StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Hobbes (15 88-1679) on the right to all
3 pages (750 words) , Download 2 , Essay
And therefore, as long as this natural right of every man to everything endureth, there can be no security to any man (how strong or wise so ever he be) of living out the time which nature ordinarily allowith men to live.... Thomas Hobbes is an English philosopher, whose political thought rested on the philosophical tradition of sixteenth century and on orthodox theories, but he went beyond the limitations of these theories (skeptical relativism). ...
Preview sample
Public administration
2 pages (500 words) , Download 2 , Essay
Free
As the closed down model initiates order and security, therefore it can be said that all such organizations that spring up to nonconventional activities should go through rigorous approval processes and should comply with all the legal norms.... Closed model assumes people to lack initiative and so needs to be strictly monitored to meet the organization objectives....
Preview sample
To what extent were Human Rights violated in Palestine by Israel since the war started in 1948
7 pages (1750 words) , Download 2 , Research Paper
There is no official line demarcating the border between the two nations.... Both Palestinian and Israeli citizens have suffered greatly, and many human rights have been violated.... Israel is a Jewish country, located in Middle East.... Palestine is a country composed two.... ... ...
Preview sample
The Success of Any Technology
21 pages (5975 words) , Download 5 , Thesis
The paper "The Success of Any Technology" discusses that experience and voluntariness of the usage of the system were concluded to be the best fit in the domain of 'citizen demographics and the societal culture of the region was proposed to be included in the moderating factors.... ... ... ... TAM is the most commonly applied model for evaluating the level of acceptance and usage by a user....
Preview sample
Aviation Safety
9 pages (2250 words) , Download 2 , Term Paper
Free
The key elements of aviation safety are reviewed in this paper; effort is made so that the factors influencing the aviation safety are identified.... At the same time, measures are suggested for increasing aviation safety.... The emphasis is given on the long-term performance of the relevant plans....
Preview sample
Expatriate Selection, Training and Support
6 pages (1500 words) , Download 3 , Essay
Free
Contrast of Different national Cultures Using an Appropriate Model Using the Hofstede Model Hofstede's cultural dimensions model explains the impacts of a society's culture on the values and behaviours of its members (Pedersen and Hofstede, 2002:67).... There are various dimensions of national cultures that can be used to contrast the national cultures using the Hofstede model.... The national cultures in most developing nations can be argued to be feminine as they pay too much attention on relationships and the quality of life (Rowley et al....
Preview sample
On the Job Ethics Sex and Alcohol
1 pages (263 words) , Download 2 , Assignment
Free
It says: I think that the American Medical Association (AMA) was wrong to use their poll to bring national attention to the issue of sex and alcohol among teens.... The assignment entitled "On the Job Ethics Sex and Alcohol" presents the author's thoughts.... .... ... ... There could have been other ways to focus the public's attention on the issue....
Preview sample
Tourism Master Assignment
12 pages (3000 words) , Download 2 , Assignment
Free
he Bear River Heritage Area near the Idaho-Utah border that houses the Great Basin and Rocky Mountains is where the earlier fur traders and North-western Band of Shoshone Nation and Mormon Settlers existed.... merican tourism calls for awakening our senses to natural beauty and national heritage.... ational parks of Utah are Arches national Park, Bryce Canyon national Park, Canyonlands national Park, Capital Reef national Park, Zion, Calf Creek Recreational, and Great Outdoor Recreation....
Preview sample
The Concept of the American Dream in Ragtime by E.L. Doctorow
4 pages (1242 words) , Download 4 , Essay
Free
This essay "The Concept of the American Dream in Ragtime by E.... .... Doctorow" is about a variety of literary forms in this novel and approaches aside from postmodern methods to depict not just the period itself but the attainment of the American Dream.... ... ... ... The combination of imaginary and real characters together with the new literary style enables Doctorow to illustrate an impersonal, but nevertheless compelling analysis of the American dream....
Preview sample
Industral ergonomics
4 pages (1000 words) , Download 2 , Essay
The report that has been selected for the study is Health Hazard Evaluation Report, HETA-99-0283-2855, Yellowstone national Park, Yellowstone national Park, Wyoming.... he evaluation of the Yellowstone national Park had been considered on the concerns arising from the riding snowmobiles to patrol roads and maintenance of the park that was known to cause injuries and pains in the muscles of those individuals who worked in the park.... national Institute for Occupational Safety and Health (NIOSH) was in charge of the evaluation of the health hazards in the area and they worked on determining whether the park workers had problems with the work and whether the work was causing health hazards to them....
Preview sample
Marketing Financial Services: HSBC
10 pages (2500 words) , Download 2 , Dissertation
Free
There are also possibilities of imposition of regulations to restrict cross border transfer of all the non-current assets i.... The research paper 'Marketing Financial Services: HSBC' seeks to evaluate the banking brand in Europe, the Asia-Pacific region, the Americas, the Middle East, and Africa....
Preview sample
Mini-Management for Cyber Software Inc
6 pages (1700 words) , Download 0 , Case Study
Free
In a computing environment, an essential aspect of security is response time and the efficiency of response.... The most effective, tried and tested means is through the establishment of a Computer security Incident Response Team (CSIRT) (Thomas, 2002).... Implementation of a CSIRT is key to the achievement of an organized and well-structured approach towards the eradication of computer security incidents and problems.... For efficient functioning, the firm must be structured so that it acts as a center for incident information, a repository of incident information, and as a coordination wing for the security Responses in the firm (Mellon, 2008)....
Preview sample
Privacy Policies of Apple Inc., IBM, and Microsoft
7 pages (1946 words) , Download 2 , Report
Free
Cyber security Table of Contents Table of Contents 2 Introduction 3 Brief of the Organizations and their Mission 3 Comparison and Contrast of Privacy Policies of Apple Inc.... Apple is dedicated towards conserving the environment, health as well as security of its workforce and customers worldwide.... Protection against Unauthorized Assessing The organization increased security relating to privacy policy against illicit accessing of the information that is gathered from the customers in order to preserve strong customer base (Microsoft, 2012)....
Preview sample
Indias Criminal Justice System and Terrorism
13 pages (3250 words) , Download 2 , Essay
Free
The border control of Kashmir and Jammu is a large debate between these two countries, and therefor, has been heavily patrolled by both countries.... The Indian army also agreed to close the line of control (LOC) between the border of India and Pakistan, and they both agreed upon decreasing the amount of military personnel deployed in the region.... Thousands of civilians, Indian security forces, Kashmiri and non-Kashmiri militants, and Islamic terrorists have all been killed since 1989 due to India's military and the increasing amounts of uprisings....
Preview sample
Discuss some of the treats that Cyberterrorism pose. How can cyberattacks be prevented
11 pages (2750 words) , Download 3 , Essay
This technology has been evolving continuously and computers have become ubiquitous.... The proliferation of the Internet has engendered a much greater.... ... ... It is impossible to envision day to day life, in the absence of computers.... Unfortunately, this rapid and immense growth of computer technology has engendered a This new class of threats has been termed as cyber – threats, and in the present scenario, there is no section of society that can afford it....
Preview sample
Structural Functionalist Theory to Homosexuality as Deviant Behaviour
13 pages (3469 words) , Download 2 , Coursework
Free
For example, one of the senators has noted that the people responsible for serious national decisions such as going into war are paid more because they make the tough decision.... It is the national problem that people judge others based on the money they make.... The strain will not be resolved unless the society will develop the new methods of social relations and the new system of achieving the desired national goals will be equally distributed....
Preview sample
Merton's Strain Theory
13 pages (3250 words) , Download 6 , Term Paper
Free
For example, one of the senators has noted that the people responsible for serious national decisions such as going into war are paid more because they make the tough decision.... It is the national problem that people judge others based on the money they make.... The strain will not be resolved unless the society will develop the new methods of social relations and the new system of achieving the desired national goals will be equally distributed....
Preview sample
Role and Responsibilities of Social Worker including Legal obligations in Child Care
12 pages (3000 words) , Download 2 , Essay
Free
This essay discusses the role and responsibilities of social worker including legal obligations in child care.... The social worker has a legal responsibility to make sure the child is safe and not at the risk of any significant harm.... The essay analyses a course of action to provide welfare measures of the parents....
Preview sample
Mobile Phone Forensics
2 pages (500 words) , Download 2 , Article
Free
SIM cards also contain unique serial identities and numbers , ICCID , International Mobile Subscriber Identity, IMSI, security authentication and partial data related to the local network as well as the list of subscribed services by the user and two access passwords to enhance security: the PIN , personal identification number and PUK, personal unblocking code for unlocking the PIN (Bruijn 2009)....
Preview sample
PUBLIC SERVICE MATTERS SPOTLIGHT CONTEST
2 pages (500 words) , Download 5 , Essay
Free
For example, the general public security is a public service.... For example, the general public security is a public service.... For example, the general security of the public cannot be left in the hands of the private sector.... Public service can be defined as the general service that is provided by the central government to all people regardless of their political affiliation, race, tribe and class....
Preview sample
Religious Expression in Schools
10 pages (2500 words) , Download 2 , Assignment
Free
imilarly, in 2005, Italy effectively banned the Muslim Hijab under anti-terrorist laws on grounds of national security.... For example, in the case of Kalac v Turkey the Court found that dismissal of an applicant from the armed forces for voicing religious views conflicting with national principles of secularism was justified under Article 9.... Section 3 of the Race Relations Act 1976 (RRA) forbids discrimination on grounds of “colour, race, nationality and ethnic or national origin”....
Preview sample
The Value Of The Internet For Terrorists - Case Study Al-Qaeda
8 pages (2000 words) , Download 3 , Research Proposal
Free
The mass media, policymakers, and even security agencies have tended to focus on the exaggerated threat of cyber-terrorism and paid insufficient attention to the more routine uses made of the Internet [Weimann, 2004].... Hence, it is imperative that security agencies continue to improve their ability to study and monitor terrorist activities on the Internet and explore measures to limit the usability of this medium by modern terrorists.... Since 9/11, public awareness of, and government concern with, Internet security issues has mushroomed....
Preview sample
Developing a Way to Protect the Information in the BioMed Devices Company
12 pages (3051 words) , Download 0 , Case Study
Free
A European standard that describes the protocols for second-generation networks for cellular digital phones, is of help in the management of Information security.... A European standard that describes the protocols for second generation networks for cellular digital phones, it is of help in the management of Information security.... Several companies are getting more concerned with security issues.... The security manager should have offices next to the store with classified information....
Preview sample
How a Bill Becomes a Law
8 pages (2161 words) , Download 4 , Term Paper
Free
Gaining knowledge and understanding of the process for law-making helps gain an appreciation for the complexity of political decisions and outcomes for various regulations and national policy.... Gaining knowledge and understanding of the process for lawmaking is helpful in gaining an appreciation for the complexity of political decisions and outcomes for various regulations and national policy.... What this bill hoped to accomplish was to provide federal legislation to establish national uniform standards to fully protect the public from discrimination and quell any concerns about the potential for discrimination, thereby allowing individuals to take advantage of genetic testing and technologies, research, and new therapies without fear of retribution or retaliation in some form either through repercussions in a job search or on the job or health insurance loss....
Preview sample
Cheap Medicine for World's Poor
5 pages (1353 words) , Download 0 , Report
Free
How they are regulated and their safety ensured is a subject of increasingly public concern and interest and has necessitated the creation of large national institutions to do so.... How they are regulated and their safety ensured is a subject of increasingly public concern and interest and has necessitated the creation of large national institutions to do so....
Preview sample
Potential Barriers to Effective Planning for Transition of Care
12 pages (3555 words) , Download 0 , Case Study
Free
Restenosis after percutaneous transluminal coronary angioplasty (PTCA): a report from the PTCA Registry of the national Heart, Lung, and Blood Institute.... The paper "Potential Barriers to Effective Planning for Transition of Care" is a perfect example of a case study on nursing....
Preview sample
The Specter of Terrorism
4 pages (1000 words) , Download 2 , Essay
Involvement of US and UN in the security and political matters of other countries especially in the Middle East seems to have lead by other interests than terrorism.... Initially Iraq was presumed to cause a significant threat on the regional security of Middle East....
Preview sample
Centralized and decentralized research analysis of United States and Japan's educational system
5 pages (1250 words) , Download 2 , Essay
Curriculum responsibility is concentrated on the national Ministry of Education, Culture, Sports, Science, and Technology.... Even though usually considered as a local accountability, in the recent decades, k-12 education increasingly becomes a major political concern at the.... ...
Preview sample
A Biography of Eleanor Roosevelt
21 pages (5250 words) , Download 2 , Essay
The author focuses on Eleanor Roosevelt, the First Lady of the world, who made the most memorable history with her civil rights' stands.... She stood up against the Daughters of the American Revolution when the organization did not allow the famous Marian Anderson to sing in the Constitution Hall ....
Preview sample
Domain Name System Problems
2 pages (500 words) , Download 2 , Assignment
Free
The solutions to the interception attacks may include assigning DNS messages through a security mechanism including IPsec or encrypting messages using IPsec.... These problems are usually associated with the system's sparse documentation particularly in relation to maintaining and managing DNS data (national Research Council (U.... This problem can be resolved using the DNSSEC signatures that will detect forged responses; however, the resolvers that cannot use DNSSEC signatures to check themselves can use TSIG for integrity communication between servers (national Research Council (U....
Preview sample
Risk of Prescription Drug Abuse
1 pages (250 words) , Download 2 , Assignment
Free
According to the national Institute on Drug Abuse, between 8 percent and 12 percent of healthcare workers have chemical dependencies.... The assignment "Risk of Prescription Drug Abuse" focuses on the critical analysis of the major issues in the risk of prescription drug abuse.... Healthcare professionals are at an increased risk of prescription drug abuse due to their easy access to medications and controlled substances....
Preview sample
Review of the Literature
4 pages (1000 words) , Download 3 , Essay
Review of Literature Name: Institution: Review of Literature Fairweather & Rogerson (2001) define health information management as the practice of caring and maintaining health records through electronic and conventional (paper-based) methods.... Health information management is most notable in health departments, hospitals, health insurance companies, physicians' office clinics and other facilities, which offer health care or health record maintenance....
Preview sample
Source Analysis paper
4 pages (1000 words) , Download 2 , Essay
[Subject Code] Analyze some of the social and political contradictions brought forth by the notion of natural rights and equality in human beings during American Revolution The Declaration of Independence which was written by Thomas Jefferson became the “American scripture” according to Pauline Maier, as it was not merely consider a written document but it was an expression of the American society post-revolution....
Preview sample
Haemachromatosis, Its Aetiology, Presentation and Investigation
7 pages (2260 words) , Download 1 , Coursework
Free
The organs which are mainly affected by this overload include the liver, pancreas, pituitary gland and the heart (Robbins et al 2005, Mohan 2005, Govan 2005 and national Digestive Disease Clearing House).... The aggravating factors should also be withdrawn which include alcohol or foods which burden the liver (national Digestive Disease Clearing House).... The intake of vitamin C should also be stopped because it boosts the absorption of iron from the gastrointestinal tract (national Heart Lung and Blood Institute)....
Preview sample
The Cultural Environment
10 pages (2792 words) , Download 0 , Essay
Free
o further expound on the layers of culture, Hofstede (2013) assert that culture can also be approached from six basic dimensions: national, regional, gender, generation, social class, and organizational levels.... To begin with, the national level is closely related to how people's way of living is differentiated by the various country they come from.... Dimensions of national Culture ... For managers to understand how different groups of people behave, they need to have broad knowledge regarding the various scopes of national culture....
Preview sample
Bilingual Education
13 pages (4026 words) , Download 0 , Report
Free
It is not surprising that Standard English predominates in schools and other situations, given its status as world, national, and official language.... he present UK national Curriculum, for example, specially does not suppose to tell teachers how to teach (only what to teach), whereas the highly significant Offices for Standards in Education and Teacher Training Agency both appear more anxious to assess teaching by quantifiable outcome and evidence of preparation than by the excellence of teacher—student relations (TTA 1998)....
Preview sample
Sports as an academic major at Northern Virginia Community College
4 pages (1000 words) , Download 2 , Essay
A study done by the national Collegiate Athletic Association (NCAA) Division III on basketball players at a liberal arts college showed that athletes were majorly involved in their academics despite their participation in sports.... Name: Instructor: Course: Date: Persuasive/argumentative essay Sports as an academic major at Northern Virginia Community College Medical experts argue that daily physical activity is essential in preventing coronary related problems, high blood pressure, and obesity among others....
Preview sample
A Memo regarding Information and Intelligence Sharing
3 pages (750 words) , Download 2 , Research Proposal
On the one hand, there are global changes in security apparatus and intelligence mechanism and on the other hand are intelligence and security systems in the United States.... The danger is that these recruiters may succeed as before and produce a security breach on the scale of September 11 or something even larger1 such as the use of nuclear armaments in urban areas.... The need of the hour is to innovate the security apparatus by delivering them with information and intelligence that makes a difference....
Preview sample
Why Libya Fell after Uprisings and Algeria Did Not
8 pages (2147 words) , Download 0 , Essay
Free
Moreover, Algeria had the capacity to emerge from the Arab Spring as a regional power because its security forces were integrated into the political system than in Libya.... The Algeria regime pays its security forces very well and professionalism enabled the forces to contain the flames of the revolution by avoiding killing large numbers of protesters.... The idea of handling the initial protestors in a civilized manner enabled the security forces to prevent the escalation of the Arab Spring uprising in the country and hence the survival of Algeria. ...
Preview sample
EU Economic Integration
8 pages (2399 words) , Download 0
Free
The fifth title introduced deliberations on common foreign and security policy (CFSP).... he second pillar curtailed the freedom of member countries to undertake foreign activities and reinforcement of own security policy following the institution of a common foreign and security policy (CFSP).... ere, the treaties third title, which deals with justice and home affairs (JHA) permits the community institution to undertake combined action to offer the affiliate countries citizens the most guaranteed protection in the field of justice, freedom and, security....
Preview sample
Political Views of Asata Shakur and Black Nationalists
7 pages (1911 words) , Download 2 , Essay
Free
Here she was confined in the Maximum security Section with members of the Aryan Sisterhood.... She was later on transferred to Clinton Correctional Facility for Women in New Jersey after the closure of the Maximum security Unit at Alderson.... The paper "Political Views of Asata Shakur and Black Nationalists" explores Assata Shakur, an American activist who was born in 1947 and was a member of the Black Panther Party....
Preview sample
Should the Egyptian Revolution Have Happened
3 pages (750 words) , Download 2 , Research Paper
First kind of discrimination is against everyone who isn't with national party.... The national party is the husnay Mubarak party.... To clarify, the whole ministers in Egypt are from the national party, and the most members of the Egyptian parliament are from the national party.... In 1995 the national party got almost 70% of the seats in the parliament (New York Times).... For example, Alaa mobarke, the son of the president husnay have a lot of companies with Alhaydar 2 Ahmad AZ who is member in the national party....
Preview sample
Literary nationalism as an emerging trend in American literature from the beginnings to 1820
4 pages (1000 words) , Download 2 , Research Paper
Name Institution Course Date Nationalism in American literature Literature of a particular country is crucial and signifies the establishment and development of a common language.... Various effects on prevailing literature lead to misunderstandings among various individuals.... ... ... ... The thesis of this essay is on nationalism as a trend in developing American literature....
Preview sample
Utilitarian Conservation or Preservation Movement
9 pages (2250 words) , Download 2 , Essay
The rising population continues to intensify conflicts between humans and wild animals owing to the fact that humans continue to encroach on the areas previously.... ... ... As the conflict heightens, the number of animals continues to diminish as humans continue to prey on most of them either for food or for their trophies....
Preview sample
Fiscal and Monetary Policy
9 pages (2594 words) , Download 5 , Essay
Free
To achieve this objective, the IS/LM model will be employed to see how various policy measures affect the interest rate, national income and inflation rates.... To achieve this objective, the IS/LM model will be employed to see how various policy measures affect the interest rate, national income and inflation rates. ... = national income, ... The equilibrium national income is given by Y1; the equilibrium interest rate is i1....
Preview sample
How Do Different Socio Cultural Paradigms Impact Humans Life
10 pages (2500 words) , Download 2 , Research Paper
Free
While the primary market is focused on the highly skilled professionals who command premium pay package with better work conditions and stability, the labor force of the secondary market are low skilled, lowly paid with relatively no job security.... For women, it was a financial security and more freedom than that of their parental home....
Preview sample
Public Policy on Drugs
13 pages (3681 words) , Download 3 , Research Paper
Free
It is recommended for drug agencies to get the national experts and well known politicians to show their support for the drug policy.... How to develop a national drug policy.... The paper "Public Policy on Drugs" will begin with the statement that a public policy is a principle, on which most of the social laws tend to be based....
Preview sample
The Pilgrims and Their Life at Plymouth Colony
3 pages (750 words) , Download 3 , Term Paper
The Pilgrims and Their Life at Plymouth Colony Name University Course Instructor Date Table of content 1.... Introduction …………………………………………………………………………….... ... 2.... Discussion ………….... ... ... ??………………………………………………………………....
Preview sample
The Formal Role of European Court of Justice
9 pages (2250 words) , Download 2 , Essay
Free
This kind of framework would produce a state where there is cooperation between the European Court and the national courts of individual countries, but does not necessarily lead to the implication that the European Court would be considered to be superior to the national Courts.... n the context of Article 234 of the EC Treaty that places the European Court of Justice in the role of interpreter of the aims and objectives of the Treaty, creative European jurisprudence has often required that the ECJ not send away an individual litigant or a national Judge without an answer, in order to avoid denial of justice....
Preview sample
Russian Economy and Oil Industry during Putins Leadership
14 pages (3707 words) , Download 1 , Essay
Free
Another pipeline would pass a current direction from the border of Kazakhstan with Russia, at Alexandrov-Gay, to the north of Lugansk Oblast, Ukraine.... Having been the leader of The Federal security Service of the Russian Federation (FSB), Putin definitely knew the issues facing his country, yet being aware of these problems is not similar to dealing with them.... Having been the leader of The Federal security Service of the Russian Federation (FSB), Putin definitely knew the issues facing his country, yet being aware of these problems is not similar to dealing with them....
Preview sample
39151 - 39200 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us