Security Essays (Examples)

Studyspark

Study Document Study Document

Immigration Reform

Pages: 5 (1424 words) Sources: 6 Document Type:Essay Document #:73100593

...Security Why Immigration Reform is Needed
Immigration reform has almost always been a thorny issue in America. Though it is popularly believed that America was born of a nation of immigrants, the reality is that the original 13 colonies largely consisted of individuals from one specific part of Europe—England—and from the time of the War for Independence onward it was a White Anglo-Saxon Protestant (WASPs) ethic that served as the fulcrum for American power and politics. It was this fulcrum that established the concept of “Manifest Destiny”—i.e., the idea that it was America’s (that is, the WASP’s) destiny in life to expand and take over the land as far as it could see (O’Sullivan). “Manifest Destiny” was used to justify taking land from Mexico and it was implicitly used to justify American expansionism overseas. In other words, WASPs wanted to expand their control and exert their influence and power. The arrival……

References

Works Cited

Bartoletti, Susan C. 2001. Black Potatoes: The Story of the Great Irish Famine, 1845-1850. New York, NY: Houghton Mifflin.

Calavita, Kitty. Inside the State: The Bracero Program, Immigration, and the I. N. S. New York, NY: Routledge, 1992.

Federation for American Immigration Reform. “The costs of illegal immigration on United States taxpayers—2013 edition.” FAIR.  https://fairus.org/issue/publications-resources/fiscal-burden-illegal-Immigration-2013 

Hafetz, J. “Immigration and national security law: Converging approaches to state power, individual rights, and judicial review.” ILSA Journal of International and Comparative Law 18.3. (2012): 628.

O’Sullivan, J. L. “Manifest Destiny,” in Voices of Freedom: A Documentary History, 4th edition, ed. Eric Foner. New York: W.W. Norton, 2014.

McCaffrey, Lawrence John. The Irish Catholic Diaspora in America. CUA Press, 1997.

Studyspark

Study Document Study Document

CFOs Big Data Opportunities In Firms

Pages: 7 (2057 words) Sources: 6 Document Type:Research Paper Document #:26742092


Big Data Opportunities
Traditional data management tools and models have posed several challenges to the finance industry in the past in terms of security and inefficiencies. One of the major security issues is fraudulent activity by insiders and outsiders. With the world increasingly becoming more connected, outsiders acting in bad faith such as hackers … The traditional models do not have the systems required to secure digital assets as hackers become more advanced by the day. Therefore, this security problem should be overcome as soon as possible because of the tremendously big risk it poses to the financial services sector. The growth ……

References

References

Chen, H., Chiang, R. H., & Storey, V. C. (2012). Business intelligence and analytics: From big data to big impact. MIS quarterly, 36(4).

Jin, X., Wah, B. W., Cheng, X., & Wang, Y. (2015). Significance and challenges of big data research. Big Data Research, 2(2), 59-64.

Joshi, N. (2018). How Big Data Can Transform the Finance Industry. Retrieved October 7, 2019, from  https://www.bbntimes.com/en/technology/big-data-is-transforming-the-finance-industry .

Nath, T. I. (2019). How Big Data Has Changed Finance. Retrieved October 7, 2019, from  https://www.investopedia.com/articles/active-trading/040915/how-big-data-has-changed-finance.asp .

Turner, D., Schroeck, M., & Shockley, R. (2013). Analytics: The real-world use of big data in financial services. IBM Global Business Services, 27.

Yin, S., & Kaynak, O. (2015). Big data for modern industry: challenges and trends [point of view]. Proceedings of the IEEE, 103(2), 143-146.

Zhou, K., Fu, C., & Yang, S. (2016). Big data driven smart energy management: From big data to big insights. Renewable and Sustainable Energy Reviews, 56, 215-225.

Studyspark

Study Document Study Document

Workplace Trends And Changes

Pages: 7 (2170 words) Sources: 5 Document Type:Term Paper Document #:67790748

...Security Introduction
Three big trends impacting the workplace are 1) the effects of the #MeToo Movement and the need to implement policies to protect workers against sexual harassment, 2) the role that AI is playing in the workplace and the impact it is having on issues such as worker privacy, and 3) the problem of politics and how there may be gaps between the type of culture the administration wants to cultivate and the socio-political beliefs of some of its workers. For instance, Google has recently come under fire for demonstrating bias against conservative workers whose socio-political views do not reflect that administration’s Left-leaning politics (Ghaffary). This paper will discuss these trending issues, how they might impact the role of the administrative professional and the support they provide and how the administrative professional can positively influence any of the changes required as a result of the current issues as they give……

References

Works Cited

Ghaffary, S. Political tension at Google is only getting worse. Vox, 2019.  https://www.vox.com/recode/2019/8/2/20751822/google-employee-dissent-james-damore-cernekee-conservatives-bias 

Kreager, Derek A., and Jeremy Staff. "The sexual double standard and adolescent peer acceptance." Social psychology quarterly 72.2 (2009): 143-164.

Nilsson, Warren. "Positive institutional work: Exploring institutional work through the lens of positive organizational scholarship." Academy of Management Review 40.3 (2015): 370-398.

O'Neil, Adrienne, et al. "The# MeToo movement: an opportunity in public health?." The Lancet 391.10140 (2018): 2587-2589.

PLBSH. Yes, Men Can Be Sexually Harassed In The Workplace. PLBSH, 2019.  https://www.plbsh.com/yes-men-can-be-sexually-harassed-in-the-workplace/ 

Wong, N. & Chin, Y. “Issues and Challenges Faced by Generation X While Managing Generation Y.” International Journal of Business and Social Science 7.2 (2016): 167-170.

Studyspark

Study Document Study Document

Fiscal Health Of Public Administration

Pages: 8 (2386 words) Sources: 4 Document Type:response paper Document #:45658914

… for an…[break]…latest in ID technology software so that people could not abuse the system to receive funds, for example, from welfare or Social Security, that are not actually due to them. This system would enhance the existing system and reduce the scale and scope of errors and ……

References

RReferences

Abiad, A. & Khatiwada, S. (2019). 5 ways technology is improving governance, public service delivery in developing Asia. Retrieved from  https://blogs.adb.org/blog/5-ways-technology-improving-governance-public-service-delivery-developing-asia 

Florida Tech. (2019). Five global trends in public administration. Retrieved from  https://www.fit.edu/your-college-decision/trends-in-public-administration/ 

McDonald, B. (2017). Measuring the fiscal health of municipalities. Retrieved from  https://www.lincolninst.edu/sites/default/files/pubfiles/mcdonald_wp17bm1.pdf 

VCU. (2019). Public personnel administration. Retrieved from  https://commed.vcu.edu/IntroPH/Management/management/personnel.html 

Studyspark

Study Document Study Document

Irregular Warfare And United States

Pages: 5 (1609 words) Sources: 4 Document Type:Case Study Document #:48593751

...Security Introduction
Irregular warfare refers to the violent process through which various non-state and state actors fight for influence and legitimacy over populations. While the full might of military power may be employed, irregular warfare generally uses asymmetric and indirect approaches to reduce the power, will, and influence of the adversary. Because of the irregular approaches, such a process is usually very “messy” and the actions during such a war cannot be distilled into a clear definite and repeatable process. The process is usually characterized by terrorism, counterterrorism, insurgency, and counterinsurgency (Department of Defense Washington DC, 2017).
Just like in any organization, the execution of war takes place at various levels from the tactical level to the top strategic level. One can understand irregular warfare by breaking it down into various levels. At the top strategic level, influence and control over the target population determine irregular warfare. At the operational level,……

References

References

Davis, R. G. (Ed.). (2010). US Army and Irregular Warfare 1775-2007: Selected Papers From the 2007 Conference of Army Historians: Selected Papers From the 2007 Conference of Army Historians. Government Printing Office.

Department of Defense Washington DC, (2017). Irregular Warfare (IW) Joint Operating Concept (JOC). Washington: 2007. 100 p. Cit, 03-02

Lundberg, K. (2006). The Accidental Statesman: General Petraeus and the City of Mosul, Iraq. Kennedy School of Government, Case Program.

White, J. B. (1996). A different kind of threat: Some thoughts on irregular warfare.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… algorithms. End users are some of the least informed or least prepared individuals and are typically the number one threat/risk to a system’s security. They are targeted through phishing methods and unless trained to know better can make an organization extremely vulnerable. The same goes for protecting ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Is Homegrown Terrorism A Real Threat In The US Chesser Report

Pages: 1 (342 words) Sources: 1 Document Type:Essay Document #:38450443

… not knowing anything about the case other than what is contained in the Chesser Report (Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs, 2012), I would have to withhold judgment for now. I do believe there is a problem of homegrown terrorism in … terrorism is authentic or that it occurs without the aid of our intelligence agencies.
References
Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs. (2012). Zachary Chesser: A Case Study in Online Islamist Radicalization and Its Meaning for the Threat of Homegrown Terrorism.…

References

References

Majority and Minority Staff Senate Committee on Homeland Security and Governmental Affairs. (2012). Zachary Chesser: A Case Study in Online Islamist Radicalization and Its Meaning for the Threat of Homegrown Terrorism.

 

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

...Security How Technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this fact. This paper will show how technology enhances ESL students' learning experience related to ESL instructional practices and analyze how that topic or trend impacts the district,……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… terms). The arrangement not only meant that those who drove full-time for Uber would be making less, they would also have no job security, and no safety in terms of their physical health if they should be attacked while on the job (North, 2019). Or, as the ……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

Natural Science Health And Nutrition

Pages: 9 (2735 words) Sources: 5 Document Type:Essay Document #:29717647

...Security How to Rid Oneself of Diabetes through Healthy Dieting
Concrete Experience
I started my health and nutrition program study after I began reading more health literature. I had seen my father’s health erode as a result of poor dieting and lack of exercise. He suffers from diabetes and is convinced it is not related to his lack of dieting or exercise, but the literature I had read convinced me otherwise. Davis (2008) showed that natives in the Marshall Islands developed diabetes when they moved away from their natural, organic diets and began consuming pre-packaged, fast foods. He initiated a program that returned them to a lifestyle of living off the land and sea, which gave them exercise and a healthy, organic diet. Their diabetes disappeared (Davis, 2008). Bray, Nielsen and Popkin (2004) and Malik et al. (2010) also have shown a link between consumption of high-fructose corn syrup, soda pop……

References

References

Bray, G. A., Nielsen, S. J., & Popkin, B. M. (2004). Consumption of high-fructose corn syrup in beverages may play a role in the epidemic of obesity. The American Journal of Clinical Nutrition, 79(4), 537-543.

Davis, B. (2008). Defeating Diabetes: Lessons from the Marshall Islands. Today’s Dietitian, 10(8), 24.

Heart. (2020). Cholesterol. Retrieved from  https://www.heart.org/en/health-topics/cholesterol/hdl-good-ldl-bad-cholesterol-and-triglyceride s

Heart Monounsaturated Fat. (2020). Retrieved from  https://www.heart.org/en/healthy-living/healthy-eating/eat-smart/fats/monounsaturated-fat s

Malik, V. S., Popkin, B. M., Bray, G. A., Després, J. P., Willett, W. C., & Hu, F. B. (2010). Sugar sweetened beverages and risk of metabolic syndrome and type 2 diabetes: a meta-analysis. Diabetes Care,  https://doi.org/10.2337/dc10-1079 

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".