Management Information Technology

Management Information Technology

Introduction

The introduction of information technology was indeed groundbreaking as it marked a new dawn for the contemporary world. Information technology is a term used to underline the application telecommunications equipment and computers in the storage, transmission, as well as manipulation of data usually in the context of business entities. Computation has been around for thousands of years. However, the entry of computers undoubtedly marked an enormous leap with regard to information technology. Needless to say, there have been incredible developments right from the invention of computers. These have been aimed at enhancing efficiency and effectiveness of information technology in the varied functions. This has undoubtedly resulted in the incorporation of information technology in almost every aspect of the contemporary human life. It goes without saying that every year, new developments and leaps in the world of information technology are made. These are incorporated in varied industries including healthcare, security, defense, education, communication and others. On the same note, they have varied impacts on the industries within which they are applied, with some displacing earlier technologies or even complementing. This paper outlines the developments that have recently been made in the world of information technology, as well as their subsequent impacts in their respective industries or the technology industry as a whole.

Kattau, S (2013). Embarcadero RAD Studio XE4 enables ‘true native’ app development. SD Times, web retrieved from HYPERLINK “http://sdt.bz/45657” http://sdt.bz/45657

The release of the RAD Studio XE4 has ushered in Embarcadero Technologies into the debate pitting HTML5 against native code for the development of mobile application. It allows developers to get rid of their HTML5 tools for true native code. While HTML5 comes with enhanced time-to-market, the native code offers better user experience and application performance. RAD Studio XE4 is similar to native Android applications but does not necessarily operate at its best in those. It can be used by developers to create applications for personal computers, smartphones, and tablets thereby giving users an experience equal to applications that are created using platform SDKs. Embarcadero uses compilers and Delphi language thereby developers to write once running true native on the devices. Developers expect that they can write it once using the true native code, as well have it operating on different supported devices, which is what the developing company is doing with Macintosh OS X, Windows 64, Windows 32 and iOS with Delphi, which means that one language is used on one product, a single codebase and one compilation on all platforms. The developers are also working with their C++ compiler so as to give their C++ developers the same capability in the future. Its key features include full application framework for Mac OS X, Windows and iOS, Full Visual designer for user interfaces in Windows, Mac and iOS with numerous orientation and resolutions among other features.

Application analysis

This application allows business application to have up to ten times faster with in-built enterprise class database and visual development support. In addition, it allows developers to design and develop their applications with reusable and extendable visual component building blocks, thereby allowing for highly maintainable and faster development. On the same note, rapid on-device prototyping allows developers to create a visual prototype operating on the target device so they can quickly have feedback and get the applications to market fast. The development of multi-device applications using this software eliminates the necessity of maintaining a separate development project so as to deliver the application natively for multiple devices such as smartphones, Personal computers and tablets on multiple platforms such as Mac, Windows or iOS. On the same note, it eases the process of building script-free and true native applications that expose the entire range of device performance and capabilities incorporated in the underlying devices. On the same note, security from hackers is catered for in the application. A large number of development vendors allow for multi-platform development using runtimes and scripting languages that are targets of notorious hackers thereby presenting inherent security risks on the mobile devices. The studio brings a true native application development thereby allowing the code to run directly on the device and lowering the risk of attacks from third parties.

Shah, A (2013). Powerful thin clients may be alternative to PCs. Infoworld retrieved from HYPERLINK “http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255” http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255

Thin client was introduced by Hewlett-Packard and Dell with faster processor and high-definition graphic capabilities than the existing thin clients thereby providing an alternative to the conventional personal computers. The desk-side thin clients incorporate advanced visualization features allowing virtual desktops to host numerous applications in a single session. These Thin Clients are essentially personal computers that don’t have local storage but have network connectivity. Virtual desktops on thin clients run applications that are stored in remote servers through virtualization technologies from VMware, Citrix, and Microsoft. They incorporate the capacity to operate high-definition games that are delivered over cloud. While thin-client computing may not be an entirely new idea, the incorporation of cloud comes with a new twist. The new thin client fits in the emerging cloud model considering that more applications are centralized to the data center, not to mention that businesses may consider upgrading Windows XP PCs to thin clients that have the capacity to host Windows 7 instances. While this new device is less expensive than PCs, the implementation of cloud-based computing model with the server and software resources may be expensive. On the same note, as much as the larger part of processing is done on the server side, it is necessary that powerful thin clients are incorporated considering that applications are dependent on heavy-client processing or graphics.

Analysis of its effects

Cloud computing has been all the range in the recent times. It provides an avenue through which an individual has increased capacity and capabilities on the fly without making any investment on new infrastructure, licensing new software or even training new personnel. It encompasses subscription-based that extends the existing capabilities of IT in real time over the internet. This, therefore, eliminates the restrictions pertaining to physical capabilities of computers. This is what the invention of thin clients that have remote servers introduces to the computer world. It is worth noting that the powerful thin clients allow for on the fly performance, which, therefore, increases the flexibility.

Simonite, T (2011). What Bitcoin Is, and Why It Matters. MIT Technology Review retrieved from HYPERLINK “http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/” http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/

This software was born out of the need for individuals to undertake a secure electronic exchange of money without necessarily incorporating the help of a third party like financial institutions. Bitcoin was based on cryptographic techniques that enable individuals to ensure that the money they receive is genuine even when they do not trust the sender. An individual would download the Bitcoin client software and run it, thereby allowing it to connect to a decentralized network of all users of the software through the internet. It would also create a pair of distinctive and mathematically linked keys that the user would need so as to exchange Bitcoins with other clients. One of the keys is public with its version dubbed Bitcoin address being given to other individuals so that they can send the individual Bitcoins, while the other key is private and hidden in the users’ computer. It is impossible to work out an individual’s private key using their public key, therefore, preventing any impersonation. However, the two keys are transferable to another computer as they are stored in a transferable file. Once a transaction is performed the Bitcom software carries out the operations to blend one’s private key and the other party’s public key with the bitcoins that an individual wants to transfer. This operation’s results are sent across the distributed bitcoin network to allow for the verification of the network by bitcoin software clients that are not participating in the transfer.

Analysis

The efficiency and accuracy of the banking sector has been incredibly watered down in the recent times. It is well recognized that a large number of frauds and criminal activities in the banking sector has involved ATMs (Automated Teller Machines). However, it is well recognized that the ATMs are inefficient in a certain way especially considering their affiliation with certain financial institutions and money transfer corporations. Nevertheless, the entry of Bitcoin seems to settle this issue thereby eliminating the need for third parties such as financial institutions in sending and receiving money, as well as ensuring that the money is genuine. This comes with an element of efficiency and effectiveness especially considering that the genuineness of the money is verified, not to mention the security that is encompassed considering that not even a super-computer can crack the private key. Needless to say, it has an enormous effect on the use of financial institutions. Of course, it is worth noting that Bitcoins are not controlled by anybody, not even the federal bank, in which case the fixed supply of money that it allows would make it difficult to undertake deflation of goods and services in the contemporary world, which is extremely dangerous.

Jackson, J (2013). IBM preps SmartCloud for real-time analytics. Infoworld, retrieved from HYPERLINK “http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274” http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274

International Business Machines (IBM) intends to use its version 10.5 of its DB2 database on its SmartCloud IaaS (Infrastructure as a Service). This database comes with a new set of technologies that have the capacity to speed up data analysis by over 25 times. SmartCloud has the capacity to run copes of SAP’s HANA in-memory database for development and test jobs. The BLU acceleration technologies incorporated in the DB2 database offers columnar processing where only columns are processed thereby speeding up the performance. In addition, it bypasses unnecessary data and may use multiple processor cores to undertake a query via parallel vector processing techniques. In addition, it incorporates a compression technology that lowers the space needed by a data set while offering easy access for quick analysis. Every DB2 instance on SmartCloud has the capacity to operate on up to 16 processor cores, a combination of which would manage at least a terabyte of memory. This technology would allow a customer to set up a system that can carry out data analysis in real time. Organizations can store data in data warehouse or in Hadoop cluster, after which they would use varied BI tools to get the patterns and other intelligence. It is proposed that the same BI tools are used in keeping data in-memory, as well as analyzing it on the fly. The company offers to run copies of SAP HANA on SmartCloud for data analysis. Nevertheless, pricing information is the company works with individual clients to determine how much the SmartCloud Database service should cost on case-by-case basis.

Analysis of its impact

Like every new technology, the incorporation of the version 10.5 of DB2 database on SmartCloud Iaas is aimed at enhancing efficiency and effectiveness especially with regard to data processing and analysis. This appears to have been met considering that the database incorporates new technologies that can speed up data analysis by more than 25 times, not to mention allowing for compression of data thereby reducing the amount of space that is needed by a data set, while also providing easy access for quick analysis. Needless to say, this is a groundbreaking move by the company considering that it is the first company to undertake

On the same note, choosing not to set the price and allowing it to be determined on a case to case basis is undoubtedly a first as it allows for customization of the database according to the needs of the customer. In addition, the effect of the invention can be felt across the industry with other cloud providers making changes. For example, Google reduced the cost of the Google Cloud Datastore by about 25%, while Microsoft expanded its Azure cloud service to China.

Science News (2013). Facial-Recognition Technology Proves Its Mettle. Science Daily retrieved from HYPERLINK “http://www.sciencedaily.com/releases/2013/05/130524142549.htm” http://www.sciencedaily.com/releases/2013/05/130524142549.htm

This article outlines the development of facial-recognition technologies with three technologies being evaluated. One of the three proved to be effective in providing a “rank one” identification. However, in one of the tests, the suspect could not have his face matched at a high rank because he wore sunglasses. This technology is said to have high accuracy levels (99 percent accurate) under conditions where the face is angled to the camera and in good lighting. It is noted that automatic recognition of face has the capacity to quickly attach a name to a particular face through searching the database of face images and coming up with the closest match, thereby replacing the manual way used by law enforcement agencies. The automatic system speeds up the identification process and eliminates the possibility of an innocent person being incarcerated.

Technology application analysis

Needless to say, this technology comes as extremely crucial to law enforcement forces especially with regard to identification of criminals. In addition, it comes in handy in eliminating the possibility that an innocent person will be incarcerated and questioned for a crime. This means that the law enforcement agencies will not only be using their time more efficiently but also more effectively especially considering the high accuracy levels with which it comes. However, the fact that the technology is unable to function so efficiently in certain conditions such as poor lighting, when the individual is not facing the camera directly or in instances where the individual is wearing sunglasses and other face masking items, underlines the need for increased development, research and innovation so as to enhance its accuracy and effectiveness. This, however, does not undermine its incredible effectiveness and accuracy especially in the right conditions.

References

Kattau, S (2013). Embarcadero RAD Studio XE4 enables ‘true native’ app development. SD Times, web retrieved from HYPERLINK “http://sdt.bz/45657” http://sdt.bz/45657

Science News (2013). Facial-Recognition Technology Proves Its Mettle. Science Daily retrieved from HYPERLINK “http://www.sciencedaily.com/releases/2013/05/130524142549.htm” http://www.sciencedaily.com/releases/2013/05/130524142549.htm

Jackson, J (2013). IBM preps SmartCloud for real-time analytics. Infoworld, retrieved from HYPERLINK “http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274” http://www.infoworld.com/d/cloud-computing/ibm-preps-smartcloud-real-time-analytics-219274

Simonite, T (2011). What Bitcoin Is, and Why It Matters. MIT Technology Review retrieved from HYPERLINK “http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/” http://www.technologyreview.com/news/424091/what-bitcoin-is-and-why-it-matters/

Shah, A (2013). Powerful thin clients may be alternative to PCs. Infoworld retrieved from HYPERLINK “http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255” http://www.infoworld.com/d/computer-hardware/powerful-thin-clients-may-be-alternative-pcs-219255

BUSA 3000 Quantitative Analysis for Business

BUSA 3000 Quantitative Analysis for Business

Homework Assignment 2 (40 points)

Name /Last Name:

IMPORTANT: For each question: First provide the formula and then show your calculations for your answers.

If calculations didn’t provide, a 50% deduction; if formulas didn’t provide a 10% deduction; if both didn’t provide, a 70% deduction will be conducted. If you are going to provide work and have mistakes still you can get partial points for your work.

The questions in this assignment covers these topics:

Chapter 10: Inference about Means and Proportions with Two Populations

Question 1 & 2 10 points

(25%)

Chapter 11. Inferences about Population Variances

Question 3 & 4 10 points

(25%)

Chapter 12. Tests of Goodness of Fit Independence and Multiple Proportions Question 5 & 6 10 points

(25%)

Chapter 13. Experimental Design and Analysis of Variance Question 7 & 8 10 points

(25%)

You can find similar questions with their answers in the exercise file of each chapter. These files located under each folder of related Chapters.

Please, provide one file as a pdf or doc for your HW assignments. So, if you are writing by hand, you have to merge your photos in a pdf file. I will not accept separate pictures, photos. You have to arrange your assignment and submit in a professional manner. Homework assignments will be available for approximately 7 days. I will not accept any excuse or any submissions through email.

Please, provide your answers under each question.

Chapter 10: Inference about Means and Proportions with Two Populations

Question 1 (5 points)

Consider the following hypothesis test.

The following results are for two independent samples taken from the two populations.

a.What is the value of the test statistic? (2 points)

b.What is the p-value? (2 points)

c.With a α=0.5, what is your hypothesis testing conclusion? (1 point)

Question 2 (5 points)

Consider the following data for two independent random samples taken from two normal populations.

a.Compute the two sample means. What is the point estimate of the difference between the two population means? (1 point)

b.Compute the two sample standard deviations. (2 points)

c. What is the degrees of freedom for the t distribution? (1 point)

d. What is the 90% confidence interval estimate of the difference between the two population means? (1 point)

Chapter 11: Inferences about Population Variances

Question 3 (5 points)

An automotive part must be machined to close tolerances to be acceptable to customers. Production specifications call for a maximum variance in the lengths of the parts of .0004. Suppose the sample variance for 30 parts turns out to be s2= .0005. Use a α= .05 to test whether the population variance specification is being violate (use p value approach)

H0: 2 .0004

Ha: 2 .0004 Research hypothesis

Question 4 (5 points)

Two new assembly methods are tested and the variances in assembly times are reported. Use α=.10 and test for equality of the two population variances.

The hypothesis

H0: 1 2 = 2 2

Ha: 1 2 ≠ 2 2

Computing the value of the test statistic

F = s12s22=2512=2.083The p-value is the probability of obtaining the value of the test statistic, or a value more extreme. The p-value is the number or interval in the column title of Table 4 containing the F-value with df n = 31-1 = 30 and df d = 25 – 1 = 24

0.05 = 2 x 0.025 < P < 2 x 0.05 = 0.10

P < 0.10, Therefore, reject Ho.

Chapter 12: Tests of Goodness of Fit Independence and Multiple Proportions

Question 5 (5 points)

Suppose we have a multinomial population with four categories: A, B, C, and D. The null hypothesis is that the proportion of items is the same in every category. The null hypothesis is

H0: pA =.pB = pC = pD = .25

A sample of size 300 yielded the following results.

A:85 B:95 C:50 D:70

Use α=.05 to determine whether H0 should be rejected. What is the p-value?

Expected frequencies: (1 point)

Actual frequencies: (0.5 point)

(1.5 points)

degrees of freedom: k – 1 = (0.5 point)

Using the table with df = ,= …………. shows the p-value is…….. than ……….. (0.5 point)

Conclusion:(0.5 point)

p-value ………….05, ………….H0

Complete this sentence based on your conclusion: (0.5 point)

The population proportions ……………. the same.

Question 6 (5 points)

The following table contains observed frequencies for a sample of 240. Test for independence of the row and column variables using a α=.05.

H0: The column variable is independent of the row variable

Ha: The column variable is not independent on the row variable

Observed Frequencies (fij) (0.5 point)

  A B C Total

P Q R Total Expected Frequencies (eij) (1 point)

  A B C Total

P Q R Total Chi–Square Calculations (fij – eij)2 / eij (1.5 points)

  A B C Total

P Q R =

Degrees of freedom = (r – 1)(c – 1) = (0.5 point)

Using the table with df = ………,=……………….. shows the p–value is ………. than ………… (0.5 point)

Conclusion: (0.5 point)

p–value ……….. .05, ……………. H0.

Complete this sentence based on your conclusion: (0.5 point)

The column variable …………… independent of the row variable.

Chapter 13: Experimental Design and Analysis of Variance

Question 7 (5 points)

The following data are from a completely randomized design. (Data file can be found in the D2L.)

a.Compute the sum of squares between treatments. (.5 point)

x = 119 + 107 + 100/3 = 107.9

SSTr = 8*(119 – 107.9) ^2 + 10*(107 – 107.9) ^2 + 10*(100 – 107.9) ^2 = 1617.86

dfBG = 3 -1

= 2

The mean square between groups is,

MSBG = SSdf=1617.86/2 = 808.93

b.Compute the mean square between treatments. (.5 point)

MSBG = SSdfMSTr = 1617.86/2 = 808.929

c.Compute the sum of squares due to error. (1 point)

SSE = (8 – 1) *146.86 + (10 – 1) *96.44 + (10 – 1) *173.78 = 3460

d.Compute the mean square due to error. (1 point)

3460/ (10 + 10 + 8 – 2) = 138.4

e. Set up the ANOVA table for this problem. Use the Excel Single Factor ANOVA test and provide screenshot: (1 point)

ANOVA table Source SS    df MS F    p-value

Treatment 1,617.86 2 808.929 5.84 .0083

Error 3,460.00 25 138.400 Total 5,077.86 27 f.At α= .05, is there a significant difference between the treatment means? (1 points)

Since the p-value (0.0083) is less than the significance level (0.05), we can reject the null hypothesis.

Therefore, we can conclude that there is a significant difference between treatment means.

Question 8 (5 points)

In a completely randomized design, 12 experimental units were used for the first treatment, 15 for the second treatment, and 20 for the third treatment. Complete the following analysis of variance. At a .05 level of significance, is there a significant difference between the treatments?

a. Complete the following ANOVA table. (3 points)

b. What hypotheses are implied in this problem? (1 point)

The p-value is 0.05

Consider Null and Alternative hypothesis.

Null hypothesis, all treatment means are equal.

Alternative hypothesis, all treatment means are not equal.

Hence, conclude that all treatment means are not equal

All treatment means are not equal.

c. At the α= .05 level of significance, can we reject the null hypothesis in part (b)? Is there a significant difference between the treatments? Explain.(1 point)

p < 0.01

p < 0.05

There is sufficient evidence to reject the claim of equal population means.

Top of Form

Source

of Variation Sum

of Squares Degrees

of Freedom Mean

Square F p-value

Treatments 1200 2 600 44 < 0.01

Error 600 44 13.6364 Total 1800 46

About the Causes

Name

Professor’s name

Course

Date

About the Causes, Symptoms, Effects, and Treatment for Depression

Introduction

Statistics from the Centers for Disease Control and Prevention reveal that 9.1% of the population suffers from minor or major depression. Feeling down, sadness, and sudden loss of interest in day-to-day activities are feelings that are familiar to people with depression. However, if they persist and interfere with the individual’s life, they may be suffering from depression. The World Health Organization reports that depression to be the leading cause of disability in the world and it affects all populations, including children, adolescents, and adults. Depression is defined as a mood disaster involving persistent feelings of loss of interest and sadness. Depression is a different condition from the mood fluctuations that people regularly encounter in their life. Depression is not a passing problem but rather an ongoing one. Depression can last years, months, and weeks. Some of the common forms of depression include major depression, bipolar disorder, persistent depressive disorder, psychotic depression, and postpartum depression. This essay discusses the symptoms, causes, effects, and treatment options for depression.

Signs and Symptoms of Depression

The signs and symptoms of depression differ across populations. Some of the general symptoms of depression include depressed mood, recurrent suicide threats, loss of interest that once gave an individual pleasure, difficulties in making decisions, loss of sexual desire, guilt, and changes in appetite. Depression is also manifested by fatigue, unintentional weight loss of gain, slow speech, agitation and restlessness, and sleeping too little or too much. Some depression symptoms, including anxiety, fatigue, mood swings, ruminating, and irritability, appear more in women than in other populations. The Centers for Disease Control and Prevention (CDC) posits that depression occurs twice in women as men. As regards the male population. The American Psychological Association notes that approximately 9% of the men in the United States have encountered anxiety and depression (Malhi and John, 2299). Men who suffer from depression are at more risk than women to drink excess alcohol, demonstrate anger, and engage in risky behavior due to depression. Common depression symptoms among men include excessive working without breaks, abusive or controlling behavior, avoiding family and social situations and difficulties in keeping up with family responsibilities. Among college students, some of the common symptoms of depression are insomnia, excessive sleep, avoiding social activities, difficulties concentrating in school, and decreased or increased appetite. College students have a stressful time because it is the first time the students are encountering other lifestyles and cultures. In teenagers, peer pressure and physical changes tend to trigger depression. Some of the common depression symptoms among teenagers include, restlessness, helplessness, withdrawal from family and friends, and difficulties concentrating in school. In children, common depression symptoms include vocal outbursts, clinginess, crying, deviant behavior and low energy. The Centers for Disease Control estimate that at least 3.2 % of children have suffered depression. Young children face difficulties expressing their feelings in words making it difficult to let their caregivers know they feel sad.

Causes of Depression

Although the medical fraternity is yet to fully understand the causes of depression, there are various possible causes of depression. Abuse is one of the factors that increase the chances of suffering depression. Sexual, emotional, and physical abuse can make a person vulnerable to depression. Substance abuse also causes depression. 30% of people with substance abuse problems also display clinical depression. Gold, M., et al. (22) note that “although the drugs and alcohol tend to temporarily make the addict feel better, eventually they aggravate to depression.” Another risk factor is age. Elderly people especially those without social support, are at higher risk of depression. Certain medications such as corticosteroids, interferon-alpha and isotretinoin tend to increase an individual’s risk of depression. Death or loss of a loved one also tends to trigger depression. Conflict such as personal disputes or conflicts with friends or family members also increases a person’s vulnerability to depression. Genes also increase the likelihood of suffering from depression if there is a history of depression in the family. Depression is seen as a complex trait that is caused when various genes exert small effects exacerbating disease risk. Worth noting, like most of psychotic disorders, the genetics of depression are not as straightforward as in other diseases that are purely genetic, like cystic fibrosis. Additionally, gender is also a risk factor for depression because women are twice at risk of suffering depression than men. Although nobody is sure why the hormonal changes for women during various points in their lives may have a direct role in this. Additionally, major events such as getting married, graduating from college, and even starting a new job can trigger depression. Even events such as losing income or a job, relocating to a new city, retiring, or getting divorced can also cause depression.

Effects of Depression

Depression has serious effects on a person’s physical health and well-being. In the United States, depression is among one of the widespread mental illnesses, affecting nearly 26% of the adult population (Eichstaedt et al., 11203). One of the effects of depression includes a weakened immune system. Depression weakens the body’s ability to combat diseases such as common cold and even more serious and long-term diseases like cardiovascular disease. Depression also results in low interest in sex. This is because it makes an individual lose interest in activities they enjoy doing, including sex. Additionally, antidepressants also affect a person’s libido. Another effect associated with depression is fatigue. If left untreated, depression wipes out a person’s energy levels during the day. Daytime fatigue can also be a result of nighttime insomnia. Another effect of depression is increased sensitivity to pain. People with depression tend to suffer headaches and other pain and the pain does not go away with medication. Weight fluctuations are also another effect of pain. Depression leads to loss of appetite and overeating. Depressed people who try to cope with food using food end up suffering stomachaches and obesity-related diseases while poor feeding habits lead to nutritional deficiencies. Additionally, stress and depression make blood vessels constrict, increasing the risk of cardiovascular disease. Depression also increases the risk of suffering a heart attack. Depression also brings along feelings of clinginess because it affects a person’s daily activities ultimately making them feel lonely. In children depression leads to clinginess and refusal to attend school. Depression is also associated with cognitive changes such as difficulty making decisions and memory. These symptoms are particularly common with the older populations who have a hard time concentrating. Depression also causes individuals to be preoccupied with thoughts about death and hurting themselves. This places them at an increased risk of committing suicide.

Treatment Options of Depression

Depression is a condition that can be treated and managing the symptoms is done through drug treatment, support, and psychotherapy. Drug treatment involves taking antidepressants that a doctor prescribes. Support entails discussing practical solutions and taking the time to engage and educate the family members. Psychotherapy entails cognitive-behavioral therapy (CBT) and one-on-one talking sessions. Antidepressants help in treating moderate to severe cases of depression. Some antidepressants used to treat depression include atypical antidepressants, tricyclic antidepressants, selective serotonin, and monoamine oxidase inhibitors. Each class of antidepressants acts on a specific neurotransmitter or a combination of some neurotransmitters. Depressed individuals should only take medication as per the doctor’s instructions. Worth noting, some medications take time before having an impact and patients that stop using the medications are not likely to encounter the full benefits of the drugs. Some of the antidepressants, such as the selective serotonin reuptake inhibitors have major side effects, including rash, sexual dysfunction, nausea, diarrhea, constipation, weight loss, and low blood sugar (Gururajan, 686). Other medication alternatives to depression include natural remedies and supplements. Some of the popular plants and herbs used to treat depression include lavender, ginseng, chamomile, and St. John’s wort. Before using any herbal remedy to treat depression, it is imperative to consult with a doctor. Some of the non-herbal supplements that help treat depression are 5-hydroxytryptophan and S-adenosyl methionine. Psychotherapy for treating depression includes problem-solving treatment, interpersonal psychotherapy, and cognitive behavioral therapy. Some forms of depression are best treated using psychotherapy, while others respond best to a combination of medications and psychotherapy. Interpersonal therapy helps individuals identify the emotional problems impacting their relationship, how the issues affect their mood and the best solution for the problem. Exercise also helps in addressing depression. Aerobic exercise raises endorphin levels that stimulate the neurotransmitter associated with a person’s mood. Brain boosting therapies are also treatment option for depression. If the person does not respond well to drug treatment, they can benefit from electroconvulsive therapy.

Conclusion

In closing, depression is a serious mental health condition that effects all populations including children, adolescents and adults. Depression is an ongoing and persistent feeling of mood disaster in people. It is best characterized by sadness and loss of interest. The signs and symptoms of depression are different for various populations such as men, women, teenagers, children and adolescents. Some of the common signs of depression range from suicidal thoughts, depressed mood, loss of interest in activities, loss of sexual desire, fatigue, and loss of appetite. Causes of depression range from sexual and emotional abuse, substance abuse, age, gender, conflict, certain medication, genes to even the death of a loved one. Effects of depression include a weak immune system, insomnia, reduced interest in sex, fatigue, and headaches. Treatment options for depression include support, drug treatment, and psychotherapy. Before taking medication for depression, individuals should seek the advice of a medical practitioner.

Works Cited

Eichstaedt, Johannes C., et al. “Facebook language predicts depression in medical records.” Proceedings of the National Academy of Sciences 115.44 (2018): 11203-11208.

Gold, Stefan M., et al. “Comorbid depression in medical diseases.” Nature Reviews Disease Primers 6.1 (2020): 1-22.

Gururajan, Anand, et al. “The future of rodent models in depression research.” Nature Reviews Neuroscience 20.11 (2019): 686-701.

Malhi, Gin S., and J. John Mann. “Depression.” The Lancet 392.10161 (2018): 2299-2312.

Bullying is widely acknowledged as a serious public health problem affecting teenagers

Annotated Bibliography

Student’s Name

Institution

Date of Submission

Thesis

Bullying is widely acknowledged as a serious public health problem affecting teenagers. The increased use of the internet worldwide, along with the popularity of social media platforms, have contributed significantly towards the increased prevalence of bullying among children and teenagers. Thus, researchers must focus sufficient attention on adolescents’ and teenagers’ bullying. This research paper is devoted to uncover the risk factors and effects of bullying as well as prevention measures for bullying.

Annotated Bibliography

Bradshaw, J., Crous, G., Rees, G., & Turner, N. (2017). Comparing children’s experiences of school-based bullying across countries. Children and Youth Services Review, 80, 171-180. https://doi.org/10.1016/j.childyouth.2017.06.060In this journal article, the authors compare the experiences of children about school-based bullying in diverse countries. The authors utilize data from an international survey that involved children aged between 8 and 12 years in 16 different countries in order to explore the differences in rates of bullying in schools and the relationships between bullying experiences and the subjective being of children within and between countries. The findings of the study suggested that there are between-country differences in the rates of diverse types of bullying. There were also significant differences in the chances of being bullied based on age, deprivation, and gender. Another significant finding was that children who had bullying experiences had meaningfully lower subjective well-being compared to those who did not have the experience. The journal article is a credible resource because the analysis conducted by the authors is consistent with prior international studies exploring variations in rates of bullying at national levels. This article makes a significant contribution to this research which explores the risk factors and the impact of bullying on teenagers.

Hellström, L., & Lundberg, A. (2020). Understanding bullying from young people’s perspectives: An exploratory study. Educational Research, 62(4), 414-433. https://doi.org/10.1080/00131881.2020.1821388In this journal article, the authors explore young people’s perspectives about bullying. The exploratory study utilizes the Q methodology where q tests which comprised of 23 items ranked in order, were given to the participants who were aged between 11 and 13 years. The results of the study indicated that older students had the tendency to rank items occurring offline as more severe when compared to those happening offline. Additionally, bullying privately was viewed as more severe in younger students while repetitive bulling publicly was considered as of highest importance during bullying behavior definition in older students. The journal article is considered a credible resource since other scholars have cited the resource severally. Additionally, the authors have borrowed different ideas from other credible resources concerning bullying. This journal article has a significant contribution to this research which explores the risk factors and causes of bullying in teenagers.

Cuesta, I., Montesó‐Curto, P., Metzler Sawin, E., Jiménez‐Herrera, M., Puig‐Llobet, M., Seabra, P., & Toussaint, L. (2021). Risk factors for teen suicide and bullying: An international integrative review. International journal of nursing practice, 27(3), e12930. https://doi.org/10.1111/ijn.12930In the journal, the authors aim to analyze teenage bullying and suicide risk and protective factors. The authors applied an international integrative review approach on five major databases, which are CINAHL, PubMed, Scopus, Cuiden, and Google Scholar. The findings of the study suggested that being male, underachievement, family dysfunction, among other factors as the most significant risk factors. Additionally, being female, having a two-parent family, a safe school environment, an involved teacher, and having a good family relationship as protective factors for bullying and suicide. This journal article is a credible resource since the authors reviewed information from credible databases. Besides, the authors searched for articles that were published between January 2010 and December 2020. This resource makes a huge contribution to this research which aims to recognize the risk and the protective factors of bullying.

Bakar, A. Y. A. (2021). A systematic literature review on the effects of bullying at school. SCHOULID: Indonesian Journal of School Counseling, 6(1), 35-39.

The authors conducted a systematic literature review to explore the impact of bullying at school. The study adopted a qualitative approach where data was gathered using a document analysis procedure. The findings indicated that bullying leads to physical, emotional, and health effects on students. Additionally, the results suggested that bullying affects the academic performance of the victim. This resource is a credible one since it has cited information from different credible sources. Additionally, document analysis was done on articles that were published within the last ten years. This article makes a significant contribution to this study since it presents the effects of bullying, which the current research aims to explore.

Fullchange, A., & Furlong, M. J. (2016). An exploration of effects of bullying victimization from a complete mental health perspective. Sage Open, 6(1), 2158244015623593. https://doi.org/10.1177%2F2158244015623593In the journal article, the authors explored the adolescents’ exposure to cyberbullying, its frequency, and perceived seriousness. Self-administered questionnaires were distributed to the participants who were aged between 12 and 18 years. The results indicated that girls frequently reported at least one dimension of cyberbullying in the previous year when compared to boys. This proportion was highest among 14-year-olds and lowest among participants at the age of 18 years. This resource is a credible one since other scholars have cited it in their work. Additionally, the authors have utilized resources from other scholars who have been cited in the article. This resource has an important contribution to the current study, which aims to explore the risk factors of bully among teenagers.

Moore, S. E., Norman, R. E., Suetani, S., Thomas, H. J., Sly, P. D., & Scott, J. G. (2017). Consequences of bullying victimization in childhood and adolescence: A systematic review and meta-analysis. World journal of psychiatry, 7(1), 60. https://dx.doi.org/10.5498%2Fwjp.v7.i1.60The authors of the journal article explored the effects of bullying victimization in both childhood and adolescence. A systematic review and meta-analysis were the methods applied by the authors in the study. The systematic review was done in reliable databases such as PubMed, EMBASE, ERIC, and PsycINFO, while meta-analysis was based on quality-effects approaches. The results showed that there is a significant relationship between bullying victimization and different adverse health and psychological problems. Strong evidence was noted between mental health issues such as anxiety, depression and suicidal behavior, and bullying. This article is credible because the authors review articles that are derived from reliable databases. This article is essential in this study which aims to explore the effects of bullying on teenagers.

Nurlia, A., & Suardiman, S. P. (2020). The phenomenon of bullying in junior high school students nowadays. International Journal of Education and Learning, 2(1), 7-13.

In this journal article, the authors investigate how the issue of bullying occurs in junior high school students. They apply a qualitative methodology approach and interview technique is used as the approach of data collection. The participants involved in these interviews are counseling guidance teachers in these schools. The findings of the study indicate that students in junior high school conduct physical, verbal and cyberbullying behavior. The results also show some of the factors of bullying which include history of being a victim of bullying, peer factors, behavior within seniority, economic status, violence from the media among others. This is a credible resource mainly because the article has been cited in various studies exploring bullying phenomena. This resource is essential for the current study which investigates the risk factors of bullying among teenagers.

Hong, J. S., Kim, D. H., Thornberg, R., Kang, J. H., & Morgan, J. T. (2018). Correlates of direct and indirect forms of cyberbullying victimization involving South Korean adolescents: An ecological perspective. Computers in Human Behavior, 87, 327-336. https://doi.org/10.1016/j.chb.2018.06.010The authors of the journal article aimed to assess the associates of direct and indirect variations of cyberbullying in different contexts. The data used in the study was derived from a study by Korean Children and Youth Rights on adolescents. The results indicated that male sex and depression had a positive association with bullying victimization at individual level while parental neglect was associated to indirect victimization at microsystem level. At the same level, neglect by parents and dysfunction in the family were related with direct and indirect victimization. On the other hand, abuse by teachers and victimization in school were related with victims of direct and indirect cyberbullying. This resource is a credible one since the authors utilize data gathered by a reliable organization. The journal article is important in the study because it asses the risk factors of bullying in different domains.

Hall, W. (2017). The effectiveness of policy interventions for school bullying: A systematic review. Journal of the Society for Social Work and Research, 8(1), 45-69.

The author of this journal article conducts a systematic review to explore and summarize the findings of studies assessing the effectiveness of bullying policies in schools. The review is conducted on 11 bibliographic databases. The findings of the review indicate that more educators view policies on bullying as effective rather than ineffective. Some studies indicate the quality or presence of policies is related with reduced rates of student bullying while some studies did not find any association between them. The study also found that schools with policies providing protection based sexual orientation and gender identity were related to better protection of , LGBTQ since fewer harassment and more frequent and impactful interventions were done by the personnel in these schools. This study is a credible one because it has borrowed ideas from other credible studies on bullying in schools. This journal article is important in the current research which aims to explore how bullying can be prevented among teenagers.

Charalampous, K., Demetriou, C., Tricha, L., Ioannou, M., Georgiou, S., Nikiforou, M., & Stavrinides, P. (2018). The effect of parental style on bullying and cyberbullying behaviors and the mediating role of peer attachment relationships: A longitudinal study. Journal of adolescence, 64, 109-123.

The aim of the authors of journal article was to examine the longitudinal impact of the style of parenting on short-term changes in cyber and conventional variations of bullying or victimization. The mediating role of peer attachment relationships was also investigated in the study. 861 adolescents and children in Cyprus public institutions were involved in the study. The findings indicated that parenting is an important factor in predicting all variations of bullying or victimization. Another significant finding was that peer attachment relationships has a mediating effect on the impact of style of parenting on forms of bullying. This article is a credible on since the authors have borrowed concepts from other reliable articles on bullying. The study is essential in the current research because it discusses the risk factors of bullying among teenagers.

References

Bakar, A. Y. A. (2021). A systematic literature review on the effects of bullying at school. SCHOULID: Indonesian Journal of School Counseling, 6(1), 35-39.

Bradshaw, J., Crous, G., Rees, G., & Turner, N. (2017). Comparing children’s experiences of school-based bullying across countries. Children and Youth Services Review, 80, 171-180. https://doi.org/10.1016/j.childyouth.2017.06.060Charalampous, K., Demetriou, C., Tricha, L., Ioannou, M., Georgiou, S., Nikiforou, M., & Stavrinides, P. (2018). The effect of parental style on bullying and cyberbullying behaviors and the mediating role of peer attachment relationships: A longitudinal study. Journal of adolescence, 64, 109-123.

Cuesta, I., Montesó‐Curto, P., Metzler Sawin, E., Jiménez‐Herrera, M., Puig‐Llobet, M., Seabra, P., & Toussaint, L. (2021). Risk factors for teen suicide and bullying: An international integrative review. International journal of nursing practice, 27(3), e12930. https://doi.org/10.1111/ijn.12930Fullchange, A., & Furlong, M. J. (2016). An exploration of effects of bullying victimization from a complete mental health perspective. Sage Open, 6(1), 2158244015623593. https://doi.org/10.1177%2F2158244015623593Hall, W. (2017). The effectiveness of policy interventions for school bullying: A systematic review. Journal of the Society for Social Work and Research, 8(1), 45-69.

Hellström, L., & Lundberg, A. (2020). Understanding bullying from young people’s perspectives: An exploratory study. Educational Research, 62(4), 414-433. https://doi.org/10.1080/00131881.2020.1821388Hong, J. S., Kim, D. H., Thornberg, R., Kang, J. H., & Morgan, J. T. (2018). Correlates of direct and indirect forms of cyberbullying victimization involving South Korean adolescents: An ecological perspective. Computers in Human Behavior, 87, 327-336. https://doi.org/10.1016/j.chb.2018.06.010Moore, S. E., Norman, R. E., Suetani, S., Thomas, H. J., Sly, P. D., & Scott, J. G. (2017). Consequences of bullying victimization in childhood and adolescence: A systematic review and meta-analysis. World journal of psychiatry, 7(1), 60. https://dx.doi.org/10.5498%2Fwjp.v7.i1.60Nurlia, A., & Suardiman, S. P. (2020). The phenomenon of bullying in junior high school students nowadays. International Journal of Education and Learning, 2(1), 7-13.

BUSI 2713 BUSINESS LAW

BUSI 2713 BUSINESS LAW

TERM PAPER RESEARCH PROJECT GUIDELINES AND DEADLINES

FALL 2020

The course syllabus for this class shows a research project must be completed for this class. The research project is worth 300 points. To help facilitate students’ success in being able to complete a better research paper, the project will be scaffolded which means that different parts of the project will be due throughout the semester and each part will be assigned points for completion.

Students will have four (4) different prompts from which to choose. The paper must be 8-12 pages in length. The final paper is due on or before Friday, November 20, 2020, at 11:00 p.m. CDT (Columbia campus time).

Directions for the term paper are as follows:

Description: Your Term Paper should include a title page (does not count toward length), be double spaced in Times New Roman 12 font with 1” margins, and appropriately cite all sources referenced using APA format. APA style and organization are mandatory. This is an academic research paper which will require your independent investigation of scholarly/credible sources. Your paper should be largely free of grammatical, spelling, and other common writing errors and incorporate outside research and sources (cited appropriately, of course). You are required to include at least five peer-reviewed articles in your paper. This paper is to be entirely your own, original work, and prepared specifically for this class. Be sure to review the LWC Statement on Academic Integrity paying especially close attention to the definition of plagiarism. It would be wise to begin working on your Term Paper early in the semester; this assignment is worth nearly 1/3rd of your entire course grade and completing it appropriately will take a lot of time and effort. You have nearly two months to craft this paper and, as such, expectations will be relatively high for this assignment.

Be sure to review the LWC Statement on Academic Integrity on the course syllabus. Any instance of plagiarism will result in a “0” on this assignment and harsher academic penalties may be applied by the Office of Academic Affairs. If you have any questions regarding the nature of plagiarism and/or academic writing, be sure to email me immediately (griderl@lindsey.edu).

PROJECT TASKS/DUE DATES

Friday, October 9, 2020 Choose Topic and submit to instructor (10 points)

Friday, October 23, 2020 Identify five (5) references and submit APA style (50 points)

Friday, November 6, 2020 Prepare and submit outline to serve as guide for paper (40 points)

Friday, November 20, 2020 Submit final paper (200 points)

PROMPTS FROM WHICH TO CHOOSE TOPIC

You need to address one of the following prompts in your paper:

What have been the major decisions handed down by the U.S. Supreme Court since 1990? How have these cases impacted the business environment? Cite specific cases. Which of these cases do you strongly agree or disagree with? What is the factual/academic basis for your position? Why do managers or, for that matter, business majors, need to be cognizant of some Supreme Court decisions?

What are some of the major court cases which revolve around Copyrights/Copyright infringement? Discuss Copyrights/infringement, the history of these concepts, and how they relate to the business environment. Include at least one major case from the past five years. You may also want to discuss registered trademarks and patents and famous court cases which relate to these concepts.

Discuss the events leading up to the creation and implementation of the Sarbanes-Oxley Act. Define and discuss SOX, its implications, and its immediate and future impact. How much of an impact has SOX had on how business is conducted? Why would a businessperson need to be aware of SOX? You may also want to discuss fraud, white-collar crime, insider trading and famous cases related to these concepts.

Discuss the events/environment which led to the creation of the FTC. What does the FTC do? Discuss historic and recent court cases regarding the FTC and allegations of monopolies. Is the market truly “free” with the FTC? Would individual consumers be better off without the FTC? Would business owners be better off without the FTC? What is the factual/academic basis for your argument?

About HITT

About HITT Contracting Inc.

Founded in 1937, HITT Contracting is among the leading general contractors in the South Florida market with offices in Atlanta, Washington DC, Houston, Dallas, New York, Santa Clara, Fort Lauderdale, and Charleston. HITT Contracting specializes in law firms, corporate interiors, hospitality, financial institutions, healthcare construction and government construction projects in various regions, including West Palm Beach, Fort Lauderdale, and greater Miami. Regarding ownership, Russell Hitt’s son and son-in-law, Brett Hitt and Jim Millar respectively, are co-chairs of the company’s Board. The two share ownership responsibilities. Initially, HITT Contracting was founded by Myrtle Hitt and Warren Hitt in 1937. Until his death in September 2020, their son Russell A. Hitt served as the company’s chairman emeritus. Together, fathers and sons of the Hitt family have led the organization’s growth into among the top 25 general contractors in the United States. The company maintains a workforce of over 1,000 team members and continues to bring on board self-driven candidates to join the team and contribute to its ongoing success. In furtherance of the company’s mission, the company uphold various core values, including working hard, staying humble, elevating the business of building, being good, taking the high road, attention to detail, and delivering with passion. This text provides an analysis for HITT, including competitive analysis, company analysis, product analysis, customer analysis, and market analysis. The text further delves into how HITT’s services can be developed in markets in developing and developed countries and discusses the future of marketing.

Competitive Analysis

HITT Contracting’s primary competitors are Turner Company, EllisDon and Clark Construction, PCL construction, Ellisdon, Shimmick Construction, Novo Construction, McCarthy. AECOM, LERNER, and Hensel Phelps. The company which has its headquarters in Falls Church, Virginia has revenue of 2.4 billion dollars, with its main business being provision of commercial real estate services for corporate education, hospitality, office, government, and healthcare sectors. HITT Contracting’s main source of competition has to be Clark Construction whose president and CEO has a CEO rating of 91/100 compared to HITT Contracting’s CEO rating of 74/100. Clark Construction has a competitive edge in the sense that its revenue and employees are higher than HITT Contracting’s. Clark generates revenue of 5 billion dollars and employs over 4,200 employees compared to 2.4 billion dollar revenue and a workforce of about 1,000 employees. Turner Company is also proving to be a source of competition generating a revenue of 14.4 billion dollars and over 10, 000 employees. Turner’s CEO rating stands at 74/100 which is the same as HITT Contracting’s. Additionally, EllisDon is a source of competition producing a revenue of $4.4 billion, a CEO rating of 81/100 and employing about 5,000 individuals. PCL Construction is another notable source of competition for HITT Contracting. PCL has an employee workforce of 4500 individual and an annual revenue of $6.3 billion. Worth noting, Dave Filipchuk, the company’s President and CEO has a CEO rating of 76/100 compared to HITT Contracting’s CEO rating of 74/100. Other potential competitors include Donhoe Companies Inc., Keller North America Inc., and James G. Davis Construction Corporation, with 1,400, 2, 400 and 584 employees respectively.

Company Analysis

Doing business as Hitt Contracting Inc., the company has hit the nail on the head in matters general contracting. The corporation provides construction services for corporate building and interiors in nearly all sectors ranging from technology to healthcare. HITT Contracting handles historical renovations to eco-friendly projects. HITT Contracting conducts business in various industries including the construction of buildings construction, non-residential building construction, renovation and repair, commercial and office buildings, and commercial and institutional buildings. According to Improvements-Institutional, 2018 data center HITT Contracting also operates in industries in construction such as land subdivision, building equipment contractors, residential building construction, street and bridge construction and utility building construction. HITT Contracting Environmental Social Governance (ESG) ranking is 1.0 with an ESG industry average of 2.68. The company has an average annual revenue of 1.22 billion US dollars. Hitt Contracting is the ultimate parent company with one subsidiary and 11 branches. HITT Contracting is mostly classified as a company with operations in Nonresidential Building Construction industries. Some of the strengths that come with being an employee of HITT Contracting Inc. are outstanding management and leadership, room for personal development and a conducive work environment. Additionally, the company provides good work pay and employee benefits and supportive team members. On the other hand, some of the perks of working at the company include young and inexperienced personnel in preconstruction, high levels and stress and lean corporate resources.

Product Analysis

HITT Contracting Inc. works with construction professionals to provide clients with a variety of services that range from service and emergency work to base building construction and renovation and corporate interior fit-outs. With HITT Contracting Inc., it is more than construction; it is shaping possibilities, building dreams, and defining spaces that surround us.

With an experience of over eight decades in service provision that goes beyond the client expectations, HITT Contracting has a portfolio of award-winning constructions particularly for commercial build environments. They deliver projects that are redefining commercial real estate in America and beyond from office spaces and mixed-use industrial campuses of the future.

The Company has notable projects including Intelsat, that features a six-level monumental stair and multipurpose room with 28 ceilings that can fit up to 330 individuals. Another notable product is located at the Radio Oncology Center at George Washington University Hospital. It is an occupied renovation that entails a CT scanner and two linear accelerators. The Verizon NAP of Capital region also features five independent data centers featuring 187 million dollars and a 508 unit 21-story and 19-story tower worth up to 150 million dollars.

Customer Analysis

As regards customers, HITT Contracting Inc. provides services to customers that are in need of services ranging from renovation to build base construction to emergency services, and interior fit-outs. They provide services to clients in the corporate arena as well as public business. HITT Contracting Inc. values their customer experience which is why they employ client-centered strategies to ensure customer satisfaction. In 2019, HITT Contracting Inc. set aggressive goals with the aim of genuinely embracing the customer experience. A year later, they chose customer experience pilots to help take the management program to the next level. The program approach had four phases. They audited the existing feedback from partners and clients to determine the feedback loopholes and generate insights for improvement. They further facilitated the first wave of journey maps and outcome-oriented client personas. They further carried out an analysis of the corporate training program and make recommendations to inject client experience into the programming. They further revised the organizations approach to brand and purpose to ensure it aligns with the renewed commitment and client experience. Some of the solutions that were implemented as a result of the program were utilizing technology for client feedback, evaluating partner and client feedback collection, and redefining survey questions. As a result, various changes were realized. There was a deeper team and leadership engagement, increased visibility for the firm, and more knowledge of the client’s expectations and sentiments. Additionally, HITT Contracting Inc. saw better brand and purpose alignment, increased knowledge about client sentiment and expectations, better understanding of client feedback system, and corporate brand architecture. In essence, the client expectation program helped HITT Contracting Inc. to deliver robust journey maps into driving a customer-centric culture and innovative customer experience.

Market Analysis

As far as the market goes, HITT Contracting Inc boasts of clients in matters construction from across the world. HITT Contracting Inc. entered the Houston Market in 2016, making the company’s latest acquisition of trademark. They announced the taking over of a Houston-based Trademark contractor that had an experience of over 30 years. The chairperson, Bret Hitt, noted the company’s excitement to welcome the contractor on board. The purpose of the collaboration was to create a bigger impact on their clients within Texas and beyond. The acquisition of the trademark allowed HITT Contracting to expand their ability to cater to clients in key sectors such as technology, healthcare, commercial base building construction, and corporate interiors. They move was 55 new office employees operate with the organization’s trademark. To further expand its operations, HITT recruited additional construction talents. Worth noting, the synergy between the teams allowed both organizations to view the acquisition as national experience to push them into getting to the next project in size, volume, and scope. Across the United States, HITT Contracting is ranked the leading commercial construction company in the field with its annual revenue amounting to 1 billion dollars. Worth noting, HITT Contracting is ranked by ENR as among the 100 largest general contractors. HITT Contracting continues to maintain its regional offices in South Florida, Atlanta, Charleston, Denver, and satellite offices in Dallas, Baltimore, Seattle, and Richmond. HITT Contracting maintains client-oriented team that meets the need of all programs that require changing the building shells and complete owner fit-outs. Worth noting the company has a wide range of employees including trained and skilled in-house, to provide round-the-clock support to clients following initial occupancy. The company’s way of maintaining excellence and quality speaks to its core mission and its structure. HITT Contracting Inc. teams are often organized into expert market sectors that have a specialty in various aspects, including technology, paint and service, law firms, industrial services, hospitality, healthcare services, government, and building and interiors. Additionally, there are other divisions that complement the market sector teams, including preconstruction, subcontractor relationships, and sustainable construction.

Product Expansion in Markets in Developing and Developed Countries

For HITT Contracting Inc. to expand its construction services to developing and developed countries, it will need to employ a variety of tactics, including collaboration and building from the ground up. According to the hitt.com website, For HITT Contracting to be the renowned construction guru, it has had to collaborate with other contractors. Collaborations are particularly viable for developed countries such as other states where it has not yet established subsidiaries and other countries such as Canada, and across Europe. HITT Contracting has more chances of success when it works with subcontractors as it places them in a position to reach a greater clientele. Without a doubt, new building technologies, approaches, and materials have the potential to completely change the future of construction. Compared to developing countries, developed ones are quick to accept innovation. HITT Contracting remains committed to the ever-changing construction industry. Innovation in the construction sector derives sustainability and well-being and learning and solutions for all stakeholders and partners. As regards underdeveloped countries, HITT Contracting Inc., should start with building sustainability from the ground up. Using built strategies such as mass-timber construction ensures that structural wood remains connected with fasteners. This would make the building not only sustainable but also safe. It would still remain as strong as concrete or steel. Worth noting, mass-timber constructions are not only easy to bring down, but they can also be reused when no longer in use. Recycled finishes and materials can be used throughout the solar panels and entire building to ensure the facility accesses all the energy it needs. With such solar panels, it is possible to input charging stations for visitors.

The Future of Marketing

The changing face of marketing can be best described using the changing marketing channels and the growing consumer dominance. Old school marketing only employed traditional channels of marketing such as broadcasting and print media. However, we are living in a digital age where new school marketers continue to employ traditional methods but combine them with digital technologies bringing deeper and improved customer experience. It is important to care about consumer behavior it speaks to the customer experience. Today client needs have taken center-stage. As creators come up with new products and services they are keeping the needs and wants of their customers at the back of their mind. This shows that, without a doubt, customers have dominated the marketing field. There is need to anticipate future customers as they are bound to be even more essential as end-users of nearly all company products are changing in location, number and makeup at an ever rising rate. Worth noting, there has also been a significant rise in the market for personalized services with consumer services now accounting for 40-50% of consumer purchases. Additionally, customers’ tastes are also becoming more flexible, varied, and demanding. For instance, the rising demand for wood products; the traditional manufacturer today sells a variety of products that never existed years ago, but due to collaborative marketing and product-based research, they are able to get products that meet the market demand.

References

Improvements-Institutional, C., & Improvements-Non-Institutional, C. (2018). Datacenter.

Hitt.com

About the Common Core

Name

Institution

Date

The Common Core Standards

About the Common Core

The Common Core contains academic standards in English and Mathematics considered to be of high quality. The set of standards contain goals that outline what students should be knowledgeable about by the end of each grade. The Common Core Was created to make sure all students graduate high school with the right knowledge to succeed in college, career, and consequently life regardless of where they are from (Common Core State Standards Initiative, n.d.). The Common Core ware created to respond to the need for consistent learning outcomes in the entire country.

The standards developmentally appropriate for students

Some people claim that the Common Core standards may not be developmentally appropriate with the problems concentrated in the early grades. Kindergarten children are not ready to read, though they are required to by the standards. What these people do not acknowledge is that experienced professionals from K-3 teachers to early childhood experts developed these standards. The standards are created to fit the requirements of the 21st Century labor market and the challenges of today’s higher education.

States incorporated these standards into their school systems because they set rigorous, measurable objectives for every child, ensuring that there will be more candidates for college and students on the path to careers. The Fordham Institute conducted an analysis of the Common Core Standards and reported a significant improvement over most states’ academic expectations. There was also greater comparability between states, and districts-all teachers have a tool on best practices and ways to track student growth.

The implementation process may not be doing the Common Core justice, but the States are still running through with them. They are continuing to run the program because it is setting clear, consistent expectations for students in terms of college and career preparations. Out of all the 45 states that adopted the standards, only Oklahoma has replaced them.

For those questioning the appropriateness of these standards in terms of development, they should first remember that there is no clear-cut information on when a child is ready to learn anything that is scientifically backed. Then again, a child’s cognition changes, and these standards are in line with the capacity of 21st Century children. Usually, by saying the Common Core Standards are developmentally inappropriate, what critics mean is, “this is too hard.”

There is no reason to perceive that the literary benchmarks set by the Common Core for kindergarten are too hard. The National Centre for Education Statistics reports that 2 in three children at the kindergarten level recognize letters from the alphabet both in lower and uppercase before they enter kindergarten. Knowledge of the alphabet is one of the “foundational skills” projected under these standards. No parent would want their children to graduate kindergarten without knowledge of the alphabet. Sixty-one percent of children come to kindergarten with more than two concepts of the common core, such as understanding that text is read from left to right.

Why is it called the common core?

It is called the common core because it is a singular academic standard for the entire nation (Trachta, 2018). This, however, does not ring true in practice because only 34 states and the District of Colombia are still fully committed to it. in other states, however, it has been a benchmark for custom state standards. Some states have repealed part of the Common Core, or others have developed their own version. Since every state uses it as a benchmark and is creating custom versions, its common status somehow still reigns.

What the Common Core means to me

The people raising controversy over these standards have not had the time to interact with them at the same level as teachers. Getting to know them reduces the anxiety about how these standards will affect classrooms and students. The Common Core, to me, is an opportunity for teachers to create curricula that can help struggling students catch up using materials that match the Common Core. By standardizing education outcomes, the Common Core is the answer to educational inequality. With proper teacher training, the challenge of adjusting a curriculum to the Common Core is reduced, and teachers can now be able to take advantage of it fully.

Why I support the Common Core

The first reason why I support the Common Core is that it is not an absolute requirement but rather a guide. Those people that disregard these standards do it based on rigidity, which is not correct. The Common Core is adopted by states in different ways, in ways that suit their needs and does not require teaching specific text. The Common Core is just but a recommendation that only works to satisfy certain standards despite the means. This is why it is so useful and practical. I support it because I understand that it is not a rigid set of rules but a dependable benchmark that will achieve great results in developing students that are ready and heading towards college and excellent careers.

I believe that the goals of the Common Core are very sensible, especially in those states that have been ranking below average or far below in these essential subjects. By using a standard that is used in almost every state, the whole nation educates its children and future leaders at the same level. The use of Common Core is an assurance that students will receive a high-quality education. I support this because it will change the statistics, which see 60 percent of students joining colleges needing remedial classes in Math and English, or only 34 percent of eighth-graders showing adequate knowledge of grade-level math and the 30 percent of high-school graduates failing Military entry exams (Riley, 2014).

References

Common Core State Standards Initiative. (n.d.). About the Standards. Home | Common Core State Standards Initiative. https://www.corestandards.org/about-the-standards/Riley, B. (2014, March 25). Why I Support Common Core Standards. National Review. https://www.nationalreview.com/2014/03/why-i-support-common-core-standards-bob-riley/Trachta, A. (2018, March 28). Don’t Be Afraid to Ask … What Exactly IS Common Core? Niche. https://www.niche.com/blog/what-is-common-core/

Management Information System part a.b and c

Name:

Course:

Tutor:

Date

Management Information System

Systems Development.

Part A

If TMS develops the system in house, they should use waterfall approach. This approach is used with the assumption that the final deliverable is not needed as quick as possible and high level of accuracy is required. Other reasons include:-

Waterfall approach helps in providing the necessary documentation for users at all stages of development.

There will be opportunity to check for errors at all stages.

It will offer enough time for analysis and final implementation.

There is no intensive user and/or client involvement in all phases of development which is very expensive in terms of time and commitment.

It enables requirements to be well defined before the system can be implemented.

This being a busy business enterprise, the client can participate in the development process while at the same time doing other duties.

It can also employ the use of prototype as an experimental way of gathering requirements such as data from the stakeholders involved.

Little training will be required for users after implementation since full documentation with user manuals are provided by this method.

Every stage in waterfall is well distinct, having the start and finishing point, with final product that can be identified for use in the following phase.

Sufficient information is also used which reduces problems of continuous future support by the developers.

The development, in addition, must take into an account all aspects of the working process. This in turn results to high reliability of the final product.

The method also provides thorough testing of the system. This also contributes to high efficiency and reliability.

The maintenance phase of this method consists of preventative and adaptive maintenance which will enable the system to be free from future flaws as well as easy conformance to the changing technology.

Corrective and perfective maintenance are also part of maintenance phase which ensures the correction of any existing errors in the system and to increase efficiency of operation respectively.

Part B

Although TMS have very skilled IS staff who can take on small new projects, outsourcing can be the best strategy in this case because:-

It is relatively cheap in terms of cost as compared to developing in-house system.

Since this is a business enterprise which is after maximizing profits, it should go for the method with lower cost like outsourcing.

Outsourcing will help TMS to enjoy the changing or latest technology from the external experts.

The TMS staff will also be better placed when it comes to learning and gaining extra knowledge from the outsourced professionals.

Outsourcing will also reduce over participation in the development of the new system by the TMS staff at the expense of daily business operations. This over participation is reduced because external experts will be responsible for system implementation.

Outsourcing will also help the project to be completed in time as the experts will have to meet the agreed deadline.

The external service providers can come with additional resources along with a pool of expertise which TMS may lack of sufficient scale within it’s IS department.

Since the TMS IS staff understand the system better, it will be easier for them to maintain the implemented system by external experts once they learn it.

The outsourcing provider can also help TMS enterprise to overcome inertia in consolidating data centers that the internal group of the enterprise cannot do as a result of merger acquisition.

The TMS enterprise will now be in a position to focus less attention in IS operations and more attention on core activities.

The strategy is also a way of helping TMS to free up most of their time to enable its employees use most of their energies in areas where core competencies are needed within the enterprise.

Outsourcing can also help TMS to effectively transition to fresh technologies.

The provider’s experienced consultants are extra readily available to the market place advances and best practices as compared to any trained and experienced in-house IT professional like those of TMS.

Therefore outsourcing providers will be instrumental in helping TMS to implement such technologies like enterprise 2.0, enterprise resource planning systems and web 2.0 tools.

Outsourcing providers can also offer IS personnel within an enterprise environment that atypical company or enterprise cannot afford to build.

The outsourcing provider in many cases opens greater opportunity for both training and advancement in IT than a single IS organization or enterprise.

Outsourcing will also relieve TMS of costly investments in constant training so that IS staff can get updated with the current marketplace technologies as well as headaches of hiring and retraining staff that can easily switch to other jobs with better pay or further lures.

Data management

There are anumber of management issues likely to occur if OIS is merged with OLDS. They include:-

Incompatibility issues since OIS is a package bought from the vendor while OLDS is customized by TMS. This makes the two systems have two completely different features that will require very high level of expertise to successfully integrate.

Difficulty in data administration. This difficulty is likely to arise given that the two systems may be using different formats for forms, queries and even reports.

The effort to integrate two applications has far reaching implications due to their extensive scope. In this case, an integration that fails or even misbehave can cost the enterprise huge loss in terms of millions of dollars.

There is also inadequate amount of control that the integration developers normally have over the participating applications. For instance, the majority of systems are legacy systems or packaged applications that cannot be altered. The systems are simply connected to the solution of integration. As a result, developers are left in asituation where they have to compensate for the gaps or differences amid the applications.

Although it can be easier to implement part of the solution within the application, this alternative might not be available due to internal corporate politics.

There are only a few standards which have established themselves in the integration domain despite the extensive requirement for the integration solution.

The available standards also do not offer solution to all integration concerns. A good example is XML web services that tackles just apportion of such challenges.

The merging of the two applications also require significant shift in corporate politics.It is because business applications, usually center on particular areas of operations like customer relationship management, finance, billing and others.

There is also difficulty in moving data from one system to another due to differences in data format. The majority of packaged, legacy and customs applications are not equipped to take part in integration solution.

As developing EAI solution is also challenging, operating and even maintaining such a solution can be extra intimidating. The combination of different technologies along with the distributed nature of EAI solutions makes it complex for troubleshooting, monitoring and deployment.

Ethics of selling the customer list

The first thing to do is to find out whether it is better to sell client list in an up market or down market. As a business person running an enterprise, this will be more of personal decision. The value of the book for the sales person in business will be greater at atime when the business is most active.It means that the book will be more valuable in the seller’s market if it consists of mainly prospective business with sellers.

However, if the book consists of mainly prospective business with buyers, it will tend to be extra valuable in the market of buyers. Therefore, before selling customer list, an individual wishing to do so have to take into an account the nature of the business along with prevailing market conditions.

Before selling customer list, it is also important to determine the value of the book of business for the salesperson. In this case, the dollar value for the sales person’s book of business relies on the prospect income that the book can be anticipated to produce over time. The present value can be estimated using the projected future income stream at a discount rate that mirrors the risk of receiving that income projection over time.

The quantity and quality of information that the sales person has affects the value of the book of business. Nevertheless, there are also other contributing factors. As an example, to have a good will of say, 40 potential buyers for $100000 properties may be less valuable as compared to having 10 potential buyers for $9 million properties. The same reasoning is true for information and relationships with potential sellers and tenants too. As a result, quantity and quality can be used as the criteria for adding value to the books of business.

The sales person can be willing to stop working immediately and cash out by selling the potential income that could be produced from his or her good will. In such a case, it can be arational choice to sell client list at retirement.

You also have to decide who the client list should be sold to. In this case, you should keep in mind that the income stream that could be produced from a retiring sales’ person’s book of business relies on who gets it from the retiring sales’ person. It also relies on how well the person who gets it can be responsible for the good will of the retiree under his/her stewardship. Therefore, the more income the acquirer anticipates to produce, the more valuable the good will.

In order to draw up an agreement, the parties involved should negotiate a simple contract that involves the sale/purchase of retiree’s book of business on their own. Nevertheless, if the transaction structure becomes complicated, the service from an attorney would be advisable.

The agreement should openly define what is to be sold. It may include the names, addresses and other information from the retiree’s client book. It may also comprise of tangible items like computer equipment, office supplies, marketing materials and many others.

As far as the payment arrangement is concerned, the parties may agree to a one-time, lump sum payment or a combination of lump sum amount. It will then be followed by prospect payment as the transactions are closed based on the contract. The terms of future payments should also be well defined. They should also agree on the right duration possible for the payment arrangement in order to minimize the liability of tax.

Recommendation to Jane

I would like to advise Jane that she should first of all consider three things before selling her enterprise customer list. She should consider who to sell customer list to, the prevailing market conditions and whether she is willing to retire. Only with the condition that she is willing to retire and with other considerations being favorable in terms of the value of sale, then she can go ahead to sell customer list, else she should not.

Management is a complex and wide concept that needs to be illustrated in an in-depth manner

Quality Management

Student’s name

Student’s Affiliation

Quality Management

Introduction

Management is a complex and wide concept that needs to be illustrated in an in-depth manner. What’s more, the dynamic business environment results into changes within management. There are new concepts adopted by management that need to be understood in order for institutions and organizations to engage in efficient and effective provision of goods and services. Quality management is one of the contemporary management concepts that managers need to be familiar with. Organizations irrespective of their size, industry, or culture must employ managerial services to ensure a balanced proportion between the various forms of resources to improve performance. Quality management, therefore, refers to the systematic process that involves measures meant to ensure that the product or service provided within an organization meets the demands of the consumers. It involves planning and implementation of the continuous organizational improvement in the provision of goods or services. Many organizations have decided to embrace quality management within the overall management system. This paper, thus, emphasizes that dynamism in the business environment calls for different institutions and organizations to ensure that there is increased quality management.

As a client or customer of SunHealth Corporation, a healthcare organization; it is important to note that quality management has enabled healthcare organizations to provide quality services to the patients through the various described processes. Through quality service provision patients have been able to obtain the required treatment at the right time in the right manner. Mortality rates have reduced due to the enhancement of quality healthcare services to patients both in-patient and out-patients (Moores, 2008). Since quality management process gives an opportunity for open decision making, healthcare organizations have taken up this advantage thereby involving the patients in making of decision through their contributions. This makes patients feel part and parcel of the organizations hence resulting into increased patient loyalty. The effect of this has been increased provision of services hence increased profitability (Miller et al, 2009).

When constructing a House of Quality within the quality management process; there should be a provision for the identification of problems affecting an organization. In that regard, Healthcare organizations have been able to identify various problems affecting them hence taking the necessary measures. This has led to effective and efficient management practices in the running of the organizations.

SunHealth Corporation should apply the concepts of quality management in order to ensure that all the patients obtain the best Medicare and Medicaid services affordable to all the stakeholders. Through quality management, healthcare facilities should embark on creating Home-based care. Through partnership with the National Institutes of Health through the establishment of the telehealth care services especially to those who cannot make it to the hospitals. They transport system has well-furnished ambulances that will assist the organization in delivering the best of healthcare services within the region (Kaluzny, McLaughlin & Simposn, 1999).

When developing a SPC checklist for each dimension of the product that you believe would be subject to statistical control, many organizations fail to employ the best approach. The below chart helps understand the process of developing a one of the best SPC checklist to help the client and the firm make the right decisions when buying or offering services. It demonstrates an order entry process serving both clients and firms.

Sources:

According to Kaizen’s philosophy that emphasizes on changing and making better explores the meaning of continuous improvement. Kaizen’s philosophy emphasizes the following five steps:

Planning of Activities

The five steps begin with planning one’s activities, which is an essential step towards quality management. Planning activities helps in managing time, thus, it is vital to plan daily, weekly, monthly or yearly. The initial step in personal Kaizen in our daily lives, reminds us to set aside few minutes to plan for our activities tomorrow.

Setting Apart Things that one does Regularly

To enter the Kaizen’s personal cycle, getting all the activities is a major step in the process of continuous improvement. The activities that appear regularly in one’s schedule will become one persona Kaizen. These activities must be set apart to ensure that one focuses on doing such activities effectively to improve the quality.

Creating a Way of making everything Better

This step focuses on improving life processes regularly based of Kaizen’s philosophy. This is the step where one improves the performance by doing the things done regularly in different manner. This is achievable though setting targets that must be accomplished.

Standardize

Continuous improvement with regard to quality management demands that the entire cycle should be part and parcel of the standardization process. Standardization also helps improve the present better state, and one is challenged to further improve in a progressive manner. Without this step, one may feel satisfied, thus, performing below the standard.

Evaluation and back again to the first step

Evaluation process is of ultimate importance in the cycle of quality management or improvement. This step is a precursor to the first step. It helps one know whether he/she has done the right or the wrong thing.

Finally in the benchmarking process, one must involve the customers and all the other stakeholders in making decisions. For example, provision of healthcare services that consumers have praised before and would to continue enjoying is essential. Both risk and quality management within SunHealth Corporation are involved in the tracking and management of incidents and either environmental factors for risk management or quality issues and outcomes for all stakeholders in quality management (Moores, 2008). They are involved in the identification of the processes and activities required for improvement to prevent future losses hence reducing the risks of financial loss as well as legal liability for organizations. In addition, both risk and quality management within ensures confidentiality of data and support a very inclusive framework of reporting and benchmarking. Through all these activities, the two aspects of management result into performance overview of an organization.

References

Kaluzny, A., McLaughlin, C. & Simposn, K. (1999).Applying total quality management concepts to public health organizations. Public Health Reports. 107, (3); 257-264

Miller, W. et al. (2009). Assessment of quality management practices within the healthcare industry. American Journal of Economics and Business Administration, 1 (2).105-113.

Moores, B. (2008). Concepts of quality and quality management in industry and the service sector. Retrieved on July 14, 2014 from http://forge.fh-potsdam.de/~IFLA/INSPEL/94-2mobr.pdf

Millennials and the Political Process

Name:

Course:

Professor:

Date:

Millennials and the Political Process

Outline

1. Every vote matters.

2. Millennials make up a significant percentage of voters, about half.

3. Ethnically diverse and open-minded generation.

4. They can become civil servants to represent their views.

5. Young people hit hard in the recession, issues like college debt and healthcare, unemployment matter to them.

6. Start voting early to make it a lifelong habit.

7. It is easy to be an educated voter; social media is awash with information about candidates.

8. Voting affects the future, adulthood responsibilities such as buying homes, healthcare. Policies by current leaders will affect this.

Millennials often take very little or no interest at all when it comes to political issues. There are several reasons for their disinterest, the first of these being that they feel that politics do not affect their lives. Nothing could be further from the truth. Politics affect every area of our lives today. This has been clearly shown in President Trump’s presidency where people have been divided along many lines, and the nation’s unity has been threatened. Policies enacted by the government affect every area of citizens’ lives including education, healthcare, and taxation among many others (Johnson). It is time for millennials to sit up, take notice and actively engage in politics to safeguard their futures and their dreams.

The first reason as to why millennials should become involved in the political process is that every single one of their votes matters. In a country with millions upon millions of voters, it is easy for someone to think, but mine is just one vote. If everyone else votes then the one vote will not count. If every single millennial adopted such a mindset, there would be trouble for the voting process known as voter apathy (Quaranta 796). In the 2016 election, the fact that every vote counts came to be seen clearly. While the president did not win the popular vote, he won the Electoral College votes. Had more people turned out to vote perhaps the outcome may have been different. Many leaders such as Senator Al Franken of Minnesota in 2009 have won elections by a very small margin.

The second reason as to why millennials should become a part of the political process is that they make a significant part of the voting population. The population of millennials is fast growing and will soon outnumber the baby boomers. Their large numbers mean that they cannot afford to sit back and let others make decisions for them (Oakley). They should take advantage of their numbers. Millennials can swing the vote in the direction that they please because of the large part of voters that they make. Given the fact that they are capable of determining the election, it would be unwise not to stand up and be counted in the political process.

Millennials come from diverse backgrounds in terms of race, ethnicity, education, mindset among many other factors. This means that their opinions are quite diverse as well. For this reason, their interaction with people of different backgrounds has enabled them to be open-minded. Older generations may have grown up with people of the same mindset that renders them incapable of open-mindedness that the millennials posses. Because of this diversity, millennials are poised to have liberal opinions on matters affecting them today (Miller). They should, therefore, be involved in the political process to ensure inclusivity and diversity in leadership.

In recent years, we have seen the age of civil servants become younger and younger. In the past civil servants were assumed to be old people and this is one of the reasons that millennials have been mostly disinterested in politics. However, it has been seen that young people are equally capable of being outstanding leaders and making the right policies in their areas of expertise. The young people taking up leadership positions in the political sphere means that they can advocate for matters that are important to their peers and ensure that they make their voices heard.

Millennials are the hardest hit by economic crises such as recessions. This is because they make up a large part of the population. Problems such as healthcare, unemployment, and debt affect them the most. Most students in college take federal loans to help them finance their education. After college during times of recession, they might find it hard to get employment that will help them pay off their loans. Because of problems like these, young people should play an active role in the political process. They must ensure that the leaders they vote for will advocate for policies that will make their lives better.

To develop a lifelong habit of voting, it is crucial that millennials start voting early on in life. As with any other practice, it should be formed early so that as one grows older, it becomes natural for them to be a part of the political process. The first time that a person vote is a significant milestone. It brings with it a feeling of responsibility and the young voter feels that they are making their voice heard (Oakley). As one grows older and takes part in election cycles, they get more familiar with the process, and they are more informed about the matters concerning them in politics. They will, therefore, be more interested in the political process in the future and it will grow to become a habit.

Another reason as to why millennials should be interested in politics is that they cannot claim ignorance. Information concerning the political process and candidates are readily available on all forms of media, both social and mainstream (Young). During election seasons, the media takes time to disseminate information and make the voter as informed as possible. With the availability of data, the millennials have no excuse to remain aloof. They can make an informed decision quickly and easily and thus lend their voice to the political process.

Millennials should be a part of the political process because it affects their future. It is normal for millennials to assume that the current crop of leaders has no impact on their lives. This is a misguided view. While today’s leaders may seem to have no effect on their lives, the policies that the leaders make today have potentially long term effects. There is every reason for millennials to be actively involved in the political process as it will undoubtedly affect their lives in the future. Policies relating to areas such as healthcare, education, employment, housing, and taxation affect the life of every citizen (Miller). Millennials should ensure that they use their numbers to vote into office those leaders that they feel represent their interests both in the short term and in the long run.

Perhaps the most important reason as to why millennials should be a part of the political process is because it is their constitutional right. All citizens have the right to vote. It is their right as well as their responsibility to vote into office leaders to represent them at the local and national levels. Exercising this right ensures that millennials safeguard their voice in government and also that their interests are articulated and expressed. They cannot afford to ignore politics as every aspect of their lives is influenced by politics.

From these arguments, it is clear that millennials have every reason to be a part of the political process. The world today is controlled by politics; hence every citizen should make sure that they have a say in the leaders that are chosen to represent them. The fact that they make up such a large part of the voting numbers in the country means that millennials have a big say in politics and leadership of this country. Voter apathy is quite rampant among the millennials (Quaranta 801). Political candidates should, therefore, ensure that they woo the young people by educating them on the relevance of politics to their lives. During political campaigns, those candidates who have been popular among the younger generation have a higher chance of winning (Young).

Millennials can no longer afford to ignore the political process. Their large and growing numbers means that their interests are at higher stake in the political process. Many policies that are passed in the political process affect their lives; hence they should be educated to make the best decisions possible. Every single vote matters in an election hence the idea that one vote does not count should be done away with. The world today is governed by politics, and it affects relationships with other people. Divisive politics have been shown to cause strife and hatred among people of one country. With the diversity among millennials, they are in the best position to bring unity and elect leaders that have the best interests of the country at heart.

Works Cited

Johnson, Meghan. “Milennials: The unspoken generation.” Veritas 1.1 (2015): 6.

Miller, Carly. “The Great Divide: How UC Students See Politics in 2017.” (2018).

Miller, Kiki. Beyond the Ballot: An Examination of the Role of Social Media in the Political Participation and Political Socialization Process of Millennials. University of Colorado at Denver, 2017.

Oakley, David. “The Millennial Generation and Alternative Political Behaviors: An Examination of Political Participation Among Modern Young Americans.” (2017).

Quaranta, Mario. “An apathetic generation? Cohorts’ patterns of political participation in Italy.” Social Indicators Research125.3 (2016): 793-812.

Young, Brittni Jamaeka. “Millennials: Redefining Engagement in Politics.” (2015).