SEARCH RESULTS

YOU WERE LOOKING FOR :National Security and Use of Technology

Essays 271 - 300

Domestic Violence Advocacy

example of domestic abuse among the wealthy and prominent. Theres a myth that domestic violence is more common in the middle and l...

Educational And Instructional Technology

430 silent filmstrips for military personnel between 1941 and 1945 (University of Texas, 2008). This technology was soon adopted i...

IP Telephony

is, how it works and how it compares to traditional forms of telecommunications. By understanding what the technology is and how i...

Primary Crime Data Sources: Compare/Contrast

rural, urban, gender, culture and age (Bureau of Justice, 2001). NCVS modified its methodology in the late 1980s to improve upon ...

Implementing New Technology; A Consideration Of Virtual Private Networks

be seen in a range of commercial and non commercial environment. One recent example has been the adoption of a VPN by the Honolulu...

Target Corporation Target

effective organization. One of the reasons is the management of human resources. The organization places a great emphasis on train...

Security Survey

well. Parking is at a premium as is the case on the fringes of most large universities, and there is a great deal of foot traffic...

Domestic and Global Security Management

and continue to find holes" (Security Directors Report, 2003, p. 1). What should corporations do? Limit business travel to the min...

Overview of Information Security Management

the ability to read directions can become a hacker because information on how to hack abounds on the Internet, in publications and...

Securities Purchasing and the Federal Reserve System

such a move would not be the best idea. For one thing, the Treasury market is large, flexible and liquid (Wheelock, 2002)....

Analyzing a Security Guard Company

profile persons, such as high-ranking executives (Command Security Corporation, About, 2002). Prior to September 11, 2001, CSC pr...

IS and Risk Assessment

hackers can readily infiltrate any given companys entire computer system with the intent to destroy data is more than enough reaso...

An IT Organization Accounting System

with each component of that task broken down and costed by way of the different resources that it consumes or requires. With this ...

UBS Investment Ban, Goldman Sachs, and Implementation of Technology

also building for the future. Current Issues and Trends Today, office automation and the use of Internet and Intranet appli...

Stadium Security and Honeywell

systems are interconnected on a single network. The Honeywell network consists of a "structured cabling system for voice and data...

Airline Company's Information Technology System Security Issues

time will obviously be severely undermined if security issues mean that customers do not have confidence that their transactions w...

Terrorism and Security Policies

Seeing a direct impact within the national boarders appears to have influenced the way in which people voted (McLean, 2004). This ...

Is Homeland Security an Effective Security Guard or an Example of 'Big Brother'?

obstacles, which suggests that this department is, at best, a "work in progress" (Lehrer, 2004, p. 71). The various bureaus that c...

Overview of Hospital Policy Development and Security

can be defined as any threat to maintaining standard operations or a threat to the protection of rights of patients. Because hosp...

Process Digitalization Through Computers as Employed by Kirwin Brewery Company

practical, but when firms use inventory, it is quite practical. The toy industry comes to mind because there is such a great deal ...

Multinational Corporation Proposal of International Security Protection

whose goal is to report a news story or open a new market for a multinational business. Globalization absolutely is an incr...

Issues Through Liberal and Conservative Lenses

liberal origins, the conservative had developed their own distinctive view of Social Security, which can be summed up in a single ...

Recent Changes in Aviation Security

over the past several years things have changed, concerns linger. In a recent report it is learned that airports are overwhelmed b...

Resource Dependency Theory, Contingency Theory and Core Technology

over a great deal with social exchange theory and the study of politics in the workplace (Huczyniski and Buchanan, 2003). The use ...

ING Security

customer provides the opportunity for a breach. However, this is mainly out of the control of the bank, and giving advice and maki...

Employees and Corporate Cyber Security

consider cyber security is "social engineering." Social engineering "is the manipulation of people rather than electronic systems ...

Prejudice and Security Management

aware of the types of risk faced by the organization or government entity and then control for contributing factors. Danie...

Characteristics of Different Securities

New Zealand (Bank of Queensland, 2010). Convertible Notes Dragon Mining Ltd is listed on the ASX with convertible notes traded,...

Is the Social Constructivism Paradigm the Most Appropriate Security Models for the 21st Century?

The writer considers whether or not the adoption of a social constructivism approach to security is the best model for the modern ...

Management of Technology

recognize is that technology management is an enterprise-wide concern, and that an effective approach to facilitating superior ado...