Literature review SECURING MOBILE MONEY TRANSFER SERVICES

GERALD MUNDERU MIGWI

KCA/05/14640

KCA UNIVERSITY

MSC. DATA COMMUNICATIONS

LITERATURE REVIEW

SECURING MOBILE MONEY TRANSFER SERVICES

INTRODUCTION

Definition:

Mobile Money: Electronic money – being essentially digital – has attributes related to mobility and portability. It can be differentiated from other means of electronic payment (such as credit cards, debit cards, smart cards, etc.) because of its ability to replicate the essential attributes of traditional money, such as: liquidity, acceptability and anonymity. Mobile money may be related to mobile wallet, which refers to a digital repository of electronic money developed and implemented on mobile devices, allowing peer-to-peer transactions (P2P) between mobile devices (M2M) from users of the same service. It is similar to a normal physical wallet and is able to store money and credit and debit cards (Eduardo 2011).

Mobile money transfer services are expected to become one of the most important applications in mobile commerce (Varshney & Vetter 2002). Since companies are not going to invest in the development of innovative mobile applications or services unless they can be charged for appropriately, the existence of standardized and widely accepted mobile payment (MP) procedures is crucial for the development of mobile commerce (Pousttchi & Selk & Turowski 2002, Dahlberg & Mallat & Öörni 2003).

Whereas in electronic commerce we still see an important role of traditional payment systems (Krueger & Leibold & Smasal 2006), a payment system for mobile commerce will be typically not adequate until it shares fundamental characteristics of the mobile offer it is to bill for, in particular its ubiquity (Pousttchi & Selk & Turowski 2002, Coursaris & Hassanein 2002, Mallat 2004). As a result a Mobile money transfer service is crucial for, but not limited to the mobile commerce scenario. Pousttchi and Wiedemann (2005) show how customers benefit from Mobile money transfer services procedure: The most important relative advantages over conventional payment systems are ubiquity (the accessibility of a procedure and the reachability of payees at any time from any location), the ability to handle micropayments (smaller than 10 EUR /USD), the avoidance of cash at vending machines, and faster conduction of payments.

Mobile phones should have firm establishments as payment terminals in the most diverse fields. However, whereas merchants and Mobile Payment Service Providers (MPSP) made a multitude of attempts to offer respective services, absence of wide customer acceptance of the offered procedures prevented a market breakthrough in most markets up to now. In addition to the lack of standardization and universality of the procedures, security concerns of customers are one of the main inhibitors (Pousttchi 2005, Ketterer & Stroborn 2002, Ehrhardt 2002, Zieschang 2002).

Definitions of related terms:

Mobile Transactions: This refers to transactions carried out through mobile technologies and devices. In addition to mobile payments, it includes every kind of mobile transaction offered by technology, whether it involves financial values or not.

Mobile payments : Mobile payments include payments made or enabled through digital mobility technologies, via handheld devices, with or without the use of mobile telecommunications networks. These payments are digital financial transactions, although not necessarily linked to financial institutions or banks. There are several models of mobile payments that are currently employed worldwide.

Mobile banking: Mobile banking can be understood as a set of mobile banking services, involving the use of portable devices connected to telecommunications networks that provide users with access to mobile payments, transactions and other banking and financial services linked to customer accounts, with or without the direct participation of traditional banking institutions. This concept can also be regarded as the banking channel through which the digital mobile services are provided by the institutions to their clients, i.e. by integrating the concepts of service and channel.

Analysis Of Securing Mobile Money Transfer Services

Although the issue of security has emerged as a major inhibitor of mobile payment acceptance especially from the viewpoint of customers.

Improving positive security and privacy perceptions are most important for sustained activity in Mobile money transfer services. Security issues in electronic payment procedure have already had a significant amount of discussion in the literature (e.g. Ketterer & Stroborn 2002, Strube 2002, Zieschang 2002). In order to evaluate possible risks related with electronic payment procedures, Reichenbach (2001) uses criteria of multilateral security (Rannenberg 1989) and refines them. Also Jakubowicz, Hanssens and Henriksen (2003) develop a framework for analyzing the risks involved in electronic payments. They include the scenarios in which there may be a loss of money or privacy, the probability of these scenarios and the major possible negative consequences. Both approaches are based on the individual and therefore subjective viewpoints of the researchers. This entails the risk that relevant issues are not included and might lead to a loss of information, or that irrelevant issues are taken into account without any information gain.

Chari et al (2000) argue that mobile commerce solutions differ from electronic commerce solutions because the underlying technology has basic differences which create a range of new security exposures. For instance, the portability of mobile devices makes theft, loss, and damage of client devices much more likely. Therefore they assume that also the perception of security in mobile commerce may differ from that one in electronic commerce.

Examining barriers to adoption of MP, Khodawandi, Pousttchi and Wiedemann (2003) indicate that the lack of perceived security (later defined as subjective security) is the most frequently called reason for a refusal. Rogger and Celia (2004) found similar results.

Finally, Users are usually asked to provide their personal information to a third party service provider in order for them to be able to register and get the service. Therefore they are asked to place immediate trust of their money and personal data on a previously unknown party (Stamatis et al 2004).

Technologies supporting mobile payment transfers

There are two primary technical protocols for conducting mobile money transfers, including short messaging service (SMS) and wireless application protocol (WAP), a basic form of Internet web-browsing similar to PC-based online banking. Recently, new downloadable applications for smart phones have been introduced for mobile (Person to person) P2P transfers, which may leverage SMS or WAP technologies, to facilitate consumer payments. While both protocols have been used in various pilots, SMS is emerging as the most common method for small-value P2P transfers because of its simplicity and compatibility for usage in a variety of mobile phones, including low-end handsets (Cynthia 2010).

Existing approaches in mobile payment procedures have done little to fully address these three requirements. Most MP procedures today use SMS or IVR (interactive voice response) as a method to verify user’s identity, methods that have been proven to be insecure (Stamatis et al 2004).

While the use of SMS is on the rise, it may not be widely adopted for retail payments (Crowe et al. 2010) because of security limitations due to the fact that messages travel and are stored on the handset in plain text without encryption (Mahmoud et al. 2009).

The device manufacturers continue to bring on the market mobile phone models that have advanced capabilities (we are heading towards smartphone domination) and host their own execution environment. It is a matter of time for cryptographic services to be integrated in the devices that will make possible secure communication on voice and data. Furthermore the privacy is at high risk, since interception of data can be done from distance and without physical access (Stamatis et al 2004).

BACKGROUND

Mobile Money Transfer Services

Mobile Money transfer services have differentiated two basic functions of: payments inside and outside mobile commerce (Pousttchi 2005). Inside mobile commerce Mobile money transfer services is used for payments of mobile offers and is ideally system inherent. In the area of charging mobile services we distinguish two basic terms: mobile billing and mobile payment. We refer to mobile billing as billing of telecommunication services by a mobile network operator or a mobile virtual network operator within an existing billing relationship (Turowski & Pousttchi 2004). We define mobile payment as that type of payment transaction processing in the course of which – within an electronic procedure – (at least) the payer employs mobile communication techniques in conjunction with mobile devices for initiation, authorization or realization of a payment (Pousttchi 2003). Outside mobile commerce, Mobile money transfer services procedure can be understood as a mobile commerce application to complete payments in different situations.

Mobile money risk environment

Money Laundering

All activities to disguise or conceal the nature, source of, or entitlement to money or property, or rights to either, when the money or property or rights are acquired from serious crime, as well as all activities to disguise or conceal money or property that is intended to be used in committing or facilitating the commission of serious crime (George 2003).

Challenges in combating Money laundering:

As telecom firms engage in financial services across shared networks in cross-border jurisdictions, the benefits of mobile payments, ubiquity, and rapid settlement may also increase the risk of money laundering in mobile transfer services (Cynthia 2010).

With potential gaps in regulatory oversight, rogue actors may find it possible to evade detection by dividing a large transfer of funds into small ones using multiple mobile phones and accounts. This new landscape may require a service-based risk analysis by regulators to determine new approaches to the oversight of money laundering risk (Chatain, Hernandez, Borowik, and Zerzan 2008).

Since mobile technology-enabled payments do not require the face-to-face interaction that takes place with traditional banking, a more opaque and anonymous experience is created that may permit the opportunity for criminal activity. This is increasingly important as mobile retail payments can occur rapidly and in cross-border environments (Cynthia 2010).

In some countries, anti-money laundering efforts have focused traditionally on high-value transfers, but in this brave new world, criminals may use mobile technology to evade detection by sending multiple small transfers, using multiple phones and accounts (GSMA 2009).

The use of cellular phones makes it possible for the proceeds of crime or terrorist financing to be transmitted over airwaves (INL 2008). These opaque mobile transfers may move rapidly around the world in a digital format, immune to traditional regulatory oversight. Since there is limited expertise in identifying electronic payments crime in the communication systems, the potential for abuse should be considered.

Solution:

Money-laundering and terrorism-financing mitigation programs require service providers to institute a meaningful KYC process that is trusted by all parties to the mobile payment transaction.

Reporting of suspicious transaction through risk controls.

Another issue is the implementation of money laundering risk controls and suspicious transaction reporting for telecom firms. Compliance with these anti-crime laws is a challenging proposition for telecoms because it represents unfamiliar territory to the telecom industry (GSMA 2008c). Similarly, because telecom regulatory oversight has not included financial services, knowledge of suspicious activity reporting may be limited. Compliance can be complicated further by the fact that in many countries nonbanks may not conduct customer due diligence and “know your customer” procedures because of regulatory restrictions (GSMA 2008d). In the United States, many mobile payment service providers are classified as money transmitters or money service businesses, requiring registration in

individual states where they do business, as well as with the Financial Crimes Enforcement Network (FinCEN);

Privacy and security

The concerns for securing the mobile channel mirror the risks seen in the online environment, including authenticating the consumer’s identity and protecting transmission of data from interception enabled by viruses, malware, and phishing attacks. Anecdotally, the mobile environment to date has been relatively secure compared to the online channel where privacy and security of personal and business data is frequently compromised through the use of malicious computer viruses, identity theft, and phishing schemes (Cynthia 2010).

The diversity of platforms and wide range of operating systems make mobile phones less vulnerable to attack than personal computers (GSMA 2010).

Challenges:

The recent surge in smart phone applications may introduce vulnerabilities to malware attacks, which may increase payments risk going forward as bad actors gain access to personal information stored in the handset or accessed through a phone application (Linck et al. 2006).

The growing use of SMS as a common technology for sending a payments message may demand further examination of the need to strengthen data encryption technology (Pousttchi 2005).

Solution:

Creating transparency is a key consideration in addressing security issues—when consumers have the ready ability to view transaction histories on their handsets, the risk of account fraud and other risks can be avoided or mitigated (Cynthia 2010).

Consumer protections

Telecom-specific consumer protections in most countries,were not created with the need for financial services regulation in mind.

Challenge:

The limitations of traditional financial regulation for emerging mobile commerce may result in gaps in legal governance and ambiguity with respect to the responsibilities and liability among parties involved in the payment service.

The mobile commerce environment will demand that financial regulations be adapted to provide oversight for the proliferation of new services, business models, and nonbank service providers.

New regulatory policy will require a comprehensive understanding of the new risks that mobile transactions introduce to consumers, including lost payments through faulty transmissions, fraudulent transactions, identity theft, or criminal activity on the part of the mobile operator, agent, or other payment service provider. In the United States, for example, the applicability of payment law to mobile payments is unclear since MNOs may not be required to provide consumer protections equivalent to those of the banking industry.

For example, Regulation E governing electronic fund transfers includes any entity that holds consumer accounts or issues a payment access device and provides electronic fund transfer services. While mobile money service providers in the United States typically comply voluntarily with Regulation E and other consumer protection laws, actual enforcement authority is fragmented, according to the state authorities where they are licensed. In the absence of Regulation E protections, it is unclear who will assume responsibility or liability for dispute resolution for billing errors, misdirected payment messages, fraudulent charges stemming from identity theft, or compromised mobile accounts resulting from lost handsets when authentication controls are intercepted. Some of these issues may fall within the scope of the Federal Communications Commission’s Truth in Billing Requirements, but enforcement at this nascent stage will lag product and service deployment.

The GSMA provides general guidance for establishing regulatory environments for MMT that underscores the need to coordinate the consumer protection efforts of both the telecom and financial services industry. The cellular telecommunications trade association has also published best practices for telecoms in financial services as a proactive measure, in order to guide the offering of safe and trusted mobile payments and maintain public confidence.

Roaming fraud

Recent successes in global-standards setting to promote interoperability among carriers have simplified the ability for mobile users to roam across geographic markets. The roaming agreements used by international operators to facilitate voice transfers can now be used to send data in the form of cross-border payments. However, wireless data transmissions may be vulnerable to access by unauthorized parties who identify some means to intercept the communication between mobile devices. The growth in wireless telecom services has led to an increasing number of roaming agreements between telecommunications companies in different countries, enabling the transmission of international remittances via mobile phones. Roaming fraud represents a potential threat to the security of cross-border mobile payments. GSMA has recommended that near-real-time roaming data exchange technology be implemented for all GSMA members in order to reduce the occurrence of roaming fraud. The technology involves faster roaming-activity reporting and requires operators to send roaming data to partners within a prescribed time limit. The data includes key call information that can be analyzed if it is received quickly, in sufficient time to detect and mitigate roaming fraud.

Credit risk

Credit risk may emerge in a postpaid scheme whereby the transaction is applied to the user’s phone bill to be paid later. Possibly because of their lack of experience in managing credit risk associated with financial services, telecoms in global markets have largely focused on providing prepaid services in order to manage liquidity and mitigate risk, particularly in telecom-led models that do not rely on a bank partnership. In most countries, nonbank payment service providers are prohibited from accepting consumer deposits or using funds in financing payment activities, which serves to protect the consumer and limits financial system risk (GSMA 2009). For example, Safaricom’s M-PESA mitigates credit risk by collecting prepaid funds from agents. Safaricom deposits into a trust account managed by a leading Kenyan commercial bank, which provides the legal protection for consumers.

In the United States, new P2P services typically involve an established payment vehicle such as a depository account at a financial institution or a credit card to fund the mobile payment. Programs in which the carrier posts charges to the consumer’s phone bill to be postpaid have been largely limited to micropayments for charitable donations, as in the Haiti relief effort discussed earlier, and for small purchases for ring tones and virtual goods in online games. There is no current evidence to suggest that carriers have an appetite for managing credit risk in MMT.

Mitigating risk in mobile money transfer systems

The risk of anonymity in mobile payments may require new authentication technologies such as voice recognition and fingerprinting to verify identification and to employ appropriate know-your-customer programs, particularly at vulnerable points of a transaction when cash withdrawals may be conducted. The use of more sophisticated control systems to flag unusual account activity, based on a customer’s user profile, will be needed to detect increasingly complex money laundering schemes (Cynthia2010).

Since mobile financial transactions occur rapidly, with funds being sent and received in fractions of a second, payment service providers may not detect suspicious activity in time to suspend a transaction (Pousttchi 2005).

The diversity of platforms and wide range of operating systems make mobile phones less vulnerable to attack than personal computers. The recent surge in smart phone applications may introduce vulnerabilities to malware attacks, which may increase payments risk going forward as bad actors gain access to personal information stored in the handset or accessed through a phone application. Finally, the growing use of SMS as a common technology for sending a payments message may demand further examination of the need to strengthen data encryption technology (Cynthia 2010).

Since the success of any payment system is predicated on ubiquity, convenience, and trust, it is necessary to address emerging risk issues in order to maintain public confidence in mobile money. The risk of anonymity in mobile payments may require new authentication technologies such as voice recognition and fingerprinting to verify identification and to employ appropriate know-your-customer programs, particularly at vulnerable points of a transaction when cash withdrawals may be conducted. The use of more sophisticated control systems to flag unusual account activity, based on a customer’s user profile, will be needed to detect increasingly complex money laundering schemes. Since mobile financial transactions occur rapidly, with funds being sent and received in fractions of a second, payment service providers may not detect suspicious activity in time to suspend a transaction. As mobile commerce advances, it will be necessary for mobile payment service providers to establish integrated systems of internal controls that respond quickly to suspicious activity.

The risk of inadequate regulatory oversight stemming from a lack of understanding about the risk exposure inherent in new mobile payment innovations- results in payment system vulnerabilities. Education and collaboration across organizational jurisdictions and the telecom and financial services industries will be necessary to detect and mitigate criminal activity, fraud, and other payment system risks.

Certain aspects of mobile handset technology may be leveraged to provide more secure transactions—by using identification tools to authenticate the user, for example, thereby reducing the risk associated with anonymous transactions. Digital wallets contained in the mobile handset that are provisioned with a secure element and empowered with multifactor authentication may also provide a more secure payment environment in the future. Location-based services available in smart phone applications may also help payment service providers to authenticate the credentials of mobile users engaging in payments transactions. Finally, transaction limits imposed by carriers and financial institutions based on the customer profile and historical usage can mitigate the risk of unauthorized payments.

23

The security issues in m-payments are confidentiality, authentication, integrity, authorization, and

non-repudiation.

• Confidentiality: In m-payments no-one-else should find out what was purchased and how it was paid.

• Authentication: Merchants and mobile customers must be able to trust the identity claimed.

• Integrity: the value of transactions should not be modified by others, knowingly or unknowingly.

• Authorization: parties involved must be able to verify if everyone involved in a transactions is allowed to make payments.

• Non-repudiation: No one should be able to claim that the financial transaction on his/her behalf was made without their knowledge.

Other, non-security issues include accessibility, convenience, speed, ease-of-use, and standardization.

In addition to security and privacy risks, new vulnerabilities arise in mobile financial applications

because wireless devices are used. These transactions may involve multiple wireless networks

with different levels of security. These networks could lead to possible change/deletion of

information, and denial of service. In such an environment, tracing hackers is a difficult job as

devices move in and out of multiple wireless networks and many United States wireless networks

do not authenticate a particular user to a particular device.

Some support for security is provided by mobile middleware. For example, WAP provides security

using Wireless Transport Security Layer (WTSL), but it does not result in the end-to-end security

(only between device and the WAP gateway). The translation between Secure Sockets Layer

(SSL) and WTSL occurs at the WAP gateway. These gateways are vulnerable to Denial of

Service (DoS) attacks because malicious WML Script may run on a device, thereby making other

existing security techniques (signing, authentication and encryption) less effective. Several United

States-based financial companies and associated vendors in the Financial Services Technology

Corporation (FSTC)2 are working on implementing end-to-end transaction support for financial

applications involving mobile devices, wireless networks, and financial institutions. One of the

major hurdles at present is that end-to-end encryption that is not widely available; however, such

encryption will become possible with widespread deployment and use of WAP 2.0.

It is possible to add some security features for financial services. GSM supports both user (PIN)

and device authentication (SSL). Finnish wireless provider Sonera is offering PKI on a SIM card.

Another possibility is wireless PKI, a system to manage keys and certificates and requires the

user to enter 2 PINs (authentication and digital signature). The WPKI is used in WTSL to support

2-way authentication (anonymous: class 1, server: class 2, user: class 3).

Financial services are supported in I-appli service for iMode phones using a version of Java

designed for small devices. I-appli service provided by DoCoMO in Japan using iMode phones

supports few financial services. To provide security for these services, Secure Socket Layer

(SSL) protocol is used at either 40 or 128 bit versions.

Security will dominate any discussions of m-payments, especially, macro payments. Certainly

more work is needed in addressing specific security requirements of m-payments and new ways

to support m-payment security. It is also possible to introduce location as a constraint in deciding

the limit on the monetary value of m-payments, in addition to other traditional constraints such as

type of user, past history of payments, and credit availability. The wireless network that is

currently being used to make m-payment could also be a factor in limiting the amount of money

that can be transferred by its permanently registered users and roaming users.

2 The Financial Services Technology Consortium (FSTC) is a consortium of North American-based financial

institutions, technology vendors, independent research organizations, and government agencies. Its aim is

to bring forward interoperable, open-standard technologies that provide critical infrastructures for the

financial services industry.

Sub security Definition Enabling Concept/technique

Confidentiality

Property that ensures that transaction

information cannot be viewed by

unauthorized persons. Encryption

Authentication

Property that the transaction information actually originates from the presumed transaction partner. Possession (e.g. of a mobile phone),

knowledge (e.g. of a PIN) und property

(e.g. biometric property)

Integrity

Property that the transaction Information remains intact during transmission and cannot be altered. Digital signatures

Authorization

Property that parties involved must be able to verify if everyone involved in a

transaction is allowed to make the transaction. Digital certificates

Non-repudiation

Property that no one should be able to claim that the transaction on his/her behalf was made without their knowledge.

Digital signatures

Table 1. Sub-goals of objective security according to Merz (2002)

ADDIN ZOTERO_BIBL {“custom”:[]} CSL_BIBLIOGRAPHY

ADDIN ZOTERO_BIBL {“custom”:[]} CSL_BIBLIOGRAPHY

Maturation processes within developmental stages in the foetus

Maturation processes within developmental stages in the foetus

After birth, the foetus is required to adapt to the environmental changes by establishing and maintaining physiological homeostasis, without the assistance of the placenta. Therefore, the survival of the foetus after birth is dependent upon maturation of structures and organs that interface with the new environment. Examples of essential organs and structures are lungs, immune system, gut, liver, pancreases and kidney (Strauss & ‎Barbieri, 2013). Various studies have shown that maturation processes during foetal development are induced by glucocorticoids (Strauss & ‎Barbieri, 2013). Critical maturation processes that occur during foetal development include deposition of glycogen in the liver; activity of enzyme systems in the foetal brain, thyroid gland, pancreases, retina, and gut; and production of surfactant by foetal lungs. Maturation of the foetal lungs is particularly important since inability to breathe due pulmonary immaturity has been found to be a leading cause of mortality among preterm infants as well as neonatal morbidity (Norris & Lopez, 2010). However, the key functions of glucocorticoids in the process of maturation are not yet clear. As Norris and Lopez (2010) highlight, some studies have shown that glucocorticoids do not initiate maturation of cells; they simply accelerate the process of maturation.

MBA_8A1_Yin Hui_BUS7AO_A1

Table of Contents

TOC o “1-3” h z u 1. Introduction PAGEREF _Toc86414272 h 22. Occurrence of Risks in Relation to Economic and Legal Implications PAGEREF _Toc86414273 h 22.1 Definition of Risk PAGEREF _Toc86414274 h 22.2 Difference between Risk and Uncertainties PAGEREF _Toc86414275 h 22.3 Origins and Nature of Risks PAGEREF _Toc86414276 h 22.5 Identification of Risks in the Context of Economic and Legal Implications PAGEREF _Toc86414277 h 32.5.1 Compliance Risk PAGEREF _Toc86414278 h 32.5.2 Hazard Risks PAGEREF _Toc86414279 h 42.5.3 Control Risk PAGEREF _Toc86414280 h 42.5.4 Opportunity Risk PAGEREF _Toc86414281 h 53. Risk Management Plan PAGEREF _Toc86414282 h 53.1 Control Measures PAGEREF _Toc86414283 h 63.2 Corrective Measures PAGEREF _Toc86414284 h 73.3 Record Keeping and Review Frequencies PAGEREF _Toc86414285 h 84. Conclusion PAGEREF _Toc86414286 h 8References PAGEREF _Toc86414287 h 9

1. IntroductionChina Communications Construction Company Limited (CCCC)principally engaged in the design and construction of transportation infrastructure, dredging and heavy machinery manufacturing business. The company operates in China,a fairly stable economy that uses a mixed controlled and open approach to regulation. This is a report covering a deep insight of the China Communication and Construction Company to uncover the major and minor risks that are associated with the company in its operations within China.

2. Occurrence of Risks in Relation to Economic and Legal Implications2.1 Definition of RiskRisk refers to the likelihood that someone or something will suffer harm or loss from a particular event or occurrence (Kuznetsova, 2019). It may also come out as the probability that a certain situation will lead to damage. According to Shad et al. (2019), a risk can is bound by measurable probabilities that are used in speculation or basic calculation and determination the possible likelihood of the event occurring and the amount of harm or loss that can be expected in case it happened.

2.2 Difference between Risk and UncertaintiesThe major and distinctive difference between a risk and uncertainty is within their possible outcomes and the possible occurrence of these outcomes. A risk represents a situation in which both the outcomes to the situation and the possibility of these occurrences are known to the investigator and they can be measured to ensure effective decision making (Kundzewicz et al., 2018). Whereas for the uncertainty, both the outcomes of the situation and their possibility of occurrence are not known and cannot be obtained by the investigator.

2.3 Origins and Nature of RisksThe nature of risk is interpreted according to the expected harm from the risks (Adeleke et al., 2018). Pascal well illustrates the nature of risk, he offers a positive expected value, laid the foundation of modern risk management, refer to traffic construction companies in China compared with the research on risk, the risk in the following aspects: the nature of market, legal aspects, material and financial aspects. Hopkin (2017) put these four aspects into four major categories to represent the whole nature of risks. These categories include; compliance risks, control risks, opportunity risks and hazard risks.

2.4 Business and Societal Setting

The China Communication and Construction Company is a multinational publicly traded company with its headquarters situated in Beijing, China. The company has the majority owner as the State to which the company anchors. The company is set in the Engineering and Construction industry offering major design and construction services all over the world. Standing at an approximate revenue of 70 billion dollars (China Communications Construction Company n.d.), the company possesses the capacity to offer construction activities such as Highways and Bridges design and construction, Port Construction, Airports design and construction, Railway construction, Oil mining platforms design and construction among many other developmental and high end infrastructural design and construction (Huang et al., 2020).

The multinational basis of the China Communication and Construction Company makes the company interact and impact a number of societies with different diversified composition of people. The basic society associated with the company is Chinese with a majority of the population consisting of the Chinese ethnicity however this changes when the company is contracted to work in other nations. With different nations the company interacts with different population of people with different languages and different practices. China Communication and Construction Company is exposed to as many cultural backgrounds and societal belief as the number of nation the world due to its worldwide operation nature.

2.5 Identification of Risks in the Context of Economic and Legal ImplicationsAccording to Polinkevych et al. (2021), four major aspects within which the nature of risk could be analyzed are brought out. This happens to be the major aspects within which the risk concept can be linked with the economic and the legal perspective. The China Communications and Construction Company also fall within these analytical suggestions of risk impact to the company and the link of the risk aspects to the economic and the legal parameters.2.5.1 Compliance RiskAt present, CCCC has carried out substantial business in 135 countries and regions (CCCCLTD, 2021). Different political, economic and cultural environments in different countries make CCCC face various compliance risks.

A Chinese enterprise once completed 90% of an overseas construction project with both quality and quantity guaranteed, but was identified by the World Bank as having violated the rules and terminated the project process, resulting in a loss of hundreds of millions of yuan, and was unable to participate in any Projects funded by the World Bank for eight years (Gong Lefan,2021). As a result, those who violate the rules may face not only huge fines but also be blacklisted and restricted from overseas operations. According to the World Bank’s statistics on sanctions cases from 2007 to 2017, fraud was the most common at 81%, followed by corruption at 20%, conspiracy at 10%, obstruction of investigation at 5%, and coercion at 1% (Nan Jinlin&Yuan Wenqi,2020). Due to the lack of understanding of the local political and economic system, the operation results in violations, and may be identified as fraud.

2.5.2 Hazard RisksAs a large infrastructure company, CCCC faces risks of earthquake, flood and other hazards.

On July 20, 2021, Zhengzhou, China, suffered a rare heavy rain. The construction enterprise Jianye Group suffered heavy losses in a large number of projects under construction, resulting in direct economic losses of 550 million yuan (Xu Qian, 2021). This risk category is related to the loss of physical property (Aziz, 2020). It is said that the risk of flooding in China will increase within a decade, The final increase range was determined to be from 4.04% to 12.34%, indicating that the higher chance of flooding in China means that the company will slightly predict the occurrence of floods often not only because of the percentage increase in the probability of occurrence but also because of the expected increase in flood cases over several decades (Schulte & Hallstedt, 2018). The expected impact is high because the hazard risk affects structural damage to working equipment and projects, resulting in financial losses.

2.5.3 Control RiskConstruction of infrastructure projects requires a lot of manpower and mechanical equipment. Negligence or improper operation will bring serious consequences. The control risk of CCCC is safety accidents.

In 2017, tower cranes collapsed at the construction site of guangzhou Headquarters Base B Project, causing 7 deaths, 2 serious injuries and a direct economic loss of 8.47 million yuan. The company was ordered to suspend operations for 90 days and not undertake new projects during the period. (Li Ying,2020). Control risk is generally related to management, which brings serious economic losses and negative image to enterprises. This risk requires organizations and companies, like internal governments, to adjust to changes in the external environment.

2.5.4 Opportunity RiskOpportunity risk is the failure rate attached to an organization in case it takes upon a new venture. This may be in terms of branching to other areas or diversification of the business to introduce a new product of or service (Sum & Abdul, 2020). The size of the China Communication and Construction Company served as the cushion or mitigation measure for the occurrences attached to this risk. The size of the organization offers more resources to conduct research and investigation for relevant market data so that any decision or step there henceforth is statistical to avoid guesses and avoidable risk ventures (Panjehfouladgaran & Lim, 2020). The probability of the opportunity risk occurring is low however the impact of the same is high which may cost the company an entire branch or financial losses on initial investment costs on new product or services.

3. Risk Management PlanIn the preceding sections, China Communication and Construction Company has been investigated on the risks that are in direct and indirect effect to the company and the impacts these risks may carry. The section has shown that a risk is associated with a number of outcomes whose individual magnitude can be measured. The risks have been investigated with their relation to the economy surrounding China Communication and Construction Company both inland (within Chinese borders), and overseas in other branches of the company located in different countries and different economies subsequently. The section has also shown that in the case of an uncertainty situation the investigator can never have a specific strategy in dealing with the situation rather anything can be expected that no one is ready and prepared to tackle. The risks occurrences are also investigated in their compliance to the legal setting of the company’s locations. Having identified the major risks that are linked to the China Communication and Construction Company, this section presents the available mitigation strategies that are available useful in curbing the risks to protect the company from suffering the impact of occurrences from the risks noted.

3.1 Control MeasuresFrom the risks discussed above, it can be noted from the context that some of the occurrences have the power of impacting the company to cause a major loss of survival-threatening damage. To ensure thriving of the business, there has to be measures to be taken in ensuring the position of the company is protected from the environmental, legal, social and Economical perspective.

The principle framework of a risk control initiative include: identification of the possibility of risk in the organization; identification of the most likely employees or groups of employees to be impacted; educating employees on the probability of risks; train employees on what to do in the event of emergencies, reporting the incidence, and making decisions; perform periodic evaluations of the workplace including the knowledge of employees on risk and risk control expectations and measures; and to reprimand employees and procedures that are not aligned to the risk control measures.

Specifically, China Communication and Construction Company is required to ensure effective risk control measures. These include: performing good and best-practice housekeeping actions and responses in the workplace including work evaluation in every major area for risk issues; establishing a stable structure to handle legal risk issues; auditing; redesigning tasks that have high probability and risk; and implement policies for people to follow in order to reduce risk.

For example, the legal department of the company ensures that the operations within and around the company are in the total compliance with the respective laws. This is by ensuring that the products and services offered by the company are in accordance with the standardization regulation for customer protection and the environmental protection. For protection of the companies and the general public, the company, which is publicly traded, is expected to act under compliance of the company Law, The Law of Enterprise Income Tax, Basic Rules for the Enterprise Internal Control, Anti-Unfair Competition Law, Labor Contract Law and the Interim Regulations on Prohibition of Commercial Bribery. These laws are incorporated to serve the regulation purpose and enhance general compliance. For the China Communication and Construction Company, the possibility of the occurrence is generally low from the strict observation from the management and the legal department set to ensure compliance (CCCCLTD,2021). The company is also publicly traded and most of the ownership left to the state which ensures the compliance of the whole organization is at per for the interests of the government and the public at large.

The pricing of the products and services should all go hand in hand with the pricing act of the law (Gokmenoglu et al., 2019). And the general sustainability of the acquisition process and should be systematic in a way it ensures sustainability in the entire process. The Human Resource department should ensure compliance with the labor law as stated in the company law of the country. For every contract assigned, the labor acquisition should be checked in way that it respects and adheres to the labor law of the country. The company interaction in the market should be controlled to ensure protection of the company from Anti-Fair competition in tender winning and other multi-company involvement activities. The legal team should also study and understand the relevant laws of other countries in which the company works with or is starting to work with to avoid inconveniences when the company’s operations unintentionally assumes some regulations.

Project managers within the company should ensure that the safety measures are put in place I every project to avoid injuries and subsequent disasters from mistakes in safety measures ignorance. Proper fire-fighting equipment should be installed within the buildings of the company and other related buildings including the project sites. The company employees should also undergo necessary fire drills and other training first aid and other short medical care procedure in case of disaster. Projects in foreign countries should be thoroughly planned to accommodate any disaster expectation in the foreign land for example the case of tornadoes in The American Countries. This fore investigation ensures earlier preparations for the expected disasters which would help avoid injuries and at most save lives.

The marketing department and the data handling department together with the management should be in constant check of the statistics within the company operations and compare the current statistics with the previous ones to know and understand the position of the company against that of the prevailing economic climate. These should also use the data obtained for future planning to cope with the constantly changing market. This strategy ensures that the steps of the company are informed for thriving and progress and most of all adaptation to the prevailing market flow to maintain the current market share and even expand under right conditions. The management team and the data handling department should take proper steps in the investigation and projection of any major step in the company’s operations such as expansion or diversification to prevent unnecessary blunders

3.2 Corrective MeasuresThe management should always ensure harmonious working of the different departments to ensure effective information passage in the moments of updates and sensitive changes (Vekasi, 2019). The legal department should ensure they are always updated on the latest updates on the relevant laws and pass the information effectively to the relevant departments and personnel. This includes foreign laws, in countries that are in constant operations with the company and those starting their operation with company. Innovation within the design team should always be high to ensure the company maintains its market share for quality in the services offered (Han et al., 2018). Structural changes should also be undertaken within the working environment to accommodate relevant drills and ensure the health acts is strictly followed. Structural changes are also necessary when trying to curb any disaster such as fire outbreaks in working environment. Previous mistakes within the company should be noted and studied to help avoid the same mistake in future or any related mistake henceforth. The management should also consider foreign assessment or auditing from known companies to ensure the company is in the same position and direction as the internal auditing states.

3.3 Record Keeping and Review FrequenciesFor efficiency, the company must ensure proper record keeping which means the system and mode of keeping records should be such that the retrieval and access of the stored information is not interrupted and should not lose information (Chang et al., 2018). For China Communication and Construction Company, all incidents on law infringement within the company operation should be recorded in proper details and the number of occurrences to be used in decision making and for addressing the entire company personnel together with the public during the annual meetings.

One of the most effective ways to respond to risk is through proper record keeping. Record keeping enables Risk managers to act based on available knowledge and information. Record keeping entails the information collected from: business expenses, tax documents, accounts payables and receivables, employee information, sales records, vendors, and customer lists. This information is necessary in informing the direction of management in regard to policy formulation and decision making.

Records are an essential element to the management of risk. For China Communication and Construction Company, records are used as proof of compliance and aids in the avoidance of legal issues including fees and penalties. The company also uses proper records to make decisions. Risks in the organization are related to management decision making. For example, failure to properly record employee information on an important management matter such as diversity could lead to poor decision making at an organization level. To ensure that proper and useful information is recorded, China Communication and Construction Company also conducts frequent reviews on a monthly, quarterly, and annually basis to ensure that the position of the company on various elements are kept at par with organizational and management goals. Such methods also aid in the management of risk.

4. ConclusionThe China Communication and Construction Company being a very large organisation, should invest effectively on the risk study and mitigation. The organization with its size and value may be highly prone to assume proper running and production efficiency since it is difficult to identify any problem embedded in the large sections and department. Therefore to curb disaster the company should ensure proper check and study of various sectors in the internal and external environment both macro and micro to uncover risks and mitigate them for survival and thriving.

ReferencesAdeleke, A. Q., Bahaudin, A. Y., Kamaruddeen, A. M., Bamgbade, J. A., Salimon, M. G., Khan,

M. W. A., & Sorooshian, S. 2018. The influence of organizational external factors on construction risk management among Nigerian construction companies. Safety and health at work, vol.9, no.1, pp. 115-124.

Aziz, N. A. A., & Manab, N. A. 2020. Meeting the stakeholder needs and sustaining business

through sustainability risk management practices: a case study of malaysian environmentally sensitive companies. In Sustaining our Environment for Better Future (pp. 195-208). Springer, Singapore.

CCCLTD, (2021), The global layout, Available from: https://www.ccccltd.cn/swfw/zjzqq/ [Electronically accessed 28th, Oct,2021]

Chang, T., Hwang, B. G., Deng, X., & Zhao, X. 2018. Identifying political risk management

strategies in international construction projects. Advances in Civil Engineering, 2018.

CCCLTD, (2021), Introduction and About Us. Available from:

http://en.ccccltd.cn/aboutcompany/introduction/ [Electronically accessed 28th, Oct,2021]

da Silva Etges, A. P. B., & Cortimiglia, M. N. 2019. A systematic review of risk management

in innovation-oriented firms. Journal of Risk Research, vol. 22, no.3, pp. 364-381. 

Gokmenoglu, K., Kirikkaleli, D., & Eren, B. M. 2019. Time and frequency domain causality

testing: The causal linkage between FDI and economic risk for the case of Turkey. The Journal of International Trade & Economic Development, vol. 28, no. 6, pp. 649-667. 

Han, X., Liu, X., Gao, L., & Ghauri, P. 2018. Chinese multinational enterprises in Europe and

Africa: How do they perceive political risk?. Management International Review, vol. 58, no. 1, pp. 121-146.

Huang, C. M., Yang, W., & Zeng, R. Q. 2020. Analysis on the Efficiency of Risk Management

in the Chinese Listed Companies. Mathematics, vol. 8, no. 10, pp.1831.

Kundzewicz, Z. W., Hegger, D. L. T., Matczak, P., & Driessen, P. P. J. 2018. Opinion: Flood-

risk reduction: Structural measures and diverse strategies. Proceedings of the National Academy of Sciences, vol. 115, no. 49, pp. 12321-12325.

Kuznetsova, M. O. 2020. Risk management implementation practices in Russian industrial

companies: results of an empirical study. Strategic decisions and risk management, vol. 10, No. 4, pp.410-423.

Li Ying, (2020), CCCC fourth Navigation Engineering Bureau was found to have participated in the bidding and won the bid illegally during the suspension of operations, Available from: http://www.315online.com/survey/404634.html [Electronically accessed 28th, Oct,2021]

Nan j.&Yuan,w(2020),‘Analysis of compliance risk in international engineering projects’,International Engineering and Labor,Vol.387 ,No.3,pp.20-23.

Panjehfouladgaran, H., & Lim, S. F. W. 2020. Reverse logistics risk management:

identification, clustering and risk mitigation strategies. Management Decision. Vol. 58 ,No. 7, pp. 1449-1474. 

Polinkevych, O., Khovrak, I., Trynchuk, V., Klapkiv, Y., & Volynets, I. 2021. Business risk

management in times of crises and pandemics. Montenegrin Journal of Economics, vol. 17, no. 3, pp. 99-110.

Schulte, J., & Hallstedt, S. I. 2018. Company risk management in light of the sustainability

transition. Sustainability, vol. 10, no. 11, pp. 4137.

Shad, M. K., Lai, F. W., Fatt, C. L., Klemeš, J. J., & Bokhari, A. 2019. Integrating

sustainability reporting into enterprise risk management and its relationship with business performance: A conceptual framework. Journal of Cleaner production, vol. 208, pp.415-425.

Sum, R. M., & Khalik, Z. A. 2020. The Influence of Corporate Governance on Enterprise Risk

Management Implementation: A Study on Non-Financial Public Listed Companies in Malaysia. Journal of Technology Management and Business, vol. 7, no. 1, pp.50-64.

Vekasi, K. 2019. Risk management strategies of Japanese companies in China: Political crisis

and multinational firms. Routledge.

Xia, N., Zou, P. X., Griffin, M. A., Wang, X., & Zhong, R. 2018. Towards integrating

construction risk management and stakeholder management: A systematic literature review and future research agendas. International Journal of Project Management, vol. 36, no. 5, pp.701-715.

Xu Qian, (2021), Behind jianye’s “help for Help” : the flood caused direct losses of more than 500 million yuan, and cultural and tourism projects were the hardest hit, Available from: https://www.bjnews.com.cn/detail/163119853714957.html [Electronically accessed 28th, Oct,2021]

Maturity

Name:

Professor:

Course:

Date

Maturity

Maturity is often seen to be a person’s development of their emotional intellectual spiritual as well as volitional capacity. After a certain age, often from eighteen when one enters adulthood, no one wants to be labelled as a child and we all refer to ourselves or rather want people to refer to us as mature. While most people mature early others may take time. We leave in a period where the young people have a lot of information at their disposal because of technology. This has made them earn so much which could be deemed as not fit for a certain age for example sexual relation. Most people will liken maturity with age which is actually wrong, however, contrary to most thinking I believe maturity is not a matter of age but rather comes with experience.

Experience is the best teacher, a popular saying actually sums up most things about maturity. Through experiences that we go through we are able to learn new things, identify better ways to counter problems and take up lessons that will be vital in the future (Dowden). You can actually meet a 13-year-old girl who is more mature in their thinking as well as action than a 22-year-old young lady. Some people have been brought up in situations that had to make them mature fast enough than their age, an example would be a child whose parents pass away at age 14 and is left to care for two younger siblings. Most often, the firstborn will take up the role and become a parent to this younger sibling. The child is likely to even take up jobs or offer the guidance to the siblings that other children receive from their parents. It’s because of the circumstances presented in our life that we eventually understand how to reason which eventually affects our maturity.

Science has often pointed out an association between age and maturity. This why often people are considered mature at the age of eighteen. Although this is partially true because with age we are exposed to certain things that also affect our maturity, eventually it will narrow down to experience. For example, when one is of age and they are taken to school the experiences they will encounter at school will shape their reasoning which translates to maturity. Maturity is associated with both accountability and responsibility (Dowden). When you have a four year old who can take care of her belongings including books and stationery and another of the same age who seems to be misplacing her books or stationery all the time, one can eventually conclude that the later can be said to be more mature. You will find a young person who knows how to save and account for their money while at the same time you will find a grown man who cannot do the same simply because they may have never been in a position where they had to live according to their means.

I hope to reach out to the society to bring an understanding of what maturity really means as we seem to be misguided. We can never equate maturity with age, it all narrows down to a person accountability and responsibility which are often influenced by experiences. As a society we need to stop basing a person’s reasoning with their age. It is because of this we are often not keen to listen to an advice from a younger person on the basis he is still young. A person may be young but the experiences they have gone through may have shaped them. The source that I except to consult is an Article on the Medium “Age vs Experience: Maturity Obscurity by Regina Dowden.

Works Cited

Dowden, Regina-Lee. “AGE vs EXPERIENCE: Maturity Obscurity.” Medium, The Post-Grad Survival Guide, 24 Apr. 2019, https://medium.com/the-post-grad-survival-guide/age-vs-experience-maturity-obscurity-a0de07e957c4.

MBA513 Talent Management

Josh Barto

11/23/18

MBA513: Talent Management

Talent/HR Analytics Paper

What are talent analytics? Matthew Valencius defines it as identifying your position with recruitment, assessing your velocity, and understanding your acceleration (Bickham, 2016, p.166). The terms of position, velocity, and acceleration can mean different things to different people. Valencius compares these terms to mathematics in the same way I would use them (Bickham, 2016). How does a company use them for talent analytics? Position, in this case, refers to where is the company at with analytics. Does the company use a large amount of data in a wide variety of ways, or does it only use analytics in several focused ways? Velocity refers to if the company is moving employees quickly through the talent management system or not. Lastly, understanding the company’s acceleration in talent analytics shows whether the company is speeding up or slowing down with their processes.

Talent analytics is not necessarily a new idea, but it does not seem for certain that a lot of companies have adapted a form of this innovative thinking. In knowing this, Jeanne Harris, Elizabeth Craig and David Light describe six analytical tools for human resources for organizations to adapt: employee database, critical talent management, focus human resource investments, customizing the employee-value proposition, workforce planning and talent supply chains (Harris, 2011). When talking about having an employee database it is not about just names, contact information, and positions in the organization. This type of database is referring to knowledge, skills, abilities, and performance of individuals (Harris, 2011, p.6). In compiling this information and comparing it to the company’s most successful employees, the company can use this information in the company’s hiring process to narrow a search of candidates towards individuals who show characteristics that the company wants. Along with an employee database, critical talent management can be important to analyzing talent within the organization. Using talent management software, a company can analyze which sections of the company have the most impact and biggest performance and focus your best recruitment efforts on those sections. This leads right to the focusing of human resource investments. Using the information from critical talent management, human resource can focus investments based on the information obtained from that analysis. The next tool is customizing the employee-value proposition. This tool is straight forward. Using analytics, find what employees’ value most and use that information to create a model that will boost retention rates (Harris, 2011, p. 8). The next tool, workforce planning, is more of a present to future tool. Initially the plan should be to integrate the company’s strategy, finance and other planning processes (Harris, 2011 p. 9). However, as strategies and goals change for the future, so should the workforce planning. Lastly, talent supply chains refer to “real-time optimization, where processes adjust on the fly to enable a company to maintain the best possible mix of skills and supply of talent (Harris, 2011 p.9).”

Another area that talent analytics can improve upon is the performance appraisal system of employees. “HR analytics can help increase perceived accuracy of the PA system by giving more objective, accurate and unbiased data related to employee’s performance behavior” (Sharma, 2017, p.688). Many performance appraisals are subjective in nature. It is based off how a direct supervisor perceives that you are doing during a certain time period. If it seems that employee is productive, then the performance appraisal will be excellent. For example, if the supervisor had some data, such as, the employee completed a certain percentage of his/her goals within that time period, then that merits an excellent rating. Analytics can improve performance appraisals and take the subjectivity out of them. This would benefit any company.

Several of these tools seem more important than others. Employee databases, critical talent management, and customizing the employee-value proposition are the most important tools. It is critical to know what character types drive the most successful parts of the organization and which parts of the organization the company wants to focus most of its efforts on when recruiting top talent. The company should also want to figure out how its top talent wants to feel valued so that it can retain these employees. I believe workforce planning is next because it is also critical to sync the entire organization with the same values. Employee databases, critical talent management and employee-value proposition can improve both individual and organizational performance. If an employee knows that his character is the exact type the organization likes to hire, then that will make the employee feel like he belongs and drive productivity. Also, if you value most employees how they wish to be shown they have value, their want to produce will increase and thusly improve the business bottom line. Having a more objective performance appraisal will help the employees understand what they need to improve upon and, in theory, those areas will improve.

Matthew Valencious states “the basic building block of talent management is a program, project, or initiative (Bickham, 2017, p.167).” Each one of these tools to analytics can be a program, project, or initiative. When trying to derive what character types drive the most successful people, that can be both a project and an initiative. Gathering the data of the most successful people in the organization can be a project, but the want to make the change of hiring the people with the characteristics is the initiative. Performance appraisals are a program. Every year an employee can hear the same worn out sentence that a supervisor thinks they perform great and are an asset to the team; or you can turn performance appraisals into a year long program to evaluate statistically if an employee is performing average or above average.

Having these analytical tools is not enough. Boudreau and Cascio suggest five conditions for analytics delivery and use: receiving the analytics, attend to the analytics, believe the analytics, believe that the analytics suggest effects that are large and compelling enough to merit attention or action, and to see implications for their actions or decisions (2017). Believing in what the analytics interpret and the decisions made based off the data received is a huge part of talent analytics. If a company does not support what the analytics are telling them, or even believe what they are, implementing it was a waste of time, resources, and money to even begin the analytical process.

A company must believe that the analytical process offers real value. These six steps will help offer real value: develop a strategy with an eye to both current and future needs; identify key questions, or investment decisions; focus the question on forward-looking rather than backward-looking issues; to not settle for data at hand, but collect additional data to understand problem thoroughly; clean the data; and limit challenges to the data’s validity by standardizing definitions and processes for generating reports (“Barriers”, 2017). This is a solid process in determining that the tools you are using, along with the ability to believe that the analytics will work, will drive the company in the correct direction.

ReferencesBarriers to effective use of human capital analytics: Focus and strategy are needed to make the data useful. (2017). Human Resource Management International Digest, 25(7), 30-32. doi:10.1108/HRMID-08-2017-0139

Bickham, T. (2016). ATD talent management handbook. Alexandria, VA: ATD Press.

Boudreau, J., & Cascio, W. (2017). Human capital analytics: Why are we not there? Journal of Organizational Effectiveness: People and Performance, Vol. 4 Issue: 2, pp.119-126, https://doi.org/10.1108/JOEPP-03-2017-0021

Harris, J., Craig, E., & Light, D. (2011). Talent and analytics: New approaches, higher roi. Journal of Business Strategy, 32(6), 4-13.

Sharma, A., & Sharma, T. (2017). Hr analytics and performance appraisal system: A conceptual framework for employee performance improvement. Management Research Review, 40(6), 684-697. doi:10.1108/MRR-04-2016-0084

Literature Review on Work-Life Balance



Literature Review on Work-Life Balance

Student Name:

University:

Subject:

Instructor:

October 7, 2013.

AN ANALYSIS OF A LITERATURE REVIEW ON WOK-LIFE BALANCE

Literature work on such topics: work life, culture at work place and maternity and children care is intertwined and tends to complement one another from this, work life promote healthy environment for all workers to work in a dedicated manner towards the realization of their respective organization’s goals (Redmond, Valiulis, Drew, 2006).

This paper utilizes is theoretical review which is a specialized review, compares and presents various concepts or theories drawn from the same topic founded on assumption.

Literature and findings on work-life balance

The ladies who are expectant within a particular work environment are likely to look around and interrogate how the others who have been in the same situation have been treated and make their decisions based on this.

The issue that is visible from this literature work is that there is increased clamor for work places to be transformed through injection of work-life balance as the steering principles. Though these transformations are likely to face some challenges but will in the long attain the designed gains both to an individual and their organization.

It is apparent that some organization have always put in place measures that are aimed at derailing or crippling change but there is a good number of them that have moved a notch higher to put in place mechanism of improving their recruitment processes, retaining highly skilled work force and motivating their employees so as to better their performances.

This research has some undersides. For example, it didn’t include those workers that have no children and given that its first concentration was on parents. However, these people will automatically be parents at one time and their quest to have children or not will be pegged on the prevalent working conditions at their respective working places.

In addition to this, the attitude of these workers towards their colleagues who have children is not known. This can therefore be a basis for results that doesn’t reflect the views of a wider workforce.

Secondly, the effects of future employment practices on cohorts are not known. According to the author, Fine Davis et al (2004) research in four countries makes an observation of key areas that ought to be further researched on. He notes of the need for additional information so as to have a better understanding of the challenges facing working parents and also inform the policies that should be addressed. Advancement of equitable work-life guidelines with tune workers going both individuals and the collective group, women to be relined work-family responsibilities, men to actively participate in handling domestic matters, employees to initiate sufficient work place flexibility. To him these issues ought to be thoroughly researched on in order to come up with proper policy programs of promoting work-life balance and general working conditions.

There appears to be complete blackout on the role played by men when handling crisis pregnancies. Also it has been noted that majority of mother are willing to switch their jobs for child bearing. There are not clear justification but suggested reasons are pay disparities of gender, gender-biased labor markets, work place policies that mostly deters fathers from seeking that not more pressure on fathers. Also in case of crisis pregnancies it is not known whether the working behaviors of father’s do influence the decision to keep a child or not.

As a result of this one is likely to influence decision-making on child arrangements but it is not clear to what level are these decisions made between couples or solely by one.

The literature Review has a number of limitations. For instance, potential results of some researchers have not been maximized. This can be attributed to the framing of question that limits respondents or ill-phrased, also from only unionized employees thus excludes views of non- unionized workers. In addition to these, the ICTU Study deployed postal questioning as a methodology is agreeably less effective in attaining high number of respondents than say one- on- one or phonier interviews moreover, the studies are not standardized and this hinders comparisons and contrasts a process that is very vital in obtaining a comprehensive view point of particular research sample. Finally there instead of passed opportunities for example the child minders the level of study (2004) the target of this study was to examine the link between the child-minders and state institution. Therefore its limited scope on looking into issues like income, levels of training, routines and proposals for adjustments was an example of a lost opportunity.

Literature and findings on workplace culture

The author argues that both national and international literature that is about the implementation of work-life policies proposes that:

First, policy implementation should be a product of consultations and effective communication forms the basis of these consultations.

Secondly, flexible working programs should be piloted on small scale before they are fully implemented on large scale so as to maximize its efficacy.

Thirdly, any proposal to adjust work arrangements must be a reflection of the views from all cadres of workers. This will make these employees to own up the process and feel obligated to work towards the success of the programs.

Finally, real action must be taken instead of further policy initiatives that are rarely implemented. This will boost employee confidence in their organizations.

Innovations at work place be enhanced and spread as the main strategic reaction to prevalent and irrigable challenges. Additionally, a 3-year fund should be created and advanced to the national centre for partnership and performance (NCPP). This will promote innovative into human resource management. Redmond, Valiulis, & Drew (2006) observe that there should be deliberate measures of promoting flexible working policies so as to foster proper and efficient workmanship at workplaces.

The author notes that a research carried out by Families and work institute concluded that work place culture holds the key to institutional transformation. They propose a four stage by stage approach that will finally culminate into a paradigm reorganization of workplaces. These stages are: Stage I: Grass root child care and woman’s affairs are addressed here. Stage 2- Human resource recruitment and retention of employees is sorted at this point. Stage 3,-cultural change, emphasize on the need to transform work redesigning through the above 4 pronged approach; the entire work place culture can be transformed for the better.

Literature and findings on maternity and Childcare and maternity issues

The following recommendations have been put forward for implementation. First, there should be deliberate measures of supporting women to re-join their workplace after giving birth.

Secondly, the possibility of public- private partnership in the provision of childcare services should be put into practice so as to enhance proper and quality service delivery.

Finally, for there to be increased quality and standards of the services provided, quality controls and provision of subsidies to child care centers should be practiced.

On practical terms, international literature has shown that result oriented strategies should be pursued. For example a study in Scotland where new childcare partnership in majority of local areas which included the provision of childcare services provision; there were records of improved services that were provided by these childcare facilities.

Recommendation for further research

There is a proposal that further research ought to be done on work life balance in Ireland, knowledge in Irish chapter extensive research in the following areas is necessary.

First, there should be practical policy frameworks on how to implement, manage and supervise work related policies in different work places.

Secondly, there should be further surveys in Ireland to understand the gains and challenges that employees who have implement flexible policies are experiencing

Thirdly, a more detailed study on the efficiency or redundancy/ ineffective of specific policies that are needed in specific cases should be conducted.

Finally, there should be further studies on the dynamic nature of roles played by mothers and fathers and also on gender divisions in domestic roles of each and whether flexible policies aid or cripple traditional gender roles.

The above proposals will be productions if further out case studies of individual work places or through pilot projects covering a number f work place

The following are suggested studies and are based on the above proposals.

Study 1

There should be a number of surveys in a range of organization to determine their gains and challenges of implementing work life balance policies.

Study 2

There ought to be interrogation of frameworks and proposals in relation to implementation of work life balance policies in each organization so as to effect of these policies can be realized.

Study 3

A quantitative study be carried out and the survey shall feature variables like; age, occupation, status, earning and parental status.

Study 4

A combined qualitative and quantitative survey be explored with an aim of studying the success of specific work place policies, this study will determine formally or informally, the take up of rate of each type and the extent of implementation

Study 5

This study will be on attitude survey on whether flexible policies backed the old gender obligations at work and home.

Study 6

This study shall accommodate questionnaire that shall be sent organization managers both in small and medium sized enterprises and will address specific issues like; their views on their role in aiding employees to attain work-life balance, their respective experiences in implementing flexible working in terms of cost and organization.

In summary, this literature review may have a number of limitations, but it does propose a number of recommendations that if fully implemented, work-life balance will be attained.

Reference

Redmond,J. & Valiulis,M.&Drew,E (2006). Literature review of issues related to work-life

balance, Workplace culture and maternity/childcare issues, NO 6.

Best Part of Life in Surrey, England

Best Part of Life in Surrey, England

Student’s Name

Institution

Best Part of Life in Surrey, England

Surrey found in England is one of the best places to be regarding living and working as it is referred to a home county. The county is well known for its beautiful sites which attracts a large number of tourists and it appropriate demographic location. It is located in the Southwest of London bordered by Sussex to the South, the Greater London conurbation to the northeast, Hampshire to the west, Kent to the east and Berkshire to the northwest. Its strategic locality is suitable and facilitates its economic development regarding accessibility regarding transportation by the railway and air means among others. Among the areas that will be elaborated into a profound extent in this essay in relevance to life in Surrey include the history and language, education, food and local diet, housing and transportation, laws, customs, and manners.

To begin with, it the history and language of the Surrey region. Looking back on the county’s history, its old city was Guildford even though in late 1893 upon the Thames, Surrey’s county administrative council was relocated to Kingston. It is densely populated with a population of around one million and two hundred thousand residents. The most large town Surrey is Guilford followed by Woking city and Ewell emerging the third with a total number more than forty thousand people. Besides having many beauty spots such as Leith Hill, Box Hill, and Newlands Corner, the county is well known to contain significant mature woodlands. The woodlands win it the title of the top forested section in the Great Britain (Kluge & Negt 2014). The name Surrey originated from Saxon which meant South Ridge and there afterward the place was named Sudergeona in other words southern.

Up to date, at Holmbury Hill there exists a Middle Age hillfort and bits and pieces of the Roman roads Ermine Street and Stane Street. The designation of Aristocrat of Surrey was individual as compensation for fidelity during the rebellion that shadowed the demise of William I of England, with the signing of the great charter in 1215 at Runnymede. The primary language spoken by the residents of Surrey is English which is used by over ninety percent of the population. It is evident through research that the borough with the highest population speaking English is Tandridge and the lowest tend to be Woking with around eighty-nine English speakers. Even though, there is a small number of residents who communicate using other languages such as the Surrey local accent the central dialect in Surrey is the English language as the most historically spoken language (Barrett, 2016). Surrey County has a higher percentage of English speakers then the percentage of people who speak English in England.

Furthermore, the other point of consideration regards the laws, customs, and manners of the Surrey’s society. In this county, there are regulatory bylaws passed by the city council to enhance better living of the people. The Bylaws covers and provides information about every niche the one can think ranging from the personal life, working, developing, living, visiting the environmental conditions in Surrey (Palovic, et.al 2014). For instance, there are laws related to noise pollution, cutting down on trees, pet-owning licensing and putting up a swimming pool among many others. The bylaws are legally passed and efficiently developed to facilitate accuracy and enhance resident’s convenience and well-being.

The people of Surrey has an excellent and recommendable culture of supporting development especially in the issues regarding social-economic life and technology. That is the reason behind the county being among the wealthiest regions in England. The cultural values of the community are welcoming and do not restrict visitors to live among the people as the standard language used is English. The Surrey people are ethical and have upright moral manners making it possible for every person to socialize and work with them Magnarella, 2015). Their customs are encouraging and provide a high motivation for working whether it is in business or any other sector. The people’s culture in the county plays a significant role in beautifying the region not only for the betterment of its residents but also for other tourists and visitors who come to work and stay in Surrey. The customs are favorable, and surely the county has healthy boundaries of expansion regarding its growth and development being the best place to work in.

In consideration of food and local diet, Surrey has dramatically improvised in the food industry where sites to takes meals are all over the cities. Places to eat include restaurants, cafes, coffee shops, pubs dining, sandwich shops, tea rooms and takeaways among many others. There is an endless list of the food eaten in Surrey include meat, fruits, eggs, fish, honey, deli foods cakes and drinks such as local beer, tea fruit, juice local and wines organic among many other. The county also holds events such as cookery classes and farmers markets which focuses on improving the food diet and teach people the significance of proper eating (Macdiarmid, 2014). Promoting healthy eating is essential not only at the individual level but also to the society at large as people will be more productive. It is mainly achieved by making people aware of the facts on healthy eating to the clients and staff of firms dealing with food. Surrey is renowned for gardening, hence farming is an excellent source of local diet.

Housing and transportation facilities in Surrey are advanced and adequately constructed to enhance proper running the everyday activities. There are adequate houses especially around the cities where one can acquire on or rent for a stay either permanent or temporal living. There are lodgings all over the restaurants and other recreation bases where the visitors can have a stay at affordable prices depending on the individual’s capability. The residential is constructed in modern technology and are well designed with adequate fresh air circulation and free prom pollutions which in many instances becomes a threat of living in urban areas. The housing facilities motivate one to live near the working place resulting in efficiency and time keeping in attending daily duties. Also, the county has not been left behind in developing transport system facilities which are essential in enhancing swift movement in and out of the county. There are highways constructed as well as airports and railway stations to facilitate fast transportation. The road networks pass across the houses not only in urban areas but also in the rural region thus efficient transportation (Williams, 2017).

The education sector cannot be left behind as it is one of the most developed and emphasized areas in Surrey county. Surrey schools do not only benefit the people of this county but also gives opportunities for more than two thousand students joining the learning institutions internationally. The children are catered for in the education field from the tender age where they are supposed to join nursery school at the tertiary level. For the tertiary level, there are some colleges and universities such as University of Surrey among many others which offer undergraduate programs and higher education including masters, and Ph.D. Education is vital to human growth and development, and Surrey is the best place to study at as quality tutoring services are provided (Kinchin, et.al 2017).

As discussed above, Surrey is the best place to work and live at as there is a diversity of success and attainment of new skill and knowledge on top of what one has acquired. The conducive and friendly environment is a crucial stimulator in every field that one might be working at hence higher possibility of succeeding. Move a step forward by visiting the place to have an experience of what is elaborated above and inevitably there will be an urge of having a stay in Surrey.

References

Barrett, M. (Ed.). (2016). The development of language. Psychology Press.

Kinchin, I., Hosein, A., Medland, E., Lygo-Baker, S., Warburton, S., Gash, D., … & Usherwood, S. (2017). Mapping the development of a new MA programme in higher education: comparing privately held perceptions of a public endeavour. Journal of Further and Higher Education, 41(2), 155-171.

Kluge, A., & Negt, O. (2014). History and obstinacy. Zone Books.

Macdiarmid, J. I. (2014). Seasonality and dietary requirements: will eating seasonal food contribute to health and environmental sustainability?. Proceedings of the Nutrition Society, 73(3), 368-375.

Magnarella, P. J. (2015). Review of Legal Pluralism in Action: Dispute Resolution and the Kurdish Peace Committee, by Latif Tas: Surrey, Ashgate Press, 2014, xv+ 207 pp., UK£ 70.00 (hardcover), ISBN 978-1-4724-2208-8.

Palovic, Z., Kam, S., Janta, H., Cohen, S., & Williams, A. (2014). Surrey think tank–reconceptualising visiting friends and relatives (VFR) travel. Journal of Destination Marketing & Management, 2(4), 266-268.

Williams, K. (Ed.). (2017). Spatial planning, urban form and sustainable transport. Routledge.

A pinto collision is where a vehicle struck from behind by a low-speed driven on-coming vehicle explodes into fire despite th

A pinto collision is where a vehicle struck from behind by a low-speed driven on-coming vehicle explodes into fire despite the little impact. Mostly was associated with the Ford Pinto car developed in the early 1970s. The Pinto gasoline tanks were defective since they often caught fire during road collisions and caused the death of many drivers. The problem was mostly caused by broken filler necks, which allowed fuel to pour out and easily ignite. After a collision, the fuel tank was also penetrated by differential mounting bolts and shock absorber on the right.

A recall coordinator decides to recall after the affected victim; the owner of the vehicle is compensated for the loss of the vehicle due to the defects. A recall is mainly directed to the manufacturer to rectify the problem. The car did not perform worse in crash tests compared to other vehicles. Gioia, in his article, speaks of the bad decisions he made as a recall coordinator without any accountability. Most of the decisions they were making were in favor of the corporation. The organization’s culture was bound together and was working towards protecting its image.

Beowulf Upon reading the heroic epic poem,

Student’s Name

Instructor’s Name

Course Tittle

Date

Beowulf

Upon reading the heroic epic poem, Beowulf which is well thought out to be one of the most important masterworks of Anglo-Saxon writings, and watching the animated version of it, I have recognized some differences and similarities of interpretation. The Film Beowulf, directed by Robert Zemeckis, is an animated movie with the Anglo-Saxon poem version. The film director chose this kind of literary work as it has a piece of very significant information on the subject of controversies and relationships of the society and kingship in Old England. Additionally, the poem is tremendously thrilling and encompasses many amazing, brilliant characters and descriptions. There are a number of differences and similarities between the sections of Beowulf discussed in class, and the analog animated film screened during the three Beowulf lectures available on Canvas in terms of Grendel’s combat with Beowulf and how Grendel passes away, Beowulf’s characteristics, Hrothgar and his actions, Grendel’s mother and her fight with Beowulf, Beowulf’s realm and the combat with the dragon. The dissimilarities between Beowulf the movie and Beowulf the poem are very large. The characteristics of Beowulf seen on the screen are somehow dissimilar from the characteristics in the Anglo-Saxon poem. 

Beowulf is roughly categorized into three parts, all of which focuses on Beowulf’s combat with a specific monster: first Grendel, then Grendel’s mother, lastly, the dragon. In both the film and the poem, the main themes mirror the motivations and the values of the personalities. One of the leading themes of Beowulf, personified by its designation character, is loyalty. To begin with, the animated film portrays Beowulf as a man of imperfection and flaws. Another thing is that the depiction of Unferth and Hrothdar is not similar to the representation in the poem. In the film, Hrothgar is portrayed as a degraded alcohol addict, while Unferth carries characteristics of a pietistic Christian. In the animated film, Grendel’s mother’s representation is slightly not accurate as she is demonstrated as an attractive, seductive woman, the dragon (Beowulf’s child), and mother of Grendel’s (Hrothgar’s offspring). Another thing is that Beowulf turns out to be the ruler of the land of the Danes rather than becoming the king of his native Geatland.

Grendel’s mother is regarded as a huge swamp-like monster who could not be pierced by a mere sword in the poem. According to Beowulf the poem, “it was then he saw the size of this water-hag, damned thing of the deep…He dashed out his weapon, not stinting the stroke, and with such strength and violence that the circled sword screamed on her head a strident battle-song. But the stranger saw his battle-flame refuse to bite or hurt her at all; the edge failed his lord in his need” (Ln.1517). On the other side, Grendel’s mother is seen in the film as a very seductive monster that seems to be very lovely and attractive; Beowulf’s sword pierces precisely through her body. They then involve themselves in sexual intercourse. In the animated film, Grendel’s mom murders Beowulf’s men before he contests the dragon. On the other hand, it never occurred because she had passed on.  

One thing is that apart from being an animated adaptation of the Old English poem, Beowulf’s film does not disappoint in any way. The construction of the elementary plot and the animated film’s storyline follows that of the imaginative literary source. As seen in the poem, Hrothgar, the ruler of Denmark, is troubled by a ferocious monster known as Grendel. It was after Beowulf comes to Denmark to kill it. Following the poem, Beowulf cuts off the giant’s arm, which on the other hand, succeeds in running away but dies from the injuries. Not so long, Grendel’s mother alternatively revenges her killed son by murdering a lot of men, which results in Beowulf pursuing after Grendel’s mom and kill her too. He gets back with Grendel’s head and is abundantly remunerated by the Danes. One common thing is that in the poem, Beowulf does not have any familial relations with Grendel’s mother or the dragon, and Hrothgar, Grendel, and Grendel’s mom are not connected to one another as in the film. 

To conclude, the film preciously bears a resemblance to the heroic poem in a way that there are some differences that the motion picture director did not take into consideration. The poem depicts Beowulf as the main hero who returns to Geatland to become the ruler of his uncle’s monarchy. On the other hand, in the film, Beowulf remains in the realm of the Danes and becomes the ruler of the Hrothgar’s kingdom. Additionally, in the poem, he murders Grendel’s mother, whereas, in the animated film, they engage in sexual intercourse, and after that, Grendel’s mother gives birth to a dragon-like child. In the poem, Beowulf has never involved in any sexual contact with Grendel’s mother. At the end of the film, the dragon which Beowulf endures is not his child. It is an unsystematic hovering monster that he combats when getting back home to Geatland to be present at the coronation and turn out to be a fair-minded king.

 

A Perspective on Self-Efficacy Beliefs for Academic Achievement

A Perspective on Self-Efficacy Beliefs for Academic Achievement

Introduction

The day-to-day endeavors of living are mostly directed by underlying self-systems that

strengthen and guide our aspirations and motivation for working towards accomplishing goals

and seeking achievements. The self-systems guide our pursuits and determine our performance.

In this regard, raising academic performance of students has been a vital challenge. All efforts

need to be directed towards this challenge by helping students not only through skill acquisition

but also by fostering the self-systems which help them to be more persuasive in their efforts for

academic achievement. An understanding of self-systems with particular reference to self-

efficacy proves to be a potent factor because "these self-systems house one’s cognitive and

affective structures and include the abilities to symbolize, learn from others, plan alternative

strategies, regulate one’s own behavior, and engage in self-reflection" (Bandura,1977). Self-

efficacy has a relatively brief history that began with Bandura’s (1977) publication of "Self-

Efficacy: Toward a Unifying Theory of Behavioral Change". Self-efficacy refers "to subjective

judgments of one’s capabilities to organize and execute courses of action to attain designated

goals" (Bandura, 1977 and 1997). Self-efficacy beliefs can therefore be extensively applied and

potentially used in the field of educational research, particularly in the area of academic

motivation and achievement (Pintrich and Schunk, 1995).

The Role of Self-efficacy Beliefs

Self-efficacy beliefs center around what a person can do rather than personal judgments about

one’s physical or personality attributes. The level of self-efficacy refers to its dependence on

difficulty level of a particular task; generality of self-efficacy beliefs refers to the transferability

of one’s efficacy judgments across different tasks or activities such as different academic

subjects; and strength of efficacy judgments pertains to the certainty with which one can perform

a specific task (Zimmerman, 1995). When students begin to doubt their capabilities, it becomes

detrimental as they slacken their efforts and give up quickly in the face of difficulties, have low

aspirations and are most likely to encounter stress. They view insufficient performance as

personal deficiencies and do not concentrate on how to perform successfully.

Self-efficacy beliefs influence not only motivation levels but also offer resilience to adversity

and avert vulnerability to stress and depression. The stress and anxiety levels required to

accomplish a task are also influenced by efficacy beliefs. Research findings over the past 20

years have generally supported the argument that "efficacy beliefs mediate the effect of skills or

other self-beliefs on subsequent performance attainments" (Schunk, 1991; and Bandura, 1997).

The findings of Bouffard-Bouchard et al. (1991) show that students with high self-efficacy are

engaged more in effective self-regulatory strategies at each level and this ability enables them to

cope with anxiety and stress, which can facilitate enhancing memory performance.

This indicates that these beliefs influence motivational and self-regulatory processes in several

ways. For accomplishing a particular task, they influence the choices people make and the

courses of action they pursue. This typically manifests in student behavior where they engage in

tasks in which they feel competent and confident and avoid those in which they do not.

Therefore, self-beliefs facilitate control over the events. According to Pajares Frank (1996),

beliefs of personal competence "determine how much effort people will expend on an activity,

how long they will persevere when confronting obstacles and how resilient they will prove in the

face of adverse situations". This indicates that higher the sense of efficacy, the greater is the

effort for persistence, persuasion and resilience. These findings are further substantiated by

researchers who have also demonstrated "that self-efficacy beliefs influence effort, persistence,

and perseverance" (Bandura and Schunk, 1981).

List of References

Bandura A (1977), ‘Self-efficacy: Toward a Unifying Theory of Behavioral Change’,

Psychological Review

. 84, 191-215

——–, (1986),

Social Foundations of Thought and Action: A Social Cognitive Theory

,

Englewood Cliffs, Prentice Hall, NJ

———, (1997),

Self-efficacy: The Exercise of Control, Freeman

, New York

Bandura A and Schunk D H (1981), ‘Cultivating Competence, Self-efficacy, and Intrinsic

Interest Through Proximal Self-motivation’,

Journal of Personality and Social

Psychology

, 41, 586-598

Bouffard-Bouchard T, Parent S and Parivee S (1991), ‘Influence of Self-efficacy on Self-

regualtion and Performance Among Junior and Senior High-School Age Students’,

International Journal of Behavioral Development

, 14, 153-164

Pajares F and Johnson M J (1996), ‘Self-efficacy Beliefs in the Writing of High School Students: