Wednesday, December 25, 2019

Government Regulation - 1301 Words

The purpose of this paper is to assess different types of government regulations, how those regulations affect current market structures while defining the different types of market structures and finally what provisions and laws have been put in place to protect consumers and society from big business and firms choices. Industrial regulation is the government’s attempt to enact laws designed to prevent firms from participating in bad monopolistic practices and to promote competition in the market space. The reason industrial regulation exists is to keep an eye on firms by making sure monopolies don’t start, however if they do or currently exist regulations are put in place to monitor prices and products to make sure society and†¦show more content†¦Economic theory justifies natural monopolies on the basis that consumers can benefit from a monopoly so long as restrictions are put into place surrounding output and high prices of goods by the monopoly. Consumers benefit by being able to purchase a desired product at lower per-unit costs. To provide an example of how natural monopolies are established most often would be surrounding public utilities, such as water, gas and electricity services. It makes more sense for the city or state to take on these responsibilities rather than having multiple firms in the market driving up price and providing lesser goods/services per firm. Economic theory supports monopoly in industries like public transportation and the postal service. Beginning in the late 1800s government began to enact four major pieces of legislation collectively known as the Antitrust Laws. The Sherman Act of 1890 is the founding legislation which states that any firm or individual operating in restraint of trade is committing an illegal act and secondly any person or firm attempting to monopolize or conspire has committed a felony. The first piece of legislation is the Clayton Act of 1914 which directly builds on the Sherman Act by specifying what specific acts are in restraint of trade and attempts at monopolization. Sections of the act outlaw price discrimination, tying contracts, purchase of stock of a rival firm that would cause less competition an d interlockingShow MoreRelatedGovernment Regulation Essay744 Words   |  3 PagesGovernment Regulation Throughout history there have been many different opinions about government regulation. Some believe the government regulates business too much others feel that the government does not do enough. I believe the government is regulating business far too much and furthermore putting businesses out of business and causing many workers to lose jobs. In this paper I will point out the common problems dealing with government regulation. I will also focus on three major aspectsRead MoreGovernment Regulations Essay796 Words   |  4 PagesGovernment Regulations on Businesses Advantages and Disadvantages Samuel Pinckney Grantham University Abstract This paper will discuss the proposed views on the advantages and disadvantages of government regulations on businesses. Government Regulations on Businesses Advantages and Disadvantages There are advantages and disadvantages that may be associatedRead MoreGovernment Regulation Of The United States1546 Words   |  7 PagesThe government has always played a very strong role in the laws of the United States and in the lives of people who live in this country. At times in history, the government has been too strict on its people other times.These leaders have, however, failed to achieve a successful medium between these two treatments. The situation is similar to this one when dealing with most everything that the government has any type of control over. Although there are opposing sides which either argue for strictRead More Self Regulation over Government Regulation on The Internet Essay470 Words   |  2 Pages How involved should the Government be when it comes to regulation of the Internet? There are many different issues regarding internet regulation. Should Internet users be responsible for controlling how they use the Internet? Since the internet has been i ntroduced to Americans there have been many debates on how involved the Government should be in regulating topics such as violent games, gambling, and sexual content. The Internet is a very useful source for many things. It has almost become aRead MoreGovernment Intervention Vs. Self Regulation874 Words   |  4 PagesBusiness Ethics: Government Intervention vs. Self-Regulation Wealth brings power and power can at times bring corruption. In today’s economy where individuals are no longer the concern when it comes to wealth, the global attention is drawn to corporations who hold the majority of our wealth. This calls for us to take cetain measures that can ensure the existence of a socially responsible behavior amongst all corporations, and these measures could be introduced in many forms, quite possibly the mostRead MoreGovernment Regulation And Its Effect On Society Essay1586 Words   |  7 Pages with many pieces to create a much larger thing. Government and society are simply pieces of the same machine that depend on each other. Likewise, government and society have the option to liberate or limit the activities of men and it is a necessary occurrence of life. Government is dependent on society because social behaviors exists wherever there are good or bad, proper or improper relationships between human beings. Humans install government from the ir own belief that human behavior is â€Å"self-centered†Read MoreGovernment, Regulation Business Ethics2112 Words   |  9 PagesGovernment, Regulation amp; Business Ethics The issue of business relations with government has increasingly become a key issue of business ethics. Some of the many questions raised are * Is it acceptable for corporations to use their considerable power tp shape government policy? * Is the government jeopardizing its role in protecting the public interest when politicians sit on the board of corporations? The government has a crucial role to play in establishing the ‘rules of the game’Read MoreProducer Protection, Prior Market Structure and the Effects of Government Regulation3100 Words   |  13 PagesProducer Protection, Prior Market Structure and the Effects of Government Regulation Assignment on Regulatory Economics 1/5/2012 â€Æ' INTRODUCTION The direct economic regulation of business by independent government commissions has a one-hundred year history on the North American continent. It is generally asserted that the purpose of such commissions is to protect consumers from exploitation by limiting the economic powers of certain firms having pervasive effects on the public interestRead MoreEssay about Government Regulations and Rights2340 Words   |  10 Pagescitizens are getting tired of the governments increasing control of the economy, health care, and a dodgy recovery plan (Engstrom, 2). According to a national survey, Voters are starting to realize that the regulations implemented by government are beginning to intrude more so on people’s personal lives (Thompson and Tringali, 2). The survey also said that, A majority of both conservatives (61%) and liberals (54%) say they are both negatively impacted by regulations that tell American business whichRead MoreThe Government Regulation Of Tobacco And Alcohol Sa les And Supply1848 Words   |  8 Pageswithout effecting other groups benefits. (Palmer, Short, 2014) Such as governments Indigenous Chronic Disease Package which aims to manage chronic diseases that effect Indigenous Australians. (AIWH 2014) Another health policy is regulatory, which provides limitations on how specific groups act, some groups are allowed more freedom while others can be more restricted. (Palmer, Short 2014) For example, the state government regulation of tobacco and alcohol sales and supply. (AIHW 2014) While in pursuit

Tuesday, December 17, 2019

Bill Gates and Tim Berners-Lee Their Contributions to...

Bill Gates and Tim Berners-Lee: Their Contributions to Information Technology and the IT Industry Nowadays, information technology is playing a significant role in human’s life. Actually, it has only been developing for several decades. In fact, there are two key men who contribute greatly for this process. They are Bill Gates and Tim Berners-Lee. This essay will explain their contribution to IT and its industry and discuss it in several aspects. There remain several differences between the computer before early 1970s and they are now. At that time, it is very huge and expensive. In January 1975, Popular Electronics magazine announced that the first microcomputer of the world which called Altair 800 had appeared. It is a real†¦show more content†¦It has the online serving software, Internet Explorer, which allowed users to open the website freely. Meanwhile, Windows 95 created the desktop, the start menu and 32-bit compatibility. As a result, consumers could operate the PC much easier, communicate with others and share information by Internet. The later Windows operating systems were almost created by using Windows 95 as the pattern. Both Bill Gates and Tim Berners-Lee contribute much to Information Technology and its industry. Gates set up Microsoft, created Windows operating systems and Office software, which allowed human to be more accessible with computers. Users could deal with issues, do research and official work by PC. It is almost Bill Gates who makes all of these more convenient. Moreover, Gates designed Internet Explorer software for consumers to find the information on World Wide Web, which created by Tim Berners-Lee. They can also play computer games, watch videos and purchase goods online. With their achievements, many other economic industries has been developing, such as online shopping and online games industry. In addition, people are fond of making friends and contact others by social softwares, such as Facebook and Twitter in 3/6 recently years. Because of their contribution, people’ life has become much easier, and s they are more closed to others. Furthermore, Bill Gates is famous for his

Monday, December 9, 2019

Network Security from High-Security Units †Myassignmenthelp.Com

Question: How to Do Network Security From High-Security Units? Answer: Introduction In todays time, the business relies on the secured ICT systems where one can focus on laying down the technology with Network Security Services. s per the number of studies approximately ninety-one percent all the organizations get easily attacked normally once in last two years which makes it a very serious issue. Security of network lays a basic foundation of many secured ICT systems (Lu et al., 2013). Concept of network security According to the article selected on T systems, GmbH, 2017, the criminal gang are using the sophisticated malware to mainly target the organizations inorder to steal all the valuable data. To be able to save the system from the attacks, the team in company looks for options on internet. The companies have to hire a team that can look for number of options to evaluate different kind of sources all the time. According to Kaspersky Global IT Security Risk Survey of 2013, there are 91% of the companies which have been attacked atleast once along with laying out the foundation of ICT (Lu et al, 2013). The administrators are facing the challenges for the adaptation of network security systems where Deutsche Telekoms honeypots are able to record approximately 800,000 attacks every day. A well-managed system does much more than just saving the corporate based network from many diverse attacks. There are specific complementary services as well like location-based networking through VPN, DNS b ased services, and Radius that are a huge help as well. Such services are also managed with the help of T systems security based specialists who are consistently up for many options like finding through various studies. Customers can determine to put the complete managed system and also select between a hosted based solutions. The concept of the firewall is managed sometime by various experts in either case (Zhu et al., 2011). Network security from high-security units The necessary infrastructure is primarily hosted by many network security services which are places in high security and are certified with various data units. In every case, the level of security and presence given by different services is very high than technology functioned by the organizations and every kind of cost are normally lower, all thanks to professional as well as scalable infrastructure (Panteli Kirschen, 2011). Moral theories Social contract The concept of morality basis can be defined as rules that are for rational people that will have an agreement to obey for more advantages together and provide other people and also obey them at the same time (Singer, 2011). In specific situations, there is no place for any industry since the outcome is not certain and at the same time cyber attack in social contract based on network security can breach the trust, and the companies become vulnerable (GmbH, 2017). Utilitarianism It is important for every human being to function as per whatever is produced with an immense balance of happiness over complete unhappiness for every human being who will get affected by different actions (Noddings, 2013). It is important to select the overall action that will manufacture the best results for all people that impacted by different actions. The cyber attacks are impacting the company's stature in the market and bringing balance; it is crucial to deal with the problem with utmost care (GmbH, 2017). Deontology The basic approach to moral theory is known as deontology concept which is because of Immanuel Kant. The theory says that act that is as per the maxim by which people at some time will be able to become a universal kind of law. Therefore, it becomes necessary to treat the whole humanity well whether it is related to one's person or in other cases as an end and not as means (Nussbaum, 2013). Cyber attack and network security are becoming a universal problem since it is impacting people at large (GmbH, 2017). Virtue based ethics Many people can easily trace the origin of many ethics which come under virtue and the writings in Nicomachean Ethics (Singer, 2011). Virtue based ethics are more or less related to detailed account of all every possible virtue and the overall qualities of the character where people require to do well in life. The principle also maintains the overall development of many human-based virtues as the most based concern for ethics. Cybersecurity and attacks question the morality of the issues and companies are in a very vulnerable situation to lose everything in a blink (GmbH, 2017). Conclusion The concern of secretly has been a major concern and threat for the organization as well as government (Susanto12 et al., 2011). There are so many intrusions that are detected in the past for some reasons. It is very important to assume that the data can be of no or little value and many adversaries are not looking at many kinds of classified data. There are many kinds of activities as well which are observed and also has an economic based aim. Following are so of the recommendations: - White-listing: when this process executed in the proper manner, it become very hard for any adversary to be able to impact the ICT system of a company. The application can be called as a technical kind of measure that only permits particularly many authorized works to operate on the system (Susanto12 et al., 2011). A software based patch is some pieces of technology specifically designed to solve issues or also update a computer program. The patching in organization system also encompasses the second as well as third mitigation based strategies. It is also very important to make a patch in the operating system as well as an application within a time frame for many serious issues (Susanto12 et al., 2011). Very often, there are opinions that by this system without any testing, something might break on the whole system. In the main cases, patching will impact the function of the organization's ICT system. It is crucial to perfectly balance the risk that exists between taking many weeks to evaluate the patches and also saving serious issues within some period timeframe (Susanto12 et al., 2011). Reference GmbH, T. (2017).Network security the foundation for secure ICT systems. [online] T-systems.com. Available at: https://www.t-systems.com/de/en/solutions/security/security-topics/networks/network-security-75814. Lu, T., Guo, X., Xu, B., Zhao, L., Peng, Y., Yang, H. (2013, September). Next big thing in big data: The security of the ICT supply chain. InSocial Computing (SocialCom), 2013 International Conference on(pp. 1066-1073). IEEE. Noddings, N. (2013).Caring: A relational approach to ethics and moral education. Univ of California Press. Nussbaum, M. C. (2013).The therapy of desire: Theory and practice in Hellenistic ethics. Princeton University Press. Panteli, M., Kirschen, D. S. (2011, March). Assessing the effect of failures in the information and communication infrastructure on power system reliability. InPower Systems Conference and Exposition (PSCE), 2011 IEEE/PES(pp. 1-7). IEEE. Singer, P. (2011).The expanding circle: Ethics, evolution, and moral progress. Princeton University Press. Susanto12, H., Almunawar, M. N., Tuan, Y. C. (2011). Information security management system standards: A comparative study of the big five.International Journal of Electrical Computer Sciences IJECSIJENS,11(5), 23-29. Zhu, K., Chenine, M., Nordstrom, L. (2011). ICT architecture impact on wide area monitoring and control systems' reliability.IEEE transactions on power delivery,26(4), 2801-2808.

Sunday, December 1, 2019

Psychology Research Oral Presentation Essays - Neuroscience

Psychology Research Oral Presentation Hypothesis: Can sleep deprivation cause an increase in anxiety within medical students? Purpose of the study is to find a correlation between sleep deprivation and anxiety within Medical students Prediction: Sleep deprivation will cause a significant increase in anxiety of medical students Sleep disorders are particularly increasing in students as they face multiple stressors such as academic overload, constant pressure to succeed, and concerns about the future that alter the quality of their sleep Design: Using an Observational cross-sectional study: (definition data are collected during a single brief time period) during an academic year. To use questionnaires to find results.4 questionnaires would be faced to faced administered to students after obtaining written consent The 4 questionnaires were to measure their sleep quality and assessing Anxiety levels. Found to be the most common and effective questionnaires used in studies of sleep and anxiety The insomnia Severity index (ISI) Pittsburgh Sleep Quality Index (PSQI) Epworth Sleepiness Scale (ESS) Generalized Anxiety Disorder 7-item scale (GAD-7) Methodology: Questionnaire Survey Personal data about age, gender and faculty were collected. The ISI Is a 7-item self-report questionnaire. Assessing the nature, severity, and impact of insomnia. The evaluated domains are: Severity of sleep onset Sleep maintenance Early morning awakening problems Sleep dissatisfaction Interference of sleep difficulties with daytime functioning Perception of sleep difficulties by others Distress caused by the sleep difficulties. A 5-point Likert scale was used to rate each item (0 to 4 where 0 indicates no problem and 4 corresponds to a very severe problem), yielding a total score ranging from 0 to 28. The total score was interpreted as follows: absence of insomnia (0-7); sub-clinical (mild) insomnia (8-14); moderate insomnia (15-21); and severe insomnia (22-28). The PSQI Is a 19-items questionnaire evaluating sleep quality and disturbances The first four items are open questions, whereas items 5 to 19 are rated on a 4-point Likert scale. Individual items scores yield seven components: Sleep disturbance Overall sleep quality Sleep latency Duration of sleep Daytime dysfunction due to sleepiness Sleep efficiency Need for medicines to sleep A total score, ranging from 0 to 21, was obtained by adding the seven component scores. Some studies stated that a score 5 suggests a good sleep quality. The ESS Is a self-administered questionnaire with eight questions Each participant rated on a 4-point scale (0-3) his general level of daytime sleepiness, or the average sleep propensity in daily life. The total ESS score was the sum of eight item-scores and ranged between 0 and 24. The higher the score, the higher is the person's level of daytime sleepiness, with significant sleepiness when the score was 10 [24, 25]. GAD-7 Is a 7-item instrument that assesses generalized anxiety severity. Each item was scored 0 to 3, providing a 0 to 21 severity score (0-4: normal; 5-9: mild anxiety; 10-14: moderate anxiety and 15-21: severe anxiety Assessment of anxiety: Studying anxiety levels after periods of sleep deprivation In the case of total sleep deprivation only anxiety assessments acquired after 24h of lack of sleep were extracted. In the case of repeated measures, the first and the last available measures were always extracted; but intermediate assessments were only extracted if multiples of 12 (e.g., 36h, 48h). Operational Definitions: Sleep deprivation: sleeping less than the required amount of 8 hours before said time to wake up or class start A lack of sleep, which included total sleep deprivation (complete absence of sleep) Partial sleep deprivation (deprivation of one specific sleep stage, such asREM sleep) Sleep restriction (reduction in total time of sleep) Sleep fragmentation (intermittent awakenings through the sleep period). Taking account for the loss of sleep we also define insomnia Insomnia: the inability to sleep Anxiety: an overwhelming feeling of stress during upcoming tests or assignments as well as amount of course load Subjects: Randomly picking students under 3 faculties Medicine, Pharmacy and Dentistry Criteria: Inclusion: 18yrs and above and willingness to participate Exclusion: under 18yrs and presence of a chronic disease and history of Students were randomly selected For each of the studying the practice randomly selecting 1 male and female Studying the entirety of one semester Breaking it down from the beginning of the term to the midterm approaching and to final examinations Ethical Considerations: Informed consent