution.... Followed by Benghazi noteworthy traces of revolt were witnessed in the towns of Tobruk and Derna where slogans and demonstrations were carried out by young people along with mass firing by the police and demolition of ammunition-depots by the people loyal to Qaddafi (Holding Libya Together: security Challenges after Qadhafi, Dec, 2011)....
Preview sample
What is Macroeconomics
7 pages (1750 words) , Download 2 , Essay
Free
If the central bank purchases securities, it exchanges money for security.... If the central bank purchases securities, it exchanges money for security.... Corporate Inflation linked bonds: a security which adjusts every month for CPI changes.... It's inclusive of global, regional and national economies.... It's inclusive of global, regional and national economies.... Macroeconomists build models that clarify the connection between factors like international finance, national income, consumption, output, savings, inflation, unemployment, international trade and investment....
Preview sample
What is the State of Britain
8 pages (2120 words) , Download 3 , Essay
Free
The goals of economic, political, and social management are largely based on the security of national sovereignty.... The goals of economic, political, and social management are largely based on the security of national sovereignty.... By focusing on national sovereignty, the state of Britain has moderated economic depression by sustaining a decisive connection with the past.... At current rates of spending and taxation, a significant portion of the national revenue is blocked by the government....
Preview sample
Whether Capital Punishment Deters Crime
6 pages (1655 words) , Download 0 , Research Proposal
Free
Research has indicated that, practicing capital punishment will not offer more security to our lives.... The size of these respondents is limited by the data collection method given that interviews take time to organise and given that offenders are involved, security might be a concern....
Preview sample
Sustainability of Biofuels and Hybrid Transportation Technologies
8 pages (2126 words) , Download 2 , Assignment
Free
The renewable nature of biofuel is a promising factor in the security of biofuel.... Additionally, nations such as the United States never wanted to over-depend on the foreign energy supply; thus, the invention of alternative fuel that could be produced locally was to elevate energy security in such nations (Droege, 2008).... The renewable nature of biofuel is a promising factor in the security of biofuel.... The use of biofuel will increase food security and reduce numerous calamities since prolonged use of these hybrid technologies and biofuels will significantly rectify the biodiversity and ecosystem....
Preview sample
Analysis of Amazon in the UK
11 pages (2750 words) , Download 3 , Term Paper
Free
n Apr 11, 2001 Amazon and border announced strategic alliance.... n this case Amazon will continue to sell books on its own, but will also provide services to border.... In return Amazon will get a share of every sale by border.... nformation security Analysis ... here are almost as many definitions of privacy and information security as there are users on the Internet, security refers to the controls (including authentication, authorization, confidentiality, integrity and availability) applied to electronic data, and privacy refers to the controls (including confidentiality, integrity and authorization) applied to personal data associated with an individual data subject....
Preview sample
Vendor Management in Freight Forwarding Companies
11 pages (3326 words) , Download 1 , Research Proposal
Free
reight forwarding involves the transfer of goods along cross border, national and international routes, to reach pre-determined destinations.... f the materials move thorough ocean, as per the customs border Protection's 24 Hour Rule, vendors must supply shipment information to company's freight forwarders.... ncreasing security requirements is one of the major challenges in the freight forwarding business.... In order to sustain the customers and business partners, companies are required to assure security to the cargos and for this the contribution from vendors is essential....
Preview sample
Globalisation Demands a Single Currency
19 pages (5051 words) , Download 1 , Coursework
Free
'Globalisation Demands A Single Currency' paper states thta the creation of economic circulation of the new uniform collective currency, and expansion of a field of activity of any already functioning national currency are the two tendencies that define the ways of development of this form of money.... Really, if Europeans have created a uniform central bank, if they managed to convince of necessity of the introduction of a single currency let not all the national governments, but the majority, why it is impossible to consider an opportunity of a similar agreement between the USA, Europe, and Japan....
Preview sample
Earmarked Tax in Public Sector
19 pages (4750 words) , Download 2 , Essay
Free
Furthermore, taxes that are collected from fuel consumption and motor vehicles are allocated for the construction of national and state roadways (Anesi, 2003). ... Furthermore, it has been observed that demand for healthcare services from the past thirty years are increasing at a rapid rate in comparison to the national income of the world nations which again imposes a certain degree of threat on the proper allocation of resources (Treasury Department, 2012)....
Preview sample
Marian Anderson Speech
5 pages (1579 words) , Download 1 , Essay
Free
rom the above it is clear that Martin Luther King Jr performance at the Lincoln Memorial was remarkable and the moral aspects of it caused a national reconciliation and acknowledgment of racial inequality.... This work called "Marian Anderson Speech" describes a speech as if it was by Marian Anderson where she reflects on Martin Luther King Jr....
Preview sample
Mental Health - Living with Schizophrenia
6 pages (1942 words) , Download 0 , Case Study
Free
Her acceptance to take the medication enabled her to receive care in a group that provided her with a security, stability, and normalcy and adhering to strict regimens of medication, diet, and exercise (Meadows, Singh, & Griggs, 2012 36).... The satisfaction brought about by goals, achievements and security from the group enabled her continued adherence to strict guidelines of using prescribed medication to manage her mental condition.... The promise of choice, stability, safety, security and satisfaction with individual objectives are evidently some of the key drivers towards continued use of prescribed medication by Millie....
Preview sample
Hacking of Computer Systems and Cyber Crimes
5 pages (1342 words) , Download 2 , Essay
Free
The paper "Hacking of Computer Systems and Cyber Crimes" describes that individuals and corporations can benefit greatly from two articles because they provide firsthand information on the potential dangers of cyber assaults, and why security measures must be re-enforced.... Therefore, this paper aims to provide a summary of and a detailed review of two recent articles in the history of computers or computing; the articles are going to narrow down on the topic further, by focusing on hacking incidences and cyber security threats that have bedeviled leading companies such as Apple Inc in the recent past....
Preview sample
The Strategic Causes of Conflict: What Caused the 1991 Gulf War
14 pages (3594 words) , Download 2 , Essay
Free
The Strategic Causes of Conflict - What caused the 1991 Gulf War Introduction One of the most important challenges that international communityhas to face is the development by countries worldwide of weapons that can severe threaten security at international level.... Shortly, the US government developed a coalition, at international level, for deciding on the measures that should be taken against Iraq: Egypt and Saudi Arabia were among the Arab states that stated their willing to participate in such coalition since their security seemed to be threatened by Iraq....
Preview sample
Accreditation of Healthcare Institutions
2 pages (500 words) , Download 3 , Essay
Free
national Voluntary Accreditation for Public Health Departments.... This essay "Accreditation of Healthcare Institutions" describes the process of accreditation which is the assessment of health care institutions and providers of how well they comply with the standard procedures of providing facility and care to the consumers of those facilities....
Preview sample
International business class (Discussion Board)
1 pages (250 words) , Download 2 , Assignment
Free
He referred to those factors as the “diamond of national advantage”, by implication he asserted that it is the inter-linkage of these factors that would actually precede the attainment of the competitive advantage.... Further, he pointed out that government policy and the chance of event had a role to play in the inter-linkage and hence a national competitive advantage factor.... This propelled them into the new millennium and provided support for them to remain competitive in the national and global market....
Preview sample
Abortion Legalization Importance
6 pages (1500 words) , Download 2 , Essay
Free
According to the data of the national Longitudinal Survey of Youth (NLSY), when teenage mothers or rape-victims are denied the abortion right, it causes significant negative effects on their physical, psychological, and social health.... The paper argues that medical community has an obligation to conduct all legally approved medical services, including abortion and fulfill their moral duty to serve the society by performing own professional job functions regardless of personal values and moral principles....
Preview sample
Substance Abuse
4 pages (1000 words) , Download 5 , Research Paper
However, according to national Institute on Drug Abuse (NIDA 2011), it is a common misreading that drug abusers lack moral principles or will power essential for changing their behavioral traits.... Substance Abuse: Alcohol, Prescription Drugs, and Illegal Drugs (College/University) Substance Abuse: Alcohol, Prescription Drugs, and Illegal Drugs Introduction Substance abuse or drug abuse is a wrongful practice that mainly involves the intake of drugs and alcohol....
Preview sample
Loss prevention with a focus on internal/external threat and countermeasures
11 pages (2750 words) , Download 2 , Research Paper
Second, the hiring of undercover store security guards will help catch more shoplifters and employee thieves.... By observing the stores' current loss prevention system, management can spot the time and type of next possible store losses.... For example, a store shelf where there is no CCTV camera or....
Preview sample
Contemporary Policing Issues and Community Support Development
10 pages (2631 words) , Download 0 , Coursework
Free
In this regard, the internet has numerous blogs relating to security and public safety.... As such, the police use these blogs to sieve off relevant and crucial information on the operations and functioning of its security and law enforcement mandate.... Therefore, this evaluation establishes that the police force uses the informal media as a platform to not only acquires security related information, but also an avenue to initiate public debates on issues the police force requires the public input and contribution. ...
Preview sample
International management
12 pages (3000 words) , Download 2 , Essay
With a wide range of products in its line the company boasts diversification in enterprise security services such as network security, information security and information assurance compliancy, wireless access points, mobile applications, analytics and portfolio management software (HP....
Preview sample
Changing Labor Markets and Demographics
4 pages (1000 words) , Download 2 , Essay
He analyzes the varied ideas highlighting that employment is an appropriate approach of attaining economic security.... Based on this, economic security is not only achievable by one being in employment but also the amount of work and the remuneration he or she gets from employment (Schiller, 2008).... This was attributable to the availability of opportunities of economic security that could be acquired by self except the black man....
Preview sample
Depression in the context of abnormal psychology
9 pages (2250 words) , Download 3 , Essay
Free
This study was financed by the NIMH (national Institute of Mental Health) which evaluated CBT (cognitive-behavioral therapy) through Fluoxetine, presently the single antidepressant medicine by FDA (the U.... national Institutes of ... Depression refers both to a serious mental disorder and to a normal mood involving sadness that all people occasionally experience....
Preview sample
Psychology of Violence
9 pages (2903 words) , Download 2 , Term Paper
Free
Hence, the Relationship Erudition Theory is a principle that understands dating knowledge based on the natural tendencies among human beings to seek care, affection, and security from their partners.... Accordingly, the Relationship Erudition Theory is conceptualized as the understanding among individual to the nature and value of relationship in one's life, in which a person may gain security, acceptance, care, and love.... Theoretical Implications for Prevention The Relationship Erudition Theory suggests that human beings have the innate need for a relationship that has security and love....
Preview sample
Occupational Safety and Health Legislature and Standards
13 pages (3772 words) , Download 2 , Essay
Free
In the US occupational health and safety regulation is enforced by the occupational safety and health commission, occupational health and safety administration and the national institute for occupational health and safety. ... Trade union works together with the various bodies to ensure the legislation are implemented at both the union level and the national levels.... n the United States, the national institute of occupational safety and health (NIOSH) was created by the 1970 act on occupational health and safety....
Preview sample
Welfare/Social Policy
2 pages (500 words) , Download 2 , Assignment
Free
These programs generally target aid at those individuals in society that are unable to work, due to age or health conditions; from Welfare programs and the Social security program that do their best to contribute to ending poverty as well as they can.... These programs generally target aid at those individuals in society that are unable to work, due to age or health conditions; from Welfare programs and....
Preview sample
Political Conspiracy and Slander
31 pages (8147 words) , Download 3 , Essay
The essay "Political Conspiracy and Slander" focuses on the critical, thorough, and multifaceted analysis of the employment of social scientific premises for ideas in the widespread occurrence of state assaults on democratic principles and practices.... ... ... ... Investigations of political conspiracy and slander had been left almost fully to political elites, who usually had clashes of interests, and to novice researchers, who normally do not possess adequate training in the social sciences....
Preview sample
From Poverty to Social Exclusion: An Introduction to Social Policy
4 pages (1000 words) , Download 2 , Essay
Social security must be achieved by co-operation between the State and the individual.... The State should offer security for service and contribution.... The State in organizing security should not stifle incentive, opportunity, responsibility; in establishing a national minimum, it should leave room and encouragement for voluntary action by each individual to provide more than that minimum for himself and his family....
Preview sample
The Impact of the Wikileaks on the International Terrorism
2 pages (659 words) , Download 5 , Essay
Free
ikileaks is essentially threatening the genuine national security interest, which in turn is a way of assisting the wider terrorism community.... Its activities are thus facilitating their capacity to cause major harm, should the security fail to be reinforced and the whole system of operations for the military and for the intelligence services fail to be reinvigorated.... hus, what Wikileaks has been doing in relation to matters security and military operations is akin to aiding international terrorism, as well as the enemies of the USA....
Preview sample
The Subject of Gun Control in the United States
2 pages (725 words) , Download 6 , Essay
Free
Considering the changing times and the need for security, there should be a relaxation of gun control laws.... They argue that it would assist them in fighting for their security.... Opponents of this ruling use the Second Amendment in their favor as according to this Amendment, "A well-regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed.... It is argued that the denial of firearms for personal security is a violation of the constitution of the United States (Associated Press 2007)....
Preview sample
Wastewater Treatment
2 pages (500 words) , Download 3 , Essay
Free
Water Quality and Wastewater Management.... ... t is standard practice—especially in the Western part of the United States—to inject treated wastewater into the ground, where it is added to the groundwater table.... ... ... ... Water Quality and Wastewater Management.... ... t is standard practice—especially in the Western part of the United States—to inject treated wastewater into the ground, where it is added to the groundwater table....
Preview sample
Survey of Information Systems Personnel Theory
12 pages (3351 words) , Download 1 , Assignment
Free
"Survey of Information Systems Theory" paper examines technical, business and system competencies, Information Systems, Cloud Computing, Operating Systems, Enterprise Systems, Intelligent systems, Web services, E-mail confidentiality, and Data security.... Data security 15 ... Technical competency entails knowledge and skills involved in hardware, software, security, and network divisions.... An organization needs understanding about data security and ownership....
Preview sample
Marketing Fundamentals - TESCO
10 pages (2686 words) , Download 2 , Essay
Free
The political impacts can be local, national or international.... - Economic - The local, national and world economy impact.... - Legal - How local, national and world legislation affects the business.... - Environmental - The local, national and world environmental issues....
Preview sample
Strategic Corporate Finance
5 pages (1250 words) , Download 2 , Essay
A corporation that wants to expand in the marketplace naturally needs more finances and funding to undertake its plans for local, national or even international expansion and to this end it must also have a good strategy for marketing and distribution of its products and services....
Preview sample
The Impacts of Terrorism on the Urban Form
6 pages (1625 words) , Download 1 , Essay
Free
Why national security Conservatives and the World May Miss In the GOP Race.... Other pessimists state that New York is still vulnerable to attacks even after the creation of The Homeland security Agency that was meant to prevent the terrorist attacks even further (Samuels 29).... The Department of Homeland security.... The Department of Homeland security Intelligence Enterprise: Operational Overview and Oversight Challenges for Congress....
Preview sample
PCR Based DNA Fingerprinting Lab
6 pages (1664 words) , Download 0 , Research Proposal
Free
However, the security agencies justify this by saying that national security is far much esteemed than the privacy of an individual. ... The DNA is available for viewing by the security agencies and therefore, no privacy is affected.... These issues include interference with individual privacy, discrimination and security....
Preview sample
Women in Progressive Era
5 pages (1314 words) , Download 3 , Assignment
Free
Efforts began to develop at the grassroots level and extended to the state and national level.... ere are the key events that took place between 1848 to 1920 from the women's rights convection in Seneca Falls, New York, The formation of national American Women Suffrage Association, and the passage of the 19th amendment to the constitution giving women right to vote in the republic of America. ... Then in 1850, the first national Women Rights convention took place at Worcester attracting more than one thousand participants....
Preview sample
Media and Its Effect on Terrorism
10 pages (2828 words) , Download 2 , Essay
Free
This all-encompassing, asymmetrical threat is thriving via the use of the tools of social media; generating life-long security challenges for domestic police force and intelligence organizations; and increasing the domestic threat of random, low level surgical strikes from the home-based terrorists using person-borne, vehicle-borne, and leave-behind improvised explosive(Joseph, 3)....
Preview sample
Definition of Science
5 pages (1842 words) , Download 0 , Essay
Free
national science education standards.... The paper "Definition of Science" discusses that science is the study of behaviour, nature and measurement of reactivity and the processes connected to their transformations.... Many people consider science as a deliberate and gradual process that is driven by the accumulation of facts....
Preview sample
Asian Single Parent Migrant Families NSW Australia
14 pages (4038 words) , Download 0 , Case Study
Free
owever, as these demographic and social changes occurred, the contiguous employment structures, wages and even social security agreements were not adequate enough to cater for the needs of sole parent families and especially those families that are headed by migrant women of Asian and Chinese origin who are barred by traditions from working and who depend on their families for survival.... his section is an outline of the development of policies for lone parents within the Australian social security system and recent policy changes that have been introduced by the government regarding this issue under “Welfare to Work”....
Preview sample
37551 - 37600 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us