SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 61 - 90

Strategies for Network Security

employees; and a plastic container plant in Georgia, with 45 employees. Each of these locations is required to maintain records pe...

Employee Rights and Organizational Security

be addressed, such that best practices can be established in order to balance the needs of employers with the rights of employees,...

Security in Organizations

of required training for "private security personnel" (Moore, 1988). In fact, the employment of private security agents may prove ...

Using Encryption as a Key for Corporate Security

during or after encryption has been implemented. If the implementation or the encryption is not properly planned and realized, the...

Technology Uses in Accounting

In this paper consisting of six pages using technology to automate accounting procedures is examined by determining a correlation ...

Uses of Technology in the Classroom

in order for the children of today to be "effective leaders and productive citizens" of tomorrow, they will require confidence in...

Computers and Usage of Security Blankets

the "intangible traces" of traditional learning, there are now electronic "artifacts" that can be owned, reproduced, and marketed....

Electronic Monitoring Devices/Parolees and Prisoners

in prison (Biniok, 2004). They contend that the costs of electronic supervision are unacceptable, even that such supervision viol...

An Argument Against Reforming Social Security at the Present Time

Roosevelt himself - promoted the plan as one in which individuals would pay into the system over the course of their working lives...

Nursing Education and Technology

In a paper of four pages, the writer looks at nursing education and the use of technology. The uses of various technologies are ex...

Security - The Psychological and Practical Aspects

In a paper of three pages, the writer looks at the topic of risk management. Practical security as well as psychological security ...

Modern Airport Design - Security Measures

perimeter control at facilities (Transportation Security Administration, 2004). This is handled in a variety of ways, from the obv...

Chief Security Officers - Role and Responsibilities

stage of the plan necessarily involves developing an understanding of recent security breach events at similar institutions, ident...

The Homeland Security Act and Its Effectiveness

a truly positive impact can be measured. Such an analysis is sorely needed as the United States currently operates several hundred...

Security in a Role-Based Environment

everything in its power to ensure that its vital sensitive information is kept secure. There are many ways to go about providing t...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

Representation Of National Identities In Media - A Case Study, News Coverage Of Turkey On The Doorstep Of European Union (EU).

of power. The aim of this research paper is to ascertain the way in which the power is used to represent national identities in th...

Decision Making in Schools and Information Technology's Uses

it the potential that is valuable, but there is even a duty of school to take advantage of technology. Where schools are concerned...

United States and Azerbaijan 2004 National Security Strategy

a national infrastructure, including law enforcement and anti-terrorism military, aided by the U.S. Resolving these issues...

Professional Sports and Collective Bargaining

aimed at preventing a lockout or restrictive system if a collective bargaining agreement could not be reached. It would appear th...

China Question and the National Security Council

According to the Office of the Historian in the Bureau of Public Affairs of the U.S. Department of State (), the National Security...

Global Politics and National Security

In two pages this essay examines national security, international politics and contemporary problems with China among the topics d...

Global Peace

In two pages this essay examines the Kosovo crisis in a consideration of national security and world peace issues. Three sources ...

Contemporary World and National Security

In three pages this research paper defines national security and also considers Arnold Wolfer's description that the concept is 'a...

The Power to Persuade by Richard Haass

In three pages this text by the onetime National Security Council's Senior Director for the Bush Administration is examined in a c...

Press Censorship and the Government in the 1991 Case of The New York Times v. United States 403 U.S. 713

In two pages this paper examines the extent of government privilege and the press when there is a national security issue as it re...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Nuclear Power and India

In fifteen pages this paper discusses India and nuclear power in a consideration of national security issues and Hindu nationalism...

The Changing Middle East and the Feasibility of Trade

This 7 page paper discusses changes that have taken place in the Middle East with regard to their impact on international trade in...

Labor Relations Laws and the 'Right to Work'

individuals in a new workplace would chose union participation and pay union dues. Many individuals either find union dues cost p...