SEARCH RESULTS

YOU WERE LOOKING FOR :USE OF STRATEGIC STUDIES AND NATIONAL SECURITY

Essays 331 - 360

Strategic Alignment and Communication Information Technology

In eight pages a niche marketing engineering company is featured in an information technology case study that examines strategic a...

Merck and Strategic Planning

In five pages this paper discusses strategic planning and decision making in a case study of the Merck pharmaceuticals company. F...

Securities Portfolios in Russian Banks/A Research Proposal

in order to learn from the strings and avoid any perceived weaknesses or errors. Dependent on the type and length of the project t...

Student Information Technology Case Study

This paper consists of a student presented case study in five pages involving a telecommunications' company's IT strategic plannin...

Characteristics of Different Securities

New Zealand (Bank of Queensland, 2010). Convertible Notes Dragon Mining Ltd is listed on the ASX with convertible notes traded,...

Guillermo Furniture Primary Research Results and Assessment

(n=2) that it was poor. Therefore there is a general patter of satisfaction. However, a major part of the problem faced by Guiller...

The Practice of Security Analysts

by a company reflects not only the size of funds, but also the start of investment and the level of activity that is undertaken. F...

Market Regulation under the Saudi Arabia Capital Market Authority and the US Securities and Exchange Commission

singular financial sector regulator in the country. It includes regulation of securities on the Saudi Arabia stock exchange, which...

The Strategic Use of Human Resources

in order to ensure that they have the resources needed in the way that they undertake workforce planning (Hansen, 2008). These are...

Strategic Planning at CC Industries

transfer of information between firms and the support of the relevant transactions, which is likely to include the need for online...

Analysis of New Balance Athletic Shoes Inc.

its advantage, and competitors disadvantage. The question is how should New Balance respond in order to meet their goals1? To as...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Technology and offender motivations in relation to fraud and theft

In addition, these security measures are not particularly effective against fraud which makes use of social engineering: the scams...

Using Moving Averages

the demand data from days 2, 3 and 4 and divides by 3. This is repeated for all the days (except the last day as there are not thr...

The Potential Clash of Alignment of Civil Liberties and Security Controls

and the rights of privacy prevented a more proactive actions being taken to find these threats. This is a core element of the argu...

Strategic Analysis of Southwest Airlines

even if airlines are leased tends to be high (Belobaba et al, 2009). The high level of concentration and use of existing brands al...

DHS Success or Failure

are not in agreement with each other. Some believe the Department of Homeland Security has made a mess of everything while other b...

Indonesia, Various Societal Features

This research paper discusses various aspects of Indonesian society, such as security of work, employment statistics, social secur...

Educational Technology and its Many Uses

In a paper of eleven pages, the writer looks at educational technologies. A case study of a sophomore world history class is used ...

Planning to Implement Strategic HRM at an Airline

market leader position for flights between the UK and Ireland. The company has archived this by careful strategic managem...

Is the Social Constructivism Paradigm the Most Appropriate Security Models for the 21st Century?

The writer considers whether or not the adoption of a social constructivism approach to security is the best model for the modern ...

Assessment and Strategy Recommendation for Lululemon Athletica

Lululemon Athletica has to make a strategic decision concerning the way that they will increase sales. The writer presents a situa...

Advantages and Disadvantages Associated with Outsourcing Global Security Tasks

advantage. Indeed Beck (2001) notes that this threat is one that has the potential to align different government interests; global...

Prejudice and Security Management

aware of the types of risk faced by the organization or government entity and then control for contributing factors. Danie...

Recent Changes in Aviation Security

over the past several years things have changed, concerns linger. In a recent report it is learned that airports are overwhelmed b...

PBS/Corp. Partnerships & Strategic Alliances

this trend, Austin points out that the "era of ever-bigger national government is coming to an end" (Austin, 2000, p. 7). In previ...

IT and the Security and Risk Manager

compromised. More recently Monster.com have had their main servers security breached and hacked into (Acohido, 2009). Hacking into...

Using Crime Pattern Analysis to Prevent Workplace Offenses

do something similar. We are coming at the question backwards, finding a list of offenses and then choosing one that fits the rest...

Great Eastern Case Study

be in the region of 3.5 to 4, meaning that for each $1 of physical assets owned by the company the share price may be in the regio...

Is the Best Strategic Development the Result of Logical Analysis?

decisive action which retains the flexibility to respond to changing circumstances, along with the ability to analyze the situatio...