Study Document
To Choose an accounting Topic That Would Be Excellent for A Dissertation.
Research Topic
Taxation in the digital era is an excellent topic for a dissertation because … are intangible. Taxation rules are based on physical location and tangible assets. Also, the concepts of intangible property are not well defined in accounting and cannot be considered in taxation.
Secondly, digital companies facilitate transactions between sellers and buyers of traditional goods and services. That is, they … transactions between sellers and buyers of traditional goods and services. That is, they act as intermediaries. Given their unique position, they can collect information on consumer behavior and sell it to advertisers. Taxation issues arise because it not clear what can be counted as a new value. ……
References
Committee of Experts on International Cooperation in Tax Matters. (2019). Tax Issues related to the Digitalization of the Economy: Report (E/C.18/2019/CRP.12). https://www.un.org/esa/ffd/wp-content/uploads/2019/04/18STM_CRP12-Work-on-taxation-issues-digitalization.pdf
Katz, R. (2015). THE IMPACT OF TAXATION ON THE DIGITAL ECONOMY. https://www.itu.int/en/ITU-D/Conferences/GSR/Documents/GSR2015/Discussion_papers_and_Presentations/GSR16_Discussion-Paper_Taxation_Latest_web.pdf
Pemerathna, A. (2016). Economic impact of digital taxation: A case on information communication technology industry Sri Lanka. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2910328
Sand-Zantman, W. (2018). Taxation in the Digital Economy. https://www.orange.com/fr/content/download/47110/1371114/version/1/file/Rapport%20TAXATION-VF-Mai2018.pdf
Sestakova, M. (2018, February). Tax Challenges of the Digital Economy [Paper presentation]. Management Challenges in the 21st Century, Bratislava, Slovakia.
Study Document
… consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communications systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination of … is more, imposters and trespassers have the ability to incapacitate or deactivate firewall protection to attain accessibility to private and sensitive data and information that is conveyed between two wireless communication devices, in the event that this sort of information is not properly safeguarded by strong and comprehensive encryption. As a result, this points out the significant necessity to enhance security in wireless … this paper is to comprehensively examine security in communication technologies.
Wireless security encompasses any initiatives taken that preclude unwarranted access or damage to information that is transmitted over wireless networks in addition to making certain that both……
References
Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.
Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from: http://users.jyu.fi/~timoh/TIES327/WPLS.pdf
Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.
GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from: https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/
Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.
Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.
IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.
Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.
Study Document
… above challenges, mistakes and inefficiencies persist within the healthcare domain owing to the low-key technology utilized by the sector for management. Most healthcare systems across the globe continue to stick to a pen-and-paper system, including those in developed nations such as America. This is an obstacle on … is also an increase in litigation and administrative costs on account of such mistakes and inefficiencies (Amit, 2019). Of particular concern is: patient information exchange when patients are shifted between departments or hospitals. Conventionally-performed record sharing of patients is ineffective and time-consuming, as well as puts patient … and time-consuming, as well as puts patient data in jeopardy (i.e., risk of data leaks and loss of confidentiality/ privacy). Inefficient or partial information interchange may be highly dangerous if the patient requires complex or emergency treatment.
Hence, this paper holds that the sole means of addressing … Quality Improvement) strategies and demands……
Bibliography
Alotaibi, Y. K., & Federico, F. (2017). The impact of health information technology on patient safety. Saudi Med J, 38(12), 1173–1180.
Amit, M. (2019, January 28). 5 Problems Which Healthcare Technology Can Solve for a Healthier World. Retrieved from Net Solutions: https://www.netsolutions.com/insights/5-healthcare-problems-which-digital-technologies-can-solve-for-a-fit-and-healthy-world/
DeSanctis, G., & Poole, M. S. (1994). Capturing the Complexity in Advanced Technology Use: Adaptive Structuration Theory. Organization Science, 5(2), 121-147.
Feldman, S. S., Buchalter, S., & Hayes, L. W. (2018). Health Information Technology in Healthcare Quality and Patient Safety: Literature Review. JMIR Med Inform, 6(2).
Halamka, J., Mandl, K., & Tang, P. (2008). Early Experiences with Personal Health Records. Journal of the American Medical Informatics Association, 15(1), 1-7.
IOM. (1999). To Err is Human: Building a Safer Health System. National Academy of Sciences.
Singh, H., & Sittig, D. (2016). Measuring and improving patient safety through health information technology: The Health IT Safety Framework. BMJ Quality & Safety, 25, 226-232.
Weigel, F., Hall, D. J., & Landrum, W. H. (2009). Human/Technology Adaptation Fit Theory for Healthcare. SAIS 2009 Proceedings.
Study Document
… standards and concepts that promote accountability and ethical leadership. Only in this way can self-regulation be effective.
In the light of existing regulatory systems failing to produce the desired outcomes, it is reasonable to accept that self-regulation is a viable alternative. The way it would work is … international stage. Third party regulators do not. Companies also have the means to monitor and regulate: RegTech has advanced to a point where information can be monitored, collected, analyzed and evaluated nearly instantaneously thanks to Big Data analytics. Finally, the company itself has the capacity to……
References
Arner, D. W., Barberis, J., & Buckey, R. P. (2016). FinTech, RegTech, and the reconceptualization of financial regulation. Nw. J. Int'l L. & Bus., 37, 371.
Arnone, M., & Padoan, P. C. (2008). Anti-money laundering by international institutions: a preliminary assessment. European Journal of Law and Economics, 26(3), 361-386.
Greene, E., & Odorski, C. (2015). SEC enforcement in the financial sector: addressing
Omarova, S. T. (2010). Rethinking the future of self-regulation in the financial industry. Brook. J. Int'l L., 35, 665.post-crisis criticism. Bus. L. Int'l, 16, 5.
Omarova, S. T. (2011). Wall street as community of fate: Toward financial industry self-regulation. University of Pennsylvania Law Review, 159(2), 411-492.
Pritchard, A. C. (2003). Self-regulation and securities markets. Regulation, 26, 32.
Study Document
...Accounting information systems Appendix
External Analysis
1. PESTEL Analysis
1.1. Political
1.1.1.Global leaders use of social media impacts the political landscape and is able to influence operations. (C-142)
1.1.2. Several high-profile world leaders utilize social media platforms to address their followers, the most notable being U.S. President Donald Trump who tweets regularly to announce global interactions with other political leaders. They also have high interactions and reach with the global community: U.S President Donald Trump had 30.13 million twitter followers as at May 2017 and former U.S. President Barack Obama had 103 million followers as at June 2018 (C-142)
1.1.3. Depending on the political climate in various countries, governments may censor content and access to social media platforms.
1.2. Economics
1.2.1. Generated revenues through advertising, data licensing and other products. products. In 2017, total revenue generated was $2,443, 299, 000 (C-142)
1.2.2. Fluctuating exchange rates and inflation rates can affect overall profit-margins. (C-147)……
References
Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)
Study Document
… areas and fit it for this particular population. This study has managed to link both parents with their children, which gives more credible information as compared to having data from one parent mostly the mother. The results of this study will shed light on the impact that ……
References
Størksen, I., Røysamb, E., Holmen, T. L., & Tambs, K. (2006). Adolescent adjustment and well being: effects of parental divorce and distress. Scandinavian journal of psychology, 47(1), 75-84.
We have over 150,000+ study documents to help you.
Sign Up for FREE