Security Essays (Examples)

Studyspark

Study Document Study Document

Field Experience Report Observation In The Deaf Classroom

Pages: 9 (2606 words) Sources: 8 Document Type:Essay Document #:99266210

...Security Field Experience Report - Observation in the classroom at the school for the Deaf
Introduction
In the US, residential institutions of learning have had a long relationship with the deaf community. They are the centers where linguistic and cultural transmission takes place. The residential, educational institutions for deaf people serve learners at K-12 levels. They avail dormitories for learners who hail from far geographical distances. Usually, each state has built, at least, one residential program of education for the deaf (Romano, 2013). It has also been noted that large communities of the deaf usually settle near a residential school. A good number of states offer education programs that provide language services and training for the deaf, including a rich cultural environment where American Deaf learners are taught American Sign Language and English Bilingual instruction. Such settings are also referred to as deafcentric. Learners are enabled to interact with teachers, heads,……

References

References

Guardino, C., & Antia, S. D. (2012). Modifying the classroom environment to increase engagement and decrease disruption with students who are deaf or hard of hearing. Journal of Deaf Studies and Deaf Education, 17(4), 518-533.

Hombo, C. M. (2003). NAEP and No Child Left Behind: Technical challenges and practical solutions. Theory into Practice, 42(1), 59-65.

Jeffries Jr., R. L. (2010). A Case Study of a Teacher Implementing Guided Reading in a Deaf Classroom. ProQuest LLC.

Malik, A. M., Rashid, M., Awan, M. Y., & Alvi, I. B. (2018). The Role of Architecture in the Identification of Obstacles and Spatial Solutions to Inclusive Education. UMT Education Review (UER), 1(2), 39-58.

Renard, M. (1999). Les sourds dans la ville: surdités et accessibilité. ARDDS (Association pour la réadaptation et la défense des devenus-sourds).

Romano, A.M. (2013). Observing a Residential School for the Deaf: Identifying Factors in Creating a Deafcentric Environment. (The Honors Program, Gallaudet University).

Staten, F. D. (2011). Examining the influence of the residential school for the deaf experience on deaf identity. (Doctor of Philosophy thesis, University of Iowa).

Van Gent, T., Goedhart, A. W., Knoors, H. E., Westenberg, P. M., & Treffers, P. D. (2012). Self-concept and ego development in deaf adolescents: a comparative study. Journal of deaf studies and deaf education, 17(3), 333-351.

Studyspark

Study Document Study Document

Solitary Confinement And Mental Health Issues In Corrections

Pages: 11 (3163 words) Sources: 16 Document Type:Essay Document #:96033944

… was used in California in the 1970s, but it presents its own set of problems as well with respect to maintaining discipline and security for prisoners and the staff (Stojkovic & Lovell, 2019).
Impacts of Incarceration and Social Justice Issues
Correctional Institution
The Minnesota Department of Corrections ……

References

References

Clemmer, D. (1940). The prison community. New Braunfels, TX: Christopher Publishing House.

Compton, M. T., Anderson, S., Broussard, B., Ellis, S., Halpern, B., Pauselli, L., . . .Johnson, M. (2017). A potential new form of jail diversion and reconnection to mental health services: II. Demonstration of feasibility. Behavioral Sciences & the Law, 35(5–6), 492–500. doi:10.1002/bsl.2319

Corrections Arizona Department. (2020). Retrieved from https://corrections.az.gov/location/110/kingman

Dryburgh, M. (2009). Policy implications of whistle-blowing: The case of Corcoran State Prison. Public Integrity, 11(2): 155-170.

Fantel, H. (1974). William Penn: Apostle of Dissent. NY: William Morrow & Co. Florida Department of Corrections. (2020). Retrieved from

https://twitter.com/FL_Corrections/status/1234884340296843266

Hensley, J. & Rough, G. (2011). Kingman prison still under scrutiny. Retrieved from  http://archive.azcentral.com/news/articles/2011/01/30/20110130kingman-prison-still-under-scrutiny0130.html 

HIV among Incarcerated Populations. (2015). CDC. Retrieved from  http://www.cdc.gov/hiv/group/correctional.html

Studyspark

Study Document Study Document

Law Of War

Pages: 3 (843 words) Sources: 2 Document Type:Essay Document #:24882465

… respect for their rights, honor, convictions, customs, and practices, it gives power to the particles in conflict to adopt control measures that guarantee security to the protected persons. Likewise, article 28 outlines that areas with protected person don’t imply immunity from military operations. Further, article 32 cautions ……

References

References

Howard, L. (1956). The Law of Land Welfare FM 27-10. Washington DC: Department of the Army.

US Marine Corps. (2005). War Crimes MCTP 11-10A (Formerly MCRP 4-11.8B). Washington DC: Department of the Navy.

Studyspark

Study Document Study Document

Digital Forensics Importance Of Hash Values

Pages: 5 (1350 words) Sources: 5 Document Type:Essay Document #:47872866

...Security Hash Values in Digital Forensics
Introduction
Hash values denote condensed representations of digitized or binary content within digital material; however, they offer no additional information pertaining to the contents of any material interpretable by an individual. Moreover, the hash function is algorithms that convert variable-sized text quantities into hash values (which are fixed-sized outputs). Also called “cryptographic hash functions,” they facilitate the development of digital signatures, short textual condensations, and hash tables for the purpose of analysis (Fang et al., 2011; Kumar et al., 2012). In this paper, hash functions and their significance will be addressed.
Description
H (hash function) represents a transformation taking variable-sized input „m? and returning fixed-sized strings (h or hash value; i.e., h = H (m)) (Kumar et al., 2012). The hash functions possessing only the above property can be put to various broad computational uses; however, when applied to cryptography, they normally possess a few……

References

References

Fang, J., Jiang, Z. L., Yiu, S. M., & Hui, L. C. (2011). An efficient scheme for hard disk integrity check-in digital forensics by hashing with combinatorial group testing. International Journal of Digital Content Technology and its Applications.

Kaya, M., & Eris, M. (2017). Hash-based block matching for digital evidence image files from forensic software tools. World Academy of Science, Engineering, and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 11(10), 1068-1071.

Kumar, K., Sofat, S., Jain, S. K., & Aggarwal, N. (2012). SIGNIFICANCE of hash value generation in digital forensic: A case study. International Journal of Engineering Research and Development, 2(5), 64-70.

Netherlands Forensic Institute, (2018a). Technical Supplement Forensic Use of Hash Values and Associated Hash Algorithms. Ministry of Justice and security.

Rasjid, Z. E., Soewito, B., Witjaksono, G., & Abdurachman, E. (2017). A review of collisions in cryptographic hash function used in digital forensic tools. Procedia computer science, 116, 381-392.

Studyspark

Study Document Study Document

White Collar Crime And The Department Of Education

Pages: 4 (1318 words) Sources: 3 Document Type:Essay Document #:56412463

...Security White Collar Crime
A grade fixing scandal emerged at William Cullen Bryant High School in Long Island City in 2015. The principal of the school, Namita Dwarka, had been adamant with teachers that they help students to pass so that they can meet their graduation quotas (Gonen, Edelman & Golding, 2015). Several teachers and some students began to speak out about the pressure they were getting from the principal. Mary Bozoyan was one of them. She blew the whistle on what became known as the grade fixing scandal at William Cullen Bryant. Her reward was retaliation from the principal (Edelman, 2015). This paper will describe the issues and criminal activity that really goes all the way up the chain of command to the Department of Education. The major issues concern falsifying student grades but more importantly the quid pro quo conditions placed on schools and states by the federal government,……

References

References

Edelman, S. (2015). School ‘retaliates’ against disabled teacher for criticizing principal. Retrieved from  https://nypost.com/2015/11/01/school-retaliates-against-disabled-teacher-for-criticizing-principal/ 

Gonen, Y., Edelman, S. & Golding, B. (2015). City finally decides to probe rampant grade-fixing. Retrieved from  https://nypost.com/2015/08/03/city-finally-decides-to-probe-rampant-grade-fixing/ 

Granata, K. (2015). Queens Community Demands Removal of High School Principal. Retrieved from  https://www.educationworld.com/a_news/queens-community-demand-removal-high-school-principal 

Studyspark

Study Document Study Document

Adapting To War Time

Pages: 1 (307 words) Document Type:Essay Document #:48641262

… as it was called. The government created new organizations to assist in the war effort and relied on volunteers to pitch in with security and factory work. This was the first time, for instance, women took an active role in working outside the home in the factories.

……

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… Stalin made the Cold War inevitable and thus Gaddis places the blame for the Cold War squarely on Stalin: “He alone pursued personal security by depriving everyone else of it: no Western leader relied on terror to the extent that he did.”[footnoteRef:17] Stalin was the virus that ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

… the society, but also against the supreme law of the land. As per the Second Amendment: “a well-regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed” (Hayes, 2016, p. 33). There ……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Strengths And Weaknesses Of Various Organizational Behavior Theories

Pages: 14 (4343 words) Sources: 16 Document Type:Essay Document #:17367904

...Security A Review of Organizational Behavior Theories
Because organizations are the primary means by which capital is earned and job are created, it is not surprising that there has been a great deal of scholarship concerning how organizations actually “behave” in the real world. The purpose of this paper is to provide a current definition of organizational behavior together with a statement of three prominent theories of organizational behavior, French and Raven's Five Bases of Power, Complexity Theory and Resource Dependence Theory. An explanation concerning the fundamental concepts of each of these three theories is followed by an analysis of their respective importance to a business. In addition, an evaluation of the strengths and weaknesses of each of these three theories as well as the positive and negative ways that the theories impact the workforce behavior of organizations. Finally, in the context of Air India, the paper presents a critical analysis……

References

References

‘About Air India.’ Air India. [online] available:  http://www.airindia.in/about-airindia.htm .

Arena, MJ ‘Understanding Large Group Intervention Processes: A Complexity Theory Perspective.’ Organization Development Journal, 27, no. 1 (Spring 2009): 49-53

Braunstein, JR and Zhang, JJ ‘Dimensions of Athletic Star Power Associated with Generation Y Sports Consumption.’ International Journal of Sports Marketing & Sponsorship, 6, no. 4 (July 2005): 242-245.

Buble, M and Juras, A ‘The Relationship between Managers\\' Leadership Styles and Motivation.’ Management: Journal of Contemporary Management Issues, 19, no. 1 (June 2014): 161-165.

French, JRP & Raven, B ‘Bases of power.’ In D. Cartwright (Ed.), Studies in Social Power (pp. 150-167). Ann Arbor, MI: University of Michigan, 1959.

Gruia, GC and Kavan, M ‘An Off-Line Dual Maximum Resource Bin Packing Model for Solving the Maintenance Problem in the Aviation Industry.’ Global Economic Observer, 1, no. 1 (January 1, 2013): 135-140.

Hillman, AJ, Withers, MC and Collins, BJ ‘Resource dependence theory: A Review.’ Journal of Management, 35, no. 6 (2009): 1404-1427.

Jain, AK ‘Organizational Citizenship Behaviour as a Potential Source of Social Power.’ Indian Journal of Industrial Relations, 45, no. 3 (January 2010): 396-401.

Studyspark

Study Document Study Document

US And Poland Relations And Military Partnerships

Pages: 3 (978 words) Sources: 4 Document Type:Essay Document #:95804576

...Security Polish Culture
Poland is one of the biggest Central European countries and is divided into 16 subdivisions. Approximately 60.1% of the population of 38.4 million people live in urban areas (CIA, 2019). A majority of the population identify themselves as Poles and speak Polish as their native language (CIA, 2019). The capital in Warsaw, and it is a Unitary parliamentary constitutional Republic with a president and prime minister. It has a legislature divided into and upper and lower house (CIA, 2019). It is bounded by the Baltic Sea, Lithuania, Belarus, Ukraine, Slovakia, Russia’s Kaliningrad Oblast, the Czech Republic, and Germany (InfoPoland, n.d.).
The geography of Poland is relatively low, with 91% of the country at just 300 meters above sea level (InfoPoland, n.d.). It has a relatively flat terrain, but glaciers in the region formed low hills and numerous small lakes in the northern portion of Poland (InfoPoland, n.d.). The……

References

References

CIA (2019). The World Factbook: Poland. Retrieved from https://www.cia.gov/library/publications/the-world-factbook/geos/pl.html

IntoPoland. (n.d.). Geography of Poland. Retrieved from  http://www.intopoland.com/poland-info/geography-of-poland.html 

Peszke, M. (2017). Polish Armed Forces, 1918-present. Oxford Bibliographies. Retrieved from  https://www.oxfordbibliographies.com/view/document/obo-9780199791279/obo-9780199791279-0150.xml 

U.S. Department of State. (2019, June 10). U.S. Relations with Poland. Retrieved from  https://www.state.gov/u-s-relations-with-poland/ 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".