The Mbuti, commonly known as the Bambuti people is one of the many pygmy groups of people living in the Ituri rain forest in Congo region of central Africa. This group of indigenous people is one of the native communities in Congo region who have preserved their cultural and social practices for a long time. They are known for their active foraging lifestyle that is characterized by hunting and gathering wild fruits, roots and vegetables as their main source of food as well as their inhabitant which is the tropical rain forest where they live in small villages known as ...
Gathering Research Papers Samples For Students
121 samples of this type
While studying in college, you will certainly have to compose a lot of Research Papers on Gathering. Lucky you if putting words together and turning them into relevant content comes naturally to you; if it's not the case, you can save the day by finding a previously written Gathering Research Paper example and using it as a template to follow.
This is when you will certainly find WowEssays' free samples directory extremely useful as it embodies numerous skillfully written works on most various Gathering Research Papers topics. Ideally, you should be able to find a piece that meets your requirements and use it as a template to build your own Research Paper. Alternatively, our competent essay writers can deliver you an original Gathering Research Paper model crafted from scratch according to your custom instructions.
Abstract
This report will discuss the Central Intelligence Agency or collective known as CIA. It is important to consider the organization for assessment because it represents a significant role as a public organization that gathers intelligence that are crucial in ensuring the security of the entire United States against internal and external threats. CIA is the main arm of the federal government in intelligence gathering that are detrimental to policymakers. This paper will explore the role of the agency in creating foreign and national security policies. However, CIA is facing problems of inadequate analytical standards that resulted a major revamp in the organization ...
The role and responsibilities of the local police
Abstract
Terrorism is a growing threat faced by several nations today. The response to terrorism had radically changed throughout the world subsequent to the 9/11 attacks and the role of the local police in combating terrorism was fiercely emphasized. The local police, while understanding and accepting the challenge have drawbacks in their counter terrorist efforts. Terrorist outfits and organizations are generally small and are secretive in their working, which makes it difficult for the law enforcement agencies to track them down. The modus operandi of the terrorists is to seek innovative and less suspecting ways of attacks that at ...
INTELLIGENCE, TERRORISM AND HOMELAND SECURITY/POLITICS
Police administration has been formalized in order to provide an organized system of policing.In the 1970's, professional models of policing have been expanded towards reaching the community and the police are considered to be the best judges on how to deal with peace and order in the community.In the modern era, effective policing is extremely important in protecting life, liberty and property to ensure peace and order. The effective law enforcement is important in counteracting terrorism and other security issues that can threaten the national and global peace and order. The emerging threat of global terrorism becomes a significant ...
Ethics and social responsibility in a leadership context specifically focusing on Australian anti doping authority investigation into drug use in the national rugby league and Australian football league
It was easier to gather information about ethics and social responsibility in sports because it falls in my area of specialization. In the research on ethics and social responsibilities in leadership context, various instruments of research were used to collect the relevant data. Because the research involved gathering of information from a large group of participants, secondary information was gathered from books, journals, newspapers and Australian Anti Doping Agency investigation (ASADA) publications. The ...
Many in government and in the media have been extremely critical of the intelligence community, and in particular the FBI (Federal Bureau of investigation) because of the failure to detect and prevent the attacks by terrorists on 9/11. In the immediate aftermath a congressional inquiry into the attacks pointed specifically to the FBI for its prior failure to focus on possible domestic terrorism. In particular, this inquiry found that the FBI failed to collect useful intelligence, carefully analyze the intelligence they did have and (perhaps most importantly) to quickly and fully share the results of their intelligence gathering with other ...
Testing web penetration aspect with Kali Linux
Introduction
With security issues of the internet becoming a major point of concern for many organizations, there is a need to have testing of the internet to check if there is sufficient security. This is equivalent to auditing the penetration of the organization. Penetration testing is a process where the vulnerabilities that have been identified are real threats or false. One of the methods that an assessment can make use is that of scanning tools which can show the vulnerabilities that exist in a given system. The penetration test would be conducted by trying to hack the given vulnerabilities just the way a ...
Introduction
Forensics refers to the use of scientific knowledge for the collection, analysis, and presentation of evidence to the courts (Guo, Jin & Hang, 2011).More specifically, forensic science refers to “the application of scientific techniques and principles to provide evidence to legal or related investigations and determinations” (Guo et al., 2011, p. 225).
Although forensic science has been employed in crime investigations since the early twentieth century (Palmer, 2002) through the use of traditional forensic techniques, the emergence of computers and other forms of technology has led to crimes that are being committed either in the cyber world or ...
MEMORANDUM
Re: Sally Reporteur’s News Story on the Reform the Electoral College Movement
FACTS
Sally Reporteur recently graduated from a prestigious journalism school. Soon after graduation she found a position as reporter for a local news station. Based on her educational background, and the small staff at the news station, her supervisor gave her a fairly significant amount of discretion to find, investigate and write her own news stories. Like many people of her age group, Sally was quite adept at using information technologies for both her work and in her private life.
One day, while she was chatting ...
Objective: The objective of this research was to conduct an epidemiological study for the cases of miscarriages at the Emergency Department of the University Malaya Medical Center, as well as suggest ways to improve the efficiency of providing emergency responses to miscarriage cases presented at the medical institutions’ emergency department.
Study Design: This study analyzed the information on the cases resented at the Emergency Department of the University Malaya Medical Center related to gynae problems, particularly those of the miscarriages cases. The time frame for the gathering of data was 8 months from October 2013 to May 2014.
...
Understanding that ethics is extremely vital in public safety is something that many are not aware of or don not recognizing the significance. Ethics in public safety should be considered deeply especially when organizations are planning operation. However, some think that some polices that are recognized in the public safety sector, promotes and permits unprincipled behavior; for instance the USA Patriot Act. This act was approved by Congress as a reply to the terrible terrorist attack that took place on September 11, 2001. Research shows that this act permits federal officials bigger authority in intercepting and tracking communications, both for ...
The Mbuti, commonly known as the Bambuti people is one of the many pygmy groups of people living in the Ituri rain forest in Congo region of central Africa. This group of indigenous people is one of the native communities in Congo region who have preserved their cultural and social practices for a long time. The group has distinct cultural values in terms of language and cultural practices that define their indigenous lives as well as differentiate them from their neighboring communities. This paper discusses in details the cultural existence of the Mbuti people in relation to their social organization, ...
Introduction
The introductory section of the paper clearly presents what the author was trying to convey. The author posited that oversights in nursing care can produce negative impacts. There was not enough research to show the factors why nursing care was omitted. The absence of appropriate and adequate literary support on the subject, the problem statement was ambiguous. There were no methods stated in the initial paragraph. Rather, the methods were mentioned in the other section of the paper. There was also no mentioning of the research tradition utilized; hence, no assumptions can be rendered concerning the research problem.
Two ...
Pow-wow is a Native American cultural gathering held annually to celebrate and honor the tribal customs and cultural connectedness. The term pow-wow has originated from the word powwaw, a native Indian word which means a “healing ceremony” led by spiritual or religious leaders from different tribes (Schweigman, et al, n.p.). While there is no clear evidence when the pow-wow started, it is believed to have originated from the Pawnee tribe where their religious ceremonial meeting includes dancing and other rituals. Since then, other Indian tribes have adopted the ceremony and integrated their own traditions. The Indians have practiced this ...
Video games are very popular and have been that way for some time. Since the days of video arcades and home game consoles, players have been choosing this activity as a pastime and as a form of entertainment. With the introduction of the internet, video games and its appeal has reached new audiences and have become extremely popular and almost a way of life. Insafe website states that in recent years, online gaming has become big business and many games have a huge following (Insafe).
With so many video game communities and many games to choose from, it is important to identify ...
1. Introduction
Synagogues are an essential part of the Jewish community both in Israel and various parts of the world in which this people are dispersed. Specifically, the synagogues are a core component of the lives of Jewish people who subscribe to the Judaism and Chasidim faith. The synagogues have been an integral part of the Jewish community ever since their exile years in Babylon. The basic ideology that motivated the exiled members of the Jewish community to set up synagogues was there inability to access the Temple of Jerusalem which prior to their exile in Babylon had been ...
The Betek people belong to a group known as Semang which occupies the areas around Lebir River in the Kelantan state in Peninsular Malaysia. Foraging as their primary mode of foraging is based on the exploitation of wild foods, fruits and small wild animals such as gibbons and monkeys, which they kill with blowpipes and poisoned darts. The group moves in and out of the forests to take advantage of the emerging opportunities including trade in forest products and participation in tourism activities. The mode of subsistence has significantly impacted on the social, economic and political organization of the Batek ...
Point Lobos is an area in Monterey County, California, which encompasses Point Lobos Natural Reserve, Point Lobos State Marine Reserve, and Point Lobos State Marine Conservation Area (). It is currently used as a marine protected area, a recreational scuba diving destination, and for hiking by tourists, but the area has a long cultural history. The coastal area was inhabited by tribes of indigenous people that are known collectively as the Ohlone, who lived in the area until the first European explorers arrived in 1602 (). Since then, Point Lobos has been inhabited by a number of different people until it ...
Affiliated Institution
Introduction
For many years, Amnesty International has been a champion for global humanitarian and human rights issues. With the world continuously evolving, Amnesty International has adapted to these changes and accommodated them. Due to population growth, the world has witnessed continued conflicts over resources specifically in Africa and the Middle East. These conflicts are fueled by political regimes and their ideologies, (Weinstein 2010). Terror groups such as Boko Haram, Al-Shabaab and Islamic State (IS), have continuously violated human rights. In most African countries, dictatorial rule has come under threat with masses becoming more educated and informed of their human ...
Abstract
The research examines the concept of global organized crime. It commences by examining the concept of organized crime and how it occurs in the international community. This leads to discussions on the realities and challenges with dealing with organized crime in international communities.
Organized crime is very difficult to handle in political matters. It involves transnational crime that is organized and hierarchical. The process leads to major challenges for governments and this is based on the economic and political benefits that are utilized in an authentic desire to benefit citizens of countries around the world. Organized crime groups are ...
The paper will focus on examining the tools that are enacted in the United States to help fight against organized crime and terrorism in which diplomacy, criminal law, financial control, military force and intelligences are all critical components that need to work correlated and coordinated. The thesis of this paper is that in every counterterrorism toll beside the advantages there are many disadvantages and controversy present. The important documents accepted in the recent time regarding the counterterrorism will be examined with the main focus on the Patriot Act. The negative and positive sides of the use of wiretapping, metadata, ...
Introduction
The US Constitution guarantees many of the rights of the individual citizens. One of the rights guaranteed is the right to peaceably assemble. The Bill of Rights states in part that “Congress shall make no law respecting an establishment of religion, or the free exercise thereof [] or the right of the people to peaceably assemble” (First Amendment [emphasis added]). The 14th Amendment, on the other hand, ensures that states enforce this guarantee and all other civil rights guaranteed under the Constitution. The core issue in the present study is the right of the fans of Big Bad Bruce to ...
Introduction
Historically, dogs have played critical roles in the life of human beings. Since ancient times, these animals have been man’s best friend in almost all dimensions of his life. In warfare, for example, this unique animals have been used as sentries, scouts, trackers and in some cases war soldiers. Even though there exists substantial variation in the utilization of these dogs throughout history (from sports, hunting, messengers and war), dogs still continue to play significant roles in the life of their masters. Historical data reveals that ancient empires used dogs in their medieval battles. Great empires such as ...
Introduction
Folklore comprises of legends, music, oral history, sayings, jokes, mainstream views, children's stories and traditions that are the customs of that society, subculture, or gathering. It is likewise the situated of practices through which those expressive classifications are imparted. The English savant William Thoms in a letter distributed by the London Journal in 1846 initially utilized the expression “old stories”. Old stories can be separated into four zones of the study: antiquity, (for example, voodoo dolls), describable and transmissible substance (oral convention), society, and conduct (customs). These ranges do not remain solitary; on the other hand, as frequently a specific thing ...
Introduction
Since its inception, internet has affected society in several ways. Internet connects people to the world and makes our life easy. It facilitates people in using, sharing and communicating ideas. People can send and receive ideas, documents, pictures and videos from anywhere to different parts of the world. Due to all these features, internet has emerged as one effective medium of committing crimes because they can operate from any part of the world without revealing their identity. If internet is useful for criminals, it is also very useful for different law enforcement agencies. Police and other law enforcement agencies ...
BIO 204 101 13S
Abstract
For many years, human beings have continued to suffer from diseases, both the kind caused by their own bodies as their age degenerated and the kind caused by infectious pathogens. During this time, human beings have constantly developed new ways of eating and living, and actual genetic or physical changes have evolved with the aim of minimizing the impacts of these diseases. This paper seeks to examine the issues of societal/cultural changes, the origins of human diseases and bioterrorism. This includes examining historical societal/cultural changes for human evolution are responsible in transmission of diseases to human beings ...
The American Heritage Dictionary defines paparazzi as a freelance photographer who doggedly pursues celebrities to take candid pictures. Paparazzi make money by selling their photos and videos to reputed publications across the world. One single photo or a video clipping is simultaneously sold to several publications. The more famous the person is and the more embarrassing the photograph is to the celebrity, the bigger is the price. The most unique shots of famous personalities can even fetch millions of dollars. These includes situations where the celebrities are drunk, getting angry, tripping and falling or with undone hair. Given the money associated ...
The problem of the sexual violence is still actual in the modern world. The people in the XXI century are spoilt by the toys of progress and technical evolution but the women today face the same problems as centuries ago. They should defend and prove their rights to their body. I have chosen three different newspaper articles where the sexual violence is discussed. They reflect the situation in the USA, the UK, and Germany. Observing the dynamics of solving the problem over the course of time all over the world we may see if the issue moves closer to ...
Abstract
There are several heart illnesses which cause a large number of deaths from stroke, coronary artery disease, aortic and peripheral illnesses. The treatment of the illnesses requires a huge amount of funds and time. Therefore, there is the need to improvise or innovate new ways to prevent or detect it on earlier. The sophisticated mechanism needs to be put in place to analyze medical data to give signs of the illness through the application of analytic algorithms to provide definite signs. Technology is evolving bringing about significant changes in the medical industry, especially in electronic health records. It has ...
Introduction
As a new member to the team, it is important that you understand what your role is as part of the security staff. First and foremost, you are expected to prevent losses of equipment, information, and other relevant assets, which are caused by human error, emergencies, disasters, and most notably, criminal actions (Hess, 2009). In addition, you are expected to prevent the unauthorized access to the facility, as well as, areas within the facility that management has determined required extra security. Lastly, you are expected to maintain a safe workplace environment by enforcing security policies and procedures that have ...
Executive Summary
The research identifies that Florida is a high-risk state in terms of human trafficking. In line with this, there is the need for some kind of urgent policy formulation that will deal with the needs and requirements of the state. The problem of Florida is complicated by its location and its cultural make-up which includes a lot of Hispanic Americans.
The policy brief identifies that there are three options available including supply-chain tracking, victimization policy and a proactive and coordination oriented method. Supply-chain tracking is deemed as expensive and a bit unworkable at the other side of the border. ...
Overview of Sufism
Sufism, simply put, is Islamic mysticism. Sufism is also popular by the name Tasawwuf in the Arab world. It is essentially a movement of the followers of Islam in pursuit of discovering celestial veracity and love by way of the direct encounters that they seek to have with God. Sufism evolved out of Islam, precisely between the 8th and 9th centuries C.E., in the form of a frugal movement.
This ascetic movement was given the name Sufism due to the coarse wool garments that denotes their denunciation of worldly pleasures. Conventionally, the Sufis were also known to have taken ...
Introduction
Studying accounting has been one of my interests since I was a child. Being in accounting classes was really enjoyable from the start. However, although studying the concept in class was interesting, I found it more thrilling to put to work some of the skills that I had learned. I was privileged to get an internship at PWC, one of the big four auditing firm, which I started on January 4th the year 2016. Through this internship, I was exposed to real-life accounting and auditing experiences which I had spent the last several years preparing. As such, this report ...
A process that needs to be improved in my organization is the patient admission and discharge process. The three concepts that I would use are benchmarking, data gathering, and usability evaluation.
Benchmarking
This is the evaluation of other organizations’ best practices and metrics and determining how they can be applied to one’s organization (U.S. Department of Health & Human Services, n.d.b.). I will use this as basis for the changes that need to be made in my organization’s workflows. For example, I would examine the processes of St. Johns Hopkins Hospital and see if I can pattern my organization’ ...
{Author Name [first-name middle-name-initials last-name]}
{Institution Affiliation [name of Author’s institute]}
Software Development Process
Core Activities
Software development process’s core activities include Requirement Gathering, Software Design, Coding, and Testing. Finally, the software product is deployed to the production environment, and a scheduled Maintenance is performed on a regular basis.
System Analysis & System Design
The System Analysis Phase defines the scope of the software product. The activities of system analysis phase are Analysis Strategy, Requirement Gathering, and System Proposal. The Analysis strategy is concerned with the types of system analysis (existing or new). Requirement gathering activity collects the new requirements for the proposed system. System ...
Religion has been seen as disempowered and in decrease in the cutting edge world, its implications no more applicable inside the overwhelming mainstream perspective and institutional temples losing control of social life to common bodies (i.e., secularization, privatization). However religion (or secularization) may not be so static or bound together a marvel as awhile ago thought (this may be an outcome of advanced Western inclination, as, for instance, Talal Asad contends; of the (liberal) separation of social order, dividing the religious and the common, characterizing the previous as bound together conventions concerned with profound, private convictions, not handy, open issues). ...
A Review of a Journal article
What are the key objectives of the study?
The key objective of the study is to guide the reader about all the aspects of the research processes, which mainly includes objective formulation, choosing appropriate research methods, securing participants of the research and data collection, analysis and interpretation.
What is the research problem?
The research problems refer from simple to complex, depending on the nature and number of variables (both dependent and independent) and the nature and relationship between the variables (Bryman, 2012, pp. 3). Once you understand the nature of the problem, it will make you able to develop the result of a specific ...
With the growing security threats in the United States such as the 9/11 attacks, which claimed the lives of many Americans and foreigners the National Security Agency put in place measures that ensure that the United States government monitors the communications of its citizens. Despite the security concerns, the American constitution defends the rights and freedoms of speech. Consequently, there have been varied reactions on the government’s efforts to monitor the communication in the interests of national security. These opponents of the governmental monitoring believe that most of the government’s enemies are outsiders. Nevertheless, proponents argue that ...
Presentation for Content of Paper on Impact of the Media on the Improvement of Saudi Women
Presentation for Content of Paper on Impact of the Media on the Improvement of Saudi Women
As a potential writer for this paper, one would follow the instructions on the outline, with emphasis on certain points. For the problem statement, what would be discussed is whether or not there have been issues brought about by media on Saudi women and their status in society today, or whether the media has brought about total improvement on the quality of life of these women – this could be measured in terms of increases in the number of Saudi women receiving tertiary education, ...
Introduction
This is one of the remarkable slave rebellion that is also termed as the Southampton insurrection. This slave rebellion occurred during August 1831 in the Southampton county ,Virginia.This Rebellion was led by Nat Turner.It resulted in 55 to 65 people who among them were men, women and children killed by slaves.This rebellion was calmed down in a few days but Nat Turner survived and hid himself for more than two months.This rebellion was suppressed on August 23, 1831 in Belmont plantation.
Success of the revolts
Nat Turner’s rebelliuon was among the bloodiest and most effective in the americxan history.It made Virginia to have a ...
Strategic planning is an essential aspect in health care organization as it helps realize the potential of the visions they aim at achieving. It also helps strengthen the organizations service by providing sufficient management and governance strategies that are needed to respond to the rapid and dramatic changes in today’s health care environment. The main achievement in realizing the strategic agendas is that it helps assess current strategies and make changes that facilitate response to the market and industry forces. It also helps in developing plans to achieve strategic goals and objectives. In addition, it helps ensure that ...
Research Summary
Family structure is one of the most important things that defines and characterizes a culture. Just like any other cultural factors, family structure may vary greatly or minimally from one culture to another. The objective of this paper is to explore on the different characteristics and distinguishing factors that define the Black American Culture in terms of their family structure or family support system. The family is the most basic unit of a government or society and there are various forms of family. There are various studies that suggest that a typical black American family can be highly associated with single-parent homes, ...
Introduction
Analysis is one of the most effective tools available to support law enforcement agencies today. Data collection is worthless unless it is easily understood and has relevance to the case. Analysis of information provides the indicators of what one has and what is missing. Analysis ultimately organizes the information in a way that possibly leads to prosecutorial success. In order to achieve this significant outcome, Colorado State criminal investigation department (CID) plans to establish an analytical unit. The objective of this proposal is to formulate a new analytical unit in order to enhance and accelerate the process of intelligence data analysis. ...
Networking is a key part of a small business owner’s strategies to avoid commercial isolation and promote innovation in their company. Running a small business involves each employee handling many operational issues. It is very easy for these operational issues to fill up all available time and energy. This inward focus is valuable to the company in some respects, but when problems occur and innovative thinking is required to solve those problems, stepping outside the company is sometimes the most efficient means of finding the solution. Networking can provide innovative solutions in several ways. First, obtaining opinions from outside the company ...
English
How September 11, 2001 changed America
Thesis Statement: The 9/11 terrorist attack became the catalyst that strengthened the U.S. as a nation by focusing the goal of using technology to make America a safer place for its people.
In September 21, 2001, America was in shock when two airplanes struck Twin Towers in New York City and also attacked the Pentagon in Washington D.C. in the morning of that fateful day. The deadly blows that hit the Twin Tower caused the 110-storey buildings to collapse as people watched in horror how some of the people inside the buildings try ...
Networks provide access or entry points to organizational systems and applications. It is emphatically crucial that gatekeepers be installed to help in controlling unauthorized access to several servers within the networked environment. While operating system's gatekeepers within servers provide a good source of protection to servers, it's important that servers are protected from other external attacks. Reconfiguration and replacement of gatekeepers by imposters should also be protected. Computer networks act as important channels for sharing resources, data, and other communication functions. To avoid cases of downtime, which affects critical business applications, it is important to implement network maintenance and data ...
Abstract:
The issue on privacy in the 21st century is a current dilemma for the public as everything can now be seen online and is on digital format. May it be simple personal profiles to highly sensitive data such as grades, credit card information, and security clearances can be accessed online. While automation and digitalized data is now common to improve a person’s daily need for information, privacy becomes a serious topic to consider since anyone can get the information they need and for some, they would take steps mimic a person’s identity and steal sensitive data for fraud and crime. Recorded ...
Introduction
Recently, testing children has grown more aggressive and widespread because the concerning issues have arisen hence pressuring parents to conduct these tests to their children. For example, most kindergarten tests their children before enrolling them, which is also applicable in colleges. Surprisingly, assessing infants and young children is a practice that has been going on for more than 30 years ago. Even though some infant and children assessment are useful, conducted research conclude that most assessment and tests turn out to be less reliable. The research recommended that screening tests are not appropriate for measuring the readiness to exclude children ...
Abstract
In this research paper, we will use the culture of the Batek people of Malaysia. This paper will show how primary mode of subsistence affects other aspects of cultural behavior and why culture acts the way it does. We will identify and analysis the culture of this peoples primarily mode of subsistence on gender relation, values and beliefs and political organization.
Introduction
Batek people are among other diverse cultural groups of the Orangi Asli people who live in central Malaysia. This indigenous people live in the rainforest of peninsular Malaysia their name means “original people”. This name was given to ...
GRIT 791 – Seminar in Instructional and Communication Technology
The effectiveness of social media in assisting the student in the understanding of classroom content as well as other relevant research work is one phenomenon that is gaining a lot of interest with the onset of time (Tess, 2013). Because of the changing trends in technological and social life progress, learning is undergoing a number of evolutions. Students tend to be obsessed with technology, especially Instagram as opposed to the previous use of books for gathering any relevant information (Tess, 2013).
Social media applications in the academic sector include computer software typically design to help learners gather and analyze ...
Corruption in a police department
Part One
Corruption in a police department can be defined as a type of police unfortunate behavior whereby a police officer (law enforcer) breaks his social and moral contract for a personal or departmental benefit. It includes manhandle of force by police or a gathering of police by organizing their exercises (Sherman, 1978). With such offense it prompts to open doubt, infringement of human rights and different genuine outcomes. There are diverse sorts of police of police debasement which incorporate; requesting or tolerating bribes, mocking the police set of accepted rules and selective enforcements. According to S. V. Gilbert ( ...
Information and Communication Teachnology
ABSTRACT
As telemedicine is used throughout the rural parts of Africa, there are many professionals and patients who find the entire process very beneficial because there is an allowance for a decrease in transmission of highly contagious diseases such as MRSA (Methicillin-resistant Staphylococcus aureus). If there are clinics that are found in locations surrounding rural Africa, there are strong concerns that patients will be able to transmit their diseases to other people who are otherwise healthy. With the use of telemedicine, the patients and the health care providers can see each other through a confined space and there is ...
The aim of this paper is to discuss the fraud that took place in the Bayou Hedge Fund Group and its impact on the organization’s investors and creditors. The organization was established in 1996 as Samuel Israel III and a gathering of foundations and hedge funds were united as the originator encouraged them to in the long run bring $450 million up with the expectation that the fund would develop to more than $7 billion in a ten year time span. The way that the organizer utilized a portion of the cash for individual use alongside critical exchanging ...
Introduction
Biological attacks include the use of biological agents such as bacteria, fungus, and toxins from living creatures for intentional or threatened purposes to cause deaths or diseases to human populations, plants, and other animals. Therefore, biological agents can be considered as microorganisms, which affect the normal functioning of other living things by imposing diseases or even deaths. Biological agents attack continues to pose great threat majorly to the world population with majority concern being given to its ability to bring massive loss of lives to individuals.
It’s, therefore, a major concern for the law enforcement agencies and medical ...
THE RELATIONSHIP BETWEEN ENTREPRENEURIAL INTENTIONS AND MORAL DISENGAGEMENT
Abstract
New intuitions into the genesis and impacts of entrepreneurs’ immoral measures can be obtained through observation to moral disconnection, a cognitive system that disables the self-regulatory process that prevents humans from actions, which are variable with their personal moral values (Gladston, 2016, p. 102). Outcomes that are acquired with a specimen of Chinese enterprises indicate that the trader’s motivation for monetary victory is linked positively to moral disconnection and that similar disengagement, alternately, is linked positively to unethical resolutions. However, enthusiasm to attain self-realization is not connected to either unethical decisions or moral disengagement (Siltaoja & Lähdesmä ...
Introduction
According to Jones and Libicki (2013), Border and Transport Security is an important component of a nation’s security effort, which forms a critical component of the protection of citizens from terrorists and other forms of destruction. Massey (2012) holds the same opinion with the only difference being the introduction of a systems approach perspective. This way, Massey (2012) suggests that Border and Transportation Security (BTS) appears as a “series of concentric circles that from a shell-like structure in which the outer shell is comprised of all the preventive efforts operating beyond the country’s borders” (p.6). Therefore, BTS ...
Abstract
Digital forensics is a critical component of forensic discipline that includes crimes and misconducts with respect to computer systems. The use of computers to investigate online crimes led to the development of this new field known as Digital forensics. The field provides new ideas for understanding and betterment of concepts and directing future concepts in Digital Forensics. Over the last few years, with the advent of latest electronic devices such as mobile phones, tablets and laptops, the concept has gained popularity over the span of few years. This has resulted in a shift of thefts from real time to ...
Innovative and new ways have been opened by the widespread use and adoption of mobile phone technologies. These technologies have improved health care service delivery tremendously. The mobile applications can also help individual patients in the management of their wellness as well as health. Their adoption has been as quick as their development. These applications are believed to be the main methods of ensuring delivery of high quality healthcare services. Despite all the advantages, the mobile phone health applications present certain risks as well as limitations that must be addressed. The relevant authorities need to regulate the use of ...
Marketing
Introduction
The Canadian Wireless Telecommunications Association represents the majority of the wireless communication industry in Canada with members ranging from wireless data and voice service providers to global smartphone brands. In order for the organization to better represent the telecoms industry to consumers in Canada, a market research of the top smartphone brands was conducted to determine the current market conditions of the three smartphone brands namely iPhone, BlackBerry, and Nokia. The analysis of the three brands involves gathering important information about including financial performance. In addition, the study will also determine what the customers are saying about the ...
Introduction
Most of the individuals of all ages experience at least one traumatic event in their life, which is followed by the wide range of reactions (Greenberg, Brooks and Dunn, 2015, p.1). Most researchers however claim that it affects women more as compared to their male counterparts (Sumner et al, 2015). Though post-trauma reactions appeared in literature throughout history, in last year’s numerous scientists and researchers began investigating various effects of traumatic experiences that may have significant influence on mental and physical health. This paper is focused on a relatively new diagnosis called Post-traumatic stress disorder (PTSD) which is ...