Evaluation of the security transaction, the consistency of the portfolio construction and management with client's profile
Thesis - 6 pages - Finance
This year, Pro Fund is very proud to have a new client, Mr Lucent who is 47 years old. He sold his firm during the summer and received 1,000,000 for it. He doesn't really need this money but he wanted to have a new challenge in another sector. He wants to keep the money for the future...
Security analysis and portfolio management in Collabo Interactive Solutions
Case study - 45 pages - Business strategy
Portfolio management is both an art and a science. It is a dynamic decision making process, one that is continuous and systematic but also requires a great deal of judgment. The objective of this project is to blend theory and practice to achieve a consistent portfolio management process. This...
Legitimacy & efficiency inside the security council
Thesis - 17 pages - International law
When the idea of a potential world organization first emerged in 1943, arbitration was soon to be made between maintaining effective power within the scope of a few powers, and the necessity to gain the support from small and medium States. The only possible answer to this dilemma was to initiate...
Why did Clinton Health Security Act of 1993 failed despite the opportunity to reform?
Thesis - 6 pages - Political science
Reforming the US health care system was one of the top priorities of the presidential battle in 1992 and William Jefferson Clinton managed to appear as the most competent candidate to deliver a comprehensive plan to solve this problem. Since the late 1970's, the country was facing problems...
A critical analysis of two 2006 information technology security surveys
Case study - 6 pages - Computer science
My analysis of two surveys - the 2006 Australian Computer Crime and Security Survey (AusCERT, 2006) and the Ernst and Young 2006 Global Information Security Survey (Ernst and Young Global Limited, 2006) will proceed systematically according to the following simple scheme, one that...
A study of home security system
Thesis - 27 pages - Electronics, mechanics, engineering & technology
Home security systems provide security from threats such as intruders or thieves, by sounding a siren to grab the attention of the public. Two sensor pairs are placed in the system. Among them one pair of receiver sensors is connected to the entrance of the house and the transmitter...
Supply chain security in the United States
Essay - 10 pages - Management
A global supply chain links the United States and the rest of the world. Across the time, the focus has been put on reducing the costs of transport, and therefore resulted in a decrease of the ship crew, customs duty and requirements. However, Sept 11 posed a clear threat on global exchange, and...
Examining the security motivation model of obsessive-compulsive disorder
Thesis - 10 pages - Psychology
Obsessive-compulsive disorder (OCD) is condition marked by persistent and intrusive thoughts (obsessions) and the repetition of relatively stereotyped behaviors despite the recognition that they are irrational (compulsions) (Szechtman & Woody, 2004). Individuals with OCD experience a high need...
Network security on Bluetooth
Essay - 5 pages - Electronics, mechanics, engineering & technology
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless local area network (WLAN) devices, for instance, allow users to move their laptops from place to place within their offices...
The central role of women in food security in Africa
Thesis - 7 pages - Social, moral & civic education
This paper will explore the problem of food security in Africa. It will provide a general overview of the problem. Then it will relate the issue to the specific ways in which food security involves women in Africa, as producers and consumers of agricultural products. It will show...
The study on security analysis for selecting the appropriate security through analyzing economy and industry
Tutorials/exercises - 80 pages - Economy general
An investment refers to the commitment of funds at present, in anticipation of some positive rate of return in future. Today the spectrum of investment is indeed wide. An investor is confronted with array of investment avenues. Among all investment, investment in equity is best high proportion....
Russia's security policy
Thesis - 6 pages - Political science
Russia's security policy is undeniably complex, a system of political, economic, and social networks that influence the identification of potential threats, and anticipates the steps necessary to strengthen the state's infrastructure. Since the collapse of the Soviet Union, Russia has had...
Failure of Social Security
Essay - 6 pages - Economy general
Since the era of what is known as Reaganomics, this country's social security has been in jeopardy for some time. Our forefathers wanted our government to be able to aid in the comfort of our golden years. This generation of baby boomers may be the last ones to benefit from our founding...
Bill C-36 and Canadian border security
Thesis - 8 pages - Journalism
In the wake of the 9/1 terrorist attacks, anti-terrorism legislation has proven to have far reaching implications for the way the western world has come to understand the relationship between society and the law. Indeed, as the focal point of this course, the relationship between society and the...
Customs and Border Patrol for Homeland Security
Thesis - 4 pages - Journalism
The Customs and Border Patrol is an integral entity involved in protecting the United States from terrorist activity, illegal immigration, drug smuggling and human trafficking. The Border Patrol has been around officially for many years, starting with 450 agents in 1924 when the agency was...
Security using firewalls
Thesis - 6 pages - Computer science
In this age of universal electronic connectivity of viruses and hackers, of electronic Eavesdropping and electronic fraud, there is indeed no time at which security does not matter. The explosive growth in computer systems and their interconnections via network has increased the...
Security challenges in wireless sensor networks
Thesis - 5 pages - Electronics, mechanics, engineering & technology
Wireless sensor networks (WSNs) are wireless ad hoc networks of tiny sensor nodes. As a result of advances in sensor technology and wireless communication, sensor networks have emerged as an indispensable and important new tool for multiple civilian and military applications, including patient...
Encryption: Security in the age of technology
Essay - 5 pages - Electronics, mechanics, engineering & technology
Encryption is a word that is associated with mystery and secrecy. For hundreds of years, it is tool that has been used to help protect information. Simply, it is a process that scrambles ordinary textual or written information into something that is illegible and difficult to read or decipher....
Privatization of Social Security: Will it Work?
Essay - 3 pages - Social, moral & civic education
When President Bush revealed his plan to overhaul Social Security in his speech at the Republican convention, it was received with mixed reactions. President Bush wants to overhaul Social Security and put it on sound financial footing. (Christine Dugas, 2004) According to Henry J....
The Specific Methods that can be used by the Organization to improve the overall security of its wireless networks
Essay - 5 pages - Electronics, mechanics, engineering & technology
The advancement of computer technologies has served as the basis for the evolution of organizations. In recent years, the proliferation of wireless technologies has made it possible for employees to work more independently, in some cases eliminating the need for an office. These advances have...
How to conduct a security survey
Essay - 5 pages - Educational studies
Due to the 9/11 attacks on the Twin Towers of New York, America has heightened its security measures. Different measures of security have been improved. The development of Homeland Security was established to strengthen the security at public institutions and places in...
Robert Oppenheimer and the FBI security clearance hearings
Essay - 5 pages - Other law subjects
Nobody can definitively say whether Oppenheimer truly deserved to lose his security clearance. He made several mistakes of great import. However, he loyally served the United States throughout his life and was instrumental in creating the weapon that ultimately ended the war (whether that...
Is the environment an international security issue?
Essay - 4 pages - International relations
The last half of the 20th Century has been exclusively dominated by the Cold war conflict. There was little space in the analysis of the scholars in International relations for other minor issues of low politics, while the questions of the nuclear war and balance of terror dominated...
Social Security
Tutorials/exercises - 2 pages - Government finance
While the United States was still establishing itself and public debates rage over what the role and duties of their new government should be other countries were fleshing out their own social security legislature. In 1880 the Chancellor of Germany, Otto von Bismarck pressured his...
The American bureaucracy on national security
Essay - 6 pages - Political science
In his book The Power Game, Hedrick Smith speaks of the foreign policy game in the United States as a bureaucratic tribal warfare, using a tribal metaphor to describe the fierce fights which take place in Washington, DC. The notion of bureaucracy emerged in the early 20th century,...
Does social constructivism really add anything new to debates about security?
Essay - 6 pages - Political science
During the late 1980s, when debates between neorealists and neoliberals seemed to exhaust themselves, so-called constructivist' researches made their appearance. By asserting themselves as an alternative to realism, they reinterpret its main concepts (power, national interest,...
What is human security?
Essay - 6 pages - International relations
The end of Cold War brought new global challenges to the security field. The arousal of new forms of conflict, such as internal wars and terrorism made it important to rethink civilian protection as the centre of this new perspective of security. Threats to security are no...
Investigating the Cybercrimes Related with IOT Based Home Appliances
Dissertation - 16 pages - Sociology & social sciences
This paper covers four areas: introduction, literature review, results and recommendations, and conclusion. In the introduction, the paper delineates its research objective: to identify cyber threats of IoT-based home appliances and to propose actions for their reduction. The literature review...
Policy Evaluation Briefing - Social Engineering
Presentation - 4 pages - Sociology & social sciences
This briefing will evaluate the current policies available to tackle social engineering. Social engineering has become a menace in the world of technology today and affects almost everyone who uses technology. Technology has evolved rapidly over the past couple of decades, causing cybercrimes to...
Navigating the Hybrid Threats of the Paris 2024 Olympics: How Can Future Olympic Games Handle These Challenges?
Tutorials/exercises - 3 pages - Sports
The Olympic Games represent a major security issue. Indeed, two years before the event, French authorities are already working hard to make Paris safe for the hundreds of thousands, even millions, of people who should gather there for the Olympic Games. In 2021, the Minister of the...