In: Economics
In: Finance
3) On July 15th, 2013, $800 was invested in an account paying 10% compounded semiannually. Then on July 15, 2017 the money was reinvested in an account paying 8% compounded daily. Determine the balance on October 20, 2017 using the Banker's Rule.
In: Finance
*NOTE: I don't really know what subject this would be considered. It's from my business law class.
Outsourcing specialized operational tasks has become a common practice. When outsourcing involves the transfer of personal information, issues of security and privacy are raised. Customers may consent to the collection of personal data without realizing that their information could be shared with another company located halfway around the world and subject to different disclosure and protection rules. In recognition of international privacy concerns, the Organization for Economic Co-operation and Development (OECD) created guidelines to enhance privacy protection during trans-border data exchanges. Guideline 10 suggests that personal data should not be used or disclosed without the consent of the owner or authority of law.
Canadian outsourcing to the United States has become even more controversial since the enactment of the USA PATRIOT Act.15 This legislation allows US law-enforcement officials to obtain personal records or information from any source in the country without the data owner knowing. As a result, there have been several Canadian challenges of personal data outsourcing to the United States. In B.C.G.E.U. v. British Columbia (Minister of Health), union members argued that the Ministry of Health was violating patients’ rights to privacy under section 7 of the Charter by outsourcing physician billing data that contained personal patient information to a private U.S. company.16 The BC Supreme Court disagreed, holding that as long as the contractual arrangement authorized under the Canada Health Act ensured that a reasonable expectation of privacy was protected, the practice was acceptable. Since then BC., Nova Scotia, and Alberta passed legislation that restricts public (not private) sector trans-border outsourcing.17
The Privacy Commissioner rejected a similar complaint against the Canadian Imperial Bank of Commerce. The bank outsourced the processing of credit card transactions to an American company. The specific confidentiality and security contained in the outsourcing agreement were approved by the Office of the Superintendent of Financial Institutions, and this satisfied the Commissioner. Both decisions turned on the specific terms of the outsourcing agreement and prior regulatory approval of the terms.
When considering sending sensitive information across the border and outsourcing to American firms, businesses should:
• Undertake a security analysis of the American company prior to contracting;
• Inform the affected customer data owner;
• Include specific confidentiality, security, and reporting provisions in the outsourcing agreement;
• Seek regulatory approval of the agreement, if available; and
• Regularly audit the privacy practices of the outsourcing company.
Increased privacy concerns can be anticipated as the transnational public cloud computing industry replaces user owned software, desks, and laptops as the primary custodians of personal information. “By 2017, enterprise spending on cloud computing will amount to a projected $235.1 billion, triple the $78.2 billion spent in 2011. ….(in 2014) global business spending for infrastructure and services related to
the cloud will reach an estimated $174.2 billion, up 20 percent from the amount spent in 2013.”
Question (1): Are there certain types of information that should remain within Canadian borders? If Canadian data is at greater risk of disclosure when transferred to the United States, why not ban all public and private outsourcing to the United States? Discuss.
Question (2): How can personal information be protected when stored on a transnational cloud server?
In: Operations Management
Your friend Scott Adams has hired you to do a fraud prevention analysis for him. Scott is a successful home-based custom furniture builder. He feels like he is ready to expand his business, Woodcraft By Scott. He doesn’t want to incur the expense and effort of creating a retail store, etc. He would rather grow through internet sales and as his business expands, he’ll look for a workshop and hire help. For now, Scott’s wife Lisa handles phone and email ordering and the business end of the operation. Scott hired a web page designer who has created a website and on-line ordering process for the business. The current plan is to roll out the website and the on-line business on October 1st. Lisa recently saw a segment on the television show “American Greed”1 about a credit card fraudster. This frightened her. She convinced Scott to give you a call. You have been contracted by Woodcraft By Scott to reassure Lisa and to protect this budding small business from fraud.
Scott has asked you for a memo addressing the following:
1) What types of fraud should this type of business be concerned with? Identify at least three fraud risks and explain them.
2) What prevention and control steps should the business take to counter these fraud risks? Note: he trusts Lisa and believes that she would be insulted if you identified as a risk her control of the business.
3) Scott is a bit concerned about the costs of these potential controls. He says that his approach to business decisions mirrors his furniture building method – one step at a time. So, he would prefer that you give him options, in priority order based on level of risk, so that he can take it one step at a time if he chooses.
In: Accounting
Financial institutions are subject to regulations to ensure that they do not take excessive risk and they can safely facilitate the flow of funds through financial markets. Nevertheless, during the credit crisis, individuals were concerned about using financial institutions to facilitate their financial transactions. Why do you think the existing regulations were ineffective at ensuring a safe financial system? brief in approximately 350-400 words
In: Finance
Automobile Insurance Program:
Writes a program that prints the insurance fee to pay for a Vehicle according to the following rules:
In: Computer Science
Automobile Insurance Program:
Writes a program that prints the insurance fee to pay for a Vehicle according to the following rules:
A Honda that is All Wheel Drive costs $450.
A Honda that is two wheels drive costs $350.
A Toyota that is All Wheel Drive costs $300.
A Toyota that is Two Wheel Drive costs $250.
A Nissan that is All Wheel Drive costs $200.
A Nissan that is Two Wheel Drive costs $280.
In: Computer Science
Air is contained in a piston-cylinder. Initially, the 0.35 kg of air is at 2 MPa and 350°C. The air is first expanded isothermally to 500 kPa, then compressed polytropically with a polytropic exponent of 1.25 to the initial pressure, and finally compressed at the constant pressure to the initial state. Calculate the net heat transfer during the polytropic process in kJ assuming constant specific heats at 300 K (with 3 significant figures).
In: Other
In the Social Cognitive Theory, the factors of reciprocal determinism have many constructs including self-efficacy, expectations, observational learning (modeling), expectancies, emotional arousal, behavioral capability, reinforcement, and locus of control.
For this week’s Discussion, describe each construct as it relates to the Social Cognitive Theory and give one example for each construct as it relates to you personally in your goals of health and wellness, and use 350 words or more.
In: Nursing