Legal Issues Essays (Examples)

Studyspark

Study Document Study Document

Why College Athletes Should Be Paid

Pages: 5 (1459 words) Sources: 6 Document Type:Research Paper Document #:49619734

Proper Compensation for College Athletes
Introduction
College athletes with poorer socioeconomic status typically have issues with position educational outcomes. If college athletes were paid, they would have the ability to provide financial assistance to their struggling families, which … there is also discussion surrounding the question of how compensation should be handled, if compensation of college athletes is allowed. Some of the issues that have been raised regarding the “how” are whether there should be a compensation cap to prevent unfair recruiting practices, and how should … should be paid. In professional sports, salaries on a team will different substantially, as will salaries between sports. In college athletics, these same issues would arise if compensation of college athletes is allowed. But the first and more important question is whether or not college athletes should ……

References

References

Bokat-Lindell, S. (2019). Should College Athletes Be Allowed to Get Paid? Retrieved From  https://www.nytimes.com/2019/10/01/opinion/california-student-athletes-paid.html 

De Piccioto, E. (2019). Should College Athletes Get Paid? Retrieved From  https://www.theperspective.com/debates/sports/college-athletes-get-paid/ 

Gaydos, R. (2019). California governor signs bill allowing college athletes to capitalize on image, name and likeness. Retrieved From  https://www.foxnews.com/sports/ncaa-paid-players-california-bill-law 

Lemmons, M. (2017). College Athletes Getting Paid? Here Are Some Pros And Cons. Retrieved From  https://www.huffpost.com/entry/college-athletes-getting-paid-here-are-some-pros-cons_b_58cfcee0e4b07112b6472f9a 

Siegfried, J. J. (2015). The Case for Paying College Athletes. American Economic Association, 29(1), 115-138. Retrieved From  https://www.aeaweb.org/articles?id=10.1257/jep.29.1.115 

Yankah, E. (2015). Why N.C.A.A. Athletes Shouldn’t Be Paid. Retrieved From  https://www.newyorker.com/sports/sporting-scene/why-ncaa-athletes-shouldnt-be-paid 

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… with devices as compared to the actual information system, encompasses natural calamities like floods, earthquakes, typhoons, among others, terror attacks, vandalism, fire outbreak, legal tampering, power surges, and break-ins. Vlad and Lenghel (2017) put forward a collection of controls defending information systems from such physical threats.
The … and information system backups, tested, state-of-the-art disaster recovery interventions, and rotation and off-site backup data storage in a secure place. Logical risks denote legal access and purposeful or inadvertent modification or destruction of information or the whole information system. Such threats may be reduced using logical security … external threats owing to their disturbingly high incidence (sometimes more than half the sum total of risks) and to their origins lying in legal network use.
Audit for IS Security
Khan (2017) reports that despite significant developments in the field of information security, like object/subject access matrix ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

The FBI Counterproliferation And Weapons Of Mass Destruction

Pages: 6 (1839 words) Sources: 8 Document Type:Research Paper Document #:33590628

… it is not easy to get all the evidence and data from the known incidents. Therefore, most of the current debate on these issues is being done using incomplete information (Ogilve-White 1996, 43). This analysis will use publicly available knowledge and will not seek any classified documents. ……

References

References

Busch, Nathan, and Joyner, Daniel (ed). 2009. “Introduction: Nonproliferation at a Crossroads.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Athens, GA: The University of Georgia Press.

Reiss, Mitchell. 2009. “Foreword.” In Combating Weapons of Mass Destruction: The Future of Nonproliferation Policy. Edited by Nathan Busch, and Daniel Joyner. Athens, GA: The University of Georgia Press.

Cameron, Gavin, Pate, Jason & Vogel, Kathleen. (2001). “Planting Fear: How Real is the Threat of Agricultural Terrorism?” Bulletin of Atomic Scientists, 57(5), 38-44.

Jennings, Elain. 2013. U. S. proliferation policy and the campaign against transnational terror: Linking the U.S. non-proliferation regime to homeland security efforts. Master’s Thesis. Naval Postgraduate School.

Levi, Michael. 2009. “On Nuclear Terrorism.” Cambridge, MA: Cambridge University Press.

Mauroni, Albert. J. 2010. “A Counter-WMD Strategy for the Future.” Parameters, 58-73.

Ogilvie-White, Tanya. 2008. “Facilitating Implementation of Resolution 1540 in South- East Asia, and the South Pacific.” In Implementing Resolution 1540: The Role of Regional Organizations. Edited by Lawrence Scheinman. New York: United Nations Institute for Disarmament Research.

Pilat Joseph F. 2009. “Dealing with Proliferation and Terrorism.” In Combating Weapons of Mass Destruction: The Future of International Nonproliferation Policy, edited by Nathan E. Busch and Daniel H. Joyner. Athens, GA: University of Georgia Press.

Studyspark

Study Document Study Document

Intellectual Property Ethics

Pages: 3 (941 words) Sources: 3 Document Type:Essay Document #:57117856

… to achieve this by giving the creators rights over their respective creations. However, the protection of intellectual property is associated with some ethical issues and concerns. This paper discusses intellectual property ethics in relation to intellectual property rights and intellectual property theft. The discussion includes an overview ……

References

References

Burris, E. (n.d.). Legal and Ethical Issues with Intellectual Property. Retrieved from University of Missouri-Kansas City website: http://sce2.umkc.edu/BIT/burrise/it222/notes/ip.html

Federal Bureau of Investigation. (n.d.). Intellectual Property Theft/Piracy. Retrieved from U.S. Department of Justice website:  https://www.fbi.gov/investigate/white-collar-crime/piracy-ip-theft 

Maya, J. (2015, April 15). Music’s “Blurred Lines” Verdict Broadens Copyright Protection. Retrieved Florida International University website:  https://law.fiu.edu/blurred-lines-verdict/ 

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

...Legal issues Ethics of Clandestine Intelligence Operations
Introduction
One of the most common yet least understood methods of operations in the art of statecraft is the clandestine operation (Sheldon 1997). Though popularized in pulp fiction and film, such as the James Bond series franchise and numerous other spy thrillers, clandestine operations remain relatively unknown in the public consciousness—and when they are discussed it is generally with distaste, distrust and vilification (Sheldon 1997). Yet as Sheldon (1997) shows, clandestine operations are not new or unique to the modern world and in fact ancient Rome used them whenever military operations were impractical. Thus, “political influence operations, seeding, propaganda, political patronage, safe havens, political assassination, and paramilitary operations” can all be traced back more or less to similar operations implemented by the ancient Romans (Sheldon 1997, 299). Today, there are many different facets to clandestine operations, and many agencies that use them—from the CIA to……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Understanding The Factors Affecting The Success Of Credit Risk In

Pages: 11 (3237 words) Sources: 15 Document Type:Research Paper Document #:41178734

… are in alignment with the lending primacies of the management. Credit risks can emanate from ambiguity in financial markets, failures in projects, and legal obligations, credit problems, calamities, natural causes and adversities, in addition to intentional attacks from an opponent. Specifically, credit risk is the by a … 2016).
Whereas banking institutions have experience major challenges over the years for a wide range of reasons, the fundamental cause of severe banking issues continues to have a direct relation to the counterparties’ credit standards, inappropriate risk management, or failure to focus on changes in economic or … worsening in the credit position of a financial institution’s counterparties. Taking into consideration that exposure to credit risk is a prevailing source of issues in banks across the globe, it is pivotal for banks and their managers to take in significant insight from past experiences. Presently, banks ……

References

References

Bhattarai, Y. R. (2016). Effect of credit risk on the performance of Nepalese commercial banks. NRB Economic Review, 28(1), 41-64.

Das, A. and Ghosh, S. (2007). Determinants of Credit Risk in Indian State-owned Banks: An Empirical Investigation. Economic Issues, 12(2): 48-66.

Derelio?lu, G., & Gürgen, F. (2011). Knowledge discovery using neural approach for SME’s credit risk analysis problem in Turkey. Expert Systems with Applications, 38(8), 9313-9318

Garr, D. K. (2013). Determinants of credit risk in the banking industry of Ghana. Developing Country Studies, 3(11), 64-77.

Gizaw, M., Kebede, M., & Selvaraj, S. (2015). The impact of credit risk on profitability performance of commercial banks in Ethiopia. African Journal of Business Management, 9(2), 59-66.

Johnson, B., & Christensen, L. (2008). Educational research: Quantitative, qualitative, and mixed approaches. New York: Sage.

Kithinji, A. M. (2010). Credit risk management and profitability of commercial banks in Kenya. (Doctoral dissertation, University of Nairobi).

Limam, I. (2001). Measuring technical efficiency of Kuwaiti banks. Kuwait: Arab Planning Institute.

Studyspark

Study Document Study Document

Psychology And The Role Of Ethics

Pages: 6 (1774 words) Sources: 5 Document Type:Essay Document #:14642099

Introduction
Several ethical issues, dilemmas, and problems apply to various aspects of psychology, including educational and scientific practices. The expansive body of literature on ethical issues shows that ethical issues are normally multifaceted and usually pose societal, interpersonal, professional, emotional, and intellectual challenges to psychologists. Furthermore, every psychologist can act unethically and harm ……

References

References

Hardicre, J. (2014). An overview of research ethics and learning from the past. British Journal of Nursing, 23(9), 483-486.

Kjellström, S., Ross, S. N., & Fridlund, B. (2010). Research ethics in dissertations: ethical issues and complexity of reasoning. Journal of medical ethics, 36(7), 425-430.

Simelane-Mnisi, S. (2018). Role and importance of ethics in research.  Ensuring research integrity and the ethical management of data (pp. 1-13). IGI Global.

Smith, D. (2003). Five principles for research ethics. Monitor on Psychology, 34(1), 56.

Resnik, D. B. (2015). What is ethics in research & why is it important? Retrieved May 26, 2020, from  https://www.niehs.nih.gov/research/resources/bioethics/whatis/index.cfm 

Walsh, R. T. (2015). Introduction to ethics in psychology: Historical and philosophical grounding. Journal of Theoretical and Philosophical Psychology, 35(2), 69.

Studyspark

Study Document Study Document

Why Uber Refuses To Hire Drivers As Full Time Employees

Pages: 11 (3298 words) Sources: 10 Document Type:Research Paper Document #:74911361

… employees. It is akin to a company like Nike outsourcing all its production work to wage slaves in Asia. Uber has found a legal loophole that allows it to classify its drivers as contractors, meaning it does not have to provide any of the benefits, support or … business model and undermined the taxi driver’s occupation with its app business that contracts out driving services to independent drivers.
There are indirect issues with Uber’s business, too, including the problem of sexual assaults that have occurred among Uber drivers. Between 2018 and 2019 there 6000 sexual ……

References

References

Bhuiyan, J. (2018). Uber’s sleek new product? Your safety. Retrieved from  https://www.vox.com/2018/9/6/17824294/uber-safety-product-feature s

Bond, S. (2019). Uber Received Nearly 6,000 U.S. Sexual Assault Claims In Past 2 Years. Retrieved from  https://www.npr.org/2019/12/05/785037245/uber-received-nearly-6-000-u-s-sexual-assault-claims-in-past-2-year s

Kaltner, J. (2018). Employment status of uber and lyft drivers: Unsettlingly settled.  Hastings Women's LJ, 29, 29.

Malos, S., Lester, G. V., & Virick, M. (2018). Uber drivers and employment status in the gig economy: Should corporate social responsibility tip the scales?. Employee Responsibilities and Rights Journal, 30(4), 239-251.

North, A. (2019). It’s not just passengers being assaulted in Ubers. Drivers are at risk, too. Retrieved from  https://www.vox.com/2019/12/7/20998646/uber-safety-report-sexual-assault-lyft-case s

Rapier, G. (2019). Uber scored a major victory when the US government ruled drivers aren't employees, but not everyone is happy. Retrieved from  https://www.businessinsider.com/uber-drivers-disappointed-ruling-not-employees-2019-5 

Reingold, J. (2013). Southwest’s Herb Kelleher: Still crazy after all these years. Retrieved from  http://fortune.com/2013/01/14/southwests-herb-kelleher-still-crazy-after-all-these-years/ 

Rogers, B. (2016). Employment rights in the platform economy: Getting back to basics. Harv. L. & Pol'y Rev., 10, 479.

Studyspark

Study Document Study Document

Social Work Policy For Sex Trafficking

Pages: 8 (2423 words) Sources: 6 Document Type:Essay Document #:78918009

… strides in its national endeavor to curb sex trafficking, by sanctioning legislation and forming schemes whereby victims can obtain protection and also temporary legal status. However, despite these determinations, the policy continues to be excessively fixated on utilizing victims as tools for law enforcement instead of helping ……

References

References

Alliance to End Slavery and Trafficking. (2017). Summary of the Trafficking Victims Protection Act (TVPA) and Reauthorizations FY 2017. Retrieved from:  https://endslaveryandtrafficking.org/summary-trafficking-victims-protection-act-tvpa-reauthorizations-fy-2017-2/ 

Benoit, C., Smith, M., Jansson, M., Healey, P., & Magnuson, D. (2019). “The prostitution problem”: Claims, evidence, and policy outcomes. Archives of Sexual Behavior, 48(7), 1905-1923.

Brooks, A., & Heaslip, V. (2019). Sex trafficking and sex tourism in a globalized world. Tourism Review of AIEST - International Association of Scientific Experts in Tourism, 74(5), 1104-1115. doi:http://dx.doi.org/10.1108/TR-02-2017-001

Bruckert, C., & Parent, C. (2002). Trafficking in human beings and organized crime: A literature review (pp. 1-35).

Clawson, H. J., Dutch, N., Solomon, A., & Grace, L. G. (2009). Human trafficking into and within the United States: A review of the literature. Washington, DC: Office of the Assistant Secretary for Planning and Evaluation, US Department of Human and Health Services. Retrieved December 25, 2009.

Greenbaum, V. J. (2017). Child sex trafficking in the United States: Challenges for the healthcare provider. PLoS medicine, 14(11).

International Labour Organization. (2017). Global Estimates of Modern Slavery. Retrieved from:  https://www.ilo.org/wcmsp5/groups/public/---dgreports/---dcomm/documents/publication/wcms_575479.pdf 

Kelly, C. (July 30, 2019). 13 sex trafficking statistics that explain the enormity of the global sex trade. USA Today. Retrieved from:  https://www.usatoday.com/story/news/investigations/2019/07/29/12-trafficking-statistics-enormity-global-sex-trade/1755192001/

Studyspark

Study Document Study Document

Case Conceptualization Group Therapy CBT And Psychodynamics

Pages: 10 (2982 words) Sources: 11 Document Type:Essay Document #:27547144

… orientations including cognitive behavioral therapy (CBT) and psychodynamics. A summary of the treatment, including client reactions, plus future recommendations are also provided. Ethical issues and quandaries are presented in accordance with the American Counseling Association (ACA) Code of Ethics. Finally, limitations and supervision needs are discussed in … irritability, difficulty concentrating, muscle aches, and difficulty sleeping. Differential diagnoses allow the clinician to…[break]…B of the ACA (2014) Code of Ethics covers all issues relevant to confidentiality and privacy in the therapeutic relationship. When the group is formed, all members need to become aware of the importance … degree to which clients are following through with treatment plan recommendations at home or outside of the group context. The counselor factors in issues related to diversity, but cannot be aware of all the pertinent variables that might impact individual responses to the treatment plan, the interventions, … 2007, p. 35). In this……

References

References

American Counseling Association (2014). ACA Code of Ethics. Retrieved from:  https://www.counseling.org/resources/aca-code-of-ethics.pdf 

American Group Psychotherapy Association (2007). Practice guidelines for group psychotherapy. Retrieved from: https://www.agpa.org/docs/default-source/practice-resources/download-full-guidelines-(pdf-format)-group-works!-evidence-on-the-effectiveness-of-group-therapy.pdf?sfvrsn=ce6385a9_2

“Clinical Thinking Skills,” (n.d.). Retrieved from:  https://in.sagepub.com/sites/default/files/upm-binaries/44297_3.pdf 

Glasofer, D.R. (2019). Generalized anxiety disorder. Retrieved from:  https://www.verywellmind.com/dsm-5-criteria-for-generalized-anxiety-disorder-1393147 

MacNamara, A., Kotov, R. & Hajcak, G. (2016). Diagnosis and symptom-based predictors of emotional processing in generalized anxiety disorder and Major Depressive Disorder: An Event-Related Potential Study. Cognitive Therapy and Research 40(2016): 275-289.

Plummer, F., Manea, L., Trepel, D., et al. (2016). Screening for anxiety disorders with the GAD-7 and GAD-2: a systematic review and diagnostic metaanalysis. General Hospital Psychiatry 39(2016): 24-31.

Suszek, H., Holas, P., Wyrzykowski, T., et al. (2015). Short-term intensive psychodynamic group therapy versus cognitive-behavioral group therapy in day treatment of anxiety disorders and comorbid depressive or personality disorders: study protocol for a randomized controlled trial. Trials 16(2015):  https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4517633/ 

Thimm, J.C. & Antonsen, L. (2014). Effectiveness of cognitive behavioral group therapy for depression in routine practice. BMC Psychiatry 14(292):  https://bmcpsychiatry.biomedcentral.com/articles/10.1186/s12888-014-0292-x

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".