Saturday, January 25, 2020

Workplace Bullying and Victimisation on Productivity Impact

Workplace Bullying and Victimisation on Productivity Impact TASK 1: BE ABLE TO UNDERSTAND HOW TO FORMULATE A RESEARCH SPECIFICATION Evaluating how workplace bullying and victimisation can affect productivity. Introduction Any effective and successful business understands the importance of productivity in the workplace. Being productive can help the firm increase and utilize the capacity of the human resources it has. Most productive companies have happy and healthy employees, which are the basis of a successful organization. Customer Benefit Productivity in the workplace will often translate into good customer service and interaction. This total client experience is the key to satisfying customers and clients, and almost all highly productive companies use this to gain customer loyalty. When a customer is loyal to your business, they will share their experience with others, which is a marketing advantage coming out of high levels of productivity. The Company The employees themselves are an investment, and like any investment, they should yield a healthy or worthwhile return to the company. Therefore, when employees are highly productive the company achieves its goals of investing in them in the first place. Productivity also helps to motivate the workplace culture and boost morale, producing an even better company environment. The Work Force More often than not, when a firm is highly productive, it eventually becomes successful, and because of this, incentives are bound to be made available to the employees. These include pay raises, bonuses, medical insurance and so on. This will also motivate employees and gives them more job opportunities as the company grows. Productivity in the workplace is an important aspect of every company and when top management understands this concept, success is just around the corner. However, if your company doesnt give you the incentive to increase productivity, you may want to start looking for another job because the lifeblood of your company is running out. I have chosen this research proposal because I have heard of cases of bullying at work and it also happened to me in one of my previous roles. I believe its a topic that can be viewed from different perspectives and I have tried to tackle it as best as I could. In order for me to understand this research I will be using different methods of evidence of primary research conducted by using the questionnaire methodology and including secondary data that will be derived from literature and other sources related to bullying and victimisation. This research will be conducted in the Private sector specifically in the IT field. Literature review Various literatures support the belief that bullying falls into one of four forms of behaviour: verbal, non-verbal, physical and subtle. Townend (2008) examined each of these to identify how they are reflected in practice. In relation to verbal behaviours, the author reported that bullying would often occur through the aggressor/bully making unpleasant, sarcastic comments, with the intention of humiliating the individual.The strongest verbal bullying behaviour refers to the deliberate andrepetitive exclusion of an individual from conversation; for example, asking all members in a team meeting for a contribution, except for the targeted individual. Non-verbal bullying behaviours were reported to be initiated through factors such as the avoidance of eye contact. Technological advancements have significantly impacted upon non-verbal bullying, with the potential to use emails, text messages and social networking websites as a means of distributing abusive messages, and further excluding individuals. Physical bullying is fairly obvious, with the behaviour often involving physical violence, such as striking the victim, or d amaging their property. Regarding subtle bullying behaviours, Samnani (2013) defined these behaviours as negative acts which are not immediately obvious, but undermine the individual. This is often the most popular choice of bullying behaviour, with actions being open to interpretation, making it difficult to detect from a neutral perspective. Subtle bullying behaviours include actions such as withholding important information, persistent criticism, excessive supervision, being assigned menial tasks, excessive workloads, gossiping and insults (Samnani, 2013); actions which through not being immediately obvious, may not always be perceived by victims as bullying. In defining workplace bullying, Einarsen et al (2011: 22) put forward the definition that bullying at work revolves around harassing, offending, socially excluding someone or negatively affecting someones work. In order for the label of bullying to be applied to a particular activity, interaction or process it has to occur repeatedly and regularly over a period of time. Bullying is an escalated process in the course of which the person confronted ends up in an inferior position and becomes the target of systematic negative social acts. Elaborating upon this, it is important to differentiate workplace bullying from workplace violence. The former is primarily psychological and persistent, whilst the latter is primarily physical and irregular (Cooper-Thomas et al, 2013). Your literature review has to incorporate both literature of the importance of productivity in a work setting and the effects of bullying and victimisation. Purpose of the research This aim of this research is to examine workplace bullying from a theoretical perspective; providing an insight into the prevalence of workplace bullying and how it might affect staff and productivity and the implications and suggest effective ways organisations could use to tackle this phenomenon. The objectives that will be used to achieve that are as follow; To assesses gender differences and ethnicity in a given work place To identify perceptions of work bullying and victimisation To analyse implications of work bullying and victimisation To determine the response of organisations in cases of bullying. Rationale of the research: In determining the extent to which workplace bullying can detrimentally impact an organisation, appropriate response is required. It is reported in the United Kingdom, that approximately only 80% of organisations have anti-bullying policies in place (Harrington et al, 2013); thus, suggesting there is still a sizeable population allowing the issue to go uncompromised. This is not the case for all organisations, with data suggesting workplace bullying costs upwards of  £2 million a year, and 18 million in lost working days, organisations understand the need for action (CIPD, 2006). Bullying is typically a problem faced by Human Resource departments (HRM), and thus it is their role to be at the forefront, introducing eradicative methods. Khan and Khan (2012) proposed four key strategies that HR departments can implement in attempting to manage workplace bullying; education and training, corporate responsibility, possession of the right machinery and support. The collaboration of these four items, form an organisations anti-bullying policy. Scope and limitations I believe my research project is suitable for all employees and employers out there who deal with such situations where work bullying and victimization may occur. By reviewing some of the literature available online and the questionnaire I have put together to see some real views from individuals who have experienced bullying a work, I hope to raise more awareness of this phenomenon prevalence. I expect this research to take up to 1 month in order to get the best of the resources that need to be analyzed and acknowledged for optimal results. As a disadvantage, I would mention that if I would have more time to look into more cases of bullying I may get more results that would add help in enhancing my research. Ethical implications The implications and ethical issues involved in my research affects safety, engagement, productivity, trust, and the workplace culture. It poses the question to leaders, just how important is a healthy work culture to business and long-term success. Research methodology The method of primary research utilised a questionnaire methodology. However, emphasis was placed on asking open-ended questions, so to attain qualitative data. This focus was assigned, as I sought to obtain in-depth responses, outlining individual exposure to bullying. The sources used for this research project include: questionnaires, books and internet pages. ADD QUANTITATIVE AND QUALITATIVE INFO. (DATA USED) ADD WEBSITE USED Evidence research proposal Word count: 800/1000 words TASK 1 part 2: Provide an appropriate plan and procedures for the agreed research specification (AC1.5); Provide an appropriate plan and procedures for the agreed research specification Here, you need to set an action plan using the key objectives(see above) and your research methodology (e.g design questionnaire, do a survey, gather secondary information, arrange interview etc) of your research question of hypothesis. Research objective By when Resources to be used (2.1) Milestones (when do you know this objective is achieved) Review dates (which is after the by when to ensure that you have actually achieve the objective ) How will you monitor this objective is being achieved? method of monitoring To assesses gender differences and ethnicity in a given work place 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To identify perceptions of work bullying and victimisation 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To analyse implications of work bullying and victimisation 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To determine the response of organisations in cases of bullying. 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target TASK 2: BE ABLE TO IMPLEMENT THE RESEARCH PROJECT WITHIN AGREED PROCEDURES AND TO SPECIFICATION 2.2 Undertake the proposed research investigation in accordance with the agreed specification and procedures. Primary data collection The primary research revolved around the adoption of a questionnaire methodology. The purpose behind this research was to provide and source first-hand accounts from individuals that have been exposed to incidents of workplace bullying. Questions were formed with consideration being allocated to the items highlighted in the literature review. These included questions referencing how the respondent was bullied, by whom, whether it impacted upon their intention to leave the organisation, the short-term and long-term implications, and how the individual structured their response. Qualitative data was selected and in turn open ended questions posed, providing contexts, like one-to-one interviewing, that allow a participant to express their beliefs, assumptions, desires and understandings (Horn, 2012, p103). The questionnaire was created using the Likert scale. This method was used instead of alternative methods, such as face-to-face interviews, as according to Dayan et al (2009) when responding to sensitive questions, methodologies that reduce the level of question administration by human interviewers, such as online questionnaires, increase responses to sensitive personal questions and yield more honest, candid answers. This belief is formalised as researchers suggest that without the presence of an interviewer, online questionnaires are able to attain higher levels of personal disclosure and reductions in responses being affected by social desirability. Online questionnaires also allow respondents to remain anonymous. This is critical in two ways; firstly people are more willing to theoretically open up and disclose information if they feel free from further repercussions, and secondly, anonymity has been proven to reduce social anxiety and social durability when divulging information . For this methodology, the author elected to adopt a self-selective sample. This was selected as the author wanted to obtain responses from individuals that met the specific criteria of having experienced exposure to bullying first-hand, but in doing so placed no pressure on individuals to participate and divulge information. Although this is not high, emphasis was placed on quality rather than quantity. Please be more specific as to what you intend to prove Advantages and disadvantages of the methodology used Although this research question addresses an important topic of discussion in literature, there are a number of limitations and benefits that can be associated towards the chosen methodology. As mentioned the method used is questionnaires, with open ended questions. In evaluating these, the methodologies will be discussed separately. Regarding the questionnaire, it can be recognised that this methodology is faced with the limitation of only having obtained a very small sample size in the form of n=4. The problem this inflicts in respect to the relevance of the data is that through the attainment of such a small sample, it raises questions regarding the generalisability of the results. Although the author hoped that this would not be the case, through the research conducted having very specific and sensitive criteria, in the form of having been bullied and willing to disclose their account, the author acknowledged that the potentiality of an undergraduate finding and sourcing willing respondents would be slim. As such, in an attempt to counter this and make the most of the sample size obtained, the author sought to compensate the limitation through ensuring the responses were in-depth. The intention was to ask a magnitude of questions, which would result in the attainment of individual detailed accounts, addressin g the various elements highlighted and discussed in the literature review. However, the rich data yielded by this small sample group offered important insights into the effects of bullying in the immediate and longer term, that now warrant further investigation through wider sampling. The benefits attached to this methodology, refer to the provision of sensitive and personal data. Dayan et al (2009) stated that online questionnaires have the strength of obtaining honest answers, as through the removal of question administration by human interviewers, participants are made to feel more comfortable in the relative anonymous environment of the internet. This in turn yields greater detailed and candid answers as participants feel comfortable and free from judgement; although the danger associated with online participation runs the risk of whether the information disclosed is indeed factual, or ultimately a positive contribution towards the discussion. Secondary data used- sources from online website Advantage and disadvantages of the methodology used 2.3 Record and collate relevant data where appropriate. DEFINE ANOVA AND EXPLAIN THE IMPORTANCE OF USING IT. ANOVA One-way completely randomized       Workplace bullying Male Male Female Female 1 2 2 1 1 2 2 2 2 3 3 4 4 4 4 4 1 1 1 1 5 4 4 4 4 6 4 4 4 4 7 1 1 1 1 8 2 2 2 2 9 1 1 1 1 10 2 2 2 2 n 10 10 10 10 X 2.300 2.300 2.200 2.300 s 1.252 1.252 1.317 1.337 Xave 2.275 source df SS MS F P-value treatments 3 0.075 0.025 0.0150 0.9974 error 36 59.900 1.664 total 39 59.975 INTERPRET THE DATA AND WHAT YOU THINK OF THE DATA ANALYSIS MEHTOD USED-ANOVA! 2.Advantages and disadvantages you found for the data analysis methods? Points to be considered forData analysis and interpretation (you can use at least 2 for advantage and 2 for disadvantage); qualitative and quantitative data analysis interpreting transcripts; coding techniques; specialist software; statistical tables; comparison of variable; trends; forecasting. Evidence: record and completed evidence of data collected Although this research question addresses an important topic of discussion in literature, there are a number of limitations and benefits that can be associated towards the chosen methodology. As mentioned the method used is questionnaire, including open ended questions. In evaluating these, the methodologies will be discussed separately. In reference to the questionnaire, it can be recognised that this methodology is faced with the limitation of only having obtained a very small sample size in the form of n=4. The problem this inflicts in respect to the relevance of the data is that through the attainment of such a small sample, it raises questions regarding the generalizability of the results. Although I hoped that this would not be the case, through the research conducted having very specific and sensitive criteria, in the form of having been bullied and willing to disclose their account, I acknowledged that the potentiality of an undergraduate finding and sourcing willing respondents would be slim. The intention was to ask a magnitude of questions, which would result in the attainment of individual detailed accounts, addressing the various elements highlighted and discussed in the literature review. However, the rich data yielded by this small sample group offered important insights into the effects of bullying in the immediate and longer term, that now warrant further investigation through wider sampling. The benefits attached to this methodology, refer to the provision of sensitive and personal data. Dayan et al (2009) stated that online questionnaires have the strength of obtaining honest answers, as through the removal of question administration by human interviewers, participants are made to feel more comfortable in the relative anonymous environment of the internet. This in turn yields greater detailed and candid answers as participants feel comfortable and free from judgement; although the danger associated with online participation runs the risk of whether the information disclosed is indeed factual, or ultimately a positive contribution towards the discussion. D3 Justify the choice of data collection methods used for 2.3. Why did you use the collection methods that you chose? Evidence: report. TASK 3: Be able to evaluate the research outcomes 3.1 Use appropriate research evaluation techniques. How was the project planning? Explain how you met your aims and objectives from the proposal by stating each objective and explain on how you met this (please link to useful research). What were your research methods effective? How valid and reliable were you findings? e.g. successes and failure What are the benefits of your research results? linked to the usefulness of the research. What were the difficulties you encountered? e.g. people not willing to talk, time consuming, working on excel , not enough literature review, not experienced with regards to research. Discuss about methods of data analysis used and why? Please add conclusion. Evidence: a report on how you used the research evaluation techniques. Please demonstrate the use of the techniques with the aid of statistical or any other relevant tools. Please make sure that you are linking the above to your research. The purpose of this research has been to examine the prevalence of workplace bullying, whilst addressing the experiences of how people responded to their personal experiences of workplace bullying. 1. Prevalence Considering the data obtained in evidence the questionnaire, it can be identified that of the population surveyed were classified as exhibiting bullying behaviour; owing to their responses, whilst some were classified as exhibiting victim behaviour. Referring back to literature findings regarding prevalence rates, similarities can be recognised with the study conducted by Einarsen et al (2011), where empirical evidence suggested that around 5-10% of the European population had at some point been a victim of workplace bullying. Although, the actual rates differ to an extent, they do not drastically juxtapose; supporting the overwhelming theme that workplace bullying remains a continuous and prominent issue in organisational culture. This is further supported through the basic comprehension of the questionnaire, with the four participants each accounting for how the bullying they had experienced had taken place, and the factors that facilitated its continuation. In seeking to generalis e these findings however, difficulties would be faced as no unilaterally agreed prevalence rates could be established. The only conclusion that could be formalised was that the issue remained a threat to both individuals and organisations. 2. Prosocial Recognition regarding the prominence of these behaviours brought into focus the hypotheses, particularly hypothesis one; that a negative relationship existed between the variables of prosocial behaviour and bullying behaviour. In relation to the response obtained from the questionnaire and the subsequent ANOVA analysis, it could be identified that this hypothesis was proven, with the relational significance being obtained. Comprehension of this analysis, in reference to the research question, would seem to suggest that the adoption and implementation of prosocial behaviour directly correlates with a reduction in bullying behaviour. Based upon this finding, it can be suggested that the creation of a culture that promotes prosocial behaviour would be an intellectual move, and one that would be likely to obtain success in diminishing the incidence and effects of workplace bullying. Relating these findings to the literature review, it can be met with support, with Griese (2013) speaking of it as possessing the potential to be utilised as a resilience tactic. By this, the author suggested that prosocial behaviour would reduce incidence of bullying, as the aim is to assist others and to attain social needs; something that would be severely hampered by acts of bullying. In respect to what has been identified thus far, the statistical evidence would seem to support the suggestion, as it shows firstly that bullying remains a predominant issue, and secondly the importance prosocial behaviours can play in eliminating workplace bullying. In applying these findings to the questionnaire, it can be acknowledged that the evidence gathered from the qualitative data supports the creation of a prosocial culture. The interviews conducted with participants via questionnaires, for example, highlighted that in many cases, failure to create prosocial behaviours and positive leadership from management was instrumental in allowing bullying to occur, and in some cases actually led to it being instigated by those in management. This in turn had an effect upon other people within the organisation, with bullying escalating from one-on-one to the creation of a climate of bullying where people felt compromised in their position. The perceived vulnerability that this inflicted upon workers, and in particular victims, reduced their ability to report their experience, as the appearance of bullying as an organisational wide issue resulted in the feeling that their claims would not be listened to; suggesting either nothing would change, or t he risk that the issue would potentially even intensify. This has important implications for both the organisation and management, with the recognisableneed for training to be put into place, setting behavioural boundaries and guidelines that promote the implementation of prosocial behaviour as a form of organisational strategy. The adoption of such training would have to extend itself towards raising awareness amongst workers, regarding the mechanisms available to them to report any grievances. This would be an integral component of the training programme, as in both the literature review and qualitative questionnaire, the findings outline a common perception held by victims, that there is either a sense of non-existent, or limited knowledge of the mechanisms available. Referring to the implications identified, in particular the need for training programmes to promote prosocial behaviour and counter the wider spectrum of workplace bullying, Branch et al (2012) expanded upon existing literature to provide support. The authors (2012) claimed organizational training designed to educate employees about bullying behaviours, the nature of its influence and equipping them with skills to address incidence of bullying, had been found to incur long-term, positive benefits, with improvements in attitudes, knowledge and behaviour. In particular, emphasis would be placed on equality training amongst management. This is important as reflection of the qualitative data highlighted that participant one had been victimised whilst on pregnancy leave, with a job offer being sent by management as a subtle technique of pushing her towards the exit. Equality of opportunity would not do this, but it does depict the necessity for organisations as a whole to create a culture, whereby managers are not capable of displaying such negative acts. What the collaboration of the data shows is that whilst it does occur, it is important the organisation itself implements training for managers, to create a line to be answered by management/organisation. The creation and implementation of the prosocial culture will helporganisations raise awareness and possess knowledge regarding how workplace bullying takes place, so that it can be identified efficiently and appropriately handled if an incident were to occur. Further support for the creation of a prosocial culture originates from the qualitative data. Participants claimed during their negative experiences, other employees had approached them and shared that they had noticed what was going on, but did nothing about it out of fear of being personally targeted. This outlines the importance for the creation of a prosocial culture, as the concept of looking out for the well-being of others and promoting positive behaviour would enable employees to acknowledge the sense of duty to report any acts which pose a threat to the elected culture. 3. Reporting and Long-term effects Examination of the qualitative data identified that none of the four participants reported their experience, citing that neither felt comfortable doing so. The participants highlighted the cause for this as being a lack

Friday, January 17, 2020

English Language Teaching in Gulf Essay

Zafar Syed’s assertions about the TESOL challenges in Gulf are subjective reflection over the issue and he is unable to provide any verified or verifiable data and findings. He places all responsibility on the structural constraints i. e. contextual framework, human resource development, system and standards, and research and knowledge and paid less heed to other relevant and important dimension f the TESOL i. e. the constraints on the art of the students. He relies too much on the secondary sources but those secondary sources are also related to education and teaching general and has taken into consideration English language teaching particularly. To some extent citation of these secondary resources is relevant e. g. citation of Mograby to provides facts and figures about the unprecedented quantitative growth in education in UAE . (338) He then generalizes that this unprecedented growth has adverse effect on the teaching of Language. He describes that this unchecked growth impacted the planning and implementation of English teaching patterns and policies. (338) In the following paragraph, he is unable to support he preposition by any solid line of arguments, research study or verifiable facts and figures. He is unable to demonstrate that how this rapid growth in education industry has affected the teaching of language. It is more important to provide a socio-cultural context as well that deter or propel the teaching and learning of a language. He describes that â€Å"local students see no concrete link between English ability and communicative requirements†. Mr. Syed is correct in saying this as communicative important of any language in general and English language in particular is related to exposure of the students to other medium of communications. If the socio-cultural context is conservative and does not allow a student to participate in activities involving other communities and people, he will be unable to use his acquired language capacity and thus will consider it meaning less and futile. This will restrict English language teaching to academic activity only. But Mr. Syed does not provide why such perception is created and this issue can be tackled. The next constraint that Mr. Syed takes into account is human resource development. This part of the study is most powerful and relevant as Mr. syed evaluates the role of English language faculty development and describes an array of issues related to it. He rightly point out the important of the local Arab English language teachers. The pool of English language teachers in the whole region are comprised of various expatriates groups that do not possess enough knowledge â€Å"about the local socio-cultural communities and languages† (339). Syed accurately concludes hat this lack of knowledge about local socio-cultural context breed problems like teacher-students gap and this gap endangers effect English Language teaching. Foreign teachers are not well-capacitated to anticipate and delve deep into the socio-problems of the learners and hence can suggest remedies to these. Grammar Translation Method also requires an understanding of the local language and context in order to effectively implement this methodology. (Chastain, 1971. p. 131) Mr. Syed concludes that this ad-hocism in the hiring of contractual foreign faculty hinders the way to implement a more effective and locally suitable system as these temporary teachers are less motivated to make an in-depth evaluation of the system. Here r. Syed has recognized the sole cause of the problem that triggers a cause and effect phenomenon leading to the deterioration of the English Language teaching system in Gulf. Only a motivated and well-informed teachers can recognize the contextual important and shortcomings of language teaching and hence can formulate policies to reduce or eradicate these contextual barriers. Mr Syed has further taken in to consideration the systems and standards but he is unable to realize that only senior and seasoned English language teachers and professors can help designing and executing a viable system and standard for English language teaching. It is not something independent in itself. He emphasizes on the importance of research but it must be noted that research only come through established systems and qualified academia. So first there is dire need to develop faculty and establish a contextually modified system of instructions. This will ultimately lead the faculty to conduct research on appropriate issues pertaining to every facets of English language teaching. Despite various defects in his theoretical framework, he provides some excellent insights into Gulf English language teaching. In addition to his content, he had certain serious flaws in the style of his expression. He only comments on a specific issue briefly and then goes on to comment on another challenges faced by the English Language Teaching without elaborating the first one. The very first sentence of the study indicates that it has nothing to do with primary research as conducting interview of the ESL teachers to locate the challenges faced by them. Further, Syed has limited his study to UAE with a little reference to Saudi Arabia here and there. So this not only limits the scope of the study but indicates that relying on a particular country in the region, generalizations have been made about the whole region. Chastain, Kenneth. The Development of Modern Language Skills: Theory to Practice. Philadelphia: Center for Curriculum Development, 1971.

Thursday, January 9, 2020

Cyber Security And Security Of The Users - 1520 Words

Abstract Vehicular networking technology is no more a futuristic concept - it is becoming a reality with the aim of providing services related to traffic safety, traffic efficiency and infotainment [1]. When these kinds of services are introduced, they also bring in the vulnerabilities associated with them, resulting in increased number of security threats and attacks. Hence, it is very important to ensure that these services do not compromise the safety and security of the users [2]. This paper aims to provide a brief overview of cyber security in vehicular networks by analyzing its vulnerabilities, challenges and solutions. I. Introduction Vehicular networks consist of in-vehicle networks and vehicular ad hoc networks (VANETs). The in-vehicle network consists of several Electronic Control Units (ECUs) connected to each other using different communication protocols like Controller Area Network (CAN), Local Interconnect Network (LIN), etc. [3]. The in-vehicle network helps in implementing applications like climate control, engine management, transmission etc. VANETs include vehicle to vehicle (V2V) communication and vehicle to infrastructure (V2I) communication; the combination of which enables in making driving safer and better. Keeping the safety applications in mind, the National Highway Traffic Safety Administration (NHTSA) announced in 2014 that it will start crafting a new rule which would require cars to talk to each other [4]. While this is a major step in makingShow MoreRelatedCyber Defense And Security Issues789 Words   |  4 PagesUnderstanding cyber defense and security issues such as cyber-crime and cyber-attacks ensure efficient functioning of information systems. Cyber-attacks are real, unexpected and increasing in numbers according to Naumovski and Kenkov (2014) cyber defense is emerging as a high priority with the increased use of information technology. Naumovski et al. (2014) noted that understanding cyber defense and security issues would ensure efficient operation of information systems. Naumovski et al. (2014)Read MoreThe Threat Of Cyber Terrorism1093 Words   |  5 PagesSolution Q. No. 2 The possible threat posed by cyber terrorism has motivated considerable alarm. Many security experts have exposed the danger of cyber terrorists hacking into government and remote computer systems and service areas of progressive economies. The possible threat is, indeed, very disturbing. So far, despite all the gloomy pre-dictions, no single example of real cyber terrorism has been recorded. This increases the question: about the threat? Psychological, political, and economicRead MoreThe Plan Of An Insurance Policy1496 Words   |  6 PagesAs mentioned earlier, taking insurance policy is a way to help maintain the risk of cyber attacks at an acceptable level. The plan in figure 2.2 shows an insurance decision plan of action. This plan of action is crucial in illustrating how insurance can help in maintaining the risk. The first step taken in the plan of action is conducting a thorough audit of the current information on security risks, which can be conducted during the assessment of risk process in the framework, after, the companyRead MoreThe International Security Threat Report989 Words   |  4 PagesThe â€Å"International Security Threat Report† provides data on cybersecurity attacks and threats throughout 2012. The report shows that there was a 42% increase in targeted attacks (page 10). Although the types of attacks have been evolving, the number of people affected and the amount of damage has increas ed. Cyber attacks have evolved in such a way that allows them to be a large threat for citizens, businesses, and governments. Cyber attacks have been putting the privacy and information of citizensRead MoreThe Impact of Mobile Devices on Cyber Security1132 Words   |  5 PagesThe Impact of Mobile Devices on Cyber security: The modern society including corporate environments has been characterized by the proliferation of mobile devices. The increased use of these devices is attributed to the significant opportunities they bring and their contribution towards enhanced communication. However, the increased use of mobile devices has been accompanied by considerable concerns regarding the privacy of personal information and sensitive corporate data that are stored on themRead MoreCurrent cybersecurity policy issues for the protection of the Internet infrastructure1573 Words   |  7 Pagesby cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet fr om the End Users. INTRODUCTION From the year 2000 to 2010, the users’ onRead MoreThe Technology That Enhances Real Time Analysis1726 Words   |  7 Pagesthe threats of cyber-attacks. IPS is responsible for detecting intruders breaking into the network systems, or detecting misuse of network resources by authorized users. In addition, when a threat is detected, IPS performs an action in respond to the threat. In such incidents, IPS performs various actions to include sending an alarm to the administrator, stop the traffic coming from the source address, and/or resetting the connection.6 Another tool that consolidates the network security of a companyRead MoreTaking a Look at Cyber Crime680 Words   |  3 Pagescomputer networks by exposing the users of the networks together with the systems to risks. The act is committed intentionally with the objective of creating interruptions that disrupt the normal functioning of the system. Computer users feel the harm directly or through a second party depending on the nature of the tool used in committing the crime (Hull and Sivanesar, 2013, p 98). Computer users across the globe are facing threat, due to the rise in cases of cyber crime, and this is necessitatingRead MoreCyber Criminals And The Internet1461 Words   |  6 Pagestoday’s world class business works on the internet. But this benefit can be enjoyed only if the internet users adopt safe online practices. Cyber criminals are the one who use online resources to steal your personal information which tend to lose of money and reputation. Never think that the money just comes from corporations, banks or wealthy people around the world. Individual online users like you and me are also targets for them. As long as we are connected to the internet the chances ofRead MoreThe Vulnerabilities Of Passwords And Security Essay1473 Words   |  6 Pagesrequired. They are the primary defense against intrusion. However, they can be easily captured and deciphered by cyber criminals. The security in this area is challenging due to the ineffectiveness of the creation of passwords and pins. Kirushnaamoni (2013) elicits that making logging in straightforward and convenient for users and trying to prevent password cracking is problematic. Cyber criminals will continue to persist and target the vulnerabilities in this area. Therefore, personally, financial

Wednesday, January 1, 2020

Group Assignment - Risk Management - Free Essay Example

Sample details Pages: 7 Words: 1969 Downloads: 7 Date added: 2017/06/26 Category Management Essay Type Narrative essay Did you like this example? = Group Assignment 1 Task 2 _ DB702- RISK MANAGEMENT This group Report is regarding a given business à ¢Ã¢â€š ¬Ã…“Luna à ¢Ã¢â€š ¬Ã…“.   In this report we are discussing the risks in the given business and then further doing analysis of it by recommending some solution that can help to minimize that chance of risk and also make sure that the cost of reducing risk does not go higher than the normal profit of the organization. Introduction:- Lunaà ¢Ã¢â€š ¬Ã¢â€ž ¢s is a brand new convenient store located at Fennville close to aspen estates. Aspen estate is an area where people live with high income. Don’t waste time! Our writers will create an original "Group Assignment Risk Management" essay for you Create order Most of young people live in this area. In this area there is no any convenience store around it with in distance of 5 km. so, this provide the huge chance for the store to maximize their sales or profit. It is a company owned by two partners named Thomas and Heidi Renner they both are perfect in their field. Heidi hold a vast experience in the food industry for 15 years. While the other one is certified public accountant. Thomas deals with the daily operations alongside the financial side of the Business. They work together as a good team to lead the business which provide the huge range of food products Lunaà ¢Ã¢â€š ¬Ã¢â€ž ¢s provides the fresh produce which consist of all kinds of fruits like apples, pears, avocadoes, melons, kiwi fruits and other seasonal fruits. This provide the vegetables and non- vegetable items which includes frozen chicken or other types of meat plus some peas in form of frozen vegetables . This store also provides the drinks service as well which further includes the soft drinks and the Alcoholic drinks which shows that there is no problem with liquor license of the store. To keep in touch The people of the town with rest of the world this store provides newspaper as well. As to introduce the People about the specials of the Luna the store gives the free pamphlets with newspapers and the food That people buy from the store. To keep the people healthy and beautiful this provides the health and Beauty items in the store like creams, shampoos, soaps, perfumes .Luna provides the sitting area for Approximately 20 people they can do there on their breakfast lunch tea breaks and coffees as well. Risk involved in the Business (Luna):- Business Risk: Business risk are kind of vast nature. These are kind of risks which classified in to two types. Internal risk and external risk Internal risk: These kind of risk are produced from the activities that is happening inside the business enterprise. These kind of risk can be determined and the chance can be conducted. The various internal factors which arise to such risk are Human Factors: the human factors are important cause of internal risk like in case of Luna it can happen with the sticks or lockout which arise from the certain accidents inside the store. As Luna also sales alcohols it is not easy to hire full licensed bar attenders. Internal risk in Luna arises from the supplier which supply the goods to store if the supply is not happening on the time it directly affect the Luna enterprise. As store is situated in highly developed area obviously the income of the store will be high and there is more chance of the store getting robbed. Technological factor : This can arise by the introduction of new production or distribution techniques like our eftpos system is wave pass which means it if someo ne just put their card in front of the wave .pass eftpos machine and the cashier press the eftpos button it will take the money out without even asking the customer for their pin number . Sometimes some customers want to pay from their different account like savings or cheque but it will deduct money from the credit account which cannot be reversed. The various external factors which arise to such risk are:- Natural factor: these are factor on which the entrepreneur can do nothing or do little. These outcome from the activities like floods, tornedo, earth quake, cyclone. Such events cause loss of life or they may spoil all the goods. Political factors: political factors arises because of the political change in the country. Like change in trade policy, budget etc. for e.g.:- change in political party. Insurance risk: this is a kind of transferable risk to the insurance company who insured the assets of the store. Compliance risk à ¢Ã¢â€š ¬Ã¢â‚¬Å" if there is no ce rtain policies or procedures of the stored food products like proper visible expiry date on items then the food items will expire and it is a health and safety issue in the system. Legal Risk: legal risks can occur in form of employees quit the job without giving any notice period also Someone misconduct the policies made by the organization. For e.g. some staff is steeling or someone is miss behaving with other staff by using abusive language etc. Business disruption risk:- Business disruption can come in form of strike from the worker working in the organization and other form can be supplier issues or delay in delivery of the products that can result on out of stock of some products for certain time is also a risk to sales or profit of the business. There can also be a power failure that can lead to business disruption for certain time period. Accounting and Finance risk:- Financial risks in this business can be on different levels so there should be a system of identifying the risk, further analyzing risks and reducing the risk. Analysis of internal risks in Luna:- Analysis of human factor :- As most of the liquor businesses close down due to serving drunk people or serving under age people ( i:e teenagers ) . Lunaà ¢Ã¢â€š ¬Ã¢â€ž ¢s is the business which provides alcoholic products. in order to reduce the human risk one should avoid to enter the drunk people inside the store to make sure to check the ID of the teen age people . As the surrounding of the Luna is highly developed so there is more probability of people getting drunk on the weekends so there should be extra security person especially on the weekends the understands the local community to look the welfare of the store . If the conditions of the store is out of control of the security person there should be the emergency phone list to call the police, fire, and ambulance to minimize the risk. Cashiers should know that the visibility of the smokes should be limited to the customers coming in the store. This also can help in reducing any robbing risks. Analysis of technology: these days we see lot of credit cards are pay wave and they definitely are good and fast way of payment but there is always a risk of someone to lose that pay wave card and any person who finds that card can use it without pin number so due to technological disadvantage we canà ¢Ã¢â€š ¬Ã¢â€ž ¢t remove the risk totally but we can put certain steps to reduce the risk such as putting credit limits to the card use for e.g. : if someone use the card using pay wave machine there must be limit to the amount of 80 $ so if someone want to redeem over 80$ from the card they have to use the pin number . Instruction near counter area or pay wave signs that indicates that the machines are pay wave so that if someone do not want to redeem the money from their credit account or in other words they want to use there check or saving accounts they know before giving their cards to t he cashier . Intellisafe should be use near the counter so that there must be the limit to the cash in the till for e.g. no staff member or cashier should have more than $300 in the till. Analysis of Natural factors:- As Luna is the recently developed area obviously it is area where the risk of the natural disaster is less. But because of the environment change natural disaster can occur. So in order to avoid or reduce the risk the store is based on a really strong foundation. In case of short circuit Luna can face the fire accident so to minimize the fire damage the water sprinkler are installed in the building. There are also exit sign in case of emergency like fire or any natural disaster like earth quake. Fire extinguisher are also up to date and installed in each floor of the building and staff is well aware of how to operate that fire extinguisher in case of an emergency. Fire or smoke alarms are also installed in the building to minimize the risk. Analysis of comp liance Risk:- In order to reduce the risk of getting more expired Stock there should be a system put in place such as FIFO that means first stock that come in the store should be sold first also stock should be rotated and checked by the staff on regular basis by each department . Legal Risk analysis :- To avoid this risk there should be at least 2 weeksà ¢Ã¢â€š ¬Ã¢â€ž ¢ notice period and a certain agreement read and signed by both parties and both parties ( employers and employeeà ¢Ã¢â€š ¬Ã¢â€ž ¢s ) should be aware of everything and also there should be a plenty or punishment in case of breaking organizational laws orders . Other legal requirement could be all the required legal documents should be filled and inspected regularly for e.g:- for food safety there should be check for the temperature checks and devices check regularly. Food storing devices can be checked with doing regular calibration of the devices. Business Disruption analysis :- there is always a chance of having power failure anywhere so there should be a backup system that help in case of power failure and doesnà ¢Ã¢â€š ¬Ã¢â€ž ¢t not let the important information in the company database to be interrupted or deleted accidently or stopping the flow of work . other types of problems can arise like strike from the worker due to some reason can also stop the flow of work so there should be a proper management system that put in place so that if any worker have any issues in the organization can talk to the higher authorities and it get sorted with in certain time frame . For e.g. complaint boxes can also be installed that can help to understand if anything is going wrong or some area needs improvement. Analysis of Financial risk:- The management should have certain skills that can help in minimizing the financial risks in the business such as follow :- How to understand and evaluate business risk. Systematic framework or realistic models should help to reduce financial risk. Calculating the cost of risk and making sure that the cost of reducing the risk should not go more than the regular profit of the company. A satisfactory risk report can be made that can help to understand the risk in more detailed manner. Conclusion of Lunaà ¢Ã¢â€š ¬Ã¢â€ž ¢s Business:- As like any other normal business this business also have certain internal and external risks that can affect badly to the performance of the organization of the company like we have classified almost all risks in the business and done further analysis and provided their solution in a sequence . now we have also make sure that how much is the probability of the risk or how much chance of occurring a certain risk and how to minimize it by spending as less money as possible so that the cost of managing the risk does not go higher than the profit of the organization . Referencing:- www.Wikipidia.com www.Youtube.com.