Security Essays


Job Advertisement for Security Manager

Essay Prompt Write a short job advertisement for a security manager for a major commercial company (real or imagined) and specify the qualifications, experience and management skills you require and the salary you expect to pay. Also, produce a more detailed job description which gives more information about the role and management skills required. please Continue Reading... Continue Reading...

Autodine Restaurants Business Plan

Convergence Between IFRS and U.S. GAAP. ACCA Global. Wallace, L., Lin, H., & Cefaratti, M. A. (2011). Information security and Sarbanes-Oxley compliance: An exploratory study. Journal of Information Systems, 25(1), 185-211. Warda, M. (2007). LLC and Corporation Start-Up Guide. Naperville: Sourcebooks Inc. Continue Reading...

Guns in the Workplace

to the necessity of a well-controlled Militia for the nation's security, citizens' rights "to keep and bear Arms" must not be violated. In view of the aforementioned difficulty with interpretation, I personally feel that, in the end, the company and its personnel must sort out matters by themselves. Lastly, state laws must be looked at if they cannot reach any definite resolution. 4) The Centers for Disease Control and Prevention (CDC) reports that workplace murders (largely using guns) claim the lives of over 700 individuals per annum. The Society for HRM conducted a survey, in the year 2012, which… Continue Reading...

Warriors into the Wild

It is like his true nature is calling out to him to leave the safety and security of his domestic world and embark on the adventure that lies waiting outside the human's yard. In other words, he is going on a quest. The same thing happens in other works in the fantasy genre: Harry Potter leaves his ordinary home to join the wizards' academy. The hobbits leave the Shire to take part in the adventure of the ring in Lord of the Rings. Fantasy books are all about main characters leaving ordinary, everyday surroundings and taking part in an… Continue Reading...

How Does Heroin Impact a Caucasian Family

Heroin Impact on Caucasian Family? A large number of Caucasian families are plagued with the issue of heroin use, mostly consumed via injections. This is a major public health issue. Viral hepatitis, HIV and other dangers associated with heroin dependence, as well as social harm resulting from accompanying poverty and crime, exceed those of almost all other drugs used. A majority of Caucasian households are indirectly as well as directly impacted by the aforementioned diseases. Increased pureness and decreased drug costs are potential factors contributing to the trend of decreased age of first-time consumption and increased initiation into habitual consumption… Continue Reading...

Vapeusa Marketing Campaign Through Ecommerce

products and accessories to consumers looking for an alternative way to smoke. The company uses Symantec safety and security for its sales and shows that all purchases and shipments are guaranteed by Norton Guarantee -- which is meant to give consumers peace of mind about doing business with this website. This is a way of separating itself from the other players in the field and of looking more professional and credible. It shows that it has the backing of a reputable company -- so this is one way it is using eCommerce to build its marketing. Another way is… Continue Reading...

At-will Employment and the Law

employee who was essentially fired for blowing the whistle on the Department of Homeland security. As the Nevada legislature makes clear, "At-will employment is a legal doctrine that defines an employment relationship in which either the employer or employee may break off the relationship with no liability, provided that the employee has no contract for a definite term or that the employer has not recognized a labor union" (Policy and Program Report: Labor and Employment, 2016). Nevada is, in short, an at-will employment state. In Las Vegas, Maclean reported to the media that the Department of Homeland security had… Continue Reading...

Employment Laws in the United Kingdom

(United Kingdom 2016). The fourteenth section pertains to exceptions to the law including statutory provisions, issues that involve national security, charities, sports and allowable age exceptions (e.g. safety). The fifteenth chapter relates to family property such as the abolition of the husband's duty to maintain a wife, the abolition of the presumption of advancement, the amendment to the Married Women's Property Act of 1964 and civil partners and their associated laws and protections. The sixteenth chapter wraps up the law by covering a few extra details such as religious situations when it comes to civil partnerships, the obligations of the… Continue Reading...

Children Of Divorce and How They Can Be Helped

¶ … Divorce on Children Children of divorce can be negatively impacted by the separation of parents and the concomitant stress associated with the parents' relationship. These negative effects can range from mild cases to extreme, and can differ according to gender and age (i.e., development level of the child). External factors also play a part in the degree of the effect of the divorce, such as socioeconomic conditions of the family, integration in the community/society, the social behavior of the child, interaction with siblings/peers, and the level of continued involvement of the parents in the life of the child.… Continue Reading...

Changing Psychological Contract Implications for Hrm

employers expect certain outcomes, and vice versa (Ishaq & Shamsher, 2016). For instance, by providing competitive remuneration, job security, and professional development opportunities, an organization often expects to get loyalty and commitment from employees in return. Equally, by demonstrating commitment to work, employees usually expect their employer to reciprocate by offering financial and/or non-financial benefits. Dissimilar to formal contracts between employers and employees, psychological contracts are essentially perceptual in the sense that there may be varying interpretations of the expectations employers and employees have one of each other (Freese, Schalk & Croon, 2011). The employer-employee relationship has experienced tremendous… Continue Reading...

Discrimination Case Analysis

the contexts, then blame should immediately stop. Evaluating the Alternatives 1. There is always the possibility of a threat to security when "piggyback" situations take place. There is need for identification, regardless of sex or race. Hope's actions could have been necessary as protective measures. 2. There should be open conversations so employees can freely interact with one another and learn more about each other's cultures. Trying to understand both parties yielded several solutions to the problem. Course of Action There were several factors that influenced Dillon, Hope and Jack. To resolve the problem, they need to be patient and understand… Continue Reading...

Research Approaches in Maritime Security

¶ … International Ship and Port security (ISPS) Code on Maritime security The study will be based on the question that "What is the impact of the International Ship and Port security (ISPS) Code on Maritime security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime security as offered by the ISPS. Scope… Continue Reading...

Open Source Software

Ploussios, 2012). Such change urgently requires IT systems for e-governance (e.g., with respect to exchange alternatives among authorities, on security the exchange occurs with, and with the masses. OSS in e-governance poses both opportunities and challenges. Gaff & Ploussios (2012) argues that a switch to e-governance will require substantial IT investments in the coming years. Hence, it is natural to closely assess the IT meant to be invested in, its application, and who will be in charge of the ownership and creation of basic e-governance technologies. The above activity will boost interest in opportunities unfolding from OSS, making the… Continue Reading...

Nursing Practitioner

Medicaid and Medicare initiatives, developed after the enactment of the 1965 Social security Amendments. The two initiatives ensured low-income kids, women, aged persons, and disabled individuals could now access healthcare. Thus, with the enhanced need for healthcare providers in primary care settings, nurses obviously assumed the responsibility of educating families with regard to illness prevention and health promotion. All through the nation, nursing care leaders reached a consensus that nursing professionals were cognizant of, and experienced in tackling, kids' and families' healthcare requirements. The consensus resulted in a growth of their responsibilities and roles to match those of primary… Continue Reading...

Strategic Resource Management Hewlett Packard Enterprise

helping to make it possible. Personnel must be afforded job security on the basis of their performance, and have a chance at personal satisfaction stemming from a feeling of accomplishment with respect to their role in the company (Hewlett-Packard, 2016). Organization: Maintaining a corporate climate conducive to individual motivation, innovativeness and resourcefulness, and affording employees sufficient liberty to work towards set aims and targets. Citizenship: Meeting good citizenship requirements by contributing to not only the community but also the societal institutions responsible for generating the climate the company operates in (Hewlett-Packard, 2016). HRM Contribution to Achievement of Objectives The… Continue Reading...

Court Process, Judicial Process, and Constitutional Issues

new laws and executive orders that focused on enhancing homeland security. However, these laws and orders have become controversial because they have ceded power to the executive branch and limited people's rights. Some examples of these limitations include restrictions on privacy, limitation of free speech and association rights, and limitation of religious freedom. While these actions were necessary to help prevent another attack, they are inappropriate since they compromise civil rights and checks and balances established in America's democracy. The federal government would have taken less drastic measures through reordering priorities of law enforcement instead of generating fundamental changes… Continue Reading...

Hiv and Aids

of Justice • Department of Housing and Urban Development • Department of State • Department of Labor • Social security Administration • Department of Veterans affairs State departments also are also involved and assist the federal agencies especially with their ground networks. Responsibilities of the State, Municipality, County and Local Public Health Departments Related to the Issue • Health promotion • Monitoring • Testing and counseling. • Provision of support services like well-baby services and family planning services. • Nutrition programs. • Advocating for people lacking healthcare resources. • Doing community assessments to identify needs and strengths of the population. • Collecting and… Continue Reading...

Social Policies in Community Agencies

Social Work Social Policies in Community Agencies Hall (2013) opines that social workers practicing from a community organizing or development perspective try to tackle systemic problems that lead to negative social issues. Social policy attempts to study how society promotes individual and family welfare. Also, the policies tend to be consistent with what the government of the day views to be the most optimal way to help those who are disadvantaged and can't help themselves. A number of these social policies are incorporated in the works of community agencies. They include availing supportive services to the vulnerable members of society… Continue Reading...

Ending Terrorism in Africa

countries within the reach of the Somalia based Alshabaab are still in both security and economic jeopardy as long as the group remains portent (Fulgence, 2015; Bamfo, 2013). Some organizations have tried to put an end to wars and terror gangs with great indications that if there is concerted effort, a lot can be achieved. These efforts can be multiplied to manage and counter terror attacks - which happen to be modern day's most worrying aspect of insecurity and economic developments on the global scene (Bamfo, 2013). Terrorism stands on the way of many development agenda. It is as… Continue Reading...

Apple Investment and Financial Analysis

legal, ethical, and regulatory requirements. Moreover, the committee oversees the internal control systems and data security. (Mukherji, 2002). On the other hand, the Compensation Committee is responsible for reviewing and approving Board's compensation and company's executive officers. The Compensation Committee is also responsible for administering equity compensation plan for the Board member and perform other duties as being set forth by the company charter. The Nominating and Corporate committee are also one of the Apple's committees responsible for implementing a periodic reporting on the matter responsible for selection, identification, and qualification of Board members. (Adjaoud, & Ben-Amar, 2010). The… Continue Reading...

Enhancing Ship and Port Security Globally

¶ … International Ship and Port security (Isps) Code on Maritime security Impact of the International Ship and Port security (ISPS) Code on Maritime security The study will be based on the question that "What is the impact of the International Ship and Port security (ISPS) Code on Maritime security." Answers will be sought to have this question addressed adequately. The study feels that the ISPS Code has some impacts upon the Maritime security in the world. Thus, the study seeks to uncover the various impacts that are realized by the Maritime security as… Continue Reading...

Exclusionary Rule in Terry Vs Ohio

initiated a snowball effect of more and more leeway on the part of law enforcement and security personnel to be able to detain persons, search them and their belongings, and seize items that may be constituted a threat. What Terry v. Ohio allowed the Court to do was to reinterpret the meaning of the "exclusionary rule" as pertaining to the Fourth Amendment's guarantee to citizens against unlawful searches and seizures (Maclin, 2014). The exclusionary rule asserted that any evidence gathered by way of a violating the individual's rights against unlawful searches could not be used in a court of… Continue Reading...

Impact Of Federalism on Privacy Rights

is embedded in the architecture of the U.S. Constitution, especially on the Bill of Rights. In light of recent security threats, the central government has enacted legislation that seemingly infringe on the right to privacy. Moreover, there have been numerous concerns on whether federalism interferes with this constitutional right. Despite these concerns, federalism has had positive impacts on citizens' right to privacy. One of the positive impacts of federalism on privacy rights is enabling people to decide the extent with which legislation affects their privacy. Federalism has achieved this through separation of powers in which state governments decide what… Continue Reading...

Police Recruitment

they emerge. Experience: if one has had experience, preferably in a security position, they stand a good chance of consideration. Physical fitness: Endurance is a necessary requirement in police work. There is a one-mile run test to ascertain one's physicality. If one completes the race in less than 7.3 minutes, they demonstrate acceptable physicality levels. On the other hand, if one runs the race in over the stated time frame, they are ranked lower. Therefore, given the above requirements, I will rate the applicants as follows: No. 1. Johnson Stephanie K She is 27 years old. Therefore, she meets the… Continue Reading...

Multicultural Understanding

structures at school. • Children hailing from cultures which stress independence, confidence, material security, and personal initiative (e.g., the U.S., Vietnam, and Japan) are typically rational, driven, task-oriented, and objective. • While evaluating students individually is important, they do normally tend towards one of the two categories, to some extent at least. • Cooperative learning models (Zirkel, 2008): • Perhaps the most researched equity instructional model; this approach should be planned carefully to ensure required impacts on equity issues. • Cohen and coworkers have offered exceptional analyses and evaluations that are geared expressly at comprehending how and whether varied cooperative… Continue Reading...

The Best Approach to Human Resources

who is hired, who is not, who is promoted, who is not, disciplinary records, addresses and Social security numbers, just to name a few things, should be closely guarded. Even so, the human resources department needs to make sure of a few things so as to maintain their credibility and protect themselves from situations where lawsuits or other legal actions arise: • Any records relating to who is hired/not hired or promoted/not promoted need to be created and retained in the event of a lawsuit. Further, it should be reviewed by qualified legal counsel or someone else that is… Continue Reading...

Kuwait Case

basic services that consist of free healthcare, education, and social security. Considering this, the positive externality is that the oil wealth of Kuwait is that it is successfully utilized to benefit its residents (El-Katiri et al., 2011). Nevertheless, at the same time, there has developed a negative externality. In accordance to El-Katiri et al. (2011), the policies of rent distribution established and implemented by Kuwait have advanced in an unplanned and extemporized way into an ungainly system with considerable misrepresentations, falsifications, inadequacies and institutional insufficiencies. These constitute of the long-standing employment of subsidies to energy and other utilities that… Continue Reading...

Psychology, Financial Decision-making, and Household Management

decisions for their households and as a result are better suited to enhance their economic and financial security and welfare (Hilgert and Hogarth, 2003). What is more, in accordance to behavioral economics, psychology plays a significant role in the financial and economic decisions made within the household. For instance, consumers with a great amount of money will spend less as compared to consumers with smaller amounts. The same case applies to individuals that spend more money in a current account as compared to money in a savings account. Therefore, this proposal will focus on different financial management activities within… Continue Reading...

Germanys Economic Policies

a rise enabled the government to effectively balance the budget and have surpluses in Germany's social security system. Complacency took place of uncertainty as there was no need to change a system that has seen success. Some changes have been made in terms of Germany's structural policy. For example, Germany has succeeded in lessening structural unemployment since mid-2000's (Reiff, 2015). This means 43 million people were employed in 2015 in Germany. Although Germany has decided against privatization and more towards regulation and state-owned banks, youth unemployment is the second lowest in the world (SGI, 2016). Germany also has a… Continue Reading...

Bryan Stow Vs Los Angeles Dodgers Case Analysis

counsel argued Los Angeles Dodgers and Mccourt were negligent in their responsibilities because they did not provide adequate security in the stadium. The Counsel maintained that two security personnel were assigned to the post, however, they did not arrive on time to intervene or prevent the assault. The plaintiff's counsel also argued that the incident was due to the negligence because the inadequate security system was not put in place to save the assault. According to Plaintiff counsel, it was apparent that Sanchez and Norwood were unruly, throwing food and yelling obscenities at people wearing Giants clothing, yet, they… Continue Reading...

Factors That Led to Enron Downfall in 2001

and House to allow their friends becoming the member of Federal Energy Regulatory Commission and security Exchange Commission. Additionally, the Enron officials put their personal loyalty above all the stakeholders that include business partners, stock holder's local communities, and rate payers. They betrayed the trusts of employees. The aftermath of the Enron collapse, numerous Enron executives were charged with different criminal acts that include money laundering, fraud, and insider trading. For example, Enron Treasurer was charged with 24 count charge of fraud, money laundering and conspiracy. The Treasurer pleaded guilty of committing fraud and received three- year prison term… Continue Reading...

History Of Government Intervention in Tobacco Markets

agriculture, not just promoting a farming lifestyle but ensuring a certain degree of security in the production of agricultural products. Taxation is more a reflection of fiscal policy, which typically views tobacco products as having a low price elasticity of demand, and therefore a lucrative target for taxation. The government's role in health policy is reflected in restrictions on the sale of tobacco, which have served to drive down demand for cigarettes in the past few decades. This paper will examine the role that the federal government has played in the tobacco industry, beginning with the New Deal, and… Continue Reading...

Shopping Malls in Latin America

in the form of not only convenience but also hyper security. From that point on, commercial space within a shopping mall has continued to be more costly compared to space outside it regardless of whether it is situated in the same sector of the city. The author goes on to give an example of an individual that purchased commercial property external from Unicentro for $8 million pesos for every square meter whereas the price for the same property within the area went for $50 million pesos. This is owing to the fact that the price is amassed from the… Continue Reading...

Florida Congressmen

voters are worried about the impact of these foreigners on jobs and their security (Mendoza 11). This legislation in particular appears to be intended to tap into this fear to the benefit of its supporters rather than having any particular benefits for constituents. In this regard, a post by Senator Rubio on his official Web site emphasizes that, "Marco opposes President Obama's attempts to close the detention facility at Guantanamo Bay and has called for terrorists captured in the fight against ISIS to be sent there" (Stand Against ISIS 4). In addition, the senator has also aggressively supported a… Continue Reading...

Business Management and Supervision

as employer-paid insurance, cost of living allowances, as well as job and income security. Further, unionisation in the electrical industry has led to not only better wages, benefits, and rights, but also the establishment of national training standards. These few examples clearly accentuate the crucial role of labour unions. Nonetheless, labour unions can be detrimental in some cases, especially from the perspective of management and supervision. First, addressing employee grievances in a union environment can be a daunting task for the management (Pohler & Luchak, 2015). Dissimilar to a non-union environment, where employees can easily articulate their concerns to… Continue Reading...

Technology Adoption in a Call Center Enterprise

and will to evaluate significant and relevant factors without bias or prejudice (Septer, 2013). Issues in a Technical Environment i. Cyber- security The security of an organizations infrastructure depends on the soundness and reliability of its critical components. Cyber-security threats seek to take advantage of the rising complexity of the infrastructure systems. Just as reputational and financial risk behaves, cyber-security risk tends to affect an organization's bottom line. It can increase costs tremendously and reduce revenue. An organization can be critically harmed by a cyber attack and its ability to gain new customers and maintain the existing customers can be greatly dented… Continue Reading...

Literary Works Referring to the Mental Illness

seemed to be frustrated because of his inability to provide a food security for his family. Moreover, he was constantly embarrassed because of the menial job he was doing that had no wage. Although, Guy's wife and his little son made effortlessly to please him because his son admires his daddy despite his inability to provide for the family needs. Guy's wife still made all her best to make ends meet showering loves for her husband. Despite the wife's true love for the Guy, a desperate need for a change his standard of living led to a drastic change… Continue Reading...

Government’s Right to Spy

its citizens the way it is done by the security apparatus. Reliance on government agencies as a secrete body of law has dire consequences. Americans are not interested in knowing the details of the ongoing sensitive intelligence and military activities. However, in their capacity as voters, they have a right to know what the U.S. government thinks and what they are permitted to do. This puts them in a better position to either ratify or reject decisions made on their behalf by the elected officials. In a nut shell, Americans acknowledge that intelligence will at some point be forced… Continue Reading...

Team America Surveillance and Espionage

that some government surveillance is necessary and desirable in the interests of national security and would gladly sacrifice a small amount of personal privacy in the interest of protecting the country. However, few Americans would agree to allow the contents of their minds be made public, really or symbolically through monitoring of individual social media accounts. What the government views as being "unreasonable search and seizure" under the Fourth Amendment might be defined differently from the common person, which is why civil liberties organizations make a determined effort to work with legal teams to protect the rights of Americans.… Continue Reading...

Thomas More’s Utopia

political system offers such an idealistic and disorienting sense of security, whilst guaranteeing the future of the people will remain precisely the same as their past and present. The author's skill in describing the political community's challenges and difficulties and, together with his capability of presenting a novel utopian world having potential feasible political solutions continues fascinating readers. A comprehension of this text requires a grasp of the fact that all his ideas combined make Utopia such a multifaceted and gripping novel. The humanist author scorned the haughtiness displayed by several members of the ruling class. Adequately detached in… Continue Reading...

Killing Consensus About Sao Paolo and Violence

democracy, openness, accountability, transparency on the one hand, and for security, law and order structures, and stability on the other. His Op-Ed makes waves. He is interviewed by Brazilian media, under the pretense of speaking about police salaries, and is tricked -- the interview is distorted to read as a Canadian support of PCC. This lands him in serious hot water. Makes him seem like he is sympathetic to the PCC and critical of the police. On the other hand, a lot of cops knew what he said was true and supported him tacitly. Unrelated, there was a change… Continue Reading...

Writing Both Fiction and Nonfiction Reflection

plane at the airport, I can write down observations about people or about security, or about something I just saw on the news. The more I write, the better I become at writing. This is true for both fiction and nonfiction. As I reflect on this and other courses I have taken, I also notice some of the differences between my fiction and nonfiction writing. My nonfiction writing tends to be stronger than my fiction writing. I have never been a good storyteller, but would like to learn how to be one. I have progressed in terms of my… Continue Reading...

Reducing Burn Care Unit Operating Costs

services. The suggested IT services that Burn Care Unit can outsource include the electronic medical records and security of the IT Infrastructures. Datamark vendor provides the mail services, scanning/imaging services, document processing, storage and retrieval services for organizations. This vendor assists organizations to lower pricing by leverage the business volume. The organization can also process medical devices efficiently with minimal effort and without incurring the additional capital investments. Despite the benefits that the health care organization stands to derive from outsourcing, the outsourcing option can be risky. Hsiao, Pai, & Chiu, (2009) argue that the outsourcing can fail if… Continue Reading...

A Concise Analysis Of Financial Performance Of Companies

are increasingly recognizing the fact that ESG (environmental, social, corporate governance) elements can substantially affect companies' security rates and financial performance. The aforementioned components' contribution to financial markets has been growing with the rise in number of ESG opportunities and risks within the contemporary international economy. Timely and improved organizational policy-related data access and the effect of organizational policy on communities have made it considerably convenient for customers to express their dissatisfaction by simply quitting a brand. When international brands' images are sullied by ESG-related problems, the resultant instantaneous backlash has the capacity of abruptly and negatively impacting income… Continue Reading...

Capital Budgeting Case Study

(2016, 3) This model holds that the value of a security is related to the risk free rate, the risk premium of the asset, and the volatility of the asset. The current risk free rate in the UK is 0.22%, according to Bloomberg (2016). The beta of South Coast is 1.07. There is historical market risk premium of 7%, which can be used for this calculation. The CAPM derivation of the cost of equity for South Coast is thus: 0.22 + 1.07 (7) = 7.71% The weighted average cost of capital is therefore: (.295)(3.3019) + (.705)(7.71) = 6.4127% Incremental Cash… Continue Reading...

Strategic Importance Of Outsourcing in U.s. Manufacturing Company

contract that involves transferring the IT assets to the vendor can lead to the security vulnerabilities. Moreover, poor outsourcing contract agreement can lead to an operational problem, and threats to information confidentiality. It is critical to realize that absence of data integrity can jeopardize organizational efficiency, and inability to make sound and effective business decisions. A loss of competency is another shortcoming of outsourcing. When firms entrust part of their business activities to service providers, they lose competency in that line of business because they rely entirely on the vendors to deliver the services. Sometimes, some vendors may be… Continue Reading...

Benefits and Shortcomings Of Outsourcing Sports Venue Services

on the businesses that generate more revenues. Moreover, the sports venues provide several soft services that include cleaning, catering, security, vending machine services and receptions. While the soft services are the essential components for the sport venue companies, however, outsourcing some of these services will assist the sports companies to deliver quality services to their customers thereby enhancing competitive market advantages. Coupled with a guarantee revenue growth, turning some of the business processes to a third party will assist the sports venues to implement better promotion and marketing of the sports activities. It is essential to realize that marketing… Continue Reading...

Biblical Prophetic Literature and Hosea

and tell themselves that they need to do so because money is equated with security. However, when times are tough, without friends and faith, ultimately nothing will be able to stand for long. Money is finite but true values such as generosity, trust, and charity are eternal. This is true not only on an individual level but of the Western church itself. Instead of preaching a gospel of wealth and attempting to attract believers by making Christian values seem similar to contemporary values which emphasize monetary gain, the church must remember the original moral principles that won believers salvation… Continue Reading...

Health Safety in Manufacturing Company

operating without such support. Therefore, this gives rise to a false sense of security that may subject personnel to greater risk of injury (Everest Group, 2010). Recommendation Taking into consideration that the most frequent injury trend was associated with back injuries associated with material handling tasks, a general strategy for curtailing back injuries in the organization is recommended. The main recommendation is for the manufacturing company to eradicate or decrease back injuries is through ergonomic assessment and implementation of engineering controls. The most appropriate prospect to attain this is through educating management, design engineers, as well as personnel on… Continue Reading...

Death and Faith from Existentialist Point Of View

human existence. The second point is that there are also four 'boundary situations' (that threatens our security and basis of existence) and the most important of them is death. It is important because it ends 'being-in-the-world'. Jaspers gives two meanings to death. They are ceasing of life or a boundary situation. The one such boundary situation is facing his or her own death and it remains personal. It is referred so because Existenz by itself expresses Dasein which is the temporary existence with respect to body and it requires an end. Also, it is the end of only the… Continue Reading...

The Grand Chessboard Book Analysis

menace of the Soviet Union and disorganized the global scenario. Moreover, American goal was to provide security for Eurasia to enhance American global domination and supremacy. The policy is also to stabilize a relationship with Eastern Asian and Western European countries to enhance international prosperity and stability. While cold war is over, and the United States has become a dominant force in the international system, nevertheless, America still requires maintaining its hegemony as the dominant super power through a grand strategy. The concept grand strategy is the ability of an entity to secure a long-term security, prosperity and peace.… Continue Reading...

Terrorism in Nigeria and Boko Haram

Deprivation Perspective. African Conflict and Peacebuilding Review 3(1): 144-157. Anyadike, N.O. (2013). Boko Haram and National security Challenges in Nigeria; Causes and Solutions. Journal of Economics and Sustainable Development 4(5): Retrieved: http://rguild.org/wp-content/uploads/2013/07/Boko-Haram-and-National-security-Challenges-in-Nigeria-Causes.pdf Aro, O.I. (2013). Boko Haram Insurgency in Nigeria. International Journal of Scientific and Research Publications 3(11): 178-185 Blanchard, L.P. (2014). Nigeria's Boko Haram: Frequently Asked Questions. Current Politics and Economics of Africa7(2) (2014): 143-172. Gilbert, L.D. (2014). Prolongation of Boko Haram Insurgency in Nigeria. Research on Humanities and Social Sciences 4(11): 150-156. Osumah, O. (2013). Boko Haram insurgency in Northern Nigeria and the vicious cycle of internal insecurity.… Continue Reading...

International Law on Overt and Covert Interventions

have become critically important to maintain international peace and security, and preventing violation and aggression. However, the principle of the international law prohibits the use of force against other state actors except where the security council authorizes the use of military force to restore the international peace or where a state uses the force as a self-defence. In the international arena, nation states have been found using the overt and covert method to exercise military interventions against other states. However, a self-defense is one of the major factors that provokes a state to exert the overt and covert interventions… Continue Reading...

Chinese Sport Venue and Market Values

For example, serious deficiencies in the construction of the sporting venues require an immediate improvement. security management The sporting stakeholders in China maintain an effective security for the sporting venues through a co-management of the sports department and real estate department. Typically, the management uses the division of labor to offer security for the venues. The coordination of the security management includes environment maintenance and infrastructure equipment maintenance. The venue security is also facilitated by ensuring that service personnel and workers comply with the security protocols. Customer Experience Deloitte (2016) argues that customers are demand are increasing, however, Chinese sporting… Continue Reading...

Apartment Complex Parking Issues

to think about a higher set of needs defined by Maslow as those pertaining to security and belongingness (Mathes, 1981, p. 69). Therefore, the nature of the change produced was certainly transformational in nature because it cultivated my neighbors to concern themselves with higher needs on Maslow's hierarchy. Compelling others to do so is regarded as one of the chief characteristics of transformational leadership (Mccleskey, 2014, p. 120). Perhaps more importantly, the transformational style of leadership was effective in this instance because of my specific characteristics as a leader. I have always been told that I am fairly charismatic.… Continue Reading...

Diplomatic Security Special Agent

heavy boots, and large duffle bag I toted with me in the security lines, especially when I knew I was flying home. I served in the army of the United States military for four years, during which time I grew well accustomed to life outside of that as a regular civilian. That experience is the primary motivation I have for joining the Foreign Service, and to become a Diplomatic security Special Agent in particular. Other soldiers I served with who enjoyed their duties were partial to the camaraderie and sense of togetherness which pervades the armed forces, particularly during… Continue Reading...

Better Relationship with Russia a New U.s. Policy

not to mention untold destruction (Davis). This policy is neither good for business nor good for the security of the nation. With Russia taking the lead in fighting ISIS, the U.S. has seen how effectively the fight against terrorism can be waged when rebel forces are not aided with arms and other material support. The key to battling terrorism in the Middle East is thus to withdraw support from rebel forces attempting to overthrow regimes (Etzioni). The first step in this policy, therefore, is to end all aid to rebel forces in Syria and allow the Russians to assist… Continue Reading...

Psychotherapy Using Ipt and Act

Jen is a 19-year-old female of mixed ethnic background. When asked what her therapeutic goals are, Jen states that she wants to "get over" the physical abuse she was subjected to her from her mother's ex-husband (her stepfather). In the third therapy session with Jen, she abruptly claims that she may not be continuing with therapy because she is just "therapist shopping." Also in this session, Jen mentioned for the first time that she works as an exotic dancer. She asks with a belligerent tone, "You don't have a problem with that, do you?" Even though there was no response,… Continue Reading...

Global Governance Human Security

the capacity to recognize, evaluate, and add represent and evolving human security concerns in the geopolitical and authority setting 3. To gain progressive academic competence in interdisciplinary research approach and policy within an array of methodologies (University of Massachusetts Boston, 2016) I have confidence that the interdisciplinary curriculum would address universal concerns from many perspectives and practical approaches. I believe the program would propose wide range of issues including arbitration, human rights, economic growth and expansion, education, health, and environment issues. The graduate program would equip me with knowledge and skills for dealing with conflict, fostering security, and administrating… Continue Reading...

Marketing an Emba Program in Vietnam

than by the necessity for a career or by economic security. Tapping into these motivations is going to be critical to successfully marketing this program to Vietnamese entrepreneurs and managers. As for reaching the market, it is worth noting that in the two major cities that drive Vietnam's economy -- the capital Hanoi and the largest city Saigon -- Vietnam is an educated, wired place. Some 40% of all Vietnamese access the Internet on a daily basis, smartphone ownership is rising rapidly and as a young country where 40% of people are under 25, there is potential for further… Continue Reading...

Psychology, Financial Decision-making, and Management Of Household

are better suited to enhance their economic and financial security and welfare (Hilgert and Hogarth, 2003). What is more, in accordance to behavioral economics, psychology plays a significant role in the financial and economic decisions made within the household. For instance, consumers with a great amount of money will spend less as compared to consumers with smaller amounts. The same case applies to individuals that spend more money in a current account as compared to money in a savings account. Mental budgets are linked to the end point, which is the spending or saving of the money. In this… Continue Reading...

Information Technology Goes on and on

because they were helping people. From the transportation company's perspective they were not. Topic 2: security Consultants (a) Companies hire perpetrators of fraud because the latter can prepare the company for future fraud attempts. (b) The ethical issues are that the company is actually hiring a criminal. Moreover, he is one who was fairly notorious for engaging in the fraudulent behavior the company wants to limit. UNIT 7 DISCUSSION Topic 1: Information security Managers should make information security a prime concern because of the increasing prevalence of security breaches in IT. Additionally, data assets are invaluable to most companies and… Continue Reading...

Muslim Americans and the Impact Of September 11th

began to be discussed as a matter of national security.[footnoteRef:2] As -- has shown, the media has been complicit in both demonizing the Muslim community in America and promoting a view of American immigration policy that is anti-Muslim.[footnoteRef:3] This paper will show that the changes in U.S. immigration policy post 9-11 have negatively affected American Muslims in several ways as a result of inherently racist legislation specifically targeting all Muslims regardless of whether they are U.S. citizens or not. [1: Jigyasu, R. "Defining the Definition for Addressing the 'Reality'," in What is a Disaster?: New Answers to Old Questions,… Continue Reading...

Economic Inequality and Austerity Motivator for Revolution

Al-Riffai P. and Yu B. (2012) Beyond the Arab awakening. Policies and investments for poverty reduction and food security. International Food Policy Research Institute, Washington D.C. Brinkman H. J. and Hendrix C. S. (2011) Food insecurity and violent conflict: causes, consequences, and addressing the challenges. World Food Programme, Occasional paper n. 24. Muller, E.N. (1985). Income Inequality, Regime Repressiveness, and Political Violence. American Sociological Review. 50 (1): 47-61 Skocpol, T. (1976). France, Russia, China: A Structural Analysis of Social Revolutions. Comparative Studies in Society and History. 18 (2): 175-210. Continue Reading...

Analysis Of Honolulu International Airport

Agency, Fish and Wildlife Service, Post Office, Center for Disease Control (CDC) and Transportation security Administration. Joint Base Pearl Harbor Hickam (JBPHH) and HNL operate as a joint use facility and share runways and taxiways. At any given daytime or evening hour, an estimated 10,000 people are in the airport complex as passengers, employees or visitors. Approximately 15,000 people work at the airport every day and another 20,000 depend on the airport daily for their livelihood. HNL has a workforce of 550 employees, half of whom are custodians and maintenance personnel. The airport has its own retail stores, restaurants… Continue Reading...

Gerontology Aging and America

the first official White House Conference on Aging in 1961, the same year Social security Amendments were altered. The second White House Conference on Aging was in 1971. They were held every decade since, with the most recent held in 2015. In 2006, the OAA was amended to create Aging and Disability Resource Centers (ADRCs), which function as portals to access the system. This is one of the most important recent additions to the OAA in light of the need for individuals to locate trusted sources of information, and find out what resources and services are available to them.… Continue Reading...

How Confucianism Impacted China

a triumphant time for China: the people were prosperous and security was strong. Thanks to the guidance of Confucianism, the people were also united in belief and a solid strategy by the Han rulers saw that all were informed on the same way of life. From the top down to the bottom and back up again, Confucianism was used to bring all Chinese to the same level of thinking; in this manner, the top advisor or nobleman in China did not think any differently in philosophical terms than the commoner at the market buying fish. They both had the… Continue Reading...

Nigeria Boko Haram and African Terrorism

be applied to Boko Haram to provide alternative counterterrorism solutions. Anyadike, N.O. (2013). Boko Haram and National security Challenges in Nigeria; Causes and Solutions. Journal of Economics and Sustainable Development 4(5): Retrieved: http://rguild.org/wp-content/uploads/2013/07/Boko-Haram-and-National-security-Challenges-in-Nigeria-Causes.pdf This article is helpful for positioning Boko Haram in terms of globalized Islamic terrorism. The author shows how Boko Haram's 2009 uprising "set a precedent," and showed how a specifically Nigerian brand of Islamic fundamentalism was competing with secular Nigerian institutions. Economic disenfranchisement, "party politics and politics of anxiety," and desperate politicians have fomented the anti-government sentiments among northern Nigerians, and Islamic leaders have remained relatively "ambivalent"… Continue Reading...

Nursing Alarm Safety and Alarm Management

(n.d.) found that too many alarms causes alarm fatigue, and also creates a "false sense of security," (p. 5). The researchers also found that staff is sometimes not educated about the different types of alarms and what they mean. 3. Who is responsible for alarm response? The delegation of authority for responses will vary from case to case. In the clinical setting in my unit, which I observed for this analysis, all nurses on duty were responsible. However, some nurses with areas of specialization would attend to additional alarms other than the general ones of the bed alarm, the… Continue Reading...

Democracy or Not for Economic Development

unwilling to invest, even when there are oil reserves to be exploited, because they cannot guarantee the security of their operations, nor the supply chain to sustain such operations. While South Sudan is fertile and can be a solid agricultural economy, economic development sufficient to life a landlocked nation out of poverty can only really come from the development of the country's oil resources. There are no real lessons to be learned from the disbursement of oil revenues. Democracies like Canada and Norway do just fine, but so do absolute monarchies like Qatar and the different United Arab Emirates.… Continue Reading...

Mobile Ais Security Issues

way SMBs do business, and the second is the role that security plays in this. Most small businesses become interested in cloud-based solutions because of the efficiency gains, and in particular solving the pain point related to payroll, but they are concerned about security Bhansali is clear that security is an essential component for a cloud-based system, because the market demands it. Accounting data is sensitive, and companies that utilize cloud-based solutions insist that this information be protected to the highest standard. Bhansali notes that his company moved to Amazon Web Services, which has one of the more secure… Continue Reading...

How to Grow the Economy

aftermath of the Great Recession, an example of this would be the Social security tax "holiday" that many enjoyed. There were also tax incentives like the HIRE act that encouraged people to hire workers that were not employed. As far as government spending goes, there is typically an increase with that as well with the focus being on the aforementioned Keynesian spending. Meaning, while there is obviously a focus on supporting situations and problems that are more protracted during recessions like unemployment and welfare, there is also a focus on projects and spending that get the economy "going". The… Continue Reading...

Innovation Best Practices

perceive creative ideas from their subordinates as a disruption of their authority and security. As mentioned previously, innovation cannot thrive in an atmosphere of standardised routines. Supervisors must genuinely embrace new perspectives and approaches provided by employees. They should view employees not as threats to their job security, but as collaborators. Google and other innovative companies have succeeded in large part because their leaders have initiated and maintained practices that facilitate innovation. In addition to the 20% rule, Google has put it place personnel management practices centred on innovation. From employee recruitment and selection to performance management, compensation, as… Continue Reading...

Moral Issues with Internet Privacy

internet hacking. In May of 2014, leading English daily, the Guardian, stated that a few of the top global security researchers were facing indictment on account of their attempts at exposing web infrastructural susceptibilities. The American CFAA (Computer Fraud and Abuse Act) prohibits hacking, or the breaching of private computers and networks; however, web security specialists utilize hacking projects for exposing security shortcomings with an aim to resolve them. Critical.IO exposed a Universal Plug and Play (UPnP) protocol flaw which endangered as many as fifty million PCs, and ended up resolving it by hacking PCs. This drove numerous technology… Continue Reading...

Unfair Treatment Of People with Privilege

friends could often go anywhere they wanted at moment's notice with no accompaniment. However, I could go nowhere without security personnel in tow and those personnel had strict orders to have my home by a certain time. Another reason I am different is that I want to continue to grow and build my family's power once it is passed to me while my peers often just want to survive and live on the money of their parents for as long as they can. Even with that, I had two friends that eventually did turn to drugs and alcohol but… Continue Reading...

Pnac the Osp and Iraqs Wmds

Iraq, WMDS, and the Rise of the Policymakers In 2003, U.S. Secretary of State Colin Powell testified before the UN security Council that Iraq had mobile weapons labs and was in possession of uranium, which was being used in the country's WMD program. His testimony was based on faulty U.S. and British Intelligence: the invasion of Iraq that followed found no evidence of such labs or of such a program. Joe Wilson, husband of CIA operations officer Valerie Plame and former U.S. Ambassador to Gabon penned an op-ed for The New York Times entitled "What I Didn't Find in Africa"… Continue Reading...

Boko Haram and Diffusion Of Innovation

M. (2014). The Spread of Military Innovations: Adoption Capacity Theory, Tactical Incentives, and the Case of Suicide Terrorism. security Studies, 23:513 -- 547. Osumah, O. (2013). Boko Haram insurgency in Northern Nigeria and the vicious cycle of internal insecurity. Small Wars and Insurgencies 24(3): 536-560. White, H. & Sabarwal, S. (2014). Quasi-experimental design and methods. UNICEF. Retrieved online: https://www.unicef-irc.org/publications/pdf/brief_8_quasi-experimental%20design_eng.pdf Continue Reading...

Fujitsu Limited Case

in Japan, delivering a wide array of ICT products and services, including big data, cloud, and security solutions. With about 95,000 pending and approved patents worldwide and 162,000 employees in 420 subsidiaries spread across more than 100 countries, the firm's revenues were $46 billion as of 2014 (Edmondson & Harvey, 2016). This makes the firm one of the largest ICT companies in the world. Presently, the firm is focusing on increasing its competitive advantage in the North American market, which is dominated by IBM, Accenture, and Hewlett Packard (HP). Fujitsu's impressive performance over the years can be attributed to… Continue Reading...

Addressing the Budget Deficit Problem

1997. By the 21st century, the deficit would be exploding as a result of wars and national security growth in the post 9/11 world -- and following the banking implosion of 2008 in the wake of the housing bubble crisis, bailouts would further increase the deficit, putting Americans even further on the hook (Burton, 2016). If anything, these decades showed that Congress was not really doing anything to reduce the deficit: its actions were impotent and the outcomes evident -- the deficit has increased dramatically. Congress is simply dysfunctional (Binder, 2015). The budget does not exist in a vacuum.… Continue Reading...

Starbucks Financial Assessment

debt, as lenders may also perceive a firm to be more risky, due to lower levels of security, as well as the firm facing a higher interest payment burden. Therefore, one ratio often used as the debt ratio, which divides the total level of debt by the total assets (Elliott & Elliott, 2015). The higher the ratio, the greater the proportional level of debt within an organisation (Elliott & Elliott, 2015). The debt ratio for Starbucks is shown in table 6 below. Table 6; Debt ratio for Starbucks 2012-2016 Debt Ratio 2012 2013 2014 2015 2016 Total debt (a)… Continue Reading...

Systems Development Process

most ideal and ethical action for the students would be to contact the company regarding such perceived vulnerabilities (Brey, 2007). security Consultants Frank Abagnale, the criminal played by Leonardo DiCaprio in the motion picture "Catch Me If You Can," ended up in prison. After he left prison, however, he worked as a consultant to many companies on matters of fraud (a) Why do these companies hire the perpetrators (if caught) as consultants? Is this a good idea? The fundamental reason why the companies employ the perpetrators as consultants is simply because they are deemed as fitting advisors. For instance, in… Continue Reading...

Ethics in Corrections

behavioural therapy to inmates, and hence require the support of correctional officers to achieve this. By ensuring security within the facility in general and monitoring inmate behaviour, correctional officers provide a good working atmosphere for counsellors. Educators constitute crucial stakeholders as inmates may take part in educational programs. They require a great deal of assistance from correctional officers. The public is an important stakeholder as correctional work is a public service. Correctional authorities, in conjunction with other elements of the criminal justice system, ensure justice is served to victims of criminal behaviour. This means that public confidence in correctional… Continue Reading...

Clara Reeve's the Old English Baron

disabling conditions suffered in the service of nobles by subordinates are returned in kind with a lifetime of security and affection in ways that would make most modern corporations and the Department of Veterans Affairs blush with shame. The honor and righteousness combined with the intrigue and supernatural elements contained in the plot resolution make it clear that this novel is a heroic romance that helped set the standard for other Gothic novels that followed. Continue Reading...

Global Comparisons in Workplace Discrimination

Workplace discrimination can be understood as an inappropriate, unjustifiable treatment towards a person or a set of people at the workplace. Such undesirable treatment is based more often on people's race, ethnicity, age, marital status, sex or other describing characteristics (Australian Human Rights Commission, n.d). Workplace discrimination can give the impression of a repudiation of particular civil liberties, neglectful treatment, deliberate undervaluing of an employee's character or work outcomes and attainments. Workplace discrimination is not only done by the employee but by the fellow employees or peers and other superiors as well. Workplace discrimination, although often not as blatant as… Continue Reading...

Self Reflection Based on Personality Type on Job Application

assist me working to exemplify my reliability and truthfulness. My commitment to creating order and security will help in establishing rules in the work environment that will make me becoming an excellent organizer and excellent administrator. Impact my Results might have on my Choice of Academic Major The results of the test are likely to influence the choice of my academic major since an academic major contributes to the choice of a career plan. I will prefer one the following academic majors: Business Administration, Business Management, Economics, and Administrations because one of these majors will assist me realizing my… Continue Reading...

African Terrorism and Boko Haram

Conceptualizing Boko Haram is challenging, requiring a multifaceted theoretical framework. Boko Haram did not emerge out of a vacuum. It is hypothesized that Boko Haram has been influenced by other radical groups as well as trans-national religious extremism. Moreover, it is hypothesized that Boko Haram functions as a political opposition group. The theoretical framework used to characterize the political function and focus of Boko Haram is based on social alienation and particularly the Frustration-Aggression theoretical framework as suggested by Omadjohwoefe (2013). Frustration-Aggression theory is related to conflict theory, in that systematic alienation and oppression lead to widespread frustration and despair,… Continue Reading...

Identifying Opportunities to Improve Revenues and Ridership Levels at Wmata

to make sure that everyone does their part in creating and sustaining a culture of safety and security in stations, vehicles, support facilities, and access points" (Metro facts, 2016 p. 2). Some of the initiatives that have already been taken to promote safety throughout the Metro network include the following: • Digital signs in the stations show next train arrival times, system status and time of day; • Digital signs outside some stations show system status and time of day; • Digital LCD monitors at station manager kiosks show real-time advisories and alerts; • Two-way radios between train operator… Continue Reading...

Constructivism Theory in International Politics

interaction between states is a critical tool in enhancing international peace and security. (Copeland, 2000). Before the advent of constructivist theory, the neorealism was the dominant theory in the international relations and the advent of constructivism assists in challenging the neorealist assumptions. Neo-realists believe that the major aspects of international politics are based on the structural hierarchy of the international systems. The neo-realists also point out that international systems are primarily based on anarchy because they lack overarching authority. Moreover, the international system composes of the unit of state, formally equal, and enjoy sovereignty over their territories. Neo-realists believe… Continue Reading...

Global Warming in 21st Century

of future generations to sustain their lives, which is ethically unfair. Indeed, global warming threatens food security, human health, human and non-human survival, as well as socioeconomic stability in the future (Cummins, 2014; Justin, 2015). Addressing the problem, however, remains a major challenge in large part due to the moral, ethical, and philosophical questions surrounding it. More specifically, there remains a great deal of controversy over who is responsible for reversing global warming. In this presentation, I delve into this issue. The presentation will be made at an upcoming climate change conference held at a local community center. The… Continue Reading...

Katz V United States

(Iannacci, 2015). Justice White’s concurrence called for an exception linked to “national security”, to the Supreme Court ruling. Justices Brennan and Douglas also expressed a strong response in their shared concurrence. Justice Black, the only one to disagree (being forever a steadfast textualist), maintained that Amendment IV’s plain text failed to include electronic surveillance. He asserted that the Amendment didn’t create any general right to authorize the Court to freely hold all privacy-violating aspects as unconstitutional. History establishes that the freedom of reposing these powers at court is dangerous. Continue Reading...

Wandering Through the Garden Of Youth

and the charms the women must use -- dresses, hair, voice -- to attain security in life; and this opera is the one that her husband Ch'ien P'eng-chic had heard her sing in when in Nanking -- and it caused him to think of her "day and night" until he finally returned and married her. It was because of this song that Ch'ien had decided to take Madame Ch'ien (Fifth Sister) as his "companion in old age" (p. 352). 3. Why is it ironic that Madame Ch'ien refuses to sing "Waking from the Dream?" a. It is ironic because… Continue Reading...

Enactment Of the 19th Amendment Xix

laws including divorce and inheritance laws that would give them more security. Women proceeded to vote; not just to improve governance but to add value to their individual lives. The Amendment helped women to vote into office policy makers that were progressive. These policy makers helped to enact policies that benefited women. The policies that were enacted between 1920 and 1965 improved both the reproductive and economic conditions of women across the USA. The flip side of the developments is that women also took advantage of the developments. For instance, birth control services were made cheaper for more women… Continue Reading...

Asian Bioethics and Towards Reconciliation

in nature as is the Western model. Medical ethics in China also refers to questions related to social security and universal health care. Bioethics, referring to such questions as the implications for cloning, is something totally different from medical ethics because it tends to be more theoretical in nature. The current leader of the bioethics movement in China is Qiu Renzong, who is instrumental in shaping an "Asian ethos" version of bioethics that can exist independently from and possibly counterbalance the dominant Western bioethical model (p. 134). Qiu Renzong warns against "ethical imperialism," and also claims that there can be… Continue Reading...

Ethnic Self Identity

all bad Integrative and Awareness One has developed a sense of security in this stage. They can assess the good and the bad. They aspire to get rid of all forms of oppression. According to Atkinson (1989), young adults among minorities start the minority development process from a dominant perspective. He points out that many blacks place a high value on religion, culture and race. Identity Development in Karen Ethnic Community The Karen are highly persecuted in Burma. Approximately 2000 villages have been destroyed since 1990. The Karen people have been subjected to a myriad of oppressive treatment and discrimination. They… Continue Reading...

Apple Vs Federal Government

Privacy and security: Apple vs. Federal Government With increased usage of smartphones and other mobile devices, concerns over unauthorized access to private and confidential data stored in the devices have soared. In recent times, Apple Inc., one of the largest manufacturers of smartphones in the U.S. and worldwide, resorted to robust cryptographic techniques in an attempt to protect data customers store on its devices. The move has led to a fierce battle between Apple and the federal government, with the latter citing national security concerns. The government's… Continue Reading...

Hsms Gap Analysis Hazard Identification and Risk Assessments

cross section of the workforce which included, supervisors, crane drivers, scaffolders, truck drivers, security guards and the water purification plant supervisor. A Health and Safety survey developed for this report was used to identify issues surrounding the implementation of the management system. The information gathered during these activities was then captured using a gap analysis tool (see appendix A) for the requirements of the BS OHSAS 18001:2007 standard. Site tours were carried out in order to identify the hazards associated with work activities which included working at height (scaffolds), construction activities, crane driving, transport and movement of vehicles, maintenance… Continue Reading...

President Trump's First Day

agenda that is starkly divergent from that laid down by Obama. He appointed important national security members and embarked on his mission to implement the daring, typically rash, promises he made during his campaign (Berger, 2017). On the evening of the first day, he signed an EO (executive order) that instructed agencies to alleviate ACA's burdens. Reince Priebus, the White House Staff Chief, instructed agencies as well, to enforce a regulatory freeze instantly. Trump, at the inaugural address, stated that it was now time to take action and not stick to empty words. As is typical of him, he… Continue Reading...

Impact Of Syrian Refugee Crisis on Marketing Arena

(Kleintop & Schwab, 2015). Whereas the crisis presents considerable political and security challenges for European governments, it also offers significant opportunities for businesses in Europe. According to Marcus (2016), the crisis provides an important growth opportunity for European industries, particularly from a labour perspective. Most refugees are young, educated, and skilled, and come ready to work. Therefore, with European businesses increasingly grappling with labour supply challenges due to reduced birth rates and population ageing, refugees can be an antidote to these challenges (Kleintop & Schwab, 2015). Together with the government, businesses can turn the crisis into an opportunity. They… Continue Reading...

Ce41o Unit 6 Assignment

time everywhere they go (OCP, 2015) Individual Goals 1. Shows a sense of security. 2. Is self-confident 3. Attitude is positive 4. Desires to learn 5. Is explorative (OCP, 2015) Standards Addressed The outdoor classroom is spurred by the real needs of children. It provides personally meaningful activities and adopts the appropriate practices for early childhood development care Part 2: Visual and Performing Arts Content State Standards: California State Board of Education 1. Learners are responsive to art, nature and the objects within it, the environment and events. They also employ the visual arts environment to communicate what they see (CSBE,… Continue Reading...

Applied Social Psychology

the terror management model -- proposes that for maintaining psychological security in spite of knowing one's mortal nature, mankind needs to believe in cultural views of the world, which convince people of their significance and endurance in this world instead of reinforcing the belief that they are nothing but animals destined to being obliterated after dying. Greenberg and Kosloff (2008) assessed terror management theory's primary underpinnings and studied its implications for comprehending typecasting, bias, political attitudes and intergroup disagreements to reveal that when reminders of one's mortality amplify the psychological necessity of supporting these worldviews, typecasting, bias, hostility towards… Continue Reading...

Budgeting

and information. The main way to evade hacking from external parties is to use security systems and metrics. This aids in making certain that the resources within the information system are aptly safeguarded from threats. Another threat to the information system is viruses. These programs are a major concern as they can easily lead to data loss, with the possibility of crashing the entire system. The best way to mitigate this threat is by using the most effective anti-virus products. This way, the organization is able to scan its systems and clear out any viruses. A third threat to… Continue Reading...

Narrative Analysis and Life Span Interview Of Ms. W

Moreover, Ms. W was isolated from her friends because she did not have nice clothes, family security and house. To please her colleagues, she was always the person to do more in a group project, despite this effort, she still believed she was not as smart as other students in class. However, she believed that her duty was to work harder than more intelligent students. Despite her challenges faced during her adolescent, Ms. W was still able to find her way into college nearby her house to save money. In the United States, many people who were in the… Continue Reading...

Security Leader in a Military Organization

Leadership ability is particularly important in military organizations. The security environment has become ever more challenging, warranting even more effective leadership (Laver, 2008). Military organizations now grapple with challenges such as craftier enemies, international terrorism, increased incidence of natural disasters, and reduced budgetary allocations. Internally, military organizations face challenges relating to issues such as personnel motivation and retention, capacity building, and veteran welfare. Yet, military organizations must constantly ensure national security. Navigating the increasingly complex security environment requires military leaders to have certain qualities. This paper discusses these qualities. Attention is particularly paid to situational leadership, integrity, people skills,… Continue Reading...

Supreme Court Second Amendment Case

this right on the basis that a well regulated is crucial towards ensuring the security of a free State. Conclusion: In a 5-4 decision, the U.S. Supreme Court upheld the decision of the federal appeals court and termed two provisions of the District of Columbia Code relating to gun laws unconstitutional. According to the majority opinion, the trigger-lock requirement for handguns in the home was found to be unconstitutional since it would make it impossible for citizens to utilize their firearms even for the legitimate purpose of self-defense. Moreover, the Court found that the handgun ban was tantamount to… Continue Reading...

Supreme Court

Obamacare at the Court; Eric Holder, ex- Attorney General; and Jeh Johnson, Secretary of Homeland security. 4th, 5th, 6th, and 8th Amendments Impacted Scalia's relatively civil-libertarian view of Amendment IV left several observers astonished. On particular matters, the Justice backed distinct rules in favor of law enforcement (e.g., the unbiased test for justifying a stop). But with regard to defining fairness and searches, Scalia's formalism and originalism philosophies ensured he supported rules which frequently facilitated crime (Slattery, et.al, 2016). For instance, consider the subject of how a search is defined. Any object plainly visible to law enforcement officers already… Continue Reading...

Life Span Interview

not have as many nice clothes, a nice house, or family security. When engaged in group projects in school, she was often the person who would volunteer to do more of the project. Still, she felt inferior because she believed she was not as smart as some of the students in the most difficult classes at her school and described herself as a dutiful student who tried hard rather than someone who was intelligent. She tended to be quiet and go along with the flow and the times that she was caught doing bad things (such as when she… Continue Reading...

Aurora Colorado Theater Shooting After Action Report

requested by local agencies to do so. The FBI may support local agencies in processes such as investigations, security clearance, and disaster response. In this case, the FBI was specifically involved in detonating the explosives planted in the suspect's apartment and collecting forensic evidence from the apartment. Indeed, the evidence collected by the FBI would later become valuable for trial and prosecution. Evacuation and denotation procedures at the suspect's apartment mainly involved the APD, AFD, FBI, and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF) (TriData Division, 2014). The APD was involved in evacuating the suspect's and neighboring… Continue Reading...

Norway, England, Wales, and the United States

twenty-seven police districts, and a central National Police Directorate. Above this agency is the Ministry of Justice and Public security Police officers (except military police) are generalized and decentralized. Meaning, they have no sector or geographical limitations regarding their powers. The government agency for corrections in Norway is the Norwegian Correctional Service. Governed by the Norwegian Ministry of Justice and Public security, it governs the Eastern, Southern, Southwestern, Western, and Northern Regions. Kripos or the National Criminal Investigation Service, is a special agency belonging to the Norwegian Police Service. Bryn within Oslo, serves as the base location. References Barton,… Continue Reading...

Protecting Data and Health Information

parts of the community clinic. They have sensitive data in the system as well from social security numbers to other identifying information like home address and telephone number. Such information in the wrong hands can lead to identity fraud. The last party that could be affected should personal data leak is the director. She could face potential legal action if the information is leaked under her supervision and guidance. In terms of risks, problems, issues, and consequences, the staffers that have their information leaked or unintentionally leak sensitive data could risk being fired, could suffer through identity fraud, and… Continue Reading...

The History Of American Social Welfare

problems ("5 Causes of the Great Depression," n.d). References "5 Causes of the Great Depression," (n.d.). Retrieved online: http://www.cland.k12.ky.us/userfiles/13/Classes/441/5%20causes%20of%20the%20great%20depression.pdf?id=8459 9. The Social security Act of 1935 was part of FDR's New Deal and was the hallmark and cornerstone of social welfare in the United States. The significance was a shift in social values and norms in America, leading to an understanding that quality of life is linked to the need for welfare to offer aid to the disadvantaged, and led to the development of the two-class social welfare system (Hansan, n.d.). References Hansan, J.E. (n.d.). The New Deal Part II. The Social… Continue Reading...

Digitalization to Enhance Customer Satisfaction at Apm Terminals

industry. These technologies have proved to be valuable in ensuring timely shipping and cargo delivery, guaranteeing cargo security, maximizing port capacity, improving process efficiency, and reducing operational costs for both port operators and their clients (Accenture, 2016; Heilig, Schwarze and Vob, 2017). Nonetheless, there is little empirical evidence of the relationship between digitalization and customer satisfaction in the port industry. Focusing on APM Terminals (APM), the present study sought to fill this gap in literature. The study specifically sought to examine how the organization can make use of digitalization to improve customer satisfaction. APM is a Dutch multinational container… Continue Reading...

Career Planning Development and Management

understanding my opportunities and areas of strength, I will be in a better position to stride with security and confidence. Nevertheless, by realizing the threats and weaknesses likely to confront me, I will properly concentrate on these parts hence work on my weak areas and eventually overcome any threatening obstacles. Strengths Since I was a child, I have always been a creative and innovative person (Barrett 69). In addition, when I was growing up, my parents always told me that I was an open-minded child. These are what I consider as my personal strengths because together, they have allowed… Continue Reading...

Impact Of the Rise and Spread Of Christianity

life with a particular woman, he was first required to wed her. Hence, Christian society afforded significantly greater security to females. Furthermore, the unfair pagan rule that permitted husbands to keep mistresses and engage in illicit affairs was disallowed by Christianity. In all of the aforementioned respects, Christianity accorded females much more of equality and security as compared to the cultures of surrounding societies. Indian widows had to, willingly or unwillingly, jump into the funeral pyre of their husbands and get burned to death. Christian missionaries contributed significantly to putting an end to such long-standing customs and standards. [7:… Continue Reading...

American History During Early 20th Century

created massive amounts of jobs for unemployed Americans during and after the Depression, the Social security Act, which remains one of the biggest legacies of the New Deal, and the creation of the Federal Deposit Insurance Corporation (FDIC), which helped protect the investments and savings of ordinary Americans. Like Progressive policies, the New Deal legislations were designed to empower the working class and prevent the private sector from overriding the decisions made by publically elected officials. The New Deal, like the Progressives, also issued federal mandates to improve quality of life via labor reforms and regulations on corporate America.… Continue Reading...

White Box Software Testing for Android

box testing primarily focuses on the internal structure, design, and implementation of the software with the aim of strengthening security, improving design and usability, and the flows of input and output within the application. When using this approach, the tester concentrates on how the software performs what it is supposed to perform. In order to perform white box testing, a tester should have programming know-how in order for them to understand the code used within the software and understand its implementation. This is because the tester would be testing the software beyond the user interface and going into the… Continue Reading...

Digitalization to Enhance Customer Satisfaction at Apm Terminals

be valuable in ensuring timely shipping and cargo delivery, guaranteeing cargo security, maximizing port capacity, improving process efficiency, and reducing operational costs for both port operators and their clients (Accenture, 2016; Heilig, Schwarze and Vob, 2017). Nonetheless, there is little empirical evidence of the relationship between digitalization and customer satisfaction in the port industry. Focusing on APM Terminals (APM), the proposed study seeks to fill this gap in literature. The study specifically seeks to examine how the organization can make use of digitalization to improve customer satisfaction. APM is a Dutch multinational container terminal company. With its headquarters in… Continue Reading...

Transparency and Governance

information is made available to the society and understood by them, with the few exceptions to protect the security and privacy of a government (Johnston M., n.d:Pp2). It is only when these tenets are followed that the governance can be said to be transparent. On the other hand, good governance can be defined as the legitimate, accountable and most effective ways of acquiring power as well as resources with the ultimate aim of implementing the widely accepted social goals. The key attributes of good governance are outlined as transparency, responsibility, accountability, participation and responsiveness to the needs of the… Continue Reading...

Military Management and the Agency Problem

accountable to the public. At the same time, the military's role in protecting national security means that its operations are by definition not necessarily public knowledge and so communication and decision making occur without public oversight. The agency problem in the military may work its way out in different ways depending on the situation. Occasionally principals may turn directly to the President and senior advisors, as in major national security crises. The intimate relationship between military and executive branch is more open to problems than the more formalized and bureaucratic relationship that typically exists with Congressional oversight (Petrina, 2005).… Continue Reading...

The Impact Of Legislation on Violence

legislation and what sort of balanced position nation states should take towards the regulation of firearms amid security and cultural crisis brought about by the War on Terror. Background Firearm legislation is not new in the West. As early as 1594 when the Protestant Queen Elizabeth of England fearing attack from angry Catholics banned wheellock pistols near the palace (Jardine, 2006), firearms have been the center of controversy. On the one hand they have been recognized as the instrument of protection and their possession deemed a Constitutional right in many regions (most notably in the U.S., which has made… Continue Reading...

Social Work Care Case Study

facility, then Stephanie can take advantage of the self-care options available to her within the provisions of Social security. If environmental stressors, such as lack of financial security, are aggravating the Parker family and exacerbating mental illness, treatment will remain challenging. A social worker can offer solutions to such problems by opening doorways to funding options. References Fink-Samnick, E. (2011). Understanding care coordination. The New Social Worker. Retrieved online: http://www.socialworker.com/feature-articles/practice/Understanding_Care_Coordination%3A_Emerging_Opportunities_for_Social_Workers/ NASW (2016). NASW Standards for Social Work Practice. NASW. Retrieved online: https://www.socialworkers.org/practice/standards/NASWHealthCareStandards.pdf Continue Reading...

Ancient Rome Timeline Of Military

Septimus Severus gave Rome a confidence boost and perhaps a false sense of imperial security. "Septimius Severus (ruled 193-211), after fighting bloody civil wars to establish his power, managed to extend Roman possessions in Mesopotamia, but was occupied in turning back a tide of barbarian invaders in northern Britain when he died in York. By this point in the Roman history timeline, the concept of maintaining order and discipline in local regions seemed impossible to actually execute. Rome simply became too big for its britches. Civil wars and local skirmishes became commonplace, as did economic and political corruption. The… Continue Reading...

Online Consumer Reviews from the Consumer Perspective

like customer service or convenience. From a consumer's perspective, online reviews offer security. They help guide a decision or reinforce one that has already been made. A consumer review might sway a customer toward one brand and away from another, or it might introduce a customer to a new product or service that might have otherwise gone unaware. Therefore, the ability of reviewers to introduced new information in their copy or to provide comparison or outlinks is critical from the perspective of the brand manager. Bloggers and other professional product reviewers have the potential to steer consumer tastes in different… Continue Reading...

Apple Market Share Increase for Ipad 4

a much subsidized prices. Risk to data breach Apple is always targeted by hackers. Increased security must always be ensured by development of applications that are not impregnable. SLP 3 Goals and objectives The targeted marketing of the iPad 4 in Asia and Africa is definitely bound to make huge success and will help the company to break into these markets in a much larger and stronger manner. Apple needs to have a prime focus on the institutions where there are various research works required, institutions of higher learning, hospitals, government agencies and NGOs that operate within the developing and underdeveloped… Continue Reading...

Apple Increase in Market Share for Ipad 4

a much subsidized prices. Risk to data breach Apple is always targeted by hackers. Increased security must always be ensured by development of applications that are not impregnable. SLP 3 Goals and objectives The targeted marketing of the iPad 4 in Asia and Africa is definitely bound to make huge success and will help the company to break into these markets in a much larger and stronger manner. Apple needs to have a prime focus on the institutions where there are various research works required, institutions of higher learning, hospitals, government agencies and NGOs that operate within the developing and underdeveloped… Continue Reading...

Airport Design

be carried out in the region especially considering financial, environmental and security implications. This airport would have two runways running parallel to one another which will be in use concurrently. This runway will be built to 4-E specification, which comfortably accommodates all present day commercial plane designs and those whose designs are still in infancy. Aircraft parking spaces, taxi roads as well as several passenger terminal buildings will also be constructed. The major passenger terminal would be where normal passenger activities such as baggage checks, baggage claim for arrivals, ticket processing and passport inspection as well as customs will… Continue Reading...

Leadership in the Public Sector

work for the general public. Whether it is education, healthcare, agriculture, security, defense, or corrections, public sector organizations seek to address problems that face the public. Since addressing these problems requires taxpayer resources, transparency and accountability is crucial. As custodians of public resources, public sector leaders have a responsibility to ensure the resources are utilized in an ethical manner (Dukakis, 2010). Deficiencies in transparency and accountability would mean that resources allocated to address a particular problem are embezzled or misappropriated, which may create detrimental consequences for the public. Ethical behavior also means that public leaders' decisions must prioritize the… Continue Reading...

Is Mandatory Military Service a Good Idea

Terrorism has propelled the nation into a new environment in which security and defense are top priorities. In such times, a country cannot depend upon the hope that citizens will volunteer their time in military service in defense of the country. It becomes imperative at such moments for mandatory military service to be enacted so that the nation can be sure of being prepared at all times to oppose its enemies and maintain its security. This paper will show why mandatory military service for all able bodied citizens is an idea that should be supported in the present climate.… Continue Reading...

Cloud Service and Prescription

regulate prescription drugs (FDA) and set the standards for security of health information systems (HIPAA). Legal services check the terms and guidelines of contracts. This represents the GUIDES side of the INPUTS and OUTPUTS prescription process. The INPUTS side has cloud service costs, prescription and patient data, and updated software/maintenance costs. This is what goes into sending a prescription, receiving a prescription, and performing the necessary tasks to get the prescription to the patient. The OUTPUTS involve a cloud service license, support and maintenance, and generated prescriptions requests. The next part involves ENABLERS and these are doctors and nurses,… Continue Reading...

Growing Your Own Food

deal of which are apparent and short-lives, provide us with a false sense of security that everything at the present moment is okay, yet it clearly is not. In addition, one of the key causes for the prevailing disconnect is based on individuals disregarding and overlooking the fact that human beings are not exempted from natural principles that they assent for all other species. Our perspective and thinking allows us to create and discover temporary resolutions that are not fully sustainable (Bekoff and Bexell, 2010). One of the key ways in which human beings constantly become disengaged is centered… Continue Reading...

Use Of Chlorhexidine to Prevent Healthcare Associated Infections

hours to protect American citizens and foreign nationals in the U.S from security, and health threats. The CDC aims to fight any diseases and provide support for the communities. The mission of CDC is also to increase health securities in the U.S communities. The agency attempts to accomplish their mission through evidence-based science against dangerous and expensive threats. This study uses different seven level evidence in order evaluate the credibility of this research. The first strategy is to use the meta-analysis, and systematic review using the random controlled trials to rank the study to the highest level. The second… Continue Reading...

Protection Of the Victims Of Crime

in lower economic zones, then they need to be responsible for being guardians of security. If one lives in such neighborhoods then they are putting themselves more at risk of crimes hence prone to victim blaming. Social activities- there is need for one to profoundly choose the social activities they engage in to avoid possible crimes meted on them. The type of activities, the timing, the place of occurrence and the people with whom one does such activities as well as the context within which such social activities take place are important factors. It is a fact that the… Continue Reading...

Different Theories for Managing Employee Relations

were mostly concerned with ensuring that employees had job security and they worked hard to quell any disturbances that might arise. With employees working as expected and employers willing to pay the employees as agreed, there was a need for the unions to honor their contractual agreements. The contracts removed the unions from management and offered the company managers leeway to run the business as deemed fit. Unions opted to have collective bargaining agreements that in the long run meant that the unions were powerless and the power of workers no longer rested with the unions (Aidt & Tzannatos,… Continue Reading...

Counter Terrorism Community Policing and Changes

law enforcement like Javier's department became more responsible for participating in and ensuring homeland security. While the role of police in homeland security might seem natural or obvious, diverting the attention and resources of police towards the federal concerns of homeland security can have some detrimental outcomes. One of the most important changes Javier noticed was the breakdown in the community policing model that the department had worked so hard to establish. Focusing more on counterterrorism efforts than on building relationships with community members damages the relationships between police and members of the community in serious ways. Police officers… Continue Reading...

Leadership and Employees

be certain that their decisions and work functions have direct influence on the security situation. Foster risk-taking. The officers should be inspired to examine and actively pursue new mechanisms of assisting the department in meeting its objectives. They should be encouraged to experiment with ingenious security and crime reduction strategies and they should be assured that no punitive measures will be taken against them in the event of failure. Implementation of a reward scheme. Officers who perform at a very commendable level will be rewarded. The applied reward scheme will be built and implemented with time. Athletic and Social… Continue Reading...

Community Policing and Justice

(FBI) -- This agency is in charge of probing crime linked to home security, such as cyber or digital crimes, terror attacks, financial offenses and abductions. Bureau of Alcohol, Tobacco and Firearms (ATF) -- This body is charged with probing and preventing federal crimes that entail the illegal production, possession and utilization of explosives and weapons; bombings and arson; and illicit tobacco and alcohol trade. This body is also tasked with regulating the possession, transport, and selling of explosives, ammo, and weapons within interstate commerce through licensing procedures. Drug Enforcement Administration (DEA) -- This represents the nation's key law… Continue Reading...

Managing Reforming Drug Addicts and Ex Convicts

discriminate against people with criminal records and particularly those from corrective facilities based on security. This argument underscores the reasons that informed the establishment of such corrective facilities. References Quinones S. (2017). Addicts Need Help. Jails Could Have the Answer. The New York Times. Retrieved on June 25, 2016 from www.nytimes.com/2017/06/16/opinion/sunday/opioid-epidemic-kentucky-jails.html The Editorial Board (2014). Halfway Back to Society. The New York Times. Retrieved on June 25, 2016 from www.nytimes.com/2014/03/30/opinion/sunday/halfway-back-to-society.html Turner, N. (2016). A Home after Prison. The New York Times. Retrieved on June 25, 2016 www.nytimes.com/2016/06/21/opinion/a-home-after-prison.html Continue Reading...

Concept Of Judicial Philosophy, Social Security, and Political Realism in the U.s.

right in the Fourteenth Amendment's equal protection rights (Michaelson, 2015). Social security Social security is a trust fund that contains monetary reserves for survivors, the elderly, retirees and disability insurance programs (Fox Business, 2016). This trust fund has continued to play a crucial role in promoting the well-being of survivors, the elderly, retirees, and disabled individuals in the American society. However, the trust fund has become a politically controversial topic in the recent past since its funded by payroll taxes on wages. In light of the debates and issues relating to Social security, it is possible for the fund to… Continue Reading...

Crimes Against Property

internet to perpetrate these particular crimes, which can cause a threat to national security and at the same time place consumers at risk. Moreover, the augmentation of the crimes against intellectual property have been instigated by the emergence of e-commerce as well as the globalization of commerce. This is owing to the fact that it significantly altered the manner in which counterfeit products and goods reach consumers. In the contemporary, the FBI works in tandem with its different partners in law enforcement together with the private sector to deal with and percent crimes against intellectual property (Federal Bureau of… Continue Reading...

Emirate Airlines Customer Service

itself may be defective and/or that the beacons might give a false sense of completeness and security when it is not fully warranted. Even so, anything that makes the airline more efficient without sacrificing customer service or quality would tend to be a good thing. Something that Emirates Airlines does a very good job with is known as its Flexible Cloud Infrastructure. This infrastructure is designed with the fact that the airline industry is very seasonal in nature. Meaning, there are a lot of ebbs and flows in the consumer demand. The customer service frameworks and personnel, as such,… Continue Reading...

Assessment Of Corporate Culture at Zappos

is where employees are not assured of their job security since they do not know whether they will be retained or laid off. Such organizations tend to undergo massive reorganization and are characterized by numerous opportunities for employees with specialized skills and competencies. In light of these categories and the results of McGinty/Moss assessment, the category that reflects Zappos' organizational culture is club culture. This is primarily because the company focuses on being cultural fit as the basis for hiring and retaining its employees. The emphasis by the company's management on cultural fit as the premise for hiring employees… Continue Reading...

Changing Organizational Structures to Learning Organization

mainly on the use of line business structure where its units specialize in an area of production such as security tools, office supplies, or health care products. By contrast, Medtronic uses functional structures where each line of production has a top-level department that oversees the overall activities of the firm such as human resources, strategy implementation, and management of legal issues. Therefore, this shows that organizational success does not depend on the superiority of the structure but its ability to promote the realization of the set goals and objectives. When starting a company, stakeholders should determine factors like the… Continue Reading...

Facilitating Airport Development Today

carried out in the region especially considering financial, environmental and security implications. This airport would have two runways running parallel to one another which will be in use concurrently. This runway will be built to 4-E specification, which comfortably accommodates all present day commercial plane designs and those whose designs are still in infancy. Aircraft parking spaces, taxi roads as well as several passenger terminal buildings will also be constructed. The major passenger terminal would be where normal passenger activities such as baggage checks, baggage claim for arrivals, ticket processing and passport inspection as well as customs will be… Continue Reading...

Two Greatest and Two Worst Presidents in Us History

of each chamber refers the bill to the established committee with jurisdiction over the theme (e.g., homeland security or energy) (Sullivan, 2008). This is followed by a vote requiring the participation of all committee members to ascertain whether or not the bill is to be reported (i.e., sent forward for discussion in the House). A successful vote is succeeded by a committee markup session aimed at bill revision with a report composed to explain the committee's reasons for supporting the bill. This report, along with the bill, are directed to the entire chamber, after which the bill gets added… Continue Reading...

Technical Instruction for Hp Pavilion

utility of the computer system. The information to set up the computer is accessed in the Main, security, Tools or Advanced menus using the following steps: • Turn on and restart the HP notebook. Press F10 when the F10 Setup message is displayed at the lower-left side corner of the screen. • To change the computer language, navigate to the Advanced menu with the aid of the cursor. • Press F1 to view the navigation information • Press ESC to return to the HP Computer Setup menu, • Then Select the Main menu, security, Tools or Advanced menu. • To… Continue Reading...

Discrimination and Social Justice Issues Today

secondary are tertiary care for patients in the future. Thus, for both young people's own financial security and health as well as for society, maintaining this policy can and will continue to convey significant societal benefits. Yours truly, X UNIT 5 DISCUSSION Plessy v. Ferguson (1896) was one of the most significant US Supreme Court cases of the post-Reconstruction era. The case involved Plessy, who refused to occupy a railway car designated for people of color alone and instead sat in a car deemed to be for whites only. The Supreme Court at the time held that it was… Continue Reading...

Punitive and Correctional System in the United States

criminal justice system • A thesis statement Similarities Opening statement Classification of prisons • security levels • Prisons differentiated based on age, and sex. Operations within incarceration facilities • Compulsory work duties and vacations • Compensation for work Access to amenities • Leisure activities • Education and skill improvement opportunities Differences Opening statement Basic and foundational principle of the criminal justice system, • Rates of imprisonment • US is punitive/retribution and neutralization • German, Norway, and Netherlands is rehabilitation and re-integration to society • Routines and environmental settings of prisons • Solitary confinement in the US • Prison sizes are smaller and crowded in… Continue Reading...

Ethical and Legal Considerations Intellectual Property and Product Safety

a century of marketing ethics: Shifting perspectives and emerging trends. Journal of Business Ethics,93(1), 1-19. Tu, J.I. (2013). Microsoft security unit files first theft case. The Seattle Times. Retrieved August 30, 2015, from http://www.seattletimes.com/business/microsoft-security-unit-files-first-theft-case/. Ventola, C. L. (2011). Direct-to-consumer pharmaceutical advertising: therapeutic or toxic? Pharmacy and Therapeutics, 36(10), 669. Continue Reading...

Ethics and Business Information Systems

and economic growth. The trade secret also improve a country stability and security. PricewaterhouseCooper (2014) defines the trade secret as "all forms and types of financial, business, scientific, technical, economic, or engineering information, including patterns, plans, analyses, program devices, formulas, designs, prototypes, methods, techniques, processes, procedures, programs, or codes, whether tangible or intangible, and whether or how stored, compiled, or memorialized physically, electronically, graphically, photographically, or in writing. "(p 7). However, a theft of trade secret can jeopardize the business viability. Despite the problems that firms face in the contemporary business environment, no quality research paper has yet been… Continue Reading...

Holding Differing Opinions on Value

.....uncommon for separate groups to hold differing opinions on value. However, it becomes a huge challenge when these opinions have no form of correlation with each other. An example is on the topic of the best valuation method to implement or even worse is when the future predictions are totally different from each other (Thuy Vu Nga & Kamolrat, 2007). Example case: Concerning the problems of the project team, two members who were questioned made clear their problems with the large volume of work which they had to finish in no time. Another team member talked up the problems of… Continue Reading...

Guantanamo Bay Essay

2014). In addition, Guantanamo Bay also provides assistance to the Department of Homeland security in facilitating the relocation of displaced migrants (Naval Station Guantanamo Bay, 2014).  The base also contains recreational and comfort facilities for the service members stationed there, including a McDonald’s, Taco Bell, Windjammer Café, outdoor movie theaters, a bowling alley, a golf course and a skate park (Nazaryan, 2014). The most notorious facilities at Guantanamo Bay by far, though, is the prison at “Camp 7” that is used to house suspected terrorists, an issue that has assumed enormous importance since the terrorist attacks of September 11,… Continue Reading...

Edward Snowden Essay

to provide a background on Edward Snowden and how his high-profile actions adversely affected the work of the National security Agency (NSA). An analysis of what the NSA was doing prior to the leaks and how it collects intelligence information now is followed by an examination concerning what Snowden leaked and why. Finally, a discussion concerning whether the U.S. government violated Snowden’s constitutional rights is followed by a summary of the research and important findings concerning this issue in the conclusion. Background of the Issue Beginning in June 2013, Edward Snowden, a computer analyst working for the National securityContinue Reading...

Credit Rating Agencies Essay

the use of an assessment of the creditworthiness of a money market instrument or security or any references to credit ratings in such regulations; Modify such regulations identified in the review to remove any reference to, or requirement of reliance on credit ratings; and. Substitute with a standard of creditworthiness as the agency shall determine as appropriate for such regulations (Credit reporting agencies, 2014). In addition, on May 18, 2011, the SEC introduced new rules intended to address the additional requirements set forth in the Act (Credit reporting agencies, 2014). In this regard, in August 2014, the SEC approved… Continue Reading...

Student Loans Essay

US Supreme Court upheld the government's ability to collect defaulted student loans by offsetting Social security disability and retirement benefits without a statute of limitations in Lockhart v US (04-881, December 2005).”28  In Lockhart v. US, a portion of Lockhart’s Social security payments were withheld beginning in 2002 to repay his federally reinsured student loans that had become overdue in excess of 10 years.29 In response, the petitioner filed suit, maintaining that the Social security withholdings were barred by the 10-year statute of limitations pursuant to the Debt Collection Act of 1982, 31 U.S.C. §3716(e)(1). In addition, the Social… Continue Reading...

Torture and Interrogation Essay

Concealed information is the foundation of the majority of security issues. In most cases, concealed information is a situation wherein one individual knows something that someone else does not know. Consequently, the majority of security issues could be resolved if there was a dependable method of determining those cases in which an individual was concealing information and extracting that information effectively. To date, though, there has not been a dependable method developed.1 For instance, polygraph research has been unable to achieve an accuracy level that would make the results acceptable in courtrooms in the United States even though the… Continue Reading...

North Korean Missile Testing

included food aid, economic and confidence-building steps, normalization of relations and security guarantees. Nothing seemed to produce any long-term results. With those efforts proving null, the U.S. and its allies than attempted to pursue “freezes.” Although North Korea agreed to various freezes regarding their nuclear-weapons program they managed to find ways to violate the freezes. When North Korea was caught violating the deals, they refused international verification and monitoring further putting strain between them and the United States. U.S. Administrations forced sanctions, especially through the Trump Administration but have faced a reluctant North Korea ally, China, to enforce them… Continue Reading...

Performance Management and Maslows Hierarchy Of Needs

water. The second level of motivation consists of needs relating to safety—personal as well as financial security. The third level consists of love and/or a sense of belonging—the need for relationships and friendships. The fourth level consists of esteem—the need to be respected and to feel confident. The highest level of motivation consists of self-actualization—the need to achieve your goals and fulfill your highest potential as a skilled, capable, talented individual (Maslow, 1943). In a performance management system, assessing the level of need that an employee is at can help a manager determine the type of motivation that the… Continue Reading...

Hazardous Materials Transportation Safety

each state, each commercial driver must also pass a TSA security assessment—essentially a type of criminal background check (“HAZMAT Endorsement,” 2017). The Department of Labor’s Occupational Safety and Health Administration (OSHA) covers issues more directly related to employer and driver responsibilities in keeping the material safe during transport and also responding to emergency situations. All employers are subject to OSHA requirements for creating safe workplaces, which means not only properly training HAZMAT drivers but also ensuring that the transport containers, conditions, logistics, and methods prevent accidents. Transportation conditions and emergency response protocols will be different depending on the material… Continue Reading...

General James Mattis Leadership

order to develop connections with the local people so as to be able to promote security for the long haul both in Afghanistan and Iraq (Szoldra, 2016). In this regard, General James Mattis adapted the David Petraeus strategy of seeking the support and backing of civilians to promote long-term security. David Petraeus is a renowned general and former director of the CIA who employed an adaptive and affirmative leadership style that was civilian-focused. The use of a civilian-focused approach also demonstrated General Mattis’ ethical and moral compass in the battlefield. For example, Mattis’ ethical and moral compass can be… Continue Reading...

Bump in Us Incomes Nyt Article Review

I would expect to retain $46,038 per annum via social security and savings on retiring. Given that I would expect to make less in terms of lifetime income in comparison to the previous generation, I would seek to set aside a higher sum in a retirement account that happens to be tax-deferred. The generation that comes after me would have to set aside an even higher sum. To raise my potential income, I would have to ensure that I enter the workforce with a higher wage. This I could do by ensuring that I have better qualifications than others… Continue Reading...

General James Mattis Thesis & Outline

forces. b. Support for troops to accept more short-term vulnerability to develop ties with locals in order to promote long-term security. He adapted David Petraeus strategy to seek the support and backing of civilians. 2. People-centered approach when commanding a troop. a. Motivating his subordinates while in the battlefield. He adapted the participative leadership style of George S. Putton, a world war 2 general, to fit modern wartime scenarios, where the morale of serving soldiers is of great relevance. b. Conducting regular visits of troops and supporting them when they make mistakes. He adapted the aggressive and swift decision making… Continue Reading...

Income Difference Occupational Vs Liberal Degrees

besides increased income. More educated persons tend to be autonomous, more mobile and flexible, enjoy higher job security, and experience higher levels of employment (Lee, 2014). However, income usually receives the highest attention, even though it may not capture all these advantages of employment. As much as all graduates experience these effects of education, this experience is never uniform. Huge differences do exist when it comes to the income and status of occupation of graduates. There have been many investigations trying to find out what brings these variations and one factor that has featured significantly is fields of study.… Continue Reading...

Understanding Various Aspects Of Logistics Management

in the packaging boxes. As a result, this makes it easier for identification but brings forth security challenges as a thief could easily pinpoint the boxes they wish to take away. Question 11-18 Of the material handling principles, the following two have surprised me the most: · The ergonomics principle covers the mental and physical human tasks. In most cases, these activities are prone to error based on the unpredictability of the human psychology (Murphy & Knemeyer, 2014). Besides, even if predictability were to happen, it would not be consistent at all times. · The life cost principle considers… Continue Reading...

Theory Of Motivation and Maslows Hierarchy Of Needs

original needs hierarchy consists of five fundamental needs: for physiological comfort and fulfillment, for safety and security, for belongingness, for esteem, and for self-actualization. Although definitions of terms have shifted somewhat, the fundamental tenets of Maslow’s needs hierarchy and the underlying assumptions of Maslow’s theory of human motivation remain consistent and relevant. For example, Taormina & Gao (2013) prove Maslow’s original assumption that the needs hierarchy is linear; “the more each lower-level need was satisfied, the more the next higher-level need was satisfied,” (p. 156). Maslow (1943) similarly stated, “when the most prepotent goal is realized, the next higher… Continue Reading...

General James Mattis Leadership Style and Strategies

force. b. Support for troops to accept more short-term vulnerability to develop ties with locals in order to promote long-term security. 2. People-centered approach when commanding a troop. a. Motivating his subordinates while in the battlefield. b. Conducting regular visits of troops and supporting them when they make mistakes. II. Style 1. Combative approach on and off the battlefield. a. Opinionated leader who was not afraid to say it like it is (Szoldra, 2016). b. He stated that he like brawling and shooting people was a lot of fun. 2. Strategic thinker a. He would constantly engage in deep thinking… Continue Reading...

Computer Networks Are Changing

couple of different factors driving these changes, which generally include issues of security, privacy, regulatory concerns, and technological advancements. For the most part, these drivers are resulting in positive changes for computer networks. One of the fundamental ways in which computer networks are changing is that they are incorporating Virtual Private Networks (VPNs). VPNs provide an additional computing network inside of an external network (Monga 343). As such, they are able to buttress security while adding a layer of privacy (Rao and Kavitha 4). There are a number of intruders and hackers who are invading networks without authority. One… Continue Reading...

Visa's Data Center Security

Question 14-14 No, Visa certainly is not being overly cautious in its fortification of its data center. security breaches are certainly on the uprise and becoming more commonplace each and every day. Moreover, when one considers the sheer number of transactional events which Visa is processing every day (let alone the statistics denoting the number of transactions it is accounting for each second) (YOUR BOOK PAGE NUMBER), it becomes clear that the likelihood of it encountering some fraudulent attempt or breach is greater than that of other financial institutions. In this case, it would be foolish to opine that the… Continue Reading...

Prosecution Of Andrew Fastow

was sentenced for six years on two counts of each charge midway through last decade. security fraud is deliberately misrepresenting a company’s assets in regards to its securities—and the perception of those securities. Fastow was aware that Enron’s securities were based on incorrect reporting which inflated its assets, making those securities more valuable than they otherwise would have been. Wire fraud is a deliberate misrepresentation of information wired within or between states. It is a crime because wiring information is a valuable means of communication, particularly in financial circles in which securities are involved. Fastow was frequently involved in… Continue Reading...

Gender Neutrality in the Military Women Combat

The primary goal of all militaries is to protect national security, and national security hinges on a cohesive armed forces. Good leadership is critical to a strong military. As more women serve in combat roles, more women will also be serving in top positions of power in the military. In fact, one of the most fruitful and positive repercussions of gender integration in combat positions will be the long-term effects on promoting women to leadership positions. Furthermore, women already serve, and already die in the line of duty and in leadership roles. Women have “shared the risks from sniper… Continue Reading...

The Role Of Sarbanes Oxley Act in Curbing Corporate Fraud

the state of financial reporting in the company. Managers should exercise respect for security and privacy and ensure that the team that they are bringing on board is ethical and vigilant to ensure that the firm’s AIS is shielded from financial misrepresentation, fraud, and other destructive threats. References Colson, T. (2017, October 4). ‘The whistle is about to blow’: Secret report exposed Tesco’s £250 million accounting scandal, court hears. Business Insider. Retrieved from http://uk.businessinsider.com/tesco-fraud-trial-whistleblower-report-accouting-black-hole-2017-10?IR=T Smith, J.S. (2016). Accounting Information Systems: Ethics, Fraudulent Behavior, and Preventative Measures. University Honors Program Theses. 178 Wells, J. T. (2017). Corporate fraud handbook: Prevention… Continue Reading...

Implementing Compassionate Immigration Reform

to contribute to the American economy. Likewise, the initiatives that have been implemented by the Department of Homeland security to identify potential terrorist threats is an important addition to the immigration law mix. . References Bender, S. W. (2010, November). Compassionate immigration reform. Fordham Urban Law Journal, 38(1), 107-111. Early American immigration policies. (2017). U.S. Citizenship and Immigration Services. Retrieved from https://www.uscis.gov/history-and-genealogy/our-history/agency-history/early-american-immigration-policies. Kopan, T. (2017, August 2). How to earn 'points' to come to the US under Trump's immigration plan. CNN Politics. Retrieved from http://www.cnn.com/2017/08/02/politics/cotton-perdue-trump-bill-point-system-merit-based/index.html. U.S. population. (2017). U.S. Census Bureau. Retrieved from https://www.census.gov/ history/www/through_the_decades/fast_facts/1870_fast_facts.html.   Continue Reading...

National Security Impact Of Immigration Policy

Immigration Policies as a Tool for National security Of late, societal apprehension towards immigrants, criminal behavior, and terrorism have intensified, giving rise to concerns regarding the American migrant system’s efficacy in maintaining the safety of the nation’s people. Recent events revolving around crimes, weaponry crossing national boundaries and foreign- born people has triggered a series of reactions with the most intense ones demanding a sealing of borders, barring migration for individuals hailing from high- risk foreign territories, and putting a stop to refugee resettlement. Theory of Migration Migration represents mankind’s story from the outset to the current age.… Continue Reading...

How to Apply for and Receive a Student Loan

missing out on opportunities, neither achieving their dreams nor financial security. As long as Kyle applies for the right kind of loan, learning about his options and how to pay the loan back effectively, he will be making the right choice for himself, his career, and his family. The Financial Calculators (2017) website shows that without a doubt, a student loan is a good investment because college graduates do earn more money on average than their counterparts with just a high school degree. In fact, Kyle already completed some college, meaning that the money he already spent can still… Continue Reading...

Confidentiality Breaches & Informed Consent when Testing New Drugs

as a precursor for the attainment of peace and security. Health promotion and protection remains at the center of any State’s achievements. There is an unequal development in health promotion and disease control in different countries. As key stakeholders in the healthcare systems, doctors should not only provide their clinical expertise to the patients but also ensure the total well-being of patients. It taking a central role in health promotion and prevention strategies and ensuring an individual is healthy. Work Cited Beltran-Aroca, Cristina M., et al. "Confidentiality breaches in clinical practice: what happens in hospitals?." BMC medical ethics17.1 (2016): 52-64.… Continue Reading...

Organizational Culture and National Culture Of Automakers Comparison

own automobile industries, and did so in order to create jobs, for national security reasons, and simply because shipping cars overseas was impractical for much of the 20th century. This paper will look at three major automobile manufacturers, one each from Europe, Japan and America, to examine the differences and similarities between them. Each company evolved differently, and did so on the basis of both national culture and in terms of the markets in which they operated. The companies studied are Ford, Hyundai and Renault-Nissan-Mitsubishi. The latter makes a nice case study because it is a French-Japanese firm, one… Continue Reading...

Repealing Of Glass Steagall a Mistake

experience with risk to execute investment banking effectively. The mortgage-backed security crisis is just one example of this – creating securities with convoluted structures and risk profiles, or investing in these securities as a means of earning superior returns, but in doing so exposing themselves to risk to which they never would otherwise have been exposed. Banks in Canada and Australia, for example, with tighter controls on such activities, were not heavily invested in these toxic assets and those countries had stable banking systems through the crisis, where banks in the US and in many European countries did not.… Continue Reading...

Public Health Officials Using Computers to Manage Outbreaks

to do with access to e-health data in government and the academic fraternity (Bansal et al, 2016). security and Health issues Research based on the internet and social media in the area of health care and epidemiology poses several functional, technical and formal challenges. The first challenge has to do with ethics in public health. The Helsinki Declaration (Bourne 2015), is the oldest framework that provides guidelines on medical health ethics. The declaration insists that the patient must first be consulted before involving them or their data in a study. Legal and ethical concerns connected to online and social media… Continue Reading...

Ibm Supply Chain Concerns

focused on data. Thus, organizations must contend with issues of security for proprietary data as well as data governance policies for the sustainable reuse of that data. Oftentimes the greater difficulty lies in implementing the latter, since the common reaction is to keep data in silos that obfuscates issues of data quality and reliability when they are used for other purposes than the initial one. Accounting for data governance requires a long term plan for the people, protocols, and practices associated with date in ERP, management information systems, supply chain management systems, and applications such as those for analytics.… Continue Reading...

Intelligent Information Systems for Cars and Highways

but doing so seems unrealistic (Hall, 2017). Other potential drawbacks or resistance to using IVHS technologies include privacy concerns, security, and liability. Privacy is a core concern: as personal details about each driver are available and subject to abuse or data mishandling. Legal and liability concerns weigh heavily on policymakers, as smart technologies essentially shift responsibility—and therefore legal liability—away from the driver and to the technology manufacturer or cloud system operator. Jurgen (1991) notes that it is important to differentiate between driver information systems in smart cars and fully automated driverless cars when determining liability. If manufacturers are willing… Continue Reading...

Healthcare Transcultural and the Amish Community

program. The Amish have been exempt from paying Social security on religious grounds since 1965, and the same principles have also exempted the Amish from participating in the Affordable Care Act and its mandated health insurance provision (Rohrer & Dundes, 2016, p. 92). Instead of participating in mainstream health insurance schemes, the Amish provide fully for the healthcare needs of members of their community. The Amish community manages healthcare costs internally by reducing or eliminating spending on non-essential services, while pooling community resources to pay for essential or emergency care. In some cases, the Amish communities have agreements with… Continue Reading...

Differences Between Formal and Informal Communication

and allow us to receive more relevant ads, they do present potentially serious security and/or privacy risks. I do not know anyone who was a victim of identity theft, but I have heard stories about this happening. However, I regularly notice that there are potential privacy concerns online. The most notable is when I am logged into my Google account on my phone and my computer. If I do a Google search for anything, I will receive targeted ads related to that product or service throughout my social media including Twitter. When I search for my name on Google,… Continue Reading...

Colonialwebb's Human Resource Plan

provides steady and stable jobs to its employees, which helps in staff retention through enhancing job security. The other staff retention strategies utilized by ColonialWebb include flexible work schedules, a friendly working environment that is centered on close working relationships, and career growth and development opportunities. Job Analysis As previously mentioned, ColonialWebb has currently advertised for the position of Helpers for its commercial construction projects in Central Virginia, particularly Charlottesville and Richmond (see Appendix A). Helpers will be responsible for assisting the firm’s mechanics with fabrication, assembly, installation and repairs of piping systems, plumbing, and sheet metal (Our Career… Continue Reading...

How Autonomous Car Will Change Everything

Indeed, as more emphasis is placed on developing autonomous technology, engineers, computer coders, IT developers, and information security workers will be required in large numbers. Each of these industries stands to benefit. The blue collar fields are what stand to be decimated. Industries that will start up out of the rise of self-driving cars will likely be a new type of monitoring/networking system like that in the aviation community, where individuals guide and track vehicles on their voyages, interacting with the technology, monitoring the vehicle’s systems and so on. This industry would have to incorporate safety, technology, and communications… Continue Reading...

Parkland School Shooting Essay

this Amendment which states:  “A well regulated Militia, being necessary to the security of a free State…” Clearly, Cruz and other mass murderers in the United States have not belonged to a “well regulated Militia,” but the words are right there in the Constitution. Aggressive lobbying efforts by the National Rifle Association and other advocates of unrestricted gun ownership have prevented the application of these oft-ignored but critical words to the resolution of the problem today.  Against this backdrop, identifying ways to prevent the recurrence of school and other mass shooting in this country requires more than just mandating… Continue Reading...

Keys to Success in Multinational Companies

teams will conduct business, how online teams will facilitate the organization, security, and emergency evacuation procedures. This paper will discuss the key benefits of creating a best practice policy on each of these described issues and will speculate on the major ramifications if such policies are not created. This paper will also predict the significant ways in which the best practices policy created here will contribute towards the long-term sustainability of the company. Finally this paper will determine whether or not the best practices policy would provide a competitive advantage over other international companies while giving an example of… Continue Reading...

The Us Grant Programs for Emergencies

Department of Homeland security Grants The HSGP (Homeland security Grant Program) for the fiscal year 2017 contributes significantly to NPS (National Preparedness System) implementation through promoting the creation, delivery and sustenance of key capabilities vital to the achievement of America’s NPG (National Preparedness Goal) geared at improving its security and resilience. The provision of key capabilities necessitates integrated community-wide efforts and not the sole, independent endeavors of a particular governmental level or agency. HSGP’s allowable expenses foster attempts at developing and sustaining key capabilities over the Protection,… Continue Reading...

Florida's Plan for Responding to Terrorism

procedures for the Florida National Guard, the Regional Domestic security Task Force, and the Department of Environmental Protection and Environmental Terrorism Response Team. It describes the Federal Response, and addresses other entities that may be included in the response. The State of Florida’s Annex also details the concept of operations, the exact process in the Terrorist Event Process, including the three step process of 1) detection, 2) notification, and 3) threat classification. It overviews the State Emergency Response Operations, including the activation of the State Emergency Operations Center, the deployment of state liaison personnel, the mobilization of other state… Continue Reading...

Business Ethics and Ericsson Bribery

such claims because they are being investigated by the American security and Exchange Commission (SEC) and the Department of Justice (DOJ), neither of which take kindly to bribery regardless of cultural context. The Ericsson case is not a cut and dry situation, either. The story involves several Ericsson employees working in multiple markets around the world. According to Morrow, the Swedish telecommunications giant “has been dogged by bribery allegations since 2000,” (1). The most recent scandal emerged in 2012, when a whistle-blower named Liss Olof Nenzell came forward to the SEC. In 2016 Nenzell handed over hard evidence (Morrow… Continue Reading...

Bin Laden Al Qaeda Financing Crime

laundering capacities. The Internet enables “a broad reach, timely efficiency, as well as a certain degree of anonymity and security for both donors and recipients,” (Jacobson, 2009, p. 353). As such, the Internet makes it both easier for terrorist organizations to covertly conduct their business activities and/or launder money, and also easier for counterterrorism experts to track and monitor that activity. Naylor’s premises about terrorism financing are fine. Yes, al Qaeda and bin Laden wield the same type of financial clout as any other criminal organization. Yes, it is challenging to trace all terrorist financing, particularly when political constraints… Continue Reading...

Analyzing Two Global Security Organizations

A plethora of private firms around the world offer customized security and risk management services. TAL Global and the Wexford Group are two firms that offer some of the most comprehensive security and risk management services, strategies, and techniques, interfacing between public and private sector and wielding power in a wide range of jurisdictions. Wexford Group offers services including operational advising, law enforcement support, program management, risk assessment, operations and intelligence fusion, development and fielding, and also recruitment, assessment, selection, and training (RAST) support for government agencies and private industries. TAL Global offers airport… Continue Reading...

History Of Immigration in United States

1920 Again? Nativism and US Immigration, Past and Present.” Journal on Migration and Human security, Vol. 5, No. 1 (2017): 217-235. Zeitz, Joshua. “The Real History of American Immigration.” Politico Magazine. 6 Aug, 2017. https://www.politico.com/magazine/story/2017/08/06/trump-history-of-american-immigration-215464 Zolberg, Aristide. Rethinking the last 200 years of U.S. immigration policy. Migration Policy Institute. 2006. https://www.migrationpolicy.org/article/rethinking-last-200-years-us-immigration-policy Continue Reading...

Proposed Immigration Bill

the land of the free, is this a vision for a new America? No, it is not. Border security and immigration control can be achieved without such draconian measures. Title I, Section E is, however, generally sound. Funds can be much better spent than on interior enforcement, but it is agreed that a pilot program for notifying immigrants their visas are about to expire is a very good idea. This is a compassionate and sensible solution to preventing overstays. Title II Regarding Title II, we agree that more robust legal pathways for immigration are necessary, sound, and sensible. The… Continue Reading...

Future Of the Wto

for this outcome may be impossible. References Ahmed, S. & Bick, A. (2017). Trump’s national security strategy: A new brand of mercantilism? Retrieved from http://carnegieendowment.org/2017/08/17/trump-s-national-security-strategy-new-brand-of-mercantilism-pub-72816 Bloomberg. (2017). China’s Silk Road cuts through some of the world’s riskiest countries. Retrieved from https://www.bloomberg.com/news/articles/2017-10-25/china-s-new-silk-road-runs-mostly-through-junk-rated-territory Brown, C. (2017). Will the Proposed US Border Tax Provoke WTO Retaliation from Trading Partners? Retrieved from https://piie.com/system/files/documents/pb17-11.pdf Gonzales, A. (2017). Govt pushing for inclusive globalization at WTO meet. Retrieved from http://www.manilatimes.net/govt-pushing-inclusive-globalization-wto-meet/367928/ Lamy, P. (2012). Emerging economies have shifted the balance of power in world trade. WTO. Retrieved from https://www.wto.org/english/news_e/sppl_e/sppl258_e.htm Lohr, S. (2016). New approach to corporate tax law has… Continue Reading...

The Trump Travel Ban

religious biases of some within the country. “Courts were justifiably skeptical of the idea that legitimate national security considerations, as opposed to religious biases or political motives, drove the first version of the travel ban.” (University) This is not progress and feels like a step back from the efforts made to create equality in recent years. To racially discriminate, to discriminate based on religion is immoral and illegal. To have a Government that promotes such illegal actions is reprehensible. They say it is all for the safety of the American people, like the measures taken by Former President George… Continue Reading...

North Korea Missile Launches and the Us and China Reaction

and north korea's ability to thus launch a nuclear attack is against all the un security clauses and can endanger human lives on a massive scale. Interpreting the response of china thus after the missile launch really puts things into perspective. China and russia have always been huge supporters for north korea in its fight against the us; however, with this recent launch, china is backing off of its support wagon for north korea. This is not a recent thread for china as it has in various previous news stories discouraged north korea from engaging in missile launch activities… Continue Reading...

Freeman Brown Private System

c, all functions must be devoid of foreseeable interruptions ; and d, financial security and growth is use a factor of employee motivation and employee retention (Terry, 2017). Keeping this approach in mind we can analyse FBPS and how it handled its relationship with the stakeholders during closure as one that didn’t follow this management approach as neither the employees were timely informed of the closure nor was financial security or growth a factor of motivation for the employees during closure. For the human relations theory of management, productivity is the key factor for decision making – and people… Continue Reading...

Life Of Arthur Koestler

copies (Menand) internationally which both procured his professional and public reputation as well as the security of his financial future. Secondly, it was indicative of Koestler\'s political views in a way which would remain eminent for the duration of his existence. The book details the vicissitudes of a political prisoner who is one of the many victims of a totalitarian, fascist government. In that respect it was symbolic of the growing power of Hitler and other fascists during the midway point of the 20th century, including others such as Mussolini and Franco. Furthermore, this work or literature was a… Continue Reading...

The Culture Of the Eastern Band Cherokee

nor too cold year round. The pine forests offered protection, security, and abundant food and game—from deer to rabbit to fish in the rivers and streams. The coastal regions also offered abundant shellfish. The climate has not changed much for the Cherokee (Carr, 2017) though their environment today is somewhat more modern in many ways. In the Qualla Boundary region, the Cherokee reservation consists of 82,600 square miles with a resident population of more than 9000 Cherokee (United States Census, 2010). The Qualla Bounary is a land trust rather than a reservation as it was never reserved for them… Continue Reading...

The Ethical Issues Of Criminal Justice

quality of products getting into a country from other partners in international trade. Even with heightened boarder security it is not lost on the government that substandard goods and counterfeit products still find their way into the country. The problem of drug trafficking has also been a thorn in the flesh. A scholarly approach to the border control program and policies might significantly assist in improving effectiveness of such programs. Reasons for considering each program 1. Criminal Justice program: Even though the criminal justice system has gone through many reforms aimed at improving the expedition of justice there are… Continue Reading...

Sars and Patient Rights

does not apply because it is a matter of security—but that argument leads to a slippery slope of violations that should be avoided. References De Bord, J. (2014). Informed consent. Retrieved from https://depts.washington.edu/bioethx/topics/consent.html HHS. (2018). Informed consent FAQs. Retrieved from https://www.hhs.gov/ohrp/regulations-and-policy/guidance/faq/informed-consent/index.html Continue Reading...

Health Concern Database Query Report

promote safe sex and reduce risky behaviors. Protected Health Information: security and Privacy Issues When it comes to the collection, maintenance, use, and dissemination of epidemiologic data, some of the most important considerations include the security, privacy, as well as confidentiality of the said data. In most cases, when the privacy of health information is discussed, HIPPA is often invoked. On the confidentiality front, it is important to note that medical professionals have an obligation to ensure that the information they access with regard to patient records and/or other related correspondence is held in confidence. Privacy on the other hand… Continue Reading...

Delays in Medicating New Admissions Leading to Discharge Against Medical Advice

after official work hours. 3. Find ways of avoiding physical confrontation. If it is appropriate, call security to assist. You have no mandate to physically prevent such parents from leaving with their child. It is the Department of Child protection and Crisis Care that have the legal authority to recover the child from their parents and return them to a healthcare facility. 4. Make sure that you explain to the child’s parents the consequences of their leaving with their child 5. Inform the parents of the role of the DCP and Crisis Care and let them know that they will… Continue Reading...

The History Of Security Measures

Introduction to security Measures The history of security is fairly lengthy. security has always accompanied organized civilizations for nearly as long as they have been extant. Initially, security was begotten from the need to protect important personages who, not infrequently, were in the private sector. Therefore, the history of security can be traced to the private security guards who were appointed to protect the Pharaohs and the rulers in Egypt. It is worth noting that these security personnel worked for those in the… Continue Reading...

Leadership

2017). The hallmark of an effective leader, per the interviewee, is knowing the proper balance between risk and security. Betting the proverbial farm is obviously not wise. However, there is a common saying in Latin that says “fortune favors the bold”. Indeed, a huge amount of success in business and leadership is not being shy and reserved. One needs to know what they stand for, what they can offer their clients and so forth. This confidence can be infectious and can draw people to the leader. This is true of employees that could or will work for the leader. It… Continue Reading...

Backend It Business Swot

business to primarily provide is backend IT support for companies in need of developing programs, apps, website functionality, security, and so on. The primary vision for this business is to grow into a top-tier backend firm that can boast a long list of satisfied clientele, with whom good working relationships can be maintained over the coming years. As many companies, like Kroger for instance, rely on individual firms to supply backend IT support for long periods of time, this type of work is obtained by establishing firm relationships. The mission of this business is to satisfy clientele so that… Continue Reading...

Israeli-palestinian Conflict

– and now. NBC News. Retrieved January 24, 2018 from http://www.nbcnews.com/id/39622062/ns/us_news- security/t/us-failure-retaliate-uss-cole-attack-rankled-then-now/#.WmlkKXlG3IU Jenkins, B. (2017). The origins of America's jihadists. The Rand Corporation. Retrieved January 24, 2018 from https://www.rand.org/blog/2017/12/the-origins-of-americas-jihadists.html Lahoud, N. (2010). The strengths and weaknesses of jihadist ideology. Combating Terrorism Center. Retrieved January 24, 2018 from https://ctc.usma.edu/the-strengths-and-weaknesses-of-jihadist-ideology/ Neiwert, D., Ankrom, D., Kaplan, E. & Pham, S. (2017) Homegrown terror. Reveal.org. Retrieved January 24, 2018 from https://apps.revealnews.org/homegrown-terror/ Continue Reading...

Private Security Vs National Security

Private security The various factors that influence both the definition and the perception of private security are typically environmental but can be internal and external to the issue of security itself. In most developed nations, the state provides security forces that are paid for by tax payers (local, municipal, state and federal police, and military forces); however, private security forces, typically operated by ex-military officers who bring their training and experience into the private sector to fill gaps in the market where demand cannot be satisfied by state security apparatuses alone,… Continue Reading...

Privacy Risks and Principles

contents of the privacy statement include; scope and content, global privacy standards, collection, use and retention, choice, access, disclosure, security, important information, and questions or complaints (eBay, 2018). On the basis of my intensive review of the website’s privacy policy, I submit that the said policy is not only clear, but also reasonable and relevant to the kind of business the website carries out. Some of the statement’s most reasonable parts are: use and retention, disclosure, and security. With regard to use and retention, the website observes that the personal information it collects is used for contact purposes (i.e.… Continue Reading...

Death Penalty As a Deterrent for Murder

of empathy and compassion. At the same time, the state must ensure that security and the force of the law are compelling—and for that reason the death penalty may serve as an appropriate deterrent. References Bazelon, D. L. (1975). The morality of the criminal law. Southern California Law Review, 49, 385-405. Bursik, R. (1988). Social disorganization and theories of crime and delinquency: Problems and prospects. Criminology, 26(4): 519-552. Davis, A. Y. (2012) The Meaning of Freedom. San Francisco, CA: City Light Books. National Statistics on the Death Penalty and Race. (2018). Retrieved from https://deathpenaltyinfo.org/race-death-row-inmates-executed-1976 Randa, L. (1997). Society’s final solution: A… Continue Reading...

Role Of Office Of National Coordinator

Nevada and Massachusetts have enacted statutes that require sufficient security measures from agencies operating within the states. Any agency conducting business with the residents herein are required to abide by some of the highest levels of information security programs. They are required to have encryptions, protect against data leakage and adopt a risk –based approach to ensuring security. Businesses in Nevada are further required to encrypt all transmissions of personal data (Thomson L.L, n.d:267). ROA and ROE Return on Assets (ROA) is an indicator of how effective managements of a business is in utilizing the assets of the business… Continue Reading...

The Morality Of Dropping Atomic Bomb on Japan

this case, vice versa. Does this add to the security of the state or, ultimately, undermine it. Anscombe suggests that the latter is so. In conclusion, Truman undermined his own authority and the moral justification of his cause by assuming that hundreds of thousands of innocents must die in order for the merciless objective of unconditional surrender to be achieved. The ends justified the means, he said. However, the end was rather unjustifiable in the first place as it lacked sufficient morality to make it compelling. The end was certainly barbaric and the means used to obtain it were… Continue Reading...

Joint Operations

it is not until recently that this concept “migrated to positions near the top of the U.S. national security agenda.” In essence, there are three kinds of potential partners in capacity building efforts that have been identified by Marquis et al. 2010. These are coalition partners, regional leaders, and indigenous partners. The authors define a coalition partner as “a willing provider of significant stability operations-related capability in support of coalition operations outside the nation’s own boarders” (Marquis et al. 2010). In essence, such a partner, as the authors further point, out ought to be internally stable, have a strategic… Continue Reading...

Steps Of Economic Growth in Usa China and Germany

change the state-run businesses, promote the profitable private marketplace, set up a social security program, enhance technological and academic growth, encourage improved global cohesiveness, and modify the part of the authorities within the financial system. China has now taken over as world’s 3rd major trading country following the US and Germany (Fogel, 2010). By having large quantities of low-priced workers compared to America, it is no wonder that China, India along with other developing nations around the world focus on producing labor-intensive items. Germany Germany is undoubtedly an industrialized country with powerful global links and an evident export emphasis.… Continue Reading...

Walmart Human Resource Practices and Change

consideration in management decisions. The two key interests of the company’s personnel include increase in salaries and greater job security. Owing to the low salaries Wal-Mart offers its personnel, the former issue of interest is understandable; the latter relates to an assurance that the company will retain its personnel for the long term (Meyer, P. (2017). Subsystems The management subsystem Wal-Mart’s corporate structure is function-based and hierarchical in nature. The term ‘hierarchical’ implies a vertical line of authority and command; the term ‘function-based’ implies the firm’s structure has personnel groups performing specific functions. For instance, the functions of sales,… Continue Reading...

Utilitarianism and Environmentalism in Ethics

are all threatening to undermine human happiness, safety, health, and security. References Haines, W. (n.d.). Consequentialism. Internet Encyclopedia of Philosophy. Retrieved from http://www.iep.utm.edu/conseque/ Mill, John Stuart (2017). Utilitarianism, in the original version in the textbook, or in the version by Jonathan Bennett. Retrieved from www.earlymoderntexts.com Singer, P. (2003). Voluntary euthanasia: A utilitarian perspective. Bioethics, 17(5/6), 526-541. Wolff, B.G. (2008). Environmental studies and utilitarian ethics. Environmental Studies 34(2):6-11. https://files.eric.ed.gov/fulltext/EJ859824.pdf Continue Reading...

Environmentalism and Some Positive and Negative Trends

about climate change and impacts like natural disasters, but about national security too. Wars could easily be fought over access to water. Natural disasters or droughts could lead to mass migration and environmental refugee crises. The global scale of environmental degradation aside, pollution at the local level is impacting public health and lowering quality of life. Adebobola (n.d.) notes that urban centers are not the only places impacted by pollution. Water pollution can affect not just areas with high population densities but also rural regions. Polluted water can also impact the integrity of food sources, as agriculture requires access… Continue Reading...

Meaningful Usage Of Health Information Technology Hit

the adoption of health information technology, HIPAA, and privacy and security issues. Health. Geonnotti, K., Taylor, E. F., Peikes, D., Schottenfeld, L., Burak, H., McNellis, R., & Genevro, J. (2015). Engaging Primary Care Practices in Quality Improvement: Strategies for Practice Facilitators (Executive Summary) (No. 6a86b94964dd4df798cff2039a6ab562). Mathematica Policy Research. Higgins, T. C., Crosson, J., Peikes, D., McNellis, R., Genevro, J., & Meyers, D. (2015). Using health information technology to support quality improvement in primary care (No. aad2d999a1ec484b873fa85d57540fc1). Mathematica Policy Research. Jamieson, D. F. (2014). Strategic flexibility in not-for-profit acute care hospitals (Doctoral dissertation, The University of Wisconsin-Milwaukee). Jones, S. S., Rudin, R. S., Perry, T., & Shekelle,… Continue Reading...

How the Internet Has Changed Society

presents new challenges in terms of cybersecurity, terrorism, and national security. The Impact of the Internet On Society Increased Dependency on Technology Just less than twenty years ago, only 4% of the world was online; now about 50% of the world is online (Rainie & Anderson, 2017, p. 1). The number of people using the Internet increases, although penetration is likely to be slower in developing countries with poor infrastructure development. Overall, the Internet has increased dependency on technology at almost every level of society. Governments, public utilities, and all finance and business activities now rely on the Internet,… Continue Reading...

India Government and Economics

encourage more domestic pea production, “the short-term move to lift Indian market prices could impact India’s long-term food security needs,” (Nickel & Jadhav, 2017). India has also come a long way towards lifting import licensing requirements for “most consumer goods,” but some products continue to be heavily restricted—the biggest being motor vehicles (India Country Commercial Guide, n.d.). Therefore, India has liberalized and continues to liberalize trade but tariffs and other barriers to trade are proving to be major impediments. Political Issues India’s government under Modi has been remarkably stable, in large part due to the country’s increased openness with… Continue Reading...

Hawaii Language Culture and Affirmative Action

some professors showed up to the campus to protest, and some even stormed past the security guards (“Hawaiian Language Demonstration at the University of Hawaii,” 1995). While the KGMG news anchors exaggeratedly refer to the most aggressive protesters as “violent,” in fact no one was actually hurt. Rather, the unarmed students simply pushed through a line of security guards. They were determined that the president of the university should hear their voices. Within hours of their protest, the president of the university relented and agreed that the Hawaiian language was unique and that the university plays a crucial role… Continue Reading...

Myanmar's Place in the Global Garment Business

might continue to do well while those who are more dependent on government for financial security are going to be more at risk. Surrounded by major players in the textile business, Myanmar is starting to develop an industry of its own on the manufacturing side. Akter (2017) notes that the country has a low cost of production, and that has drawn the interest of buyers. Garment sector exports were worth $1.8 billion, and the industry got an early head start with the former military government made it one of the only open sectors of the economy in 1988. The… Continue Reading...

The Zika Virus Threat to the United States

The Emergence of Zika Virus as a Global Health security Threat: A Review and a Consensus Statement of the INDUSEM Joint working Group (JWG). Journal of Global Infectious Diseases, 8(1), 3–15. Waggoner, J. J., & Pinsky, B. A. (2016). Zika virus: diagnostics for an emerging pandemic threat. Journal of clinical microbiology, 54(4), 860-867. World Health Organization. (2016). Current Zika product pipeline. Current Zika product pipeline. Geneva (SW): World Health Organization. Zanluca, C., Melo, V. C. A. D., Mosimann, A. L. P., Santos, G. I. V. D., Santos, C. N. D. D., & Luz, K. (2015). First report of autochthonous… Continue Reading...

Fast Food Restaurant Security

As with many consumer-oriented businesses, fast food restaurants need to maintain a strong but unobtrusive security profile. Their structures and access points need to remain accessible while still preventing malicious behavior. This security survey of a fast food restaurant provides an example of how to perform a total security audit, identify weaknesses and risks particularly with regards to customer and employee safety, and offer suggestions for improvement. Property and Perimeter The outermost boundaries of the fast food restaurant are the limits of the company’s locus of control. There is a lot the fast food restaurant can do to… Continue Reading...

Motivation and Morale Police Administration

is also the factor of having secure job status where the organization is expected to provide job security to the personnel. Most of all, there is organizational and administrative policies that ought to be flexible, objective and clear for all personnel (Hertzberg et al., 1959). In contrast, according to Herzberg, hygiene factors cannot be deemed as motivators or satisfiers. In particular, motivational factors also referred to as satisfiers give rise to constructive satisfaction levels, which are intrinsic to the workplace. Notably, motivational factors generate morale and motivation for personnel for a better performance and increased output. Imperatively, these factors… Continue Reading...

The Yemen Conflict Between Saudi and the Houthis

Middle East/ Africa security Issue Introduction The ends, ways and means strategy is a method of understanding what the objective is for a particular issue (ends), how that objective will be achieved (ways) and what resources will be required to make this happen (means). This methodology is commonly applied in military or international relations, where the issues can be complex, as this method simplifies strategy by focusing on the desired ends (Eikmeier, 2007). Background on the Issue There are several issues in the Middle East worthy of attention, one of which is… Continue Reading...

Women in 20th Century Canadian Society

society, and rocking the very world under their feet. The safety and security of normative Canadian society was shaped by the idea of having a male breadwinner; hence, having all of these women in the workplace was rocking people to their core. More than that there was also the fear of the unknown inherent in women and girls joining the workforce: “Fears of immorality also pervaded the debates about women’s and girl’s work. Participation in paid work in public spaces might expose female workers to moral dangers in the shape of exploitative foreman or bosses, and their low wages… Continue Reading...

How Pictures Shape the Story in Syria

(2017). Instability and incoherence: Trump, Syria, and chemical weapons. Critical Studies on security, 5(2), 168-172. Berry, M. (2017). Reporting the Israel-Palestine Conflict. In: Harb, Zahera, (ed.) Reporting the Middle East: The Practice of News in the Twenty-First Century. Lib of Modern Middle East Studies. I.B.Tauris, London.  De Noli, M. F. (2017). UN ‘Joint Investigative Mechanism’report on Khan Shaykhun proven inaccurate, politically biased. Retrieved from http://theindicter.com/un-joint-investigative-mechanism-report-on-khan-shaykhun-proven-inaccurate-politically-biased/ Easley, J. (2017). Poll: Majority says mainstream media publishes fake news. Retrieved from http://thehill.com/homenews/campaign/334897-poll-majority-says-mainstream-media-publishes-fake-news Greenwood, K., & Jenkins, J. (2015). Visual framing of the Syrian conflict in news and public affairs magazines. Journalism Studies, 16(2), 207-227. Makarechi, K. (2105).… Continue Reading...

Sample Wordpress Essay

policies need to be geared to providing support and security for these types of families. It is little cause for optimism however, that in recent years governments of all persuasions have shown an increasing reluctance to fund social welfare programs of this kind. It is difficult to offer a comprehensive explanation for the growing trend of marital breakdown; and it is even more difficult to find solutions that might ameliorate the problems created by it. Clearly though, as I have argued in this essay, the most useful answers are to be found not within a narrow legal framework, but… Continue Reading...

Black Lives Matter Essay

this historical reality, the Black Lives Matter movement is not just about race, but about the safety, security and the humanity of all of us who inhabit this land. Black lives matter because all lives matter” (2017, p. 21). Conclusion Do Black lives matter? Of course they do, but the fact that an organization was created to articulate this concept reinforces the unpleasant reality that race relations remain at the forefront of the important social issues facing Americans today. Indeed, the research indicated that many critics believe that black lives do not matter more than other peoples’ lives, though,… Continue Reading...

Immigration Essay

that want illegal immigrants deported, note the identity theft crimes that illegal immigrants participate in each year. “The Social security Administration estimated that in 2010, 1.8 million undocumented immigrants worked under a number that did not match their name” (Yee, Davis, & Patel, 2017). Risk of identity theft, loss of jobs for the working class, and potential exposure to criminals has made the idea of illegal immigrants a main issue in the country. With each year passing, the number of undocumented immigrants increases. According to statistics 150,000 undocumented immigrants came to America versus one million legal immigrants. Those that… Continue Reading...

President Donald Trump Essay

the Centers for Medicare and Medicaid Services; Don McGahn as White House Counsel; K.T. McFarland as Deputy National security Advisor; Betsy DeVos as Secretary of the Department of Education; Nikki Haley as the U.S. Ambassador to the United Nations; Mike Pompeo as CIA Director; Jeff Sessions as Attorney General; Michael Flynn as National security Advisor; Steve Bannon as Chief Strategist; and Reince Preibus as Chief of Staff. Repealing Obamacare was one of Trump’s major campaign promises and his choice of Tom Price, a very vocal Obamacare opponent, suggested that he intended to keep that promise.  However, his choice of… Continue Reading...

Brexit Essay

and pundits who confidently but inaccurately predicted that voters in the UK would never leave the security of the European Union. The research showed, though, that despite some initial economic fallout as a result of the vote, things have returned to their pre-Brexit levels and some economic indicators have even improved. Some of the reasons for this return to normalcy include the amount of time that will be required to formally effect the UK’s withdrawal from the EU and the growing realization on the part of UK voters that the outcome can actually benefit them given enough time and… Continue Reading...

Russian Meddling in U.s. Election Essay

some U.S. voting systems.  According to a document leaked by a National security Agency employee, Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier (Bump 2017).  This allegation is especially important given that election day results in several key districts throughout the United States had results that were substantially different from poll results in the days prior to the election and from exit poll results the day of the election.  If these voting systems were compromised, then Russia did not just manage to exert influence on the 2016 election, but actually managed to deprive… Continue Reading...

The American Dream Essay

in the last few decades, the American Dream has taken on the form of materialism and financial security. “The American Dream is usually defined in terms of financial security, homeownership and higher education” (Currier, 2015). When people think of the American Dream, they think of owning a home. This is because home buying has been part of the American reality for many people in the 1950’s. People could buy homes with relatively little money, and pay off their mortgages in 30 to 40 years. They could buy a car, own it, and have it to pass down to their… Continue Reading...

Criminal Justice System Essay

the Auburn plan. It was named after the Auburn Prison opened in 1821 as a maximum- security facility. Inmates were locked in separate cells at night but worked in groups during the day” (Bettman/Corbis, 2017). Americans were the first to implement a true prison system and continue to provide a prison system that changes every couple of decades. These changes can as a result to internal government changes like those brought on by the Civil Rights Movement or due to privatization efforts. The prison system became the main means of rehabilitation of criminals in the United States. The court system… Continue Reading...

Social Media Essay

platforms have different strengths and weaknesses, based on their security or privacy settings, their algorithms, and their user interfaces. II.  Various Social Media Platforms? a. Facebook 1. The most popular. As of June 2017, Facebook has 2 billion monthly users (https://techcrunch.com/2017/06/27/facebook-2-billion-users/) 2. Facebook is a global social media platform. b.  Instagram 1. Image-driven, with 800 million active users each month (https://www.statista.com/statistics/253577/number-of-monthly-active-instagram-users/) 2. Interfaces well with other social media like Twitter c.  LinkedIn 1. Designed specifically for career development, human resources. 2. Different from the other social media. Active monthly users is 500 million (http://fortune.com/2017/04/24/linkedin-users/) d.  Twitter 1. 328 Million… Continue Reading...

Isis Attacks in America Essay

US Radical Islamic Terrorism: Is it Really the Biggest Threat Facing Domestic security ISIS Attacks and the Trump Administration: Will the New Presidential Administration’s Approach to Terrorism Increase or Decrease the Likelihood of Domestic Terrorist Attacks Related Topics Radical Islamic Terrorism- What is radical Islamic terrorism?  How does it differ from the Islam practiced by the majority of Muslims?  Does the religion, itself, promote violence, or is terrorism a corruption of the religion. Afghanistan and Russia- How did Russian involvement in Afghanistan help bring about a modern era of terrorism?  While the mujahedeen fought with the United States in Afghanistan… Continue Reading...

Internet Terms Essay

promoting safety since several of them do not even still understand the real concepts of security (Serrhini, 2013). URL Websites would be located by the addresses shown on the www--World Wide Web. Such types of addresses could be called Uniform Resource Locators or URLs. Each website has a unique URL allocated to it. Hence, the web services and searchers could effortlessly and quickly find them. There are many data which one could gather from a basic URL, inclusive of the following: the type of server wherein the website would be hosted; the type of organization wherein the website would… Continue Reading...

Dark Net Essay

in counterfeit goods; and buying and selling credit card information, social security numbers, and other information necessary for identity theft.  The essay will delve into some of the history of the dark net, including the founding of Silk Road, and other services such as nucleus and alpha bay.  It will explore the relationship of the dark net to digital currency like bitcoin and blockchain.  Our example essay will not only explain the dark net, but also show you how to write the individual parts of an essay including the: introduction, thesis statement, and body paragraphs that combine evidence and… Continue Reading...

Bitcoin Essay

demand in an organic way, its blockchain technology and its relatively tight security. Another reason why bitcoin and other cryptocurrencies have become popular is that they are detached from the international monetary exchange system. Cryptocurrencies are insulated from the fluctuations that take place in financial systems, and are especially attractive to buyers in countries that have volatile or weak currencies, like China. For this reason, governments are already trying to crack down on cryptocurrency exchanges (Hawkins, 2017). Relatively few people have bitcoin now, but if more people invest their money in bitcoin, the less the governments can regulate their… Continue Reading...

Facebook Data Breach Essay

from voter internet usage.  Cambridge Analytical has played a significant role in the Facebook security breach because of its role in mining data from Facebook users, where it inappropriately collected data from over 50 million Facebook users.   An essay focusing on Cambridge Analytical would examine the company’s history, board of directors, role in prior elections, and role in the Facebook scandal. Cybersecurity and Social Media- Cybersecurity refers to being protected against both criminal and unauthorized use of data that you share to use internet sites.  Although generally used in the context of identity theft, it is important to realize… Continue Reading...

Globalization Essay

numbers reflect plainly how globalization can undermine the fiscal security of its people—even in developed nation like America. Even when workers in America don’t lose their jobs, they often have to deal with demands from employers for reductions in pay, when these same employers make threats to send these jobs overseas (Collins, 2015). Some have argued that globalization has essentially created a “culture of fear” for many workers around the world. Other have argued that the expansion of labor to cheaper nations is also what enables certain evils such as child labor and human trafficking. Moreover, one of the… Continue Reading...

Robert Mueller Investigation Essay

including investigations in the former chairman for the Trump campaign, Paul Manafort, and Trump’s former National security Advisor, Michael Flynn.  While the focus of the investigation has been on election interference and collusion with Russia, it has also investigated possibly related areas, such as hush-money payments made by people connected to the Trump campaign to various individuals who have claimed sexual relationships with Trump.  I Essay Hook While President Trump or his surrogates have repeatedly called the Mueller Investigation a witch-hunt and suggested it has no foundation, the reality is that Mueller has not only found enough evidence to… Continue Reading...

Intimate Relationships in Britain

is more than social interactions: the self represents a psychological construct develop to produce psychological security for the individual in the face of declining traditional social structures. In a risk society, the old world customs and institutions (such as the family and marriage) have been deconstructed and the idea of the autonomous, independent, self-serving self has been elevated. In this sense, self-identity is reflexive and is constantly monitoring the highly fluid and dynamic society in which it finds itself. The self realizes that the current trends in social practice will determine future life outcomes; the self sees that with… Continue Reading...

Introduction to Security

in order to protect the client, it is necessary to provide maximum security. This paper will discuss the proper security procedures that will be implemented in order to protect the client. Pre-screening the venue is crucial. This will include a screening of the inner, outer and middle perimeters. Vulnerabilities will be noted with regard to vendors, arrivals, trucks, mail, trash collection, and service. The use of security video cameras as well as the installation of alternatives where necessary will be employed to ensure that all ingress and egress routes are monitored in advance of the speaking event. The facilities… Continue Reading...

Warehouse Internship

(2001) points out, logistics managers need to build in redundancies to mitigate threats; dealing with the contingencies of additional security concerns does, however, imply potentially “less reliable lead times and less certain demand scenarios,” (p. 1). The goal in the future is to develop systems that are both efficient and robustly secure. I also learned about the array of new technologies used in both private and military sectors for managing inventory, such as the implementation of RFID. As costly as RFID investments have been, they have also tremendously improved security and efficiency for material management. As Ozdemir & Bayrak… Continue Reading...

Reducing Operational Costs Of Burn Care Unit

included. This is to say that such items as social security paid for by the hospital, as well as pension plan and health insurance contributions will be included. It is also important to note that other related allowances including, but not limited to, the recruitment of staff and training efforts (if any) will be taken into consideration in the estimation of annual labor cost of operating the unit. While this report uses “wages” in reference to what health workers in the unit receive as pay for hours worked, salaries (if and where used) will be in reference to the… Continue Reading...

Implications Of Augmented Reality

looking for reality itself. Third, adapting AR technology will generate numerous security and safety concerns in the future. Similar to other technologies, the adoption of AR is likely to create criminals who seek to capitalize on its capabilities to develop scams that harm innocent users. This will in turn create new demands on law enforcement agencies to develop better measures for handling such activities and criminals. In conclusion, augmented reality has emerged as a common buzzword in the modern world, particularly in the field of technology. This concept continues to have significant impacts on today’s society given its increased… Continue Reading...

Effective Communication Letter Of Advice

Introduction Relationships are all about communication: something you have probably heard before. But did you know that social science research backs up this claim, and can also provide you with the practical tools you need to minimize conflict and maximize harmony in your relationship? For example, research shows which barriers to communication might arise, why, and how you can overcome them. Research also shows that your self-concept and self-image have a strong bearing on how you comport yourself in your intimate relationships. Using appropriate levels of self-disclosure and emotional intelligence, you can improve your self-esteem and improve your relationship with… Continue Reading...

The Virginia Tech Shooting

the student and to see how the student behaves. Law Enforcement The decisions made by local law enforcement and campus security to only lockdown the dormitory until 9 and then to fail to alert students appropriately and effectively were poor ones. Classes should have been canceled until more information was obtained as to the motive and whereabouts of the shooter. The problem here was that Cho had no reports filed with police, so his identity was unknown to them; however, campus security had been made known of his suicidal tendencies thanks to the call from the roommate, which led to Cho’s… Continue Reading...

Guide to Writing in Third Person (2018 Edition)

The coffee was bitter. Nick laughed. It made a good ending to the story. His mind was starting to work. He knew he could choke it because he was tired enough. He spilled the coffee out of the pot and shook the grounds loose into the fire. (Hemingway, Nick Adams Stories, 2009). Writing in third person can be found throughout the classics of English and American literature. Above is an excerpt written in the third person by the author who is perhaps a master at writing in the third person—Ernest Hemingway. Known for his simple, declarative sentences, Hemingway made an… Continue Reading...

Dark Web, Darknet, Deep Web Essay

trafficking in counterfeit goods; and buying and selling credit card information, social security numbers, and other information necessary for identity theft.  The essay will delve into some of the history of the dark net, including the founding of Silk Road, and other services such as nucleus and alpha bay.  It will explore the relationship of the dark net to digital currency like bitcoin and blockchain.  Our example essay will not only explain the dark net, but also show you how to write the individual parts of an essay including the: introduction, thesis statement, and body paragraphs that combine evidence… Continue Reading...

What Problems Did the Acquisition Of Empire Generate for Rome?

off more than it could chew. There was a false sense of security after the Pax Romana, during which any small uprising or rebellion could be easily squelched because of the ability of Rome to either resort to military might or to the lure of financial gains for local leaders. Eventually, it was the rebellion of local groups who had access to human resources, the passions of those human resources, and the traditional hierarchal social and political organizations that led to the demise of Rome. Rome could not adjust itself to a world that did not properly worship its… Continue Reading...

Improving Outcomes for Elderly Essay

Medicaid and state-level programs. There is assistance with paperwork, invoicing and enrollments. Social security and other assistance is provided as needed as well. The second arc is an educating wing. Indeed, there is educating about how to handle aging and the diseases and disorders that tend to come with it. Just a few examples of what is educated about is arthritis, preventing falls, the importance of medical alert and similar systems and there is also a hearkening back to the healthcare questions and concerns. Finally, there is the direct medical care and checkups that are done for seniors. Of… Continue Reading...

Unemployment Insurance Essay

on 99 weeks of unemployment follow this conspicuously by filing for Social security Disability when they had not done so prior. There were surely cases where pride was the issue and not laziness but to suggest that there was no malfeasance at all is a bit dubious. Beyond that, many people “double dip” in that they will collect unemployment and Social security retirement at the same time (Yarrow, 2011). Conclusion The unemployment system is absolutely needed but there are people that which absolutely need more stick and less carrot. However, doing so in a gentle and fair way is… Continue Reading...

Should Homosexual Partners Adopt Essay

With an adopted child, a gay or lesbian couple can create opportunities for future financial security, while also providing for an heir. Without adopting or having children, a homosexual couple might lack end-of-life security, which could be especially traumatic if one spouse were to die. Children provide many lifelong caregiving needs to their parents, whether their parents are gay or straight. Raising a child does not guarantee the possibility of avoiding a nursing home, but it does increase the chances that a person or both members of the couple will be cared for in their elder years. Other social… Continue Reading...

Welfare System Essay

solution and result in noticeable issues that prevent it from happening. A 100% bypass rate means the security solution does not stop any incidents. In this case it is a 0% bypass rate which means the noticeable issues solution stops the firm from being successful. Residual Risk This is incident risk to the organization if the noticeable solutions are appropriately linked, used, and checked. In this case this would be all the risks because they are all connected. Net Present Value (NPV) Costs Category Details Cost in First Year New Services and cubicles to hire paralegals 650 square feet… Continue Reading...

To Kill a Mockingbird Essay

the Great Depression, from the New Deal job programs to Social security to the minimum wage legislation of 1938. Social security excluded coverage for every category of employment in which African Americans made up a significant part of the U.S. workforce. (Tischauser 84-85) Jim Crow laws gained ground during this time and many lynchings took place harking back to the ‘red summer’ of 1919. “Into the early twentieth century, lynchings continued to average two to three a week with marked increases during the “Red Summer” race riots of 1919 and during the Great Depression.” (Kirchmeier 127) Race played such… Continue Reading...

Big Data and Supply Chain Management Essay

going forward (Ghazal et al, 2013). Finally, big data is also becoming a competitive weapon, which makes security of big data a major issue. Companies that gather and own data sets, and in particular the usable intelligence that has been gathered from those data sets, are increasingly going to be targeted with hacks. security of big data is going to be an issue going forward. This is especially true of supply chain data, because that is powerful business intelligence. So it will be necessary, especially when using remote or cloud solutions, that data security is paid attention to, as the… Continue Reading...

Gun Control Essay

prevent and deter crime as well as promote a feeling of security. Those that support gun control see gun crime escalating in the United States and feel lax gun laws are at the center of it. From mass shootings to high-profile murders, the constant and easy access to guns has made gun violence a main issue for Congress and the American public. People find that gun control remains ineffective and want things to change. With stores like Walmart having maintained assault rifles on its shelves up until recently, there is little in terms of restriction see in United States… Continue Reading...

Marketing Plan for Vietnamese Business Essay

motivated by achievement and challenge, rather than by the necessity for a career or by economic security. Tapping into these motivations is going to be critical to successfully marketing this program to Vietnamese entrepreneurs and managers. As for reaching the market, it is worth noting that in the two major cities that drive Vietnam's economy – the capital Hanoi and the largest city Saigon – Vietnam is an educated, wired place. Some 40% of all Vietnamese access the Internet on a daily basis, smartphone ownership is rising rapidly and as a young country where 40% of people are under… Continue Reading...

Cognitive Psychology Essay

This essay discusses cognitive psychology and a specific scenario within that scientific term.  It starts out with an introduction or definition of cognitive psychology, then discusses a specific scenario, and perspectives of the scenario.  The body of this essay covers treatments, therapies, and interventions for the scenario, as well as effectiveness of therapies, before summing up the paper with a conclusion. Titles: Cognitive Psychology:  Modern Approach to Human Behavior Cognitive Psychology Advancements Topics: Introduction to Applied Cognitive Psychology Cognitive Psychology of Planning Outline: I.  Introduction II.  Body A.  Scenario B.  Psychological Perspectives C.  Treatment, Therapies, Interventions D.  Effectiveness of Therapies… Continue Reading...

Cryptocurrency

of exchange (currency) that is digital in form, non-governmental, and relies on cryptography for its security (Investopedia, 2018). It is the latter component of the definition that gives cryptocurrency its name. The vast majority of currency in the world comes in the form of exchangeable units that are issued and have their value controlled by governments. Nations will either allow their currency to float freely on the market, where the value derives in part from supply and demand, and is backed by the ability of that state to raise revenues. These are considered to be the strongest currencies. Other… Continue Reading...

Whether Immigration Is a Problem or Not

productive societies. In the United States, immigrants participate in the civil service and military sectors to protect national security and promote the common welfare. Immigrant communities can advocate for themselves and human rights, preventing racist discourse from dominating the public consciousness. Immigrants also contribute to the companies they start, or the companies they work for, creating a robust economy. Finally, immigration is not a problem because it builds both economic and cultural capital. Economic capital is built through immigrant contributions to the economy in their labor and their entrepreneurship. Immigrants directly build cultural capital by introducing arts, music, food,… Continue Reading...

Foreign Business Environment Of Columbia

social advancement, and the restoration of its stability and security. Though it still has a long way to go, the country is definitely on the right path to progress (Villegas, 2014). The Colombian economy has progressed along a positive direction during the last 5 years, in spite of the existence of severe armed conflict within the nation. Indeed, its private sector and policymakers count the year 2007 among the best years, economically, of late, after the year 2005. The economy’s continuous improvement is partly ascribed to Colombia’s strict governmental budgets, concentrated efforts at reducing the level of public debt,… Continue Reading...

Latinos and Deportation Arrests

had no prior criminal record and seemingly pose no threat to American security? That is the question posed by the AP (2018)—and while enforcing immigration laws is certainly within the scope of ICE and its mandate, the worry that some communities have is that this crackdown on illegal immigration will upset a carefully crafted balance between whites and Latinos, one that has taken years to develop. In America, race is always an issue and one that many people seek to overcome in order to promote concepts of equality and fraternity. At the same time, the agenda of the Trump… Continue Reading...

Professional Accountability and Patient Safety

respond to instances of nurse or health worker attacks. In the authors’ own words, “the presence of security guards in ED is widely considered effective in reducing violent episodes…” (Ramacciati, Ceccagnoli, Addey, Lumini, and Rasero, 2016, p. 25). This approach could be morphed with technology whereby nurses are equipped with electronic devices that they could use to call for help in case they are attacked or threatened. The said devices should be able to help a rapid response team pinpoint the nurse’s exact location. In the final analysis, it should also be noted that there is need to ensure… Continue Reading...

Five Principles Of Management

just policies for employee recruitment and promotion decrease stress, enhance the feeling of security, and prompt employees to work ethically and promote organizational interests. But inefficient bureaucracy management can lead to several issues. In certain instances, leaders make the bureaucratic red tape overly cumbersome, discouraging organizational change and rendering the decision-making process ineffectual and time-consuming. Overreliance of management on rules for resolving issues and inadequate reliance on their personal judgment and competencies renders their behavior inflexible. One major challenge organizational leaders face is: using bureaucratic principles to benefit the company instead of causing it harm (Appendix A: The Evolution… Continue Reading...

Type 2 Diabetes Education

explored the correlations between A1C and social and personal factors, including diabetes knowledge, diabetes numeracy, and food security” (Young, Yun, Kang, Shubrook, & Dugan, 2018, p. 1). One factor proven by the study was food security. “Although the correlation coefficients generated by the results obtained from the three questionnaires and A1C levels were generally small, a correlation coefficient of 0.46 was found between food security and A1C” (Young, Yun, Kang, Shubrook, & Dugan, 2018, p. 1). Food is such an integral part of diabetes management. The African American population, another segment of the population more likely to develop type… Continue Reading...

Police Killings

communities will tend to seek more law enforcement aid when it comes to addressing conflict or for their own security. To achieve this, academic or organizational police training initiatives must integrate and give priority to tension de-escalation approaches and other potential courses of action not involving the use of lethal force. Officers must be sensitized to implicit bias which triggers class and racial profiling. This involves expecting personnel to maintain superior standards of professionalism and conduct, and having appropriate punishments in place for the violation of those standards. The development of mutual trust necessitates department investigation and prosecution of… Continue Reading...

Religion and Christian Counseling

the Christian Counseling approach. The background in religion helps to facilitate the approach and give it the degree of security and effective inputs it needs to be of use to the client—just like a nest that is built by bird on a high-up branch is better protected from predators on the ground than a nest that is built in a bush on the lawn. The more informed one’s approach in one area of study is by another area of study, the better situated one’s overall academic and professional appeal is going to be for clients and employers. Biblical Worldview… Continue Reading...

The Active Shooter Crisis in America

the 1999 Columbine school massacre (Fox and Levin 8). Criminal justice agencies and the Department of Homeland security differentiate active shooters from both mass shooters and domestic terrorists, although these all may share methods and tactics in common. An active shooter is defined as “an individual actively engaged in killing or attempting to kill people in a confined and populated area,” but with no apparent pattern or logic in their means of targeting victims (United States Department of Homeland security 2). Active shooters are “active” because they will continue to kill as long as they have access to victims,… Continue Reading...

Immigration in America

lower costs of goods and services; and unrequited contributions to Social security, Medicare and unemployment insurance programs” (Lipman, 2006, p. 3). Lipman (2006) points out that the overwhelming majority of economists believe that immigrants have a positive or at worst neutral effect on the economy. Conclusion Immigration in America is a divisive issue because of the underlying cultural perspectives that serve as the foundation of the two polarizing political parties’ platforms. Democrats and Republicans both prefer to highlight numbers and figures that tell either a positive story about immigration or a negative one. Is it possible that both of… Continue Reading...

Health Public Policy Analysis

that is affordable for all socioeconomic groups, sustainability, food and water security, safety and freedom from violence, access to healthy food and exercise, and access to quality healthcare (Hancock, 1993). Healthy Cities/Healthy Communities also promote the principle of patient autonomy. Nurses promote patient autonomy by encouraging patients to make decisions based on available information and resources. Patients are not coerced in any way to access or utilize public health resources or community services, but those services are available and the patient and family members are aware of those services. Finally, Healthy Cities/Healthy Communities promote social justice and health equity.… Continue Reading...

Tools for Crime Analysis

property crimes are taking place helps law enforcement work with private security personnel to come up with immediate tactical interventions. For example, most stereo and auto thefts have been occurring between 17:00 and 20:00, whereas the GPS thefts are occurring between 12:00 and 6:00. The product also lists the most vulnerable days of the week and specific areas of the parking lot. Knowing this, law enforcement can place additional patrol officers in the high risk areas of the mall parking lot during those hours or hire additional personnel to monitor the CCTV footage live during those times. Strategic The… Continue Reading...

United Kingdom Freedom Of Expression Within the Social Media

sabotage the government, etc. In the past, classified information that could threaten national security has also been leaked, with the most notorious of such leaks being the one by Edward Snowden (Scaife 2017). Conclusion In the final analysis, it is important to note that the relevance of promoting freedom of expression within social media in the U.K. cannot be overstated. This is more so the case given the social benefits that accrue when people are free to express their views online freely and without any fear of reprisal. These benefits have been clearly highlighted in this text. However, freedom… Continue Reading...

Negotiating Peace in the Middle East

and gas to Europe, and 2) expanding their own territory and national security (Engdahl, 2014). As an ally of Israel, the U.S. is heavily leaning towards supporting regime change and has so in the past with respect to Syria. However, now that Russia and Iran have emerged as defenders of Assad and have helped to drive back ISIS and the U.S.-supported rebels, the game has changed substantially and regime change no longer seems possible save for an all-out war between world powers U.S. and Russia. In order to get these various countries to the table, hammering out what each… Continue Reading...

Argument in Favor Of the Life in Prison over Execution

a perpetrator of a crime might offer temporary solace, and a false sense of security and peace. In the long run, though, capital punishment only creates a standard whereby the state is permitted to kill its own citizens. The state should set an example, not of leniency but of genuine justice. Victim restitution programs would be far more meaningful for restoring justice than the illusory finality of the death penalty. Besides, even a seemingly antisocial criminal could potentially change and provide opportunities for genuine healing, learning, and forgiveness: the true harbingers of a more peaceful society. Yes, life in… Continue Reading...

Security at Bay Street Shopping Mall

public holidays. The main objective of this paper is to conduct and complete a security survey of the mall, ascertain the key security concerns facing this particular facility and also its resources and plans for its capability to withstand any emergency that takes place. security Concerns with Bay Street Shopping Mall Subsequent to conducting a survey of the mall, there are a number of key security concerns identified with respect to this facility. From the perspective of physical security, there are security concerns regarding the physical structure of the mall. Specifically, the buildings within the vicinity have susceptibilities, for… Continue Reading...

Will Congress End the War on Terror

George W. Bush proposed the new Office of Homeland security to help confront a new threat to national security in the first step of what became the War on Terrorism (Select Committee on Homeland security, 2004). One week earlier, Congress had signed off on the Authorization for Use of Military Force (AUMF), allowing the president broad scope for using military force against countries or organizations who “planned, authorized, committed, or aided” terrorism (Ackerman & Hathaway, 2011). 17 years and more than $2 trillion later, the War on Terrorism continues with no sign of easing up (Amadeo, 2018). Though President… Continue Reading...

Monsanto and Gmos

Republicans. ABC-CLIO. Wegren, S. K., Nikulin, A., & Trot?s?uk, I. V. (2018). Food policy and food security: Putting food on the Russian table. Lanham: Lexington Books.   Continue Reading...

William Gibson's Neuromancer on Technology and Humans

human beings already do rely heavily on pharmaceuticals and plastic surgeries, already do use technologies to enhance global food security, and especially have come to rely on technologies for all business transactions. Gibson shows readers a world in which human beings go far beyond mere dependency on technology, to a reality in which human consciousness can be uploaded to a hardware interface, thus blurring the distinction between a man and a machine. This is a world in which “people imitate machines, and machines imitate people,” (Grant, 1990. p. 41). Gibson opts to set Neuromancer in Japan partly because of… Continue Reading...

Social Media in the Uk Promoting Freedom Of Expression

which limit people’s ability to freely express themselves in the name of fighting crime and advancing the national security agenda (Dimbleby, 2015). However, as several authors have pointed out in the past, hate speech ought not to be used interchangeably with freedom of expression (Klang and Murray, 2005, p. 44). In that regard, therefore, freedom of speech and hate speech should be distinguished and sanctions adopted for the latter, not the former. Hate speech, according to the Council of Europe (2018), has no assigned definition. However, it could be seen as a “broad discourse that is extremely negative and… Continue Reading...

Conflict Within Unionizing Sga Industries

first, and think about the needs of employees and their happiness and security, second. Such a massive profit loss as the type reported in this case study can be crushing to so many companies. From the company’s perspective, the fact that they had to “cut corners” meant that it was better than simply folding and closing down shop completely, laying everyone off. As the case study clearly states, “…the company was forced to lay off 1,500 employees, reduce pay scales, and rescind many of the perks that the workers had enjoyed under the Anderson family. Many of these changes… Continue Reading...

Mobile Information Technology

limited to, the acquisition of hardware, user skill enhancement, integration of the relevant security features so as to guarantee the safety as well as confidentiality of data, etc. The Assistant Medical Director - Nnennaya Omerigbo MD, was of the opinion that developers of mobile information technologies ought to take into consideration several factors to further enhance the applicability of their creations. For instance, the Assist Medical Director pointed out that the relevance of simplicity cannot be overstated on this front. This is to say that such technologies must not only be straight forward, but also uncluttered. Further, according to… Continue Reading...

Banking and Blockchain Technology

secure by design, exemplifying high Byzantine fault tolerance with a distributed computing system (Kelly, 2015). Due to the security and stability of blockchain technology, it can be suitable for medical records, identity management, voting, food traceability, and recording of events. Serving in its initial stages as a public transaction ledger for bitcoin, it has led to innovations and creations of companies specializing in blockchain technology. Status of Block-Chain Technology The current status of block-chain technology revolves around digital currency. Although blockchain technology can be used for medical records and a slew of other processes, currently, it is seeing growth… Continue Reading...

Blockchain

is not without its risks. Indeed, as with the security of smart contracts, the vulnerabilities are still largely unknown, and possibly as yet unexploited. This is actually worse than when you know the risks, because it is much harder to defend against risks of which you are unaware. Eisenberg (2018) notes that while "blockchain is eons beyond competing database architectures in terms of keeping data secure…but security risks do exist, and they must be recognized and mitigated." Major risks for blockchain include endpoint vulnerabilities, public and private key security, vendor risks, scale risks, lack of standards and regulation, and… Continue Reading...

Multicultural Negotiation Strategies Between the United States Germany and Japan

party. For example, if the German firm wishes to have greater security in case one or both members of the negotiation do not honor their promises, “a contingent agreement—negotiated ‘if, then’ promises aimed at reducing risk about future uncertainty” may quiet their fears (Shonk, 2018, par.3). This example also shows how ignoring the needs of the other party is seldom effective. Instead, they must be addressed head-on, else they will simply erupt and cause further issues at a future date. Dynamics of Multiparty Negotiations The science of game theory was originally generated to deal with the conflicts which can… Continue Reading...

The Problem Statement Related to Virtual Teams

(Gordon, 2017, p. 1). Many of the issues confounding virtual teams are not technological issues such as network security but rather, are related to social and psychological factors. The failure of virtual teams to achieve stated goals may be due to any number of challenges, ranging from the lack of face-to-face interaction that provides the nonverbal communication context (Quisenberry, 2018) to the different means by which each member of the team uses or interacts with the technology and with team members (German, 2017). Global virtual teams are instrumental, necessitating further research into how to formally improve their operations via… Continue Reading...

Social Problem and Human Services

Social Problem Related to Human Services Social justice implies citizens’ equal entitlement to the self-same services and rights. In this paper, the inequalities in providing various human services to different societal groups in the nation will be addressed. Beginning with education, a fundamental human service, it is a highly concerning fact that the nation’s educational system continually fails unwanted, abused and neglected children. Also, foster children totally at society’s mercy for survival are largely ignored. As children don’t have any avenue for voicing their views and demands, and cannot finance political campaigns, protest for improved services, or lobby elected representatives… Continue Reading...

The Role Media Plays in Relation to Gender Stereotypes

people understand complex phenomena. Stereotypes provide a sense of security because they help to rest anxiety that emanates from uncertain phenomena; and Gender stereotyping is not an exception (Giomi, Sansonetti & Tota, 2015). The emphasis is that the media play a central role in the formation of opinions at both individual and group level. They have, therefore, a responsibility to promote human dignity. The role extends to discouraging and preventing discrimination against women and promoting equality between the two genders. By encouraging quality between both men and women, it is assumed that there is a shift on cultural and… Continue Reading...

How to Gather and Analyze Data

superior quality consulting services and products in the following areas: Cyber security, Program Management, Financial and Cost Management, and Engineering Services, to governmental clients such as the DoD (defense department).The personnel specifically emanated from the company’s project managers, the human resources division and also individuals constituting a project team. The obtained responses were read and analyzed numerous times to ascertain themes. Subsequently, the themes were reported and discussed as follows. Employee Motivation One of the key objectives of the study was to determine the manner in which employee motivation impacts retention. The responses from the participants indicated that motivational… Continue Reading...

Why I Want to Go to College Essay

Introduction When I reflect upon why I want to go to college, a number of thoughts come to my head. I think about how much I respect higher education. I think about the expectations of my parents and how much they would panic if I did not go. I honestly think about how weird my friends would think it was if I skipped college all together. I think about the cutthroat job market and how difficult it can be to get a decent job without a college degree. I think about how everyone tells you that college presents some of… Continue Reading...

Healthcare Informatics

range of issues related to accessibility, with potent socioeconomic class disparities evident. security and standardization of healthcare technologies are also proving problematic. Patient portals, electronic medical records, and personal monitoring devices are all technologies that have the potential to radically improve the quality of healthcare and patient outcomes, as well as improve overall patient experiences. Because of their abundant benefits, these technologies need to be embraced and promoted through effective public health policies. Otherwise, disparities will continue to threaten to exacerbate the already significant social determinants of health. Patient Portals Online portals are rapidly becoming the main point of… Continue Reading...

Making Good Personal Finance Decisions

There is great flexibility in renting, even if one must make an investment of a security deposit (which is recoverable and usually smaller than a down payment on a home). Other factors to consider include the cost of rent in the area. In some areas, renting is almost as prohibitively costly as a mortgage, and it might be better to accept a longer commute to work than either renting or buying in the area. Of course, wear and tear on one’s vehicle, gas, and the investment of time in commuting must be a consideration. In some areas, houses may… Continue Reading...

Tax Law and Status for Nonprofits

is used to report the employer’s withholding of employee income for the purpose of taxes, Social security, and Medicare, and nonprofits must still manage these considerations in regards to their employees (Plaskow, 2016). References About form 8833. (2018). IRS. Retrieved from: https://www.irs.gov/forms-pubs/about-form-8833-treaty-based-return-position- disclosure-under-section-6114-or-7701b Differences between for-profit and nonprofit accounting. (2014). Capital Business Solutions. Retrieved from: https://www.capitalbusiness.net/resources/differences-between-for- profit-nonprofit-accounting/ Filing requirements. (2018). IRS. Retrieved from: https://www.irs.gov/charities-non-profits/churches-religious-organizations/filing- requirements Plaskow, D. (2016). 4 payroll considerations for nonprofits. CPA Practice Advisor. Retrieved from: http://www.cpapracticeadvisor.com/article/12165392/4-payroll-considerations-for- nonprofits Continue Reading...

Emergency Response Crisis Management and Cert

crisis management, risk assessment. Next, CERT leaders can plan and coordinate resources for effective emergency management. Homeland security CERT plays an integral role in the maintenance of homeland security objectives. Homeland security refers to the protection of national borders, the promotion of community resilience to withstand crises including natural disasters and terrorist attacks, and the prevention or response to other crises such as cyberattacks. Because so many emergencies are localized, it is critical that local service providers engage with federal agencies that coordinate responses. The Department of Homeland security (2018) is the presiding federal agency that can provide resources and… Continue Reading...

Nursing Intervention

a prison population where civilian workers and prisoners mix. This paper will provide a plan for a maximum- security prison when a shortage of flu vaccine is identified. The plan will include a nursing intervention for each level of prevention of influenza. It will also determine who should receive the flu vaccine among civilian workers and prisoners as well as identify environmental factors that will place the prison population at high-risk. Intervention Plan When it comes to devising interventions at the three levels of physician, staff and resident, how to protect the body is one of the most important factors… Continue Reading...

Emergency Management and National, State, County, and Local Responses

can mitigate injuries. Its website also provides advice about security and crime prevention. Regarding response and recovery phases, the police also engage in drills to enhance marine and traffic safety and handle missing persons cases. New Jersey Red Cross New Jersey state and local organizations also coordinate their efforts with NGOs (non-government organizations) such as the state division of the American Red Cross to provide aid. The American Red Cross is subsequently divided into chapters, such as Central, Southwestern, Southern, and Northern New Jersey, to ensure more tailored response efforts to different communities. According to the state-specific Red Cross… Continue Reading...

How Immigrants Deal with Discrimination

key motivating factor for migration to the US. Other factors include improved personal and familial ?scal security and the means to better fulfill their basic requirements in the US. Mexico’s low wages and the US’s greater earning potential serve as strong incentives. But beneath this façade of economic opportunity is a profounder concern for the overall family unit, rather than for personal economic progress. A majority of men attempt at improving their children’s, wives’ and dependent parents’ lives as well (DeLuca, et al 118). Lack of true freedom for undocumented immigrants Akin to several other migrants, José Ángel also… Continue Reading...

The Impact Of War on Iran

in and provide the country with the soothing balm of financial stability and security that it needs to keep its citizens happy, its infrastructure running, and its government in power. The difference between times of peace and war for Iran and how investment and aid are used is the difference between the approach of the U.S. and China towards the country. The U.S. is allied with Israel which has a long-running spat with Iran and has often accused the country of being a threat to world peace. This position of Israel, which has major influence in the U.S., has… Continue Reading...

The Tom Story in Mudbound

city by going back to the suburbs to be a security guard in anonymity. The audience is invited to shake their heads collectively at the racism that continues to exist in the world—but only once the action has concluded and the audience is able to catch its breath. While both films also depict events that occurred decades ago and can thus be viewed safely from a distance, from the vantage point of the 21st century where the audience can look back at the way people behaved in the past and feel that now things are different, the reality is… Continue Reading...

Investing in China

against Western companies in general or as a rule, based on the interlinking nature of security and economic interests (He, 2017). Recommended Entry Mode The recommended option for entry mode into China for this company is, therefore, an equity joint venture (EJV) or contractual joint venture (CJV). Either would pose little threat to China’s domestic investment concerns and for that reason less risk to the Western investor. According to Chen et al. (2017), currently “the top-three entry modes chosen by foreign investors are equity joint venture (EJV), contractual joint venture (CJV), and wholly foreignfunded enterprise (WFFE)” (p. 410). While… Continue Reading...

Haiti Health Marketing Plan

goal should be to help improve traveling experience, wellbeing and sense of security. In addition, we aim to strive to help customer’s family stay well, prevent sickness, obtain access to primary health care so that they can recover from illness or injury, return to work and provide for their loved ones. We offer a solution for healthcare needs through travel care vouchers. Marketing and Branding Strategies The results from the survey reveal that Haitian Radio is a key means of delivering advertisements. Therefore, the aim is to create brand awareness through radio. Furthermore, because Haitians trust face-to-face communication more… Continue Reading...

Philosophical Orientations and Theory

can be classified. These comprise of technical activities, commercial activities, financial activities, accounting activities, managerial activities and security activities (Amirkhani, 2016). A key question to be considered is what an individual has to have to believe regarding the world and regarding human beings so as for the person to accept or to utilize this theory. In order to utilize this theory, it is imperative for an individual to comprehend that not all persons can become managers. Rather, there is a significant need for skills and qualities to be acquired in order to be able to manage people and resources… Continue Reading...

How 9/11 Affected Private Security

security Management 1. Some operational contingencies are considered core because the operation could not function without it. A core operational contingency is one that must remain functioning. This is important for contingency planning, so that when you plan for the more common risks that the operation faces, you ensure that the core ones are taken care of, and will continue to run. If you run an e-commerce site, for example, you would consider the ability to keep your website running and continue taking orders as a core contingency. Everything else… Continue Reading...

Conducting a Security Assessment Of a Building

adjacent. This is home to a beauty salon, and residential condominiums above. There is no security on site. The main entrance is up a flight of stairs, so there is no need for a vehicle barrier. There is one step for the fire exit, and just two small doors at the back, one for freight and the other with an entrance to the fitness facility in the basement. None of the entrances require vehicle barriers, as none are large enough for a vehicle larger than a bicycle to drive through. There is no on-site parking. There is no landscaping… Continue Reading...

Palestine and the Jewish State

feel empowered in what often seems a helpless situation amid the heavy hand of the authoritarian security apparatus and the hegemonic state-directed media apparatus. Even the recent protest against President Trump’s decision to relocate the U.S. embassy to Jerusalem was muted by the mainstream media. As the numbers of Palestinian dead and wounded climbed upward into the hundreds, the citizen journalists took to social media to raise awareness. Yet the move of the embassy proceeded and was lauded as a great victory for Israel. The suffering of Palestine continues to go unrecognized in mainstream media: it does not accord… Continue Reading...

Health Information Technology Benefits

care facilities may have to pay costs for developing, sustaining and maintaining the services. Another challenge is security and with more and more hacks occurring in organizations, health care facilities will need to be protective of information. That means added cost and energy spent in keeping HIT safe from attacks. These concerns will continue to last well on into the future as hacks and security needs will only get more pronounced from here on out (Meingast et al., 2006). Privacy concerns are another matter and those need to be addressed because patients have a right to have their information protected.… Continue Reading...

Boston Marathon Bombings

examining thousands of photographs and video recordings of the event taken by security cameras and bystanders succeeded in identifying the two primary suspects and surveillance-camera pictures of the pair were released to the public on the evening of April 18, 2013 (Frommer, 2013). That same evening, a 27-year-old police officer working at the Massachusetts Institute of Technology was murdered by the two Tsarnaev brothers as he sat in his patrol car, apparently in an attempt to obtain his service revolver (Frommer, 2013). Shortly thereafter, the older brother stole a Mercedes SUV, and took the driver hostage, explaining that he… Continue Reading...

False Advertising

so to speak, and they should have to answer when crimes are committed and the public’s safety or security is threatened by the company’s reckless behavior and the CEO’s inability to address the recklessness. References Hallowell v. Citaramanis. (1991). Justia. Retrieved from https://law.justia.com/cases/maryland/court-of-special-appeals/1991/1060-september-term-1990-0.html United States v. Park. (2010). CaseBriefs. Retrieved from https://www.casebriefs.com/blog/law/criminal-law/criminal-law-keyed-to-kadish/group-criminality/united-states-v-park/   Continue Reading...

Utilitarianism

the bill for my health care. Other programs will likely have to be cut—such as social security. Spending on the military would probably have to be cut in order to make sure there is enough money to cover everyone’s health care. I for one think spending on the military should be cut because we are in too many foreign lands already—however, if it were cut, it would cause a lot of people who depend on the military for their livelihoods, such as soldiers and contractors, to have to find new work, which might not be easy, especially if our… Continue Reading...

Marketing B2b and B2c

factor. If I’m selling, one thing I want to really hammer home is security, and the other is uptime. I feel that uptime is something that is a “must have” for the university, and that elements such as performance and security are things that can be differentiated. Performance for servers is measured in terms of their capacity, and that means that comparisons across companies is easy. security is something that IT buyers care a lot about, but typically have little knowledge in. This is an area that a sales rep can really hammer home the value prop. IBM’s reputation is… Continue Reading...

Differences Between Proprietary and Contract Security

When considering their security needs, businesses will be faced with whether to develop an in-house, proprietary team or to outsource their security to a contractor. There are significant differences between contract security services and proprietary security, as well as costs and benefits associated with each. With proprietary services, the company can control and monitor all their security needs, change security strategies as needed, and conduct all training in-house. security personnel are also directly reporting to the company, creating a safer and more internally cohesive security strategy.… Continue Reading...

Capitalism and Economic Surplus

the federal budget in the United States is Social security, Medicare and Medicaid. Combine this with other programs like food stamps, WIC and a few others, it is easy to see that a lot of surplus is going to people that ostensibly or supposedly need help. To be fair, there are some people that certainly do need help. For example, “full employment” is considered to be 4-5 percent because there are always people that are between jobs for one reason or another. However, the workforce participation rate in this country is rather low as compared to the past and… Continue Reading...

Database Professionals Employment Trends in Us and Monaco

and this makes them well versed. Database skills are vital for any IT professionals in other fields like development, security, and programming. This is because information is stored in databases and one needs to understand how they can interact with a database (Galup, Klein and Jiang). Interaction with databases is at the core of IT and without this knowledge, one would find it hard to store and retrieve data that they can use in order for them to perform their work (McKendrick). For example, in IT security all information will be stored securely in a database and only accessed when… Continue Reading...

Army Diversity

a diverse military ready to address conflict’s human dimension. Present and imminent security environments demand a culturally adaptive and perceptive military that can respond to the nation’s interests in any environment. An efficient, long-run corporate diversity undertaking will provide the armed forces with a chance at becoming a national diversity leader. Attainment of this goal will end up making a strong statement to army personnel and the country. Effective understanding of internal differences (including cultural disparities) will result in a tendency for respecting individual differences, extending to global operations preparations. It is naturally not easy to appreciate other cultures… Continue Reading...

Feminist Ethical Virtues Versus Masculine

the carpet at a cost of $400. Within 45 days the landlord returns all but $500 of the tenant’s security deposit, and gives notice that it is withholding $500 for the carpet. If the tenant sues to recover the rest of her deposit, what is the most she can recover? A. $100 – the amount greater than actual costs withheld, plus reasonable attorney’s fees. B. $300 – three times the amount greater than actual costs withheld, plus reasonable attorney’s fees C. Nothing because the landlord was justified in withholding the $500. D. $1500 plus reasonable attorney’s fees because the… Continue Reading...

Law Clerk's Legal Analysis Of Landlord and Tenant

that landlords together with property managers face is the issue of whether to return the security deposit subsequent to evicting a tenant. It is imperative to note that a tenant that is evicted does not automatically lose the security deposit that he or she paid at the start of the lease agreement. The clause that the firm’s client is considering inserting into a lease is allowable. The tenant has a general right to be given back the security paid at the start of the less with interest, less any damages that are rightfully withheld within a period of 45… Continue Reading...

Port Security Customs and Border Protection

Port security The CBP (Customs and Border Protection) is a unit in the homeland security department and is the agency responsible for regulating, monitoring and facilitating flow of products at the points of entry. CBP policy formulation is done is such a way as to ensure that there is smooth movement of cargo through the border line. CBP enforces the customs and trade rules which are put in place with a view of protecting businesses and customers in the U.S. and collect revenue. CBP also enforces security laws for imports formulated… Continue Reading...

Trading Strategy Of Cryptocurrencies

token type: thus, one routinely sees the clustering of currency tokens, platform tokens, utility tokens, brand tokens, and security tokens. Yet these are not the only clusters that may appear, the more closely one looks at the space. As clustering shows which cryptocurrencies move in tandem at the top of the market cap, it is useful to examine clustering cryptocurrencies to see what similarities in movement might tell us. Are fundamental similarities backed by market metrics? That is the main question to be asked and an important one because clusters can be used to formulate trading strategies. However, Qunitero… Continue Reading...

Understanding Issues Pertaining to Retailers Going Global

Issue: Retailers going global For United States together with European retailers within a still-troubled economic climate, the key to develop could be as difficult to attain as it can be difficult to disregard. Money-strapped consumers are, even now, not opening their own wallets, as confirmed by the decline in American retail product sales this past year. Simultaneously, lifestyle standards all over the world have already been increasing for a long time. Certain countries and parts that, at one time, functioned primarily as suppliers of cheap-labor together with raw materials within the global economic climate now feature engaging national marketplaces with… Continue Reading...

Social and Environmental Challenges Facing Megacities

social tensions in megacities due to overcrowding is also attributable to inadequate access to essential public services and increased security threats. While megacities are regarded as engines of global economic growth, they are characterized by huge inequalities in wealth and economic opportunity distribution. This has resulted in the failure by these cities to enhance the quality of life of their residents. Egelhof (2010) states that a survey of megacities in OECD region has shown that one-third of this region has unemployment rates that are higher than the national average. Additionally, between 7-25% of populations in megacities live in deprived… Continue Reading...

Third World Relations with Other Worlds

democratic institutions; (2) spur economic growth, trade, and investment; (3) advance peace and security; and (4) promote opportunity and development.” The USA policy promoted the establishment of democracy in the African nations, limiting the Soviet influence in Africa and other third world countries as much as possible and promoting market-oriented economies, also referred to as capitalism. The US has also included other issues that during the cold war were at the periphery of their considerations like the issue of human rights, global environment and international peacekeeping have all become central to the US foreign policy especially towards the third… Continue Reading...

Alice Walker’s “everyday Use” and Individual Identity

Preserving Family Traditions and Cultural Legacies: Alice Walker’s “Everyday Use” and Individual Identity In Alice Walker’s short story “Everyday Use,” the conflict between a desire for personal fulfillment and the need to honor one’s tradition is dramatized in the conflict shown between two daughters, Maggie and Dee. Maggie has never had a desire to leave home and seems content to live with her mother. Mama is a woman who has grown up poor, tough, but also very deferential to white people, because of the profound societal injustices she has endured. “Who can even imagine me looking a strange white man… Continue Reading...

The Book Trade in Early Modern China

and the West as that of ignorance versus experience, rather than addressed the genuine potential security concerns of the Chinese. It should be noted, however, that the Society did research the book market within China to better understand what the Chinese were actually reading, including the Yellow Calendar (a kind of almanac) and Collections of Useful Information (Chen 1715). The Qing Dynasty had placed a ban on all foreign publications and ultimately all material of the society had to be printed in Singapore. Regardless, the fact that the Qing had aggressively worked to prevent foreigners from gaining control over… Continue Reading...

Improving Global Food Security and the Environment

West P.C. et.al, (2014). Leverage points for improving global food security and the environment. Science Magazine. Vol. 345. Issue 6194. The article centers on the leverage points for improving global food security and the environment. It is indicated that agriculture accounts for between 20% - 35% of the Green House Gasses (GHG) emission. Due to the need to produce more, agriculture is the major driving force for GHG emission, water quality degradation from soil loss and nutrient runoff as well as water use. This means there is need to have… Continue Reading...

Strengths Of the Long Term Care in South Korea

LTCI, in a social insurance format, effectively fulfills the role of a social security policy. References Economic and Social Commission for Asia and the Pacific – ESCAP (2016). SDD-SPPS Project Working Papers Series Long-Term Care for Older Persons in Asia and the Pacific. Retrieved from http://www.unescap.org/sites/default/files/Long-term%20care%20for%20older%20persons%20in%20the%20Republic%20of%20Korea.pdf Rhee, J.C., Done, N. & Anderson, G.F. (2015). Considering Long-Term Care Insurance for Middle-Income Countries: Comparing South Korea with Japan and Germany. Health Policy, 119(10), 1319-1329. Continue Reading...

School Security Management

security Options and High Performance Introduction As McCrie notes, “the training of employees and the development of their skills and careers is a critical and time-consuming activity within security operations.”[footnoteRef:2] For an organization like a public elementary school, employees are more than likely already stretched to the max in terms of time and ability: their primary focus is on teaching and assessing student achievement. Other stakeholders—i.e., parents—will nonetheless be concerned about safety, as Stowell points out.[footnoteRef:3] To keep stakeholders happy, managers and employees have… Continue Reading...

Two Sides to Every Story Kashmir Today

Studies 33(1), 147.] Indeed, a resolution adopted by the nascent United Nations (UN) security Council in January 1948 specifically called upon “the Government of India and the Government of Pakistan to take immediately all measures within their power (including public appeals to their people) calculated to improve the situation, and to refrain from making any statements and from doing or causing to be done or permitting any acts which might aggravate the situation.”[footnoteRef:5] Notwithstanding this and subsequent UN resolutions concerning Kashmir that mirrored these requests for forbearance of compellence on the part of either belligerent, there have been hundreds of… Continue Reading...

Parkinson's Disease

this population includes accessing government benefits such as Social security, Medicaid, and disability services. This population may be able to apply for government aid for obtaining health care; however, Social security is not as reliable as it once was, and Medicaid, too, has its limitations in terms of the extent of options one can obtain. In short, access to care is available—but it is also limited and not as full as it could be. Key Factors/Social Determinants of Health Contributing to Overall Health Status of This Population Key factors of health contributing to the overall health status of this… Continue Reading...

Illegal Immigration Essay

in recent history.  In any discussion of illegal immigration, “the wall” is one of the Border security One reason illegal immigration is still a hot topic is that border security is not up to where it needs to be to stop in the influx of illegal immigrants from border countries.  Over the past few decades, both democrats and republicans have called for stronger border security—so this is not a partisan issue, even though it is often made to seem one today.  Proponents of closed borders note that border security is a necessary feature of any nation as it helps to… Continue Reading...

How Policy Administration Can Make or Break Education

able to freely and fully exercise their human rights, gain accessibility to basic needs and also experience economic security. In the present day, different populations experience discrimination, for instance women facing prejudice at the workplace and also tribal sects such as the Aboriginal facing discrimination and ostracizing. Therefore, my vision for social change takes into account empowering the communities that are not only marginalized but also disadvantaged. Marginalized groups in different expenses, for instance tribal individuals, unorganized workforces, peasants, dalits, as well as women are all in the present day engaged in a tussle for power to attain equality… Continue Reading...

The Local State and Federal Levels Of Disaster Management

allocate resources. The state must also determine how to engage either or both FEMA and the Department of Homeland security, both of which play critical roles in disaster management. Within the National Response Framework (NRF), first responders at the local level always bear the heaviest burden being on the front lines, and remain the most important for successful emergency management response procedures. Only local first responders understand the terrain and geography, cultural or linguistic constraints, and other issues that impact effective service delivery. References FEMA (n.d.). Disaster sequence of events. https://training.fema.gov/emiweb/downloads/is208sdmunit3.pdf FEMA (2018a). About the agency. https://www.fema.gov/about-agency FEMA (2018b).… Continue Reading...

Fema Dhs and Emergency Management at Local Levels

before, during, and after incidents,” (United States Department of Homeland security, 2008, p. 6). States in many ways play the least visible role in emergency management, often working as liaisons between local governments requesting additional support and the federal government needing more information about the situation. Not all incidents require state or federal intervention and assistance, and city councils should not be concerned about losing control. Compliance with the Incident Command System (ICS) helps to unify disparate organizations involved in emergency response, ensuring interoperability. According to the Department of Homeland security (2016), emergency response is tiered even though the… Continue Reading...

Infancy and Toddler Development

social and physical environment. The mother tends to be the child’s source of security and the child grows in confidence through connection to the mother. Between the ages of one and two the child is like a “young scientist,” according to Piaget in the sense that the child explores and demonstrates cognitive development (Thomas, Warner & Foster, 2000). According to Freud, the child is developing a sense of pleasure, first through oral stimulation which is connected to feeding initially but also through relief by way of bowel movements and urination. According to Erickson, the child is developing trust during… Continue Reading...

Critical Infrastructure Security Information Technology

components in the United States are privately owned, compliance with Department of Homeland security risk assessment methods remains voluntary. Risk assessments of critical infrastructure focus on threat, vulnerability, and consequences, with all types of assessments integral to helping improve resilience and mitigate problems (GAO, 2017). A vulnerability analysis of the nation’s information technology critical infrastructure reveals several points of weakness and security gaps. The Department of Homeland security (2018) infrastructure survey tool can be used alongside the systems dynamics approach to vulnerability assessment. These tools reveal the inherent strengths of complex, interdependent information technology systems, while also revealing the… Continue Reading...

Risks and Benefits Medical

The interviews are most likely to be conducted in a secure setting with security personnel nearby, so being close to the prisoners likely poses little risk. The reality is that the researcher is interviewing prisoners in a closed setting, asking them to recall things that may trigger emotional response, and these are people who have already demonstrated subpar impulse control. There probably will not be any issues, but some safety precautions should be taken to ensure the safety of the researcher in this situation. There are not that many risks to the prisoners in this situation. However, they are… Continue Reading...

Social Media Postings and the Internet Privacy

be academically useful in the research. Macdonald S., (2018). Data Privacy and security Questions Answered with Scott Macdonald. Retrieved August 24, 2018 from https://www.ebsco.com/blog/article/gdpr-data-privacy-and-security-questions-with-scott-macdonald This is a journal article retrieved from EBSCO. Indeed it is an excerpt from an interview that was conducted with the vice president of information security and platform operations. It gives a technical and real life experience of the world of internet security, hence useful in this research. Ayala D., (2017). Dealing with the Loss of Internet Privacy. Retrieved August 24, 2018 from https://www.proquest.com/blog/pqblog/2017/Dealing-with-the-Loss-of-Internet-Privacy.html This is an article from ProQuest written by a contributor who is… Continue Reading...

Problems Implementing Cpted Measures

Methods of security 1. Implementing Crime Prevention through Environment Design (CPTED) is not without its challenges. For many businesses, cost is cited as a major challenge. The changes are not always small and easy to implement, and things like installing barriers or redesigning spaces usually come with a cost. That cost then has to be absorbed by the business, because it is often difficult to pass onto the consumers. The reality is that in the long run the changes are expected to pay for… Continue Reading...

911 Commission Report Intelligence and Information Sharing

is privileged information which is intended to be consumed by specific audiences (Mostly security officials). Intelligence is an art of gathering the protected and privileged information and using it to the benefit of the public. From the perspective of Goldfarb (2016), the principle difference between intelligence and information is data. Data does not have any context by itself. It would not be helpful to anyone in trying to solve a particular problem. In determining the difference between data and intelligence context is very important. Some of the questions that one must ask themselves in order to understand the difference… Continue Reading...

Compensation and Benefits the Modern Workplace

ideal to ensure that employees feel that the company is interested in their financial security. But it is equally important to offer tuition reimbursement and learning opportunities to employees, so workers can become involved in developing themselves as potential leaders and in their career, particularly to answer millennials’ expressed desire for emotionally fulfilling careers career. For employees from historically discriminated-against groups and women, showing particular consideration for their needs, including mentorship programs specific to their needs may be useful (Kuhl, 2018). And above all, soliciting input from employees and showing respect for their opinions is critical—an intangible benefit which… Continue Reading...

The Housing Crisis and Insecurity and Poverty in America

not just about providing financial assistance directly, but providing the means by which low income families can enjoy long-term security and access to opportunity. Desmond proposes a sort of universal voucher program. A universal voucher program is designed to provide families with options and choices, thereby empowering them to make the housing selections that worked for them and their family. As Desmond suggests, a voucher program can be designed to use complex algorithms that help to balance the needs of the economy with the needs of the poor to find a stable housing option within their means (Desmond 308).… Continue Reading...

United States Gun Control Pros Cons

Amendment to the Constitution states, “A well regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed,” (United States Constitution). Because few contemporary gun owners would describe themselves as being part of a “well regulated militia,” the relevance of the Second Amendment becomes increasingly spurious. Mass shootings, firearm accidents, and other gun-related deaths are disproportionately high in the United States, but assessing causality remains one of the greatest policy challenges of the last century. Gun control advocates claim that revising the Second Amendment would… Continue Reading...

Security Management Civil Action

security management 1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding? Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases: · If the individual harming or injuring another is an employee of the company. · If the employee is… Continue Reading...

Art Of War

involving both cyber and aerospace, distance issues may be less important in security military victories. Technology can mitigate some of the challenges associated with terrain (McCallum, 2007). Therefore, the proper use of terrain starts with a thorough analysis of the geological and morphological features of the landscape, while also taking into account technological capacities for change and adaptation. Potential Calamities In conjunction with a classification of terrain, Sun Tzu also covers potential human factors that can adversely impact the military campaign. Unlike the natural conditions of physical terrain, the human factors that impact the outcome of a battle include… Continue Reading...

Public Transportation and Promotion

is agreeable to the community. Cleanliness, safety and a feeling of security will do more to attract a range of commuters from women and children to adult men who wish to ride in peace and comfort when in the city than almost any other means of promotional display. To enhance its security, the city could provide all public transports with their own security detail. Cameras in all cars and stations could also be mounted to better give the public the impression that everything is watched. Conclusion In summation, the issue of public transportation is very important for the well-being… Continue Reading...

Security Training and Management

on the 8-hour pre-assignment training course proposed by the Task Force on Private security? What is the reasoning behind pre-assignment training? Three decades later are those educational goals still relevant? Although some employers combine basic security training with pre-assignment training and only provide the minimum number of hours required by law, the overall trend within the field has been to increase the number of hours of training. This offers greater protection for employers, should they become the subject of a lawsuit (McCrie, 2016). Additional training highlights the extent to which the employer engaged in planning for every possible eventuality.… Continue Reading...

The Meaning Of American Identity

hand of the central government. In many respects we have given up our freedoms for security, especially since 9/11. We are willing to be spied on by the NSA and groped by the TSA—just so long as we are told that we are being kept safe. In this sense, Americans have reverted back to being like subjects to a crown, where the leader has no accountability before the people. Do Americans still have freedom and independence? Some would say very little of it. References Avalon Project. (n.d.). Letters from an American Farmer: Letter XII. Retrieved from http://avalon.law.yale.edu/18th_century/letter_12.asp   Continue Reading...

Vaccines and the Smallpox Epidemic

certainly resonate with Americans who support the concept of liberty. However, in today’s world, where safety and security are also viewed as important in maintaining order in society, there is some agreement among most that what is in the best interest of the common good is what individuals should follow. This utilitarian principle would seemingly support the idea of vaccination on a large scale and even forced vaccination in cases where emergency necessitates it—such as an outbreak of an epidemic. Kaufman points out, for instance, that “vaccination had proven to be effective in preventing smallpox and it was widely… Continue Reading...

What Did Goya Paint

Goya and Redon Francisco Goya was an 18th-19th century Spanish painter and printmaker. Odilon Redon was a 19th-20th century painter and printmaker. The two artists, though separated by a century, share a similar style and perspective. Goya lived through the Romantic-Enlightenment era and saw the unraveling of society on the Continent as the Old World values were swept away be Enlightenment philosophy and Romantic dreams. Redon lived to reflect the aftermath of that era: his symbolist paintings show a world that is half-mad, yet totally focused on itself and its grandiose ideas. Together, Goya and Redon cover three centuries of… Continue Reading...

Berg Versus Allied Security Inc

Berg v. Allied security Inc. Chicago 1.    An overview of the case (provide a detailed case review)      In this case, Joan Berg, the plaintiff, filed the personal injury case against Allied security, the defendants.  The Cook County circuit court, in 1996 September the 4th, ruled in favor of the defendants. After thirty days Joan Berg sought authority to amend the complaint and the circuit court, on 15th October, denied her the reconsideration. The amendment Leave was also denied on 21st November. The plaintiff filed an appeal… Continue Reading...

Programs for Risk Management for Health Care Organizations

for Civil Rights) is within the HHS (Health and Human Services) department and is responsible for the enforcement of security rules and Health Insurance Portability and Accountability Act (HIPAA). OCR is actively involved in the investigation of privacy violations as well as the enforcement of noncompliance penalties (TechTarget, 2018b). CMS (Center for Medicare and Medicaid Services) is also under the HHS and is responsible for health insurance programs for children, Medicare and Medicaid administration. CMS supervises most regulations relating to systems in healthcare and provides subsidized government medical covers through programs such as Medicaid (For the low income families… Continue Reading...

Human Resource Strategies for Security Management

Factors to Consider in security Management 1. On meeting new workers assigned to the unit, what topics would the supervisor discuss first? Why? Regardless of the supervisor’s precise role, many of the problems that occur following the hiring of new employees relate to misunderstandings concerning organizational expectations and the failure to identify optimal candidates (McCrie, 2016). Therefore, supervisors at every level should focus on accurately communicating organizational expectations based on a timely and accurate job description, accident reporting requirements, what safety protocols and procedures are in place and… Continue Reading...

Security and the Wall

Methods of security Seven types of physical barriers designed to thwart a potential threat are: (1) perimeter security measures, (2) physical barriers (natural or structural), (3) fencing (chain link, barbed wire, top guard), (4) gates, (5) protective lighting, (6) doors, and (7) windows (U.S. Geological Survey Manual, 2018). Of these, I feel that the most important is to have perimeter security measures. Perimeter security measures can include virtually anything that secures a perimeter and can vary in complexity and comprehensiveness—from something as simple as a wall around one’s home… Continue Reading...

How Hackers Can Be Stopped

out, “well-intentioned employees will offer account numbers, volunteer passwords, and even open locked security doors if the request seems reasonable or the threat seems real?—?or if the stranger seeking physical access is a decent actor with an adequate disguise.” Workers fall for four basic social engineering ruses—(a) content in a strange email that looks inviting, (b) provocative social media messages that they just have to respond to, (c) fake package deliveries, and (d) exciting offers made over the telephone. Jackson (2018) states that auditors have to know what the trends in social engineering are so that they can help… Continue Reading...

What Is Critical Infrastructure

encompasses the people, places, and things necessary to deliver critical services and goods. The US Department of Homeland security often abbreviates critical infrastructure as CIKR (Critical Infrastructure and Key Resources) and defines CIKR as consisting of, “the assets of the United States essential to the nation's security, public health and safety, economic vitality, and way of life,” including “power grids and water filtration plants; national monuments and government facilities; telecommunications and transportation systems; chemical facilities” (“CIKR,” 2009, par.1). Although the majority of CIKR is privately owned, according to DHS, the government still has a vital protective role to ensure… Continue Reading...

Key Resources Critical Infrastructure

protection mission of CIKR (Moteff & Parfomak, 2004). The continuity and protection of CIKR is fundamental for national security, safety, vitality, lifestyle and public health. Critical infrastructure can be understood as the systems, networks and assets, virtual or physical (Fisher & Norman 2010). Critical infrastructure is quite fundamental to a nation to the extent that their destruction or incapacitation may cause a devastating impact on public health, national security, safety, or a combination of all (Moteff & Parfomak 2004). Critical infrastructure sectors include: Food and Agriculture: This sector can be understood as the national animals, feeds, and feeds supply… Continue Reading...

Using Nuclear Power to Generate Electricity

nuclear power plants have been on the rise and many governments are grappling with how to manage the energy security of their country and at the same time reducing air pollution and greenhouse gas emissions. Nuclear Power Technology According to Brook and Bradshaw (2015) generating electricity using nuclear reactors is similar to the way electricity is generated using coal-fired power plants but somehow more complicated. Nuclear reactions produce energy from uranium fuel. The uranium ore is first mined and then enriched in order to increase the amount of isotope uranium, which is able to sustain a nuclear chain reaction.… Continue Reading...

Performance Appraisal Security Management

technology, and without good people at the helm, appropriate security protocols will not be enforced. People need to know on a regular basis how they are performing and usually desire feedback. Ideally, this feedback should combine both positive and negative input, since simply focusing on the negative can be disheartening from the employee’s point-of-view. Also, another function of performance appraisals is to communicate to employees the degree to which the organization takes a vested interest in their development. That is why, according to McCrie (2016), “In well-structured organizations, all employees deserve appraisals” (p.160). Performance appraisals are something employees deserve,… Continue Reading...

Critical Infrastructure Protection Using Computers in Modern Society

computer-linked/ related systems. From the above-made statements, it is clear that there is a need for coordinated security systems to protect critical computer systems that are keeping the world moving. This means there is a strong need for cooperation among stakeholders for the successful protection of critical infrastructure. According to the Department of Justice, any unpermitted intrusion into a critical national security system by an individual or a group of individuals is a crime (Sharp, 1998). It is the responsibility of all levels of governments in the United States to prevent unauthorized intrusion into critical systems. Critical infrastructure securityContinue Reading...

National Infrastructure Protection Plan Nipp

the year 2006 by the DHS (Department of Homeland security). The Plan was part of Presidential Directive 7 for Homeland security and it was developed to boost security, and resilience and to help secure critical infrastructures from security threats. The plan included a thorough risk management guideline and defined the roles and responsibilities of the DHS with regards to CIP (Critical Infrastructure Protection). Included in the guideline were also the roles and responsibilities of the federal government, state governments, local governments, tribal governments, federal agencies, and private actors towards CIP in their jurisdictions. CIP is important for overall securityContinue Reading...

Infancy and Toddlerhood S Developmental Stage Age Group

Developmental Stages Developmental Stage/Age Group: Infancy and toddlerhood (0 - 3 years) Erickson maintains that the first human developmental stage involves an individual’s interactions with his/her surroundings, normally the baby’s immediate social and physical environment, which is made up of home and family (Levinson, 1986). Especially important at this point (i.e. infancy) is the mother- baby relationship – the very first social bond one forms. Receptive mothers sensitive to the distinctive requirements of their baby will help cultivate a sound sense of self- worth within the baby, facilitating the development of a sound, all- round physical, emotional and psychological constitution,… Continue Reading...

Managing Theft with Low Tech and High Tech Techniques

security Lighting Survey of a Facility The facility selected for this study is Aventura Mall. This is a major regional shopping mall that is situated in Aventura in the state of Florida. This is the biggest conventional shopping mall in the state with an area of more than 2.8 million square feet. In addition, Aventura mall has three different floors of retail space, consisting of more than 300 businesses selling commodities and services. The center is anchored by five department stores, including Nordstrom, Bloomingdale’s and Macy’s, and features… Continue Reading...

Communications Interagency Technology Security

as verbal message transmissions. Technological tools that enhance safety and security bolster critical infrastructure and improve overall resilience. However, safety and security networks need to be regular updated and maintained. Technology can be employed specifically for the purposes of security management, training, and consistent monitoring of all essential services. Likewise, technology can be used as a means of interfacing with the public during crisis scenarios. Each agency can establish its own channel of communication, providing the public and other external stakeholders with access to multiple messages via many media channels. Social media and other new media can also be leveraged… Continue Reading...

Security Management

are EAP services vital in the workplace? What is the role for security practitioners in supporting the work of EAP? All employers are required to have employee assistance programs (EAPs) for the safety of workers and also the financial safety of the organization, to ensure that employees can receive the necessary support when dealing with personal and workplace problems. security practitioners can support the work of EAP by ensuring that employees who have been proven problematic for the company, such as those who have been shown to be harassing employees or behaving inappropriately are monitored and not permitted back… Continue Reading...

Make University Tuition Free

Would they object to free healthcare for everyone? Or how about social security? Before social security, people had to save for retirement on their own. Now, everyone pays into it. And everyone pays into a big fund today, too—only that fund is not being spent on the people who need it most: students. Instead, it is being spent to blow up the Middle East or to build a base on some black site in some unknown part of the world. What about the students here? What about the companies here suffering from a lack of talent? They have to… Continue Reading...

Security for Mobile Devices

security: Mobile Protection As the Internet has become the dominant means of communicating, sharing information, tending to business, storing data, and maintaining records in the Digital Age, the importance of security for the digital world has become more and more realized (Zhang et al., 2017). Not only do companies have to invest in digital security in order to safeguard against threats and risks such as hacking or malware, but individuals also have to be cognizant of the threats to their personal information and property now that all things are online.… Continue Reading...

The Importance Of Communications As a Critical Infrastructure

Published by the Department of Homeland security (DHS) in 2003, authored by President George W. Bush, The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets is the first document of its kind. After September 11 and the creation of the DHS, swift action was taken to synergize national security efforts and interests. The National Strategy redefines the meaning and definition of critical infrastructure and key assets, offering guidance to individual sectors for risk management, risk mitigation, information sharing, and more (Erbschloe, 2004). Moreover, the National Strategy takes into account the diversity of… Continue Reading...

Physical Security Design and Methods Of Security

Physical security Design The physical security of any entity is largely pegged on the risk assessment mechanisms used. Prior to implementing any physical security plans, it is fundamental to comprehend the types of threats that the entity is faced with, the possibility that the threats will occur, and the level of damage likely to be inflicted in the threat happens. Firms involved in risk management should be able to assist in the identification of the vulnerability areas and thereafter form a… Continue Reading...

Implementation Of Continuous Quality Improvement

bill that made Medicare a component of the nation’s Social security scheme. This bill which was enforced in July of 1966 expanded the three-decade-long Social security initiative and offered nursing home and hospital care, outpatient treatment and home nursing services to individuals aged above 65 years (QIO News, 2014). Numerous major attempts at quality improvement have been made in the last 50 years, largely initiated by academicians’ health quality campaign. Examples of such attempts are patient care delivery system reengineering and reorganization, incentivizing inter-institutional/provider competition, and peer review encouragement. Additional efforts were determination of medical procedures influencing patient health, performance… Continue Reading...

Wait Times and Queuing Theory

businesses which provide time-dependent services, queuing is necessary to ensure efficiency. For the Transportation security Administration (TSA), queuing is also a matter of safety. To ensure all passengers are appropriately screened, the TSA must ensure that flyers are able to wait in an orderly line and receive appropriate direction. Yet when people are forced to wait in line, they are often angry and agitated. This is especially true in situations such as an airport in which passengers may be worried about missing flights or have gotten up very early in the morning, endured a hectic commute, or face other… Continue Reading...

Health and Poor Populations

Vulnerable Populations: Low Income Adults Low income adults in Wyandot County, Kansas City, Kansas, are vulnerable to the socio-economic factors that commonly have a negative health impact. These factors include low wages, unstable family life, risky sexual behavior, drug and alcohol abuse, high crime, low education, obesity, diabetes, and poor access to health care (Boyer et al., 2017; Guariguata, 2014; Osborn, Squires, Doty, Sarnak & Schneider, 2016). Low income adults, therefore, are at risk of not receiving the proper health education they need to maintain healthy lifestyle; they are at risk of lacking a cogent support system to maintain a… Continue Reading...

Emirates Airlines Pestle and Swot Analysis

the American government in relation to the issuance of entry visas, fortified security vetting, and restrictions on electronic devices in aircraft cabins have had a significant direct influence on consumer interest and demand for air travel into the United States. This has given rise to weakened travel demand and therefore reduced tickets and revenues generated. This has affected Emirates’ decision-making by forcing the firm to cut flights to the United States (Zhang, 2017). 3. Militant attacks in Europe and Turkey The militant attacks that took place in Europe and Turkey significantly impacted the operations of Emirates Airlines. According to… Continue Reading...

Cost Efficiency in Cyber Security

security Management 1. The appropriate budget allocation will vary by organization based on what?  The appropriate budget allocation will vary based on the specific profiles of the organization, its needs and the extent to which resources are actually available. In an economic downturn, supply chains can become tight. With tariffs going up or a trade war worsening, obtaining cheap resources becomes more difficult. This has to be taken into consideration when determining a budget--i.e., that organization must look at the macro as well as the micro. The micro in… Continue Reading...

The Mission Of Usaa

motivation techniques used by the company from an employee’s perspective. Mission The mission of USAA “is to facilitate the financial security of its members, associates, and their families through provision of a full range of highly competitive financial products and services; in so doing, USAA seeks to be the provider of choice for the military community” (USAA, 2018). Vision The vision of USAA is to be part of a world in which appreciation and respect is shown to the military community through services and products like those offered by USAA. Types of Products and Services Offered USAA offers a wide range of products… Continue Reading...

A Brief History Of Medicare and Medicaid

the health insurance issue a campaign matter. The Second New Deal crafted by President Roosevelt involved including the Social security program in the laws (Piatak, 2015). The act tried to reduce the extent to which such factors as poverty, old age, widowhood and children without known fathers were seen as dangers. The New Deal had a chunk of its content expunged by the Supreme Court because they were either seen as unconstitutional or simply not within the jurisdiction of the federal government. Some of the acts such as the National Industrial Recovery Act and the Agricultural Adjustment Act were ordered… Continue Reading...

Strategies to Improve Collaboration and Cooperation Between the Homeland Security Agencies

Strategies to improve collaboration and cooperation between the Homeland security agencies The department of homeland security (DHS) controls the territorial, local, state, tribal, and federal government resources (DHS, 2018). The DHS coordinates various programs and agencies into one single and unified effort that is given to protecting the American homeland and the people. The first QHSR (Quadrennial Homeland security Review) was completed in the year 2010 with an objective of establishing an incorporated strategy for the goals and missions of homeland security (Homeland security, 2005). Following this, DHS carried out a BUR (Bottom up Review).… Continue Reading...

Joint Function As Related to Operation Anaconda

concerned with information collection and synchronizing this with tactical tasks of surveillance, reconnaissance, intelligence operations, and security. Intelligence development is a continuous process of analyzing information from different sources. The fires function denotes the collective and coordinated use of air and missile defense, indirect fires, and joint fires. Army fires systems will deliver fires in support of defensive and offensive tasks in order to create a lethal and nonlethal effect on the target. Sustainment function provides support and services in order to ensure freedom of action, prolong endurance, and extend operational reach. Sustainment is what determines the depth of… Continue Reading...

Classroom Management and Arrangement

ordered feel to it that can reinforce the ASD student’s sense of well-being, security, proportion and boundaries—all of which are crucial to maintaining the student’s engagement. References Bene, K., Banda, D. R., & Brown, D. (2014). A meta-analysis of peer-mediated instructional arrangements and autism. Review Journal of Autism and Developmental Disorders, 1(2), 135-142. Ganz, J. B. (2007). Classroom structuring methods and strategies for children and youth with autism spectrum disorders. Exceptionality, 15(4), 249-260. Leach, D., & Duffy, M. L. (2009). Supporting students with autism spectrum disorders in inclusive settings. Intervention in School and Clinic, 45(1), 31-37.   Continue Reading...

Defence and National Strategy

operational and tactical objectives (Bush, 2002). The Air Force plays a big role in national security. Some of the critical capabilities that determines what the Air Force is able to provide for a nation include: action freedom in air, space and cyberspace; power projection; air diplomacy; global situational awareness; and military support to civil authorities. The above mentioned capabilities are divided into three parts; one that defines it, one that develops a national strategy vision and one that describes its shocks – highlights the strengths and weaknesses of each capability (Gates, 2009). Certain recommendations have been made to help… Continue Reading...

Comparing Etihad and Emirates

strong example. · Reliability – count on us to get results (Emirates Group security, 2018) By focusing on excellence, agility, innovation, leadership and reliability, Emirates is able to describe the quality of service and products it seeks to offer its clients. Product Product is the thing that is being sold to the consumer—a good or a service. In many cases it is also a brand, a concept, a perception—as Ries and Trout (2009) put it. Product also refers to the advantages it can give to a consumer—i.e., what makes it better than other products on the market, or what features… Continue Reading...

Impact Of Organized Crime

consequences on the economy, political environment, social environment, and commercial environments. Financial security, safety systems, and healthcare are some of the most adversely affected areas by organized crime. Economic crimes from organized crime have monumental financial consequences on any society. Organized crime consequences extend beyond monetary consequences as well. Corruption, intimidation, and violence are primary characteristics of organized crime. Organized crime will characteristically affect the security and solace of any community, neighborhood, and home. Human rights to order, good governance, and peace are fundamentally affected by organized crime activities. Organized crime corrupts the political system as well as the… Continue Reading...

Determining Liability for Negligence

potential harm that one might foreseeably cause to another individual or property. Looking at personal security, this is quite applicable in that even when offering security, one should ensure that they take care of their actions. Even though one might be forced to use force, it must be used only when absolutely necessary and this action should be considered and determined that it will not result in harm to others. Business owners or organizations that hire security guards or bouncers are liable for the harm that these individuals would cause on the people who visit their establishments. Since the… Continue Reading...

Financial Strategies Of Healthcare Organization

cloud technologies, develop superior mobile applications, and enhance expertise in customer patient support services. For healthcare data security and patient safety is a big thing. Patient information must be held in confidence and be retrieved to the benefit of the patient or with their consent. In order to synchronize digital information across various departments in healthcare the hospital management may consider outsourcing. Healthcare institutions can outsource IT experts during the development and implementation of their IT infrastructure. Some institutions will keep an entire IT department to take care of emergency system issues and for general continuous IT infrastructure maintenance… Continue Reading...

Criminal Law and Psychopathy

means that permitting psychopaths who have committed crime to roam freely effectively compromises the security and wellbeing of other members of the society. As it has been pointed out elsewhere in this text, studies have established a clear link between psychopathy and criminal behavior. Indeed, as Dhingra and Boduszek observe, psychopaths tend to perpetrate what is referred to as instrumental violence (221).[footnoteRef:58] Instrumental violence ought to be contrasted from reactive violence in that while instrumental violence appears to be “controlled, purposeful, and used to attain a desired external goal (e.g. money, drugs, or power), reactive violence appears to be… Continue Reading...

Hiring Practices and Ethical Legal

practices that reflect legal ground rules and also ethical codes, human resources managers achieve critical security goals and also protect the legal and ethical rights of employees. Key issues to take into consideration in hiring decisions include the legal ground rules that govern organizational codes of conduct and codes of ethics. Many organizations also craft codes of ethics and codes of conduct specifically to craft organizational culture, promote security, while also insuring against legal breaches. Codes of Ethics vs. Codes of Conduct Both codes of ethics and codes of conduct can be grounded in legal compliance, while still reflecting… Continue Reading...

Comparing Nations Civil Order Control

protests that rocked the KSA. The Ministry of Interior is responsible for providing security forces in such cases, so the KSA’s approach to civil order control is somewhat more centralized than in the U.S. or the UK, though both of the latter Western nations will also use centralized means of control in order to restore order when necessary. The KSA will use deadly force to disperse crowds and did so during the 2011-12 riots, killing many protestors and prompting calls of human rights abuses from international watchdog groups. However, because the KSA is used to being hit with these… Continue Reading...

Us Foreign Policy and the Use Of American Military Power

America anymore. Terrorist acts (e.g., 9/11) were more pressing threats to the nation’s security. For safeguarding the nation and its citizens against such attacks, the DHS (homeland security department) was instituted by the US Congress in the year 2002. The Department’s mission was preventing terror attacks and aiding with recovery efforts if such attacks did occur. It combined numerous federal organizations such as the US Secret Service, Coast Guard, and FEMA (Federal Emergency Management Agency) (Deutsch, 1997). Thus began America’s fight against terrorism, which targeted terrorist outfits as well as the states which supported them. The foremost action on… Continue Reading...

Feminist Theory and International Relations

[5: J. Ann Tickner, "Retelling IR's foundational stories: some feminist and postcolonial perspectives." Global Change, Peace & security 23, no. 1 (2011), 5.] Epistemic Injustice refers to the injustice that stems from the ways in which knowledge is conceived, passed on, communicated and understood. Freire defines epistemic injustice as a pedagogy of oppression.[footnoteRef:6] In order to free oneself from epistemic injustice, one must be willing to challenge the established epistemic order—and Feminist IR theory enables IR scholars to do exactly that. Purpose [6: Paulo Freire, Pedagogy of the Oppressed (Bloomsbury Publishing, 2018), 1.] This paper will use Tickner and other Feminist… Continue Reading...

High Working Performance in Organizations

to their career paths and providing them with a sense of security and generating a setting where their careers can thrive and prosper. Johnson & Johnson adhere to dissimilar policies to facilitate the treatment of their employees in a fair and equal manner. The policies comprise of equal employment opportunity policy, policy on employment of young persons, resolving employee disagreements policy and harassment policy (Johnson and Johnson, 2018). The exceedingly significant practices for J&J are work design practices with regard to the processes that instigated the anticipated behaviors. The strong work design example of Johnson and Johnson is the… Continue Reading...

The Reagan Administration U S Diplomatic Relations with the Uk Throughout the Falkland War

so many other capacities. The first major success by Sir Parsons was to convince the UNSC (United Nations security Council) to condemn and urge Argentina to withdraw its soldiers from the disputed islands as the negotiations of the future of the islands continued (“Message from British Prime Minister” November 4, 1982). Sir Parsons achieved this success barely 24 hours after news of the invasion reached the rest of the world. This was an important diplomatic success as it gave Britain the moral high ground and the backing by the international community. It also somewhat isolated the Argentinians. Another top… Continue Reading...

Uae and Japan Relations

significantly expanded, diversified and multi-layered into many other sectors such as renewable energy, environment, education, science and technology, security, finance, tourism, and others. (Fujiki, 2016, para. 4). In fact, fully 4 years prior to the formation of the UAE in 1971, Japan had already established economic relations with the emerging nation and three Japanese oil companies obtained concessions through an international tender by Abu Dhabi in its oilfields in 1967 (Mustafa, 2013). Given the burgeoning but still relatively weak nature of Japan’s economy at the time, these investments and effort to develop closer political and economic ties with the… Continue Reading...

Safety and Spills Prevention

DHS and Plainsville In order to comply with the priorities handed down through Department of Homeland security (DHS) Grant Programs and state mandates, Plainsville, Colorado, must address the situation of its critical rail line running through its community. The rail line is crucial for industrial use in manufacturing a hazardous material that is not manufactured anywhere else. However, the rail line is two centuries old and in need of repair. To assess the issues and risks at hand, the city has been tasked with bringing a committee of experts together that can share information on a range of… Continue Reading...

Radical Negotiation Posturing and Political Strategies Trump and Alinsky

have little efficacy in ceasing illegal immigration or enhancing security, the ostensible purposes of building the wall. Alinsky’s Ethics: Rules Do Not Matter In Rules for Radicals, Alinsky famously declared that “One’s concern with the ethics of means and ends varies inversely with one’s personal interest in the issue, and one’s distance from the scene of conflict” (Alinsky, 2010, p.26). Alinsky stated that one man’s terrorist is another man’s freedom fighter—hence, those opposed to the Nazis regarded members of the Resistance as heroic figures, while the Nazis themselves regarded the Resistance as the enemy. Similarly, during the Civil War,… Continue Reading...

Emergency Response and Management

and NECP The National Response Framework (NRF) is a national strategy that seeks to enhance homeland security through providing guiding principles and action points for handling future contingencies and hazards regardless of their origin (Lindsay, 2008). This strategy provides a guiding principles and doctrines for unified actions from all governmental levels and communities in response to major incidents and disasters. The major focus on the National Response Framework (NRF) is response and short-term recovery from a disaster, major incident or hazard. This strategy defines the roles and responsibilities of different governmental and non-governmental actors across the different stages of emergency… Continue Reading...

The Problem Of the European Parliament

a set of features well-regarded among modern society as being characterized by freedom, security, equality and so on, one could argue that who makes legislative decisions is less important than the outcome of those decisions and whether or not they align with the features that modern society seeks to have established in its culture.[footnoteRef:7] However, the specific character of democratic legitimacy is the way in which power is distributed—and that character is dependent upon the people having a voice in selecting their leaders or representatives and in shaping directly the laws that will be used to govern them.[footnoteRef:8] [4:… Continue Reading...

Military Tribunals or Federal Courts Terrorism

detain suspects indefinitely without a trial, ostensibly for “preventative” purposes proclaiming national security (Bennett & Litt, 2009, p. 1). However, Constitutional law is generally interpreted in ways that extend protections like Miranda rights to non-citizens of the United States (“Myth v. Fact: Trying Terror Suspects in Federal Courts,” 2018). Likewise, the United States has maintained offshore detention facilities, most notably the one at Guantanamo Bay, in order to conveniently and credibly circumvent the pesky legal constraints that would otherwise apply if detention centers sat more squarely on American soil even though technically such offshore locations count as American soil.… Continue Reading...

Theories and International Relations

of state level. Reflectivist theories incorporate the meanings of security in an expanded manner from post-colonial security, gender to class. International relations theories have a big role in helping policy-makers produce solutions that are effective instead of being regarded as being too abstract. In policy organizations that are foreign, people are not selected by their theories’ quality but by their quality of knowledge and intelligence of a particular area. Theories are usually created to give an understanding of reality of life. A good theory must be consistent, complete, proved by factual evidence, must have the ability of explaining what… Continue Reading...

Fraud and Accounting Balance Sheets

individuals regarding a fraud, than for one person to act singularly. References McCrie, Robert. (2016). security operations management (3rd ed.). Waltham, MA: Butterworth- Heinemann. Separation of duties. (2017). Accounting Tools. Retrieved from: https://www.accountingtools.com/articles/what-is-separation-of-duties.html Q1. While excessive liabilities in the form of costs are problematic, not all liabilities are equally so. Why is this? Provide an example. Firstly, liabilities with very low interest rates are not as damaging to a business’ bottom line as liabilities with high interest rates, as noted by Accounting Coach (2018). In fact, the ability to find lower interest rate loans can be a sign of health, as… Continue Reading...

The Characteristics and Attributes Of Biometrics

unique physiological qualities used in identifying a person. Biometric applications are often associated with security. However, the identification of the unique human characteristics scientifically has broader meaning and relevance bearing in mind that computer interface has become increasingly natural (Sareen, 2014). Jaiswal (2011) describes biometric as any robust, measurable, physical, and distinctive personal traits or characteristic of individuals usable in their identification or verification of their claimed identities. There are two categories of biometrics as described by Sareen (2014) i.e. physical and behavioral biometrics. Behavioral biometrics can be defined as a biometric that evaluates naturally acquired characteristics over some… Continue Reading...

New Equipment Development on Operation Influence Of Air Force

in force protection as well as enhancement of base security. The wellbeing of crews should be protected at all times. This is more so the case in reference to minimizing the risk of capture, injury, or loss of life. Unmanned vehicles come in handy in this endeavor. One of the key advantages UAVs have over manned aircraft is endurance. In essence, endurance is often greatly minimized in manned aircraft. This is more so the case given that such aircraft usually use consumable fuel – and the fuel quantity that can be carried is definitely finite. Although this is a… Continue Reading...

How Germans View the Holocaust

 Guilt about the Past. University of Queensland Press (Australia), 2013. Trojanow, Ilija, et al. "Attack on Freedom: The Surveillance State, security Obsession, and the Dismantling of Civil Rights." German Studies Review 38.2 (2015): 271-284. Zimmermann, Moshe. "Holocaust Angst: The Federal Republic of Germany and American Holocaust Memory since the 1970s." Israel Journal of Foreign Affairs  12.1 (2018): 1-4.   Continue Reading...

Assessment Of Security at City Hall New York

Assessment of security at city hall New York, 15 Center Street Introduction The New York City hall is the seat of the New York City government. The building is located at the center of the city hall park, civic center, lower Manhattan. The New York City hall is the oldest city hall in the United States of America and it houses the mayor’s office, the staff of some of the municipal agencies (White & Willensky, 2000). Despite its age, the building has been installed with various traditional and new… Continue Reading...

The Banking Act and Security

security Management: The 1968 Bank Protection Act In the 1960s, all banking was primarily done in person and in-house—i.e., a customer had to literally walk into a bank to make a transaction. This was well before the era of digital cash, when money could be moved from one place to another with the click of a few buttons on a keyboard. In the 60s, cash had to be on hand at the bank in sufficient quantities to meet demand—and that meant banks were a big target… Continue Reading...

Canadian Society Global Perspectives

by means of remunerated work or by support from social security. Defamilisation can for that reason be employed as a means of testing the degree to which welfare states, and welfare state administrations, enable female self-sufficiency and economic liberation from the family. References Hill, J., McCauley, T. P. (2010). Canadian Society: Global Perspectives. Whitby: de Sitter Publications. Ruspini, E. (2013). Diversity in Family Life: Gender, Relationships and Social Change. Bristol: Bristol University Press. Zajdel, K., Truhlá?ová, Z., Prokosz, M., Levická, J., Borecka-Biernat, D., & Mitlöhner, M. (2014). Social Problems of the Contemporary Families. Continue Reading...

Gender Status Impact Access to Social Political and Economic Resources

contribute as much as their female counterparts to familial food security and overall wellness. Though microcredit programs display potential when it comes to increasing females’ self-confidence levels and small-scale earnings generation, they may play a role in increasing their susceptibility and indebtedness. Lastly, they typically reach only the moderately poor, and fail to cater to the most destitute individuals (McGinn et.al 85). But, though some researchers have discovered that female entrepreneurs, employed females or those who are land/property owners display lower domestic violence experience rates, other researchers have revealed greater incidence, especially within conservative cultures reflecting the effects of… Continue Reading...

Conflict and Negotiation the Bophuthatswana Crisis Of 1994

to principles of due care, proportionality, and distinction are biased fundamentally often favoring protection of Americans and selfish security interests that contravene the just war theory. Goldstein & Pinker (2016) point the diminishing of chaos and war carnage in 2016 hence resulting to global peace. The past war escalation seems to be abating. Goldstein & Pinker (2016) gave examples of the cease fire in Ukraine and he formation of a unity government in South Sudan. Goldstein & Pinker (2016) believe that peace talks are a current proof that war violence can be overcome. Marc, A., (n.d.) offers statistical facts… Continue Reading...

Justification Of the State

Many countries that recently experienced conflict and turmoil politically cannot be relied on to provide security for their citizens. One of the common problems in such states is that there are no sufficient manpower resources to offer effective service in the military, police and other such services. In fact, where units of such services exist, they are widely viewed as part of the problem afflicting the people. The reasons for the perceptions are broad. They may be viewed as corrupt or supporting criminal gangs that operate counter to the wishes of the wider society. They may also… Continue Reading...

Improving Collaboration Between Agencies

these vices is relevant and should not be taken lightly. One year following the assaults, the Homeland security Act of 2002 initiated the central Department of Homeland security. This led to a ripple effect in numerous regions which developed individual divisions focused on safe keeping the motherland as well as handling crisis. There was complete overhaul in the already existing divisions in order to meet the novel standards (Bush, 2002). Handling crisis is imperative. Federal regions are mandated to address the shift in weather conditions which have led to adverse regular climatic conditions. The 50 regions as well as… Continue Reading...

International Law and World Government

authority it exercises. The organization has achieved the feat in a range of ways including the security Council sanctioning a country as a response to a threat to prevailing security. It may also do so when there is a threat to public peace and aggression as highlighted in the UN Charter. Nevertheless, use of the armed forces is not among the options that the UN has on its cards. Other examples include the fact that they rely on their image to the public that they are a more humane option. Sanctions are treated as an option of the last… Continue Reading...

Impact Of Nurses on Health Care Policy

those guidelines. The guidelines exist to provide patients with some sense of security with respect to healthcare provision, and there is little reason why nurses should find fault, on a high level, with that concept. There might be individual rules or laws that nurses might struggle with, but ultimately the regulatory bodies exist to ensure a high standard of care, and nurses generally should agree with that. Regulators therefore can have a fairly significant impact on healthcare delivery. While the intent is that this impact is positive, that might not always be the case, especially where regulations prevent some… Continue Reading...

The American Dream Today

very existence can be turned upside down. There is a lot less security today. One cannot be sure of anything. That is why Estrich states: “there is a lot going on in the world, and most of it seems frightening, depressing and utterly beyond our control” (476). The modern world is not a place in which dreams can become true. It is a place where more likely than not, a nightmare is going to be one’s reality. The nightmare is just waiting around every corner: crime, oppression, poverty, homelessness, disease, the broken family, the loss of one’s savings—it is… Continue Reading...

Stopping Of Female Genital Mutilation

modern day. FGM violates the rights of women and girls to their physical integrity, security, health, freedom from cruelty, torture, degrading and inhumane treatment. FGM violates the victims living rights when the FGM procedure leads to their death. FGM experiences exacerbate the short term and long term health consequences for girls and women affected by the vice. It is unacceptable from the health and human rights perspective. With FGM the risk of adverse health outcomes increases FGM severity. The world health organization opposes any form of FGM (WHO, 2019). The organization is also resolute in its opposition to this… Continue Reading...

Conflict Mapping in South Sudan

IGAD has led peace negotiations between the warring parties. In addition, the UN security Council has often called for sanctions as well as authorized additional peacekeeping resources to bolster the ongoing interventions. Dessalegn (2017) identifies that the peace intervention has entailed multiple ceasefire agreements between the government and rebels which are often violated. In August 2015, a Peace agreement was reached between the government and Sudan People’s Liberation Movement/Army-In Opposition (SPLM/A-IO) with intent to unite the warring parties. A transitional power-sharing government was established in 2016 with Kiir as the President and Dr. Machar as the Vice President. The… Continue Reading...

Fire Administration and Efficient Performances

a division under the United States Department of Homeland security (DHS). Created on the 1st April 1979 by the US former president, Jimmy Carter and was brought under DHS in 2003. For almost four decades of its creation, FEMA has been relentlessly committed to helping people before, during, and after disasters, which are its obligations as stated in its statutory mission statement. The agency has been helping US residents to prevent and avert impending dangers, and also providing succor to some in the event of natural and human-made disasters in the country. One of the responsibilities the agency is… Continue Reading...

Resistance to Technological Change

the resistance stems from a combination of mistrust, fear, loss of job security, and overall a total lack of leadership to help Figueroa bring about the change. She was put in the impossible position of making change happen on her own, as an outsider. There was really little hope of success, given that. Part Four I do not believe that Figueroa can resolve the situation, at least not on her own. The best approach would have been proactive, to work with the leadership of ASD, and tie her hiring to a broader strategic initiative. This is simply not about… Continue Reading...

The Minnesota Bridge I 35w Collapse Of 2007

radio and wire communications. The 800 MHz band reconfiguration implementation was a priority for the homeland security and public safety bureau (FCC, n.d.). The Minnesota bridge incident happened to be the first and most significant test for this 800MHz system (FEMA, 2007). The 800MHz was quite an asset for the police, firefighters, and the EMS responders. The system did not fail. There was only a twelve seconds incidence with bust time although that did not affect operations at all. The system was deployed effectively. The system streamlined communication during the emergency rescue operation and made it possible for successful… Continue Reading...

Public Administration Government and Interagency Relationships

those relationships and mandating accountability. The most notable example of mandatory interagency partnerships is in the realm of homeland security. Prior to the creation of the Department of Homeland security, interagency partnerships existed but tended to be loose and often ineffective (Hagen, 2006). The Department of Homeland security created a new model of interagency partnership that enhanced the effectiveness and scope of the homeland security enterprise, taking into account multiple disparate stakeholders (Marcella, 2004). Interagency partnerships also flourish in law enforcement and criminal justice, as with the Organized Crime and Drug Enforcement Task Forces (United States Department of Justice, 2017).… Continue Reading...

Developing an Annex for an Emergency

Law Enforcement will be responsible for securing the area, providing security at the scene, controlling traffic, and evacuating personnel. In the event of a train derailment, Level 2: State Office of Emergency Management will assume Incident Command. Local Fire will coordinate with Hazmat, which will remove hazardous materials and facilitate in the clean-up with local FD. Local law enforcement will continue to provide security for the scene and evacuate the premises. In the event of a train derailment, Level 3: FEMA will assume Incident Command and manage local and state agencies in the containing, clean-up, and response. Terror threat… Continue Reading...

Challenges Of Globalization

move away from their home towns if they want economic security and good jobs.  This also means that the local governments no longer have a reliable tax base.  When this tax base disappears, so does the ability to provide the type of help and resources that any community, especially an economically vulnerable community, needs.   This can happen on a small scale in towns, or in a larger scale, for example the city of Detroit has experienced a tremendous negative impact because of the movement of manufacturing jobs out of the Detroit area.  The movement of these jobs out… Continue Reading...

The Rise Of State and Its Advantages

to between 4,000 and 3,000 BCE. This is when agriculture and trade escalated, subsequently boosting food security and economic stability. Some people and communities chose to abandon farming and delve into other economic activities of their interest (National Geographic Society, 2018) Tribes that lived further away from the equator required more advanced technology to fend for themselves. It is definitely easier to fish in a river than the antarctic ocean. These tribes were still able to survive thanks to their ability to improve their tools of work. Genetic evolution would have been much slower were it to be the… Continue Reading...

Why R2p Does Not Work

Protect 2015, 4.] [8: Alex J. Bellamy, “The Responsibility to Protect,” security Studies, 489.] [9: Justin Morris, "Libya and Syria: R2P and the spectre of the swinging pendulum." International Affairs 89, no. 5 (2013), 1267.] [10: Ramesh Thakur, “The Responsibility to Protect at 15,” International Affairs 92: 2 (2016), 422.] In the final analysis, R2P may have some noble ideals and principles at its foundation, but the outcomes, as shown by Thakur and the motives as shown by Gleijeses, indicate that these noble ideals and principles fall prey to the rather pragmatic sentiment of those who, like Evans, are willing to… Continue Reading...

Homeland Security and the Distinction Between Isr and Iaa

that are aimed at improving the informational and situation awareness to the department of homeland security. The capabilities of ISR have increased in demand since the incident of Hurricane Katrina. The same capabilities of ISR are the ones that are termed Incident Awareness and Assessment (IAA). The Incident Awareness and Assessment (IAA) capabilities have been leveraged to respond to various kinds of threats such as hurricanes, wildfires or even ocean oil spill. The ISR has the capability to provide invaluable situational awareness from various intelligence disciplines. The intelligence can be in the form of signals or imagery to the… Continue Reading...

Technologies Used by Isis the Terrorist Organizations

is often encrypted with end to end secure technology hence making it very difficult for security agencies to detect their activities online. Some terrorists have employed their hacking credentials and radio tools to listen in or eavesdrop on communication between security agencies. This way they are able to detect any potential threats to their terrorist missions. Drones, information hacks, eavesdropping on police communication and other unorthodox surveillance activities have been used by terrorists to counter the efforts of security forces. ISIS has been known to use threats, murder, kidnapping, population control, resource control to prevailing over Syria and Iraq.… Continue Reading...

Organizational Management

towards one another. This builds positive relationships, trust and security. The second stage—storming—is where the team’s leaders emerge. The third stage—norming—is where the group begins to come together as a single unit, with all members feeling comfortable about their roles, what is expected of them and so on. The fourth stage—performing—is where the team begins really executing at a high level; the goal of this stage is for the team to start achieving its goals and objectives. The fifth stage—adjourning—is where the team has finished its task and now the work is done; however, before disbanding, the team members… Continue Reading...

Securing a School Compound

Methods of security The American School of Paris is located at 41 Rue Pasteur in Saint-Cloud, France, and holds more than 800 students from grades K through 12. There is a gate at the west entrance and a gate at the east entrance, for cars coming and going. Numerous entrances and exits into the building are available. Because of a recent spate of terror attacks in major cities around the world, it is important to secure a building such as this one, where… Continue Reading...

Mobile Devices Networking Performance and Security Related Issues

Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted. Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission… Continue Reading...

Robo Calls Increase in Use

I.R.S.” 43.4m Search listings “Listing issues” 31.0m Travel “Discounted/free trip” 27.0m Preapproved loans “Ready to wire – only seeking some info” 26.2m Home security “Free installation/service” 26.1m Utilities “Save money – only require some info” 19.2m The above data sets clearly reveal that robocalls fleece and extort considerable public money, indicating the dire need for an effective solution to the issue. Moreover, clearly, several public domains’ efforts to effectively control the growth in robocall frequency has proven ineffective (Hibbard, 2014). For tackling this issue, the following recommended solutions may be adopted by society:  Blocking individual phone numbers. Android phones and Apple’s iPhone allow the blocking of certain phone numbers. Though… Continue Reading...

A Strong and Clear Boundary Between Church and State

the other hand, in case the government perceives that a certain religion is practising activities which put the security of the citizens to risk, they have a right to put into practice the appropriate measures (Mendelson, 1962). In the constitution of the United States, the first amendment entails protection of American civil liberties as well as amendment of any law concerning an initiation of a federal or state religion, hindering the freedom of speech, right to assemble peaceably and the freedom of the press. US is deemed to be a religious country and all religions should be granted the… Continue Reading...

Ethics and Technology at Homeland Security

Ethical Considerations for the Use of Technology to Meet Selected Homeland security Objectives Introduction The Digital Age has transformed the way the world works for better or worse. Technology exists to bring down nations’ infrastructures without ever firing a missile (Ten, Manimaran & Liu, 2010). New technology has been developed that can allow agencies to spy, snoop, monitor, and retrieve conversations had online, through email, on cell phones, or via text messaging. To meet security needs, using this technology has very real and practical advantages. At the same time, there are privacy rules and regulations that have to be… Continue Reading...

Biblical Counseling in Real Life

people have a personal need to feel bigger or better than they actually are. Crabb refers to it as “ security and significance” (p. 80), but ultimately it is rooted in a desire to find that in ourselves, which really only comes from God. They are all affected with the sin of pride because they do not want to give up that portion of the self that is preventing them from being united wholly to God. Pride is at the root of all the troubles that people have. Biblical Integration Biblical integration refers to the use of Scripture as the… Continue Reading...

Opioid Crisis in the United States

within 3 years; •    Additional resources have been allocated for port security initiatives that are designed to prevent illicit opioids from entering the country; •    In 2018, the U.S. Congress to passed the Substance Use-Disorder Prevention that Promotes Opioid Recovery and Treatment for Patients and Communities Act (commonly referred to as the SUPPORT Act) which represented the single largest legislative package addressing a single drug crisis in the country’s history (White House, 2019). Opioid deaths and current statistics In 2017, more than 47,000 Americans died as a result of an opioid overdose, including prescription opioids, heroin, and illicitly manufactured fentanyl,… Continue Reading...

Johnson and Johnson Human Resource Value and Contribution

teamwork. Employee benefits. This is the indirect and non-wage health, income protection and retirement programs that provide security for employees and their families.J&J has a comprehensive and competitive benefits programs to reward its employees. For example, in the U.S. J&J have choices benefits program. The program caters for the needs of employees and their families by providing health, retirement, disability and survivor choices. The benefits include: dental; medical; vision; life insurance; accident insurance; auto and home insurance; long-term care insurance; group legal insurance; disability coverage; commuter benefits program; tobacco cessation (Team, Directors and Governance, 2019). This benefits inculcates the spirit of… Continue Reading...

What Did Aphrodite Do for the Greeks

Aphrodite Biography Aphrodite was said to have been the most beautiful and sensual of all the goddesses. There are varying stories of her birth. One story holds that she was born from the loins of Uranus, when his sex was severed from him and thrown into the sea: Aphrodite emerged from the sea foam—a daughter of the sea, which is why one of the most famous images of her in artistic expression is of the goddess emerging from the sea (Graves). Homer in the Iliad indicated that Aphrodite was the daughter of Zeus and Dione. Regardless of her origin story,… Continue Reading...

Can Nato Still Keep the Peace

can cooperate without international institutions just fine. [6: John J. Mearsheimer, ‘The False Promise of International Institutions’, International security, 19:3, 1994-5] [7: John J. Mearsheimer, ‘The False Promise of International Institutions’, International security, 19:3, 1994-24.] From the standpoint of collective security theory, which admits that military power is a basic element of international politics and one that can be used to cause peace, the main focus is on managing military power. This is where NATO could be better used in diplomatic terms. Just because the power is there does not mean it has to be used—and the risk of… Continue Reading...

Does the United Nations Have Power

has a World Court—the International Court of Justices—and the security Council is responsible for monitoring issues and making reports, as it did in the Middle East in the run-up to the Iraq invasion by the U.S. The UN had reported that Iraq was not hiding weapons of mass destruction—and yet that did no good because the U.S. determined to invade anyway. The UN meanwhile can adopt resolutions that identify states as being human rights abusers. In 2016, the UN adopted a resolution identifying Israel as a violator of the human rights of Palestinians, yet, again, the U.S. has attempted… Continue Reading...

New Business Plan Swot Analysis

not professional in terms of its functionality, usability and its security. All told, we do feel that there is enough of an opportunity here. We are unsure of the exact potential, but know that we are providing people with information that is both valuable and is otherwise difficult to acquire. In that sense, we are part of the information that they need in order to aid their decision-making, and because we intend to be able to provide it on demand, that this will be successful. The SWOT analysis can be a powerful exercise because of the way in which… Continue Reading...

President Roosevelt New Deal Era

New Deal did not address unemployment. The Second New Deal did, and led to the WPA and the Social security Act, which provided not just jobs but also long-term financial security for Americans. New Deal vs. Progressive Legislation The New Deal echoed some of the Progressive sentiments, particularly in that both reflected the needs of the common person, and also in that both aimed to reduce corruption in the banking and corporate sectors. For example, the Sherman Antitrust Act of 1890 was a forebear to Roosevelt’s 1934 Securities and Exchange Commission (SEC). Continue Reading...

Hunger Eradication and Extreme Poverty

eradicating poverty and hunger in Africa. Africa Regional Overview of Food security and Nutrition report by the UN indicates an increasing prevalence of hunger in Sub Sahara Africa which reverts the progress realized in poverty eradication (ECA & FAO, 2018). The world recorded an increase in the population of undernourished people to 10.9 % (821 million) in 2017 from 10.5 % (784) in 2015. Sub-Saharan Africa accounted for the greatest increase in undernourishment recording a high of 237 million undernourished people in 2017. Figure 1; Source: FAO, IFAD, UNICEF, WFP, and WHO. 2017.The State of Food security and Nutrition in… Continue Reading...

America's Anti Immigrant Orders and Its Implications

bills on immigration. These orders inclusive of the one about border security where federal agencies have been ordered to build physical walls to lock those entering illegally through the border and to eliminate those immigrants who don’t have an authentic evidence to stay. And they do so without a court hearing. Moreover, other bills majored on terrorism and banned people from 7 islamic countries.out of the affected countries, six of them were Sudan, Libya, Somalia, Yemen, Iraq, and Iran and they were banned for a minimum of 90 days and Syria was permanently banned (Felter et al). Mr. Trump… Continue Reading...

The Enron Trial and Kenneth Lay and Jeffrey Skilling

Lay was indicted for twenty-one counts entailing conspiracy to commit securities fraud, false bank statement, wire fraud, security fraud and bank fraud by the Houston grand jury in 2004. While Kenneth Lay passed before the ruling by Judge Simeon Lake, Jeff Skilling was fined $45 million and sentenced to 24 years of prison in 2006 (Moncarz, Moncarz, Cabello, & Moncarz, 2006). Main Laws Violated in the Enron Scandal Civil charges were initiated by The Securities and Exchange Commission (SEC) against the former Enron CEO Kenneth L. Lay and Jeff Skilling for orchestrating a wide-ranging scheme to defraud through misleading public… Continue Reading...

Trump Versus Hawaii

that the government is mandated by the constitution to help the citizens preserve their security and be able to stay safe. The Trump vs Hawaii law of 2018 clearly has contentions. In terms of culture, the Muslims are affected since their rights to religion is monitored and certain practices banned in the United States. This infringes in their right to freely express themselves since they need the actual law to protect them as aliens. The civil rights act of 1969 protects them against slavery and any misdeeds since in the country they are viewed as illegal aliens and need… Continue Reading...

Development and Education Of Security Management

security Management 1. While some people may be better leaders than others, all people can lead and all people can learn to lead better. Discuss some ideas of how leadership skills may be improved. Development and education Leaders need to develop in their position. Owing to managerial tasks’ knowledge-based nature, the word “development” has been used to describe the continuous growth in skills and cognition of executives and managers. Managerial development is promoted via education that they may acquire in various settings (Fernandez et al., 2015). Attending and… Continue Reading...

Childhood Development Attachment Disorders

leave infants vulnerable should one or both parents perish. Infants experiencing healthy attachments will also evolve a sense of security that is essential for psychological resilience and the reduction of risk for separation anxiety and other attachment-related issues. This paper outlines the different attachment theories provided by Bowlby and Ainsworth, both of which show how attachment experiences are central to the evolution of fundamental social needs, such as trust in human relationships and the creation of sustainable connections with other people. Attachment Theory: Bowlby Bowlby’s attachment theory shows how attachment behaviors and experiences in early childhood can have lasting… Continue Reading...

Future Of Policing Law Enforcement

safety. Policing in the 21st century will include responding to the ongoing challenges of threats to national security, too. Finally, a shift in norms and values may help reduce the mass incarceration epidemic and liberate police resources away from antiquated drug policies. References IACP (2018). 21st century policing blueprint. https://www.theiacp.org/projects/21st-century-policing-blueprint The President’s Task Force on 21st Century Policing (2015). Final Report. https://cops.usdoj.gov/pdf/taskforce/taskforce_finalreport.pdf “What 21st Century Policing Means,” (2015). United States Department of Justice Archives. https://www.justice.gov/archives/opa/blog/what-21st-century-policing-means   Continue Reading...

Fracking

The greatest good for investors is a positive return. The greatest good for communities is health, safety and security. The greatest good for the oil/gas industry is a process of oil/gas exploration and production that can be achieved profitably. The greatest common good is therefore a safe, positive return, profitable method of retrieving oil and gas from the ground. Is this fracking? In its current state, the answer is no. Counter Argument The counter argument is that fracking is profitable, as both investors and promoters have suggested (McLean, 2019). They also argue that it is safe, as the California… Continue Reading...

Private Security and Homeland Security

Private security Trends and Movements Private security plays such a significant role in the efforts of the Department of Homeland security (DHS) that the DHS published in 2010 a Private Sector Resources Catalog that “centralizes access to all DHS resources targeted for the private sector including small and large businesses, academia, trade associations, and other non-governmental organizations” (DHS, 2018). One example of a private security firm within the catalog is TRIPwire Community Gateway (TWCG)—“a web portal designed specifically for the nation’s CIKR owners, operators,… Continue Reading...

Discrimination and Employment Law

a world with reduced pensions and an uncertain Social security system. Also from a utilitarian perspective, the reasons used to support discrimination are not supported by current studies. Older workers do not have deficient technical skills, nor are they less productive, so long as they have the physical and mental capacity to work at the job for which they were hired (Dennin, 2018). In short, companies should not discount the benefits of experience gained from hiring older workers and older workers are not taking jobs away from younger workers, particularly given that they are not necessarily competing with much… Continue Reading...