Structure CS The Advances Of Annotated Bibliography

There have been numerous attempts to intervene in determining the target groups for such video games by the policy makers. More precisely, legislative acts have been undertaken in several states that would limit the purchase of video games by minors (Thierer, 2003). However, such initiatives are against the First Amendment of the Constitution and were therefore rejected. Despite the fact that such an option may have reduced the number of video games purchased by minors, it may not have had the desired results largely because not all video games are violent. Indeed additional care should be provided to limit violent video games from influencing children and young adults, but the total ban of video game purchasing by minors would not have reached the desired result. Minors could have requested an adult to purchase such video games and it would have only pushed children of thinking of different methods to acquire these video games.

A proper solution, although not the only one, represents the labeling of video games that are violent, contain sexual explicit scenes, or are simply a negative influence on children. It is rather difficult to limit the access to products in a free market and in the end, the role of the state is to allow its citizens the right to a choice and to safe guard that this right is upheld. By properly pronouncing itself on the content of the video game (whether it is violent or sexually explicit or contains vulgar language or action) the consumer will make the decision to purchase or not based on an informed...

...

Unless these violent video games are declared illegal, the consumer has the right to chose but this choice can be done knowing that the content of the video game overall is not suitable for children or young adults.
Overall, it can be concluded that video games represent a two faced mirror. While on the one hand they can benefit self-development, on the other hand they can have a negative impact on children and young adults. The action that can be taken by the state, with full and due respect for the rights of the consumer and for the respect of the Constitution is to provide the consumer with a warning that one video game or another contains acts of violence, sexual behavior, or explicit vulgar language or scenes. In this way, the consumer makes the choice fully aware of the content and possible consequences.

Works Cited

Gentile, D.A. (2007). Violent Video Games as Exemplary Teachers: A Conceptual Analysis. Institute of Science and Society. Journal of Youth and Adolescence.

Rudon, T. (2011). 10 Benefits Of Video Games. Retrieved from SelfGrowth.com: http://www.selfgrowth.com/articles/10_Benefits_Of_Video_Games.html

Thierer, A.D. (2003, Jan 23). Regulating Video Games: Must Government Mind Our Children? Retrieved Sept 4, 2011, from Cato Institute: http://www.cato.org/pub_display.php?pub_id=11521

Sources Used in Documents:

Works Cited

Gentile, D.A. (2007). Violent Video Games as Exemplary Teachers: A Conceptual Analysis. Institute of Science and Society. Journal of Youth and Adolescence.

Rudon, T. (2011). 10 Benefits Of Video Games. Retrieved from SelfGrowth.com: http://www.selfgrowth.com/articles/10_Benefits_Of_Video_Games.html

Thierer, A.D. (2003, Jan 23). Regulating Video Games: Must Government Mind Our Children? Retrieved Sept 4, 2011, from Cato Institute: http://www.cato.org/pub_display.php?pub_id=11521


Cite this Document:

"Structure CS The Advances Of" (2011, September 06) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/structure-cs-the-advances-of-45293

"Structure CS The Advances Of" 06 September 2011. Web.23 April. 2024. <
https://www.paperdue.com/essay/structure-cs-the-advances-of-45293>

"Structure CS The Advances Of", 06 September 2011, Accessed.23 April. 2024,
https://www.paperdue.com/essay/structure-cs-the-advances-of-45293

Related Documents

In this manner, it makes network management and filtering a lot easier. Even though SPF can protect the network infrastructure against certain attacks that are known to exploit the weaknesses that are inherent in the various network level protocols, it can never provide protection at application level. The application defense needs more awareness of the content of the payload. Circuit Proxy Firewall (CPF) This type of firewall operates by relying as

" (Polkinghorne, p. 4) As with Lewis before him in our discussion, Polkinghorne supplies a reason for the certainty of God's presence in scientific affairs most simply because he believes there is no other more likely or rational explanation for certain accomplishments. Like Lewis, Polkinghorne simply places beyond the grasp of human capacity a certain loosely defined category of things that must inherently be accounted for by the unseen power of

United States to Respond to a WMD Attack Within Our Borders? The objective of this study is to answer how prepared the United States is to respond to a WMD attack within its borders and to answer whether there is enough capability to effectively respond to such an attack. This study will further answer as to whether the response plan and command control structure clearly understandable and whether everyone has

Are Video Games Art
PAGES 30 WORDS 8319

Pervasive Video Games as Art The form and function of art has evolved and changed quite a bit over the years, decades and millennia. Paintings and sculpture have been artistic mainstays for much to most of the world of the civilized human race. However, with the technological revolution that has roared up over the last fifty years or so, new forms of art have bubbled to the proverbial surface. Digital technology

" "STUDENT INFORMATION TABLE" ( "STUDENT ID" CHARACTER (4) NOT NULL, NAME CHARACTER (25) NOT NULL, "STREET NUMBER" CHARACTER (10) NOT NULL, "STREET NAME" CHARACTER (25) NOT NULL, CITY CHARACTER (25) NOT NULL, STATE CHARACTER (10) NOT NULL, EMAIL CHARACTER (25) NOT NULL, "PHONE NUMBER" CHARACTER (15) NOT NULL ); CONNECT RESET; SQL FOR Book_Information CONNECT TO LIBRARY; CREATE TABLE "USER"; CREATE TABLE BookInformation ( "BookISBN" CHARACTER (10) NOT NULL; "AUTHOR" CHARACTER (25) NOT NULL; "TITLE" CHARACTER (50) NOT NULL; "PRICE" CHARACTER (10) NOT NULL; CONNECT RESET; SQL STATEMENT FOR

Data Management Systems
PAGES 16 WORDS 4416

Practice Fusion Strategic Planning Document: A Plan for Conversion, Integration, and Implementation of Electronic Health Records (EHR) in a Residential Care Facility Description of Institute The objective of this study is to examine the implementation of a new information technology data-management plan at a residential care facility for individuals with mental illness/mental retardation. This facility also provides day treatment and respite care. This will include a two-person practice for a Nurse Practitioner and a