SEARCH RESULTS

YOU WERE LOOKING FOR :USE OF STRATEGIC STUDIES AND NATIONAL SECURITY

Essays 541 - 570

IBM Proposal for a Knowledge Management Program

nineteenth century, and develops through the twentieth century, always based in the development of new technologies. IBM have been...

Barriers to Strategic Thinking

the inputs. In most decision making models there is the acceptance that for any scenarios it is unlikely that all of the relevant ...

The Advertising of OpenSkies; The New British Airways Subsidiary

This 7 page paper looks at the print advertisements that were used by the new subsidiary of British Airways; OpenSkies to launch t...

E-COMMERCE, ETHICS, SECURITY AND LAW

auction is eBay. In this paper, well examine some of the ethical, security and legal issues that are dominating e-business...

Juicy Red Tomato Company Case Study

findings of the first consultant are that JRT need to invest in both the managerial and front line staff and need to improve commu...

Information Management

since the computer revolution; this has facilitated improved levels of communication and access to information with an increasing ...

Information Technology Security, Web Services and Database Management Systems

many forms cryptography complexity increasing the difficulty breaking the code is achieved with the use of prime numbers. One most...

Valuing an IPO for JetBlue

is that of the dividend discount model. The rationale behind this model is that the value of a share should be calculated by refe...

International Law And The War In Iraq

42 that give the Security Council the authority to determine if there is cause to use acts of aggression (Dorf, 2003). These Artic...

Uses of Computer Protocols

In eight pages computer protocols are examined in terms of their data transfer and communication uses with types such as IPX, PPP,...

Hoshin Planning Process

2009). These indicators are pre-determined and quantifiable (Reh, 2009). They will differ depending on the type of business. Very ...

Should AirAsia Adopt an M-Commerce Strategy?

the ability to assess the potential of m-commerce as a part of the strategies used by AirAsia. 2. E-commerce and m-commerce 2.1 ...

Strategic Alliances; The Case of the ‘White Sands’ Joint Venture

use of those resources. The competences were complimentary. 2. Background Dow Chemicals is a US based company and Petroche...

HACKERS AS SECURITY GUARDIANS

and once inside, decide to be destructive (Germain, 2004). Then there are the white hat hackers - those who deliberately break int...

Collective Security and the United Nations

to another body where it was sought to confer powers on the General Assembly (Sarooshi, 1999). In the case of Southern Rhodesia th...

Argentine Exporting of Security Systems

would suffer a loss (U.S. & Foreign Commercial Service And U.S. Department Of State, 2004). Because of this risk, it is easier for...

Faith Hospital Case Study

hospital will have to reduce costs by 15 percent to break even. 5. Do Not Resuscitate (DNR) orders are implemented differently by ...

HRM and Organizational Performance Measures

in order for customers to return and the firm to be successful the quality of the product is an issue. However, this an issue that...

Assessing Guillermo Furniture Investment Alternatives

looks at the net revenue which is produced by investment, and assess is how long it would take for the initial capital investment ...

Improving Appraisals at Englewood

allow for the strategic use of employees and to maximise productivity which may also be the source of competitive advantage would ...

An Overview of Database Security Concerns

been charged with a critical task. As our company moves forward and begins to implement several key initiatives in developing comp...

Sustainability in the Department of Homeland Security

some have suggested that the DHS should scale back its scope and better implement its anti-terrorism agenda by focusing on the pro...

Labor Productivity: A Statistical View

years, there has been an increasing tendency towards specialization, even at the process level. While there are many theoretical m...

Patton-Fuller Community Hospital - Network Security Concerns

The paper explores the benefits of the Electronic Medical Record system, or EMR, that several hospitals have begun to adopt. There...

Sarbanes-Oxley: An Analysis

signed into law in 2002 as a response to the number of corporate corruption cases and accounting scandals. The primary purpose of ...

Federal Healthcare Regulation: An Examination of the Insufficiencies

is the question of whether or not health care is a right common to all citizens or a privilege. Both sides of the issue concern th...

Security Concerns and Globalization

influx of new businesses has now driven up the value of real estate much higher than can actually be sustained. Some fear a repeat...

How Does the Strategizing Process Influence the Output of the UAE Public Sector Performance?

performance of firms located within the UAE. 1.1 Research Question The main research question is to assess the impact of ...

A Comparative Overview of Security Risk Analysis and Planning

into the digital realm and other new frontiers, the importance of security management and analysis becomes all the more apparent. ...

Issues in Clinical Practice: Infant Abduction

justify its relevance to health care. The severity of infant abductions from hospitals should not be gauged by the frequency of oc...