Thursday, October 31, 2019
Major Assignment Research Paper Example | Topics and Well Written Essays - 12500 words - 1
Major Assignment - Research Paper Example In area, Chile is slightly bigger than Texas or France and it is 756,946 sq.km long and lies on the 380 latitude and its southernmost tip where Horn Island is situated where there is a cape which is lying on the 560. Hence, some part of the Chile lies inside the tropics and this region is the nearest continental land on the planet to the snowy expanse of Antarctica. Chile claims the ownership for these region. Hence, there is a large variation in latitude from north to south, there has been great dissimilarities in climate. Valley, oasis, arid deserts, rain-forests, tranquil green pastures, icy glaciers, mountain-framed lakes and rocky archipelagos are natural beauties that adorn Chile. Along the lines of latitude, Chile’s geographical division can be identified as forest Chile, desert Chile and Mediterranean Chile (Collier & Sater 2004: xix). Chile lies on the south-west of Pacific coast of South America. The whole nation is comprised of a thin strip of land protruding North-South. It has a maximum breadth of 420 kms which has around 2,006,096 sq.km of which only 756,626 sq.km are considered to be continental whereas the balance area is comprised of the Chilean Antarctic. Chile is a small nation situated in the Southern South America bordered by the South Pacific Ocean lying between Bolivia, Peru and Argentina. Its geographic coordinates are 710 W & 300 W. Chile has a total continental area of 756,626 sq.km out of which about 12,290 sq. km is occupied by the water and 743,812 sq.km is filled by the terrestrial. Chile owns two islands namely Isla Salary Gomez and Easter Island. It shares largest land boundary of 6339 kms with Argentina (5308 km) and Bolivia (860) and smaller portion with Peru (171 km). It shares a long coastal line of 6345 km. As per 2011 statistics, Chile has an arable land of 1.74%, it is developing permanent crops just only in 0.06% and other
Tuesday, October 29, 2019
Amending the Constitution Essay Example for Free
Amending the Constitution Essay Step 1: Which route do you choose? The route I chose was Congress route. Smart start! Why? You remembered that, historically, constitutional amendments have never been initiated at national conventions, even though that is one of the two possible methods outlined in Article V. Your decision to use the route that has proved successful in the past increases the odds of your effort succeeding. Question #2: House or Senate First? Step 2: Which route do you choose? The route I chose was the House First. Great choice! Why? You have two distinct advantages in the House that you dont have in the Senate: (1) you are a senior and respected member, and (2) a block of House members already supports the amendment. If you succeed in the House, your odds of also succeeding in the Senate are increased because the House vote may convince many skeptical senators. Question # 3: Negotiations in the House Step 3: Whose support will you go after? Good move! Why? Fiscal conservatives arent overjoyed with your decision, because leaving in the two-thirds language will still allow the government the option to run a deficit. But, they still want some kind of amendment that will make running a deficit more difficult for the government. Moderates, on the other hand, are happy that youve sided with them. The result is that the bill passes in the House by a comfortable margin, with only a small block of the most ardent fiscal conservatives voting against it. Question #4: A Court Challenge Step 4: What is your response? Good choice! Why? As your supporters thought, the suit is thrown out. The judge rules that it is without merit. Having wasted no time on the suit, you are ready to begin working on the Senate to pass your proposal. Question #5: Negotiations in the Senate Step 5: What is your response? Smart move! Why? The president gives a forceful speech in support of the proposed amendment and within three weeks the bill passes in the Senate. Youve achieved your goal of succeeding at stage one of the process. Now youve got to turn your attention to getting two-thirds of the states to ratify the amendment, and that could take years. Your work is cut out for you, but youve made it farther than most! You Are Proposing a Constitutional Amendment (cont.) Conclusion Amending the U.S. Constitution is not easy. Remember, only 27 amendments to the Constitution have been ratified, while over 10,000 have been proposed. One reason there are so few amendments is that the writers of the Constitution made it very difficult to amend it. The two-stage process established by Article V sets the bar high and ensures that any amendments are supported throughout the land before they are added to the Constitution. Based on what youve learned in this simulation, consider the following: * Are there any issues right now that you think have enough support throughout the country to become constitutional amendments? * What is the primary benefit to having a constitution that is so difficult to amend? * What is the primary problem with having a constitution that is so difficult to amend? You have completed this activity. To find out if your professor has made a test available for the activity, close this window and return to your course.
Sunday, October 27, 2019
Winds of Change: From Vendor Lock-in to the Meta Cloud
Winds of Change: From Vendor Lock-in to the Meta Cloud Introduction: A software requirement specification is a complete explanation of the system that is to be created. Software requirement specification includes non-functional and functional requirements. Use case technique can be used in prepared to identify the functional requirements of the software inventions. Non-functional requirements are requirements which force constraints on the implementation and design. As systems grew more complex, it becomes more apparent that the goal of the entire system can’t be easily included. The software requirement specification consists of two important activities. Problem/Requirement investigation Product Function summary Security is one of the most important points in wireless communication studies because it is an essential challenge since wireless messages are transmitted in the air so there is a chance that hackers can read out the messages and see what all the contents are there in the message. Purpose of Software Requirement Specification: A software requirement specification personifies the requirements of a system IEEE standard and is a organized collection of information. A business analyst (BA), sometimes called system analyst is important for examining the business needs of their clients and for the persons having interest and concern in solving the problems and finding solution for the problems. BA typically performs a communication between the business side of an enterprise and the information technology department. To list the user requirement in a specified manner is the main purpose of software requirement specification. It defines requirements for the software and restrictions needed to this application and document. 4.2 Performance Requirements Portability: It is easy for the user to understand and respond as the Graphical User Interface of this application is user-friendly. Response time: It is the time taken to complete a work by the system by the user is found to be very less. Reliability: This system helps us to deliver the need for queries with high possibility and the functionalities that are available in the application. Scalability: To improve the quality of the product, the system can be extended to combine the changes that are done in the present application. Scalability is meant for the future works that is to be done on the application. 4.3 Functional Requirements: Functional requirements are the statements of services the system should supply, how the system should behave in particular condition and how it behaves to certain inputs. Also the functional requirements define what the system should not do in some cases. The functional requirements is based on the kind of software being evolved, when writing requirements the general approach taken by the organization and the anticipate users of the software. These requirements for a system report what the system should do. The requirements are normally describes in a fairly abstract way when it is exhibited as user requirements. Functional requirements may be exhibited in numerous ways for a software system and it describes the irregularity, its inputs and outputs and functions of system in detail. Some of the typical functional requirements are: 1. Transaction corrections, adjustments, cancellations: Here uploading the data on cloud by data owners are by the transactions which is done online. The end users upload the files to each cloud servers can be downloaded and viewed and these end users have to register to cloud service providers. 2. Authentication: Here the users authentication is required to enter any of the modules implemented in the proposed system and is used to login into the cloud service providers servers. 3. Authorization- functions user is assigned to perform: Here the users are allowed to login by registering and paying into cloud servers if the cloud services are to be used by paying. User has the right to upload the files to respective cloud servers and track the details which are uploaded after logging into the cloud by registering. 4. Audit Tracking: An audit trail which is also called as audit log provides documentary proof of the series of activities that have elaborated at any time a particular operation, procedure or event and is a security-applicable chronological record, set of records, and/or at the end of line and source of records. Scientific research and health care data transactions, financial transactions, or communications by individual people, systems, components, accounts or other entities are the activities in which the audit records typically result from. The procedure that generates an audit trail can enter and administer all actions from all users; a standard user is not authorized to stop or change it and is typically required to always run in a prosperous mode. Additionally, database table with a string or trail file is not reachable to normal users in some cases. The use of a role-based security model in the software is another way of dealing with this issue. When using audit trail functionality, the softwar e is required by many companies and it can also work as a ‘closed system’ or with closed-looped controls. 5. Historical Data: Historical data is the data which is a collection of old records and it should always be present in database. Historical data should not be deleted by the cloud service provider from the database except the data owners are asking to delete the historical data. 4.4 Non-Functional Requirements: Non-functional requirements are the requirements that are often called the qualities of the system. It can be used to form the operation of the system, rather than specific behaviors. Reliability (accuracy), response time and store occupancy are the emergent system properties that non-functional requirements deal with. Alternatively, they may define the constraints on the data representations used in system interfaces and the system capabilities of I/O devices. Non-functional requirements are constraints, quality attributes i.e. it provide the method for designing the fitness and suitability of the product, quality goals, non-behavioral requirements i.e. it achieves its job such as reliability(accuracy) and defines the attributes of the system, efficiency(planning), timing constraints etc.. Non-functional requirements are divided into two main classes: Security and usability are execution qualities. Testability, maintainability, extensibility and scalability are evolution qualities. Some of the non-functional requirements are: Accessibility Accessibility is the one in which a device, service, product or environment is available to many people as possible. Accessibility advantage from some system or organization and it can be observed as the â€Å"ability to access†. The cloud computing system is distributed software so it can be reached from any point of the world through internet without interfering. Availability Availability is the degree to which a system, subsystem, constituent or equipment is in a detailed operable and occurring state at the start of a mission, when the mission is called for as an unknown i.e. a non-specific time. The cloud computing system is distributed software so it can be reached from any point of the world without interference. Reliability Software reliability is the accuracy that has possibility that software will work properly in an identified environment and for a given time. The possibility of failure is calculated by testing a sample of all available input states using the following formula. Probability = Number of failing cases/ Total number of cases under consideration. System Reliability Specification: Hardware reliability Possibility a hardware component fails. Software reliability Possibility a software component will produce an incorrect output Even though a bad result will occur, software can continue to operate in that condition Operator reliability Possibility a system user will make an error Dept. of CSE,STJIT,RANEBENNURPage 1 Underpricing in Turkey: a Comparison of the IPO Methods Underpricing in Turkey: a Comparison of the IPO Methods Abstract This paper addresses the question of what kind of selling and underwriting procedure might be preferred for controlling the amount and volatility of underpricing in the Istanbul Stock Exchange (ISE). Using 1993-2005 firm and issue data, we compare the three substantially different IPO methods available in the ISE. One is very similar to the book building mechanism used in the U.S., another is the fixed price offer, and the third one is the sale through the stock exchange method. The empirical analysis reveals significant first day underpricing of 7.01% in fixed price offer, 11.47% in book building mechanism, and 15.68% in sale through the stock exchange method. Finally, we also show that fixed price offers can better control the impact of market information on underpricing than sale through the stock exchange method. 1. Introduction Extensive amount of research from a variety of different markets have documented the presence of first-day underpricing upon the listing of initial public offerings. The evidence is well documented by Loughran, Ritter, and Rydqvist (1994) and Ritter1 (1998), (2003) in many developed and emerging markets. In developed markets, in the absence of restrictions on intra-day price movements, first-day underpricing is observed in broad price bands. However, in emerging markets, in the presence of daily volatility limits, first-day underpricing is observed in narrow price bands. In contrast to the daily price limits, significant positive short run returns are observed in a number of emerging markets and substantial amount of money is â€Å"left on the table by issuers. Besides empirical evidence, most of the theoretical models explaining IPO underpricing are grouped under four broad headings by Ljungqvist (2005), these are (i) information asymmetry between the investors, the issuing firm an d the underwriter, these models assume that one of these parties knows more than the others, (ii) institutional reasons, institutional theories focus on three features of the marketplace: litigation, banks price stabilizing activities once trading starts, and taxes, (iii) control considerations, control theories argue that underpricing helps shape the shareholder base so as to reduce intervention by outside investors once the company is public, (iv) behavioral approaches, behavioral theories assume either the presence of irrational investors who bid up the price of IPO shares beyond true value, or that issuers suffer from behavioral biases causing them to put insufficient pressure on the underwriting banks to have underpricing reduced. These theoretical models almost always end with the conclusion that the average IPO is undervalued at the offer price, where the initial investors, in most cases, benefit from possessing information by receiving allocations of shares in IPOs and earn the largest first-day returns. The expectations of issuing firms, investors and underwriters in IPO pricing are considerably different. In an offering, the issuer generally wants to receive the highest possible price to maximize cash flows to the firm. Investors like to purchase shares at a deep discount so that they can realize positive returns *Baskent University, Faculty of Economics and Administrative Sciences, Baglica Kampusu, Ankara, 06530, Turkey, + 90 (312) 234 10 10 /1728, [emailprotected] 1 Ritter (1998), (2003) provides an update on the compilation of Loughran, Ritter, and Rydqvist (1994) in a short investment period. Underwriters, acting as an intermediary between investors and issuing firms, suffer from a dilemma, if an underwriter determines IPO prices too low, where the foreseen amount of money left on the table will be huge, the issuing firm may withdraw or switch to another underwriter. On the other hand, if an underwriter determines IPO prices relatively high, investors will hesitate to buy new issues, which would result in low commissions and an unwanted effort in aftermarket stabilization activities. Underwriters, however, have an incentive to underprice the shares to ensure that they can sell the offering, and, unsurprisingly, there is extensive evidence that IPOs are, on average, underpriced. Hence, pricing of stocks in IPOs may be the most critical stage of the IPO process. More recently, the literature on IPOs, both theoretical and empirical, focuses on the efficiency mechanisms of the following methods for pricing initial public offerings. At the center of this literature, book building, auctions and fixed price offers differ mainly in price-discovery and share allocation process. Book Building in which the underwriters do road shows and take non-binding orders from Auctions in which the company sets a price range to be used as a non-restrictive guideline for investors, than accepts bids, each specifying a number of shares and a price the investor is willing to pay for them, finally, the market-clearing price set by the investors approximates the real price the shares will command in the market. Fixed Price Offer in which the issue price is set first and than orders are taken from investors who typically pay in advance for part or all of the shares that are ordered. Sale through the Stock Exchange in which the sale is initially conducted in the primary market of the stock exchange by a designated underwriter. Those investors who buy the shares in the primary market must wait until the shares trade in the secondary market in order to sell their shares. The price designated at the time of registration with the securities exchange commissions is set as the opening price. Hybrid Offerings in which the underwriters combine the preceding IPO methods, and design auction/fixed price, auction/book building and book building/fixed price hybrids. For most hybrids, the most common combination is the book building/fixed price offer, where the underwriter uses the book building method to set the price and allocate shares to institutional and foreign investors, and retain the fixed price offer to the domestic retail investors who do not participate in the price-setting process. This paper addresses the question of what kind of selling and underwriting procedure might be preferred for controlling the amount and volatility of underpricing in the Istanbul Stock Exchange (ISE). In this regard, we first compare the three IPO methods available in Turkey. One is very similar to the book building mechanism used in the U.S., another is the fixed price offer, and the third one is the sale through the stock exchange method. Then, we estimate a binary probit on the issuers choice between fixed price offer and sale through the stock exchange method, however, because of the declining importance of the book building mechanism in Turkey, we excluded the book build IPO sample from our binary probit estimations. Finally, we determine the factors that are expected to have an effect on the IPO returns. Our results indicate that, the comparison of the two mechanisms yield that for certain values, namely first day underpricing, IPO amount and fractions of equity sold, fixed pric e offer outperforms the sale through the stock exchange method. To the best of our knowledge, this is the first empirical study on the comparison between fixed price offer and sale through the stock exchange method in the IPO literature. The uniqueness of the data and the availability of the sale through the stock exchange method in the ISE make it possible to conduct a study on the comparison between these two methods. The remaining part of this paper is organized in six sections. In the next section, we provide a comparison of the theoretical and empirical research conducted on IPO methods across many countries around the world. In section 3, we describe the three important Turkish IPO market selling procedures. In section 4, we describe the data and the methodology we used in our empirical tests. Section 5 documents the relationship between market conditions and underpricing of IPOs in different time series and the last section concludes. 2. Comparison of the IPO methods in the literature: Theory and Evidence The efficiency of the IPO methods has been the subject of an academic research over a decade, both empirical studies and theoretical models have tried to explain the advantages of one method over another. The argument that is often made in favor of IPO methods is often empirical as well as theoretical. Researchers studying on the efficiency of the IPO methods try to answer the most challenging question, â€Å"Which one of the IPO mechanism is the most efficient?2. However, according to our comprehensive literature research, both empirical studies and theoretical models listed in Table have some mixed answers. 1. Book Building vs. Fixed Price Offer and/or Auctions Comparison of the IPO methods in the literature goes back to Benveniste and Spindt3 (1988), (1989) and Spatt and Srivastava (1991), they suggest that the American bookbuilding procedure is efficient since it encourages investors to reveal their beliefs about the issues value at a cost of initial underpricing. Book building allows investors to collect information about the value of the stock and price the issue more accurately. To compensate the investors who reveal information, underwriter will favor them when allocating shares. However, fixed price mechanism does not utilize any information about realized buyer valuationsin setting the issue price and is generally inefficient. Loughran, Ritter and Rydqvist (1994) present the first international evidence on the short-run and long-run performance of companies going public in many stock markets around the world. They document that the fixed price method is associated with greater underpricing because of the greater probability of the issue failing and the increased uncertainty associated with the longer time delay between offer and issuance time. Chowdhry and Sherman (1996) point out that two features of fixed price offers tend to lead to greater underpricing, relative to the book building method. The first one is the length of the bidding process, as the time gap between the offer and first day market price widens â€Å"price information leakage occurs, the second one is the common requirement that investors pay in advance for their entire order. Benveniste and Busaba (1997), extend Welchs4 (1992), model of information cascades in investment decisions and present a theoretical comparison of the fixed-price and book-building mechanisms. They exhibit that issuers with a greater concern for risk will prefer a fixed-price offer, because book- building might generate higher expected proceeds, and exclusively provides an opportunity to sell additional shares at full value but it also exposes them to higher risk. Ritter (1998) demonstrates that countries that use bookbuilding typically have less underpricing than countries using f ixed-price offerings, more underpricing under fixed-price offering procedures can be attributed to informational cascades. However, Loughran, Ritter and Rydqvist (1994) and Ritter (1998) point out that IPOs with discretionary allocation (Fixed Price Offering and Book-building) are underpriced more than those with non-discretionary allocation (Offer for sale and Auctions), especially in Auctions. Under discretionary allocation, the first day price increase averaged 37% in fixed price offerings, 12% in book building. Under non-discretionary allocation, the first day price increase averaged of 27% in Offer for sale and 9% in Auctions. 2 In terms of controlling the amout and volatility of underpricing, share allocation and pricing. 3 The literature on underpricing in initial public offerings goes back to Logue (1973), Ibbotson (1975), Chalk and Peavy (1987), Miller and Reilly (1987), Ritter (1984), Rock (1986), Allen and Faulhaber (1989), Benveniste and Spindt (1988, 1989), Grinblatt an d Hwang (1989), and Welch (1989). However, the mechanism by which initial issues are sold has largely been ignored until Benveniste and Spindt (1988), (1989). 4 Welch (1992) focuses on the fixed-price procedure used in some non-US countries, and shows that this procedure can cause informational cascades: investors who observe the investment choice made by previous investors can update their beliefs about the value of the issued shares. Sherman (2000), (2002) shows that fixed price offer, can lead to higher underpricing than book building. Contrary to the fixed price offer and the auction method, in book building underwriters discriminate investors in the allocation of shares to establish long-run relationship with intermediates. Book building gives the underwriter greater flexibility in designing a solution that reflects the individual issuers preferences. By controlling investor access to IPO shares, book building controls both the winners curse problem that affects discriminatory auctions and the free rider problem that affects uniform price auctions. Book building also reduces uncertainty for both issuers and investors. In a study that covers 47 countries, Sherman (2002) has found that in all countries in which the bookbuilding mechanism has been introduced, pre-existing auction systems have decreased in popularity or disappeared altogether. Ljungqvist, Jenkinson and Wilhelm (2000) use a unique dataset containing information on 2,051 initial public offerings in 61 stock markets around the world, during the period of 1992-1999. The authors examine the relative direct and indirect costs of offerings carried out by book building and fixed-price methods. They find that, the direct costs of book building are typically twice as large as direct costs for fixed-price offers. Compared to fixed price offerings, book building efforts though more expensive produce far less underpricing. Nevertheless, fixed price offering is still an extremely common method that is not likely to be abandoned by the underwriters completely. Compared to book building efforts, fixed price offering is an efficient, low cost way to distribute shares to retail investors, avoiding the high fixed costs of road shows. Aorsio, Giudici and Paleari (2000), Guidici and Paleari (2001) present an empirical study conducted on the Milan Stock Exchange companies bet ween 1985 and 1999. Authors distinguish between fixed- price offers and open-price offers with bookbuilding and find different underpricing levels and statistically significant determinants. They state that if the offering is preceded by book building, the underpricing is significantly lower (8.32 % vs. 28.33% in fixed-price offerings), this method allows the issuing parties to collect information from the institutions and to signal good news or bad news to retailers through the revision of the prospectus price range. Therefore, the cost of raising private information is reduced and the requested underpricing is lower. The evolution of the placing procedure, from fixed price to book building, has considerably improved the efficiency of Italian IPO market. Biais and Faugeron-Crouzet (2002) analyze and compare the performance of book building, fixed price offering, uniform price auction, internet-based Open IPO mechanism, and an auction like mechanism called the Mise en Vente in France. Conclusions emerging from their analysis are; Fixed price offerings lead to inefficient pricing and winners curse. Dutch auctions can also lead to inefficiencies, to the extent that they are conductive to tacit collusions by investors. The book building and an auction like mechanism Mise en Vente can lead to optimal information elicitation and price discovery. Chahine (2002) investigates the relationship between underpricing and the investors interest prior to and after the IPO day on 305 French issues. Empirical results show that book-built issues have a lower underpricing, on median, but a higher variance level, than the auction-like and fixed-price offerings. Despite the high initial underpricing of some book-built issues, book-building procedure appears to better control the information gathering from investors participating in the offering, and to be a more efficient pricing system than the auction-like procedure. Paney (2004) examines the initial returns, characteristics of issuers and long run performance of Indian IPOs on a sample of 84 Indian IPOs between 1999 and 2002. In terms of initial returns or underpricing, Paney (2004) finds that fixed price offering yields higher initial returns on average, as compared to book building. In terms of issuer characteristics, Paney (2004) finds that fixed price offering are used by issuers of fering large proportion of their capital by raising a small amount of money. In contrast, book building is opted for by issuers, offering small portion of their stocks and mobilizing larger sums of money. Kutsuna and Smith (2004) present an empirical study conducted on the Japanese IPOs between 1995 and 1999. Using a sample of 163 book-built and 321 auctioned IPOs by JASDAQ companies, authors document that average total issue cost, measured as a percent of aftermarket price, was significantly higher in the book-building regime than in the earlier auction regime. However, when results are weighted by issue size, the estimated aggregate costs of auctioning and book building are similar. This outcome favors book building over auctions for two reasons. First, auction-method estimates do not reflect opportunity costs related to underinvestment. Second, issue cost estimates ignore other benefits of the more-accurate pricing that book building affords. Anand (2005) examines the differences between book building and Dutch-auction, and shows that the bookbuilding method of offering securities is superior to the Dutch-auction IPOs. Stated by Anand (2005), while the Dutch-auction may seem to lea d to efficient price discovery based on investor demand, recent transactions suggest that price discovery is not always accurate and that, indeed, underpricing occurs even in the Dutch auction. Further, even if the Dutch auction is more fair than the bookbuilt process in terms of allocating securities, the Dutch auction can lead to less capital market efficiency overall and can therefore be questioned as a basis for promoting this type of offering. Jagannathan and Shermans (2005) research on the efficiency of IPO mechanism show that hybrid bookbuildings5, unlike auctions, have proved effective in many different countries, cultures, time periods, and market conditions. Jagannathan and Sherman (2005) propose a new IPO mechanism that could overcome the problems with standard auctions. A method that retains the advantages of bookbuilding, while modifying it to increase transparency. Although not a direct comparison between book building, auctions and fixed-price offers, Cornelli and Gol dreich6 (2001), (2003) examine a unique data set of international book building allocations and find that the underwriter favors both regular investors and investors that supply information on the value of the issue. Degeorge, Derrien and Womack (2005) have presented empirical evidence from Frances IPO market that underwriters employing the bookbuilding process implicitly committed to providing more favorable coverage to the companies they took public in the aftermarket. Authors find convincing empirical evidence that in addition to placing the IPO shares with investors, underwriters employing book-building implicitly commit to providing more favorable coverage to the companies they take public in the aftermarket. Specifically, analysts, affiliated with the lead underwriter of the offering, issue more favorable recommendations for recent book-built IPOs than for auctioned offerings. 2.2. Fixed Price Offer vs. Book Building and/or Auctions The pricing of Initial Public Offerings (IPOs) in the short-run has been analyzed by several theoretical and empirical studies referring to the major international stock markets. Extensive research has revealed that the fixed-price offering all over the world suffer from IPO underpricing especially in these major markets. However, studies conducted by Busaba and Cheng (2001), Bierbaum and Grimm (2003), Chemmanur and Liu (2003), Hsu and Hung (2005) present some evidence on the efficiency of fixed price offering over book building and auctions. Busaba and Cheng (2001) show that the bookbuilding process elicits much information from informed traders at the IPO stage by promising larger allocation of valuable stocks to investors who truthfully reveal their information, and therefore reduce the impact that such informed traders have in the after- 5 In the hybrid bookbuilding offers, all retail investors are allowed to place orders in a public offer tranche, and all have an equal chance of getting shares. The prices, however, are set by professional investors who are given incentives to attend the road show. Jenkinson and Jones (2004), cast some doubts about the findings of Cornelli and Goldreich (2001) upon the extent of information production during the bookbuilding period. market trading. In contrast, the fixed price method, that does not elicits such private information at the IPO stage, enables informed traders to use such information in the after-market at the expense of the uninformed traders. In this regard, if the underwriter building a book can not successfully target a subset of the informed investors, a simple fixed price strategy that involves allocating the issue to retail investors produces higher proceeds on average. The comparatively high adverse selection problems associated with the fixed-price method will spill over from the IPO stage to the after-market. This in turn means that liquidity will be relatively more important for IPOs carried out via a fixed- price method than via bookbuilding. Authors show that, compared with a fixed-price offering, the bookbuilding process elicits more information from informed traders at the IPO stage, and therefore reduce adverse selection problems in the after-market trading. However, by the same toke n bookbuilding may require larger informational rents to be paid at the IPO stage. This suggests that underpricing should be larger for IPOs carried out via bookbuilding than via a fixed-price method. Bierbaum and Grimm (2003) compare the fixed price and the uniform auction in a game theoretic framework. The comparison of the two mechanisms yields that for certain parameter values, namely a low variance of the asset and, at the same time, a sufficiently high probability of low demand, fixed price method outperforms the auction in terms of revenue. Moreover, the revenue in the fixed price mechanism is typically less volatile than the revenue in the auction. Chemmanur and Liu (2003) model the effect of costly information production on issuers choice of a fixed-price offer or a uniform-price auction with exogenous entry of bidders. Their model predicts that IPO auctions will exhibit a significantly lower mean and variance of underpricing compared to fixed- price offerings. This is due to the fact that the offering price in an IPO auction aggregates the information produced by outsiders to a significant degree, so that this offering price is greater for higher intrinsic-value firms and lower for lower intrinsic-value firms in IPO auctions than in fixed- price offerings. At the same time, there is less information production in IPO auctions compared to fixed-price offerings where the offering price is set by insiders to induce the optimal degree of information production, so that a lower amount of information is reflected in the opening price of the shares listed in the stock market. Thus, Chemmanur and Liu (2003) demonstrated that, in many situations, firms will prefer to go public using fixed-price offerings rather than IPO auctions in equilibrium, since such offerings allow the firm to induce the optimal extent of information production. Hsu and Hung (2005) present an empirical study conducted on the Taiwanese companies between 1996 and 2000. Using a sample of 280 pure fixed-price offers and 84 hybrid auctioned, authors find that, Taiwanese hybrid auctions are associated with less under-pricing and with a lower variance of under-pricing than versus the pure fixed-price offers, but these differences are not statistically different. On the other hand, we find that the market index returns prior to the IPO pricing date have a strong influence on the under-pricing of Taiwanese IPO auctions and of the pure fixed-price offers. Authors provide empirical evidence of how Taiwanese issuers make the choice of IPO method. Taiwanese issuers that float large IPOs, or which have a pricing conflict with underwriters, will likely use a hybrid auction to distribute shares. On the other hand, when the relative risk level of IPO auctions to fixed-price offers has increased, the issuers will likely avoid an IPO auction. Empirical evidenc e also explains why Taiwanese IPO auctions have lost market share to fixed-price offers. Further results reveal that Taiwanese IPO auctions are not associated with less under-pricing and with a lower variance of under-pricing, nor are they better at incorporating recent market information into the IPO price than the pure fixed-price offers. Authors examination on issuers choice of hybrid auctions or fixed-price offers indicates that Taiwanese issuers condition their choice of IPO method not only on firm characteristics, but also on IPO size and on market conditions. This is why Taiwanese issuers prefer a pure fixed-price offer to a hybrid auction are based on market volatility and the pricing conflict. In doing so, under a volatile market where Taiwanese hybrid auctions have become much riskier relative to the pure fixed-price offers, issuers will prefer a pure fixed-price offer to a hybrid auction, resulting in a lower popularity of Taiwanese hybrid auctions. As listed in Table 1, Fixed Price Offering seems to be the less favorable method comparing to Book building and Auction Methods. It is a fact that, the worldwide introduction of book building method during the 90s has promoted efficiency in the major equity markets. However, Sherman (2002) states that stock markets listing few IPOs each year, fixed price offering is still be the optimal method. 2.3. Auctions vs. Book Building and/or Fixed Price Offer Using a sample of 108 French firms marketed on the Second Marchà © between 1984 and 1991, Leleux and Paliard (1995) show that initial returns are significantly higher for firms issuing through the fixed- price procedure than for firms using auction-like procedures. Leleux and Paliard (1995) state that the auction mechanism is associated with less underpricing and thus more efficient, since this procedure is able to incorporate more information from recent market momentum into the pricing of the IPO. Beierlein (2000) compares the book-bu ilding method to two commonly used auction mechanisms, the discriminatory price auction and the uniform price auction in terms of underpricing and the long run performance of IPOs relative to the market. Using data from Japan, Israel and the U.S., author finds evidence that the U.S. book building is less efficient than the auction mechanisms are. Specifically, underpricing is significantly higher in the U.S. than it is in Japan or Israel and bookbuilding appears to incorporate less demand information into the offer price than the auction mechanisms do. Bennouri and Falconieri (2001) suggest that auction mechanisms are the optimal way to sell new shares because auction procedures are more informationally efficient than bookbuilding. Assuming ex ante uncertainty about the firm true value, then auction mechanisms are able to elicit and incorporate more information from the market as well as from investors into the pricing of IPOs. Draho (2001) suggests that underpricing in bookbuilt IPOs is due to the uncertainty about the price on the secondary market rather than about the firm value, as most of the literature assume. Nonetheless, his results indicate auction-like mechanisms as the most efficient ones, since they are open to all investors who are moreover required to submit price-quantity bids. McDonald (2001) examines the efficiency mechanisms of the sealed-bid uniform-price auctions over book building method in a theoretical framework and concludes that the uniform-price auction, due to its generalized Vickrey auction properties, is indeed an efficient auction mechanism especially for the sale of IPOs over the Internet. Biais, Bossaert, and Rochet, (2002) study the optimal IPO mechanism by which the seller can extract private information to maximize the expected net IPO proceeds. They find that the optimal mechanism they characterize is similar to auction-like IPO procedures used in the U.K. and in France. Kaneko and Pettway (2003) examine the Japanese initial returns before and after the introduction of book building, and find that underpricing in book building method is significantly higher than auctions, especially during hot markets. Results suggest that the move from auction-priced to underwriter-priced IPOs using book building in Japan has significantly reduced the wealth of issuing companies while increasing the wealth of underwriter-selected investors. Derrien and Womack (2003), use the French IPO data for the 1992-1998 period and compare the three underwriting/selling mechanisms available on the French market. One is very similar to the book building mechanism used in the United States. Another is a fixed price procedure. The third one is an auction-like procedure. Authors show that the auction procedure is better than the others at controlling underpricing in general as well as the variance of underpricing of the issued shares in â€Å"hot versus â€Å"cold markets. Fixed price offering method is indeed inefficient and leads to greater underpricing compared to IPOs sold through book-building and auctions. However, the main empirical comparison in this paper is between the two main procedures auction and book building. Authors find evidence that during hot markets auctioning is associated with less underpricing than book building. They attribute the result to the auction methods ability to incorporate more information about recent market performance into the offer price. This result provides empirical support for the theoretical work by Biais, Bossaerts, and Rochet (2002) who suggests the auction procedure is optimal. In line with the evidence of Derrien and Womack (2003) that an auction procedure is more efficient in incorporating recent market momentum in the offer price compared to fixed price procedure, Vandemaele (2003) uses the French IPO data for the 1984-1995 period and points out the factors that may influence issue procedure choice. Results indicate that, firms facing relatively high valuation uncertainty are high likely to opt for an auction-like procedure and the likelihood of opting for an auction increases as the investment bank reputation associated with the issue decreases. Although not a direct comparison between auctions, book building and fixed-price offers, studies in Pettway and Kanekos (1996) examination on Japanese auctions, Kandel, Sarig and Wohls, (1999) examination on Israeli auctions, and Liu, Wei and Liaws (2003) examination on Taiwanese auctions seem to suggest that IPO auctions lead to less under-pricing. Biais and Faugeron-Crouzet (2001) show that a uniform price auction can prevent tacit collusion among bidders and can truthfully elicit information from investors in much the same way as book building. Bulow and Klemperer (1998) also show that it can be optimal in an auction to set a price at which there is excess demand. 2.4. Research on IPOs in the Istanbul Stock Exchange (ISE) Firms in Turkey may offer their shares to the public through, book building, fixed price offer and sale through the stock exchange method, however, they are mainly underwritten and sold using the fixed- price offering method; a method which is very common world w ide is becoming much less common, particularly for more active markets. Recent empirical studies, focused mainly on the initial returns and under pricing, condu Email Protocol: SMTP, POP, and MIME Email Protocol: SMTP, POP, and MIME Email protocol governs the interactions between email clients and servers. An Email protocol is a standard method which is used at each end of a communication channel either server side or client side, in order to transmit information properly. User is required to use a mail client to access to the mail server, by using variety of email protocols, the mail client and server can only exchange their information with each other. Three examples of Email protocol are: Simple Mail Transfer Protocol (SMTP) Post Office Protocol(POP) Multipurpose Internet Mail Extensions(MIME) Simple Mail Transfer Protocol(SMTP) Simple Mail Transfer Protocol (SMTP) transmits electronic mail (email) within different hosts in the Department of Defense Internet protocol suite. Email servers and other mail transfer agents use SMTP to send and receive messages, while SMTP usually used by client side’s email application to send messages to the email server for relaying only. For receiving messages, client side would mostly use POP protocol which will be introduced at the next part. Examples of email client that used SMTP to send messages are webmail systems: Hotmail, Gmail and also Outlook, Microsoft Exchange and so on. SMTP listens on TCP protocol well-known port 25. Functions of SMTP: To enable the client side to send email message to a receiver (an email address which already exist), SMTP would perform the following functions: User authentication To verify the sender who is using SMTP server to send an email message has the right to do so. User notification After delivering the message to the destination, SMTP will check whether the message has been successfully delivered. If the message does not delivered successfully, SMTP notifies sender by using an error messages and the message that was not successfully delivered will be delivered back to the sender. Advantages of SMTP: Simplicity SMTP is the simplest way to send an electronic mail between various computers in a particular network. As long as there is a receiver destination and a sender who send the message, the message will be send to the destination. The message will pass through a simple process from SMTP server to an exchange server for the receiver’s computer. Quick Email Delivery As we known SMTP is the simplest way to transmit a message, email messages can be sent quickly and easily by using SMTP. As long as the condition of the mail server is good, the messages that are sent will reach to the recipients as quick as possible. Reliability When the message has failed to deliver, an error message will be sent to inform the sender and the message that failed to deliver will be sent back to the sender. In this case, sender doesn’t have to worry that the message send will failed to delivered, because when the message is failed to delivered, sender can choose to resend the message until the message is finally delivered to the recipient successfully. Limitation of SMTP: Additional administrative overhead Original SMTP identifies clients by using the IP addresses, but it is only available when the email services are provided by the same Internet server provider that supplied the connection. Therefore, an extension named†SMTP-AUTH†is required to verify the senders of the messages. Required to set up security Required expertise Post Office Protocol(POP) Post Office Protocol (POP) is a Internet standard protocol in the application layer which allows email clients to retrieve email messages from a remote mail server. Out of the versions of POP that has been developed, current standard which used in most of the client and server email communication architecture is version 3 of POP also written as POP3. POP3 server listens on TCP protocol well-known port 110. It uses the TCP/IP protocol stack for network connection and works with SMTP for end-to-end email communication. In this case, POP is responsible to â€Å"pull†the messages from the server and SMTP will â€Å"push†the messages to the server. Function of POP: Retrieve message from an ISP and whether to delete or not to delete it on the server, depends on users’ decision. Detect whether new message has arrived but not retrieving it from the server, meaning the messages will be stored at the server until the user choose to retrieve it from the server. To see whether the message is worth retrieving, POP will peek at the few sentences of the message before retrieving it. Advantages of POP: Once the messages have been retrieved to the client computer, it is visible with or without the internet connection including the attachment along with the message. User can choose whether to delete or not to delete the messages that already retrieved from the server. User can choose to save a copy of some of the important messages by choosing not to delete the messages from the POP server. Disadvantages of POP: Occupied a lot of hard disk spaces in computer as the email retrieved from the server are all store into the hard disk storage. Not accessible from other machine. Nowadays, people uses multiple devices to access to one email account, but not with POP, all messages are downloaded into one and only one PC. In order to read that specify message, user can only use the PC which used to download the messages to view it. Messages stored at local disk drive are vulnerable to data loss or even security threats. As those messages stored at local disk are deleted from the server and stored at only one PC at a time, it is more dangerous when the PC suffered virus attack or data corrupted. Multi-purpose Internet Mail Extension(MIME) MIME is an extension which allows users to use the protocol to send different kinds of data files on the Internet, for example: audio file, image file (PNG, GIF, JPEG), video or even application programs. SMTP protocol only handled ASCII text, which means, only ASCII texts can be send through the protocol. Media type of content in email is described by MIME type, some of the examples for MIME types are: Plain text: txt/plain Java applets: application/x-java-applet Adobe PDF documents: application/ pdf Advantages of MIME: Allows mail messages consists not only ASCII text. Old version of Internet email standard allows only ASCII characters messages, messages not exceed 1000 characters and so on. But with MIME, it allows additional fields for mail message by using the MIME headers that describe new types of content and organization for messages. MIME allows mail messages to consist of the following: Multiple objects in a single message. Unlimited length text messages. Other than ASCII characters, it also allows non-English messages. Message that consist multiple types of font. Application specify or even binary files. Audio, Image, Video and other multimedia attachment in the mail message. MIME header can help client PC to search for the suitable application software to open the attachment or file include in the mail messages. Disadvantages of MIME: Some compound formats are considered as an application when they are nor for example â€Å"application/pdf†. Diagrams below show how client and server send and retrieve messages via SMTP and POP protocols, also how the multipurpose internet mail extension works: How to apply the following email protocols (SMTP, POP, MIME) with ASP.NET? One way to apply the mentioned email protocols with asp.net is using System.Net namespaces. It consists of classes that provide simple programming interface for several number of network protocols, compose Email and send it, it also consist of representation of multipurpose internet mail exchange (MIME) headers. Besides, it also can access to network traffic data and peer-to-peer networking function. SMTP Inside System.Net, there is a namespace called System.Net.Mail, it contains classes that we needed which is to send email messages to a simple mail transfer protocol (SMTP) server for it to be delivered. Classes include in this namespaces are for example: an Attachment class which allowed user to add an attachment into the email, MailMessage class represents the email message that can be sent by using the SmtpClient class, while there is also a class which allowed user to send an email by using the SMTP. List of all the classes in System.Net.Mail namespace will be included in Appendix A. To actually send an email using SMTP, we will require these following items: The SMTP host server that we use to send email. A port number, which usually we use port number25. User name and password for authentication purpose. An email address of sender and recipients. The message content. Once we have accessible SMTP server, it is time to send our email message! Firstly we will need to create an empty page which consists of the example coding shown: Next we can choose to send the email to more than one person at a time, by adding email address to the â€Å"To†collection as shown below: After that we can set the name of the sender, this will be shown along with the sender email address to the recipient once the email has been received. For instance, we can do this: Next, we can use the CC and BCC fields in the email messages, for example: Other than that, we can also set priority of an email message, by using one of the method provided in the System.Net.Mail class: POP To log in to a POP server, we need to use System.Net.Sockets namespace. Classes that we can use from the System.Net.Sockets namespace are for example TcpClient and NetworkStream. Firstly, we will need a simple aspx page which consists of several textfields that allow user to enter the username and password. To initiate the connection to POP3 server, we will use the System.Net.Sockets. For example, after user enter their username and password, and then there is a on click event of the button as shown in the following header: Next, we will send the username and password to the server, and the server response will be displayed: If the username and password are valid and successfully verified by the POP server, we will get a response and then start to retrieve a list of messages from the server. We will request for using the LIST command and display each message that we loop through: At last, we need to close the connection to the server. In this case, QUIT command has come to use, and then server response will be display: MIME Similar with implementing SMTP into asp.net, we can use the classes within System.Net.Mail namespace to apply MIME into asp.net. There is one namespace called System.Net.Mime which holds the types that used to represent MIME headers. These types are use along with the types in System.Net.Mail namespace when a SmtpClient class send an email with attachment. Data of MIME is represented by Attachment class which we just mentioned in the System.Net.Mail part. Here are some example of classes included in the System.Net.Mime: For the full list of classes included in System.Net.Mime, please refer to Appendix B.
Friday, October 25, 2019
Priestleys portrayal of Inspector Goole in An Inspector Calls Essay
Consider the ways in which Priestley's portrayal of Inspector Goole and the way in which he carries out his investigation of the Birling family and Gerald Croft create dramatic interest? 'An inspector calls' was written in 1945 by J.B Priestley. The play is set in 1912 and centres on Arthur Birling, a prosperous manufacturer and his family, who are celebrating the engagement of their daughter, when they are suddenly and dramatically interrupted by the arrival of the police inspector. The inspector, investigating the suicide of a young working-class woman, uncovers each of the family's shameful secrets that link them with the young girl and her death. Priestley was a strong believer in socialism, opposing capitalism which exploits and degrades the working classes to benefit the rich. Priestley believed that whether we acknowledged it or not, we are all part of one big community and have the responsibility to look after everyone else, no matter who they are or what their status is. In 'An inspector calls' Priestley tries to highlight these beliefs and educate the audience on how they should treat one another. This message was particularly effective to the audiences of 1946 as, weary from the Second World War they were looking for change. The Inspector's quote of 'Fire, blood and anguish' refers to the 1st and 2nd World Wars, would have had great emotional impact on the audience and caused them to think more deeply into the play and Priestley's message. During the Second World War social classes were forced to mix, children were evacuated to where was safest and not according to class, all young men were forced to mix in the Trenches and on the Front Line, the women left at home were forced to all work in the factories together, al... ...ugh they are his social superiors. He is or need not be a small man but however creates an impression of massiveness and of purposefulness; this comes across in the whole atmosphere he creates. He uses many tactics such as the photograph and graphically detailed descriptions to shock both the audiences and the characters. By shocking the audience he can best get across his moral warning and by shocking the other characters he can best get them to open up to him and admit their wrongs. The Inspectors overall approach to the investigation is totally irregular, which creates dramatic interest and in some points emotional conflicts which create tension and keep the audiences attention. But even after he has left, he is still creating interest and tension as the characters try to decide whether or not he was a real inspector and in fact whether or not he was actually real.
Thursday, October 24, 2019
Forensic Psychology and the Prison Service Essay
The two programmes mentioned above have similar objectives and use comparable methods. The curriculum includes teaching problem-solving skills, perspective taking and social skills, creative thinking, moral reasoning, management of emotions, and critical reasoning’ (Blud et al, 2003). To pass through the first stage of selection for a cognitive skills programme in HM Prison Service, offenders should either have a current or previous conviction for a sexual, violent or drug-related offence, or they should demonstrate a life-style factor such as serious drug abuse or poor family relationships which indicate they may benefit from the programme. One study conducted by the Canadian Correctional Service showed that there were modest outcome effects at best, with 47% of the sample being readmitted to prison. Critics of this treatment suggest that focusing on developing compensatory strategies to repair ‘deficits’ in thinking does not allow sufficient account to be taken of the predisposition, choices, opportunities and motivations of the individual, and that it would be more useful to design interventions which focus on providing opportunities to change and develop. There are alternatives to cognitive therapy within the prison system. One of these is the therapeutic institutional regime, which has the aim of ‘providing offenders with an institutional environment that will encourage their development as members of an effective community, which may then lead to more effective participation in their community on release’ (Howitt, 2006, p. 366). The effective treatment of sex offenders originated in the behavioural therapies common in the 1960s. The treatment of sex offenders was not a priority in prison services until the last few years. Sex offenders typically have both sexual and nonsexual problems (Blackburn, 1995), so assessment needs to cover social, cognitive, affective, and physiological levels of functioning. Treatment for sexual offenders differentiates between types of offence, such as child molestation, exhibitionism, rape, and sexual assault (Hollin, 1989). Behavioural therapists consider assessment of sexual arousal patterns to be necessary. Changing deviant sexual preference is a major target of cognitive-behavioural programmes. There are a number of ways of doing this, such as covert sensitisation, shame aversion therapy, masturbatory or orgasmic reconditioning and shaping and fading (Blackburn, 1995). However, there are a number of questions over their use. For example, the assumption that deviant preference predicts re-offending remains largely untested. There are also attempts to improve social competence. Cognitive distortions are targeted in this approach. These distortions include beliefs about sex roles, rape myths, the acceptability of child-adult sex, and the minimization of harmful effects of sexual assault. According to Blackburn (1995), offenders who commit serious crimes against the person are likely to display multiple psychological dysfunctions. Blackburn states that there are four types of murderer: paranoid-aggressive; depressive; psychopathic; and over-controlled repressors (of aggression). In one study, using the MMPI (Minnesota Multiphasic Personality Inventory), Biro et al (1992) found that 49% of homicide convicts were in the hypersensitive-aggressive category. This category consists of people with the characteristic of ‘being easily offended, prone to impulsive aggressive outbursts and intolerant of frustration. They are very rigid, uncooperative and permanently dissatisfied thing things. However, the causes of antisocial behaviour in psychotic offenders are often the same as those in the non-disordered. Psychological treatment for dangerous offenders is most frequently carried out in forensic psychiatric facilities. While pharmacological treatment is frequently the best strategy for treating acute psychotic disorders, psychological interventions are a more durable alternative for emotional problems such as depression or anxiety, and are critical in rehabilitation. There are few demonstrably effective treatment or intervention programmes for adult violent offenders in maximum-security prisons, particularly for those diagnosable as psychopaths. They have very high recidivism rates and are often involved in institutional violent behaviour (Belfrage at al, ).
Tuesday, October 22, 2019
Human Cloning Essay
â€Å"What we call process is the exchange of one nuisance for another nuisance.†This quote by Henry Havelook Ellis describes the outcome of cloning that the world has seen so far and will continue to see if strict laws regulating cloning research are not set into place. Due to governmental regulations, cloning research has slowed down. If such legislations continue, the process of cloning will continue to demolish. If these laws proceed, the creation of the human race will remain in the hands of God  not in the hands of scientists. Cloning has shown few positive outcomes and many negative. Cloning research is not something of the recent past, but something that has been a controversial issue for over 50 years (Cloning). If no laws are set into place, cloning will become a major problem. It will terminate natural birth, and create a superhuman race. Cloning trends have been sporadic for over a century. Recent advancements, however, have startled many. They have cataly zed a large uprising against the continuation of cloning research. Ladies and gentleman, cloning is a problem that has sparked many fires and will continue to do so if nothing is done to stop it. Problem Humans have come a long way in the scientific field with advances in medicine and treatments for God’s ailments, but as far as playing God in order to create a human or any other animal, that is one step that humans can not handle. A clone is defined as a group of organisms, all of which are descended from a single individual through asexual reproduction, as in a pure cell culture of bacteria (Cloning). The main source of the problem, somatic cell nuclear transfer, is actually something far more complex. Somatic cell nuclear transfer is the process by which Dolly, the first mammal to be cloned, was created. DNA coming from a single cell in her mother’s egg, was fused with the mammary cell. The fused cell then developed into an embryo, which was implanted in a â€Å"surrogate†sheep. The embryo grew into a lamb, which was genetically identical to the donor sheep (The Cloning Process). This same process could be performed in a human, and a human clone would be form ed. A study of the American people states that 33% of Americans believe that cloning should be banned completely while the other 66% favor research to continue with in reason until something goes wrong (By The Numbers). This shows that Americans are willing to see what cloning has in store for us, but not willing to sacrifice human lives. Raymond Flynn, president of the National Catholic Alliance states that â€Å"Human and animal reproduction is now in the hands of men, while it rightfully belongs in the hands of God; (Human Cloning).†Even Alan Colman, the lead scientist at the Roslin Institute, states â€Å"I think it highlights more than ever the foolishness of those who want to legalize [human] reproducing cloning.†This is in response to the long and painful death of Dolly. The problem is as clear as day, cloning is not as advanced as it would need to be in order to be successful without complications and history shows us that it has been this way for years. History Cloning is not a new found technology; it has evolved slowly with additions from many top scientists in their fields to become what it has become today. With DNA work dating back hundreds of years, cloning research started over fifty years ago by Robert Briggs and Thomas King. The two scientists successfully added the nucleus of a frog embryo to a frog egg, but eventually the frog egg failed to develop so there was no clone achieved. In 1967, John Gurdon continued the research of Briggs and King and was successful, but his frog died after being alive for only a couple of days. The premature death didn’t deter cloning research for good however. In 1984, cloning took its first giant step with the first sheep being cloned by embryo cell fertilization. In 1997, Dr. Ian Wilmut, head scientists at the Roslin Institute in Scotland, successfully cloned a sheep by an adult cell, rather than the embryo cell. Cloning has come a long way from early predictions to the actual cloning and wi th this change, a large outcry of opinions has emerged (Cloning). Magnitude In a recent CNN poll, 89% of Americans thought it to be unacceptable to clone a human and 66% believed it to be wrong to clone an animal. This information comes from the news that it took the scientists who created Dolly 277 tries before they created a healthy, viable lamb. Since cloning humans is more complicated, â€Å"even more deaths and lethal birth defects can be expected during experimentation;†(Human Cloning: Religious and Ethical Debate). In the same CNN poll, 74% of humans believed that scientists were taking God’s powers into their own hands. This is the largest, second to the side affects of cloning (10%), reason that humans disagree with and are fighting hard to change. A viable argument that has been presented is if someone was to create a medicine or antibiotic to stop an illness, would it be playing God? Cloning is creating a living and breathing object, not aiding the individual to live their own life. As times goes on, more and more advances were made in the cloning research field. Although some advancements have been positive such as discovering the ability to replicate bone marrow for leukemia patients, many negative aspects, such as high mother-death rates from birth complications (1 in 3 mother cows died of complications during birth), have started to affect us at an alarming rate. Impact With cloning research, certain desirable traits can be chosen and a superhuman race could be created. Imagine a world with women having attributes of the most gorgeous woman, and men having the attributes of the most handsome man. This could make for a very dull and boring world due to the lack of variation in physical appearances. Physical traits are not the only possibility for change. Diseases could be wiped out. According to the 2002 World Almanac, nine out of the top ten causes of death in the world are genetics related and 52,606,687.5 humans die of these various causes (Top Killers). A question is posed, what would happen if those 52,606,687.5 humans were still living and more humans were being born at a rate of 14.1 babies for every thousand humans (Against Human Cloning)? Poverty rates (19%) would rise at a considerable rate due to the fact of over crowdedness in our metropolitan areas. At time of publication, there were 6,275,919,702 humans on earth (By The Numbers). With this information, the new number including the humans that would still be alive because the void of disease and birth, after simple math would be 6,328,526,389.5. With this number, you can calculate the new amount of humans that would be living in poverty at the same rate (19% [NCPA]) in 1998 would be 1,202,420,014 humans in comparison to 1,192,850,491. That is an addition of 9,569,523 humans that will be suffering from malnutrition and poor living conditions. Death is God’s way of population control and if it is your time to go, then it’s your time to go and if these diseases were still around, then these figures would become fact, rather than simple math problems. Cloning research and public opinion have been factors of each other ever since the first idea of cloning emerged. As new research comes out, people begin to become excited, but as the research becomes more detailed, the general public begins to shy away from the idea. Trends In the beginning, cloning research was so new, no one really knew anything about it, but people were curious so public opinion was high (73%) in the hopes of a breakthrough. After President Clinton halted all federal funds to aide in the research of cloning, public opinion began to decrease to 17% (Clinton). This shows that the public follows the government in their efforts to seize a program. From the information that has been gathered, many solutions are possible, and hopefully some will come into affect. Problem Solution Costs The costs standards should be measure on the fact that it costs $1,700,000 to clone a human and up to $1,000,000 to clone an animal (By The Numbers). This is a very high price for the chance to have a replica of yourself or any other human being. The chance that an embryo will take is 1:1000, so the costs of running tests on each embryo can add up quickly (What Would A Human Clone Be Like). The costs should be as minimal as possible. Ethics The problem solution should be measured by the quality of life in the world from cloning. Since our numbers for poverty are high enough already, adding more to the human race could only add to the problems faced in the world today. Another ethical argument proposed by opponents is that cloning encourages parents to value their children according to how well they meet expectations, instead of loving them for their own sake. This would cause stress to the clone themselves and with suicide rates in America reaching almost 30,000 (Top Killers) , this would also add to the problems. Humans should also not have to worry about having a superhuman race. With a superhuman race, there would be no diversity. Diversity is what the world, America especially, runs on and if diversity was void, then the world be mundane. The ethical standards play a large part in the forming of a solution, but the largest part is if it can actually happen (Ethics). Feasibility The problem solution should be measured by what changes the world would have to endure because of cloning. Having mass produced children isn’t too far away from reality, but it will never be accepted because there is such a strong religious backbone to our country. Something needs to be done, if not, the world would be in turmoil due to the fact that there would be no disease and diversity. The solution needs to be something that the majority of Americans can agree on, whether that is a total ban or just a partial ban. A key step to a solution was already set into place in 1997 when President Bill Clinton set a ban into place on all federal funds going towards human cloning. As these standards have been set, many possible solutions could come about. Some solutions seem to be far fetched, but some are quite possible. The following is an explanation of possible null, extreme, and moderated solutions to cloning. Alternatives Null By leaving things as they are, nothing will be accomplished. The costs will still continue to be high even though the federal government will still give out federal grants to the research for cloning. The ethics behind the null alternative will be the same. Humans will still have the to worry about the fact that government legislation could be overturned and cloning could become legal. Even though human cloning seems farther away than the cloning of animals, researchers will still be able to continue in their quest for the perfect cloning process. The feasibility of this is actually very easy. The world will still continue to pursue cloning research, but still without federal aide. If the chance to continue on researching is still there, then many possible outcomes could happen such as a superhuman race and the void of diversity. Extreme An extreme stand on the cloning issue is that of making all research and practicing of cloning an offense punishable by death. There would be no costs coming from the cloning standpoint, but the prosecution standpoint would have great costs. When a researcher is found and enough evidence is present, then the researcher would be put into a chair and have a gun pointed to their head and killed. Their organs would be given to the ones that need it. This is not ethical what so ever, but it would cut down on the amount of research at an extreme rate. The human race would become scared and bitter towards the governmental body that is overseeing such a horrible act so the quality of life would start to diminish. Americans especially would never stand for this type of punishment because of their belief in the Bill of Rights, Amendment V and VI. The only ethical part would be that a family would still have its roots and nothing would be changed. Is this solution truly feasible? No, it will never happen. Humans do not see this as a viable plan of action. It would massively change the world in the way humans think about the government and how humans deal with controversial issues. This is an example of a policy that Saddam would be running under his government, and the world is seeing what his people are thinking about him. Moderate The moderate view of cloning would be to only allow research that has been federally approved. The costs for allowing this could get out of line with corrupt practices asking for more and more money to create a human clone. The costs would have to be raised because that would cut down on the affordability for the average human being. Instead of having a human clone cost $1,700,000, the cost would need to be around $20,000,000. The price jack would also benefit the technology aspect in that there is more money to be spent to improve the already existing technology. There would also be a surge in groups’ attempting to be the first group to have a successful clone. The ethical standpoint would not be able to change no matter what happens. No one will ever be happy. This solution will not diminish the quality of life in the world due to the fact that it will raise awareness of the problem at hand, but still allow for a technological breakthrough. The feasibility of having government control over who can research and practice cloning is very possible. Changes would have to be made to the government to include very strict laws for those who are trying to break the law, but other than that, it would be a simple transition from free cloning to government regulated cloning. There would be some organization towards it, but there would still be the possibility of corruptness from either the researcher or the government such as bribery and black mail. Recommended Moderate Alternative The best view that would be the most cost effective, ethical, and feasible would be one where government would place bans on the rights of scientists who practice and research cloning. Since there is going to be government control, the government has the right to pull the plug on any project that seems to be getting out of control. It would still be cost affective because all money would have to come from outside sources that have already been previously approved by the federal government. The only money that would be spent by the government would be on prosecution of researchers who have continued work after their programs has been seized or those who don’t receive government approval. The punishments would run from heavy fines to jail time, depending on the severity of the offense. The ethical standpoint will never be totally ethical because many see that it is wrong to create a human being not through sexual intercourse. The ethical part of the solution would be that the government still has control over what goes on. This solution is also very feasible. Giving the government control over cloning research could be very easily done. Many might disagree that this solution would be feasible, but there is always a possibility of a permanent ban on all research. These solutions are only going to work if people put their mind to it and work at it. These issues will stop dead in the tracks if something is done but if not; it will continue to spiral until becoming out of control. Conclusion Cloning research has become a major part in our technology-driven society. If legislation is not passed to control cloning, the negative outcomes of cloning will continue to culminate. The history of cloning shows that there are many problems to be solved in the cloning process, yet cloning advancements are growing at a rapid pace – while the problems are left unresolved. With these advancements, a human’s undesired qualities will become a thing of the past and super-human races will start to evolve. Public opinion and the problem will continue to grow until legislation is passed. A final thought, do humans want a society that is a copy of the previous generation? Bibliography â€Å"By The Numbers: Human Cloning.†Issues and Controversies On File, FACTS.com. January 29, 2003. . â€Å"Cloning.†Issues and Controversies On File, FACTS.com. January 29, 2003. . Ethics of Human Cloning, The. Cass, Leon R. AEI Press. Washington, DC. 1998. â€Å"Human Cloning.†Issues and Controversies On File, FACTS.com. January 29, 2003. . â€Å"Human Cloning Is Wrong According to America.†CNN.com. January 29, 2003. < http://www.cnn.com/TECH/9703/01/clone.poll/index.html> â€Å"What Would A Human Clone Be Like?†Issues and Controversies On File, FACTS.com. January 29, 2003. . â€Å"Clinton Bans Funds for Human Cloning.†CNN.com. March 20, 2003. http://www.cnn.com/TECH/9703/04/clinton.cloning/ â€Å"Against Human Cloning.†BBC.com. April 7, 2003. http://www.bbc.co.uk/religion/ethics/cloning/clonesdanger.shtml â€Å"Human Cloning.†Virginia.edu, April 7, 2003. http://www.cs.virginia.edu/~jones/tmp352/projects98/group1/home.html â€Å"Top Killers.†Aerobic Gardening.com, April 7, 2003. http://www.ritecode.com/aerobicgardening/topkill.html.
Subscribe to:
Posts (Atom)