SEARCH RESULTS

YOU WERE LOOKING FOR :IT Security Ethics Assessing the Differing Approaches

Essays 1711 - 1740

Homeland Security Issues

In a paper of five pages, the writer looks at Homeland Security issues. Different research questions are proposed on the basis of ...

CHS Cybersecurity

This report discusses the need for the Department of Homeland Security to refocus its resources to include fighting cyber threats....

Department of Homeland Security - Ethical Violations

In a paper of three pages, the writer looks at the Department of Homeland Security. Instances of ethical breaches are explored. Pa...

Biggest Hacking in U.S. History

Just before Thanksgiving 2013, malware was installed on Target's security and payments system that was designed to capture all the...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

2002's Maritime Transportation Security Act

This research paper pertains to the Maritime Transportation Security Act, which was passed in 2002. Analysis is provided. Ten page...

Container Security Initiative, An Overview

This research paper/essay offers an overview of the Container Security Initiative (CSI), which is under the jurisdiction of the U....

Student Privacy Concerns Should Not Trump Effective Safety and Security Measures

This paper argues that student safety trumps Fourth Amendment rights when it comes to campus security. There are four sources in ...

Breach of PHI Confidentiality

This paper discusses patient personal health information (PHI) in terms of a major breach in confidentiality. HIPAA regulations an...

DOE and its Illegal Actions

The United States Department of Energy, in its attempt to prop us a uranium enrichment company that was failing, arranged for enri...

Two Fraud Cases

Fraud continues to be rampant in the corporate world. Prudential Securities were charged with late trading. A manager for Johnson ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Overview of Dept. of Homeland Security

This research paper offers an overview of the history, role, mission, and duties of the Department of Homeland Security (DHS). Fou...

CASE STUDY FOR VL BANK

Analyzes the legal and security factors occurring around the cyber attack against VL Bank. There are 3 sources listed in the bibli...

USE OF STRATEGIC STUDIES AND NATIONAL SECURITY

Analyzes strategic studies, and their strengths and weaknesses when it comes to national security. There are 5 sources in the bibl...

Security for Retirement in America

This 6 page paper gives an overview of the problems with securing retirement for older Americans. This paper includes issues such ...

Assessing Personalities

the client (APA, 2011). This would be spelled out in the limits to confidentiality agreement not yet signed. These same restrictio...

Assessing the Success of an IT Implementation in a Healthcare Setting

The writer presents a paper which looks at the implementation of electronic patient records for a company providing medical care f...

A Questionnaire to Assess Customer Needs and Satisfaction

explanation, giving the reason for the survey; to assess the product and services needs of the customers visiting Java Coffee. The...

Charter Schools and Vouchers: Assessing the Value

United States around the end of the 20th century, as something of a middle ground in the traditional dichotomy of public and priva...

A Case of Variable and Fixed Costs - Assessing Contribution and Breakeven Points

as the lease or rental costs, these remain the same regardless of production level. Overheads also include costs such as utility b...

Adult Children of Alcoholic Parents - Assessing the Negative Impacts

and effectively determine the true scope of the impact upon adult children of alcoholic parents, one must recognize that such data...

Identifying and Assessing a Project for a Healthcare Center

The Maimonides name was adopted in 1996; the facility was named in honor of the Rabbi Moshe Ben Maimon. Maimon was a Jewish twelft...

Assessing Budget Items for Town Budget

has been given as a single figure as $1,000,000. 5. The decrease in productivity is as having a cost of $35 per hour, with the ne...

Investigation to Assess the Impact of Downsizing on Employee Motivation

motivation on employees performance and business results has also been seen in the UK; a similar study took place with the Nationw...

Measurements to Assess Bank Performance

Turnover Referrals Cross Sales It is now possible to look at the way that these are all linked together by creating...

Implementing and then Assessing the a New Web Based Communication Strategy

The writer looks at a hospital planning on implementing a web chat facility on their corporate web site to increase communication...

Assessing An Intervention - A Statistical Analysis

BarOn EQ test control group 21 Table 21 Chi squares test to assess link between improvement in scores and the intervention 22 3.4 ...

Assessing an Investment for a Hospital

investment in the software program has a number of benefits as well as some challenges. The development of a system where patient ...

Assessing Student Tolerance and Respect for Cultural Differences

The creation of a self-assessment questionnaire about the level of empathy and respect for other cultures can be utilized to evalu...