Research Strategic Plan on Apple Company

Research Strategic Plan on Apple Company
Research Strategic Plan on Apple Company

Research Strategic Plan on Apple Company

Order Instructions:

Phase 2 Research Strategic Plan Project Preparation Work –

You should now have selected the company for your strategic plan, either, Ford Motor Company, Apple or iRobot. Continue your preliminary research on the company by beginning to analyze the external forces that affect the organization: economic, social, cultural, demographic, environmental, political, governmental, legal, technological and competitive. Use the tools for external audit and benchmarking on the company in your strategic plan. – Due in Week 3

Company Information http://www.apple.com/sitemap/ Retrieved (March 2013)
Investor / Financial Information http://investor.apple.com/ Retrieved (March 2013)

SAMPLE ANSWER

Phase 2: Research Strategic Plan on Apple Company

                An analysis of Apple Company’s Inc. can be facilitated by the use of a PESTEL analysis. This term is an abbreviation for Political, Economic, Social, Technological, Ethical and Legal factors. It describes a strategic framework which can be used by a company to analyze its macro-environmental factors by scanning the environment. This analysis will be helpful in understanding market growth factors and thus contribute towards formulating a viable research strategic plan.

Political factors determine the degree of government intervention in the growth and development of the economy. The government through its policies and regulations have impacted on decisions made by the management at Apple. For instance, since 2005, the company has expanded its market segments outside the United States thus selling most of its products outside the USA. The countries that account for most of its sales include China, Ireland, Czech Republic and Korea. The global market place is diverse with developing and developed countries. These governments impact on the sales volume of products through taxation, tariffs and quotas so as to achieve a Balance of Payment (BOP) (David, 2007). In the event that Apple disregards these international rules and those set by the US government, then it will have a hard time marketing its products.

Economic factors have impacted on the decision making process at Apple Inc. This is because global factors such as economic growth, inflation rate, exchange rates and interest rates impact how a business operates. Economic situations such as recession and bloom could impact on the sales made on Apple as a company. The products produced by Apple are mostly viewed as luxuries thus an increase inflation could result into low sales volumes. This is because of the increase in unemployment rates which will reduce disposable income thus lowering the buyer’s propensity to purchase. Economic factors can affect Apple either negatively or positively.

Social-cultural factors describe the living patterns and values of the global consumers of Apple electronic products and services. Social factors impact on customer preferences, income groups, and perception and life priorities towards purchasing Apple products. Whereas other social factors such as fashion, social class and peer pressure could drive people into purchasing Apple products, the same forces could make people value other products instead of Apple’s (David, 2007). The company has managed to associate itself with quality, reliability and innovation. The consumers are also aware that Apple Inc. is an expensive brand. Social factors are synonymous with cultural aspects such as population growth rate, age, demographics and distribution of people. These factors collectively impact the company’s positioning of its products and creation of niches.

Technological factors are determined by the ability of Apple to manufacture and design highly innovative and differentiated products through research and development. So far, Apple Inc. has managed to win over more customers because of its unique products. The IT industry is competitive based on the ability for a firm to be innovative in creating appeal through appearance and product features (David, 2007). Ethical factors are related to the ability for the company to ensure that its products are original, safe, secure and not counterfeited. Ethics has helped in protecting innovations made by Apple thus reducing chances of imitation by other companies. Legal factors describe the global laws governing the manufacture of electronic products by companies such as Apple Inc. The company has benefited from laws allowing for sub-contracting of countries with cheap labor such as Korea, and China. As a result, the company has managed to create a competitive advantage due to its low costs of production.

Reference

David, E. H. (2007). Strategic Management: From Theory to Implementation. New York: Routledge.

We can write this or a similar paper for you! Simply fill the order form!

Preliminary research on Apple Company

Preliminary research on Apple Company
Preliminary research on Apple Company

Preliminary research on Apple Company

Order Instructions:

Purpose:

Start preliminary planning for your strategic plan project.

Assignment Description:

Select from the 3 companies Ford Motor Company, Apple or iRobot which company you plan to write your strategic plan for and begin your preliminary research on the company background, products, services, markets serving, key technologies, key manufacturing and operations, financial strength, key partners…etc.

Parameters:

This assignment is worth 75 points.

You are to follow APA formatting and style, and the assignment will be graded following the grading rubric “BU482 Phase 1 and 2 Research Plan Project Work Grading Rubric.“

BU482 Strategic Plan Project Description
The strategic plan project is broken into 4 parts:
Phase 1 Research Strategic Plan Project Preparation Work
Phase 2 Research Strategic Plan Project Preparation Work
Phase 3 Strategic Plan Sections 1- 5
Phase 4 Final Strategic Plan Sections 1-10
Develop a strategic plan for iRobot, Ford or Apple. This should be your writing of a strategic plan for either of these companies and not a copy of their strategic plans. Be creative in your vision for these companies by analyzing the company information provided and using your own research. For example, analyze/develop the mission and vision statement, external and internal forces, long term objectives, desired strategies, management organization/issues, implementation plan/issues and a conclusion. Each of these companies are in dynamic industries undergoing significant changes. For example, Apple is under extreme pressure from Samsung, Google and other Android devices, new tablets and technology, smartphones, cloud computing, sustainability, cost pressures, economic and environmental pressures. Ford is under pressures from the United States and other foreign governmental regulations, zero emission requirements, global competition, product costs, safety technology, satellite systems, intense innovative competitive designs and growth in the emerging markets like India, China and Brazil. iRobot is developing technology that has both military and commercial use, governments are beginning to regulate the use of robots such as drones, robot and computer technology changes quickly and the public is unsure how robots will affect or be a part of their lives. Be creative and develop your strategic plan for one of these fantastic companies. You are to follow the strategic planning process outlined in our textbook shown in (David, Figure 1-1,page 14) and which is highlighted in each chapter of the book but be creative and include sources and information from outside of our test book.
Report Length should be at least 10 pages double spaced (not including the cover page or appendices), 12 point font and following APA 6th Edition writing guidelines.
Phase 1 Research Strategic Plan Project Preparation Work – Select from the 3 companies Ford Motor Company, Apple or iRobot which company you plan to write your strategic plan for and begin your preliminary research on the company background, products, services, markets serving, key technologies, key manufacturing and operations, financial strength, key partners…etc.. – Due in Week 2

Company Information http://www.apple.com/sitemap/ Retrieved (March 2013)
Investor / Financial Information http://investor.apple.com/ Retrieved (March 2013)

SAMPLE ANSWER

Phase 1: Preliminary research on Apple Company

Company Background

Apple Company is a multinational corporation based in the United States. Its headquarter is in California. It is specialized in the development, designing, marketing and selling of consumer electronics, online services, personal computers and computer software. The company has managed to create its market niche by producing a dominant hardware which is used in the Mac product line such as iPod media players, iPad table computers and iPhone smartphones. The software used to run the Mac hardware is known as the iOS operating systems and the OS X (David, 2007). The company was founded by three principles; Steve Jobs, Ronald Wayne and Steve Wozniak in the year 1976. The company then became incorporated into Apple Computer, Inc. in 1977 and later renamed to Apple Company Inc. in 2007. The new name reflected the companies shift in focus to produce a diversified line of consumer electronics. Currently, the company ranks as the second largest in the IT industry. This rank comes after Samsung Electronics which has been ranked as the world’s largest mobile phone manufacturer.

Products

Apple sales it products via an online store as well as its chain retail stores. Some of its other products are sold by direct sales force, resellers, value added resellers and third party wholesalers (David, 2007). These products include Macintosh, iPods, iPhones and other compatible hardware products such as storage devices, printers, watches, branded television sets, headphones, speakers among other computer peripherals and accessories.

Services

The online services provided by Apple Company include iTunes Store, iCloud as well as an App Store. Apple also manufacturers digital contents which are sold through iTunes Store. These services include software programs which are sold through the Apple App Store to its diverse groups of consumers. The iCloud online service has been helpful in syncing a wide range of data such as contacts, email, documents, calendars and photos. The iCloud also offers backup storage for iOS.

Customers

Apple has specialized in segmenting, creating market niches and penetrating market segments. The company has created a blue ocean for its products since, in spite of the high prices, the company has managed to retain its customers who range from small and mid-sized businesses, individual consumers, educational institutions, government agencies, creative customers and enterprises.

Markets serving

Apple Company Inc. serves multinational customers through its 425 chains of retail stores which are strategically located in 14 countries. The supply chain is facilitated by other independent sellers.

Key technologies

                The latest technologies by Apple Company Inc. include the iOS 8 which has more than 4000 APIs that lets developers improve the capabilities and features of applications. The technology enables a deeper integration of iOS thus enabling extended functionality. The technology has facilitated game development. The iCloud for developer’s technology has leveraged the full power of building applications through the cloud kit framework. The developers can now securely and easily store and retrieve essential data on their applications from an online database.

Key manufacturing and operations

Manufacturing and operations at Apple Inc. are highly innovative thus leading to the production of innovative products which move through the fast product life-cycle associated with the IT industry. The company promotes its products through spectacular promotions and marketing campaigns. The products are of high quality thus they are charged at a premium price.

Financial strength

Apple Company Inc. has the largest market capitalization estimated at $446 billion. Because of its financial strength, the company has 75,800 full time employees globally and it enjoyed an annual revenues of $170 billion in 2013. The company is ranked in the top ten of the Fortune 500 companies. Another ranking by the Inter-brand Best Global Brand have reported that Apple is the most valuable brand in the world with a value of $118.9 billion.

Key partners

                Apple’s key partners include social networking sites developers and programmers such as Facebook and LinkedIn. These companies have been essential in partnering with Apple in marketing its products because the company pre-install these applications in their electronic gadgets such as the iPhones. The Taiwan Semiconductor Manufacturing Company (TSMC) has been a confidential key partner for Apple Company since it shares with it important data on the A7 system on chip technology (SoC).

Reference

David, E. H. (2007). Strategic Management: From Theory to Implementation. New York: Routledge.

We can write this or a similar paper for you! Simply fill the order form!

Differential Diagnosis Research Assignment

Differential Diagnosis
Differential Diagnosis

Differential Diagnosis

Order Instructions:

hello,
Id like my work to have 5-6 figures with its reference.And there is a copy of the work on your website

http://customphdthesis.com/essay/diagnostic-techniques-in-pathology-2014-5/

 

SAMPLE ANSWER

  1. Differential Diagnosis

The patient has many presenting symptoms and this is a challenge to identifying the disease at once.  The productive cough of the patient is  purelent indicating the presence of a large number of white blood cells mainly neutrophillic  granulocytes. The purulent sputum of asthmatic is as a result of eosinophillic cells (Farzan  N.p). The patient’s blood stained sputum (hemoptysis) may be caused by a wide range of underlying disorders ranging from trauma to  heart problems to lung diseases to many other infections. Patients  in industrialized countries such as china, bronchitis, bronchogenic carcinoma and bronchiectasis may lead to a productive blood-stained cough but are ruled out since chest X-rays in these diseases are shown to be normal (Jaiswal pp. 176-178.). Lung cancer is also ruled out because its diagnosis does not indicate the presence of rod-like bacteria.  Pulmonary embolus is also ruled since diagnosis of sputum is found to be non-purulent.  Hemoptysis and purulent sputum may also be observed in patients with HIV, where the common cause is typical pneumonia (Health Grades Editorial Staff, Chamberlain  2012).

Home. n.d)

A patient with pneumonia may also present a cough with purulent sputum (Lower Respiratory Tract Infections N.p). Scanty acid-alcohol fast bacilli are also observed in a patient with HIV but this infection is also ruled since HIV patients show a normal X-ray. The patient may be suffering from Chronic Obstructive Pulmonary disease since X-ray shows flattened diaphragm but it also ruled out because the Ziehl Neelsen’s method does not show the presence of the rod –like bacteria (Acute Exacerbations of COPD, N.p). The patient may be having tuberculosis which is the most common cause of hemoptysis and also due to the observation of scanty acid-alcohol fast bacilli in the patient’s sputum (Yoon pp. 172). Observation of heavy pus cells and red blood cells and multiple light areas which coalesce provides evidence that the patient has tuberculosis (Tuberculosis, advanced – chest x-rays N.p).

  1. Table of the Biochemistry Results
Protein Result Normal Range  

High (),

normal () or

low ()

C-reactive protein 13mg/l 1-3 mg/l 10-40

10

1

Creatine kinase 125IU/I 10-120IU/I 308

39-308

39

C-Creatine (hs-CRP) is an essential clinical tool used by physicians to assess patients to determine if they can benefit from a statin therapy.  The rise in levels of CRP is brought about inflammation hence it serves as a marker for inflammation.  Different diseases and infections have varying ranges of CRP.  The CRP of 13 mg/l measured for the patient indicates an increased sensitivity presenting mild inflammation.

(The Relationship Between C-Reactive Protein and Cardiovascular Disease. (n.d.)

The patient’s CK is within the normal range. This implies that there is no injury to muscles in the body (Clinical significance of markedly elevated serum creatine kinase levels in patients with acne on isotretinoin. n.d.).

  1. Chest X-ray Pathology Test

The patient was directed to stand in front of the X-ray machine and instructed to hold his breath at the time the X-ray is taken.  The radiologist usually takes two images, that is, one is taken when the patient is standing next to the machine while the other is taken while standing sideways. In case the patient is pregnant, chest X-rays are not recommended at all. In fact, no chest X-ray should be taken of the pregnant woman when she is in first six months pregnant.

(TUBERCULOSIS: No longer down and out. n.d)

All other patients can have the chest X-rays as long as they have diseases suggestive of a chest related problem.  These may include the patient experiencing a persistent cough, coughing blood or productive cough with purulent, and having difficulty in breathing.  If the patient has shown advanced signs of tuberculosis, one’s doctor can order for a chest X-ray. There are no expected complications as long as it is not repeated many times within a short time or a certain number of times in the patient’s life span.

The patient’s symptoms suggest that he has Tuberculosis (cough, rod-like bacteria, fever). He, therefore, would require chest X-ray besides microbiological testing. The radiologist will take both the lateral and the posterior-anterior (PA) films with each having clear notes. The typical changes he will be looking for include air space consolidation, fibrous contraction and cavitation on the superior parts of the lobes or one or both superior parts of the lower lobes or upper lobes.   The extensive infiltrate with air space consolidation in noted with a bronchogram( ). The number of cavities formed is indicated by (+). Ina addition,  reticulonodular satellite fibrosis and lesions are seen surrounding the involved lung which is normally identified by a traction of the right upper hilum.  However, atypical finding will be more profound if the patient has human immunodeficiency virus (HIV) (Testing for tuberculosis  n.d.).The result on the X-ray depends on the level of the disease. On the X-ray result film there will be seen an abnormality on the mid and lower lung fields.

  1. Interpretation of data and Diagnosis of the patient

Based on the symptoms which have been listed, the patient has an upper respiratory infection which indicated by the cough (Rabkin  N.p, n.d). There are a number of diseases which are indicated by the hemoptysis such as bronchogenic and bronchitis. But only Tuberculosis diagnoses with the rod-like bacteria in the purulent and blood-stained sputum. The patient experiences fever which comes about by the body’s struggle to fight the foreign disease causing microorganisms. That is why his average body temperature is higher than the normal 37 .4 d degrees centigrade. According to the X-ray, the arrow points to the  air space consolidation, fibrous contraction and cavitation which can be observed clearly on the superior parts of the lobes or one or both superior parts of the lower lobes or upper lobes.

The suggestion that the patient is suffering from TB is based on other examinations made which indicate that the patient is not generally well. The patient was also referred to the urologist because he was suspected to have genitourinary tuberculosis.  The result from the urologist which indicated 15 leukocytes in the field, confirms the presence of foreign antigens in the genitourinary system, probably, the mycobacterium, the rod shaped bacteria which causes tuberculosis (Savage pp. 1998 N.p).

More evidence that the patient is suffering from Tuberculosis is indicated by the result obtained from staining the purulent and blood stained sputum with Ziehl Neelse’s method which also confirmed the presence of large a number of scanty acid-alcohol fast bacilli.  The result indicated that each field had more than 20 pus cells within a single field. This was an indication a high density of the mycobacterium, the organism behind the genesis and progression of tuberculosis. Besides pus cells, rod-like bacteria or streptococci are observed. Although few in number, they are still the causative and infectious agents of both pulmonary and genitourinary tuberculosis.

Ziehl neelsen staining. (n.d.).

The presence of red blood cells also indicates that more oxygen is needed to for respiration to produce energy needed by leucocytes.  This suggestion was based on the underlying symptoms such as the immobilization of the commercial disease associated antigens. This were observed on the plastic micro-wells’ surfaces and were specifically bound IgG antibodies from Alfred’s serum to his diseased parts.  There was also a positive result when peroxidise- conjugated goat which is also indicated by anti-human IgG bound Alfred’s IgG in change. Also, resistance to Amphicilin and Isoniazid in which the test carried out shows sensitivity to the drugs.

  1. 5. Discussion
  2. a) The Lesion (Abnormality) in the Chest X-Ray

The lesion is observed as an extensive infiltrate and air-space consolidation on the upper lobe of the right lung. A number of cavities are also observed as indicated by the positive (+) signs. Also, observed are surrounding reticunodular satellite lesions which are very easy to note. There are also fibrotic lung lesions. These are also consistent with tuberculosis at an untreated inactive state of the disease. These lesions make the patient more at risk than their counterparts with a tuberculosis infection if both were more than eight years.
b)    Why did the urologist request the submission of three specimens?

X-ray alone is not enough to confirm that a suspect has TB . The urologist might have requested to carry out other diagnostic tests associated with TB. The results obtained support the radiology results. The comparison of the results from both departments helps the two practitioners to confirm with certainty the actual disease the patient is suffering from. The results from the urology department such as cid-fast smear which is used for microscopic identification of the cause of the pulmonary tuberculosis.  The results show the presence bacilli and pus cells.

  1. c) Significance of Using Early Morning Specimens

The urologist requested for the urine specimens produced by the patients in the early morning since it is less contaminated by lyses red blood cells. This is because the urine collected soon after a prolonged recumbency or soon after a vigorous physical or even sexual activity should not be examined when assessing the patient’s state of microhematuria since he knows it is contaminated. Patients are advised to void the first 5 ml of the urine and then collect up to 50 ml of the remaining urine in a sterile bottle.
d) Antibiotics Used As Treatment of Pulmonary TB

After diagnosing with TB, a number of antibiotics are prescribed by a doctor as a therapy for the infections and to prevent emergence of resistant bacteria in the body.  They are used in a period of 6-12 months. The combination of the antibiotics includes:

  • Isoniazid
  • Rifampin
  • Pyrazinamide,
  • Ethambutol

(Tuberculosis (TB) – Treatment.  n.d.).

(The rationale for recommending fixed-dose combination tablets for treatment of tuberculosis. n.d.).

  1. e) Route; Drug Resistance; Combination Therapy and Length Of Therapy.

Since is has pulmonary TB, he will take two antibiotics orally in a combination of rifampicin and isoniazid every day for six months. He will have an additional oral administration of two antibiotics in a combination of pyrazinamide and ethambutol every day for two months (Tuberculosis (TB) – Treatment. n.d.).
f) Further Investigations to Determine the Spread of the Disease

To determine the spread of the disease within him, three tests may be conducted. Positive tuberculin test leads to the development of cell-mediated immunity which develops within 2-8 weeks from the time of infection. The mechanism behind this phenomenon is that activated T Lymphocytes combine with macrophages to form granulomas which are effective in limiting replication hence curbing the spread of bacilli. Ziehl Neelsen method may be used to determine the level of infection by the bacilli. Lastly, use biochemistry tests such as determine the level of damage to specific muscles of the body.
g) The Disease Progress and Prognosis for the Patient

Tuberculosis disease begins with infection and overcoming the carrier of the mycobacterium’s immune system defences. During primary tuberculosis, the disease is dormant and the immune system is able to contain the infecting and its spread. The bacteria multiplies, it continues affect the immune system and eventually overwhelms it leading to tuberculosis (Testing for tuberculosis n.d.).

List of Works Cited

Acute Exacerbations of COPD | Doctor | Patient.co.uk, [Available at: http://www.patient.co.uk/doctor/acute-exacerbations-of-copd][ [Accessed on 11th November, 2014]

Chamberlain, N. 2012, “CLINICAL SYNDROMES OF PNEUMONIA” . [ Available at http://www.atsu.edu/faculty/chamberlain/Website/lectures/lecture/dxpneumo.htm][Accessed on November 11, 2014]

Clinical significance of markedly elevated serum creatine kinase levels in patients with acne on isotretinoin. (n.d.). [Available at http://www.researchgate.net/publication/11559091_Clinical_significance_of_markedly_elevated_serum_creatine_kinase_levels_in_patients_with_acne_on_isotretinoin] [Accessed on 11th November, 2014]

Farzan, S. 1990, “ Clinical Methods: The History, Physical, and Laboratory Examinations. 3rd edition: Chapter 38Cough and Sputum Production. Butterworth Publishers, a division of Reed Publishing. [Available at: http://www.ncbi.nlm.nih.gov/books/NBK359/][Accessed on11th November, 2014]

Health Grades Editorial Staff, -. (n.d.). Sputum Symptoms. [Available at:http://www.healthgrades.com/symptoms/sputum-symptoms][Accessed on November 11, 2014]

Home n.d.,  [Available at http://tbevidence.org/][Accessed on November 12, 2014]

Jaiswal, A., Munjal, S., Singla, R., Jain, V. & Behera, D. 2012, “A 46-year-old man with tracheomegaly, tracheal diverticulosis, and bronchiectasis: Mounier-Kuhn syndrome”, Lung India, vol. 29, no. 2, pp. 176-178.

Lower Respiratory Tract Infections. (n.d.). [Available at http://www.atsu.edu/faculty/chamberlain/Website/lectures/lecture/dxlrt.htm ][Accessed on 11th November, 2014]

Rabkin, M. n.d.,  “ Upper Respiratory Tract Infection.”  Retrieved November 11, 2014, from http://www.medicineclinic.org/AmbulatorySyllabus4/NEWURI.htm

Savage, P., Roddie, M. & Seckl, M.J. 1998, “A 28-year-old woman with a pulmonary embolus”, The Lancet, vol. 352, no. 9121, pp. 30.

Testing for tuberculosis. (n.d.). [Available at http://www.australianprescriber.com/magazine/33/1/12/18/][Accessed on November, 2014].

The Relationship Between C-Reactive Protein and Cardiovascular Disease. n.d., [.Available at  http://www.medscape.org/viewarticle/500049_4][Accessed on November 11 2014]

The rationale for recommending fixed-dose combination tablets for treatment of tuberculosis. (n.d.). [Available at http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2566330/][Accessed on November 11, 2011]

Tuberculosis (TB) – Treatment . (n.d.).[Available at :http://www.nhs.uk/Conditions/Tuberculosis/Pages/Treatment.aspx][Accessed on November, 2014]

Tuberculosis, advanced – chest x-rays: MedlinePlus Medical Encyclopedia Image. (n.d.). [Available at: http://www.nlm.nih.gov/medlineplus/ency/imagepages/1607.htm][Accessed on November 11, 2014]

Yoon, Soon Ho, Nyoung Keun Lee, and Jae Joon Yim. “Impact of Sputum Gross Appearance and Volume on Smear Positivity of Pulmonary Tuberculosis: A Prospective Cohort Study.” BMC Infectious Diseases 12 (2012): 172. ProQuest. Web. 11 Nov. 2014.

Ziehl neelsen staining n.d., [Available at http://images.1233.tw/ziehl-neelsen-staining/][Accessed on November 11, 2014]

We can write this or a similar paper for you! Simply fill the order form!

The regression technique Discussion

The regression technique
The regression technique

The regression technique

Order Instructions:

This is supposed to be a discussion posting. Not a paper assignment.

Due 11/13 (Wed)

Please see attachment for instructions and references.

SAMPLE ANSWER

Introduction

The regression technique used is the logistic regression. This is a technique used when the dependent variable is categorical. The study outcomes are not continuous and they do fall into different categories that warrant this modeling approach (Lewis-Beck, 1993). In a logistic regression, a logistic transformation of the odds or the logit serves as the dependent variable. The dependent variable (odds) if taken and adding a regression equation for the independent variable will yield a logistic regression (Allen, 1997).

The odds ratio is used to measure how the fitted probability changes between different values of the explanatory variable. An odds ratio that is equal to one indicates a zero effect, an odds ratio greater than one indicates an increase in odds while an odds ratio less than one indicates a decrease in the odds (Draper, & Smith, 1981).

A logistic regression significance testing helps a researcher to identify the influence of different factors in his model (Lewis-Beck, 1993). Thus, the Wald’s test is used to test the contribution of individual regression co-efficient, while the deviance test is used to identify the contribution of several model coefficients simultaneously.

Criminal Justice Research

The research has looks into different types of mistreatment categorically. The odds ratio with its confidence interval has been indicated, as well as the regression co-efficient for each contributing factor. The Wald value has also been indicated so as to ascertain the contributory aspects of each variable. The p-value to indicate the significance of each variable has also been indicated.

In analyzing emotional mistreatment, age, employment status, health status, previous traumatic event, social support levels, and ADL assistance needs are our categorical variables with a probability of success or failure (Williams, 1959). From the results, the odds of an a person below seventy years being mistreated emotionally is approximately three time more than for a person above seventy years. The regression coefficient also indicate that age is the most influential factor when understanding aspects of emotional mistreatment followed by previous traumatic event, need for ADL assistance, health status, employment status and social support respectively. Nonetheless the health status is insignificant when interpreting the health status. Social support level contributes more to the model individually.

Physical mistreatment can be associated with age, gender, race, income level, health status, previous traumatic event and level of social support. Age and social support levels are the only significant factors that can be used to define physical mistreatment as indicated by their probability values of 0.05. The model also suggests that age is the most influential factor as regards physical mistreatment. This is attributed to its Wald value of 8.5 and regression coefficient value of 1.41.

Sexual mistreatment as a categorical variable is identified by gender, income levels, health status, previous traumatic event, social support and need for ADL assistance. Of these factors, previous traumatic event is the only significant variable explaining sexual mistreatment. It regression coefficient of 2.64 indicates its high influence on the logistic model describing sexual mistreatment.

The research utilizes logistic regression to assess different aspects of elderly mistreatment based on different predictors ascribed to them. This is due to the categorical nature of the various forms of mistreatment. Mistreatment is our outcome variable as its value is discrete, thus the assumption of linearity is upheld. A logistic regression then addresses this defect by using a logarithmic transformation on the type of mistreatment variable. The different levels of mistreatment are expressed in terms of odds ratio for success. This ratio indicates the reaction resulting from any form of mistreatment.

References

Allen, M. P. (1997). Understanding regression analysis. New York: Plenum Press.

Draper, N. R., & Smith, H. (1981). Applied regression analysis. New York: Wiley.

Lewis-Beck, M. S. (1993). Regression analysis. London: Sage Publications.

Williams, E. J. (1959). Regression analysis. New York: Wiley.   https://doi.org/10.1002/bimj.19610030208

We can write this or a similar paper for you! Simply fill the order form!

Refinery and Storage Stages in Energy

Refinery and Storage Stages in Energy
Refinery and Storage Stages in Energy

Why Refinery and Storage Stages in Energy are More Vulnerable than at Other Supply Chain Components

Order Instructions:

Read the required literature and especially review the videos.

•Critical Infrastructure Protection Module: Energy Supply Chain: https://www.chds.us/coursefiles/cip/lectures/energy/cip_energy_supplychain/player.html

•Energy Vulnerability Analysis: https://www.chds.us/coursefiles/cip/lectures/energy/cip_energy_vulnerabilityanalysis_p01/player.html

•Critical Infrastructure: Vulnerability Analysis and Protection: SCADA Structure: https://www.chds.us/coursefiles/cip/lectures/scada/cip_SCADA/player.html

•SCADA Vulnerability Analysis:
https://www.chds.us/coursefiles/cip/lectures/scada/cip_SCADA_vulnerabilityanalysis/player.html

Permission granted by Naval Postgraduate School, Center for Homeland Defense and Security, 28 JAN 11.

Answer the following:

1.Why are refinery and storage stages more vulnerable than at other supply chain components?

2.IT-ISAC: Explain what this is and its role in IT and computer products.

3.“SCADA protection is scattered among governmental agencies and commercial groups.” Give some examples of overlap.

Assignment Expectations
Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper

Organization: Subheadings should be used to organize your paper according to question.

SAMPLE ANSWER

Why Refinery and Storage Stages in Energy are More Vulnerable than at Other Supply Chain Components

Energy markets are known to be very complex, technically challenging and highly competitive. Improving the performance throughout the supply chain and more so at all levels of the operations could be at the top of all the agendas of all suppliers. The economic regulatory and the changing business dynamic pressures are continuously faced by the energy providers. Success can only be achieved in this area if the suppliers have responsive, flexible, and scalable strategies that could deliver the profits to the shareholders and the service and value to the consumers.

According to the National Research Council (NRC) and the US Global Research Program (USGCRP) assessments, it is clear that the US energy infrastructure is more vulnerable to the impacts of the range of climate particularly the infrastructure in areas that are prone to bad weather and shortages of water supply. The climate changes are most projected to affect the infrastructure throughout the stages of the energy supply chain thus increasing the risk of disruption (Andrews, 2008).

However, the key issues that affect the retail energy market include: the security of supply in the short and long term, the unit cost of energy and its increasing competition, simplification of the models of tariffs and setting the standards for billing of customers, the smart meters, the carbon reduction commitments and its effects on the energy bills, the micro generation, reduction and the removal of the fuel poverty, and finally the improvement of the energy efficiency at the level of consumption.

IT-ISAC

IT-SAC is known in full as the Information Technology Services Advisory Committee. It was established in the year 2002 to offer a forum say for the students as well as the IT staff in order to discuss the technology priorities and issues. It involves the membership including the representatives from the college and the members in general in order to discuss the current and the new IT initiatives and is mandated to submit a report each and every year (Basham & Campbell, 2009).

Role of IT-SAC in IT and Computer Products

The Information Technology Services Advisory Committee (ITSAC) is designed so as to advice the Vice Provost of the Information Technology and the CIO on the IT services that are provided to the community of the University by the Information Technology Services. Its deliberations are known to be informed by the advice from the respective administrative units, which have clear accounting for all the advisory committee recommendations and the commentary.

Simply, its primary roles include the making of recommendations on the levels of the services offered to IT and their costs in general. Secondly, is to review the budget involved in the Information Technology Services so as to ensure that the services that are provided to the University are carried out effectively and even more efficiently. Lastly, the IT-SAC is designed also for the purpose to provide advice and the input to the Vice Provost for the Information Technology and the CIO regarding the annual preparation and the presentation of the budget of the Information technology Services to the university Budget Advisory Committee (Shyh Chiuan Chia, 2005).

“SCADA protection is scattered among governmental agencies and commercial groups.”

With the SCADA international, consulting, project solutions and engineering are offered. Aside from that, they involve the execution of the Supervisory Control and data Acquisition (SCADA) systems within the renewable sector of energy. The clear structures and processes guide their work whether with the supply of an off the shelf solution or a project specific solution. They implement the best SCADA solutions to the market, make puzzle to get into place as well as the critical piece involving any good SCADA solution.

The SCADA systems are usually more complex with multiple components. They may be fully automated where there is full control performed by the computers, fully manual in the case where control is performed by the human operators or even a hybrid system. Many SCADA systems include the following in order to perform the above functions: The field Interface Devices which sensors the detecting and the reporting power levels, temperature, pressure, flow rates and the local control devices like the controls of motors, valve actuators and the control switchboxes.

In addition, they involve the operating equipment where the motors, automated factory, pumps and the valve are controlled by the SCADA network. They involve the management computers whereby the computer terminals with a Human machine Interface (HMI) are connected with the SCADA network. These computers have a provision of an interface for the operators to monitor and control the devices on the SCADA network.  Other than that, they involve the interconnection to the business process systems. That is, the SCADA networks frequently are connected to the corporate networks so as to allow them to interconnect with the business process systems (Norman SCADA protection, 2012).

References

Andrews, C. J. (2008). Energy Conversion Goes Local: Implications for Planners. Journal Of The American Planning Association, 74(2), 231-254.

Basham, M. J., & Campbell, D. F. (2009). Introduction to the Special Issue on Best Practices in SACS Accreditation. Community College Journal Of Research & Practice, 33(8), 609-610.

Norman SCADA Protection. (2012). Pipeline & Gas Journal, 239(6), 85.

Shyh Chiuan Chia, C. (2005). Promoting independent learning through language learning and the use of IT. Educational Media International, 42(4), 317-332.

We can write this or a similar paper for you! Simply fill the order form!

Privacy and Ethics Essay Paper Assignment

Privacy and Ethics
Privacy and Ethics

Privacy and Ethics

Order Instructions:

see the film

SAMPLE ANSWER

Introduction

Currently, people live in a world where the internet plays a major role in day-to-day lives, commonly referred to as the information age, which can be described as an era where economic activities are mainly based on information. This comes as a result of the development and use of technology. This article discusses the ethical questions related to the right to privacy of an individual that is threatened by the use of the internet. Specifically, it gives the challenges that these ethical problems pose to the information professional and the practical guidelines based on the ethical norms.

The Concept of Privacy and Ethics

Privacy is defined as a condition of life of an individual that is characterized by an exclusion from the public. This concept follows the right to be left all alone (Thierer, 2013). Such a privacy perception sets the course for passing the laws of privacy in the United States for the following years. Privacy could be regarded as a right that provides the foundation for the legal right. This is important because it is necessary for the fulfillment of other rights such as freedom and the personal autonomy, which are quite related. The respect of someone’s privacy acknowledges the person’s rights to freedom and recognizes that the person is an autonomous human being. Thus, respecting a person’s privacy is a duty that everyone is obliged to follow.

Categories of Private Information

            According to Kauffman, Lee, Prosch, and Steinbart, (2011), privacy is usually expressed by means of information. This implies that it is possible to categorize privacy, namely; information that is related to the privacy of an individual’s body, private communications, information regarding a person’s possessions and other personal information.

The category of private communications concerns all the forms of personal communication, which one wishes to keep private. This kind of information is usually exchanged, for example, between the user and informational professional during a reference interview. The category of the privacy of the body normally refers to the medical information and enjoys a separate legal protection (Kauffman, Lee, Prosch, & Steinbart, 2011). This legislation defines the right of a person to be notified about the nature of an illness and the implications associated with it.

The category of personal information refers only to the information of a specific person. Examples of these kinds of information include name, address, which are the bibliographic data, and the financial information. All of these are relevant to the categories of the information professionals. Lastly, the category of the information about someone’s possession is known to be closely related to the right to own property (Thierer, 2013). A person has the right to control the information, which relates to his personal possessions in certain instances. A good example of this is the secrecy about the place where a person has kept his wallet.

Ethics

            Ethical actions of a person are described as those actions, which are performed within the criteria of what is regarded as right. In terms of human actions, it relates to the question of what is good or bad. Its purpose is to help people behave in an honorable manner and attain the basic good that make them fully human.

The Influence of the Internet on the Processing of Personal and Private Information

Definition of the Internet in relation to Information Technology

            According to Busch (2013), the concept of technology is defined as the process of gathering, organizing, storing and distributing information in different formats by the use of computer means and the techniques based on the micro-electronics. He defines internet as a form of technology that is a network of many computers, which he sometimes calls the Global Information Infrastructure (GII) (Busch, 2013).    

Ethical Implications for the Use of Technology in Processing Information

            The main ethical impact of technology relates to accessibility and inaccessibility and the handling or manipulation of information. Through its implications, it becomes easy to access the private information of an individual by many people. Other than that, the person may be excluded from necessary information in the electronic format by use of security formats such as passwords. This kind of manipulation of information by the use of technology refers to the integration of information done by the merging of documents, repackaging of information, which involves the translations and the integration of textual and the graphical formats, and the alteration of information by the means of computer electronics, thus, changing the photographic images.

The use of technology to process information is not regarded as ethically neutral. Technology has, however, changed the ontological status of a document while accompanying the ethical implications (Mingers & Walsham, 2010). This refers to the manipulation of personal information by the use of the internet as a form of technology.

The impact of technology use on the private lives of people manifests itself in a variety of areas. First, is the use of the electronic monitoring of people in the workplace. Research shows that companies justify their use of technology to the increase of their productivity. However, there are several ethical problems pertaining to it (Nunan & Di, 2013). People’s privacy in their workplaces are threatened by these devices, which could lead to fear and the panoptical phenomenon. Second is the interception and the access to the email messages of people. This is an ethical problem related to the private communication of a person. The reading of email messages is justified at workplaces because they get to see the technology infrastructure as usually a resource being to the company rather not to an individual. Aside from that, they get to intercept the messages so as to get to know whether their employees use the facilities for their own private and selfish reasons or for the right purposes of the job.

Thirdly, there is the merging of databases, which contain the private information known as the data banking (Nunan & Di, 2013). This shows the integration of personal information from various databases into one central database. The problem here comes up because the individual is not aware of his personal information that is being integrated in the central database, the purposes for that, and if truly the information gathered is accurate. Forth, is the buying of cards by the retail stores. These cards are buried with computer chips that record every item that is purchased together with the variety of information of the buyer which allows companies to do targeted marketing to people they may have known their personal information and their buying habits (Busch, 2013). Lastly, another threat to information privacy is the increase in the number of hackers and crackers, which break into the computer systems (Kauffman, Lee, Prosch, & Steinbart, 2011). This comes together with the shift in the ethical values as well as the emergence of the culture of the cyberpunk with the ‘information wants to be free’ motto.

Associated Effect

            The use of technology affects the individual level in that it causes loss of dignity and spontaneity as well as a threat to the right of information privacy and freedom. Technology is viewed more as a cause of threat rather than personal freedom. Research conducted by one of the biggest credit bureau companies in the USA, Equifax, showed that approximately 79% of the respondents indicated that they were weary of the use of technology for the processing of personal information (Nunan & Di, 2013).

Technology also has effects on the economic and the social levels. The biggest effect is the growth of businesses such as the credit bureau and the telecommunication companies that specializes in the processing and trade of person related information. The legislation on the protection of information privacy on the internet of an individual is known to fall behind due to the rapidly changing world in terms of technology (Thierer, 2013).

Relevance to the Information Professional

Ethical Issues

            Handling and processing of the categories of personal and private information is entitled with several ethical issues. First is the confidential treatment of such information which refers to the information that is gained from the reference interview. The main ethical problems regarding this could be the use of personal details obtained from the interview for other purposes rather than what they were gathered for. This involves the re-use of a search strategy of one user for another user and discussing the nature of the specific query with other people.

Second is the issue of accuracy of information, which is important in cases where an information professional is working with the personal information that could have a direct influence to a person’s life. Third is the purpose for using different categories of information. The question is whether an information professional will employ the categories of private information for other reasons other than the original reason and whether the person should be informed about it (Mingers & Walsham, 2010).

Last is the ethical problem of the rights of a person in the use and distribution of his or her personal information. The related questions to this is if the user has the right to verify the information held by the professional and what rights the person has regarding the correction of any wrong information. Other than that, it is necessary to question if the person has the right to know the person using his personal information and for what reasons.

Ethical Norms

            It is necessary to formulate the ethical norms to address the ethical issues. The ethical norms that can be distinguished are freedom, truth and the human right. Truth has a dual application in ethics. It is a norm for factual correctness of information. It thus guides the information professional to accurately and correctly handle the private information of an individual.

An individual also has the freedom to make choices in terms of the freedom of privacy and the freedom from intrusion though it may not become absolutized. The human rights norm on the other hand means the juridical acknowledgement and protection of the right to privacy of a person. It protects an individual from the unlawful interference from the society in the private life of an individual.

Ethical Guidelines

            The recognition of person’s autonomy and freedom together with the fact that the guidelines on information privacy do not give a complete framework for ethical actions of the information professional regarding handling an individual’s private information. Thus, it is important to have the following ethical guidelines in mind.

The information professional is required to act on the assumption that is regarded by the client as confidential. This implies that the information professional is obliged to acknowledge the right of the client to control any private information. Regularly, the client is obliged to have access to all the private and personal information that is used by the information professional. This helps the client to have the opportunity to verify if the information is accurate.

Merging of personal information of an individual into a different database should be done with necessary caution. This is applicable in certain situations where the client is not aware of the merging or rather its implications. The client should be informed about that and be given the right to access the information in the central database. Other than that, the client should be given the right to change the information in the central database if it could by any chance be incorrect. In addition it is the right of the client to know those people using the information and for what purposes.

It is necessary for the information professional to notify the client of any intended purpose of using the information. This implies that the client has granted permission to that. No unnecessary private information should be gathered. This is for both the logistics reasons and to prevent any unnecessary violation of the person’s information privacy. Aside from that, any personal information that is collected and is no longer necessary should be destroyed (Bush, 2013). This is based on the norms of freedom and the human rights. In addition, in case the rendering of a specific product or service is refused to an individual due to his or her personal information like the credit worthiness, it is necessary to inform the individual the reason for denial. This is based on the norm of truth and the human rights. Personal information must be given strict confidentiality. This is the security and the control of information regarding the right to access it and the right to change and add any necessary information to it (Thierer, 2013).

Conclusion

In conclusion, the use of the internet in processing information has various important questions with regard to a person’s right to information privacy, which is directly linked to the freedom right and the human autonomy. These problems relate to the accessibility and the manipulation of information. It is, however, relevant to the information professional who deals with the private and the personal information. Their practical guidelines to handle the problems are formulated according to the truth, norms of freedom, and the human rights. In a world that is facing a rapid technological advancement, it is important that relevant sectors take appropriate measures to curb cases of cyber-crime, in order to protect the rights of users and ensure complete confidentiality. Otherwise, this piece of unprecedented innovation might as well become its own barrier.

References

Busch, T. (2013). Fair Information Technologies. The Corporate Responsibility of Online Social Networks as Public Regulators. University Of St. Gallen, Business Dissertations, 1-158.

Kauffman, R. J., Lee, Y. J., Prosch, M., & Steinbart, P. J. (2011). A Survey of Consumer Information Privacy from the Accounting Information Systems Perspective. Journal Of Information Systems, 25(2), 47-79.

Mingers, J., & Walsham, G. (2010). Toward Ethical Information Systems: The Contribution of Discourse Ethics. MIS Quarterly, 34(4), 833-854.

Nunan, D., & Di Domenico, M. (2013). Market research and the ethics of big data. International Journal Of Market Research, 55(4), 2-13.

Thierer, A. (2013). The Pursuit Of Privacy In A World Where Information Control Is Failing. Harvard Journal Of Law & Public Policy, 36(2), 409-455.

We can write this or a similar paper for you! Simply fill the order form!

The MBA Decision Mini-Case Study Paper

The MBA Decision
The MBA Decision

The MBA Decision

Order Instructions:

It is critical that the writer follow APA 6th edition for this papers as the Prof is very particular about that , I am already loosing a lot of points for that in my previous papers of last week. so I have also uploaded a document he send to guide us on how to use APA 6th edition to complete this assignments

Mini-Case Study: The MBA Decision
For this assignment I have attached the case study mentioned below in the question for the writer to use in completing this paper. The prof took me a lot of points for the previous paper because of the APA which he said was very bad. I will also upload a document which he send to me indicating how the paper has to be using APA 6th edition.

In this case study, found on page 134 of your course text, an individual is making a decision on what is the best option for pursuing an MBA and has asked for your advice. After reading the case study, briefly answer the six questions at the end of the study ( 3 sentences minimum each).

SAMPLE ANSWER

Introduction

Graduating from an MBA class is mostly related to success and good living associated with high paying jobs. But making the final to quit from a secure job and taking the chances to move up the ladder maybe one of the hardest decisions that most potential students experience. These paper looks at the process of determining the best decision to take considering all the quantifiable and the non quantifiable factors.

Financial Factors that Ben Bates must consider

  1. The age of Ben is relevant when estimating the number of years that he can work. For example if his age is currently 30yrs, and if he is expected to retire after reaching the age of 55yrs then his remaining working life would be 25yrs.
  2. The other non-quantifiable are the increased taxation that is progressive, the bonus that’s payable once and the other medical health benefits that are offered while studying for post graduating degrees.
  3. Benefits from the current job
Interest C Years rate PV Annuity Tax After Tax
Annuity due 1.03 65,000 40 0.03 1547533.98 402358.84 1145175.148
Formula C * (1.05^-n-1)/0.05) *1.05
Benefits After MBA Graduation
Interest C Years rate PV Annuity Tax After Tax
Annuity due 1.04 110,000 38 0.04 9,835,006.50 3048852.02 6,786,154.49
Formula C * (1.05^-n-1)/0.05) *1.05

 

Future Value (After MBA graduation)
Years Present value Interest FV
38 110000 1.04 488269.5
Future Value (Current Job Benefits)
Years Present value Interest   FV
40 65000 1.03 212032.5

 The future values are not for periods over 30 yrs and the interest rates are lower than 10% it would be better to calculate the options using the annuities due.

  1. The Present value of the benefits he receives from the current employment are;
PV of all salary payments in 40 years 1,145,175.15
Taxes -297,746
Total benefits 847,429.61
MBA Course $70,000 per yr for 2yrs 140,000
Books 6000
Taxes 2103707.89
Total Exp 2,249,708
Bonus 20,000
MBA Job income for 38yrs 6,786,154.49
Savings 4,556,446.59

 The total benefits to be derived from the job offers are much more than the current benefits from the current job. The MBA offer has a net benefit of $4,536,446.59 on getting a job after completion. While the current job offers a total of 867,429.60. (Ross, Westerfield & Jaffe, 2013, p.175).

Ben would need a salary of; $4,556,446.59 – 847829.61 = 3,708,617

The present value of 3,708,617 at 3% interest for 40 years = 1,136,902 per year which is equivalent to $94,741.83 per month;

PV = Years Future value Interest PV PM
40 3708617 1.03 1136902 94741.83

 

6. PV of all salary payments in 40 years 1,145,175.15
Taxes -297,746
Total benefits 847,429.61
MBA Course $70,000 per yr for 2yrs + interest 150,675
Books 6000
Taxes 2103707.89
Total Exp 2,260,383
 

Bonus

 

20,000

MBA Job income for 38yrs 6,786,154.49
Savings 4,545,771.59

Discussion

The present value of the total benefits that Ben bates can possibly earn from his employment in the next forty years is $1,145,175.148 at a growth of 3%. The other benefits that he can derive from his employment are the low taxes that are chargeable because of low salaries. The amounts receivable after graduating from the MBA class are very high compared to the benefits that Ben Bates receives from his current employment even after factoring all the expenses incurred while seeking the MBA degree course. I certainly would recommend to him to take the MBA class.

Conclusion

The option to take an MBA degree course is a good decision compared to the current job undertaking. It would be profitable for Ben Bates to quit the current job and enrolled at the Ritter College of Business Studies at Wilton University. The cost of the tuition, books and also the loan interests are still affordable given the outcome of the MBA degree course.

Reference

Ross, S. R., Westerfield, R. W. & Jaffe, J. (2013) Corporate finance (10th Ed.) New York, NY: McGraw-Hill. pp. 175.   http://www.academia.edu/29976485/Corporate_Finance_10th_Edition_by_Stephen_Ross_Others

We can write this or a similar paper for you! Simply fill the order form!

Current Events in Business Research

Current Events in Business Research
Current Events in Business Research

Current Events in Business Research

Order Instructions:

Find an article in the University Library that contains a research study in the functional area of Youth Ministry or Catholic Religious Education as a Career.

Write a 700- to 1,050-word summary:

Describe the business research process followed in the study in the article.
•Identify the research problem and the research method used.
•Discuss how the research is solving the problem within the chosen functional area.
•Identify other potential applications using business research within this functional area or related areas.

Format your paper consistent with APA guidelines.

SAMPLE ANSWER

Current Events in Business Research

The article ‘The practice of youth ministry in a changing context: Results from an Australian scoping study’ is a study whose main aim was to come up with innovative strategies to reach out to the youth, and bring them back to the church, since it has been registered as a global trend that the population of youths in the churches is drastically reducing. As such, the Australian churches, which are the center-stage of this study, sought to find a solution (Singleton, Webber, Joyce, & Dorissa, 2010). It is a common thing across all churches to define key strategies to allure back their youths into the church. The study posits that different programs may be employed to change the perception or approach to the issue of youths, a question regarding their efficacy should be asked. As such, it is important to determine which approach has the elements of best-practice in the advent of youth ministry.  Basically, this study connects the denominational role of the church in the lives of the youth, and the use of the church as a career opportunity by the youth, as one of the main ways of achieving their retention in the church.

The business research process followed in this article involved a scoping research, which was conducted in Melbourne, Australia, especially among the denominations that have struggled to maintain the youth. The scoping exercise had two main aims: to identify the various ministry styles that are being applied; and identify among the mentioned ministry approaches and styles, which ones represent best-practice when in a mission to ensure youth retention, social justice activities, and involvement of adults in liturgy, to create an environment of understanding and development. The method used here primarily aimed at providing a descriptive foundation upon which useful discussions regarding theological and sociological perspectives could be held. In all churches across the globe, the youth ministry is recognized as the invigorated theology discipline, that requires a series of activities and practical work to survive. In order to explicitly provide a manifestation of these practical approaches, the study employed a descriptive empirical task to tend to address in an amicable manner, the question, “what is going on?

The method applied in this study can be best understood as a descriptive-empirical task in the bracket of practical theology. In addition, it is a social-scientific study, whose aims are to create a relationship between various theological perspectives and the problem of youth retention in churches today. This study strongly builds on the empirical base on which it is strongly instituted, which is used to explore the changes that need to be effected in the youth ministry and other facets of the pastoral ministry. In order to create a sense of reliability and authenticity for the study, the researchers instituted four innovative ways of penetrating into the minds and interest of the youth. For instance, they were presented with an interpretive task that involve surpassing the normal descriptions to understand the dynamics involved in the mix; normative task that inculcates deep reflections on the actions of God; and lastly, the pragmatic task, which involves taking a decision on the action implemented. This methodology and approach involved knowing and understanding the target customers, as well as identifying other players in the issue of youth retention.

As identified above, the research problem that is being addressed in this article is the high rate of youth attrition from modern churches, with a specific focus on Melbourne, Australia. It must be understood that this area would be assumed to act as perfect representative of the global trend in this issue. The study addresses the problem by testing and coming up with amicable suggestions and solutions to ensure youth retention in churches.  The research recognizes that the functional area of the youth is one that is very elusive and difficult to predict. As such, it requires innovative processes and activities in order to work well. The research set out different strategies to woo youths back into the church, including entertainment, career choices, youth forums, and many other innovative processes that make the youth feel involved and wanted. At this time, the research recognized that the incorporation of such activities as retreats, fun-days, contemporary music, and multimedia worshiping are among the key strategies to allure the youth back to the church. More importantly, the study had one focal point that active engagement of youths in the church through solid employment opportunities is a good way of ensuring their retention. Particularly, the research is very pragmatic when it comes to identifying the needs of the youth in relation to the church. Inasmuch as the youth might view the church as apace of worship, it is also a social place, where they meet various individuals, get to connect, and create fruitful relationships that can be the basis of prospective career developments. It is this particular need that the study presented here aptly establishes, in a bid to address the research problem, which is the reducing number of youths in churches.

There are various other applications that can use a similar business research with the same functional area as discussed here, that is, the youth ministry. As identified above, youths are a very difficult group to work with, owing to the diverse and unique nature of their desires, likes, and dislikes. However, owing to its critical nature in the future development and life of a person, it is imperative that several programs be put in place to ensure they survival, safety, and continued support.  A program such as a campaign to reduce the habit of smoking among the youth is an example. This campaign would involve basically the same business research as above. Secondly, a camping to create awareness among the youths and school going children to enroll into specific career choices that are facing a crisis of manpower shortage, such as the healthcare sector.  Another example of a an application that would involve the same business research is creating brand awareness of a new product targeting the youth, for instance, cola drinks such as soda. Lastly, promotion of the use of protection during acts of intimacy may be a potential application that can utilize this business research. Summarily, a business research requires absolute understanding the needs of the target population, and streamlining strategies to address the problem of deficit identified.

Reference

Singleton, A., Webber, R., Joyce, M. R., & Dorissa, A. (2010). The practice of youth ministry in a changing context: Results from an Australian scoping study. Journal Of Youth Ministry9(1), 35-54.

We can write this or a similar paper for you! Simply fill the order form!

Challenges and Solutions to Effective Recruiting

Challenges and Solutions to Effective Recruiting
Challenges and Solutions to Effective                                  Recruiting

Challenges and Solutions to Effective Recruiting

Order Instructions:

Dear Sir,

I need an essay in the following subject:

For this essay (case study) you will need to read the following article:
Recruitment in the 21st Century (the article is included as an attachment)
After you have read the article, complete the following:

Identify and analyze the challenges in staffing, especially with regards to personnel selection practices. Identify the best approaches to successful recruitment.

The following conditions must meet in the paper

1) I want a typical and a quality answer which should have about 1100 words.

2) The answer must raise appropriate critical questions.

3) The answer must include examples from experience or the web with references from relevant examples from real companies.

4) Do include all your references, as per the Harvard Referencing System,

5) Please don’t use Wikipedia web site.

6) I need examples from peer reviewed articles or researches.

Appreciate each single moment you spend in writing my paper

Best regards

SAMPLE ANSWER

Challenges and Solutions to Effective Recruiting

Recruiting new employees is becoming more and more difficult among employers today. There are a variety of challenges attached to the recruitment exercise ranging from finding to attracting good talent. On the other hand, employees have become more and more aware of the need to identify employers who are more likely to accommodate them indefinitely and to give them a reasonable compensation while at the same time placing them under proper working conditions. This paper analyzes the major drawbacks to the recruitment process and provides viable solutions.

Challenges

Finding talent is one challenge that employers find rather difficult in the present age. In this regard, employees are becoming more and more likely to resist new employers if they are of high quality (Shafique, 2012). High quality employees also have restrictions as to who may employ them (Gberevbie, 2008). If the needs of the employer and the employee to not complement each other, then recruitment is made difficult.

Employers must also seem attractive for them to attract good talent. In this regard, for employers to get access to good talent, they must also be willing to go an extra mile while dealing with potential employees (Shafique, 2012). This includes giving feedback to unsuccessful candidates, planning for interviews swiftly and using a variety of platforms to advertise the company’s vacancies.

Another challenge to the recruitment exercise is selecting the right platform for advertising. While employers have recognized the need in utilizing multiple platforms, they have failed in regard to identifying the right partners in this regard (Hutchinson, 2010). On the one hand, they must identify companies that offer relevant personnel and on the other hand they must obtain one with a sufficient employee network.

Today, employers have had to change their staple from A-level to mainly graduate recruiting (Shafique, 2012). This is because present generations have come with a vast knowledge in technology coupled with a high level of education. With this regard, employers have found the need to accommodate the new developments in order for them to remain relevant to their field.

Another challenge in the industry is the problem of identifying individuals who will fit into the company culture (Sage, 2014). For certain companies such as Apple, identifying someone who will fit into the company culture is vital. The company culture at Apple requires creative people who are able to work in teams. Identifying such people is sometimes rather difficult. Consider the position of Head of Retail in the company. When it was left vacant after the resignation of Ron Johnson in 2011, the position was filled by John Browett. However, the new head of sales could not fit into the culture at Apple and was finally replaced. Currently however, the position has been filled by Angela Ahrendts. Angela fits perfectly in the culture of Apple (Gurman, 2013). The only issue arises in that the company had to search for a whole two years before finally settling on her.

Finally, there is the challenge of identifying the best candidate fast. Sometimes employees need to identify a good candidate fast. If they do, they are faced with the challenge of compromising on some of their values or doing devising alternatives of getting the roles performed. Both of these options may impact on the productivity of the company. It is therefore important that each of the roles be satisfactorily filled as soon as reasonably possible.

Solutions

With the many challenges that have been identified in recruitment, employers must devise suitable recruitment methods. A company should also be willing to look at various platforms before finally settling on any one. Alternatively, the company should identify various platforms and adopt as many as possible so as to get access to a wider number of potential candidates.

One very important aspect of recruiting today is using the internet. It solves most of the challenges above. First, it is often one of the swiftest recruitment methods. It comes with little effort and brings with it, a variety of options. The internet is also one of the most cost-effective methods (Shafique, 2012). Today, all major companies have identified the need to incorporate recruitment into their online company profiles. All major companies make sure that they advertise vacant positions on their websites. In most instances, employees who are motivated or interested in working for the company often look on the company’s website. Tapping the internet could therefore be a source of quality employees who are ready to jump ship.

Advertising is another important aspect of recruiting. Advertising vacant positions has always been part of most companies’ recruitment programs. It involves the company’s paying for advertisement services from another company in order to fill vacant positions (Walker, 2008). On doing this, the company must be willing to pay as well as explore various options. Some quality employees are only going to be reached on the internet while others are only going to be reached on newspapers or magazines (Haar & White, 2011). Posting advertisements on numerous platforms opens up the position to various candidates.

Once the position has been opened to the public, numerous applications will often be made. It is important for the company to identify methods of obtaining only the right candidate for the position. This involves eliminating all those who are unqualified and retaining only those who are potential candidates (Walker, 2008). The best method is to review the properties of each candidate individually and only retaining only those who will be suitable for the position. After this, the right candidate should be identified by interviews.

In the course of filling positions, companies can take advantage of the big number of applicants to identify talent (Shafique, 2012). Some candidates may not qualify for certain positions but be perfect for others. Analyzing each candidate independently helps the company to identify such talent and take advantage of them accordingly.

Once talent has been identified, it should also be retained. Retaining employees involves a variety of concepts. First, employers should be willing to go an extra mile and provide good compensation plans for its employees (Rostker, Hix & Wilson, 2007). If employees are not given attractive plans, they will keep looking. Employees who keep looking will be most likely moving to other companies if an opportunity arises. Proper working conditions should also be prioritized to ensure that employees prefer working there regardless of the pay levels.

In conclusion, companies usually must a have a continuous recruitment program to deal with its growth and the positions that are left vacant by exiting employees. Identifying the right talent is vital to the recruitment exercise. Employees who move the operations of the company should be retained at all costs. Getting such employees requires identifying a variety of strategies and employing as many as possible to ensure that the company never falls short of candidates to employ.

References

Shafique, O. 2012. Recruitment in the 21st Century. International Journal of Contemporary Research in Business, 4(2), 887-901.

Gberevbie, D. 2008. Employee Retention Strategies And Organizational Performance. IFE PsychologIA, 16(2).

Gurman, M. 2013. Apple finally finds new Head of Retail: Burberry CEO Angela Ahrendts. Will begin in Spring 2014, run Online Stores too. [online] 9to5Mac. Available at: http://9to5mac.com/2013/10/14/apple-finally-finds-new-head-of-retail-burberry-ceo-angela-ahrendts/ [Accessed 6 Nov. 2014].

Haar, J. and White, B. 2011. Corporate entrepreneurship and information technology towards employee retention: a study of New Zealand firms. Human Resource Management Journal, 23(1), pp.109-125.

Hutchinson, I. 2010. People glue. Warriewood, N.S.W.: Woodslane Press.

Rostker, B., Hix, W. and Wilson, J. (2007). Recruitment and retention. Santa Monica, CA: Rand Gulf States Policy Institute.

Sage, 2014. Top five recruiting challenges HR professionals face and how to overcome them. [online] Available at: http://na.sage.com/us/articles/hr/five-recruiting-challenges [Accessed 6 Nov. 2014].

Walker, H. 2008. Advertising and recruiting. ACM SIGCSE Bulletin, 40(2), p.16.

We can write this or a similar paper for you! Simply fill the order form!

Pros and cons of removing personal information

Pros and cons of removing personal information
Pros and cons of removing personal information

Pros and cons of removing personal information prior to the screening and short listing of applicants for employment

Order Instructions:

Dear Sir,

I need a paper in the following subject:

Identify the pros and cons of removing personal information, such as age, gender, ethnic origin, and family or marital circumstances, prior to the screening and short listing of applicants for employment. Take a position for either removing or retaining such information.

The following conditions must meet in the paper

1) I want a typical and a quality answer which should have about 830 words.

2) The answer must raise appropriate critical questions.

3) The answer must include examples from experience or the web with references from
relevant examples from real companies.

4) Do include all your references, as per the Harvard Referencing System,

5) Please don’t use Wikipedia web site.

6) I need examples from peer reviewed articles or research.

Appreciate each single moment you spend in writing my paper

Best regards

SAMPLE ANSWER

Every employee has personal information with regards to age, ethnic origin, gender, and marital status that can possibly be captured, or left out prior to screening and shortlisting of employment application. Removing or retaining personal information has possible implications that should adequately be considered during shortlisting.

Mollick (2010) argues that the removal of the personal information helps a person to have maximum privacy in accordance to the Freedom Act and the Privacy Act that forbids a company from releasing an employee’s personal information.Some information like the payroll information in the case of federal agencies is exempted from the public disclosure and this can only happen when a person has declared his information to be released to the public (Iannarelli & O’Shaughnessy, 2014).The failure not to assess the employee’s personal information makes them have a complete trust on their employer since they are sure that such information will not be used in a biased manner against them. Most employees are free to release their personal information to their employers but they would not wish that this information be used against them for discrimination purposes in their workplace. In a case where trust is lost, employees tend swift to places where they are treated better such that their personal information is not necessary for employment purposes. Some people fail to avail their personal information since they think by doing that they will have invaded their personal liberty and this helps them not to reveal their background checks to their employer. A mistake done in the youth may affect a person in that they don’t get a certain job and if they do not disclose their personal information to their employees they secure the job at hand. Over the year, people have been discriminated in their workplace due to ethnic origin, religion, gender, and background. Concealing such personal information is the only chance that can help reduce such forms of discrimination.

The removal of personal information is useful since it helps one not to be able to sell another person’s information to unscrupulous persons that may use such information in unnecessary means. In the case of personal property like the driving licenses, it is important not to give such personal information to the employer for easy retrieval in case such documents get lost. Not disclosing personal information helps victims to be able to protect themselves from the thief’s who have intentions of hacking their systems or acquiring property from them through unauthorized means.The ability not to disclose personal information’s helps one to be sure that his information is not being misused or even it is not compromised by organizations or their employers for their own benefits and not issues related to their duties. Thorough background checkup protects the employers not to have problems in their future lawsuits with their employer.

It is advisable to have a specific person who receives company office calls since it is good to have one person who is trusted in safeguarding employee’s information (Blanpain, 2014). On the other hand, background checks are very expensive in terms of money since most employers tend not to carry thorough checks on the people they are about to employ since its highly expensive to do so.Litigation is evident in most companies since they failed to carry enough background check on the people they were employing, a good case example is Wal-Mart, which was involved in the negligence lawsuit in matters related to employees personal information (Teevan & Jones, 2006). The employer can highly be penalized by not dealing with private information or data that is provided to him in irresponsible manner and this may bring problems on the side of the employee. Carelessness of losing personal information may lead to heavy fines which may make the employers be compromised by the court to pay them.The company that gets access to personal information or even the doings of those persons and fails to handle it well may find itself in problems if such information was to get into the wrong hands; hence they need to be very sensitive on such information.According to Charters (2005), the extensive background checks carried out by company employers may be very crucial to a person’s livelihood and this explains why companies should not make errors while performing background checks.Terrorist attacks have contributed to the result of high security check since it is hard to get a job without undergoing serious security check for the employer to be sure of the type of a person he is dealing with.

However, disclosing the personal information of the employees also has some benefits (Iannarelli & O’Shaughnessy, 2014). Disclosing such personal information helps the HR department to prove to the management and the general public that they are fair in their recruitment and that all the demographic groups are incorporated. This is highly important in cosmopolitan zones and ethnically mixed population, whereby any form of discrimination is highly sensitive. In addition, displaying personal information enables the HR department to plan for necessary adjustments with the aim of ensuring that all the demographic groups are represented. A particular demographic group can be good in doing a particular task within the organization and thus, such personal information can be used by HR for their employee placement.

References

Blanpain, R.2014. Protection of Employees’ Personal Information and Privacy. Wolters Kluwer Law & Business

Charters, D. 2005.Managing employee personal information. CMA Management. Vol. 79 Issue 2, p14-15

Iannarelli, J. & O’Shaughnessy, M. 2014.Information Governance and Security: Protecting and Managing Your Company Proprietary Information. Butterworth-Heinemann, 1 edition

Mollick, J.S. 2010.Determinants of perceived trustworthiness in managing personal information.International Journal of the Academic Business World. Vol. 4 Issue 1, p19-28

Teevan, J. &Jones, W.2006.Personal Information Management.Communications of the ACM. Vol. 49 Issue 1, p40-43

We can write this or a similar paper for you! Simply fill the order form!