Enter The Assignment Details
Organization Culture Homework Help
Consumer Behaviour Homework Help
Retail Management Homework Help
Product Management Homework Help
Health Management Homework Help
Hospitality Management Homework Help
Business Management Ethics Homework
Accounting Homework Help
Statistics Homework Help
Economics Homework Help
Financial Assignment Help
Marketing Homework Help
HRM Homework Help
Humanities Homework Help
Strategc Management Homework Help
IT Management Homework Help
Java Homework help
C/C++ Homework Help
Dot Net Homework Help
Computer Homework Help
Data Structure Homework Help
Operating System Homework Help
IT Homework Help
Final Year Project Homework Help
CDR Report Help
Networking Homework Help
Make My Homework
Write My Homework
Do My Homework
Homework Help for USA
Writing Homework for College
Writing Homework for University
Buy Online Homework Help
Cheap Homework Writer
Plaigirm Free Homework Help
Complete My Homework For Me
Homework Writing Help
Are you looking for free homework samples of your subjects? We have 1000+ homework professionals who have written a lot papers. You can review our free homework samples before you proceed. We have free samples of MBA homework as well to deliver you. It’s written as per standard homework format styles as per college & university standard. You can get any free samples of management subject such as marketing homework examples, human resource management homework samples, accounting homework examples, Economics homework samples, Law homework examples and many more…
There are a lot of MBA subject where you need management paper samples or recourses as you need to see the assignment format and styles so that you could get proper knowledge of homework format as it’s necessary to complete academic paper as per college/university standard. There are a lot of referencing styles. For example: Harvard referencing, APA referencing, Chicago referencing and there are a lot of others which is needed by particular college/university. Here you can find homework samples, management homework sample, homework examples with proper bibliography and referencing styles. Get homework sample for first grade and example mba homework.
We have professional homework programmers who wrote free C/C++ samples to review to get confidence. Get free C/C++ samples right away. We have java homework samples, java programming samples, examples of java homework, C/C++ homework samples, examples of C/C++ homework samples, free programming homework samples, Dot net homework samples, C# homework samples, website design samples, final year project homework samples and many more… We assure that you will get 100% plagiarism free homework papers with free turnitin report. We do college and university homework mostly. We have top homework expert writers, homework professionals to support you here.
Java example and c/c++ example is available on our website for particular task. There are other programming samples like Dot Net programming samples, visual basic programming samples. It can be found on demand as it’s not necessary to put all samples on our website. We have put some homework programming samples where you can get some confidence in coding. You can also get java coding help by our java expert programmer where all coding error will be rectified. Not only above but also VB (visual basic), Oracle, Mysql, Object oriented design, Android, Web design, basics in python, Perl, ruby. Our company will do all these programming works.
Now a day we can see that medical papers are tough in doing homework. We do not do it with perfection due to time constraint. No1HomeworkHelp.Com is worlds No1 homework provider having experienced professionals. You can ask download medical homework, free nursing homework samples, health care free samples, examples of nursing homework examples of health care homeworknursing homework samples, health care free samples, examples of nursing homework examples of health care homework, writers here.
No1HomeworkHelp.Com is for all academic and non academic professionals who can get homework help in their case study of any subject. Our professional writers have written case study homework samples, examples of case study, case study styles. You can review and learn that how to start case study homework writing and get good grades in your academics. We are top case study homework provider around the world. We have done marketing homework case study, HRM homework case study, Paypal homework case study etc.
Case study is need by all academic or non academic professional in their research. Apart from main educational subject, there are other things need to be studied and that’s comes under case study. swot analysis and pestle is done for company audit. If you got case study by your college/university then you can get some idea by downloading our case study samples and see format of case study. There are different styles of case study for particular case. You can get case study help @ world’s number homework website around the world.
Hire our computer homework samples at ease now. No1HomeworkHelp.Com has experienced computer homework professionals to support in your academics. Our writers has done more than 40,000 papers and you can review to get started with us. Ask for computer homework samples, data structure homework samples, operating system samples, computer network homework samples, Data base management system samples on demand. We assure 100% plagiarism free all college and university homework. You no need to be worried about any computer homework as our professionals are ready to help you in all aspects.
There are many technical homework assignments such as Database management system assignment, Operating system assignment, Computer networking homework paper where we need clearance on some points. If you are not clear, it will be more complex in future. We are here with variety of technical home works free samples for you so that you can get some idea about how to write computer homework and technical homework as we are no.1homerwork website to provide assignment help, homework help, essay help, thesis/dissertation help, proposal, term paper, editors and proofreaders, expert for programming assignment, resume writing and many more…
No1HomewrokHelp.Com is having 1000+ expert writers, researchers, ex-professors and professionals. Once we get homework from client then we appoint appropriate professionals on your homework. We provide college homework help, university homework help management homework help, mba homework help, medical homework help, engineering homework help and many more… Contact to our live chat agent to discuss about your assignment homework to boost grade in your papers.
Prof. Kelly Champagne
Master Degree in MBA Department from Ohio State University.
Prof. James Stroud
Master Degree in Engineering Department from Clemson University.
Prof. Brian Redondo
Master Degree in Medical Department from Texas A&M University
Prof. Laura Pence
Master Degree in Computer Programming Department from Yale University.
Supply chain management has helped various companies in the present day world achieve long term sustenance and growth. IKEA has applied supply chain management in the different political, economic and physical environment around the globe. The company has successfully accomplished its global coordination and applied various R&D activates to achieve the efficient production system and deal with the concept of lead time and time compression. Hence efforts are made to accomplish various corporate goals and customers delivered cost effective outcomes.
1. Introduction to the concept of Supply Chain Management (SCM):
2. Introducing IKEA:
3. Difference in supply chain environment:
A. Political Environment:
B. Economic Environment:
C. Physical Environment:
4. Managing coordination across the globe:
5. Importance of lead time and time compression in IKEA:
6. R&D investments made by IKEA:
A. Efficient production and physical distribution system:
B. Developing innovative designs:
C. Reducing carbon imprints:
D. Final outcome:
7. Supply chain risks and associated mitigation strategy:
A. Supply chain Risks:
B. Mitigation strategy:
8. Advanced technological inputs for competitive advantage:
9. Critical evaluation of supply chain:
10. Conclusion:
10. Bibliography
SCM or Supply Chain Management is a term used for the effective and efficient management of flow of goods such that various actions and steps could bring out the desired level of outcome. This way it involves the efficient movement of the goods and services such that the loss in transit is avoided and on time delivery of the consignment takes place. Along with that it takes into consideration the storage of raw material and inventory management of finished good such that the cost of operation remains low. The outcome of SCM is therefore a highly integrated network of movement of goods and material with careful application of various supply chain activities with the objective of meeting cost effective outcome without affecting quality. The present day businesses applies SCM to achieve value added flow of goods and services in the supply chain achieving strategic coordination in the business process(Cagno et al., 2011).
IKEA is a multinational ready to assemble furniture selling company. The company was established in year 1943 in Sweden and since then has been delivering quality outcome and low cost furniture goods to the customers. At present the company has its business developed in Europe, Asia, North America, Africa, Atlantic and even Oceanic countries. The main feature of the company is that it produces ready to assemble furniture that can be assembled easily by the customers. Thus efforts are made to save huge chunk of money that could have been spent on inventory management. Also the travelling expenditure and other taxes that could have been levied on the final good are saved. This savings is passed on to the customers, who get the cost effective but high quality products at the door step. The customer is expected to assemble the product easily with the guidelines delivered along with the ready to assemble furniture. This way through self-efforts the customers could save lot of money and assemble the high quality IKEA furniture at their homes and offices.IKEA till March 2016 had nearly 384 stores in about 48 countries around the globe. The company has list of 12, 0000 products to offer to its customers. On an estimate, the company’s website is visited by nearly 470 million visitors in a year. This way the company has become a largest furniture selling company in the global market(Davies, 2015).
The supply chain environment in different region has resulted in bringing out a list of strategic moves by IKEA to achieve its corporate goal, meet up to customer satisfaction and deliver the required pre-requisites related with legal, economic social needs to different regions. Therefore efforts are made for establishing relationship between different organizations under different political, economic and physical environment. The company has its offices in Asia, Europe, Africa and various other continents. Therefore the environment supply chain management on the basis of political, economic and physical environment can be done as follows.
The political environment in Europe is much safe than Asia and Africa. The countries in Europe observe stability of government, effective government bureaucracy and positive international relations. On the other hand, the similar characteristics are absent in Asia and completely unavailable in Africa. Therefore the company has developed its business with priorities in the countries offering conducive political environment so that its stores could operate safely and the customers can be offered value for service in tension free political environment. Also the business is preferred to be developed in such countries where the political and social well welcomes the business of the company. Because of this reason only the selected countries in Asia and Africa are observing the development of IKEA business. In Asia, IKEA has its business outlets in Japan, Singapore, South Korea and recently China in the Asian continent. In Africa, IKEA is present only in South Africa, Egypt and Morocco(Zhou et al., 2008).
The economic environment includes the structure and nature of the economy, economic condition and policies, global linkages and economic policy. These factors support the development and growth of the business. Since, the economic environment of the global countries is suffering from the depression stage since the inception of the global slowdown from year 2008. Due to this reason IKEA is developing its business in new economic boundaries. The developing countries of Asia are therefore the target regions of development. This is because of the reason that the global meltdown has hardly affected the Asian countries such as China, India and others. Therefore the company has already established its huge stores in China and planning to expand its area of operation in India soon. China has infect became the top business place for the company by contributing to 18% of the global sales. This way the company is making efficient decision in developing business in those countries that are observing lesser heat of economic slowdown.
The physical environment and its concerns are high in the European continent than in Asia and Africa. However concerns of safeguarding the physical environment is rising at a high pace in other continents as well. Therefore, IKEA has developed a global strategy meant to accomplish the safety of physical environment in all locations. The company has developed standards that help its business set up in various countries to meet the safety requirements for the physical environment. The supply chain environment differs from region to region as per the government regulations and societal interest. In the developed economies, the concerns for reducing carbon footprints are high as compared to the developing and underdeveloped economies. Due to this reason, IKEA has developed a uniform policy for developing a strategic supply chain environment in all regions that applies Green Supply Chain Management. That is efforts are made in every step business process to retrieve the high quality, cost effective and lesser polluting output(Rao, 2002).
IKEA has been managing efficiently its close coordination across the globe including any offshoring decisions and location specific advantages. To deal with the offshoring decisions, the company has developed a matrix system of hierarchy in the organization is developed. That is the employees in the different warehouses and retails stores around the globe are actually directed to work under the combination of functional and product hierarchy structure. That is through matrix structure the different departments are made but integrated such that the higher authorities assigned could control the course of business and take effective decision make. Also the reporting is made compulsory at regular intervals applying the online system through which the controls over the expanded business are applied. This way the offshoring business is also kept under tight control by applying the various procedures and control applications so that the business could continue to meet its quality standards and effective outcomes such that the customer satisfaction is achieved and the organization goals are met. The location specific advantages are also taken by the company by developing a head center in different countries through which the controls to other sales offices could be applied. This way an integrated coordination between different business outlets is made through its head centers developed around the globe so that the smaller functioning offices could be controlled. Not only that the process of transferring goods applies green supply chain management so that the global standards related to conserving the environment are also met and the local level issues in different countries could be avoided. This process includes cleaner sourcing and manufacture, followed lower transport emissions. Efforts are also made to apply cleaner warehouse operations and consolidate safe and steady movement such that the customers can be delivered with the high quality goods and services at their doorstep at cost effective prices. This process can be depicted as follows.
IKEA has taken huge attempts towards the accomplishment of global lead time management. That is the company has applied JIT or Just in Time System. That is through this system in application the company makes different components during the manufacturing process but do not assemble them at all. This way the assembling is left for the customers to follow. This helps the company in keeping lesser inventory and supplies the customers with the high quality products at no lead time gap. The procurement, manufacturing and delivery therefore follow an effective method of forecasting and inventory management. This can be displayed as follows.
Also the efforts are made to achieve cycle time compression in the supply chain process. That is the identification of the customer trend is made and the according inventory level is maintained so that the customer can be delivered with the desired good just in time. Also the lean production system is followed to avoid wastage of material during the production process. The process followed for supply chain time compression include the followings.
The distinctive R&D investments have helped IKEA in increasing its revenues. These R&D measures include the followings.
IKEA follows efficient production system. The company follows lean production system through which wastages are avoided. Also the low cost of retaining raw material is given due consideration. Not only the manufacturing but the physical distribution transfer system is also made cost effective through which the customers are delivered high quality products in a easy to assemble form so that the cost of transfers is reduced(Besner & Hobb, 2004).
IKEA makes consistent efforts in developing innovative designs that could match the needs of present day customers. Also the effective joint space is developed so that the customers could easily assemble and build the furniture at low cost. The latest designs and colors add to the customers interests which bring out more demand company products. Also attempts are made to keep costs low so that the IKEA products could come under the budget of many people and the quality is still maintained.
To reduce its carbon footprints the company has invested nearly 1.5billion Euro in renewable energy developments in the business place. This way the company has opted to renewable energy outcome for almost 34% of its total consumption. In year 2012, the company deployed nearly 250,000 solar panels in its retail stores with the view to source renewable energy for lighting up its warehouses and supports the customer purchase through well lighting. Including that the company has also deployed 126 wind turbines in six countries where the power generation is now supported by renewable sources. The physical distribution system is also developed such that the delivery is made taking in view the effective fuel consumption followed by the personal physical distribution modes. This way the company has been applying an equitable and effective supply chain management in different region by taking personal interest in safeguarding the environment. Therefore the global supply chain is considered by IKEA as a direct ownership of production and the distribution process such that the effective use of networking system with the global partners help in establishing business in a safe environment(Rao, 2002). These efforts can be demonstrated as follows.
All these efforts have helped IKEA to increase its profit margins by manifolds. The one time investment in solar panels and windmills has resulted in giving the company returns through huge savings. The net profit of the company reached 3.5 billion Euros in year 2015 which was actually a 5.5% increase as compared to last year. The UK sales of the company rose by 11.3% which amounted up to 1.1 billion pounds. Also the number of online customers has increased by manifolds, which supported the increase in sales of up to 31.9 billion Euros. Thus the energy saving technology and deployment of renewable energy production system the company has been able to safeguard huge profits even when the rest of the world economy is suffering from the heat of global slowdown (Davies, 2015).
The supply chain risks and associated mitigation strategy can be stated as below.
There are different kinds of supply chain risks that involves in the IKEA business. These include the operational risks as well as the demand risks. These risks may include the following factors:
1. The Economic factors include demand shocks, price volatility, border delays, currency fluctuations and energy shortages.
2. The Geopolitical factors include political instability, trade restrictions, terrorism, corruption, theft, illicit trade and piracy.
3. The environmental risks include natural disaster, extreme weather and pandemic.
4. The technological risks include ICT disruptions and infrastructure failures.
The risk mitigation strategy that IKEA has deployed to deal with various kinds of risks includes the followings.
1. The company already has developed a contingency plan to deal with the currency fluctuations as the trade experts are deployed in different countries to make the transfers at the best time.
2. The company has opted to solar and wind sources for energy production to deal with the energy shortages issues in various developing and underdeveloped nations.
3. The company has effective strategic marketing planning system in operation through which the demand shocks are identified well in advance and the sale and transfer of goods from one outlet to other is made accordingly.
4. The company has developed an integrated supply chain system through which the border delays and trade restrictions are easily dealt with.
5. The company has developed online control system to deal with the corruption, theft, illicit trade and piracy system in different locations around the globe.(Wu et al., 2006)
IKEA has developed big data analytics system and internet controlling system in its business. Through big data the company is keeping records of sales and customers feedbacks to improve its output and place new innovative products as per customer demands. This way the company is trying to meet the different demands of the customers in different regions. Efforts are made to frame an effective business policy so that the customer trend can be understood and the placement of the new products and services can be made accordingly.
The development of internet usage for reporting has also been made essential by the company so that the managerial control over the expanded business can be made effectively. This way the company has applied proper procedures of control in its different business places around the globe so that the proper administration of the business process can be followed. Also the customer’s queries, complaints, suggestions and feedback can be considered wisely and applied accordingly.
The various competitive advantages that IKEA has accomplished through these applications include the followings.
1 The company has achieved economies of scale which has helped in decreasing the cost of operation and accomplishing high standard outcomes.
2 The company has achieved economies of scale which has helped in decreasing the cost of operation and accomplishing high standard outcomes.
3 The company has rooted history and therefore been following the mission and objective statement in its future business process which includes offering cost effective outcomes to the business and low cost products to the customers.
4 The company has applied all its social responsibilities by participating in various social welfare projects and financing the noble cause in different regions.
5 The company has developed research and development programs that are meant to support the business growth in the long run.(Cagno et al., 2011)
Critics are of the view that the company is not following the green supply management system in various underdeveloped nations of Asia and Africa. This is because of the reason that the local governments in these regions are corrupt and therefore do not worries about the application of the green supply chain management process. Critics are also of the view that the concept of easy to assemble is a complex process which may not be followed by every customer in a comfortable manner. Therefore the customers may find it difficult to manage the assembling of the company furniture at various times. Therefore the need is to develop more easy and lesser complicated assembling system so that the products could be assembled. In addition some critics wants that the company should offered assembling option by experts so that the customers who are willing to pay extra could take the benefit of assembling by experts. Critics are also of the view that the company has become the cause of global cutting of trees. This way it is causing deforestation. The company has been convicted of cutting of massive trees in South East Asian countries. Due to corrupt government the company was able to secure huge forest land for wood. This attempt resulted in effecting the ecological balance in the region. Therefore the company has become the cause of deforestation around the world(Fleming & Koppelman, 2006).
IKEA has applied effective supply chain management process in its business which is spread around the globe. This includes the concentration on cost effective inputs through effective procurement process, lean production system to avoid wastage and ready to assemble goods transfers using green supply chain management process. These way efforts are made to apply effective supply chain process so that the benefit could be shared with the customers, society and the company as well.
Besner, C. & Hobb, B., 2004. An empirical investigation of project management practice: In reality what tools do practitioners use? In D.P. Slevin, D.I. Cleland & J.K. Pinto, eds. Innovations: Project Management Research. Newton Square: Project Management Institute. pp.337-51. Cagno, E., Guido, M.J.L., Perotti, S. & Zorzini, M., 2011. The impact of green supply chain practices on company performance: The case of 3PLs. Lancaster University Management School Working Paper., 1(1), pp.1-31.
Davies, R., 2015. Tack! Ikea profits grow as empire expands in new territories. [Online] Available at: https://www.theguardian.com/business/2015/dec/10/ikea-profits-grow-empire-expands-new-territories
[Accessed 21 Augustus 2016].
Fleming, Q.W. & Koppelman, J.M., 2006. Earned Value Project Management. 3rd ed. Newton Square: Project Management Institute.
Hillson, D., 2009. Managing Risk in Projects (Fundamentals of Project Management). Gower.
Large, R.O. & Thomson, C.G., 2011. Drivers of Green Supply Chain Management Performance: Evidence from Germany. Journal of Purchasing and Supply Management., 17(1), pp.176-84.
Rao, P., 2002. Greening the supply chain: A new initiative in South East Asia. International Journal of Operations and Production Management., 22(6), pp.632-55.
Wu, F., Yeniyurt, S., Kim, D. & Cavusgil, S.T., 2006. The impact of information technology on supply chain capabilities and firm performance: A resource-based view. Industrial Marketing Management, 35, pp.493-504.
Zhou, Q., Sarkis, J. & Lai, K., 2008. Green Supply Chain Management implications for "Closing the loop". Transportation Research Part E: Logistics and Transportation Review, 44(1), pp.1-18.
1. Introduction
2. Discussion
3. Difference in supply chain environment
4. Industry Analysis and Macroeconomics
5. Financial Analysis
A. Liquidity Position of Tesco Company
B. Stock Valuation
C. Stock Chart of Ten Years
D. Cost of Debt
6. Conclusion
7. References
Tesco Company has incredible growth pattern, and it is having any effect in its methodologies in the same manner as compared to the competitors. Tesco Company conveyed stable financial performance and expanded its net sales by 5.7percent to $412.9 billion in 2014(Baur & Lucey, 2010). The operating revenue or income of Tesco Company is grown by 4 percent to $25.7 billion. The acquiring every share of Tesco Company is extended from $5.28 to $5.57 from going before year (Bond, Elston, Mairesse & Mulkay, 2003), Tesco Company included 51.9 million assets and other 1180 additional units that included the acuuistition in Egypt and United Arab Emirates. Tesco Company conveyed $10.5 billion uncommon comes back to the shareholders by providing for them stock profits. Tesco Company is directing its business operations deliberately and making excellent business progress. This study is undertaken to determine if Tesco Company is worth investing with. Tesco Company has confidence in its undertaking since it is inputting all its assets into lower costs and making genuine changes in promoting and operations. Positive sales additions are giving exceptional yields on ventures and values. Tesco Company has never centered value authority as Tesco Company puts stock in serving instead of making gigantic measure of benefits by increasing its costs of the goods so does that of the services. Tesco Company trusts in expense viability, and it launched to put $2 million in costs by costs decreases and making profit improvements amid the following heading up years. Tesco Company is accomplishing remarkable sales targets and attained to $105 billion sales. Tesco Company is among central three world biggest retailers. Tesco Company is centering to expand to other nations such as Brazil so does China particularly because Tesco Company is not attaining to high benefit from the above countries. Tesco Company has started "Controlled by Tesco Company" as an activity to fortify the benefit and reducing the additional costs. It is clear that the company has substantiated itself as best situated worldwide exchanging retail locations. Therefore, this paper will offer a clear financial advice if it’s viable for Global Equities to invest with Tesco Company. Financial and Economic Analysis will discussed in the report to deduce the viability of investment.
Tesco Company Stores, Inc is operating different retails stores in diverse configurations as far and wide as possible. Tesco Company's rationality of valuing is "Consistently low evaluating –EDLP"(Bryson & Freeman, 2010). Tesco Company is operating retail locations in distinctive organizations around the world, it works attire stores, distribution center clubs, retail locations, restaurants, markets, markup stores, supercenters and neighborhood markets. Tesco Company cash value five systems are making it a worldwide pioneer these are creating individuals, driving the profit circle reinvigorating client-centered society, driving on sociologies and winning in Global e-business.
There are various competitors that can be considered are giving Tesco Company a great deal of competition in the UK. One of them is ALCO stores while the other is Walmart. Others are like Costco Corporation and Big Lots Company. The profitability of Tesco Company is expanded from $20000 in 1963 to $15.6 billion in 2012. Profit for Investments – ROI is a standout amongst the most critical metric to impart it to the speculators so that financial specialist may have an agreeable thought regarding how successfully Tesco Company is overseeing and using its present and non-present Assets. The rate of return developed to 19.2percent from 18.6percent in the financial year 2012. It is evident that the ROI of Tesco Company albeit expanded. However, this incremental have been offset because of acquisitions. It is noted that the ROI for Tesco Company is non-GAAP that accounts for 18.8 percent (Harris, Siegel & Wright, 2005) and 19.5 percent that were noted on 2011. Profit for assets is 8.9percent, which was 9.11 percent in the year of 2011.
Trend analysis: It is evident that the analysis of the company shows how profitable Tesco Company. This covers the analysis done between 2006 and 2013. The analysis further indicates that the company will possible perform better if all the other factors are left constant by 2015.
The Dividend Yield for the company is noted to be 2. This is a positive indication that the company is expected to expand in the near future. This however is considered from an investment perspective and not social or economic perspective. The cost to income proportion is 7.74 which is just about equal to the business routine it demonstrates that Tesco Company has adequate rate of liquidity to keep up and get out its financial assets and the consecutive stream of cash is reliable.
The financial ratios of the Tesco Company store show that the organization has comprehensive financial standpoint for the company. The Gross net income rate is expanding from 23.2 to 24.9. The Operating Income of Tesco Company is growing from $15025 to $26558 over the 19 years span. The operating margin rate is kept up from which 5.9. This is the greatest viewpoints that despite variable financial variables organization is keeping up the OP margin. The financials reliability of Tesco Company from the financial to 2013 demonstrated that the organization is keeping up great financial stand, however, transitory concerns are there yet majorly organization has substantial Financial situation in nearly to industrial average.
The financial leverage (2004- 2013) of Tesco Company moved from 2.41 to 2.71which demonstrates that the hazard of organization is kept up and Tesco Company is using the obtained stores (from banks) and keeping up high Financial apex.
The operating cash flow is expanding. It is evident that the company has been using a long-haul to ascertain the financial position of the company. The free cash streams to sales rate proportion is 2.72 in 2013 which shows that organization is making improvement while the cash flow also creats each and every unit sale that increasing the financial value of Tesco Company.
The liquidity position of Tesco Company demonstrates that organization has insufficient cash that is able to sustain the present assets and CL also denoted as (current liabilities) are above the CA ( Current Assets). It can be considered that the current proportion pattern of Tesco Company is showing that the liquidity standpoint of Tesco Company growing punier which may get to be dangerous in future. This is a positive indication that the company has the ability to repay its debts hence no need for Debt financing. Therefore, this shows that Tesco Company is a company to invest in as less risk are observant. The average value of Tesco Company is more than the assets that demonstrate its sustainability and strength in the market hence a credible company to invest with. This also indicates that the company is long-term organization that will expand in the future hence this will increase its customer hence profit maximization. The day's sales extraordinarily is five at most extreme which implies that organization's stock is not staying on the track and at the time of five days the share of the stock occur. It shows that clients are very fulfilled by the Tesco Company items, and they are occupied with getting Tesco Company's item all the more nearly to alternate contenders. The cash change cycle of Tesco Company is operating productively and successfully since 2004 to 2013 as indicated the financial analysis. The stock is not staying for a long time of time, and the business occur inside less time to give the space for gaining cash and cash equivalents. The receivable turnover shows that in the wake of making credit sales organization recuperates its utilized subsidies inside 153.89 at first at 2004 yet by 2013; Tesco Company's receivable turnover has been decreased to 79.96. It is one of the momentous accomplishment the extent that the liquidity of Tesco Company is concerned it shows that the organization is anticipating keep up its liquidity positions.
The average measure for evaluating the shares value totality, it is fitting to comprehend the level of cost to winning rate in the analysis with contenders. For correlation Tesco Company, two contenders TARGET and COSTCO cost to acquiring proportion are ascertained and indicated in the chart demonstrating that Tesco Company is falling behind from both of its rivals and the business as entirety. This is the evidence that Tesco Company is estimate is inferior in correlation with competitors. The analysis is particular on the premise of how a financial specialist would respond in the wake of the review its cost to gaining rate. For discovering the intrinsic value that is aligned to the share, this is vital in figuring out the intrinsic value of the share. In order to determine the intrinsic value the Dividend Discount Model us used. Multistage model is utilized in evaluating Tesco Company stock.
In the wake of determining the growth rate that ought to be paid. Capital Asset evaluating model was utilized for discovering the markdown rate and it is taken 0.26 percent as Tesco Company low beta does not deliver entirely to the business sector hazard that is confronted by the speculator. Be that as it may, markdown rate is still much lower than normal however it in any event better demonstrate the truth to a certain rate. It can be noted that the intrinsic value of Tesco Company is 95.5 dollars, but that of the current market is expected to 73.5 dollars.
The stocks ten yrs. Outline demonstrates that organization's offer value is in expanding pattern on the contrary is is noted that there is a decrease of time between 2006 to 2008 yet afterwords the value of stock increments and in the wake of registering the inborn value of the offer it is viewed as that the tender quality will stay predictable, and it will become further. Financial specialist must put assets into the supplies of Tesco Company.
It is clear that the dividend per share denoted to Tesco Company is expanding and it is expcted that its future is promising since Tesco Company has done different acquisitions that is braches are there to be contributing further while the income per share of the Tesco Company is in expanding pattern and financial specialists have better choice to put assets into a small margin that has less risk in the market.Capital Structure
For ascertaining the cost of debt, powerful investment rates for long-term debt and compelling duty rate is utilized for discovering the weighted standard expense of cost of debt. The Tesco Company yearly report is noted to have valuation rates and investment rates thus the expense of COB (cost of debt) is computed by the equation: KD=I (1-CT).
Tesco Company Discounted Cash Flow Evaluation
Tesco is a good company to invest with. Tesco Company Stores, Inc. (Tesco Company) is operating different retails stores in diverse configurations as far and wide as possible. Tesco Company's logic of valuing is "Consistently low evaluating –EDLP". Tesco Company is running in three separate business sections, Tesco Company International, The Tesco and Tesco Company U.K. amid the financial year 2012, Tesco Company U.K. portion represented 60 percent of its net sales in operating retail locations in 50 conditions of the U.K. Tesco Company Global is mostly creating income from 26 nations. Tesco section is comprising of stockroom enrollment organizations operating in 47 districts in the U.K and Puerto Rico. For this reason, it is valued to consider investing in this company has it has a promising future not only in profit maximization but also is expansion. Due to changes in technology Tesco Company is providing to be one of the best companies with a better online-supermarket hence the call for taking the risk to invest in the firm as it has been the customer needs already.
Baur, D. G., & Lucey, B. M. (2010). Is gold a hedge or a safe haven? An analysis of stocks, bonds, and gold. Financial Review, 45(2), 217-229.
Bond, S., Elston, J. A., Mairesse, J., & Mulkay, B. (2003). Financial factors and investment in Belgium, France, Germany, and the United Kingdom: A comparison using company panel data. Review of economics and statistics,85(1), 153-165.
Bryson, A., & Freeman, R. B. (2010). How does shared capitalism affect economic performance in the United Kingdom?. In Shared capitalism at work: Employee ownership, profit and gain sharing and broad-based stock options(pp. 201-224). University of Chicago Press. Forbes Financial (2010), Forbes.com LLC 2010 Web. 17 Oct, retrieved from
http://finapps.forbes.com/finapps/jsp/finance/compinfo/CIAtAGlance.jsp?tkr=wmt&t ab=searchtabquotesdark
Harris, R., Siegel, D. S., & Wright, M. (2005). Assessing the impact of management buyouts on economic efficiency: Plant-level evidence from the United Kingdom. Review of Economics and Statistics, 87(1), 148-153. Joyce, M., Lasaosa, A., Stevens, I., & Tong, M. (2011). The financial market impact of quantitative easing in the United Kingdom. International Journal of Central Banking, 7(3), 113-161.
Reinhart, C. M., & Rogoff, K. S. (2010). From financial crash to debt crisis (No. w15795). National Bureau of Economic Research. Revsine, L., Collins, D. W., Johnson, W. B., Collins, D. W., & Johnson, W. B. (2005). Financial reporting and analysis. New York, NY: Pearson/Prentice Hall.
Shaoul, J. (2005). A critical financial analysis of the Private Finance Initiative: selecting a financing method or allocating economic wealth?. Critical Perspectives on Accounting, 16(4), 441-471. Shaoul, J., Stafford, A., & Stapleton, P. (2006). Highway robbery? A financial analysis of design, build, finance and operate (DBFO) in UK roads. Transport Reviews, 26(3), 257-274.
The Reserve Bank of Australia is responsible for formulating and implementing monetary policy. Monetary policy decisions involve setting the interest rate on overnight loans in the money market. Other interest rates in the economy are influenced by this interest rate to varying degrees, so that the behaviour of borrowers and lenders in the financial markets is affected by monetary policy (Bagnall, Chong and Smith, 2011).
The Monetary Policy Decision Process The plan of financial strategy is the essential obligation of the Reserve Bank Board. The Board ordinarily meets eleven times every year, on the primary Tuesday of the month aside from in January. Subsequently, the dates of gatherings are surely understood ahead of time. For every meeting, the Bank's staff set up an itemized record of advancements in the Australian and global economies, and in household and worldwide financial markets. The papers contain a proposal for the arrangement choice. Ranking staff go to the meeting and give presentations. Financial approach choices by the Reserve Bank Board are conveyed openly not long after the finish of the meeting.
The Implementation of Monetary Policy From every day, the Bank's Domestic Markets Department has the undertaking of keeping up conditions in the currency advertise in order to keep the cash rate at or almost a working target chose by the Board. The cash rate is the rate creditd on overnight credits between financial go-betweens. It affects other interest rates and structures the base on which the structure of interest rates in the economy is constructed. The cozy relationship between the cash rate and other currency market interest rates can be found in Graph 2. Changes in money related arrangement mean an adjustment in the working focus for the cash rate, and consequently a movement in the interest rate structure winning in the financial framework.
The Reserve Bank Board's clarifications of its fiscal arrangement choices are declared in a media discredit, which is appropriated through electronic news benefits and distributed on the Reserve Bank's site at 2.30 pm upon the arrival of every Board meeting. Any change to the cash rate target will produce results from the next day.
If the Reserve Bank supplies more trade settlement funds than the business banks wish to hold, the banks will attempt to shed funds by loaning more in the cash market, bringing about a propensity for the cash rate to fall. On the other hand, if the Reserve Bank supplies not as much as banks wish to hold, they will react by attempting to get more in the cash business sector to develop their possessions of trade settlement funds; simultaneously, they will offer up the cash rate. The real level of the cash rate, which results from the Reserve Bank's business sector operations, and the objective rate are appeared in Graph 3.
The Transmission of Monetary Policy to the Economy Developments in the cash rate are immediately gone through to other capital business sector interest rates, for example, currency market rates and security yields. These interest rates are additionally impacted by the danger resistance of speculators and inclinations for holding funds in a structure that are promptly redeemable. Thus, improvements in total interest, in conjunction with advancements in total supply, impact the level of inflation in the economy. Inflation is likewise impacted by the impact that adjustments in interest rates have on imported merchandise costs, by means of the conversion scale, and through their impact on inflation desires all the more for the most part in the economy.
The routes in which financial arrangement influences the economy are a long way from mechanical in their operation. In total, be that as it may, a general negative relationship between interest rates and both interest development and expansion is clear (Graph 5). Generous ascents in interest rates, intended to limit inflationary blasts, have been trailed by compressions sought after and a decrease in swelling. Alternately, generous interest rate diminishments have been trailed by times of essentially quicker development. In reacting to recurrent improvements and inflationary weights, financial approach has affected total interest and swelling in the economy (Cochran, 2015).
The Relationship between Monetary Policy and Debt Management Sound financial arrangement requires that the Government completely fund any financial plan deficiency by issues of securities to the private part at business sector interest rates, and not obtain from the central bank. Numerous nations have enactment to convey this result, however in Australia it is viably accomplished by understanding between the Treasury and the Reserve Bank. This course of action implies that there is detachment between money related strategy and the Government's obligation administration, with the Treasury specifically in credit of the last mentioned and the Reserve Bank in credit of the previous. The Bank subscribes to tenders when essential for its own portfolio administration purposes and gives registry administrations, however since October 2006 the Bank no more goes about as specialist for the Australian Government in leading tenders of Australian Government Securities. It is impractical to guarantee that the Australian Government's requirement for funds are precisely coordinated step by step by issues of securities to the business sector. First off, issues for the most part happen just week by week. To beat this befuddle between every day spending and financing, the Treasury keeps cash equalizations with the Reserve Bank that go about as a cushion. The Reserve Bank additionally gives an overdraft office to the Government that is utilized to cover periods when a surprisingly huge befuddle debilitates cash equalizations. The understanding between the Treasury and the Reserve Bank places strict controls on access to the overdraft office, and additionally forcing a business sector related interest rate on the office. The overdraft is utilized occasionally, for the most part to cover unanticipated setbacks in cash adjusts, and is stifled at the following Treasury Note delicate. The Relationship between the Bank and the Government The Reserve Bank Board settles on choices about interest rates autonomously of the political procedure that is, it doesn't acknowledge direction from the Government of the day on interest rates. This standard of central bank autonomy in the operation of financial strategy, in quest for acknowledged objectives, is the worldwide standard. It avoids control of interest rates for political finishes, and keeps money related arrangement concentrated on its long haul objectives. Responsibility for Monetary Policy The Reserve Bank's conduct of fiscal strategy is clarified openly through a few channels. The Bank makes an open declaration of any approach choice, giving point by point thinking for it. Minutes of the fiscal approach gatherings of the Reserve Bank Board are distributed two weeks after every meeting. It distributes four Statements on Monetary Policy every year, which contain an itemized investigation of the economy and financial markets, and a record of the contemplations for the arrangement position received by the Bank. The Governor shows up twice every year prior to the House of Representatives Standing Committee on Economics, to answer questions on the Bank's conduct of strategy
For quite a long time, experts have anticipated the end of physical cash as an exchange medium. Such an exchange medium has been alluded to as a "cashless society." Substituted in the spot of cash would be an electronic installment framework, in some structure. A few examiners take a gander at such a prospect hopefully, trusting that a cashless society would expand the effectiveness of the economy. Still, others, view such a prospect cynically accepting, to the point that it would subject the most private subtle elements of our lives to examination and distribution. Whatever the result, such a radical change will without a doubt substantially affect the credit card handling industry (Forgione, 2016).
Consideration regarding the likelihood of a cashless society has expanded and increased in the course of recent years. The individuals who are energy over the possibility of killing cash as an exchange medium trust that the quick advantages would be significant and fundamental. Burglary of cash would get to be incomprehensible. Bank burglaries and cash register thefts may stop to happen. Assaults on retailers, cab drivers, and cashiers could end. Urban roads might just get to be more secure. Security expenses and protection rates may conceivably fall. Property estimations could exceptionally well ascent. The offer of unlawful medications, alongside related brutal wrongdoing could reduce. Healing center crisis rooms may turn out to be less swarmed. A change from cash to recorded electronic cash may be joined by a stream of beforehand unpaid salary credit incomes in the billions of dollars. Accordingly, wage credit rates could be brought down or the national obligation decreased.
Not all advocates are as euphoric about the advantages of a cashless society. Be that as it may, paying little heed to the points of interest, or inconveniences, a few spectators surmise that it may just be a short time before the cashless society turns into a reality. Numerous depict the disposal of coins and cash at any point in the near future as a myth. Whatever the feedback, the disposal of cash exchanges is quick turning out to be actually attainable. There need not be a unitary government-run electronic financial framework for cash to vanish. Numerous electronic and other non-cash installments means are as of now being used. Mastercards, credit cards, prepayment cards, and brilliant cards are set up segments of a non-cash exchange framework. Checks, obviously, are a non-cash installment implies likewise, yet don't fit either into the electronic cashless society envisioned by its advocates.
Credit cards are in such broad utilize in order to barely require exchange. The credit card business has been described by some as being saturated. Not entirely an installment implies, but rather a guarantee of conceded installment, credit cards in any case can substitute for the utilization of cash. Check cards have been accessible for quite a long time. They speak to a genuine installment implies subsequent to the measure of the buy is taken from a record having a place with the client. Regardless of there being a large number of check cards being used, whether the relative volume of buys made with them surpasses those of cash is far from being obviously true. Utilization of platinum cards appears to be liable to develop consistently. Numerous were hesitant to issue them in the past as a result of specialized issues and the apparent trouble of making them gainful. In any case, both Visa and MasterCard dispatched crusades to acquire broad utilization of their platinum cards. These battles envelop attempting to join more banks as backers and teaching buyers in their utilization. They have likewise been looking for extra outlets which have not generally assumed praise cards, including taxi and fast food outlets. Indeed, even welfare beneficiaries are utilizing a type of check cards. ATMs have encouraged the utilization of cash by making cash effectively accessible whenever, pretty much anyplace. Be that as it may, ATMs which administer "scrip" spendable at the retailer in which the ATM is found have been brought into the commercial center, yet have not turned out to be effective in their organization. Such script machines ought to speak to retailers as another method for making it simple for clients to burn through cash while being much less expensive to have nearby than an ATM. They are additionally less appealing to hoodlums than cash ATMs.
Prepayment cards store esteem on attractive, electronic, or optical media, frequently in appearance much like a credit card. Whenever utilized, the tolerant gadget eradicates the best possible bit of the worth. Prepayment cards have had generous utilize abroad, and their utilization in the United States has become significantly in the course of recent years. Shrewd cards are one might say an expansion of the prepayment cards. Like the prepayment cards, they can store esteem for future use, however they likewise incorporate an inward microchip based preparing ability. Savvy cards have been minimal utilized as a part of the United States, yet are regular in Europe. Financial obstacles may restrain the advancement of option frameworks which are in fact achievable. The expense of paper taking care of and getting approvals going with the acknowledgment of credit and credit cards has been a boundary previously, particularly for moderate size exchanges. The improvement of minimal effort purpose of offer terminals has been disposing of the requirement for this paper taking care of since it makes conceivable the only electronic treatment of the exchange. This has brought about a generous lessening in the expense of a normal credit approval in the course of recent years. The expense of taking care of exchanges electronically is drawing closer the level that makes even moderately little buys with electronic installment implies attainable. Such non-paper trades can now have a cost advantage over checks (Cochran, M., 2015.).
Absence of shopper acknowledgment has obstructed the spread of check cards and may likewise moderate further advances in electronic installments implies. The issue may mostly have been the name "credit card." To battle this, such cards are regularly alluded to as cash or check cards. Another snag is that for some purchasers there is no net point of interest to platinum cards. There is a component of comfort over conveying cash or even a checkbook. Be that as it may, the client loses the conceded installment highlight innate in Mastercards and expect more noteworthy potential obligation if the card is lost or stolen. Considering these variables, it may be reasonable to say that the individuals who pay off their Visa adjusts each month will by and large be in an ideal situation with one of the some no-expense Mastercards now accessible than with a platinum card. Numerous buyers are prone to achieve the same conclusion, however the individuals who don't fit the bill for credit cards may discover platinum cards engaging. It creates the impression that shoppers still utilize cash more than some other installment implies for individual uses.
It is not simply street pharmacists or different lawbreakers who are worried with the protection managed with cash exchanges. Others are stressed over the point by point record of their exchanges left by non-cash exchanges. Non-cash exchanges considerably risk protection, which is lost with the current electronic credit, credit and keen cards. For instance, it give the open door for outsiders to amass and swap arrangement of data proving various things that most persons would care to stay private, including, however not restricted to, what recordings or recreations a man rents at the video store, what books are acquired in book shops or what is generally obtained at any store or on the web. Further, pessimists say they don't trust lawmakers who tell everybody that by snooping in traders' databases they will succeed in ensuring the security of customers. Rather, they trust that the government officials will utilize the information for their own political purposes – gathering credits, endeavoring to decrease national social insurance costs, getting re-chose, and so forth. Trepidation of being followed in subtle element is not baseless. For instance, card affiliations give benefits that permit banks to all the more decisively investigate cardholders' purchasing examples and target deals and advancements to clients. Prepayment cards are for the most part mysterious being used. Be that as it may, there is no mechanical boundary to the guarantor encoding data about the buyer on the card and following its utilization. Moreover, frameworks have purpose of-utilization gadgets organized to PCs to spot abuse of the cards. It is not hard to envision the work on growing.
Radicals trust that a "cashless society" is one stage more like a world tyranny. Another fiscal framework would be actualized under such a general public along these lines rendering existing investment funds useless. Still different radicals trust that a cashless society would be confirmation of the Anti-Christ where everybody would be compelled to have a blemish on their right hand or brow to purchase or offer. They cite the Bible where it expresses that the sign of the Beast or Antichrist will trick numerous religions by leading supernatural occurrences and promising peace. They expect that the "Brute" will break his guarantee of peace, run the world and power everybody to love him by tolerating the sinister imprint keeping in mind the end goal to purchase and offer products. The disposal of physical cash from our economy is as of now attainable from an absolutely mechanical viewpoint. The monetary boundaries are likewise vanishing, however a generous extra interest in hardware and cards would be expected to allow the buy of little ticket things. Some system to allow simple exchange starting with one individual then onto the next would likewise must be given. There don't appear to be sufficient motivating forces to affect any element or gathering of elements to make this considerable interest in the close term. Hence, any move to a cashless society is prone to be slow.
A significantly more noteworthy snag to the end of physical cash is customer resistance. Notwithstanding the accessibility of an assortment of non-cash installment implies, there has not been a considerable decrease in the relative utilization of cash over the previous decade. Indeed, even among those purchasers who are not worried over the security suggestions, straightforward dormancy requires a more prominent impetus for change than has so far been obvious. The cashless society, then, is by all accounts a far removed vision. It is just a couple of years nearer to satisfaction than when initially elucidated numerous years back.
Bagnall, J., Chong, S. and Smith, K., 2011. Strategic review of innovation in the payments system: results of the Reserve Bank of Australia’s 2010 Consumer Payments Use Study. Cochran, M., 2015. Conventional and alternative transport fuels in Australia. Energy News, 33(4), p.4.
Forgione, P., 2016. Cashless welfare trial begins in Ceduna. Green Left Weekly, (1087), p.10. Lee, T.J. and Kim, H.K., 2014. Popularity and Risks of Electronic Gaming Machines (EGMS) for Gamblers: The Case of Australia. Tourism Analysis, 19(2), pp.233-240. Norman, D. and Richards, A., 2010. Modelling inflation in Australia (No. rdp2010-03). Reserve Bank of Australia.
Thuo, C.N., 2014. Influence of Mpesa cashless payments product on the operations of east Africa breweries distributors in Nairobi county (Doctoral dissertation, University of Nairobi).
2. Choice of business
3. Start-up Cost Analysis
4. Cost/Benefit Analysis
5. Breakeven Analysis
6. Cost-Volume-Profit (CVP) Analysis
7. Discussion
Management accounting is a critical part of the monetary data framework, playing a strategic part in choice making, in all- the little and medium ventures or huge organizations. Managerial accounting is a necessary piece of management that handles distinguishing, exhibiting and deciphering data utilized for procedures, choice making, asset enhancement, workers’ data, resource assurance plan and control of exercises, data of partners or other outside data clients (Schmenner, 2002).
To have a solid and effective dealing, we need a reasonable comprehension of the finance- related effect that the most fundamental business choices might have. Regularly the toughest piece of beginning a business is raising the cash to make a start. The business visionary may have an awesome thought and clear thought of how to transform it into a fruitful business. On the other hand, if adequate funds can't be raised, it is impossible that the business will be initiated (Sheldon, 2006). Raising fund for start-up needs cautious plans. The business owner has to choose:
The amount of funds required.
The time and extent for which the money is required.
The security for funds (if any) which can be given?
Whether the business visionary is ready to surrender some control (possession) of the start-up for venture?
The fund requirements of a start-up ought to make note of these key ranges:
Set-up expenditure (the costs that are spentprior to the business begins to exchange) (Pinson and Jerry, 2008).
Initiating investment in limit (the business requirementsof fixed assets before it can start to exchange).
Working capital (the stocks required by the business –e.g. r crude materials + remittance for sums that will be owed by clients once deals start).
Development and improvement (e.g. additional investment in limit).
Adventurous worldwide journey (AWJ) will start functions in current year and give Adventurous and tourism packages to individuals in the Pacific Northwest, particularly the Sandy Creek zone. Prospects for AWJ’s prosperity are there on the grounds that the nationwidesightseeing and voyage industry is developing @ 4%, and Adventurous sightseeing @ 10% yearly. Additionally, the Sandy Creek Adventurous tourism business sector is developing no less than 12% every year and there are no suppliers who practice exclusively in Adventurous tourism in the more Sandy Creek region.AWJ is ready to exploit this development and absence of rivalry with an accomplished staff, astounding area, and compelling management and advertising. The target markets that we willlook for are individuals searching for a get-away or retreat destination, and walk-in clients. AWJ imagines numerous families and duos from everywhere throughout the United States.
The organization's objectives throughout the following three years are:
Sales of $650K by 3rd year.
Keep up thescope of 10% on each and every trip by airways.
Attain 15% of deals from the web-world.
Build up key partnerships with suppliers of services in the state, universally, and in the Sandy Creek range.
With a specific end goal to accomplish these objectives AWJ has to concentrate on the three vital ranges of:
Successful segmentation and targeting of adventurous voyagers inside the bigger tourismindustry (Lavin, 2007).
Effectively positioningof AWJ as Adventurous tourism masters.
Correspond the differentiation and nature of AWJ’s offering by individual cooperation, media, and territorial advertising.
Grow a rehash business base of steadfast clients keeping in mind the end goal to make adequate deals.
AWJ will be a sole proprietorship and will function from the town of Atkins Grove, California. The author and workers of AWJ are skilledtourismbusiness experts and are energetic on the subject of the exercises AWJ will endorse and put forward.
Shopping Malls and clinics are situated around 15-20 miles from the place for the individuals who appreciate a shopping background or for the individuals who may need medicinal help. With the State income coming in and my managerial foundation, this adventurous location will be fruitful. My solid foundation in management in the hotel business will guarantee the AWJ an effective business.
AWJ’saggregate start-up capital necessity is roughly $103K. Start-up will be funded by the proprietor's own savings and a long haul note of $85kattained from one of the National Banks. AWJ's target clients are wellbeing- aware duos and people, with family salaries of around $50k. They are occupied with mainstream adventurous exercises, for example, skiing, water games, and mount-biking. AWJ's most vital target clients, in any case, will be wedded couples, in ages 27-37, with kids and family earnings over $50k.
The Sandy Creek range has an expansive grouping of open air amusement fans. These wellbeing cognizant people, couples, and amasses inspired by prevalent Adventurous games, for example, skiing, kayaking, hiking, and so on, are AWJ's essential clients. AWJ's targeted business sector is avulnerable corner, and AWJ will give a special and differentiating facilities. EWJ will endeavour to keep up profits of 10% on each of air voyages. Profits on every single other item and facility differ as per the supplier yet are required to be @ 20%.
AWJ plans to lay stress on its beginning endeavours on the Adventurous tourism industry in the Sandy Creek location. Adventurous tourism is principally categorizedin the recreation tourism class (Breen and Blankenship, 2002). Incomes from recreation journey earned by U.S. tourism agents surpass $50 billion every year.
Adventurous sightseeing is a sub-group of pastime sprees and can be supplementary segregated as tough and tantalizing adventurous excursion. Yearly utilizations in the U.S.A are approximated to be $45-50 Mn for elusive and $13-15 for tough voyagers.
The staff plan portrays AWJ's foreseen employees’ number for the initial year. The accompanying table gives more point by point data. AWJ does not envision the requirement to essentially expand staff in the initial 2-3 years.
The accompanying table subtle elements AWJ’s break-even to get back the initial investment, including month to month sales break-even focuses. Earning back the original investment figures expect a 20% gross profit. This is a traditionalist appraisal, and it will be enhanced as key connections build up and the advantages of AWJ’sdeals are acknowledged by clients.
CVP breakdownis a method for looking at the relations among variable and fixed costs, the volume (in units or in dollars), and the business’ profits. There are 3keydevices accessible by CVP study:
contribution edge examination, which thinks about the productivity of diverse items, lines or benefits AJW sells.
breakeven, lets AWJ know the business volume itmust have to equal the initial investment under distinctive cost or cost situations
Operating leverages, which looks at the extent to which AWJ business utilizes fixedoutlay, which amplifies the profits as deals increment, additionally amplifies thelosses as deals drop (Bower, 2005)
AWJ’s proceeds rise as operations go in the 3rd quarter of the opening year of function. AWJ foresees betterment of its GP as of 21.75% in preliminary year to 23% in consequent year.
The sample balance sheet demonstrates maintained and arranged development. Total assets enhance impressively in year two and will give AWJ a solid budgetary position.
The organization does not expect any issues in terms of costs or income inside of the following three years. Yearly income and cash flows for the first year of operation gets to be sure in the second quarter of operation. According to the arrangement, business will have the capacity to accomplish Sales of $650K by year three and attainrevenues of at least10% on all aircraft travel. It will attain 15% of offers from the websites and make key partnering\together with administration suppliers broadly, globally, and in the Sandy Creek zone. AWJ’s representatives and proprietor are Adventurous and tourism aficionados and in addition prepared tourism industry experts. AWJ is relied upon to interface Adventurous tourism newcomers and veterans with facility suppliers, Adventurous exercises, and facilities that suit the customer's yearnings, spending plan, and ability level. AWJ has set up links with suppliers of tourism related items and administrations.
Two foremost flying machines have been picked as our key ticket suppliers to some degree because they don't beat the specialists' benefit on tickets. This licenses AJW to get the 10% income on ticket bargains that was for quite a while the business standard. Measurable studying has enabled us to perceive and develop working relationship with organization suppliers around the world.
AWJ has possessed the capacity to recognize chances to catch edges of up to 25% from specific groups. Sourcing will be consistently assessed. AWJ will exploit the fares, tourism industry journals, and different ways to spread of industry related data to keep track of the nature of its advertising.
Corporate profitability is whatever monies left after all costs are represented, including compensations of the management and staff and paybacks to financial investors (Berry & Hill, 1992). On the off chance that these profits are reinvested in advertising or extra item generation, they are expelled from the profit sheet- - which implies an exceedingly fruitful however quickly developing organization can demonstrate no profits on paper, or even a loss if invested capital is as yet streaming. At the point when corporate returns are contributed as money or for future corporate utilization, the organization can start to demonstrate a profit (Worthington and Robert, 2007).
According to the monetary proclamations, the business worth is expanding year by year and there is additionally a rising pattern found in the money balances.AWJ's benefit picture enhances as operations advancement into the second from last quarter of the first year of operation. AWJ envisions enhancing its gross edge from 22% in year one to 23% in year two. The climb in net benefit/deals is relied upon to be found in the 3 years, which is a positive sign for the proceeding with this plan.Once business has known its breakeven point, it will be connected for surveying the impacts of expanding or diminishing the part of altered expenses in the working structure.
The broad augmentation in benefits as an outcome of by and large subtle augmentations in arrangements over the breakeven point, and likewise the boundless addition in mishaps as a delayed consequence of unassuming arrangements rots underneath the breakeven point, can be attributed to the degree to which adjusted costs added to the arrangements. The extent to which a business uses settled expenses (diverged from variable expenses) in its operations is insinuated as "working impact." The usage of working impact (changed expenses, much of the time joined with settled assets), for business has been more essential so the development in benefits is greater as arrangements rise and the augmentation in losses is greater as deals decline (Zare et al 2013).
Seeing that the essential worry of the business plan is to exist prosperously with the returns of the business at the same time as getting a charge out of the auxiliary advantages of working for myself, it might never be important for my business to demonstrate a profit, and in addition invaluable from a tax collection point of view.
Zare, I., Nekounam, J., Pirzad, A., Sedaghatjoo, F., Mosavimoyahar, S., 2013. Role of accounting information systems on relevance of accounting information, Life Science Journal, 10(3s), http://www.lifesciencesite.com
Berry, W. & Hill, T., 1992. Linking systems to strategy. International Journal of Operations and Production Management, 12 (10), 3-15
Bower, P. , 2005.12 most common threats to sales and operations planning process. The Journal of Business Forecasting, 24(3), 4-14.
Breen, G., and A. B. Blankenship.,2002.Do-It-Yourself Marketing Research. New York: McGraw-Hill
Lavin, M. R. , 2007.Business Information: How to Find it, How to Use it. Phoenix, AZ: Oryx Press.
Pinson, L. and Jerry, J. , 2008.Marketing: Researching & Reaching your Target Market. Tustin, CA: Out of Your Mind...and Into the Marketplace.
Schmenner, Roger W., 2002. Making Business Location Decisions. Englewood Cliffs, NJ: PrenticeHall.
Sheldon, D. H., 2006.WorldClass Sales and Operations Planning – A Guide to Successful Implementation and Robust Execution. Ft. Lauderdale: J. Ross Publishing,Copublished with APICS.
Worthington, A. and Robert, E., 2007. Worthington. Staffing a Small Business: Hiring, Compensating, and Evaluating. Denver, CO: Oasis Books.
The module registration system allows the university administration staff to add and remove modules from the curriculum, register new student , remove student and register module to be taken by a student.
The system also provides the following display functions for administrator:
1. Display all the information for each module in the module Jist
2. Display the complete list of students
3. Display a Jist of modules currently taken by a particular student
A user in the Module Registration System is first presented with a main menu, the "Module Registration System Main Menu".
Two options will be presented, the "Module Matters" option and the "Student Matters" option. The "Module Matters" submenu will contain options pertaining to the administrative details of modules, whereas the "Student Matters" submenu will contain options pertaining to the administrative details of students.
To implement such a system, your Java program should consist of the following supporting classes.
1. (13 marks - 1 mark each for property and 2 marks each for method declaration and constructor) The Module class represents a module. A module has a moduleiD (int}, a moduleName (String}, a population (int) property indicating the number of students currently taking it, and the classlimit (int), which is the maximum population size that can take the module, and a semester (int) property that indicates when the module is offered (either semester 1 or 2). The Module class has a constructor that takes in moduleiD, moduleName, classlimit and semester. It has the following methods:
/*Returns true when classlimit has been reached, not allowed to register a student for this module when class size is full */ public boolean isFull()
/*Returns true when the module is offered in the semester sem */ public boolean isOfferedlnSem(int sem)
The toString method returns a String that'contains all the property values in the form of
images......................
2. (10 marks - 2 marks each for the property and 4 marks for the constructor) The Student class represents a student. A student has a student!D (int), a name (String),and a list of modules currently taking (Arraylist of Modules).
It has a constructor that accepts student ID, and name.
3. (27 marks- 2 marks for each method, 1 mark each for the property) The School class represents the Module Registration System in a school. It has three properties: the schooiName (String), and two collection lists, namely modulelist(Arraylist of modules) and studentlist( Arraylist of students. The class has the following methods: addStudent- This method accepts a Student object and adds it to the studentlist. addModule - This method accepts a Module object and adds it to the modulelist collection.
removeStudent - This method accepts a int representing the student!D and searches for the student within the studentlist collection. It returns true when the student is found, and removed from the studentlist. Otherwise it returns false.
removeModule - This method accepts a int representing the moduleiD and searches for the module within the modulelist collection. It returns true when the module is found, and removed from the modulelist. Otherwise it returns false.
searchStudent- TThis method accepts an int representing the studentiD and searches for the student within the collection of students. It returns the student if found, otherwise it returns a null value.
searchModule- This method accepts an int representing the moduleiD and searches for the module within the collection of modules. It returns the module if found, otherwise it returns a null value.
listModules- This method goes through the collection of the modules and displays all the information of each module in the modulelist.
listStudents - This method goes through the collection of the students and displays all the information of each student in the studentlist.
classFull - accepts a moduleiD (in!) and checks if the classlimit for the module has been reached.
isOfferedlnSem -accepts a moduleiD (int) and a sem (in!). It checks if the module is offered in the semester sem.
registerModule - This method accepts a studentiD (int), a moduleiD (int) and a semester (int). Returns true when the module is added to the module list in the Student object. Otherwise it returns false.
ListModulesTaken - This method accepts a student!D (int) and display a list of modules taken by the student in the format shown below.
005 Tan Ah Teck
101 Programming Fundamentals
202 Intermediate Programming
4. (40 marks- 5 marks for each feature, to be awarded during demo)
The SchooiApp class is the driver class, It should create an instance of the School class with Bogus School as the school name, followed by displaying the main menu option. Based on this option, a relevant submenu is then displayed. The choice made on the submenus will determine the nature of task. This task is performed using appropriate methods of the School, Module and Student classes. To perform the task selected, the driver class should include the following functionalities: • Add a student
Prompts user for the relevant input to create a new student object, It should check if there is any duplicate before the student is created, If there is no duplicate, the new student object is created and added into studentlist within the School class using the addStudent method. The option should display either "Duplicate student ID" if the student ID already exists, or "Added 002 Tan Ah Teck successfully" if the add is successful." 002 is the studentiD, whereas Tan Ah Teck is the student name.
• Remove a student Prompts the user for a student ID. For simplicity no check is required to remove the student. The option should display either
"Non-existing (studentiD)- removed failed", or "Removed (studentiD) successfully"
• Add a module Prompts the user for the relevant input to create a Module object. It should check if there is any duplicate before the object is created. If there is no duplicate, the Module object is created and added into the collection of the Modulelist (Arraylist) within the School class using the addModule method.
The option should display either "Duplicate module ID" if the module ID already exists, or "Added 101 Programming Fundamentals successfully" if the add is successful.". This option keeps prompting about semester when the semester input is invalid.
Remove a module Prompts the user for a moduleiD. Allows the user to remove the module only when no students are currently taking the module,
The option should display either
"Non-existing (moduleiD)- removed failed", or
"There are still students taking the module- removed failed", or
"Removed (moduleiD) successfully"
• Display module list
It searches through the collection of modules and displays all information about the module. This option should display either
"Module list is empty" if there is no module listed yet, or in the format (ModuleiD) (moduleName)(semester)(population)(classlimit),
101 Programming Fundamentals 1 100 130
202 Intermediate Programming 2 80 100
303 Advanced Programming 2 50 50
• Display student list
Go through the studentlist and displays the studentiD and name for each student. This option should display either
"Student list is empty" if there is no student listed yet, or in the format (studentiD)(studentName),eg:
001 Tan Daisy
002 Tan Ah Teck
• Display modules taken by a particular student
This method accepts a studentiD (in!) and display a list of modules taken by the student in the format shown below.
001
123 Module1 Name
234 Module2 Name
Where 001 is the studentiD, 123 and 234 are the module ids,Module1 Name and Module2 Name are the respective module names
• Register Module for a student
This option allows administrator to register student to take a particular module. The user specifies the studentiD, moduleiD and semester. It checks whether the module has currently being registered . On top of this, it verifies that the class limit for that module has not been reached and the module is offered in the semester. Given all the verification is successful, the module is added to the collection of modules in Student class. A successful registration will produce a format similar to the following output.
Lastly, if the registration is unsuccessful as the module is not offered in this semester, it produces the output
"Registration failed as module is not offered in semester (semester)" (semester) is the integer input keyed in by the user earlier. For successful registration, remember to increment the population property of Module object.
1. Menu.java import java.util.Scanner;
/* Class containing menu related methods */
public class Menu {
/* 1 = Main menu, 2 = Module matters menu, 3 = Student matters menu */
private int menu_type = 1;
// Global scanner object
private Scanner reader = new Scanner(System.in);
// Display menu depending on menu type
public int display_menu() {
int choice;
switch(menu_type) {
case 1:
choice = display_main_menu(); if(choice == 9) return 0;else return display_menu(); case 2: choice = display_module_matters_menu(); if(choice == 9) { menu_type = 1; return display_menu(); } else return (10 + choice); case 3: choice = display_student_matters_menu(); if(choice == 9) { menu_type = 1; return display_menu(); } else return (20 + choice); } return 0; } // Display main menu
public int display_main_menu() { int choice; System.out.println("\nStudent Registration System\n Main Menu\n***************************\n"); System.out.println("1) Module matters"); System.out.println("2) Student matters"); System.out.println("9) Quit"); System.out.print("Select your option: "); choice = reader.nextInt(); switch(choice) {
case 1: menu_type = 2; return choice; case 2: menu_type = 3; return choice; default: return 9;} }
// Display module matters menu public int display_module_matters_menu() { int choice; System.out.println("\nModule Matters Menu\n***************************\n"); System.out.println("1) Add a module"); System.out.println("2) Remove a module"); System.out.println("3) Display module list"); System.out.println("4) Register module for a student"); System.out.println("9) Quit"); System.out.print("Select your option: "); choice = reader.nextInt(); return choice; }
// Display student matters menu public int display_student_matters_menu() { int choice; System.out.println("\nStudent Matters Menu\n***************************\n"); System.out.println("1) Add a student"); System.out.println("2) Remove a student"); System.out.println("3) Display student list"); System.out.println("4) Display modules taken by a student"); System.out.println("9) Quit"); System.out.print("Select your option: "); choice = reader.nextInt(); return choice; }}
2. Module.java
public class Module { // Attributes of a module public int moduleID; public String moduleName; public int population; private int classLimit; private int semester;
// Constructor public Module(int moduleID, String moduleName, int classLimit, int semester) { this.moduleID = moduleID; this.moduleName = moduleName; this.classLimit = classLimit; this.semester = semester; }
// Returns true is the capacity of the module is exhausted, false otherwise public boolean isFull() { if(population < classLimit) return false; else return true; } // Returns true if this module is offered in the given semester, false otherwise public boolean isOfferedInSem(int semester) { if(this.semester == semester) return true; else return false;
// Returns module information in a pre-defined, tab-separated format
public String toString() { return moduleID + "\t" + moduleName + "\t" + semester + "\t" + population + "\t" + classLimit; } }
3. School.java
import java.util.ArrayList; //Class containing methods that a school generally requires to operate //Class containing methods that a school generally requires to operate public class School { // Attributes of a school private String schoolName; private ArrayList(Module) moduleList = new ArrayList(Module)(); private ArrayList" " studentList = new ArrayList" "();
// Constructor public School(String schoolName) { this.schoolName = schoolName; } // Adds a student to this school // Returns true if a student with the given studentID already exists, false otherwise public boolean addStudent(Student student) { Student existingStudent = searchStudent(student.studentID); if(existingStudent != null) return false; else { studentList.add(student); return true; }}
// Adds a module to this school
// Returns true if a module with the given moduleID already exists, false otherwise
public boolean addModule(Module module) { Module existingModule = searchModule(module.moduleID); if(existingModule != null) return false; else { moduleList.add(module); return true;} }
// Removes a student from this school
// Returns true if a student with the given studentID already exists, false otherwise
public boolean removeStudent(int studentID) { for(Student student: studentList) { if(student.studentID == studentID) { studentList.remove(student); return true; } } return false; }
// Removes a module from this school // Returns true if a module with the given moduleID already exists, false otherwise public boolean removeModule(int moduleID) { for(Module module: moduleList) { if(module.moduleID == moduleID) { moduleList.remove(module); return true; } } return false; }
// Returns a student with the given studentID if such a student already exists, false otherwise public Student searchStudent(int studentID) { for(Student student: studentList) { if(student.studentID == studentID) { return student; } } return null; }
// Returns a module with the given moduleID if such a module already exists, false otherwise
public Module searchModule(int moduleID) { for(Module module: moduleList) { if(module.moduleID == moduleID) { return module; }} return null; }
// Displays the list of module this school is offering // Returns false if this school is offering no module at present, true otherwise public boolean listModules() { if(moduleList.size() == 0) return false; for(Module module: moduleList) { System.out.println(module); } return true; } }
// Displays the list of students enrolled to this school // Returns false if no student is enrolled to this school at present, true otherwise public boolean listStudents() { if(studentList.size() == 0) return false; else { for(Student student: studentList) { System.out.println(student); } return true; } }
// Returns true if a module with the given moduleID exists // and module capacity is not exhausted yet, false otherwise
public boolean classFull(int moduleID) { Module module = searchModule(moduleID); if(module != null) { return module.isFull(); } else return false; }
// Returns true if the module with the given moduleID // is offered in the given semester, false otherwise public boolean isOfferedInSem(int moduleID, int semester) { Module module = searchModule(moduleID); if(module != null) { return module.isOfferedInSem(semester); } else return false; }
// Registers the student with the given studentID to the module with the // given moduleID for the given semester.
public boolean registerModule(int studentID, int moduleID, int semester) { Student student = searchStudent(studentID); if(student != null) { if(isOfferedInSem(moduleID, semester)) { Module module = searchModule(moduleID); if(!module.isFull()) { student.registerModule(module); module.population++; return true; }} } return false; }
// Displays the modules taken by a student with the given studentID public void listModulestaken(int studentID) { Student student = searchStudent(studentID); Student student = searchStudent(studentID); student.listModulesTaken(); }
// Returns true if at least one student is enrolled in the // module with the given moduleID, false otherwise
public boolean isEnrolledInModule(int moduleID) { for(Student student: studentList) { for(Module module: student.modulesTaken) { if(module.moduleID == moduleID) return true; } } return false; }}
4. SchoolApp.java
import java.util.Scanner; // Main driver classpublic class SchoolApp { // Program entry point, displays menu and // dispatches calls as per user's choice public static void main(String[] args) { int choice; School school = new School("Bogus School"); Scanner reader = new Scanner(System.in); while(true) { choice = menu.display_menu(); switch(choice){ // Exit from the program case 0: reader.close(); return; // Add a module case 11: { System.out.print("Module ID: "); int moduleID = reader.nextInt(); reader.nextLine(); System.out.print("Module name: "); String moduleName = reader.nextLine().trim(); System.out.print("Class limit: "); int classLimit = reader.nextInt(); reader.nextLine();System.out.print("Semester: ");int semester = reader.nextInt(); if((semester != 1) && (semester != 2)) { System.out.println("Semester should be either 1 or 2"); break; } Module module = new Module(moduleID, moduleName, classLimit, semester); if(school.addModule(module)) { System.out.println("Added [" + moduleID + "] " + moduleName + " successfully }else } System.out.println("Duplicate module ID [" + moduleID + "]"); break; } // Remove a module case 12: { System.out.print("Module ID: "); int moduleID = reader.nextInt(); reader.nextLine(); if(school.isEnrolledInModule(moduleID)) { System.out.println("Student(s) enrolled in [" + moduleID + "] - remove failed"); break } else { if(school.removeModule(moduleID)) System.out.println("Removed [" + moduleID + " successfully"); else System.out.println("Non-existing [" + moduleID + "] - remove failed"); break; }} // Display module list case 13: { if(!school.listModules()) System.out.println("Module list is empty"); break; } // Register module for a student case 14: { System.out.print("Student ID: "); int studentID = reader.nextInt(); reader.nextLine(); if(school.searchStudent(studentID) == null) { System.out.println("Registration failed - invalid studentID"); break; } System.out.print("Module ID: "); int moduleID = reader.nextInt(); reader.nextLine(); if(school.searchModule(moduleID) == null) { System.out.println("Registration failed - invalid moduleID"); break; } System.out.print("Semester: "); int semester = reader.nextInt(); reader.nextLine(); if((semester != 1) && (semester != 2)) { System.out.println("Semester should be either 1 or 2"); break; } if(!school.isOfferedInSem(moduleID, semester)) { System.out.println("Registration failed as module is not offered in semester " + semester); break;} school.registerModule(studentID, moduleID, semester); System.out.println("Student [" + studentID + "] registered for module [" + moduleID + "] in semester " + semester + " successfully"); break;}
// Add a student case 21: { System.out.print("Student ID: "); int studentID = reader.nextInt(); reader.nextLine(); System.out.print("Student name: "); String studentName = reader.nextLine().trim(); Student student = new Student(studentID, studentName); if(school.addStudent(student)) { System.out.println("Added [" + studentID + "] " + studentName + " successfully"); } else System.out.println("Duplicate student ID [" + studentID + "]"); break; } // Remove a student case 22: { System.out.print("Student ID: "); int studentID = reader.nextInt(); reader.nextLine(); if(school.removeStudent(studentID)) System.out.println("Removed [" + studentID + " successfully"); else System.out.println("Non-existing [" + studentID + "] - remove failed"); break; }}
// Display student list case 23: { if(!school.listStudents()) System.out.println("Student list is empty"); break; }
// Display modules taken by a student case 24:
{ System.out.print("Student ID: "); int studentID = reader.nextInt(); Student student = school.searchStudent(studentID); if(student != null) { System.out.println("[" + String.format("%03d", studentID) + "]"); student.listModulesTaken(); } else System.out.println("Non-existing student ID [" + studentID + "]"); break; } } } } }
4. Student.java
import java.util.ArrayList; //Class containing student related methods public class Student { // Attributes of a student public int studentID; public String studentName; public ArrayList modulesTaken = new ArrayList (); // Constructor public Student(int studentID, String studentName) { this.studentID = studentID; this.studentName = studentName; }
public String toString() { String studentInfo = studentID + "\t" + studentName + "["; for(Module module: modulesTaken) { studentInfo = studentInfo + module.moduleID; } studentInfo = studentInfo + "]"; return studentInfo; }
// Registers a module for this student public void registerModule(Module module) { modulesTaken.add(module); } // Displays the modules taken by this student public void listModulesTaken() { for(Module module: modulesTaken) { System.out.println(String.format("%03d", module.moduleID) + "\t" + module.moduleName); } } }
1.1 Introduction
A Objective
A.a Advantage:
B. Project Category
A System Study & Analysis
A Principles Of System Analysis
B Entity Relationship Diagram (Erd)
C Cardinality and modality:
C Entity Relationship Diagram
D. Start-up Cost Analysis
E. Context Level Diagram
F. Data Flow Diagram
G. Class Diagram
H. Object Diagram
I. Sequence Diagram
J. Activity Diagram
A Data Modeling
B Password Table
C Login Status Table
D Customer Details Table
E Member Details Table
F Hotel Details Table
G Booking Details Table
I Room Details Table
J Checkout Details Table
K Package Details Table
K. Function Details
A Scope of Improvement
L CONCLUSION
This is a Project work undertaken in context of partial fulfillment of MCA.I have tried my best to make the complicated process of Online Hotel Management System as simple as possible using Structured & Modular technique & Menu oriented interface. I have tried to design the software in such a way that user may not have any difficulty in using this package & further expansion is possible without much effort. Even though I cannot claim that this work to be entirely exhaustive, the main purpose of my exercise is perform each Employee’s activity in computerized way rather than manually which is time consuming.
I am confident that this software package can be readily used by non-programming personal avoiding human handled chance of error. This project is used by two types of users.
(i) Online Users.
(ii) Administrator (management of the Hotel).
Online users can see the required articles or news Administrator can maintain daily updates in the hotel records. Administrator is must be an authorized user. He can further change the password. There is the facility for password recovery, logout etc.
The main aim of the entire activity is to automate the process of day to day activities of Hotel like Room activities, Admission of a New Customer, Assign a room according to customer’s demand, checkout of a computer and releasing the room and finally compute the bill etc.
The limited time and resources have restricted us to incorporate, in this project, only a main activities that are performed in a HOTEL Management System, but utmost care has been taken to make the system efficient and user friendly. “HOTEL Management System” has been designed to computerized the following functions that are performed by the system:
Room Detail Functions
Opening a New Room
Modification to room assigned
Check-in and check-out Detail
Functions
Admission of New
Customer Check-out of
Customer
Room assigning related to customer’s need.
Statement of Customer
Customer Check-out
Details
Total number of Customers in the Hotel
Individual customer Report
During the past several decades personnel function has been transformed from a relatively obscure record keeping staff to central and top level management function. There are many factors that have influenced this transformation like technological advances, professionalism, and general recognition of human beings as most important resources.
.A computer based management system is designed to handle all the primary information required to calculate monthly statements. Separate database is maintained to handle all the details required for the correct statement calculation and generation. This project intends to introduce more user friendliness in the various activities such as record updation, maintenance, and searching. The searching of record has been made quite simple as all the details of the customer can be obtained by simply keying in the identification of that customer. Similarly, record maintenance and updation can also be accomplished by using the identification of the customer with all the details being automatically generated. These details are also being promptly automatically updated in the master file thus keeping the record absolutely up-to-date. The entire information has maintained in the database or Files and whoever wants to retrieve can’t retrieve, only authorization user can retrieve the necessary information which can be easily be accessible from the file. The main objective of the entire activity is to automate the process of day to day activities of Hotel like:
1. Room activities,
2. Admission of a New Customer,
3. Assign a room according to customer’s demand,
4. Checkout of a computer and releasing the room
5. Finally compute the bill etc.
6. Packages available.
7. Advance online bookings.
8. Online Cancellation.
9. List of Regular customers.
10. Email facility.
11. Feedbacks.
This project have some more features:
System Connectivity
No data duplication
No Paper Work Required
Time Efficient
Cost Efficient
Automatic data validation
User friendly environment
Data security and reliability
Fast data insertion & retrieval
Easy performance check
I have designed the given proposed system in the JSP to automate the process of Hotels. This project is useful for the authorities which keep track of all the users registered in a particular state .The authority can add hotel packages, room details, availability of rooms, online booking etc.
The following steps that give the detailed information of the need of proposed system are:
Performance: During past several decades, the records are supposed to be manually handled for all activities. The manual handling of the record is time consuming and highly prone to error. To improve the performance of the Hotel Management System, the computerized system is to be undertaken. This project is fully computerized and user friendly even that any of the members can see the report and status of the company.
Efficiency: The basic need of this website is efficiency. The website should be efficient so that whenever a new user submits his/her details the website is updated automatically. This record will be useful for other users instantly.
Control: The complete control of the project is under the hands of authorized person who has the password to access this project and illegal access is not supposed to deal with. All the control is under the administrator and the other members have the rights to just see the records not to change any transaction or entry.
Security: Security is the main criteria for the proposed system. Since illegal access may corrupt the database. So security has to be given in this project.
This Project is coupled with material on how to use the various tool, sub sets available in JSP, SERVLETS AND MY SQL. The need of today’s software development is competence in a GUI based front-end tool, which can connect to Relational Database engines. This gives the programmer the opportunity to develop client server based commercial applications. These applications give users the power and ease of a GUI with the multi user capabilities of Novell, UNIX or WinNT based RDBMS engines such as MY SQL . All the important coding techniques used by programmers, in OOPS based coding is brought out in full and in great detail.
System Study & Analysis
Principles Of System Analysis
1.Understand the problem before you begin to create the analysis model.
2.Develop prototypes that enable a user to understand how human machine interaction will occur.
3. Record the origin of and the reason for every requirement.
4. Use multiple views of requirements like building data, function and behavioral models.
5. Work to eliminate ambiguity.
Entity Relationship Diagram (Erd)
Entity – Relationship Diagram: This depicts relationship between data objects. The attribute of each data objects noted in the entity- relationship diagram can be described using a data object description. Data flow diagram serves two purposes:
1. To provide an indication of how data are transformed as they move through the system.
2. To depict the functions that transformation the data flow.
Data Objects: A data object is a representation of almost any composite information that must be understood by the software. By composite information, we mean something that has a number of different properties or attributes. A data object encapsulates data only there is no reference within a data object to operations that act on the data.
Attributes: Attributes define the properties of a data object and take on one of three different characteristics. They can be used to: Name an instance of data object.
Describe the instance.
Make reference to another instance in other table.
Relationships: Data objects are connected to one another in a variety of different ways. We can define a set of object relationship pairs that define the relevant relationships.
Cardinality and modality:
Cardinality and modality:* The data model must be capable of representing the number of occurrences of objects in a given relationship. The cardinality of an object relationship pair is One-T0-One (1:1): An occurrence of object ‘A’ can relate to one and only one occurrence of object ‘B’ and vice versa. One-To-Many (1:N): One occurrence of object ‘A’ can relate to one or may occurrences of object ‘B’ but an occurrence of object ‘B’ can relate to only one occurrence of object ‘A’.
Many-To-Many (M: N): An occurrences of ‘B’ and an occurrence of ‘B’ can relate to one or many occurrence of ‘A’. Modality: The modality of a relationship is zero if there is no explicit need for the relationship to occur or the relationship is optional. The Modality is one if the occurrence of the relationship is mandatory.
The object relationship pair can be represented graphically using the Entity Relationship Diagrams. A set of primary components are identified for the Entity Relationship Diagram,
Attributes,Relationships andVarious Type Indicators.
The primary purpose of the Entity Relationship Diagram is to represent data objects and their relationships.
Data Modeling Data modeling defines primary data objects, composition of each data object, and attributes of the object, relationships between each object and other objects and between objects and the processes.
The basic objective of Hotel Management System is to generalize and simplify the monthly or day to day activities of Hotel like Room activities, Check in of New Customer, Check out of customer, Assigning a room according to customer requirement, and finally compute the bill etc. which has to be performed repeatedly on regular basis. To provide efficient, fast, reliable and user-friendly system is the basic motto behind this exercise.
Let us now discuss how different functions handle the structure and data files:
1. Password: In this module, this website is for multiple users. If a User enters a password and the software checks its validity. If the password is valid then option is given to change the password, otherwise “InvalidUser/Password” message is displayed. There is an option for password recovery, log out, login, new users sign in. The Administrator can also update changes in the site after login.
2. Creating new Entity (Hotel, Room, Customers,Members etc.) This is used to add a new employee details, delete entity details and view the details. In that screen, the automatic item is created. In this function, whenever a new entity is required to be added the corresponding forms are opened and the database is manipulated to check whether the data is already existing or not. If it already exists, then it prompts that “Entry already existing” and if not than the data is entered with the various validation checks.
3. Function NEW_ROOM() This is the function used to open a new room for a customer so that he/she can assign a separate room . In that screen, the automatic room number is created. After opening a new room for the customer, finally a room is assigned to a customer and the room records are appended in the data file.
4. Function CHECKIN_CUSTOMER() This function is used to admit a customer in our Hotel after entering his all personal details like Name, Address, Phone, Sex and then he/she is assigned a room from NEW_ROOM() function.
5. Function CHECKOUT_CUSTOMER() This function is used to checkout the customer details from database. When the user inputs his room number, the same room number will be checked in the database, if the room number is matched in the database, then the customer will be check-out from the database and transferred the record of the checkout to another table of database so that the Hotel Management has the record of customers who have check-out to fulfill his legal liabilities.
6. Function GENERATE_BILL() When any customer check-out, his/her bill is generated automatically by calculated check-out date minus check-in date and getting multiplied it by daily room charge plus other charges and the bill has to be saved in the table in the database.
7. Function DISPLAY_RECORD() This function is used to display all the transaction including the customer name, address, phone, bed number, and doctor assigned to him/her in the screen. This is a global repor to display all the transaction records in the screen.
8. Validation of Data Entered by the User & Error Handling In this function, the validity of data entered by the user during the various business processes is checked through various validation checks. For example, there should not be any characters entered in the numeric fields, likewise if there is any error occurs than it should handle that particular error and give the required messages.
9. Searching In this function, room, customer well as members can search details from the database according to their authentications.
10. Report Generation In this function reports are generated for the following entities: a) Customer Details.b) Requirements of the Customersc) Rooms Detailsd) Bill Detailse) Checkin Reportsf) Booking Detailsg) Online Bookings Checkout Detailsh) Membership Details j) Packages Available
This project can be used in the hotel after adding some more useful modules in the project for which hotel are providing services. Utmost care and back-up procedures must be established to ensure 100% successful implementation of the computerized hotel system. In case of system failure, the organization should be in a position to process the transaction with another organization or if the worst comes to the worst, it should be in a position to complete it manually.
Now a days hotel are providing many other facilities, this project can also be improved with the improvement in the Hotels. Utmost care and back-up procedures must be established to ensure 100% successful implementation of the computerized banking system. In case of system failure, the organization should be in a position to process the transaction with another organization or if the worst comes to the worst, it should be in a position to complete it manually.
This project is designed to meet the requirements of Online Hotel Management. It has been developed in JSP, Servlets keeping in mind the specifications of the system. For designing the system we have used simple data flow diagrams. Overall the project teaches us the essential skills like: Using system analysis and design techniques like data flow diagram in designing the system and understanding the database handling and query processing.
Find a data structure that yields a better CPU efficiency than java.utl.Hashtable for the given system.
Programs of the current system are written in Java, utilizing java.util.Hashtable. The main operation this system is to insert records.
You are tasked to:
A Recommend a data structure that can give a better CPU efficiency than java.util.Hashtable for the above mentioned requirements.
B Develop a program to support your recommendation by comparing the CPU efficiency between java.util.Hashtable and the data structured of your choice. To test your program, your program needs to
1. Read all records from the file “finalData.csv” into java.util.Hashtable and the data structure of your choice – the time used for this operation has nothing to do with the requirements.
2. Insert all records from the file “finalInsert.csv” into java.util.Hashtable and the data structure of your choice.
Your program is expected to display two lines of output:
1 the time used to insert these records into java.util.Hashtable and
2 the time used to insert these records into the data structure of your choice.
Article I: Windows 8 beats IOS
The first issue is about the disagreement that can be utilized by the requirements of software in order to make computer systems navigational. It is because it does not have to deal with new software in order for computer systems to operate. Users prefers simple software systems to have the multi-disciplinary approach of utilizing logical and technical process that are used to manipulate and process all kinds of tasks. In addition to its functions, computers nowadays are dynamic that has the capability to interact with all kinds of facilities that are needed to be constructed as well as to be rehabilitated to carry our new structures that are more effective and efficient to human activities.
The second disagreements are about the utilization of computer touch screen technology that is not necessary in order to accomplish tasks. It is already enough for the users to use mouse in order to navigate file systems. Using touch screen technology is considered to be an advanced structure that aims to consolidate computer operating systems to function efficiently. Users can actually trust computer facilities that will replace some of their activities while performing other tasks that help them to be more productive in any way and improving their routine objectives. The functionality of using non-touch screen technology in the present era are now comfortable and safer to use as compared before that consumes a lot of time and effort that resulting into a new form of health risks.
Problems in the design of UNIX The first problem in the design of UNIX is all about the UNIX’s assumes a static file system because it is a system that organizes files. It is more regulated than traditional operating systems because it helps to secure data that will be prevented from being disorganized. The security nature of static file system aims to consolidate data as well as other involved systems to be more valuable and secured. This is the reason why there are more users who prefers static file system to be absorbed by the users to navigate relevant information over the network security systems.
Article ii: Multitasking
The chosen operating system use is all about the multi-programming systems. With the use of computer technology today, it provides numerous features that are user friendly and helps users to understand all kinds of technical performances that help to improve their skills and knowledge of manipulating data as compared from previous centuries. All kinds of executed program have been documented and recorded by the system’s processing unit and detailing each chronological data events that were previously manipulated by the users. The execution of the program utilizing stored architecture can have the capability to employ systematic structure of program execution that allows the computer to repeat its previous tasks in a repeated sequence. Other programmable features includes the ability of processing machine codes that represents certain instructions that have unique function that will help identify network processes to execute a certain task. This can be associated with the use of numerical coefficient code that is being used to store different kinds of numbers that will be used for maintaining logical processes.
Works Cited N.A. (2013). Problems in the design of UNIX. Accessed:http://homepage.cs.uri.edu/~thenry/resources/unix_art/ch20s03.html.
Ciliendo, Eduardo & Kunimasa, Takechika (April 25, 2008). "Linux Performance and Tuning Guidelines" (PDF). redbooks.ibm.com. IBM. p. 4.
Philipps, Jon (2012). 5 ways windows 8 beat ioS. Accessed: "http://www.pcworld.com/article/2012280/5-ways-windows-8-beats-ios.html."
A file is kept with details of my car's mileage. Whenever I fill up with petrol I enter the total km the car has travelled and the amount of petrol (in litres) I've just bought, beside each other on a single line. This file called mileage.txt is also uploaded.
The deliverables for this assignment are
1. a single C file. It should work, and It should be properly indented and commented.
2. A design report, including a short discussion of the problem, a flow diagram and results of unit tests.NB Do not exceed 2 pages
The fuel efficiency can be calculated in terms of the distance travelled between fills d and the petrol used p. It would be safe in general to assume that the tank is completely filled on each fill of petrol. If this is the case, then a fill of p litres indicates that pi litres have been consumed by the car in its journey from d to d.
The answer is to pipe the mileage.txt file into the program, so the program 'thinks' it's taking all those numbers in from the keyboard.
1. Make sure a copy of mileage.txt is in the same folder (or directory) as your .exe file. Right-click on the explorer bar and select Copy address as text.
2. Open a command window (run CMD.exe) and change current directory to the directory containing your .exe file: type cd and paste the path you copied in step 1. Hit Enter.
3. Type myprog < mileage.txt and hit enter, where myprog.exe is the name of your executable (program) file.
4. Your myprog program will take the contents of mileage.txt onto its standard input
The pattern for our program should go something like
while (not end of input): Read a single (d, l) record compute an efficiency, in terms of d, l and the previous d write the efficiency value end
But how to make sure the previous d value is available every time? One suggestion was to use an array for all d values, but we are fairly sure that reading all the records into an array is not viable. How can the program know in advance at compile time how big the array needs to be at run time? The answer seems to be that it can't (or can't easily). So no arrays. How, then?
Another niggle: the program needs to read and calculate until the end of input. How do do this? [ Clue: Remember how the scanf() function behaves if it isn't able to read all the values it expects. ]
Working code The code compiles and runs properly Maximum mark20
Error handling Does the program check for basic error conditions, e.g. Bad input? Maximum mark5
Works as a filter Works as a filter -- no need for long arrays Maximum mark 10
Style -- comments, indentation Style -- comments (head of file, above functions), proper indentation Maximum mark 15
Design report -- short discussion of the problem Maximum mark 10
Design report -- a flow diagram Maximum mark 20
Design report -- results of unit tests Maximum mark20
24886 27.59
25319 29.55
25740 28.98
26141 27.13
26563 29.21
26968 26.40
27406 28.60
27817 27.13
28247 28.73
28669 28.56
29074 27.31
You are a first year RN who has been working in intensive care unit for the past six months. Today you are caring for a post-operative patient admitted from theatre following thoracic surgery. The patient has the following: indwelling urinary catheter, an intravenous analgesic infusion, oxygen therapy, a central venous line for fluids and antibiotics, two wound drains and an underwater seal drain that is vented to the air and is currently swinging on inspiration.
You know it is going to be a busy late shift. There are two third year nursing students that commenced their four week placement in the unit two days ago. The shift is progressing well and your post-operative thoracic patient is stable with their pain under control. Bethany, one of the nursing students asks if there is anything she can assist you with. You ask if she has emptied wound drains and a urinary drainage bag before. The student tells you that she has in the previous surgical placement. You ask if the student knows where all the equipment is kept and where to chart the drainage volume? Bethany says yes and goes off to carry out the task. You are entering data from the shift about your patient while sitting at the end of the patient bed. Bethany has just completed empting the wound drains and the urinary catheter when the patient begins to gasp for breath griping the bed sheets. You immediately go and assess the patient and discover that Bethany had emptied the underwater seal drainage bottle.Describe how you are to respond to the incident. Describe the action you must take
As for the answer of the scenario, it is important for the nurse to always consider about the fair practice of other individuals. This is regardless if the professional is newly hired or not. This is all about the question on how a person should be complying with their competencies with their professional practice. The clarification is correct, but it is important to check that the patient has been already prescribed with the medication before administering it. In this case, the procedure made by Bethany was not correct because the patient was seen to be gasping for air after changing the drainage. The issue in this case is all about the correct administration of water seal drainage management because it is a practice that the nurse should maintain to ensure that the safety of the patient will be always ensured according to Thoms (2011).
It is important to fill up the drainage immediately in order to seal the respiratory system of the patient. Our environment is considered to be the source of negative pressure, which sucks up the air from the respiratory system. By filling the drainage bottle and then securing it by covering the tubes, it will help the patient from having their lungs to be exposed into the outside environment. Allow Bethany to be always keep in mind that drainage bottle is always a risky procedure as it affects the chest of the person.
1. Check for doctor’s order: Checking the patient’s chart for new doctor’s order is an essential procedure. This is to check the name of the patient, the procedure or management, dose, route, and the time of the order. And then confirm it to the bedside by determining the right patient to be administered with the medication.
2. Prepare equipment: It is important to prepare necessary equipment so that it will be easier to administer medication. This includes syringe, medication, alcohol, cotton ball, and the label. Open the drain packaging by observing in a sterile technique.
3. Approach the patient: This is an important procedure in order to determine if the person is the right one to be administered. Asking the name of the patient by allowing them to verbalize their concern will enable to ensure that the medication will be administered with the right patient and negligence will not push through. Establish rapport and explain the procedure to be applied.
4. Ask for assistance: If you are a student nurse, it is always important to call for the attention of the staff. This includes allowing the staff to observe while you are performing the medication administration. Passing the sterile end of the tubing to nurse or doctor inserting the drain is important to avoid respiratory complications.
5. Apply suction to drain: This will be eliminating excessive secretions so that it will provide a comfortable breathing pattern for the patient. It seeks to maintain the integrity to the respiration of the patient by means of having a clear airway clearance.
6. Secure drain and tubing to bed and patient: This is to prevent the bottle from any unexpected movements that may cause the tube to be dislodged. Securing all connections with cable ties are important to prevent the patient from any accidents that might harm their health.
7. Discard: All used cottons and other materials should be discarded to prevent contamination that might cause diseases.
8. Perform hand hygiene: Prevents the spread of infection.
9. Documentation: After providing medication administration, it is important to document the procedure to provide legal reference in the future and will endorse it to the staff on duty.
Safe and Quality Nursing Care – This is a competency that allows the nurse to demonstrate their knowledge and skill while providing care for the patient by checking again the drainage after Bethany managed the drainage. Since the patient has been gasping for air, it is important to fill the drainage bottle and secure it. A nurse should always think for the safety of the patient while responding be able to preserve their physical wellness and to prevent the possibility of acquiring illness. Quality nursing care can be managed by nurturing the patient’s need by providing protective gear such as helmets and blankets for the patient to be kept in a warm and comfortable environment as a measure for the core competency to promote their health. As an expanded scope of practice, the nurse always seek for promoting the patient’s safety by placing the victim on a safe zone during disaster incidents to prevent further injury that can cause significant damage to the patient’s health care status. As an ethical practice, the nurse should always show politeness while rescuing the patient that are in need of emergent rescue as well as avoiding to hold private parts of the patient to avoid legal lawsuits. Patients need adequate and reasonable health care services which are stated from the patient’s bill of rights and if this right will be violated by the nurse as a health care provider will be facing charges that can lead to revocation of license as well as being imprisoned.
Health Education – Orienting Bethany regarding the proper procedure is important because it helps her experience to improve her knowledge on how to prevent things from happening again in the future. This is to protect the dignity of the patient as well as not being involved in future negligent actions of chest drainage management. this is an event when the attending nurse on duty will always orient the patient regarding the date, the time, and the place because this is an orientation process that will keep them aware for their current status.
Establishing rapport is always important while providing health education to be able to gain the patient’s cooperation for being attentive to all the instructions and information that are being mentioned while attending with the patient. In the same manner, health education is one of the most important that supports the nursing core competencies to be able to implement the patient’s acquisition of having the right to obtain information. In addition to the scope and practice of competency, health education can be done by stating the patient’s current physical illness and the underlying factors that created this kind of medical irregularity so that the patient will collaborate with the attending nurse practitioner that helps them to recover. Providing the patient’s rights such as the right to information and to obtain the patient’s basic health care needs is a requirement by the law to avoid legal malpractice suits.
Ethico-moral responsibility –In this process, the nurse should always know the procedures for responding to patients to maintain their level of professionalism. In any case that the nurse that does not have any knowledge or skill to accomplish emergent tasks such as medication administration. Deciding against the patient’s right to live by not attending to their medical needs in the disaster site is an immoral act for the reason that the nurse deprives the patient against their right to live, which can be considered as an immoral act that can be imprisoned with corresponding fines.
Personal and professional Development – this process is essential for nurses that are attending with patients that are under disaster circumstances in order to gain experience and practice. Skills will be improved into a higher level for the fact that patients undergoing training will be able to become confident for efficiently accomplishing procedures at a short period of time as an emergent response for urgent cases. Being personally and professionally trained will make the nursing professional to become more self-reliant and more efficient for handling complex health care services that will prevents the possibility of committing negligence or other unethical activities that may harm the patients according to Nursing and Midwifery Board of Australia (2015).
Quality improvement – This pertains to any health care services that needs to be improved so that responding health care utilizing medication administration will be accomplished independently to upgrade the integrity of professional image as indicated by Emerson (2010). As a scope for this practice, this can be done by evaluation for the past health care services that have been conducted to measure the efficiency if the services have been fully or partially provided to review past intervention that needs to be restructured. In cases that there are failure of health care provision especially for not saving patient’s lives that are confined in hospital should be taken into consideration to discover some procedures that have been forgotten to be delivered efficiently because these cases can lead into legal disputes such as homicide due to negligence. In the study of ethics, a nurse can lose their professional license if they have been proven to be negligent from their previous act of allowing the patient to end their life due to incompetency such as by not watching the patient while they fell from their bed and ended their lives. Quality improvement solves nursing competency integrity by improving nursing care services that helps the professional nurse to become as a role model and inspiration for new professionals that are starting to practice their profession as new health care providers according to Grossman (2011).
Research – As an emergent practice for chest tube drainage management is significant because it is a continuing process of acquiring more knowledge to increase awareness regarding issues about responding to wrongful medical administration. In this manner, the scope will be to attend trainings, seminar, or enrolling with academic institutions to continue the learning process of providing chest tube drainage. Researching more facts or insights will increase the nurse’s self determination and reliance to significantly accomplish health care tasks of saving patient’s life from disaster conditions. As an ethical circumstances, having a wrong information or notion such as providing false information to clients and other health care workers can cause miscommunication and disputes, which is a form of unethical instance that should not be practiced by nurses. Research is the process of obtaining more information that can be practiced by internet surfing, going to the library to read scholarly articles, and by reading newspaper journals to know something about current events that are related the professional nursing practice according to South Australian Health (2013).
Record management – Mahagan (2010) indicated that the process of documentation or record management pertains to a core competency to identify and collect relevant data that are based from nursing or health care services because all kinds of information will be needed to be recorded for the purpose of future reference for other health care professionals. As a scope for this action, this can be done by collecting significant data that came from nursing assessment of objective and subjective data that contains patient’s chief complaints and symptoms of the diseases that are needed to be treated that will be written to charts. Planning and interventions management are essential for the records management for the reason that this is the process of recording the current prognosis of the patient’s treatment plan that were experienced by patients in need of medical attention. The ethical issue that can be related to this event is to provide a concrete evidence for all the nursing and health care services that will be provided by the attending nurse and physician on duty because these will serve as legal documents according to the law. In any circumstance wherein there will be reproducing of these medical records can be sanctions by imprisonment, dismissal, and revoking of license as a consequence. Record management is important for health care practitioners for the reason that this competency will legally help the nurses to fight for their rights and privileges in instances that there are cases of abusive behaviors according to Hughes (2013).
Communication – This application utilizes communication to be able to establish responsive interaction between the victim and the health care provider during chest tube drainage management. This management helps the process of nursing competency by providing basic life support for patients under an emergent situation to prevent the patient from respiratory arrest. In addition, this can be done by stating your name to the patient and identifying yourself as a rescuer with valid proof of identification card for the patient to become aware that they are now being rescued and will be transported to a safer place. Walker (2005) stated that communication can also develop harmonious interpersonal communication with the attending nurse because in this process of core competency that helps the patient to be attended with their medical needs while being rescued or being treated in health care facilities. On the other hand, communication between other health care team members create positive collaboration and teamwork that is an important quality to gain more trust between health care team members to efficiently save patient’s lives. As an ethical principle, communication blocks the possibility of misunderstanding and as a conflict such as by practicing verbal harassment due do miscommunication incidents.
Collaboration and teamwork – cooperation with other health care team members especially in a disaster situation will help to unify complex tasks of saving patients with chest tube drainage. In this process, the scope of chest tube drainage management for nursing is by having an organized system of task delegation that will avoid confusions between health care team members. While attending patients, each task that are delegated represents a systematic flow of activities that creates as an inspiration for attaining goals successfully without experiencing any kind of constraints that affects the process of helping victims to be saved from harm such as injuries and damages. Collaboration is the process of helping other health care team members while teamwork pertains to the ability of the health care team to systematically accomplish tasks as a scope of the core competency. Disorganized collaboration and failure of teamwork can lead into negligence that can potentially affect the essence of professionalism between attending health care team members especially in a disaster circumstances. Implication and Recommendation of the Study
As an implication, it has been learned from the study that core competency is important for a practicing health care professional particularly with licensed nurses for the reason that it represents their degree of professionalism and competitiveness as a professional. This involves coordinating with the staff nurse if the student nurse will provide medication administration and then charting it for legal purposes. Nursing competencies is essential because there are lots of insights that can be learned from being a nursing professional in order to become self-reliant and independent as indicated by Harisson (2009). There are many concepts that can be affected by the underlying competencies that will be needed by the practicing nurses for them to improve their knowledge and skills as a professional. Therapeutic health care services will be implemented while engaging core competencies because this can be considered as a part of learning process for the nurses to enhance their practice of providing tender loving care to boost the patient’s self-worth while undergoing rehabilitation. Ethical standards of nursing practice should be embraced for all practicing health care professionals for the reason that these are standards for maintaining moral principles of respecting patients, other health care professionals and for their own self. Advanced learning practice enhances the process of improving the degree of knowledge and skills to become more organized and systematic on providing health care services to avoid ethical lawsuits.
As a recommendation for this practice, the process of nursing competencies should be more studied and researched to be able to learn new knowledge and insights that will be beneficial to all practicing health care professionals that aim for client’s satisfaction of health care services. All health care professionals should attend regular trainings and seminars for all advanced nursing care topics such as advanced cardiac life support and basic life support to be able to have the ability to save lives for patients that are under a disastrous condition without the help of physicians or paramedics. It is important to know for a nurse that attends on real life situation of rescuing victims that are suffering from injuries that are brought about by earthquakes or other natural disasters as hazards should be equipped with facilities and protective equipments to prevent them from committing negligence due to the extent of hazards that are contained according to Snowball (2012).
Emerson, Bethany (2010). Patient Safety and Quality of Health care. Retrieved from: http://ec.europa.eu/public_opinion/archives/ebs/ebs_327_en.pdf.
Grossman, Steven (2011). Training with Industry and Lean Health care. Available: http://twi-institute.com/documents/healthcare_twiwhitepaper.pdf.
Hughes, Clifford (2013). Clinical Incident Management in the NSW Public Health System: Looking, Learning, Acting. Auckland: Academic Press.
Mahagan, R.P. (2010). Critical incident reporting and learning. British Journal of Anaesthesia 105 (1): 69–75 (2010) doi:10.1093/bja/aeq133.
Nursing and Midwifery Board of Australia (2015). National competency standards for the registered nurse. Prentice Hall.
Olivar, Manson (2008). Description of Competencies. Retrieved from: http://wdrs.fnal.gov/elr/competencies_04.pdf.
Snowball, Kim (2012). Clinical Incident Management Policy. Sydney: Government Press. South Australian Health (2013). Patient Safety report. Sydney: University press. Thoms, Debra (2011). Wow: Ways of Working in Nursing: Resource Package. Sydney: Academic Press.
Walker, Cathy (2005). Effective Communication. Accessed: http://www.umext.maine.edu/onlinepubs/PDFpubs/6103.pdf.
Wilson, Harisson (2009). Core Competency Framework. Available: http://www.cna-aiic.ca/CNA/documents/pdf/publications/Competency_Framework_2010_e.pdf
Name Affiliation
There are many social issues facing New Zealanders today, couple these with low economics and low employment and these factors start turning these issues into health problems such as obesity. This essay will outline a social issue of obesity (Allison, Warin & Bastiampillai, 2014). It will then give a brief explanation of sociological theories, upon doing so the essay will then relate the social issue back to the three sociology theories. Lastly this essay will explore how obesity is affecting children between 13 and 18 years old.
Obesity in Aotearoa New Zealand has become a major health and social issue facing people of all ages. Recent statistics on this issue have highlighted just how much of a problem obesity has become.in the years 2013/16 31.6% of all adults (aged 15+) are obese that's 1 in 4 and childhood obesity is no better with 1 in 12 children (aged 13 - 18) being obese that's 10.3% (Allison, Warin & Bastiampillai, 2014). This breaks down to males being 27.7% and females being 29.12%, compare these to 2014 where the statistics were vastly different. Only 20% of males were obese and 20.6% females were obese. Children's statistics are similar but there is a definite trend for children as only some in the total population are affected. All factors have been addressed while these statistics have been complied such as food intake, food types and psychical activities. The health issues that have steamed from social issue include type 2 diabetes, and heart disease among others in adults, However in children the problems are far more serious(Bowers, Webber & Bigby, 2014) .
Obese children face a lifetime of health problems such as high blood pressure and asthma. For obese children there is a greater risk of bullying, body dissatisfaction as well as psychological problems. There has been research to suggest that obesity in children may lead to strokes, common cancers, reproductive problems and musculoskeletal problems (Ministry of health, 2011). Obese children often lead to obese adults; this is now not just a health problem but a social issue as the repercussions that stem from this are far reaching (Crothers, 2015). Our children will have to face this head on as it will be down to their generation who ultimately have to deal with this issue.
A conflict theorist believes that social economics are determined by the wealthy and therefore they hold the power over the majority of the people. With this happening it clearly breaks society into two groups rich and poor, the boss and the workers or as Karl Marx put it the bourgeoisie and the proletariats (Crothers, 2015), this division between the masses proves to be beneficial for the richer of society (Mooney, Knox, & Schacht, 2000). When dealing with social problems the conflict theory can be broken into two areas Non-Marxist conflict theory and Marxist conflict theory. Marxists focus on conflicts in our society that develop from differences in financial status (De Brún, McCarthy, McKenzie & McGloin, 2014). Non-Marxists focus on conflicts in our society that arise from differing and oppositional ethics amongst different groups (De Chesnay, 2014).
A Symbolic interactionism has a different view on the world as they believe that our society is a group of interrelated individuals that coexist in a manner that creates symmetry for all (De Chesnay, 2014). With this belief comes the realisation that corporations and families are equal in society, families reproduce, nurture and educate children who in turn provide workers with the skills and knowledge base for the corporations to continue (Gregori et al,. 2014). Structural functionalism highlights how a society works together and how one part of society influences another part of society (Hay et al,. 2014).
Symbolic interactionism is largely based on work by George H Mead and Max Webber. Symbolic interactionism looks at the whole picture while analysing the micro level, as theorist who follows this perspective believe that by analysing the macro level the social problem could be broken down to see what level has been affected (Martin, 2015). This perspective is occupied with the inner workings of a small group to see how human behaviour is influenced while interacting within the small group vs. a larger group (Martin, 2015). This perspective also advocates that a person's self is shaped and influenced by interaction with others in a social situation (Lane, 2014).
Looking at obesity from a Symbolic interactionism point of view you would have to say that not one person is to blame as it is a collective problem, that a collective has to come to terms with. With this understanding it then becomes hard to correct the problem as if one part of society is influencing to the wrong degree then that will impact on another part of society and then a domino effect is created (Lane, 2014). Marketing advertisements in modern media that depict high fat and high in sugar foods utilising graphical images that portray healthy people, make the average consumer believe that eating this style of foods will have no effect on them (Monaghan, 2014). This is just one example of the major corporations influencing society to buy items which is propelling the obesity problem. This is one part of society influencing another part of society.
It can be concluded that by making appetizing food which tastes good with no nutritional value in bulk the fast food companies are able to keep costs down and in doing so they hold power over the consumer as they are able to purchase a cheap filling meal at no great cost to them (Monaghan, 2014). A symbolic interaction theorist would look at how people are being influenced by those they surround themselves with, how a person/people receives and interprets the information being beamed through all media outlets and peer's a like (Müller, 2015). By bringing the person down to the macro level a theorist would look to see how these influences are being processed, how media influences peoples buying patterns and challenges our ability to see right from wrong and good from bad. The use of modern media practice gives visuals of healthy people consuming high fat unhealthy food (Murgatroyd, Frampton & Wright, 2014). The image contradicts the act and therefore legitimises this in their mind, consequently making it ok to eat unhealthy. This is how obesity has become a social issue.
Allison, S., Warin, M., & Bastiampillai, T. (2014). Anorexia nervosa and social contagion: Clinical implications. Australian and New Zealand Journal of Psychiatry, 48(2), 116- 120. Bowers, B., Webber, R., & Bigby, C. (2014). Health issues of older people with intellectual disability in group homes. Journal of Intellectual and Developmental Disability, 39(3), 261-269.
Crothers, C. (2015). Recent (2015) sociology-relevant books about New Zealand. New Zealand Sociology, 30(4), 280.
De Brún, A., McCarthy, M., McKenzie, K., & McGloin, A. (2014). Weight stigma and narrative resistance evident in online discussions of obesity. Appetite, 72, 73-81.
De Chesnay, M. (Ed.). (2014). Nursing research using grounded theory: Qualitative designs and methods in nursing. Springer Publishing Company.
Gregori, D., Gulati, A., Paramesh, H., Paramesh, E. C., Kameswaran, M., & Baldi, I. (2014). Children Obesity from Global Determinants to Local Consequences: The New Zealand Perspective. The New Zealand Journal of Pediatrics, 81(1), 2-4.
Hay, P., Chinn, D., Forbes, D., Madden, S., Newton, R., Sugenor, L., ... & Ward, W. (2014). Royal Australian and New Zealand College of Psychiatrists clinical practice guidelines for the treatment of eating disorders. Australian and New Zealand Journal of Psychiatry, 48(11), 977-1008.
Lane, D. C. (2014). Explaining Body Deviance with Stigma and Carnival of the Grotesque. Understanding Deviance: Connecting Classical and Contemporary Perspectives, 290. Martin, G. M. (2015). Obesity in question: understandings of body shape, self and normalcy among children in New zealand. Sociology of health & illness, 37(2), 212-226. Monaghan, L. F. (2014). ‘Postmodern’Muscle: The Embodied Pleasures of Vibrant Physicality. Challenging Myths of Masculinity: Understanding Physical Cultures, 15.
Müller, T. (2015). Volume Editor’s introduction: The diversity of symbolic interaction in Europe. Contributions from European Symbolic Interactionists: Reflections on Methods (Studies in Symbolic Interaction, Volume 44) Emerald Group Publishing Limited, pp. xi- xvii, 44.
Murgatroyd, S. E., Frampton, C. M., & Wright, M. S. (2014). The effect of body mass index on outcome in total hip arthroplasty: early analysis from the New Zealand Joint Registry. The Journal of arthroplasty, 29(10), 1884-1888.
Rivera, L. M., & Paredez, S. M. (2014). Stereotypes Can “Get Under the Skin”: Testing a Self‐Stereotyping and Psychological Resource Model of Overweight and Obesity. Journal of Social Issues, 70(2), 226-240.
van der Spuy, H. H., De Klerk, H. M., Vogel, H. M., & Wenhold, F. A. (2014). The meaning of food for obese men: a qualitative study. Journal of Family Ecology and Consumer Sciences/Tydskrif vir Gesinsekologie en Verbruikerswetenskappe, 42.
1. Identifying some barriers and good practices to healthcare access experienced by the group of indian people living in Australia:
2. Reflecting my attitudes, beliefs and values about the indian ethnic people:
3. Describing some culturally safe health care practices that might be undertaken with individual people:
4. Outlining the ways to advocate the indian people living in Australia and contribute to improve health outcomes for the group:
1. Conclusion:
2. Reference list:
All the people no matter whether they are from different culture, social status, and region must have the equal rights in accessing medical treatment (O’Donnell et al. 2016, p.508). This study focuses on the perspective, belief, attitudes and values of mine as the care provider or nurse. Before conducting this study, a particular group has been chosen and the group of people are Indian but live in Australia. This study focuses on the barriers and good practices to healthcare access that have been faced by that particular group. Here, the several initiatives that have been made by the healthcare sectors to provide high-quality services to the Indian community have been discussed. On the other hand, some culturally safe healthcare practices have been also explained here.
The group of Indian people, who live in Australia, face many difficulties while accessing medical treatment because many of them do not belong to a rich family. Therefore, they cannot afford much expensive drugs or treatments that are prescribed by the doctors. Giger (2016, p.120) stated that most of the care homes in Australia focus on providing high-quality services to their care users and they do not compromise with the quality of the services. Therefore, automatically the charges of the services start becoming high that cannot be afforded by the particular group. On the other hand, the care users must keep patience while accessing the medical treatment because there are a large number of care seekers go to the care homes for their regular check-up. Apart from that, due to the population, there are a large number of people, who suffer from various diseases so they seek for the best treatment to cure their health issues.
Apart from that, that particular group gets some facilities also like the care homes monitor the activity of the care providers as well as the care seekers to eradicate any possibilities of harm or self-abuse. The care homes use various advanced technology in order to save the medical records of the care seekers to provide the best treatment to them (Davidson et al. 2016, p.17). The staffs of the care providers are well experienced and well trained so the Indian groups do not feel neglected and get proper care from them. The management of the care homes tries to involve the care seekers in the decision-making the process so Indian groups can share their opinion, preferences or interests with the care providers. They can make the own decision regarding the treatment procedures that would permit to their pockets to resolve their health issues.
I try to make the Indian people comfortable while they are coming to access the proper treatment. I respect their culture, belief and do not entertain any kind of discrimination within the healthcare sector. I do not underestimate them but I provide all kind of information to them to make them involved in the decision-making process. I do not agree with those people, who do not pay proper attention to the people, who have the language problem and black in colour. I believe that care providers are involved in a noble profession so they have great responsibilities to treat all the people equally, no matter whether they are from the different caste, creed, race, gender, age, colour and region. I have learnt the sign languages to communicate with the people with learning disability and learning problem. I value for the money so I try to provide the superior quality of services at affordable price to the Indian people, who do not belong to the rich family. Longo et al. (2015, p.115) stated that it is important to value the opinion of the care seekers. Therefore, I listen to the Indian group as well as try to understand their problems and based on it I take an initiative to resolve those particular issues.
The concept of racial and gender abuses brings in discrimination in health care. There are two distinctions in human culture. Firstly, language and culture that belong to the cognitive aspect of culture. Secondly, the social position of the being in the society. The first distinction faces discrimination in the health care field (Payyappallimana, 2010, p.70). Differences between Indian and Australian culture are remarkably vivid. While India has almost half a million dialects, Australia has only one; English. While in India, the caste system affects the social stratification, Australia has a discriminatory presence between aboriginal and non-aboriginal people. Health practices in India are based on some traditional methods, like, Ayurveda, Siddha and Unani. But Australian medical system is devoid of these traditional practices (Payyappallimana, 2010, p.78). This leads to the chaos that the Indians migrating in Australia face. According to World Health Organization, traditional medicines belong to that genre of health practices that include animal, plant, mineral based medicines incorporating with traditional beliefs (Kildea et al. 2010, p.200). In a country like India, health practices are based on codified medical system, folk system and the presence of fate is sometimes necessary.
Hence, the absence of such practices restricts Indian immigrants to consult medical practices. This discriminatory presence in a system is vivid in Australian aboriginal picture also. According to, Health and Welfare Report of Australia's Aboriginal and Torres Strait Islander People, in 2008, the aboriginal people in Australia suffer twice than their non-aboriginal counterparts due to discrimination. This discrimination happens due to the lack of traditional medicines that are mixed with beliefs (Durey, 2010, pp.92).
I believe the solution lies in some methods that are effective in Indian minds. Firstly, codified medicines in India like Ayurveda should be included in the Australian system. Like, Central Council for Indian Medicine surveys the need for this method in India. Secondly, folk systems like bone setting, private healer and birth attendants are inseparable from Indian culture. The lack of these processes in Australia leads to discrimination. Thirdly, India’s caste system reflects a traditional discrimination in different castes in India. In Australia, the absences of caste-based health centres make the Indian immigrants feel insecure.
I believe that before providing treatment to the care seekers it is important for the care providers or the doctors to review the previous medical history of the care seekers. Makowharemahihi et al. (2016, p.60) stated that Indians have different food habit and their lifestyle is completely different from the Australians so the care providers must have the proper knowledge about the lifestyle and habit of the Indian. It has been found that Indians, who live in different countries cannot make changes in their food habit so based on their food habit they suffer from some specific health issues like stroke, diabetes, arthritis and obesity. On the other hand, Mosavianpour et al. (2016, p.400) argued that the care providers must discuss each matter with the experts.
I allow the care seekers to make the decision on the treatment process to cure their health issues. Apart from that, I consult with the doctors or the physicians about the present health status and the previous health report of the care seekers to get understandable knowledge about treatment and diagnosis. I always maintain a good relationship with the Indian group to make them feel comfortable within the organisation. I undertake many training session in order to enhance my performance and to eliminate the possibilities of the accidents within the care home.
This study shows that the care seekers must not be discriminated by the care providers and the care providers must understand the feelings and financial capacity of the care seekers. Then the care seekers would be able to afford the treatment that is suitable for their health issues. The care providers must know about the culture, language and interest or preferences of the Indian groups to make them feel flexible within the care sector. Here, it has been seen that the lifestyle and food habit of Indian people is different from the Australians so the care providers must try to know about it and they must have knowledge about the health issues that are mostly faced by the Indians. Then the Indian people must be able to access the proper treatment living in Australia without being discriminated.
Giger, J.N., (2016). Transcultural nursing: Assessment and intervention. 7th ed, Glorietta: Elsevier Health Sciences.
Davidson, P.M., Phillips, J.L., Dennison-Himmelfarb, C., Thompson, S.C., Luckett, T. and Currow, D.C., (2016). Providing palliative care for cardiovascular disease from a perspective of sociocultural diversity: a global view. Current opinion in supportive and palliative care, 10(1), pp.11-17.
Longo, M.C. (2015), "Good Practices in Health Care “Management Experimentation Models”: Insights from an International Public–Private Partnership on Transplantation and Advanced Specialized Therapies." International Best Practices in Health Care Management (Advances in Health Care Management,) Emerald Group Publishing Limited, 17(5), pp.71-115. Makowharemahihi, C., Wall, J., Keay, G., Britton, C., McGibbon, M., LeGeyt, P., Maipi, J. and Signal, V., (2016). Quality Improvement: Indigenous Influence in Oral Health Policy, Process, and Practice. Journal of health care for the poor and underserved, 27(1), pp.54-60.
Mosavianpour, M., Sarmast, H.H., Kissoon, N. and Collet, J.P., (2016). Theoretical domains framework to assess barriers to change for planning health care quality interventions: a systematic literature review. Journal of Multidisciplinary Healthcare, 9(5), p.303-400. O’Donnell, C.A., Burns, N., Mair, F.S., Dowrick, C., Clissmann, C., van den Muijsenbergh, M., van Weel-Baumgarten, E., Lionis, C., Papadakaki, M., Saridaki, A. and de Brun, T., (2016). Reducing the health care burden for marginalised migrants: The potential role for primary care in Europe. Health Policy, 120(5), pp.495-508.
Payyappallimana, U. (2010). Role of traditional medicine in primary health care. Yokohama Journal of Social Sciences, 14(6), pp.57-78. Durey, A. (2010). Reducing racism in Aboriginal health care in Australia: where does cultural education fit?. Australian and New Zealand Journal of Public Health, 34(s1), pp.87-92. Kildea, S., Kruske, S., Barclay, L., & Tracy, S. (2010). ‘Closing the Gap’: how maternity services can contribute to reducing poor maternal infant health outcomes for Aboriginal and Torres Strait Islander women. Rural and Remote Health, 10(3). pp.125-200
For the purpose of this assignment I will explore my personal and professional development in my third year and throughout the entire course. In this assignment I will reflect on an episode of practice that happened in the accident and emergency department during my placement there. I will discuss my leadership role, supervision and delegation to others whilst I managed the elder's area on a morning shift. I have chosen to reflect on this episode of practice as this is one of the first times I was truly allowed to manage an area during this time I was able to delegate to others, question my leadership style and make clinical decisions.
I will use reflective practice to critically analyse my delegation and supervision of others and analyse my own professional development. Throughout this reflection I will also look into the theory that underpins the following areas, Clinical Decision Making; Leadership, Management and Teamwork; Delegation and Supervision of others and Continuing Professional Development.
The main focus of this assignment will be my delegation and supervision of others as this is a very important part of being a nurse as the NMC (2008) says "You must establish that anyone you delegate to is able to carry out your instructions" and that "You must make sure that everyone you are responsible for is supervised and supported".
To critically analyse this I will use a recognised model of reflection, I have researched a number of different models of reflection to find one that is suitable for this and that I'm comfortable using. Some of the models I have looked at include John's model of reflection as cited in Siviter (2008) But I found that this to be to rigid and does not help me discuss my own development as well , and also requires the reflector to work under constant supervision and keep a diary.
Another model I considered was Rolfe et al (2001) framework for reflective practice, but I found this not to be structured enough to adequately explore my development and create future action plans. The final model I looked at is the Gibbs (1988) model of reflection as cited in (Siviter, 2008). The Gibbs model is well structured and easily guides the reflector through the process allowing them to explore the reflection in depth and allow action plans to be created. I have chosen this model as I have used this model in the past and feel comfortable using it and I feel it is well suited to this episode of practice.
During this assignment I will use a pseudonym for any patients I discuss to maintain confidentially in line with the NMC (2008) on confidentiality.
The fourth patient is a 42 year old male Ben Willow (accompanied by his wife) presenting with persistent headaches that have been so intense he has not been able to sleep for the past two days. The patient was seen by the medical officer and is awaiting an MRI scan. He is on full neurological observations hourly. It is time to undertake the next set of hourly neurological observations you enter the darkened cubicle and before you say anything the patient’s wife tells you that she does not want her husband disturbed because he has finally gone to sleep. You consult the observation chart and see that the previous two sets of observations were within normal range. You decide not to wake the patient and note on the emergency chart that you were requested not to wake the patient by his wife.
This essay will discuss a clinical skill in which I have become competent in practicing. I will use a reflective model to discuss how I have achieved the necessary level of competence in my nurse training programme. The reflective model I have chosen to use is Gibbs model (Gibbs 1988). Gibbs model of reflection incorporates the following: description, feelings, evaluation, analysis, conclusion and an action plan (Gibbs 1988). The model will be applied to the essay to facilitate critical thought, relating theory to practice where the model allows. Discussion will include the knowledge underpinning practice and the evidence base for the clinical skill. A conclusion to the essay will then be given which will discuss my reflection skills, acknowledge my competence and show my personal and professional development. The clinical skill I have chosen to reflect on within this essay is the administration of Intramuscular (IM) injections. I have chosen this as within my first clinical placement this was a widely used method of drug administration and I became involved in the process of IM injections. I therefore researched the topic of IM injections and my knowledge within this area developed.
The first stage of Gibbs (1988) model of reflection requires a description of events. I was asked to administer a drug to a patient via IM injection. I had observed this clinical skill on a variety of occasions and had previously administered an IM injection under supervision. On this occasion I was being observed by two qualified nurses, one of which was my mentor. The drug had been drawn up and was ready to be administered and the patient consented to have a student administer the injection. My mentor was talking me through the procedure step by step and informed me that I should use an alcohol wipe to cleanse the injection site, when the other nurse interrupted and said that this was not necessary. This was in front of the patient, who then requested that the alcohol wipe was omitted as on previous occasions this had caused a stinging sensation. My mentor said that this was acceptable and I continued to administer the injection, omitting the use of the alcohol wipe. On the previous occasions when I had administered IM injections I had not cleansed the site and had never been instructed to adopt this practice.
Evaluation is the third stage of Gibbs (1988) model of reflection and requires the reflector to with state what was good and bad about the event. I was aware that research by Workman (1999) suggests that the use of skin cleansing wipes is inconsistent and not necessary in IM injections if the patient appears to be physically clean and an aseptic technique is adopted, along with stringent hand washing by the nurse. It has also been noted that the use of cleansing with an alcohol wipe can cause skin hardening (Mallet & Dougherty 2000). The trust policy was to follow guidelines published by the Royal Marsden Hospital (Mallet & Dougherty 2000). The Royal Marsden (Mallet & Dougherty 2000) advocate the use of skin cleansing wipes, however it is stated within their guidelines that they adopt this because their patients are often
immunocompromised, and give evidence of previous studies which indicate that skin cleansing is not normally necessary. Therefore my practice was within the trust protocol. This experience made me think about my attitude towards literature and how it is applied in practice. Burnard (2002) suggests that a learner is a passive recipient of received knowledge, and that learning through activity engages all of our senses.
The site used in the IM injection was the gluteus maximus, this the most commonly used site for the administration of IM injections (Greenway 2004, Workman 1999). The gluteus maximus area is both thick and fleshy with a good blood supply (Watson 2000). It is located in the hip area and forms the buttock (Watson 2000). It has been noted by Watson (2000) that the gluteus maximus is near the sciatic nerve and Greenway (2004) suggests that this presents a risk of threat of injury in the administration of IM injections. When I administered the IM injection to the patient, I injected into the gluteus maximus muscle, as the evidence stipulates this is best practice.
Stage four of Gibbs (1988) is an analysis of the event, where Gibbs encourages the reflector to make sense of the situation. I will do this by exploring the skill and looking at the evidence underpinning it. An IM injection is the administration of medication into the muscle; there are many reasons why drugs are given via the IM route (Workman 1999). These include a rapid absorption rate, the conscious state of the patient, and the drug effect being altered by ingestion (Mallet & Dougherty 2000, Workman 1999). Workman (1999) suggests there are four considerations in giving an injection, the site of injection, the technique, the equipment and the route. On my clinical placement, an orthopaedic outpatient centre, IM injections were administered on an almost daily basis. However Hemsworth (2000) comments that IM injections are rarely used in certain specialities and suggests that, in this case, nurses current practice in IM injections may not be up to date with recent research findings.
Through evaluation of the event in question I have become more aware of different practices concerning the use of alcohol wipes in skin cleansing. I am aware that both practices have been researched, but as I develop professionally I am developing my own skills and will not cleanse the skin in future unless the trust policy dictates so or the patient requests me to do so. There is no clear evidence in this area but I will use the literature which is available to justify my actions, and therefore give evidence based care. The reason my mentor suggested using the alcohol wipe could be that she has been qualified for a long time, and practices have changed. In this scenario I have learnt from experience and through experience (Burnard 2002). Following this incident in practice I will now be more prepared to challenge the views of others in relation to my clinical practice.
I was working on a morning shift in the Elderly area of the Accident and Emergency department with my mentor and her other third year student. The nurse in charge asked us if we wanted to take it in turns the run the elderly depart for half the shift each. I was given the task of running the area for the morning half the shift. In addition to my mentor and the other student there was a HCA also assigned to the area. The elder's area was not particularly busy this morning there was 3 patients in the area with another 2 or 3 waiting to be seen. One of the Doctors working with is in the area asked if I could do an ECG on one of the patients then refer them up to the cardiology ward as they needed to be admitted. I decided that I would hand the patient over to the ward as I had the patient's full history and I would delegate the task of the ECG to the other student as I knew she needed to do this for her skills, my mentor went with her as she needed to be supervised to complete this skill. On my way to make the phone call, a paramedic crew brought a child in the paediatric area of the elder's bay. When a patient is brought into the area there paperwork has to be completed including observations. I decided to delegate this to the HCA as the other patient urgently needed to go to the ward. I asked the HCA to do a complete set of observation on the child who responded "when I get round to it" I explained to her that the observations were more important at that time than stocking a cupboard. After making the phone call I returned to the child and the HCA to ensure the observations where completed correctly and noted the Childs observations were not normal and may indicate acute appendicitis as I had seen this on a previous shift, at this point I took the results to the doctor and explained what I felt the doctor agreed and moved the child up in the waiting list to be seen next.
When I was asked to run the elderly area initially I felt very excited about this as I have not had many management opportunities during my course and I was getting to manage an area I have always been interested in and hope to eventually work in. When I started to get into the management role I started to find myself getting more and more anxious as I have never really worked in this environment before and that previous experience had been limited to wards which had more set routines. I felt comfortable being able to delegate to the third year student as I knew she would be competent to do the task I asked her I also felt confident in asking the HCA to complete observations as I knew they had training to work in this area. I feel that I could have asked the HCA in a different way to complete the observations as I felt the way I handled it was wrong and it led her to resent me for the rest of the shift because I was short with her. Overall I enjoyed the experience and felt a great deal of satisfaction when I was able to identify a potentially critically ill patient and make the appropriate referral using my clinical judgement. Evaluation What I feel that was positive about this situation is I was able to practice my leadership and delegation skills which previously I have not had the opportunity to do. It has also given me a good insight into the importance of time management and prioritising tasks. This episode has given me a small insight into the importance of quality assurance because I had to check the observations and also allowed me to recognise my own limitation as I knew there was nothing I could have done for the child without referring to a doctor. What was negative about the situation I feel was my team working and management style could have been better as I could have explained to the HCA in more positive way. I feel I may not have needed to delegate the task of observations as I could have made the call and managed to complete the observations in a timely and safe manner.
Delegation and supervision of others is an integral part of being a registered nurse. Delegation is defined as the process of transferring a task to a competent individual and giving them to authority to complete a selected nursing task in a selected situation Hanston & Jackson(2004). The stage five of the Gibbs (1988) model, I am aware that all nurses do not use evidence in the same way and may use different methods but as long as my practice is safe and evidence based then I can practice safely. My future practice will depend on the area in which I am working and I aim to find out the trust protocol concerning clinical procedures before I commence any procedure.
Within my action plan my aim is to research further into the theory of using alcohol wipes in the administration of IM injections. I am also planning to have a discussion with the qualified nurses on the subject of skin cleansing. In conclusion my reflection skills have developed through the production of this essay. Using a model of reflection has helped me to structure my thoughts and feelings appropriately. My level of awareness concerning evidence based practice, and its importance, has been enhanced with the use of critical reflection. My competence, within this clinical skill, has been further developed and I now feel that my personal and professional development is progressing. Using this reflective model has helped me to realise that my learning is something which I must be proactive in. Furthermore as a student nurse I have recognised that reflection is an important learning tool in practice
McKenna, L., McCall, L., & Wray, N. (2010). Clinical placements and nursing students' career planning: A qualitative exploration. International journal of nursing practice, 16(2), 176-182.
Teno, J. M., Mitchell, S. L., Gozalo, P. L., Dosa, D., Hsu, A., Intrator, O., & Mor, V. (2010). Hospital characteristics associated with feeding tube placement in nursing home residents with advanced cognitive impairment. JAMA, 303(6), 544-550.
Salminen, H., Zary, N., Björklund, K., Toth-Pal, E., & Leanderson, C. (2014). Virtual patients in primary care: developing a reusable model that fosters reflective practice and clinical reasoning. Journal of medical Internet research, 16(1), e3.
Warne, T., Johansson, U. B., Papastavrou, E., Tichelaar, E., Tomietto, M., Van den Bossche, K., ... & Saarikoski, M. (2010). An exploration of the clinical learning experience of nursing students in nine European countries. Nurse Education Today, 30(8), 809-815.
Webster, S., Lopez, V., Allnut, J., Clague, L., Jones, D., & Bennett, P. (2010). Undergraduate nursing students' experiences in a rural clinical placement. Australian Journal of Rural Health, 18(5), 194-198.
Whalley Hammell, K. R. (2013). Client-centred practice in occupational therapy: Critical reflections. Scandinavian journal of occupational therapy, 20(3), 174-181.
Written by:
Submitted to:
Date of submission:
Traditional Education System had many flaws that resulted in the inability of the students in fetching good jobs in the present day world, even after scoring good marks. The main flaw is the lack of specific education that actually led to the confusion of the students to do after they finish them school, college or university. Through the application of the P-TECH program by IBM an effort is made to ensure that the present day education system can be changed and made more job specific so that the youth could get their respective jobs easily. The first chapter therefore consists of the introductory information about the new education system. The second chapter consists of the description of the situation followed by assumptions and scope of the study. The third chapter consists of the problem statement and plan of analysis. The fourth chapter consists of analysis and findings. The fifth chapter consists of proposed solution to the problems. Finally the last and sixth chapter consists of application of learning.
1. Chapter:
1.1 Introduction:
1.2 Background of the case study:
1.3 Statement of problem:
1.4 Research question
1.5 Research aim and objective:
1.6 Significance of the study:
1.7 Structure of the case study:
1.8
2. Chapter: Case brief:
1.1 Description of the situation:
1.2 Assumptions:
1.3 Scope of study:
1.4
3. Bibliography
4. References (includes all in-text references)
5. Bibliography (all other references)
6. Table of figures
7. Table of tables
8. List of Acronyms
After the great recession in the last decade, the aftermath is still affecting the present day community. The rising tuition fees of colleges and decline in earnings of the people have both become a point of concern in the present day world (Kanter & Malone, 2015). To overcome this problem, IBM developed P-TECH with a view to help and support the students of today (TheAspenInstitute, 2016). The company developed a class through which the student could have more of professional knowledge (Litow, 2016). Also a job offer was promised on priority basis to the students who scored good marks and met the requirements of the company (P.TECH, 2016). P-TECH therefore proved to be a plan through which the education system is made much more comfortable, easier and faster for the students by bringing the education budget under their reach (IBM.com, 2016). Through P-TECH efforts are made to end up the high school and college degree which takes nearly 4+2, 6 years to complete in 4 years, while the student are having education through public schools (ptechnyc.org, 2016). This way no extra burden of expenditure was made through this fast way knowledge system. In fact efforts are made to remove the financial constraints from the student and offer them more of job specific technical education. Adding to the benefit, IBM who introduced P-TECH also promised the students to be given priority after they successfully complete their course (Kanter & Malone, 2015). This way a job offer at the end of the course can be expected for those who successfully complete the course (Beecham et al., 2008).
IBM creation of P-TECH actually proved to be blessings for the present day education system in the United States. The knowledge about this project was given by New York City mayor Bloomberg to Rahm Emanuel, former US Congressman who was also the chief of staff to US President Barack Obama and Bill Clinton after he became the mayor of Chicago (Kanter & Malone, 2015). Thus started the application of the P-TECH model schools in Chicago by making partnership with IBM (P.TECH, 2016). Various schools were added with the passage of time and soon the whole city schools came under this project. The result was that the five early colleges through STEM school were established for Science, Technology, Engineering and Math. Further assistance was taken from Cisco, Microsoft, Motorola and Verizon to offer a high solution to the education system in the country (IBM.com, 2016).
NB:PLEASE U CAN STILL MODIFY THE SUBJECT AREAS BECAUSE IT HAS TO BE RELATED TO THE CASE STUDY.NOTE THE USE OF MICRO-ECONOMIC SUBJECT AREA IN THE APPLE CASE STUDY.THIS IS USED BECAUSE THERE IS MICRO-ECONOMIC PROBLEM/ISSUE OR CHALLENGE IN THE APPLE CASE STUDY.HOWEVER,THE MAXIMUM SUBJECT AREA WE CAN USE IS FIVE(5).ALSO,NOTE THE IMPORTANCE OF SUBJECT AREAS FOR CHAPTER 1 AND 3.IF SUBJECT AREAS ARE NOT CORRECTLY IDENTIFIED AND RELEVANT TO THE CASE STUDY,THEN IT WILL BE VERY DIFFICULT FOR U TO DO CHAPTER 3.CHAPTER 3 DEPENDS ON THIS SUBJECT AREAS IDENTIFIED EARLIER IN CHAPTER 1.
The statement of the problem includes the followings.(SHOULD BE SUBJECT WISE, PLEASE CHECK APPLE CASE STUDY)
a) Human Resource Management: The new age education system offering more of technical information to the children would not end up in bringing disregard and lack of knowledge to other subjects such as humanities and arts (P.TECH, 2016).
b) Strategic Management:P-TECH could bring in cost effectiveness to the students in acquiring education.
c) Organization:An attempt is required to bridge the gap between the middle level technical assistance that the company expects to grow in next ten years for about fifteen thousand; the disintegration of the students from their traditional educational culture has been made (Kanter & Malone, 2015).
d) Behavior:P-TECH may end up in depleting the level of morale, common knowledge and factual information about the history to the students (ptechnyc.org, 2016).
The research questions therefore may rise as follows.
Strategic management(I think this first problem/issue/challenge relates to strategic management subject area as it suggest innovation and change modeled by P-TECH,please think about it with me)
Human Resource Management:
A. Is P-TECH the smart way to learn or it’s just an addition of the course material resulting in making education system become tougher?
B. Is IBM methods are fair way of dealing with the human resource management?
2. Strategic Management:
C. Job specific course are the need of the present day world to remove the high rising unemployment level in the country?
3. Marketing:
D. If IBM is following the guidelines for International business and corporate social responsibility while offering job through P-TECH programs?
E. Is the marketing of P-TECH still a challenge?
F. Does the marketing of the P-TECH system of education requires to be done to bring alertness among the students?
4. Behavior:
G. If the education system in the whole world should follow STEM education through which efforts are made to bring skills in students for job specific subjects such as Science, Technology, Engineering and Mathematics?
5. Organization:
H. Does the organizational behavior of IBM favorable for the development of more programs like P-TECH?
I. Does the P-TECH system needs to develop more methods of offering technical education to the children?
NB. ALL THE ABOVE QUESTIONS SHOULD BE PLACED UNDER DIFFERENT SUBJECT AREAS,PLEASE CHECK APPLE CASE STUDY SAMPLE TO GUIDE YOU)
The research aim is to review the decision of applying the P-TECH education system in the United States. The objective is therefore to find out that if the new program of education is as follows.
1. Strategic management
A. P-TECH is actually meeting its target objectives of offering job courses.(SHOULD NOT BE IN THE FORM OF QUESTIONS)(MAKE USE OF: TO FIND OUT,TO ANALYSE,TO EXAMINE,TO EVALUATE TO WRITE OUT OBJECTIVES.PLEASE CHECK THE APPLE CASE STUDY.IT SHOWS A GOOD SAMPLE OF THE UNIVERSITY REQUIREMENTS.PLEASE JUST ADAPT WHAT YOU SEE THERE TO THE IBM CASE STUDY.
EXAMPLE: To find out about its target objectives of offering job courses.
2. Human Resource management
B. The new education system bringing new job opportunities for the students.(NOT QUESTIONS)
3. International business
C. The new education system helped student to get education within their budgetary constraints. (NOT QUESTIONS)
4. Marketing:
D. The marketing of P-TECH still required to be done so as to make this concept generally acceptable.(NOT QUESTIONS)
5. Organizational behavior:
6. The organizational behavior including the inner culture and outer culture response favorable enough to support more programs like P-TECH.(NOT QUESTIONS) PLEASE NOTE THE RELATIONSHIP BETWEEN STATEMENT OF PROBLEM,RESEARCH QUESTION AND RESEARCH OBJECTIVES) ONE EVOLVE FROM ANOTHER I.E USE STATEMENT OF PROBLEMS TO WRITE RESEARCH QUESTIONS AND USE RESEARCH QUESTIONS TO WRITE RESEARCH OBJECTIVES) PLEASE CHECK APPLE CASE STUDY FOR GUIDANCE.
The significance of the study is for the common people who are looking at the outcome of this new kind of education system. The students going in their middle schools are also planning to join the P-TECH so as to achieve their desire of ending up in having a good job. The researchers are enquiring in the outcome of this education system which has offered student a pathway to technological information so as to get good jobs. Finally the government officials who have their target of deploying the unemployed youth of the country are observing the outcome of this education system and also supporting such changes in the education system to follow in other states as well.
Example: Figure 1: Structure of the case study taken from MS word
HOW TO COPY AND PASTE FROM A PDF FILE AND AVOID PLAGIARISM?
MAKE USE OF THE SNIPING TOOL AVAILABLE ON WINDOWS,GO TO SEARCH MENU AND TYPE SNIPING TOOL,THE TOOL WILL COME UP.USE IT TO COPY AND PASTE THE NECESSARY DIAGRAMS,TABLES,EXIBITS ETC TO EXPLAIN THIS SECTION AND REMEMBER TO REFERENCE THEM USING THE CASE STUDY REFERENCE OF( Kanter and Malone,2014).
Example:of using sniping tool:
THE ABOVE IMAGE HAS BEEN SNIPED BY THE SNIPING TOOL AVAILABLE ON WINDOWS. ANY EXIBIT/TABLE/GRAPHS/FIGURES USED IN THIS SECTION SHOULD BE EXPLIANED AND PROPERLY REFERENCED.
NB: PLEASE, CHECK APPLE SAMPLE CASE STUDY GIVEN TO U TO SEE HOW GRAPHS/EXIBITS/TABLES/FIGURES WERE COPIED FROM THE CASE STUDY GIVEN ON APPLE TO ILLUSTRATE AND EXPALIN THIS SECTION.
The case study discusses the application and review of the education system that existed in different parts of the United States and the benefits that the new system is now offering to the public. The start of the case study discusses about the different states in the United States where the need for change in the education system was desired (P.TECH, 2016). This need was later fulfilled through the application of the P-TECH education system that actually supported the development of the new age education system that actually offered job specific education through application of STEM system. That is the science, technology; engineering and mathematics were kept as educational subjects that could be drawn to student for bringing them skills that are required for getting a good job (Litow, 2016).
IBM therefore made innovation of P-TECH which actually helped the company in meeting the requirements of the present day world about education. The years of education were declined and the whole educations system was made much cost effective. Also the education application mode was made easier and comfortable for the students to learn better. The students were provided with more technical information than general information with a view that they finally end up with a more desired job position (ptechnyc.org, 2016).
The following exhibits shows the actual outlook of P-TECH schools.
Hence the case study discusses about the smart way learning through P-TECH which is an addition of the course material resulting in making education system become tougher. Also the evaluation of the IBM methods isdrawn as fair way of dealing with the human resource management. The efforts are made to bring into light the approach for developing job specific course that are needed in the present day world to remove the high rising unemployment level in the country. An evaluation of the IBM is following the guidelines for International business and corporate social responsibility while offering job through P-TECH programs is also made to draw out conclusion about IBM to be following ethical and moral business responsibility. However, the evaluation has also been drawn on the development of the P-TECH system such that it gets popular among the students and they get the most cost effective and good outcome reaping courses (IBM.com, 2016).
The exhibit shows the achievements of P-TECH system of education.
The assumptions that are taken into consideration for IBM’ new age education system called P-TECH are stated as follows.
a) The need of developing an education system was required which could offer more cost effective education system to the students. This way they can get relieved from the heavy tuition fees that they find unbearable to pay.
b) TThrough the P-TECH education system the years of learning were compressed, however the quality of learning was enhanced.
c) The learning for technical aspects was made as priority as they could help student get a bright job career in the field of technology.
The scope of the study includes the public especially the parents as well as the students who are looking for getting admission in various Universities and Colleges. Through this analysis and reporting these people will get an idea of how P-TECH education system could actually help them achieve the job of their dream. They could get the knowledge about the benefits of the technological specific education system and that also through P-TECH education system developed by IBM which is cost effective as well as allow the students to finish their degree two years earlier. The government organizations and other researchers will also get to know about the benefits of the new age education system that is changing lives and helping student reaches their desired career prospective.
The plan of analysis can be depicted as follows.
A Human Resource Management:
The new age education system offering more of technical information to the children would not end up in bringing disregard and lack of knowledge to other subjects such as humanities and arts (P.TECH, 2016).
b Strategic Management:
P-TECH could bring in cost effectiveness to the students in acquiring education.
c Organization:
An attempt is required to bridge the gap between the middle level technical assistance that the company expects to grow in next ten years for about fifteen thousand; the disintegration of the students from their traditional educational culture has been made (Kanter & Malone, 2015).
Behavior:
P-TECH may end up in depleting the level of morale, common knowledge and factual information about the history to the students (ptechnyc.org, 2016).
e Marketing:There is an utter need of marketing P-TECH programs to make it popular among the masses.
3.3.1 Problem 1:
The students from around the country and even outside world need to be made aware of the latest upgrade in teaching and learning experience.
3.3.2
Strategic HRM Model(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
The strategic HRM model therefore would apply to informing different candidates about the latest upgrade in the education system through prospectus.
3.3.3
Problem 2(identify problem from the case study)
To help student understand the importance of new mode of education that brings more comfortable level of learning.
3.3.4 Strategic Human Capital Planning(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
The strategic human resource planning therefore would apply the deployment of the capable faculty that could deliver the quality education to the students.
3.3.5
Problem 3(identify problem from the case study)
3.3.6
The Harvard Framework(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
3.3.7 Problem 4(identify problem from the case study)
The fourth problem is to bring into action such infrastructure that could help the students learn in a comfortable environment.
3.3.8 Best fit or Contingency Model(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
The best plan of learning therefore needs to be applied using strategic human resource management that assures better learning to the students.
3.4 STRATEGIC MANAGEMENT
3.4.1 Problem 1(identify problem from the case study) To develop courses that offers better career prospects.
3.4.2 PESTEL Analysis (should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics).
The political, economic, social, technological, environmental and legal aspects of the education system needs to be reviewed and analyzed so that the right mix of education can be delivered to the students.
3.4.3 Problem 2(identify problem from the case study)
To create an environment of learning.
3.4.4 Change Quadrants(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
To apply such an environment of learning that supports the learning system.
3.4.5 Problem 3 (identify problem from the case study)
To recognize the achievements of the passouts.
3.4.6 Porter’s Five Forces (should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)
Through porter’s five forces analysis the students are made aware of the cutting edge advantage, both in time and money constraints that can be achieved.
3.4.7 Problem Four (identify problem from the case study)
To develop business system in other regions.
3.4.8 Blue Ocean Strategy (should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics).
Through the application of the blue ocean strategy to the other regions are required to be added for such a change in the business.
3.5.1 Problem 1(identify problem from the case study)
To develop business in other regions and even overseas.
3.5.2 Carroll’s Pyramid(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)Through the international business system application the efforts are required to be made to develop and grow the education system in various other regions and countries. 3.5.2 Problem 2(identify problem from the case study)To increase awareness among students in international borders.
3.5.3 Hofstede’s Cultural Dimensions(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)Through the application of Hofstede’s cultural dimension the need of the students in the present day world needs to be recognized and sorted out through the international business strategy.
3.5.4 Problem 3(identify problem from the case study)
To increase the level of acceptance for the new age education concept called P-TECH.
3.5.5 Licensing(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics).Licensing can help in placing the new place education system in application.
3.5.6 Porter’s Diamond of National Advantage(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics) Porter’s diamond model can help in identifying the various advantages to the students from the new age education.
3.6.1 Problem 1(identify problem from the case study)
3.6.2 Kotler’s 4ps of marketing(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics). Displaying the students about the correct price, place, promotion and product are need to be reviewed and placed as per the need and benefit of the students.
3.6.2 Problem 2(identify problem from the case study)
3.6.3 Curry’s Pyramid: Customer marketing and relationship management(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics) To develop cordial and fruitful relationship with the students so that they could identify the value of money that they achieved by learning through P-TECH.
3.6.4 Problem 3(identify problem from the case study)To develop faith in students.
3.6.5 The BCG Matrix(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)Through the application of BCG matrix, efforts are required to be made to bring the business situation in star quadrant so that a win-win relationship develop between the students and authorities of P-TECH.
3.6.6 TProblem Four (identify problem from the case study)Helping the student recognize the benefits of the new age learning program P-TECH.
3.6.6 Ansoff’s product/market grid(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics) Efforts are required to made market and product development both. That is the students to be made more aware of the benefits and the product to be developed as to give more benefits to the students.
3.7.1 Problem 1(identify problem from the case study)
P-TECH may end up in depleting the level of morale, common knowledge and factual information about the history to the students.
3.7.2 Classical-Keynesian theories(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics).
The development of old thoughts of losing something needs to be changed to new thoughts of learning something that could help bring better changes in life.
3.7.2 Problem 2(identify problem from the case study) Students to accept new change of learning as vital development.
3.7.3 Theories of economic growth(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics) The theories of economic growth should be stated which supports the idea of development along with change.
3.7.4 Problem 3(identify problem from the case study)To convince students for learning through new technology.
3.7.5 Theory of production(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics).Just like the theory of production, the students also needs to recognize the various benefits that the change process could bring in their life.
3.7.6 Problem Four(identify problem from the case study)To compare and contrast the benefits of new education system with classical methods.
3.7.6 Game Theory(should have at least five authors for in-text referencing: one author to reference the illustration/relevant diagram and a critical analysis(4 authors,2 for negative critics and 2 for positive critics)Game theory application will help support the outcome that clears the benefit and value addition that the new age learning can achieve.
3.8.1 Positivism Research philosophy
The research policy will quantify and depend on objective manner and philosophical approach that could help in getting the most desired outcome from the study.
3.8.2 Research Approach
The research approach is deductive as it supports the rational existing viewpoint and keeps ahead new viewpoints through extended research.
3.8.3 Research choice The research choice include data gathering through questionnaire filling and personal interviews that will help get the desired inputs from the target population.
3.8.3.1 Multiple Method More than one solution will be looked in that could help in the growth and development of the new age P-TECH programs which could help the students earn better job prospects in their life.
3.8.3.1 Secondary data collection The data collection will be made from the secondary sources including internet and journal articles which have huge contents of prior research.
3.8.4.1 Types of secondary data The types of secondary data that will be used will be objective information backed by facts and figures issues by reliable sources.
3.8.5 Ethics Ethics will be followed in display of secondary information by applying in-text citations. Also the end of the study will consist of the references of the work used for study. Finally the personal information of the respondents will be kept secret as per the global ethical standards of research.
3.8.6 Reliability The reliability of the research will be achieved with the deployment of the statistical data and inputs from highly dependent sources like corporate houses, government institutions etc.
3.8.7.1 Threats of validity The threats of validity can exist if the respondents give answers in hurry, unfairly or even without understanding. Therefore efforts are required to be made to recognize the most reliable source for data fetching.
OVERALL THE WORK IS BEING DONE WELL EXCEPT FOR THE FACT THAT WE NEED TO FOLLOW UNIVERSITY REQUIREMETS FOR THE MBA DEGREE)-FONT: TIMES NEW ROMANS
FONT SIZE: 12
-LINE SPACING: 1.5
-PLEASE MAKE USE OF THE SAMPLE CASE STUDY ON APPLE TO GUIDE YOU AS WE MOVE THROUGH THE RESEARCH PROJECT.IT IS VERY IMPORTANT SO WE DO NOT COME BACK FOR CORRECTIONS OR IF WE NEED TO THEN IT SHOULD BE VERY MINIMAL
-CHAPTER ONE HAS A BIG RELATIONSHIP TO CHAPTER 3
-CHAPTER 4 DEPENDS ON CHAPTER 1 AND 3
-CHAPTER 6 DEPENDS ON ALL CHAPTERS FROM 1 TO 5
-CHAPTER 4 IS 2000 WORDS
-CHAPTER 5 IS 2600 WORDS
-CHAPTER 6 IS 3800 WORDS
-PLEASE DO THE RELEVANT PROOF READING AND EDITING FOR SPELLING AND GRAMMATICAL ERRORS)
Azim, R. & Hassan, A., 2013. Impact analysis of wireless and mobile technology on business management strategies. Information and Knowledge Management, 3(2), pp.141-50.
Beecham, S. et al., 2008. Motivation in Software Engineering: A systematic literature review. Information and Software Technology, 50, pp.860-78.
Brynjolfsson, E. & Hitt, L.M., 2000. Beyond Computation: Information technology, organizational transformation and business performance. Journal of Economic Perspectives, pp.23-48.
CEB information Technology, 2012. Rules to Live By: 10 Guiding Principles for Project Management. [Online] Available at:
http://www.executiveboard.com/blogs/rules-to-live-by-10-guiding-principles-for-project-management/.
facts@web, 2015. Top 10 Best Wearable Technology Devices 2015. [Online] Available at:
https://youtu.be/w8zjmAmL4TM [Accessed 16 December 2015].
Henderson, J.C. & Venkatraman, N., 1993. Strategic alignment: Leveraging information technology for transforming organizations. IRM Systems Journal, 32(1), pp.472-84.
IBM.com, 2016. IBM and P-TECH. [Online] Available at:
https://www-03.ibm.com/press/us/en/presskit/42300.wss [Accessed 07 March 2016].
Kanter, R.M. & Malone, A.-L.J., 2015. IBM and the re-invention of high school (B): Replicating and scaling P-TECH and partners. Harvard Business School, pp.1-19.
Karim, Z., 2009. Towards secure information systems in online banking. In International Conference for Internet Technology and Secured Transactions. London, 2009.
Karim, A.J. & Hamdan, A.M., 2010. The impact of information technology on improving performance matrix: Jordanian banks as case study. In European, Mediterranean and Middle Eastern Conference on Information Systems. Abu Dhabi, 2010. EMCIS2010.
Khan, A.A., Zaman, N. & Dawood, M.U.Z., 2008. Online Banking Transaction System. Journal of Information and Communication Technology, 2(2), pp.90-100.
Kitchenham, B. et al., 2009. Systematic Literature reviews in software engineering - A systematic literature review. Information and Software Technology, 51, pp.7-15.
Kitchenham, B. et al., 2010. Systematic literature reviews in software engineering - A teritary study. Information and Software Technology, 52, pp.793-804.
Kumar, R., Salve, P.B. & Chotia, A., 2013. Centralized Internet Banking System. International Journal of Emerging Technology and Advanced Engineering., 3(7), pp.2250-459.
Litow, S.S., 2016. P-TECH. [Online] Available at: http://citizenibm.com/category/p-tech [Accessed 07 March 2016].
McAfee, A., 2002. The impact of enterprise information technology adoption on operational performance: an empirical investigation. Production and Operations Management., 11(1), pp.33-53.
NCBI, 2015. National Center for Biotechnology Information. [Online] Available at: http://www.ncbi.nlm.nih.gov/ [Accessed 30 November 2015].
P.TECH, 2016. P.TECH: 9- 14 Model. [Online] Available at: http://www.ptech.org/ [Accessed 07 March 2016].
Peotta, L. et al., 2011. A formal classification of internet banking attacks and vulnerabilities. International Journal of Computer Science and Information Technology (IJCSIT), 3(1), pp.186-97.
ptechnyc.org, 2016. Pathways in Technology early college high school. [Online] Available at: http://www.ptechnyc.org/site/default.aspx?PageID=1 [Accessed 07 March 2016].
Reichert, F.M. & Zawislak, P.A., 2014. Technological Capability and firm performance. Journal of Technology Management and Innovation., 9(4), pp.20-35.
Schneider, G., 2013. Electronic commerce. 10th ed. Boston, Massachusetts: Course Technology Cengage Learning.
Schwabe, K., 2014. Information technology project management. (Seventh Edition). Cenage Learning. Shu, W. & Strassmann, P.A., 2005. Does information technology provide banks with profit? Information and Management, pp.781-87.
Stoica, M., Roach, W. & Price, D., 2012. Wireless Business and the impact on Firm performance: The strategic move to adopt a new technology. International Journal of Management and Information Systems, 16(1), pp.45-54.
TheAspenInstitute, 2016. Economic Opportunities Program: IBM P-TECH. [Online] Available at: http://www.aspeninstitute.org/policy-work/economic-opportunities/skills-americas-future/models-success/ibm [Accessed 07 March 2016].
Whitman, M. & Mattford, H., 2014. Hand-on information security lab manual. 4th ed. Boston, Massachusetts: Thomson Course Technology.
References :(all in-text references should come here and leave the rest under Bibliography).
Example is show below: I SAW THIS AS IN-TEXT REFERENCE IN THE WORK, LET IT BE UNDER REFRENCES AND ALL REFERENCES SHOULD APPEAR ALPHABETICALLY)
IBM.com, 2016. IBM and P-TECH. [Online] Available at: https://www-03.ibm.com/press/us/en/presskit/42300.wss [Accessed 07 March 2016].
facts@web, 2015. Top 10 Best Wearable Technology Devices 2015. [Online] Available at: https://youtu.be/w8zjmAmL4TM [Accessed 16 December 2015].
Schwabe, K., 2014. Information technology project management. (Seventh Edition). Cenage Learning.Shu, W. & Strassmann, P.A., 2005. Does information technology provide banks with profit? Information and Management, pp.781-87.
3.1 Plan of Analysis (JUST DIAGRAM, PLEASE CHECK SAMPLE CASE STUDY ON APPLE) SOME OF THE MODELS/CONCEPTS/THEORIES USED HERE ARE NOT RELEVANT UNDER THE SUBJECT AREA,FOR EXAMPLE JOINT VENTURE IS NOT A STRATEGIC MANAGEMENT CONCEPT,IT IS RATHER AN INTERNATIONAL BUSINESS CONCEPT).DO NOT USE SIMILAR CONCEPTS USED IN THE APPLE CASE STUDY EXCEPT IF THEY ARE RELEVANT FOR THE IBM CASE STUDY) MAKE USE OF THE SIXTY MODELS/CONCEPTS/THEORIES I DID SEND EARLIER.YOU CAN STILL USE MODELS OUT OF IT IF THEY ARE RELEVANT FOR THE IBM CASE STUDY.
3.2 Problem statement (PLEASE CHECK SAMPLE CASE ON APPLE)
3.3 Subject area 1 (e.g strategic management)
3.3.1 Problem 1(identify problem from the case study)
3.3.2 Relevant model studied under subject area(e.g strategic management) to analyse the problem.
3.3.3 Problem 2
3.3.4 Relevant model/theory/concept
3.3.5 Problem 3
3.3.6 Relevant model
3.4 Subject area 2(e.g Human resource management)
3.4.1 Problem 1
3.4.2 Relevant model
3.4.3 Problem 2
3.4.4 Relevant model
3.4.5 Problem 3
3.4.6 Relevant model
3.4.7 Problem Four
3.4.8 Relevant model
3.5 Subject area 3(e.g International business).
3.5.1 Problem 1
3.5.2 Problem 2
3.5.3 Relevant model
3.5.4 Problem 3
3.5.5 Relevant model
3.5.6 Problem Four
3.5.6 Relevant model
3.6 Subject area 4(e.g Marketing)
3.6.1 Problem 1
3.6.2 Problem 2
3.6.3 Relevant model
3.6.4 Problem 3
3.6.5 Relevant model
3.6.6 Problem Four
3.6.6 Relevant model
3.7 Subject area 5(e.g Organizational behaviour or project management or economics depending on subject area as identified in the case study).
3.7.1 Problem 1
3.7.2 Relevant model
3.7.3 Problem 2
3.7.4 Relevant model
3.7.5 Problem 3
3.7.6 Relevant model
3.7.6 Problem Four
3.8 Research Methodology
3.8.3 Research choice
3.8.3.1 Multiple Method
3.8.3.1 Types of secondary data
3.8.5 Ethics
3.8.6 Reliability
3.8.7 Validity
GENERAL COMMENTS -OVERALL THE WORK IS BEING DONE WELL EXCEPT FOR THE FACT THAT WE NEED TO FOLLOW UNIVERSITY REQUIREMETS FOR THE MBA DEGREE)-FONT: TIMES NEW ROMANS
-FONT SIZE: 12
-CHAPTER 5 DEPENDS ON CHAPTER 1, 3 AND 4
1 Introduction:
1 Impact of social media on public relations referring crisis and reputation management:
2 Crisis communications preparedness plans:
3 Other options before Domino’s:
4 Alternatives for using traditional media and social media:
5 Challenges faced by PR practioners in telling truth:
6 Speed of response rate in the digital world:
7 Structure of the case study:
8 Applying Page Society’s principles:
9 Pizza Turnaround campaign:
10 Conclusion:
11 Bibliography
1 Figure 2
2 Figure 3
3 Figure 4
Social media has become an effective method of reaching out to the public. However this method has resulted in causing harm to various multinational organizations. Many notorious people have engaged in uploading such videos and activities through social media which has resulted in creating a mess like conditions for multinational companies. The similar kind of incident was observed in the case of Domino’s where two employees uploaded a stinky video of pizza making inside the kitchen of Domino’s. This video became viral and soon people started avoiding their visit to Domino’s. In result the president of the company active step in uploading another video where in the confession of the two employees were recorded and also the personal regret was revealed by apologizing on the situation (Young et al., 2004).
Social media has huge impact on public relations practices particularly in the case of crisis management and reputation management. Social media helps in promoting products and services for the organization, thereby becoming a cost effective and efficient resource of marketing various products and services manufactured by the organization. It also helps in sharing information for consumption by press and stakeholders. This way a temptation for purchase of particular goods is aroused through discussions and advertisements on social media. Furthermore the social media helps in taking input and output information exchange. That is the feedback from consumers in the form of input and response to queries as output is retrieved from the social media information exchange process. This way stakeholder’s questions, queries, doubts and complaints are heard through this source. It also provides the platform for sharing updated information to the different stakeholders. This way during crisis management and reputation management social media acts as a platform for clarifying the stand of the organization and shares real information and answers customers queries so that their faith in the organization and its products can be maintained (Oribabor, 2009).It is therefore highly significant for the organizations of today to monitor content on social media sites including hash tags and other signs of internal as well as external dialogues. This is so because these social media hash tags leaves deep impressions on number of people who are members of the social media group. The hash tags and other information related to the organization therefore needs to be carefully monitored and scrutinized so that the source of information can be identified and dealt accordingly. Also the spread of false claims and inappropriate information flow can be controlled from spreading from the initial stage. The internal as well as external dialogues therefore need to be reviewed so that the best interest of the organization can be safeguarded (Koekemoer, 2005). To monitor the various information’s sharing process on the social media includes the following methods.
1. Collecting the information linked with the organization displayed on social media sources.
2. Analyzing the information and reviewing the contents.
3. Indexing various information’s under different headings.
4. Allowing the correct information to pass on, while the inappropriate is hold and removed.
The above information can be displayed as follows.
The crisis communication preparedness plans could address the proliferation of social media outlets by applying the Seeger’s best practice. This practice could help in applying the social media tools for scanning, reviewing and removing the information that are not appropriate for the best interest of the business. The various steps involved in the process of achieving crisis communication preparedness plans include the following best crisis communication practices.
1. Process approach and policy Development:A proper process approach and policy deployment is required to be devised so that the business could attain an effective stand on the social front for crisis and communication management.
2. Pre-event planning:The pre-defined and formulated method would therefore assure the best course of action that could give out the desired outcome of safety in handling crisis situation and communicating true picture to the customers using social media tools.
3. Partnership with the public:The development of partnership with the public through continuous updating of information using the social media tools could help in getting informed early about the inappropriate information spread about the organization. Also the source of informational be figured out easily and dealt with at the soonest. Finally the customers can be reached out through social media to clarify the stand of the company and give out the proper and clear outcome through information sharing process.
4. Listen to public’s concern and understand the audience:The method of listening to public’s concern and understanding the audience helps in keeping alignment with the expectations of the customers with the target goals of organization. This way the customer queries, thoughts, concerns, views, suggestions and complaints can all be informed by passing on the information to the concerned department helping them in reviewing decision making process and bringing the desired changes in the organization process.
5. Honesty, candor, and openness:The display of honesty, candor and openness can help the organization in achieving faith of the customers. These displays actually bring ahead transparency about business process followed on daily basis.
6. Collaborate and coordinate with credible sources: The collaboration and coordination with the credible sources can be achieved so that any issue rising on the social media front could be tackled wisely and instantly.
7. Meet the needs of the media and remain accessible:The social media could offer a consistent contact with customers. The daily updates will help in keeping the customers informed about the new product, quality standards and other measures of control applied at the work place. This way they can be made sure that the process followed in the organization is safe and secure.
8. Communicate with compassion, concern and empathy:The social media could help in communicating compassion concern and empathy which could help gain support of the people and thereby the inappropriate message would not be able to achieve any harm on the company.
9. Accept uncertainty and ambiguity:The organization can accept uncertainty and ambiguity as part of risk management so that it could review the situation and bring out the truth before the people so that the reality check can be applied.
10. Messages of self-efficacy:The organization could use messages of self-efficacy which could help the customers realize the real procedures and plans, skills, abilities and technological upgrades that are helping the organization achieve the standardized outcome for the consumption of customers (Khan, 2006).
Apart from the perspective of crisis communicators concerned with social media, Dominos could have done various other things to prove its messages were sincere includes the followings. This way the followings crisis triggers attributions of responsibility to the organization would have been taken ion consideration including the following three dimensions.
1. If the crisis has happened earlier or is likely to happen again.
2. If the crisis is controllable or uncontrollable by any other organization or individual.
3. If the crisis is occurring from internal or external source.
The other options that Domino’s had include the followings.
A. Making a police complaint.
B. Reporting the issue to the concerned authorities.
C. Calling for answer from the head of the restaurant in that particular region.
D. Removing the two employees with immediate effect and applying disciplinary action on them.
E. Requesting Google to stop sharing of the view and removing it.
F. Making a new video and linking it with old video that reveals the true statement and place ahead the culprits who confess their mistakes.
(Ghemawat, 2005)
The other types of traditional media and social media that the company would have used to reach its stakeholders include the followings.
A. Traditional media sources:The tradition media which could have been used to reach out to the maximum of customers include billboard, radio, newspaper, television and direct mail. These modes would have helped in reaching out to the customers who are living in remote areas. These traditional modes have access to every single home and therefore it could be expected that the number of customers reached through this method would be highly significant.
b. Social media sources:The present day online sources are called social media sources which includes, twitter, YouTube, what’s app, LinkedIn, Xing, face book, interest and others. These modes of new age communication actually help in reaching to maximum number of customers. The use of internet is so high these days that the people are using it on regular basis on daily basis. People of all ages are using internet through their smart phones that can give them access from any region, place or remote area. Therefore the use of social media sources other than just YouTube could have helped in gaining better access to the customers of the organization and clarifies their appropriate stand on the issue.Domino’s therefore could use both the above stated sources so that the customers in the remote regions and with lesser technological knowledge could be upgraded with the latest news and know how. These way efforts can be made to bring into alignment the information exchange to Domino’s customers based on different physical, behavioral and geographical locations (Duvall, 2009).
The other challenges that the PR practitioners, marketers and other corporate communicators would have in telling the truth in the digital age include the followings.
1. High stress:The PR practitioners have to face high stress work environment wherein efforts are required to convince different types of customers with varied demand and different thoughts. Therefore the stress is over to convince these different kinds of customers with the display of true statement which reveals the best course of action and most effective business proposition followed at the workplace.
2. Demanding pace:The demanding pace is the key to effective PR practice. The PR practitioners therefore have to display truth on different social websites and other source of information in this new age. This way the updates and upgrades of various information is required to be done by PR practitioner so that the demand for latest inputs, information exchange and solution to issues can be conveyed to the customers in different region.
3. Long hours of working:PR practitioner has to work for long working hours. During these hours he or she stay informed about what is actually happening around the external environment that may affect the business and long term sustenance of the organization. Therefore long working hours ensures that every single information is reviewed, diagnosed and allowed to move around only if it is relevant, otherwise appropriate action will be taken to remove them.
4. Rapidly shifting deadlines:PR practitioner has to achieve the desired outcome in limited time frame. However the need for rapidly shifting deadlines may be required so that the quality compromise can be avoided and the business process could follow swift movement in the changed environment that facilitates the movement of goods and services.
5. Taking care of messages:The PR manager has to take care of messages from different department. This way the departmental care and linkage is required to be obtained by PR practitioner so that the alignment in the efforts of the various departments and their associated human resource can be achieved.
6. Review of publicity and advertisement tactics:The review of publicity and advertisement tactics needs to be done by PR practitioner so that the business could follow the most appropriate method of availing popularity in the business process. The various publicity stunts and adverstiments are therefore reviewed so that they reveal the most effective outcome for the business.
7. Taking care of audience concerns:PR practitioner has to take full care of audience concerns so that the customer’s interests can be obliged and therefore value for money and customer satisfaction can be achieved.
8. Achieving public opinion:The achievement to public opinion is another factor that PR practitioner has to take as priority. The PR practitioner therefore has to respond to customer queries and deal with the viral videos creating unauthorized and ill thoughts about the company process. This way the PR practitioner has to bring back the faith and achieve alignment of customers towards positive views towards organization through public opinion.
9. Meeting up to the expectations:PR practitioner has to make sure that the customer expectations are met wisely. This way the customer needs, demand and expectations are all given due weight age in the decision making process so that the decision making could become more customer oriented.
This way the PR practitioner has to take into consideration various stakeholder attributions which can be summarized in the following four steps.
1. PR practitioner needs to observe the event carefully to understand the level of loss or aftermath that the organization may have to suffer.
2. The PR practitioner needs to interpret the information by checking for its relevancy and accuracy. This way the information retrieved is reviewed for its logical outcome that may affect the organization sales.
3. The PR practitioner needs to choose a strategy among various alternatives that could help in achieving the control over situation and bring a halt over progress of misconceptions and misleading statements through different online sources.
4. The PR practitioner applies the solution by selecting the most favorable alternative. After this the review of the decision is made by comparing the estimates with the real outcome.
5. This way the best practice and principles are applied through social media which helps in removing the misconception and misperceptions about organization products and services. This way not only the customers but the employees also needs to follow the proper course of action during their daily work without taking things for granted. The viral video of the two employees of DOMINO’S was actually the outcome of boredom and nuisance act. Therefore this happening should be taken as a task to remember so that the employee satisfaction and up gradation can be achieved at regular time so that the boredom and nuisance act of such kind could be avoided in near future (Coles, 2008).
The speed of response rate is very important in the digital world. That is, when the organization is facing crisis situation the need of response become vital so that the customers can be made aware of the truth and that the misconceptions and misperceptions can be removed at the earliest. The speed of response can be achieved by the organization by carefully going through the points stated in the viral video. Later the answer to the viral video through the same participants can help in gaining the true picture and help customers understand the non-reliability of the earlier video. That is in the case of DOMINO’S, the administration took serious note of the various issues and problems that rose out due to crisis situation. These problems were addressed and vital information sharing process was followed so that the business process could achieve the most desired outcome from the business operation and trust of the customers can be regained. In the present day context the speed of communication is faster which may lead to creation of crisis situation in a sudden manner. Therefore the proactive action needs to be devised and applied so that the business could respond to the crisis situation and give out the most effective outcome. In addition proper team of recruits specialized in dealing with the online issues are required to be deployed so that proactive actions can be taken to deal with the crisis situation. The various steps that can be followed while dealing with the crisis management plan include the followings.
Step 1. Identifying the risks.
Step 2. Risk avoidance
Step 3. Risk reduction
Step 4. Risk management
Step 5. Business continuity
The communications made by the DOMINO’S president Patrick Doyle through the apology statement on behalf of the two employees uploading the viral video about unhealthy making of pizza clearly depicts the power of media. The media upload made by the two employees worked as trigger to halt the sales of Domino’s and question its healthy activities in their kitchen. The topical issue therefore raised was the application of healthy process that should have been applied at the work place. But the same was not observed and hence the customers had doubts about the healthy outcome from the Domino’s pizza. However the strategic move made by the president of Dominos through new video uploads which clearly depicts the nuisance of the two employees and demonstrated an apology on their behalf. This way promise to the customers was deployed through online video so that their faith in the organization can be achieved and that the bad impression created by the employees could be removed.
The Joey’s quit video clearly depicts the depression of the employee namely Joey on the higher management which results in drums and beats in front of the higher manager revealing his depression and desire to convey the depression to the management. This way it is observed that the human resource needs to be clarified about the removal and the facts should be presented before taking any action of lay off. Page’s philosophy can also be applied n this case which could help managers in avoiding such cases in their organization.These methods include the following application of Page’s philosophy.
1. Tell the truth;Dominos can use the other media sources to tell the truth about the event that has been affecting the image of the company and quality outcome of its products and services. The use of newspaper, hoardings, pamphlets, programs and publications could have helped reach out to the target customers so that they can identify the true picture behind the viral video and should not take it seriously. This way the video outcome could be considered as attempts of the employees to showcase their nonsense humor and that has nothing to do with the compromising of quality of products in the regular business process.
2. Prove it with action;The company actually made real life attempts by proving into action. The Company officials made a new video in which the two convicted employees accepted their mistake of making false video just for the purpose of humor. Thereafter these employees were removed from their jobs and legal action was taken against them. This way the actions were taken to prove to customers that the video display was just a part of nuisance created by pair of employees.
3. Listen to the customer;The customers concerns were also listened through emails, feedbacks and complaint forms available on the website. These inputs were taken seriously and quick actions were taken to bring down the culprits under lawful consideration. The customer’s views, thoughts and concerns were obliged and appropriate response or feedback was issued.
4. Manage for tomorrow;The managing for tomorrow helped the company by displaying of various other messages. These messages include great concerns of the company in maintaining quality standards and assuring the best practice of health and safety followed in the regular business process.
5. Conduct public relations as if the whole company depends on it;The managing for tomorrow helped the company by displaying of various other The conduct of public relations as if the whole company depends on it, could help convey the people about the understanding that the organization has gained about the concerns, thoughts and expectations of the customers. Therefore making they assured that the health and safety measure are taken appropriately helps in gaining customer trust and confidence.
6. Realize a company’s true character is expressed by its people; and lastly,The company’s true character of caring about health and offering them with true picture of the real situation could have helped gained respect in the eyes of customers. This way the customers would have been informed about the process and procedures that are followed on regular basis to ensure quality output delivery to the customers.
7. Remain calm, patient and good-humored:The best method to deal with any kind of situation is remaining clam, patient and good humored. The company could have applied these methods also. The public interview of the chief executive officer clearly depicted that the company was displaying calm but spontaneous action over the issue. This way staying calm and patient about the existing situation helped the company in resolving the issue and displaying the truth later on.
The pizza turnaround camp gain depicted that the organization was observing all sort of healthy plans and procedures at the work place. The revelation of life kitchen work clearly depicted that the company followed all the health and safety guidelines so that the taste and health of the customers can be ascertained. Also effective advertising methods are applied so that the business could regain the trust in the business process of Domino’s. Hence the pizza turnaround campaign includes the followings.
1.Tweets made to attract, impress and tempt customers.
2.New online videos were made to display the kitchen process to the customers which is safe and healthy.
3.The best practice of pizza making was revealed which could help the customers get convinced with the best method deployed in pizza making.
A number of conclusions can be drawn from the incident.
1.Domino’s and other companies that are expanding in the global arena should take controls over the business process through effective and timely scrutiny. This way they would be able to control the working abilities of the human resource and avoid any such practices that could lead to loss to company of any kind
2.Domino’s and other companies need to apply strict guidelines through which health and safety measures can be applied effectively at the workplace.
3.Domino’s and other companies need to develop competitive abilities to deal with the online situations that could lead to rise of issues and problems. This way an effective plan of action needs to be developed so that the business could maintain its steady growth.
Cagno, E., Guido, M.J.L., Perotti, S. & Zorzini, M., 2011. The impact of green supply chain practices on company performance: The case of 3PLs. Lancaster University Management School Working Paper., 1(1), pp.1-31.
Cavusgil, T., Knight, G. & Riesenberger, J., 2014. International Business: Strategy, Management and the new realities. New Jersey: Princeton Hall.
Coles, T., 2008. International business and tourism: Global Issues, Contemporary Interactions. In F. Luthans & J. Doh, eds. International Management: Culture, Strategy and behavior. UK: Hodgetts.
Duvall, C.K., 2009. Developing individual freedom to act empowerment in the knowledge organization. Participation and Empowerment., pp.204-12.
Ferris, D. & Tagg, T., 1996. Academic Oral Communication Needs of EAP Learners: What Subject-Matter Instructors Actually Require. TESOL Quarterly, 30(1), pp.31-58.
Ghemawat, P., 2003. The Forgotten Strategy. Harvard Business Review, 81(11), pp.76-84.
Ghemawat, P., 2005. Regional Strategies for Global Leadership. Harvard Business Review, 83(12), pp.98-108.
Gill, S.K., 2002. International Communication: English Language Challenges for Malaysia. Jurnal Kementerian Pelajaran Malaysia, 12(34), pp.11-19.
Khan, H., 2006. Using strategy maps and the balanced scorecard effectively: The case of Manpower Australia. MGSM case studies in management, pp.1-22.
Koekemoer, L., 2005. Marketing Communication. Juta: Lansdowne, South Africa.. International Journal of Market Research, pp.47(4): 383-405..
Oribabor, P.E., 2009. Human Resource Management: A Strategic Approval. Human Resource Management, pp.9(4): 21-24.
Priem, R.L. &Butler, J.E., 2001. Is the Resource-based "View" a Useful Prespective for strategic managment research? Academy of Management Review., pp.26 (1) 22-40.
Samli, C.A., 1995. International consumer behavior: its impact on marketing strategy development. Quorum Books.
Tishman M., F., Looy Van, S. & Bruyere M., S., 2012. Employer Strategies for Responding to an Aging Workforce. Report. New Brunswick: National technical Assistance and Research Center The NTAR Leadership Center.
Tyler, J. & Chard, D.J., n.d. Focus on Inclusion: Using readers theatre to foster fluency in struggling readers: A twist on the repeated reading strategy.
Young, M., Dermody, M. & Taylor, S., 2004. Identifying job motivation factors of restaurant servers: insight for the development of effective recruitment and retention strategies. International Journal of Hospitality and Tourism Administration, pp.5(3), 1 - 14.
2 Reflection using Driscoll’s framework:
3 Conclusion
4 References:
I have been an undergraduate nurse working my PEP in hospital where I have been recruited with caring for a patient, Shelley suffering from lower lobe pneumonia and brain injury. She is regularly visited by her mother and her brother at an interval of three weeks. She has been in respite care after sustaining injury and is very much disturbed for her mother who lives interstate. Since Shelley has a tendency to wander off and has been found to leave the hospital premises and therefore been advised to be nursed in bed. Shelley screams when I enter the room and flatly refuses to take medication.
I have followed Driscoll’s reflective model and imbibed this model in producing a reflective analysis of the above scenario. Shelley is an independent woman who is very pleasant and cooperative. She at times is very anxious for her mother. When I have been asked her to confine her to her rooms, and close the door, she pleaded and screamed. She does not cooperate with me on the medication and I have been seriously tensed and unnerved on the situation. As I lack any previous experiences, I have had a difficult situation handling that matter. I am aware of her daily activities in the last three days, which also shed light on occasional promptness or assistance to require close supervision. Being on respite care, she hardly required any strict guidelines until she has left the hospital premises. I have been in dilemma when I have been advised to keep her to bed and put bed rails and close the door all the times. I have become confused due to moral factor, which influenced my decision making process. The whole situation has simply interpreted to me as since she is unable to take care of herself due to her medical condition, therefore, she is to be confined so that she cannot further depict any harm to herself and others. As cited by Crump et al. (2010, p.1180), The Working Group of Ethics Guidelines for Global health Training (WEIGHT) has developed a code of conduct and ethical issues for the trainees, nurses and institutions to educate them of current ethical issues. The nurses and trainees like me are to be trained of having mutual long term relationship with the organisations while keeping in mind the basics of ethical issues. The trainees should follow international guidelines. It is also referred that the potential nurses or trainees should follow the guidelines provided by the institutions to reduce any harm that can be implicated by some extreme patients. This guideline has also been used to maximise the potential benefits for the institutions. This has proved to be a tricky situation for me. I have been in a plight to choose between the ethical guidelines and the freedom that has been deprived of Shelley. She does not mean to harm any patient or people.She is very anxious and tensed for her mother who is only able to visit her once in three weeks. Though she has been admitted to hospital only for three days, I highly conflict on the matter to keep her in close confinements of her bed with rails and closed door. When I have been advised of such, I got into a conflict between following guidelines or offer freedom of choice to Shelley. She is mostly cooperative and has been under respite care however, since she has history of absconding from hospital premises, snatching her freedom would not solve the ethical issues. Since this is my first experience and I am devoid of any past experience as such and is puzzled by this situation. On the contrary, Haddad and Arabi (2012, p.1) argue that patients with brain injury should be kept under critical care. Patients suffering from brain injury are requested to be under severe protocols and remain under observations. Recommendations are made to adhere to guidelines provided by the institution. Therefore, this context has severely affected my responsibilities and ethics morals. On one hand, it would be severely unjust to confine Shelley to one room and put rails on the bed, while on contrary, citing to the above stated argument, she should be kept under strict observation and follow the rules laid down by the hospital authorities. This is further supported by Giacino et al. (2014, p.100), who suggest that patients who have recently suffered from acquired brain injury tend to have dissolution of consciousness. These patients are recommended to have proper treatment and care. In addition, such patients face problems communicating with word or gesture. This would prove difficult for patients such as Shelley to have proper communication with the surrounding people. In her case, she suffered an acquired brain injury while falling from her horse. I would also reflect that she has a tendency to wander into other patients’ rooms and even leave from hospital premises. Now, my concern is whether there can be an unexpected accident or she may become unconscious while roaming places. Last time a good Samaritan has come to her rescue and informed the police who on further notice accompanied her to the hospital again. However, I have doubts whether she would be safe and medically fit if is to roam free in accordance to the freedom and ethical issues she deserves. Such issues have grabbed my attention and challenged my morale regarding her ethical factors. It is also to be noted that there is no standards to the care that may be provided to patients suffering from acquired brain injury like that of Shelley. Even improper guidelines create an undetermined, inappropriate, inaccurate and inconsistent care. Since Shelley is suffering from both left lower lobe pneumonia which requires immense medical attention and acquired brain injury, she is a difficult case to handle. Since this is my first case, my inexperience is creating barriers in connecting ethical issues and organisational guidelines, which in overall is affecting proper care of Shelley. Patients like her require long-term intensive care since she is also suffering from pneumonia. This adds to set of problems she is already being taken care of. Coming back to the acquired brain challenge I would focus on the close proximity that ethics and AIB share. As per Monty et al. (2010, p.585), the conditions regarding such patients remain inadequate and is on constant encounter with the health system. They are unable to communicate though can still follow orders. Their condition is termed hopeless and beyond any help from the carers. Patients, such as Shelley, who is under close observation, face withdrawn care at some instances. Since they are unable to voice their opinions they often succumb to the confined structure they are marginalised. I would also reflect more on comprehensive care. Physical, emotional and cognitive systems and their interactions are seamlessly compromised on the basis of their medical condition. A serious condition that I have faced in this context that optimistic approach to their liberty is negotiated. I have felt that my duty of care needs to identify and take care of Shelley who is at risk to herself as well as to others because of her poor emotional and behavioural control. I am facing interdisciplinary conflict due to divergence in personal and professional values. The factor epistemology can be applied here which is defined as a distinction between justification of opinion and belief. There are few raised questions that I am despair to be answered. One such question is the ongoing conflict between the psychological and physical risk. According to the hospital authorities, physical safety is to be ensured even at the cost of personal despair. I would illustrate that ethical issues, such as the one related to Shelley, are rarely resolvable and fails to satisfy the patients and their families. However, Iacobucci et al. (2012, p.480) pointed out that ethical dilemma are common and increasing in the healthcare environments. I would rather focus on self esteem which endorses social values and play a transformative role in upgrading professional identity. Ethical decisions sometimes contradict and integrate with my professional and personal views. This has conflicted with my professionalism as well. Therefore, I would focus more on understanding the significance of self-esteem that plays role in professional growth. This professional growth would help me to take care of Shelley much better. Ethical dilemmas are a part of every nursing student throughout their careers as they face challenging situations where they are dragged into morale of ethics and legal procedures designed for the safety of the concerned patients.
Moral dilemma in healthcare is considerably increasing as new legal rules are applied on the patients to assure their safety. I have seen independent Shelley being advised to nursing in bed with closed door and raised up rails. Since she is suffering from severe medical cases and is at risk to herself as well as others, she cannot be provided with the freedom she deserves. However, I have considered ethical issues which have on some account contradicted with legal factors. I have come to conclusion that additional knowledge should be provided to the nurses so that they can overcome emotional distress and manage ethical decisions.
Crump, J.A., Sugarman, J. and Working Group on Ethics Guidelines for Global Health Training (WEIGHT). (2010). Ethics and best practice guidelines for training experiences in global health. The American Journal of Tropical Medicine and Hygiene, 83(6), pp.1178-1182. Giacino, J.T., Fins, J.J., Laureys, S. and Schiff, N.D., (2014). Disorders of consciousness after acquired brain injury: the state of the science. Nature Reviews Neurology, 10(2), pp.99-114. Haddad, S.H. and Arabi, Y.M., (2012). Critical care management of severe traumatic brain injury in adults. Scandinavian journal of trauma, resuscitation and emergency medicine, 20(1), p.1.
Iacobucci, T. A., Daly, B. J., Lindell, D., and Griffin, M. Q. (2012). Professional values, self-esteem, and ethical confidence of baccalaureate nursing students. Nursing Ethics. 20(4), pp.479-490. Monti, M.M., Vanhaudenhuyse, A., Coleman, M.R., Boly, M., Pickard, J.D., Tshibanda, L., Owen, A.M. and Laureys, S., (2010). Willful modulation of brain activity in disorders of consciousness. New England Journal of Medicine,362(7), pp.579-589.
1 Name:
2 Affiliation:
Molly's medical problem has influenced her life as it were. The ulcer has diminished portability. She feels torment when she strolls. Further to lessen the mending she has been encouraged to stay situated however much as could reasonably be expected. This has brought about Molly staying inside the house for more often than not keeping in mind in the house she stays situated more often than not. She doesn't cook as Pat does it. Since she can no more go out for get-togethers like knocking down some pins and in this way is denied meeting companions and relatives. This has psychologically affected Molly. Her problem has abandoned her exceptionally discouraged and sulky. She has gotten to be expanding peevish. Being situated more often than not, she would clearly put on more weight along these lines which would influence her diabetic problem too. She fights with Pat over little things and they feel that their conjugal relationship is beginning to endure as Pat discovers Molly hard to handle more often than not given her touchy nature.
The arrangement of medicinal services that depends on useful, logical and socially worthy techniques and innovation and which is accessible for everybody in the general public or the encompassing group, is characterized as essential human services. The framework is designed to the point that the expenses are reasonable in term of the confidence of the self determination of the locale or group or the nation (Finlayson, Edwards & Courtney, 2010). This arrangement of medicinal services concentrates on wellbeing treatment for all and adds to social strategy. The essential human services framework entitles Molly that she gets reasonable and great treatment for her ulcer. This was not a wellbeing problem that would require concentrated consideration or treatment. What she required was standard checking and cleaning of her injury. These are the fundamental comforts that are accessible and gave by the essential medicinal services framework.
Assuming the liability of one's own self and making a healthy lifestyle for one with a definitive objective to being the best individual one can be is called wellbeing (Moffatt, Doherty, Smithdale & Franks, 2010). The health model has six essential measurements in appreciation of how a man ought to be. The six measurement of wellbeing are the different circles of life where a man ought to deal with one's self and be upbeat and sound. These six circles are social, passionate, profound, ecological, word related, scholarly and physical wellbeing. Each of these circles associate with each other and have a co-connection with each different as additionally the general feeling of a man being 'admirably'.
There are a few standards of Wellness:
a) Wellness has an all-encompassing methodology where the attention is more on the improvement of a man's body brain and soul. This standard concentrates less on the substantial indications and accentuation on the individual being "great" in all parts of life. It is likewise acknowledged that wellbeing is a dynamic procedure.
b) A man ought to not just rely on upon others to accomplish great wellbeing. A man ought to additionally take activities without anyone else's input to settle the issues. This would incorporate instructing oneself about the issues and taking guidance and gain from the medicinal services counselor to take self-measures to stay well.
Molly has been experiencing an ulcer in the leg which has abandoned her practically fixed. This has made her crabby and discouraged. The wellbeing standard of all-encompassing methodology could be advanced for molly for her to stay mentally well in spite of her sickness and stay cheerful even with her hindrances (Nelson et al,. 2012). The rule of dynamic process of well too applies for Molly. Rather than setting off to the specialist's chamber three times each week for getting the ulcer dressed, she could figure out how to do it without anyone's help. Her specialist and human services work force could give her the imperative direction and do as such. She could likewise utilize writing and books to take in the process herself. This would permit her to know about her current problem and prepare her brain appropriately. This rule ought to additionally be connected to take care of the mental issues that Molly is confronting.
In the sort II diabetes, the body makes insulin however by and large, either the pancreas can't make enough insulin or the insulin made is not utilized all around ok. Sort II diabetes is likewise called insulin resistance. This problem does not permit the sugar to get into the cells yet rather gets put away in the blood and this causes numerous handicaps. Such problems influence the nerves and little veins in the eyes, kidney and the heart which can bring about heart assault and stroke. This problem additionally results in more pee and along these lines lost liquids from the body. In such a circumstance if the individual does not take enough liquids, the individual can slip into what is known as a diabetic trance like state (Nelson et al,. 2012). In Australia, it is evaluated that 100 individuals get diabetes consistently. The last overview directed in Australia guaranteed that 760,000 Australians have sort II diabetes. This number is assessed to achieve 35 million by 2030 given the present rate of diabetes development. Research into Type II diabetes in Australia demonstrates that indigenous Australians are three times more inclined to create sort II diabetes when contrasted and non-Indigenous Australians. Examines likewise demonstrate that more than 1.5 million Australians have created pre-diabetes manifestations and is more than liable to add to the illness. Legitimate and auspicious treatment can avert more than half of the pre-diabetes patients from creating diabetes in Australia
State Molly’s health problem you are discussingMolly has built up an ulcer in her cleared out leg. She goes for treatment and dressing to the nearby specialist three times each week. She has been encouraged to stay situated however much as could reasonably be expected with her cleared out leg up. Molly has been cut off from the general public and social events because of her this stationary nature and invests the majority of her energy either sitting in front of the TV or listening to the radio. This has abandoned her mentally aggravated and she has created serious crabbiness (Purwins et al,. 2010).
Explain the skill or behaviour she needs to learn or changeMolly could add to the ability to dress her own ulcer or wound. This would diminish the inconvenience of setting off to the specialist frequently. She can likewise know about her issues more. She can likewise figure out how to stay cheerful even in her present wellbeing problem and with restricted portability. She needs to create exercises that she can do even in the sitting position and maybe if conceivable be somewhat more social and pick events and exercises that permit her to stay situated for more often than not. This would take into consideration her injury to mend and in addition unwind her brain and decrease fractiousness.
Identify two other health professionals who could assist this client and explain how they could help.A specialist or a nurse can offer Molly some assistance with learning dressing her own injury. A specialist can exhortation Molly to stay rationally solid even in her present wellbeing problem. State two showing strategies you would utilize and quickly clarify how you would educate the customer. Showing techniques might incorporate clarification, aptitude exhibit or composing straightforward directions. Molly can figure out how to dress her injury either from a nurse or from books and articles and assets for the web. This technique for showing herself can be immediate or auxiliary. Molly can take the assistance of a therapist and take after his guidelines or she can utilize and read structure writing and restorative articles accessible in broad daylight area or the web.
Explain how each resource will help the client (remember that these need to be referenced in-text and included in your reference list!)It is important Molly should get the assistance of the nurse as well as get the help of other professional dealing on the same case. She is advised to get help from other sources such as the use of the internet as well as books and article online
(http://www.nhs.uk/Conditions/leg-ulcer-venous/Pages/treatment.aspx,2015). The following are the best sources online that she can be able to use to dress her wound as well as to treat or handle the problems that come with the wound:
1.2015). The following are the best sources online that she can be able to use to dress her wound as well as to treat or handle the problems that come with the wound:
2.www.webmd.boots.com/skin-problems-and-treatments/guide/leg-ulcers
On the other hand, she can also be able to read the diabetes problem from the internet. She should be able to get various online content on the same via the following http://www.nhs.uk/Conditions/Diabetes-type2/Pages/Treatment.aspx, 2016)
a How would you as an enrolled nurse support her husband through the initial grief and bereavement process?As a professional nurse, helping the lamenting spouse would basically include helping the individual mentally. There are a few stages that one ought to take after like letting the spouse the wife however the issue ought not be constrained, giving the spouse a chance to shout out his despondency and acquire alleviation accordingly, be pleasing if the spouse gets irate or bad tempered and be useful in such a circumstance, attempt and not raise the matter of the wife's passing and attempt and connect with the spouse in exercises that would keep him occupied (Törnvall & Wilhelmsson, 2010). Nonetheless if the circumstance is goes out hand the nurse, in counsel with a specialist, can offer pharmaceuticals to unwind to the spouse. The nurse ought to likewise be perceptive about existing wellbeing issues of the spouse that could be influenced by the lamenting.
1. Name one resource or support service you could recommend to this grieving spouse. Again please include actual website addresses or community program names. The following link offers the best sources of information on grieving partners or spouses that can offer help (http://www.helpguide.org/articles/grief-loss/supporting-a-grieving-person.htm , 2016 and http://www.focusonthefamily.com/lifechallenges/emotional-health/coping-with-death-and-grief/helping-loved-ones-grieve, 2016)
Molly's problem was treatable and she could or a medicinal professional could help her treat her mental issues. This would have offered her some assistance with getting on all the more effortlessly with life and lessen the anxiety of her life. She could have additionally figured out how to dress her injury and dispose of the need to frequently visit the specialist. Molly or Pat could have utilized the data accessible for both of the above from the nearby library or the web or both.
Finlayson, K., Edwards, H., & Courtney, M. (2010). The impact of psychosocial factors on adherence to compression therapy to prevent recurrence of venous leg ulcers. Journal of clinical nursing, 19(9‐10), 1289-1297.
Moffatt, C. J., Doherty, D. C., Smithdale, R., & Franks, P. J. (2010). Clinical predictors of leg ulcer healing. British Journal of Dermatology, 162(1), 51-58.
Nelson, E. A., Bell-Syer, S. E., Cullum, N. A., & Webster, J. (2012). Compression for preventing recurrence of venous ulcers. Cochrane Database Syst Rev, 4(CD002303).
Purwins, S., Herberger, K., Debus, E. S., Rustenbach, S. J., Pelzer, P., Rabe, E., ... & Augustin, M. (2010). Cost‐of‐illness of chronic leg ulcers in Germany. International wound journal, 7(2), 97-102.
Törnvall, E., & Wilhelmsson, S. (2010). Quality of nursing care from the perspective of patients with leg ulcers. Journal of wound care, 19(9).
The use of Actor-Network theory is gaining use in the contemporary world. There are various issues that the theory is able to offer in the Information technology industry especially the computing section of the industry. The research considers that the theory is of great help as a tools or apparatus for data systems as well as in the research of computing by offering value to Actor-Network theory graphical analysis and interpretation of the current trends that exist in the industry. In this research, the use of graphical analysis of the same is outlined in order to explain the conceptualism of the theory at stake (Cresswell, Worth & Sheikh, 2010). It is also evident that there are various issues in computing industry especially in cloud and data computing that the theory plays a vital role. There are various merits as well as demerits that come with the use of the theory in the industry. First, the theory is able to offer the needed explanation on the gaps that exist when it comes to today’s computing among others that are at stake. The value for money when it comes to integration of cloud computing for example, in organization is one of the key players that the industry offers to today’s clients. This is considered as a merits when it comes to the use of Actor-Network theory.
It is clear that the founder or the pioneer of Actor-Network theory are Latour, Callon and Law. This was done between 1978 and 1982 (Cresswell, Worth & Sheikh, 2010). The study was first supported with various field such as human science and computing fields, however, steps have been made to include others sectors of fields such as data systems analysis. Generally, the theory is there as a constructivist methodology because it tries to avoid the explanations that exist in contemporary technology, innovations as well as events. For example, it explains the success of the theory by comprehending and understanding the interactions and combinations of all the elements that are able to make it a success rather than stating if it is true of false. Besides, it is different from other STS theories due to its material semiotic approach. It is clear that the theory is able to offer the needs answers to the gaps that exist in literature. The actants ate able to explain how computing can be mended to offer reliable solutions that the world needs today from medical, agricultural among all the others sectors that calls of computing to function properly.
Actor-network theory, is considered a theory that is made up of elements mostly known as actants. It also has a connection between those elements in order to form a conclusive chain of support that is rendered beneficial in the field of cloud computing. As part of the theory, it makes a better side to be used in computing research (Fenwick & Edwards, 2010). The world of computers is considered a huge area that needs to be divided into smaller parts that can be used to explain the value of the same in the industry. The use of the theory explains that the elements of it offer a reasonable answer to how the computing world is able to meets its needs and demands in the world to come. Since computing research seems to worry many, it is clear that there is considerable analysis on the same if Actor-network theory is going to be used. The theory is able to divide the generation aspects of introduction to computers in three stages. Past, current and future. This means that Actor-network theory is also able to explain the gap in literature that is able to denote how computing as an industry is able to be transformed to a better one for future use (Cresswell, Worth & Sheikh, 2010).
On the other hand, the software and hardware actants offer reliable connection between each other a way in which it helps explains the tenants of computing. There is no elaborate explanation on the best way to manage the issues that are handy when it comes to delivery of services in the computing industry. Without the help of hardware aspects of Actor-network theory, the world cannot be able to denote the real answer to the vast computing industry or sector (Díaz Andrade & Urquhart, 2010). For example, the medical industry calls of better computing technologies to be able to offer healthcare services to the people especially in this modern world, but this hardware cannot undertake the role without software such as expertise among others.
With reference to ontology everything whether human or nonhuman remains isolated as a substance as genuine as the following. Everything should be considerd as a whole and nothing should be considered as an insignificant part of a greater substance. The present day target outer reality and prejudiced human personality is ended by this thought.
Consideration must be given to all actors and not just act as a broker whose purpose is to pass on an impact of one element to another without influencing it. These actors can be computing, human or even immaterial .
In the actor network theory which is occasionally referred to as the humanism of interpretation actors can be unified. This alliance is explained better by comparing it with dialect interpretation. Seeing each other is compulsory for two actors to be in a relationship. Interpretation is basically about one of the actors trying to make itself justifiable to the other actor with reference to the how the other actor is making its case. The disadvantage about interpretation is that sometimes a few notions might lose meaning since they might receive similar understanding. The revelation of Feldman and Pentland is that interpretation is the way in which thoughts are utilized and items change beginning with one connection going onti the next while that of Yoo is that it is a method to focus on insufficient and unsatisfactory clarifications, opposing understandings and clashing employments who regards it to be very important in her assessment.
Extending the core syntax Communication of the complex actor-network theory is doable through mixture of the basic network theory builds in the structure of the centre language. Diverse actors taking interest in solid connections is a good example of the idea of a black box. The open threshold of the structure of language can anyway be expanded by graphical documents that are direct giving expanded adjustment in addition to more concise models of graphs. .A documentation to mean actors acting at a separation and one showing secret elements are expansions recommended for this write.
A sequence of events which is the second viewpoint of the actor-network theory is also required. A fundamental issue in disconnection such as a sole graphical actor network theory model seeming static should be considered before the structure of linguistics and its expansions can be shown. The varying nature of the actor network theory gets to be recognizable when in connection to different models. The circumstance of the substitute models could be similar or shown from different perspectives or by different specialists. The actor network theory is not influenced by experience scene.
In the public arena today, individuals can't envision their lives without the utilization of computing. Different innovations are peopling to experience their lives extravagantly. In any case, with more extravagances comes the contrary impacts computing has on individuals and society in general. In spite of the fact that computing has put a man on the moon, the abuse of these new gadgets could conceivably bring about a wedge to divide people and the outside world. While computing is giving numerous preferences, there are likewise a few drawbacks to being breakthrough with the most recent computing (Gao, 2015). For one thing, computing has made life less demanding. In the therapeutic field, specialists and medical caretakers need to get data about patients brisk and simple. Computing has possessed the capacity to give quicker and more exact results. Having the capacity to get to patient's records by a tick of a catch is to me, the most imperative progression in computing (Fenwick & Edwards, 2010). Another preferred standpoint in the therapeutic field is for individuals with diabetes. With the headway in computing, individuals are presently ready to get exact blood glucose level readings from home. This decreases the danger of confusions with diabetes, for example, visual impairment and fringe nerve harm (Gao, 2015).
It can be concluded that Actor-Network theory is one of the ways that computing is able to gain a needed understanding in the world today. The gaps that exist in literature can be able to be explained with the use of Actor-Network theory actants in various ways. The ability to make sure that computing attains its full potentials can be explained with a better explanation of the elements of Actor-Network theory. This means that Actor-Network theory is very vital in computing as the two have a mutual relationship.
Cresswell, K. M., Worth, A., & Sheikh, A. 2010. Actor-Network Theory and its role in understanding the implementation of information technology developments in healthcare. BMC medical informatics and decision making, 10(1), 1.
Díaz Andrade, A., & Urquhart, C. 2010. The affordances of actor network theory in ICT for development research. Information Technology & People, 23(4), 352-374.
Fenwick, T., & Edwards, R. 2010. Actor-network theory in education. Routledge.Gao, P. 2015. Using actor‐network theory to analyse strategy formulation. Information Systems Journal, 15(3), 255-275.
Yoo, Y. 2010. Computing in everyday life: A call for research on experiential computing. Mis Quarterly, 213-231.
2 Executive Summary:
3 Review of the project:
4 Security posture review:
5 Technical Risk assessment:
5.1 Threats:
5.2 Vulnerabilities:
5.3 Consequences:
6 :Data security and allied risk
7 : Conclusion
8 Reference List:
This specific study is dedicated with an aim to understand the basic concepts of risk assessment specifically in information technology (IT) domain. A professional from the organisation Aztek will assess the related risk in a specific IT project. The IT project is about the automated fault tracking system. During the course of study the professional from the organisation Aztek will analyse the associated risk in completion of the project related to “Automation of fault detection and tracking system”. Generally the IT projects are associated with various types of technological risks. The most important prerequisite of this system is not to install or connect any personal laptop or mobile devices. Prevention of the risk of data compromising it is the basic need of the system. Hence, the researcher will evaluate the various types and also provide suitable recommendation in order to minimise the risks in this brief opportunity of study.
As per the above discussion, it can be evidently mentioned that this specific IT risk assessment project is mainly focused on the specific IT project regarding the “Automated fault tracking system” Fault and error are the kinds of hazards which will always come along with the advancement and development. It is impossible to learn anything without doing any mistakes. Errors are the basic learning stages which enable the learner to inculcate the process in a sustainable way. Errors are the learning tool for the intelligent. Hence, it is obvious that error will occur in the developmental stage, but it is also important that the error must be tracked and resolute in order to complete the cycle of learning. Computational methods are not exception of this rule. There are many errors can block the way of developing a new project. It is required that the system should analyse the error and detect it in order to resolute it. This specific project is based upon the automation in the process of fault detection. In computational language it can be referred as bug detection.Proper detection of the errors is equally important as the solution. Proper detection can save time and energy which could have been misused because of improper selection of the area of fault. Hence, this is also similar for an organisation level as well. In organisations manager and senior managers strive to find out the resolution of a problem which has been identified. The problem actually becomes enigmatic when the probable source of error is unknown. Similarly the computational systems are also following the same process. With the command of analysing the problem, the system tries to analyse the entire associated aspects and modules, in order to fix it. The specific project will consider the automation of the fault tracking system. There are several problems which are associated with the automation process. It includes the proper monitoring system which will analyse each step to identify the source of error. Improper command related issues which can direct the system into wrong pathway which in terms will detect the improper problems. Data security and accessibility can also be another aspect of this problem. Hence to overcome these impediments the researcher will analyse the each possible step and will provide specific resolution.
Another aspect of this study is the utilisation of cloud based module in the project. In Australia the potential of the cloud based computational module is expected to grow in the next five years in an exponential growth. The total revenue generated from the cloud business is expected to touch $ 1.24 billion by the year 2020. With an aim to prevent data piracy and curb the associated practices, the government of Australia has implemented Privacy Amendment Act 2012. Thus, it can be aptly mentioned that the government is striving to enforce rules and regulations in the technological segment to protect the authority of the private data. As it has been mentioned earlier, the cloud based model has brought some allied risk related to data security along with its arrival. In this brief opportunity of the study the analyst will discuss the implication of cloud computing along with personal devices like mobile, laptop and tabs in the workplace. Allowing the employees to bring their own electronic gadgets can put the IT organisation into a big threat. The analyst will discuss this approach in detail in the risk assessment section. The researcher will also provide the verification of the findings and issues in terms of generating appropriate solutions. These solutions may include the correlation established by the researcher with some established models and theories. Apart from correlating the theories and modules the researcher will also try to develop in depth understanding about the automation process of tracking. Technical risk associated in this specific project will properly addressed by the researcher in due course of study. Recommendation may also include the usage of several advanced technical method of storage and retrieval of data through cloud as well. The security related issues of the cloud computational model also be considered by the researcher in due course of study.
This specific project has an aim to follow the process of automation in fault detection and tracking. The researcher will be observing this process into details and will strive to come up with the solutions for associated problems in due course of study.
As opined by Asveld & Roeser (2012), innovation in technological domain is the driver of major efficiency in the financial sector and services. In the present situation the advent of online payment methods and transaction has revolutionised the pace of economic cycle. Hence the security related risks in financial management domain has increased as well. For this reason the government has also enforced new rules and regulations regarding the financial system security. For example s12DL which has been enforced the Australian government in Australian Securities and Investment Commission Act 2001 (Fsi.gov.au, 2015). This act prohibits the banks or financial organization to issue unsolicited credit cards through which online transactions can be made. When the law was first drafted the unforeseen consequences was not in the consideration. With the time the government has changed the regulations accordingly to stop cyber crimes. Apart from that the organizations also required to put stringent guidelines about bringing personal gadgets like mobile, laptop and tabs in the workplace as this can pose threats to the confidentialities of the organisation.
According to Earle (2012), in the present times with growing incidents of unauthorized transactions and related crimes are taking place due to improper tracking of associated risks. The government, regulators, investors and the general people, everybody is under threat due to the enhancement of cyber crime. Hence government has put considerable efforts in detecting the source of problems and to find out the challenges in data security. As per the preliminary assessment made by the federal and state based legislative body, it is important to use specific form of the technology to curb the rate of crimes in financial domain. Beroggi & Wallace (2012) opines that the government has already changed and enforced several old laws into new pattern with specific amendments. For example, the Victorian transfer of Land Act 1958 has been amended with required changes in 2009 to facilitate the online transaction and transfer of authority of a specific land. The federal level the chapter 7 of Corporation Act 2001 has also been amended with required changes in 2009 (Fsi.gov.au, 2015).
Apart from that government has decided to enforce newer regulations after consulting the industrial sector which facing the trouble at the initial level. One of the newly introduced act is Electronic Transaction Regulations (ETR) 2000 which enables the organisations to provide secured transaction method and guarantees data security in order to maintain pristine business environment (Fsi.gov.au, 2015). These all have been amended with a specific reason to solve out the technological challenges in several related provisions. McManus (2012) opines that in the near future the segmentation of the financial services will become more intricate. Hence, the government is also planning to bring new laws to protect the financial management over internet. The approach which is being considered by the government at the present situation is the neutralization of technology framework. Technology specific rules and regulations are yet to come in this segment. That will be a commendable approach taken by the government. Hence, the “Automation of fault detection and tracking” will play a crucial role in providing security to the organisations and their customers as well. As opined by Edwards & Bowen (2013), proper detection of error will lead to the root problem of any transactions or related process. The generation of technology based e-payment code can be another approach to help the customers to have a more secured payment procedure. As opined by Leiss (2012), international transactions are also having a greater curve in present days. Thus, the international regulations are also required to maintain the cross border jurisdiction. Otherwise technology related risks may jeopardize the international transactions which can serve as the basis of the loss incurred by the global economy. The “Automation of fault detection and tracking system” will enable the proper monitoring of the entire process. This approach will also help to minimise the technological risks related hazards in due time. Thus, the organisation Aztek has taken up the project. In the latter sections, the associated technological risks with this project will be analysed by the risk analyst of Aztek. Risk from personal devices like mobile, laptop and tabs in the workplace will also be analysed by the analyst. These devices can pose threat to the organisation while logging into the cloud is possible through single encryption. Thus, the detail assessment of the risks will be analysed in the risk assessment section.
As per the situation, the organisation Aztek is on the verge of developing this new project of “Automation of fault detection and tracking system”. Hence, as the team lead of technological risk assessment division of the company, the researcher will analyse the associated risks in developing such a project. With the help of Security Posture Assessment (SPA) tool various associated risks could be classify accordingly. SPA can also be referred to the process of security audit and reviewing system. According to the views of Mobey & Parker (2012), the technology is upgrading itself at a tremendous speed organisations cannot remain stagnant without upgradation. Hence the SPA can help to analyse the risks associated with upgradation and stagnancy as well. Through the SPA analysis the risk analyst of Aztek will be able to provide better recommendation to mitigate the problems and allied risks as well.
There are several risks are there which are closely associated with the project. It can be classified into various verticals. It involves the following parameters:
Risk related to Vulnerabilities: Automation in tracking system can expose the internal data of the Aztek without the hierarchical segregation. It will create the vulnerable situation about the confidential data. As this the inclusion of the automated system will require upgradation of the available data. As opined by Boutellier & Heinzen (2014), this reason can make the data vulnerable. Hence this may be a great risk in terms of organisational confidentiality. Apart from data related problem, system information is the other concern in terms of vulnerability. Automated system for detection of faults needs to have the access over the every area of operation. Hence, it has a quite possible chance that the system information can be compromised as far as the ethical misconducts are concerned.
Risk related to penetration: Penetration of the automated system into the existing system can cause severe problems. As opined by Allman (2012), improper integration can lead to a disruptive system. It is important to integrate the existing system or the flow of information in accordance with the new developments. In order to maintain a well organised working module, integration of the wireless technology and data services must be ensured with proper security. According to Oikonomou, Brooks & Pavelin (2012), if not properly maintained, wireless network are the most easily penetrable area to hack the system information.
Server configuration risk: In order to create an integrated system, the new project related system must be integrated with the existing one. The most important prerequisite of this system is no external device should be entertained within the network. That indicates no personal mobile, computer, laptops and tabs cannot be connected with the system. Otherwise the data security may be compromised. According to the views of Chapman (2013), this can lead to corruption of the main server which is a disastrous situation. Therefore, it can be aptly mentioned that the installation of the newer system into the existing one involves the risk of mal-handling of the server.
Optimisation of the system: Optimisation of the entire system as per the recent requirement of the newly installed platform is another challenge which also involves high risk. According to Alhawari et al. (2012), functional activities are directly proportional to the optimal integration of the available resources. Improperly optimised system can enhance the risk of security breaching. Thus proper optimisation is required which sometime may seem very tough to achieve. In this specific case of Aztek, the optimisation is highly recommended as because the system information is on the same network. Hence, without proper optimisation this platform should not be used within the organisation.
Security audit at international standards: As far as the international standards are concerned to create a new and viable project and to make it economically feasible one, the project need to meet international standards. As opined by Ledenyov & Ledenyov (2012), in the era of globalisation the whole world has become a global village. It has eroded the economical boundaries to certain extent. Hence, in the present time every product is required to maintain global standards in order to make it acceptable at the global level. Marinating international standards are prerequisite for that. In order to survive the international standards audits the firewall of the new system is required to be tougher enough as far as the virus related problems are concerned. As opined by Chen et al. (2012), “Automated fault detection and tracking system” with an average level of firewall can increase the chances of the penetration by the virus into the system. Thus, meeting international standards will be a real tough nut to crack
Risk related to DNSSEC system installation: Domain Name System Security Extension (DNSSEC) is the systems which have the aim to resolve the client’s problem related to forgery in DNS data. This system is required to be installed within the “Automated fault tracking system” platform. It will enable the system to have the facility of internal mailing and communication without revealing the data into the public. This system will also enable the user to create on board secure key generation along with on board key storage. According to the views of Stolfo, Salem & Keromytis (2012), DNSSC system can be installed in to the system but it requires utmost attention of the technical expert. Otherwise DNS system can erase all the existing information along with stored factual details of the organisation. Apart from that the external devices must be prohibited from logged into the main server.
These are all the system integration related risks are associated with the new project of“Automated fault detection and tracking system”. In order to create a full proof operational platform with an aim to auto detection of error, the above mentioned parameters requires a closer monitoring. As mentioned earlier, to run the system with proper functionalities, booting of external devices like laptops, mobile and tabs must be prohibited.
Figure 1: Security posture review(Source: Sood, 2012, p.1833)
As opined by Chapman (2013), without integration of the proper technological advancement, no organisation can enhance their performance to the apex. Hence it is important to incorporate technological advancement into the business process. Incorporation of technology has an array of benefits but, besides having benefits it has some associated risks as well. The aim of the incorporation of technology is reduction of the manual process and increase the systematic working procedure into the organisation. As opined by Leiss (2012), reduction of manual interference is good for a business operation but, the increase of automation actually rises the situation where the single intervention is enough to resolute or create a problem as well. Thus the proper assessment summarized risks are required to be analysed by the professional analyst.
The assessments of the technological risks are important from the business point of view. These risks can be classified into four different verticals:
Technicalities in financial reporting risks:Incorporation of the technological aspects into the business involves the automation of the financial reporting system. The financials of the organisation is key aspect. It is required to be updated at a regular and minimum interval to visualise the organisational situation. Hence the automation is required. Therefore, the incorporation of the “Automated fault detection and tracking system” will be helpful in analysing the errors and to create an accurate depiction of the financial situation. The risk which is associated into this system is the fault in error detection. As per the view of McManus (2012), if the error detection is not done properly the system may show the wrong data which can impact the business related key decisions. Hence it is important to closely monitor the associated risks in financial reporting.
Technicalities in business process related risks:Business process related risks are mainly the monitoring and reporting related threats. Improper monitoring by the system will generate reports with faults. Improper reports may impede the business decisions. Thus proper reporting is required and the proper monitoring of the technical end in terms of report generation is another considerable aspect.
Technicalities in compliance risks:Automated systems must comply with the industry related stringent governmental rules and regulation. For example, It companies in Australia must comply with the Privacy Amendment Act 2012 (Efa.org.au, 2015). Thus the technical system requires having the guideline related data within the system for proper compliance. However the improper monitoring of the compliance related guidelines can bring the possible legal issues for the company which is not at all required.
Technicalities in security and privacy risks:As opined by Allman (2012), the automation in process and over indulgence of technology is not good for organisational health. However in present days it is not possible to avoid the interference of the technology in order to keep pace with the market. Incorporation of technology involves shared hierarchy in data accession. That may lead to several risks like compromising the data security. Apart from this the encryption related problems are considerable threats in an organisation. Single encryption access given by the cloud technology is the best example of this problem. Single encryption means angle authorisation which may cause decisional problems in the organisation. Hence it is very important to measure the technology related risks and resolute accordingly.
External device related risks:The prerequisite of this specific project of the “Automated fault detection and tracking system”, no external devices and personal gadgets should not have access to the system. Employees must be restrained from bringing in the personal laptops, mobiles, tabs into the connection of the internal system of the organisation. As opined by Mobey & Parker (2012), these external devices may lead to data hacking and other problems in due course of time. Hence, external devices are required to be prohibited in to the organisation in order to reduce the risks.
Figure 2: Technical threats in business(Source: Von Schomberg, 2012, p.194)
Due to the above mentioned threats the organisation can be vulnerable to the related circumstances. The organisation is required to maintain the ethical guidelines in order to lower the rate of vulnerability. This can be achieved through, recruiting experienced professionals in the various departments and proper risk analysis by the expert. As opined by Jacob (2012), legal compliances are also required in order to avoid unnecessary legalities. Emerging as a successful organisation in this present arena of global business, it is important to monitor every possible aspects of business and to minimize the situation which is vulnerable. As per the view of Barrieu et al. (2012), vulnerable areas can be taken into consideration as the area of improvements rather than considering them as the weak point. If analysed and monitored properly, today’s pain can become the tomorrow’s gain. The possible vulnerable areas of this specific project “Automated fault detection and tracking system” are: Proper installation: Without proper installation, system will not work at the optimised level. Proper optimization is also required in order to exploit the full functionalities of the platform.
Rigorous training for the employees:As opined by Glickman & Gough (2013), when a newer system is being installed into the organisational process, proper training of the employees are a rudimentary requirement. Without proper training the employees may not be able to comply with the automated system. This may lead to the situations which will involve various system related errors.
Cost effectiveness:The installation of the newer system into the organisation may involve several costs. Among those cost the installation cost is the primary one. While trying to maintain a cost effective situation in an organisation in order to leverage the maximum benefits, the organisational operation cost should be a considerable aspect. Thus, to make the system cost effective, newer professional approaches are required to be taken that will cut down the cost from other sections.
Maintenance at regular interval:Technological system engineers are required to be hired to maintain the system properly. Bugs are required to be fixed at regular intervals. Caches are needed to be cleared out to run the system with optimum speed. Besides fixing these problems, system engineers are required to develop modifications into the system as per the organisational requirements.
As opined by Von Schomberg (2012), every possible sequence will have a consequence as well. Here in this project of “Automated fault detection and tracking system”,the consequences may be good or bad depending on the approach to handle the vulnerabilities. If those weak areas are properly monitored and worked accordingly, the consequence will bring the success. If not, those will be areas of penetration by the competitors. Hence the system must be installed properly to avoid the mal-functioning. Employees required a good training to grasp the subjective and functional knowledge about the system. Otherwise an incorporation of faulty system along with poor comprehension about the process can lead to devastation of the organisation. This may incur huge losses as well. In order to minimise those related hazards, proper adherence to the functional guidelines along with perfect risk analysis is required.
As opined by Mohamed et al. (2012), in order to create a secure network with all the associated data a single platform must be used to minimize the hazards. The single system which will store and provide the data as per the retrieval requirement is required to be installed along the new system. The cloud storage can solve the problem of data storage and retrieval. “Automated fault detection and tracking system” is required to be developed in accordance with the cloud storage. The cloud storage will enable the organisation to store the enormous volume of data through cloud over internet while minimising the organisational operating cost. Whenever the automated error tracking system will be applied to check the process it will require data. Cloud can provide the opportunity to retrieve the data regardless of physical location of the user. Hence cloud is the best possible approach to simulate the data flow along with automated checking procedure. Besides having various benefits of the cloud storage there are some allied risk with the data security related issues in cloud as well. The security related issues are discussed below:
Data Breaches: Sood (2012) opines that the specific system in cloud enables the user to encrypt the data. The problem of this specific attribute is, if any user looses the encryption key, no other back up is being provided by the cloud system. As per the expert’s view, this feature has been developed by cloud to provide the security. In spite of encryption related feature, the cloud data in public cloud are not secured. With efficiency in hacking the data can be retrieved without the permission of the user. As opined by Neely et al. (2014), actually cloud does not provide the authorisation to verify the data security. Hence it increases the chances of data breaching. In this specific case the “Automated fault detection and tracking system” project needs a close association with the cloud storage. Now, if the cloud does not provide any kind perfect data security then associated firewall of the new system will also become vulnerable. Eventually the whole organisational data of Aztek will be at stake.
Data loss: The data which are been stored in the cloud does not have any provision to keep a separate copy within the system. Therefore due to any catastrophic situation, if any data loss occurred by the cloud service provider itself, then there is no chances are there to compensate the loss. As opined by Patil et al. (2012), no back up is the worst problem in cloud storage. This situation can have a great impact on the organisational level.
Account hijacking: In the present time in-spite of various approaches other attacking methods are still in the use by the account hijackers. It includes activities like phishing, fraud, and exploration of software Some credentials and passwords for the accounts are reused severely, hence this makes the process easier and make the system vulnerable towards criminal activity like account hijacking. As opined by Jacob (2012), no cloud service provider provides any kind of security related clause on the written agreement, as it is well known that cloud can be breached.
Insecure APIs: Cloud has several layers of application (SaaS, PaaS and IaaS). Depending on the user requirement it can be exploited by the user. These layers can be used and changed as well as per the requirement of the user through their portal. The problems in these layers are associated with the changeable attributes. As it has been mentioned that the layer can be changed as per the requirement, it is also possible for a hacker to hack the organisational data by just manipulating the layers as well. Hence this is the other challenge of the cloud related storage. In this specific case of implementation of the “Automated fault detection and tracking system” by Aztek can pose severe threat if the layers are unsecured. As opined by Barrieu et al. (2012), the organisational data can be breached through the manipulation of the layers, where the detection system and firewall will not work as well.
Denial of service: This can be referred to the threats related system related errors or the slowing down of the process. Denial of service involves the sudden pause in a running system which inhibits the user to access their encrypted data from cloud. As per the user opinion this was not an initial problem in the cloud. Since 2013 it has suddenly appears a s threat to the users of every level. As opined by Taylor, Artman & Woelfer (2012), this may be due to the over load of the data into the system. Hence, during the working procedure of the “Automated fault detection and tracking system” denial of service can give rise to another fault as well. Thus, the system may not work properly and may require booting again. This can lead to data loss as well.
Malicious Insiders: This threat is specifically related to the ethical issues. As it has been mentioned earlier that cloud has single encryption system for the data security purpose, hierarchical management cannot be done through cloud as well. Hence it is possible that, the cloud service accessing administrator of a company can become malicious insider as the single encryption is known to the administrator only. Then the system admin can access and retrieve the sensitive company related data even after leaving the organisation. According to Michalski (2013), this can be a serious issue for the organisational security as well. This specific problem can be solved through the dual security encryption measures which are yet to come as attribute in cloud. Though as per the users opinion this threat has been subsided in present days by keeping the system administration to the owner of the organisation level, but this not a good option for international business where many country head works independently.
Abuse of cloud service: The cloud based computational system has provides the small organisation the power to use thousands of servers for which the organisation is required pay the rents. They do not have to buy the servers which involve a huge cost. As per the opinion of Leppälä, Murtonen & Kauranen (2012), this may become a threat to the organisation. When the organisation is using their own limited server then encryption may be tough be hacked but, using the cloud based server which are shared by various user which can be hacked through a specific code as well. This can be a serious threat to the organisation.
Insufficient due diligence: in present time many of the small organisations are trying install cloud based computational model into the organisation with a promise to cost cut. Proper comprehension about the cloud modules are required in order to utilise the cloud computing. As opined by Valitov & Sirazetdinova (2014), without proper comprehension of cloud models users may invite various associated risks unknowingly. Hence the project “Automated fault detection and tracking system” of Aztek may also invite some related risk without proper comprehension of cloud. Thus proper training and expert opinion is required to utilise the cloud computing in a proper way.
Shared Technology issues: Cloud computing possess the multi tenant model for their three different layers. It refers to the sharing of the server, layers and modules as well. Hence the shared technology can lead to the risk of sharing confidential information. As opined by Alhawari et al. (2012), without proper defensive mechanism the usage of cloud can enhance the vulnerabilities of the organisation and severe configuration problems.
Figure 3: Data security and allied risk(Source: Valitov & Sirazetdinova, 2014, p.77)
At the concluding note it can be aptly mentioned that the risk analyst of Aztek, has analysed the various aspects related to technical risk in this study. The analysis has been done in an extensive manner. The financial reporting related risks and technical risks has been analysed thoroughly to comprehend the labyrinths of the associated risks. In this brief opportunity the analyst has considered every possible technical risk related to the project of “Automated fault detection and tracking system”. The special consideration about the external devices like personal laptops and tabs has also been mentioned by the analyst in order to minimize the related risks of internal data breaching. In final conclusion it can be adverted that the technical risks of this project has been analysed successfully by the risk analyst of the organisation, Aztek.
Asveld, L., & Roeser, S. (2012). The ethics of technological risk. London: Routledge. Beroggi, G., & Wallace, W. (2012). Computer supported risk management. London: Springer Science & Business Media.
Chan, N. H., & Wong, H. Y. (2015). Simulation techniques in financial risk management. Boston: John Wiley & Sons.
Earle, T. C. (2012). Trust in Cooperative Risk Management: Uncertainty and Scepticism in the Public Mind. London: Routledge.
Edwards, P., & Bowen, P. (2013). Risk management in project organisations. London: Routledge.
Glickman, T. S., & Gough, M. (2013). Readings in risk. London: Routledge.Leiss, E. (2012). Principles of Data Security. UK: Springer Science & Business Media.
McManus, J. (2012). Risk management in software development projects. Boston: Routledge.
Alhawari, S., Karadsheh, L., Talet, A. N., & Mansour, E. (2012). “Knowledge-based risk management framework for information technology project”. International Journal of Information Management, 2(1), pp. 50-65
Allman, E. (2012). “Managing technical debt”. Communications of the ACM, 5(5), pp.50-55.Barrieu, P., Bensusan, H., El Karoui, N., Hillairet, C., Loisel, S., Ravanelli, C., & Salhi, Y. (2012). “Understanding, modelling and managing longevity risk: key issues and main challenges”. Scandinavian actuarial journal, 2(3), pp. 203-231.
Boutellier, R., & Heinzen, M. (2014). “Technical Risk Management”. Through Innovation 5(3), pp. 213-224.
Chapman, R. J. (2013) “Technological Risk Management”. Simple Tools and Techniques for Enterprise Risk Management, 4(8), pp. 309-331.
Chen, C. W., Gerlach, R., Lin, E. M., & Lee, W. C. (2012). “Bayesian forecasting for financial risk management, pre and post the global financial crisis”. Journal of Forecasting, 3(8), pp. 661-687.
Huber, C., & Scheytt, T. (2013). “The dispositif of risk management: Reconstructing risk management after the financial crisis” Management Accounting Research, 4(2), pp. 88-99.
Jacob, C. K. (2012). “The impact of financial crisis on corporate social responsibility and its implications for reputation risk management”. Journal of Management and Sustainability, 2(2), pp. 223-259.
Ledenyov, D. O., & Ledenyov, V.O. (2012). “On the risk management with application of econophysics analysis in central banks and financial institutions.” Journal of risk management. 6(1), pp.56-78
Leppälä, J., Murtonen, M., & Kauranen, I. (2012). “Farm Risk Map: A contextual tool for risk identification and sustainable management on farms”. Risk Management, 4(1), pp. 42-59.
Michalski, G. (2013). “Financial consequences linked with investments in current assets: Polish firms case”. European Financial Systems. 5(8), pp.78-113
Mobey, A., & Parker, D. (2012). “Risk evaluation and its importance to project implementation”. Work Study, 51(4), pp. 202-208.
Mohamed, E. M., Abdelkader, H. S., & El-Etriby, S. (2012). “Enhanced data security model for cloud computing”. In Informatics and Systems (INFOS), 6(2), pp. 7-12.
Neely, C. J., Rapach, D. E., Tu, J., & Zhou, G. (2014). “Forecasting the equity risk premium: the role of technical indicators”. Management Science, 6(7), pp. 1772-1791
Oikonomou, I., Brooks, C., & Pavelin, S. (2012). “The impact of corporate social performance on financial risk and utility: A longitudinal analysis”. Financial Management, 4(2), pp. 483-515.
Patil, D. H., Bhavsar, R. R., & Thorve, A. S. (2012). “Data security over cloud”. International Journal of Computer Applications. 6(4), pp.76-98
Sood, S. K. (2012). “A combined approach to ensure data security in cloud computing”. Journal of Network and Computer Applications, 5(6), pp. 1831-1838.
Stolfo, S. J., Salem, M. B., & Keromytis, A. D. (2012). “Fog computing: Mitigating insider data theft attacks in the cloud”. In Security and Privacy Workshops (SPW), 3(9), pp. 125-128.
Taylor, H., Artman, E., & Woelfer, J. P. (2012). “Information technology project risk management: bridging the gap between research and practice”. Journal of Information Technology, 7(1), pp. 17-34
Taylor, H., Artman, E., & Woelfer, J. P. (2012). “Information technology project risk management: bridging the gap between research and practice”. Journal of Information Technology, 7(1), pp. 17-34.
Valitov, S. M., & Sirazetdinova, A. Z. (2014). “Project risks’ management model on an industrial enterprise”. Asian Social Science, 1(2), pp. 202-242.
Von Schomberg, R. (2012). “Prospects for technology assessment in a framework of responsible research and innovation”. Technikfolgen abschätzen lehren, 8(2), pp. 39-61.
Websites Efa.org.au, (2015). Data Protection Laws in Australia. Retrieved 12 October 2015, from https://www.efa.org.au/Issues/Privacy/privacy.html
Fsi.gov.au. (2015). Regulation in a digital environment | Financial System Inquiry. Retrieved 12 October 2015, from http://fsi.gov.au/publications/interim-report/09-technology/regulation-digital-environment/
1 Preparation strategy- RFP Response Approach:
3 Background:
4 Objectives:
5 Scope:
6 Constraints:
7 Assumptions:
8 Risks:
9 Deliverables:
10 Issues:
11 Team Structure:
12 Roles and Responsibilities:
13 Project Schedule (Gantt chart):
14 Pricing:
15 Demonstration of knowledge of project management processes and the issues that THIS project will face and how you will manage them:
16 Project Review:
17 Problem Resolution:
18 Tracking, Monitoring and Control:
RFP response would be done based on the tender requirement. As per the document, the NSWTG requirements and the project scope would be finalized. After getting the idea of project scope the entire project management plan would be done.
In this response documents the details of the project would be provided such a way that a person would come to know about the project requirements and the way of implementation of the project.
The NSW Department of Attorney General & Justice (DAGJ), for the company of New Trustee and Guardian (NSWTG), is expecting a tender in the area of Client Management System in order to take effective management of client level service agreements. NSWTG has a staff of about 600, majority of whom are client service officers who carry out financial management, trustee services, and other client-related activities in connection with NSWTG’s legislative responsibilities. The requirement of this project is for:-
A commercially mature software package capable of managing all client relationship functions, including support for mobile users
Consultancy services for the tailoring of the package to suit NSWTG’s specific needs. To develop this software, NSWTG is willing to have a vendor who already has off the shelf package of the similar application. However, as it is assumed that the actual required application would not be available in the market,there is always a scope of customization as per NSWTG requirement.
The successful tenderer has to implement the system by following activities:
Implementation planning of the application needs to be done with a view to run a pilot within 6 months
The pilot should include basic functions for client and trust accounting, with NSWTG specific requirements to be customized as part of the implementation
The new system would maintain all existing interfaces to the NSWTG business systems including TRIM, Sun Financials (to be migrated to SAP in FY 2013/14), MYOB, Garradin (or specific funds management systems used by external funds managers).
Subtle requirements are to be confirmed during the planning phase, but if tenderers believe the specifications in the tender is insufficient and require additional cost for preparing detailed requirements, the tenderer shall explain this in their response .
NSWTG currently uses an Excel-based financial planning tool for preparing client budgets and investment plans. The resulting data is entered into the CIS system.
NSWTG would continue using the financial planning package, but expects a smarter way for passing the resulting data to the new system.
NSWTG has about 700 staff (NSWPG included) across NSW. The head office is located in the Parramatta Justice Precinct, with 18 branch offices spreading across metropolitan and country NSW areas. NSWTG’s current PC environment consists of Lenovo hardware running the Windows XP operating system. There are approximately 700 desktop PCs and 50 laptops. Migration to Windows 7 and Office 2010 is being planned and is expected to happen within the first quarter of FY 2012/2013. The standard operating environment is based on the Microsoft Office range of products, including MS Office and Explorer.There is a link to NSWTG’s ISP for E-mail and Internet services, which is available to all staff. hese infrastructure components are provisioned as shared services through the DAGJ’s Information Services Branch (ISB). NSWTG needs an integrated system to support its dual service delivery combining trustee services and financial management. Currently there are three separate systems supporting NSWTG and Public Guardian (PG) is running in the network:
TEAMS (Trustee Services)
CIS (Financial Management)
CRMS (Public Guardian).
Individually, none of the existing systems is capable to support the combined operations and as a result of that they are willing to implement a new system which would integrate all the existing system and also provide the other benefits described in the following section.
NSWTG requires a solution that would consist of a Client Management System, which can serve both office based and mobile staff of the organization. The software must be platform independent and should run in the portable computing devises like iPad, laptops etc. It is anticipated that there will be some 700 users of the system, including 50 mobile users.In the backend, the central system should be capable of handling a combined client base of up to 500,000 active detailed records for Wills, Trusts, Powers of Attorney, Direct Management, Private Management, and NSWPG clients
It is expected that mobile users would NOT need to replicate client data on their laptop and the software should have the capability to retrieve the information through web. So, Web based application must be developed, which can deliver the requirement. The application must be user friendly so that with good training sessions, the suers can use the application easily. The software is expected to provide the following features, either directly or as a result of easy tailoring:
Maintenance of client information including contact details, budgets accommodation, health care, benefits, financial assets. Some aspects of these client data would be supplied from external sources (e.g.,Centrelink) Record details of interactions with clients including requests, authorized visits, complaints, financial planning, assets, and trustee services. Most of this information would contain a range of codes for statistical analysis. To be able to set up matters for monitoring a collection of tasks for theperformance of standard services. Be able to link clients to files including paper-based files, word-processing documents, drawings or sketches. Provide facilities for task allocation and workload planning and monitoring. Be able to print and record a variety of formatted documents based on fixed and variable text together with selectable standard phrases and database fields. Offer flexible tailoring of the database and software to meet NSWTG’s specific needs and be able to include user-written procedures to extend the functionality outside the product’s native capabilities. Offer extensive support to mobile users including support for Citrix, minimum software install size and with effective use of resources. To offer flexible control over access to data and functionality.
The scope of work is as below: Maintaining proper supply of CMS in order to assistance NSWTG operations. The system can be used by all the 18 Regional offices throughout NSW. Providing all kinds of Technical services to support proper implementation of implementation. Training assistance to update the users Documentation of the whole project. Maintenance of covering version upgrades and error correction, Software support services following the successful implementation of the Client Management Software Integration with the corporate email system (currently Lotus Notes, but to be migrated to MS Outlook) for workflow management and task notification. An open workflow management facility that would permit easy integration with other corporate electronic business systems including TRIM, Sun Financials (to be migrated to SAP in 2014), Chameleon (Will Making software), MYOB (Taxation), and Garradin (Portfolio management). System usage, especially on the server to be effectively monitored to assist tuning of its performance and functionality. Customization of the system, including database and screen modifications to be retained and carried forward to future releases of the software.
Following are the few mandatory requirements that need to be performed: Customization of screens, including the addition of new screens and fields and change of captions as per the requirement Customization of the database including the addition of new tables and fields as per the application and NSWTG requirement Simple and flexible access control facilities based on client groups, system functions and data records or fields Flexible reporting facilities are available at system-wide and individual user levels, for example
O A range of in-built reports
O Functions to enable end users to create simple reports
O An integrated report writing tool to be supplied
O Use of 3rdparty reporting tools can be used to fulfill the requirement
O Third party includes Private Managers obtaining system reports through Website
Support for client identification and search facilities based on client number, name, status and address, and private manager, asset type. Ability to exchange data on a batch basis with legacy or other applications using an open systems architecture to support the exchange (e.g.,. to load initial client details or “leads” supplied by outside organizations). Ability to fully manage and monitor current interactions with clients and to view history of contacts. The provision of flexible facilities for workload allocation and time management for both client services and specialist services staff. Ability to interface to NSWTG’s TRIM Document Management System that:
O Management of both paper and electronic client files is required to conform to legal requirements and to be efficient for the business Access to electronic documents should be through the Client Management System so that all security requirements are met
Following are the Highly Desirable Requirements Maintaining and viewing of client information relating to all parts of the organization, including:
O Full search facilities to access client information
O Facility to record details of all contacts with Clients
O Facility to record notes relevant to the clients
O Alerts on various aspects to be displayed on screens
Optimization of screensto eliminate unwanted information in the screen than can make the end user confused. Ability to update database using interface from an external source (e.g. Guardianship Tribunal, Centrelink, private managers through website interface). These information sources are mostly available in the Government public cloud, but could include other trusted business partners (e.g. private managers). Facilities to record, assign, and monitor a sequence of tasks associated to a service, with provision to turn on/ off time/ effort recording for costing purpose. Ability to correlate tasks or activities arising from clients/ changes in client’s circumstance. Tailored menus, screens or functions to suit different types of user such as branch managers, client services and specialist services staff i.e. user based access to be provided so that the required information can be retrieved from the system. Archiving of certain types of data based on business rules (e.g.,. over two years old).Customization of workflow management to comply with business rules. Document generation based on a combination of fixed text, database fields, selected phrases and free text on an individual or batch basis, save to TRIM and attach to tasks. Data fields to be validated against a database table or in combination with other fields as opposed to merely a simple set of values. Validation rules should be definable outside the database schema, and error messages suitably customized. Merging of different clients into one, for example, where small differences in name or address exist (e.g.,. as a result of conversion from existing client systems CIS, TEAMS and CRMS). Storing of incomplete transactions with features to allow follow-up (e.g.,. missing fields in a client record) and proving of thealert message later on for follow up purpose. Providing of flexible end user search facilities Ability to interface to telephony systems as and when required To allow the client details to be displayed automatically to transfer calls to the executives with client details Automatically create a ‘file note’ for every telephone call received Ability to manage standard letters and documents: Creation of both standard and non-standard letters Letters to be populated with name and address information and other data as appropriate from the core application Link to task for purpose of batch printing Ability to print signature electronically Documents created to be automatically stored into TRIM with facilities to access from the core system created automatically. The facility to amend standard letters without having to retype should be available where appropriate. Ability to send documents via all available facilities (traditional mail, email, fax) Ability to provide comprehensive management reports including reporting KPIs. Ability to meet the following security and control requirements: NSWPG Staff must only be able to access clients and data which relates to the NSWTG. Similarly, NSWTG staff must only be able to access clients and data that relate to NSWTG. There are some specific legal and assets information for which access must be restricted during an embargo period. With the exception of the above, data may be viewed by any staff members. Staff can only modify data as determined by their roles Private Managers interface with financial information through Website; private managers will have no modification access but will have the ability to view past submitted data and input new data to “holding” area for review/saving. There must be an audit trail of all access and modifications to client information Staff must only be able to authorize payments in accordance with their delegated levels of authority
General Desirable Requirements Changes to standard field, icon or tab descriptions can easily be made. System should allow users to define an association of clients (e.g.,. having common addresses, ACN, directors or linking subsidiary companies to a parent). System should link one person to several clients (e.g.,. guardians, case managers, or private financial managers). The system should issue system alerts on a client basis (e.g.,. Appeal for Internal Decisions, Court/Tribunal Hearings). System should allow users to identify readily new information following data synchronization System should be able to link to 3rd party software such as data mining tools to identify insights and trends within client information such as patterns of spend by client account, payments for items that are large and unusual, duplicate payments, changed bank details, etc. The system should keep production and control of “accountable” documents with serial numbers and the system should prevent any changes to the finalized documents. The system should be maintained by user administrators for normal operational requirements, with IT specialists needed only for more complex changes. Ability to record security items held for client’s estate with link to client (preferably for PMB to link individual assets recorded for client to individual security items)
The pre-existing systems are in unstructured format. So it will be difficult to import all data in proper format to the new system. The NSWTW user details need to be formalized. The key roll and responsibilities need to be taggedproperly. Otherwise used based access would be very difficult. There are no client management systems available in the market that in line with the requirement. So, customization of approximately sixmainmodules and approximately 27 sub-modules in a span of 6 months is a very challenging issue.
Validation should be available for data importing from the old systems The business rules of the application are well defined NSWTL users and staffs are well aware of the existing and proposed system, so that they can help while migrating to the new software from the older one The reports templates are pre-defined. So, all the main reports would be generated in the desired format. However a report modular would be provided, so that the user can create the report template by them and generate the several reports as and when required. For the financial aspects, all the tax and other aspects to be entered by the NSWTL authorized person, as these details can be changed with time. All the required hardware to be provided by NSWTL User based layout to be provided, so that anauthorized person can perform the authorized work.
The structure of preexisting data is not in a proper format. So incorporating all these previous data to the application data structure needs to be taken care of properly. If this migrated data is not checked properly, the whole data may become useless.
Following is a Risk Register:
All the software licenses required/offered and how the cost is dependent on the numbers and types of users and states this in the appropriate Response Form All software would be delivered along with the software version and release date. The release date of all previous versions would be provided to NSWTG with the legal rights. The ownership and all the developed application would be provided to NSWTG. A detailed project plan that identifies all major activities including time estimates, and milestones Appropriate training programs to system administrators from IT and user staff and training materials All project documentation to be delivered to the NSWTG team
Demonstration of knowledge of project management processes and the issues that THIS project will face and how you will manage them.
Project Review For effective monitoring and control of the program, the following review mechanisms will be followed:
Weekly Status Meetings The project implementation team would have weekly status meetings, all control procedures would be analysed and plans for the following week would be established. In addition, event-driven meetings will also be held with concerned team members, whenever a situation may demand.
Progress Report Meetings Project teams would have fortnightly / monthly meetings to monitor progress of the Project. Actual progress against plans will be reviewed, action items would be drawn, respective owners identified, and adaptive action would be implemented.
Status Reporting TThe project team would provide monthly status reports to the NSWTL. Status reports would be discussed during progress report meetings, action items drawn, and minutes communicated to all parties concerned. These reports will be maintained for continuous improvement purposes. These reports will typically cover the following aspects:
Completed activities, and activities yet in-progress as against the project plan
Risks
Cumulative project metrics
Changes in the project
High-level items to be configured
Metrics collected at the end of each phase in the reporting period
Problem Resolution All outstanding issues would be reported in status reports and discussed at status meetings. Critical issues not resolved in these meetings, would be escalated to the Project Manager and thereafter to Project Director who will consult with the National Library for quick resolution. Problem reporting would focus on early identification of potential risks, their resolution and mitigation plans. Risk factors will be tracked continuously and timely action would be taken to contain them. Escalation would be done through periodic meetings with the NSWTL. Review meetings would be used to raise any management-related issues and addressed. Process changes would also be discussed in these meetings.
Tracking, Monitoring and Control Maintaining audit ability at every process level is the key to tracking and monitoring. Audit ability of every image and corresponding data encompasses the tracking and monitoring tool that is used as a part of the workflow. Errors are tracked during quality check that is done and the QC that is put in place in the process. Every image, which flows in the workflow, has complete audit ability (end-to-end). The control system inherent as a part of the workflow is placed in order to attain and maintain accuracy. The control points are as follows –
Tracking the various reasons for escalations so that local resolutions are possible that would increase efficiency.
If the reason for omissions were attributable to the system then necessary modifications would be incorporated after conducting an impact analysis.
Share the learning with the team members through a knowledge database.
Organize frequent knowledge sharing sessions.
Monitor performance of Analysts before and after refresher sessions to check for improvement of performance and reduction of past errors.
The mechanism that is generally put into place has the following functionalities:
Monitors the processing and workflow in real-time
Provides a graphical view of the workload collections in the system (batch-based)
Enables managers to identify system bottlenecks and take corrective action
Quick information accessibility on the Internet has become increasingly important for growing businesses. As companies begin to spread various business functions to the public network, precautions are highly needed to make sure that their network not been tampered with or does not fall to wrong hands. If a network is accessed by a hacker or dissatisfied employee, it could create havoc for organization proprietary data, affect company productivity negatively, and retard the ability to compete with other businesses. Unauthorized network access can also harm a company’s relationship with customers and business partners who may question the company's ability to protect their confidential information. Furthermore, any part of a network can be susceptible to attacks or unauthorized activity as earlier discussed. Company competitors or even internal employees can violate all routers switches and hosts.
In order to determine the appropriate ways of protecting a company's property against attackers, the Information Technology Manager of such company should understand the attacks that can be instigated and the havoc they can cause to business infrastructures.
Network attacks have been discovered to be as varied as the system that they attempt to penetrate. Attacks are known to either be intentional or unintentional and technically competent intruders have been interested in targeting the protocols used for secure communication between networking devices. (Reed 2003). This review addresses how highly sophisticated intruders are penetrating internet networks despite high levels of security. But as the intruders increase, the network experts are deriving many techniques in preventing attackers from accessing company networks.
Security threat can be categorized into four parts and these categories are the ways or forms through which threats can be carried out on a network.
Unstructured security threat is the kind of threat created by an inexperienced person trying to gain access to a network. They commonly use common hacking tools, like shell scripts, and password crackers. A good security solution should easily thwart this kind of attack. In other words, these kinds of hackers could not be underestimated because they can cause serious damage to network.
Unlike unstructured threats, structured threat hackers are well experienced and highly sophisticated. They use sophisticated hacking tools to penetrate networks and they can break into government or business computers to extract information. On certain occasions, structured threats are carried out by organized criminal gangs or industry competitors.
Some unauthorized people outside the company who do not have access to the company’s computer system or network could cause external threat. They usually break into company's network via the Internet or server. Both experienced and inexperienced hackers could pose external threats.
This kind of threat could be by a disgruntled employee who has authorized access to the company's network. Like external threats, the damage that could be caused by such a hacker depends on the expertise of the hacker. (Orbit-Computer Solutions 2012).
Physical installation attacks, as the name implies originate from some basic threats that we can see with own eye but might not be prevented.
Firstly, hardware threat is a common example of a physical installation attack; this could be due to the old age of a particular system, and as a result of that, it start acting erratically
Environmental threat, as discussed previously, can be caused by natural phenomena, such as extreme weather temperatures, earthquakes, and storms. Furthermore, electrical threat can cause extensive damage to a network. This kind of threat is common in countries where the power supply is always interrupted unexpectedly. Examples of this type of threat are: blackout (unexpected interruption of power supply), brownout (insufficient supply of power voltage), noise (unconditioned power). Maintenance threat could also cause problem to network. Examples of maintenance threats are poor cabling, poor cable labelling, electrostatic discharge, and lack of critical spare parts.
Technically competent hackers have been able to fashion a structured attack targeted at communication protocols. the OSI model has seven layers that are used for communication between networking devices, which are with vulnerabilities that can be controlled. Basically, higher layers cannot be secured while the lower layers are also not being secured, yet in recent years there has been limited attention to insecurities at the physical layer or data link layer despite changes in network operational practice that include developments like nation-wide layer two networks and national and regional optical networks. Currently known threats at lower levels of the OSI stack include ARP spoofing, MITM (man-in-the-middle) attacks at layer two, and physical layer attacks such as passive optical taps or the interception of wireless network signals by attackers. While these attacks are well known, little research is currently focused on addressing those concerns.
The physical layer is responsible for transferring data over network communication media. It could also be refer to as most changeable and vulnerable layer. When dealing with this type of layer, unserious incidents like unplugging the computer power cord or removing a network cable could sometimes cause a great and untraceable havoc on a particular network, and it could cause great damage to the computer. (Reed 2003) There are plenty of vulnerabilities that the physical layer is facing, few of which include: loss of environmental control, damage of hardware and data, disconnection of physical data links, power loss, input logging like keystroke and other physical theft of data and hardware, and undetectable interception of data. These vulnerabilities could cause great damage to network security through physical layers if prevention is not done at the right time. Nevertheless, there are always solutions available for any threat of damage caused to a network. As mentioned above, there are always solutions for every problem. Perimeters and enclosures lock, electronic lock mechanisms for logging and detailed authorization, data storage cryptography, PIN and password secured locks, electromagnetic shielding, biometric authentication systems, and video and audio surveillance can all be used to prevent or secure any threat that is coming to attack a network or that has attacked a network via the physical layer.
This is the layer where transmission of data packets has been prepared by the physical layer. Communication of the data link is somehow weak in terms of security. The key component at layer 2 communications is the switch, which is also used for communication at layer 3. Data link is susceptible to many layer 3 attacks. The prime example of the layer 2 element is 'wardriving' the method of going around searching for wireless LAN (802.11) Network with default security settings. VLAN in layer 2 switches are also vulnerable to attacks. (Reed 2003) All the OSI layers face different threat that affect them at their various stages. Highlighted below are the problems faced by layer two of the OSI model and the solution to the problems. CAM (ontent-Addressable Memory) table overflow, MAC (Media access control) spoofing, STP (Spanning Tree Protocol) Manipulation, ARP (Address Resolution Protocol) attack, and VLAN hopping are the problems faced by data link layers. CAM can be controlled by configuring port security on switch in order to provide a MAC address specification on a particular switch port so that it can be learnt and memorized by the port to detect an invalid address on the port. Like in CAM, port security commands can also be used to control MAC-spoofing attacks. The command can allow the switch to specify a protection action whenever violations of port-security occur. A BPDU guard is used to control manipulation of STP. This guard is put in place for network administrators to predict actively a network topology. ARP attacks can be mitigated by using Hold-down timers in the configuration interface menu. This can be achieved by setting an entry-stayed time in the ARP cache. Control of VLAN hopping could be done by issuing VLAN IDs for trunk ports, and disabling of unused switch port and putting them in an unused VLAN.
The network layer is a medium used by packets to get to their final destination over multiple data. As said earlier in the previous chapter above, virtually all the layers have challenges of security. The lowest third layer of the OSI model is known to face challenges of information privacy problems and Denial of Service attacks. Internet protocol (IP) is the well-known protocol for the network layer. There are many security risks associated with the IP in the network layer. The part of the security risk affecting network layers are network layer packet sniffing, route spoofing, IP Address spoofing. Route policy controls - This mitigation gives a network administrator total control over the routing behavior of particular system. This control also improves network stability. Authentication— Packet sniffing can be mitigated by various methods, and the using of strong one-time passwords is one mitigating method it could also be controlled by deploying switch infrastructure to counter the use of packet sniffers.
Administrators could overlook this attack because of the form it takes to penetrate the network. It always makes this kind of noise that might let the administrator to think is just a network noise. A reconnaissance attack is always used by hackers to gather information about a particular targeted network, which they subsequently used to access the network or as DoS attacks. (cisco 2005).
1. PACKET SNIFFERS As its name implies, a packet sniffer is a very good device used by the administrators for detecting any kind of fault in the network. As it is a good device for administrators for monitoring or analyzing a network, so is it a good device for attackers for capturing packets sent across networks
2. PORT SCANS AND PING SWEEP These applications run a series of tests against hosts and devices to identify vulnerable services that need to be attended to. These attacks can attempt to:
1. Identify all services on the network
2. Identify all hosts and devices on the network.
3. Identify the operating systems on the network.
4. Identify vulnerabilities on the network
“WHOIS” is the Internet weapon attackers use to view addresses by DNS queries so that they can present a targeted company live hosts. By querying the IP addresses, some information could be revealed, such as the range of addresses and domain associated to those addresses. All revealed information could prompt an attacker to carry out whatever attack they intend to do.
Access attackers could be outsider hackers or inside users gaining entrance into a network in an unauthorized way to steal some vital and confidential information from the systems. They could also engage in destruction of resources so that some information that could lead to them could not be seen. There are different reasons for different attacks. Intruders use access attacks on networks or systems for the following reasons: to retrieve data, to gain access and escalate their access privileges. Access attacks can consist of the following:
1. Password Attacks Hashes of passwords could be taken by L0pht Crack and the clear-text passwords could be generated from them; a brute-force password attack offers access to accounts that can be used to alter critical network services and files. A typical example for such attack that compromises the network integrity is when an attacker modifies the network’s routing tables. By doing so, the attacker ensures that all network packets are routed to the attacker before being transmitted to their final destination. In such cases, an intruder can monitor all network traffic. There are two methods for computing passwords with L0phtCrack:
1. Dictionary cracking: The password hashes for all words in a dictionary file are compared and computed against all of the password hashes for the users. This is an extremely fast method that finds very simple passwords.
2. Brute-force computation: In this method, particular character sets are used, such as A to Z plus 0 to 9 or A to Z, and compute the hash for every potential password made up of those characters. Brute-force compilation usually computes passwords if those passwords are made up of the character set someone has selected to test. The problem for the attacker is the time required for the completion of this type of attack.
Trust exploitation is a situation where by an individual is taking advantage of a trustable and reliable relationship within a network. An example of such an attack is a perimeter network connected to a corporate network. Hacker leverages on the existing trust relationships. Several trust models that exist:
1. Windows
2. NIS+
3. Active directory
4. NIS
5. Linux and UNIX
6. Domains
Port redirection attacks are a type of trust exploitation attack, which uses a host that is fragile in passing traffic that would otherwise be dropped via a firewall. A host on the outside can contact the host on the public services segment (mostly known as the demilitarized zone [DMZ]) (Host A), but not the host on the inside (Host B). The host on the public services segment can be reached by the host on both the inside and outside. If hackers successfully compromise the public services segment host, they will be able to install software to channel traffic from the outside host directly to the inside host. Even though neither communication fails to agree with the rules implemented in the firewall, the outside host has now achieved a good network connectivity to the inside host simply through the port redirection process on the public services host. A good example of an application that can render this kind of access is Netcat.
A man-in-the-middle attack necessitates that the hacker possess access to network packets that come via a network. A man-in-the-middle attack could be implemented using network packet sniffers and routing and transport protocols.
Theft of information, hijacking of an ongoing session to gain access to internal network resources, traffic analysis to derive information about the network and its users, denial of service, corruption of transmitted data, and introduction of new information into network sessions are possible tools uses by man-in-the-middle attacks to attack a network. Someone working for an ISP can gain access to all network packets and perform all of the above operations.
A denial of service (DoS) attack damages or corrupts a computer system or denies all forms of access to the networks, systems or services even within the hacker’s community. Denial of Service (DoS) attacks is regarded as less important and considered a bad form because they require little effort to execute. Although DoS implementation is easy and can cause little potential significant damage the attacks deserve special attention from security administrators. DoS attacks can consist of the following:
1. IP Spoofing IP spoofing; This is a technique used to acquire unauthorized access to computers. In this kind of technique, the intruder sends illegitimate messages to a computer with an IP address which shows that the message is coming from a reliable and trusted host. Engaging in IP spoofing, hackers firstly use a variety of techniques to look for an IP address of a trusted host, then they modify their packet headers to appear as though the packets are coming from that trusted host. Furthermore, attackers can also engage other unsuspecting hosts in order to generate traffic and make it appear like its coming from a trusted host, hence, flooding the network.
2. DDoS EXAMPLE DDoS(Distributed Denial of Service) attacks refer to the next generation of DoS attacks on the Internet. TCP SYN flooding and UDP, ICMP echo-request floods, and ICMP directed broadcasts (also refferred to as smurf attacks) are similar to DDos attacks, however, the attack has a new scope. Victims of DDoS attack experiences packet flooding from various sources perhaps spoofed IP source addresses that brings their network connectivity to a grinding malfunction. In the past, an attempt to flood a target host with packets is the typical DoS attack. The hacker uses a terminal to scan for systems to hack. After handler systems are accessed, the hacker installs software on these systems. This software attempts to scan for, compromise, and infect agent systems. When the agent systems are accessed, the intruder then loads remote control attack software to accomplish the DDoS attack. [Bidou 2000]
Some threat are categorized according to minor or primary vulnerabilities for the end- user, which could be handled by a layman by just explaining what he/she has to do. These attacks could be solved by the use of antivirus software or by restoring the affected machine to factory settings.
1. Virus Viruses are known as malicious software, which are attached to other programs and execute a particular undesirable or unwanted function on a user workstation. Typically, a virus propagates itself by infecting other programs on the same computer where it resides. Viruses can do serious damage, like erasing an entire storage media or erasing and manipulating files. These kinds of viruses cannot affect a new computer without human aid such as introducing a virus-infected file on a CD, or as an email attachment and mostly through file sharing.
2. WORMS A worm is a self-replicating malware, which executes arbitrary code and also installs copies of itself on memory of infected computer; it can then infect other hosts from the infected computer. A worm is also a program that propagates itself like viruses do, but a worm can as well spread itself automatically across the network from one computer to the next unlike viruses that need human media to spread. They always take advantage of features of automatic file sending and receiving, found on many computers to propagate.
3. TROJAN HORSE A Trojan horse does two things at a go: it can infect and convert the infected, and a Trojan can attack on three levels. It can attack as virus, as worm and as itself. A virus known as the Love Bug is a typical example of a Trojan horse because a love bug pretends to be a love letter when it actually carries a harmful program. Love Bug is definitely a virus because it infects all image files on the attacked disk, and turns them into new Trojans. Finally, Love Bug is worm as it propagates itself across the Internet by hiding in the Trojan horses, which is sent out using addresses in the attacked email address contact.
Due to the unfortunate case of numerous threats and attacks that have befallen the networking industry, it becomes imperative to find ways of mitigating each of the attacks. Chapter two above described the various types of threat facing network security, Chapter three and four discuss the solutions for the threats mentioned in the previous chapters.
Hardware Threat Mitigation As a result of fault from physical installation, planning of physical security to limit damage or theft of equipment during the process of installing hardware is very important. Few of the many ways that this action could be monitored or controlled is by making sure that no unauthorized access from the doors, ceiling, raised floor, windows, ducts or vents, monitoring and control closet entry with electronic logs, use of security cameras, and if possible, electronic access control should be used and security systems should log all entry attempts and controlled by security personnel. Physical security is discussed in detail in Chapter four of this thesis.
Environmental Threat Mitigation The first stage of every attack has been from lack of environmental control, which brings about limiting damage by creating a proper operating environment through: Temperature control, humidity control and positive airflow.
Electrical Threat Mitigation Loss of power can also be an opportunity for intruders to break into a controlled network, which could be prevented or controlled in many ways few of which are mentioned here; Electrical threat could be limited by ensuring uninterrupted power supply for network devices, by following a preventative maintenance plan designed for the purpose, and by performing remote alarming and monitoring.
Maintenance-Related Threat Mitigation Maintenance has always been a vital operation, for any organization that uses hardware. Maintenance-related threats can be limited by:
* Using neat cable runs
* Labeling critical cables and components
* Using (electrostatic discharge) ESD procedures
* Stocking critical spares
* Controlling access to console ports
Console should neither be left connected nor logged into any console port, and ensure logging off administrative interfaces before leaving.
A locked room should not be relied upon as the major protection for devices. No room is totally secured, and if intruders get in a secured room, there is nothing stopping them from making a connection to the console port of a router or a switch.
The following are the tools that can be used to control packet sniffer attacks;
Authentication: For defense against packet sniffers, the use of strong authentication should be the first mitigation option. Strong authentication is a technique of authenticating users that cannot be circumvented easily. One Time Passwords (OTPs) are a clear example of strong authentication. An one-time password is a security mechanism that makes use of a mobile device in generating password each time an application requests for it. Switched infrastructure: This technique counters the use of packet sniffers in a network environment. For instance, if an organization deploys a layer-2 switched Ethernet, access by intruders can only be gained to the traffic flow of the connected port. Obviously a switched infrastructure does not totally eradicate the threat of packet sniffers, but their effectiveness is reduced considerably. Anti-sniffer tools: Certainly, there would always be a solution for every threat, anti- sniffer is a software and hardware, designed for detection of the use of sniffers on a network, and can be implemented on networks Cryptography: A communication channel is cryptographically secure when the only data a packet sniffer detects is a cipher text (a random string of bits) and not the original message. Cisco deploys network-level cryptography based on IPSecurity (IPsec), IPsecurity is a standard security method for networking devices in communicating privately through the use of Internet Protocol (IP). (CANS 2011) Secure Sockets Layer (SSL) and Secure Shell Protocol (SSH) are also cryptographic protocols for network management.
The prevention of port scans and ping sweeps seems to be difficult without compromising network capabilities. However, the use of intrusion prevention systems at network and host levels is an advisable way of mitigating any damages. Ping sweeps can be stopped if ICMP (internet control message protocol) echo as well as echo-reply are turned off on edge routers. Network-based intrusion prevention systems (IPSs) which compare incoming traffic to signatures in their database and host-based intrusion prevention systems (HIPS) can usually notify an administrator when a reconnaissance attack is under way. Discovering stealth scans requires kernel level work.
Access Attacks Mitigation
Users should not be allowed to use the same passwords on multiple systems.
The use of ordinary text passwords should not be allowed
Use of strong passwords (e.g., Use “mY8!Rthd8y@” rather than mybirthday)
Trust exploitation-based attacks can be mitigated by means of tight constraints on the level of trust within networks. The outside systems of a firewall should not be fully trusted by the inside Systems of the firewall, in other words trust should be limited to specific protocols where possible, and should also be validated by another parameters other than an IP address.
Cryptography (encryption) is the only effective mitigation technique for Man-in-the- middle attacks. Man-in-the-middle attack mitigation can be achieved by the encryption of traffic in an IPSecurity tunnel. With this Encryption method, intruders or hackers can see only cipher text. (Mattsson 2006
IP SPOOFING ATTACK MITIGATION 1. The threat of IP spoofing cannot be eliminated but can be reduced using the following measures: 2. Access control configuration: In order to reduce the effectiveness of IP spoofing, configuration of access control is required to deny any traffic from external network, which has a source address that should reside on the internal network. 3. Encryption: Encryption is another possible way to prevent IP spoofing, by encrypting all network traffic to avoid source and destinations hosts from being compromised. (Mattsson 2006) 4. Additional authentication: If additional authentication methods are used, they render IP spoofing attacks irrelevant. Cryptographic authentication is the best method of additional authentication. However, when cryptographic authentication is not possible, one time passwords(OTPS), which is a strong two-factor authentication, can be effective.
DoS(Denial Of Service) ATTACK MITIGATION
The threat of DoS(Denial Of Service) attacks can be reduced with the following techniques:
1. Anti-spoof features: Proper configuration of anti-spoof features on routers and firewalls can reduce risk of DoS attack. This configuration includes filtering to an RFC 2827 level. In this way, hackers’ would not be able to mask their identities, and they will not attack.
2.Anti-DoS features: configured anti-DoS(denial Of Servuce) features on routers and firewall limit the effectiveness of an attack. Anti-DoS features often involve limiting the amount of half-open TCP connections that a system allows at any given time.
3. Traffic rate limiting: Some ISPs provide the implementation of traffic rate limiting. In filtering, the amount of unnecessary traffic that crosses the network segments at a certain rate is limited.
These are some steps to mitigate worm attacks:
Inoculation: method of patching all systems and, possibly, scanning for vulnerable systems.
Quarantine: Tracking down each infected machine inside a network. Any infected machine should be disconnected, blocked or removed from the network.
Treatment: Cleaning and patching each infected system is safe worm attack mitigation. Complete system reinstallation may be required to clean up a worm totally.
Measures that can be taken to reduce risks include the following:
Reading operating system and network log files, or have them analyzed by log analysis applications.
Subscribing to mailing lists that publicize vulnerabilities.
Keeping the operating system and applications current with the latest patches.
Using IDS/IPS in scanning known attacks, monitoring and logging attacks, and sometimes, preventing attacks.
Cisco networking (Cisco 2005), devices support Authentication Authorization and Accounting (AAA) access control using line passwords, a local security database, or remote security server databases. The local security database is configured on the router for a group of network users using the username xyz and the strong password command. A remote security database is a separate server running an AAA security protocol, providing AAA services for multiple network devices and large numbers of network users.
Router administrators and users who wish to access the corporate LAN through dial- in or Internet connections use AAA. The architecture enables systematic and scalable access security (Cisco network device (SND) v1.0) which is explained in details in the below architecture:
Information security professionals have long focused on virtual risks, but at some point all things virtual become physical. It is that crossing point—where physical infrastructure and systems provide an access point to the virtual world -- that the link between physical threats and virtual threats are most apparent (Lindstrom 2003). Many physical threats should be factored into a security program which includes; theft, human error, sabotage, and environmental disruption.
Video surveillance and IP are modern technologies devices used in different part of the world toward protecting enterprises from the physical threat against their network as well as computing equipment. The attributes of this solution include:
Secure: The computer architecture of a video surveillance renders the security of transmission by encrypting communications for protection against captured data or inserted into the information stream. Additionally, tamper resistivity on sensors can be deployed with a protective casing. Finally, the ability to distribute and administer sensors offers redundancy to protect against focused attack on the sensor.
Solid State: Moving parts do not exist on the sensors. Moving parts are hereby susceptible to mechanical and physical damage, which requires site visits for repair. By developing the digital potentialities of the system, the system was able to eradicate the need for mechanical features whereby the likelihood of failure is reduced.
IP Connectivity: Separate physical cabling for CCTV functions is required for existing monitoring systems. Video surviellance uses the same technology it protects by incorporating it into the typical IP network which allows sensors to be positioned anywhere the network protects its components. In addition, it eradicates the necessity for duplicate cabling using various wire types.
Multi-sensor collectors: In keeping along with the “human senses” framework of threat monitoring, NetBotz provides the ability to gather data from multiple sensors in order to combine information into a single place.
Intelligent analysis software: The more software grows intelligent, the more quickly individuals respond to threats. As technology produces the ability to aggregate data from various places, a level of analysis complexity is created which is best resolved through analytical software. Finally, this creates effective and efficient approach to the needs of identifying attacks and reacting to it.
SNMP Aggregator: Some capabilities are associated with a physical threat monitoring system and works with the IP network with its ability to also collect SNMP (Simple Network Management Protocol) data and also passes the data along at appropriate times. (Pete, L. 2003)
A keyed lock is one of the most common means of restricting access. However, precautions need to be taken about the types of keys used. The options will vary depending on the type of building office is located in. Some keys have warnings on them to make it prohibit duplication, while others are of an uncommon shape, a copy can not be made even without a warning, If a set of duplicated keys are used in some certain for offices or server rooms, it may worth considering periodic changes of the locks and keys. This will effectively "expire" any unauthorized duplications.
Many forms of electronic code locks exist in buildings today, some more advanced systems can be expensive and sophisticated. These systems require users to input code to gain access via a doorway. The apparent vulnerability with these systems is that if the code does not change, the entire facility may finally know the code, and when that occurs, there might as well be no entrance at all. In other to prevent this from happening, different codes should be provided to different employees. In this way, if an employee leaves the company, access code of such employee could be deactivated.
Once an operating system is installed on a computer, some simple steps should be taken immediately after installation:
Default usernames and passwords should be changed immediately.
Access to system resources should be restricted, so that only the authorized individuals can have access to the resources.
Any unnecessary application and services should be turned off and uninstalled, if possible.
System should not be left on or un-lockd while not on sight.
Users should subscribe and always check Subscribe and always check for patches and update to install from software and Hardware vendors. Secured Password
The practice of the following techniques can give a company rest of mind concerning passwords:
Users should not be allowed to have the same password on multiple systems.
Accounts should be disabled after a certain number of unsuccessful logins. This practice prevents continuous password attempts.
A plain-text passwords should be avoided. The use of either an OTP (One Time Password) or encrypted password is recommended.
The use of strong passwords or passphrase is highly recommended. Strong passwords should be at least eight characters long and uppercase letters, lowercase letters, symbols or special characters, and numbers should be used in passwords. Many systems provide strong password support and can also restrict a user to using of only strong passwords.
Security Software To protect against known viruses, host antivirus software should be installed. Antivirus software detects most viruses and Trojan horse applications. It also prevents viruses from spreading in the network. Antivirus software does its protection in two ways: File scanning by comparing their contents with known viruses in a virus definition database or dictionary. Suspicious processes that run on a host and indicate infection are monitored. This monitoring may include port monitoring, data captures, and other methods.
Host Intrusion DetectionHost-based intrusion typically implemented as Inline technology, called a host-based intrusion prevention system (HIPS), it stops the attack, prevents damage, and blocks the multiplication of worms and viruses. Active detection should be set to stop affected services automatically so that corrective action could be taken immediately. Companies can also require network administrators to notice when some external process tries modifying a system file in such a way that may include an underground program. Furthermore, remote access is a way an intruder can get into the network from a distance area where he cannot be noticed. Secure Remote Administrative Access Using Ssh Secure shell (SSH) has replaced Telnet as the best application for providing remote router administration with connections that support session integrity and strong privacy. SSH uses port TCP 22; it offers a similar functionality to an outbound Telnet connection, except that the connection is encrypted. With encryption and authentication, SSH allows for secure communications over an insecure network.
Secure With IOS Firewall With the IOS Firewall Authentication Proxy appropriately configured, users are impelled to authenticate before access is granted through the IOS Firewall. When a user attempts to initiate communications through the IOS Firewall, they are queried for a username and password, which are then sent to an external authentication, authorization, and accounting (AAA) server operating either TACACS+ or RADIUS. The server replies to the firewall’s request with a user profile, which defines specific rights and limitations for same individual users access which is then adopted by the firewall for the entire period of the communication.
Secure Routers Using AAA (TACACS+) Services AAA is used by router administrators and users who wish to access the corporate LAN through dial-in or Internet connections. It provides a higher degree of scalability than the line-level and privileged-EXEC authentication. In the Cisco environment, network and administrative access security whether it involves campus, dialup, or Internet access, is based on a modular architecture that has three functional components: authentication, authorization, and accounting: External AAA systems, like the Cisco Secure ACS Solution Engine or Cisco Secure ACS for Windows, communicate with Cisco routers and NASs using the Terminal Access Controller Access Control System Plus (TACACS+) [10]. TACACS+ can be configured in a different system interfaces, e.g., Cisco (IOS, CatOS), Juniper (ScreenOS, JUNOS), Huawei, HP, OneAccess, Linux-based systems (via PAM), but the configuration use.
SET UP A DMZ (Demilitarized Zone) A DMZ is a small network that sits between the internal (corporate) network and the Internet. The DMZ prevents outside users from getting direct access to company computers. In a typical setup, the DMZ would receive requests from corporate users to access Web sites and other information on the external network. The DMZ initiates requests for the information and forwards the packets back to the requesting machine. Companies often place Web servers on their DMZ so that external users can access their Web site but not the private data ghosted on the corporate network. There are two types of DMZs; A three-homed perimeter network. In this type of DMZ setup, the firewall possesses three connections: one for internal network, a second for the Internet and the third for the demilitarized zone (DMZ). The second type of demilitarized zone (DMZ) is known as back-to-back perimeter network, and it makes use of two firewalls. One firewall has a connection to the Internet as well as the DMZ, while the second has connections to company’s internal network and the demilitarized zone (DMZ). With this method, the demilitarized zone (DMZ) sits between the internal and external networks. In both setups, configuration is made to restrict traffic firewall in and out of each network.
Security with IPSec VPNs To provide a secure connection over a public network, Cisco utilizes IPsecs VPNs to provide secure connections. Cisco employs IPSecurity (IPsec) Virtual Private Networks (VPNs) to offer a secure connection across a public network—connection, which can be planned, based on business needs of a company. Remote-access solutions can be used for telecommuters, site-to-site solutions for remote offices that require access to the corporate network, and extranet solutions, which provide customers and partners with the limited information they need. (B. N. I 2004-2009)
Summary and Conclusion To flourish in today’s economy, service providers should provide open and easily accessible communications services, which will enable their end users to contact anyone in the world. The same open and freely scalable communication architecture offers limitless communications services to end users and also sets a very attractive target to hackers who would abuse that open communication access for their own financial benefits. A security implementation of an organization, irrespective of its size, should consider all forms of access and intrusion on network hardware both physically and remotely, such as environmental monitoring, using video surveillance and IP, securing remote access using AAA (TACACS+) and deploying of firewalls and demilitarized zone (DMZ). Because security is a long-term issue, service providers need a security strategy and staff that is well educated in that strategy. To that end, this thesis discussed the tools and practices that are indispensable to network operators in securing their networks against denial of service (DoS) attacks and other common security threats. Finally, service providers can turn those necessary security protections into profitable managed security services for their enterprise customers. Because security is a long-term issue, service providers need to develop a security strategy. A good place to start is to educate staff on best practices. When implementing a security plan, it is important to begin by implementing the most obvious protections first and by deploying equipment that is capable of the most advanced protections, deploying equipment capable of providing privileged-EXEC authentication and a higher level of scalability than line-level, such as AAA Services. Other straightforward steps include: protection of servers and routers by using one- time passwords and allowing only authorized users to get to routers, by applying authorization systems based on TACACS+ or RADIUS. Administrators can also implement a mechanism to manage incoming traffic, which can include DoS attacks against the control processors of routers. In general, operators should turn off unused and unneeded services, even when this may entail turning off features on servers. Finally, the increase in physical infrastructure as well as its growing implication to an organization has created the necessity to physically protect the systems themselves, not only from cyberattacks, but also from the physical attacks that can be perpetrated against them. Implementing policy-based security also brings many advantages to the security arsenal, because it automates the implementation of the security philosophy and lessens the chance of user error in protecting the network.When implementing security policy, it is necessary to keep in mind that mechanisms such as DMZ, IPSec- VPNs, firewalls and intrusion detection and prevention techniques that are so critical to securing network infrastructure can be turned into managed security services that could be sold to enterprise customers.
Below is a list of additional configurations that should be in place and they complement the concepts described in this thesis.
1. All network devices should have an ACL(Acess Control List) that only allows network management workstations access to the device
3. User accounts synchronization could be done easily using the following script:
Bidou, R. 2000. Denial of service attacks. Retrieved: May 10 2012. Available at: http: //www.docstoc.com/docs/85149779/Denial-of-Service-Attacks Cisco Security. 2005. Securing Cisco Network Devices. (v 1.0 ed.) Available at: http://www.scribd.com/doc/985242/Securing-Cisco-Network-Devices-SND-v1-0 Hill, J. 2001. An Analysis of the RADIUS Authentication Protocol. Retrieved: April 16 2012.Available at: http://www.untruth.org/~josh/security/radius/radius-auth.html Lin, D.; Tsudik, G.; Wang, X. Cryptology and Network Security, in Proceedings of 10th International Conference on Cryptology and Network Security: Sanya, China, 2011,
Mattsson, U.T. October 03, 2006. Best Practice for Enterprise Database Encryption Solutions. Retrieved: May 5, 2012. Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=934271 MIT Kerberos Team Security Contact. The Network Authentication Protocol. Retrieved:
January 27, 2012. Available at: http://web.mit.edu/kerberos/contact.html Orbit-Computer Solutions. 2012. Threats to physical and network infrastructure.
Retrieved: May 5 2012. Available at: , http://www.orbit-computer- solutions.com/Threats- to-Physical-and-Network-Infrastructure.php Paul, A. May 13 2003. Implementing secure access to Cisco devices using TACACS+ and SSH. Retrieved, February 28, 2012. Available at:
http://www.sans.org/reading_room/whitepapers/networkdevs/implementing-secure- access-cisco-devices-tacacs-plus-ssh_1041
Pete, L. June 2003. The Emergence of the Physical Threat No. 2-3 P.O. Box 152, Malvern, PA 19355: Spire Security, LLC. Available at:
http://netbotz.com/library/Physical_Threat_Security.pd Reed D. November 21, 2003. Network Model to Information Security. Retrieved: . Available at: http://www.sans.org/reading_room/whitepapers/protocols/applying-osi- layer- network-model-information-security_1309