Study Document
… everything. Now the central bank’s only policy is to continue to inflate the asset bubble or risk bringing down the entire global financial system when confidence in that system evaporates.
Conclusion
By trying to intervene in the markets through the manipulation of inflation rates in order to reduce unemployment, the central bank ……
References
Amadeo, K. (2019). Unemployment rate by year since 1929 compared to inflation and GDP. Retrieved from https://www.thebalance.com/unemployment-rate-by-year-3305506
FRED. (2019). FRED Graph. Retrieved from https://fred.stlouisfed.org/series/LNU04000024#0
Friedman, M. (1977). Nobel lecture: inflation and unemployment. Journal of political economy, 85(3), 451-472.
Heller, R. (2017). Monetary mischief and the debt trap. Cato Journal, 37(2), 247-261.
Lucas, R. E., & Rapping, L. A. (1969). Price expectations and the Phillips curve. The American Economic Review, 59(3), 342-350.
Stiglitz, J. (1997). Reflections on the natural rate hypothesis. Journal of Economic Perspectives, 11(1), 3-10.
Wulwick, N. J. (1987). The Phillips curve: which? whose? to do what? how?. Southern Economic Journal, 834-857.
Study Document
… However, for Goldman to be held accountable in a much more severe manner would have meant, essentially, an undoing of the current financial system since Goldman alums sit in powerful positions throughout that system all over the world (Draghi at the ECB, Mnuchin in the U.S. Treasury, Carney at the BOE and so on). Goldman is one ……
References
Baer, J. (2014). Former Goldman Trader Tourre Won't Appeal Fraud Verdict. Retrieved from https://www.wsj.com/articles/former-goldman-trader-tourre-wont-seek-appeal-of-securities-fraud-verdict-1401221556
Huston, J. H., & Spencer, R. W. (2018). Quantitative easing and asset bubbles. Applied Economics Letters, 25(6), 369-374.
Lewis, M. (2010). The Big Short. NY: W. W. Norton.
McDonald, R., & Paulson, A. (2015). AIG in Hindsight. Journal of Economic Perspectives, 29(2), 81-106.
Murray, N., Manrai, A. K., & Manrai, L. A. (2018). The role of incentives/punishments, moral hazard, and conflicts of interests in the 2008 financial crisis. The bi-annual academic publication of Universidad ESAN, 22(43).
SEC. (2010). Litigation Release No. 21489 / April 16, 2010. Retrieved from https://www.sec.gov/litigation/litreleases/2010/lr21489.htm
Weisenthal, J. (2009). Goldman Sachs made billions shorting AIG. Retrieved from https://www.businessinsider.com/goldman-sachs-made-billions-shorting-aig-2009-3
Study Document
...Economic system To Choose an Accounting Topic That Would Be Excellent for A Dissertation.
Research Topic
Taxation in the digital era is an excellent topic for a dissertation because there is an ongoing debate on whether digital companies are paying their fair share of taxes. Some tax experts believe that digital companies enjoy tax levels close to zero compared to traditional companies, yet they earn huge profits. The underlying principle of corporate taxation is that \"profit should be taxed where value is created\" (Sestakova, 2018). However, digitalization challenges this principle because of it difficult to pin down how and where digital companies create value. Also, digital companies rely heavily on intangible assets, big data, and which is hard to value (Sand- Zantman, 2018). Given this fact, there is a need to research problems that tax accountants face when taxing digital profits.
The above topic is relevant when examined from the technological perspective……
References
Committee of Experts on International Cooperation in Tax Matters. (2019). Tax Issues related to the Digitalization of the Economy: Report (E/C.18/2019/CRP.12). https://www.un.org/esa/ffd/wp-content/uploads/2019/04/18STM_CRP12-Work-on-taxation-issues-digitalization.pdf
Katz, R. (2015). THE IMPACT OF TAXATION ON THE DIGITAL ECONOMY. https://www.itu.int/en/ITU-D/Conferences/GSR/Documents/GSR2015/Discussion_papers_and_Presentations/GSR16_Discussion-Paper_Taxation_Latest_web.pdf
Pemerathna, A. (2016). Economic impact of digital taxation: A case on information communication technology industry Sri Lanka. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.2910328
Sand-Zantman, W. (2018). Taxation in the Digital Economy. https://www.orange.com/fr/content/download/47110/1371114/version/1/file/Rapport%20TAXATION-VF-Mai2018.pdf
Sestakova, M. (2018, February). Tax Challenges of the Digital Economy [Paper presentation]. Management Challenges in the 21st Century, Bratislava, Slovakia.
Study Document
… be bundled and sold to investors: that was the idea that helped fuel the home buying spree leading up to the 2008 global economic crisis. The bubble burst when creditors began defaulting on loans and the price of credit default swaps skyrocketed. Moral hazard came back to … the upper level management is willing to permit (Riley, 2009). JP Morgan is another international competitor that engages in ERM by looking at system risk and seeing how a loss by one member or branch or department or division can affect the rest of the firm. It ……
References
Beasley, M. (2020). How to Leverage ERM Principles to Better Respond to COVID-19-Related Risks. ERM Professional Insights.
Derysh, I. (2020). Watchdog questions why Wells Fargo reported giving only one large PPP loan to a Black-owned business. Retrieved from https://www.salon.com/2020/07/22/watchdog-questions-why-wells-fargo-reported-giving-only-one-large-ppp-loan-to-a-black-owned-business/
English, C. (2020). Wells Fargo Forced to Cut Its Dividend After Fed Stress Test. Here’s What Other Banks Did. Retrieved from https://www.barrons.com/articles/wells-fargo-forced-to-cut-its-dividend-after-fed-stress-test-51593467664
Hall, J. (2007). Internal Auditing and ERM: Fitting in and Adding Value. Retrieved from https://global.theiia.org/about/about-the-iia/Public Documents/Sawyer_Award_2007.pdf
Kaplan, R. & Mikes, A. (2012). Managing risks: A new framework. Harvard Business Review, 3.
Lewis, M. (2010). The Big Short. NY: W. W. Norton.
Lundqvist, S. (2014). Abandoning Silos for Integration: Implementing Enterprise Risk Management and Risk Governance. Lund University.
Morgenson, G. (2020). More Wells Fargo customers say the bank decided to pause their mortgage payments without asking. Retrieved from https://www.nbcnews.com/business/personal-finance/more-wells-fargo-customers-say-bank-decided-pause-their-mortgage-n1234610
Study Document
… the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computers, video system and other handheld devices as well as objects that have traditionally not been viewed as being amenable can be incorporation into computer-based networks ……
References
Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.
Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005
An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.
Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.
Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.
Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.
Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from https://www.business.com/articles/business-disaster-prep/ .
Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from https://justcreative.com/2018/11/19/internet-of-things-explained/ .
Study Document
… out through various exploitation methods or techniques on individual computers, networks or the Internet. It incorporates intentional activities to infiltrate or penetrate computer system/networks used by a rival to obtain information within or transmitted through these networks or system.[footnoteRef:3] Cyber espionage is used by different nations across the globe including the United States, China and Russia despite concerns regarding its legitimacy and … Cyber Espionage
Banks (2017) define cyber espionage as intentional activities used by an adversary to collect information resident on or transmitted through computer system or networks.[footnoteRef:4] Cyber espionage has become common in the modern international relations framework due to use of cyberspace and the emergence of cyber … to the long-standing practice of intelligence gathering and espionage in national security apparatus of every nation. Cyber espionage involves electronic surveillance of computer system or networks to intercept communication between two or more parties. Using electronic surveillance, adversaries……
Bibliography
Ablon, L. “Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data.” RAND Corporation, March 2018. https://www.rand.org/content/dam/rand/pubs/testimonies/CT400/CT490/RAND_CT490.pdf
Agarwal A. & CERT-IN. “Cyber Espionage, Infiltration and Combating Techniques.” Indian Computer Emergency Response Team, 2013. https://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2013-0128.pdf
Banks, W.C. “Cyber Espionage and Electronic Surveillance: Beyond the Media Coverage.” Emory law Journal 66, (2017).
Baxter, P. & Jack, S. “Qualitative Case Study Methodology: Study Design and Implementation for Novice Researchers.” The Qualitative Report 13, no. 4 (2008).
Brown, G. “Spying and Fighting in Cyberspace: What is Which?” Journal of National Security Law & Policy 8, (2017).
Connell, M. & Vogler, S. “Russia’s Approach to Cyber Warfare.” CNA Analysis and Solutions, 2017. https://www.cna.org/CNA_files/PDF/DOP-2016-U-014231-1Rev.pdf
Creswell, J.W. Research design: Qualitative, quantitative, and mixed methods approaches, 4th ed. Thousand Oaks, CA: Sage Publications Inc.
Diplomacy Data. “Cyber Security and Cyber Espionage in International Relations.” Diplomacy Data, 2015. http://diplomacydata.com/cyber-security-and-cyber-espionage-in-international-relations/
Study Document
Proper Compensation for College Athletes
Introduction
College athletes with poorer economic status typically have issues with position educational outcomes. If college athletes were paid, they would have the ability to provide financial assistance to … full or partial scholarship, depending on the athlete or the sport – is inadequate compensation for the labor these athletes provide, and the economic benefit of that labor. A more equitable approach to the distribution of the proceeds of that labor will alleviate many of the challenges … to this an as extra layer – the stars among college athletes are free to pursue market forces for their gain, beyond whatever system is designed for compensation of all athletes.
Conclusion
College athletes should be paid for their work. First, the economic benefits of college athletics are significant, and they are not distributed in an equitable manner. Indeed, the iniquity of the distribution of this ………
References
Bokat-Lindell, S. (2019). Should College Athletes Be Allowed to Get Paid? Retrieved From https://www.nytimes.com/2019/10/01/opinion/california-student-athletes-paid.html
De Piccioto, E. (2019). Should College Athletes Get Paid? Retrieved From https://www.theperspective.com/debates/sports/college-athletes-get-paid/
Gaydos, R. (2019). California governor signs bill allowing college athletes to capitalize on image, name and likeness. Retrieved From https://www.foxnews.com/sports/ncaa-paid-players-california-bill-law
Lemmons, M. (2017). College Athletes Getting Paid? Here Are Some Pros And Cons. Retrieved From https://www.huffpost.com/entry/college-athletes-getting-paid-here-are-some-pros-cons_b_58cfcee0e4b07112b6472f9a
Siegfried, J. J. (2015). The Case for Paying College Athletes. American Economic Association, 29(1), 115-138. Retrieved From https://www.aeaweb.org/articles?id=10.1257/jep.29.1.115
Yankah, E. (2015). Why N.C.A.A. Athletes Shouldn’t Be Paid. Retrieved From https://www.newyorker.com/sports/sporting-scene/why-ncaa-athletes-shouldnt-be-paid
Study Document
...Economic system Introduction
The most significant terrorist attack on American soil was the September 11 attacks by Al Qaeda terrorists. The attacks changed the perception that America cannot suffer such attacks, considering how far away it is from where terrorist organizations such as Al Qaeda are based. The attacks also initiated America’s war against terrorism, which continues to date. Before the September 11 attacks, Americans had never experienced a large scale terrorist incident within their country’s borders. Moreover, most local and state security agencies had no experience with such attacks and were, therefore, very ill-prepared to respond to them. The only historic attacks or incidents that compare to the September 11 attacks were the airplane hijackings of the seventies and the eighties. The fact that Americans were not prepared and for the attacks and never expected such attacks to happen on their soil resulted in many people being very surprised and mentally……
References
Chanley, V. (2002). Trust in Government in the Aftermath of 9/11: Determinants and Consequences. Political Psychology, 23(3), 469-483. Retrieved May 11, 2020, from https://www.jstor.org/stable/3792588
Dugulin, R., & Niglia, A. (2015, May 17). The private sector in the protection of critical infrastructure - GRI. Global Risk Insights. https://globalriskinsights.com/2015/05/the-private-sectors-vital-role-in-the-protection-of-critical-infrastructure/
Gramlich, J. (2018, September 11). Since 9/11, Americans have seen anti-terrorism policy as a top priority. Pew Research Center. https://www.pewresearch.org/fact-tank/2018/09/11/defending-against-terrorism-has-remained-a-top-policy-priority-for-americans-since-9-11/
Morgan, D. (2019). Homeland Security Research and Development: Homeland Security Issues in the 116th Congress. Current Politics and Economics of the United States, Canada, and Mexico, 21(1), 43-46.
Moteff, J., Copeland, C., & Fischer, J. (2003, January). Critical infrastructures: What makes an infrastructure critical?. Library of Congress Washington DC Congressional Research Service.
Study Document
… millions of Middle Eastern refugees. The Germans, like the Hungarians, the Italians and the British are all concerned about the safety risks, the economic risks, the health risks, the social risks, the cultural risks, and the political risks that come from allowing so many refugees through their … with the global economy wavering there is a great deal of downside risk. How can the EU weather the coming social, political, and economic storm that is gathering overhead?
The reality is that managing a modern representative government among dozens of diverse peoples and nations is not … able to join and become a debt colony. Italy is in similar shape, as is Spain, Ireland and others. How is this a system that can work for long?
Thus, the future looks bleak for the EU. It is not going to be able to address its ……
References
Amadeo, K. (2019). Eurozone debt crisis. Retrieved from https://www.thebalance.com/eurozone-debt-crisis-causes-cures-and-consequences-3305524
BBC. (2020). Brexit. Retrieved from https://www.bbc.com/news/uk-politics-32810887
Chadwick, L. (2020). Recession could tip EU. Retrieved from https://www.euronews.com/2020/02/27/could-covid-19-coronavirus-trigger-a-european-economic-recession
Grose, T. (2020). Coronavirus tests Europe’s open borders. Retrieved from https://www.usnews.com/news/best-countries/articles/2020-03-02/europes-open-border-agreement-may-become-casualty-to-coronavirus
Herszenhorn, D. (2019). Europe’s NATO problem. Retrieved from https://www.politico.eu/article/europe-nato-problem-defense-procurement-training-research/
Pew Research Center. (2016). European opinions of the refugee crisis. Retrieved from https://www.pewresearch.org/fact-tank/2016/09/16/european-opinions-of-the-refugee-crisis-in-5-charts/
Wirtz, B. (2019). The Beginning Of The End Of Open Borders In Europe. Retrieved from https://www.theamericanconservative.com/articles/the-beginning-of-the-end-of-open-borders-in-europe/
We have over 150,000+ study documents to help you.
Sign Up for FREE