Choosing careers in health care for job security
Case study - 2 pages - Educational studies
Despite slow recovery of economy battered by recession followed by credit crunch, overall poor economic growth and unstable stock markets, job prospects in health care is bright in the USA, UK and many other countries. In fact, health care is a very demanding sector where career growth is...
Security issues with cloud computing
Case study - 3 pages - Management
As most of the cloud computing services depend on the internet, the availability of the service is incessant. The only thing a user needs to worry about is the security of the data, which is stored on the cloud network, which is popularly known as shared network. Most of the services...
Security information on the internet
Case study - 3 pages - Business strategy
If you decide to use the Internet either as a consumer, business, for information or just surfing the web for entertainment purposes you have to decide whether you want to use or visit websites that use an open or secure environment while on the Internet. In today's digitally connected...
The Ultimate Weapon is No Weapon: Human Security and the New Rules of War and Peace by Shannon D. Beebe and Mary Kaldor
Book review - 4 pages - Social, moral & civic education
Shannon Beebe and Mary Kaldor argue in their book that we need to focus on human security to fix contemporary conflicts. They explain there is a security gap that needs to be filled; they now believe, after years of experience that if we would implement basic necessities in most...
The India-US relationship through the prism of the regional security complex theory: To what extent have regional security issues led to dramatic improvements in the US-Indian relations?
Case study - 23 pages - International relations
In 2003, the professors in International Relations Barry Buzan, at the London School of economics, and Ole Waever from the University of Copenhagen, published a book exploring a new field in Theory of International Relations: Regions and Powers- The Structure of International Security....
Security of information systems: Implementation of encryption
Dissertation - 4 pages - Computer science
The security of computer systems is generally limited to guaranteeing rights of access to data and system resources by implementing authentication mechanisms and monitoring to ensure that users of these resources have only those rights that they were granted. The security mechanisms...
Exploring the Genesis of the Department of Homeland Security: What Exactly Lies Within the Office of the Director of National Intelligence?
Thesis - 5 pages - Social, moral & civic education
This report will investigate the root causes for the creation of the Department of Homeland Security (DHS). To help explain the genesis of its inception, history of the Bush administration's preoccupation with securing the nation from terrorist threats or attacks will be discussed....
Social Security in Algeria
Course material - 9 pages - Social, moral & civic education
On the eve of colonization of Algeria by France, the concepts of public health and social security barely existed. The colonial regime of the time introduced Social Security in Algeria to organize the medical benefits of military settlers and for the Algerian Workers' Algerians...
Understanding the tendencies in the use of private military and security companies in international security management
Case study - 8 pages - Management
The recent war in Iraq reveals the growing importance of the phenomenon of privatization of security and defense activities. It has been estimated that more than 20,000 private contractors were hired in Iraq to carry out military and security related activities. These new soldiers...
NATO and the EU: Promoting Europe's energy security
Thesis - 5 pages - International relations
Energy security has been defined as guaranteeing the physical availability of energy products at objective and reasonable and/or affordable prices over the short and long term. According to the European Commission energy security is mainly about economy: Energy...
The issue of terrorism and security has dominated international relations since 9/11 in 2001. Critically analyse this statement by using any theory of international relations
Essay - 3 pages - International relations
The International Relations represents the interactions between actors within the international system. Norms and rules exist in international system. The only actors are states and we consider that each actor has its own role. In every state, we need to consider five basic social values which...
The High Representative of the Union for Foreign Affairs and Security Policy
Worksheets - 3 pages - European law
It is only with the European Council acting by qualified majority and the concurrence of the President of the European Commission that the High Representative is appointed. Art 18 TEU states that the High Representative shall implement the common foreign and security policy of the Union....
To what extent has European integration promoted security and stability in post-Cold War Europe?
Internship report - 5 pages - European union
According to E. Bomber and A. Stubb (2003) , the European integration is a process by which sovereign states relinquish (surrender or pool) national sovereignty to maximize their collective power and interests.' We notice that European integration involves different institutions where...
Should ecological security replace sustainable development as the organising principle of global environmental governance?
Thesis - 12 pages - Ecology & environment
In Our Common Future, the report of the World Commission on Environment and Development (WCED 1990, 87, 105), both phrases of sustainable development and environmental security marked their entry into the international debates and were highlighted as important notions of the future global...
Is the EU successful in its attempt to create a 'security community' with its neighbors through the elaboration of the European Neighborhood Policy?
Thesis - 6 pages - European union
The aim of this paper is to assess whether or not the EU is efficient in its attempt to build a security community with its neighbors through the implementation of the European Neighborhood Policy (ENP). In order to do so, I will first demonstrate that the EU and its neighbors share, to a...
Differences and similarities among the contemporary security policies in Nordic countries
Essay - 9 pages - Political science
Since 1720, all the Nordic countries have remained minor powers on the international stage. As such, the Nordic states have had to adapt to the constraints that are usually beyond their control. This statement could summarize the geopolitical situation which has shaped the...
The Conference on Security and Co-operation in Europe (CSCE) in the post cold-war Europe - publié le 29/09/2010
Essay - 5 pages - International relations
The CSCE (Conference on Security and Co-operation in Europe) was born with the Helsinki final act in 1975, as the territorial statu quo seemed definitely taken for granted by both the communist block and western countries. On the 1st of August 1975, 35 heads of states from Europe, the US...
Analysis of FOSS: An open standard for network security and monitoring
Thesis - 5 pages - Computer science
The aim of the project is to provide a cost effective, secure and easy working environment over a network. This FOSS is very much helpful for educational institutes, non profit organizations and small industries. The GUI provides options to choose from monitoring, blocking, filtering and...
Security in image transmission using audio watermarking
Thesis - 3 pages - Computer science
With the recent burgeoning of networked multimedia systems, techniques are needed to prevent illegal copying / forgery in distributed digital audio/ visual/text document. It may be also desirable to determine where and by how much the multimedia file has been changed from the original due to...
Do online information retrieval systems pose a security threat?
Thesis - 4 pages - Computer science
The search engine's deceptive role of information mining from the crawled web servers has been gravely misunderstood. The general perception of search engine being an information locator is a universal truth. The 24x7 availability of the updated information makes it a potential information search...
The High Representative of Union for Foreign Affairs and Security Policy - published: 29/09/2010
Essay - 5 pages - European union
This paper will examine the new role of The High Representative of Union for Foreign Affairs and Security Policy (High Representative') that came into force in 2009 following the Lisbon Treaty signed in 2007. First, the historical background will be discussed followed by the...
An overview of U.S. social security act, 1935
Thesis - 3 pages - Political science
The US Congress passed the landmark Social Security Act on 14 August 1935 as part of the new Deal offered by President Roosevelt. This act established a system of old-age benefits for workers, benefits for victims of industrial accidents, unemployment insurance, and aid for...
National Security as an ambiguous symbol, by Arnold Wolfers
Book review - 2 pages - Political science
In this text written in 1952, Arnold Wolfers tries to point out the scope of the concept of national security, its meaning and its various implications as well as the way the states deal, and should deal, with it. We will first clarify the evolution of the notion of national interest,...
Short essay: Security Council Reform In The United Nations and Changing World Politics (Westview Press, 2007), the author argues that "a significant shake-up in the way the UN does business is essential" if the UN is to keep pace with changing world
Essay - 3 pages - International relations
The UN Secretary General, Kofi Annan, called in September 2003 for the reform of the UN Security Council (UNSC), in order to make it more effective and more representative, given the changed geopolitical realities. Diverse problems affect both the efficiency and the representative...
CFSP (Common Foreign and Security Policy) and Non Proliferation - publié le 29/09/2010
Essay - 12 pages - European union
Since the end of the Cold War, the nature and origins of threats on Europe have changed. This evolution of repartition of powers in the world led some countries to develop their defence and military capabilities, whether it concerns missiles, biological or chemical weapons, or the ultimate...
UN Security Council Resolution 1559 and US multilateralism - publié le 29/09/2010
Essay - 6 pages - Political science
The United Nations Security Council Resolution of 1559 was adopted by the Security Council on September 2, 2004 by a vote of 9 in favor (Angola, Benin, Chile, France, Germany, Romania, Spain, United Kingdom, United States), to none against, with 6 abstentions (Algeria, Brazil,...
David J. Francis, Uniting Africa: Building regional peace and security systems
Book review - 3 pages - Literature
Africa today is faced with a stark choice, either unite or perish. So opens David J. Francis' intriguing study on the state of African nations in relation to one another. Frances spends a great deal of attention outlining the serious social and economic problems facing the African...
The economic impact of terrorism and the global security structure
Thesis - 5 pages - International relations
The beginning of the 21st century was highlighted by the 9/11 incident and it marked the apogee of the era of international terrorism. Since 9/11, terrorism threats are more and more in the center of national and international political decisions. This strong interaction with domestic and foreign...
Security and emancipation
Essay - 4 pages - Political science
The 20th century has witnessed many struggles for emancipation, and a strong emphasis put on security agenda in many countries. Regarding emancipation, many examples come to our mind like the decolonization era, after World War II, the feminist struggles for equality between genders all...
Formal security evaluation of ad hoc routing protocols
Thesis - 3 pages - Computer science
Research into routing protocol development for mobile ad hoc networks has been a significant undertaking since the late 1990's. Secure routing protocols for mobile ad hoc networks provide the necessary functionality for proper network operation. If the underlying routing protocol cannot be...
