SEARCH RESULTS

YOU WERE LOOKING FOR :Security in Organizations

Essays 391 - 420

Wal-Mart : Organizational Behavior

are" (MMR, 2005, p. 40). This is one of the controls the company uses with their top managers to constantly improve. It is essent...

The National Center for the Preservation of Democracy

the blog sites of Volpac, a conservative political action committee chaired by Senate majority leader Bill Frist. One of the curr...

International Save The Children Alliance

Executive Directors of a number of national Save the Children organizations across the world (International Save the Children Alli...

Risk Management Function in Corporate and Military Settings

Management 18 Lessons From Dow Chemical 22 Method of Analysis 23 Modeling Security Risk 24 Results of Analysis 26 Conclusion and R...

Leadership In Organizations

cohesive, productive team; instead, this leader allows each person to do what he or she sees fit even if it falls outside the scop...

Organizational Information Systems

Originally seeking to be a virtual company carrying no inventory of its own (Gruppo, 2000), Amazon abandoned that plan shortly aft...

The Public Sector: Balanced Scorecard

a decision the author notes as being perilous to both profits and employee productivity, a coupling he deems inextricable intertwi...

The Patriot Act: A Political Issue

against Americans on their own soil. The extent to which the Act serves to intercept terrorist activity, protect national freedom...

Computer Security

a large group of Milwaukee hackers known as 414s, whose infiltration impacted such organizations as the Los Alamos National Labora...

Tenure Laws In Georgia And Tennessee: Opinion

these teachers not been locked into job security under the precept of permanent tenure and been expected - as with virtually every...

The Patriot Act

vital to national security (Pike 1). The 9/11 Commission even pinpointed several failure of communication that occurred within th...

National Security Threat Levels

needs to prepare. The standard protocol for a green national threat conditions includes taking this otherwise down time to re-eva...

Computers: The Battlegrounds of the Future

and other highly specialized tasks. Information technology and the computers and global network that bind all three together, in ...

ECONOMICS AND INFORMATION SECURITY

with the purchase of a good? Its fairly simple - there are two choices on the information security curve. Either so tightly protec...

INTERNET SECURITY TECHNOLOGIES - AND PREVENTING THEM FROM BEING COMPROMISED

hindrance to productivity. Any employee who has trouble remembering an alpha-numeric password to get onto a system, then has to wa...

U.S. Failed Policy of Torture Tactics and Techniques on Suspected Terrorists

the instigation of or with the consent or acquiescence of a public official or other person acting in an official capacity (Bufacc...

Roosevelt's New Deal Policies

even when they did not grow anything; some of the comments went to the fact that children were hungry so it made no sense to subsi...

SUBPRIME MELTDOWN, MORTGAGE-BACKED SECURITIES AND THE ECONOMY

faced with the possibility that single trusts could be wiped out at a moments notice - thus creating the idea of slicing and dicin...

USE OF FORCE AND PERSONAL SECURITY

(Colleges Confront Shootings with Survival Training, 2008). Most public safety experts suggest that weapons not be used to...

How Security Managers Can Benefit from Understanding Rational Choice Theory and Routine Activities Theory (RAT)

sphere (Remco, 2003). Theorist Henri Fayol (1841-1925) developed the concept of security management in his 1916 book entitled Adm...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

COMPUTER SECURITY AND BRUCE SCHNEIER

be shared. Schneier points out, for example, that China, though not exactly our ally, also has computers, and has the same securit...

POLITICS AND LEGISLATION IN INFORMATION SECURITY MANAGEMENT

its tightly enforced on most websites that sell books and music. Another piece of legislation that is trying to be pushed...

Culture and Belief as it Respects Information Security

it is important to examine culture to see how a culture of security can impact an ordinary business. One part of culture is how an...

Settling International Disputes Peacefully

the general principles of law recognized by civilized nations. If there is an international law, especially where it is based upon...

An Argument for Social Security Privatization

virtually done away with pension plans in lieu of other benefits. This has placed more concern about Social Security in the laps o...

Crime pattern theory in relation to security management

are also linked to the everyday movements and routines of people: shoplifters will choose times when retail stores are busy and st...

CONDUCTING A SECURITY AUDIT OF INFORMATIONAL SYSTEMS

in isolation from the organization or its processes (Gasson, 2004). This means that any kind of security audit would have to take ...

INFORMATION SECURITY AND THE STUDY OF ECONOMICS

This 3-page paper discusses choices of information security and how it compares to the study of economics. Bibliography lists 3 so...

Uses of Computer Protocols

In eight pages computer protocols are examined in terms of their data transfer and communication uses with types such as IPX, PPP,...