992 Search Results for Research on Terrorism
Criminal Justice
There are a large number of study designs that can be used to better understand issues in social sciences, including criminal justice (USC, 2014). Before a study design can be applied to a particular phenomenon or problem, however, Continue Reading...
20th century has been one of remarkable technological advancements and of increased need to further improve human existence and the speed through which man runs about its everyday life. These ideas alone have demonstrated an immense capacity of man Continue Reading...
The trainer will then focus on the steps to be taken to develop new skills. For example, if the trainer wants to talk about motivating, leading, negotiating, selling or speaking, it is best to start with what the learners do well before showing some Continue Reading...
Apple iPhone Company)
In the achievement of competitive advantages, desired financial resources, and satisfaction of the consumers and employees, business entities need to focus on enhancing effectiveness and efficiency of their marketing strategy. Continue Reading...
Self-Reflection:
Writing the proposal, annotated bibliography, and research argument on overfishing in the Pacific Ocean has been an exciting and challenging process. The exciting aspects of this task originate from the lessons and skills I have gai Continue Reading...
Rather, research findings should be available in a more condense manner, with options for greater detail provided for later review. Annual or semiannual journals could be disseminated that contain the latest research findings. This would make the pr Continue Reading...
customer's source] states that there are various types of qualitative approaches to research including the education filed approaches which includes the ecological psychology approach, the holistic ethnography approach, the cognitive anthropology ap Continue Reading...
computer used by the employee has either been compromised physically with a password cracking software (EC-Council,2010;Beaver & McClure,2010) or it has bee compromised remotely with the help of a keylogging software.A keylogger is noted by APWG Continue Reading...
19Combatting Terrorism Using Fusion CentersTerrorism is one of the major global security issues in the modern society, particularly due to technological developments and globalization. The 9/11 terror attacks on the United States highlighted the deva Continue Reading...
Terrorism in Iran: Fighting or Helping?Today, the 90 million people of Iran are confronted with a critically important juncture in their nations lengthy history which will have implications well into the future. The adverse impacts of longstanding cr Continue Reading...
Seaports Vulnerability to Submersible Vessels
Criminology
All countries of the world are struggling hard to provide peace to its residents and masses. After all the efforts and struggle, countries are still not completely safe from the dangerous at Continue Reading...
Sometimes, it is even necessary to carry out certain clandestine operations like deceptions, clandestine collection of information, covert actions, and also the carrying out of the exercise of distributing disinformation or misleading information, w Continue Reading...
By federal law, all passenger airliners now feature cockpit doors that are locked by the pilots from inside the cockpit. Likewise, pilot training now includes the specific instructions not to open the door in response to any occurrence or emergency Continue Reading...
Columbian Drug Trade
If Americans know nothing else about Colombia, they know that it is a place where people grow and package cocaine for use on the world market. This is, of course, a highly biased view of the country because Colombians do many th Continue Reading...
The assassination of Major General Qassem Soleimani
Introduction
In early 2020, January 3, the U.S. launched airstrike attacks around Baghdad International Airport and killed two of the most influential leaders in Iran, Iraq, and the surrounding regi Continue Reading...
ancient history of Yemen is filled with conflict and countless examples of conflict resolution, some successful but many disastrously unsuccessful. The country has been divided and reformed, the subject of colonization, the victim of several complet Continue Reading...
International Ship and Port Security (Isps) Code on Maritime Security
Impact of the International Ship and Port Security (ISPS) Code on Maritime Security
The study will be based on the question that "What is the impact of the International Ship an Continue Reading...
Immigration and the Muslim Population
9/11 changed the world -- especially in the U.S. in terms of Muslim-American relations and the way the word "terror" and "terrorist" is used to identify or refer to a group of people.[footnot Continue Reading...
open communication while resolving public safety concerns. Moreover, it demonstrates the efforts conducted by various agencies in training their personnel to form alliances with local community residents. The primary aim is to initiate quick respons Continue Reading...
Community Policing
Are community policing models an effective way of containing criminal activity and keeping neighborhoods safe? Should a city, town, or suburb adopt a "community policing model" as a way to take the pressure off the professional la Continue Reading...
The fact that it is neither arbitrary nor motivated by atavistic animosity in a vacuum distinguishes this type of infringement from those that are absolutely impermissible in principle.
Conclusion:
In a wider perspective, the issue of police profi Continue Reading...
The Failures of the Intelligence Community Leading to 9/11IntroductionThe investigation of the 9/11 terrorist attacks revealed a massive failure of the U.S. intelligence community. Despite numerous signs pointing to an impending terrorist attack, the Continue Reading...
Federal Government Response to Protect Americans From Attacks Targeting Civilians
With the rise of the Islamic state, many more people are becoming aware of global Islamist terrorism. The group's ability to carry out attacks on Western capitals is a Continue Reading...
The Aryan Nations Web site describes Redfearin as "an individual of cunning mind, violent tendencies and radical outlook who aided in the evolution of the Aryan Nations worldview as the organization moved into a future which was very different than Continue Reading...
S. law dating back to 1819 in more than a century (Gettleman, 2008).
Right of Innocent Passage
The other significant complication for enforcement action against maritime piracy arises in connection with the economic realities of maritime insurance Continue Reading...
The administration's disregard for international norms led to the excesses at Abu Ghraib Prison in Iraq, and attempts to circumvent congressional oversight over the activities of the Administration backfired. Faced with increasing criticism at home Continue Reading...
It also illustrates how many of the same human rights that the U.S. Supreme Court has interpreted and applied are protected by others in a similar way." (Youm, 2007)
It is noted that Louis Henkin stated of the U.S. constitutional system and interna Continue Reading...
Running Head: Study of Recommendations from the /11 CommissionStudy of Recommendations from the 9/11 Commission 5Recommendations from the 9/11 CommissionAmong the US citizens, 9/11 is one of the renowned dates that has remained clear onto their memor Continue Reading...
1. Introduction
A reflection on the events of June 16, 2015, presents Donald J. Trump in Trump headquarters eagerly awaited by passionate fans. Analogous to the looks on The Apprentice reality show, every bit of his appearance resembled a culturally- Continue Reading...
Businesses are always exposed to risks of several kinds, for which risk management becomes mandatory. To keep the corporation safe, an appropriate risk management program is obligatory even in times of uncertainty. Risk management helps in strengthen Continue Reading...
George W. Bush: A Biographical SketchGeorge W. Bush had been the 43rd President of the United States of America. His term lasted from 2001 to 2009. Bush, who was the eldest son of George H. Bush, the 41st President of the US, was the Republican Gover Continue Reading...
Weapons of Mass DestructionIntroductionThis paper addresses the methodology, and discusses the findings of the research. It also offers conclusions and recommendations for addressing the problem of WMD prevention. It applies the theoretical perspecti Continue Reading...