Consumer Protection Essays (Examples)

Studyspark

Study Document Study Document

Wells Fargo Collateral Protection Insurance Scandal

Pages: 5 (1382 words) Sources: 4 Document Type:Essay Document #:75685970

Wells Fargo Scandal
The Wells Fargo Collateral protection Insurance (CPI) Scandal occurred as a result of the banking firm placing CPI on accounts even though the account holders did not ask ……

References

References

Forsyth, D. R., & O’Boyle Jr, E. H. (2011). Rules, standards, and ethics: Relativism predicts cross-national differences in the codification of moral standards. International Business Review, 20(3), 353-361.

Goodpaster, K. (1983). Ethical frameworks for management. HBS.

Horowitz, D. (2011, May). We need a \\\\\\"moral operating system\\\\\\" Retrieved from  https://www.ted.com/talks/damon_horowitz  (Links to an external site.)

Top Class Actions. (2019). The settlement is closed. Retrieved from  https://topclassactions.com/lawsuit-settlements/closed-settlements/917069-wells-fargo-auto-loan-insurance-class-action-settlement/ 

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… measures for averting such breaches and reducing their adverse impacts.
Security risks
Two classes of risks exist, against which corporate information systems require protection: logical and physical. The latter, more to do with devices as compared to the actual information system, encompasses natural calamities like floods, earthquakes, ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

The Transformation Of The US Into Oceania

Pages: 9 (2807 words) Sources: 7 Document Type:Essay Document #:33502677

… to privacy have become the greatest issue facing 21st century ethical leadership. Indeed, public and private sector organizations of all types routinely collect consumer’ personal information and use it in ways that are violative of the spirit if not the letter of the law, and the proliferation … that emerged in the paper’s conclusion.
Review and Discussion
Overview of threats to personal privacy
Together with freedom of speech and religion, many consumer prize their personal privacy above all else. Although the concept lacks definitional clarity, the term “privacy” is generally used to refer to “a … arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks.” Likewise, in the United States, the right of people to protect their personal privacy has … right in a number of……

References

References

Black’s law dictionary. (1990). St. Paul, MN: West Publishing Company.

Cantor, M. D. (2006, Summer). No information about me without me: Technology, privacy, and home monitoring. Generations, 30(2), 49-55.

Ethical issues facing businesses. (2020). Florida Tech. Retrieved from https://www.floridatech online.com/blog/business/the-5-biggest-ethical-issues-facing-businesses/.

Haslag, C. (2018, Fall). Technology or privacy: Should you really have to choose only one? Missouri Law Review, 83(4), 1027-1033.

Karn, R. (2019). The biggest threat to data security? Humans, of course. The Privacy Advisor. Retrieved from  https://iapp.org/news/a/the-biggest-threat-to-data-security-humans-of-course/ .

Sharma, P. (2017, June). Organizational culture as a predictor of job satisfaction: The role of age and gender. Journal of Contemporary Management Issues, 22(1), 35-40.

Taslitz, A. E. (2009, Spring). The Fourth Amendment in the twenty-first century: Technology, privacy, and human emotions. Law and Contemporary Problems, 65(2), 125-131.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… exponentially in line with the proliferation of mobile devices together with powerful sensing devices that can be fitted to virtually any type of consumer product or artifact (Banham, 2016).
Many of the same attributes that make the IoT a valuable resource for businesses of all sizes and … of devices in ways that not only facilitate the aggregation of data but enhance the ability of organizations to respond to changes in consumer preferences and demand. Further, new applications for IoT technologies continue to be developed on a near-daily basis, and most authorities agree that the ……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

… shifting towards cloud computing owing to the reason that they presently understand the benefits facilitated, including increased mobility and heightened satisfactory interactions with consumer. Furthermore, rather than spending massive amounts of money on investing in servers, storage, and IT assets, progressively, more accounting organizations are emphasizing cloud ……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Enterprise Risk Management In Wells Fargo During The Pandemic

Pages: 15 (4587 words) Sources: 15 Document Type:Essay Document #:32848070

… culture. The bank does not seek to avoid risk but rather embraces and takes risks. It does so knowing that it has strong protection in place, including: an internal rule that poses that all capital at stake must be capital that the firm can stand to lose … capital that the firm can stand to lose (i.e., no over-leveraging or playing with capital that would harm the company if lost); another protection is that managers discuss risk management models with staff and make sure lower level employees understand the risk posture that the upper level ……

References

References

Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.

Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from  https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/ 

English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from  https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664 

Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from  https://global.theiia.org/about/about-the-iia/Public  Documents/Sawyer_Award_2007.pdf

Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.

Lewis, M. (2010). The Big Short. NY: W. W. Norton.

Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.

Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610

Studyspark

Study Document Study Document

Global Transformations And The Human Condition Global Lives Of Things

Pages: 7 (2248 words) Sources: 5 Document Type:Research Paper Document #:97236568

… is deemed to have both positive and negative effects on the health of human beings. The prevailing recommendations give the suggestion that a consumer should not drink more than 400 milligrams of caffeine on a daily basis. This is approximated to be about three to five cups … 400 milligrams of caffeine on a daily basis. This is approximated to be about three to five cups of coffee, reliant on the consumer’s brew of choice.
Section 2
Coffee is the most far and wide consumed beverage in the world. On estimate, almost 35,000 cups of … at their relationship to the greater world and has conversations.
There are different ways in which advertisements convey coffee as a commodity to consumer. One of the ways is whether a consumer is a morning person. Usually, in the morning, consumer are categorized into the caffeinated and the un-caffeinated, with the latter defined……

References

References

Bhupathiraju, S. N., Pan, A., Manson, J. E., Willett, W. C., van Dam, R. M., & Hu, F. B. (2014). Changes in coffee intake and subsequent risk of type 2 diabetes: three large cohorts of US men and women. Diabetologia, 57(7), 1346-1354.

Cadden, I. S. H., Partovi, N., & Yoshida, E. M. (2007). Possible beneficial effects of coffee on liver disease and function. Alimentary pharmacology & therapeutics, 26(1), 1-8.

D’Costa, K. (2011). The Culture of Coffee Drinkers. Scientific American.

Einstein, E. (2019). The Health Benefits of Coffee: How does drinking coffee help your body and your brain? Scientific American.

Lucas, M., Mirzaei, F., Pan, A., Okereke, O. I., Willett, W. C., O’Reilly, É. J., ... & Ascherio, A. (2011). Coffee, caffeine, and risk of depression among women. Archives of internal medicine, 171(17), 1571-1578.

Ponte, S. (2002). The latte revolution? Regulation, markets and consumption in the global coffee chain. World development, 30(7), 1099-1122.

Rudeen, K. (2018). The History of Coffee and its Concurrent Marketing Strategies. Scholars Archive.

Samoggia, A., & Riedel, B. (2019). Consumers’ Perceptions of Coffee Health Benefits and Motives for Coffee Consumption and Purchasing. Nutrients, 11(3), 653.

Studyspark

Study Document Study Document

Deregulation Under The Trump Administration And Its Impact On The

Pages: 7 (2006 words) Sources: 5 Document Type:Essay Document #:81227752

...Consumer protection Deregulation under the Trump Administration and Its Impact on the Non-Profit Sector
Introduction
President Trump touted deregulation as one of the issues he would push for during his campaign leading up to the 2016 election. Once placed in the White House, he held true to his push for deregulation and that policy has had some impact on the non-profit sector in the US. This paper will show how that impact has benefited the nonprofit sector in some ways and how in other ways it remains to be seen whether negative fallout will occur or not. Specifically this paper will explain how deregulation under the Trump Administration is impacting the non-profit sector in various beneficial ways, such as
by allowing nonprofits to keep anonymous the names of donors; and by capping the amount federal agencies can force nonprofits to spend—the idea being that this will prohibit agencies from shifting costs for……

References

References

Belton, K. & Graham, J. (2019). Trump’s Deregulatory Record: An Assessment at the Two-Year Mark. Retrieved from  http://accf.org/wp-content/uploads/2019/03/ACCF-Report_Trump-Deregulatory-Record-FINAL.pdf 

Benson, M. L., Stadler, W. A., & Pontell, H. N. (2019). Harming America: Corporate Crime in a Context of Deregulation. Victims & Offenders, 14(8), 1063-1083.

Brookings Institute. (2020). Tracking deregulation in the Trump era. Retrieved from  https://www.brookings.edu/interactives/tracking-deregulation-in-the-trump-era/ 

Morrow, D. (2017). Deregulation in the Trump Administration will likely impact nonprofits. Retrieved from  http://blog.abila.com/deregulation-trump-administration-impacting-nonprofits/ 

Weaver, H. L. (2018). One for the price of two: the hidden costs of regulatory reform under executive order 13,771. Administrative Law Review, 70(2), 491-512.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… wireless system can only be done for a specific technology at a specific time and place and given the QoS requirements for the consumer (). In the process of migrating to 5G, this is a risk that might result in a try and error process in the ……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".