SEARCH RESULTS

YOU WERE LOOKING FOR :Organizational Security and Risk Perceptions

Essays 1531 - 1560

Security Topics for Computers

In a paper of four pages, the writer looks at computer security. Honeypots are examined as an example. Paper uses six sources....

Department of Homeland Security - Ethical Violations

In a paper of three pages, the writer looks at the Department of Homeland Security. Instances of ethical breaches are explored. Pa...

Homeland Security Issues

In a paper of five pages, the writer looks at Homeland Security issues. Different research questions are proposed on the basis of ...

CHS Cybersecurity

This report discusses the need for the Department of Homeland Security to refocus its resources to include fighting cyber threats....

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

Discussion Questions on Cyber Security

In a paper of four pages, the writer looks at cyber security discussion questions. Topics such as spyware and adware are addressed...

Coordinating Maritime Transport and National Security

This paper suggests that current approaches to national maritime security are ineffective and suggests two specific areas that nee...

UN Resolution on Libya 1973, The German Abstention

This research paper/essay pertain to the reasons why Germany abstained in regards to UN Security Council Resolution 1973, which pe...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Solutions to System Security Issues

data to a controlled group. One can easily discern the difference by recognizing the fact that Internet-based applications make u...

Collective Security and Socioeconomic Development

In five pages this paper discusses collective security issues and the impact of socioeconomic development on such matters through ...

U.S. Foreign Aid Past and Present

In thirty five pages this paper examines the history of foreign aid with a consideration of the Third World debt crisis and includ...

Establishment of a VPM

no long distance phone charges. While a telephone bill may seem to be a minor expense, when many employees access an 800 number, t...

Overview of National Security

In ten pages this paper examines the national security concept and the many changes it has undergone in recent decades. Seven sou...

Conflict Between Public Protection and the Public's 'Right to Know'

In 5 pages this paper examines national security censorship of information by the FBI in order to protect the public, the public's...

Post 1945 Russian and Eastern European Security Affairs

In five pages this paper discusses the measures these regions took with regards to security following the Second World War until t...

National Security and Use of Technology

In eleven pages this paper discusses the asymmetric approach to warfare in a consideration of national security and the implicatio...

Social Security Privatization Supported

In six pages this report supports privatization of the U.S. Social Security system in a consideration of its economic and politica...

Role of Remote File Logging

In seven pages this paper discusses the security advantages represented by a remote file logging system. Four sources are cited i...

U.S. and France Labor and Social Security Issues

In six pages this paper compares the U.S. and France in terms of each country's Social Security systems and the impact of labor ...

Canada's Hotel Business

Canada face the same problems that union workers around the world do, and similarly those who are employed without benefit of unio...

Considerations in Training Security Guards in Hong Kong

This 5 page paper discusses some of the issues that need to be taken into account when training security guards in Hong Kong. Thes...

2000 Political Debate Featuring Presidential Candidates John McCain and George W. Bush

In eight pages this New Hampshire debate of January 2000 is examined in terms of the tax cut emphasis by both candidates as well a...

Advantages and Disadvantages of Online Pharmacies

In eight pages this paper discusses Internet pharmacies in a consideration of advantages and disadvantages which includes privacy ...

Overview of Network Security

included. Other important considerations are Internet connections. They need an end-to-end policy of network security. The IS d...

Importance of Database Security

most critical resource in todays enterprises is information, whether they are industrial, commercial, educational, or civic. As su...

Illegal Insider Stock Trading Basics

In twelve pages this paper defines and discusses the illegal practices of stock trading in a consideration that also includes back...

21st Century Nursing

required of nurses in the twenty-first century, it is important to look at health care trends in general. II. Changes in the Am...

Proprietary versus Contractual Security Guards' Analysis

This paper consists of six pages and questions whether professional security guards are needed and effectively provides answers to...

Fraud Detection and Security Personnel

In five pages this paper examines fraud detection in a consideration of security personnel's role. Three sources are listed in th...