Justifying Research Methods and Design
Insider threats are one of the primary sources of risk to an enterprise network and to intellectual property. For decades, the internet security realm has been rather narrowly focused on pre-empting insider th Continue Reading...
Understanding the Value of Qualitative Research
Qualitative researchers have a number of different research strategies available to them, including case studies, phenomenology, grounded theory and ethnography. Each of these research strategies has it Continue Reading...
Marketing Canon: Approaches Based on Principles for Influencing Decision Making in Firms
Operating in several geographical locations, quite a number of firms have many product lines, which many marketing scholars believe are ever confronted by myri Continue Reading...
It's a tidal wave that's going to engulf us all within the next five years. Cloud services will be a $160 billion industry by the end of 2011" (Ginovsky 2011, 21).
Although the decision to transition from a traditional approach to cloud computing w Continue Reading...
Management Strategy to Utilize Meta-Analysis Technique for Nuclear Energy and Waste Disposal and Create Social Sustainability
This research proposal explores the link between public perceptions of nuclear power, how those perceptions are formed, an Continue Reading...
This approach to defining a performance-based taxonomy will also allow for a more effective comparison within industries as well. All of these factors taken together will provide enterprise computing buyers with more effective foundations of arguing Continue Reading...
Role of Technology in Corporate and Social Responsibility
Insider trading. The insider trading case that has become most prominent is that against Raj Rajaratnam who ran the hedgefund Galleon Group, and was charged along with his co-defendant, Danie Continue Reading...
interventionism from the perspective of realism vs. idealism. Realism is defined in relationship to states' national interests whereas idealism is defined in relation to the UN's Responsibility to Protect doctrine -- a doctrine heavily influenced by Continue Reading...
Computer Games Research
When considering the short history of computers, video and PC gaming are very recent on the timeline of technology. This is one of the reasons why there have not been many conclusive studies on the negative and/or positive ef Continue Reading...
A favorite target for conspiracists today as well as in the past, a group of European intellectuals created the Order of the Illuminati in May 1776, in Bavaria, Germany, under the leadership of Adam Weishaupt (Atkins, 2002). In this regard, Stewart Continue Reading...
The following diagram represents the structure of the idea.
Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan
Objectives of the Study
The overarching objective of this study is to build a solid portfolio manag Continue Reading...
Mortgage Fraud
If a rash of armed bank robberies swept across America next year, and if in these robberies criminals absconded with $30 billion dollars, one may be certain that a public panic would ensue. The banking system would likely be changed f Continue Reading...
Unethical/Criminal Conduct following the Equities Market Crash 2000 to 2002
This paper is a discussion of the identification and analysis of unethical and criminal conduct following the equities market crash from 2000 to 2002. The paper begins with Continue Reading...
Franks (along with the Bush war cabinet, including Vice President Dick Chaney) "met repeatedly" to plan the attack on Iraq. It was groupthink through and through. At the same time Bush was saying publicly he was "pursuing a diplomatic solution" (Ham Continue Reading...
Culture that Encourages Human Rights
Americans were shocked when they learned about the abuse of prisoners at Abu Ghraib. Or were they? Certainly, the media reported shock and outrage on the part of the public to the unpleasant revelations. But the Continue Reading...
Foreign Policy of China (Beijing consensus)
Structure of Chinese Foreign Policy
The "Chinese Model" of Investment
The "Beijing Consensus" as a Competing Framework
Operational Views
The U.S.-China (Beijing consensus) Trade Agreement and Beijing C Continue Reading...
finance and financial entrepreneurship. The basis of the article is on a discussion that was held on this subject among four leading lights of financial entrepreneurship in the United States - Michael Milken, Lewis Ranieri, Richard Sandor and Myron Continue Reading...
…[…… parts of this paper are missing, click here to view the entire document ]…OccupationalStressandScientificMonitoringLiteratureReview2.1IntroductionThedefinitionofthetermoccupationalstressisderivedfromthedefinitionofitstwoc Continue Reading...
Military Intelligence
The objective of Part One of this study is to examine the use of Unmanned Vehicle Systems in intelligence collection and how this has expanded significantly. This work will discuss the major trends in UV utilization in intellig Continue Reading...
Forming a Bank Holding Company - Structure, Governance, and Regulations
Understanding Banks
Forming and Expanding a Bank Holding Company
Financial Holding Company Requirements
BHC Regulations
Capital Building Options for Bank Holding Companies
Continue Reading...