Are you in High School, College, Masters, Bachelors or PhD and need assistance with your argumentative essay or research paper? All you need is to buy an argumentative research paper written by a specialist in your academic field . When you buy a research paper from us, we offer you an original, nil plagiarized dedicated proofreader, writer and editors who is PhD or Masters qualified. MyEssayServices.com is an experienced writing service with over 9 years experience having delivered over 83,000 argumentative essays over the years.
Brief Introduction on U.S.A’s education system.
II. BACKGROUND SECTION
Overview of U.S.A’s history relating to standardized testing system.
III. SUPPORTING EVIDENCE
Benefits of using standardized testing system.
IV. COUNTER EVIDENCE/COUNTER ARGUMENTS
Inefficiencies brought about by the use of standardized testing system.
Standardized testing had been used in the American education system since the mid-1800s. The evolution of education has seen the era of No Child Left behind Testing. This means that the government uses a mandatory standardized testing system for the whole country. Despite the inaccuracies, inefficiencies, biases and other common flaws in the standardized testing system, the government still supports the standardized testing system.
The use of standardized testing system in the elementary and secondary education stages is insufficient because it does not offer equality and uniformity for all students across America. This essay seeks to evaluate the fact that standardized testing is not a true measure of knowledge for minorities or economically disadvantaged areas. Moreover, this essay assesses how the testing system can be improved to make it more efficient.
The use of standardized testing is explained by two fundamental notions. First, standardized testing is aimed at providing various essential academic objectives fairly to all students. Second, the standardized tests should accurately evaluate the level of students’ knowledge. These two notions have convinced the government and school officials to use a standardized test data system to evaluate student’s ability. Therefore, these tests are an integral part of the government’s education policies.
This has led to the government implementing various policies such as the No Child Left Behind and Race to the Top (Heckman, Humphries & Kautz, 32). The No Child Left Behind act was passed by the congress in 2001. The act addresses authorization of parents to engage their children in the mandatory elementary and secondary education curriculum provided by the government through the public schools or private schools.
Benefits of using Standardized Testing
Standardized Tests Offer a Common Assessment System for Every Student
Standardized tests are defined as tests administered in a standard and consistent manner, under standard controlled conditions supervised by the educations board of the government. Therefore, standardized tests create an average gauging method for students to evaluate their level of knowledge or skills. The use of standardized tests offers a common academic domain to measure student’s knowledge base (Heckman, Humphries & Kautz, 12).
Standardized Tests Create Equity and Uniformity for All Students
The tests are aimed at achieving equity and fairness for all students in the country. Thus, this creates uniformity in the education system. The goal of using an identical means of testing and identical degrees of grading the students is to attain a fair and objective testing system. If the standardized testing system achieves fairness and accuracy, it can measure the real ability of students’ knowledge and progress in a certain common domain. For instance, students are equally tested in various common domains such as science and mathematics (Tollefson, 42).
Disadvantages of using a Standardized Testing System
Standardized Tests Lack Career Development Skills for Students
Standardized tests are supposed to achieve validity and reliability. Validity is the ability of the test makers to accurately design the tests and achieve the test objectives. On the other hand, reliability is the measure of the tests consistency. This means the same level of knowledge is measured for all students in a similar manner but not repeatedly. However, the role of the standardized tests has been debated over its flaws. It is safe to argue that standardized testing in the modern world is mainly aimed at creating a ranking scheme rather than personal goal orientation for every student (Ravitch, 2011). Schools now focus more on creating a ranking scheme among students and competition for top ranks rather than engaging the students in competitive career orientation.
Socio-Economic factors create disparities in the standardized testing system
Consequently, non-instructional factors create the major variance among test scores by students in different states in the country. For instance, a research study of math result scores by the National Assessment of Educational Progress in the country simulated that a number of other socio-economic variables led to the differences in test scores (Tollefson, 54). These socio economic variables included the type of community that students come from, the type of families that they come from (single or both parents), the parents’ educational background and the poverty rate. These variables create major inefficiencies in the structural objectives of using standardized testing method in the country.
Standardized Tests are not the best way to gauge students
Standardized testing goes against the norm of a fair education system that strives to rate students’ knowledge and the quality of learning or teaching. Most tests are now designed in a manner that half of the students will not succeed in the exam. Therefore, this simulates the motive that most schools seek to rank students rather than rate students. Ranking students is gauging students on the basis of test scores, whereas, rating students is gauging students according to their level of conceptual ideology framework. The testing system now seeks to spread out student scores more than gauging the quality of education provided by a given school or student (Tollefson, 56).
Standardized tests promote average thinking
The normal routine used in the standardized tests evaluates chances of average thinking. The Journal of Educational Psychology there are two types of students ‘active” students and “superficial” students (Heckman, Humphries & Kautz, 43). Active students try to connect their past leaning and ask themselves questions that connect their normal lives with the education. On the other hand, superficially engaged students tend to copy most of the answers, they like guessing a lot and they have a tendency of skipping the hard parts.
The Journal of Education Psychology argues that according to a study research they conducted, most of the students in the current education system are superficial students (Ravitch, 123). Therefore, this simulates a standard tests inaccuracy, where the tests are mainly made for ranking students rather than measuring their quality of learning.
Younger Children should not be tested using the standardized tests
Educational specialists argue against the notion of using standard testing on younger children between 8-9 years of age (Ravish, 130). This is because younger children are still experiencing brain development and it would be more beneficial to test their understanding capability individually or in a more personalized manner than the use of standardized tests. However, early childhood education is still characterized by wide levels of standardized tests that do not provide promote individual student growth. Moreover, there are major inefficiencies encountered by basing primal decisions such as promotion and graduation based on a single test.
The Value of Standardized Tests on Students’ Academic Growth is Minimal
A research conducted by the National Research Council concluded that the value of standardized testing is redundant and it leads to minimal learning progress for students. In addition, the council addressed the inefficiencies caused by the No Child Left Behind policy (NCLB). The inefficiencies arise when the objectives of the standardized tests are misused (William, 2010). Negative consequences arise such as teachers begin narrowing the curriculum as they try teaching to the test. Furthermore, the standardized tests tend to push students out of school and the tests drive teachers out of their profession. The No Child Left Behind disadvantages the poor students, minority students and immigrant students (who do not use English as their native language.
How the Standardized Testing System can be improved
The education system needs some major rectifications to reclaim the essence of an effective educational system. For the education system to achieve effectiveness and quality learning the government should relinquish some control to other education sectors. The role of school officials has increased over the years. Further, the use of testing to measure students’ knowledge has also increased. Thus, the goal of education has changed and it is the right times for the education system to enable students achieve academic growth and prepare them for their future goal-orientation (Wiliam, 107).
Standardized teaching should not be the only way to evaluate the level of teacher or student performance. In addition, standardized tests should not be the main methods of enacting an effective educational curriculum and policy. The diversity of American students is wide simulating the need for other testing methods other than use of standardized tests. For instance, the PISA test is an internationally respected assessment test that is more effective than the American student testing system (Wiliam, 152). Program for International Student Assessment (PISA) is preferred as a universal testing methods used to test various educational domains. The system allows students to design and implement projects.
The current education system is designed to achieve government accountability in the education sector rather than helping teachers provide quality education. The standardized tests have failed to meet the diverse needs of students all across the United States of America. This is pivoted by the government’s measure to standardize education for all the students. Education should never be standardized because one can never create the optimum limit of learning. A standardized education system will enable U.S.A achieve freedom of expression (Ravitch, 330).
The government should help reduce the effect of inequality in the education sector. Education systems should be designed to cater for the community objectives and policies rather than the government’s objectives (Tollefson, 258). The government should work closely with the state governments and the school officials without mandating most learning activities. The education sector should also allow school officials exercise their own private educational practices to achieve quality education.
The role of standardized testing is clear and well intentioned. However, the variables creating inefficiencies should be addresses even whether the changes required are costly or hard to implement. This is because education is very primal to human growth and progress. There should be no limit to education or hindrance to education. All American students should be able to afford quality education despite their financial background. This is because there can never be a price put on knowledge and intelligence. The main objectives for education are changing because of the widely flawed education system. Fundamental changes are necessary to accommodate the needs of the minority disadvantaged students; mostly those who cannot afford private education.
Heckman, J. J., Humphries, J. E., &Kautz, T. (2014). The myth of achievement tests: The GED and the role of character in American life.
Ravitch, D. (2011). The death and life of the great American school system: How testing and choice are undermining education. Basic Books.
Tollefson, J. W. (Ed.). (2012). Language policies in education: Critical issues. Routledge.
Wiliam, D. (2010). Standardized testing and school accountability. Educational Psychologist, 45(2), 107-122.
The internet is one of technological advancement. It has had a positive influence on the users. However, information privacy has been one negative effect of reliance on the internet. The research proposal will establish whether advanced technology has had influence in the privacy of personal information. Although advanced technology has influenced and improved communication between different people, it also has influenced the level of privacy of personal information.
Internet among other advanced technology media has grown within the past years creating a great influence in relationships between people. I feel that this is a timely topic because of the current concerns among many people on security of sharing information using the internet. The intended people for the research are business people, individual family members and as well the government. I conduct the research aiming at establishing the factors contributing to the failure of advanced technology (Gratton, 2003). This is a research paper aiming at giving security issues that face the internet as advancement of technology.
Within the last few years, reliance on the internet among many people has grown at a high rate. Communication is the primary use of the internet. Communication with clients, friends and as well other business people has faced a stiff challenge of lack of security while relying on the internet. Complains from business people have spread widely. In addition, personal information such as health status is another condition that is facing the security issues. Despite the role that the internet plays in the day to day life, its security issue has brought about critics from its users (Duquenoy, 2008). People’s feedback and article review are the res
Search materials in the paper. This will involve both qualitative and quantitative approach. Analyzing different cases of insecurity of information experienced by different people will comprise the quantitative analysis while analyzing the extent of insecurity while using the internet will comprise the qualitative analysis.
While looking at privacy issues facing the internet as advancement of technology, it is best to understand the relationship between vulnerability of the internet and reliance on the internet. In addition, understanding the race between the advancement in technology that diminish the security level and as well people concerned with maintaining the security level of internet. Security threats that face the internet arise from people who work against those involved in ensuring that there is protection of the internet (Gratton, 2003).
More so, once a security threat to the internet is detected, a method of dealing with the threat establishes. This implies that security threats that face the internet arise as a result of new attacks. An example is the computer viruses found in the internet. Once developers develop an antivirus for dealing with these viruses, new methods of generating other viruses emerge (Duquenoy, 2008).
Within the last few years, the balance between privacy-invading and privacy-securing balance is changing dynamically. Over the previous years, cases of security-invading were more compared to privacy-securing. This implies that the rate of security threats were higher as compared to methods devised for dealing with the threats (Gratton, 2003). However, following the rise in the level of high-powered encryption has contributed to the rise in security levels of the internet. However, it remains as a major social concern since personal information either business or family issues are at a high risk of security exploitation. Therefore, there lies need of determining possible methods of dealing with the security threats that face the internet (Duquenoy, 2008).
Accountability of the internet as advancement of the internet remains to be a high concern of many users. Information shared through the internet does not have full credibility. Since people use the internet for their day to day activities, invasion of information shared by business people and as well friends results to mistrust of information. An example where there is a violation of accountability of the internet is through the ZPass program used in America.
This is an automatic program where once individual enrolls for the program he is gets an electronic device. The member places the devices in the car where once the car passes through the toll, he an antenna picks up the device (Duquenoy, 2008). Deduction of an appropriate amount follows from the prepaid toll account. This program plays a great role in dealing with traffic issues. However, failure of the antenna causes deduction of the appropriate amount from the prepaid toll.
This system increases chances of tracking of its members. Violation of personal liberty can easily be attained through the use of the program. Considering the program, if a driver subscribes for the ZPass and immediately his subscription erased implies that he loses his money paid for the subscription. Personal information such as route taken by a driver is used against him. This indicates that information shared through the internet is neither safe nor accountable (Dhanda, 2002).
Storing of personal information in the internet contributes to cases of privacy violations of the information. This personal information can include anything from your Social Security number to your bank account or credit card numbers. It is unlucky that some people do not realize the risks that lie on storing personal information in the internet. This is an ignorant act since most of the internet users think that the information is safe and completely removed from the memory once we delete it, especially since it is been shown multiple times that deleted information can be recovered (Gratton, 2003).
Personal information stored in emails can easily be retrieved by other people. Strangers, hackers and identity thieves gain access to it personal information through their hacking techniques. By ssing of email password has become a common and easy activity since many people have the knowledge of attacking different internet sites. Hacking places personal information under threat of attack and violations.
Tracking, as highlighted earlier is another security concern while using the internet. There are different tracking methods that can be done. Location tracking is the most common form of tracking done by many people. Download and installation of tracking applications available for devices is easy (Dhanda, 2002). Common use of location tracking available is in Google and Facebook. These applications are meant to help you get turn-by-turn directions.
In addition, their applications in Facebook are to tag your location and your camera in order to provide the locations where some photos were taken. This is a fun feature. However, they have a negative impact in personal privacy. Tracking applications installed in electronic devices influence our privacy. Locating other people is becoming an easy activity. Personal activities are under threat of location tracking when these devices are. Spouses can easily locate and track each other while using these applications without the knowledge of the other (Gratton, 2003).
Other than location tracking, there lays activity tracking done on personal activities. There are certain devices used to track our online activities when using the internet. This is attained through tracking of cookies, and data sent from a website saved in the Web browser. Cookies from websites create a blueprint of websites visited on the Internet. Cookies can contribute to tracking of online activities, and violations of information sent through the internet while using a third party cookie.
Personalized advertisements found on various websites are highly used for online tracking. Cookies have the ability to save personal information. Information such as address, credit card number, and passwords for certain websites. This implies that cookies may contain some personal information. Once other people have access to this personal information through accessing these cookies, therefore violating the internet privacy (Dhanda, 2002).
The internet has made it possible for the government to track your travel habits. Tracking application and software used by the government play this role of tracking. In addition, network provider companies have access to personal information and location details of the individual using the network. This reduces security levels while using the internet and while using the internet. On the other hand, while using the websites, it has become easy to track your spending and browsing habits (Acohido, 2011).
This is reducing personal privacy while using the internet. Employers have the ability of tracking your habits since accessing personal information while using the internet is contributing to reduction of security of personal information. This implies that potentially any action you take may be traceable. This can be done by anyone interested in your activities. The internet has landed many people in jail. Tracking of personal activities plays an essential role in identifying criminal activities. In addition, it allows criminals to steal your identity. This contributes to a whole new class of crimes that were previously impossible.
The internet increases chances of stealing from companies. Before the invention of the internet, the only way of stealing from a company was through breaking into their property or steal items from an employee. However, through the use of the internet, stealing from a company has changed. Invading a company’s personal information through the proliferation of computer networks, small storage devices, and wireless technology has changed the approach to company threats (Acohido, 2011).
This makes it possible for employees to steal data without ever being caught. In addition, outsiders can easily steal information and cause monetary damage without physically availing in the company’s premises. This implies that theft crimes have been made easier through the use of the internet and can be done while far from the company. This has made it hard for companies to avoid theft. On the other hand, it has made it easier for those wishing to commit theft or vandalism. In short, while the internet has made access of information and life easier, we have mainly traded our privacy. In addition, we have placed our security at risk in order for the conveniences that the internet offers.
Considering the influence that the internet has on personal freedom, it can be concluded to have limited all personal freedom. Since the internet is invading our privacy, it is also invading our freedom on the other side. The relationship between the internet, freedom and privacy can be summarized as the less you rely on the internet, the more your personal information is secure and the more you are free. It is true in life that if you do not use a telephone, no one could have access to the numbers you dial and the message you share with other people. This implies that there would be no people analyzing your number and as well people evaluating your conversation (Acohido, 2011).
On the other hand, while not using a cell phone, it is unlikely for anyone to track your location. Individuals who do not rely on cell phones have full freedom on their personal since their activities are never prone to tracking. On the other hand, if you don't use the Internet, it is rare for people to find out sites that you visited. In addition, it is not possible to access information on the commodities that you bought online and lastly the information you searched while accessing the internet. This implies that the internet is limiting its application in the daily activities. Private activities can easily be monitored remotely through the use of browser’s cache.
While using the internet, unauthorized attacks (authentication attacks) occur when an individual manipulates resources of a system. Access of information without authorization ensures that the attack prevails over the internet. This is through sharing of login and as well password using unattended terminal with an open session. This is an attack used by hackers in accessing a system that requires authentication. Password attack (authentication attack) is a method used of repeating attempts on a user account (Alderman, 2004).
This can be used on accessing Gmail accounts and as well social accounts such as Facebook and Twitter. This attack puts personal information stored in online accounts under risk of facing attacks from hackers. Attackers use a program that runs across a network where they make an attempt of logging a shared resource such as a server. While using the internet, authentication attacks are common. This places personal information shared over the internet under the risk of violation by the attackers (Alderman, 2004).
Confidentiality attacks, also called sniffing attacks, are another attack that the internet faces. Since computers communicate serially, information is sent in small blocks called packets. Attackers use different methods to access information communicated over the internet. This is done using different methods called social engineering attacks. Sniffers use a dozen of freeware and shareware that do not require the attacker to understand the underlying protocols. This enables the attacker to access the network packets which comprise of user login names, passwords and accounts (Alderman, 2004).
This makes information shared using online accounts face threats of sniffers. Sniffers use the advantage of the human tendency (that is using a single password for multiple accounts). This attack is made to access corporate sensitive and confidential information. Some snooping attacks place the network interface card in a promiscuous mode (they can easily face sniffing attacks).
Sniffing attacks, used to access information over the internet have a high impact in the privacy of information shared over the internet. Many sniffers capture the first 300 bytes of all Telnet, file transfer protocol (authentication required while sharing files from one computer to the other through the internet) and login sessions. This attack has a high impact in corporate information shared over the internet. As a result, security of personal information is under risk of sniffing while using the internet (Baresi, 2007).
Integrity attacks, which involves message alteration, delay and denial. In this attack, attackers add information or data to the original message. In addition, attackers may also remove or modify information in transit across the network (Alderman, 2004). This is done by having a root access to the system or the router of the network. Integrity attacks are not easy to detect. If a program does not check the buffer limits while reading and receiving data, this opening can be exploited by n attacker by adding arbitrary data into the program. Once the data is executed it gives the attacker a root access to the system and can easily access information shared over the internet. Integrity attacks also have an effect of creating delay of data being transmitted.
This implies that these attacks can cause data to be unavailable for a period of time (Baresi, 2007). This is done by flooding the network with unnecessary traffic making the system be slow. As a result, communication through the internet system is interfered with, and it becomes unreliable. More so, through integrity attacks, messages sent can be discarded before they are delivered to the recipient. This attack has an influence on the reliability of the internet. Once the message has been altered and denied for a period of time, it becomes prone to interference. As a result, information and message sent over the internet faces a privacy threat.
While using the network, an attacker may access it remotely by bypassing the internet protocols. This attack is called access control attack. In this internet attack, the attacker finds the internet protocol address of a trusted host or system (Baresi, 2007). Configuration of his own interface follows where he is granted the permission of sending messages as if they were from a trusted host. In this form of attack, the attacker has a prior access to the internet protocol addresses of the network.
Once he configures his host he is granted the permission of sending information as a trusted host. In contrast with packet sniffers, internet protocol masquerading do not have restrictions. Both external and internal attackers can use it to gather information by sending messages to people using the internet. This is a privacy threat that faces the internet. Fake messages requiring passwords and account names can be used to gather personal logging details used to violate the privacy of personal information (Baresi, 2007).
There lie some additional security attacks that the internet faces. Phishing is another attacking tool used by hackers in accessing personal information over the internet. While using this tool, the user is requested through email to connect to a rogue website that requires logging information. Once the user accesses the website and keys in the passwords, they are recorded in the attackers file system.
An example of a phishing activity is where a rogue server acts as a middleman to the real banking sites (Alderman, 2004). The rogue server uses the client’s credentials to log into their accounts where they can easily engage in numerous transactions using the access that they have to their accounts. This is a security issue facing the internet. Many internet users are not aware of the threat. Therefore, it remains to have a high influence on online transactions.
Other than the highlighted attacks that are executed over the internet, there also lies the most basic security threat that can be carried out to log into other people’s online accounts. An attacker can access the password by guessing the password to the account. This is the weakest of all privacy threats that face the internet. Attackers execute this method by learning personal interests (Douligeris, 2007). On the other hand, there lies the key-logging threat where the attacker sends a fake login page and uses the credentials used to log into account to access personal information. Attackers install a key-logger remotely and can master the logging credentials used by a client to access to personal information stored in the online accounts.
Internet security remains to have a high influence in the daily activities. Privacy of personal information stored in the internet can easily be accessed remotely by sniffers and hackers. Sniffers and hackers use this information for their personal benefits. For the cases of business activities, sniffers use this information in competing with their competitors. On the other hand, the information can also be used for crime activities. With the research paper, it is clear that there is a need to deduce methods of dealing with the security threats that face the internet (Douligeris, 2007).
In order to deal with tracking threats, devices used should be turned off location detecting. This will ensure that even after a message is sent; it will not show the actual position of the sender. This is a tool that can be used to deal with cases of location tracking. Cache clearing is a method used to deal with online activity tracking. This involves clearing all the browser cache after accessing the internet. In addition, ensuring that passwords are not saved and remembered while logging into internet accounts is another method that can be used to deal with online activity tracking. Online passwords should be made complex in order to deal with cases of password guessing (Douligeris, 2007).
Encryption is another method that can be used to deal with hacking attacks. It involves transforming plain text into an unreadable format (converting passwords into binary form). This can be used to code the message being sent. In addition, it can be used in coding the network devices such as routers in a manner that there are no external attacks. Internet security begins with securing the individual local area networks.
Securing a network can be done by installing security hardware and software aimed at protecting the network. A firewall is a hardware configuration located between the internal and external network. This configuration aims at protecting the internal network from unwanted intrusion. Firewalls play an essential role in ensuring that there is control of information entering and leaving the internal network. They are used for keeping unauthorized and preventing unwanted activities in the internal network. This is a general method that can be used dealing with cases of hacking and sniffling.
As from the research paper, it is quite clear that the internet faces a security threat. Activities conducted over the internet are prone to violation. Personal information stored in the internet is not safe as it can face violation from hackers and sniffers who access private information stored in the internet. Messages sent through the internet need to be coded in order to deal with the security issues facing the internet.
Douligeris, C. (2007). Network security: Current status and future directions. Hoboken, NJ: IEEE Press.
Baresi, L., & Di, N. E. (2007). Test and analysis of Web services. Berlin: Springer.
Rose, A. (2013). The Internet of Things Has Arrived- And So Have Massive Security Issues
Le, D. J. (November 2000 to 2001). Internet and Network Security . INDUSTRIAL TECHNOLOGY.
Alderman, Ellen, and Caroline Kennedy. (2004). Right to Privacy. New York : Vintage.
Acohido, B. (2011). Web tracking has become a privacy time bomb. USA TODAY.
University of Florida Department of Electrical and Computer Engineering. Network Security: History, Importance, and Future. Bhavya Daya.
Duquenoy, P., Jones, S., & Blundell, B. G. (2008). Ethical, legal and professional issues in computing. Australia: Thomson.
Gratton, E. (2003). Internet and wireless privacy: A legal guide to global business practices. Toronto, Ont: CCH Canadian Ltd.
Dhanda, R. K. (2002). Guiding Icarus: Merging Bioethics with Corporate Interests. Hoboken, NJ: John Wiley & Sons.
In the United States, there are gun laws that are in place both on a national and state level. The main aims of the gun laws are regulating the sale, possession and the use of ammunition and firearms. The federal firearms laws differ from different states, but they are a few clauses that happen to be common. Some states have some very strict laws while others happen to have some laws that are a little bit lenient. In forty-four states, in the United States, there is a provision that is similar to the second Amendment to the United States constitution. Those who possess firearms need to abide by the firearm law of the states they are in at the moment rather than their state of residence.
In the state of California, the gun laws are rather strict, but there is further need for the restrictions to be made much stronger. The state possesses some of the most strict firearm laws compared to the other states. In the state, the strictness of the law varies from one part to the other. In urban areas like Los Angeles and San Francisco, the rules happen to be much strict compared to other non-urban areas those who portray ill intent with firearms are the ones that get charged (Janiskee 297). In some communities, it is particularly hard to possess a firearm, and there are provisions that are already put in place to make this very hard.
For one to be a dealer in the sale of firearms, they have to be vetted and then approved by being included in the state’s roster of dealers. For the private sale of firearms, this must be done through a known and accepted dealer. The sales then have to be recorded by the state and require a ten-day period before the state can approve. The state does not provide for any clause giving individuals the right to bear or possess a firearm. The possession or sale of assault rifles, which happen to be automatic firearms, is a prohibited in the state.
Anyone who wants to purchase a firearm also fills in an application which after reaching the authorities, a background check is done on the application to ensure the applicant does not have any criminal record. The results of the check are only available until a whole month is over, or rather thirty days. The main advantage of doing so is ensuring that the possession of the firearm does not find itself in the wrong hands. If it proves that the applicant has a doubtful past, then the purchase cannot proceed and the person is not viable for purchasing the firearm. The transfer of the ownership of a rifle is also prohibited under state law and under no circumstances is one supposed to give out their firearm. This is to avoid the use of one’s firearm to commit an act of crime or cause harm to the public.
In the state, it is also prohibited to carry a concealed firearm, but this differs in the different areas of the state. In some towns, one can carry a concealed weapon but in others like San Francisco or Los Angeles one is prohibited from carrying a concealed rifle. However, a resident of another state is allowed to carry a concealed weapon as long as they possess concealed carry permits (Lott 233). In Los Angeles and San Francisco concealed carry permits from other states are not recognized. It is therefore, not even allowed for a resident of another state to carry a concealed weapon between within these boundaries.
The state of California is also very notorious for the many gangs found there. The gangs are notorious for breaking the firearms law, and their members possess illegal firearms that they do not possess licenses. It specifically becomes a heard task trying to track down their members and the viscous activities. The gang members identify themselves through things like clothing or tattoos. The gangs engage in very many illegal activities ranging from drug and human trafficking to the sale of illegal weapons. The weapons they sell are either stolen from the government, or they are brought as imports from other nations (Henigan 67).
It is the particular business of the sale of illegal weapons that poses a threat to the strict rules on firearms in California. The illegal weapons distributed by the gangs and their members are first not registered like it a main requirement before one possess a firearm. The weapons in specificity firearms sell at a cheaper price compared to the prices of firearms in the authorized dealers. They therefore, also affect the market of the sale of firearms and the shops count losses since most of their customers opt to buy the cheap guns which they get on paying rather than have to follow lengthy legal procedures.
The firearms distributed may also find themselves in the wrong hands with the criminals being the main customers. The effect of this is the increase in crime rates in the society and this forces the respective groups to go out of their way to reduce these crime rates. The firearms also find themselves in the hands of people who cannot even shoot and the outcome of a person who does not know how to handle a firearm having one is a nightmare. The effect is the same as a recruit who cannot drive sitting behind the wheel of a vehicle and attempting to drive.
The state government of California should therefore, find ways to stop the illegal firearm trade carried out by the gangs. The use of information from the communities in which the gangs exist may prove to be very helpful. Once they have known who the gang members are, it becomes much easier to attack or ambush them when carrying out this illegal business (Bruce 88). If the state government can reduce the gang members and their illegal activities, this would help in a very big way to strengthen the firearms acts. In doing so, the will cut out the supply of illegal firearms, and this is by far the first stage of progress.
The second step would be to raise awareness to the public on the dangers of possessing of illegal firearms. The public should be made aware of the implications that they would face if the state found them with a firearm illegally acquired and not having a license to permit one such firearm. The state government should go ahead to provide an amnesty period for those in possession of illegal firearms. During this period, individuals possessing illegal firearms would be urged to come forward to the state offices and give up their weapons and not face any federal or state charges. This method is expected to work perfectly if the public is well informed.
Two years ago, there was a bill that if approved would ban the sale of most types of semi-automatic rifles that allow detachable magazines. The bill was however, under too much pressure especially from the National Rifle Association which threatened to sue the state of California if the governor signed the bill to law. The bill had also redefined assault weapons, and therefore if passed most of the firearms would fall under the new category of assault rifles and would therefore become illegal. The bill was later on vetted and is still in use till now.
The state government should also conduct random searches in all the gun dealers. This is to ensure they do not sell the illegal firearms that are prohibited by the state or fail to follow the needed procedures in the sale. The dealers should also have been registered, and if a dealer is found to be selling firearms without the approval of the state, the correct legal action should be taken on them. The most important forum that the state government should use is to enforce the public with the knowledge about firearms. This empowerment of the public is a very key method in trying to enforce any rule.
In conclusion, the state government of California despite having already in place strict rules in firearms, there is a need to work an extra mile. This should make the state maintain the strictest rules when it comes to firearms and this will in a good way help reduce the crime rates. The public however, have to play their part to make sure this is successful. The only way this can be achieved is the public helping by being responsive and following the rules set up.
Janiskee, Brian P, and Ken Masugi. The California Republic. Lanham, Md: Rowman & Littlefield, 2004. Print. Pg 297.
Henigan, Dennis A. Lethal Logic: Exploding the Myths That Paralyze American Gun Policy. Washington, D.C: Potomac Books, 2009. Internet resource. Pg 67.
Bruce, John M, and Clyde Wilcox. The Changing Politics of Gun Control. Lanham, Md: Rowman & Littlefield, 1998. Print. Pg 88.
Lott, John R. More Guns, Less Crime: Understanding Crime and Gun Control Laws. Chicago: University of Chicago Press, 2010. Print. Pg 233.
Browse More Essay Topics 24/7/365 Support 11+ Yrs in Essay Writing Pay for Quality not Quantity Score that A+ Grade
Research Paper for Sale
Cheap Research Papers
Buy Term Papers
Buy Research Paper
Write My Paper
Buy an Essay
Cheap Essay Writer
Write my Essay
Paper Writing Service
Pay for Homework
Pay for Research Paper
Do My Essay for Me
Pay for Essay
College Papers for Sale
Do My Homework for Me
College Essays for Sale
Buy Research Papers Online
Buy College paper
Client: "(Berlin, G.K., CA)"
Topic title:"Leadership shortfalls in Blue Chips"
Pages: 5, (APA)
" Awesome, the writer delivered it as required by the professor. They also sent me a plagiarism & grammar report Wow!. I was worried about how the essay would turn up but this is exactly what wanted. Thank you and will be back with a longer essay"
Accounting Research Papers
Business Research Papers
Communication Research Papers
Computer Science Research Papers
Economic Research Papers
Film Studies Research Papers
Finance Research Papers
Geography Research Papers
Psychology Research Papers
Political Science Research Papers
Nursing Research Papers
World Affairs Essays
Frequently Asked Questions
0% Plagiarism Guarantee
Money Back Guarantee