SEARCH RESULTS

YOU WERE LOOKING FOR :Globalization and Security of the United States

Essays 3121 - 3150

Supreme Court Rulings' Interpretation on Equal Protection and Affirmative Action

In this paper consisting of seven pages various Supreme Court rulings as they relate to affirmative action are discussed within th...

DRUG TRADE IN LATIN AMERICA: TRANSNATIONAL/INTERNATIONAL SECURITY STRATEGIES

reduction tools and, to an extent, education on the evils of drug use (Seelke et al 2010). The results have been mixed to not-so-g...

Assessment of the USPS Strategic Plan

In 2008 the United States Postal Service released a new strategic plan with the vision of creating an organization that would be a...

IT Security Ethics - Assessing the Differing Approaches

and academic institutions, the concept has spread to address the basic concern of what behaviors are appropriate when dealing with...

Global Security and Safety Following the Cold War

in the Cold War, therefore, would not come without a great expense to both powers. When the Cold War...

Business Information Systems, Control, and Security

In ten pages this paper discusses the Singapore Electronic Hotbed Program in an ecommerce overview that examines electronic commer...

Post 1945 East European and Moscow Security Affairs

In seven pages this paper discusses the fall of the Soviet Union and the increase in Poland's Solidarity power. Seven sources are...

Comparative Legal Approaches to Homeland Security and Anti-Terrorism by James Beckman: A Book Report

changed" (5). The text consists of an Introduction, seven country case studies (the United States, the United Kingdom, Germany, S...

Terrorism, Maritime Security, and Shipping Containers After the September 11, 2001 Attacks

weapons in outwardly harmless looking shipping containers (Smith, 2002). This report strongly suggests that delivering such nucle...

International Cooperation and Maritime Homeland Security

International cooperation in regard to thwarting maritime terrorism leaves much to be desired. This relates to a number of proble...

Using Physical Security to Make Aviation Safe

security of their facilities, as instructed by Federal Aviation Regulation (FAR) Part 107, enacted in 1971 (National Research Coun...

Auto Plants in Mexico Owned by the United States and the Impact of the North American Free Trade Agreement

loss of many American jobs and the exploitation of inadequately paid Mexican autoworkers. When such workers were questioned reg...

RISK MANAGEMENT IN JUSTICE AND SECURITY ORGANIZATIONS

The concept of risk management is fairly straightforward: It involves a "systematic approach to analyzing risk and implementing ri...

IS IT WORTH IT? BRINGING SOCCER’S WORLD CUP TO THE UNITED STATES

the advantages to hosting such an event? Even more importantly, how is it that a nation that is not anywhere near as soccer-mad as...

Security and Risk Management

Emergency preparedness is something in which societies often invest tremendous...

Asian Economic Crisis and the Economic Policy of the United States During the Presidency of Bill Clinton

In five pages this paper discusses how the US economy was affected by the economic crisis in Asia during the late 1990s. Six sour...

Security Risk Management and Disaster Recovery

In five pages the necessity of risk management especially in terms of disaster recovery is examined from a business perspective. ...

Were Japan and Germany Treated Differently by the United States During the Second World War?

This paper consists of five pages and considers the U.S. treatment of adversaries Japan and Germany during the Second World War an...

1992 U.S. Supreme Court Case Jacobson v. United States

In one page this Court ruling is discussed. There are no other sources cited....

Overview of the US Supreme Court Case United States v. Marion

process leading to the indictment, and that no issues of expediency were claimed regarding the time frame between the indictment a...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Information Security

In six pages this paper discusses computer information safety and the dangers posed by hackers. Seven sources are cited in the b...

Health Security Act of the Clinton Administration

In fourteen pages this essay discusses the Clinton Administration's proposed health care reforms and the controversy they have ini...

National Security Council's History and Origin

In twelve pages the NSC is examined in terms of its origin, the role played by President Harry S. Truman, and its controversy. Se...

Statutory Employment Policies versus Job Security

for mediating conflict and compensating for job loss (Mosley, 2001). The vast majority of employment protection policies were firs...

Employee Retirement and Income Security Act Provisions for Funding and Termination

In fourteen pages the ERISA is presented in an overview that considers termination and funding in regards to loss allocation and m...

What Went Wrong in the United States According to the Writings of Plato, Karl Marx, Lao Tzu, Niccolo Machiavelli and Frederick Douglass

The writings of 'The Republic,' 'The Communist Manifesto,' 'Tao te Ching,' 'The Prince,' and 'Narrative of the Life of Frederick D...

Overview of Motown and Post 1945 Impacts of Black Identity, Gender, Class, and Race on the United States

In twenty six pages this paper examines the post World War II changes in American culture with regards to race, class, gender, and...

Internet Security and Software

In nine pages this report discusses software designed to ensure against credit card fraud over the Internet. Seven sources are ci...

U.S. Basin and Range Province Origin and Physical Characteristics of the Basin & Range Province in the United States

In five pages this area is examined in an overview of physical characteristics and geologic regional development. Four sources ar...