SlideShare a Scribd company logo
Running head: S.1494-SECURE AND PROTECT ACT OF
20191
S.1494-SECURE AND PROTECT ACT OF 20193
S.1494-Secure and Protect Act Of 2019
Student’s Name
Institutional Affiliation
S.1494-Secure and Protect Act of 2019
Problem ID and
Solution
President Donald Trump has not provided a roadmap for re-
establishing the U.S. refugee and asylum systems. The refugee
crisis is an international issue, and the U.S. should embrace
becoming a global humanitarian leader on the disaster. In
response, a S.1494-Secure and Protect Act of 2019 bill aims to
prevent and respond to the U.S. government’s decisions and
tries to close the U.S. openings for refugees and asylum-seekers
(S. 1494 — 116th Congress, 2019). The bill will ensure the
amendment of the William Wilberforce Trafficking Victims
Protection Reauthorization Act of 2008 to shield alien juveniles.
Also, a review of the Immigration and Nationality Act will
ensure no more oppression of the asylum-seekers system as well
as building refugee application and clearance bodies outside the
country. It gives a vision for responding to the global refugee
crisis as well as restoring the U.S. humanitarian lost glory under
Donald Trump. Senator Graham Lindsey of South Carolina
introduced the bill on May 15, 2019, in Congress.
CAN Analysis
Biblical Guidelines
Efforts to undermine the country's programs for refugees and
asylum is an injustice issue. The government is always
responsible for the safeguarding the rights of refugees and
asylum-seekers according to the fundamental right for refugees
which is the right not to be subject to oppression, established in
Article 33 of the 1951 Convention (Erickson, 2019). The
biblical teachings provide guidelines in evaluation of the U.S.
government's refugee issues, Muslim ban, and the border wall
(McDowell, 2008). The Bible brings out an obligation to treat
strangers with dignity and hospitality. In Deuteronomy 23:15-
16, the Bible says, "You shall not hand over to his master a
slave who has escaped from his master to you…" Also, Acts
18:2 says, "And he found a Jew named Aquila, a native of
Pontus, recently having come from Italy with his wife Priscilla
because Claudius had commanded all the Jews to leave Rome,"
“Fincham, 2018). As per Scriptures, it is a government's
responsibility to protect the rights and interests of refugees and
asylum-seekers.
The Constitutional Guidelines
The Refugee Act of 1980 passed in the Congress in the United
States gives legal grounds for the current U.S. Refugee
Admission Program. President Jimmy Carter signed the Act into
legislation on March 17, 1980. The law provides a permanent
and systematic process for admitting refugees of particular
humanitarian interest to the U.S. and offers comprehensive and
equal provisions for the immediate absorption and resettlement
of refugees and asylum.
Political
The bill is at its introduction stage and was tabled in the Senate
on May 15, 2019. It was read two times in the Senate and
presented to the judiciary committee and placed on Senate
Legislative Calendar under General Orders, Calendar No. 181.
On August 16, 2019. Its sponsors are Senators Lindsey Graham
and Marthe Mc Sally. The Republican party under the influence
of Senator Graham supports the passage of the bill. According
to Skopos Labs, the bill has a 3% chance of being enacted into
law (S. 1494 — 116th Congress, 2019). The bill is likely not to
pass in the Senate because at initial stages, it has only one co-
sponsor, Sally. Approximately 154 organizations have opposed
the bill by writing to the Senate Judiciary Committee to vote no
(Menkel-Meadow, 2019). Organizations have instead suggested
for human reforms to tackle the issues raised by Senator
Graham. There are challenges in meeting the quorum to hold
over a bill. According to Judiciary Committee Ranking Member,
Dianne Feinstein, the committee cannot transact any business
when there is insufficient attendance. For instance, at least
seven Senators from the majority wing and two from the
minority are required to meet the quorum.
Financial
If the bill is enacted into law, it will increase the U.S. national
debt because it means more people will enter the U.S. as
refugees and others apply for asylum. The registered asylum-
seekers will need food, shelter, and accommodation. They will
also force the U.S. government to spend more on healthcare
services and education since their children will need access to
schooling. The proposed bill removes barriers for people
seeking refuge in the U.S. Approximately €10 000 will be used
for application and accommodation of one asylum-seeker
(OECD, 2016). These expenses are high compared to what the
refugees and asylum-seekers economically contribute to the
United States. So, the bill is not worth the amount the
government will use in registration, reception, and emergency
support.
Practical
The bill sponsor is required to report the bill under the authority
of the order of the Senate. Two chambers (the House and
Senate) are required. The Senate Judiciary Committee to vote
for the bill in the Senate at its initial stages. The committee
must have at least seven senators from the majority group and
two from the minority. The U.S. president is required to sign
the bill into law after it passes in both houses, the Senate and
the House of Representatives. Some of the challenges witnessed
in the bill passage include a lack of democratic legitimacy
(Menkel-Meadow, 2019). This problem is evident during voting,
whereby a lack of democratic accountability in both chambers
may persist. The bill must under the following steps in both
houses before it becomes law;
Bill Introduction
Any member can introduce the proposed legislation. The person
who does the bill is called a sponsor. In the Senate, a bill is
assigned S. to indicate a Senate bill while in the House, carries
H.R. to show the House bill.
Committee Action
A concerned committee chairperson states whether there will be
a bill proceedings or markup. These two elements involve
debate, an amendment, and rewriting.
Committee Report
A committee chair prepares a bill’s report with a description of
the law, legislation history, effect on outstanding legislation,
and the decision of the committee’s majority members.
Floor Debate and Votes
House’s speaker and the Senate’s Majority Leader determines
the date when the bill will be debated or amended in their
respective floors.
Referral to the Other Chamber
After the proposed law passage in the Senate or the House, it is
presented to another chamber to have the same channel through
the committee and debate action.
Conference on a Bill
If one chamber makes minor alterations to a bill, the law goes
back to the originating chamber for a concurring vote.
Action by the President
After the approval of the conference report by both chambers,
the final proposed legislation is presented to the head of the
state. If the president affirms the proposed legislation, he signs
it into law. If he does not respond within ten days, the propose
legislation automatically becomes a law.
SHOULD Analysis
Graham’s bill will not go past the Senate. This stuck means the
end of the bill at its early stages. The majority the Senate
Judiciary Committee does not attend the bill’s proceedings
meaning they do not support the bill. Also, the bill undermines
president Trump’s directive of building the wall at the border.
Trump has a majority in the Senate, a clear indication that the
bill receives strong opposition. It has only one co-sponsor thus
the current support for the bill cannot make it pass. Most of the
politicians allied to president Trump and over 154 organizations
term the bill as cruel. They view it as not a real solution to a
humanitarian crisis at the U.S. border. According to the director
of Federal Advocacy for the Immigration Hub, Kerri Talbot, the
bill is likely to fuel more chaos and cruelty in the asylum
system. Summarily, the crucial stakeholders view the bill from a
negative perspective and may use corrupt strategies to
undermine democratic legitimacy when voting for the bill to
make sure it does not attract the majority votes supporting it.
References
Fincham, K. (2018). The King James bible: crown, church and
people. The Journal of Ecclesiastical History, 1-21.
McDowell, S. K., & Beliles, M. A. (2008). Liberating the
nations: Biblical principles of government, education,
economics & politics (Vol. 5). Providence Foundation.
Menkel-Meadow, C. (2019). Negotiating the American
Constitution (1787-1789) Coalitions, Process Rules, and
Compromises. Landmark Negotiations from Around the World:
Lessons for Modern Diplomacy (Emmanuel Vivet, editor,
Intersentia 2019.).
Musalo, K. (2019). Evolution of Refugee and Asylum Law in
the United States. Refugees and Asylum Seekers:
Interdisciplinary and Comparative Perspectives, 17.
S. 1494 — 116th Congress (2019). Secure and Protect Act of
2019.” www.GovTrack.us.
https://www.govtrack.us/congress/bills/116/s1494
Google, Apple, and Facebook Battle for Your Internet
Experience
Three Internet titans—Google, Apple, and Facebook—are in an
epic struggle to dominate your Internet experience, and caught
in the crossfire are search, music, video, and other media along
with the devices you use for all of these things. Mobile devices
with advanced functionality and ubiquitous Internet access are
rapidly overtaking traditional desktop machines as the most
popular form of computing. Today, people spend more than half
their time online using mobile devices that take advantage of a
growing cloud of computing capacity. It’s no surprise, then, that
today’s tech titans are aggressively battling for control of this
brave new online world.
Apple, which started as a personal computer company, quickly
expanded into software and consumer electronics. Since
upending the music industry with its iPod MP3 player, and the
iTunes digital music service, Apple took mobile computing by
storm with the iPhone, iPod Touch, and iPad. Now Apple wants
to be the computing platform of choice for the Internet.
Apple’s competitive strength is based not on its hardware
platform alone but on its superior user interface and mobile
software applications, in which it is a leader. Apple’s App Store
offers more than 2 million apps for mobile and tablet devices.
Applications greatly enrich the experience of using a mobile
device, and whoever creates the most appealing set of devices
and applications will derive a significant competitive advantage
over rival companies. Apps are the new equivalent of the
traditional browser.
Apple thrives on its legacy of innovation. In 2011, it unveiled
Siri (Speech Interpretation and Recognition Interface), a
combination search/navigation tool and personal assistant. Siri
promises personalized recommendations that improve as it gains
user familiarity—all from a verbal command. Google countered
by quickly releasing its own AI tool, Google Now. Facebook
has developed an intelligent assistant called M.
Apple faces strong competition for its phones and tablets both
in the United States and in developing markets like China from
inexpensive Chinese smartphones and from Samsung Android
phones that have larger screens and lower prices. iPhone sales
have started to slow, but Apple is not counting on hardware
devices alone for future growth. Services have always played a
large part in the Apple ecosystem, and they have emerged as a
major revenue source. Apple has more than 1.3 billion active
devices in circulation, creating a huge installed base of users
willing to purchase services and a source of new revenue
streams. Apple’s services business, which includes Apple’s
music (both downloads and subscriptions), video sales and
rentals, books, apps (including in-app purchases, subscriptions
and advertising), iCloud storage, and payments, has been
growing at a double-digit rate.
As Apple rolls out more gadgets, such as the Watch and
HomePod, its services revenue will continue to expand and
diversify. According to CEO Tim Cook, Apple has become one
of the largest service businesses in the world. This service-
driven strategy is not without worry because both Google
and Facebook offer stiff competition in the services area.
Google continues to be the world’s leading search engine,
accounting for about 75 percent of web searches from laptop
and desktop devices and over 90 percent of the mobile search
market. (Google is also the default search engine for the
iPhone). About 84 percent of the revenue from Google’s parent
company Alphabet comes from ads, most of them on Google’s
search engine. Google dominates online advertising. However,
Google is slipping in its position as the gateway to the Internet.
New search startups focus on actions and apps instead of the
web. Facebook has become an important gateway to the web as
well. In 2005, Google had purchased the Android open source
mobile operating system to compete in mobile computing.
Google provides Android at no cost to smartphone
manufacturers, generating revenue indirectly through app
purchases and advertising. Many different manufacturers have
adopted Android as a standard. In contrast, Apple allows only
its own devices to use its proprietary operating system, and all
the apps it sells can run only on Apple products. Android is
deployed on over 80 percent of smartphones worldwide; is the
most common operating system for tablets; and runs on watches,
car dashboards, and TVs—more than 4,000 distinct devices.
Google wants to extend Android to as many devices as possible.
Google’s Android could gain even more market share in the
coming years, which could be problematic for Apple as it tries
to maintain customer loyalty and keep software developers
focused on the iOS platform. Whoever has the dominant
smartphone operating system will have control over the apps
where smartphone users spend most of their time and built-in
channels for serving ads to mobile devices. Although Google
search technology can’t easily navigate the mobile apps where
users are spending most of their time, Google is starting to
index the content inside mobile apps and provide links pointing
to that content featured in Google’s search results on
smartphones. Since more than half of global search queries
come from mobile devices, the company revised its search
algorithms to add “mobile friendliness” to the 200 or so factors
it uses to rank websites on its search engine. This favors sites
that look good on smartphone screens. The cost-per-click paid
for mobile ads has trailed desktop ads, but the gap between
computer and mobile ads fees is narrowing. Google instituted a
design change to present a cleaner mobile search page.
Seven Google products and services, including Search,
YouTube, and Maps, have more than a billion users each. The
Android operating system software has over 2 billion monthly
active users. Google’s ultimate goal is to knit its services and
devices together so that Google users will interact with the
company seamlessly all day long and everyone will want to use
Google. Much of Google’s efforts to make its search and related
services more powerful and user-friendly in the years ahead are
based on the company’s investments in artificial intelligence
and machine learning (see Chapter 11). These technologies
already have been implemented in applications such as voice
search, Google Translate, and spam filtering. The goal is to
evolve search into more of a smart assistance capability, where
computers can understand what people are saying and respond
conversationally with the right information at the right moment.
Allo is a smart messaging app for iOS and Android that can
learn your texting patterns over time to make conversations
more expressive and productive. It suggests automatic replies to
incoming messages, and you can get suggestions and even book
a restaurant reservation without leaving the chat. Google
Assistant is meant to provide a continuing, conversational
dialogue between users and the search engine.
Facebook is the world’s largest social networking service, with
over 2 billion monthly active users. People use Facebook to stay
connected with their friends and family and to express what
matters most to them. Facebook Platform enables developers to
build applications and websites that integrate with Facebook to
reach its global network of users and to build personalized and
social products. Facebook is so pervasive and appealing that it
has become users’ primary gateway to the Internet. For a lot of
people, Facebook is the Internet. Whatever they do on the
Internet is through Facebook.
Facebook has persistently worked on ways to convert its
popularity and trove of user data into advertising dollars, with
the expectation that these dollars will increasingly come from
mobile smartphones and tablets. As of early 2018, over 95
percent of active user accounts worldwide accessed the social
network via smartphone. Facebook ads allow companies to
target its users based on their real identities and expressed
interests rather than educated guesses derived from web-
browsing habits and other online behavior.
At the end of the first quarter of 2018, 98 percent of Facebook’s
global revenue came from advertising, and 89 percent of that ad
revenue was from mobile advertising. Many of those ads are
highly targeted by age, gender, and other demographics.
Facebook is now a serious competitor to Google in the mobile
ad market and is even trying to compete with emerging mobile
platforms. Together, Facebook and Google dominate the digital
ad industry and have been responsible for almost all of its
growth. Facebook has overhauled its home page to give
advertisers more opportunities and more information with which
to target markets. The company is expanding advertising in
products such as the Instagram feed, Stories, WhatsApp,
Facebook Watch, and Messenger, although the majority of ad
revenue still comes from its news feed. Facebook has its own
personalized search tool to challenge Google’s dominance of
search. Facebook CEO Mark Zuckerberg is convinced that
social networking is the ideal way to use the web and to
consume all of the other content people might desire, including
news and video. That makes it an ideal marketing platform for
companies. But he also knows that Facebook can’t achieve long-
term growth and prosperity based on social networking alone.
During the past few years Facebook has moved into virtual
reality, messaging, video, and more.
Facebook is challenging YouTube as the premier destination for
personal videos, developing its own TV programming, and
making its messages “smarter” by deploying chatbots. Chatbots
are stripped-down software agents that understand what you
type or say and respond by answering questions or executing
tasks, and they run in the background of Facebook’s Messenger
service (see Chapter 11). Within Facebook Messenger, you can
order a ride from Uber, get news updates, check your flight
status, or use augmented reality to imagine what a new Nike
sneaker looks like by superimposing a 3-D model of that
sneaker atop images or video. A new standalone app will allow
users to stream videos in their news feed through set-top boxes
such as Apple Inc.’s Apple TV and Amazon.com Inc.’s Fire TV,
as well as Samsung Internet-connected TVs.
Zuckerberg has said that he intends to help bring the next
billion people online by attracting users in developing countries
with affordable web connectivity. Facebook has launched
several services in emerging markets, such as the Free Basics
service designed to get people online so they can explore web
applications, including its social network. Facebook wants to
beam the Internet to underserved areas through the use of
drones and satellites along with other technologies. Zuckerberg
thinks that Facebook could eventually be an Internet service
provider to underserved areas.
Monetization of personal data drives both Facebook and
Google’s business models. However, this practice also threatens
individual privacy. The consumer surveillance underlying
Facebook and Google’s free services has come under siege from
users, regulators, and legislators on both sides of the Atlantic.
Calls for restricting Facebook and Google’s collection and use
of personal data have gathered steam, especially after recent
revelations about Russian agents trying to use Facebook to sway
American voters and Facebook’s uncontrolled sharing of user
data with third-party companies (see the Chapter 4 ending case
study). Both companies will have to come to terms with the
European Union’s new privacy law, called the General Data
Protection Regulation (GDPR), that requires companies to
obtain consent from users before processing their data, and
which may inspire more stringent privacy legislation in the
United States. Business models that depend less on ads and
more on subscriptions have been proposed, although any effort
to curb the use of consumer data would put the business model
of the ad-supported Internet—and possibly Facebook and
Google—at risk. Apple emphasizes its privacy protection
features and does not share customer data with others.
These tech giants are also being scrutinized for monopolistic
behavior. In the United States, Google drives 89 percent of
Internet search, 95 percent of young adults on the Internet use a
Facebook product, and Google and Apple provide 99 percent of
mobile phone operating systems. Critics have called for
breaking up these mega-companies or regulating them as
Standard Oil and AT&T once were. In July 2018 European
regulators fined Google $5 billion for forcing cellphone makers
that use the company’s Android operating system to install
Google search and browser apps. Have these companies become
so large that they are squeezing consumers and innovation?
How governments answer this question will also affect how
Apple, Google, and Facebook will fare and what kind of
Internet experience they will be able to provide.
How Secure Is the Cloud?
Over the last several years, many companies have altered their
IT strategies to shift an increasing share of their applications
and data to public-cloud infrastructure and platforms. However,
using the public cloud disrupts traditional cybersecurity models
that many companies have built up over years. As a result, as
companies make use of the public cloud, they need to revise
their cybersecurity practices in order to consume public-cloud
services in a way that enables them both to protect critical data
and to fully exploit the speed and agility that these services
provide.
Managing security and privacy for cloud services is similar to
managing traditional IT infrastructures. However, the risks may
be different because some, but not all, responsibilities shift to
the cloud service provider. The category of cloud service (IaaS,
PaaS, or SaaS) affects exactly how these responsibilities are
shared. For IaaS, the provider typically supplies and is
responsible for securing basic IT resources such as machines,
storage systems, and networks. The cloud services customer is
typically responsible for its operating system, applications, and
corporate data placed into the cloud computing environment.
This means that most of the responsibility for securing the
applications and the corporate data falls on the customer.
Cloud service customers should carefully review their cloud
services agreement with their cloud provider to make sure their
applications and data hosted in cloud services are secured in
accordance with their security and compliance policies. But
that’s not all. Although many organizations know how to
manage security for their own data center—they’re unsure of
exactly what they need to do when they shift computing work to
the cloud. They need new tool sets and skill sets to manage
cloud security from their end to configure and launch cloud
instances, manage identity and access controls, update security
controls to match configuration changes, and protect workloads
and data. There’s a misconception among many IT departments
that whatever happens in the cloud is not their responsibility. It
is essential to update security requirements developed for
enterprise data centers to produce requirements suitable for the
use of cloud services. Organizations using cloud services often
need to apply additional controls at the user, application, and
data level.
Cloud service providers have made great strides in tightening
security for their areas of responsibility. Amazon’s security for
its cloud service leaves little to chance. The company keeps
careful constraints around its staff, watches what they do every
day, and instructs service teams to restrict access to data
through tooling and automation. Amazon also rotates security
credentials for authentication and verification of identity and
changes them frequently—sometimes in a matter of hours.
The biggest threats to cloud data for most companies involve
lack of software patching or misconfiguration. Many
organizations have been breached because they neglected to
apply software patches to newly identified security
vulnerabilities when they became available or waited too long
to do so. (See the discussion of patch management earlier in this
chapter.) Companies have also experienced security breaches
because they did not configure aspects of cloud security that
were their responsibility. Some users forget to set up AWS
bucket password protection. (A bucket is a logical unit of
storage in Amazon Web Services [AWS] Simple Storage

More Related Content

More from todd521

Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
todd521
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
todd521
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
todd521
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
todd521
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
todd521
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
todd521
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
todd521
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
todd521
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
todd521
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
todd521
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
todd521
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
todd521
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
todd521
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
todd521
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
todd521
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
todd521
 
Running head SCHIZOPHRENIA .docx
Running head SCHIZOPHRENIA                                       .docxRunning head SCHIZOPHRENIA                                       .docx
Running head SCHIZOPHRENIA .docx
todd521
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
todd521
 
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docxRunning head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
todd521
 
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docxRunning head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
todd521
 

More from todd521 (20)

Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docxRunning Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
Running Head Sherry’s Personal Leadership Plan1Sherry’s P.docx
 
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docxRunning Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
Running Head SHARING CLINICAL DATASHARING CLINICAL DATA.docx
 
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docxRunning head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
Running head SERIAL KILLER-JEFFREY DAHMER1SERIAL KILLER.docx
 
Running Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docxRunning Head Sexuality education in schoolsSexuality .docx
Running Head Sexuality education in schoolsSexuality .docx
 
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docxRunning Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
Running Head SEXUALLY TRANSMITTED DISEASESSEXUALLY TRANSMIT.docx
 
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docxRunning head SETTING UP RESEARCH1  Chapter 6 Methods of Measu.docx
Running head SETTING UP RESEARCH1 Chapter 6 Methods of Measu.docx
 
Running head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docxRunning head SEx as a protected class 1SEx as a protected clas.docx
Running head SEx as a protected class 1SEx as a protected clas.docx
 
Running head SETTING UP COMPANY 1SETTING UP .docx
Running head SETTING UP COMPANY                 1SETTING UP .docxRunning head SETTING UP COMPANY                 1SETTING UP .docx
Running head SETTING UP COMPANY 1SETTING UP .docx
 
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docxRunning head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
Running head SERVING LEARNING ORGANIZATION ROUGH DRAFT1SERVI.docx
 
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docxRunning Head SETTING A BUDGET1SETTING A BUDGET 6.docx
Running Head SETTING A BUDGET1SETTING A BUDGET 6.docx
 
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docxRunning Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
Running Head SERVANT LEADERSHIP1SERVANT LEADERSHIP2.docx
 
Running Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docxRunning Head Security Technologies IdentifiedProject .docx
Running Head Security Technologies IdentifiedProject .docx
 
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docxRunning head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
Running head SELECTING RESEARCH DIRECTION AND QUESTIONS1SELE.docx
 
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docxRunning head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
Running head SELF-INJURIOUS BEHAVIOR 1SELF-INJURIOUS BEHAVIO.docx
 
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docxRunning Head SECURITY MODEL 1SECURITY MODEL 7.docx
Running Head SECURITY MODEL 1SECURITY MODEL 7.docx
 
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docxRunning head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
Running head SECURITY MECHANISM1SECURITY MECHANISM 2.docx
 
Running head SCHIZOPHRENIA .docx
Running head SCHIZOPHRENIA                                       .docxRunning head SCHIZOPHRENIA                                       .docx
Running head SCHIZOPHRENIA .docx
 
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docxRunning head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
Running head SECURE VPN CONNECTIONS1SECURE VPN CONNECTION.docx
 
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docxRunning head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
Running head SAMPLE Unit 2 Legacy of the American Revolution Assi.docx
 
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docxRunning head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
Running head SECONDARY SOURCE INTEGRATION1SECONDARY SOURCE I.docx
 

Recently uploaded

Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 

Recently uploaded (20)

Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 

Running head S.1494-SECURE AND PROTECT ACT OF 20191S.1494-S.docx

  • 1. Running head: S.1494-SECURE AND PROTECT ACT OF 20191 S.1494-SECURE AND PROTECT ACT OF 20193 S.1494-Secure and Protect Act Of 2019 Student’s Name Institutional Affiliation S.1494-Secure and Protect Act of 2019 Problem ID and
  • 2. Solution President Donald Trump has not provided a roadmap for re- establishing the U.S. refugee and asylum systems. The refugee crisis is an international issue, and the U.S. should embrace becoming a global humanitarian leader on the disaster. In response, a S.1494-Secure and Protect Act of 2019 bill aims to prevent and respond to the U.S. government’s decisions and tries to close the U.S. openings for refugees and asylum-seekers (S. 1494 — 116th Congress, 2019). The bill will ensure the amendment of the William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 to shield alien juveniles. Also, a review of the Immigration and Nationality Act will ensure no more oppression of the asylum-seekers system as well as building refugee application and clearance bodies outside the country. It gives a vision for responding to the global refugee crisis as well as restoring the U.S. humanitarian lost glory under Donald Trump. Senator Graham Lindsey of South Carolina introduced the bill on May 15, 2019, in Congress. CAN Analysis Biblical Guidelines Efforts to undermine the country's programs for refugees and
  • 3. asylum is an injustice issue. The government is always responsible for the safeguarding the rights of refugees and asylum-seekers according to the fundamental right for refugees which is the right not to be subject to oppression, established in Article 33 of the 1951 Convention (Erickson, 2019). The biblical teachings provide guidelines in evaluation of the U.S. government's refugee issues, Muslim ban, and the border wall (McDowell, 2008). The Bible brings out an obligation to treat strangers with dignity and hospitality. In Deuteronomy 23:15- 16, the Bible says, "You shall not hand over to his master a slave who has escaped from his master to you…" Also, Acts 18:2 says, "And he found a Jew named Aquila, a native of Pontus, recently having come from Italy with his wife Priscilla because Claudius had commanded all the Jews to leave Rome," “Fincham, 2018). As per Scriptures, it is a government's responsibility to protect the rights and interests of refugees and asylum-seekers. The Constitutional Guidelines The Refugee Act of 1980 passed in the Congress in the United States gives legal grounds for the current U.S. Refugee Admission Program. President Jimmy Carter signed the Act into legislation on March 17, 1980. The law provides a permanent and systematic process for admitting refugees of particular humanitarian interest to the U.S. and offers comprehensive and equal provisions for the immediate absorption and resettlement
  • 4. of refugees and asylum. Political The bill is at its introduction stage and was tabled in the Senate on May 15, 2019. It was read two times in the Senate and presented to the judiciary committee and placed on Senate Legislative Calendar under General Orders, Calendar No. 181. On August 16, 2019. Its sponsors are Senators Lindsey Graham and Marthe Mc Sally. The Republican party under the influence of Senator Graham supports the passage of the bill. According to Skopos Labs, the bill has a 3% chance of being enacted into law (S. 1494 — 116th Congress, 2019). The bill is likely not to pass in the Senate because at initial stages, it has only one co- sponsor, Sally. Approximately 154 organizations have opposed the bill by writing to the Senate Judiciary Committee to vote no (Menkel-Meadow, 2019). Organizations have instead suggested for human reforms to tackle the issues raised by Senator Graham. There are challenges in meeting the quorum to hold over a bill. According to Judiciary Committee Ranking Member, Dianne Feinstein, the committee cannot transact any business when there is insufficient attendance. For instance, at least seven Senators from the majority wing and two from the minority are required to meet the quorum. Financial If the bill is enacted into law, it will increase the U.S. national debt because it means more people will enter the U.S. as
  • 5. refugees and others apply for asylum. The registered asylum- seekers will need food, shelter, and accommodation. They will also force the U.S. government to spend more on healthcare services and education since their children will need access to schooling. The proposed bill removes barriers for people seeking refuge in the U.S. Approximately €10 000 will be used for application and accommodation of one asylum-seeker (OECD, 2016). These expenses are high compared to what the refugees and asylum-seekers economically contribute to the United States. So, the bill is not worth the amount the government will use in registration, reception, and emergency support. Practical The bill sponsor is required to report the bill under the authority of the order of the Senate. Two chambers (the House and Senate) are required. The Senate Judiciary Committee to vote for the bill in the Senate at its initial stages. The committee must have at least seven senators from the majority group and two from the minority. The U.S. president is required to sign the bill into law after it passes in both houses, the Senate and the House of Representatives. Some of the challenges witnessed in the bill passage include a lack of democratic legitimacy (Menkel-Meadow, 2019). This problem is evident during voting, whereby a lack of democratic accountability in both chambers may persist. The bill must under the following steps in both
  • 6. houses before it becomes law; Bill Introduction Any member can introduce the proposed legislation. The person who does the bill is called a sponsor. In the Senate, a bill is assigned S. to indicate a Senate bill while in the House, carries H.R. to show the House bill. Committee Action A concerned committee chairperson states whether there will be a bill proceedings or markup. These two elements involve debate, an amendment, and rewriting. Committee Report A committee chair prepares a bill’s report with a description of the law, legislation history, effect on outstanding legislation, and the decision of the committee’s majority members. Floor Debate and Votes House’s speaker and the Senate’s Majority Leader determines the date when the bill will be debated or amended in their respective floors. Referral to the Other Chamber After the proposed law passage in the Senate or the House, it is presented to another chamber to have the same channel through the committee and debate action. Conference on a Bill If one chamber makes minor alterations to a bill, the law goes back to the originating chamber for a concurring vote.
  • 7. Action by the President After the approval of the conference report by both chambers, the final proposed legislation is presented to the head of the state. If the president affirms the proposed legislation, he signs it into law. If he does not respond within ten days, the propose legislation automatically becomes a law. SHOULD Analysis Graham’s bill will not go past the Senate. This stuck means the end of the bill at its early stages. The majority the Senate Judiciary Committee does not attend the bill’s proceedings meaning they do not support the bill. Also, the bill undermines president Trump’s directive of building the wall at the border. Trump has a majority in the Senate, a clear indication that the bill receives strong opposition. It has only one co-sponsor thus the current support for the bill cannot make it pass. Most of the politicians allied to president Trump and over 154 organizations term the bill as cruel. They view it as not a real solution to a humanitarian crisis at the U.S. border. According to the director of Federal Advocacy for the Immigration Hub, Kerri Talbot, the bill is likely to fuel more chaos and cruelty in the asylum system. Summarily, the crucial stakeholders view the bill from a negative perspective and may use corrupt strategies to undermine democratic legitimacy when voting for the bill to make sure it does not attract the majority votes supporting it.
  • 8. References Fincham, K. (2018). The King James bible: crown, church and people. The Journal of Ecclesiastical History, 1-21. McDowell, S. K., & Beliles, M. A. (2008). Liberating the nations: Biblical principles of government, education, economics & politics (Vol. 5). Providence Foundation. Menkel-Meadow, C. (2019). Negotiating the American Constitution (1787-1789) Coalitions, Process Rules, and Compromises. Landmark Negotiations from Around the World: Lessons for Modern Diplomacy (Emmanuel Vivet, editor, Intersentia 2019.). Musalo, K. (2019). Evolution of Refugee and Asylum Law in the United States. Refugees and Asylum Seekers: Interdisciplinary and Comparative Perspectives, 17. S. 1494 — 116th Congress (2019). Secure and Protect Act of
  • 9. 2019.” www.GovTrack.us. https://www.govtrack.us/congress/bills/116/s1494 Google, Apple, and Facebook Battle for Your Internet Experience Three Internet titans—Google, Apple, and Facebook—are in an epic struggle to dominate your Internet experience, and caught in the crossfire are search, music, video, and other media along with the devices you use for all of these things. Mobile devices with advanced functionality and ubiquitous Internet access are rapidly overtaking traditional desktop machines as the most popular form of computing. Today, people spend more than half their time online using mobile devices that take advantage of a growing cloud of computing capacity. It’s no surprise, then, that today’s tech titans are aggressively battling for control of this brave new online world. Apple, which started as a personal computer company, quickly expanded into software and consumer electronics. Since
  • 10. upending the music industry with its iPod MP3 player, and the iTunes digital music service, Apple took mobile computing by storm with the iPhone, iPod Touch, and iPad. Now Apple wants to be the computing platform of choice for the Internet. Apple’s competitive strength is based not on its hardware platform alone but on its superior user interface and mobile software applications, in which it is a leader. Apple’s App Store offers more than 2 million apps for mobile and tablet devices. Applications greatly enrich the experience of using a mobile device, and whoever creates the most appealing set of devices and applications will derive a significant competitive advantage over rival companies. Apps are the new equivalent of the traditional browser. Apple thrives on its legacy of innovation. In 2011, it unveiled Siri (Speech Interpretation and Recognition Interface), a combination search/navigation tool and personal assistant. Siri promises personalized recommendations that improve as it gains user familiarity—all from a verbal command. Google countered by quickly releasing its own AI tool, Google Now. Facebook has developed an intelligent assistant called M. Apple faces strong competition for its phones and tablets both in the United States and in developing markets like China from
  • 11. inexpensive Chinese smartphones and from Samsung Android phones that have larger screens and lower prices. iPhone sales have started to slow, but Apple is not counting on hardware devices alone for future growth. Services have always played a large part in the Apple ecosystem, and they have emerged as a major revenue source. Apple has more than 1.3 billion active devices in circulation, creating a huge installed base of users willing to purchase services and a source of new revenue streams. Apple’s services business, which includes Apple’s music (both downloads and subscriptions), video sales and rentals, books, apps (including in-app purchases, subscriptions and advertising), iCloud storage, and payments, has been growing at a double-digit rate. As Apple rolls out more gadgets, such as the Watch and HomePod, its services revenue will continue to expand and diversify. According to CEO Tim Cook, Apple has become one of the largest service businesses in the world. This service- driven strategy is not without worry because both Google and Facebook offer stiff competition in the services area. Google continues to be the world’s leading search engine, accounting for about 75 percent of web searches from laptop and desktop devices and over 90 percent of the mobile search market. (Google is also the default search engine for the
  • 12. iPhone). About 84 percent of the revenue from Google’s parent company Alphabet comes from ads, most of them on Google’s search engine. Google dominates online advertising. However, Google is slipping in its position as the gateway to the Internet. New search startups focus on actions and apps instead of the web. Facebook has become an important gateway to the web as well. In 2005, Google had purchased the Android open source mobile operating system to compete in mobile computing. Google provides Android at no cost to smartphone manufacturers, generating revenue indirectly through app purchases and advertising. Many different manufacturers have adopted Android as a standard. In contrast, Apple allows only its own devices to use its proprietary operating system, and all the apps it sells can run only on Apple products. Android is deployed on over 80 percent of smartphones worldwide; is the most common operating system for tablets; and runs on watches, car dashboards, and TVs—more than 4,000 distinct devices. Google wants to extend Android to as many devices as possible. Google’s Android could gain even more market share in the coming years, which could be problematic for Apple as it tries to maintain customer loyalty and keep software developers focused on the iOS platform. Whoever has the dominant smartphone operating system will have control over the apps where smartphone users spend most of their time and built-in
  • 13. channels for serving ads to mobile devices. Although Google search technology can’t easily navigate the mobile apps where users are spending most of their time, Google is starting to index the content inside mobile apps and provide links pointing to that content featured in Google’s search results on smartphones. Since more than half of global search queries come from mobile devices, the company revised its search algorithms to add “mobile friendliness” to the 200 or so factors it uses to rank websites on its search engine. This favors sites that look good on smartphone screens. The cost-per-click paid for mobile ads has trailed desktop ads, but the gap between computer and mobile ads fees is narrowing. Google instituted a design change to present a cleaner mobile search page. Seven Google products and services, including Search, YouTube, and Maps, have more than a billion users each. The Android operating system software has over 2 billion monthly active users. Google’s ultimate goal is to knit its services and devices together so that Google users will interact with the company seamlessly all day long and everyone will want to use Google. Much of Google’s efforts to make its search and related services more powerful and user-friendly in the years ahead are based on the company’s investments in artificial intelligence and machine learning (see Chapter 11). These technologies already have been implemented in applications such as voice
  • 14. search, Google Translate, and spam filtering. The goal is to evolve search into more of a smart assistance capability, where computers can understand what people are saying and respond conversationally with the right information at the right moment. Allo is a smart messaging app for iOS and Android that can learn your texting patterns over time to make conversations more expressive and productive. It suggests automatic replies to incoming messages, and you can get suggestions and even book a restaurant reservation without leaving the chat. Google Assistant is meant to provide a continuing, conversational dialogue between users and the search engine. Facebook is the world’s largest social networking service, with over 2 billion monthly active users. People use Facebook to stay connected with their friends and family and to express what matters most to them. Facebook Platform enables developers to build applications and websites that integrate with Facebook to reach its global network of users and to build personalized and social products. Facebook is so pervasive and appealing that it has become users’ primary gateway to the Internet. For a lot of people, Facebook is the Internet. Whatever they do on the Internet is through Facebook. Facebook has persistently worked on ways to convert its popularity and trove of user data into advertising dollars, with
  • 15. the expectation that these dollars will increasingly come from mobile smartphones and tablets. As of early 2018, over 95 percent of active user accounts worldwide accessed the social network via smartphone. Facebook ads allow companies to target its users based on their real identities and expressed interests rather than educated guesses derived from web- browsing habits and other online behavior. At the end of the first quarter of 2018, 98 percent of Facebook’s global revenue came from advertising, and 89 percent of that ad revenue was from mobile advertising. Many of those ads are highly targeted by age, gender, and other demographics. Facebook is now a serious competitor to Google in the mobile ad market and is even trying to compete with emerging mobile platforms. Together, Facebook and Google dominate the digital ad industry and have been responsible for almost all of its growth. Facebook has overhauled its home page to give advertisers more opportunities and more information with which to target markets. The company is expanding advertising in products such as the Instagram feed, Stories, WhatsApp, Facebook Watch, and Messenger, although the majority of ad revenue still comes from its news feed. Facebook has its own personalized search tool to challenge Google’s dominance of search. Facebook CEO Mark Zuckerberg is convinced that social networking is the ideal way to use the web and to
  • 16. consume all of the other content people might desire, including news and video. That makes it an ideal marketing platform for companies. But he also knows that Facebook can’t achieve long- term growth and prosperity based on social networking alone. During the past few years Facebook has moved into virtual reality, messaging, video, and more. Facebook is challenging YouTube as the premier destination for personal videos, developing its own TV programming, and making its messages “smarter” by deploying chatbots. Chatbots are stripped-down software agents that understand what you type or say and respond by answering questions or executing tasks, and they run in the background of Facebook’s Messenger service (see Chapter 11). Within Facebook Messenger, you can order a ride from Uber, get news updates, check your flight status, or use augmented reality to imagine what a new Nike sneaker looks like by superimposing a 3-D model of that sneaker atop images or video. A new standalone app will allow users to stream videos in their news feed through set-top boxes such as Apple Inc.’s Apple TV and Amazon.com Inc.’s Fire TV, as well as Samsung Internet-connected TVs. Zuckerberg has said that he intends to help bring the next billion people online by attracting users in developing countries with affordable web connectivity. Facebook has launched
  • 17. several services in emerging markets, such as the Free Basics service designed to get people online so they can explore web applications, including its social network. Facebook wants to beam the Internet to underserved areas through the use of drones and satellites along with other technologies. Zuckerberg thinks that Facebook could eventually be an Internet service provider to underserved areas. Monetization of personal data drives both Facebook and Google’s business models. However, this practice also threatens individual privacy. The consumer surveillance underlying Facebook and Google’s free services has come under siege from users, regulators, and legislators on both sides of the Atlantic. Calls for restricting Facebook and Google’s collection and use of personal data have gathered steam, especially after recent revelations about Russian agents trying to use Facebook to sway American voters and Facebook’s uncontrolled sharing of user data with third-party companies (see the Chapter 4 ending case study). Both companies will have to come to terms with the European Union’s new privacy law, called the General Data Protection Regulation (GDPR), that requires companies to obtain consent from users before processing their data, and which may inspire more stringent privacy legislation in the United States. Business models that depend less on ads and more on subscriptions have been proposed, although any effort
  • 18. to curb the use of consumer data would put the business model of the ad-supported Internet—and possibly Facebook and Google—at risk. Apple emphasizes its privacy protection features and does not share customer data with others. These tech giants are also being scrutinized for monopolistic behavior. In the United States, Google drives 89 percent of Internet search, 95 percent of young adults on the Internet use a Facebook product, and Google and Apple provide 99 percent of mobile phone operating systems. Critics have called for breaking up these mega-companies or regulating them as Standard Oil and AT&T once were. In July 2018 European regulators fined Google $5 billion for forcing cellphone makers that use the company’s Android operating system to install Google search and browser apps. Have these companies become so large that they are squeezing consumers and innovation? How governments answer this question will also affect how Apple, Google, and Facebook will fare and what kind of Internet experience they will be able to provide. How Secure Is the Cloud? Over the last several years, many companies have altered their IT strategies to shift an increasing share of their applications and data to public-cloud infrastructure and platforms. However,
  • 19. using the public cloud disrupts traditional cybersecurity models that many companies have built up over years. As a result, as companies make use of the public cloud, they need to revise their cybersecurity practices in order to consume public-cloud services in a way that enables them both to protect critical data and to fully exploit the speed and agility that these services provide. Managing security and privacy for cloud services is similar to managing traditional IT infrastructures. However, the risks may be different because some, but not all, responsibilities shift to the cloud service provider. The category of cloud service (IaaS, PaaS, or SaaS) affects exactly how these responsibilities are shared. For IaaS, the provider typically supplies and is responsible for securing basic IT resources such as machines, storage systems, and networks. The cloud services customer is typically responsible for its operating system, applications, and corporate data placed into the cloud computing environment. This means that most of the responsibility for securing the applications and the corporate data falls on the customer. Cloud service customers should carefully review their cloud services agreement with their cloud provider to make sure their applications and data hosted in cloud services are secured in accordance with their security and compliance policies. But
  • 20. that’s not all. Although many organizations know how to manage security for their own data center—they’re unsure of exactly what they need to do when they shift computing work to the cloud. They need new tool sets and skill sets to manage cloud security from their end to configure and launch cloud instances, manage identity and access controls, update security controls to match configuration changes, and protect workloads and data. There’s a misconception among many IT departments that whatever happens in the cloud is not their responsibility. It is essential to update security requirements developed for enterprise data centers to produce requirements suitable for the use of cloud services. Organizations using cloud services often need to apply additional controls at the user, application, and data level. Cloud service providers have made great strides in tightening security for their areas of responsibility. Amazon’s security for its cloud service leaves little to chance. The company keeps careful constraints around its staff, watches what they do every day, and instructs service teams to restrict access to data through tooling and automation. Amazon also rotates security credentials for authentication and verification of identity and changes them frequently—sometimes in a matter of hours. The biggest threats to cloud data for most companies involve
  • 21. lack of software patching or misconfiguration. Many organizations have been breached because they neglected to apply software patches to newly identified security vulnerabilities when they became available or waited too long to do so. (See the discussion of patch management earlier in this chapter.) Companies have also experienced security breaches because they did not configure aspects of cloud security that were their responsibility. Some users forget to set up AWS bucket password protection. (A bucket is a logical unit of storage in Amazon Web Services [AWS] Simple Storage