Wednesday, May 6, 2020

Good And Bad Effects Of Computer Essay Example For Students

Good And Bad Effects Of Computer Essay Software Licensing And PiracyAuthor: Kelly SommerfeldEmail: emailprotected In 1993 worldwide illegal copying of domestic and international software cost $12.5 billion to the software industry, with a loss of $2.2 billion in the United States alone. Estimates show that over 40 percent of U.S. software company revenues are generated overseas, yet nearly 85 percent of the software industrys piracy losses occurred outside of the United States borders. The Software Publishers Association indicated that approximately 35 percent of the business software in the United States was obtained illegally, which 30 percent of the piracy occurs in corporate settings. In a corporate setting or business, every computer must have its own set of original software and the appropriate number of manuals. It is illegal for a corporation or business to purchase a single set of original software and then load that software onto more than one computer, or lend, copy or distribute software for any reason without the prior written consent of the software manufacturer. Many software managers are concerned with the legal compliance, along with asset management and costs at their organizations. Many firms involve their legal departments and human resources in regards to software distribution and licensing. Information can qualify to be property in two ways; patent law and copyright laws which are creations of federal statutes, pursuant to Constitutional grant of legislative authority. In order for the government to prosecute the unauthorized copying of computerized information as theft, it must first rely on other theories of information-as-property. Trade secret laws are created by state law, and most jurisdictions have laws that criminalize the violations of a trade-secret holders rights in the secret. The definition of a trade secret varies somewhat from state to state, but commonly have the same elements. For example, AThe information must be secret, Anot of public knowledge or of general knowledge in the trade or business, a court will allow a trade secret to be used by someone who discovered or developed the trade secret independently or if the holder does not take adequate precautions to protect the secret. In 1964 the United States Copyright Office began to register software as a form of literary expression. The office based its decision on White-Smith Music Co. v. Apollo , where the Supreme Court determined that a piano roll used in a player piano did not infringe upon copyrighted music because the roll was part of a mechanical device. Since a computer program is textual, like a book, yet also mechanical, like the piano roll in White-Smith, the Copyright Office granted copyright protection under the rule of doubt. In 1974, Congress created the Natural Commission on New Technological Uses (CONTU) to investigate whether the evolving computer technology field outpaced the existing copyright laws and also to determine the extent of copyright protection for computer programs. CONTU concluded that while copyright protection should extend beyond the literal source code of a computer program, evolving case law should determine the extent of protection. The commission also felt copyright was the best alternative among existing intellectual property protective mechanisms, and CONTU rejected trade secret and patents as viable protective mechanisms. The CONTU report resulted in the 1980 Computer Software Act, and the report acts as informal legislative history to aid the courts in interpreting the Act. In 1980 The Copyright Act was amended to explicitly include computer programs. Title 17 to the United States Code states that it is illegal to make or to distribute copies of copyrighted material without authorization, except for the users right to make a single backup copy for archival purposes. Any written material (including computer programs) fixed in a tangible form (written somewhere i.e. printout) is considered copyrighted without any additional action on the part of the author. Therefore, it is not necessary that a copy of the software program be deposited with the Copyright Office in Washington, D.C. for the program to be protected as copyrighted. With that in mind then a copyright is a property right only. In order to prevent anyone from selling your software programs, you must ask a court (federal) to stop that person by an injunction and to give you damages for the injury they have done to you by selling the program. The Software Rental Amendments Act Public Law 101-650) was approved by Congress in 1990, this Act prohibits the commercial rental, leasing or lending of software without the express written permission of the copyright holder. An amendment to Title 18 to the United States Code was passed by Congress in 1992. This amendment. Known as Public Law 102-561 made software piracy a federal offense, and instituted criminal penalties for copyright infringement of software. The penalties can include imprisonment of up to five years, fines up to $250,000 or both for unauthorized reproduction or distribution of 10 or more copies of software with a total retail value exceeding $2,500 or more. Under United States law duplicating software for profit, making multiple copies for use by different users within an organization, and giving an unauthorized copy to someone else is prohibited. Under this law if anyone is caught with the pirated software, an individual or the individuals company can be tried under both civil and criminal law. A Civil action may be established for injunction, actual damages (which includes the infringer=s profits) or statutory damages up to $100,000 per infringement. The criminal penalties for copyright infringement can result in fines up to $250,000 and a jail term up to five years for the first offense and ten years for a second offense or both. When software is counterfeit or copied, the software developer loses their revenue and the whole software industry feels the effect of piracy. All software developers spend a lot of time and money in developing software for public use. A portion of every dollar spent in purchasing original software is funneled back into research and development of new software. Software piracy can be found in three forms: software counterfeiting, which is the illegal duplication and sale of copyrighted software in a form that is designed to make it appear to be a legitimate program; Hard disk loading, whereby computer dealers l oad unauthorized copies of software onto the hard disks of personal computers, which acts as an incentive for the end user to buy the hardware from that particular dealer; and downloading of copyrighted software to users connected by modem to electronic bulletin boards and/or the Internet. When software is pirated the consumer pays for that cost by new software and/or upgrade version being very expensive. Federal appellate courts in the U.S. have determined that operating systems, object code and software cotained in ROMs are protected by copyright, and some lower federal courts have also determined that microcode (the instructions set on microprocessor chips), and the look and feel of computer screens is subject to copyright protection. Which leads to the problems of the widespread development of multimedia applications that has brought out major problems in clearing copyright for small elements of text, images, video and sound. The United States Government has been an active participant in protecting the rights of the software industry. When the Business Software Alliance (BSA) conducts a raid, Federal Marshals or local law enforcement officials participate also. An organization known as the Software Publishers Association (SPA) is the principal trade association of the PC software industry. SPA works closely with the FBI and has also an written enforcement manual for the FBI to help them investigate pirate bulletin board systems and organizations (audits). With the help of the FBI, the result of enforcement actions resulted in recoveries from anti-piracy actions totaling $16 million since the program started in 1990. Nicholas Ferrar Essay2. Implement a software codes of ethics for everyone to adhere to. The ethics should state that copyrighted software, except for backup and archival purposes, is a violation of the law. 3. Establish a procedure for acquiring and registering software. Determine your companies software needs, evaluate software packages, and also have supervisors approve the plans. Keep the lines of communication open. 4. Establish and maintain a software log. The log should state the date of when the software was acquired, the registration of it, serial number, network version, location of where the software is in use, where the original is, licensing agreement and the location of the original disks. 5. Conduct periodic audits or on a as needed basis comparing the software log and/or other purchase records. 6. Establish a program to educate and train your employees about every aspect of software and its uses. 7. Maintain a library of software licenses and provide users with copies of the agreement. 8. Having done the above seven points, the company can benefit by having obtained software legally, receive full documentation, technical support when needed and also upgrade notices. Patents do not cover specific systems, instead they cover particular techniques that can be used to build systems or particular features that systems can offer. Patent grants the inventor a 17 year monopoly on its use. Once a technique or feature is patented, it may not be used in a system without the permission of the patent-holder even if it is implemented in a different way. Since a computer program usually uses several techniques and provides many features, it can infringe many patents at once. A computer program is built out of ideal mathematical objects whose behavior is defined, not modeled approximately, by abstract rules. An example of this is Borland International, Inc. complained in the 1st Federal District Court gave Lotus Development Corp. the benefit of patent protection to Lotus 1-2-3 menu commands and their order, but failed to require Lotus to meet the requirements of patent law, including novelty, examination and contribution to the prior art. The Supreme Court sid ed with the 1st Circuit decision that one entity cannot own the user interface to programs. Meaning such as file formats, menu structures and programming languages. Software license agreements emerged as the most popular means of protection of proprietary rights in computer software. They coexist with other forms of intellectual property rights as patent and copyright. Software license agreements serve several functions in transactions involving the transfer of computer technology. One of the most important legal functions is the protection of the proprietary rights of the licenser in the transferred software. Other functions include controlling the revenue generated by licensed software and determining the rights and responsibilities of the parties regarding the performance of the licensed technology. Issue related to these functions include the applicability of Article 2 of the Uniform Commercial Code, including offer and disclaimer of warranties, determining the appropriate types of licenses to utilize, such as single users/CPU licenses, Site/enterprise licenses and network/concurrent licenses. Trade secret, copyright and patent law are email protected forms of protection in the sense that they may exist independently of any underlying business transactions and do not necessarily require any transfer of intellectual property from one party to another. Whereas, the need for a license agreement usually arises as one of the contractual forms of protection when the underlying business transaction involves the transfer of intellectual property, such as computer software. Transactions involving the transfer of computer software are subject to both federal and state laws. Generally, state law governs contractual and trade secrets aspects of the transaction, while federal law governs aspects related to patent, copyright and antitrust issues. Each state has its own version of a doctrine of a trade secret, the common thread through these state-specific laws is that if you show that you are seriously treated information as confidential and that the confidential information helped your competitive position, you can stop others from using it if the information was improperly acquired by them, and even collect damages from the wrongdoers. A computer is useless without software. The two types of software typically found on a computer are operating systems software and application software. Operating system software provides interface that makes it easier to develop programs for the system by reducing the amount of code that must be written. The operating system acts as an interface between the computer hardware, application programs and the end user. Application software consists of one or more computer program that fulfill a specific function for the user like word processing, bookkeeping or financial analysis. Two legal cases recently within the last few years has brought to light the controversy regarding the copyright protection of software elements. Until 1992, most of the federal courts followed the decision in Whenlan v Jaslow Dental Laboratory as a precedent of similar cases. Whenlan, a small software company wrote a accounting program for Jaslow Dental Laboratory company. Jaslow rewrote the software to run on personal computers and proceeded to sell the product. The software was identical to Whenlans in the data structures, logic, and the program structure, except for the source code. Jaslow argued that the duplicated elements were part by the of the idea not the expression. The court in response felt that the data structures, logic, and the program structure comprised to make a single function of a computer program, therefore copyright protection should be given to those elements also. In 1992, this protection was weakened by Computer Associates v. Altai, Inc. , when Altai a software developer was accused of copying various modules of a software package developed by Computer Associates which controlled the running of applications on IBM mainframes. The court rejected Whelan=s premise that a computer program embodies one function because programs are made up of sub-routines that contain their own idea. The court recognized this would narrow the scope of software copyright protection and found this in accordance with Congressional intent of computer programs with copyright. This resulted in why currently software copyright is not as broad as it once was. Bibliography:Brandel, William, Licensing stymies users,URL: , Viman Software, Inc., 2002. Business Software Alliance, Software Piracy and the Law,URL:http://www.bsa.org/bsa/docs/soft_pl.html, Business Software Alliance, 2002. Software Publishers Association, SPA Anti-Piracy Backgrounder,URL:http://www.spa.org/, Software Publishers Association, 2002.

The Traditional Economic Theory of The Firm

Question: Discuss about The Traditional Economic Theory of The Firm. Answer: Introduction: According to the Traditional economic theory, the objective the raison dentre of the firm is to maximize profits. The statement implies that a firm enters into the market, whether there is free entry or not, to maximize its own profit. Profit maximization is the process, long run or short run determining the optimum level of output and price returning the highest possible profit to the firm. Along with many approaches in traditional economic theory, the total revenue and total cost approach that relies on the truth that profit is equal to revenue minus cost (Varian 2014). In addition, it focuses on the difference along with the marginal revenue-marginal cost aspect because total profit is reached at the maximum point when the marginal revenue equals the marginal cost. Different market structures: Mainly there are four kinds of market structure prevails in an economy, namely- (i) Perfect Competition, (ii) Pure monopoly, (iii) Monopolistic competition and (iv) Oligopoly. Firstly, in the perfectly competitive market, where the firms exhibit specific criterion such as, selling identical products, price taking specification, having small market share, having complete information about the goods and services that are sold with free entry and exit (Kirzner 2015). In perfect competition, profit is maximized when the price equals marginal revenue of the firm (Fussand McFadden2014). In the monopoly, the profit maximization condition is when the price and marginal revenue equals the marginal cost i.e. MR=MC. The diagram below shows the price Pe is the price of the firm receives for every unit sold which is Average Revenue of the market and Ce being the Average cost of each unit. The diagram shows supernormal profit in monopoly, which is the sustainable long run profit for the market structure. Figure 1: monopoly long run profit For monopolistic competition, the companys demand curve should end up being tangent to the average total cost curve to yield zero profit. This is the long run condition for monopolistically competitive market. Figure 2: Monopolistic competition long run profit In the oligopoly, the market structure is different. The kinked demand curve yielding long run profit is given the in diagram below. Figure 3: oligopoly long run profit Uncertainty: The aspect of uncertainty is discussed with respect to the long-run profit maximization of a firm when it commits production before the price is set. The increase in demand uncertainty does not affect the equilibrium number or size of the firms if the firm is risk neutral. If the firm is risk averse, there will be a reduction in the equilibrium number of firms with an ambiguous effect on the sizes. In the equilibrium, if the firm is risk neutral, it operates at the capacity. Nevertheless, if the firm is risk averse, there will be excess capacity prevailing in the economy (Fudenbergand Tirole2013). The problem of uncertainty affects the long run profits of the firm if it is risk averse. In long term, the firm is affected by the price as the price level is always unpredictable. So whatever be the market structure, the risk averse firm will avoid investing in any kind of productions which will lead to a proper loss for the firm. The situation is quite different in case of the risk lovin g firms as they invest whatever be the future predicted price level. "Principal-Agent" Problem: The principal agent problem is the situation when one party or agent agrees for working in favor of another party, who is the principal, by responding to some incentives. As people directly respond to incentives, the situation yields huge costs for the agents, causing a moral hazard (Okuguchiand Szidarovszky2012). The principal agent problem includes everything from incentives regarding financial forms for avoidance of asymmetric information. The Principal-agent problem, also known as agency dilemma, happens in a situation while a person who is the agent is able making decisions on behalf of any other person or entity who is the principal. The dilemma persists, as the agent at times, gets motivated acting in his best level rather than that of the principal. This relationship of principal-agent is a proper useful tool to analyze the conditions regarding economics and political science. A very common example can be drawn as the relationship between corporate management (agent) and the shareholders (principal). The problem may arise in a greater manner when the two parties face information asymmetry. This is a situation when the principal is not able to ensure directly that the agents activity is at the principals highest level of interest. Here the problems of conflict of interest and Moral Haza rd arise. The problem of moral hazard is the situation when one agent gets involved in any uncertain activity knowing about its protection against risk and the other party incurs the cost. In addition, the principal can be very much concerned about the exploitation possibility by the agent as he decides not to enter into the transaction of the both involved parties. This deviation from the interest of principal by the agent is named as agency costs (Sng2014). Alternative theories: Sales Maximization Theory (William Baumol): The theory by Professor William Baumol on the Theory of Oligopoly incorporated a managerial theory of the company based on the maximization of the sales. The theory exhibits the following assumptions: The firm has a single period horizon, aiming at maximizing the sales revenue in long run subjected to the profit. The firm's minimum level of profit is set competitively on the current value of market shares The oligopolistic firm has a U-shaped cost curve and downward sloping demand curve with conventional total cost and total revenue curve. The Baumols findings regarding the oligopoly firms reveal that they consider the sales maximization objectives. According to the economist, with the ownership separation and modem corporation control, managers seeking prestige and higher salaries to try expanding sales of the company even at the profit expenses (Baumoland Blinder2015). The firm needs to exhibit minimum profits for financing the future expenditures. Minimum profits serve as the constraint on maximizing revenue. According to Baumol, revenue will be maximized only at an output when the demand is unit elastic. Therefore it differs from the traditional economic theory which talks about the invisible hand in market force and automation on equilibrating the optimums. Management Utility Maximization Theory (O.E. Williamson): According to Williamson's utility maximization theory againost the profit maximization, also known as "managerial discretion theory," the managers and shareholders are two separate groups. The shareholders want to maximize the return on the investment as well as maximizing the profits. On the other hand, the managers are interested not only in their own fees but also in their staffs size and the expenses on them. Thus, the theory of Williamson relates to the maximization of the utility of the manager that is the function of staff expenditures and fees and discretionary funds (Sng2014). The assumptions of the model focus on: (i) imperfect competition in the markets, (ii) Divorce of management and ownership, (iii) minimum level of profit constraint existing for the company being able to pay dividends to the shareholders. The model differs from the traditional theory by the means of imperfectly competitive structure with the profit constraints. Satisfying Behavior (Simons): According to Simon's theory, he compared the organizational behavior with the individual behavior. He proposed that as an individual, a firm aspires leveling to keep up with the needs and driving to achieve its goals. The firm has an aspiration for achieving a certain level of profits. The level of aspiration is based on the different goals and aims regarding production, prices, sales, profits, etc. (Varian2014). In the given situation, the firm faces three alternative situations as follows: Firstly, the real achievement is lesser than the level of aspiration, when there is a big lag due to possible fluctuations in economic activities of the firm. Secondly, the achievement is greater than the level of achievement when the firm is quite satisfied with the performance. Thirdly, the achievement equates the level of aspiration when the outcome is also satisfactory. The theory differs from the traditional one in terms of targeting the profit level that the firm has an aspiration to reaching. The major objective is different and not reconcilable. Conclusion: The article critically analyzes the statement that is mentioned- The traditional theory of the firm has long outlived its usefulness in explaining the raison d'entre of business organizations." The theories discussed the important factors affecting the firm's profit maximization conditions. The Simon's model is superior to the model by Williamson as it talks about individualism. On the other hand, in Williamsons model, the managers are concerned with the utility maximization aspect. The Baumols model gives ambiguous ideas into this critical evaluation. References: Baumol, W. and Blinder, A., 2015.Microeconomics: Principles and Policy. Cengage Learning. Fudenberg, D. and Tirole, J., 2013.Dynamic models of oligopoly.Taylor Francis. Fuss, M. and McFadden, D. eds., 2014.Production Economics: A Dual Approach to Theory and Applications: Applications of the Theory of Production(Vol. 2). Elsevier. Kirzner, I.M., 2015.Competition and entrepreneurship.University of Chicago press. McChesney, F.S., Reksulak, M. and Shughart, W.F., 2015.Competition Policy in Public Choice Perspective(Vol. 1, pp. 147-171).The Oxford Handbook of International Antitrust Economics. Okuguchi, K. and Szidarovszky, F., 2012.The theory of oligopoly with multi-product firms.Springer Science Business Media. Sng, T.H., 2014. Size and dynastic decline: The principal-agent problem in late imperial China, 17001850.Explorations in Economic History,54, pp.107-127. Varian, H.R., 2014.Intermediate Microeconomics: A Modern Approach: Ninth International Student Edition. WW Norton Company.

Thursday, April 23, 2020

The ethical dilemma of the Indian barial contovers Essay Example For Students

The ethical dilemma of the Indian barial contovers Essay y Grave desecration has been experiences in the United States for nearly two hundred tears without respect to Native Indians first amendment rights to freedom of religion. Indian spirituality is not free from ecology, they are part of the same system of the beliefs for Indians, and their spiritual beliefs are a significant part of their culture. Their beliefs operate in the present applying through space, to all people. Their views are global and everyone is perceived to live within these beliefs. Part of the spiritual/ecological process is confirmed within the role of their ancestors and traditions are held within these beliefs. We will write a custom essay on The ethical dilemma of the Indian barial contovers specifically for you for only $16.38 $13.9/page Order now American archeologists fell obligated to tell the story of pre-historic American peoples. Using scientific methods they trace through time within the study of ancient burials. They can accumulate data as to disease patterns, diet, environment, cultural, demographics and population changes. The continued uses of skeletal remains are detrimental to them, as research methods are updated and fields of interest evolve. Without hard resources, their work may come into question because they will have no original data source to state their claims of science and their research may come into question. Looking at science (archeology) as a belief system, they too are entitled to their first amendment right. Since prehistoric times, Native Americans have kept their stories alive without the written record but rather through oral tradition. Stories are handed down to generation after generation, and their ancestors buried are mistaken, by archeologists, as prehistoric peoples that have hidden secrets. Come of the natives do not see the benefit that archeology provides, because they are already aware of the cultural details that are unveiled through desecration. Since Indian values conflict with archeology, very few Indian students pursue it as a potential profession; while the archeologist view their research as beneficial to both traditions. Archeologists value what is a basic human right to the Indians established religious beliefs and practices regarding the dead. The gap between them needs to be bridged in order to resolve this on going dispute. One example between them is the Navajo Nation Archeological Department (NNAD). The NNADs long-term objective is to train Navajos as archeologists and eliminate any non-Indians from the program, But does this lead to conflict of interest set by the traditional belief system of the Navajo? With any sort of compromise, both traditions may find a deeper understanding of American prehistory. Our understanding may become richer when archeological method works with traditional Native perspective to tell us this ongoing story that we are all a part of. Euro-Americans have been the dominant society for a long time. The Indian dead has been looted and put to the test, while their oral traditions have been discredited through archeology. This ethical dilemma is viewed as non-renewable archeological resources, while denying equal protection under the law. Archeologists may benefit from the reburial actions of cultural presentation by bring the motion to their static view, while Indians may also find traditions that were left untold. Can there be a successful bridge to fill the gaps of both traditions order to preserve history and respect ancestors? Bibliography: .

Tuesday, March 17, 2020

Young Versus Old Essays - Ageing, Old Age, Rudeness, Retirement

Young Versus Old Essays - Ageing, Old Age, Rudeness, Retirement Young Versus Old In my community I have two groups of people that just don?t seem to get along. One group is the younger people of the area, and the other group is the older senior citizens that live in the community. The older people have complained that the younger people are irresponsible, destructive and rude. The younger people of the area have protested the construction of a retirement home in the community, saying that the older people are boring, old fashioned and complain too much. I feel that bringing these two groups together and making them see the things they share in common will be rather easy to accomplish. Much of the prejudice that the two groups have against each other is based on rumors or something only one member of that group has done. The older people see a couple of younger people riding their skate boards on their street and they assume that all young people are going to take over their streets with skate board riding. The younger crowd may see some senior citizens complaining of service at a restaurant and assume that all older people are picky and rude. The prejudices are of course wrong, the solution is to show the two groups the positive aspects of the other group. For the younger crowd I would set up a community service through the school to visit retirement homes and help the elderly with chores and other odd jobs. These could be set up through the Honor Society at the school, and the Student Council. These two groups could say that they would have to do some many hours of service to earn credits. This could also be provided to the students who are being punished. Instead of staying after school for 2 hours detention, they could just visit the retirement home or some other elderly related activity. During these activities the young people would realize that not all elderly citizens are picky and rude, that some of them are actually fun to be around. And this would also be beneficial to the older crowd, as they would see the good that the young people can do. Both groups would benefit from this. Another possible thing to do with these two groups would to just have big community events that both of the groups would attend. That way these groups would be spending more time together and therefor realize the benefits of having senior citizens in the area and the likewise benefit of having younger people in the area. The key is to make both groups realize that the other group isn?t really like what they thought. Learning and being open-minded is an essential

Sunday, March 1, 2020

How to Use the Perl Array join() Function

How to Use the Perl Array join() Function The Perl programming language  join() function is used to connect all the elements of a specific list or array into a single string using a specified joining expression. The list is concatenated into one string with the specified joining element contained between each item. The syntax for the join() function is: join EXPR, LIST. Join() Function at Work In the following example code, EXPR uses three different values.  In one, it is a hyphen. In one, it is nothing, and in one, it is a comma and a space. #!/usr/bin/perl$string join( -, red, green, blue );printJoined String is $string\n;$string join( , red,  green,  blue  ); printJoined String is $string\n;$string  Ã‚  join(  , ,  red,  green,  blue  );printJoined String is $string\n; When the code is executed, it returns the following: Joined String is red-green-blueJoined String is redgreenblueJoined String is red, green, blue The EXPR is only placed between pairs of elements in LIST. It is not placed before the first element or after the last element in the string.   About Perl Perl,  which is an interpreted programming language, not a compiled language, was a mature programming language long before the web, but it became popular with website developers because most of the content on the web happens with text, and Perl is designed for text processing. Also, Perl is friendly and offers more than one way to do most things with the language.

Thursday, February 13, 2020

Political Corruption in Bulgaria after 1989 Essay

Political Corruption in Bulgaria after 1989 - Essay Example Though showing some improvement in the recent years, Bulgaria holds the shame of being labeled as the corruption capital of Europe. It is the corruption at the political level that is most dangerous in the country. All political parties operate with an open funding system. Such a condition, with no obvious management, surely encourages corruption. However, some facts and figures will show the 'politics' behind Bulgaria's corruption. In an attempt to modernize the nation's economy, the communist government enforced different industrialization programs. Until democratizing reforms began in 1989, Bulgaria remained a communist country. The Bulgarian nationalism underwent a drastic change since its first multi party elections in 1990 (U.S.-Bulgarian Relations, 2008). But the transition from the communist rule to a free market economy was not easy. The introduction of Banking reforms, and program to privatize state-owned assets turned out to be challenging issues. Due to the fall of communism, the country lost all its Soviet market. The Bulgarian goods could not find a good market. It led to a substantial contraction of the financial system. The rising inflation and unemployment became major problems. To add oil to the fire, the Bulgarian government had to battle with the uncontrolled corruption at all levels of administration. In the last two decades, Bulgaria underwent complet... In the last two decades, Bulgaria underwent complete political transformation. It is imperative to say that the political transformation has contributed much to the restructuring of the nation's entire mechanisms. On the other hand, how effective those reorganizations, is a question of active debate. However, it could enjoy steady economic growth and macroeconomic stability, problems are too many. It struggles hard to come up as a democratic power. Unfortunately corruption has become a key word in any study of Bulgaria. The National Assembly, which is supposed to monitor all anti corruption mechanisms, proved to be ineffective. Corruption is among the five most important problems Bulgaria is facing today. Five most critical problems Bulgaria is facing Unemployment 58,40 % Low incomes 51,30 % Crime 45,40 % Corruption 38,50 % Poverty 31,60 % High prices 22,90 % Political instability 17,70 % Healthcare 11,50 % Pollution 3,60 % Education 2,70 % Ethnic problems 2,10 % The sum of percentages exceeds 100, as respondents have given up to three answers (Source: Five most critical problems Bulgaria is facing, http://www.online.bg/coalition2000/eng/ci-feb99/2.htm) This social evil happened to spread widely in various fields of Bulgarian public life. Corruption has developed as a key principle in many fields like administration and judiciary. Political party finance, public administration and judiciary are the most affected areas. The Bulgarian community has begun to understand the magnitude of corruption of ministers and senior officials. Due to corrupt bureaucracy, any official procedure has become a 'hard nut' for the common man. He has to pay a huge amount to the police, health

Saturday, February 1, 2020

Criminology in the Future Essay Example | Topics and Well Written Essays - 500 words

Criminology in the Future - Essay Example As criminals become more sophisticated in their use of technology, forms of crime committed by them also become increasingly complex and difficult to understand and manage. Thus police and security officials must stay current in their knowledge and understanding of emerging crime, and both well resourced and expert regarding their own technological capabilities (p.36). Schmalleger (2012, Chapter 13) considered technology to be one of the causes of new forms of crime, since it facilitates new forms of criminal behavior. In his Chapter 13, Schmalleger (2012) named several types of cybercrimes, including crimes requiring use of modern technology, such as identity theft. All of these types of crimes arose out of technological innovations. However, criminal justice system has been revolutionized too since the 1970’s, all due to new technologies (Peterson & Leggett, 2007, p.621). Modern technology has revolutionized the criminal justice system. DNA testing by forensic biologists has become crucial in many capital offenses, as it exonerated many innocent defendants and eliminated blind faith in the criminal justice system (Petherick, Turvey & Ferguson, 2010, p.309). In 1990, the Combined DNA Index System (CODIS) was established in order to gather DNA of all convicted felons (Peterson & Leggett, 2007, p.635 - 636). Use of computers has been crucial in fighting crime as well. In the 1980’s, first computerized databases of forensic evidence were established (Peterson & Leggett, 2007, p.630). Database forensics evolved, and soon became crucial in fighting cybercrimes (Khanuja & Adane, 2011, p.170). More subfields evolved. Forensic toxicology enables testing of drugs and other chemical compounds found on the crime scene (Petherick, Turvey & Ferguson, 2010, p.432). Other forensic scientists conduct fire debris analysis, which is again a chemical compound analysis (Petherick, Turvey & Ferguson, 2010, p.434). Trace evidence analysis