SEARCH RESULTS

YOU WERE LOOKING FOR :History of the Social Security System

Essays 1591 - 1620

Sophocles, Gilman & Browning/Oppressed Women

finer points of interpretation. However, the general consensus, down through the ages, is that Sophocles main theme had to do with...

Math Through the Ages, A Gentle History

as, in this case, devising symbols for replacing long strings of tallies. In this section of the book, the authors present math ...

One of the Negatives of Advanced Technology: Identity Theft

his or her social security number written on various documents, someone that throws all mail into the trash without securing vital...

E-Mail Security on Laptops

e-mail. However in a wireless environment there are other challenges, such as the collection of the e-mail in the first pl...

Influences of IT on a Financial Services Company

This 4 page paper looks at information technology in financial institutions and considers influences such as the Sarbanes-Oxley, v...

Orwell/1984 Overview

and the public. Party slogans exemplify doublethink, as they proclaim that war is really peace, freedom is really slavery, etc. Wh...

Airport Security, Long Lines And Solutions

arrivals at all major airports in the U.S. is between 70 and 75 percent (Howarth and OToole, 2005). And, there are other reasons....

Policy Proposal: Preventing Assault

you have a potentially volatile atmosphere" (Hughes, 2005). Kowalenko, Walters, Khare, and Compton (2005) surveyed 171 ED p...

US Foreign Policy, National Security & Terrorism

as "not free" (Eland 38). It is therefore simplistic to think that terrorist leaders, such as bin Laden, would close up shop due t...

Organizational Security; Terrorism and the Threat of Hezbollah

parties that represents Shiite Muslims, the largest religious group in Lebanon. In the Lebanese parliament there are 128 seats, He...

Do Women Need To Get Married?

own reason for and support of the holy vows of matrimony. For example, marriage is a very natural and expected occurrence within ...

Global Security Environmental Changes

States power and security position? Many questions linger. Since the cold war has ended, many thought that it was the end of secu...

Organizational Security in the Face of National and International Risks

time they must be accountable for their decisions, for decisions as diverse as those made in human resources, architectural and in...

Uncle Sam and Juggling Two Wars

a formidable presence in Afghanistan we are beginning to pull troops back from around the world and to more efficiently consolidat...

Three Sections on Organizational Theory

to each other. Some managers do not seem to realize that as other forces impact the business of the company, it is necessary for t...

Online Shopping Analysis of Singapore's NTUC FairPrice Supermarket Website

unless the customer or his/her agent is there to sign for it and make payment (FairPrice, Terms 2002). Third, the Terms and Condi...

Coordinating Maritime Transport and National Security

This paper suggests that current approaches to national maritime security are ineffective and suggests two specific areas that nee...

Was the Iraq War Illegal?

In 2003 the United States, the United Kingdom, and Australia invaded Iraq. The war was controversial, justified to many of the ele...

UN Resolution on Libya 1973, The German Abstention

This research paper/essay pertain to the reasons why Germany abstained in regards to UN Security Council Resolution 1973, which pe...

Press Censorship and the Government in the 1991 Case of The New York Times v. United States 403 U.S. 713

In two pages this paper examines the extent of government privilege and the press when there is a national security issue as it re...

Hackers and Hacking

Hacking is an ongoing issue in computer security. This paper examining the issues associated with hacking. The paper starts by exa...

Homeland Security and the Unintended Consequences of their Polices and Practices

Any official policy or practice will have both intended and unintended consequences. This paper looks at some of the ways in which...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Pros and Cons of the Federal Government's Witness Security Program

In six pages this paper assesses the positive and negative aspects of the federal government's witness security program. Five sou...

Educating the Public About Homeland Security

This paper discusses the use of violent images in the efforts to keep the public abreast of homeland security issues. There are f...

The Problem of Energy Security

The writer looks at the concept and problems associated with energy security. The influences including but not limited potential d...

Security Trade-Offs and Liberty

In a paper of three pages, the writer looks at security and liberty. The relationship between the two is examined. Paper uses thre...

Security Topics

In a paper of four pages, the writer looks at discussion questions related to security. Terrorism is also considered, as well as t...

Application of an Outline

This essay indicates how the use of an outline aided in the creation of an essay that pertains to the Department of Homeland Secur...

Homeland Security Issues

In a paper of five pages, the writer looks at Homeland Security issues. Different research questions are proposed on the basis of ...