Thursday, October 31, 2019

Media Research Paper Example | Topics and Well Written Essays - 500 words - 1

Media - Research Paper Example Despite the conventional assumption that social media suited the Millennial Generation, it is evident that Baby boomers have adopted social media as the contemporary form of communication. The question relating to the means in which social media has shaped an individual’s life shares almost similar answers from everyone who utilizes social media. As such, it is evident that social media has shortened communication channels, making it easier to reach out to people at low costs regardless of the physical distance. For instance, communicating abroad through mobile networks require additional charges unlike social media whereby all that is needed is a reliable internet connection. The reduced costs of communication that accompany social media have enhanced social interaction among peers. As such, social media has removed some of the inherent barriers to effective communication among individuals who could not afford the extra costs of communicating with people abroad. Social media has been embraced in the business world to enhance the process of establishing a global market. As such, various social media play different role in ensuring that the intended message is communicated as desired. For instance, Facebook and Twitter allow users to communicate in short messages also termed as â€Å"Micro blogs.† On the other hand, Instagram allows users to communicate in form of picture messages. LinkedIn takes a different approach and creates a platform for work professionals to share their profiles. As such, every aspect of social media is differentiated to ensure that the user needs are met without overlapping. The functions of different social media ensure that the services offered are all round, making it a comprehensive communication platform. Social media, being a comprehensive communication platform, has myriad drawbacks besides boasting of numerous benefits. The most evident benefit of social media is

Tuesday, October 29, 2019

How journalists influenced US war efforts in Vietnam Research Paper

How journalists influenced US war efforts in Vietnam - Research Paper Example The differences that led to war involved the Northerners favoring communist form of rule and the Southerners favoring non-communist form of rule. The stand by Southerners tended to cohere with the desire of USA, which hated communist rule. Coupled with the fear of about the possible spread of communist rule across the entire East Asia in case any country managed to secure an opportunity, USA resolved to help South Vietnam intensify war against North to defeat the idea of communism. The perceived support given to the South prompted the North to fire directly on US ships1. This act aggrieved US authorities thus resolving to direct involvement and participation in the war. This is how US entered into the Vietnam affair, where it emerged unsuccessful due to various factors. One of the main factors was the involvement of American journalists in an era when televisions were widespread across many households in US. 2The digital technology of television and newspapers facilitated the process of journalists transmitting real videos and pictures as happened in the battle ground. Influence of Journalists on US efforts in Vietnam War Prior to the arrival of the US journalists in the war field, US government tended to deliver deceptive reports concerning the progress of the war. At first, the government denied claims that US troops took part in the war, while they did. This came clear after the arrival of the journalists in the war field, who captured and aired the real events. The reports send by the journalists showed how US participated in aerial bombings that killed many people. Some of the news showed children running helplessly in Trang Bang after being hit by and injured by bombs fell by US military. 3These pictures frightened and aggrieved most of the Americans who started blaming the government for mismanaging American resources by fighting innocent children. In fact, television news and newspapers covered a terror-stricken girl running along the street naked after her cloths burnt in bomb triggered fires. In bid to quell citizens, American government responded by claiming that the attacks on children were due to misdirected bomb thrown by South Vietnamese soldiers4. This claim was in total contradiction to the pictures and videos transmitted by journalists, which showed US airplanes dropping the bombs. 5Journalist reported and transmitted videos of massacres of US soldiers during the Tet offense of 1968, alongside flying of dead bodies of soldiers back to US. Furthermore, journalists investigating the Vietnam at some moments focused on the sad atrocities caused by US soldiers who massacred people across Vietnam. This news increasingly aggrieved US citizens who continued to declare strong opposition of the government in the Vietnam War. 6In spite of the media transmitting clear pictures and information as happening in the battleground, US government persisted on denial and even quoting small number of deaths of soldier contrary to the visual records transmitted by media. It this continued denial of the government and closure of truth that aggravated public anger to an extent of engaging public protests demanding for withdrawal of US troops from Vietnam. 7The media through the respective investigative journalists stationed in Saigon did at one time transmit images about Buddhist crisis of 1963. The images showed people committing serious suicide away of protesting restriction to religious rights by Diem

Sunday, October 27, 2019

History Of The Indus Motor Company Commerce Essay

History Of The Indus Motor Company Commerce Essay The assignment has been worked to look into the chosen organisation with regards to its environment effect on Indus Motors for achieving its objective in the diverse industries culture where the organization is based. Indus motor company is a joint venture between Toyota motor corporation, house of habib and Toyota tsusho corporation Japan, for manufacturing, assembling and marketing Toyota vehicles in Pakistan and the neighboring countries since late 80s. The dealership network the IMC has established is the only one which distributes Toyota and Daihatsu vehicles in the country. It was incorporated in Pakistan as a public limited company at commencing stage where as the commercial production took place in 1993 may, the stock exchange of Pakistan quotes the shares of the company Toyota motor corporation and Toyota tsusho corporation possess twenty five percent of the equity, house of habib own the majority shares in the organisation. The production facilities are located in the industrial area near Karachi called Port Qasim of around 100 acres. The current social, economic changes and their impact on Indus Motors Company Ltd A social change refers to the regulation of values, norms and customs of society. As IMC does believe in the customer satisfaction so they try to manufacture the product according to the need of customers. Their targeted market belongs to the upper class of the society. They think that the upper class people perceive the GLI as their status value. IMC believes that people are becoming more price conscious along with the need of car that consume low amount of fuel with high mileage coverage. The other social factors that is impacting a lot is the literacy rate of people is growing due to which people are becoming more quality conscious along with the price consciousness so that IMC is concentrating to improve its quality along with the diminish in the price. Some economics forces are also impacting the current scenario of IMC like as the inflation is increasing day by day the input cost of assembling cars in IMC is also increasing due to the import of CKD unit from Japan. It results in diminish the purchasing power of the people that affect their buying behavior. Due to taxation policy the Honda have the competitive advantage over IMC as it has given tax exemption till 1998 to its customers. Diverse approaches to strategy-making concepts of strategic change, search, choice and implementation Economic and management viewpoint on organization tactic can and should be incorporated. The intermediation hypothesis of the firm and models of market micro structure provide a basis for advancing the integration of management and economics perspectives. In particular, the theory allows for a combination of economic approaches work on competitive strategy with management approaches such as work on the abilities and resources of the organization. The article presents a combined strategy framework based on transaction costs and the intermediation theory of the firm. The impact of globalization on employment markets and practices The recent wave of mergers and acquisitions in the automotive assembly industry itself has triggered a similar round of merger mania in the auto parts segment. One of the more significant developments of recent years has been the transformation of the auto parts business into a separate industry in its own right. One of the more significant developments of recent years has been the transformation of the auto parts business into a separate industry in its own right. Even as the automobile business grows, it is also becoming more competitive. Currently, there is worldwide overcapacity in the industryand this has forced manufacturers to contain and even reduce costs. In the United States, for instance, the average monthly vehicle payment as a percentage of household income has dropped from 12.5 percent in 1980 to only 7.5 percent todaya 40 percent decrease. Emergent theories of corporate strategy and their relevance to IMC In the year 2000, Toyota rolled out its multi purpose vehicle (MUV) Qualis in India that was an instant success. Gradually It introduced Camry, Corolla and later in 2005, Innova. All these models created success saga for Toyota Kirloskar. Notwithstanding of its initial success, Toyota could manage to have meager 5% market share in Indian passenger car market that remained far away from its mission statement to grab 10% market share in Indian passenger car market by 2010. Analysts predicted that unless Toyota would enter into compact car segment, it would unlikely to have that much market share. SWOT, PEST and PESTEL tools and change management to different organizations development and their potential impact on the strategic business THREATS The government tax policies are threat to Indus motors. They have to pay 35% import duty on CKD kits that is imported from Japan. Honda motors are subscribed by 5% tax while Toyota has to pay 30% on its earnings. The major part of diminishing of the production and demand of the products is also due to the law and order situation. Political instability also affects the whole scenario of the automobile industry due to the inconsistency of tax and import duties. The substitute products of the Toyota products like Suzuki are also a big threat to the organization, as the demand for low price vehicles is increasing day by day so that the demand for Suzuki products are becoming more market oriented than Toyota. Due to the inflation and fluctuation in exchange rate also considered as the major threat for diminishing the demand for the companys products. The stern competitions in the higher sector market are also a threat to Indus Motors. OPPORTUNITIES As the political condition of Afghanistan is becoming more stable and the completion of motorways and expansion in the road networks is gaining the high impact on people so that the consumption of commercial vehicles is growing day by day that will lead to an inevitable growth in the transport sector. There is also a chance to expand market of Toyota Hilux in Nepal and Bhutan. According to sources from Indus Motor, if engineering board of Pakistan makes the industry specific deletion policy this will provide an opportunity for the development of vendor industry. WEAKNESSES Indus motor has not yet achieved appropriate economies of scale as compared to its competitors. Indus Motor and Honda Atlas motors are producing the same no of vehicles but Indus Motor gain huge cost. For Indus CKD kits account for 75% of their total Manufacturing cost, where as for Honda CKD kit account for 65% CKD kits cost for Indus is on the average about 25% higher than its competitor Honda Atlas. It is obvious that Indus is producing 5000 vehicles at higher cost as compared to its competitors. Indus Motor Company is producing so much lower units than its capacity as it has the total capacity of 20000 units, but at present they are producing around 5000 units. It means that they are not amortizing their fixed cost in best way. Their dealership network is weak, as they do not own this dealership network. STRENGTHS Its strengths are its location, its latest technology that is considered as no.3 in Asia. As far as its image is concerned in the market it is considered as the market leader within the industry because of its quality, brand loyalty and household product. Its capacity is also its strength that is currently about 20000 units per anum but it can be expanded up to 40000 units per year. Indus Motor Company has a extensive product range, which includes 20 vehicles. Which satisfy each and every segment of market. Its efficient and well-trained labor is also its big strength. Genuine spare parts can be easily available in the market and the resale value of Toyota also considered as its strength. Creative Suggestion System is also strength. New technologies and their impacts on people and process of IMC The kind of technology employed by an organization gives an important edge in terms of quality. Technology is of two types: labor intensive and capital intensive (state-of-the-art technology, for example). In case of Indus Motors, the company has installed capital-intensive technology. They are using conveyer belts to transfer a car during assembling from are station to another station. They have heat exchanger, spray booth, drying tower, etc. For measuring and checking of locally manufactured parts in order to maintain quality standard and to assist vendors in product development, a state-of-the-art Quadrant Measuring Machine was installed in 1997. In 1996, the company acquired new computer technology for the implementation of software and its applications, which provides a centralized database support integration between Manufacturing and Financial systems, and is assisting the company in providing meaningful data in time for management decision making. The impact on the business strategy of the external business environment Because of the continuous change in environment, there is an element of uncertainty in the environment. The environment has become highly complex and dynamic. Keeping this thing in mind, a company must look for a strategic fit between what the environment wants and what the company has to offer, as well as between what the company needs and what the environment can provide. Thats why before an organization begins to formulate strategy, the management must screen the environment and identify external environmental factors, which affect the organization. Importance of customer driven strategies in developing and implementing a successful business strategy Product which company offers is also resource of company. Larger the product mix, greater will be return on sale of product. Indus Motors company has analyzed needs and wants if its customer and has made available a broad product range to suit their need. All the cars in its product range are a beautiful brand of style, economy and technology. Now they are going to increase its product range by introducing Daihatsu Coure in year 2000 that also possess all the qualities, which its all the cars have. The Toyota has entered in the maturity stage of product life cycle and its market share has shrunk from 60% to 41%, but in spite of all this, Toyota is still enjoying brand loyalty and higher returns. This is obvious from the tact that company has earned its. 271.70 million pre-tax profits for the year 1998, and it announce to pay 15% dividend to the shareholders of the Company. The importance of management and leadership in developing and implementing business strategy Every successful business requires effective leadership to fully utilise the skills of staff in order to achieve the aims of the business. This isnt just a matter for larger businesses even if you only employ one or two people you still need to make sure that you make the most of their abilities and aptitudes. This requires a distinct set of management skills and the confidence to carry them out. You have to be able to motivate and develop your team, to communicate well with them and to build a business strategy that allows each individual to perform to the best of their abilities. Use of strategic alliances and joint ventures, and alternative routes to survive, prosper and avoid failure A strategic alliance, broadly defined, is a contractual agreement among firms to cooperate to obtain an objective without regard to the legal or organizational form the alliance takes. The aim of joint venture is progressive manufacture of Toyota vehicles and components parts with an initial annual capacity of 20,000 units expandable to 40000 units or more to meet the requirements and quality standard of the automotive industry for tile Twenty-first Century. Appraise processes by which organizations identify their goals and values Employee involvement can supplement strong corporate cultures to develop innovative organizations. Executives from forty successful companies responded to interviews on the organizations values and involvement practices. Structural equation analysis indicate that effective involvement measured by the use of employee problem solving groups, cooperative interaction, and employee influence was a critical mediating mechanism between people-oriented values and firm performance. These results suggest the complex challenge of developing a successful organization and guides for making an organization both value-driven and productive. Current and likely future demographic trends in the UK and internationally Toyota forcefully long-drawn-out manufacture ability over the history decade well in front of predictable order. Profits on export vehicles finished in Japan have as well be hit by a intensification Japanese yen. Toyota has a near chokehold on the US cross/low-emissions car sell thanks to the redesigned Prius. As the American Big Three thrash regarding to convene the 35-mpg authorization by 2020, Toyota has a beginning start. In late 2009 and early on 2010, on the other hand, Toyota initiate two disconnect but associated recall to a number of vehicle types together with the 2010 Prius that were single-minded by the U.S. general Highway travel protection direction as experience broken down speeding up. The succeeding bring to mind on January 21, 2010 unwavering that the beforehand assumed drivers floor mat issue was not to be answerable; somewhat, a more grave issue concerning the sticking accelerator pedal was at cause. as a result, the total universal digit of cars recalled by Toyot a stand at 9 million vehicles, extrapolative to a price that will go beyond $3 billion USD international. As of February 2010, over 30 lawsuit have been file alongside Toyota concerning accelerator harms. The impact of globalization and international trade on IMC With the globalization of markets, greater foreign competition, and the reduction of barriers to entry, it becomes all the more important to benchmark a companys financial indicators on a worldwide basis. World stock markets have recently witnessed a return to fundamental financial analysis. Globalization brings in new technology. On a selective basis, globalization indeed brings in new technology and opposition to globalization is not tantamount to becoming technologically isolated from the rest of the world. But today, almost no advocate of globalization is calling for selectivity. Importers have a strong financial interest in a globalize economy. But so do exporters dependent on imported parts and machinery. Industrialists with interests in ports, shipping, international warehousing and other aspects of international trade and commerce may also see globalization as beneficial to their sectors of the economy. Social trends and social problems in the UK The automotive industry currently faces huge challenges. The fundamental technological paradigm it relies on, volume production, has become progressively more unprofitable in the face of increasingly segmented niche markets. At the same time it faces increasing regulatory and social pressures to improve both the sustainability of its products and methods of production. The use of more sustainable fuel sources and new types of modular design with built-in recyclables. However, these technologies can only be fully exploited if methods of manufacture change. The book also describes new models of decentralized production, particularly the micro factory retailing (MFR) model, which provide an alternative to volume production and promise to be both more sustainable and more profitable. Patterns of change in social attitudes and their significance for organizations An financial, community, cultural, and emotional-psychological reproductive component that is predictable to serve up, conserve, and raise persons and community and even uphold nation. It is also predictable, through its own strategy, to continue to exist and flourish, cope and conquer, under the best and worst of state of affairs. It is unspecified and predictable by state, civilization, social organizations, and persons to be stable and dependable in the countenance of modify, be it good chance or disaster and complexity. unspecified to be muscular and kind, the flexibility of the relations is frequently taken for decided. In short, it is predictable to be a unwavering, confidential financial and social sanctuary net at all period and beneath all circumstances. In actuality it is certainly often the sole and eventual protection net, both in period of financial enlargement and disaster. The relevancy of business ethics and corporate social responsibility with regards to change The importance of ethics in business is seen all the way into the structural natures of businesses. It is not just a notion that you have; it is in the way a business operates that can show the importance of ethics in your company. The dedication to ethics must come from the highest ranks of the organization. In order to have a principled company, you must have a principled leadership. With the amount of pollution in the world today it is very important for business to be socially responsible in operation. For instance, my company has its own environmental department, which takes care of any environmental issues that may occur in our daily operations Organizational arrangements for supervising ethics and corporate In the procedure of production with the member of staff, the subject was not first and foremost one of principles, other than of two ethical principles in clash, sympathy and apprehension for a beneficiary human being and the principles central response to duplicity. The second govern the consequences because that goodness was matching with the principal ethics of the company concerned with preserving the influence makeup and reliability of the association quite than the individual benefit of the personality in the corporation . managerial behavior towards specific employees might be strong-minded by person decency that is unbreakable by secretarial ethical main beliefs additional anxious with the selfishness of the association than beliefs per se. Relationship between ethics and corporate governance Business ethics and corporate governance have become key factors influencing investment decisions and determining the flows of capital worldwide. In part, this is the result of scandals in both developed and developing countries. However, in a more positive sense, the growing demand for good governance also flows from the lessons learned about how to generate rapid economic growth through market institutions. From this perspective, the emphasis on anti-corruption and good governance is based both in moral standards as well utilitarian considerations of improved market performance. The impact of the increasingly competitive global environment and the needs for innovation, entrepreneurship in organizations All innovation begins with creative ideas . . . We define innovation as the successful implementation of creative ideas within an organization. In this view, creativity by individuals and teams is a starting point for innovation; the first is necessary but not sufficient condition for the second. Booming supervision in the new millennium requires on the rise new method and approaches to outfit the challenge and opportunity of this latest period of globalization. An entrepreneurial move toward is seen by numerous scholars and strategy makers as a main alternative to improve managerial routine in this period. The impression of entrepreneurship is multi-dimensional and moment again vague. different perspective have dissimilar implication for how entrepreneurship is connected to and assist support sustainable development (SD). This initial paper to WREMSD will effort to discover viewpoint from approximately the world on entrepreneurship, administration, and SD. The main goal are to give details diverse perspective on what is destined by the expression entrepreneurship in a universal background and to offer an general idea of SD in next of kin to entrepreneurship. The document argue that it is necessary that investigate and rule improvement completely takes explanation of the cont radictory perspective of entrepreneurship and make unequivocal the exacting viewpoint that they are attractive. No single description of necessity fully capture the idea, but by life form obvious about our sense of the notion and the original assumption, we can development our accepting of entrepreneurship and its associations to SD. Evolution of regulation of business activity The Toyota Industries Group will contribute to compatibility of environmental conservation and economic growth throughout its wide range of business activities, including automobile, industrial equipment, and electronic logistics. The Toyota Industries Group will continue to set challenging targets aimed at further reducing the environmental impact of its business activities, listening carefully to voices of its stakeholders such as customers, and acting in compliance with the letter and spirit of laws and regulations. The Toyota Industries Group will continuously improve its environmental management, placing environmental activities among its highest priorities. The Toyota Industries Group will aim to foster greater communication and teamwork within a wide range of partnerships, including those with customers and suppliers, in order to promote sustainable management of the environment. In addition, the Toyota Industries Group will act as an upstanding corporate citizen, taking an active part in the planning of activities that contribute to various regional communities as well as to our global society Enterprise and corporate concepts At the heart of The Toyota Way is a core belief that our workforce is a critical asset and that all permanent employees should benefit from stable employment. We also believe that our success as a sustainable organization depends on the commitment of employees who understand and work according to The Toyota Way. Employees crossways the industry are empower to think and pick up their behavior in ways that add charge to the selling and get them acknowledgment from their general management. Quality Control Circles or QCC, as it is generally known within the industry, is a motivational implement used by line employees at Toyotas invention vegetation. It is planned to give confidence workers to proactively recognize and respond to harms on the line. Toyota chains long-term employee growth through widespread programmer of universal and practical training courses. It begin at the very initiate of an employees occupation at the corporation with basic preparation about The Toyota Way. preparation courses are obtainable to office staff, as well as recruits in manufacture, retailer and the after sales system. Elements of the implementation process The corporate philosophy, rules set up and attitudes which control the resources usage is the main reason of Toyotas success in the world market. Through its admirable productivity the company has earn its repute in world in a very successful manner. Its basic approach of bettering its products and the way of delivery is customer friendly and driven towards market. Its way of authorizing its manpower is the critical human resource management systematic approach which improves the productivity, the innovation and on going improvement and the engagement of employees which the most likely will result into loyal employees. Where there is more job satisfaction hence for obvious reasons the productivity is precise and desired, in lined with the cost effectiveness. The company possesses a very achieving and profitable workforce in practice thorough out its outlets no matter where in the world. So as its suppliers have benefited from the practices in use where ever they have faced difficulti es. Understand continuous monitoring and improvement techniques Systematic and organized approach is crucial in the implementation, introduction and improvement of project management process which helps to resolve organizational short comings, helps the costs control, improves the shared understanding and more secure outcomes are obtained. With in the motor industry many organizations have decided to involve into software intensive areas and engage into several improvement programs. One of the main issues in such a context is project management for the better way towards success. Gradual approach is presented in this text for the introduction and improvement of project management. The steps are defined which are required to enhance the implementations of project management in software intensive organization and its core projects. The key factors are well been spoken upon success criteria, the ways and tools necessary to achieve better and systematic, global and in practice project management process. Kaizen events have become commonplace at companies that practice lean manufacturing. But these events are only a portion of the complete Kaizen process. Traditionally companies have focused on a project-based path to change. Organizations that work toward a state of constant improvement understand that Kaizen events are a tool that allows them to focus resources and employees on process improvements. By understanding the current process and the future state goals you can implement Kaizen. Creating a corporate culture of continuous improvement will allow you to adapt to a changing marketplace and exceed customer expectations. Establish KPIS and KGIS and scorecard to measure and monitor change within organization Diverse groups usually manage supply chain and logistics for a solitary commerce unit. fairly frequently third party logistic is used for incorporate the a variety of logistic armed forces under one crown. Fierce opposition and increasing client prospect have forced business to go for third party logistics. These collaboration typically achieve over human being vendor, as join up of services underneath one head assure better suppleness, ready efficiency the length of with better client happiness levels and bigger supply chain management, also the most central factor of cheap expenses. Key performance indicators (KPIs) are the full stipulation used to path business objectives. They are distinct within the background of the commerce actions editor and evaluate by Web Sphere Business Monitor. KPIs are shaped base on business goal. A industry objective is an decision-making statement of way in carry of a commercial policy. The industry point is a elevated goal that is experimental, computable, and results-oriented. For industry procedures model, the production objective is translate into a KPI that enable the association to measure some feature of the procedure next to a aim that they describe. Within Web Sphere Business watch, the KPI is compare against genuine results to conclude the level of achievement. A KPI is linked with a exact procedure and is normally represent by a numeric worth. A KPI might have a goal and permissible limits or inferior and higher limits, form a range of presentation that the procedure be supposed to achieve. A KPI can be consideration of as a metric with a objective. An example of a simple KPI is: standard time for answer to a customer question is less than two days. Principles of change and the organizational change process Any business or organization has to change its strategy almost constantly for the sake of competitive in the market with other organization and it is the requirement of todays business. The main factor due to which we need to change our business rapidly is globalization in order to survive. Sometimes technological changes take place on their own but they often they are change or introduced as components of larger strategic changes. Who will be threatened the most by changes is determined by an important aspect of changes technology and it will determine as well. For the success any changes in technology must be matched with the companys overall system or strategy and they should create a management structure to support it. Some companies change through negotiation and rewards to manage to overcome resistance. Other companies resort to handling, or using slight plans such as giving a confrontation organizer a well-known place in the change attempt. A final option is compulsion, which involves punishing people who refuse to accept or using power to ensure their collaboration. Although this method can be helpful when momentum is of the core, it can have lasting unhelpful special effects on the company. Change activities in providing level of assurance with in organization Quality assurance, in its broadest sense, is any action taken to prevent quality problems from occurring. In practice, this means devising systems for carrying out tasks, which directly affect product quality. A simple example of quality assurance is a cooking recipe. A recipe is a system for preparing a particular dish. It describes the ingredients and utensils necessary to prepare the food, the method of cooking it, how to test when it is ready, how to store it, and how to serve it. Cooking to a recipe produces better and more consistent results. And the same applies to using systems in other situations. Systems of various kinds are, of course, already an integral part of all organizations. But in most cases they do not thoroughly address quality as a separate and important issue. This changes when an organization embraces and pursues quality assurance. Quality assurance does not only apply to products. Services, and even non-production activities such as administration and sales, benefit from a quality assurance approach. Implementation of the chance process including resistance of change and practical management aspects Change management is the process, tools and techniques to manage the people-side of busine that will squeeze change as long as they are part of the process ss change to achieve the required business outcome, and to realize that business change effectively within the social infrastructure of the workplace. Market requirement bring evulationary changes in management for good competitor in business today. Now the world is moving in core of employee to empowerment, ownership, and accountability which has changes the automobile industry work force that will squeeze change as long as they are part of the process. Offerings from both the engineering and psychology fields are producing a meeting of thought that is crucial for successful design and accomplishment of business change. In other words, a business must constantly examine its routine, strategy, processes and systems to understand what changes need to be made. Increasing external and internal factors have made this strategy essential for endurance. However, an organization must also appreciate the implication of a new business change on its workers given their culture, values, history and ability for change. It is the front-line employees that ultimately execute on the new day-to-day activities and make the new processes and systems come to life in the business. Conclusion In the end it may conclude that if Indus motor want to survive in this era of Globalization they need to recheck their strategy day by day and they need invention of new ideas or applications for according to market demand. And if they apply the strategies which I recommend or they launch features which I discussed above then they can get more share of the market and compete other companies. They need to do some agreements or strategic alliance with the other companies it may good for

Friday, October 25, 2019

Economics: Keynes vs. Hayek Essay -- Keynes vs. Hayek, 2014

The past few years the United States has seen some rough economic times.   The unemployment rate is extremely high and many people have lost their homes and businesses.   Because there are so many factors in an economy, it is hard to find the right people to blame.   The protest group â€Å"Occupy Wall Street† has come to the conclusion that corporations are making us poor through taking advantage of us and the governmental system.  Ã‚   The share of income going to the top one percent of Americans has increased dramatically over the past few years and â€Å"Occupy Wall Street† is outraged.   They are calling for increased governmental regulation so that the lower quintile Americans can gain some equality (Cesca).     I wonder who is actually at fault.   Is it actually this top one percent who have been hurting us or some other factor?   Maybe the government has created the problem. A good way to approach it is to take a step back and look at the philosophy of economics.   From learning about classical economic theory, modern dilemmas, specifically â€Å"Occupy Wall Street,† may be easier to solve.   There are two main theories on economics and how a society should run.   The classical theory is that of the British economist, John Maynard Keynes.  Ã‚   The other, less popular theory is from the Austrian economist, Friedrich August Hayek.   These two highly respected economists did most of their important work in the mid-20th  century. (Cochran and Glahe 69). John Maynard Keynes classical approach to economics and the business cycle has dominated society, especially the United States.   His idea was that government intervention was necessary in a properly functioning economy.   Ã‚  One economic author, John Edward King, claimed of the theory that: Keynes believed tha... ...itical Economy  26.1   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   (1994): 69-94. Print.    Papola, John. â€Å"Fight of the Century: Keynes vs. Hayek Round Two† – YouTube.  YouTube –   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Broadcast Yourself.  Web. 29 Oct. 2011.    Friedman, Milton.  Capitalism and Freedom.  [Chicago]: University of Chicago, 1962.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Print    King, J. E. â€Å"Keynes and ‘Psychology’.†Ã‚  Economic Papers: A Journal of Applied   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Economics and Policy  29.1 (2010): 1-12. Print.    Maiello, Michael. â€Å"Keynes vs. Hayek Debate Rages With OWS and Tea Party.†Ã‚  The Daily Beast. 29 Oct. 2011. Web. 06 Nov. 2011    Roberts, Russ. â€Å"Occupy Wall Street and Washington’s History of Financial Bailouts | Foreign   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Affairs.†Ã‚  Home | Foreign Affairs. 21 Oct. 2011. Web. 06 Nov. 2011.      Rosenberg, Alex. â€Å"Rosenberg on the Nature of Economics.† Interview. Audio blog post.  EconTalk. ITunes, 26 Sept. 2011. Web. 30 Oct. 2011.

Thursday, October 24, 2019

Online Courses: the Pros and Cons

Online Courses: The Pros and Cons By Melody More and more students are taking online classes. They are advertised on the radio, television, and billboards, promising convenience and opportunities. Even traditional universities are now offering online classes in conjunction with their normal â€Å"brick and mortor† classes. In actuality, online classes only appear to be easier and more convenient. Online course are more difficult and time-consuming than traditional classroom courses although they have afforded many bright and industrious students unprecedented opportunities to further their education.The stigma behind online classes has led them to be less respected than traditional classes. In an effort to increase enrollment, many universities advertise that they offer online courses in which a student can quickly and conveniently earn their degree. This has two potentially negative consequences. First, employers who have never experienced a classroom setting in an online env ironment assume that these degrees are not as reputable as those from schools that exclusively offer traditional courses. Secondly, students enroll in these online courses with the mistaken belief that they are going to be quick and easy.Unfortunately, this could not be further from the truth. Online classes are more time consuming than in-classroom courses. In almost all courses, participation makes up a portion of everyone’s grade. Most professors count participation points as 10% of a student’s total grade. This 10% can easily be obtained in a classroom environment where a student can speak to peers and professor about a particular topic. However, online courses use a discussion board for communication, where the students and professor post responses to a discussion.The continuous posting by the students and professor makes spelling, grammar, and punctuation an unprecedented factor in a student’s participation points. Although online professors typically over look spelling and grammatical errors when responding to students’ posts, they are liable to take away points. Most of the time they deduct participation points if the grammar and spelling is so bad that they cannot understand the point the student is attempting to make. Students whom normally struggle with spelling and grammar are forced to improve their writing skills.In turn, the necessity of grammar, spelling, and punctuation benefits a student’s overall education experience. Moreover, the increased writing in a classroom environment can be a double-edged sword. The replacement of writing rather than speaking in a classroom can yield a negative effect on a person’s life. Online environments inadvertently encourage social isolation. A student who may have had social challenges or anxiety about speaking in front of a group of people in the past can easily continue isolating themselves from others rather than facing their fears.When the student graduates, findin g employment can be increasingly difficult without these necessary interpersonal skills. The socially awkward alumnus of a particular university negatively represents their university and discredits other alumni that could be applying for the same position. Despite this potentially disastrous effect, there are opportunities online courses have presented to so many people around the world. Online courses open doors to people who would otherwise have to give up on their dreams of higher education.An example is a single mother who barely survives by working two jobs to provide for her children. She does not have the money to hire a babysitter while she attends night classes. However, with online classes, she can work on a college degree while her young children sleep. Online classes are more convenient for the worker that works until 3:00 am and has little time before and after work to study. Driven, disciplined, non-traditional students can derive great benefit from the ability to att end class when they can, wherever they have internet access.Furthermore, potential students should not shun the idea of online classes if it can help them further their education. Students who may be considering online classes should think carefully about what it is they need from a course. If they want to speak to a professor directly to get their questions answered, have the availability at the same time each week to attend a course, and prefer not to perform additional writing assignments each week, then an online course may not be for them.On the other hand, if a potential student works for a company that is not willing to work around a school schedule, childcare is not available, or they simply do not want to drive to class in the evening, an online course may be the perfect solution. There are many pros and cons that are part of the decision-making process on whether or not to take an online course. Taking an online course should not be a decision that a student jumps into wit hout carefully considering all the factors involved.

Wednesday, October 23, 2019

Organizational behavior Essay

1.Define organizational behavior, discuss its purpose, as well as what it includes within an organization. Basically organizational behavior is the study of the way people interact within groups in an organization by taking a system approach. The purpose of organizational behavior is to gain a greater understanding of those factors that influence individual and group dynamics in an organizational setting so that individuals, groups and the organizations to which they belong may become more efficient and effective. 2. Identify and explain what an organization’s foundation is based on. In addition, describe two steps an organization can take if they truly want to increase employee morale. An organizational foundation defines how job tasks are formally divided, grouped, and coordinated. Step 1. Show employees some appreciation by saying thanks, or give them sincere admiration for a job well done (especially in the presence of others). Employees need to know that they are being appreciated, even for the little things they do. Step 2. Encourage communication between employees and management: doing this will allow employees to feel comfortable to voice their opinions and make suggestions to improve conditions and work environments. Listen to your employees concerns about the job or possible problems at home or work. Find out if there are other concerns that need to be addressed. 3. Explain what motivation is and the benefit for organizations to have motivated employees. In addition, identify and describe the most valuable asset an organization has and how they keep them motivated. Motivation is the reason or reasons one has for acting or behaving in a particular way, it underlines what employees choose to do and how much effort they put into accomplishing the job. Employee motivation is an important part of managing employees. This is because motivation can be directly linked to job performance. An employee’s performance typically is influenced by motivation, ability, and the work environment. There are several different motivation techniques that can be applied, many of which are universal and others which are dependent upon the situation, employee, department, or overall organization. People——- an organizations most valuable asset and must be kept engaged in the organizations process to stay motivated. An engaged employee is a person who is fully involved in, and enthusiastic about, his or her work. Engaged employees care about the future of the organization and are willing to invest the discretionary effort, exceed duty’s call, and to see that the organization succeed. 4. Identify and discuss the five main motivational theories of management. According to Maslow, employees have five levels of needs (Maslow, 1943): Physiological/biological, — food, water, shelter, air (all things needed for survival) safety, –stability, security, freedom from fear social/belonging/love,–affection, relationships and famil ego/esteem—recognition, respect and achievement and self- actualizing—self fulfillment, seeking personal growth and realizing personal potential 5. Explain the two key practices to managing an employee’s performance. Employee engagement——– Employees who are engaged in their work and committed to their organizations give companies crucial competitive advantages (including higher productivity and lower employee turnover.) Employees that are engaged usually will not take off from work just to be off, but will come to work and give more than a 110% Commitment——– Commitments requires an investment of time, as well as mental and emotional energy, most people make them with the expectation of reciprocation. That is, people assume that in exchange for their commitment, they will get something of value in return (such as favors, affection, gifts, attention, goods, money and property.) In the world of work, employees and employers have traditionally made an agreement. In exchange for workers’ commitment, organizations would provide forms of value for employees, such as secure jobs and fair compensation. Reciprocity affects the intensity of a commitment. View as multi-pages

Tuesday, October 22, 2019

Chaucer Canterbury Tales essays

Chaucer Canterbury Tales essays Some say the things we most desire are these: Freedom to do exactly as we please, is an excerpt from Geoffrey Chaucers Canterbury Tales that directly correlates with the books easily recognizable thematic idea. Mankind will bring about his own fate by his behaviors. Within the three tales of The Franklin, The Merchant, and The Wife of Bath, the fortunateness of the characters marriages comes from each of the individuals' actions. The human nature of love and courtship is revealed through each marriage and can be easily understood when analyzing every couples selfish or selfless behaviors. When a pretentious Knight takes advantage of a young girl at his discretion, a selfish demeanor of this character is revealed. The Wife of Baths Tale shows the successfully progressive behavior of this Knight. To save from being punished from this deed he is set on a journey to find what women desire most. Last in the story, he is forced to marry an old hag who helped him discover that women want control. Basic nature for this knight would be to shun the objectionable courtship, but instead he gives his new wife the choice of how to better herself. You make the choice yourself, for the provision Of what may be agreeable and rich, is a contrasting attitude the Knight has then from before. At this point the wife becomes beautiful and good. The knights selflessness shone through to bring him the good fortune he deserved. The Merchants Tale on the contrary to the other two tales, portrays all of mankinds poor attributes. An old man has set out to find himself a young wife, and in the process of doing so, he looses sight of what is important in his future wedlock, Flesh should be young though fish should be mature. And with his repeated misperception of satisfactory love, he continues to be mistreated by the youthful wife he obtained. The old man had a selfish attitude, as...

Monday, October 21, 2019

Lost Boy essays

Lost Boy essays Book Report - The Lost Boy by: Dave Peltzer Dave Peltzer the author of The Lost Boy tells his story from the time he left his abusive mother and alcoholic father, through his experiences in five foster homes and juvenile detention, and how he eventually made it into the Air Force. He was a defiant, rebellious boy who, despite his background and personality, managed to endear himself to many guardians, social workers, and teachers. Pelzer writes in an honest, sometimes rambling, style; he is never bitter, and his story will find many sympathetic readers. The main purpose for Dave to write this book is to show at what lengths children and adolescents have gone to over come the unmentionable hardships of and abusive family. The three most valuable things I have learned from this book are very hard to choose. The book was full of many things to help me in my everyday life. Ranging from how to deal with kids who have be through abusive situations to how kids of abuse act in general. The first one has to be, Dave was very tactful in how he handled his thoughts and feelings. Many children his age are running around chasing girls and hanging with the guys. Not him he was studying hard and trying to be better than his parents were. He would always squander away what he had, so no one could take what was rightfully his and that includes his life. The second thing that was useful was how Dave was never angry with his situation he would just look at it as another challenge. Many times through out the book Dave would have to change foster homes after being fairly settled in the way of living there. Most teens his age cant handle a great deal of change but Dave would just go with the flow and never bat an eye lash. The third most valuable thing has to be his willingness to help. I would think that since no one would help him he would not help anyone else. On the contr...

Saturday, October 19, 2019

ApushRevolution of 1800

Previous presidents had done what they could to stay neutral in foreign battles and conflicts, but Thomas Jefferson took initiative and this is also present in the XYZ affairs with France. Jefferson brought the country into its real first international involvement. With judiciary, the real revolutionary happening of the time period was with the Marbury vs. Madison case when the Supreme Court was given the power of judicial review of the laws and actions by the federal government. It allowed for the Supreme Court to rule federal laws invalid if they conflicted with the Constitution. Politically, Jefferson believed in strict interpretation of the Constitution unlike his predecessors. He bought the Louisiana Purchase which the Constitution did not fully allow him to do. Under Federalist views, the economy of the United States was looking to be increasingly more urban with a shift from agricultural ways. With Thomas Jefferson being elected into office, he hoped that America would maintain a strict agrarian economy with crops being the top export to foreign countries. He wanted Americans to stay a primarily rural-living nation with farming the main aspect of the economy. The election of 1800 was also considered a revolution because politics changed hands from Federalists with strict views on centralization and creating a stronger national government to Republicans with the hopes of creating strong state legislatures and a stricter foreign policy where manufacturing was less important. The succession of Republicans contributed to it being called a revolution. ApushRevolution of 1800 Previous presidents had done what they could to stay neutral in foreign battles and conflicts, but Thomas Jefferson took initiative and this is also present in the XYZ affairs with France. Jefferson brought the country into its real first international involvement. With judiciary, the real revolutionary happening of the time period was with the Marbury vs. Madison case when the Supreme Court was given the power of judicial review of the laws and actions by the federal government. It allowed for the Supreme Court to rule federal laws invalid if they conflicted with the Constitution. Politically, Jefferson believed in strict interpretation of the Constitution unlike his predecessors. He bought the Louisiana Purchase which the Constitution did not fully allow him to do. Under Federalist views, the economy of the United States was looking to be increasingly more urban with a shift from agricultural ways. With Thomas Jefferson being elected into office, he hoped that America would maintain a strict agrarian economy with crops being the top export to foreign countries. He wanted Americans to stay a primarily rural-living nation with farming the main aspect of the economy. The election of 1800 was also considered a revolution because politics changed hands from Federalists with strict views on centralization and creating a stronger national government to Republicans with the hopes of creating strong state legislatures and a stricter foreign policy where manufacturing was less important. The succession of Republicans contributed to it being called a revolution.

Friday, October 18, 2019

Tragedy of the Commons and Collective Action Term Paper

Tragedy of the Commons and Collective Action - Term Paper Example Acceptance of the reality of interdependency is implicit idea that all kinds or types of natural resources are for the good of everybody. This means resources are safeguarded for a common purpose of use, exploitation and preservation for replenishment and eventual use of all future generations. This idea is called the global commons of natural resources (Nonini 164). Early or primitive human societies had latched unto this idea of the commons due to their own survival instincts. Every member of the tribe is tasked to help preserve all resources not only for today's present consumption needs but for the future requirements of succeeding generations as well. Because of this concept of environmental preservation, the tribe members had banded themselves together with some social, cultural or religious arrangements to ensure that resources are safeguarded from over-exploitation, allowed to recover and replenish and to make everyone aware that no one owns these resources exclusively but ev erybody owns it. It is this idea that is known as the commons with the added sense of good stewardship. People are supposed to take only what they need from their common-pool resources. A fertile or rich environment can support a population adequately to provide a comfortable life as long as this practice is enforced. Nobody is supposed to take more than what they need, such as exploiting a resource for profit because some people had become too greedy. This had been practiced by the native Americans before the white colonizers came along. In fact, this is shown to be viable, a sense of abundance even in marginal ecological zones (ibid.). Continued population growth had put pressure on natural resources, a grim reminder of the theory put forward by Malthus centuries ago regarding... Good governance today demands consent, cooperation and commitment from people and the old ways of using coercion is no longer an acceptable alternative when imposing some form of social contract in managing common-pool resources (CPR). In fact, this was what the Nobel prize winner Elinor Ostrom advocates, using her recommended seven principles on the best ways on how to govern the commons while privatization is also considered but it has its limitations but an important point is that socio-economic models for sustainable extraction of resources can be implemented using the old ideas of liberal democracy. Global commons has been shown to be generative as well if done right, such as in music, literature, new medical technologies, hybrid seeds and in computer software where the intellectual rights are recognized and protected by copyright and patent laws.

Annexation, Land Use Change, and Landscape Impact Dissertation

Annexation, Land Use Change, and Landscape Impact - Dissertation Example Thus the main aim of the paper is study the use of land policies for the betterment of the society. The global change has serious consequences on different landscapes. With increasingly changing environment and urgent global concerns every nation and community stands at the juncture of growing and evolving, keeping in pace with the environmental change which is critical. The competing visions of the future create the dilemma in many different ways. The type of places people of a community try to inhabit and the environment they leave behind for their future generations bring forth this dilemma. The landscapes and the nature are the factors that sustain the living of the human generation and also the life cycle of other species on the planet. The ideal future for the planet will be one in which the consumption and the use of land are done sparingly and where people cherish the landscapes. The future of the towns and the cities are expected to be vibrant as well as compact along with being green. The economic bases of the society are also expected to be restorative both environmenta lly and socially along with being viable. The ultimate vision of these theories is to result in the creation of an environment by the human community containing enduring values. People should ultimately be proud of the landscape and the environment they are about to leave for the next generations (Beatley & Manning, 1997, pp. 1-2). Carl Sauer, a born geographer was considered to be the grandfather of the theories of landscapes. He was the profounder of what can be called the ethics of land. According to the profounder it is the responsibility of human community to focus on the sustainability of the world environment and the earth for the well being of both the present as well as that of the future generations. An aesthetic rationale for the environmental progress has been given by Carl Sauer.

Corporate social responsibility in the global business community Assignment

Corporate social responsibility in the global business community - Assignment Example Also, it changes the business entrepreneurs perception towards business and society. Today, business is not just about profits, but it is more about profit sharing with society and employees (Kiran & Sharma, 2011). The majority of the world-renowned firms and organizations, for instance, the world bank, as well as European Commissions are mostly actively promoting and supporting the concept of Corporate Social Responsibility. However, Modern corporations attempt to put significant focus on the politics, economy, and the society of a country (Baxi, 2006). Perhaps, the developing nations are supposed to focus more on the Corporate Social Responsibility implementation and from the planning process. In addition, they can form alternatives to lifting the development of the social sector, and a suggested way is to develop viably and strategized public-private partnerships. Currently, the greatest challenge for most governments is on how to create Corporate Social Responsibility practices policies aa well as nurture a framework that is durable and would assist society and companies to translate the public policies to deliverables (Kiran & Sharma, 2011). Therefore, the paper focuses on defining CSR, identifying a global business that implements a CSR strategy, explain why, how, and where the global market they implement their strategy. The overall objective of the paper is to get a better understanding of how and why global companies are becoming more responsible. The paper also include the interpretation and conclusion. Nestle is one of the global renowned and largest, beverage and food companies. Nestle is a very old organization that started its activities almost 130 years ago. Its key success is innovations of its product. Alongside with its innovative capabilities, its brand business acquisitions that have made it be the large food firm all over the world. However, with time the passing, the Nestle company has swiftly grown and penetrated into the production of

Thursday, October 17, 2019

Performance-Enhancing Drugs Essay Example | Topics and Well Written Essays - 1500 words

Performance-Enhancing Drugs - Essay Example Nowadays, sportsmen and women will go to extreme lengths to improve their athletic abilities (Mottram 18). Many sports personalities admit that the competitive desire to be victorious is unusually severe. Apart from the pleasure of benefiting individually, sports individuals share a dream to participate in large sporting events, high class teams, and the young athletes pursue the school scholarships. The common, competitive situation, made by the human culture, has caused the widespread use of performance-enhancing drugs such as stimulants, sedatives, lean mass builders and painkillers among individuals taking part in sporting activities (Bahrke and Yesalis 8). The people who use the substances for enhancement may appear to have acquired gains that are physical. There has not been a thorough study on the long-term effects of performance-enhancement drugs, but evidence suggests that the short-term effects are destructive with numerous consequences like loss of scholarships, medals, el igibility, side-effects, and sometimes death. This paper will look at the performance-enhancement drugs that should be accepted in sports, and whether creatine should be illegalized in Major League Baseball Several performance enhancement drugs should be legalized in sports, they include: Lean Mass Builders This are the types of performance-enhancement substances that are used to amplify or facilitate the enlargement of lean body mass and muscles, and from time to time to lessen fats in the body. These drugs may include several human hormones, anabolic steroids, and Chromium Picolinate. Chromium Picolinate, for instance, helps an individual to make use of the body glucose. It helps an individuals’ body to access fats and convert it to energy. This drug is more useful to people who have additional body fat and they would like to lose it (Mottram 23). Stimulants They are used to stimulate an individual’s mind and body to function at the top level by increasing energy, aggression, and focus. The examples are amphetamine and caffeine. Caffeine has been for a long time been used as an aid for muscle endurance by many athletes. Caffeine lengthens the duration of fatigue that occurs in the muscles at the heightened power levels. Nowadays, caffeine is a performance-enhancing drug that is not listed as illegal for use by sports personalities. In addition it is proven that stimulants can promote endurance, enhance accuracy, and improve reaction time. The dose of caffeine and the athlete’s condition and exercise determine if the person’s performance is enhanced or not (Mottram 26). Painkillers Painkillers cover up pain that is experienced by the sportsmen so that they can keep on performing and competing without their normal pain limit. Painkillers used in sports vary from over-the-counter administered drugs to prescriptions that are powerful, such as narcotics and NSAIDs (Mottram 28). Sedatives The drugs in this category are mostly used by people who take part in sports which have the need for being steady, accurate and overcome too much discomfort and nervousness. Examples include valium, alcohol, and marijuana (Jeffrey, Jose, and Douglas 34). Diuretics These are drugs that remove water from the body. Diuretics are most often used in different t ypes of wrestling and contact sports because the sportsmen have to conform to weight restraints (Jeffrey, Jose, a

Managing Diversity Essay Example | Topics and Well Written Essays - 2000 words

Managing Diversity - Essay Example has emerged within the past 20 years and spawned from the equal opportunity act which was promulgated in the workforce by the passage of the 1964 Civil Rights Act. This law extended voting rights and outlawed racial segregation in the schools, housing or hiring practices. With the passage of this act, American organizations began to hire new employees from different races, ethnic backgrounds and religions into sectors they were once excluded from. There is an undeniable difference between diversity and equal opportunity. Equal opportunity employment has deep historical roots. The law was enacted after years of unfair practices in different sectors denied equal opportunities simply based upon a person’s race, gender or national origin. The passing of this law developed a definition for minorities and now prohibits discrimination based upon a person’s age, gender, religion, sex, race, color or national origin. Diversity promotes accepting individual differences. The business ideals of diversity states that inclusion of a diverse workforce better equip a company to thrive in a marketplace. Exclusion of a diverse approach isolates demographics and limits perspectives. An example of such an implementation of diversity is the inspirational movie Glory Road. The 1966 college basketball team base on the Texas Westerns won the NCAA championship while promoting diversity. Don Haskins, the first year coach of the team, pioneered diversity by recruiting players deemed best for the positions and sidestepping traditional hiring practices. The hiring of the new folks in nontraditional roles is an exemplary example of the advantages of diversity. The team put racial differences aside and worked collectively to attain the coveted championship prize. Peter F. Drucker, author of â€Å"The Theory of the Business† (1995: 100) reveals that a valid theory of business suggests that the assumptions about environment, mission and core competencies must fit reality.. Over

Wednesday, October 16, 2019

Corporate social responsibility in the global business community Assignment

Corporate social responsibility in the global business community - Assignment Example Also, it changes the business entrepreneurs perception towards business and society. Today, business is not just about profits, but it is more about profit sharing with society and employees (Kiran & Sharma, 2011). The majority of the world-renowned firms and organizations, for instance, the world bank, as well as European Commissions are mostly actively promoting and supporting the concept of Corporate Social Responsibility. However, Modern corporations attempt to put significant focus on the politics, economy, and the society of a country (Baxi, 2006). Perhaps, the developing nations are supposed to focus more on the Corporate Social Responsibility implementation and from the planning process. In addition, they can form alternatives to lifting the development of the social sector, and a suggested way is to develop viably and strategized public-private partnerships. Currently, the greatest challenge for most governments is on how to create Corporate Social Responsibility practices policies aa well as nurture a framework that is durable and would assist society and companies to translate the public policies to deliverables (Kiran & Sharma, 2011). Therefore, the paper focuses on defining CSR, identifying a global business that implements a CSR strategy, explain why, how, and where the global market they implement their strategy. The overall objective of the paper is to get a better understanding of how and why global companies are becoming more responsible. The paper also include the interpretation and conclusion. Nestle is one of the global renowned and largest, beverage and food companies. Nestle is a very old organization that started its activities almost 130 years ago. Its key success is innovations of its product. Alongside with its innovative capabilities, its brand business acquisitions that have made it be the large food firm all over the world. However, with time the passing, the Nestle company has swiftly grown and penetrated into the production of

Managing Diversity Essay Example | Topics and Well Written Essays - 2000 words

Managing Diversity - Essay Example has emerged within the past 20 years and spawned from the equal opportunity act which was promulgated in the workforce by the passage of the 1964 Civil Rights Act. This law extended voting rights and outlawed racial segregation in the schools, housing or hiring practices. With the passage of this act, American organizations began to hire new employees from different races, ethnic backgrounds and religions into sectors they were once excluded from. There is an undeniable difference between diversity and equal opportunity. Equal opportunity employment has deep historical roots. The law was enacted after years of unfair practices in different sectors denied equal opportunities simply based upon a person’s race, gender or national origin. The passing of this law developed a definition for minorities and now prohibits discrimination based upon a person’s age, gender, religion, sex, race, color or national origin. Diversity promotes accepting individual differences. The business ideals of diversity states that inclusion of a diverse workforce better equip a company to thrive in a marketplace. Exclusion of a diverse approach isolates demographics and limits perspectives. An example of such an implementation of diversity is the inspirational movie Glory Road. The 1966 college basketball team base on the Texas Westerns won the NCAA championship while promoting diversity. Don Haskins, the first year coach of the team, pioneered diversity by recruiting players deemed best for the positions and sidestepping traditional hiring practices. The hiring of the new folks in nontraditional roles is an exemplary example of the advantages of diversity. The team put racial differences aside and worked collectively to attain the coveted championship prize. Peter F. Drucker, author of â€Å"The Theory of the Business† (1995: 100) reveals that a valid theory of business suggests that the assumptions about environment, mission and core competencies must fit reality.. Over

Tuesday, October 15, 2019

Provide two reasons why Medicaid violations do not generally receive media attention Essay Example for Free

Provide two reasons why Medicaid violations do not generally receive media attention Essay One of the most frequent crimes of the affluent and the high-class of the society is Medicaid fraud. These frauds can be committed by several parties including the recipients and the providers. Medicaid is a government program that utilizes the taxpayer’s money to provide healthcare to the low income groups of the society. It is basically setup to help the weaker sections of the society including individuals above the age of 65, the disabled, the medically compromised and the low-income groups. The nations would be happy if the money is spending to help people in need, but frequently several providers and recipients indulge in fraud and abuse of the funds set aside under Medicaid. Some of the abuses committed by recipients include forging prescription, giving the medical card to another party, using several cards, duplicating or consuming excessive healthcare services, and selling the items received under Medicaid to others. Some of the abuses that can be committed by the providers include providing false bills, duplicating bills, providing unwanted medical care, doing unnecessary tests, billing in excess, compromising the quality of care under Medicaid services, and including the names of others in the bills (NY State, 2006). One of the reasons why Medicaid violations are not given great amount of media attention is because these crimes are usually committed by affluent. These crimes are often great amount of protection and secrecy, so as to gain for profit. In the US, it is estimated that Medicaid fraud cost the nation about forty billion dollars in the year 1993. Usually, a certain person rather than an organization would be involved in committing a Medicaid fraud. The White collar staffs who commit these crimes frequently think that they are above the law. They feel that committing such crimes is justified as it is anyway a part of the system. They would go to any extent to cover their crimes. The media would not like to get involved in covering such events, as they feel that they would later be harassed by the White collared staff. Besides, they also feel that they would not be getting any kind of requests they may have, as the white collared staff would be using their powers to avenge for the media attention given. It is found that the business-minded white collared staffs are more frequently involved in committing Medicaid frauds rather than the professional staff (Cullen, 2008). The media feels that the people who are victims by the crimes of Medicaid fraud are usually not the class who would be customers to their services. They may find that covering such events would not be beneficial to them in anyway, and would instead get them in bad looks with the high-class. The poor, elders and the disabled are less likely to be customers of the media services. They would also not stand up to fight their rights. The beneficiaries of Medicaid frequently are not aware of their rights. They may be often abused or neglected by the healthcare organization which may include the white collared staff. Frequently, the person getting abused may be physically and mentally helpless and would depend on the care provider for help. However, the care giver would be providing low quality healthcare and instead use the funds other Medicaid for other purposes (including gaining profits). Medicaid fraud is a criminal offence and involves abusing taxpayer’s money. It has been set aside for helping the weaker sections of the society, but instead these funds are ending up in the hands of the rich, thus making the rich richer and the poor poorer. At any cost, the media would have to change their policy of reporting cases of Medicaid fraud to the public.

Monday, October 14, 2019

Card Security For Republic Bank Customers

Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app Card Security For Republic Bank Customers Card Security For Republic Bank Customers There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations. However, credit card fraud and identity theft has continued to plague the banking and retail industries as there seems to be no feasible solution to these crimes. Advances in technology have opened a gateway for hackers to restructure their position of attack, intruding on ones personal life. The basis of this project is on the new Chip and PIN technology introduced on credit cards. Ive considered this to be an interesting topic because of the publicity this technology has been receiving across the world and it has even reached to our shores, here in Trinidad and Tobago. Hence, Republic Bank Limited one of the local banks would be the case studied in this research. Chapter two would encompass the existing literature on credit card history and Chip and PIN. This chapter would outline how credit cards have become smart cards and how the Chip and PIN cards are used. Chapter three gives the entire design of the project and the objectives to be obtained for the research. Moving to chapter four, the research framework adopted for this study on Chip and PIN and how it relates to the model undertaken in the research. The findings from this research would be summarized version of the data collected, with the analysis of the theory and research framework the author undertook in this study. In concluding, the author would report on the learning aspects of the research and provide an assessment of achievements, giving a position on the research question. Literature REVIEW This section is intended to place the scope of the project with literature surrounding the components of the research question. The Credit Card Transaction Process Discussed This payment mechanism was formally introduced in 1958, when the BankAmericard card, now known as Visa was franchised across the global community. By introducing an electronic authorization system, the BankAmericard was able to be used globally. Now by partnering with banks across the globe, Visa has been able to provide an international processing system for the exchange of money. The workings of a credit card transaction are such that it comprises of four main steps. These are: Authorization Batching Clearing Funding The cardholder requests a purchase from the merchant, which is then submitted to the acquirer by the merchant. The acquirer then sends a request to the issuer to authorize the transaction. Once the authorization code is sent to the acquirer verifying that credit is available, the transaction is authorized and the cardholder receives the product. (This is further explained in detail on page 9 of this document) This simple process of electronic transacting has opened up a world of e-commerce opportunities. From an information system perspective the processing workflow of an online credit card transaction is shown below: Figure 1: Online Credit Card Processing Workflow Diagram (Hubbard, 2003) Because of the vulnerabilities that lay in a transaction, more so the networks across which the information is exchanged, various security breaches can occur. Types of Credit Card Fraud There are many different types of credit card fraud. Fraudsters are very innovative in finding new ways of committing credit card crime and as technology changes so does their crime tactics. Security issues surrounding the card fraud has moved from the traditional ways of committing credit card crime (Application Fraud, Intercept Fraud and Lost/Stolen Card Fraud) to the modern techniques namely, Skimming, Site Cloning and most recently Triangulation. Skimming is the fastest growing type of credit card fraud around because of its simplicity. Pocket Skimming devices can be easily carried around and the cardholders data can be obtained by merely swiping the card through the battery-operated magnetic card reader. This technology has also evolved so as to read the data of Chip and PIN cards, with the use of a scanner. These scanners, which can write or even re-write the data on the Chip cards, are fully portable and have high storage capacities. Because some of these devices are not illegal, they are easily accessible to hackers and can be bought over the internet. Site Cloning involves cloning an entire site or just the pages where customers make purchases. Since the web pages are identical customers are not aware that their personal information is being compromised. Also, confirmation details are sent to the customer just as the official companys website would, so the crime goes undetected. The details entered on the cloned site are then used by the fraudster to commit credit card fraud. Another method of credit card fraud is Triangulation. Goods are presented on websites at discounted prices, which can be shipped to the customer before payment. Again, just as with site cloning, the site appears to be legitimate then the customer proceeds to enter their personal data. With this captured information the fraudster can then order goods from legitimate retail websites using the credit card number obtained. Due to these security issues surrounding credit card information security, there has been global industry-wide concern for the protection of cardholders data. Since security management is a systematic issue, a serious look at what can be done to prevent security breaches is necessary-whether it may be legislation, the use of fraud detection system monitors or the application of data encryption/ authentication techniques. Chip and PIN Technology Credit cards have been a feasible solution for making payment processing simple and efficient. The history of the credit card dates back to the 1900s when oil companies and proprietors created their own credit card as a means of obtaining customer loyalty and improving customer service. However, as with advances in technology, the credit cards have evolved from having just encoded magnetic stripes to modern day Chip and PIN cards, with embedded microchips, which can store and transmit data. These Chip and PIN cards were developed to provide an inter-operative system that would combat card fraud (counterfeit and plastic cards). This transaction processing infrastructure has enabled the cash-less revolution, whereby consumers, governments and businesses benefit from the electronic payment network, which has shifted payments by cash and cheques to an efficient electronic payment system. The mechanics of a credit card transaction is such that the merchant acquirer, usually the bank processes transactions on behalf of the merchant. This payment by credit card represents an offer for issuance of payment in exchange for the goods or services provided by the merchant, (Transaction Processing). There are two parts to this type of transaction processing: the first is front end processing which involves the capture of data messages across communication channels to the point of sale devices; and secondly the back end processing which involves the balancing of accounting information by acquirers and issuers and the submission of the payment to the acquiring merchants bank. As a result of the rapid advances in technology, data security continues to be a major concern as every transaction that involves the transmission data across networks is open to external attacks. Attacks on a consumers card information can come from any angle, whether it may be data thieves or network intruders. The Payment Card Industry Security Standards Council (PCI SSC), which comprises of major payment brands namely VISA, MasterCard, Discover and a few others, have created global compliance standards to protect cardholders data. These set of standards help govern and educate all merchants and organisations that process, store and transmit data, as well as the manufactures of the devices used in transaction processing. The PCI SSC (2010), Data Security Standard Quick Reference Guide, as summarized below, outlines the best practices for protecting cardholder data: Develop and Maintain a Secure Network Install and maintain firewall configuration to protect cardholders data. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect cardholders data Protect stored data Encrypt transmission of cardholders data across open public networks Maintain a vulnerability management program Use and regularly update anti-virus software or programs Develop and maintain secure systems and applications Implement strong access control measures Restrict access to cardholder data by business need to know Assign a unique ID to persons with computer access Restrict physical access to cardholder data Regularly monitor and test networks Track and monitor all access to network resources and cardholder data Regularly test security systems and resources Maintain an information security policy Maintain a policy that address information security for all personnel Nevertheless, despite these procedures in place, there has been amplified instances of the various types of credit card fraud, namely Intercept Fraud, Skimming, Site Cloning as well as Triangulation. This propelled an industry and governmentà ¢Ã¢â€š ¬Ã¢â‚¬Å"led initiative in the UK to embark on the introduction of Chip and PIN card technology. Based on the EMV standard (Euro pay, MasterCard, Visa) Chip and PIN technology was launched in the UK on February 14th 2006. This programme was introduced to combat credit and debit card fraud, and to provide an ideal way of validating the cardholders identity. By utilizing smart card technology a microchip is embedded with the customers information which includes their unique four digit PIN. For transactions to be accepted, the customer PIN entered must match the one encoded on the microchip. These steps are further explained below: The card is inserted by the customer into the card reader. The card reader would then prompt the user to insert their PIN. A four-digit PIN is then entered by the customer. Once the reader accepts the PIN entered the transaction would be approved. Note the PIN entered is not displayed on the reader but rather represented by asterisks. The customer is issued a receipt as confirmation of the transaction process. This process removes the responsibility and accountability from the merchant to the customer for point of sale transactions. The card never leaves the customers hand and as such prevents skimming of ones card information. One of the benefits of the Chip and PIN cards is that the Chip itself is encrypted with a range of security features, which the transaction processing system uses to identify the cardholder. These security features are said to be virtually impossible to replicate. The terminals used for Chip and PIN transactions, use secure transmission technology to ensure the privacy of the cardholders data and can operate over a range of connectivity environments, such as wired, wireless and cellular networks. The PCI Security Standards Council also developed a framework of standards which is legally enforced through a merchant/service provider/card brand agreement. These include requirements that support the encryption of the cardholders account data and the point of sale terminal integration. Figure 2: Outline of the process of a Chip and PIN transaction The PIN entered replaces the request for signature as verification of the transaction. This is why the banking industry in the UK has campaigned for this technology, because signatures can be forged, however the PIN is unique to that person. Although the United States is yet to convert to this technology, countries such as Japan, China, Canada, Mexico as well as the majority of the European Countries have all introduced Chip and PIN technology and it is gaining momentum in various other countries including Trinidad and Tobago. Republic Bank Trinidad and Tobago Limited is the first local bank in Trinidad and Tobago to introduce Chip and PIN technology to make the concept of paying by credit card safer for cardholders. The bank adopted this type of technology because this is now an industry-wide conversion from the magnetic-stripe cards and it is also in keeping with the EMV standard. Conversely, a potential security issue with Chip and PIN card terminals is its capability of processing cards with the magnetic stripe as well. Because of this the request to enter the customers PIN can be bypassed by the merchant, with a receipt generated to be signed by the customer. Now because this option is still available it poses an added security threat to card transactions. So, unfortunately skimming still remains a huge problem for cardholders and sadly enough this includes Chip and PIN cardholders as well. Although this practice is slowly migrating from EMV compliant countries, once a card has been skimmed it can still be used in countries where the magnetic stripe is still prevalent, for example some Asian Countries and the United States. This is why many fraudsters can still create a fake card with stolen magnetic stripe information which can be used in for example the United States. The United States believes that although Chip and PIN has reduced fraud for face to face card transactions, there are a still a number of issues surrounding the security of the system used for this these transactions. Now as with any new system introduced, there have been a number of studies on whether Chip and PIN cards are really secure. So the question is has Chip and PIN technology impacted on the activities of overall card fraud or has the activities of fraudsters shifted from retail crime. In a study by Emily Finch (2010) The Impact of Chip and Pin Technology and The Activities of Fraudsters, it was recognised that since the implementation of Chip and PIN technology participants involved in card fraud made varying decisions when it came to their crime of choice. The Decision to Desist The Decision to Continue To work with others Shift to Distance Transactions Diversification of Theft into Identity The study also shows that there is a shift in the attack strategy of fraudsters from point of sale card fraud to Internet and Card Identity Fraud. In an analysis of Internet and Card Identity Fraud, we can note that Chip and PIN technology was not designed for preventing these types of card fraud. So, the question remains, was Chip and PIN successful at what it was set out to achievereduce card fraud? This too can be argued further as there are other limitations. How can one link a particular card to a specific owner? Once the PIN is known by the individual a transaction can be completed with ease. Other studies have shown that the card readers used for Chip and PIN transactions can be modified. In a study by a team of University of Cambridge Computer Scientists, they have uncovered a series of fatal flaws in the Chip and PIN system. One example is where the internal hardware can be replaced without external evidence of this. This new terminal could then be programmed and modified so that it performs just as a typical terminal, where the card details can be collected and allow criminals to make cards with a fake magnetic stripe, which along with the PIN would enable a fraudster to make valid purchases. Another example is that fraudsters can insert an electronic wedge between the stolen card and the terminal, which tricks the terminal into believing that the PIN was correctly verified. Further, with this wedge inserted, any PIN can be entered and the transaction would be verified. This type of fraud makes it difficult for the victims of the attack to be refunded by the bank as the receipt given is authentic and would state verified by PIN. The bank in turn would be accurate in stating that no refund is required as their records show verified by PIN. This type of complaint appears as an act of negligence by the cardholder as he/she allowed their PIN to be compromised. So based on this study the point of sale attacks are much more prevalent, since before the introduction of Chip and PIN cards, consumers only entered their PIN at ATMs. Now with the introduction of Chip and PIN, consumers are using their cards at various other public areas. To combat the compromising of the consumers PIN a shield over the keypad has been used as added security but in many public areas there are video cameras and a persons PIN can still be captured on footage. So, although the UK banking industry has claimed to have rolled out this new technology successfully in 2006, there seems to be some negative aspects of this technology. The architecture surrounding Chip and PIN technology is questionable and the onus is on the banking industry to ensure that cardholders information is protected. Additionally, it also seems that Chip and PIN terminals offer no difference to what the magnetic stripe terminals offered. These terminals can be tampered with, which is a clear indication that there needs to be accurate configuration of these terminals so as to secure the cardholders data when transmitting transactions and that is not vulnerable to incident of attack. So the intent of Chip and PIN technology has more so opened a new marketplace for fraudsters than prevent/reduce fraudulent activity. PROJECT DESIGN, OBJECTIVES AND RESEARCH METHODS The scope of this project is to outline the features of Chip and PIN technology and whether its implementation thus far has been beneficial. This section of the project would provide the methods involved in achieving the data for the project as well as the results based on the data collected. The chosen approach to this design is online research (journals/scholarly articles) along with a case study on the implementation of Chip and PIN technology in Trinidad and Tobago, with the case being Republic Bank Limited. Objective 1 A good foundation for this objective would be the interpretation of the credit cards history. How has this cash-less mechanism moved from a local innovation to a global payment mechanism by use of digital communication across networks? In gaining a clear understanding on the reason for the implementation of this technology, a wealth of research would be conducted on credit card technology and digital security. Objective 2 A holistic understanding on the basis of credit card fraud and the types of fraudulent activities and the steps taken to prevent credit card crime. What technologies have been implemented and the effects/benefits drawn from these approaches. Objective 3 Expanding from objective two also discussed would be whether or not since the introduction of Chip and PIN technology in the UK, has there been a cascading effect of this new technology across countries. Analysing the increasing number of fraudulent activities reported from statistics, which compelled the global banking industry to find a seamless solution for the protection of cardholders data. Objective 4 An assessment on the introduction of Chip and PIN technology by Republic Bank Limited, which would include sourcing information on its implementation and the benefits derived. Further research would be on the acceptance (or non-acceptance) of the technology by customers. Objective 5 Lastly, from the feedback received from the interview conducted and by analysing the incidents of attack on Republic Bank credit cardholders, what was the determining factor in the bank aligning themselves with the UK standards set by EMV? CONCEPTUAL FRAMEWORK In identifying the framework to be adopted that can be referenced to the literature in this research, the author considered the Delone and Mc Lean IS Success Model. Using this model, the author would explain the net benefits of adopting Chip and PIN technology, relating it to Republic Banks implementation of this technology. DeLeone and McLean IS Success Model In evaluating the success of Information Systems, the DM IS Success Model, systems quality measures the technical success, information quality measures semantic success and organisational impacts and user satisfaction measures the effectiveness of the system. The processes in the model are inter-connected by links, across the dimensions of the system. Figure 3: Depiction of the Updated Information Systems Success Model (DeLeone McLean 2002, 2003) The updated DM Model interprets the evaluation of a system in terms of the information, system, and service qualities and how these characteristics attribute to user satisfaction. As a result of using the system, certain benefits will be achieved and the net benefits will in turn (positively or negatively) influence user satisfaction and the further use of the information system. So, therefore three basic components make up this model, the creation of a system, its use and the consequences of its use. Case study as it relates to the ISS model. Republic Bank has been providing banking and financial solutions to individuals and businesses for over 160 years. Their mission is not only to provide efficient and competitively priced services but also to implement sound policies which will be beneficial to their customers. These factors presented provide clarity and influences the net benefits of the implemented Chip and PIN system at Republic Bank thus far. By use of the ISS model to map the research done in this project, the author would complete a step by step relay of the framework discussing the implementation of Chip and PIN by Republic Bank. Information Quality-Information quality refers to the accuracy/protection of the content of the data in transacting. How secure is the personalized data being transmitted across networks. When a customer presents their card to make a purchase, are they confident that their card information is protected because of the added security enabled on this card. System Quality-The system quality refers to the reliability of the network and the response time in transacting, notwithstanding the approved devices that accept personal identification numbers for all PIN based entries (the ease of use of the system functionalities). Therefore in rolling out this new technology the bank along with their partner merchants would train staff so that they are familiar with the best practice guidelines when using Chip and PIN. Service Quality-This refers to the back-end support systems that assist in usage of the technology. How reliable are Republic Banks servers and IP networks? User Satisfaction- This encompasses measuring the users entire experience-the purchase payment, receipt and service (the ease of purchasing without the fear of being a victim of fraudulent activity). Net Benefits -This is the most important success measure and it encapsulates the cost savings and the decrease in the value of fraudulent transactions arising from stolen credit card data. Was the implementation of this technology beneficial in reducing the incidents of card fraud? Are Republic Bank cardholders satisfied that their bank is on par with global industry changes? The focus of this success model lies in determining the impact the features of technology (information, system, and service quality) have on the variables user satisfaction, use, and net benefits. The main objective for using this ISS model is to establish the ultimate benefits derived from the use of information system both in individual and organizational terms. FINDINGS This chapter will illustrate the findings from the questionnaires submitted to a sample of the Republic Banks credit card customers as well as a formal interview conducted with an employee of Republic Bank Credit Card Centre. The aim of the chapter is to source an awareness of the topic area Chip and PIN by cardholders and the personnel interviewed. Primary Data Collection For the basis of the findings of this research the author conducted a formal interview with a middle management employee at Republic Bank and also distributed questionnaires to a sample of the banks credit card customers. A summarized version of the responses from the interview is represented in this chapter, based on the interviewees knowledge. The questionnaires distributed were mostly closed questions so as to deliberately avoid open-ended respondent answers. Approximately 120 questionnaires were distributed to Republic Bank Customers. Only the answers to the key questions are represented in this chapter. Summarized responses from the interview This interview was conducted with the Supervisor, Card Services, which prove to be very insightful. The Supervisor spoke about the banks vision for their credit card market, and how they plan to continuously innovate so as to maintain their customer base and attract new profitable customers. Since the credit card industry is a highly competitive one, the bank is constantly reviewing their interest rates and looking for new ways to give customer returns from the use of their credit card. Due to his long tenure at the bank and having the customer service background, the supervisor was able to give insight on what infuriates a credit card customer. He explained that customers become frustrated when they see added charges and puffed up late fees placed by the bank on their card statements. In view of the fact that most customers do not read the fine print when completing a credit card application, they are not totally aware of all the charges that can arise from delinquent payments. He f urther added that although queries like this can be explained by representatives at the bank who can provide valued solutions to the cardholders problem, the most infuriating of all queries from customers are unexplainable purchases on their account. At Republic Bank, fraudulent activity on a card can be detected from the use of their state-of-the-art security systems and their experienced fraud expert team that are in place to monitor and detect any unusual activity on a customers credit cards, but even with these measures in place, fraud can occur. The supervisor expressed that by implementing Chip and PIN technology for credit cards, the bank was able to be a step ahead of the competition and most importantly the card criminals. He also stated that although credit card fraud is not as prevalent in Trinidad and Tobago as in the developed countries, continuous education in counteracting fraudulent activities for their customer base is an effective method of addressing credit card fraud. He explained that Republic Bank has not had many eye-opening occurrences of notified credit card fraud but they believe that Chip and PIN technology is an innovative solution to the likelihood of this problem. He was also truthful in expressing that this technology is still new to the industry and all merchants have yet to convert to Chip and PIN enabled machines, therefore there is a window of opportunity for fraud until merchants are mandated to have these Chip and PIN enabled machines. He used the term mandate, because eventually all Republic Bank debit cards would also be chip enabled. In summing up the interview the author probed the supervisor on the banks position on the studies done by the University of Cambridge team on Chip and PIN technology and the tested flaws of the system. His response was quite interesting, because it ventured into a thought-provoking discussion on research. He lamented that the sphere of research done on any topic would result in the researcher seeking out the positive and negative aspects of it. How the data is interpreted, reflects the real value of the research done. Questionnaire Findings Question 5: How often and where do you frequently use your credit card to make purchases? Aim: To assess how often the average Republic Bank cardholder uses their credit card. Findings: Most Republic Cardholders in this study used their credit card regularly, at least five times per month. Credit Cards are used for purchases at the supermarket, restaurant and retail clothing stores. Question 6: Has your credit card information ever been compromised? If yes provide details. Aim: To determine the number of incidents of attack on Republic Bank credit card holders. Findings: Less than 50% of the respondents have never had their credit card data compromised. Question 7: Do you understand the workings of Chip and PIN technology introduced to Republic Bank credit cardholders and the value to be derived from using this technology? Aim: To determine the extent of the customers perception of this technologys value and how the card is used. Findings: Although some customers are guarded about the use of their credit cards, most of the respondents are confident in the service that Republic Bank provides and believes that implementing Chip and PIN gives them that added security against fraudulent activities, especially those customers that frequently travel abroad. Question 8: How do you think by using Chip and PIN cards for making payments will make it easier in transacting? Aim: To establish the efficiencies in the use of Chip and PIN cards, on the time taken to complete a transaction. Findings: Many customers applaud this technology as it reduces the time taken at the cash register when making purchases. It is simple, easy and convenient and most customers are truly happy as there is no need to write their signature. For this reason they find the system most efficient as it prevents their signature from the likelihood of being forged. ANALYSIS The main objective for the research completed on this topic, was to show how and to what extent the adoption of Chip and PIN technology has improved credit card security for Republic Bank cardholders. At a glance, before Chip and PIN technology was introduced in the UK, there was nation-wide educational literature on the benefits of the technology for banks, merchants and most importantly, the customers. However, it seems that this programme led by EMV, created more enthusiasm in the build-up to its implementation rather than the actual usage of the system. From the research, the mounting negative features of the technology and use of the system is outweighed the decreasing positive ones. It seems that the card theft criminals were focused on a solution to obstruct the successful use of the technology before the intention to use. The question remains, which facet of credit card fraud has Chip and PIN really reduced? The research show that for point of sale transactions Chip and PIN has been useful in the prevention of skimming ones card information, however the fraudsters have found alternative ways to improve on that tactic. Chip and PIN technology can only be used à ¢Ã¢â€š ¬Ã…“successfullyà ¢Ã¢â€š ¬? for point of sale transactions and not online transactions, so fraudsters have modified their techniques as with the modifications of the technology. Based on the research framework adopted, Republic Bank has measured their net benefits of adopting the Chip and PIN technology by encircling the information, service and system qualities to deliver user satisfaction and usage of the system with this technology. The success of any information system is multi-dimensional and the relationships among the constructs relate to the comprehensive evaluation of the system. The variable dependent on these constructs are the net benefits of this system, and for whom? This local company has app