Uncategorized

Assignment Answers Pdf Of Invitation To Treat Binding Offer:G56A12

Assignment Answers Pdf Of Invitation To Treat Binding Offer:G56A12

MSc Computing Masters Project Proposal
1. Project Title
Biometric Authentication system for avoiding security breaches in Banks
2. What problem are …

Preview text

MScComputingMastersProjectProposal
1.ProjectTitle
BiometricAuthenticationsystemforavoidingsecuritybreachesinBanks
2.Whatproblemareyoutryingtosolve?
Biometricauthenticationreferstothetechnologythatisutilisedwiththepurposeofproviding
bettersecurity.Theimplementationofauthenticationsystemwithincompanywillavoidthe
chancesofsecuritybreaches.Thiswillalsopreventsecuritybreachesfrominsertingwithin
bankdevices.Ithasbeenobservedthatbiometricauthenticationsystemhasbeen
introducedineveryairports,medicalinstitutes,organisationsandpoliticalareasfor
enhancingthesecurity(Maliketal.2014).Theuseofbiometricauthenticationsystemwill
enhancethesecurityfactors.Withtheintroductionofbiometricsystem,itwillbecomeeasy
toprotectthehackersfrominfluencingtheoperations.Thesewillofferabetteruser
experienceandwillavoidthechancesofsecuritybreaches.Theuseofbiometric
authenticationsystemwillsecurethebankandwillensurethatapropersecurityisbeing
providedtowardstheoperationswhicharecarriedoutinthebank.Openbankingdemand
willbecomereliablewiththehelpofabiometricauthenticationsystem(Mirzaetal.2018).
Further,thiswillalsoensurethatthechancesofdatagettingstolenortheftisbeingreduced.
Hence,itcanbestatedthatbiometricauthenticationsystemisverycrucial.
3.Objectivesoftheproject
Biometricauthenticationsysteminthebankwillhelpinprovidingabettersecurity.Theseare
utilisedwiththeperspectivetoofferabettersecureprocessingwiththehelpofmultifactor
authenticationsystem.Themajorobjectiveoftheprojectaretoaddressisthefollowing
components:
Theobjectiveoftheprojectistodeterminethewayofbiometricauthenticationcan
improvethesimplicityofbanking.
Name:
MastersRoute:
Supervisor:
2ndReader:
Thepurposeoftheprojectistodeterminethemajorsecuritybenefitsthatarelikelyto
beofferedwiththeintroductionofbiometricauthenticationsystem(Patiland
Ranjanikar2021).
Tounderstandandexplorethewaysofsecuritybreacheswillberemovedfromthe
bankwiththeuseofbiometricauthenticationsystem.
Theobjectiveoftheprojectistounderstandthewaycybersecurityissueswillbe
avoidedbyusingbiometricauthenticationsystem.
4.Expectedendproducts
oTheprojectwillbefocusedonunderstandingthewaybiometricauthentication
systemisgoingtointroducenewsecurityfeatureswithinthesystemofbank.
Inordertocarryouttheprojectsuccessfully,itisexpectedthattheproject
managementmethodologyagileapproachwillbebeneficial.Thesewill
provideopportunitiestocarryouttheprojectintodifferentphases.Bytheend
oftheprojectitisexpectedthatthewaybiometricauthenticationsystem
needstobedevelopedwillberepresented(Phadke2013).
oTheuseofbiometricauthenticationsystemwillavoidthecybersecurityrisk
fromoccurring.Itisexpectedthatthebiometricauthenticationsystemisthe
futureofthebanksasthishasthepotentialtoonlyprovideaccesstowards
authenticatedperson(Saralayaetal.2017).Besidethis,biometricscannotbe
stolenandhencesecuritywillgetenhanced.
oItisimportanttoensurethatpropertechniqueisbeingconductedwhile
implementingbiometricauthenticationsystem.Ametaloxidesemiconductor
imageisneededforthepurposeofrecognisingtheauthenticity.Inadditionto
this,anopticalsensorincaseoffingerprintsystemsarealsorequiredforthe
purposeofamanagingthebiometricsystem.Thiswillcontributetowardsthe
betterdevelopmentofthebiometricauthenticationsystem.
oBiometricauthenticationsystemwillensurethathighsecurityandassurance
isbeingofferedtowardstheendusers.Therefore,theimplementationof
biometricauthenticationsystemwillavoidthediscrepanciesfromoccurring
withinthebank.
5.EthicalConsiderations
5.1.EthicsDeclaration:
TrueFalse
Myprojectisentirelyliteraturebasedand/ortechnical,Yes
MyProjectdoesnotuseanyformofparticipants,Yes
MyProjectdoesnotuseexternalinputs(e.g.liaisingwithsomeonein
industry),
Yes
MyProjectdoesnotrequiremetodoworkoffcampus(e.g.inacompany),Yes
MyProjectdoesnotusesecondarydatasetsYes
6.JustificationforMasterslevelproject
Theprojectofimplementingbiometricauthenticationsystemwithinbankisconsideredtobe
veryefficientasthesewillcontributetowardsthebettermentofthebank.Therefore,the
projectisconsideredtobethebestsuitableforMastersLevelasthishelpsinexploringthe
cybersecurityaspectsaswell.Theprojecthasbeenselectedforthepurposeofexploring
thewaybiometricauthenticationsystemcanavoidthechancesofdatabreachesinbanking
system.Itisexpectedthattheproposedsolutionandwilldeliverhighendoutputandwill
ensurethatallformofsecurityinefficienciesarebeingavoided.Theselectedprojectwill
provideabetterwayofdealingwiththerequirements(SarkarandSingh2020).Theproject
willexploreindetailsaboutthewaybiometricscanbeimplementedforbenefitingthebank
owners.Hence,itcanbestatedthattheselectionturnouttobeverymuchbeneficialforthe
project.
7.References
Malik,J.,Girdhar,D.,Dahiya,R.andSainarayanan,G.,2014.Referencethreshold
calculationforbiometricauthentication.InternationalJournalofImage,GraphicsandSignal
Processing,6(2),p.46.
Mirza,Z.,Alsalem,E.,Mohsin,F.andElmedany,W.M.,2018.Users’AcceptanceofUsing
BiometricAuthenticationSystemforBahrainMobileBanking.KnEEngineering,pp.102-121.
Patil,R.Y.andRanjanikar,M.,2021,May.BiometricAuthenticationBasedSmartBank
LockerSecuritySystem.InInternationalConferenceonImageProcessingandCapsule
Networks(pp.298-308).Springer,Cham.
Phadke,S.,2013.TheImportanceofaBiometricAuthenticationSystem.TheSIJ
TransactionsonComputerScienceEngineering&itsApplications,1(4),18,22.
Saralaya,P.K.,Anjali,R.,Shivaprasad,G.andReddy,N.S.,2017,May.Biometric
authenticationusageforinternetbanking.In20172ndIEEEInternationalConferenceon
RecentTrendsinElectronics,Information&CommunicationTechnology(RTEICT)(pp.
1810-1814).IEEE.
Sarkar,A.andSingh,B.K.,2020.Areviewonperformance,securityandvariousbiometric
templateprotectionschemesforbiometricauthenticationsystems.MultimediaToolsand
Applications,79(37),pp.27721-27776.

Assignment Answers : IT Business Procedures BMP4005

Assignment Answers : IT Business Procedures BMP4005

0
BSc (Hons) Business Management
Cohort 2
BMP4005
Information Systems and Big Data Analysis
Information Systems …

Preview text

0
BSc (Hons) Business Management
Cohort 2
BMP4005
Information Systems and Big Data Analysis
Information Systems & IT Solution
2019/2020
February 2020/Semester 1
Submitted by:
Name:
ID:
1
Table of Contents
Information Systems & IT Solution …………………………………………………………………………… 0
Introduction ……………………………………………………………………………………………………………….. 2
Task 1: Theories, methods, and techniques that relate to the design and development of TWO
of the IT solutions listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS Office …………. 2
Canvas …………………………………………………………………………………………………………………… 2
MS Office………………………………………………………………………………………………………………. 3
Task 2: Explanation of the systems below with relevant examples……………………………………. 3
DSS (Decision Support System) ……………………………………………………………………………….. 3
ESS (Executive Support System)………………………………………………………………………………. 4
TPS (Transaction Processing System) ……………………………………………………………………….. 4
MIS (Management Information System) ……………………………………………………………………. 4
KSM (Knowledge Management System) …………………………………………………………………… 5
Task 3: Globalisation and the effects of IT on globalization …………………………………………….. 5
Task 4: Definition, example, advantages and disadvantages of digital infrastructure …………… 6
Definition ………………………………………………………………………………………………………………. 6
Example ………………………………………………………………………………………………………………… 7
Advantages …………………………………………………………………………………………………………….. 7
Disadvantages ………………………………………………………………………………………………………… 7
Task 5: Risks associated with information systems outsourcing and why is IT infrastructure
so critical to digital transformation! ………………………………………………………………………………. 8
Risks associated with information systems outsourcing ……………………………………………….. 8
Why is IT infrastructure so critical to digital transformation! ……………………………………….. 8
Conclusion ………………………………………………………………………………………………………………… 9
References ……………………………………………………………………………………………………………….. 10
2
Introduction
This report will include the analysis with an examination of IT business procedures, strategies, as
well as ideas to identify the many canvases and operational computer programming of MS office
as well as development. It will include the message of administration support link and operating
supporting connection, utilization of graphics to explain visually many systems of IT.
Globalization while coupled with a technical breakthrough as well as big data analytics has
influenced substantially IT infrastructure development and management for organizations. It is
developed an additional list of many features linked to outsourcing mediums of communication to
support users in understanding the value of the technological advancements within the systems of
IT.
Task 1: Theories, methods, and techniques that relate to the design and development of
TWO of the IT solutions listed here: (i) McAfee; (ii) Moodle; (iii) Canvas; (iv) MS
Office
Canvas
Canvas administration technology leads to facilitate digital storage through collecting and
evaluating substituting standard content at a specific level with customized knowledge that
results in originality as well as growth in digital networks and communicative networks. This
utilizes the many different types of strategies to assist the interactive systems of education at
the necessary level spanning from organized education routes to collecting reactive
information methodologies. Assisting the consumers with the different standard programs
and non-traditional projects removes the challenges and provides effective information to
every IT organization. Canvas management system facilitates internet information in
managing data and gathering it through replacing typical data with detailed customized data
to ensure and foster innovation with originality in digital channels and communication.
Virtual education system varies from organized learning ways to the dynamic one to
preserving the data collection method is one of the important strategies in canvas1. It assists
the clients with many different traditional courses and non-traditional courses. This ensures
minimizing complexity and provides unique content to all of the IT resolutions.
1 Beck Dallaghan GL, Lomis K, Crow S, Coplit L. Bridging educational innovation and
financial offices: using the Business Model Canvas modified for medical educators to
communicate a need. Journal of Communication in Healthcare. 2021 Oct 27:1-6.
3
MS Office
MS office ensures to provide the IT answers to challenges of users through ensuring the
protection of all information and providing assistance to computer-related challenges. This
supports assists administration organizations and makes smoothness in work. It provides
resolutions to clients’ challenges by ensuring the security of the network and providing
support to all computer-related challenges. The objective of Microsoft Office is to ensure the
assistant that management stores and develops many IT resolutions. Corporate information of
the organization may be processed through developing and assigning different types of IT
resolutions with the utilization of MS Office that needs to manage the big data through
securing huge data as well as providing resolutions to network security and management of
data2.
Task 2: Explanation of the systems below with relevant examples
DSS (Decision Support System)
It is an equipment piece that assists individuals in making different types of decisions. An
operational support approach is the computerized workstation program which ensures to
assists with the discontinuation, launch, and invention of many projects. To removing
constraints as well as barriers an administration cloud infrastructure at an effective level can
analyze a huge amount of data by integrating it with credible information and mechanisms of
decision making3. A procedure of decision-making includes planning, problem-solving,
choosing, and improving the operations of the customer. For instance, systems of
administration support could analyze the total results of the organization by analyzing all of
the financial information from the preceding 6 weeks and ensuring additional projections of
sales.
2 Dorsey-Elson L, Chavis C, Baptiste-Roberts K, Bista K, Tannouri A, Oni A, Rockward M,
Allen-Milton S, Kinyua A, Pratt-Harris N, Brunson DJ. Teaching and Learning as” CANVAS
Ambassadors” during the COVID-19 Pandemic: Faculty Experiences at One Historically
Black College and University. Journal of Interdisciplinary Studies in Education.
2021;10(1):1-5.
3 Fenu G, Malloci FM. DSS LANDS A decision support system for agriculture in Sardinia.
HighTech and Innovation Journal. 2020 Sep 1;1(3):129-35.
4
ESS (Executive Support System)
Accounting reporting in today’s time might be transcribed into quickly analyzed as well as
securely linked publications which utilized the oversight guidance flow which will remain a
patent tool and utilized at a high ranking management squad to begin manufacturing of
corporate entity factual details of statements, enabling management to ensure and develop
informed choices4. Corporate data and monetary data may remain organized within the
appropriate social programs as well as the performance of executives might be evaluated in
the limelight of possible implications. For instance, an operational support segment is a right
transition between individuals, accounting, and personal level finance. The operational
assistance model can look quickly at rational evaluation to support management in making
important decisions.
TPS (Transaction Processing System)
This kind of computer system is recognized as an important type of electronic processor that
gathers, modifies, and retrieves all of the operational information about the contracts of
business. Data administration system at effective level is precise, dependable, as well as time-
saving. Techniques of retail programming are recognized as the real-time computation.
Organizational procedures looked at different transaction elements and anticipated results of
every interaction with the queuing control technique. For instance, corporate processing
systems gather and modify data for the organizational working capital revenues as well as
outcomes over the presentation of quarterly results course5.
MIS (Management Information System)
Activities of the organization are linked and supported by the management information
system. This is developed with operational processes and includes economical execution and
effective execution. Management information system ensures to analyze the data from the
many different aspects to provide and gain information that might support management to
make the right choices. Another important objective of the management information system
4 Megawaty M, Ulfa M. Decision Support System Methods: A Review. Journal of
Information Systems and Informatics. 2020 Mar 17;2(1):192-201.
5 Wang Y, Kogan A. Designing confidentiality-preserving Blockchain-based transaction
processing systems. International Journal of Accounting Information Systems. 2018 Sep
1;30:1-8.
5
is to ensure the improvement in decision making through acquiring exact techniques to
collect actual economic data for the organization6. For example, in the case of the
manufacturing industry, MIS supports the gathering of data on production that the
organization ensures to produce.
KSM (Knowledge Management System)
This is an important and specialized tool that enables the organizations to manage
information records of the IT program which safeguards as well as changes all of the
associating protocols and collaboration. This enables to improve the efficiency level of the
organizational management. It enables the organization to link every customer and business
intend to facilitate customers in accomplishing all objectives. Data connectivity framework in
a business provides journal articles, licenses, training, and many more7. For instance, a
platform of data management includes the question material of every site that addresses more
frequently questions about a subject.
Task 3: Globalisation and the effects of IT on globalization
In todays time globalization is recognized as the procedure of extensive products as well as
commodity exchanges and necessary movements around the nation whilst taking into account
all elements such as technology, standards at the social level, finance, and many other
considerations. It is important to ensure the improvement in communication amongst humans
from the whole world with different results and accomplish a particular degree of efficiencies
in completing operations and earning income with the support of other organizations. All
dynamic traits of many nations and linked institutions bring combined as well as varied
culture with skills to work and ensure to motivate other people with excitement and
creativity8. This is explained as the broad interconnection range with the range of those
nations that include the objective of completing the functional procedures and transmitting
6 Zhang Y. Management information system. In2017 2nd International Conference on
Machinery, Electronics and Control Simulation (MECS 2017) 2016 Jun. Atlantis Press.
7 Humayoun M, Qazi AM. Towards knowledge management in RE practices to support
software development. Journal of Software Engineering and Applications. 2015;8(08):407.
8 Zajda J. Globalisation and its impact on education and policy. In Second international
handbook on globalization, education, and policy research 2015 (pp. 105-125). Springer,
Dordrecht.
6
the good information speedily through many channels and applications to minimize the
international material preservation consumption.
Computing Technology Corporation supports the deployment of the network while
monetization of technology ensures to improve research and development at the global level.
Moreover, globalization is important for big organizations to ensure and manage global
development with support in a long time existence. The industry of e-commerce and linking
strategies may have co-linked in recent times; every executive should analyze thoroughly
linking technical advances on the internationalization of initiatives effectiveness. Such
organizations apply frequently methods of digitalization and plants of assembly to extremely
moving huge levels of information to other countries. Connectivity approaches are
recognized as stimulating for international participants in developing the international setting
as enabling the organization to ensure and think outside the box with items relied on the
every personal connection automation. Moreover, scientists can ensure to divide commodities
scientific accomplishing into the different types of categories to analyze the impact of data
technological advances on globalization. These are the part, connection, and business. Plans
of IT support and ensure to encourage international activities to improve the capability and
creativity of the management to allow for the development of many organizations’ big data
with effective management as well as many analogous things. Due to industries connectivity
and international techniques with the vast digital warehouse of information might be
supported through the many different types of programs such as MS Word, spreadsheet, and
reducing efforts of humans.
Task 4: Definition, example, advantages and disadvantages of digital infrastructure
Definition
Digital infrastructure refers to the digital techniques which provide a foundation for the
information technology and functions of the organization9. This is the combination of specific
accordance with the effective standard in the industry of information technology that is
relying on the many features as well as architecture. This interconnects and brings altogether
physical and virtual techniques like compute, storage, system, software, IaaS platform, PaaS
platform, and SaaS platforms to create an effective foundation for the digital operations of the
9 Niranjanamurthy M, Kavyashree N, Jagannath S, Chahar D. Analysis of e-commerce and
m-commerce: advantages, limitations and security issues. International Journal of Advanced
Research in Computer and Communication Engineering. 2013 Jun;2(6):2360-70.
7
company. Digital infrastructure utilizes an important foundation to rearchitect facilities for
international digital delivery as well as access many capabilities and ecosystems which need
to create products and services speedily and deliver at a scale.
Example
Digital infrastructure ensures that digitalization of public transport supports statistics to be
obtained which were gathered previously through hand and prevents the users from slipping
by issuing warnings to necessarily security whenever it takes place and enables the fleet to be
managed within a real-time as well as supports to automate signage that improves safety.
Advantages
Users through the digital infrastructure examples such as internet computing and capturing
real-time might utilized to gain an effective deal of understanding as well as unique
capabilities of IT10. Moreover, outsourcing is an important electronic technology sort that
enables people to perform fundamental functions in a small period and save money for
organizations. Regular changes are ensured and adjusted to provide a good range of
alternatives as well as analysis in organizational settings. Transmitted over the license
network might be ensured and expanded to many manufacturers by focusing on adaptability
and following the appropriate rules.
Disadvantages
Corporate engagement, customer engagement, and participation at an unnecessary level are
hampered through the critical component of functional attempts through digital
infrastructure11. If operations of a data center’s business are exported with the application of
digital infrastructure then ecological dangers could create major challenges. The disparity
between the improving offerings as well as growing messages, and the physical location of
the linking gear is the main challenge for corporate consumers and in-house administration
through digital infrastructure. Consumers face many challenges such as project expansion and
operational costs that need additional investigation. People are needed at a frequent level to
focus strongly on networking techniques that may lead to cause concerns of security.
10 Nanehkaran YA. An introduction to electronic commerce. International journal of
scientific & technology research. 2013 Apr;2(4):190-3.
11 Van Deursen AJ, Helsper EJ. The third-level digital divide: Who benefits most from being
online?. communication and information technologies annual 2015 Dec 12. Emerald Group
Publishing Limited.
8
Task 5: Risks associated with information systems outsourcing and why is IT
infrastructure so critical to digital transformation!
Risks associated with information systems outsourcing
There are many risks linked with information systems outsourcing. The main challenges
presented through it is a license that includes administrative as well as operational procedures
that secure the integrity of information, performance level viability, and regulatory
compliance. The risk associated with information systems outsourcing is inexperienced
employees, loss of control, leaking risk of many strategic information, the solvency of
vendor, dependence, and hidden cost.
Why is IT infrastructure so critical to digital transformation!
To ensure that the organization is keeping up with digital transformation demands it is important
to ensure and work with a strong as well as secure digital infrastructure. Digital infrastructure is
defined by emphasizing on enabling organizational agility and powering experiences of users
which lead to driving engagement and loyalty of the customers. IT infrastructure is critical in
service delivery. This is utilized to ensure the improvement in effectiveness, sustainability, and
services. IT infrastructure ensures to remake a procedure to become effective12. This enables to
replicate the existing service within the digital forms and utilize digital technology to transform
the service into something significant. IT infrastructure supports to become more effective and
efficient with the utilization of resources to manage daily work easy as the digital transformation.
To improve the reliability of suppliers and avoid limitations as well as operational risk, many
ways to minimize the poor level of variation from the transfer of money are utilized. For example,
a business executive applied for a mortgage and started the reading procedure of deal situations,
requesting credit analysis from customers and gaining the funds.
Long time viability of the organization is compromised because of the limitations as well as laws
in the technology of IT and manufacturing of the product. Risk is linked with developing
sustainable growth as operations may effectively function and identifying all of the physical
abilities of the organizations which may be harmed through the possible implications and local
conflicts. All of the clients at the general level demand the information network and convergence
of network, prevention, and stock security dealings within the profits and remain capable to
12 Peppard J, Ward J. The strategic management of information systems: Building a digital
strategy. John Wiley & Sons; 2016 Apr 18.
9
preserve organizations operating whilst minimizing the problems with equipment connection and
testing of security13.
There is a huge level of competition within the outsourcing of computing networking to ensure
and protect the level of privacy as well as confidentiality of a system being transmitted. Through
considering the privacy risks and security risks, top-secret information transmission may lead to
creating challenges and concerns for the users. Through evaluating cryptographic tools, a strategy
develops the base for minimizing risk levels and maintaining rules of privacy. Upper management
of the organization is in charge to manage all of the interconnections administrative strategy, and
methodology, and manage confidential material.
Conclusion
In the limelight of the discussion, it can be concluded that many possibilities could support the
organization to ensure the development within the competitive industry and ensure explicit
demonstration of use throughout the whole duration. This is important to analyze and review
every trait to maximize the earnings of the organizations within the big spectrum of variables. The
report has ensured the focus on many IT platforms that are developed prioritized with the
utilization of many advanced approaches such as Canvases, McAfree, Microsoft Word, and
Moodle. It has been presented in this report that globalization has altered every industry within the
twenty-first century through developing creativity, and progress, and has a substantial impact on
the IT business expansion through technological transformation. Different types of IT connection
challenges have confronted outsourced organizations, limiting the effectiveness and disruptive
innovations’ utility. The significance of IT infrastructures as well as technological advances for
the organizations has been highlighted throughout the report.
13 Yeow A, Soh C, Hansen R. Aligning with new digital strategy: A dynamic capabilities
approach. The Journal of Strategic Information Systems. 2018 Mar 1;27(1):43-58.
10
References
Beck Dallaghan GL, Lomis K, Crow S, Coplit L. Bridging educational innovation and
financial offices: using the Business Model Canvas modified for medical educators to
communicate a need. Journal of Communication in Healthcare. 2021 Oct 27:1-6.
Dorsey-Elson L, Chavis C, Baptiste-Roberts K, Bista K, Tannouri A, Oni A, Rockward M,
Allen-Milton S, Kinyua A, Pratt-Harris N, Brunson DJ. Teaching and Learning as” CANVAS
Ambassadors” during the COVID-19 Pandemic: Faculty Experiences at One Historically
Black College and University. Journal of Interdisciplinary Studies in Education.
2021;10(1):1-5.
Fenu G, Malloci FM. DSS LANDS A decision support system for agriculture in Sardinia.
HighTech and Innovation Journal. 2020 Sep 1;1(3):129-35.
Humayoun M, Qazi AM. Towards knowledge management in RE practices to support
software development. Journal of Software Engineering and Applications. 2015;8(08):407.
Megawaty M, Ulfa M. Decision Support System Methods: A Review. Journal of Information
Systems and Informatics. 2020 Mar 17;2(1):192-201.
Nanehkaran YA. An introduction to electronic commerce. International journal of scientific
& technology research. 2013 Apr;2(4):190-3.
Niranjanamurthy M, Kavyashree N, Jagannath S, Chahar D. Analysis of e-commerce and m-
commerce: advantages, limitations and security issues. International Journal of Advanced
Research in Computer and Communication Engineering. 2013 Jun;2(6):2360-70.
Peppard J, Ward J. The strategic management of information systems: Building a digital
strategy. John Wiley & Sons; 2016 Apr 18.
Van Deursen AJ, Helsper EJ. The third-level digital divide: Who benefits most from being
online?. In Communication and information technologies annual 2015 Dec 12. Emerald
Group Publishing Limited.
Wang Y, Kogan A. Designing confidentiality-preserving Blockchain-based transaction
processing systems. International Journal of Accounting Information Systems. 2018 Sep
1;30:1-8.
Yeow A, Soh C, Hansen R. Aligning with new digital strategy: A dynamic capabilities
approach. The Journal of Strategic Information Systems. 2018 Mar 1;27(1):43-58.
Zhang Y. Management information system. In2017 2nd International Conference on
Machinery, Electronics and Control Simulation (MECS 2017) 2016 Jun. Atlantis Press.
11
Zajda J. Globalisation and its impact on education and policy. In Second international
handbook on globalization, education, and policy research 2015 (pp. 105-125). Springer,
Dordrecht.

Assessment Answers: Current Workflow BPMN ICT226

Assessment Answers: Current Workflow BPMN ICT226

Running head: – INTEGRATED BUSINESS PROCESS
INTEGRATED BUSINESS PROCESS
Name of the Student
Name of the University
Auth …

Preview text

Running head: – INTEGRATED BUSINESS PROCESS
INTEGRATED BUSINESS PROCESS
Name of the Student
Name of the University
Author Note
1 INTEGRATED BUSINESS PROCESS
Table of Contents
1. Question-1: …………………………………………………………………………………………………………….. 2
2. Question-2: …………………………………………………………………………………………………………….. 3
2.1. Part-(a): …………………………………………………………………………………………………………… 3
2.2. Part-(b): …………………………………………………………………………………………………………… 4
3. Question-3: …………………………………………………………………………………………………………….. 6
4. Question-4: …………………………………………………………………………………………………………….. 7
4.1. Part-(a): …………………………………………………………………………………………………………… 7
4.2. Part-(b): …………………………………………………………………………………………………………… 7
5. References: …………………………………………………………………………………………………………….. 8
2 INTEGRATED BUSINESS PROCESS
1. Question-1:
The BPMN diagram to describe the workflow in the accounts department at the
manufacturing company has been displayed as follows. The following BPMN diagram has
clearly stated the currently existing workflow at the organization, which necessarily includes
three primary actors, the Customer, Accounts Clerk and the Manager. Each of the activities
and processes that are carried out by them has been shown with the help of the following
diagram.
Figure-1: Current Workflow BPMN
(Source- Created by Author) Manufacturing Company Accounts Department
Manager
Accounts clerk
Customer
Start
Check In-house
ERP System
Bill
Check In-house
ERP System
Make Payment
through PayNow
Received?
NO
Notification
(Not received)
Check email inbox for
supplier invoicesYESSort by due
date
Supplier
invoices
Use Rubber stamp and
Approve
Reconcile invoices and
received payments
Produce monthly
reconciliation report
End
3 INTEGRATED BUSINESS PROCESS
2. Question-2:
2.1. Part-(a):
In this section of the document, 2 ineffectiveness as well as 3 inefficiencies within the
current business workflow at the accounts department of the company has been appropriately
identified (Ezekiel et al., 2018). Both the identification after evaluating the current workflow
will help us devise a proper solution for the same in specific terms. The evaluation has
mainly been carried out to ensure a better understanding of all the bad business activities that
are still carried out at the accounts department and to help provide suggestions or
improvements to the process. Hence, 2 of the existing ineffectiveness in the current workflow
are,
a. The company already has an in-house ERP system. However, even if the system
exists, the Accounts Clerk still needs to check the system for invoices as well as his
mailbox for any invoice that has been sent by the supplier. As a reason, the in-house
ERP system is ineffective, since it still requires human involvement and has been
considered as an ineffectiveness within the current workflow. This also has been
considered an ineffectiveness due to the time-consuming process that it is. Hence, is
an ineffective method that is carried out.
b. The monthly reconciliation report is manually prepared by the accounts clerk
(Olender 2020). This has also been identified as an ineffective process since the same
should be prepared by the in-house ERP system. However, it is not and eventually
becomes a manual process as well. The manual process can also lead to human errors
at the accounts department of the company and lead to financial miscalculations at
times.
4 INTEGRATED BUSINESS PROCESS
In addition to the identified ineffectiveness in the above processes, the following
points have clearly out 3 of the inefficiencies that are present in the system and needs to be
changed or altered to integrated efficiency into the business process (Allard et al., 2019).
i. Manually printed hardcopies of bills are provided to the customers if they are not
digitalized. This is an inefficient process, since all the likely work is supposed to
happen online that makes the business process a faster one to carry out. In
addition to this, hardcopies of bills might also get damaged due to some reason,
which would again need the Accounts Clerk to print the bill and make the process
lengthy.
ii. The company does not accept payments in cheques and every individual customer
needs to use the PayNow application to make the necessary payment (Zhang &
Metawa, 2022). This has been considered as an inefficiency, since, the mode of
payment should always be a decision for the customer based on their suitability.
This mode of payment that does not offer any options might lead to losing out on
customers.
iii. Reconciliation of all the invoices based on incoming as well as outgoing payments
are carried out by the Accounts Clerk. This manual process is a lengthy one and at
the same time is time consuming. This is also an inefficient process and needs an
instant change to integrate efficiency into the business in specific terms.
2.2. Part-(b):
This sub-section of the document has clearly been discussed to put forward necessary
improvements into the current workflow of the business and needs to be addressed in a
proper manner with the help of technologies or information system integration (Ezekiel,
2021).
5 INTEGRATED BUSINESS PROCESS
Currently, there is an ERP system implemented and working at the accounts
department of the business. However, multiple issues have been identified within the process
that needs to be changed to integrated efficiency and effectiveness into the current workflow
for the business (Bruijl, 2018). As a reason, the following points have clearly outlined all the
necessary changes that needs to be performed to ensure a better understanding of the
necessary improvements within the business.
a. With respect to any invoice that is received on which bill needs to be made, the same
should be done automatically by the ERP system and the customer should be provided
with a bill that needs to be paid on their smart devices in the form of a notification.
The accounts clerk should not have any involvement in this.
b. The ERP system should keep a track of all the invoices, incoming and outgoing
payments (Hwang, 2018). The accounts clerk should only click an option on the ERP
system application to download the automatically generated reconciliation report.
c. All the customers should be registered to the mobile application and should receive a
softcopy of the bill in the form of a notification. The provisioning of hardcopy bills
should be instantly removed. All the customers will be provided with the bills in the
form of notification on their devices.
d. All the customers should be provided with options of choosing their preferred
payment gateway or application apart from the PayNow application. This will help all
the customers through the process of making online payments.
e. All the supplier invoices should be automatically arranged by the ERP system without
the Accounts clerk having to be involved into this process.
6 INTEGRATED BUSINESS PROCESS
3. Question-3:
The following diagram has clearly displayed the future workflow at the Accounts
Department by integrating the recommended improvements as made in the previous section.
The following BPMN diagram has been drawn by integrating all the necessary suggestions
and improvements that have been made to the current workflow in the accounts department
has mentioned in the previous section.
Figure-2: Future Workflow BPMN
(Source- Created by Author) Accounts Department
Customer
ERP System
Accounts
Clerk
Manager
Suppliers
Start
Generate bill
for customers
BillChoose payment
modeMakes payment
Received?
Database
YES
Updates
Database
Payment
Failed
Places supplier
order
OrderIn stock?
Out of
stock
Prepares and
Delivers product
NO
Prepares bill
Supplier
Bill
Makes paymentReconciles bills
& invoices
Reconciled
bills/
invoice
Sends to manager
for approval
Reconciled
bills/
invoice
Approves
Approved
bills/
invoice
Updates
database
End
7 INTEGRATED BUSINESS PROCESS
4. Question-4:
4.1. Part-(a):
With respect to the ERPSIM game, Cost Leadership Strategy is the one that has been
chosen from the Porters Four Strategies Model to be applied to the game. The game mainly
allows the participants to use a real-time ERP system to manage their virtual business, which
promises to enhance their understanding of utilizing ERP systems into their businesses.
However, this particular strategy has been chosen to be applied to the ERPSIM game,
since this strategy aims to target a large market and provide products or services at the lowest
price possible. This is one of the most effective strategy that can be adopted to increase the
customer base and effectively create the foundation of the business.
4.2. Part-(b):
The primary strategy that can be effectively used to increase Sales during the
ERPSIM game is to adopt the Cost Leadership Strategy (Paulet & Dick, 2019). This is a
strategy that helps the business to target a large market, which will attract more number of
customers and then provide them products or services at the lowest price possible.
A large target market might be in need of a specific product, and offering them the
product at the lowest price possible is the most effective strategy that can provide with the
helping hand in increasing the sales very quickly. Hence, this strategy has been chosen.
8 INTEGRATED BUSINESS PROCESS
5. References:
Allard, T., Alvino, P., Shing, L., Wollaber, A., & Yuen, J. (2019). A dataset to facilitate
automated workflow analysis. PloS one, 14(2), e0211486.
(https://doi.org/10.1371/journal.pone.0211486)
Bruijl, G. H. T. (2018). The relevance of Porter’s five forces in today’s innovative and
changing business environment. Available at SSRN 3192207.
(http://dx.doi.org/10.2139/ssrn.3192207 )
Ezekiel, K. (2021). Adaptation of business rules in business workflow systems (Doctoral
dissertation, London Metropolitan University).
(http://repository.londonmet.ac.uk/id/eprint/6753)
Ezekiel, K., Vassilev, V., Ouazzane, K., & Patel, Y. (2018). Adaptive business rules
framework for workflow management. Business Process Management Journal, 25(5),
948-971. (https://doi.org/10.1108/BPMJ-08-2017-0219)
Hwang, M. I. (2018). Relationship between teamwork and team performance: Experiences
from an ERPsim competition. Journal of Information Systems Education, 29(3), 157-
168. (https://aisel.aisnet.org/jise/vol29/iss3/4)
Olender, M. (2020, September). Business process modeling for flexible tasks workflow. In
IOP Conference Series: Materials Science and Engineering (Vol. 916, No. 1, p.
012079). IOP Publishing. (https://iopscience.iop.org/article/10.1088/1757-
899X/916/1/012079/meta)
Paulet, G., & Dick, G. (2019, March). ERPsim Games in Management Higher Education. In
Developments in Business Simulation and Experiential Learning: Proceedings of the

9 INTEGRATED BUSINESS PROCESS
Annual ABSEL conference (Vol. 46). (https://absel-ojs-
ttu.tdl.org/absel/index.php/absel/article/view/3241)
Zhang, Y., & Metawa, S. (2022, March). Design and Implementation of Business
Information System Based on Workflow. In The International Conference on Cyber
Security Intelligence and Analytics (pp. 911-915). Springer, Cham.
(https://doi.org/10.1007/978-3-030-97874-7_131)

Case Study Answers of Establishment of New Servicing Method

Case Study Answers of Establishment of New Servicing Method

Assessment Solutions of Creating an IT Sourcing Strategy- ITECH3103

Assessment Solutions of Creating an IT Sourcing Strategy- ITECH3103

ITECH 3103 –
Assessment Task 4
VERSA, Australia
Introduction
• The aim of the presentation is to evaluate the key IT strategy and
governa …

Preview text

ITECH 3103-
Assessment Task 4
VERSA, Australia
Introduction
The aim of the presentation is to evaluate the key IT strategy and
governance associated with versa Australia
Versa networks is one of the strong, private and independent company
which operates worldwide
In this presentation the focus will be on communicating and analyzing the
different IT strategy and governance which has helped the business to grow
The importance and benefits of IT governance and management
technologies in the current world will be evaluated
Learning journey
The module has provided information associated
with the IT governance and management
techniques.
IT governance is responsible for determining the
strategic direction
These are providing a better way of organizing the
strategic goals associated with the business
The IT governance component which are needed to
be considered include value delivery, strategic
alignment, performance management, resource
management and risk management
About Company: Versa, Australia
VERSA founded by the security and network
industries
This emerged as an innovative leader in SASE
VERSAis a medium sized company which has 500
employees but has created a significant impact in
the market
Innovative IT solutions, security practices and IT
service management approaches has helped in
leveraging the operations of Versa Australia
Findings of literature review
IT strategy and IT governance is one of the most
integral part of organization.
This is responsible for the purpose of determining
strategic direction
The IT strategy of the company VERSA has helped
in boosting the performance
The need to understand IT strategy and alignment
with business therefore becomes crucial
Findings of literature review
The components associated with IT governance
include the following:
Value delivery
Strategic alignment
Performance management
Resource management
Risk management
Findings of literature review
IT strategy needs to be devised in a manner that it
can contribute towards the betterment of the
business
The need to define digital business strategy is
crucial at this point of time so that better efficiency
can be obtained
With the introduction of strong IT strategy it
becomes easy to organize the investment and also
enables the organization to manage resources
New ICT Policies for VERSA
The need to introduce new IT strategy and IT governance is cr ucial within
the company
The new set of ICT policies will offer a better efficiency in the business
The IT security policies which are needed to be considered are as follows:
Security incident response policy
Data encr yption policy
Infor mation security policy
VPN usage policy
Password management policy
New ICT Policies
The IT security policies which are needed to be
considered are as follows:
Mobile device security policy
Identity theft protection policy
User privilege policy
Security awareness and training policy
Disaster recovery policy
Business continuity plan
Issue with IT strategy and governance
The current IT strategy having several issues
Lack of transparency and lack of defined goals it can lead to impacting the
performance of the company
Versa at present does not have a strong communication across the stakeholders
It is important to devise a new policies which will be able to provide a better ability
to interact with the customers
The proposed IT strategy will be reliable and will deal with all the issues
Practices and related techniques
The following practices must be considered for a better development of the
IT strategy:
Creating an IT sourcing strategy
Implementing appropriate IT governance strategy
Planning for an efficient digital transformation
Government as a platform must be considered
Creating work from anywhere environment
Reflection on the major learning
The module has helped in learning about the importance
of IT governance and strategy
Every company must have an activity governance
principle for the purposes of meeting the business
needs
The focus should be on transparency, responsiveness
and effectiveness
This module helps in understanding the way good IT
governance must be implemented in business
References
Blondeel, M., & Van de Graaf, T. (2018). Toward a global coal mining moratorium? A comparative analysis of coal mining
policies in the USA, China, India and Australia.Climatic Change,150(1), 89-101.
BoshkoskaKlisaroski, M., Midovska, M., Nikolovski, D., Boneva, M., & Lazaroski, S. (2019). Measuring the ICT Influence on
InnovativityLevel.Inter national Jour nal of Sciences: Basic and Applied Research (IJSBAR), 109-124.
Da Luz, F. Q., Sainsbury, A., Mannan, H., Touyz, S., Mitchison, D., & Hay, P. (2017). Prevalence of obesity and comorbid eating
disorder behaviorsin South Australia from 1995 to 2015.Inter national Jour nal of Obesity,41(7), 1148-1153.
Mahanti, R. (2019).Data Quality: Dimensions, Measurement, Strategy, Management, and Gover nance. Quality Press.
Sirisomboonsuk, P., Gu, V. C., Cao, R. Q., & Burns, J. R. (2018). Relationships between project governance and information
technolog y governance and their impact on project performance.Inter national jour nal of project management,36(2), 287-300.
ulMusawir, A., Abd-Karim, S. B., & Mohd-Danuri, M. S. (2020). Project governance and its role in enabling organizational
strateg y implementation: A systematic literature review.Inter national Jour nal of Project Management,38(1), 1-16.

Assessment Solutions-Different types of Devices Hardening:ICT50220

Assessment Solutions-Different types of Devices Hardening:ICT50220

Running head: IT
DEVICE HARDENING
Name:
Student From:
Author Note:
1 IT
Table of Contents
1. Introduction ……………………………….. …

Preview text

Runninghead:IT
DEVICEHARDENING
Name:
StudentFrom:
AuthorNote:
1IT
TableofContents
1.Introduction………………………………………………………………………………………………………….2
2.Devicehardening………………………………………………………………………………………………….2
3.Differenttypesofdeviceshardening……………………………………………………………………….3
4.Scenario,threats,andriskforeachtype…………………………………………………………………..3
4.1.Eachtypeofdevicehardening…………………………………………………………………………3
4.2.Scenario,threatsandriskofeachtype………………………………………………………………6
5.Attackerscanleveragethesethreatsandrisksforeachtype……………………………………….7
6.Reputablehardeningandusefulnessforeachtype…………………………………………………….7
7.Conclusion…………………………………………………………………………………………………………..8
Reference……………………………………………………………………………………………………………………9
2IT
1.Introduction
ITsecurityisthesetofsomestrategiesofcybersecuritythatcanpreventtheunauthorised
accesstotheorganisationalassetsincludingdata,networks,andcomputers.TheITsecurity
canmaintaintheconfidentialityandintegrityofthesensitiveinformationandbasedonthe
requirements;itcanblocktheaccessofhackers[2].Theobjectiveofthisresearchpaperisto
describeaboutthedevicehardening.Devicehardeningcansecureadevicebeforeinstallation.
Theprospectsofthispaperaretodescribeaboutthedevicehardeninganditsdifferenttypes,
theScenario,threats,andriskforeachtypeofthedevicehardening,theprocessinwhich
attackerscanleveragethosethreatsandrisksforeachtypeofthedevicehardening,and
reputablehardenerforeachtypeofdevicehardeningincludingtheirusefulness.
2.Devicehardening
Thedevicehardeningcanbeidentifiedasthemethodofreducingthevulnerabilitiesin
thesecuritydevices[1].Devicehardeningisaveryimportantstepbeforeanydeviceis
installedinanetwork.Thisstepisveryimportanttosecureadeviceasthedevicehasno
loopholethatcanbeexposedbyahacker.Maximumnetworkadministratorcanrelyonthe
firewallthathelpstoprotectthewholenetwork[5].Duetothedevicehardening,the
hardeningofthedevicesintheentirenetworkisenhancedandthiscausesnoharmforany
devices.Sometechniquescanbeusedinthehardenedsecuritydevicessuchasupdatingthe
patchesandfirmwareofthesecuritydevices,disablingtheunnecessaryports,services,and
protocols,ensuringtheusageofsomenon-defaultconfigurations,reviewingpoliciesto
ensurethattheycanbeconfiguredwithsomebestpractices,ensuringthatthedevicescanbe
configuredfortheusageofthesecurityprotocols,andpasswordmanagement.
3IT
3.Differenttypesofdeviceshardening
Devicehardeningcaninvolveinthesecuritysystemoftheapplicationofcomputer
softwareincludingoperatingsystemandnetworks,database,andfirmwareofacomputer
system[4].Therearedifferenttypesofsystemhardeningsuchas:
Networkhardening.
Databasehardening.
Operatingsystemhardening.
Softwareapplicationhardening.
Serverhardening[3].
4.Scenario,threats,andriskforeachtype
Inthissection,wewilldiscussaboutthescenario,threats,andrisksofeachtypeofthe
devicehardening.
4.1.Eachtypeofdevicehardening
Networkhardening
Networkhardeningcansecurethebasicinfrastructureofthecommunicationof
differentcomputersystemsandserverstooperatewithinanetwork[6].Networkhardening
canbeactivebyfollowingtwodifferentwaysviaestablishingsystemsofintrusion
preventionandintrusiondetectionwhicharebasicallythesoftwareusedforhardeningthe
network.Thesementionedapplicationsreportandmonitorautomaticallytheharmfulactivity
whicharethereintheprovidednetworkandassisttheadministratorstopreventany
unauthorizedaccess[8].Thetechniqueofnetworkhardeningbasicallyincorporatethe
appropriateconfigurationaswellassecurethefirewallsofthenetwork,audittherulesofthe
networkandtheprovidetheprivilegestoaccessthenetwork,disabletheprotocolsofthe
4IT
networkandtheunnecessaryorunusedportsofthenetwork,disabletheservicesifthe
networkandtheassociateddevicesthosearenotworkingcurrently.
Databasehardening
Performingthedatabasehardeningbasicallyinvolvesthesecuringofboththedigital
contentofthedatabaseandtheDBMS(DatabaseManagementSystem),thatisgenerallythe
applicationofadatabasewhichtheusersinteractwithsothattheycanstoreaswellas
analysetheinformationwhicharepresentinthedatabase[6].Thereareseveralprocesses
whichareperformedbythedatabasehardeningsuchas:
Helpstocontrolandrestricttheaccessandprivilegeoftheuser
Disablethefunctionsandservicesofthedatabasewhicharenotnecessary
Encryptandsecuretheresourcesandinformationofthedatabase
Operatingsystemhardening
TheOShardeningwhichisalsotermedastheoperatingsystemhardeningbasically
incorporatetheimplementationandpatchingoftheimprovedsecuritymeasuresinorderto
securetheoperatingsystemserver[10].Oneoftheappropriatewaysinordertoobtainthe
stateofhardeningfortheoperatingsystemisbasicallytohavethepatches,servicepacks,and
updatesinstalledintothesystemautomatically.Thistypeofhardeningisgenerallylikethe
hardeningoftheapplicationwheretheoperatingsystemperformstheroleofasoftware[12].
Butlikethehardeningoftheapplicationwhichaimsonprotectingthethird-partyand
standardapplicationswhereastheoperatingsystemhardeningsecuresthesoftwarebase
whichprovidesthepermissionstothoseoftheapplicationssothatcertainthingsonthe
server.
Softwareapplicationhardening
5IT
Anotherhardeningtechniqueishighlightedwhichisthehardeningofthesoftware
applicationthatincorporatetheimplementationandupdatingofthesecuritypatches
additionallyinordertosecureboththethird-partyaswellasthestandardapplicationswhich
areinstalledontheserver[7].Likethehardeningoftheserverthataimsonsecuringthe
wholesystemsserverbythedesign,whereasthehardeningoftheapplicationaimsonthe
applicationwhichareontheserver,basically,incorporating,forexample,aprogramofa
spreadsheet,customsoftware,orwebbrowserapplicationwhichusedformultiplereasons
[11].Atthebasiclevel,thehardeningoftheapplicationincorporatestheupdationofthe
existingandtheimplementationofthecodeofthenewapplicationssothattheservercanbe
securedinfutureandtheimplementationoftheadditionalsecuritymeasuresofthesoftware.
Serverhardening
Thehardeningoftheserverisbasicallythehardeningprocessofthesystemwhich
incorporatesprotectingtheports,functions,permissions,anddataoftheserverbyutilizing
theadvancedlevelofsecuritymeasuresatthefirmware,software,andhardwarelayers[8].
Themeasuresoftheserversecuritybasicallyincludebutarenotrestrictedtothefollowing:
Keepingtheoperatingsystemserverupdatedandpatched
Updatingthesoftwarefromthethird-partydailywhichisimportanttotheservers
operation,anddeletingthesoftwarefromthethird-partywhichdoesnotconformtothe
establishedstandardsofthecybersecurity[9].
Utilizingmorecomplicatedandstrongerpasswordaswellasdevelopingthestrong
passwordforthepoliciesoftheusersalso.
Blockingtheusertohavetheaccesstheaccountiftheuserfailedtologintothe
account.Thisfailedattemptsalsoneedstoberegisteredandtodeletetheaccountwhichare
notinuseatall.
6IT
4.2.Scenario,threatsandriskofeachtype
Networkhardening
Supposeinanorganizationthereareseveralserverswhichareconnectedwitha
networkfortransferringthedataamongthecomputers[14].Iftheorganizationhasnotset
anystrongfirewalltotheirnetwork,thenitwillprovidetheopportunitytotheattackerto
havetheaccesstotheinternalserverbyperformingDDoSattackwhichwillallowthehacker
tohavethesensitiveinformationoftheorganization.
Databasehardening
Supposeacustomerserviceprovidingcompanyhastheinformationabouttheir
customerswhichisstoredintotheirdatabase[11].Ifthedatabaseprivilegesarebeing
configuredproperlythentheattackercouldbeabletocausetheexecutionwiththehelpofSL
Injectiontechniquesothatthegeneraloperationsofthedatabasemanagementsystemcannot
beperformedproperly.
Operatingsystemhardening
Supposeageneraluserisusingacomputersysteminhishouseandaccidentlyhe
accessedasitewhichisnotunauthorizedandsafe[12].Thetimewhentheuservisitsthesite
certainmaliciouscodesgetinjectedtohiscomputersystemwhichiscalledMalwares.Slowly
itinfectstheprogramfilesoftheoperatingsystemasaresultsystemgetcrashedorfailedto
start.
Softwareapplicationhardening
Supposeauserisusingawebbrowserletitbechrome,iftheuserdoesnotupdateit
thenwhenevernewthreatapproachtotheirsystemthroughthebrowser,thenitwillfailto
7IT
blockthoseduetothelackofappropriatesecuritystandards.So,updatingthesoftwareis
veryessentialtoensurethesecurity.
Serverhardening
Supposeinanorganizationwheretherearevariouslevelsofmanagerialhierarchy,setting
theappropriateadministrativeprivilegeensuretheaccessoftheinformationbytheauthorised
usersonly[15].InattentiveAdministrationisthewaywheretheadminoftheserverfailedto
patchtheirsystemwhichresultstothesystemsecuritythreat.
5.Attackerscanleveragethesethreatsandrisksforeachtype
Attackerscangaintheaccessofanetworkbycreatingbackdoorsonacompromise
system.Thiscanbeaccomplishedbyfindingthevulnerabilityinanetworkforanunused
account[14].Thesetypesofaccountshavetheirpasswordbutthispasswordcaneasilybe
crackedbythehackers.AfterBreakingthepassword,attackerscancreateastrongpassword
thatisdifficulttobreakforauser[13].AttackeriscapableofexploitingtheSQLinjection,
bufferoverflows,andsooninordertoaccessadatabaseserver.theattackcanbedonebya
hackerthroughawebapplication.Operatingsystemhardeninginvolvesimplementingand
patchingtheadvancedlevelofsecuritytosecuretheoperatingsystemofaserver.Thebest
waytousetheHardenoperatingsystemistohaveaservicepackofinstalledapplications,
patches,andupdates.
6.Reputablehardeningandusefulnessforeachtype
Hardeningguidelinesarethepracticeswhichensuretheappropriatemanagingofthe
servers,networks,andthesystem.Thereareseveraltypesofhardeningasoutlinedabove
whereonethingiscommonwhichisensurethesecurityofthedataandtheinformationofa
particularentity.Accordingtothehardeningguideithasbeenseenthatthereisaguideline
8IT
ofCIS-CATtollwhichhastheexpectationtoprovideaoverallsecuritytotheentire
hardeningtypes.
7.Conclusion
Devicehardeningisamethodinwhichthevulnerabilitiescanbeeliminatedandturning
offeverynon-essentialconfiguringsystemandserviceswithsecuritycontrolsincluding
disablingtheunusednetworkports,filepermission,andpasswordmanagement.Fromthe
abovediscussion,wehavediscussedaboutthedevicehardeninganditsdifferenttypes,the
Scenario,threats,andriskforeachtypeofthedevicehardening,theprocessinwhich
attackerscanleveragethosethreatsandrisksforeachtypeofthedevicehardening,and
reputablehardenerforeachtypeofdevicehardeningincludingtheirusefulness.Device
hardeninghasvarioustypesincludingnetworkhardening,databasehardening,operating
systemhardening,softwareapplicationhardening,andserverhardening.Eachtypeof
hardeningisveryimportantforanydevicetosecurethem.Hence,itcanbeconcludedthat
theabovediscussionhassuccessfullyhighlightedaboutthedescriptionofthehardening
device.
9IT
Reference
1.FrankC,NanceC,JarockiS,PauliWE.ProtectingIoTfromMiraibotnets;IoTdevice
hardening.JournalofInformationSystemsAppliedResearch.2018Aug1;11(2):33.
2.RaeJS,ChowdhuryMM,JochenM.InternetofThingsDeviceHardeningUsingShodan.
ioandShoVAT:ASurvey.In2019IEEEInternationalConferenceonElectroInformation
Technology(EIT)2019May20(pp.379-385).IEEE.
3.ChoiSK,YangCH,KwakJ.SystemhardeningandsecuritymonitoringforIoTdevicesto
mitigateIoTsecurityvulnerabilitiesandthreats.KSIITransactionsonInternetand
InformationSystems(TIIS).2018;12(2):906-18.
4.DurveR,BouridaneA.Windows10securityhardeningusingdeviceguardwhitelisting
andapplockerblacklisting.In2017SeventhInternationalConferenceonEmergingSecurity
Technologies(EST)2017Sep6(pp.56-61).IEEE.
5.GabitovII,SaifullinRN,FarhshatovMN,NegovoraAV,MudarisovSG,KhasanovER,
GaliullinRR,GabdrafikovFZ,YunusbaevNM,ValievAR.Hardeningofelectrohydraulic
injectorsvalveunitsofdieselsatrepair.JournalofEngineeringandAppliedSciences.
2018;13(S8):6478-86.
6.PastukhovAG,VolkovMI.Developmentofdeviceforfixingdiskdrillbootinalathe
whenhardening.VestnikofFederalStateEducationalInstitutionofHigherProfessional
EducationMoscowStateAgroengineeringUniversitynamedafterVPGoryachkin.2019.
7.RotD,JirinecJ,KozenyJ,PodhrazkyA,HajekJ,JirinecS.Inductionsystemfor
hardeningofsmallparts.In201819thInternationalScientificConferenceonElectricPower
Engineering(EPE)2018May16(pp.1-6).IEEE.
10IT
8.SarkarS,ZhangX,HaoS,HuaX,BaileyTP,UherC,WolvertonC,DravidVP,
KanatzidisMG.Dualalloyingstrategytoachieveahighthermoelectricfigureofmeritand
latticehardeninginp-TypenanostructuredPbTe.ACSEnergyLetters.2018Sep
26;3(10):2593-601.
9.LeguesseY,VellaM,EllulJ.Androneo:Hardeningandroidmalwaresandboxesby
predictingevasionheuristics.InIFIPInternationalConferenceonInformationSecurity
TheoryandPractice2017Sep28(pp.140-152).Springer,Cham.
10.RodriguesCT,JacobsR,VasconcelosKF,LambrechtsP,Rubira-BullenIR,Gata-
AraujoH,Oliveira-SantosC,DuarteMA.InfluenceofCBCT-basedvolumetricdistortion
andbeamhardeningartefactsontheassessmentofrootcanalfillingqualityinisthmus-
containingmolars.DentomaxillofacialRadiology.2021Jul1;50(5):20200503.
11.MarchenkoD,DykhaA,AulinV,MatvyeyevaK,TishechkinaK,KurepinV.
Developmentoftechnologyandresearchofmethodofelectrichydropulsehardeningof
machineparts.In2020IEEEProblemsofAutomatedElectrodrive.TheoryandPractice
(PAEP)2020Sep21(pp.1-4).IEEE.
12.ZhenZ,FengC,WangQ,NiuD,WangX,TanM.SingleEventBurnoutHardeningof
EnhancementModeHEMTsWithDoubleFieldPlates.IEEETransactionsonNuclear
Science.2021Aug16;68(9):2358-66.
13.GrydinO,AndreievA,HolzweiigMJ,RsingCJ,DuschikK,FrolovY,SchaperM.
Shortaustenitizationtreatmentwithsubsequentpresshardening:Correlationbetweenprocess
parameters,microstructureandmechanicalproperties.MaterialsScienceandEngineering:A.
2019Mar11;749:176-95.
14.AmrouMH,HamoudaK,KeddamM.Modellingandoptimisationoftreatment
parametersusingresponsesurfacemethodology:applicationtosuperficialhardeningof
11IT
2017Aalloyusingtherods-ballsdevice.InternationalJournalofMaterialsEngineering
Innovation.2018;9(1):46-63.
15.JiK,JuH,XunJ,SuY,ZhangK,LiuP,XueY.Effectofhardeningandsealingoncolor
ofchemicallycoloredstainlesssteel.ScientificReports.2020Aug11;10(1):1-7.

Assignment Answers of The Most Crucial Strategy- HI5013

Assignment Answers of The Most Crucial Strategy- HI5013

Running head: MANAGING ACROSS BORDER

M ANAGING ACROSS BORDER
Name of the Student:
Name of the University:
A …

Preview text

Running head: MANAGING ACROSS BORDER
M ANAGING ACROSS BORDER
Name of the Student:
Name of the University:
Author Note:
1 MANAGING ACROSS BORDER
Que stion 1:
In complia nce with the aim that the organiza tio n is having, the meeting should highli g ht
that not all the developing countries have the same cultura l, politica l and social environme nt whic h
is why a thorough research on the targeted market is essential to the core.
As a part of Research and Developme nt, the organiza tio n should focus on learning more
about the competitors; in the developing nations it is the local businesses which have the bigge r
advantage and thus, research on them and their strategy, would aid the organiza tio n to know how
they should create their approach for that specific area or nation. Knowing what the organiza t io n
is competing against is better than moving towards an uncertain area without a plan.
Addressing and being aware of the rules is equally a significa nt strategy that needs to be
acknowledged and utilise d as a strategy; the global and the national rules are differe nt from each
other, given the fact that the demand on the business of the world is a lot diverse from the ones
imposed on a domestic firm.
One of the most crucial strategy that needs to be undertaken and discussed is to appreciate
the locals and take time to train they local employees so that they can have an opportunity for job
in the organizatio n itself, thereby supporting the whole cause for their expansion and bringin g
more consumers in. This is such a unique strategy that would not only bring the consumers in and
make the organiza tio n feel accepted in the developing nation, but it would also ensure a long- term
employme nt for the employees.
The organizatio n would have a motivatio n to hire the local employees, since they are a
great source of informa tio n and they can help the organizatio n to learn about the internatio na l
customs of business.
2 MANAGING ACROSS BORDER
Another crucial strategy for the organizatio n which needs to be discussed in the meeting is
that expanding the market in a developing nation needs patience and through the help of this
patience, the organiza tio n would be able to pull through the challenges they would face at the
initia l time after expansion.
Que stion 2:
The following are the advantages of entering a foreign market for a specific organizatio n:
One of the core advantages which is also the reason for which organiza tio ns take the step
of entering and expanding in foreign market is the improveme nt in the sales for the
organiza tio n. Launching in foreign market means that the organizatio n would have more
markets for extending their life cycle.
When an organiza tio n enters a foreign market, they get to learn as to how they can compete
with the foreign organiza tio n.
The following are some disadvanta ges of entering a foreign market for any specific organizatio n:
In order to entering the foreign market, there are several new regulatio ns which has to be
considered and it is significa nt to establish the brand of the organizatio n for protection but
some new regulatio ns create obstacles for their smooth functio ns.
Foreign nations have differe nt culture which implies that it is not necessary for the
organiza tio ns product to work in an equally effective way as it does in their host natio n.
For instance, the culture of Australia comprises of Aborigina l people, hence, the socio-
culture for in fashion for these people might not be effective or popular in a foreign natio n
like that of China.
3 MANAGING ACROSS BORDER
The Uppsala Model is known to be one of the theories which describes the internatio na li z in g
procedure of firms. This model aids in stating that firms tend to select to enter the nearby markets
that has low market commitme nt; all of these are inclusive of size, competitive advantage, and also
the product. Even though there are several internatio na lizatio n theories that attempt to explain the
internatio na l activities and the Uppsala Model is able to give a universa l explanatio n of how
internatio na lizatio n operates in the shape of sequentia l levels at the time of its initia l developme nt.
Through the developme nt trajectory, it is the Uppsala Model refuses the eclectic paradigm and is
even challenged by the rise of the EMNEs. To be specific, the Uppsala Model explains that firms
gradually tend to intensify their activitie s in the foreign areas.
Que stion 3:
Any informatio n that employees would get regarding the possibility of closure would
create a sense of insecurity and fear in them. It would highly impact the performance of the
employees, not to mentio n, that it would lead to an increase in employee turnover. The
motivatio na l theory stated by Abraham Maslow in Hierarchy of Needs Model determines the need
for humans which basically motivate s them and one of the needs that motivates people are safe ty
needs. The moment employees would get to know that the closure of the unit would put their job
safety at stake; majority of the employees would opt out from the organiza tio n wherein their job
would not ne at risk and they would perform without this pressure. The safety needs are the second
base level in the model created by Maslow stating their significa nce in the lives of people and
thereby, the essentiality of the strategies for this organizatio n to upkeep the morale of the
employees. The following are some of the strategies which can help to upkeep the emplo ye e
morale at the time of this diffic ulty:
4 MANAGING ACROSS BORDER
Ensure the employees that they can perform at the adequate level and their performa nc e
would prevent the closure.
The employees would need to be provided with goals so that they can understand what the y
need to do and the level of the effort they are expected to perform so that they are not as
uncertain and insecure about the situatio n.
Communica te every detail with the employees so that they are aware of what is happe ning
and how they are contributing in helping the Unit so that it is not closed.
The employees would have to be motivated through external motivatio n strategies as well,
like providing incentives to the employees who were able to perform at the expected le ve l
for the benefit of the Unit.
Provision of meaningful feedback to the employees is also essential in this scenario so tha t
they are aware all througho ut the process and not be lost and thus insecure.
It is also possibly helpful if every achieveme nt and milesto ne is celebrated; it would make
sure for the employees that they are working effective ly and the closure would not take
place if this performance is made to be consistent.
Que stion 4:
The ethnocentric approach is known to be one of the methods for internatio na l recruitme nt
where the Human Resources recruit the right person for the suitable job for the internatio na l
businesses based on the skills needed and the willingness of the candidate to be mixed with the
culture of the organiza tio n. Aside from this strategy, there are possible alternative s lik e
polycentric, regio- centric and geocentric approach to the ethno- centric approach for HR. The
poly- centric strategy comprises of hiring locals for manging as well as working the business for
better connection with the customers and the customers for the area wherein the consumer resides.
5 MANAGING ACROSS BORDER
As for the geocentric approach, it is the one where HR hires the best possible mixture of workers
regardless of their nationality. As for the regio- centric approach, it is very common in
organiza tio ns with widespread operations across the globe. Herein, the HR hires regiona l leaders
as opposite to that of leaders who are nation- based. For instance, a manager who is based on
London might head up operations for Europe.
An ethnographic approach is one which challenge s the HR since their staff might not be
familia r with the local consumers as well as business processes. Often times, it is the domestic
firms who outsource HR or even recruit internatio na l consulta nts for helping in getting a new
foreign office and while they screen employees, they would make sure that the people they recruit
meet the technica l essentiality as well as have a desire and the willingness to transfe r
internatio na lly. If any one of the approaches is to be recommended for being the alternative of
ethno- centric, it would be the Regio- centric approach for the following reasons:
It is focused on culture fit; or to state simply, the managers from same region like that of
the host nation might not encounter any issue in respect to the culture as well as the
langua ge.
It would cost less in hiring the natives of the host nation.
The managers would tend to work well in the neighbo uring nations within the geogra p hic
area.
Que stion 5:
Before formulating the strategy, Boost Juice has to consider conducting market research in
order to comprehend the diverse regiona l markets that are in the plan to enter. Market researc h
would help in obtaining a clear comprehensio n of the competitio n, and the local trends along with
6 MANAGING ACROSS BORDER
the target consumers within the specific region. Secondly, it has to be noted, that none of the
expansion plan would help in formula ting a strategy, if there are no clearly identified goals. There
are segmentatio ns required for both long- term as well as short -term strategies. The factor of
financ ia l readiness is equally essential before coming into a solution from a strategy; the issue
would be more intense if the organiza tio n come up with a strategy but they did not calculate the ir
financ ia l readiness. There might be another need for possibility of development for a separate
strategy for the change manageme nt within an organizatio n. When people cross cultures, they need
to be ready for the change and thus, every aspect of change manageme nt has to be considere d .
Finally, it is to be comprehended well that legal consideratio ns are very crucial at the time of
formulatio n of any strategy; the legal consideratio ns at often, involves in the global expansion and
these add a lot of stressful aspect, mainly for the risk is great if one leaves everything out.
Documentatio ns for these legal consideratio ns are also significa nt but before the formulatio n of
strategy, a thorough knowledge of the required documents are mostly a need. Planning for the
development of an organiza tio n, and coming up with strategies might be overwhelming, howeve r,
through some organizatio n and prior notion about the aspects of the expansion, can help in
preparation for the strategy formula tio n which can then be imple me nted.
Que stion 6:
Geert Hofstede had projected that nation-wide as well as provincia l factors help in
contributing to the culture of the company and then eventua lly impact the behaviour of the workers
within the organizatio n itself. As per this model by Hofstede there are primarily 5 factors tha t
impact the culture of any workplace; these factors are as follows:
Power Distance: this is the index that refers to the differe nces within the work culture
according to the power delegated to the workers. There are some companies that believe in
7 MANAGING ACROSS BORDER
having team leaders who are responsible for their respective teams as well as have the
challenge of extracting the best out of all their team members.
Masculinity versus Feminity: It reflects on the impact of differe ntiatio n in male and the
female values upon the culture of the company, companies, wherein male workers
dominate their female workers would follow diverse policies as compared to companie s
wherein females have a huge say in the process of decision- making procedure for the
companies.
Individ ua lism: Some organiza tio ns do not follow a culture of teamwork and those
individ ua ls prefer to work in a single unit and not with teams.
Uncertainty Avoidance Index: It is the factor that acknowledges the uncertainty of
unacquainted scenarios that the workers face. It also implies to the open-minded ness le ve l
of the workers within the uncomfortab le or comfortable situatio ns.
Long Term Orientatio n: Some organiza tio ns concentrate on the long- term associatio n with
their workers, specially, such workers work very hard for meeting with the expectation of
the organiza tio n. The workers who note this attempted long- term speculatio n, they tend to
feel more devoted to their organiza tio n and thus concentrate on their personal as well as
professiona l long- term goals and even meet them.
8 MANAGING ACROSS BORDER
References:
Isfahani, S.L., Teimouri, H. and Abzari, M., 2020. Developing and presenting an organisatio na l
culture model based on dimensio ns of Hofstede model. International Journal of Business
Information Systems, 34(2), pp.293-308.
Kalasin, K., CuervoCazurra, A. and Ramamurti, R., 2020. State ownership and internatio na l
expansion: The Scurve relationship. Global Strategy Journal, 10(2), pp.386-418.
Liu, G., Tsui, E. and Kianto, A., 2021. Knowledge-frie nd ly organisatio na l culture and
performance : A meta-analysis. Journal of Business Research, 134, pp.738-753.
Vahlne, J.E. and Johanson, J., 2017. From internatio na liza tio n to evolutio n: The Uppsala model at
40 years. Journal of International Business Studies, 48(9), pp.1087-1102.
Vahlne, J.E., 2020. Developme nt of the Uppsala model of internatio na lizatio n process: From
internatio na lizatio n to evolutio n. Global Strategy Journal, 10(2), pp.239-250.
Wang, X., Chen, W., Shang, J. and Yang, S., 2018. Foreign markets expansion for air medic a l
transport business. Journal of the operational research society, 69(7), pp.1146-1159.

Assessment Solutions | Report on Hiring And Firing: MAN200

Assessment Solutions | Report on Hiring And Firing: MAN200

HIRING AND FIRING
1
Contents
Introduction ……………………………………………………………………………………………. …

Preview text

HIRINGANDFIRING
1
Contents
Introduction…………………………………………………………………………………………………..2
Hiring…………………………………………………………………………………………………………..2
RecruitmentandSelection…………………………………………………………………………..2
Firing……………………………………………………………………………………………………………4
Conclusion……………………………………………………………………………………………………5
References…………………………………………………………………………………………………..6
2
Introduction
ThereareanumberoffunctionsthataHumanresourceprofessionalhasto
performwithinacompany,butthetwoofthemostimportantfunctionsofthese
professionalsistohireandfirepeople.Thereareprocessesthatareassociatedwith
thesefunctions,namelyrecruitmentandselection(forhiring),andperformance
evaluationandterminationofemploymentcontract(forfiring)(Muller,2013).This
paperwillreflectonthesefunctionsandprocessesperformedbytheHumar
Resourceprofessionalswithintheorganization.
Hiring
Hiringisthefunctionwhich,insimpleterms,isrelatedtotheprocessof
assessingthepotentialcandidatesforajobpositionthatarisesinanorganization,
andmakingselectionoftheemployeesaspertherequirementsofthejobposition
andjobdescriptionofthejobposition.Thisfunctionofhiringincludestwomajor
processes,thatarerecruitmentandselectionofcandidates.Thecandidateshaveto
gothroughmanystagesofhiring,wheretheirjobapplicationsarereviewed,they
abilitiesandskillsaretested,andthen,whenthesuitabilityhasbeenestablished,
theyareselectedforthejobposition(Kumari&Malhotra,2013).
RecruitmentandSelection
Inrecruitmentprocess,theHRprofessionalsdeterminetheneedforthe
employeesasthefirststep.Inthis,thejobpositionswhicharevacant,orincaseof
requirementofmorehumanresourcefortheorganization,areidentified.TheHR
professionalthenproceedstoattractthepotentialemployees,orcandidatesforthis
jobpositionusingvarioussources,suchasnewspaperads,jobboards,onlinejob
boardsandwebsites,andothermodes(Armstrong,Landers&Collmus,2016).
3
Duringthisprocessofattraction,thecompanyreceivesanumberofapplications,
fromwhich,theHRprofessionalchoosesonlythoseapplicationthatmeetsthebasic
requirementsofthejob,suchaseducationalqualificationandexperienceyearsof
thecandidate.Afterfilteringoutcandidatesinthisprocess,theHRprofessionalthen
proceedstothenextstep,whichistotestthecandidatesfortheirabilities,skills,and
knowledge.Incaserequired,thisstepwouldalsoincludephysicalexaminationto
assessthephysicalfitnessofthecandidatesforthejobpositionidentified.
Afterthecandidatespassthistestofknowledge,skills,physicalwellbeing
andabilities,thenextstepofrecruitmentthatfollowsisinterview(Renwick,Redman
&Maguire,2013).Aftertestprocess,morecandidatesareremoved,andtherestof
thecandidatesproceedtotheinterviewprocess.Therecanbenumberofroundsof
interview,butthissteprequirestheinteractionofthecandidateswiththeHR
professionalsandotherleadersofthedepartmentinwhichthevacancyisavailable.
Inthisprocess,theknowledgeofthecandidateisassessedagain,butinface-to-
faceinteractions.Otherthanknowledge,theleadersandHRprofessionalsalso
assessthepersonalitytraitsofthecandidates,alongwiththeobservationalskills.
Thisisthelaststepofrecruitment,andthenselectionprocess,oractualhiring
starts(Renwick,Redman&Maguire,2013).
Theselectionprocessincludestheevaluationofthecandidatesbasedonthe
testsconducted,alongwiththeinterviews.Afterthisevaluationofthecandidatesis
done,selectionofthecandidate,whichisthemostsuitableforthejobpositionand
canfulfillthejobdescriptionresponsibilities,isdone,andthatcandidate(s)isthejob
offer,wheretheyaresenttheofferletterforthejob.Atacceptanceofthisjoboffer,
thecandidateisofficiallyhiredandbecomesthepartofthehumanresourceofthe
4
companywhentheycommencetheirjobinthenewjobposition(Armstrong,Landers
&Collmus,2016).
Firing
Justlikethehiringhasadetailprocess,noemployeescouldbefiredeasily,or
isfiredimmediately.Thereisaprocesswhichisfollowedwhenanemployeeorthe
humanresourceisfiredortheirjobcontractisterminated.Thisprocessincludes
assessmentorappraisaloftheperformanceoftheemployees,andthen,the
employeesarefired,whichareunabletomeettheworkstandardsofthecompany
(Daley,2015).
Intheappraisalprocess,thefirststepfollowedistotakeanappraisalmeeting
atthestartoftheemployeesworkatthecompanyanddeterminetheSMARTgoals
whichareneededtobeachievedwithintheprovidedtimeperiod.EitherSMART
goalsarefollowed,orthecompanymighthavesomepredeterminedstandards
whichneedtobefollowed(Pichler,2012).Afterthesegoalsarecommunicated,the
employeesaregiventhechancetomeetthestandardsset,orthegoalsthatwere
determined.Followingthisstep,theperformanceoftheemployeesismeasured,
whichisthencomparedtothestandards,ortotheSMARTgoalsset.After
comparison,anothermeetingisconducted,wherediscussionabouttheperformance
isdone.Whentheperformanceissatisfactoryorabovethesetstandards,the
employeesaregivenraiseorpromotion,whilebadbehavior,basperformanceand
poorattitudemightbesomeofthereasonsemployersdecidetoterminatethejob
agreementorcontractwithemployee(s)(Kadiresan,etal,2015).Mostly,employees
arenotimmediatelyfired,andtheyaregivenachancetoimprovetheirbehavior,
attitudeand/orperformance.Butiftheemployeeisstillnotabletomakechanges,
5
theemployersarenotleftwithachoiceotherthantofiretheemployee(s)(Daley,
2015).
Conclusion
Thus,itcanbeconcludedthatthereareanumberofstepsinvolvedinthe
hiringandfiringprocess,anditisnoteasyasitsounds.Therearenumeroussteps,
screeningsandevaluationsthatanHRprofessionalhastoundertakeinorderto
determinewhichpersontobringintothecompany,whilealsotakealotoftimeand
steps,includingthestepsofappraisalprocesstodeterminewhichemployeesneeds
tobefiredfromthecompany.Boththestepsareimportant,andacompanycannot
ignoretheseprocesseswhilemanagingthehumanresourcesinacompany.
6
References
Armstrong,M.B.,Landers,R.N.,&Collmus,A.B.(2016).Gamifyingrecruitment,
selection,training,andperformancemanagement:Game-thinkinginhuman
resourcemanagement.InEmergingresearchandtrendsingamification(pp.
140-165).IGIGlobal.
Daley,D.M.(2015).Strategichumanresourcemanagement.InPublicpersonnel
management(pp.128-142).Routledge.
Kadiresan,V.,Selamat,M.H.,Selladurai,S.,Ramendran,C.S.,&Mohamed,R.K.
M.H.(2015).Performanceappraisalandtraininganddevelopmentofhuman
resourcemanagementpractices(HRM)onorganizationalcommitmentand
turnoverintention.AsianSocialScience,11(24),162.
Kumari,N.,&Malhotra,R.(2013).AStudyoftheRecruitmentandSelectionprocess:
SMCGlobal.ZENITHInternationalJournalofMultidisciplinaryResearch,3(2),
244-254.
Muller,M.(2013).TheManager’sGuidetoHR:Hiring,firing,performance
evaluations,documentation,benefits,andeverythingelseyouneedtoknow.
Amacom.
Pichler,S.(2012).Thesocialcontextofperformanceappraisalandappraisal
reactions:Ametaanalysis.HumanResourceManagement,51(5),709-732.
Renwick,D.W.,Redman,T.,&Maguire,S.(2013).Greenhumanresource
management:Areviewandresearchagenda.Internationaljournalof
managementreviews,15(1),1-14.

Assessment Answers : Customer Relationship Management MMH230

Assessment Answers : Customer Relationship Management MMH230

(Student Details)
HUMAN RESOURCE
MANAGEMENT
1
Discuss the use of video in employee recruitment and/or selection. What are the
imp …

Preview text

(Student Details)
HUMAN RESOURCE
MANAGEMENT
1
Discuss the use of video in employee recruitment and/or selection. What are the
implications of the use of video technologies for human resource professionals
undertaking these activities? Provide examples where appropriate.
Introduction
Human resource management is commonly referred to as the efficient use of human
resources in order to ensure that a particular organization’s business objectives are met within
a specific time frame. It is the effective use of people in the achievement of the organization’s
long-term corporate objectives, as well as the satisfaction of individual employee needs. The
purpose of human resource management is to make the most of the company’s workforce
while also ensuring that it is happy and productive (Nikolaou, 2021). However, as an
organisation can manage any kind of human resources, it must first hire its line of personnel.
Nevertheless, the methods and platforms utilised in recruiting have evolved dramatically as a
result of digitalization and globalisation. When technology was introduced, recruiting became
computer-based, with the entire recruitment and selection process achievable solely via the
use of a computer.
Discussion
Recruiters and job searchers have been impacted by a wide range of technical changes, not
only the widespread use of the internet or perhaps the extensively employed social
networking websites. As a result of technological advancements, the discipline of
work/organizational psychology, human resources management, and computer science and
engineering have all seen a rise in study interest. It seems to be an essential and expensive
activity in every company to successfully attract, evaluate, select, and onboard new
personnel. The abrupt transition to video recruiting was one of the most significant
transformations in HR practises brought on by the coronavirus epidemic. As in-person
discussions are restricted until at least 2020, many interviews as well as briefings from
recruiting managers have had to actually happen over video communications systems like
Zoom or Microsoft Teams. Hundreds of successful candidates have begun positions without
ever seeing their supervisor or team in person (Marie Ryan and Derous, 2016).
Numerous of the illusions about video’s inferiority in the recruiting process have been
dispelled by the requirement of using video in many parts of the process. The advantages
have been increased for the hiring organisations, in particular the decrease in hiring time.
After implementing Covid-19 limits, Walmart cut its hiring process from 14 to only three
2
days by using video interviews, as per the views of Kevin Parker, CEO of video hiring
provider HireVue (Lukacik et.al, 2022).
Shortlisted applicants can be introduced to the hiring manager and/or company through
video; the questions one wants them to respond to can be shown in video; and the candidate’s
responses can be shown in video as well. The usage of video interviews in the hiring process
has grown in popularity in recent years. Both synchronous as well as asynchronous video
interviewing are included under the phrase digital interview, which is used to refer to both.
Globalization and digitization have aided in the growing acceptability of video interviews for
business purposes throughout the world. It is justifiable to utilise video interview
technologies because of distance, accessibility issues, time savings, and/or expenses. Using
video as a component of the recruiting process allows for a more diverse pool of prospects,
allowing you to go beyond just a candidate’s qualifications. A company’s willingness to get to
know a candidate on a more personal level might be demonstrated by giving video
applications (Mejia and Torres, 2018).
In many cases, a candidate’s resume and cover letter are insufficient to provide you a
complete picture of who they are. When evaluating a resume, certain qualities, such as
education and work experience, are frequently highlighted. It is indeed unfortunate that this
might limit the number of candidates because it does not truly convey their personality or if
they are a good cultural fit in the company. As a recruiting manager, they are generally the
only one responsible for screening resumes and cover letters. Using videos to evaluate
candidates can help you find the greatest match for the role. Since a result, the screening
process becomes more cooperative, as other team members may participate more easily. At
their own pace, team members may evaluate video submissions and give input to assist
identify the most suitable individuals for in-person interview consideration (Johnson et.al,
2020).
An advantage of a collaborative hiring approach is that it increases the likelihood of finding
employees who have cultural fit. When it comes to what it means to be an employee,
different people have different ideas. Early in the hiring process, many team members are
able to give a more complete picture of the candidate’s cultural fit for the organisation. In the
early phases of the employment process, candidates are more likely to apply if they have the
option of doing so by video. Some applicants may be put off by the requirement to do a video
interview. But it guarantees that only the most motivated and enthusiastic applicants apply.
3
Personal, direct comments are easier to convey in video interviews, and most applicants
welcome the opportunity to show a truer side of themselves. The HR department of a
company can be greatly impacted by technological innovation. Internal processes, key
capabilities, concerned markets, as well as the organization’s structure may all be improvised
as a result of this initiative (Nikolaou, 2021).
There are both positive and bad aspects to the use of technology in the recruiting
process. As an example, a prospective employee of an accounting firm can conduct an
online search to learn more about the company. There is a distinct lack of job-hunting-related
content accessible on social media networks. Online forums such as Yelp and Quora allow
users to express their views about businesses and organisations. As they are external
websites, the organisation has no control over the information they provide. If a potential
employee develops a mistaken bias, it might lead to a bad attitude toward the business
(Gorman et.al, 2018). This might deter potential employees from submitting their
applications for employment. Human resource managers in companies usually start the
selection process when the recruiting procedure has been completed successfully as well as
applications have closed. The process of selecting a new employee involves evaluating each
candidate’s qualifications in light of the job’s requirements. Both individuals learn about the
other and establish opinions on whether or not they are compatible during this process, which
entails exchanging information back and forth. A fair, lawful, and non-discriminatory
selection process is essential for evaluating potential candidates and determining whether or
not to recruit them. In other words, use a merit-based hiring process to ensure that only the
most qualified candidates are considered for positions. Interviews are the most common
method of doing this procedure. It is not uncommon for businesses to conduct interviews and
other commercial activities digitally since the recent COVID-19 outbreak. Using social media
platforms like Skype, Facebook, and Zoom, organisations are now able to conduct business
meetings from anywhere in the world (Lukacik et.al, 2022).
It is much easier for HR professionals to evaluate candidates after an interview when they can
watch the video of the interview. A few drawbacks of virtual interviews include internet
connection troubles, lack of savvy, and difficulty in reading people’s body language. The
quality of the video and audio may suffer if the interviewee has a bad internet connection.
The interviewer is forced to move on to the next candidate if this is allowed to continue.
Candidate’s having a slow internet connection will be penalised. When conducting a virtual
interview, interviewers are unable to read the responses of their applicants. For example,
4
candidates may put up a facade to fool the interviewer into believing they are someone else,
while they are actually a quite different person. As a result, HR professionals need to develop
solutions to avoid these possible issues when using technology in their selection process
(Johnson et.al, 2020).
Conclusion
To conclude, the use of technology in case of employee recruiting as well as selection has
both good and bad effects. Using social media for recruiting can save 90% more time than
using traditional techniques of recruitment. Using social media in the recruitment process
also saves time for HR workers. The disadvantage is that prospective employees can read
skewed reviews of organisations on third-party websites, leading to a skewed perception of
the organisation. It is possible for human resource experts to conduct interviews
electronically, which saves time and money while removing the stress that an in-person
interview imposes on job candidates. However, issues such as interviewers putting on a show
or lying about their qualifications might arise. Though, the same can be overcome by using
effective hiring tactics.
5
References
Gorman, C.A., Robinson, J. and Gamble, J.S., 2018. An investigation into the validity of
asynchronous web-based video employment-interview ratings. Consulting Psychology
Journal: Practice and Research, 70(2), p.129.
Johnson, R.D., Stone, D.L. and Lukaszewski, K.M., 2020. The benefits of eHRM and AI for
talent acquisition. Journal of Tourism Futures.
Lukacik, E.R., Bourdage, J.S. and Roulin, N., 2022. Into the void: A conceptual model and
research agenda for the design and use of asynchronous video interviews. Human Resource
Management Review, 32(1), p.100789.
Marie Ryan, A. and Derous, E., 2016. Highlighting tensions in recruitment and selection
research and practice. International Journal of Selection and Assessment, 24(1), pp.54-62.
Mejia, C. and Torres, E.N., 2018. Implementation and normalization process of asynchronous
video interviewing practices in the hospitality industry. International Journal of
Contemporary Hospitality Management.
Nikolaou, I., 2021. What is the Role of Technology in Recruitment and Selection?. The
Spanish Journal of Psychology, 24.

Task Solutions of The Plastic Manufacturing Sector

Task Solutions of The Plastic Manufacturing Sector

Running head: HRM 1

Preview text

Running head: HRM 1
Human Resource Management
Name
Institution
Authors Note
HRM 2
Strategic Human Resource Management
Introduction
The Human Resource Management is known to have the capability of playing quite a
number of vital roles across different jobs. At the same time, various organizations are also in a
position of addressing most of their goals and objectives in real time when they ensure that
different strategic human resource management procedures are well implemented within their
respective boundaries (Boon, Eckardt, Lepak & Boselie, 2018). In Canada alone, there exits
different types of job opportunities within the market platform and these job opportunities have
always been subjected towards a vast range of patterns that have ended up contributing towards a
vast range of experiences in the lives of different personalities and also within the business
operating boundaries of different types of organizations (Muhammad, 2018). This whole
assignment will therefore be in a position of capturing various patterns that exists in different
types of job vacancies within the Canadian boundaries (Salikov, Logunova & Kablashova,
2019). Moreover, it also captures different forms of implications that are well linked to the
human resource department across three different industries hence creating high levels of
awareness regarding some of the things that are taking place from a range of perspectives
(Cooke, 2018). It also captures a vast range of various strategies that should be taken into
consideration by the human resource department in order to respond to all these unpredictable
patterns (Ren, Tang & Jackson, 2018).
HRM 3
Content
Web developer
For web developers within the Canadian boundaries between the periods of 2019-
2028 a good number of new job openings emerging from demand together with replacement
demand are expected to total to an approximated value of 10,900. At the same time, around 14,
000 new job seekers are also expected to be available for the purpose of filling the existing gaps.
Additionally, as various job openings together with job seekers who are linked to the web
developer profession are projected to be relatively similar levels between the period of 2019 and
2028, the existing balance between labor supplies together with demand seen in the recent years
is something that is expected to continue scaling up over the projection period. Issues associated
with job growth together with retirement are expected to be in a position of accounting for most
of the job openings. The rate of employment is also expected to scale up at a faster rate
compared to the average of all the existing occupations. Due to this, the issue of job creation will
be able to give a representation of about 54% of all the existing openings (Mansour et al., 2016)..
This is a proportion that appears to be above the average of all the available number of
occupations. A good number of workers who are linked to this job profession are employed
across different industries that deals with computer system designs are related services in
different areas like finance, real estate and even telecommunication. At the same time, the
overall demand for workers within this occupation is a situation that is expected to be fully
supported by various forms of technological changes that are being encountered from a vast
HRM 4
range of perspectives (Simonovic et al., 2016). Indeed, issues that are linked to rapid innovation
will still continue to induce a good number of Canadian firms for them to be capable of adapting
at a faster rate and even upgrading their respective Information Technology infrastructures for
them to remain digitally safe and even competitive when it comes to dealing with a vast range of
operations. On the other hand, various forms of new technological practices which might include
things like Block chain will still continue to emerge from different directions (Chowdhury, Sapra
& Hindle, 2016). This condition fully accompanied by a stronger penetration of issues that are
related to e-commerce, increased levels of data science together with machine learning will be
able to offer a vast range of opportunities to work as web developers. Additionally various
workers who are linked to specific skills on the innovative internet kind of a user experience are
also expected to be in a particular state of demand within a short term period.
The human resource department that is linked to this job opportunity has been on
the verge of making sure that appropriate and reliable decisions are made when it comes to
employing well trained and experienced professionals who are capable of coming up with high
levels of competitiveness across the entire industry. On the other hand, the human resource
departments have also been able to offer the employees within this job profession advanced
training in order to enable them to develop a clear understanding of the most competitive
operations that they are expected to implement within the boundaries of their career lines. Based
on all the aforementioned patterns, there are various ways that can be taken into consideration by
the human resource department in order to respond to them in a certain manner. Firstly, they
should be able to address issues associated with performance management and development as
far as the job is concerned. This will further provide one of the best opportunities of being able to
HRM 5
predict various future performance management patterns that are much suitable when it comes to
offering high levels of competitive advantages.
Plastic manufacturing
The plastic manufacturing sector in Canada is majorly characterized by quite a number of
different processes together with applications that are in a position of making good use of an
increasing range of existing raw materials (Amin, Wu & Karaphillis, 2018). On the other hand, a
good number of Canadian manufacturers have been in a position of having one of the most
unique captive plastics manufacturing modes of operations that are all capable of
manufacturing a variety of finished products for the purposes of sale or even several components
that are all meant for other existing end products. This kind of diversity has been on the verge of
creating a lot of difficulties in terms of assembling accurate and reliable statistics for the entire
industry. However, it is much clear that the whole sector is a clear representation of one of the
most significant portions of all the activities that are being encountered within the Canadian
boundaries where it continues to experience a specific growth rate that is well in excess of the
whole average for all the existing manufacturers within the entire industry. In 2004 alone, the
entire Canadian plastics processing was capable of generating an approximated amount of $38.4
billion in terms of shipments where it also ended up employing more than 146,000 personalities
in an approximated number of 3,800 companies. Currently, some of the major markets that are
known to be served by the plastic industry within Canada include packaging, construction
together with the transportation market. Also, all these segments have been able to account for
about 34%, 26% and 18% respectively of the total number of resin that is being manufactured in
Canada. The total number of processors employment that is based on plastic manufacturing is
approximated to be around 146,880. Again, the total suppliers employment covers around
HRM 6
24,500. Finally, the total sector employment has been able to capture about 171,380. There also
exists a vast range of job vacancies in Canada that are linked to plastic manufacturing
(Dauvergne, 2018). Laborers together with extruder operators are among the major job vacancies
within this industry that have been able to gain much popularity hence capturing the attention of
quite a number of individual within the Canadian boundaries (Liu, Adams & Walker, 2018). On
the other hand, the human resource department that is known to be linked to this industry has not
yet developed a full potential of coming up with a vast range of career opportunities that can help
to scale up the levels of competitiveness of various forms of operations that are known to be
existing within the plastic manufacturing boundaries in Canada (Tian, Zheng, Goodyer & Bayen,
2020). In order to guarantee a positive progress, the human resource department should fully
respond to all these existing patterns by creating high levels of awareness across different careers
within the whole industry for them to be in a position of developing a clear understanding of how
things are capable of working out with an intention of attaining different types of goals and
objectives in real time.
Banker
The service sector in Canada has been able to gain a lot of popularity as a result of
different patterns of employment and job vacancies that are linked to various professions.
Moreover, banker being one of the major professions in this sector has ended up attracting a
huge population if individuals across the whole region due to these trends that are being
encountered from a range of perspectives (Sajid & Lynch, 2018). The financial institutions in
Canada have been able to navigate a changing workforce where the employees in the banking
sector are currently fearing much better than the ones who are linked to several other existing
industries within the region most so when it comes to remote working. This has positively
HRM 7
contributed towards high levels of employment within the sector where more bankers have been
recruited ever since the beginning of the pandemic. This aims towards making sure that that the
banks are capable of providing all the customers with quality and advanced services irrespective
of the entire economic situation that is also being encountered across different parts of the world.
About 58% of the banking service employees have been subjected to idea work spaces where
they are currently in a position of working from their respective remote locations and still be
capable of delivering all the desired services within the industry (Lokanan, 2018). Banker
profession is one of the most popular job vacancies that has taken over the service industry in
Canada and a lot of and lot of institutions are currently looking for well trained and experienced
personnel with the capability of delivering a vast range of competitive services are likely to put
the organization at the top levels at all times (Lui & Lamb, 2018). The human resource
department within this sector has been on the verge of making sure that different financial
institutions are capable of hiring top notch individuals who are well versed with what they are
doing (Shooshtarian, Anderson, Armstrong & Luckert, 2018). On the other hand, the human
resource department has also been able to evaluate the level of competencies of different
applicants right before they are hired for the banking jobs. One of the best ways that the human
resource department can incorporate in order to respond to such patterns is to make good use of
advanced technological techniques to attain different goals and objectives within their
recommended areas.
Conclusion
One of the major objectives that is linked to this research is to clearly evaluate different
patterns in employment together with job vacancies that are linked to various professions that are
being practiced within the Canadian boundaries. On the other hand, the human resource
HRM 8
department in deed plays a very significant role in different industries that exists within an
economy. As a result of this, the accurate and reliable decisions that are made by this department
greatly determines the levels of success that is likely to be met by a particular industry in terms
of the overall nature of competitiveness that is likely to be offered. Various patterns in
employment that are all associated with a vast range of professions makes it much easier to be
able to document both current and future statistics being encountered within a particular type of
industry. As a result of this, it is much easier to come up with a variety of recommendations on
some of the best procedures that can be taken into consideration to ensure that appropriate levels
of success are attained.
HRM 9
References
Amin, S. H., Wu, H., & Karaphillis, G. (2018). A perspective on the reverse logistics of plastic
pallets in Canada. Journal of Remanufacturing, 8(3), 153-174.
Boon, C., Eckardt, R., Lepak, D. P., & Boselie, P. (2018). Integrating strategic human capital and
strategic human resource management. The International Journal of Human Resource
Management, 29(1), 34-67.
Chowdhury, S. A., Sapra, V., & Hindle, A. (2016, March). Client-side energy efficiency of
HTTP/2 for web and mobile app developers. In 2016 IEEE 23rd international conference
on software analysis, evolution, and reengineering (SANER) (Vol. 1, pp. 529-540). IEEE.
Cooke, F. L. (2018). Concepts, contexts, and mindsets: Putting human resource management
research in perspectives. Human Resource Management Journal, 28(1), 1-13.
Dauvergne, P. (2018). The power of environmental norms: marine plastic pollution and the
politics of microbeads. Environmental Politics, 27(4), 579-597.
Liu, Z., Adams, M., & Walker, T. R. (2018). Are exports of recyclables from developed to
developing countries waste pollution transfer or part of the global circular
economy?. Resources, Conservation and Recycling, 136, 22-23.
Lokanan, M. (2018). Regulatory capture of regulators: the case of the investment dealers
association of Canada. International Journal of Public Administration, 41(15), 1243-
1257.
HRM
10
Lui, A., & Lamb, G. W. (2018). Artificial intelligence and augmented intelligence collaboration:
regaining trust and confidence in the financial sector. Information & Communications
Technology Law, 27(3), 267-283.
Mansour, E., Sambra, A. V., Hawke, S., Zereba, M., Capadisli, S., Ghanem, A., … & Berners-
Lee, T. (2016, April). A demonstration of the solid platform for social web applications.
In Proceedings of the 25th International Conference Companion on World Wide
Web (pp. 223-226).
Muhammad, K. (2018). The effects of electronic human resource management on financial
institutes. Journal of Humanities Insights, 2(01), 1-5.
Ren, S., Tang, G., & Jackson, S. E. (2018). Green human resource management research in
emergence: A review and future directions. Asia Pacific Journal of Management, 35(3),
769-803.
Sajid, Z., & Lynch, N. (2018). Financial modelling strategies for social life cycle assessment: a
project appraisal of biodiesel production and sustainability in Newfoundland and
Labrador, Canada. Sustainability, 10(9), 3289.
Salikov, Y. A., Logunova, I. V., & Kablashova, I. V. (2019). Trends in human resource
management in the digital economy. Proceedings of the Voronezh State University of
Engineering Technologies, 81(2), 393-399.
Shooshtarian, A., Anderson, J. A., Armstrong, G. W., & Luckert, M. M. (2018). Growing hybrid
poplar in western Canada for use as a biofuel feedstock: A financial analysis of coppice
and single-stem management. Biomass and bioenergy, 113, 45-54.
HRM
11
Simonovic, Slobodan P., Andre Schardong, Dan Sandink, and Roshan Srivastav. “A web-based
tool for the development of intensity duration frequency curves under changing
climate.” Environmental modelling & software 81 (2016): 136-153.
Tian, L., Zheng, J., Goodyer, C. G., & Bayen, S. (2020). Non-targeted screening of plastic-
related chemicals in food collected in Montreal, Canada. Food chemistry, 326, 126942.

error: Content is protected !!