Wednesday, August 26, 2020

A central assumption made in Mean-Variance Analysis and the Capital Coursework

A focal supposition made in Mean-Variance Analysis and the Capital Asset Pricing Model (CAPM) is that financial specialists like to put resources into the most effective portfolios accessible - Coursework Example The idea of the effective portfolio can be surely known in the wake of returning to the first portfolio the board speculations. One such hypothesis is the renowned capital resources evaluating hypothesis (CAPM). The CAPM is a model that shows the relationship between the necessary pace of profit and the hazard for resources that are held in a portfolio that is very much expanded. As indicated by Fama and French (2004), the beginning of the capital resource valuing model is the conspicuous work of William Sharpe (1964) and John Lintner (1965). The CAPM model is extremely valuable in exercises, for example, the assurance of the companies’ cost of capital and in surveying portfolio execution. A portfolio is a gathering of advantages (more than one resource) held by a financial specialist (Sharpe 1964). The hypothesis of portfolio endeavors to direct speculators on the most proficient method to cause the best mix of resources for streamline returns just as to limit the hazard related with the ventures. The regularly utilized CAPM condition is a follows: ER = Rf + (Rm †Rf)î ², where Rf is the hazard free rate, ER is the normal profit for the portfolio, (for the most part signified by the financing cost on treasury charges), Rm is the normal market return for a similar period, and ÃŽ ² is the beta, which gauges the connection between the portfolio execution and the market execution. At the end of the day, beta demonstrates how touchy the portfolio’s execution is to the varieties in the market execution. The above condition shows that a portfolio’s return can be communicated regarding the hazard free return, the hazard premium and the beta. In light of the condition, which is a straight, it is uncovered that the portfolio return is legitimately identified with the h azard. That is, the higher the portfolio chance, the higher the portfolio’s return. The CAPM hypothesis carries us to another thought of the productive portfolio. A portfolio can be proficient under

Saturday, August 22, 2020

Internet Usage Essays - Communication Design, Design,

Web Usage Are Mainstream Scientific Researchers Using the Internet to its full Multimedia Potential? As an examination introduction medium, the Internet has been intended to offer incomprehensibly more to distributers than simple content access. It's astoundingly easy to fuse photos, outlines, delineations, sounds, livelinesss, motion pictures and a wide range of non-content substance into a site utilizing the present easy to understand web improvement programming. This subject, Networks and Multimedia in Science and Technology, has been intended to open its understudies' eyes to the energizing mixed media prospects accessible that can impart examine discoveries all the more accessibly, adequately and compactly than plain content. A glance through a portion of the examination introduced by numerous individuals of these understudies, discovered connected to the NAMIST CONFERENCE PAGE, clarifies that very much planned sites can make even the most possibly exhausting subjects (measurements? butterflies?) alluring and fascinating using natural structures and proper interactive media. In any case, a peruse through the site of Australia's vital government-financed Scientific association, the CSIRO AUSTRALIA page, uncovers bunches of research papers distributed solely in content just arrangement. The http://www.nobel.se/declaration 98/physics98.html official 1998 Nobel Prize honor declaration for the field of Physics incorporates a few graphs, however nothing one would not discover in a 1970's course reading. A large number of the connections from american science association www.Sigmaxi.org's science asset page, http://www.sigmaxi.org/scienceresources/scienceresources.htm, have a modest quantity of graphical substance, yet just one site I discovered, http://volcano.und.nodak.edu/ - a site devoted to fountain of liquid magma examine - utilized film documents, sounds and liveliness, and this site was recorded under diversion for kids on sigmaxi's asset list. I accept there are numerous purposes behind established researchers' obvious abhorrence for interactive media. Not a little factor could be the conceivable recognition that examination that is introduced in a garish, brilliant way is inadequate in substance, that specialists who invest a lot of energy in introduction are trading off the exploration itself. The customary introduction of research has experienced distribution in logical diaries, not famous for their consideration regarding visual intrigue, and the utilization of broad visual or interactive media help to center the peruser's consideration could be seen as deigning. Moreover, utilizing the accessible innovation, while moderately simple utilizing the present propelled, easy to use improvement programming, is in any case definitely additional tedious than the utilization of basic content. With regards to a logical report, obvious signals are unmistakably more work serious to incorporate than comparable printed clarifications much of the time. Moreover numerous specialists are new with the methods required to create them, and additionally ready to endeavor composed clarifications than commission realistic craftsmanships. A large number of the mechanically maximized destinations associated with the NaMiST Conference page occupy the crowd from the data they plan to give. This is reflected by one gathering's customer mentioning a straightforward, uncluttered and development free page. Cutting edge pages additionally take more time to download, and frequently require modules that may themselves set aside a great deal of effort to download. Furthermore, how frequently have you trusted that a huge record will download just to discover it has been some way or another ruined and is pointless? Maybe in numerous fields of logical research, such material is basically unseemly. Clarifying quantum material science investigate on any level however the most fundamental would be incredibly hard to do utilizing designs and sound. PCs and Internet

Friday, August 21, 2020

Treating Catatonic Behavior in Schizophrenia

Treating Catatonic Behavior in Schizophrenia Schizophrenia Print Diagnosing Catatonic Behavior in Schizophrenia By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Medically reviewed by Medically reviewed by Steven Gans, MD on May 21, 2019 Steven Gans, MD is board-certified in psychiatry and is an active supervisor, teacher, and mentor at Massachusetts General Hospital. Learn about our Medical Review Board Steven Gans, MD Updated on February 23, 2020 Schizophrenia Overview Symptoms & Diagnosis Causes & Risk Factors Treatment Living With In Children Verywell / Chelsea Damraksa In This Article Table of Contents Expand Common Catatonic Behaviors Getting a Diagnosis Types of Treatment For Loved Ones View All Although you may have heard the term catatonic schizophrenia, this diagnosis no longer officially exists in the current Diagnostic and Statistical Manual of Mental Disorder (DSM-5).?? It was previously one of the subtypes of schizophrenia. Currently, it is used to describe someone who is diagnosed with schizophrenia who also meets the diagnostic criteria for catatonia. Catatonia or catatonic behavior is a serious psychiatric condition that has historically been associated with schizophrenia, but it can be present in a variety of psychiatric conditions, including schizoaffective disorder,  bipolar disorder, and major depressive disorder.?? Catatonic behavior may also result from certain medications and medical conditions. Catatonia is marked by a significant decrease in someones reactivity to their environment. This can involve stupor, mutism, negativism or motor rigidity, and even purposeless excitement. While these symptoms can be scary and extremely debilitating, knowing more about them (and what treatments are available) can help you better manage or help a loved one do so. Common Catatonic Behaviors Someone with this condition might experience rigidity or stupor, be unable to speak, respond, or even moveâ€"and this can last for hours or even days if left untreated. Catatonia can also cause a person to perform strange movements and stay in uncomfortable-looking positions without attempting to shift into more comfortable or natural ones. In addition to a lack of mobility, erratic and extreme movement is possible in catatonic behavior. For example, you might pace in a repeated pattern and make loud exclamations for no reason at all (i.e., these actions are not in response to an environmental stimulus or event).? Parrot-like repetition or echoing of words, known as echolalia, is also a common catatonic behavior. Of course, people with this disorder may also display signs of schizophrenia, including:?? HallucinationsDelusionsCognitive problemsSocial withdrawalDisorganizationPoor self-careSocial difficultiesDecreased inability to express emotions How Schizophrenia Is Diagnosed by Observing Symptoms Getting a Diagnosis There are no labs or tests to diagnose catatonic symptoms in schizophrenia. Instead, your doctor will perform a series of medical exams and psychological evaluations to assess your physical and mental health, as well as rule out other conditions. Depending on the results, your doctor might give you a magnetic resonance imaging (MRI) scan or an electroencephalogram (EEG) to check for any lesions or unusual brain wave patterns.?? A test may also be given to check for the presence of drugs and alcohol. During the psychiatric evaluation, you will be asked questions about your thoughts and behaviors. A psychiatrist will attempt to discover how long you have been experiencing the symptoms in question. If a patient is in a catatonic stupor and unable to talk, his or her family may be called in to provide information about the catatonic behavior. Misdiagnosis Unfortunately, because catatonia is characterized by motor symptoms, it is sometimes mistaken for another disorder. Catatonic symptoms like facial contortions, strange limb movements, or unusual body positions can lead to a misdiagnosis of tardive dyskinesia or other movement disorders. Similarly, Tourettes syndrome may be confused for catatonia due to some of the vocalizations that can be part of the syndrome. Types of Treatment Schizophrenia is a lifelong, chronic condition, which means youll need to take steps to stay ahead of and manage your catatonic behaviors and your schizophrenia. While theres no cure, there are treatment methods that can help you to better manage your symptoms. Find Help With the Best Online Therapy Programs Medication Benzodiazepines like Lorazepam (Ativan) are perhaps the most common approach to treatment.?? These drugs act as depressants on the central nervous system, which is why they are often used to treat anxiety. Because these drugs are fast-acting, they can often relieve catatonic symptoms quite quickly. However, they can be habit-forming when used as a long-term treatment. There is some debate around the use of antipsychotics in catatonia. In some cases, antipsychotics can worsen catatonia and are often discontinued in its acute management. However, they are generally reintroduced to treat and prevent the symptoms of schizophrenia. How Schizophrenia Is Treated Electroconvulsive Therapy (ECT) ECT, formerly known as electroshock therapy, is increasingly used to effectively treat catatonia in schizophrenia and other psychiatric conditions. Living With Schizophrenia For Loved Ones Witnessing someone you care about experience catatonic behavior with schizophrenia is certainly scary. Perhaps the best thing you can do is to stay educatedâ€"about diagnosis, symptoms, and effective treatmentâ€"so you can get help right away if you notice any signs of catatonia like rigidity or stupor or erratic and extreme movements. Depending on the severity and type of symptoms, you may need to step in to describe the catatonic behaviors to your loved ones doctor. Doing your best to encourage your loved one to work with his or her mental health professional and stick with the treatment plan will help ensure that schizophrenia is being well managed and controlled. And dont forget self-care, which is essential for sustaining the mental energy required to support someone with a mental illness. Try to get ample sleep, eat right, exercise, and make time for relaxation and fun in your life. A Word From Verywell Getting a proper diagnosis and complying with treatment is key to coping with catatonic behavior. While schizophrenia is a lifelong disease, catatonia can be controlled. With appropriate treatment, people suffering from catatonic symptoms as part of schizophrenia and other psychiatric conditions can find significant relief from their symptoms.

Sunday, May 24, 2020

Omnivores Dilemma Book Report - 2486 Words

Omnivore s Dilemma Book Report I chose Omnivore s Dilemma for various reasons, one being to learn more about current food issues within our economy, ecosystem, and environment; and two, to learn more so I am not a hypocrite to my beliefs. My entire life I have grown up learning and practicing sustainable mannerisms. Learning to turn off the water while I brushed my teeth, using reusable tupperware and grocery bags, and not idling are a few of the many practices I was taught. I spent my middle and high school years surrounded by many individuals whose views about the environment were much different than my personal beliefs. Listening, observing, and learning from those around me drove me to apply for school and pursue a degree in†¦show more content†¦In my first year of college I have been introduced to copious amounts of new information and topics that had never crossed my mind. Becoming familiar with new ideas, food production and it’s impacts of the environment both locally and globally became of interest to me. I have been a vegetarian for about four years and as I have attended college I have learned more about the state of the issue with food production and sustainability. When presented with the list of books for our independent project Omnivore s Dilemma immediately jumped at me. When Pollan stated in the introduction, â€Å"Farming and food industry produces even more greenhouse gases than all forms of transportation put together; the way you eat affects the world more than anything else you do,† I was hooked. Michael Pollan the author of Omnivore s Dilemma discusses and asks, â€Å"what should we have for dinner?† He attempts to answer one of the pressing questions of sustainability in today s society, to save money or to save the planet, and how? Pollan talks about how humans are omnivores and we have the choice to eat whatever we want, no matter the health and sustainability implications of our decisions. Pollan discusses three main food chains, industrial (corn), organic, and hunter/gatherer. He analyzes each food chain, learning eating industrial is basically eating corn, and goes into the complex issues

Thursday, May 14, 2020

Gender Discrimination - 1518 Words

Gender Discrimination Written by: Brent Davey TABLE OF CONTENTS Introduction--------------------------------------------------------------------3 Gender Discrimination Defined-------------------------------------------3 Gender Discrimination at Work-------------------------------------------5 Gender Discrimination and Politics--------------------------------------6 Conclusion---------------------------------------------------------------------6 Works Cited-------------------------------------------------------------------8 Introduction To discriminate socially is to make a distinction between people on the basis of class or category without regard to individual merit. Examples of social discrimination include racial, religious,†¦show more content†¦Female rights activists in Canada and all over the entire world are helping to bridge the gender gap. These activists tackle a large variety of issues that impact women around the world. For example, in November of 2005 almost 200 female activists from nearly 70 countries met in Sri Lanka to address issues including violence, harassment and intimidation. As time passes a clearer picture of global gender equality begins to take shape, however we still have a lot of work to do before we ever see the elimination of all gender-related discrimination. Gender Discrimination at Work In Canada, It is prohibited to discriminate against a person on the basis of Gender. Unfortunately our laws are simply rules and in no way do they prevent circumstances from occurring. Discrimination in the workplace is a serious problem in North America. Heres a good example: In 2004, Wal-Mart was the subject of a huge class action lawsuit filed by six women from California for allegedly discriminating against females. The judge expanded the case to include 1.6 million female workers nationwide since 1988. Residing Judge Martin Jenkins indicated that Wal-Mart had for the most part failed to dispute the plaintiffs evidence that women were paid less than men in every region and in most job categories; that the salary gap widens over time even for employeesShow MoreRelatedRacial Discrimination And Gender Discrimination962 Words   |  4 Pagesincreasingly being seen, especially on social media. It s a single word which people are using instead of the longer phrases disability di scrimination or disability prejudice. Racial discrimination and gender discrimination have their own single words - racism and sexism - and so those ideas can be expressed a little more easily. Disability discrimination is often complicated and misunderstood. At one end of the scale, buildings with steps instead of ramps may be said to be ableist. Less obviousRead MoreSexual Discrimination And Gender Discrimination1384 Words   |  6 PagesSexual discrimination, sex based discrimination, gender discrimination or sexism is a type of prejudice or discrimination based on a person s sex or gender usually by the opposite gender. Thus, it generally refers to discrimination against a male by a female or a female by a male. Feminism can therefore be considered a form of sexism. More often than not however, sexism is commonly applied to the unfair treatment of women, the denial of opportunity to women or an injustice towards women, whichRead MoreGender Discrimination5921 Words   |  24 Pages GENDER DISCRIMINATION By Nkechi AGBOGO TABLE OF CONTENT 1. Abstract 2. Introduction 3. What does sex discrimination cover 4. Sex discrimination possible scenes 5. Forms of sex discrimination 6. Reasons for sex discrimination 7. Policies which should help reduce gender discrimination 8. Conclusion 9. Reference ABSTRACT Gender discrimination is an acute and persistent problem, especiallyRead MoreDiscrimination Based On Gender Discrimination973 Words   |  4 PagesDiscrimination, especially discrimination based on gender, should be looked at through Deontology. This is because discrimination based on gender affects the rights of many, requires duties of other to not discriminate and have respect for others, and can have large consequences. It is important we look at rights, duties, and consequences rather than only evaluate gender discrimination based on its consequences in order to be able to create a way to virtuously handle gender. While gender discriminationRead MoreRacial Discrimination And Gender Discrimination2298 Words   |  10 PagesDiscrimination is an ongoing problem that exists in many forms and is often studied by social psychologists. According to Bordens and Horowitz (2014), discrimination is defined as â€Å"overt behavior- often negatively directed toward a particular group and often tied to prejudicial attitudes- which involves behaving in different ways toward members of different groups† (p. 106). Although discriminatory behaviors have seemed to simmer down over the past decades, individuals still to this day continueRead MoreSexual Discrimination And Gender Discrimination2076 Words   |  9 Pagesdemand is a kind of employment discrimination. The sex discrimination of employment the female encounter is especially extrusive. At present, females of China more and more fall in a weak position in employment market. So, what is gender discrimination? Gender discrimination, also known as sexual discrimination, is any action that specifically denies opportunities, privileges, or rewards to a person (or a group) because of gender. The practice of letting a person s gender become a factor when decidingRead MoreGender Discrimination In The Workplace1867 Words   |  8 PagesDiscrimination in the workplace, specifically gender discrimination is a significant matter, impacting women all over the world. Defined by the International Labour Organization (ILO) Convention No. 11, discrimination is ‘Any distinction, exclusion or preference made on the basis of race, colour, sex, religion, political opinion, national extraction or social origin, which has the effect of nullifying or impairing equality of opportunity or treatment in employment or occupation.’. As stated by GillianRead MoreThe Existence Of Gender Discrimination2843 Words   |  12 PagesThe existence of gender discrimination in w orkplaces is not under dispute (Acker, 2006). In virtually all societies across the world, women are known to be in a lower position in labour market than men. Women are overrepresented in positions at the bottom echelons of organisations; they have less status, prestige, power and authority on the job. Besides, women are segregated into roles and jobs that offer poorer rewards and have fewer opportunities for progression to positions of power (Walby, 1988)Read MoreGender Discrimination And The Workplace Essay1242 Words   |  5 Pagesusually paid less than their male peers and they aren’t promoted as fast as their male peers. Progress has been make towards gender workplace equality but gender workplace discrimination continues to be an impediment to gender equality. For the purpose of research on gender workplace discrimination, I used four journal articles. The first article, Minimizing Workplace Gender and Racial Bias, by author William T. Bielby, discusses stereotypin g in the workplace. The article offers suggestions on howRead MoreGender Discrimination At The Workplace962 Words   |  4 Pages Gender Discrimination in the Workplace Santisha Fleming Human Resource Management Dr.Juluis Demps –Management 360 Jacksonville University April, 1, 2015â€Æ' American women can vote, hold office, and they can work in a public work environment. They are considered have an equal opportunity when compared to men. What is the true definition of equal employment opportunity? Does this mean that women and men are offered the same opportunities in the workplace? As well treated equally in regards

Wednesday, May 6, 2020

Essay on United States Government and Federalism - 1473 Words

Over the last two centuries the United States has grappled with the idea of federalism. While former President James Madison had a very concrete understanding of that form of governance, â€Å"In the compound republic of America, the power surrendered by the people is first divided between two distinct governments, and then portion allotted to each subdivided among distinct and separate departments† (Madison, 1788, p. 67), the United States has never had a conclusive division of power between the state and the US Federal Governments. Instead of definitive spheres of governance as Madison envisioned, over the years the US Federal Government has played an increasingly important role in state matters. Beyond changes in the balance of power between†¦show more content†¦This case established the precedent that the United States Federal Government could dictate the countries monetary policies. More importantly, during this period the supremacy of federal law over state law was established with the Nullification Crisis of 1832. The ensuing conflict established the precedent that the states did not have the right to judge the constitutionality of acts of Congress. It was not until the American Civil War and the resulting defeat of the Confederate States of America that the supremacy of the US Federal Government in legislative and economic matters was established. Between the conclusion of the American Civil War and the election of President Franklin D. Roosevelt, the United States entered a period of definitive dual federalism. During this period â€Å"fundamental governmental powers were shared between the federal and state governments, with the states exercising the most important powers† (Lowi Ginsberg Shepsle Ansolabehere, 2010, p. 73). While the US Federal Government left a majority of the decision making up to the states, unlike before the Civil War, the supremacy of the Federal Government was no longer in question. Although the government did establish various national standards during this period, it did little to enforce compliance on the state level. For example, little was done to enforce the implementation of the 15th amendment at the stateShow MoreRelatedFederalism Is A Key Component Of How The United States Government Operates Essay1225 Words   |  5 PagesFederalism is a key component of how the United States govern ment operates. Many countries now are a federalist form of government. The definition of federalism is a governmental system in which national and regional governments share powers, and are considered independent equals (Smith and Greenblatt 29). Many countries now use a federalist system of government. The United States version of federalism was enacted with the Constitution in 1787, and has evolved in different ways since then. BeforeRead MoreFederalism: Federal Government of the United States and Natural Disaster877 Words   |  4 Pages08 Federalism Federalism in Action Part One: The Storm The Storm: Chaos and Tragedy: Answer the following questions as you view the PBS video excerpt Chaos and Tragedy. 1. According to Frontline, what problems were caused by the following groups: o The Local and state officials? The inability to enforce laws from the federal level uniformly throughout counties o The U.S. military? Suffered problems because they had no previous experience on these situations of emergencies o FEMA? HadRead MoreImportance Of Federalism And How The United States Structure Is Based Upon This Form Of Government2428 Words   |  10 Pagescurrent national government under the Articles of the Confederation was not adequate to properly provide for the needs of the people of this newly found nation. Another instance includes the various research that I have conducted and the research that I have learned from my fellow classmates via our weekly discussion posts. Nonetheless, I believe that the three of the most important lessons learned from this course would have to be the concept of federalism and how the United States structure is basedRead MoreDifferences Between Dual Federalism And Cooperative Federalism969 Words   |  4 Pagesdual federalism and cooperative federalism? Be sure to fully address what federalism is and why it was created. 1000 words. Dual federalism is a term used to describe a circumstance in which national and state governments are sovereign and equal within their constitutionally allocated spheres of authority. Federalism is a concept that refers to a system of government in which power is shared between the national and non-national governments. Cooperative Federalism is a model of federalism in whichRead MoreFederalism Vs. Cooperative Federalism1148 Words   |  5 PagesFederalism is a critically important concept in helping to understanding the American political system. The Founding Fathers of the United States had to answer important questions on how to handle power and responsibility between the states and national government. They did not want to have a situation where the federal government had all the power. They had just fought a war against Britain because of that idea. However, they did not want each individual state doing essentially whatever they wantedRead MoreAssess The Significance Of Federalism In The USA Essay1450 Words   |  6 Pagessignificance of federalism in the USA Federalism involves the sharing of powers between different levels of government. In the United States this relates to the government at national level (the federal government) and those at the level of the state. The United Kingdom is not a federal state instead it is a unitary state where power is held in one place (parliament). Federalism is the process of sharing power between a central government, in America’s case Washington, and the States. The US ConstitutionRead MoreDual Federalism Vs Dual Federalism732 Words   |  3 PagesC.J. Diehl Ms. Crouse U.S Government 10/23/17 How come we can go from Pennsylvania to New Jersey without paperwork but pay a different amount of state tax for purchases made in the different state? The answer is federalism, federalism is having or relating to a system of government in which several states form a unity but remain independent in internal affairs. These discissions were made in the Federalist Papers written by the Founders. The federalist papers were a collectionRead MoreFederalism Vs. Cooperative Federalism1469 Words   |  6 PagesRight now the current form of Federalism that the United States uses today is called New Federalism, or Cooperative Federalism. Cooperative Federalism was created as a political model around 1937 that emphasized â€Å"teamwork† between the National and State governments. This was created to ensure that both governments would work together in order to provide services more efficiently in the Nation. This is why Cooperative Federalism is appealing to this day an d still exercised, because the U.S. has stillRead MoreThe Federal Vs. State1058 Words   |  5 PagesFederal v. State There has always been a huge political debate on what powers the federal government and what powers the state government should hold. Do you feel like dual federalism gives the states too much power? Do you feel like cooperative federalism was bad because there was no distinction between the federal government and the state government? Do you think that categorical grants are better than block grants because the money has a more specific purpose? From 1789 to 1937, most fundamentalRead MoreEssay on Federalism1371 Words   |  6 PagesFederalism Federalism is a widely accepted system of government in North American cultures. To many North Americans it seems to be the obvious choice for all world governments, but this is not the case. In all honesty, federalism is a fairly unique form of government. Out of approximately two hundred nations on the earth one hundred and eighty states practice unitary forms of government, leaving only twenty or so as federal nations (Winchester, 1999). Unitary forms of government consist

Tuesday, May 5, 2020

Examining the Encryption Threat-.com

Question: Should Encryption Technologies be restricted? Answer: Introduction The interest in the encryption originates from the background of technological know-how transforming business. Presently the rise to acquire communications has propagated on the progression of the encryption schemes to be able to protect the integrity of the data because it is been transferred electronically (Ball, Borger and Greenwald, 2013). There are a number of the security services that are involved with the encryption outside the problem of the privacy: confidentiality- that is the assurance which the events involved with the communication possess a distinctive understanding of the message; authentication- the guarantee which the parties required are who they say are. Encryption safeguards our information, specific whenever it is sitting on our computer systems and in the information facilities. This assist it whenever it is being transmitted around the World Wide Web (Ou, Chung, H.Y. and Sung, 2006). The protection of the information is important to everybody. The utilization of the encryption is most effective in case it is ubiquitous along with automatic. The two kind of the encryption that happen to be primarily used are the Https URLS on the browser along with the handset to the tower link for the mobile phone calls (Koops, 2006). The encryption needs to be allowed for everything by the delinquency, rather than a function you may switch on only when you are carrying out something you believe essential and even worth safeguarding (Koops, 2006). Encryption continues to be the most important security preserving technological innovation that is right now there in the world, one which is distinctly suited would be to protect against the bulk surveillance- this really is mainly done by the authorities to be able to manage on their populations in addition to their criminals who are searching for the susceptible victims. Through forcing both to focus on their attacks against individuals, we protect the society (Ou, Chung and Sung, 2006). It is important to n ote that just as much as encryption is important as well as crucial in protection of our data when utilized by the wrong people for instance the criminals the law enforcement officials could become incapable to prevent these people from committing crimes of extraordinary magnitude (Siegfried, Siedsma, Countryman and Hosmer, 2004). Existence of indestructible encryption could render these kinds of methods of the electronic surveillance worthless, even though the law enforcement authorities might intercept on the communication that are created by the criminals they may be not able to decipher on the encrypted messages. In this research I argue as to why the encryption should be restricted. On the first issue as to why encryption should be restricted is to enable that illegal activities are not protected by the strong encryption and that the law enforcement agencies have the access of the data that can be used to fight crime and prevent the acts of terrorism (Scarfone, Souppaya and Sexton, 2007). In some tech industry it has been observed that they are encrypting data with strong encryption such that the companies are not able to access on the information of the customer to comply with the court orders and the warrants from the courts (Ball, Borger and Greenwald, 2013). The regulation of the encryption should require a licensing where only certain firms or individuals who meet the predetermined criteria are allowed to use the encryption. This this means it would allow illegal activities are protected from these encryption and the law enforcement are able to target the individual who break the law (Siegfried, Siedsma, Countryman and Hosmer, 2004). Another issue is that through restricting of the encryption to allow the enforcement officials to regulate on the encryption for the good of the public safety through providing a back door to access the information that is encrypted in the special circumstances (Scarfone, Souppaya and Sexton, M., 2007). over the past it has been observed that criminals are using unbreakable encryption to communicate with one another which renders the methods of the surveillance to be useless, to an extent that the law enforcement officials are not able to intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted (Tavani and Moor, 2001). When there encryption are restricted the law officials are able to monitor on every communication that is made and as result be able to identify criminals that are conspiring to do harm and at the same time protect the public from the danger they pose through their criminal activities (Scarfone, So uppaya and Sexton, 2007). This would be a preventive measure of a criminal activity before it occurred. Another issue for the need of restricting of the encryption would be to control as well as monitor on the strong encryption. According to the policy in the US companies are not allowed to exports the products that has a strong encryption, unless there has been the recovery features, which would allow the government to have access to the encryption keys (Scarfone, Souppaya and Sexton, 2007). The purpose of this would prevent the export of product which may pose threat to the national security. It would allow the organization to secure their own intellectual property from getting into the wrong hands. On a certain level this restriction would protect the information of the company which when fell on the wrong hands could compromise on their operation and their intellectual property rights in case it is stolen by the criminals. The argument against the motion: encryption should not be restricted. First it is important to understand that encryption is intended to protect individuals data from the unwanted access, this is important to every individuals and not the selected few (Ou, Chung and Sung, 2006). Having an encryption has the ability of protecting our data as well as devices from the malicious attackers. What we should ask is that who determines what data is significant and what is not. We as the individuals should be given the opportunity when it comes to determing which of our data that deem important and worthy of being strongly encrypted (Ou, Chung and Sung, 2006). I an m of the opinion that individuals need to maintain some sort of the privacy in this age where we are being constantly tracked through the traffic cams or perhaps through the electronic footprint left on the internet. There is constant exposure of the possibility of personal data falling in the hands of the criminals. Encryption is important particularly in preserving on the individuals privacy, howeve r it should not replace our security (Siegfried, Siedsma, Countryman and Hosmer, 2004). There are limitation as to where encryption does not protect our devices from being hacked, but rather facilitates on the protection of our data which we believe to be important and necessary for our privacy to remain much intact. Conclusion There are various regulations in effect worldwide which relates to the protection of the private and the sensitive data. This can be achieved through the encryption of the data, some of which has focused on the protection of the specific information in the industry. The widespread of the use of the encryption has been a necessary consequence of the revolution of the information. With the coming of the electronic communication on the computer networks, individuals need a way of ensuring the both the conversation and transaction has remained confidential. Nonetheless, as much as these encryption are providing privacy and protection of the data there are being used by the criminals and the terrorists to prevent the authorities from intercepting on their communication. In my view the encryption should be restricted. The reason for restricting on the encryption would to enable the law enforcement to have access and intercept the communication that are made between the criminal as they are unable to decipher on the messages that are encrypted. Moreover, it would make sure that all the illegal activities are not protected by the strong encryption as well as the law enforcement agencies. References Ball, J., Borger, J. and Greenwald, G., 2013. Revealed: how US and UK spy agencies defeat internet privacy and security. The Guardian, 6. Koops, B.J., 2006. Should ICT regulation be technology-neutral?. Ou, S.C., Chung, H.Y. and Sung, W.T., 2006. Improving the compression and encryption of images using FPGA-based cryptosystems. Multimedia Tools and Applications, 28(1), pp.5-22. Scarfone, K., Souppaya, M. and Sexton, M., 2007. Guide to storage encryption technologies for end user devices. NIST Special Publication, 800, p.111. Siegfried, J., Siedsma, C., Countryman, B.J. and Hosmer, C.D., 2004. Examining the encryption threat. International Journal of Digital Evidence, 2(3). Tavani, H.T. and Moor, J.H., 2001. Privacy protection, control of information, and privacy-enhancing technologies. ACM SIGCAS Computers and Society, 31(1), pp.6-11