Verified Document

Business Law Predators Businesses Often Engage In Research Paper

Business Law (predators Businesses often engage in predatory practices to deter their competitors from entering their market niches or send their competitors out of business. Certain business ventures usually reduce their prices to destroy their rivals or worse still discourage new entry into the market. This happens regardless of the existence of the Sherman Act that was enacted to prohibit this predatory practice. The Sherman Act has largely been considered vague because of its inability to reign in firms that engage in predatory pricing vice (Areeda & Turner, 1975). Business ventures that engage in predatory pricing tend to draw a very vague line between legitimately competitive prices and prices that are utterly predatory. Businesses that engage in predatory pricing normally price their products below appropriate measure of cost with an intention of driving their financially weaker competitors out of business and establishing monopoly power. Courts have failed to address the issue of predatory pricing in context of the antitrust laws (Oster & Strong, 2001). There are no standards that address cost/price test. The antitrust laws have failed to come up with standards that hold prices below...

There is more to predatory pricing that is not known as it also involves intertemporal behavior patterns that cannot be adequately addressed by comparison of prices and costs. It is a strategic behavior with intertemporal undertones (Oster & Strong, 2001). Those engaging in predatory pricing do not incur losses in standard accounting sense. He incurs lower profits. The predator incurs economic losses as opposed to accounting losses.
Other than predatory pricing, there are also other predatory practices like the predatory lending that is very prevalent in mortgage lending in Hispanic communities. Predatory lenders thrive in subprime market in Latino communities where subprime mortgage grew by 26% in from 1994 to 2000 (Bowdler, 2005). Predatory lending is very difficult to pinpoint. Its features are subtle and difficult to define. Predatory loans are characterized with high interest rates and mandatory arbitration clauses. Interest rates charged on loans borrowed are often higher than warranted by borrower's credit risk. The mandatory arbitration clauses often force borrowers to give up their right to litigate in the event that something is wrong…

Sources used in this document:
References List

Areeda, P. & Turner, D.F. (1975). Predatory Pricing and Related Practices under Section 2 of the Sherman Act. Harvard Law Review, 88(4), 697-733.

Bowdler, J. (2005). Jeopardizing Hispanic Homeownership: Predatory Practices in the Homebuying Market. National Council of La Raza, 15, 1-20.

Oster, C.V. & Strong, J.S. (2001). Predatory Practices in the U.S. Airline Industry. Retrieved May 27, 2013 from http://ntl.bts.gov/lib/17000/17600/17602/PB2001102478.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Cyber Crime Is a Serious
Words: 2431 Length: 8 Document Type: Term Paper

These "stepping stone" computers can be located anywhere in the physical world because real-space is irrelevant to activity in cyberspace (Brenner, 379)." The use of stepping stones can make it difficult for law enforcement to find where an attack actually originated. As was previously mentioned in this discussion, Hackers are often used by companies to develop stronger security. Hackers often perfect their techniques at conventions that also feature hacking competitions.

Social Networking Privacy Online Privacy
Words: 3284 Length: 10 Document Type: Essay

But research is very mixed on what that answer is when the data is voluntarily revealed. For example, if someone "likes" Apple on Facebook and Apple then in turn markets Apple products to that person, it should be asked whether Apple is acting improperly. Companies with products that compete with Apple could do the same thing. Research bears out that this question comes down to personal and professional ethics

Teenager's Awareness and Their Lack
Words: 8637 Length: 31 Document Type: Term Paper

In this article, the author describes the technological, demographic, and market forces shaping this new digital media culture and the rich array of Web sites being created for children and teens. Many nonprofit organizations, museums, educational institutions, and government agencies are playing a significant role in developing online content for children, offering them opportunities to explore the world, form communities with other children, and create their own works of

Mortgage Fraud
Words: 13949 Length: 38 Document Type: Term Paper

Mortgage Fraud If a rash of armed bank robberies swept across America next year, and if in these robberies criminals absconded with $30 billion dollars, one may be certain that a public panic would ensue. The banking system would likely be changed forever. If thousands of armed thugs went rampaging across the nation forcing people out of their homes, into the streets, and then destroying the properties, leaving the occupants homeless

Internet Privacy for High School Students
Words: 12595 Length: 40 Document Type: Term Paper

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now