SEARCH RESULTS

YOU WERE LOOKING FOR :Security Management and Social Theory

Essays 1981 - 2010

Processes of Decision Making

present in some models, however, the older models still remain as the basis of decision making theory, with most studies still loo...

Personality Approaches East and West

notes, in other words, people are constantly changing and re-inventing aspects of themselves in order to adapt to the equivalent c...

State and Local Governmental Impacts of the Homeland Security Act

come full circle to represent three of the most pressing issues critics contend reflect a botched attempt toward better security a...

Military's Peacekeeping Role

Article 42 (Cox, 1999, p. 239). Peacekeeping operations take the form of one of two models" 1. Unarmed observer missions (Cox, 19...

Home Lifestyle Changes Due to Computers

make life so much easier. Anymore, there is no reason to slave over a hot stove when one can come home from work with a hot, nour...

Carr, Gillepsie, and Drucker on Business Ethics

It appears that Carr has not even a speaking acquaintance with the concepts of integrity and trust. Neither does he effectively s...

Comparisons Between Biometrics and Electronic Access Security Systems

experts note that customers want products that can be integrated seamlessly with technology and infrastructure they already have (...

Airline Company's Information Technology System Security Issues

time will obviously be severely undermined if security issues mean that customers do not have confidence that their transactions w...

Screening and Assessment of Security Guard Applicants

protocol testing for security guards would also have to differ from similar types of testing for law enforcement officers. For on...

Cyber Security and Government System Protection

and bright, as being clever. Yet, hackers are engaging in serious crimes. Ordinary hackers aside--both white hats and black hats...

Forging a Committed and Motivated Workforce- An In-Depth Case Study

turnover rate of 22 to 33 percent per year. While it is not unusual for employee turnover to reach even 25 or 35 percent in a year...

19th Century French Mathematician Augustin Louis Cauchy

own background also needs consideration, as the work was also a reflection of the man and his circumstances. After this some examp...

eCommerce Remedies and Security Risks

little legal protection in terms of privacy on the Internet, many companies do their best to utilize technology so that a consumer...

Modernist and Postmodernist Architectural Theories of Le Corbusier and Robert Venturi

generator" which "holds in itself the essence of sensation" (Le Corbusier, 1924, p. 8). For Le Corbusier, the idea that the plan "...

The New York Stock Exchange (NYSE) and Foreign Firms

(Anonymous, 1992). The NYSE has been and still remains one of the most respected and certainly among the most recognizable of the...

Three Adult Education Theories

This essay includes a self-analysis of level of cognitive development based on three theories. The analysis is made at the end of ...

CASE STUDY FOR VL BANK

Analyzes the legal and security factors occurring around the cyber attack against VL Bank. There are 3 sources listed in the bibli...

USE OF STRATEGIC STUDIES AND NATIONAL SECURITY

Analyzes strategic studies, and their strengths and weaknesses when it comes to national security. There are 5 sources in the bibl...

Achievement Motivation

This essay discusses achievement theories and achievement motivation theories. There are seven sources used in this 10 page paper....

Two Fraud Cases

Fraud continues to be rampant in the corporate world. Prudential Securities were charged with late trading. A manager for Johnson ...

Nursing Philosophy and Practice, Their Relationship

This research paper discusses nursing theory and nursing practice, as well as the theories of Watson and Orem. Seven pages in leng...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Overview of Dept. of Homeland Security

This research paper offers an overview of the history, role, mission, and duties of the Department of Homeland Security (DHS). Fou...

Counseling and an Eclectic Approach

all of us are enough complexes, minor neuroses, quirks, behavior patterns, beliefs, inadequacies and competencies to require at le...

Descartes' Psychology and the 'Conscious Mental State' Theory of William James

This paper examines the 'constant mental state' theory of psychology William James created to improve the theoretical limitations ...

Stakeholder and Philanthropy Responsibility in Business Ethics

In five pages philanthropy is examined in terms of the ethical use of assets with Adam Smith's theory of the 'invisible hand' and ...

Firewalls and the Internet

In five pages this research paper examines the Internet and the need for firewalls for security reasons in a consideration of diff...

School Policing and Its Importance

In five pages this paper discusses the need for security and law enforcement on school grounds in the aftermath of the murders in ...

Alarm Systems and Loss Reduction

In five pages this paper discusses alarm and detection systems and how such security measures can reduce business losses. Six sou...

Political Theories of John C. Calhoun

to protect (Safford 211). Calhoun proposed giving to the minority not merely a proportionate voice, but an equal voice with that ...