Categories
Writers Solution

Does the media influence the government or does the government influence the media?

Assignment Questions

Waddell, C. R., & Taras, D. (2012). Media and Politics. Edmonton: Athabasca University Press. [Referred to as Waddell & Taras (2012)] http://search.ebscohost.com.ezproxy.myucwest.ca/login.aspx?direct=true&db=e000xna&AN=463483&site=eds-live&authtype=ip,url,uid&ebv=EB&ppid=pp_1

Read up to Chapter 3 (up to page 54) and answer the following questions:

1) Does the media influence the government or does the government influence the media?

Use at least one direct quote from the text

2) What does Waddell give as reasons for the “death of political journalism”?

3) What are the reasons negative ads work?

4) Why are newspapers integral to all media?

5) What does the CRTC stand for, who created it and what does it do?

Each question is worth 5 marks. Be sure to write enough for each question that justifies you getting 5 marks. This means you really will likely need at least 5 sentences for each question at a minimum but if you want full marks you definitely should write more than that

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Does the media influence the government or does the government influence the media?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Exploring the foundation of our American system of government including its democratic principles and the basic philosophy underlying the US Constitution

Overview

In Discussion 1 we will be exploring the foundation of our American system of government including its democratic principles and the basic philosophy underlying the US Constitution.

To help you formulate an answer, be sure to review the Exploration for this Module, and Chapter 2 of your e-text, on The Constitution.

Outcomes 1, 2, 3

Instructions

  • Please respond to the following questions completely:  If you were setting up your own government, how would you structure it so that the government doesn’t take away our inalienable rights?  The Founders found the answer in limits. They devised a government that established limits at every opportunity.  What do you believe those limits that are placed upon the government should be?   Please be specific in your response and explain why.

criteria: 1.  All parts of the original discussion questions are answered; several reasons or examples are provided in support of the response; the initial post is a minimum of 150 words or more. 

2. The student demonstrated an excellent understanding of the concepts in the module; at least 3 textbook and/ or lecture concepts were incorporated and cited in their responses. 

3.  Writing represents correct college-level English, grammar, spelling, and punctuation throughout the discussion, and APA citation is correct. 

here’s how to cite the video for the module exploration:  Films Media Group. (2010). The Constitution and foundations of government. Films On Demand. Retrieved October 10, 2021, from https://fod.infobase.com/PortalPlaylists.aspx?wID=151823&xtid=39964. 

Link to video to help with this discussion: <iframe height=’530′ frameborder=’0′ style=’border:1px solid #ddd;’ width=’660′ src=’https://ccco.idm.oclc.org/login?url=https://fod.infobase.com/OnDemandEmbed.aspx?token=39964&wID=151823&plt=FOD&loid=0&w=640&h=480&fWidth=660&fHeight=530′ allowfullscreen allow=”encrypted-media”>&nbsp;</iframe>

if this one doesn’t work in your URl, try this one: https://ccco.idm.oclc.org/login?url=https://fod.infobase.com/PortalPlaylists.aspx?wID=151823&xtid=39964

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Exploring the foundation of our American system of government including its democratic principles and the basic philosophy underlying the US Constitution

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Crimes Against Persons and Government


Overview
Scenario 1
Lori is walking to her car in a shopping mall parking lot at night when Brian suddenly jumps in front of her and points a knife in her face. Brian strikes Lori. Fortunately, Lori took a self-defense class and hits Brian with her knee and fists and while running to safety, falls and hits her head. Lori dies from her injuries. Brian is subsequently arrested and charged with assault, battery, and murder.

  • Determine whether your home state will prevail in a prosecution against Brian for assault, battery, and murder, and to what degree of murder.
    • Refer to FindLaw’s State Criminal Law webpage to locate the criminal laws in your state.
    • Be sure to identify all the elements and evidence necessary for a conviction.
  • Scenario 2
    Jack is angry at his local school because his son is being bullied. He drives to the school to meet and talk to the principal. At the school, the meeting does not go well and he threatens to “bring the house down” if his son is not better protected at school. Jack creates a Facebook page titled, “Down with Hill High School” and advocates to followers to “change the regime.”
  • Under federal law, can federal prosecutors charge Jack with terrorism?
    • Explain why or why not.
  • Scenario 3
    Juan has worked on Bob’s farm for 10 years and one night gets arrested for DUI. When Juan fails to show up for work on Monday morning, Bob finds out that Juan is in the country illegally. Juan shows up at Bob’s house and asks for his last paycheck so he can flee the country. Bob can’t pay Juan but agrees to let him stay in his home and work around the farm for food and shelter. Juan remains in the country illegally for another two years, misses his criminal and immigration hearings, and marries Bob’s daughter, a U.S. citizen. Bob and Juan are arrested by immigration federal officers two months later.
  • Under immigration law, can Bob be charged with harboring an illegal alien?
  • Can Juan be removed from the United States, pending a fair hearing?
  • Instructions
  • Pursuant to the chapter readings, write a 3–4-page paper in which you analyze the three scenarios explained above and answer the specific questions.
  • Use at least three quality academic resources in this assignment. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is grammatically correct and generally free of spelling, typographical, formatting, and/or punctuation errors.
  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
    The specific course learning outcome associated with this assignment is:
  • Distinguish among crimes against persons, including terrorism and criminal conduct against the government

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Crimes Against Persons and Government

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Political – Existing or potential government policies; and ways in which government does, or is likely to, impact on the business.

Recent Question/Assignment

please read the case study and apply the case fact into the questions asked in the analysis document.
PESTEL analysis
template
Political
?
?
? ? Economic
?
?
? ? Social
?
?
? ?
Technological
?
?
? ? Environmental
?
?
? ? Legal
?
?
? ?
A PESTEL analysis focuses on the external environments in which a business operates. You should be able to describe the potential impact(s) that each identified factor may have on the business now and in the future. Analysis should focus on the factors that are most likely to change and the factors that are likely to have the greatest impact on the business.
• Political – Existing or potential government policies; and ways in which government does, or is likely to, impact on the business.
• Economic – Key economic factors that impact on the business.
• Social – Demographic characteristics, societal norms or trends and applicable attitudes and values.
• Technological – Technological changes, innovations or advancements, and cross industry/market adoption or adaption.
• Environmental – Environmental factors or changes that may impact on the business.
• Legal – Existing legislation that impacts on the business. Potential changes to legislation are considered to be political factors as governments drive changes in legislation through policies.
For the factors listed above, consider which factors are most likely to change and their impacts on the business.
Swot analysis
template
S Strengths
W Weaknesses
1.
2.
3. 1.
2.
3.
O Opportunities T Threats
1.
2.
3. 1.
2.
3.
Internal perspective – Factors that the business can directly control. They are considered important to its long-term success.
Strengths – Internal features of the business that allow it to operate more effectively than its competitors.
Consider the following:
• What the business does better than its competitors.
• The advantages it has over its competitors.
• What differentiates it from its competitors.
Weaknesses – Internal aspects of the organisation that could be improved.
Consider the following:
• Whether the business has any features that do not meet the industry standard.
• Whether the business can increase performance in any underperforming aspects.
• Any features of the business that cause problems or complaints.
• What its competitors can do better.
External perspective – Factors that the business cannot control.
Opportunities – Factors in the business external environment that it can use to its advantage, such as new or changing trends.
Consider the following:
• Any developments or changes in relevant technologies or markets.
• Any changes in relevant government policy or regulations/legislation.
• Any major local or global events that may have occurred.
• Any potentially new uses of the business’ products and/or services.
Threats – Factors in the business external environment that could adversely affect the business or its strategic intent. Examples include inflation, new legislation or a new competitor in the market.
Consider the following:
• Any obstacles the business might face from external factors.
• What the business’ competitors are doing.
• Any changes in products, services or technology that could threaten the business.
• It is possible for something to be considered as both an opportunity and a threat.
Porter’s Five Forces Analysis
template

Porter’s Five Forces analysis considers the external environment in which a business operates to determine the intensity of competition that exists within an industry. The higher the overall intensity rating of the various forces, the higher the intensity of competition. The level and source of intensity should have a direct impact on a business’s strategy.
• Threat of new entrants – How easy is it for new competitors to enter the industry? Competitors may come from another market (eg overseas) or another industry. Assess the different barriers to entry.
• Threat of substitute products or services – Can other products/services be used in place of the products/services the business provides? How similar are the other products in terms of cost, quality and functionality?
• Bargaining power of suppliers – In negotiations, who has the greatest influence on the relationship? Who is more dependent on the other? Who has the greater market presence, and are their supplies unique?
• Bargaining power of buyers – In negotiations, who has the greater influence on the relationship? Who is more dependent on the other? Who has the greater market presence?
• Rivalry amongst existing competitors – How many businesses operate in the market? How fragmented is the market? What is the key basis for competition? How are industry growth levels? What stage of the growth lifecycle is industry currently experiencing? What are the barriers to exiting the market?
Value chain analysis
template
Primary activities Margin
Inbound logistics
?
?
? ? Operations
?
?
? ? Outbound logistics
?
?
? ? Marketing and sales
?
?
? ? After-sales services
?
?
? ?
Support activities Administrative infrastructure
?
? ? ?
Human resources management
?
?
? ?
Technology development
?
?
? ?
Procurement
?
? ? ?
Task 2.
1. Fill in the template by describing 10 different risks in the case study. Include a range of both financial and non-financial risks in your answer. For each risk you need to answer the following questions:
o What could be the source or underlying cause of the risk?
o Why is this a risk?
o What would be the consequences of failing to address the risk?
o How can the risk be managed?
2. Update the strategic analysis you completed in Topic 3.1
3. Open your strategic analysis documents.
4. Compare the analysis documents to the risks you identified.
o Are there any risks you didn’t initially include in your strategic analysis?
o Do you have any new insights that may impact on your strategic analysis?
5. Amend your strategic analysis by adding in any relevant information from your risk identification. Include justification for these changes.
Risk identification
template
Risk Name and description of the risk Source or underlying cause of the risk Explanation of
why this is a risk Potential consequence(s)
of failing to address the risk Can the risk be managed?
If yes, how?
1
2
3
4
5
6
7
8
9
10
TASK 3
Analyse the financial ratios.
1. For each ratio, complete the analysis column. Compare each ratio over time and to the benchmark, referring to the financial statements and the company information.
2. Write a brief analysis for each ratio which includes the following:
o How the company compares to benchmark ratios.
o The reason why a ratio might differ from a benchmark.
o Whether the ratio is considered reasonable.
o Ratio trends over time.
3. Update the strategic analysis and risk identification you completed
4. Open the strategic analysis documents and the risk identification document.
o Compare these documents to your ratio analysis. Does this provide any new insights that may impact your strategic analysis and identified risks?
5. Amend your strategic analysis and risk identification documents by adding any relevant information from your ratio interpretations. Include justifications for these changes.
Interpret ratios
template
Jun-21 Jun-20 Jun-19 Jun-18 Jun-17 Australia Benchmark US Benchmark Financial ratio analysis
Profitability ratios
Gross margin 35.09% 34.70% 35.66% 35.99% 35.68% 40.00% 35.00%
EBIT Margin 5.86% 3.87% 7.51% 7.43% 7.72% 5.00% 7.50%
Return on assets (ROA) 4.80% 3.33% 5.32% 5.00% 5.15% 6.00% 7.00%
Return on shareholders equity 4.45% 1.38% 5.51% 4.74% 4.83% 10.00% 12.00%
Activity ratios
Debtor days 55.21 45.09 47.30 48.27 47.50 45.00 60.00
Inventory days 178.00 148.92 160.42 164.50 195.19 150.00 180.00
Creditor days (based on COGS) 200.19 187.53 211.06 198.24 176.64 90.00 175.00
Working capital days 33.01 6.48 -3.35 14.52 66.05 105.00 65.00
Asset turnover 0.82 0.86 0.71 0.67 0.67 0.75 0.80
Fixed asset turnover 1.39 1.44 1.18 1.13 1.14 1.40 1.40
Liquidity ratios
Current ratio 1.35 1.20 1.30 1.34 1.66 1.50 1.25
Quick ratio 0.50 0.44 0.66 0.66 0.91 0.65 0.55
Financing ratios
Return on equity (ROE) 4.55% 1.45% 5.64% 4.83% 4.92% 10.00% 12.00%
Return on capital employed (ROCE) 7.22% 4.99% 7.61% 6.86% 6.77% 12.00% 15.00%
Debt ratio 0.47 0.46 0.39 0.38 0.36 0.50 0.50
Debt-equity ratio 0.88 0.85 0.64 0.60 0.57 0.75 0.75
Interest coverage ratio 5.05 3.51 10.23 8.01 6.73 3.50 4.50
Other ratios
Dividend payout 10.00% 10.00% 20.00% 20.00% 20.00% 40.00% 50.00%
Return on investment (ROI) 4.66% 2.99% 5.14% 4.85% 4.99% 10.00% 12.00%
Operating cash flow ratio 0.05 0.05 0.28 0.34 0.65 0.25 0.25
Operating cash flows to net profit 0.67 2.16 2.68 3.29 5.41 1.20 1.20
Current liability coverage 0.04 0.05 0.26 0.32 0.62 0.20 0.20
Self-generation -$8,650 -$6,148 $4,346 -$4,321 $14,806 positive positive

Looking for answers ?

GET SOLUTION BELOW

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. A verdict was rendered against three parent chaperones. How was the third parent included in the case?
  • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services Political – Existing or potential government policies; and ways in which government does, or is likely to, impact on the business.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

What are three things that the government has implied it can do that aren’t specifically delegated powers in the Constitution?

What are three things that the government has implied it can do that aren’t specifically delegated powers in the Constitution?  Example: The government on various occasions has implied it can draft soldiers into the army as it has the delegated power of raising an army.  Discuss three more of these implied powers.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals What are three things that the government has implied it can do that aren’t specifically delegated powers in the Constitution?

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government.

Required Resources

Read/review the following resources for this activity:

Textbook: Chapter 6, 10

Magstadt, T. M. (2017). Understanding politics: Ideas, institutions, and issues. Australia: Cengage Learning.

Lesson

Instructions

Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government. Adolf Hitler is the most notorious tyrant. Using a totalitarian society from the past or present, discuss how the state and its leader attempt to impede citizens from exercising their rights. In your discussion, explain some components of an “ideal citizen,” consequences of voter apathy, and ways the state controls the citizen.

Writing Requirements (APA format)

Length: 1.5-2 pages (not including title page or references page)

1-inch margins

Double spaced

12-point Times New Roman font

Title page

References page (minimum of 2 scholarly sources)

Grading

This activity will be graded based on the essay rubric.

Course Outcomes (CO): 1

Due Date: By 11:59 p.m. MT on Sunday

Rubric

Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government

Week 5 Assignment: Essay – Ideal Citizen in a Totalitarian Government

Criteria  RatingsPts

This criterion is linked to a Learning Outcome Actual case study of a country.

20.0 pts

Uses a historical or contemporary example of a totalitarian country

16.0 pts

There is a totalitarian country, but it is not real.

12.0 pts

There is a country, but it is not totalitarian.

0.0 pts

There is no country mentioned.

20.0 pts

This criterion is linked to a Learning Outcome Control by a totalitarian leader

20.0 pts

Describes the three ways, violence, propaganda, and scapegoating, that leaders use to keep control in the country.

16.0 pts

Only two of the tactics of totalitarian leaders are described.

12.0 pts

Only one of the tactics of totalitarian leaders are described.

0.0 pts

How a totalitarian leaders keeps control is not addressed.

20.0 pts

This criterion is linked to a Learning Outcome Citizens in the country.

20.0 pts

States and describes two ways of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.

16.0 pts

States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Discusses voter apathy.

12.0 pts

States and describes one way of stopping a totalitarian regime by using political socialization, civil disobedience, resist propaganda. Does not discuss voter apathy.

0.0 pts

Does not address the concepts.

20.0 pts

This criterion is linked to a Learning Outcome Scholarly resources

10.0 pts

Uses both the book and, at least, one outside scholarly source.

8.0 pts

Uses only the book or a scholarly source.

6.0 pts

Uses only a scholarly source and the source is not scholarly.

0.0 pts

Does not use the book or scholarly source.

10.0 pts

This criterion is linked to a Learning Outcome APA

5.0 pts

All sources are properly cited and referenced according to APA standards.

4.0 pts

Sources are either properly cited or referenced, missing one of those elements.

3.0 pts

The citation and/or reference are incorrect.

0.0 pts

No APA format was used.

5.0 pts

This criterion is linked to a Learning Outcome Writing

5.0 pts

Presents information using clear and concise language in an organized manner (minimal errors in English grammar, spelling, syntax, and punctuation).

4.0 pts

Presents information using understandable language but is somewhat disorganized (some errors in English grammar, spelling, syntax, and punctuation).

3.0 pts

Presents information using understandable language but is very disorganized (many errors in English grammar, spelling, syntax, and punctuation).

0.0 pts

Presents information that is not clear, logical, professional or organized to the point that the reader has difficulty understanding the message (numerous errors in English grammar, spelling, syntax, and/or punctuation).

5.0 pts

Project 4: System Development or Application Assurance

Start Here

It is critical that cybersecurity professionals be able to use all applicable systems, tools, and concepts to minimize risks to an organization’s cyberspace and prevent cybersecurity incidents. In this project, you will demonstrate your understanding of how to apply security principles, methods, and tools within the software development life cycle. You will also apply your knowledge of the cybersecurity implications related to procurement and supply chain risk management.

This is the fourth and final project for this course. There are 13 steps in this project. Begin below to review your project scenario.

Transcript

Competencies

Your work will be evaluated using the competencies listed below.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Step 1: Assess Software Vulnerabilities

Project 2 outlined the steps involved to produce a final vulnerability and threat assessment, and Project 3 covered risk analysis and mitigation. Those assessments were across the entire enterprise and included numerous elements outside the realm of systems and technology. However, they did uncover opportunities for improvement in the application software processes.

For this step, return to the vulnerability and threat assessment from Project 2 and focus on all areas of application software that were itemized. Give additional thought to uncover software that perhaps did not make the list or were assumed to be secure and simply overlooked.

The assignment is to create a more comprehensive list of application software that could place the enterprise at risk of a breach, loss of data, loss of production, and/or loss of brand confidence.

The assessment should include the application of secure principles, development models such as the maturity model or integrated product and process development (IPPD), software development methods, libraries and toolsets used in the software development life cycle or systems development life cycle.

Use the Software Vulnerability Assessment Template to submit your results for feedback.

Submission for Project 4: Software Vulnerability Assessment

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will review your organization’s software procurement policy.  

Step 2: Review Software Procurement Policy

Upon completion of the software specific vulnerability assessment, conduct a review of the organization’s software procurement policies for software development methods.

Note that there is no submitted assignment for this step. Your review will be used in the submission for the following steps.

When the review is complete, move to the next step, where you will create a table or spreadsheet that lists recommended policies for software procurement that address certain questions or concerns.

Step 3: Create a Software Procurement Policy List

You’ve reviewed the organization’s policies for software development methods. Now it’s time to create a policy list for software procurement. The following are some sample questions to be included in a software procurement policy:

• Does the vendor provide any cybersecurity certifications with the product?

• Does the vendor provide access to the source code for the product? Are there other security issues in source code to be addressed?

• What is the guaranteed frequency of security updates to be provided for the product?

• What is the implementation process for software updates/upgrades?

What are additional questions or concerns that should be included in the procurement process? Create a table or spreadsheet that lists recommended policies to properly address these questions or concerns.

Use the Procurement Policy Template to list the cybersecurity implications related to procurement and supply chain risk management and submit your results for feedback.

Submission for Project 4: Procurement Policy List

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will generate assurances or controls to address each of the policy issues identified here.

Step 4: Document Relevant Software Acceptance Policies

Now that the procurement policies have been identified in the previous step, what assurances or controls should be established as policy that would evaluate the security implications during the software acceptance process? The objective is to provide a one-page overview of security testing that would be included in the acceptance of a vendor’s application.

The next step in this project will document the actual testing and validation. This step is simply to verify the congruence between the procurement process and acceptance process. In other words, do the procurement policies establish the correct cyber security framework for software purchase and do the acceptance policies match?

In considering the security implications of the in the software acceptance phase of the development cycle, use the Software Acceptance Policy Template to document recommended tests and assurances for the procurement policies identified in the previous steps.

Submit your results below for feedback.

Submission for Project 4: Software Acceptance Policy

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will research software testing and validation.

Step 5: Research Software Testing and Validation Procedures

Based on the software acceptance policies created in the previous step, consider what testing and validation procedures could be used to assure compliance.

Note that there is no submitted assignment for this step. You will submit the final list of recommended testing and validation procedures in the next step.

Step 6: Document Software Testing and Validation Procedures

You’ve completed the research, and it is now time to create testing and validation procedures that follow a specific process to assure compliance. The key to the success of this step is to document exact procedures to be followed by a testing team prior to installation.

At a minimum, the procedures should address the following questions:

• What are potential vulnerabilities inherent in the application platform?

• How well does the vendor document preventive measures built into the application?

• Are there alternative solutions provided by the vendor or in the application in case of a breach?

• What additional safeguards can be added to ensure the security of the software environment?

The testing and validation procedures should address each of these concerns.

The executive team will want to see specific steps for the testing team to follow as the team members complete the tests and assurances you recommended in the previous step.

Document your specific testing and validation recommendations from a cybersecurity policy standpoint in the Test Script Procedures Template and submit for feedback.

Submission for Project 4: Test Script Procedures

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consider procedures for upgrading software.

Step 7: Review Software Upgrade Procedures

In the last step, you documented testing and validation requirements. In this step, it’s important to review software upgrades. Installation of a software upgrade has similar, yet unique requirements from the previous steps. In most enterprise environments, software updates and upgrades follow a specific change management routine. However, complete reliance on this procedure can lead to unintended oversight of cybersecurity issues. The change management process is generally focused on detecting errors and the auditing and logging of changes in the operational environment after the upgrade has been performed.

From the cyber perspective, this is not enough. As demonstrated in previous steps, significant effort is required to ensure a secure environment, not just an operational one. The question to be answered is “when” should the upgrade be performed during an application or system change. Should it be performed multiple times during the update?

Think through this issue thoroughly and make notes on your thought process. It is important that the risk analysis associated with an application or system change is conducted at the optimal time.

Note that there is no submitted assignment for this step. However, the research and corresponding notes related to this step will be applicable to the final report for Maria and the other executives. When this is complete, move to the next step, where supply chain risks will be considered.

Step 8: Review Supply Chain Risks

Following the previous steps relative to the supply chain and previous projects, it is time to thoroughly review risk within the supply chain.

Like many companies, your organization is dependent on a supply chain, so the software development process must include a supply chain risk management (SCRM) plan to minimize the impact of supply chain-related risks on business operations and the security of the infrastructures and data.

Note that there is no submitted assignment for this step. The identified supply chain risks will be reported in the next step.

Step 9: Document Supply Chain Risks

After review, it’s time to document supply chain risks. This portion of the overall report requires a two- to three-page narrative that addresses the following supply chain concerns:

1. Describe cybersecurity implications related to the procurement process.

2. Provide recommendations that would address these concerns.

3. Include appropriate supply chain risk management practices.

Where appropriate, cite references to support the assertions in the recommendations and conclusion.

Submit your report on supply chain concerns here for feedback.

Submission for Project 4: Supply Chain Cyber Security Risk Report

Previous submissions

0

Drop files here, or click below.

Add Files

Then, move to the next step, in which you will consider how the procedures of acquisition, procurement, and outsourcing line up in the organization.

Step 10: Consider Alignment Issues

Based on the review and recommendations on the supply chain described in the previous step, consider how well the policies and procedures regarding the acquisition, procurement, and outsourcing of software in your organization are aligned.

Outline a strategic approach to getting all the functions in alignment. There is no submission for this step. The alignment recommendations will be submitted in the next step.

Step 11: Develop an Acquisition Alignment Report

Keeping the alignment issues in mind from the previous step, prepare a one-page plan to align acquisition, procurement, and outsourcing of software applications for the enterprise. This should be a strategic approach to getting all the functions in alignment. Start with a request for information, proceed through acquisition, testing, and implementation, and finish with ongoing maintenance of the application.

All the work has been done in the previous steps. This step is designed to “bring it all together” in one easy-to-understand approach. The approach will be used in the final step to complete the supply chain analysis with a mitigation plan as it applies to software acquisition and maintenance.

Submit your one-page plan to align acquisition, procurement, and outsourcing efforts with your organization’s information security goals here for feedback.

Submission for Project 4: Acquisition Alignment Report

Previous submissions

0

Drop files here, or click below.

Add Files

In the next step, you will consolidate all your work thus far.

Step 12: Consolidate Your Work

The acquisition plan alignment is complete. For this exercise, collate all the material presented in the previous steps into a cohesive presentation that describes the entire software risk analysis processes and articulates specific supply chain cybersecurity threats and the technologies and policies that can be used to mitigate them.

You will use your consolidated results in your final project submission in the next step.

Project 4: System Development or Application Assurance

Step 13: Write the Risk Analysis/Supply Chain Threats/Mitigation Report

Management is always interested in solutions, and Maria Sosa and the other executives at your company are no exception. In the case of cybersecurity, there are no absolute solutions to an ever-changing environment. However, there are steps to mitigation that might eliminate or minimize the results of certain vulnerabilities. This final step is to describe the mitigation strategies recommended as a result of all previous steps in the project.

The final report for the executive meeting should be five to seven pages, only one to two of which will have to be written in this step. The remainder is from all the previous steps in the project.

Use the Supply Chain Risk Mitigation Final Report Template to submit your specific testing and validation procedures.

Check Your Evaluation Criteria

Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.

• 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

• 1.5: Use sentence structure appropriate to the task, message and audience.

• 2.4: Consider and analyze information in context to the issue or problem.

• 9.4: Software Security Assurance: Demonstrate secure principles, methods, and tools used in the software development life cycle.

• 9.5: Software Security Assurance: Describe the cybersecurity implications related to procurement and supply chain risk management.

Submission for Project 4: Supply Chain Risk Mitigation Final Report

Previous submissions

0

Drop files here, or click below.

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals Aristotle defined tyranny as an illegitimate form of government by one individual that tightly controlled every part of life and government.

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Several years ago, working for the city government, we had a city manager who had little or no interest in employee morale

response to the below statement:

Several years ago, working for the city government, we had a city manager who had little or no interest in employee morale. He was only concerned about making the city council happy, to be reelected again and again. During this time, our division was off on Sundays. However, we rotated shifts and worked Monday through Saturday. Everyone worked a Saturday once every six weeks. This allowed employees time off with their families/ reset their batteries, and the city could still provide support for weekend activities. When the new city manager was appointed, we began to work 7 days a week, which meant our schedules were completely changed.

The decision negatively affected our morale, not to mention spending quality time with family. Code enforcement was now working 7 days a week, and our hours had also changed, making things worse. Employee morale dropped, a few staff members left to other cities, and I began to look for work elsewhere as well. Other things changed as well. For instance, the new city manager placed a hold on all promotions, salary increases and freeze employee evaluations. The purpose of this was to save money and meet the budget requirements. I can understand freezing salaries, promotions, but working on Sundays was the big take for me. After working there for several years, I left along with several people. My takeaway from this was, the city manager goofed things up and made bad decisions. Good decision-making is a vital part of good management because decisions determine how the organization solves problems, allocates resources, and accomplishes its goals, Daft (2013). He should have slowly and seamlessly asked employees that changes were on the way and that Sunday and Saturday coverage would be temporary until things simmer down, but instead, the change was all too fast for most folks. I think employees would have understood if he had worked with them and identified problems, but rather, he made nonprogram decisions. Non programmed decisions are made in response to unique situations, are poorly defined and largely unstructured, and have significant consequences for the organization, Daft (2013).

Reference

Daft, R. L. (2013). Management (11th ed.). Mason, OH: South-Western Cengage Learning. ISBN-13: 9781285068657

GET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

GET SOLUTION FOR THIS ASSIGNMENT

CLICK HERE TO MAKE YOUR ORDER

TO BE RE-WRITTEN FROM THE SCRATCH

NO PLAGIARISM

  • Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
  • Timely Deliveryprimewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
  • Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
  • Confidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.
  • Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
  • Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. Several years ago, working for the city government, we had a city manager who had little or no interest in employee morale

Get Professionally Written Papers From The Writing Experts 

Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

The Yourtown Government Building Office of Emergency Management and Homeland Security will use a three-phased approach to the activation

Time-Phased Implementation Assignment

The Yourtown Government Building Office of Emergency Management and Homeland Security will use a three-phased approach to the activation, management, and eventual deescalation of the COOP plan. (You will use the same incident/emergency you selected in Topic 3 for this assignment).

For this assignment use the Anytown example below to create a Time Phased Implementation chart for Yourtown, consistent with the type of information below.

You need to write 500-750 words in your final chart:

PhaseTime FrameActivity
Phase I- Activation and Relocation0-12 Hours· List who you would want to notify (likely alternate Anytown mayor/city manager/administrator/other VIP’s) of impending activation and relocation requirements. · List how you would best notify impacted Anytown, state, and or federal agencies (use any State and U.S. model). · Discuss how to activate plans to transfer to alternate facility within Anytown. · Instruct advance team(s) to ready alternate facility. · Notify likely Anytown employees and contractors regarding activation of COOP plan and their status. · Assemble a brief list of likely Anytown of documents/equipment required to be maintained for essential functions at alternate facility. · Order likely needed equipment/supplies as reflected by the emergency you selected in Topic 3. · List where you might transport vital documents and operate communications/dispatch. · Detail how you would secure original facility. · Describe how best to continue essential functions at the Anytown Gov’t Building, if available, until alternate facility is ready. · Answer where the operations and support teams would be coming from and how they would get there. · And, how best to activate operations and support teams as necessary.
Phase II- Alternate Facility/Work Site Operations12 Hours to Termination of Emergency· Provide guidance to Anytown contingency team personnel and information to the public. · Identify likely replacements for missing personnel (delegation of authority and orders of succession). · Explain how to commence full execution of operations supporting essential functions at the alternate facility.
Phase III- ReconstitutionTermination of Emergency· Explain how best to inform all personnel and residents that the threat no longer exists. · Explain how to supervise return to normal operations. · Describe who should conduct a review of COOP plan execution and effectivenessGET SOLUTION FOR THIS ASSIGNMENT, Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER TO BE RE-WRITTEN FROM THE SCRATCH GET SOLUTION FOR THIS ASSIGNMENT CLICK HERE TO MAKE YOUR ORDER TO BE RE-WRITTEN FROM THE SCRATCH NO PLAGIARISM Original and non-plagiarized custom papers- Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper. Timely Delivery- primewritersbay.com believes in beating the deadlines that our customers have imposed because we understand how important it is.Customer satisfaction- Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfiedConfidential- It’s secure to place an order at primewritersbay.com We won’t reveal your private information to anyone else.Writing services provided by experts- Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?Enjoy Please Note-You have come to the most reliable academic writing site that will sort all assignments that that you could be having. We write essays, research papers, term papers, research proposals. The Yourtown Government Building Office of Emergency Management and Homeland Security will use a three-phased approach to the activation

Get Professionally Written Papers From The Writing Experts   
Categories
Writers Solution

What type of document is the source (journal article, news article, government document, etc.), and how can you tell?

For this discussion topic, you will post four sources that you consider possible sources for your research project. At least two of these should be scholarly journal articles.

For each source, please post your answers to the following:

  1. Provide an APA-style reference citation for the source. Remember that you can use CiteFast if you wish.
  2. What type of document is the source (journal article, news article, government document, etc.), and how can you tell?
  3. When considering the usefulness of this source for your research project, what positive and/or negative features can you identify? Factors you may wish to consider include focus, credibility, detail, and audience.
  4. Optional question: Feel free to comment on what search strategies you employed to find your sources.

Guided response (by Sunday): 

Consider the sources posted by one of your peers. Would you consider all of the sources to be credible if you encountered them in a research paper? Would you give more weight to one over another? Why or why not?

00

Discussion 2: Making Choices About Commas

In this discussion, we will examine choices that we make about commas in our writing. 

Initial post

Post a paragraph from any writing you have done recently. Then identify one choice you made with regard to commas (either using a comma or not using a comma). Comment on the reasons for your choice. Are there other alternatives

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. bank robbery would be property theft of money
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays
Categories
Writers Solution

Describe who the suppliers and demanders are in the labor market. Is a government-mandated minimum wage a price floor or ceiling?

select only 1 of the following options and answer each of the questions related to that option. Your responses should be thorough and well supported. You are encouraged to use our textbook and the online book for this class, which is called Popular Economyths

A good, well-reasoned, detailed answer should be at least 1.5 to 2 pages (total) in length (and please do NOT rewrite the questions). You need to answer each of the questions for the option you select.

OPTION 1 – The Minimum Wage

Since 2009, the national minimum wage has been $7.25 per hour for most occupations in the private sector. Many of those who support an increase in the minimum wage believe this is one way the government could possibly reduce poverty, while its opponents believe that it creates unemployment and hurts low-skilled workers. The following items address the idea of raising the minimum wage from the current federal minimum of $7.25 per hour.

1) Describe who the suppliers and demanders are in the labor market. Is a government-mandated minimum wage a price floor or ceiling? Discuss the effect of a minimum wage law from a supply and demand standpoint, making sure to address the concept of surplus or shortage, and specify what that shortage or surplus is most commonly called in economic terms.

2) Raising the minimum wage will also affect the labor costs of businesses. What is going to happen to the prices these businesses charge for their products? And who is going to be most affected by these price changes, those with low incomes or those with high incomes? 

3) Discuss any potential changes in the incentives for low-skilled workers – those who keep their jobs and their hours – to increase their human capital when the minimum wage increases. What about those who lose their jobs or never get hired? Discuss the incentives for employers to substitute capital inputs (technology and automation) for labor.

4) What might be an unintended impact on government spending on entitlements such as welfare, food stamps, and unemployment compensation because of the changes in the minimum wage and its impact on unemployment and underemployment?

5) Do advocates of a minimum wage law believe that workers should be paid based on their output (i.e., performance) or on their level of need? What do opponents of the minimum wage law believe workers’ wages should be based on? Which one is sustainable and why? 

For the sake of comparison, how should students be graded in class, based on their performance or level of need?

6) Advocates of a minimum wage often believe that employers would “exploit” or “take advantage” of their workers if there were no minimum wage. How would you know if employers are “taking advantage” of their workers if there were no minimum wage? What simple thing could the employee do if they believed they were being exploited?

7) What percentage of American workers get paid above minimum wage? In general, why do such workers get paid more than the government-mandated minimum wage if employers are supposedly so greedy? 

8) Compare and contrast some of the information contained in the three videos:

Obama: “Raise Minimum Wage to $9 an Hour” – SOTU 2013 

How the Minimum Wage Creates Unemployment – Note: this video uses an example of a $5 minimum wage as an illustration only. The same exact point could be made with a minimum wage of $7.25, $9, $12.37, or any other amount, so please do not get hung up on the $5 amount. The point is whether or not the government ought to dictate the wages of a private transaction between a willing employee and employer.

We the Internet TV: Pledge for $15

Describe the main points of each video. Which one or two videos do you agree with more from an economic perspective and why? Be specific!

9) Based on your previous responses, do you believe that the minimum wage should be raised, lowered, remain as it currently is, or be altogether eliminated? If you think there should be a minimum wage, how would you arrive at the specific wage? You need to give a thorough reason for your answer. Who should get to decide how much a worker gets paid, the worker and their employer or a politician? WHY?

OPTION 2 – Taxes

It has been said that nothing in life is guaranteed except for death and taxes. The next questions ask about the three tax structures as well as rate rates.

1) A lot of students say that some people pay “more (or less) in taxes” than others, but they often confuse tax rates (percentages) with the amount of tax paid (in dollars). Be sure to answer questions in this option with references to the differences between taxes paid in dollars versus percentages.

Please state whether you prefer a progressive, regressive, or flat (proportional) tax system and WHY. Is your preference more in accordance with the concept of equality of opportunity (which is equal treatment) or equality of outcome (which is unequal treatment)? BE SPECIFIC. Which tax system incentivizes taxpayers to earn more money and which structure disincentivizes taxpayers to work harder and earn more money. 

2) Please write about marginal tax rates and whether you believe they need to be changed in general. More specifically,

A) If you believe in a flat tax rate system, should income tax rates be raised or lowered? 

B) If, however, you think a progressive tax rate is best: 

i) should taxes on low-income earners be raised or lowered?

ii) should taxes on average-income earners be raised or lowered?

iii) should taxes on high-income earners be raised or lowered?

C) If, however, you think a regressive tax rate is best: 

i) should taxes on low-income earners be raised or lowered?

ii) should taxes on average-income earners be raised or lowered?

iii) should taxes on high-income earners be raised or lowered?

Regardless of which you chose (A, B, or C) be sure to give your reasons WHY you feel the way that you do.

3) Please explain HOW the tax rate changes (the increase or decrease you advocated for in Questions #2 above) will affect each of the following:

a)  economic growth: job creation, investment, incentives to work more, and tax avoidance

b)  the budget: the difference between tax revenue and government spending

   c) economic “fairness” 

Your answer needs to have a discussion related to the Laffer Curve, especially with respect to the budget (and to government revenue in particular). In addition, please give your definition of economic “fairness” and WHY you believe that. 

4) Please watch the following two videos:

Robert Reich: Why Taxes Have to be Raised on the Rich

Is America’s Tax System Fair?

Describe the main points of each video in detail. Which video do you agree with more? Please describe WHY. Which video recommends treating people equally and which one does not? 

5) Please read the following articles:

What You Don’t Know About the Top One Percent

Tax Foundation: Latest Federal Income Tax Data

Describe the main points of each article in detail.

Based upon the two articles: By income percentile group, who doesn’t pay their “fair share” of taxes and who pays more than their “fair share” in your opinion? How do you arrive at that opinion?

  • GET SOLUTION FOR THIS ASSIGNMENT

    CLICK HERE TO MAKE YOUR ORDER

    TO BE RE-WRITTEN FROM THE SCRATCH

    NO PLAGIARISM

    • Original and non-plagiarized custom papers. Our writers develop their writing from scratch unless you request them to rewrite, edit or proofread your paper.
    • Timely Delivery. capitalessaywriting.com believes in beating the deadlines that our customers have imposed because we understand how important it is.
    • Customer satisfaction. Customer satisfaction. We have an outstanding customer care team that is always ready and willing to listen to you, collect your instructions and make sure that your custom writing needs are satisfied
    • Privacy and safety. It’s secure to place an order at capitalessaywriting.com We won’t reveal your private information to anyone else.
    • Writing services provided by experts. Looking for expert essay writers, thesis and dissertation writers, personal statement writers, or writers to provide any other kind of custom writing service?
    • Enjoy our bonus services. You can make a free inquiry before placing and your order and paying this way, you know just how much you will pay. suppliers and demanders are in the labor market
    • Premium papers. We provide the highest quality papers in the writing industry. Our company only employs specialized professional writers who take pride in satisfying the needs of our huge client base by offering them premium writing services.

    Get Professionally Written Papers From The Writing Experts 

    Green Order Now Button PNG Image | Transparent PNG Free Download on SeekPNG Our Zero Plagiarism Policy | New Essays