SEARCH RESULTS

YOU WERE LOOKING FOR :Security Management and Social Theory

Essays 2521 - 2550

Modernist and Postmodernist Architectural Theories of Le Corbusier and Robert Venturi

generator" which "holds in itself the essence of sensation" (Le Corbusier, 1924, p. 8). For Le Corbusier, the idea that the plan "...

Retail Prevention of Loss and Shoplifting

In twelve pages this research paper discusses security tools retailers can implement to protect themselves against shoplifting and...

Decisions and Data Warehousing

In ten pages this research paper discusses decisions made in information storage and data warehousing with a definition of data wa...

Significance of Database Security

In ten pages the possibility of database attacks by hackere are discussed in an examination of database security and its importanc...

Workplace and Transsexual Issues

that the European Sex Discrimination Act will be rewritten to specifically address the concerns of transsexuals in the workplace. ...

Examination of Competitive Markets

In three pages efficient markets' theory and the impact of competitive markets are considered in a microcompetitive model that ide...

Abandoned Building Securing

In four pages this paper on maintenance and security describes an abandoned building can be secured from decay, leakage, et cetera...

Nuclear Power and India

In fifteen pages this paper discusses India and nuclear power in a consideration of national security issues and Hindu nationalism...

The new design of Global TransPark Airport

The design of a new international airport is what this paper focuses attention on. Benefits to the community, site selection and o...

Security, Foreign Affairs, and the European Union

In five pages the EU is examined in terms of various security and foreign affairs conditions. Six sources are cited in the biblio...

Economic Crisis of Russia

In twenty eight pages this paper discusses Russia's problematic economy in a consideration of its devalued currency and the impact...

Basic Economic Theories and Inflation

In nine pages inflation is discussed in a consideration of basic economic theories including predictability, trends, recessions al...

Overview of the SEC

The Securities and Exchange Commission is the focus of this comprehensive research paper consisting of twenty two pages which incl...

Essays on the Lack of World Capital Market Integration

In ten pages this paper discusses how security markets and reward to risk ratios are not coinciding because the world capital mark...

Early 1990s' Scandal of the Salomon Brothers' Trading Firm

In nine pages this paper examines the involvement of the US government's securities and exchange commission in the scandal involvi...

Keynesian Perspectives on Contract Labor

In thirty two pages contract labor theory is reviewed in terms of its Keynesian monetarist and neoclassicist theories with a discu...

Internet, Public Documents, and Government Control

In fifteen pages this paper discusses the Internet and how the government has endeavored to control public document assess in the ...

Techniques in Advanced Marketing

This paper consists of twenty pages includes content analysis, case study research tools, and discusses such marketing techniques ...

Overview of the Internet and Marketing III

In ten pages this paper examines Internet marketing in a consideration of what it is, how it takes place, and its benefits with on...

An Essay on Airport Security

This paper provides an overview of FAA measures and other relevant issues that pertain to airport security. There are five biblio...

Learning Theories Applied to Computer Education

This paper addresses the learning theories of constructivism and mastery learning. The author tests these theories by applying th...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Security on the Internet and Cryptography

One of the most important solutions for Internet security is cryptography. This paper discusses use of encryption to enhance TCP/I...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Computer Operating Systems, Security Threats and Protective Measures

In fifteen pages this paper discusses how computer operating systems must be protected from external threats and the compromising ...

Rights of Inmates

In seven pages the rights of inmates are assessed from security and safety perspectives. Three sources are cited in the bibliogra...

Visitation Programs and Issues Pertaining to Prisoners

In ten pages this paper examines visitation rights and programs of prisoners in terms of history, types, and security improvement ...

Learning Stages of Albert Einstein

In seven pages Albert Einstein's learning development is considered within the context of Piaget's developmental stages theory and...

The School Counselor, Divorce, and Attachment Theory

literature on attachment theory and the effects of divorce on the childs ability to continue growing and developing positively. Th...

Rhe Gren Monkey and AIDS

In six pages the theories presented in A Presentation of Fact Demonstrating the Validity of the Theory that AIDS Originated from (...