SEARCH RESULTS

YOU WERE LOOKING FOR :Data Security and Cyber Crime

Essays 241 - 270

Indonesia, Various Societal Features

This research paper discusses various aspects of Indonesian society, such as security of work, employment statistics, social secur...

Security in a Role-Based Environment

everything in its power to ensure that its vital sensitive information is kept secure. There are many ways to go about providing t...

The Homeland Security Act and Its Effectiveness

a truly positive impact can be measured. Such an analysis is sorely needed as the United States currently operates several hundred...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

DHS Success or Failure

are not in agreement with each other. Some believe the Department of Homeland Security has made a mess of everything while other b...

Modern Airport Design - Security Measures

perimeter control at facilities (Transportation Security Administration, 2004). This is handled in a variety of ways, from the obv...

The Potential Clash of Alignment of Civil Liberties and Security Controls

and the rights of privacy prevented a more proactive actions being taken to find these threats. This is a core element of the argu...

Chief Security Officers - Role and Responsibilities

stage of the plan necessarily involves developing an understanding of recent security breach events at similar institutions, ident...

Investigating Cyber Bullying Using The Internet

This essay pertains to critiquing three Internet sources, a blog, a video and a podcast, as to their validity and applicability to...

The Effects of Cyber Bullying on Adolescents

This research paper addresses the topic of cyber bullying as an issue that negatively affects the health of adolescents. Ten pages...

Cyber Bullying, Effects on Teens

This research paper offers additional research findings than its shorter version khcyberbully.doc. Both paper discuss research fin...

Cyber Attacks and Psychological Profiles

In a paper of ten pages, the writer looks at cyber attacks. An in-depth analysis reveals psychological aspects of such attacks. Pa...

Two Aspects of National Security

There are many different aspects or elements of national security. Paper discusses border security and cybersecurity, which is bec...

Criminal Sexual-type Conduct Data

There have been a number of laws passed and numerous court cases regarding sexual harassment in the workplace. These span more tha...

Security Issues - Airlines and Water Supply Pipes

The writer looks at two different issues where there may be security concerns. In the first section security of airlines and airc...

Information Warfare (IW) and Cyber-Terrorist Activities

The concept of information warfare is not new, it has been around for centuries, while cyber-terrorism is new. Despite this the tw...

American Social Security in the Future

This 7 page paper gives an overview of the current and future state of Social Security in America. This paper includes a discussio...

How to Mitigate Risks

There are a number of techniques and methods organizations and businesses can use to mitigate risks. This essay discusses three me...

HSO and the Changes in Management Information System

This 8 page paper gives an overview of security issues for organizations. This paper includes discussions of sensitive materials a...

Employee Potential to Steal

Linda has been given many responsibilities, including deciding which accounts are uncollectable and written off. The Fraud Triangl...

Sex Trafficking, An Overview

This research paper pertains to sex trafficking. This overview defines the issue, describes trafficker tactics, and describes the ...

Health in Richmond County NY

This essay offers an overview of health and safety in Richmond County, NY (Staten Island). Demographic data and health data are in...

Data Analytics Plan

Big Data Analytics is becoming more common in healthcare institutions because the outcomes include cost reduction, error reduction...

The Latest Ways to Analyze Business Data

It is very hard for a business to gain a lasting analytics competitive advantage yet some companies have done just that, such as W...

China and The US, Crime

This research paper pertains to the increase in crime occurring in China in the 1990s and the decline of crime in the US during th...

Data and Two Hypothetical Businesses

Foodie is an app that uses big data to understand user's food preferences. Wandr uses big data to link travelers with other travel...

Status of the Pension Funds of PepsiCo and Coca-Cola

The conditions of pension funds for these two firms in 2009 is assessed using data from the annual accounts. The growth, contribut...

Reduce Health Costs by Targeting Resources

The New York City Police Commissioner was successful in reducing crime by targeting high crime areas and allocating resources to t...

Sutherland's Theory of Executive Crimes

him, including mail fraud, laundering money, and conspiracy to obstruct justice. The financier was involved with a global Ponzi sc...

The Commonalities and Differences in Research using Focus Groups and Group Interviews

The writer looks at two methods of gathering data for qualitative research; group interviews and the use of focus groups. Each met...