SEARCH RESULTS

YOU WERE LOOKING FOR :Security Management and Social Theory

Essays 2161 - 2190

Constitutional Issues and National Security

In eight pages this paper examines national security in the United States in an assessment of strengths, weaknesses, and the issue...

Corpuscular Light Theory of Sir Isaac Newton

In five pages this research paper considers the corpuscular light theory developed by Newton and how this formed the foundation fo...

Triassic and Jurassic Changes in Climate and Geology

The disappearance of the dinosaur is an issue that divides both scientists and laypeople alike. This paper examines the part that ...

Explanation of Theories Pertaining to Physics

In five pages this research paper discusses modern physics in a consideration of 2 major theories with the groupings or Eightfold ...

Press Censorship and the Government in the 1991 Case of The New York Times v. United States 403 U.S. 713

In two pages this paper examines the extent of government privilege and the press when there is a national security issue as it re...

Overview of Healthcare Information Systems

In seventy pages this paper examines healthcare information systems and the necessity for increased security and confidentiality w...

Pros and Cons of the Federal Government's Witness Security Program

In six pages this paper assesses the positive and negative aspects of the federal government's witness security program. Five sou...

Explanation of Distributed Cognition

In seven pages the late 1980s theory known as distributed cognition is discussed in terms of its departure from other theories of ...

China Question and the National Security Council

According to the Office of the Historian in the Bureau of Public Affairs of the U.S. Department of State (), the National Security...

Two theories relating to cognitive development: Case and Siegler

state to another, which could be considered the strategies used. In other words, there is something similar to a hierarchy and the...

Internet Commerce and Digital Cash

In nine pages this research paper presents an argument that favors digital cash as opposed to check, credit card, or paper transac...

Taking Chances in The Stand, Desperation, and Insomnia by Stephen King

this is the same evil that invades the minds and souls of killer postal workers, schoolyard murderers, and child abusers? King al...

Society and the Individual

In nine pages this paper discusses society and the individual in a consideration of theories by Hegel, Veblen, Thoreau, Kant, Talc...

Historical Overview of the 'Big Bang' Theory

The Big Bang Theory is the focus of this historical overview consisting of five pages in which black holes, curved space, theories...

Descartes' Psychology and the 'Conscious Mental State' Theory of William James

This paper examines the 'constant mental state' theory of psychology William James created to improve the theoretical limitations ...

Stakeholder and Philanthropy Responsibility in Business Ethics

In five pages philanthropy is examined in terms of the ethical use of assets with Adam Smith's theory of the 'invisible hand' and ...

B.F. Skinner and Erik Erikson on Personality

In five pages this paper examines Skinner's operant conditioning theory and his views on stimulus and response along with Erikson'...

An Asymptotic Theory Analysis

In two pages Ravi Jagannathan and Zhenyu Wang's article, 'An Asymptotic Theory for Estimating Beta-Pricing Models Using Cross-Sect...

Buying on Credit is a Good Practice

In four pages this paper argues that credit buying is generally good if properly implemented with examples such as stability, safe...

Firewalls and the Internet

In five pages this research paper examines the Internet and the need for firewalls for security reasons in a consideration of diff...

School Policing and Its Importance

In five pages this paper discusses the need for security and law enforcement on school grounds in the aftermath of the murders in ...

Alarm Systems and Loss Reduction

In five pages this paper discusses alarm and detection systems and how such security measures can reduce business losses. Six sou...

Political Theories of John C. Calhoun

to protect (Safford 211). Calhoun proposed giving to the minority not merely a proportionate voice, but an equal voice with that ...

The New York Stock Exchange (NYSE) and Foreign Firms

(Anonymous, 1992). The NYSE has been and still remains one of the most respected and certainly among the most recognizable of the...

'Magic Bullet' Theory in the Assassination of John F. Kennedy

easily draw his own conclusions as to why these members would be eager to see such a thing occur, in that they would become furthe...

Internet Privacy and Safety

New York at which the following statement was made, "Governments around the world should recognize the dangers that regulation of ...

Educational Theory and Army ROTC

In ten pages this paper examines the Army ROTC program through an application of basic educational theory within the contexts of F...

Dorothea Orem - Self-Care Deficit Nursing Theory

own studies in numerous areas, such as formal logic, metaphysics, action theories, and to her readings of Aristotle, Aquinas and m...

Orem, Mid-range & Grand Theories

relationships between self-care agency and the self-care demand" (Kumar, 2007, p. 106). Within the context of Self-Care Deficit ...

Wireless Networks for a Small Business; Governance and Security

AP in a single cell (Benner, 1996). It is more likely to a LAN would made up of several cells with the...