Saturday, December 28, 2019
Knowledge of Group Processes - Free Essay Example
Sample details Pages: 6 Words: 1819 Downloads: 5 Date added: 2017/06/26 Category Management Essay Type Essay any type Did you like this example? DEMONSTRATE KNOWLEDGE OF GROUP PROCESSES 1.0 Describe clearly two situations one of which describes a situation where a group is clearly appropriate and another where a group is clearly inappropriate or each situations describe clearly explain the situation and analyse why it is appropriate / inappropriate. Ans. Appropriate group: Appropriate group is a group in which a team is required for a particular work or task for example Nike. Donââ¬â¢t waste time! Our writers will create an original "Knowledge of Group Processes" essay for you Create order Nike produce different products like footwear, bags and cloths etc. So they require different sections for different work for example Manager, Accountant, Chief Operating officer (CEO) and labour etc. Inappropriate group: Inappropriate is a group in which a single person can do any work and task so there is no need of any team for example teacher. A single teacher can teach any particular subject so there is no group of teachers required for teaching a single subject. 2.0 Discuss a minimum five advantage and five dis-advantage of working in groups. This may include answers such as synergy, quality of decisions, commitment to decision, relationship building, task familiarity, task complexity. Ans. Advantage of group: Better ideas: Members of different skills are able to come up with more effective solution of any problem. Better outcomes: A group can bring additional resources to develop and contribute to poor person to reduce risk of further monitoring because teamwork can lead to better business results. Mutual support: In group people can encourage each other and they can support one other so they can excess any work. More achievements: Different minds have different ideas so a member in group can achieve specific goal more effectively. Skill development: Being a part of multicultural group a person can gain more skills such as speaking, listening and leadership and more will help you to develop your personal skills. Disadvantage of group: Fair share: In a group some worker do more work than others so there will be some misunderstanding between the member of group and the whole group will agonise. Preventive creativity: In a group a person will focus on a particular concept in which a person can fit so the creativity will be limited. Understanding problems: In a multicultural group, some people canââ¬â¢t understand what other member wantââ¬â¢s to say for example Chinese are not good in speaking English so it is very hard to understand what he wants to say. Time taking: In a group everyone has different mind so they think differently and it will be time consuming to take a quality decision in a group. Personal issues: In a group there will be many personal issues for example some member of a group will be abusive and more dependent to others so it will be an issue in a group. 3.0 Utilising Hackmanââ¬â¢s Model of group effectiveness, discuss the key factors that influence group of effectiveness. Ans. 4.0 Briefly describe a formal group which you have been a member of. Clearly describe its organisational context. Ans. At the time I am working in a European restaurant and its name is Libertine. In a restaurant different skilled people required for different work for example chef for cooking, manager for managing restaurant, kitchen hand for helping chef, waiter for serving and a person for receiving bills. Every personââ¬â¢s contribution is important otherwise restaurant will shut down. Without a single section restaurant will not run so it is a very good example of group work. 5.0 Identify the group goals and norms that are operating within your group? Ans. Group goals: 1. Customer satisfaction: It is a very important to give full satisfaction to a customer with the service and excellent food provided. 2. Friendly Environment: I n a restaurant there will be good ambience and good interaction between customers and staff so they can improve the way of service. 3. Improving sales: The target of the restaurant is repeating customers and attracting more customers to increase the sales by providing good food and service. Group norms: Norms are the behaviour and models which are establish and accepted by all the team members. If the group either implicitly or explicitly develops positive work norms the group would work toward greater chances of being an effective group like as per the case study they all are seemed to work together on all assignments. There seemed to be a laughter in the group and some time it could be quite disruptive to others in the room trying to study. 6.0 Identify both the Task and Maintenance roles exhibited by all participants within your group? Summarise by explaining the overall effect of these roles on the groups functioning. Ans. Task roles: Task roles are the roles that in itiate to get the job done. In a restaurant there are different tasks to do. The role of head chef is maintain food quality and taste and also introducing different menu on some special occasions and most important is health and safety of staff members. On the other hand Manager Role is to manage restaurant and take quick actions on any deterioration and accountant part is to give wages to the employees on time. Maintenance roles: Maintenance roles are the tasks provide oil in machine by encouraging people by mentally or emotionally. In a restaurant there are different maintenance roles like gatekeeper, his job is to welcome customer in a restaurant and at the end give farewell to the customer. Also the role of manager is to encourage staff and to give specific work to person his job is to manage overload of work on a single employee. 7.0 Explain the main leadership style that is used within your group. Additionally explain two different leadership styles from group that you h ave been a member of comparing these to your main group. Ans. The main leader of a restaurant is Manager he plays different roles in a restaurant. His job is to monitoring less wastage in a restaurant and managing work schedule for kitchen staffs. Also his work is to arrange health and safety equipment for staff and customers. He has to check freshness of delivered food and product and maintain budget of wages and product. If any customer give negative feedback than manager has to take quick action and to recover what is wrong as well as he has to maintain records and standard of a restaurant. Most important work of a manager is to make successful menu and appropriate price of the dishes. 8.0 Explain a minimum of three decision making styles used in your group comparing their effect on the functioning of the group? Ans. The three decision making styles are: Decision by command: Group leader uses his information he possess to solve the problem. He/she does not consult inf ormation in any form with anyone. The manager examines all the relevant option and has enough information to make an effective decision. Decision by compromise: In decision of this type many member of group will not satisfy with the decision but due to some situation they have to make compromise with their decision. At the end the results was always good but not the best. Decision by analysis: Sometime a leader does not possess enough information to decide, then they will need to obtain more information and skills. He cannot tell what the problem is; usually, they just ask for information. Then leader evaluates the information and makes an effective decision. 9.0 Identify the potential consequences of groupthink on the process of effective decision making within your group. Describe any two possible strategy to avoid group-think and their effect on the functioning of the group? Ans. 10. Explain using a model of group development the group processes that have occurred within your group? Ans. Development stages of a group: Forming: At this stage all team members are positive and polite. The entire team will work as it is not some concern. Others are simply excited about the task ahead. Team members, roles and tasks are not clear, because as a leader, you play a leading role at this stage. People start to work as in this stage, may continue for some time, and they get to recognise new partner as an effort to. Storming: Team members natural style is a conflict between works, which often starts storming. People can work in different ways, but different working styles cause the problem worse, they may be upset. Norming: Now your team members know each other better, that they can trace together, and they ask each other for help and are able to give positive suggestions. The team with a strong assurance to the goal of development, and also to begin to see progress. Performing: Work hard to achieve the goal of the team without abrasion, le ads the team reaches the stage performing. Group have set up a good support, the structure and function. Adjouring: At this stage the task was successfully completed. Its purpose has been achieved and everyone feel good about it. As an organisational prospective new things can move on. 11. Utilising Hofstedeââ¬â¢s model, identify a minimum of three cultural influences on your groups functioning. Clearly explain how each cultural influences affects the groups functioning? Ans. 12. Describe both the positive and negative effects of conflict on the functioning of your group. Ans. Frequently angry disagreement, which results in strong difference between groups is known as group conflict. Positive effects of conflict: Upgraded results: Work for the team most often reference for a confident amount of growth and quality of ideas within a group share. Furthermore, the work of the team members to discuss their ideas and have the chance to argue their strength or weak ness. The best ideas and most creative solutions to the problems that can be apply on it. Collective work: Working with other employees within the work group often identified advantage of the stock. Decisions are made à ¢Ã¢â ¬Ã¢â¬ ¹Ã ¢Ã¢â ¬Ã¢â¬ ¹and work for the formation of a single work of any member of a team is not overcome by his personal liability for that, therefore employees can share the bond for the work. Negative effects of conflict: Self-management: Self-management may be requested and for some team interaction, lack of organizational support or both cannot meet the challenge so it can cause less production. Team clash: To work in a team to get close to other people is a major loss that social activity can cause struggles. Proximity of the group work the employee was working alone, you make it even more important than the nature of the rejection can failure. Exclusions rise within a group when they still have the promise of work and responsibility, si nce only one other partner cannot ignore. 13. Describe how each of the following strategy offset the impact of conflict within your group? Provide examples where appropriate? (a) Accommodation. (b) Avoidance. (c) Compromise. (d) Competition. (e) Collaboration. 14. Identify a minimum of two preferred conflict management styles based on your cultural preferences. Discuss these styles in the context of the impact on managing conflict within your group. Ans.
Friday, December 20, 2019
Obesity Obesity And Obesity - 1242 Words
Obesity and Nutrition More than one-third (34.9%) (The State of Obesity) of the American population is overweight. The definition for obesity is the condition of being grossly fat or overweight. Obesity can happen for many reasons, including age, gender, hereditary obesity, stereotype obesity, and fast food restaurants and their marketing. For example, a 50-year-old man can add pounds faster than a 5-year-old child can because of his age. Obesity is a growing problem that society needs to deal with. What is the extent of obesity in the U.S.? Americanââ¬â¢s love to eat, but eating any type of food with little or no physical movement is the main cause of being overweight or obese. Approximately, 17 % of children and teenagers (ages 2 to 19) are obese and 31.8 % are either overweight or obese. More than one in twelve children is obese in early childhood (The State of Obesity). Americanââ¬â¢s choose to stay inside and watch television, play video games, or focus on their phones. S tress can play a big role as well in overeating. Indulging in food can be a distraction from their stress or a belief to make matters better, where a smoker smokes to give them a distraction from their stress. Eating can be a disease, a pleasurable addiction that spirals out of control. However, like most addictions it can be controlled. Indiana now has the seventh highest adult obesity rate in the nation. Indianaââ¬â¢s adult obesity rate is currently 32.7 %. Adult obesity rate by age are; 18 to 25 is 19.9 %,Show MoreRelatedObesity : Obesity And Obesity986 Words à |à 4 PagesObesity is one of the major health epidemics that human being struggle to deal with it. Obesity is a chronic disease characterized by excessively high body fat in relation to lean body mass. In the last 20 years, people started complaining that fast food is the main cause of rising obesity. However, a lot of research proves that fast food is not the source of obesity. The rising obesity problem cannot be b lamed on the fast food industry; there are several other factors leads to obesity. OverRead MoreObesity : Obesity And Obesity798 Words à |à 4 Pages Obesity Close to over one-third of adults living in the United States are obese (Diet and Obesity). Unfortunately, one third of children in the United States are also obese or overweight. Obesity has grown throughout the United States and has led to major health problem and can even be fatal. About 365,000 or more people die every year due to obesity. With numbers increasing obesity should be furthered examined to help prevent these conditionsRead MoreObesity : Obesity And Obesity1442 Words à |à 6 Pages5/13/16 Take home Project: Obesity Obesity basically means having too much body fat. Not being overweight for your height, having too much muscle, or water in your body. What exactly is obesity? ââ¬Å"Obesity is a condition that is associated with having an excess of body fat, defined by genetic and environmental factors that are difficult to control when dieting. Obesity is classified as having a Body Mass Index (BMI) of 30 or greater. BMI is a tool used to measure obesity. Obesity increases your risk ofRead MoreObesity : Obesity And Obesity1318 Words à |à 6 PagesObesity Epidemic Due to Fast Food or Something More Obesity is rising at a rapid rate here in the United States, especially childhood obesity. The obesity epidemic is one of the countryââ¬â¢s most serious health problems. Adult obesity rates have doubled since 1980 from 15 to 30 percent, while childhood obesity rates have more than tripled. Is there a link in obesity and fast food eating? Are fast food restaurants to blame for our nationââ¬â¢s obesity issues? Or are we ourselves and our lack of knowledgeRead MoreObesity : Obesity And Obesity Essay1508 Words à |à 7 Pagesleads to health risks and obesity, people are still putting unhealthy food into their body daily. à The United States has the highest obesity rate in the world by 6% and the government should be helping to lower that percentage (http://www.nationmaster.com/country-info/stats/Health/Obesity). à The best for the United States to help the obesity rate is by implementing a fat tax. à A fat tax is a tax on foods that are considered unhealthy and are believed to lead people to obesity. à The main way fat taxesRead MoreObesity : Obesity And Obesity1417 Words à |à 6 Pagesconcerned. Doctors often use a formula based on height and weight, called body mass index (BMI), to determine obesity. Children with a BMI over 21 is considered obese and over 18 is overweight (Arnett, J.J.2016). Adults with a BMI of 30 or more are considered obese. Severe obesity, also known as severe obesity or morbid obesity, occurs when a BMI of 40 or more is present. With morbid obesity, there may be serious health problems. If children do not have enough activities, they will not be able to burnRead MoreObesity : Obesity And Obesity1413 Words à |à 6 Pagescertificates, diabetes was mentioned as a cause of death (6). The Centers for Disease Control refers to ââ¬Å"twin epidemics of diabetes and obesity, because obesity greatly increases the risk of diabetes, and the number of Americans who are obese has been increasing rapidlyâ⬠(9). A newly developed term, ââ¬Å"diabesity,â⬠is commonly used to represent the close relationship between obesity and diabetes (8). Type 1 diabetes usually occurs in childhood and is defined when the pancreas fails to produce a healthy amountRead MoreObesity : Obesity And The Obesity2209 Words à |à 9 Pages OBESITY in America As the world is growing day by day the problem of obesity is also increasing all over the world. Since from1980 to 2014, the obesity has risen two times as compared to the previous years. The obesity is related to the how much energy is left, but the most important cause of having the obesity is ââ¬Å"dysbalance between energy intake and energy expenditureâ⬠(Nazarii Kobyliak 1). The obesity is the excessive fat in the body and it can cause to any age group form child to the oldRead MoreObesity : Obesity And Obesity892 Words à |à 4 Pagesadults are considered obese in America. In recent years obesity is the health topic of choice these days because obesity in America is a growing epidemic. One out of twenty people in America have extreme obesity. According to a 2009-2010 survey conducted by the National Health and Nutrition examination this data states that about one third of children and adolescents ages six to nine are considered to be overweight or obese. Adolescent obes ity has more than tripled in young adults and doubled in childrenRead MoreObesity : Obesity And Obesity985 Words à |à 4 Pages Obesity is one of the major health epidemic that human being struggle to deal with it. Obesity is a chronic disease characterized by excessively high body fat in relation to lean body mass. In the last 20 years, people started complaining that fast food is the main cause of rising obesity. However, a lot of research proves that fast food is not the source of obesity. The rising obesity problem cannot be blamed on the fast food industry; there are several other factors leads to obesity.
Thursday, December 12, 2019
Net Income Intermediate Accounting
Question: Discuss about theNet Income for Intermediate Accounting. Answer: Introduction Net income is the measure or the calculation of the amount of total revenue/income that exceed total expenses.Net income also known as net profit.Net profit is calculated by subtracting expenses from the total revenue (Simanovsky 2010 p.23). = Total revenue Total expenses Total Revenue is the adding of all the income coming to the business after sale of goods. Revenue of trust includes: Consulting income $467,000 Rental income from the investment apartment $17,000- (Depreciation from the previous financial year of $15,600) 17,000-15,600 = $1,400 Interest on Bank deposits $1,000 Fully franked dividend from BHP $32,000 Capital gain on a commonwealth bank shares $58,000 Total Revenue = = $559,400 Expenses Body corporate fees on income producing property $ 5,000 Interests on money borrowed to purchase investment apartment $15,000 Legal expenses related from a new loan to acquire the investment apartment $ 5,500 Fees paid to a registered tax agency in May 2016 $ 1,100 New computer $7,700 New photocopier $3,300 Travel to and from work $1,000 Operating expenses including Davids salary $45,000 New motor vehicle $65,000 Trust tax loss from an earlier income year $10,000 Apartments chattels depreciations $15,600 Total expenses = $189,200 Net income = 559,400-189,200=$370,200 Net profit is =$370,200 Each beneficiary is allowed to get equal shares of the property of the trust. The net income is shared between David and his wife. The expense cost is divided equally among the two since they help determine the net income of the trust (Troy 2008, p.120). Consulting income, which is $476,000 maybe, split into two each member getting $233,500.The rental income which is 17,000 will be split among the two each member getting $8,500 but the apartment had depreciated in the last financial year with a depreciation of 15,600 hence all the member will get $700 which in total is 1400 .The interest on the bank deposits split into two, will give each member $500 each. Franked dividend from the BHP divided equally in the two will give each member $16,000 and $29,000 from the capital gain in the commonwealth bank share. David and his wife income without including the expenses will get $287,500 but this amount does not include tax and the business expenses (Gibson 2009, p.89). The expenses, which include the Body corporate fees on income producing property at $ 5,000, interests on money borrowed to purchase investment apartment at $15,000, Legal expenses related from a new loan to acquire the investment apartment at $ 5, 500, Fees paid to a registered tax agency at $ 1,100, will be split between the two owners. Not only are the profits shared equally but also the expenses. New computer at $7,700, new photocopier at $3,300, Travel expenses at $1,000, operating expenses including salary at $45,000, new motor vehicle at $65, 00, Trust tax loss from an earlier income year at $10,000 and Apartments chattels depreciations at $15,600 expenses will be divided equally between David and wife. Each member from the cost sharing will get $94,600.David and his wife net income is equal to $287,500-94,600=192,900.Each member will get a net income of $192,900 (Leach 2010, p.89). SCL Partnership Interest income from term deposits $25,800 Dividends Plastic Australia Pty Ltd $175,000 Franked 100% company profits 100%, tax paid is 30% dividend paid is 70 = 175,000 *30/70=$75,000 Commonwealth Bank of Australia ltd (CBA) $85,000 Franked at 65%= hence 65%=85000 35%=85000*30/35= $72,857.14 Dell computers Inc. $47,600 Rental from commercial shops $125,080 Total income= $521,337 Expenses Legal expenses on loan $5,800 Lease preparation costs paid to a solicitor $7,700 Interest paid on the loan $125,000 Salary paid to Mr. Chan $75,000 Total expenses= $213,500 Total income=521,337-213,500= $307,837 $ 307,837 GST is abroad-based tax of 10% on goods and services offered by a company with a turnover of $50,000 per annum and on good sold and consumed in Australia (Troy 2008, p.90). GST rent from commercial shops =125,080 10*125080/100=$12,508 Reference Epstein, B. J, Bragg, N. M., Nach, R. (2009). Wiley Gaap 2010: interpretation and application of generally accepted accounting principles p.90. Kieso, D. E, Weygandt, J. J, Warfield, T. D. (2011). Intermediate accounting. Vol. 1 Vol. 1. Hoboken, NJ, John Wiley Sons. Cch incorporated. (2008). Top accounting issues for 2009: CPE course. Chicago, CCH p.45. Mackenzie, B., Coetsee , D., Njikizana, T., Selbst, E., Chamboko, R., Colyvas, B., Hanekom, B. (2013). Wiley IFRS 2013: interpretation and application of international financial reporting standards p.134. Pkf international, ltd. (2016). Wiley ifrs 2016: interpretation and application of international financial reporting standards. [Place of publication not identified], John Wiley. Epstein, B. J., Bragg, S. M., Nach, R. (2009). Wiley Gaap 2010: interpretation and application of generally accepted accounting principles. [includes new codification]. Hoboken, NJ, Wiley pg.197. Dong, B. (2008). The discretionary reporting of noncontrolling interests and its association with the market assessment of credit risk p.87. Mard, M. J., Hitchner, J. R., Hyden, S. D. (2011). Valuation for financial reporting: fair value, business combinations, intangible assets, goodwill, and impairment analysis. Hoboken, NJ, Wiley pg. 67. Troy, L. (2008). Almanac of business and industrial financial ratios. Chicago, IL: CCH p.68. Leach, R. (2010). Ratios made simple: A beginner's guide to the key financial ratios. Petersfield, Hampshire: Harriman House p.134. Gibson, C. H. (2009). Financial reporting analysis: Using financial accounting information. Mason, OH: South-Western Cengage Learning p.g 46. Bull, R. (2008). Financial ratios: How to use financial ratios to maximize value and success for your business. Amsterdam: Elsevier/CIMA Pub pg.234. Albrecht, W. S. (2007). Accounting, concepts applications. Mason, Ohio: Thomson/South-Western p.132. Duchac, J. E., Warren, C. S., Reeve, J. M. (2011). Accounting using Excel for success. Mason, Ohio: South-Western p.69. A dictionary of accounting. (2010). Oxford: Oxford University Press. Simanovsky, S. (2010). Accounting for beginners. Grandville, MI: Global Finance School p.156.
Wednesday, December 4, 2019
Cyber Security Smart Survey And Challenges ââ¬Myassignmenthelp.Com
Questions: What Is The Impact Of Cyber-Security Challenges On The Business? What Strategies Can Be Developed To Deal With Cyber-Attacks? Answers: Introduction The proposed research is based on the challenges and issues observed in cyber security for the business in the recent time. It has been observed that businesses are now fully depended on the technology, which means that due to the technological advancement, the ways of leading the business in a dynamic environment has become quite easy for the marketers. However, even though, the technology plays a big role in todays modern business, due to the loophole in the technologies, the businesses often face external threats such as stealing valuable information, anonymous access to bank accounts or organizations official sites and other cyber attacks. According to Aloul et al., (2012) ICT devices as well as elements are largely interdependent and disrupt of one could affect many others. The Information Technology experts and the policy makers have expressed their concern regarding the protection of businesses from the cyber attacks. Here, the acts of protecting the ICT system as well as thei r contents are considered as cyber security. In this report, a detail about the proposed research has been discussed elaborately. The report presents the idea how the research is going to be conducted. The report provides the project scope, which includes the determining and documenting a list of particular project goals, features, tasks, deadline and other significant factors. Likewise, the report also includes the key objectives of the proposed research. Considering the background to the research, the research questions and objectives have been provided in this report. Furthermore, the research report also includes a set of research techniques that will be applied to the proposed study. Background to research Several studies have been conducted to learn the impact of the issues related to cyber-security on businesses. The current scenario indicates that the marketers rush to implement all policies related to cyber security to protect their business from the external threats. It is observed that the federal role in cyber security includes both securing federal system as well as assisting in preserving the non-federal systems. A study conducted by Busch and Givens (2012) mentioned that protecting the valuable intellectual property as well as the business information in the digital form against the theft as well as misuse remains as the critical management issue. Dunn Cavelty (2013) indicated in their study that organization must have to fend off the regular cyber-attacks and the threats of cyber criminal. Dumitras and Neamtiu, (2011) mentioned that sophisticated organizations have recently endured the public breaches to their technological environment and many incidents went unreported but the marketers are not eager to advertise or describe the vulnerabilities. On the other side, the study conducted by Liu et al. (2012), mentioned that most large organizations have gradually reinforced their cyber security capabilities over the past few years. Nonetheless, due to this argumentative outcome, the present study observes the importance of conducting an investigation on cyber security challenge and its impact on the businesses. Project Scope Understanding the importance of examining the impact of cyber-security on business, the proposed research has been framed with a primary analysis. This will help to conduct the analysis with the practical evidences. The proposed study abandons the secondary analysis because the research might not provide an authentic outcome that is related to the real-world context. In order to conduct a primary analysis, an organization- Australian National Bank will be considered as the case study organization in the proposed study. Moreover, the proposed study also focuses on the existing studies conducted on the same topic. In order to conduct the literature review, 20 journals have been considered and hence, the analysis will help to find out the gaps in the previous studies. In addition to this, to collect the primary data, a survey and interview will be conducted among the employees and senior executives of Australian National Bank. However, the research is restricted to primary analysis only , any sort thematic and comparative analysis will not be included in the proposed study. Eventually, a research time line has been provided in the following, which shows how the research has been scheduled to be conducted. Project Objectives and aim The major aim of the study is to examine the impact of cyber-security challenges and issues on the business organizations. The following are the key objectives of the research: To critically investigate the impact of cyber security challenges on the business To critically understand the importance of protecting the business information from the cyber attacks To develop suitable strategies to resolve the cyber-security issues Research Hypotheses H0-Cyber security challenges have no impact on the businesses H1- Cyber security challenges have impact on the businesses Literature Review Many studies have been conducted on cyber security challenges and their impact on the businesses. Each study has been framed with variety of requirements and techniques; thereby, the outcome of the study came out to be different. The study conducted by Bonaci et al., (2015) mentioned that as the technology is continuously growing to develop, the opportunities and challenges also come out. However, as the society that runs widely on the technology, the business, as the consequences are dependent on it. The technology also brings the greater threats. According to Wang and Lu (2013), by the very nature of the opportunities, the technology presents, the technology becomes a focal point for the cyber attacks and threats. Sridhar, Hahn and Govindarasu (2012) particularly focused on the threats of data manipulation, identify theft and cyber-warfare that have a strong impact on the businesses. Moreover, the studies claim that as the world environment transitions large amount of products and service online, the people in turn depend on them. Protecting this technology infrastructure has now become a fundamental building block for the information system internationally. It is understood that existing studies have focused on the type of threats and attacks occurred in the businesses through the technological adoption but the studies have hardly provided any relevant outcome in terms of the strategies. However, an in-depth literature review will be conducted considering 20 different journals conducted on the present topic. Research Methodology Research methodology determines the outcome of the study, which means the implementation of the techniques determine the result of the study. In order to conduct the proposed study, appropriate primary research techniques will be applied to the study. The type of methods will be applied to the study has been discussed in the following. Data collection methods The data collection is usually divided into two different categories primary and secondary data collection. Primary data collection- The primary data collection method is categorized into two different groups such quantitative and qualitative data collection. It is observed that quantitative data collection techniques are based in mathematical calculation in different formats. In the proposed study, the primary data collection techniques include the questionnaire with the close-ended questions such as the method of correlation, mean, mode, median and others. On the contrary, the qualitative research method does not consist of number and mathematical calculation and this method is rather related to emotion, sounds, voices and other relevant elements. This research methodology focuses on the level of depth of understanding. In the proposed study, the quantitative data collection involves the survey method, which will be conducted among the employees of Australian National Bank. Conversely, for collecting qualitative data, interview method will be applied to the proposed study. However, for c onducting the survey and interview, a particular sampling method will be applied, which is discussed in the following. Secondary data- The secondary data will be used for conducting the literature review in the proposed study. Almost 20 journals have been selected for conducting the literature review. The secondary data will be collected from the journals, books, blogs, newsletter, annual report and other reliable secondary sources. Apart from the collection of data, reliability and validity of the papers will also be checked. Sampling method As put forward by Babbie (2010), sampling can be described as the particular principle applied to make the choices of members of population to be included in the research. It is also appropriately noted that as many population interest are very large to work directly. It can be mentioned that because of the brad size of target population, the studies do not have any choices besides to research a number of case elements in the population to present the population and reach the population. For the proposed study, the sampling has been categorized into two different categories such as probability and non-probability sampling. In probability sampling, every individual of the population has less or zero chance of being involved in the study. On the other side, non-probability samplings are chosen on a non-random manner; thereby, not each population member has a chance to take part in the study. However, in the present study, both probability and non-probability sampling method will be applied. The probability sampling method will include the general employees of Australian National Bank. Hence, the employees are eligible for the survey because they do not need much knowledge about the occurrence of cyber threats and challenges and their impact on the businesses. Conversely, the non-probability sampling method will include IT executives and managers of Australian National Bank; certainly, they have much knowledge about the type of threats, attacks, thefts and other relevant technological attacks. Thereby, the managers and the executives are the perfect the suitable individuals among all type of population. This means, the proposed study will include a mixed sampling method. The sample size for the proposed survey and interview is 100 employees and 5 managers respectively. It is identified that reliability and validity should be tested and clarified before applying the method s to the study. Research reliability and validity As put forward by Wilson (2010) the reliability is referred to the extent to which the same response can be derived with the help of the same instruments many a time. The outcome of the proposed study will be reliable because if the analysis is made using the same interview and survey method. Therefore, in future when other researchers will conduct the research on the same topic, they could derive the same result with interview and survey methods. In this context, Babbie (2010) mentioned that reliability revolves around the source and it is mostly associated with the subjectivity. On the contrary, the data that will be collected for analysis is validity because to conduct the research, appropriate time scale of the research along with appropriate research method will be selected. In addition, to conduct the study, the most suitable method for the research will be selected. Whenever, the study will be conducted with such similar methods, the same response will come out. Moreover, it i s not possible to eliminate the threats to studys reliability and validity but it is ensured that much effort will be put to minimize as much risk as possible. Research Limitation The proposed study is limited to primary analysis only; this means that no thematic and comparative analysis will be conducted in the proposed study. In addition to this, sample size for the proposed study is very constrained. The study will be conducted considering one single organization only, but the study would be more intensive, if a comparative is conducted. Research Timeline Main activities/ stages Month Aug- Month Sep-Dec- Month Jan-march- Month April-July- Month August-September- Month October Topic Selection Data collection from secondary sources Framing layout of the research Literature review Formation of the research Plan Selection of the Appropriate Research Techniques Primary data collection Analysis Interpretation of Data Collection Conclusion of the Study Formation of Rough Draft Submission of Final Work Table 1: Research Timeline Conclusion In conclusion, it can be mentioned that the proposed study will provide a desired result because all relevant methods will be applied to the study. In addition to this, the literature review will help to focus on the relevant areas as previous studies have missed out several relevant factors. However, in the proposed study, those factors will be covered References Aloul, F., Al-Ali, A. R., Al-Dalky, R., Al-Mardini, M., El-Hajj, W. (2012). Smart grid security: Threats, vulnerabilities and solutions.International Journal of Smart Grid and Clean Energy,1(1), 1-6. Babbie, E. R. (2010) The Practice of Social Research, Cengage Learning Bonaci, T., Herron, J., Yusuf, T., Yan, J., Kohno, T., Chizeck, H. J. (2015). To make a robot secure: An experimental analysis of cyber security threats against teleoperated surgical robots.arXiv preprint arXiv:1504.04339. Busch, N. E., Givens, A. D. (2012). Public-private partnerships in homeland security: Opportunities and challenges.Homeland Security Affairs,8(1). Choo, K. K. R. (2011). The cyber threat landscape: Challenges and future research directions.Computers Security,30(8), 719-731. Dumitras, T., Neamtiu, I. (2011). Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware.CSET,11, 2011-9. Dunn Cavelty, M. (2013). From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse.International Studies Review,15(1), 105-122. Line, M. B., Tndel, I. A., Jaatun, M. G. (2011, December). Cyber security challenges in Smart Grids. InInnovative Smart Grid Technologies (ISGT Europe), 2011 2nd IEEE PES International Conference and Exhibition on(pp. 1-8). IEEE. Liu, J., Xiao, Y., Li, S., Liang, W., Chen, C. P. (2012). Cyber security and privacy issues in smart grids.IEEE Communications Surveys Tutorials,14(4), 981-997. OConnell, M. E. (2012). Cyber security without cyber war.Journal of Conflict and Security Law,17(2), 187-209. Sridhar, S., Hahn, A., Govindarasu, M. (2012). Cyberphysical system security for the electric power grid.Proceedings of the IEEE,100(1), 210-224. Wang, W., Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), 1344-1371. Wilson, J. (2010) Essentials of Business Research: A Guide to Doing Your Research Project SAGE Publications
Subscribe to:
Posts (Atom)