SEARCH RESULTS

YOU WERE LOOKING FOR :Security in Organizations

Essays 1051 - 1080

A Security Plan for a White Supremacist

Insuring defendant security is often a concern in high profile criminal cases. Public law enforcement agencies may or may not be ...

DRUG TRADE IN LATIN AMERICA: TRANSNATIONAL/INTERNATIONAL SECURITY STRATEGIES

reduction tools and, to an extent, education on the evils of drug use (Seelke et al 2010). The results have been mixed to not-so-g...

IT Security Ethics - Assessing the Differing Approaches

and academic institutions, the concept has spread to address the basic concern of what behaviors are appropriate when dealing with...

Employee Retirement and Income Security Act Provisions for Funding and Termination

In fourteen pages the ERISA is presented in an overview that considers termination and funding in regards to loss allocation and m...

Internet Security and Software

In nine pages this report discusses software designed to ensure against credit card fraud over the Internet. Seven sources are ci...

National Security Council's History and Origin

In twelve pages the NSC is examined in terms of its origin, the role played by President Harry S. Truman, and its controversy. Se...

Commerce Planning and Internet Security

of capital caused by unplanned events. What is the old adage, about an ounce of prevention and the pound of cure? Something to t...

Security Risk Management and Disaster Recovery

In five pages the necessity of risk management especially in terms of disaster recovery is examined from a business perspective. ...

Information Security

In six pages this paper discusses computer information safety and the dangers posed by hackers. Seven sources are cited in the b...

Security Issues and Computer Viruses

executable files that are then shared and executed on other PCs and so on. Virtually every computer installation is susceptible to...

Health Security Act of the Clinton Administration

In fourteen pages this essay discusses the Clinton Administration's proposed health care reforms and the controversy they have ini...

Internet Security Threats

access to personal information. When an analyst with Xato Network Security notified Microsoft that its "Front Page" web pub...

Homeland Security and a Secure America

In fact, there have been a rash of school shootings over the years. Schools realize that even when precautions are taken, it is di...

An Overview of the Training that is Needed for Armed Security Guards

temporary licence to be grated and 40 hours in the first 180 days to then apply for a full permanent license (ACC, 2006). The are...

Business Information Systems, Control, and Security

In ten pages this paper discusses the Singapore Electronic Hotbed Program in an ecommerce overview that examines electronic commer...

Panama and the U.N. Security Council

come under intense scrutiny. Some critics suggest that it is weak and even that it is not needed anymore. Others applaud the work ...

MANAGEMENT, ADMINISTRATION, ORGANIZATION

J. Boeddewyn at New York University examined the similarities between the terms, pointing out that, for example, administration an...

Politics in Organizations

it can be used as a source of power. If a manager calls someone and does not leave a message on the other persons voice mail syste...

A MANAGER'S ROLE IN TODAY'S ORGANIZATION

Discusses three desirable managerial traits in a 21st-century organization. The bibliography of this 6-page paper lists 3 sources....

RISKS FACED BY HEALTHCARE ORGANIZATIONS TODAY

Discusses some of the risks faced by today's healthcare organizations. Topics include joint ventures, physician contracting, the T...

THE EXPAT, EMPOWERMENT AND ORGANIZATION OF ORIGIN

executive can remind the branch or division or subsidiary about some of the important things from home. This is generally a good e...

IBM AND THE LEARNING ORGANIZATION

have the ability and capacity to learn, he explained, but what stood in the way were the rigid corporate structures in which they ...

The Benefit of Formalized Processes in an Organization

finance management, human resource management and IT processes. The value and advantages of formalizing and documenting those proc...

Budgeting and Budgetary Controls for a Voluntary Organization

used efficiency for the church to mobilise its mission (Irvine, 2005). This means that budgeting needs to be considered for the ch...

TASK MANAGEMENT WITHIN ORGANIZATIONS

the subordinates get it wrong, and a project ends up having to be scrapped, or having to start all over again. Zmund...

GROUPS, TEAMS AND CONTEMPORARY ORGANIZATIONS

processes was a great dream, but many companies realized that implementation of these concepts was fast becoming a nightmare. ...

Analysis of Al Qaeda's Strategy And Organization

extent to which terrorists act of their own accord is both grand and far-reaching; that their non-state status creates an even gre...

Case Study Analysis of Health Care Organizations

in a health care organization as being a part of a merger with a pervious competitor. This is not an unusual situation. Firms com...

AN OVERVIEW OF COMMUNICATIONS IN ORGANIZATIONS

Though this scenario may seem amusing, its unfortunately the state of organizational communication these days. People who sit mere...

Police Effectiveness And Organization

The notion of being in touch with the community is a considerable element of organization on the beat (Dempsey and Forst, 2005). ...