منابع مشابه
A Comparison of Proposals to Restructure the U.S. Financial System
permitted to offer only a limnited nanuge of financial services. At the sanue time, fir-ms enugaged in muonfinancial activities, as well as somne in financial industries, have not been pernnitted to owmu banks. Such restrictions were intended to limit the misk of bank failure, to avoid conflicts of intem-est and to prevent undue concentn-ation of financial power-.’ In r-ecent years, however-, t...
متن کاملNetwork Security - Proposals
The explosion of the public Internet and ecommerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. Hackers, viruses, vindictive employees and even human error all represent clear and present dangers to networks. Loss of irreplaceable data is a very real threat for any business owner whose network connects to the outside worl...
متن کاملProposals to Modifv the Taxation of Social Security Benefits: Options and Distributional Effects
This article presents simulation estimates of the income-distributional effects in 1994 of several proposals to modify the taxation of Social Security benefits under the Federal personal income tax. Under the benefit-taxation provisions that have been in effect since 1984, up to 50 percent of benefits are included in taxable income for taxpayers with incomes above certain thresholds. In 1994 ab...
متن کاملProposals to modify the taxation of Social Security benefits: options and distributional effects.
This article presents simulation estimates of the income-distributional effects in 1994 of several proposals to modify the taxation of Social Security benefits under the Federal personal income tax. Under the benefit-taxation provisions that have been in effect since 1984, up to 50 percent of benefits are included in taxable income for taxpayers with incomes above certain thresholds. In 1994 ab...
متن کاملPerformance Analysis of BGP Security Proposals
Border Gateway Protocol (BGP), the only standard for interdomain routing in the Internet, is used to exchange information between Autonomous Systems (ASes). BGP possesses many security vulnerabilities, as it works with the information received from the neighboring routers, and neighbors can lie, deliberately or mistakenly. Many security approaches have been proposed, but due to reasons like inc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Economic Perspectives
سال: 1996
ISSN: 0895-3309
DOI: 10.1257/jep.10.3.67