Free Essay

Is the Social Security System Broken?

In:

Submitted By cruedog
Words 1541
Pages 7
Is the Social Security System broken?
Problems with the Social Security System Intermediate Macroeconomics

Problems with the Social Security System

The Social Security System, created in 1935, is the one of the most costly items in the federal budget today. The program was created to provide old age, survivors’ and disability insurance to a large portion of Americans, mostly the elderly who are now out of the work force. The Social Security Act was a major turning point in American history (William, 2007). Today the U.S. Social Security system has been in the news a lot lately. While politicians throw around dramatic words like “crisis” and “bankrupt,” regular Americans have more mundane concerns. Social Security has assisted to defend millions of employees from scarcity in their elder years, but demographic truths have transformed over the last seventy years and are still altering. (Smith, 2010)
If Social Security does not transform with them, the system will be incapable to fulfill its guarantees to tomorrow’s retirees and will load the next generations, our children and grandchildren, with hard taxes. The President would let Americans save some of their Social Security taxes in personal retirement accounts that they own and that Congress can never legislate away. Personal retirement accounts would strengthen Social Security by assisting all US citizens to raise their retirement income and pass on a nest egg to construct a better fiscal future for their households. (Smith, 2010)

Several Social Security professionals think the system is in crisis because it will soon be incapable to fulfill its guaranteed distribution payments to qualified retirees (Koitz, 2003). Republicans and Democrats tend to have extremely different concepts not only about how the Social Security system should encounter this disaster, but they also vary considerably on how the regime should address personal retirement requirements.
Social Security is financed by the payroll taxes of existing employees to pay the advantages of current retirees (Smith, 2010). Projected long run project costs are not sustainable under new program parameters. Social Security’s yearly excesses of tax income over expenses are anticipated to fall sharply this year and to stay about stable in 2010 because of the financial depression, and to increase only briefly before declining and turning to stable cash shortfalls starting in 2017 that will increase as the baby boom generation retires. By 2046, the Social Security trust funds will be exhausted and advantages would need to be cut by about twenty-five percent (25%) across the board. (Smith, 2010)
Additionally, this excess is a product of an intergovernmental move system. The Social Security surplus is provided to the Treasury Department and restored with IOUs. This intergovernmental transfer is various type normal regime debts as we consider of it, because when a person purchases a regime bond, he or she has an economic claim against the regime. When the regime problems itself an IOU to one of its own accounts, it has not bought anything or established an accusation against another organization or individual. (Smith, 2010)
The major cause for the looming monetary crisis is that our community is aging. The “Baby Boom” generation has previously begun to gather their Social Security retirement benefits. As a consequence, there are fewer employees to support each retiree than when Social Security was made. Raising life expectation, and the approaching retirement of more Baby Boomers continues to put growing stress on Social Security every year. Over the next many years, the number of retirees is anticipated to grow more quickly than the number of people whose taxes will pay for future benefits. Because of this, the number of employees supporting each Social Security beneficiary is estimated to fall from 3.3 nowadays to 2.2 in 2041. When evaluating these figures with those from 1950 (when there were sixteen employees for every one beneficiary), the modifications in the program become obvious. (Smith, 2010)
This future is coming with steady speed. Social Security's annual cash surpluses will begin to fall in 2010, the same year that the first baby boomers reach early retirement age. Over roughly the next 10 years, those Social Security surpluses, about $100 billion a year at their peak will continue to shrink and then disappear completely. Without those surpluses to reduce the size of the federal deficit, Congress will have to raise taxes to bring in billions of dollars of new revenues, cut programs, or let annual deficits climb. (William, 2007)
And then the real problems will hit. Somewhere around 2017, on top of replacing Social Security's $100 billion annual surplus, Congress will have to find billions more so that Social Security can pay all of the benefits that it has promised. Within about five years, that additional money will reach $100 billion a year (not counting inflation). From there, the annual demands will reach first $200 billion a year, and soon $300 billion a year. (Zeleny, 2009)
Then there is Medicare. Together, Social Security and Medicare will consume an estimated 60 percent of income taxes collected by 2040. What's left would have to finance the entire rest of the government. Without reform, Social Security's future is inevitable, like it or not. We can either prepare now, or worry about what year it will happen (Zeleny, 2009). Wishful thinking did not stop the Romans, and it will not prevent Social Security's problems either. While there may not be an immediate crisis, there is certainly a problem. As both President Obama and former President Bush have said, it will be a lot easier to fix the problem now than it will be in 30 years, when the system is in imminent danger (Smith, 2010). The remaining question is what can be done to fix the problem?

Solving the Social Security Problem

In theory, there are two easy answers to any budget problem is increase income (in this case, raise the percentage taken out of workers' paychecks for Social Security) or reduce spending (in this case, cut the amount paid out in Social Security benefits). In reality, neither of those solutions is simple, since raising taxes is never a popular political decision, and cutting Social Security benefits will negatively affect millions of retirees. The raw numbers bring these potential changes into perspective: According to the Trustees' report, an increase of 1.89 percent in the Social Security payroll tax would keep the account full for the next 75 years. To achieve similar results, benefits would have to be cut 13 percent. (Smith, 2010)
President Obama has made a different proposal, one that has resulted in a great deal of controversy. He wants to allow people to put some of their Social Security payments (up to 4 percent) into privately held accounts that would be invested in the stock market (Zeleny, 2009). Supporters of this plan say that stock market gains will offset future deficiencies in the Social Security system. They also note that this privatization would give Americans more control over their earnings, as they would own their own retirement accounts instead of simply turning the money over to the government.
Opponents of privatizing Social Security list several reasons why they think it would do more harm than good:
• Social Security is efficient, spending slightly more than half a cent out of every dollar paid out on administrative costs. Private Social Security accounts used in other countries waste as much as 15 cents per dollar. (Zeleny, 2009)
• Taking money away from government-run Social Security would gradually weaken the system. Eventually, the benefits it would be able to provide would shrink tremendously. (Zeleny, 2009)
• Estimates of increased earnings from private accounts may be based on overly optimistic stock market projections. (Zeleny, 2009)

President Obama has also offered another plan which he calls “progressive indexing.” Under the current system, cost-of-living increases are tied to the CPI-W (Consumer Price Index for All Urban Workers). Progressive indexing would keep that system for workers making $30,000 per year or less. High-income workers would get increases tied to the CPI-U, which doesn't go up as fast as the wage index because it covers a larger percentage of the U.S. population. Workers earning an income in the middle of the two would get cost-of-living increases based on a formula that combines wage and price growth. The end result would be an overall cut in benefits, with higher-income workers bearing most of the cuts over time.
In conclusion, another proposal involves raising the $90,000 cap on income taxable for Social Security. Variations involve creating a new surtax on income above $90,000, usually between 2 and 6 percent. This would put more money into the system without increasing the tax burden on lower income workers. The government borrowed the surplus and paid the interest on the national debt. Now we face a double problem. The generations behind the baby boomers are smaller in size. This means that the money coming into social security is dropping. As the baby boomers retire, the outputs are going up. Combined, the annual surplus that social security had is now effectively gone. This means we are going to need to start paying money into social security and also find money to use to pay the interest on the national debt.

Similar Documents

Free Essay

A Broken System

...A Broken System SOC 304: Social Gerontology October 29, 2012 The Social Security System, created in 1935, is the one of the most costly items in the federal budget today. The program was created to provide old age, survivors and disability insurance to a large portion of Americans, mostly the elderly who are now out of the work force. The Social Security Act was a major turning point in American history Today the U.S. Social Security system has been in the news a lot lately. While politicians throw around dramatic words like crisis and bankrupt, regular Americans have more concerns. Social Security has assisted to defend millions of employees from scarcity in their elder years, but demographic truths have transformed over the last seventy years and are still altering. (Smith, 2010) If Social Security does not transform with them, the system will be incapable to fulfill its guarantees to tomorrow’s retirees and will load the next generations, our children and grandchildren, with hard taxes. The President would let Americans save some of their Social Security taxes in personal retirement accounts that they own and that Congress can never legislate away. Personal retirement accounts would strengthen Social Security by assisting all US citizens to raise their retirement income and pass on a nest egg to construct a better fiscal future for their households. (Smith, 2010) Several Social Security professionals think the system is in crisis because it will soon be incapable to...

Words: 850 - Pages: 4

Premium Essay

Introduction Broken Families Earn Less and Experience Lesser Levels of Educational Achievement Whether or Not a Child’s Married and Stay Married Has a Massive Effect on His or Her Future Prosperity and That of the Next

...Introduction Broken families earn less and experience lesser levels of educational achievement whether or not a child’s married and stay married has a massive effect on his or her future prosperity and that of the next generation. Unfortunately, the growth in the number of children born into broken families in Philippine. Children from broken families are nearly five times more likely to suffer damaging mental troubles than those whose parents stays together, Government researched has found it also showed that two parents are much better than one if children are to avoid slipping into emotional distress and anti-social behavior. The findings say that the children’s family background are important. Marriage is also another small social system which is the foundation of a family. The dissolution of marriage contracted between men and women by the judgment of a court or by an act of the legislature is called divorce. In other words, it is the legal termination of marriage. Through marriage two individuals start to live together to continue their conjugal life as well as for the creation of new generation. But divorce has severe impact on the family and ultimately on the society. It fractures a family unit, interrupts child rearing as well as children’s and women’s socioeconomic security in the society. Though divorce has become more acceptable over time, an inverse relationship exists between socioeconomic status and divorce rate. It has been found that to establish a peaceful...

Words: 497 - Pages: 2

Premium Essay

Mathews vs. Eldridge: a Case Review

...The Mathews vs. Eldridge Case: A Review of the Significance of Due Process. In my opinion of the case Mathews vs. Eldridge was a valid claim in such that Mr. Eldridge wanted to be heard and felt as if his social security benefits had been unjustly terminated. In review of the case it is found that the Mathews vs. Eldridge case established a new precedence in deciding if due process is appropriated. The result of the case was that there should be a balance between “the interests affected and the administrative burden.” (www.invisipress.com). Mr. George Eldridge had been a Social Security beneficiary from June of 1968 up until July of 1972. His original Social Security disability benefits were noted as being because of back strain and chronic anxiety, later Mr. Eldridge contended in a written reply to the administration, after being told his benefits were to become terminated, that he had spinal arthritis and that there was enough formal documentation to determine disability benefits presented at earlier dates. The agency proceeded to terminate his benefits and informed him that he had the right to file a rebuttal within six months to be heard for reconsideration. Mr Eldridge did not do so; though Mr. Eldridge had been offered a post-termination procedure in which an oral evidentiary hearing was to be included, he instead chose to bring suit and argued that Fifth Amendment Rights had been violated. The suit claimed that Mr. Eldridge’s benefits had been terminated in violation...

Words: 678 - Pages: 3

Premium Essay

Immigration Dbq

...According to the U.S. Citizenship and Immigration Services article Late Twentieth Century, “visas were divided into 3 separate categories: family-sponsored, employment-based, and “diversity” immigrants selected by lottery from countries with low immigrant volumes. This new system was to directly combat the influx of illegal migrants by increasing immigration opportunities. In the post September 11th society the need to enforce strict and better regulation on immigration laws were at an all time high. In an attempt to protect the nation from terrorist attacks, law enforcement emphasised on the deportation of criminal aliens and strict border security. With the Homeland Security Act of 2002, the nation no longer had an Immigration and Naturalization Service department by March 1, 2003. According to the U.S. Citizenship and Immigration Services article Post-9/11, came “three new federal agencies serving under the newly-formed Department of Homeland security: Customs and Border Patrol, Immigration and Customs Enforcement (ICE), and U.S. Citizenship and Immigration Services.” Each entity emplaced to better the public and control mass illegal...

Words: 1381 - Pages: 6

Premium Essay

Quiz

...Class Quiz for Security+ 1. Which access control method is primarily concerned with the role that individuals have in the organization? a. MAC b. DAC c. RBAC d. STAC 2. A need to know security policy would grant access based on: a. Least Privilege b. Less Privilege c. Loss of Privilege d. Single Privilege 3. Which type of attack denies authorized users access to network resources? a. DOS b. Worm c. Logic Bomb d. Social Engineering 4. Your Help Desk has informed you that they received an urgent call from the VP last night requesting his logon ID and password. What type of attack is this? a. Spoofing b. Replay c. Social Engineering d. Trojan Horse 5. What is the most common form of authentication? a. Certificates b. Tokens c. Passwords d. Biometrics 6. What is the C in the security CIA model stand for? a. Certificates b. Central c. Confidentiality d. Consider 7. What kind of attack are hashed passwords vulnerable to? a. Man-in-the-Middle b. Dictionary or Brute Force c. Reverse Engineering d. Denial of Service 8. What is the most difficult type of cabling to eavesdrop on? a. Coaxial b. Fiber Optic c. Shielded Twisted Pair(STP) d. Unshielded Twisted Pair(UTP) 9. Computer Forensics experts collect evidence and analyze data using...

Words: 268 - Pages: 2

Premium Essay

Mis 535 Week 7 Homework Mis535 Week 7 Homework

...MIS 535 Week 7 Homework Click below link for Answer http://workbank247.com/q/mis-535-week-7-homework/13272 http://workbank247.com/q/mis-535-week-7-homework/13272 1. Social media sites result in loss of personal information because (Points : 1) |        sites lack appropriate tools to prevent security fraud.        hackers spend more time working to penetrate the sites.        users are not careful and share inappropriate business or personal information.        Wikileaks is publishing social media site information. | Question 2.2. Information systems (Points : 1) |        pose traditional ethical situations in new manners.        raise new ethical questions.        raise the same ethical questions created by the Industrial Revolution.        raise ethical questions primarily related to information rights and obligations.  | Question 3.3. The feature of social institutions that means mechanisms are in place to determine responsibility for an action is called (Points : 1) |        due process.        accountability.        courts of appeal.        the judicial system.  | Question 4.4. The process in law-governed societies in which laws are known and understood and there is an ability to appeal to higher authorities to ensure that the laws are applied correctly is called (Points : 1) |        liability.        due process.        courts of appeal.        FOI appeals.  | Question 5.5. Immanuel Kant's Categorical Imperative states...

Words: 994 - Pages: 4

Premium Essay

Cj 1220 Assignment 1.1

...Criminal Justice System and three main functions of each. I will also explain how the creation of the Department of Homeland Security changed the structure of federal law enforcement along with whether or not its creation enhanced or hindered the coordination of federal law enforcement efforts. Assignment 1.1 The American Criminal Justice System is a large and complex system consisting of many different people trying to complete many different tasks. As complex and sometimes confusing the system is, it can be broken down into three main parts. Those parts are: Police, Courts, and Corrections. Each part has very distinct roles. The roles of the police are to serve as the initial contact an offender has with the criminal justice system. The police are charged with maintain civil and social order. They also investigate wrong doings and make an arrest. After arrest, the offender then moves into the second part of the criminal justice system, the courts. The courts are where the offender is allowed to argue in his/her defense. In America, we offer the right to an attorney provided by the state, if the offender cannot afford a private one. The judge, or jury, will hear the case and all arguments by the prosecution and the defense, and then make a ruling. If the offender is found “not guilty,” he/she is released from the criminal justice system. If the offender is found “guilty,” he/she then moves into the third and final part of the criminal justice system, corrections...

Words: 577 - Pages: 3

Free Essay

Team

...Identifiable Stakeholders Federal Stakeholders: Attorney General Eric Holder Secretary of the Interior Ken Salazar Secretary of Labor Hilda Solis Secretary of Homeland Security Janet Napolitano Valerie Jarrett, Assistant to the President & Senior Advisor Nancy Ann DeParle, Assistant to the President & Deputy Chief of Staff for Policy Melody Barnes, Assistant to the President & Director of Domestic Policy Council Gene Sperling, Assistant to the President for Economic Policy & Director of National Economic Council AustanGoolsbee, Chairman, Council of Economic Advisers Cecilia Munoz, Deputy Assistant to the President & Director of Intergovernmental Affairs Heidi Avery, Deputy Assistant to the President for Homeland Security State and Local Stakeholders: Leith Anderson, President, National Association of Evangelicals Hon. Michael Bloomberg, City of New York Bill Bratton, Former Police Chief, City of Los Angeles and City of New York Hon. Julian Castro, Mayor, City of San Antonio Secretary Michael Chertoff, Former Secretary Homeland Security Governor John Engler, President and CEO, Business Roundtable Hon. Eric Garcetti, City Council, President City of Los Angeles Secretary Carlos Gutierrez, Former Secretary of Commerce Raymond Kelly, Commissioner, New York City Police Department Senator Mel Martinez, Former United States Senator/Chairman, Florida, Mexico, Central America and the Caribbean JP Morgan Chase Greg Page, Chairman & CEO, Cargill Secretary Federico...

Words: 526 - Pages: 3

Free Essay

Sampling

...reviewed and additional information will be discussed as to how they relate to each other and how the information could be used in a business or other setting. Part 1: Survey Analysis: Entertainment Social gaming is taking the desktop and console gaming world to new heights by attracting gamers that might not have every touched a video game before according to Shaer, (2010). He reports that 56.8 million American consumers over the age of 6 had participated in social game playing over the past three months. According to the U.S. Census Bureau, the 2010 population was 281,421,906, and Shaer’s 56.8 million consumers represent approximately 20% of the overall population. I was surprised to find the accuracy in Shaer’s numbers representing one-fifth of the U.S. population in 2010. That is a staggering number of people doing nothing more than playing games! To further understand the impact these numbers have on social gaming sites such as PopCap Games, I visited the Information Solutions Group website that was responsible for collecting the data relative to how the gaming population is broken down among gender, age, frequency of play, etc. Their updated study dated November 14, 2011, led to a plethora of information regarding the social gaming phenomenon and who the players are within the system. It was quite an...

Words: 2203 - Pages: 9

Premium Essay

Accountancy

...Researches UNDERGRADUATE RESEARCH WORK THE EFFECT OF BROKEN HOMES ON SCIENCE EDUCATION STUDENTS (A case study of some selected secondary school in Sokoto south local government) BY MUSTAPHA ABDULHAMID 0711404245 BEING A PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF BACHELOR’S DEGREE IN SCIENCE EDUCATION, EDUCATION CHEMISTRY, DEPARTMENT OF SCIENCE AND VOCATIONAL EDUCATION, FACULTY OF EDUCATION AND EXTENSION SERVICES USMANU DANFODIYO UNIVERSITY, SOKOTO. DECEMBER, 2011 .       TABLE OF CONTENTS TITLE PAGE. i APPROVAL PAGE. ii DEDICATION.. iii ACKNOWLEDGEMENTS. iv TABLE OF CONTENTS. vii CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY. 2 1.2 STATEMENT OF THE PROBLEM… 4 1.3 RESEARCH QUESTIONS. 5 1.4 RESEARCH HYPOTHESES. 6 1.5 OBJECTIVES OF THE STUDY. 6 1.6 SIGNIFICANCE OF THE STUDY. 7 1.7  SCOPE AND DELIMITATION OF THE STUDY. 8 CHAPTER TWO REVIEW OF RELATED LITERATURE 2.0 INTRODUCTION.. 9 2.1 CONCEPT OF HOME, SCIENCE STUDENTS AND EDUCATION.. 10 2.2 IMPORTANCE OF THE HOME. 13 2.3 NEEDS OF SCIENCE STUDENTS AS CHILDREN.. 15 2.4 THE ROLE OF HOME IN SCIENCE STUDENTS EDUCATION.. 18 2.5 BROKEN HOMES. 19 2.6 INFLUENCE OF BROKEN HOME ON ACADEMIC ACHIEVEMENT OF SCIENCESTUDENTS  20 2.7 CONCLUSION.. 24 CHAPTER THREE RESEARCH METHODOLOGY 3.1 INTRODUCTION.. 25 3.2 RESEARCH DESIGN.. 25 3.3  POPULATION OF THE STUDY. 26 3.4 SAMPLE AND SAMPLING TECHNIQUES. 28 3.5 INSTRUMENTATION.. 28 3.5.1 VALIDITY OF INSTRUMENT. 29 3.5.2 RELIABILITY OF INSTUMENT. 29 3.6 METHOD OF...

Words: 10647 - Pages: 43

Premium Essay

Right Realism

...assumes it takes a more realistic view of the causes of crime and deviance. Right realists believe crime and deviance are a real social problem that requires practical solutions. It is said that right realism perpetuates moral panics as a means of swaying the public to agree with their views. For example, the media claims that elderly people are scared to be attacked when venturing out, when in actuality crimes against OAP’s are minimal. (0.3 against men 75+ and 0.2 against women aged the same). Right realists believe that official statistics often underreport crime. But right realists believe they are able to paint a more realistic picture of crime and deviance in the UK. Right realists believe that crime is a growing social problem and is largely committed by lower working class male juveniles, often black, in inner city areas. Right realists believe that there are six causes of crime: The breakdown in moral fabric of society; a growing underclass in the UK; a breakdown in social order; opportunity for crime and that some people commit crime as a deliberate and rational choice. As more crime is committed, society itself deteriorates and this in turn leads to more crime. Marsland in 1988 stated that crime and deviancy is linked to the breakdown in the moral fabric of society. Schools and religion have become less effective agencies of social control and that the moral glue of society, which gave it its authority, has gone. Marsland believes that this has led to a decline...

Words: 1507 - Pages: 7

Premium Essay

Business Fraud

...billion messages on their behalf each year. On March 30th, 2011 Epsilon announced that unknown intruders had broken into one of its email servers and accessed the names and email accounts of some of its 2,500 corporate customers, including 7 of the Fortune 10. Companies affected by the breach include the grocery store Kroger, Walgreens, Best Buy, Tivo and significant household banks such as JP Morgan Chase, U.S. Bancorp, Citigroup, Capital One, and Barclays Bank to name a few. Roughly 50 companies were affected by this major breach one that the Guardian called “the largest Internet security breaches in U.S. history” . Experts say the good news is this was not credit card data, Social Security numbers, or account numbers and passwords. The hackers mainly got email addresses and names. Even though these scammers did not receive credit card information or social security numbers it is still a major breach that can cause serious damage to its clients. This is a concern because of a crafty way to obtain personal information from someone through a technique called phishing. “Phishing is a type of Internet fraud that seeks to acquire a user’s credentials by deception. It includes theft of passwords, credit card numbers, bank account details, and other confidential information. Phishing messages usually take the form of fake notifications from banks, providers, e-pay systems...

Words: 904 - Pages: 4

Premium Essay

Role and Functions of Law

...not do. Many people feel that they can do things and get away with them or do things the way they want to do them. If the world was, free of laws, there would be no order and without order, there would be up roar throughout the world. According to Reference.com (2007), law is “rules of conduct of any organized society, which is enforced by threat of punishment if the law is violated.” Laws started out simple but moved to becoming bigger and started to have levels to them. Laws that were broken went through a system called court that helped punish those who broke laws. The following paragraphs will discuss the roles of laws and the courts involving them in today’s business environment. Laws Functions of laws are important and are important to understand, as there are functions that make laws important the roles are important also. Functions of laws can start at making sure that there is peace, making sure that personal freedom is promoted, and making sure that social justice is promoted. As the functions are known, the roles also have to be known, if the functions of laws are understood the roles of laws come right alone to be understood. Laws make sure that people stay protected, and to help ensure people that they can try to live free. Levels to Laws As many, know that laws...

Words: 1013 - Pages: 5

Premium Essay

Fdgdsfg

...mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.[2] In my opinion, threat can cause damage unconsciously and deliberately. But attack must be implemented on purpose. It also means that threat can result from people as well as other kinds of power and when the safety of Information security faces the threat of other power, people’s control is always limited. But attack must comes from people and can be prevented by people. Take myself as example, I used to like reveal my private information with the help of some social tools or websites and I didn’t realize that these acts were threats. Until one day, my computer was attacked by someone and he got these information and caused some loss to me. The other example is that two months ago, it was still summer and the temperature was really high. When my friend was playing computer games, the CPU suddenly broken down because of it was too hot. References: [1] Free download of ISO/IEC 27000:2009 from ISO, via their ITTF web site. [2] Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems. 2. study the various attack methods can help people have a deeply understanding of hackers’ means...

Words: 315 - Pages: 2

Premium Essay

The Transitioning Workplace

...more accessible for the decision making process and produces results in a timelier manner using virtual networks, databases, and web pages. Emphasized is the flexibility and convenience of wider coverage using internet. Advances contributed to the internet are communications capabilities such as email, file sharing, creating websites, and e-commerce (Obiri-Yeboah, Owusu-Ansah, & Odei-Lartey, 2013). Emails, Video Conferences, and Chat rooms let a large number of personnel receive the same data in different locations and have a recorded stream of communication, increasing memory capabilities through added storage space, traceability, and logs. Next dis-advantages are not as clearly noted but can be quite drastic when it comes to the social interaction, dependency, and personnel issues that may arise. Integration of technological advances makes face to face interaction less necessary, as larger portions of information are conveyed to larger groups...

Words: 765 - Pages: 4