301 Search Results for Sociological Security the Sociological Structure
The DHS is consistent with the larger social trend on a global scale concerning institutional security measures insofar as Risley (2006) reports that "the securitization of an ever-expanding number of realms is a distinguishing feature of the conte Continue Reading...
This researcher rejects the existence of online communities because computer mediated group discussions cannot possibly meet this definition. Weinreich's view is that anyone with even a basic knowledge of sociology understands that information excha Continue Reading...
The criminal justice system, according to Karl Marx, is thought to work for the rich while the resulting policies are more concerned with controlling the poor. Seigel and Welsh state that, "conflict theorists observe that while spending has been cut Continue Reading...
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many function Continue Reading...
.." while more than sixty percent of women in the developing world represent those employed in domestic work, street trading and other low paying jobs lacking in "security, benefits, and legal protections..." (2005) Within the informal sector of empl Continue Reading...
Eurosec Automation and Security Systems
Identifying Eurosec Automation and Security Systems resource capabilities
Choosing the geographical location
Methods of Expansion
Finance and Information Technology
The organisation Eurosec Automation and Continue Reading...
Security Study
Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, an Continue Reading...
Aviation Safety
Aviation Security
"As the first flights began again on September 15, some crews refused to fly, not confident of airport security. Those who steeled themselves to work entered a strange new workplace. With no guidance from the airli Continue Reading...
In the post-World War II model Japan, under the economic and political influence of the United States, began repairing its economy and was a clear strategic ally for the U.S. In relation to the Soviet Union. As Japan became more and more sophistica Continue Reading...
Notwithstanding these positive trends, the glass ceiling is not broken (although it has been cracked a bit) and even telecommuting is used in different ways with male and female employees. For example, Arnow-Richman points out that, "While telecomm Continue Reading...
Furthermore the rhetoric here is rich in symbolism. Dr. King draws parallels between the response of violence to his peaceful protests and other great personalities whose commitment to justice, truth, and love also had unintended and unfortunate co Continue Reading...
" (Willmott 2000) in other words, the reality of death is removed to the edges of culture and society; which means that the significance and reality of death is in effect 'anesthetized' by institutions such as the medicine and science. As Giddens sta Continue Reading...
Ethics
In viewing the basic definition of bureaucracy and in noting some of the country's most recent examples of success and failure in the bureaucratic business world, one can see that the issue is clearly two-sided and will likely remain so for Continue Reading...
Social Changes for the American Family: Today and in 10 Years
The next ten years will see a greater variation in the structure of families and marriages, with much greater variations and flexibility than has ever been the case in the past. This wil Continue Reading...
When speaking of visibility and demeanor, he refers to the fact that the Saints had access to vehicles to take them out of the eyes of their regular neighborhood, where as the boys did not have this privilege and therefore had to commit their delinq Continue Reading...
White Collar Crime
Theoretical Perspectives of Criminal Behavior
Three broad theoretical models of criminal behavior have historically prevailed. These models include psychological models of criminality, sociological models of criminality, and biol Continue Reading...
Crime and Deviance
Crimes and increasing criminal activities have become a major concern for the security enforcement agencies. They seek help from technology as well as social and psychological theories to prevent crimes and deal with them. The fi Continue Reading...
Gender-Specific Therapy for Women Prisoners
RESEARCH QUESTION AND JUSTIFICATION
On average, women make up about 7% of the total federal and state incarcerated population in the United States. This has increased since the 1980s due to stricter and m Continue Reading...
Offenders here might physically transport cash to those countries in small amounts that will not violate customs regulations. However, this method is not viable for transferring large amounts of money.
Very large amounts of money can be informally Continue Reading...
Israel
Explanation of the Issue: Introduction
The most recent escalation of conflict in Israel and Gaza show that the current situation is untenable. This paper examines the history of the creation of the state of Israel and the aftermath of the Ba Continue Reading...
Sexuality and Stigma in Cinema: Gay and Transgender Representation
According to the sociological theorist Erving Goffman, to bear a 'stigma' is to viewed by society as abnormal. "Stigmatized people are those that do not have full social acceptance a Continue Reading...
Emotional Labor
Implications on a Call Centre
During the last two decades Contact or call centers have emerged as the answer to cost effectiveness for all sort of businesses that require back end customer services (Boreham et al., 2007). These call Continue Reading...
Change
This study analyzes outsourcing trends in the next decade. The study assesses this by focusing on the past and current trends, problems and issues in outsourcing via semi-structured interviews. Major trends and processes will be revealed and Continue Reading...
Computerization of production in recent years has become quite common, and there are now four versions of the application of computer technology in the production of computer-aided design (CAD) involves the use of computers to design parts and prod Continue Reading...
For example, Ehrenreich tamed her naturally assertive nature into a more tame and likable demeanor: one that corresponded with gender norms as well as with norms for prospective employees. Working with one career coach in Georgia, the author present Continue Reading...
Police Reform in Post-Authoritarian Brazil
A majority of new democracies entail an unbelievable illogicality of an immensely feeble citizenship coalesced with a stern description of the constitutional guarantees. In order to explicate this disparity Continue Reading...
Criminology
Five main risk factors for criminal victimization
Cohen, Kluegel, and Land in their article Social inequality and predatory criminal victimization: An exposition and test of a formal theory adopts the interpretation of five factors in a Continue Reading...
Furthermore, it is suggested that the roots of the problem lie deeper than the superficial debate about gun control. In sociological terms, this problem is to do with the lack of meaning and the breakdown of inherent normative structures. In this s Continue Reading...
Resolving a Social Problem:
As mentioned in the first assignment, one of the main social problems in the modern society is crime, which is basically defined as an offense against public law. Since it is a major social problem, crime has significant Continue Reading...
A favorite target for conspiracists today as well as in the past, a group of European intellectuals created the Order of the Illuminati in May 1776, in Bavaria, Germany, under the leadership of Adam Weishaupt (Atkins, 2002). In this regard, Stewart Continue Reading...
The extreme power of this new cultural tool is the very nature -- it depends on nothing but an electronic connection. it, like many things in the modern world, is instantaneous, satisfying the 21st century need to have both dependence and independen Continue Reading...
Narco-Terrorism
Narco- terrorism can be seen from a number of perspectives. The term is commonly applied to the use of terrorist techniques by drug traffickers and dealers to distract attention from and facilitate drug abuse. An accepted definition Continue Reading...
influential theories related to deviance by Robert K. Merton. Firstly, the paper provides the historical context within which the theorist produced their ideas. Secondly, the paper provides a summary of their original theory. Thirdly, the paper prov Continue Reading...
Treatment vs. Punishment
Treatment Concept
Juvenile crime is often serious because of the ability to represent a significant proportion in relation to the total criminal activity within the community. The normal assumption indicates that adolescent Continue Reading...
The Liberal and Conservative parties are therefore in a battle to "out-do" each other, in terms of producing the most workable, viable and therefore, acceptable, policy towards these issues, at any given time during their time in office, or their el Continue Reading...
Rather than lamenting the loss of a family structure from an admittedly anomalous decade, Stacy (1993) argues that social reforms are necessary to ensure that children are cared for.
In Beck-Gernsheim's (2002:85) assessment, the focus should not be Continue Reading...
Criminology
Criminal Victimization
Crime is the breaking of rules or laws for which a legal system can provide a conviction (Darrow & Baatz, 2009). Historically, individual human societies have defined crimes differently. Crimes can be consider Continue Reading...