SEARCH RESULTS

YOU WERE LOOKING FOR :Security Management and Social Theory

Essays 2341 - 2370

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

Decisions and Data Warehousing

In ten pages this research paper discusses decisions made in information storage and data warehousing with a definition of data wa...

Significance of Database Security

In ten pages the possibility of database attacks by hackere are discussed in an examination of database security and its importanc...

Examination of Competitive Markets

In three pages efficient markets' theory and the impact of competitive markets are considered in a microcompetitive model that ide...

Learning Theories Applied to Computer Education

This paper addresses the learning theories of constructivism and mastery learning. The author tests these theories by applying th...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

An Essay on Airport Security

This paper provides an overview of FAA measures and other relevant issues that pertain to airport security. There are five biblio...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Rights of Inmates

In seven pages the rights of inmates are assessed from security and safety perspectives. Three sources are cited in the bibliogra...

Visitation Programs and Issues Pertaining to Prisoners

In ten pages this paper examines visitation rights and programs of prisoners in terms of history, types, and security improvement ...

Contemporary World and National Security

In three pages this research paper defines national security and also considers Arnold Wolfer's description that the concept is 'a...

Global Politics and National Security

In two pages this essay examines national security, international politics and contemporary problems with China among the topics d...

Global Peace

In two pages this essay examines the Kosovo crisis in a consideration of national security and world peace issues. Three sources ...

Careers in Allied Healthcare

In this paper that contains eleven pages the reasons to choose a career in allied healthcare are examined and include job security...

The Idea of Security as Thomas Hobbes Would Have Seen It

This 10 page paper explores how Thomas Hobbes ideas might be applied to the problem of modern security. The bibliography lists 4 s...

Human Perception, Hume, Descartes, and Berkeley

In five pages human perception and the theories connected with it are examined and then the perception theories of this trio of ph...

Analysis of Identity of Meaning Theory

In two pages U.T. Place is one of the theorists considered in a discussion of the Identity of Meaning Theory with a contrast of th...

G.W. Leibniz's Theory of Monads

This paper addresses Leibniz's Monad theory of a harmonious universe, constructed of infinite monads (units), ascending to the Sup...

Leibniz's Second Theory of Monads

This paper addresses Leibniz's second theory of Monads, or structured units. However his second theory addresses gaps in his firs...

Jung's Archetypes as They Correlate to Fairy Tales

An article that suggests the theory that Jung's theories and archetypes can be applied to interpret certain fairy tales. This 11 ...

Keeping or Leaving a Job

In seven pages this report examines the significance of employment security in assessing whether or not an unsatisfactory job shou...

Policy Failure Explained by Information Theory

In six pages this report discusses information theory and public policy and if failure can be explained through 'implementation th...

Constitutional Issues and National Security

In eight pages this paper examines national security in the United States in an assessment of strengths, weaknesses, and the issue...

Labor Relations Laws and the 'Right to Work'

individuals in a new workplace would chose union participation and pay union dues. Many individuals either find union dues cost p...

Rhe Gren Monkey and AIDS

In six pages the theories presented in A Presentation of Fact Demonstrating the Validity of the Theory that AIDS Originated from (...

International Participation, the United Nations, and Human Rights

In eight pages this research paper examines how the U.N. approaches human rights issues in a discussion of organizations such as t...

Human Rights Organizations and Colombia

In forty five pages this research study discusses Colombia in terms of the work of human rights organizations and its negative imp...