Security Threat Essays (Examples)

Studyspark

Study Document Study Document

How Media Coverage Of Operation Desert Storm Was Influenced By The

Pages: 11 (3336 words) Sources: 8 Document Type:Essay Document #:61111774

… Storm in response to Saddam Hussein’s invasion and occupation of Kuwait while the American public held its collective breath to see whether Hussein’s threat to wage “the mother of all battles,” including threat to use chemical weapons of mass destruction, would come to fruition. Although the Iraqi military was never able to live up to their … responses to this conflict included an initial “rally ‘round the flag” reaction that swept the nation which is commonplace during times of perceived threat to national security. In fact, throughout its history, Americans have been taught from an early age that their country is the greatest nation in the world, ……

References

References

Curtis, J. (2015, November). Reflecting on strategic results of Operation Desert Storm. Army, 65(11), 24-27.

Khan, H. (2011, July 1). An unbiased estimate of present American competitiveness from deontological and teleological perspectives of utilitarianism. Competition Forum, 9(2), 348-352.

Klotzer, C. L. (2002, October). A lesson for Americans: Desert Storm operation reports were full of lies and distortions. St. Louis Journalism Review, 32(250), 34-39.

Lindsey, J. M. & Smith, C. (2003, Summer). Rally 'round the flag: Opinion in the United States before and after the Iraq War. Brookings Review, 21(3), 20-24.

Operation Desert Storm. (2020). U.S. History. Retrieved from  https://www.ushistory.org/  us/60a.asp.

Stilwell, B. (2015, September 12). 21 facts about the first Gulf War. Military.com. Retrieved from  https://www.military.com/undertheradar/2015/09/21-facts-about-the-first-gulf-war .

Taylor, A. (2016, January 14). Operation Desert Storm: 25 years since the first Gulf War. The Atlantic. Retrieved from  https://www.theatlantic.com/photo/2016/01/operation-desert-storm-25-years-since-the-first-gulf-war/424191/ .

Tilford, K. H., Jr. (1993, Summer). Review: The meaning of victory in Operation Desert Storm: A review essay. Political Science Quarterly, 108(2), 327-331.

Studyspark

Study Document Study Document

Fero Beauty Boutiques

Pages: 6 (1862 words) Sources: 4 Document Type:Marketing Plan Document #:30588715

… be located on a site where there is stability. It is imperative to ensure that the location does not have any kind of security. Typically, in New York, some gangs might impact the security, stability, and operations of the retail store.
Economic Factors
Economic factors that will impact the company will include the economic growth rate of … have the opportunity to market its products on different social media platforms, including Facebook and Instagram. This will increase the company's consumer base.
threat
1. Changing consumer preferences
In the contemporary fashion world, consumer preferences are regularly changing and at a quick pace. It will be essential … clients through online transactions. This is becoming a progressively preferable option for consumers.
3. Product Substitution
Fero Beauty will also face the significant threat of product substitution being easily accessible. It is imperative to note that it is easy for consumers to switch……

References

References

Boone, L. E., & Kurtz, D. L. (2013). Contemporary marketing. Cengage learning.

Jeannet, J. P., & Hennessey, H. D. (2005). Global marketing strategies. New York: Dreamtech Press.

Menon, R. V., Sigurdsson, V., Larsen, N. M., Fagerstrøm, A., & Foxall, G. R. (2016). Consumer attention to price in social commerce: Eye-tracking patterns in retail clothing. Journal of Business Research, 69(11), 5008-5013.

 

Studyspark

Study Document Study Document

US Marshals In Civil Rights Era

Pages: 5 (1551 words) Sources: 2 Document Type:Essay Document #:90084071

… handle fugitives. Policing America was necessary post-segregation era since the African Americans needed protection against harm, discrimination, and criminalization. The U.S. marshals provided security for them, fulfilling their duty of call to the American people.
The first Congress created the U.S. Marshals under President George Washington. The … Luke Moore and Deputy US Marshal Richard Kirkland Bowden both worked within the crowds to control any form of violence that might have threat to occur at that time. The crowd was full and heavy on the morning of August 28, 1963. Despite the fears of violence, … they have done that to this day. During the civil rights movement, which was a crucial time in the country, they helped provide security to segregated African Americans, and this showed their commitment to protecting the American people and not just a select race. In most American ……

References

References

Larry K. Gaines, V. E. (2014). Policing in America. New York: Routledge.

Skocpol, T. (1999). Advocates without Members: the recent transformation of American civic life. In T. Skocpol, Civic Engagement in American Democracy (pp. 461-480). Washington, DC: Brookings Institution Press.

Studyspark

Study Document Study Document

Irregular Warfare And United States

Pages: 5 (1609 words) Sources: 4 Document Type:Case Study Document #:48593751

...Security threat Introduction
Irregular warfare refers to the violent process through which various non-state and state actors fight for influence and legitimacy over populations. While the full might of military power may be employed, irregular warfare generally uses asymmetric and indirect approaches to reduce the power, will, and influence of the adversary. Because of the irregular approaches, such a process is usually very “messy” and the actions during such a war cannot be distilled into a clear definite and repeatable process. The process is usually characterized by terrorism, counterterrorism, insurgency, and counterinsurgency (Department of Defense Washington DC, 2017).
Just like in any organization, the execution of war takes place at various levels from the tactical level to the top strategic level. One can understand irregular warfare by breaking it down into various levels. At the top strategic level, influence and control over the target population determine irregular warfare. At the operational level,……

References

References

Davis, R. G. (Ed.). (2010). US Army and Irregular Warfare 1775-2007: Selected Papers From the 2007 Conference of Army Historians: Selected Papers From the 2007 Conference of Army Historians. Government Printing Office.

Department of Defense Washington DC, (2017). Irregular Warfare (IW) Joint Operating Concept (JOC). Washington: 2007. 100 p. Cit, 03-02

Lundberg, K. (2006). The Accidental Statesman: General Petraeus and the City of Mosul, Iraq. Kennedy School of Government, Case Program.

White, J. B. (1996). A different kind of threat: Some thoughts on irregular warfare.

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… visible to machine learning algorithms. End users are some of the least informed or least prepared individuals and are typically the number one threat/risk to a system’s security. They are targeted through phishing methods and unless trained to know better can make an organization extremely vulnerable. The same goes for protecting ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Iraq War

Pages: 7 (2067 words) Sources: 6 Document Type:Case Study Document #:65620193

… added some simple goals which had to be accomplished before the military end state was officially declared. Such included the reestablishment of local security and granting locals unpaid-for access to energy reserves. There was however some bone of contention between the military end state and the officials … Iraqis. For instance, two divisions positioned themselves to attack the weak western arm of the Iraqi forces. Meanwhile, the coalition forces made a threat to invade from the eastern side. The Iraqis, therefore, moved in big numbers to the east, unaware of the impending attack on the … to the aforementioned tactics, they also made good use of effects and a concealed approach plan. These can be seen in the fake threat to attack from the sea while the actual attack was on land. Effects in this context refer to the requirements that need to … land. Effects in this context……

References

References

Andrews, W. F. (1998). Airpower against an Army: Challenge and Response in CENTAF\\\\\\'s Duel with the Republican Guard. DIANE Publishing.

Bame, D. J. (2001). The Exit Strategy Myth and the End State Reality. Marine Corps Command and Staff College. Quantico VA.

Builder, C. H., Bankes, S. C., & Nordin, R. (1999). Command concepts: A theory derived from the practice of command and control. RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA.

Currie Jr, J. G. (1995). Operational Logistics, War and Operations Other Than War: What Applies?. Army Command and General Staff College. Fort Leavenworth Ks. School of Advanced Military Studies.

Joint Chiefs of Staff (2017). Joint Publication 5-0: Joint Planning. Washigton, DC, Aug.

Matsunaga, H. (2019). The Reconstruction of Iraq after 2003: Learning from Its Successes and Failures.

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… terms). The arrangement not only meant that those who drove full-time for Uber would be making less, they would also have no job security, and no safety in terms of their physical health if they should be attacked while on the job (North, 2019). Or, as the … for hire business model that Uber uses. Since Uber has undermined the traditional taxi cab business it has no real competition as a threat, so it can get away with this model. Yet from a Christian perspective Uber’s leaders are not demonstrating servant leadership and should……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

McCarthyism Fear Of The Red Menace And The Cold War

Pages: 1 (336 words) Sources: 2 Document Type:response paper Document #:76945842

… having sympathies with the Communist party or for not giving up names to the government of people suspected of being a Communist. The threat of nuclear war also frightened many middle class white Americans, especially in the 1960s as a standoff between the US and Soviet-backed Cuba … of nuclear war also frightened many middle class white Americans, especially in the 1960s as a standoff between the US and Soviet-backed Cuba threat to take the world to the brink of all-out nuclear war. Kennedy stated in his 1962 speech that the presence of Soviet missiles … the brink of all-out nuclear war. Kennedy stated in his 1962 speech that the presence of Soviet missiles in Cuba represented “an explicit threat to the peace and security of all the Americas” (Kennedy). The difference for white Americans and African Americans was that white Americans lived in fear during the Cold ……

References

References

Kennedy, John F. “Speech, 22 October 1962.” https://www.americanrhetoric.com/speeches/jfkcubanmissilecrisis.html

Skrentny, John David. "The effect of the Cold War on African-American civil rights: America and the world audience, 1945-1968." Theory and Society 27.2 (1998): 237-285.

 

Studyspark

Study Document Study Document

John Lewis Gaddis

Pages: 8 (2280 words) Sources: 9 Document Type:Essay Document #:77530466

… https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis]
Part 2: Why I Chose This Historian
I chose this historian because of my own interest in the Cold War, when the threat of nuclear war was so high. The fact that Gaddis has been called the Dean of the Cold War piqued my interest in … Stalin made the Cold War inevitable and thus Gaddis places the blame for the Cold War squarely on Stalin: “He alone pursued personal security by depriving everyone else of it: no Western leader relied on terror to the extent that he did.”[footnoteRef:17] Stalin was the virus that ……

References

Bibliography

Alpha History, “Cold War Historiography.”  https://alphahistory.com/coldwar/cold-war-historiography/ 

Branch, Mark Alden. “Days of Duck and Cover,” Yale Alumni Magazine, 2000.  http://archives.yalealumnimagazine.com/issues/00_03/gaddis.html 

Encyclopedia. “John Lewis Gaddis,” 2020.  https://www.encyclopedia.com/arts/educational-magazines/gaddis-john-lewis-1941 

Gaddis, John Lewis. We Now Know: Rethinking Cold War History. Oxford University Press, 1997.

Kaplan, Fred. “America’s Cold War Sage and His Discontents,” NYTimes, 2007. https://www.nytimes.com/2011/11/23/books/george-f-kennan-by-john-lewis-gaddis-review.html

Lundestad, Geir. "The Cold War According to John Gaddis." Cold War History 6, no. 4 (2006): 535-542.

National Endowment for the Humanities. “John Lewis Gaddis,” 2005.  https://www.neh.gov/about/awards/national-humanities-medals/john-lewis-gaddis 

Paxton, Robert. Anatomy of Fascism. New York: Vintage, 2012.

Studyspark

Study Document Study Document

Retention In The National Guard

Pages: 10 (2959 words) Sources: 7 Document Type:Capstone Project Document #:20886677

… involved in ensuring that the country has a fully equipped standing military force that is capable of dealing with any external or internal threat. One of the ways it does this is to make laws that influence how the different branches of the United States military recruit … military reservists typically trained just once a month and a couple of weeks every summer. However, after the bombing and because of the threat the country faced, reservists are now required to train almost full time (Figinski, 2017). And with more countries needing the help of the ……

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".