Recent orders

Network infrastructure of Miles High Stadium

Network infrastructure of Miles High Stadium

Name:

Institution:

Date:

Summary

Currently, large organizations have organized network infrastructures in technology towers for their servers and storages, databases network as well as end users. Most of these technology domains are often integrated with smaller towers having their own department interfacing with different associates in their organization to develop and support their operations (Davies, 2012). However, as the business become more global, this models that are put in place becomes less effective and efficient and seems to be reaching their limits.

This is mainly because the customers’ expectations grow each time as the technologies advances. Owing to this, the organizations are slowly turning away from sophisticated network infrastructures to more efficient plan-built- run models for organization (Davies, 2012). This helps in facilitating a wide set of performance and eventually improving the objectives of transformation. Consolidating information technology network infrastructure by large organizations across different business, the model designs are combined with central and regional infrastructure tower elements (Clemm, & Walter, 2013). Therefore to avoid duplication of activities in an organization and improve efficiency, the network infrastructure helps in the diagnosis of issues pertaining to application performance in terms of proper information management. A study on a stadium domain service as conducted and its entire network infrastructure reviewed.

Task one

Mile high stadium is located in the city of Denver, Colorado. This is modern stadium that embraces network infrastructure in its operation in terms of information technology (Desmond, 2013). The stadium is independently operating its own domain name service (DNS) that enable easy access to the information via the website. HYPERLINK “http://www.sportsauthorityfieldatmilehigh.com/stadium-information/”http://www.sportsauthorityfieldatmilehigh.com/stadium-information/ is the domain service name used to retrieved information about mile high stadium.

This information represents the names used to locate internet addresses and active directory which is a private network. The domain name service helps in performing the name resolution from every client that arrives at the server of the stadium (Desmond, 2013). This is then converted to an IP address that gives a correspondence to that particular website that is hosting the server and a response is re-laid depending on the content that is requested in the web. In this case this case the information concerning the stadium is displayed (Jeffrey & Piyasat, 2012). If this is not done correctly, an error message is displayed on the site by the browser.

The domain name service has root which is denoted by a dot coming at the end of the URL and a top level domain that is represented by ‘com’. The top level domain is followed by the lower domain that makes the word ‘sportsauthorityfieldatmilehigh’ to be identified. The DNS server operates using a referral to perform the task of search resolution (Jeffrey & Piyasat, 2012). It exchanges the information required from the stadium with the root name server to the top level domain authoritative server that eventually retrieve information about the top level domain (Motta et al, 2011). For instance, the DNS of the stadium successfully retrieved stadium information, the packing and directions, host and event, event tickets and the stadium contact among other details (Minasi, 2014).

For an organization network infrastructure to operate, the components such as primary domain controller must be effectively configured (Mankell & Segerberg, 2012).In the domain system, the primary domain controller act as the controller for organization clients that do not have active directory software for clients. In addition, the organization network requires a router which helps in forwarding data packets within a given network using the address of required destination (Clemm, & Walter, 2013). The information obtained from the pocket data is important in retransmitting the data packet in the network. The firewalls regulate the access to organization procedures and policies that guide network operations. This is executed through proxy service, packet filtering, creating a perimeter network and tasteful inspection among others (Mankell & Segerberg, 2012).

Task two

The stadium has many departments that ensure objectives and goals are achieved. These departments include department of corporate entertainment, guest services department and ticketing section among others (Minasi, 2014). The organization structure of Mile high stadium is organized into a central system with the board of directors occupying the upper most level of the management and the hierarchy descends down to the general workers who also ensure that the objectives of the stadium are achieved. Different departments operate in an integrated manner in carrying out their functions. For instance, the head of department of guest services is charged with the responsibility of ensuring that the client’s needs are fulfilled in terms of food and accommodation (Theiss et al 2013). The department ensures that the customers orders are attended to by delegating duties to the sections in this department for example the food department in their docket provides catering services to the client at the stipulated time. The accommodation department directs the client to places they can relieve themselves and even change their attires.

The communication flows from the top management to the bottom through the use of computer network in the organization (Rudolph & Schneider, 2013). The head of corporate and entertainment department also in collaboration with the top management of the stadium ensures that clients are promptly attended to. The head of department communicates its request from the clients to the employees that work under his/her docket through the use of the computer network. The tasks are them performed by the employees and the feedback communicated to other corresponding departments to enhance the leadership responsive to client’s requirement (Motta et al, 2011). The entire organization department in the stadium is integrated so that every department is involved in the organizations operations.

128587524130Board of directors

Board of directors

2066925422910 CEO

CEO

-70485045720HOD. Guest services

HOD. Guest services

1838325112395HOD. Entertainment

HOD. Entertainment

4638675183515HOD. Ticketing

HOD. Ticketing

5267960190500Ticket issuance

Ticket issuance

2667000209550Event planning

Event planning

4124325152400Printing

Printing

228600257175Accommodation

Accommodation

1628775257175Security

Security

-829310276225Food

Food

The above diagram represents the general organizational structure of Mile high stadium.

The diagrams below represent the structure of three main department of the stadium which is entertainment, guest services and the ticketing department.

4486275285750HOD. Guest services

HOD. Guest services

285750-219075HOD. Entertainment

HOD. Entertainment

1352550150495Event planning

Event planning

-685800211455Security officer

Security officer

-733425215265Gate guards

Gate guards

1352550215265Address system

Address system

5305425118110Accommodation

Accommodation

3438525118110 Food

Food

3200400344805 Catering

Catering

5543550344805Lodge section

Lodge section

153352522860 HOD. Ticketing

HOD. Ticketing

369570092075Printing

Printing

-34290015875Ticket issuance

Ticket issuance

-342900219710 Accounts

Accounts

369570031115 Distribution

Distribution

Active directory of the organizational structure of Mile high stadium is based on hierarchy from the board of directors to the chief executive officer (Desmond, 2013). It passes further down to the general employees that deal with services ranging from food and accommodation to issuing of tickets at the stadium. For each of the three main departments there several departments that ensures their efficiency (Farnham et al, 2012). For instance, the department of guest services has other two sub departments which are food and accommodation. Corporate entertainment department consist of security section and the section that coordinates all the programs that run in the stadium. Finally the ticketing department which has sections that deals with ticket printing and distribution of the bought ticket. These are just departments among others (Jeffrey & Piyasat, 2012).

Active directory construction depend on application protocol for modifying and querying directory services and a treelike structure for representing a directory of organizations structure, its Domains Groups and individual units (Farnham et al, 2012).. This is then put together with the Domain Name System and helps the organization in naming domains, individual computers and servers. For successful functioning of Active Directory, Domain Name Service must first be configured.DNS enables Active Directory to use the windows DNS service to perform its function faster and efficiently (Motta et al, 2011). Furthermore, the configured active directory can be used to find the domain names, IP addresses and objects and locate services by using their service location records (Farnham et al, 2012).

In the case of the Miles high stadium, the active directory can be derived from its organization structure as follows: widows’ server-board of directors- chief executive officer-guest services- food and accommodation, windows clients-board of directors-chief executive officer-corporate entertainment-security and event planning and windows user-board of directors-chief executive officer-ticketing-printing and issuing (Desmond, 2013).

Task three

Successful implementation of the stadium active directory entirely depends on the management system because it is being accessed by many users that have diverse needs and should therefore acquire access level (Henrie, 2013). This approach should be based on a clearly defined criterion according to the level of the client’s requirement. Before the commencement of the operation, it is prudent to establish legitimate users of the network for proper creation and maintenance of the accounts. Different users should be identified with particular accounts their access levels (Jeffrey & Piyasat, 2012). This process should be based on specific computers and domains. The criteria depend mainly on the privileges the user account has and the ability to access the corresponding network resources.

Predetermined user account for administrator will be the head of departments of guest services, entertainment and ticketing and the sections working under them will access the directory through an account called guest account (Desmond, 2013). However, this guest account is properly designed to match the requirements of the stadiums network infrastructure. In addition, the clients of the stadium that will be making inquiries of the services wills also be granted access of the directory through the guest account (Motta et al, 2011).

These accounts will not require password in order to access because it is developed for the outsiders to access the stadium in formation. However, the administrator account has a password that is keyed in before the access is granted (Desmond, 2013). This is because the information therein relates to security of the stadium and contains vital information about the entire operation of the stadium (Davies, 2012). The password used is only known by the users that can access is often changed to enhance confidentiality of the operation. Network administrator created is also responsible to create network accounts for new clients of the stadium the new account formed must have a user name and a password that conforms to certain standards corresponding to the password strength set by the administrator (Shelly & Vermaat, 2012).

Moreover, additional parameters that may affect access rights and the privileges pertaining to the role of the user and the approved requirement for network resources (Stallings & Lowrie, 2013). The configuration of a default user account provides minimum rights and thus should be must be configured to enable additional privileges to the clients (Svidergol et al, 2013). Each and every new user is added, a manual update of a user account is supposed to be developed even though it may prove to be time consuming (Wu et al, 2013).

In order to implement the domain controller system of the stadium, there are several services that must be installed on the main server which allows access to networked computers and other resources like information shared (Shelly & Vermaat, 2012). The central computer that acts as principle is then connected to the network and controlled only by unauthorized user in accessing the server (Stallings & Lowrie, 2013). However every client should access a number of services such as directory services which is on a system that stores information in a directory. These services helps in supporting the stored information as w ell as enabling its access (Svidergol et al, 2013).

Task four

It is important to subject a new network program to a pilot test to ascertain if it is effective (Basile, 2011). However, before testing a network infrastructure it is important to create a testing environment this help in identification of design problem before the network is fully deployed even though it is time consuming and may need a test network is deployed (Wu et al, 2013). A testing plan is first created alongside a test t cases, the test is then conducted and finally the results are evaluated.

After a test plan has been created. It is important to produce a list of clearly defined objectives that are to be accomplished at the completion of the test (Motta et al, 2011). Moreover, different parameters are checked and specific aspects of the network deployment are assessed of a given network infrastructure. The network infrastructure should be in compatibility with hardware and network devices used, the compatibility of operating systems and applications software is then put to test (Tirgari, 2012). Evaluation of hardware and software components of the network is also done to determine a performance baseline to help in benchmarking certain features of network. The mechanism of testing security is then documented (Rudolph & Schneider, 2013).

Basis of the test case should be on a plan that is given to the tester and is be in the form of identified steps, indicating how to use the network and handling of the computer devices (Basile, 2011). This should be based primly on the network element being tested and attempt to exhaust all functions and any procedure that maybe followed. However, the main focus of the test case should be to identify any errors and weaknesses on the network infrastructure (Motta et al, 2011). The access of administrator directory should be permitted only to the authorized users. Therefore, it is prudent to manage permissions in an efficient and effective manner.

This is done obtained through issuing of different permissions to individual user depending on the part of the network infrastructure (Tirgari, 2012). Moreover, the assigning of permissions should be done according to the specified groups to allow more efficient management approach. This can be connected to the main directory but permissions should be set for specific directory files (Henrie, 2013). Direct permission should be granted on folders of read, change, and full control of the infrastructure. The services such as printing and ticketing should be shared over a network developed .however, configuration should be done to establish how these services are shared between the user network .even through the terms used may differ varies between various stages and versions in the same management system (Motta et al, 2011).

There should be proper when management of the disk space that is available in a network designed (Mankell & Segerberg, 2012). It is also important to assign disk quotas to determine if there is limitation in the space of each user. It also ensures that each user has available resources that do not expand beyond what the expected storage requirements. On top of this file compression should be performed to save space and avoid unnecessary waste of resources. Deciding on which files and folders is necessary to even though it may be more time consuming to use them. (Motta et al, 2011) This process makes it possible for the contents of folders to be kept in a compressed and efficient state. The other more confidential way is by encrypting files and folders to deter unauthorized access to the files (Davies, 2012).

The security of the network is paramount to the organization especially with regards to those who are accessing the network from outside (Sitzabee et al, 2013). Therefore, using a mote access method is important as it is based on the routing and remote access service from the main windows server. This is necessitated through the use of dial-up and visual private network method. Using the internet in connecting to the developed network by applying a tunneling connection involving the users to come up with a visual network that give access to the main network server.

The integration of the remote access server in creating a more safe and secure tunnel for the passing of information from different departments is key to the organization operations (Theiss et al 2013). Visual private network is one of the security approaches that is predominantly applied in large organization because it allows many users to connect to the network. On the other hand it offers a continuous remote access to the network as the remote access server of the organization is permanently connected to the internet (Sitzabee et al, 2013). Implementing the policy of a remote access to the network authorizes the client in accessing the server. The access policy involves conditioning of the policy including the type of authentication, the restriction day, restriction time and data link to the network (Rudolph & Schneider, 2013).

It also include all the protocol that are used, the group of windows permitted to connect to network and type of tunnel used (Davies, 2012). In connection to that, permission of remote access which is either allowed by ensuring that the conditions of the policy are satisfied or the explicit access is granted by an administrator. Finally, the file of the remote access that includes the constraints of dial-in and the configurations of the IP address and the type of encryption used for the network should be clearly defined (Motta et al, 2011).

In conclusion, the stadium should put in place additional measure regarding security of the network infrastructure by installing intrusion detection system which closely monitors every possible intrusion network (Davies, 2012). This kind of network systems may be deployed on a specific network server to check on the server logs for an external intruder or may be installed on Network-based server to monitors network data traffic on the network during the operation (Clemm, & Walter, 2013).

References

Basile, A. (2011) Networking system and innovation outputs: The role of science and technology parks. International Journal of Business and Management, 6(5), 3-15. Retrieved from HYPERLINK “http://search.proquest.com/docview/867071928?accountid=45049″http://search.proquest.com/docview/867071928?accountid=45049

Clemm, A., & Wolter, R 2013. Network-embedded management and applications: Understanding programmable networking infrastructure. New York, NY: Springer.

Davies, J. 2012 Understanding IPv6: Your Essential Guide to IPv6 on Windows Networks.

Desmond, B., 2013. Active directory designing, deploying, and running Active Directory.

Farnham, O’Reilly Jeffrey S. Beasley & Piyasat N 2012. A Practical Guide to Advanced Networking: Third Edition Pearson.

Henrie, M. (2013) Cyber security risk management in the SCADA critical infrastructure environment. Engineering Management Journal,25(2), 38-45. Retrieved from HYPERLINK “http://search.proquest.com/docview/1434438191?accountid=45049″h ttp://search.proquest.com/docview/1434438191?accountid=45049

Mankell, H., & Segerberg, E 2012. Firewall. London, Vintage.

Minasi, M., 2014. Mastering Windows Server 2012 R2. Indianapolis, Sybex.

Motta, G., Barroero, T., Galvani, F., & Longo, A.(2011). IT service level management: Practices in large organizations. Communications of the IBIMA, Retrieved from HYPERLINK “http://search.proquest.com/docview/1437173167?accountid=45049″http://search.proquest.com/docview/1437173167?accountid=45049

Organization for Economic Cooperation and Development 2012. Latin American economic outlook: 2013. [S.l.], Oecd.

Rudolph, S., & Schneider, F. (2013). Political barriers of implementing carbon markets in japan: A public choice analysis and the empirical evidence before and after the fukushima nuclear disaster. Environmental Economics and Policy Studies, 15(2), 211-235. doi:http://dx.doi.org/10.1007/s10018-012-0049-z

Shelly,Gary B., & Vermaat, Misty, E 2012. Enhanced Discovering Computers, Complete 2012 Your Interactive Guide to the Digital World

Sitzabee, William E, Ph D,P.E., U.S., & Harnly, M. T., U.S.A.F. (2013). A strategic assessment of infrastructure asset-management modeling. Air & Space Power Journal, 27(6), 45-68. Retrieved from HYPERLINK “http://search.proquest.com/docview/1503683646?acco%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20%20Theiss,%20V.,%20Krespi,%20N.%20T.,%20&%20Lavarda,%20C.%20E.%20F.%20(2013).legitimating%20implication%20in%20the%20process%20of%20the%20implimenting%20an%20ERP%20system%20in%20aholding%20company.%20Journal%20of%20Information%20Systems%20and%20Technology%20Management%20:%20JISTEM,%2010(2),%20287-302.%20Retrieved%20from%20http://search.proquest.com/docview/1440824157?accountid=45049%20untid=45049″http://search.proquest.com/docview/1503683646?acco Theiss, V., Krespi, N. T., & Lavarda, C. E. F. (2013).legitimating implication in the process of the implimenting an ERP system in aholding company. Journal of Information Systems and Technology Management : JISTEM, 10(2), 287-302. Retrieved from http://search.proquest.com/docview/1440824157?accountid=45049 untid=45049

Stallings, W., & Lowrie, B 2013. Computer security principles and practices Pearson Edu.

Svidergol, B.,Allen, R., & Hunter, L. E 2013. Active Directory cookbook. Beijing: O’Reilly.

Tirgari, V. (2012). Information technology, policies and procedures against unstructured data:.Academy of Information and Management Sciences Journal, 15(2), 87-106. Retrieved from HYPERLINK “http://search.proquest.com/docview/1037809135?accountid=45049″http://search.proquest.com/docview/1037809135?accountid=45049

Wu, Y., Cegielski, C. G.,Hazen, B. T., & Hall, D. J. (2013). Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud. Journal of Supply Chain Management, 49(3), 25-41. Retrieved from HYPERLINK “http://search.proquest.com/docview/1467435391?accountid=45049″http://search.proquest.com/docview/1467435391?accountid=45049

The Great Depression and its far reaching effects

The Great Depression

The great depression has far reaching social effect. The great depression can be explained as the great economic depression. It preceded the First World War and was very severe. The greatest social effect was the widespread poverty all over. The wide spread poverty during the period of economic crisis lead to skyrocketing of the rate of crime. This is because there were so many unemployed people who resorted to criminal activities so as to manage a meal. Many who were jobless resorted to petty theft. There was a rapid rise rate of prostitution. Women were desperate as they were unable to pay their bills and provide for their children so they resorted to prostitution (Shiller 98). Many family units became stronger during this crisis. This happened because those who were jobless found themselves at home with their families and the family ties became stronger. There were also business men who found themselves back at home to their wives and children as their business crashed. Thus the gap the jobs and business caused in the families units was closed. Other families units became weak because the bread winners could no longer provide for the families leading to frequent fights. Another social effect of great depression was homelessness. Without an income many people especially those who had mortgaged homes lost their homes and ended up in makeshift dwellings which had poor sanitation and heating. It was during this period of deprivation that a generation referred to as the greatest generation by a Tom Brokaw came to birth. This is the name used to refer to those who grew up in the United States during this period.

The thrift had a number of merits though the demerits outnumbered the merits. First and for most there were family units that were strengthened as a result of the great depression. This as explained above was due to joblessness and fall of business that brought back the businessmen and the jobless back to their homes. When the family is close knit and the ties are strong, a conducive environment for upbringing the children is produced. This also helps in producing god values in the society. It was at this period a generation that contributed positively to the society grew up. This generation participated in the war and with their political dissent they contributed positively to the society.

The role that the great depression plays in our social consciousness is the effects of poverty in a society and thus poverty must always be fought tooth and nail. Another thing is that moral decadency of a society is more inclined to poverty (Shiller 157). When people in a society are not able to meet their needs they are forced to do anything however immoral to meet their needs. People will result to theft which results to hatred and tension in a society. When the crime rate rises the levels of insecurity arise and people leave in fear. Worse the thief even resort to taking lives in their quest to steal from other people. This generally means that the society is in chaos and is disintegrated. Thus burden to fight poverty is placed on the society and the leadership so as to avoid a state of chaos in the society.

It is as important as it was 50 years ago. Nothing has changed. Poverty as similar effects on the society as it had 50 years ago. People will resort to theft and other petty crimes when they are poor even to date. Prostitution in the contemporary society is practiced mostly by women who are poor and wish to foot their bills. Thus the effects and the lesson of great depression are relevant even to date.

My generation may be a bit different since formal education has permeated all the corners of the society. Even though the economic depression may result to poverty it may not be as severe as many people have the formal education and though they main earn little compared to what they are supposed to earn they are still able to meet the basic needs. However the standards of living for my generation may go down. People already used to high standards of living may not be able to adapt easily.

CITATIONS

Shiller Robert. The effects of the great depression. United States: Norton publishers,2008

Healthcare Practices that Cause Conflict

MHA 614: Policy Formation & Leadership in Health Organizations

Healthcare Practices that Cause Conflict

The healthcare organization has many layers of business. When one enters the hospital they are focused on how they are going to get well, and not what business plans are being made. In most businesses there are sales and marketing; this proves to be the same for any healthcare organizations. As a result there are many influences on the healthcare market, causing professional conflict for healthcare practices. It sounds complex, but is considered the norm in the healthcare arena.

The problem with the marketing influences is it takes away from the seriousness of patients’ health. Each pharmaceutical company, medical equipment company, or the supply companies are working hard to promote their new products. Their marketing tactics does not always involve the reactions or needs of the patients. The goal is to make the healthcare facilities and their physicians think their product is the best for their organization or patients.

Three healthcare practices that create conflict are gifts (including meals), provision of pharmaceutical samples, and grants for research projects (Harrington & Estes, 2008). The three listed practices were chosen due to the high volume of usage. They are the ones that you most frequently notice being used. At times these practices have been known to cross the line when it comes to the patients’ wellbeing. It is viewed as sacrificing the patient’s health for a dollar.

Giving gifts (including meals) is a way the particular promoting organizations work to manipulate the different healthcare organizations and physicians. This is done when the healthcare organization is given lunches, pens, tablets, highlighters, and bags for promoting a certain medication or product. What better way to have an organization focus on your product, than to have them see the product name ever time they write a note. This makes the product name more familiar in the facility, hopefully to encourage the use of the particular product.

Providing pharmaceutical samples to doctor’s offices and private practices is another way of healthcare practices creating conflict. This was a practice that has been used for years. A pharmaceutical representative would visit a healthcare facility; then meet with the manager/administrator to inform them of how wonderful their product is. At the end of the information session the pharmaceutical representative would leave samples of the medications to use or have their patients to try. The goal of leaving samples is to promote their product, in hopes that the physicians will prescribe their medication on a regular basis. This would work in their favor of increasing their profits. Then one has to ask, which is more important: the patients or the profits?

Lastly there are the grants for research projects. This is another healthcare conflict that is continuously addressed. This is carried out when a particular pharmaceutical organization or medical supply company provides grants to research facilities. This is done with the goal that the research facility would complete research studies using their products. This would give the pharmaceutical companies adequate data about the created medication or product. This is just another way to strong arm the health care system.

According to the Wall Street Journal Europe, “conflicts of interests may influence research, education and clinical decision-making in ways that compromise clinical integrity and patient care, and may lead to increased health care costs” (Stossel, 2012). It is suspected that different pharmaceutical organizations promote their new drug, but the cost is extremely high for patients. Because of this “the Obama administration is finally poised to enact badly needed regulations requiring that the manufacturers of drugs, medical devices and medical supplies disclose all payments they make to doctors or teaching hospitals. The information, which would be posted on a government Web site, will allow patients to decide whether they need to worry about any possible conflicts of interest (New York Times, 2012).

Years ago the issues discussed were not considered to be conflicts of interest. If a pharmaceutical rep came to a healthcare facility to give a presentation about their new medication, and brought lunch or goodies was only a plus. This is from the healthcare staff’s opinion only. At times medication samples are the only way patients can get their medications, so this is considered a plus also.

There are many healthcare conflicts of interest that have to be taken into account. There are new regulations that have been passed by the government to help mandate these conflicts. There are now websites that patients can review for information about gifts received by their doctors or healthcare facility. There is a good understanding for the need to market new products for sale to these healthcare organizations, but it should not come at the expense of the patients.

In conclusion, some of the medications that are being promoted by the companies are too expensive for the patients to buy. So after they are done with samples, they are without their medications finding themselves noncompliant. I work in the insurance realm of the healthcare, and see this situation on a daily basis. The doctor prescribes the medication, the insurance company does not pay for it (not on the formulary), and the patient is without the medication. My solution would be for all healthcare organizations and physicians to turn their priority focus to the patients. After review of a patient’s medical records and health history, the physician will then evaluate which medication should be prescribed. I think the doctors should go back to researching for themselves. They should research which medication is best for the patient, not a drug rep pushing the new cholesterol statins. Prescribing medications should be done on a personal, patient by patient basis; not on the basis of what’s new on the market. If the focus is placed solely on the patients this would reduce some of the created healthcare conflicts.

References

Harrington, C. & Estes, C. L.(2008). Health policy: Crisis and reform in the U.S. health care delivery system (5th ed.). Sudbury, MA: Jones and Bartlett.

Thomas P. Stossel. (2012, January 24). Who Paid for the Doctor’s Bagel? Wall Street Journal (Europe), p. 16.  Retrieved from ProQuest Newsstand.

Who Else Is Paying Your Doctor: [Editorial]. (2012, January 21). New York Times (Late Edition (east Coast)),  p. A.22.  Retrieved from Banking Information Source.