SEARCH RESULTS

YOU WERE LOOKING FOR :Security Culture and Organizational Behavior

Essays 1321 - 1350

School Policing and Its Importance

In five pages this paper discusses the need for security and law enforcement on school grounds in the aftermath of the murders in ...

Alarm Systems and Loss Reduction

In five pages this paper discusses alarm and detection systems and how such security measures can reduce business losses. Six sou...

UNIX, Linux, and Windows OS Security

the executive, client/server allows for the provision of a multiple operating system environment, meaning the system could have sy...

Proposals for Reforming Social Security

In seven pages this paper examines proposals to reform the U.S. Social Security system within the next ten years. Six sources are...

How Social Security Can be Reformed

In five pages this research paper discusses Social Security and how it can be reformed with privatization arguments for and agains...

U.S. Homeland Security and Islamic Extremists

It is a highly sticky position for a democratic society to be in when the government, not its citizens, discriminate against a rel...

Making the Policy on Homeland Security More Effective

(both from abroad and from within). But in this case, its the means to how we get there that ends up being just as important (and ...

Private Security and Public Police Relationship Improvements

the least of which included the concept of community policing. If communities were going to come together, it had to begin with t...

Post September 11th Changes in Private Security

dark. In this capacity, then, private security has begun to assume some of the duties of the regular police force. Consider...

Social Security Tax Avoidance

by the same ceiling, The employer is under an obligation to withhold this tax from an employees wages until the wage level is reac...

Online Shopping Analysis of Singapore's NTUC FairPrice Supermarket Website

unless the customer or his/her agent is there to sign for it and make payment (FairPrice, Terms 2002). Third, the Terms and Condi...

Global Security Environmental Changes

States power and security position? Many questions linger. Since the cold war has ended, many thought that it was the end of secu...

Uncle Sam and Juggling Two Wars

a formidable presence in Afghanistan we are beginning to pull troops back from around the world and to more efficiently consolidat...

Early 1990s' Scandal of the Salomon Brothers' Trading Firm

In nine pages this paper examines the involvement of the US government's securities and exchange commission in the scandal involvi...

Abandoned Building Securing

In four pages this paper on maintenance and security describes an abandoned building can be secured from decay, leakage, et cetera...

The new design of Global TransPark Airport

The design of a new international airport is what this paper focuses attention on. Benefits to the community, site selection and o...

Security, Foreign Affairs, and the European Union

In five pages the EU is examined in terms of various security and foreign affairs conditions. Six sources are cited in the biblio...

Economic Crisis of Russia

In twenty eight pages this paper discusses Russia's problematic economy in a consideration of its devalued currency and the impact...

Overview of the SEC

The Securities and Exchange Commission is the focus of this comprehensive research paper consisting of twenty two pages which incl...

Essays on the Lack of World Capital Market Integration

In ten pages this paper discusses how security markets and reward to risk ratios are not coinciding because the world capital mark...

Corporate Management and Information System Security

In seventy five pages this paper discusses IS security training and computer crime issues. Fifty five sources are cited in the bi...

Decisions and Data Warehousing

In ten pages this research paper discusses decisions made in information storage and data warehousing with a definition of data wa...

Significance of Database Security

In ten pages the possibility of database attacks by hackere are discussed in an examination of database security and its importanc...

Security Issues and Computer Network Management

In thirty pages this research study examines corporate computer network management and issues related to security and information ...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

Nuclear Power and India

In fifteen pages this paper discusses India and nuclear power in a consideration of national security issues and Hindu nationalism...

Indochina's Hotel Management

In six pages this paper discusses advertising, security, personnel and management training as each topic pertains to Indochina hot...

Retail Prevention of Loss and Shoplifting

In twelve pages this research paper discusses security tools retailers can implement to protect themselves against shoplifting and...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...