SEARCH RESULTS

YOU WERE LOOKING FOR :Organizational Security and Risk Perceptions

Essays 1351 - 1380

The Bahamas, Internet Security and Governance, and Challenges Facing the Islands

meant domain names, root servers and IP address administration" (Cute 2007). There is obviously a great deal more to the Internet ...

Careers in Health Information

produce accurate medical records and health information will be in increasing demand for some time, according to the Bureau of Lab...

Commercial Aviation and Technology

The screening of carry-on baggage incorporates a variety of automated screening technologies, including improved capabilities for ...

Overview and Criticism of the Welsh School (Aberystwyth) of Critical Security Studies

where there is the argument for the need to eliminate unjust social relationship, including gender relations and needs to be seen ...

Did the Attacks on America Affect Importers

laws combined with new technology being recommended would have a significant impact on logistics budgets (Chandler, 2002). Immedia...

Impacts to Law Enforcement

security. Others, however, condemn the Act because of its impact to American civil rights. Along with that condemnation has been...

MANAGEMENT, SECURITY AND INFORMATION TECHNOLOGY

man-in-the-middle attacks, wireless attacks, hackers doing their homework, monitoring vulnerability research, being persistent/pat...

Terrorists in Detention and the Rule of Law

that "not only ... [are] there are rules creating legislative, executive and judicial powers, but that these rules impose limits o...

Cyer Law Privacy v. Security

Businesses have an interest in free information flows. Businesses are also under a threat from cyber criminals and terrorists. Whi...

Information Technology for a Shopping Center

duel purpose, to provide a system, of observations and as a deterrent. The tying of the system with an IT system, will allow for a...

IA AND IS IN A HEALTHCARE INFORMATION SYSTM

not be enough to ensure protection of electronic patient information (Cannoy and Salam, 2010). Simply adding security tools and in...

An Overview of Database Security Concerns

been charged with a critical task. As our company moves forward and begins to implement several key initiatives in developing comp...

Theories of Justice, Ancient and Modern

even harder to achieve. This paper considers some of the principles of justice theories, how they differ from utilitarianism, how ...

NATIONAL SECURITY STRATEGY AND OVERVIEW

According to the specific NSS document, the approach toward national security involves a better foundation for American leadership...

Improving Appraisals at Englewood

allow for the strategic use of employees and to maximise productivity which may also be the source of competitive advantage would ...

Security The Perimeter to the Innermost Recesses

whether it be private physical or commercial physical security is much more complex than it was just a few decades ago. Physical ...

Issues concerning Terrorism

security is the most basic aspect of terrorist protection and this involves utilizing physical controls, such as locks, fences and...

Social Security Privatization - The Debate

In a paper of seven pages, the writer looks at Social Security privatization. The paper presents arguments against privatization. ...

Security Trade-Offs and Liberty

In a paper of three pages, the writer looks at security and liberty. The relationship between the two is examined. Paper uses thre...

DEFENSE ACTS TO PROTECT THE UNITED STATES

U.S. governments ability to examine terrorism financing and money laundering as well as allowing the government to closely examine...

The Problem of Energy Security

The writer looks at the concept and problems associated with energy security. The influences including but not limited potential d...

Security Topics

In a paper of four pages, the writer looks at discussion questions related to security. Terrorism is also considered, as well as t...

Educating the Public About Homeland Security

This paper discusses the use of violent images in the efforts to keep the public abreast of homeland security issues. There are f...

Cyber Security and the Human Element

In a paper of four pages, the writer looks at the human element in cyber security. Steps for drafting an effective approach to pol...

Application of an Outline

This essay indicates how the use of an outline aided in the creation of an essay that pertains to the Department of Homeland Secur...

Patriot Act and New Department

The Department of Homeland Security was signed into law in 2002, a year after the 9/11 attacks on America. Prior to that, the Patr...

The New York Stock Exchange (NYSE) and Foreign Firms

(Anonymous, 1992). The NYSE has been and still remains one of the most respected and certainly among the most recognizable of the...

How Social Security Can be Reformed

In five pages this research paper discusses Social Security and how it can be reformed with privatization arguments for and agains...

Firewalls and the Internet

In five pages this research paper examines the Internet and the need for firewalls for security reasons in a consideration of diff...

School Policing and Its Importance

In five pages this paper discusses the need for security and law enforcement on school grounds in the aftermath of the murders in ...