StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Iran's nuclear ambitions
23 pages (5750 words) , Download 2 , Essay
In this age of variegated ideological, economic and cultural differences and interests, the renunciation of nuclear weapons may, on the fact of it, sounds utopian.... Even the results of so many treaties and meetings on banning nuclear weapons have not yielded encouragement of a considerable amplitude....
Preview sample
Logistics - ELME MicroMotion System
9 pages (2387 words) , Download 2 , Essay
Free
The paper "Logistics - ELME MicroMotion System " highlights that responding to the requirements of the industry, Management's decision to use designed and built the RS Series reach stackers, particularly for the total intermodal yard and rail terminal.... ... ... ... Historically dependable container handling solutions make ELME a principal force in container terminals used for high-density throughput as compared to container terminal which is associated with a multipurpose role, stacking yards, sea and rail ports....
Preview sample
Vietnam: How We Got There
9 pages (2833 words) , Download 2 , Research Paper
Free
national security: A reference handbook.... The national security Legacy of Harry S.... When President Harry Truman's government resolved in 1946 that the Soviet Union intimidated the interests and security of the United States and its allies, Americans assumed as well that problems in one region were closely connected to issues and predicaments elsewhere (Schulzinger 1997, 8).... The Geneva Accords proclaimed that national elections will be held resulting in Vietnam's reunification in 1956 (Schulzinger 1997, 88)....
Preview sample
The Evolution of the Wireless Phone Network
10 pages (2796 words) , Download 2 , Literature review
Free
security Issues The wireless communication network as a computing model has led to unprecedented flexibility, usability and access to the Information Technology environment in a moderately short period (Lee, 2001).... The heart or center of the security issue, in the wireless security environment, is that networks are at the heart of an independent processing unit and furthermore the architecture itself is vulnerable to external controls.... Such evolution makes the wireless world so successful, but highly vulnerable to a security breach (Richard & Smith, 2006)....
Preview sample
Privacy and Surveillance
6 pages (1770 words) , Download 1 , Essay
Free
The communications which people thought were private are now being monitored by the national security agency (NASA).... Thirdly, change your security/privacy settings.... As such, the internet's design did not encompass security or privacy features.... dward Snowden's recent disclosure of the United States government surveillance projects has elicited an emotional debate about privacy, secrecy and security (Slobogin 54).... ducation institutions especially universities are facing a wide array of cyber security threats....
Preview sample
DRUG TRAFFICKING IN THECARRIBEAN JAMAICA AND TRINIDAD
17 pages (4250 words) , Download 2 , Thesis
Fighting drug trafficking in the Caribbean (Jamaica and Trinidad/Tobago) Fighting Drug Trafficking Name: Institution: Abstract Drug trafficking has caused a major concern in the world today.... The lives of the majority have been lost due to the intensity of the crime in many nations.... ... ... ...
Preview sample
Critical Appraisal to Glide Scope Video Laryngoscope
8 pages (2513 words) , Download 1 , Research Proposal
Free
Another ethical principle is that the survey participants must be provided security of confidentiality and should be free from all type of physical harm.... It should have been better if the authors would have allowed the readers to get aware regarding the literature reviewed to undergo the study (British national Formulary 2010).... ritish national Formulary, 2010....
Preview sample
The Convenience of GlideScope
8 pages (2514 words) , Download 2 , Essay
Free
Another ethical principle is that the survey participants must be provided security of confidentiality and should be free from all type of physical harm.... It should have been better if the authors would have allowed the readers to get aware regarding the literature reviewed to undergo the study (British national Formulary 2010).... List of References British national Formulary, 2010....
Preview sample
The Effects of the Great Depression
5 pages (1536 words) , Download 0 , Report
Free
In order to avoid any more effect, the Social security Act was passed in the year 1935 that compensated unemployment in the country through insurance of old aged people and survivors.... n the United States, decade from the year 1930 observed doubling of union memberships, which was caused by the devastating rate of unemployment, as well as, the implementation of the national Labor Regulations Act of 1935 in which, collective bargaining was encouraged by the government....
Preview sample
Recruitment and Selection Strategies in Employee Retention
15 pages (4181 words) , Download 3 , Essay
Free
He refers to the common myths associated with employee satisfaction which many employers still maintain as sufficient motivation to retain their key employees, this include money as a good incentive, a nice office, and job security among others.... timulating occupation and challenge; significant job; distinctive contribution; employee relations; teamwork; leadership; recognition; enjoyment; independence at work; remuneration; job environment; job security; captivating friendly employer; modern work systems and technology....
Preview sample
Indonesia And Role In Asia-Pacific
12 pages (3000 words) , Download 3 , Essay
This reform was seen as a "partnership" between "national stakeholders and the international community"1.... Since the demise of authoritarian rule in May 1998, international actors have been keen to bring about political reforms in Indonesia.... Governance reform has since been the top priority initiated by three multilateral organizations, the United Nations Development Programme (UNDP), the World Bank, and the Asian Development Bank (ADB)....
Preview sample
Change of the Relationship between India and the US
8 pages (2118 words) , Download 2 , Research Paper
Free
The strategic community and policymakers of the Indians are increasingly attuned to the notion that India is supported by the United States on issues of national security.... The strategic community and policy makers of the Indians are increasingly attuned to the notion that India is supported by United States on issues of national security.... During the end of 2010, presidents from the five permanent members comprising of the UN security Council decided to visit India....
Preview sample
Why world war II is a good war for THE UNITED STATES
3 pages (750 words) , Download 3 , Research Paper
The Advent of the World War II saw the experience of suffering and inhuman actions on a large number of people.... But rarely does there exist a case within history in which a war benefits an economic and political system to the extent that the Second World War benefitted the United States.... ....
Preview sample
Correctional Officers
4 pages (1000 words) , Download 2 , Essay
Subjects of study include 'institutional policies, regulations and operations as well as custody and security procedures.... Correctional officers hold one of the most stable jobs in the country.... This is brought about by the decreasing number of applicants attracted to the work due to the 'negative' impressions attached to the work, and the apparent 'threats' and 'hazards' posed by working in prison facilities (US Labor Dept....
Preview sample
Prison Law and Penology
15 pages (3825 words) , Download 4 , Essay
Free
In the US, most prisoners serving longer sentences are held in state prisons, which are usually large maximum-security buildings holding more than 1,000 offenders in conditions of strict security.... Prison Law and Penology Rehabilitation in Prisons Prisoners are distributed among a variety of types of In the United s most prisoners serving longer sentences are held in state prisons, which are usually large maximum-security buildings holding more than 1,000 offenders in conditions of strict security....
Preview sample
Cuban Missile Crisis
1 pages (250 words) , Download 2 , Assignment
Free
In a letter to security Council that US government agreed to respect Cuba sovereignty and its borders.... The movements gained momentum or national prominence when Africans in America became aware of their right to resist racism.... The movements gained momentum or national prominence when Africans in America became aware of their right to resist racism....
Preview sample
Howard Hughes: Aviator and Innovator
13 pages (2500 words) , Download 2 , Term Paper
Free
But commuting and national security were not always the primary concern of Hughes, whose desire to have the competitive edge was often dubbed by critics as culminating in obsessive-compulsive behavior (Pasternak, 2001).... As airplanes were first used in World War I, Hughes understood their importance in the world, not only for transportation, but for national defense and military prowess.... In 1938, when he and a crew of three flew a Lockheed-14 airplane around the world in a record-breaking three days, 19 hours, and 17 minutes, Hughes instantly became a national hero (McCaffery, 2005)....
Preview sample
What Is Globalization Critical Issues For International Trade Liberalisation
9 pages (2250 words) , Download 2 , Term Paper
Free
Globalization can be defined as “a process that encompasses the causes, course, and consequences of transnational and transcultural integration of human and non-human activities” (Geneva Centre For security Policy, “Program on the Geopolitical Implications of Globalization and Transnational security”).... To implement a successful SEZ operation, local government authority should provide certain facilities to the investors like cost reduction of electricity, construction of roads along with providing security personnel....
Preview sample
History of Organized Crime in the United States
8 pages (2137 words) , Download 2 , Term Paper
Free
Now Organized crime threatens multiple facets of the America, including the economy and national security.... Federal hard work to implement prohibition, including raids, was opposed by well-organized bootlegging operations with national as well as international connections.... These gangs made up the national crime syndicate that controlled and organized crime even after his death (Montaldo 2010).... harles "Lucky" Luciano: founder of national crime syndicate ...
Preview sample
The Effects of Unemployment for Lower and Middle Class Black America on the Nation
9 pages (2250 words) , Download 2 , Research Paper
Free
The problem is that most of the global growth over the last decade has been created through credit financing; giving people everywhere a false sense of hope and security.... Due to decreased income, they weren't able to save the money needed to offset the national financial crisis.... A study of the national unemployment rates in 2009 showed overall unemployment at 9.... times the national overall rate....
Preview sample
The Direct and Indirect Victims of Terrorism
13 pages (3682 words) , Download 2 , Essay
Free
he American public was further victimized by the irrational fears that were imparted by the government as a reaction to increasing national security.... Governments will take extraordinary steps to provide additional national security.... Tom OConner (2006), the Director of the Institute for Global security Studies at Austin Peay State University reported that, ... he national recognition of the victims of a terrorist attack as a social issue did not reach any level of legitimacy until 9/11....
Preview sample
License to Torture: Dershowitz vs Scarry
7 pages (1885 words) , Download 2 , Essay
Free
Similarly, following September 11, 2001, it has become not so rare practice in the US security and intelligence services to employ rough interrogation techniques, which more or less border on torture, in order to obtain information from suspected terrorists (Dershowitz, 258, 264).... Not surprisingly therefore, Scarry not only fails to understand Dershowitz's motives behind his arguments for the legalization of torture, or practices that border on it, but also inadequately addresses the issue itself....
Preview sample
A Critical Literate Review Concerning Consumer Perception of Privacy and Security Risks for Online Shopping
8 pages (2000 words) , Download 3 , Literature review
Free
A Critical Literate Review Concerning Consumer Perception of Privacy and security Risks for Online Shopping 1.... A Critical Literate Review Concerning Consumer Perception of Privacy and security Risks for Online Shopping Details: Institutional Affiliation: Date of Submission A Critical Literate Review Concerning Consumer Perception of Privacy and security Risks for Online Shopping 1.... In as much as e-shopping offers people the convenience of real-time completion of transaction from mobile locations, internet security is no longer guaranteed (Zhou, Dai and Zhang, 2007)....
Preview sample
Grover Cleveland's Illegitimate Child Scanal
5 pages (1250 words) , Download 2 , Essay
Insert name Tutor Course Date Grover Cleveland's illegitimate child scandal Grover Cleveland's illegitimate child scandal was the result of a date rape he had with Maria Halpin in early 1870s.... Although, he later agreed to support the child's upkeep, Cleveland did not spare Ms Halpin of blackmail (Tackett and Fidel 1; Lachman 1)....
Preview sample
Explaining Religious Terrorism
15 pages (4027 words) , Download 4 , Research Paper
Free
Explaining Religious Terrorism Introduction The fact that terrorism is one of the greatest threats to international peace and security is incontestable.... Terrorism and the nature of it threaten international peace and security in various ways.... The organization of terrorism and activities involved in funding it threatens peace and security in various ways (Kaplan 101).... Reports indicate that al Qaeda emerged in the late 1980s and is widely regarded as being the foremost threat to international peace and security and particularly to the United States national safety and security....
Preview sample
Tourism in Peru
10 pages (2793 words) , Download 0 , Literature review
Free
In terms of highways, Peru has highway links with all its border countries except Columbia.... eru is located in South America and has five border countries.... security in main tourism sites within the country has been enhanced a feature which has led to increase inflow of tourists in the country.... Pull factors include many tourist attractions, security, easy accessibility and good public image.... It is also located near a national park and reserves (Santana 2001)....
Preview sample
Asian Americans: Thai People
14 pages (3587 words) , Download 3 , Essay
Free
It is hard to believe that there are no social security programs that provide medical care and financial care for the population.... Thus, smiling for all occasions is a national feature of Thai character. ... It is also customary to show respect toward national anthem, rising when it is played....
Preview sample
Networking of Relations with Its Neighbours and in International Levels
9 pages (2685 words) , Download 0 , Coursework
Free
This paper ''Networking of Relations with Its Neighbours and in International Levels'' tells us that as per CIA World Factbook 2012, Saudi Arabia remained the 23rd largest economy in the world with the GDP (PPP) of Saudi Arabia being $740.... billion.... Further, Saudi Arabia is maintaining the highest per-capiincomemes in the region....
Preview sample
Information Systems Management in E-Government
8 pages (2500 words) , Download 4 , Assignment
Free
The use of emerging technologies would enhance security, interactivity, and data transfer rates and volumes.... In this subsection, we will focus on the two most important issues: (i) information transference and (ii) security.... 110) (ii) Next, there is the important consideration of security.... Optimum control and continuous surveillance are the keys of effective security.... Radio frequency identifier (RFID) can be regarded as an important technique that can help the governments attain better security benchmarks....
Preview sample
Strengths and Weakness of Human Development Index
10 pages (2679 words) , Download 1 , Literature review
Free
They impact to the decrease of security in the country.... The security system have been heightened and therefore they members of that society live in a well-kept area.... Moreover, the security in major areas is highly a threat.... The security system is also under going some reforms that will enable the country to reach the united nation requirement of one police to two hundred citizens(Sharma & Morrissey, 2006).... In other words, there is a great unfairness in the distribution of the national resources....
Preview sample
Risks of Contagion in Asia
5 pages (1601 words) , Download 0 , Research Proposal
Free
De Gregorio and Valdes (2001) evaluated the extent of 1982 debt crisis, the 1994 mexican crisis, and the 1997 Asian crisis extended into other 20 countries.... Out of fear and doubt, the market participants sell off their security holdings, curtail the lending and deny short period loans to borrowers of the affected countries.... xcessive borrowing by national banks causes the contagion state.... national banks incessantly rented from abroad countries lent in their country....
Preview sample
The Cold War: Cause and effect
10 pages (2500 words) , Download 3 , Research Paper
Around 1949, most nations within the Western Europe were organized into a military alliance known as the national Atlantic Treaty Organization (NATO) while the communist states belonging to the Eastern Europe was the Warsaw Pact after 1955.... Commonly known as the war of words, it was popularized by an American journalist Walter Lippmann in 1947, where it was used to describe the cooperation between the....
Preview sample
The African American Experience in the United States
10 pages (2986 words) , Download 1 , Term Paper
Free
With regard to persisting racism in America, Ronald Takaki pertinently states “'Race,' Toni Morrison explained, has functioned as a "metaphor" necessary to the "construction of Americanness": in the creation of our national identity, "American" has been defined as ‘white22'” However, the situation is soon to change, with the Latino and Asian population set to overtake the combined white European population.... Given below is the table published by the US Government's national Center for Educational Statistics....
Preview sample
Is Liberalism Still a Coherent Ideology in the 21st Century
7 pages (2089 words) , Download 0 , Assignment
Free
The paper "Is Liberalism Still a Coherent Ideology in the 21st Century" states that liberalism is the belief in freedom and equal rights.... The theory of liberalism advocates that the society or rather the people of the nations should have such freedoms as the freedom of speech and association.... ...
Preview sample
Benevolent Repression: The Three Major Reformatory Systems
7 pages (1877 words) , Download 1 , Term Paper
Free
Like other reformatories, though, Massachusetts had its share of security issues.... A storm in 1890 for instance was able to blow down a 150-foot section of the outer security fence and one prisoner, attempting to escape his prison time, managed to jump the train that transported all prisoners to the grounds (Pisciotta, 1994: 100).... The original system grew out of the 37 principles listed in the Declaration of Principles drafted in 1870 from the efforts of the first meeting of the national Congress on Penitentiary and Reformatory Discipline....
Preview sample
Needs Assessment: Among Elderly
13 pages (3687 words) , Download 6 , Essay
Free
This essay "Needs Assessment: Among Elderly" gives focus on the needs of the elderly in some Social Service Institutions which be used as a reference to enhance future social infrastructure.... It will also foster quality care, belongingness, and the overall well-being of the elderly.... ... ... ...
Preview sample
Current Position of Australias Healthcare Industry
16 pages (4870 words) , Download 1 , Case Study
Free
Healthcare industry players use IT in several areas of management including office operations, marketing, accounting, booking and security purposes.... Therefore, this report draws upon Porters theory of national competitive advantage to analyze the current position of Australia's Health Care Industry and suggests strategies or recommendations to improve its position.... The report will also analyze the current position of Australia's Health Care Industry using four dimensions of Porter's national Diamond comprising of factor conditions, company structure, strategy and rivalry, demand conditions, and supporting and related industries....
Preview sample
The Language of Health Informatics
3 pages (750 words) , Download 2 , Essay
It is however popular to store data at different campsites for security purposes but it has to be made sure that the integrity of data is maintained.... Health Informatics Case Study Author [Pick the date] Database Characteristic and structure A database is a collection of digitized related files that are put together in order to provide a more efficient system of file storage than in folders and cabinets....
Preview sample
The Rise of Middle Class in Latin America
13 pages (3728 words) , Download 2 , Research Paper
Free
For instance, the third largest nation of Latin America, Colombia has been successful to stretch its middle class almost by 50%, taking into account the cross border associates such as Costa Rica and Peru.... Moreover, as the education system and employment opportunities began to expand combining with enhanced social security, the economy experienced rise of middle class society in Latin America.... Such reform comprises of better labor policies, provision for sound social security as well as controlled safety net protocols by providing adequate subsidies to poor....
Preview sample
Pursuing Criminal Justice
10 pages (2744 words) , Download 2 , Essay
Free
For example, the implementation of the US Patriot Act and the Department of the Homeland security (DHS) that has greatly transformed the face of the criminal justice system.... As a result of the establishment of the department of the homeland security act that was initiated by the former governor of the Pennsylvania.... Tom Ridge led the formations of the new organizations, which include transport security administration that is mandated to run all the security issues in the United States airport to counter threats of terrorism attacks (William, 2011)....
Preview sample
The Hegemony Debate in International Relations
25 pages (6250 words) , Download 3 , Essay
The distribution of power in the world, whether it may be politically, economically and technologically, has been the interest of many scholars whose debate has led to a wealth of ideas and prominent school of thoughts.... A very healthy field is the study of dominance of certain nations which involves an analysis of the past, present and the future....
Preview sample
The UK Business Tax System for Small Business
7 pages (1750 words) , Download 2 , Research Paper
Free
(In the United States, this would likely consist οf items such as name, address, social security number, filing status, name and social security number οf spouse and dependents.... national Tax Journal 45 No.... This research paper describes different types of no-return systems and summarizes features of the British system....
Preview sample
Environmental Justice
5 pages (1250 words) , Download 2 , Essay
The members of the Indian tribe were concerned with the cleanup of the abandoned debris, facilities and contamination of the former airfield site because it affected their.... ... ... Another group of stakeholders was the federal agents.... Local community members agreed to work with the federal agents....
Preview sample
The Regan Revolution Through President Obama
4 pages (1000 words) , Download 2 , Research Paper
The government also enhanced domestic in the significant installations such as airports, roads and ports through creation of homeland security agency.... With more than 3,000 confirmed cases by the end of 1983, there was growing pressure on the government to develop a national AIDS policy and also develop medication (Brier, 2009)....
Preview sample
Bleeding Kansas Leading to Civil War
12 pages (3000 words) , Download 3 , Research Paper
They include; the mexican war of 1848, fugitive slave act of 1850, the release of Uncle Tom's cabin, Bleeding Kansas, attack of Charles Summer, the decision by Dred Scott, rejection of the Lecompton constitution, Harper's Ferry Raid by Brown, Election of the Abraham Lincoln as the president of the U....
Preview sample
The Global State of Effect of Drugs among Youth
25 pages (6250 words) , Download 2 , Research Paper
This paper discusses the global state of the effect of drugs among youth.... The paper considers the political and social effects on the global community and explores solutions to these issues.... Drug use increases the chance that students will become pregnant, contract a communicable disease.... ...
Preview sample
How can I come professional in safety major
6 pages (1500 words) , Download 2 , Essay
Free
uilding security ... harles, Oakes, Safety versus security in Fire Protection Planning, The American Institute of Architects: Knowledge Communities.... Within that period, practitioners are prepared to undertake national certification exams for example the Board of Certified Safety Professionals....
Preview sample
European Law Issues
10 pages (3160 words) , Download 0 , Coursework
Free
34, CIA security SA v Signalson SA (C-194/94) ... The paper "European Law Issues" discusses that it is essential to state that as a Member State, under the principle of 'state liability', the United Kingdom is legally responsible for preserving its national practice that is contrary to the Community law.... lthough addressed to Member States, EC ‘directives' may confer individual rights on citizens against member of states, which can be enforced and are to be protected by national courts....
Preview sample
Computer Crime & Identity Theft
11 pages (2750 words) , Download 2 , Essay
Free
By using another person's social security number, driver's license number, date of birth, address, online information one may open bank accounts, apply for loans and credit cards, get a cell phone and so on.... The company may also be subjected to lawsuits from clients who claim that there was no due diligence preformed as regards the security of their information.... It is estimated that between twenty-five and fifty percent of all business have experienced some sort of intrusion or breach of security of their computer networks....
Preview sample
Immigration and Asylums
12 pages (3240 words) , Download 3 , Essay
Free
The case owner will also represent UK border Agency if at any point Mr.... The UK border Agency (UKBA) is an agency which is responsible for securing the UK borders and controlling immigration in the UK.... This agency is responsible for border control and enforcing immigration and custom regulations.... UK border Agency take under consideration the applicant's account of persecution and their supporting documents which can meet criteria for granting asylum....
Preview sample
4201 - 4250 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us