SEARCH RESULTS

YOU WERE LOOKING FOR :Security Management and Social Theory

Essays 2431 - 2460

Personal Development and Developmental Theories

In twenty pages personal development is considered within the context of such developmental theories as John Dewey's Development M...

David Hume and John Locke on Perception

In five pages this paper contrasts and compares the perception theories of David Hume and John Locke and exposes flaws in the empi...

Philosophers and Their Weak and Strong Theories

In six pages this paper discusses the strengths and weaknesses of various philosophical theories with the utilitarianism of John S...

Network Security Issues

In seven pages this paper discusses firewall and encryption as they relate to telecommunications' network security with the pros a...

Hyper-Reality Theory

Media's role is discussed as Baudrillard's hyper-reality theory is utilized. The ways in which the theory may be used to evaluate ...

Overview of Internet Crime

In fifteen pages this paper examines Internet crime in a consideration of system security concerns and the threats posed by comput...

Theoretical Comparison of John Stuart Mill and Immanuel Kant

exists where half of the population is in ecstasy while the other half are totally miserable, this would not be desirable under th...

Internet Information Basics

In a paper consisting of ten pages the ways in which the Internet can be used are examined with its historical development first c...

Individual Perspectives of Nancy Chodorow and Sigmund Freud

In seven pages this report contrasts and compares Nancy Chodorow's feminist sociological theories with the psychoanalytical theori...

Sociological Perspective Applied to Gays in the Workplace

In eleven pages gays in the workplace is examined through the sociological perspectives offered by the division of labor theory of...

Sigmund Freud, Imogene King, and Nursing

2001). Growth and development is a component in Kings Goal Attainment Theory. Where the patient is in terms of growth and develo...

3 Theorists on Psychological Disorders

Three Perspectives: 10 pages in length. This paper examines the theories and treatments of psychological disorders as viewed by t...

The So-Called Ongoing Gulf War and U.S. Involvement

a part of Iraq, yet Kuwait had systematically encroached on Iraqi territory, while also deliberately stealing Iraqi oil from the R...

Evolution Explanation and Complexity Theory

In five pages the ways in which the theory of evolution are supported by complexity theory are discussed with references to Comple...

Europe and its Common Security Policy Failure

In sixteen pages this paper examines the European Union in an analysis of why the implementation of a policy regarding common secu...

Security Risks of Data Warehousing

In eight pages a possible security risk posed by a company's external data warehouse is examined in terms of the business's altern...

Learning Potential Among Students With Learning Disabilities

This paper examines various learning styles, as well as different learning theory relating to the education of students with learn...

Urbanization in the 20th Century

This 6 page paper examines the theory put forth by the Chicago School sociologists that all urban areas assimilated their immigran...

Order and Architecture

a new technocratic order" (Le Corbusier: Kenneth Frampton, 2002). According to one particular author we find that, perhaps, "On...

Computer Programming and the Hashing Function

Integer. Represented as a word or pair of words. Early Use As stated above, hashing in its early days was used primarily...

Theory of Sigmund Freud

analysis and treatment of the "transference neurosis" is thus often described as the essence of psychoanalytic therapy" (Davis, 20...

Current Issues Facing Management of Airports

In a paper that contains six pages such issues as budgetary constraints and controls as well as security matters that face airport...

Analysis of Shoplifting in America

product movement analysis reports, the number of actual shoplifter apprehensions, and the revelation of demonstrable signs of thef...

Database Protection

simply company preference (Spalka and Cremers 67). Thus, in evaluating the need for security in databases, many issues will be bro...

U.S. Army's Volunteer Service

In five pages this paper examines the volunteer members of the U.S. Army in a consideration of welfare and national security issue...

CIA

policy. Management of the CIA and the U.S. intelligence community is a crucial part of the new administrations national security e...

Global Trends from Different Perspectives

In six pages globalization as perceived by Ignacio Ramonet and Thomas Friedman is examined in a disucssion that also includes glob...

Contrasts in the General Systems Theory

In five pages this paper contrasts and compares the Viable Systems Model of Stafford Beer and the Natural Systems Theory of Ervin ...

American Security from a Unilateral Perspective

In twelve pages this paper discusses the major security role the US plays from a unilateral perspective. Seven sources are cited ...

Theory of Attribution

In a paper consisting of five pages attribution theory is examined along with the motivation theory of Alderfer as a way of explai...