Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the study, but must be clearer with your research questions as two are very similar. Your literature review is reasonable, but includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim and objectives. The rationale and significance of the study are not clear. You need to use a specific theory to understand the subject matter. The review seems to be done on mobile banking in general. It should include ideas about security issues with mobile banking. The review needs to be more critical. Research methodology needs to be connected to the research questions. You need to show the number of studies you are going to systematically review. If Meta-analysis is the main method to answer the research questions, you need to review studies on the same topic and show how you are going to do Meta-analysis with an appropriate analysis tool. Potential outcomes need to be explained with good evidence of analysis. The writing structure is fine but you need to improve your English with good grammar and academic writing. Referencing follows the Harvard style despite a few journal references have been used in the proposal.
MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking. Technology has brought the ease of doing a financial transaction to the finger-tips. However, this radical developmental has also lead to great negative impacts on the customers due to security issues. This study seeks to investigate the Security Issues in Mobile Banking System of the Maldives and its Effect on Customers.
With the existing literature that demonstrates the Mobile Banking and security issues and measures to counter, the study will use Meta-analysis to bring a statistical solution to fill the knowledge gap in the context of the research. Moreover, existing models will be critically reviewed to find solutions to the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1 Research Question 6
1.3.2 Research aim 7
1.3.3 Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Col.
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
Internet banking offers many benefits but little research has been done about its acceptance in Mauritius. This paper aims at assessing the factors that contribute to the adoption of internet banking in Mauritius. To support our arguments, we use a logistic regression model based on a sample survey to analyze the factors that influence internet banking in Mauritius. We conclude that factors such as age, income, service usefulness, risk factor, checking account frequency and internet location are the main determinants for a person to opt for online banking
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesIOSR Journals
ABSTRACT:Mobile banking is a newly added service in the banking sector that facilitates banking via mobile devices. With the tremendous growth in mobile phone usage, banks in the developed world have moved to utilize mobile banking, which makes banking easier, faster, and very cost-effective. Mobile phones have quickly emerged as a successful and popular means of communication in recent years and the researchers believe that growth of mobile banking in Bangladesh is inevitable, especially when banks do not have sufficient number of branches in the rural areas of Bangladesh. The purpose of this research is to assess the Opportunities and Challenges of mobile banking in this country. To accomplish this empirical study, multiple banks have been surveyed which either currently have an operational mobile banking in place or planning to introduce one in the near future. The research shows tremendous potential for mobile banking in Bangladesh and reveals some of the key barriers of progress as well. KEYWORDS:Banking Sector, Mobile banking, Mobile Phone, Rural Areas, Telecommunication.
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
Internet banking offers many benefits but little research has been done about its acceptance in Mauritius. This paper aims at assessing the factors that contribute to the adoption of internet banking in Mauritius. To support our arguments, we use a logistic regression model based on a sample survey to analyze the factors that influence internet banking in Mauritius. We conclude that factors such as age, income, service usefulness, risk factor, checking account frequency and internet location are the main determinants for a person to opt for online banking
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesIOSR Journals
ABSTRACT:Mobile banking is a newly added service in the banking sector that facilitates banking via mobile devices. With the tremendous growth in mobile phone usage, banks in the developed world have moved to utilize mobile banking, which makes banking easier, faster, and very cost-effective. Mobile phones have quickly emerged as a successful and popular means of communication in recent years and the researchers believe that growth of mobile banking in Bangladesh is inevitable, especially when banks do not have sufficient number of branches in the rural areas of Bangladesh. The purpose of this research is to assess the Opportunities and Challenges of mobile banking in this country. To accomplish this empirical study, multiple banks have been surveyed which either currently have an operational mobile banking in place or planning to introduce one in the near future. The research shows tremendous potential for mobile banking in Bangladesh and reveals some of the key barriers of progress as well. KEYWORDS:Banking Sector, Mobile banking, Mobile Phone, Rural Areas, Telecommunication.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?IAEME Publication
This research was conducted to find out customer's response in digital banking
era using TAM and UTAUT model. Questionnaires filled bank account owner who
have often used digital banking. Results based previous research most customers have
been able to adjust to the digital banking. There is short comings facilities in digital
banking i.e. small banks still use digital banking as window dressing to attract
customers, the front-page display is too confusing, often broken, security is not
guaranteed. Recommendations have been given to the bank's management, as input
for improvement in the future.
Internet banking is becoming increasingly popular due to convenience and flexibility it offers. Banks are forced to promote online banking services to enhance its operations
with reduced cost of operations. This particular research has been conducted to evaluate the customer perceptions towards internet banking in the United Kingdom. A sample of 100 UK based banking customers was selected. The sample selection was made by the convenience sampling technique. Qualitative and quantitative methods have been applied to evaluate the research objectives. Through descriptive analysis of research findings, it has been evaluated that customers perceive internet banking services reliable and secure. However, some of the older respondents did not feel
convenient to use internet banking and they might have higher security concerns while using internet banking. The dimensions of privacy, security, convenience and time
savings was perceived positively by the customers. The research represents future implications for the internet bankers who can attract more online customers by arranging
stronger measures of security, and privacy. The results of this particular research are limited to the sample size and questionnaire made. The future researchers have the
opportunity to expand the boundary of knowledge of current research by taking a large and diverse sample.
A Study on Factors of E Banking Challenges in Indiaijtsrd
The customer uses the banking services through online banking, mobile phone banking and automated teller machine these were are called as 'E Banking. This study aimed to describe the customer view about the banking services through E banking. Customer service is also a part of the banking, this paper will tell about the customer satisfaction level about the e banking will explain through the pilot study. Dr. S. Saravanan | M. Dharani "A Study on Factors of E-Banking Challenges in India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31147.pdf Paper Url :https://www.ijtsrd.com/management/accounting-and-finance/31147/a-study-on-factors-of-ebanking-challenges-in-india/dr-s-saravanan
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docxvannagoforth
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLINE BANKING
Introduction
With evolution in Information technology, many industries have extended their operations by going on internet. Information management primary focus was on technology initially, but later companies realized that information will be valuable to organization only if certain policies and procedures are implemented to control, govern and monitor the analysis, use, access, protection and retention of that information. Banking industry has undergone structural and performance changes over time and online banking transformation is the latest among all transitions, there are not many innovations that has transitioned the business of banking as soon as the online banking revolution. This transition enabled banking industries to offer its services to their consumers anytime and anywhere. Online banking was first implemented in US called Security First Network Bank since then this development had wide spread across all countries. Services offered by online banking has been categorized into three levels, the first one is considered as basic i.e., bank’s websites which is used to share information regarding the different services and products offered to the new and existing customers by the bank and also for answering basic queries of the customers, the second level is called transactional websites which allows its customers to provide their information or submit applications for services offered, view their account balances, access any other available services but this level doesn’t allow any fund-based transactions, and the third level is considered as fully transactional where customers can perform fun-based transaction and pay any other bulls or make any purchases. Online banking also came with many potential risks which increased the necessity to enhance the mechanism of risk prevention, to escalate the formation of standards and laws relating to e-commerce, and to strengthen the information development. The research will be primary focused on the following question: Why is it so important for banking industry to consider the factors of privacy in policy-making?
Background
Ensuring privacy is very vital objective in every organization as it relates to the trust of its customers. Though online banking has made all the operations user friendly it also created many challenges in terms of privacy of personnel and financial security. Cyber-thieves took the advantage of this evolution by pretending and accessing the online account illegally to rob money and this also led to the exposure of personal and private information to the hackers. Governance of information has emerged into banking industry to overcome such threats and control the movement and creation of information. The main objective of information governance and policy inventions in banking domain is to avoid the unauthorized access to the data, to shield the frequent use of database and network that add value to or ...
Customers perception of m banking adoption in of bahrain an empirical assess...IJMIT JOURNAL
Mobile applications have been rapidly changing the way business organizations deliver their services to
their customers and how customers can interact with their service providers in order to satisfy their needs.
The use of mobile applications increases rapidly, and has been used in many segments including banking
segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role of
factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended TAM
model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The model
was evaluated using a sample survey of 372 customers. The results reveal that the intention to adopt mobile
banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of Use. On the
other hand, some factors such as perceived cost and perceived risk did not show any affect on the users'
intention to use mobile banking. The result of this research is beneficial for banking service managers to
consider the factors that can enforce the Mobile Banking services adoption and increase the take-up of
their mobile services.
Customers perception of m banking adoption in kingdom of bahrainIJMIT JOURNAL
Mobile applications have been rapidly changing the way business organizations deliver their services to
their customers and how customers can interact with their service providers in order to satisfy their needs.
The use of mobile applications increases rapidly, and has been used in many segments including banking segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role of factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended TAM
model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The model
was evaluated using a sample survey of 372 customers. The results reveal that the intention to adopt mobile
banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of Use. On the
other hand, some factors such as perceived cost and perceived risk did not show any affect on the users'
intention to use mobile banking. The result of this research is beneficial for banking service managers to consider the factors that can enforce the Mobile Banking services adoption and increase the take-up of their mobile services.
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
Oral "Pseudo-Defense" PPT Dropbox
Please submit here a narrated PowerPoint for your final presentation of your thesis proposal. Remember that this is not you reading a paper -- this is more of a "sales pitch" than anything if you're in need of a metaphor.
Requirements:
- Must be Narrated. Must be narrated. TEST IT BEFORE SENDING. I should be able to open it up and hit Present/Play and just let it go. If you fail to meet this requirement you will automatically lose 30% of the grade (3/10 possible points).
- Introduction topics, including criteria such as your project motivation, the gap/needs that brought you to it, and what significant considerations and context surround the topic area
- RQs/Hypotheses/Objectives, operationalized and justified. There should be NO ambiguity here. (Remember, "What is the impact of Big Data on Security" or "How do we make X better?" are not specific enough.)
- Literature Review, presented as the primary topics you separated your review into, the reason they are important and frame your study successfully, and what key sources/authors you identified (the important few). Discuss how this literature further informed your research agenda, methodology, and consideration of conclusions/limitations for your thesis
- Methodology, as precise as you can make it. Sample, collection, framework (if qualitative), analysis, intended outcome
- Conclusion, timeline and future projections of issues, routes to completion, etc.
MOBILE SCAN PAYMENTS SECURITY ISSUES AND STRATEGIES
VINIL REDDY KASULA
ID#210243
HARRISBURG UNIVERSITY OF SCIENCE AND TECHNOLOGYResearch Methodology & Writing (GRAD 695)
Professor-Richard Wirth
MOBILE SCAN PAYMENT
3
Table of Contents
ABSTRACT 4
1. Introduction 5
1.1 Background 5
1.2 Research aim and objectives 7
1.3 Research questions 7
Research question 1 7
Research question 2 8
Research question 3 8
1.4 Problem statement 8
1.5 Significance of the study 10
1.6 Relationship to CPT 11
LITERATURE REVIEW 11
MOBILE PAYMENT SYSTEMS 12
Mobile payment platform 13
Independent mobile payment system 14
MOBILE PAYMENT SECURITY 15
THREATS IN MOBILE PAYMENT SYSTEMS 17
Research Background and Rationale 18
Research Aims and Objectives 19
Research Questions 19
Research Methodology 19
Ethical Considerations 22
Limitations of the Research 23
Research Timeline 23
CONCLUSION 24
References 25
ABSTRACT
In the present decade and the modern age, mobile payments as a medium for financial transactions have gained much popularity. Mobile technology has emerged as a clear and new channel in the space of banking and payment transactions. With the significant advancement in the field of technology have made this field as one of the burgeoning growth in the financial services. People are involved in the application of the widespread smartphone technology and the customers are very comfortable with their mobile devices as a form of communicating device and this has resulted in the increased interest in .
Feedback Assignment Set 4Great job on this assignment. I know yo.docxmglenn3
Feedback Assignment Set 4
Great job on this assignment. I know you know how to do WACC. I am not sure if you rushed on th second answer or if it was a typo but you did give an incorrect answer.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly calculated Bad Boys, Inc.'s cost of capital.
Feedback:
Great job showing your work and getting correct answer.
23.7 (23.7%)
Points Range:21 (21%) - 23.7 (23.7%)
Partially calculated Bad Boys, Inc.'s cost of capital.
Feedback:
In this section you provided the wrong answer.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly identified two corporations that have dealt with cannibalization and what steps were taken to overcome cannibalization. Thoroughly provided citations and references.
Feedback:
Great job explaining cannibalization and giving examples.
10 (10%)
Points Range:9 (9%) - 10 (10%)
0-2 errors present
Feedback:
no errors detected.
C y b e r A t t a c k s
“Dr. Amoroso’s fi fth book Cyber Attacks: Protecting National Infrastructure outlines the chal-
lenges of protecting our nation’s infrastructure from cyber attack using security techniques
established to protect much smaller and less complex environments. He proposes a brand
new type of national infrastructure protection methodology and outlines a strategy presented
as a series of ten basic design and operations principles ranging from deception to response.
The bulk of the text covers each of these principles in technical detail. While several of these
principles would be daunting to implement and practice they provide the fi rst clear and con-
cise framework for discussion of this critical challenge. This text is thought-provoking and
should be a ‘must read’ for anyone concerned with cybersecurity in the private or government
sector.”
— Clayton W. Naeve, Ph.D. ,
Senior Vice President and Chief Information Offi cer,
Endowed Chair in Bioinformatics,
St. Jude Children’s Research Hospital,
Memphis, TN
“Dr. Ed Amoroso reveals in plain English the threats and weaknesses of our critical infra-
structure balanced against practices that reduce the exposures. This is an excellent guide
to the understanding of the cyber-scape that the security professional navigates. The book
takes complex concepts of security and simplifi es it into coherent and simple to understand
concepts.”
— Arnold Felberbaum ,
Chief IT Security & Compliance Offi cer,
Reed Elsevier
“The national infrastructure, which is now vital to communication, commerce and entertain-
ment in everyday life, is highly vulnerable to malicious attacks and terrorist threats. Today, it
is possible for botnets to penetrate millions of computers around the world in few minutes,
and to attack the valuable national infrastructure.
“As the New York Times reported, the growing number of threats by botnets suggests that
this cyber security issue has become a serious problem, and we are losing the war against
these attacks.
.
Feedback Financial Research Report Part 1Thank you for redoing a.docxmglenn3
Feedback Financial Research Report Part 1
Thank you for redoing assignment so quickly. The only area that I see that you can add more that may help along the second section of your paper is your client profile section. I have made notes above for your review.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Feedback:
Great job providing economic and financial factors.
26.7 (26.7%)
Points Range:24 (24%) - 26.7 (26.7%)
Satisfactorily suggested the primary reasons why the selected stock is a suitable investment for your client. Satisfactorily included a description of your client’s profile.
Feedback:
In this section you can provide more about the client. You stated what he is looking for but you did not state if client is married. You did not state if client has other liabilities that he is paying or what his overall financial situation is.
20.7 (20.7%)
Points Range:0 (0%) - 20.7 (20.7%)
No references provided
Feedback:
In this section you have reference but you do not have an annotated bibliography. It is incorrect.
10 (10%)
Points Range:9 (9%) - 10 (10%)
0-2 errors present
Feedback:
No errors detected.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 100
Assignment 1: Financial Research Report Part 1
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Provide a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Weight: 30%
Did not submit or incompletely provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Partially provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Satisfactorily provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Thoroughly provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
2. Suggest the primary reasons why the selected stock is a suitable investment for your client. Include a description of your client’s profile.
Weight: 30%
Did not submit or incompletely suggested the primary reasons why the selected stock is a suitable investment for your client. Did not submit or incompletely included a description of your client’s profile.
Partially suggested the primary reasons why the selected stock is a suitable investment for your client. Partially included a description of your client’s profile.
Satisfacto.
More Related Content
Similar to Feedback from Lee Smith-Dennis250320 1941You have produced .docx
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
DIGITAL BANKING MADE TRANSACTION MORE TRUSTED AND SECURED?IAEME Publication
This research was conducted to find out customer's response in digital banking
era using TAM and UTAUT model. Questionnaires filled bank account owner who
have often used digital banking. Results based previous research most customers have
been able to adjust to the digital banking. There is short comings facilities in digital
banking i.e. small banks still use digital banking as window dressing to attract
customers, the front-page display is too confusing, often broken, security is not
guaranteed. Recommendations have been given to the bank's management, as input
for improvement in the future.
Internet banking is becoming increasingly popular due to convenience and flexibility it offers. Banks are forced to promote online banking services to enhance its operations
with reduced cost of operations. This particular research has been conducted to evaluate the customer perceptions towards internet banking in the United Kingdom. A sample of 100 UK based banking customers was selected. The sample selection was made by the convenience sampling technique. Qualitative and quantitative methods have been applied to evaluate the research objectives. Through descriptive analysis of research findings, it has been evaluated that customers perceive internet banking services reliable and secure. However, some of the older respondents did not feel
convenient to use internet banking and they might have higher security concerns while using internet banking. The dimensions of privacy, security, convenience and time
savings was perceived positively by the customers. The research represents future implications for the internet bankers who can attract more online customers by arranging
stronger measures of security, and privacy. The results of this particular research are limited to the sample size and questionnaire made. The future researchers have the
opportunity to expand the boundary of knowledge of current research by taking a large and diverse sample.
A Study on Factors of E Banking Challenges in Indiaijtsrd
The customer uses the banking services through online banking, mobile phone banking and automated teller machine these were are called as 'E Banking. This study aimed to describe the customer view about the banking services through E banking. Customer service is also a part of the banking, this paper will tell about the customer satisfaction level about the e banking will explain through the pilot study. Dr. S. Saravanan | M. Dharani "A Study on Factors of E-Banking Challenges in India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31147.pdf Paper Url :https://www.ijtsrd.com/management/accounting-and-finance/31147/a-study-on-factors-of-ebanking-challenges-in-india/dr-s-saravanan
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLI.docxvannagoforth
ONLINE POLICIES TO ENSURE CUSTOMER PRIVACY IN ONLINE BANKING
Introduction
With evolution in Information technology, many industries have extended their operations by going on internet. Information management primary focus was on technology initially, but later companies realized that information will be valuable to organization only if certain policies and procedures are implemented to control, govern and monitor the analysis, use, access, protection and retention of that information. Banking industry has undergone structural and performance changes over time and online banking transformation is the latest among all transitions, there are not many innovations that has transitioned the business of banking as soon as the online banking revolution. This transition enabled banking industries to offer its services to their consumers anytime and anywhere. Online banking was first implemented in US called Security First Network Bank since then this development had wide spread across all countries. Services offered by online banking has been categorized into three levels, the first one is considered as basic i.e., bank’s websites which is used to share information regarding the different services and products offered to the new and existing customers by the bank and also for answering basic queries of the customers, the second level is called transactional websites which allows its customers to provide their information or submit applications for services offered, view their account balances, access any other available services but this level doesn’t allow any fund-based transactions, and the third level is considered as fully transactional where customers can perform fun-based transaction and pay any other bulls or make any purchases. Online banking also came with many potential risks which increased the necessity to enhance the mechanism of risk prevention, to escalate the formation of standards and laws relating to e-commerce, and to strengthen the information development. The research will be primary focused on the following question: Why is it so important for banking industry to consider the factors of privacy in policy-making?
Background
Ensuring privacy is very vital objective in every organization as it relates to the trust of its customers. Though online banking has made all the operations user friendly it also created many challenges in terms of privacy of personnel and financial security. Cyber-thieves took the advantage of this evolution by pretending and accessing the online account illegally to rob money and this also led to the exposure of personal and private information to the hackers. Governance of information has emerged into banking industry to overcome such threats and control the movement and creation of information. The main objective of information governance and policy inventions in banking domain is to avoid the unauthorized access to the data, to shield the frequent use of database and network that add value to or ...
Customers perception of m banking adoption in of bahrain an empirical assess...IJMIT JOURNAL
Mobile applications have been rapidly changing the way business organizations deliver their services to
their customers and how customers can interact with their service providers in order to satisfy their needs.
The use of mobile applications increases rapidly, and has been used in many segments including banking
segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role of
factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended TAM
model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The model
was evaluated using a sample survey of 372 customers. The results reveal that the intention to adopt mobile
banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of Use. On the
other hand, some factors such as perceived cost and perceived risk did not show any affect on the users'
intention to use mobile banking. The result of this research is beneficial for banking service managers to
consider the factors that can enforce the Mobile Banking services adoption and increase the take-up of
their mobile services.
Customers perception of m banking adoption in kingdom of bahrainIJMIT JOURNAL
Mobile applications have been rapidly changing the way business organizations deliver their services to
their customers and how customers can interact with their service providers in order to satisfy their needs.
The use of mobile applications increases rapidly, and has been used in many segments including banking segment. This research aims at extending the Technology Adoption Model (TAM) to incorporate the role of factors in influencing customer’s perception towards M-banking adoption. Furthermore, the extended TAM
model was evaluated empirically to measure its impact on M-banking adoption in of Bahrain. The model
was evaluated using a sample survey of 372 customers. The results reveal that the intention to adopt mobile
banking is mainly affected by specific factors which are: Perceived Usefulness and Ease of Use. On the
other hand, some factors such as perceived cost and perceived risk did not show any affect on the users'
intention to use mobile banking. The result of this research is beneficial for banking service managers to consider the factors that can enforce the Mobile Banking services adoption and increase the take-up of their mobile services.
Oral Pseudo-Defense PPT DropboxPlease submit here a narrated P.docxgerardkortney
Oral "Pseudo-Defense" PPT Dropbox
Please submit here a narrated PowerPoint for your final presentation of your thesis proposal. Remember that this is not you reading a paper -- this is more of a "sales pitch" than anything if you're in need of a metaphor.
Requirements:
- Must be Narrated. Must be narrated. TEST IT BEFORE SENDING. I should be able to open it up and hit Present/Play and just let it go. If you fail to meet this requirement you will automatically lose 30% of the grade (3/10 possible points).
- Introduction topics, including criteria such as your project motivation, the gap/needs that brought you to it, and what significant considerations and context surround the topic area
- RQs/Hypotheses/Objectives, operationalized and justified. There should be NO ambiguity here. (Remember, "What is the impact of Big Data on Security" or "How do we make X better?" are not specific enough.)
- Literature Review, presented as the primary topics you separated your review into, the reason they are important and frame your study successfully, and what key sources/authors you identified (the important few). Discuss how this literature further informed your research agenda, methodology, and consideration of conclusions/limitations for your thesis
- Methodology, as precise as you can make it. Sample, collection, framework (if qualitative), analysis, intended outcome
- Conclusion, timeline and future projections of issues, routes to completion, etc.
MOBILE SCAN PAYMENTS SECURITY ISSUES AND STRATEGIES
VINIL REDDY KASULA
ID#210243
HARRISBURG UNIVERSITY OF SCIENCE AND TECHNOLOGYResearch Methodology & Writing (GRAD 695)
Professor-Richard Wirth
MOBILE SCAN PAYMENT
3
Table of Contents
ABSTRACT 4
1. Introduction 5
1.1 Background 5
1.2 Research aim and objectives 7
1.3 Research questions 7
Research question 1 7
Research question 2 8
Research question 3 8
1.4 Problem statement 8
1.5 Significance of the study 10
1.6 Relationship to CPT 11
LITERATURE REVIEW 11
MOBILE PAYMENT SYSTEMS 12
Mobile payment platform 13
Independent mobile payment system 14
MOBILE PAYMENT SECURITY 15
THREATS IN MOBILE PAYMENT SYSTEMS 17
Research Background and Rationale 18
Research Aims and Objectives 19
Research Questions 19
Research Methodology 19
Ethical Considerations 22
Limitations of the Research 23
Research Timeline 23
CONCLUSION 24
References 25
ABSTRACT
In the present decade and the modern age, mobile payments as a medium for financial transactions have gained much popularity. Mobile technology has emerged as a clear and new channel in the space of banking and payment transactions. With the significant advancement in the field of technology have made this field as one of the burgeoning growth in the financial services. People are involved in the application of the widespread smartphone technology and the customers are very comfortable with their mobile devices as a form of communicating device and this has resulted in the increased interest in .
Similar to Feedback from Lee Smith-Dennis250320 1941You have produced .docx (20)
Feedback Assignment Set 4Great job on this assignment. I know yo.docxmglenn3
Feedback Assignment Set 4
Great job on this assignment. I know you know how to do WACC. I am not sure if you rushed on th second answer or if it was a typo but you did give an incorrect answer.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly calculated Bad Boys, Inc.'s cost of capital.
Feedback:
Great job showing your work and getting correct answer.
23.7 (23.7%)
Points Range:21 (21%) - 23.7 (23.7%)
Partially calculated Bad Boys, Inc.'s cost of capital.
Feedback:
In this section you provided the wrong answer.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly identified two corporations that have dealt with cannibalization and what steps were taken to overcome cannibalization. Thoroughly provided citations and references.
Feedback:
Great job explaining cannibalization and giving examples.
10 (10%)
Points Range:9 (9%) - 10 (10%)
0-2 errors present
Feedback:
no errors detected.
C y b e r A t t a c k s
“Dr. Amoroso’s fi fth book Cyber Attacks: Protecting National Infrastructure outlines the chal-
lenges of protecting our nation’s infrastructure from cyber attack using security techniques
established to protect much smaller and less complex environments. He proposes a brand
new type of national infrastructure protection methodology and outlines a strategy presented
as a series of ten basic design and operations principles ranging from deception to response.
The bulk of the text covers each of these principles in technical detail. While several of these
principles would be daunting to implement and practice they provide the fi rst clear and con-
cise framework for discussion of this critical challenge. This text is thought-provoking and
should be a ‘must read’ for anyone concerned with cybersecurity in the private or government
sector.”
— Clayton W. Naeve, Ph.D. ,
Senior Vice President and Chief Information Offi cer,
Endowed Chair in Bioinformatics,
St. Jude Children’s Research Hospital,
Memphis, TN
“Dr. Ed Amoroso reveals in plain English the threats and weaknesses of our critical infra-
structure balanced against practices that reduce the exposures. This is an excellent guide
to the understanding of the cyber-scape that the security professional navigates. The book
takes complex concepts of security and simplifi es it into coherent and simple to understand
concepts.”
— Arnold Felberbaum ,
Chief IT Security & Compliance Offi cer,
Reed Elsevier
“The national infrastructure, which is now vital to communication, commerce and entertain-
ment in everyday life, is highly vulnerable to malicious attacks and terrorist threats. Today, it
is possible for botnets to penetrate millions of computers around the world in few minutes,
and to attack the valuable national infrastructure.
“As the New York Times reported, the growing number of threats by botnets suggests that
this cyber security issue has become a serious problem, and we are losing the war against
these attacks.
.
Feedback Financial Research Report Part 1Thank you for redoing a.docxmglenn3
Feedback Financial Research Report Part 1
Thank you for redoing assignment so quickly. The only area that I see that you can add more that may help along the second section of your paper is your client profile section. I have made notes above for your review.
30 (30%)
Points Range:27 (27%) - 30 (30%)
Thoroughly provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Feedback:
Great job providing economic and financial factors.
26.7 (26.7%)
Points Range:24 (24%) - 26.7 (26.7%)
Satisfactorily suggested the primary reasons why the selected stock is a suitable investment for your client. Satisfactorily included a description of your client’s profile.
Feedback:
In this section you can provide more about the client. You stated what he is looking for but you did not state if client is married. You did not state if client has other liabilities that he is paying or what his overall financial situation is.
20.7 (20.7%)
Points Range:0 (0%) - 20.7 (20.7%)
No references provided
Feedback:
In this section you have reference but you do not have an annotated bibliography. It is incorrect.
10 (10%)
Points Range:9 (9%) - 10 (10%)
0-2 errors present
Feedback:
No errors detected.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 100
Assignment 1: Financial Research Report Part 1
Criteria
Unacceptable
Below 70% F
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Provide a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Weight: 30%
Did not submit or incompletely provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Partially provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Satisfactorily provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
Thoroughly provided a rationale for the stock that you selected, indicating the significant economic, financial, and other factors that led you to consider this stock.
2. Suggest the primary reasons why the selected stock is a suitable investment for your client. Include a description of your client’s profile.
Weight: 30%
Did not submit or incompletely suggested the primary reasons why the selected stock is a suitable investment for your client. Did not submit or incompletely included a description of your client’s profile.
Partially suggested the primary reasons why the selected stock is a suitable investment for your client. Partially included a description of your client’s profile.
Satisfacto.
Feedback analysis, limitations of project approach, and conclusions .docxmglenn3
Feedback analysis, limitations of project approach, and conclusions drawn should be included. Discuss any concerns associated with the number of participants or reviewers. Share what your reviewers/participants said in the evaluation tool. Share actual quotes and how you organized the material. What conclusion can you draw from the feedback? Did it confirm or contradict research found in your literature review?
.
Federalist 51To the People of the State of New YorkHow shall .docxmglenn3
Federalist 51
To the People of the State of New York:
How shall we keep the necessary separation of power among the different parts of government? The only answer that is that the parts themselves keep each other in their proper places.
The separate use of different parts of government is needed to save liberty. As such, each department should have its own powers. The members of different parts should have as little power as possible in selecting members of the other branches. Ideally, this would be happen due to voters elect members of each department separately.
Such a plan would be difficult to carry out, however. Therefore, we must allow certain members of government to be selected by other ways. It would be useful to allow judges to be appointed by other government officials. Judges need special skills, so it is important that they be elected in a way that makes sure that only best candidates are chosen. Also, because judges are selected to the courts for life, they are less likely to be influenced by the men who select them.
"Power Is Divided"
Members of each government branch should be able to keep other parts from overtaking their power. The system should force individuals to defend their branch's powers.
In a perfect world, we would not need such protections. In creating a government that is to be ran by men over men, it must control itself. This can be done by separating and arranging the different offices of government so that each acts as a check on the others.
It is not possible to give to each part an equal ability to protect itself. In republican government, the lawmakers who make up the legislative branch will always have the most power. The cure to this problem is to divide them into two legislative branches. Each branch should be made different by different systems of election and different principles of action. They should be as little connected with each other as possible.
The division of power between the federal government and state governments offers another protection to the people. In the republic of America, power is divided between the states and the federal government. It is then divided again among the branches of each government. Therefore, government power is divided twice and can be controlled.
"To Guard Society"
It is important in a republic to guard society against its rulers. It also must guard one part of the society against the injustice of the other part. Different wants exist in different classes of citizens. If a majority is united by a common interest, the rights of the minority could be hurt.
To defend against this evil, we must make it unlikely that a bad party will gain a majority of support. The people should be broken into many parts, interests and classes of citizens. This will make sure that the rights of individuals, or of the minority, will not be in much danger from the will of the majority. The size of the United States, and the number of people under the same government, offers some prote.
Federalism Comparing Government Response in Hurricane Katrina v.docxmglenn3
Federalism: Comparing Government Response in Hurricane Katrina vs. Coronavirus
Submissions must be a minimum of 2 pages, in length. This does not include your bibliography or works cited. This should be attached and added on as the last page of your essay. Y ou will only have one attempt to upload and submit your paper. Your bibliography or works cited page, and your paper, must be uploaded as a single file. They cannot be uploaded separately. No e-mailed assignments will be accepted.
Your response should be your own thoughts and analysis. Research and resources should be incorporated with scholarly application. I.e. used as examples or evidence to support your analysis. Citations may be formatted in APA, MLA or Chicago style, as long as they are consistent throughout. You must include in-text (parenthetical) citations, as well as a bibliography.If you have questions about citation formatting, please ask me, or utilize the tool easybib.com. You must provide in-text citations, to show ownership of any information that you include, in your essay, which is either
1. not considered common knowledge
2. paraphrased
3. directly quoted
Failure to cite information, properly, will result in students receiving an automatic zero. Furthermore, to not do so is considered plagiarism, and will be treated, as such, in conjunction with HCC's policies.
Make sure to use complete sentences, and proper grammar. Your response to the prompt should focus on analyzing the information you gather and use to complete the constitutional chart through application. Incorporate the information you gathered by using it to provide examples and support for your response to the prompt.
Essay Topic and Objective:
You will be watching two 50 minute documentaries: The Storm and Coronavirus Pandemic in order to complete this essay.
1. The Storm: Hurricane Documentary (Links to an external site.)
2.
Coronavirus Pandemic Documentary (Links to an external site.)
Federalism Overview
: Considered together, Hurricane Katrina and Covid-19 both produced policy disasters in the United States that were both unnecessary and linked to federalism. These challenges produced by nature raise the question of whether certain disasters are beyond the capacities of state and local government.
Objective
: While watching these films, the central theme to take away from these videos is a better and more comprehensive understanding of Federalism, through real life evidence and explanation. Critically analyze each of the elements and consequences of each different national disaster, based on different level of government’s responses, actions. Leadership, communication processes, and decision-making. Despite, both Hurricane Katrina and Corona Virus being deemed as “national emergencies”, the power organization resulted in vastly different responses by each level of government’s leadership (across all levels: federal, state and local).
Introduction to Federalism:
State and Local governments.
Federalism is the structure where two or more levels of government.docxmglenn3
Federalism is the structure where two or more levels of government operate alongside each other with some autonomy, although they have overlapping jurisdiction and specific functions. During the formation of the U.S. Constitution, there were federalist and anti-federalist arguments being made. Explain the concept of federalism; use specific examples of federalism and anti-federalism in your posting.
Which group had the best arguments? Support your argument with examples. Incorporate some of the shifts that took place between both groups (federalists and anti-federalists) to support your response.
1-2 paragraphs
.
Federalism is the sharing of powers between the federal and state go.docxmglenn3
Federalism is the sharing of powers between the federal and state governments.
1. In discussing federalism, observers often concentrate on the tension over where national powers end and state powers begin. But state and federal governments have concurrent powers as well. How do some of these powers (e.g., law enforcement, taxation, general welfare) affect citizens?
In 3 to 5 paragraphs discuss ways in which federalism affect our lives. You may use a personal experience such as financial aid to pay for your education.
.
Federal judges do not have a mandatory retirement age, yet Arizona a.docxmglenn3
Federal judges do not have a mandatory retirement age, yet Arizona and 32 other states require all state judges to vacate their positions upon turning age 70. Should Arizona’s judges be forced to retire at age 70? Might this be considered age discrimination or is a necessary protection for the people?
.
Federal Budget SpeechDo you want to know who you are Dont.docxmglenn3
Federal Budget Speech
"Do you want to know who you are? Don't ask. Act! Action will delineate and define you."
- Thomas Jefferson
The federal budget spends close to four trillion dollars a year and is split between mandatory spending (what the federal government has to spend due to congressional legislation) and discretionary spending (what the federal government spends as a result of congressional allotment). Roughly speaking, mandatory spending accounts for two-thirds of the federal budget and discretionary spending accounts for one-third of the federal budget.
Every year the executive and legislative branches debate budgetary priorities for the federal bureaucracies such as the Department of Defense, the Pentagon, the Environmental Protection Agency, Veteran Affairs, the Department of Education, and others. Many of these debates occur within congressional committee meetings as members of Congress, federal employees, outside interests, and individual citizens articulate funding requests.
For this assessment you will compose a speech advocating why your chosen department, administration, or agency within the federal bureaucracy should receive additional funding.
Because the “world is a stage,” let us establish the setting, plot, and the ensuing action for your speech.
Setting:
Exterior: Washington D.C. State Capitol Building.
Interior: Room 221B. Congressional Hearing Room.
Plot:
Imagine that you are in a cavernous room. You sit before a large table facing twenty one senators from the Budget Committee. Photographers, more than you can imagine, squeeze between the space that separates you from the members of Congress. Behind you in the gallery, public policy wonks and regular citizens sit, awaiting your presentation.
You are a featured speaker from a citizen group that advocates a particular public policy funding concern for your federal department, administration, or agency. Prior to the meeting you have already read the president’s proposed federal budget for the upcoming year from the
Office of Management and Budget
and you have some budgetary concerns. You read in alarm how the upcoming federal budget request from the White House reduces funding for your federal department, administration, or agency. But, as you know, it is up to Congress to fund the executive bureaucracy. The executive branch requests funding and the legislative branch allocates funding. This is your chance to request more funding for your federal department, administration, or agency of choice.
Action
:
Equally eager and nervous you stand in front of a lectern. “Now,” you think, “now I am ready…” You click on the microphone, examine your prepared speech about your funding request, and you begin to speak with eloquence and passion!
Directions
: Compose a 400 word transcript of your public policy speech.
Select a specific example of public policy from one of the following fields:
Economic policy – for example, U.S. budget deficit spending.
Educ.
Federal Budget SpeechDo you want to know who you are Don.docxmglenn3
Federal Budget Speech
"
Do you want to know who you are? Don't ask. Act! Action will delineate and define you
." - Thomas Jefferson
The federal budget spends close to four trillion dollars a year and is split between mandatory spending (what the federal government has to spend due to congressional legislation) and discretionary spending (what the federal government spends as a result of congressional allotment). Roughly speaking, mandatory spending accounts for two-thirds of the federal budget and discretionary spending accounts for one-third of the federal budget.
Every year the executive and legislative branches debate budgetary priorities for the federal bureaucracies such as the Department of Defense, the Pentagon, the Environmental Protection Agency, Veteran Affairs, the Department of Education, and others. Many of these debates occur within congressional committee meetings as members of Congress, federal employees, outside interests, and individual citizens articulate funding requests.
For the Unit 9 Assignment you will compose a speech advocating why your chosen department, administration, or agency within the federal bureaucracy should receive additional funding.
Because the “world is a stage,” let us establish the setting, plot, and the ensuing action for your speech.
Setting:
Exterior: Washington D.C. State Capitol Building.
Interior: Room 221B. Congressional Hearing Room.
Plot:
Imagine that you are in a cavernous room. You sit before a large table facing twenty one senators from the Budget Committee. Photographers, more than you can imagine, squeeze between the space that separates you from the members of Congress. Behind you in the gallery, public policy wonks and regular citizens sit, awaiting your presentation.
You are a featured speaker from a citizen group that advocates a particular public policy funding concern for your federal department, administration, or agency. Prior to the meeting you have already read the president’s proposed federal budget for the upcoming year from the
Office of Management and Budget
and you have some budgetary concerns. You read in alarm how the upcoming federal budget request from the White House reduces funding for your federal department, administration, or agency. But, as you know, it is up to Congress to fund the executive bureaucracy. The executive branch requests funding and the legislative branch allocates funding. This is your chance to request more funding for your federal department, administration, or agency of choice.
Action:
Equally eager and nervous you stand in front of a lectern. “Now,” you think, “now I am ready…” You click on the microphone, examine your prepared speech about your funding request, and you begin to speak with eloquence and passion!
Directions
: Compose a 400 word transcript of your public policy speech.
Select a specific example of public policy from one of the following fields:
Economic policy – for example, U.S. budget deficit spending.
.
February is known as Black History Month. For 30 extra credit points.docxmglenn3
February is known as Black History Month. For 30 extra credit points address the following questions in 200 words or more:
Which African American artist(s) has had the most influence on you? Why? Be sure to organize your thought and ideas using paragraphs. Your response must be a minimum of 200 words or you will not receive any credit for the response.
.
FEATURE ARTICLE Creating and Capturing Value Through Susta.docxmglenn3
FEATURE ARTICLE
Creating and Capturing Value Through Sustainability
The Sustainable Value Analysis Tool
A new tool helps companies discover opportunities to create and capture value through sustainability.
Miying Yang, Doroteya Vladimirova, and Steve Evans
OVERVIEW: Recent research and practice have shown that business model innovation can be one way to create and
capture new value and drive production and consumption toward sustainability. However, business model tools typically
do not create a space to consider how sustainability concerns may be integrated into the innovation process. To address
this gap, this article describes a tool that can help companies identify new opportunities to create and capture value
through sustainability by analyzing value captured and uncaptured for key stakeholders across the product life cycle.
The Sustainable Value Analysis Tool is shown to help companies recognize value uncaptured and turn it into opportunities;
it facilitates sustainability-focused business model innovation by identifying value uncaptured—and hence, opportunities
for innovation—associated with environmental and social sustainability in production, use, and disposal.
KEYWORDS: Sustainable Value Analysis Tool, Sustainability, Business model innovation, Sustainability-focused innovation
In recent years, as companies have been challenged by
environmental legislation and societal pressures (Elkington
1997), sustainability has become a key factor in long-term
business success. As a result, innovation for sustainability
has received much attention from researchers and practi-
tioners (Nidumolu, Prahalad, and Rangaswami 2009; Boons
et al. 2013). However, although technological approaches to
promote sustainability have been thoroughly investigated
(Camarinha-Matos 2011), comparatively little work has been
done to understand how innovation in business models can
support sustainability across the product life cycle, including
manufacturing, operation, and disposal.
Business model innovation looks at how companies create
and capture value at every stage of a product’s journey to
market. While business model innovation has been the
subject of much discussion and research, very few tools have
been developed to help companies integrate sustainability
into the business model innovation process (Evans et al., in
press). Existing tools for business model innovation either
do not consider sustainability (for instance, Osterwalder
and Pigneur’s [2010] Business Model Canvas) or do not
address all of the elements of the business model (for
example, lifecycle assessment tools [Tukker 2000]). Thus,
sustainability considerations and business model innovation
are often not well integrated, with sustainability being
treated as an add-on rather than as a core source of value.
Considering sustainability in the process of business
model innovation can provide entirely new ways to create .
FEATUREASSOCIATION FORUMHiring tiie Very BestHow to in.docxmglenn3
FEATURE
ASSOCIATION FORUM
Hiring tiie Very Best
How to increase your employees' morale and productivity
By Tracy Mullin
Tracy Mullin is
president and
CEO, Nationai
Retail
Federation,
Washington,
D.C,
[email protected]
I
remember a quote from former ABC execu-
iive Thomas Murphy, who said. "If you hire
the best people and leave them alone, you
don't need to hire very many." While I think re-
tailers should be hiring the best people possible,
and treating them well, it may not always be best
to leave them alone. Especially during the holi-
day season.
With the holidays almost upon us, retailers are
scrambling to hire the best seasonal workers—
more than 520,000 of them—while retaining
their top performers. And during the most cru-
cial selling period of the year, there is no time
for mistakes. Executives know that good em-
ployees ean bolster the image of a store and
unsatisfactory employees can be disastrous.
More often than not. finding good workers is
high on the list of challenges facing retail exec-
utives. And keeping those people is even more
difficult.
Turnover in the retail industry is nothing new,
and it is not a problem that will disappear any-
time soon. After Sept. 11, many retailers experi-
enced low turnover as employees waited for the
job market to improve. Now that the economy is
back on traek, workers are keeping an eye out
for new opportunities, and many are moving on.
Statistics reinforce that theory: According to
the 2005 NRF/Mercer Retailer Compensation
and Benefits survey, released last month, turn-
over for store managers rose 20% last year over
2003.
Leading HR experts seem to agree that tradi-
tional approaches to management haven't been
working. Author Bruce Tulgan. a consultant
who spoke in June at the National Retail Eed-
eration's Loss Prevention Conference, talked
about the mind-set of the new American worker
and said that the best way retailers could keep
their employees was to find out what people
want and use it to drive performance.
Best Buy is one of those retailers. Nearly half
of the 3.500 employees at Best Buy headquarters
have embarked on a radical strategy that enables
employees to work where and when they
as long as their job gets done. The approach
seems to be working, as executives maintain that
this new program has reduced turnover and
increased productivity at the same time.
Other retailers, such as Costco, believe that
the way to their workers" hearts is through their
wallets. Costco's employees earn an average of
$17.41 an hour and receive some of the most
generous health benefits in the industry. Perhaps
that's why they are able to maintain a low
turnover rate of about 17% per yean
However, money isn't everything. In his pre,s-
entation, Tulgan also featured several non-finan-
cial elements, such as people needing to be sat-
isfied with their jobs. One of those basics, giving
employees control over tasks, is an area where
Trader Joe's has an upper hand. Instead of giv-
ing employees.
FEATURED ESSAYThe Ecstatic Edge of Politics Sociology and.docxmglenn3
FEATURED ESSAY
The Ecstatic Edge of Politics: Sociology and Donald Trump
ARLIE RUSSELL HOCHSCHILD
University of California-Berkeley
[email protected]
The day before the Louisiana Republican
primary in March 2016, I watched Donald
Trump’s Boeing 757 descend from the sky
at the Lakefront Airport in New Orleans,
Louisiana. Inside the crowded hangar, Elton
John’s ‘‘Rocket Man’’ was playing. Red,
white, and blue strobe lights roved sideways
and up. Cell phones snapped photos of the
blond-haired candidate as he stood before
thousands waving and shaking signs that
read MAKE AMERICA GREAT AGAIN. A
small, wiry man bearing this sign with
both hands, eyes afire, called out to all with-
in earshot, ‘‘To be in the presence of such
a man! To be in the presence of such
a man.’’ There seemed in this man’s call, I
wrote in my field notes—part of a five year
ethnographic study of Tea Party supporters
in Louisiana—a note of reverence, even
ecstasy (Hochschild 2016:224). How do we
understand the states of mind and situations
of those to whom Donald Trump appeals?
How does such emotional appeal work?
Whatever Trump’s future, he has touched
a cultural nerve we sociologists need to
study. In this essay, I explore illuminating
works in and around sociology before ven-
turing an interpretation of my own.
In The Paranoid Style in American Politics,
the historian Richard Hofstadter (1996)
traced the relationship between paranoid
political rhetoric and ‘‘style of mind’’ as
these periodically emerged in the United
States through the nineteenth and twentieth
centuries. The leader expressing such a style,
he says, ‘‘does not see social conflict as some-
thing to be mediated and compromised, in
the manner of the working politician. Since
what is at stake is always a conflict between
absolute good and absolute evil, what is nec-
essary is not compromise but the will to fight
things out to a finish. . . . This demand for
total triumph leads to the formulation of
hopelessly unrealistic goals, and since these
goals are not even remotely attainable, fail-
ure constantly heightens the paranoid’s
sense of frustration. Even partial success
leaves him with the same feeling of power-
lessness with which he began, and this in
turn only strengthens his awareness of the
vast and terrifying quality of the enemy he
opposes’’ (p. 31).
Propelling such movements, he argues, is
not just economic deprivation as narrowly
conceived, but the loss of an older America,
inward-turned, Protestant, secure, busy
turning the wheel of a thriving local capital-
ism. As one of the original so-called birthers
(who questioned President Obama’s place of
birth and religion) and as one who has
extended this suspicion to Hillary Clinton’s
religion, Donald Trump fits in Hofstadter’s
‘‘paranoid style.’’ Still, Trump’s appeal
reaches far beyond the style of mind through
which it is expressed.
Updating Hofstadter, the excellent The Tea
Party and the Remaking of Republican Conser-
vatism by Theda Skocpol and V.
Fears and Health Needs of Patients with Diabetes A Qualitative Re.docxmglenn3
Fears and Health Needs of Patients with Diabetes: A Qualitative Research in Rural Population
Maria Papaspurou,1 Vasiliki C. Laschou,2 Paraskevi Partsiopoulou,3 Evangelos C. Fradelos,4 Christos F. Kleisiaris,5 Malamati A. Kalota,6 Anna Neroliatsiou,7 and Ioanna V. Papathanasiou8
Author informationArticle notesCopyright and License informationDisclaimer
This article has been cited by other articles in PMC.
Go to:
Abstract
Introduction:
Insulin-dependent patients are individuals with chronic disease who are well adapted to living and dealing with any health needs and fears arising. An important aspect in the process of adaptation to chronic illness is the provision of nursing care in the early stages of the disease, because this contributes to its acceptance and the early identification and management of potential complications.
Purpose:
To investigate the health needs and self-management problems faced by patients with diabetes daily, especially those who use insulin. Furthermore, purpose of this study was to investigate the fears experienced by patients in the early stage of the disease, but also in its subsequent development and to study possible differences between sexes.
Methodology:
This is a qualitative study, using interpretative phenomenological approach. Fifteen (nine women and six men) insulin-dependent patients, recounted their personal fears and their needs, through semi-structured interviews, which took place in Central Greece. The method used for processing the results is the Mayering one.
Results:
The analysis of the narratives showed that patients have a variety of fears and needs associated with the diagnosis, treatment, expected consequences, prognosis and everyday life in the management of the disease. Most patients express the concept of need as desire. Care needs, psychological support and education to recognize and prevent hypoglycemia.
Conclusions:
Insulin-dependent patients express fears and needs in their daily lives. Nurses providing care aimed at enhancing the level of health, while putting self-care information and training them. Patients want the nurse next to them, so that information is continuous and permanent.
Keywords: diabetes mellitus, fears, health needs, self-care, nursing care
Go to:
1. INTRODUCTION
Patients with type II diabetes, especially insulin-dependent are usually suffering from diabetes several years before the initiation of insulin therapy. Treatment of diabetes has now as a central character, the patient himself who co-decides with the physician-nurse team. The primary concern is the patient’s acceptance of the disease in the early stages and his gradual familiarization with the treatment (1).
According to International Diabetes Federation, at least 285 million people worldwide have diabetes and this number is expected to increase to 438 million by 2030, with two-thirds of all cases living in low or middle income countries (2, 3).
Apart from pharmaceutical care, the nurse also pr.
Featherfall has recently violated several government regulations.docxmglenn3
Featherfall has recently violated several government regulations regarding the current state of its technology and how it is being used. The technology system is vastly out of date, and staff are not always using the technology that is in place or they are using the technology inappropriately. These problems have lost the institution lots of money for not meeting government regulations and have caused operational and ethical problems from inefficient and ineffective use of technology.
The staff at Featherfall are not well-trained on the use of technology and do not communicate appropriately about technology use. The roles that pertinent to your consult are the health information management team, the clinical staff (doctors, nurses, etc.), and administrative staff. The health information management team uses proper coding practices, and the current technology system serves them well, despite its age. However, other roles in the hospital have had issues with the system. Clinical staff, for instance, have had record-keeping issues both due to lack of training on the system and the system itself being out of date. Administrative staff within the organization have taken issue with the lack of communication about the technology and its use between the various roles. When the current technology system was chosen many years ago, the needs of these various roles were not considered.
Assignment link :
https://learn.snhu.edu/d2l/lor/viewer/viewFile.d2lfile/243073/1720,1/
.
FEATURE - ‘Overtourism’ Worries Europe. How Much Did Technol.docxmglenn3
FEATURE - ‘Overtourism’ Worries Europe. How
Much Did Technology Help Get Us There?
By Farhad Manjoo, The New York Times Aug. 29, 2018
Reference: Manjoo, F. (2019, Aug. 29). ‘Overtourism’ Worries Europe. How Much Did
Technology Help Get Us There? The New York Times. Retrieved from
https://www.nytimes.com/2018/08/29/technology/technology-overtourism-europe.html
By Farhad Manjoo
Over the summer, my wife and I traveled with our two young kids on a two-week
vacation through Europe.
It wasn’t as highfalutin as it sounds. In London, our Airbnb had ample skylights —
which rendered the place all but uninhabitable during Europe’s heat wave. In Paris, our
charming home-share had a cavernous hole in the ceiling of the entryway, revealing
load-bearing beams that appeared to have been rotting since Napoleon’s reign. And in
Amsterdam, our Airbnb advertised a kids’ bedroom stocked with toys — but failed to
mention the mosquitoes and mice.
I’m not complaining. If travel mishaps are the stuff of memory, my vacation was
unforgettable. And without home-sharing services like Airbnb, review sites like
TripAdvisor and conveniences like Uber, OpenTable and Expedia, the trip would have
been far more expensive, less accessible and, in a strange way, less authentic.
But my tech-abetted trip was illuminating, too, because it provided a firsthand look into
a vexing problem that has gripped much of Europe lately — the worry of “overtourism,”
and the rising chorus that blames technologies like Airbnb, Uber and other internet-
enabled travel conveniences for the menace.
Every summer, the most popular European destinations get stuffed to the gills with
tourists, who outnumber locals by many multiples, turning hot spots into sweaty, selfie-
stick-clogged, “Disneyfied”towns. They offer a taste of a growing global threat: Across
the world, thanks in part to rising affluence, travel is becoming a more widely shared
pastime. International trips were up 6 percent in the first half of the year, surpassing
experts’ forecasts, according to the United Nations’ World Tourism Organization.
This growth might once have been considered unambiguously good news. But the
world’s most popular destinations cannot expand to accommodate an infinite flood of
visitors. Advocates of curbing tourism say too many visitors are altering the character of
historic cities, and making travel terrible, too.
“It’s a level of tourism which is degrading the enjoyment that residents have, but it’s also
degrading the tourist experience, because the tourist who is endlessly queuing behind
backpacks of hundreds of other tourists is not discovering the real or the authentic
place,” said Justin Francis, the chief executive of Responsible Travel, a company that
arranges “sustainable” travel for customers.
What’s to blame? In addition to broad prosperity, there’s technology, defined very
broadly.
Over the last few decades, innovations in aviation — wider, more e.
FEASIBILITY REPORT1
FEASIBILITY REPORT6
Feasibility Report
MEMO
TO: Manager
FROM:
DATE:
SUBJECT:
This memo is meant for introducing the feasibility report that aims at providing a solution to the cases and nation problems about the cybercrime and the potential proposed solution to curb up the challenge. These feasibilities we are identified by studying various critical factors such as the social effects, legal issues, technical problems, and the economic impact. Therefore, this memo is very vital for an individual to read and understand various aspects.
Feasibility Report
It takes much time in planning and preparing to implement a solution to the major problem in society. During the planning and preparation process, the proposed solution should be tested and determined if it is feasible to provide the solution or not. Cybercrime in united states has been a significant problem and need to be addressed and solution provided to reduce the cybercrime.
One of the proposed solutions to this major problem is providing cybersecurity among very individual. This will enable most of the people to understand and know the importance of cybersecurity and thus leading to the reduction of the negative loses that is caused by the cybercrime in society every year. Another thing that will ensure that the individuals in the nation are protected from the impact of the cybercrime is educating them on ways they can protect themselves over the cybercrime attempts.
This report will majorly focus on looking at the proposed solution provided and determine if the answers are feasible or need some changes. The essential aspects that the story will focus on include the social impact, the economic effect, and other elements which will be determined if it can provide a solution to the problem.
The Social Impact
When looking for a potential solution to be implemented to solve a specific major problem in society, a positive impact is always the main objective. When the proposed solution is applied, such as implementing cybersecurity in the daily lives of the individuals in the society it will bring a lot of positive impacts on them. For instance, when the cybersecurity is made the main focus in the in every place, i.e. schools and workplace, majority of the individuals will be aware of these threats and ways of preventing them from affecting their daily lives. This will also reduce the loss that most of the individuals incur due to the cybercrime and lack of security in their day-to-day business operations (Help Net Security, 2015).
When the cybersecurity is introduced in society It will bring much social impact to the life of the individuals since it will educate people about the dynamic changes that occur in uses of the technology. When this provides a solution to the cybercrime problem in the society, it will be adopted by every nation, and thus the cybercrime problem is reduced and making every country secure and safe from the cybercrime prob.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The Art Pastor's Guide to Sabbath | Steve ThomasonSteve Thomason
What is the purpose of the Sabbath Law in the Torah. It is interesting to compare how the context of the law shifts from Exodus to Deuteronomy. Who gets to rest, and why?
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
Feedback from Lee Smith-Dennis250320 1941You have produced .docx
1. Feedback from Lee Smith-Dennis
25/03/20 19:41
You have produced a reasonable rationale for conducting the
study, but must be clearer with your research questions as two
are very similar. Your literature review is reasonable, but
includes some very dated references which are now irrelevant.
Your methodology could be more detailed as you must explain
why you are choosing the methods that you are.
Your potential outcomes are reasonably clear. Overall, a
reasonable attempt but failing to show a current research gap.
Feedback from Ali Rasel
27/03/20 14:14
The proposal shows a good study background with a clear aim
and objectives. The rationale and significance of the study are
not clear. You need to use a specific theory to understand the
subject matter. The review seems to be done on mobile banking
in general. It should include ideas about security issues with
mobile banking. The review needs to be more critical. Research
methodology needs to be connected to the research
questions. You need to show the number of studies you are
going to systematically review. If Meta-analysis is the main
method to answer the research questions, you need to review
studies on the same topic and show how you are going to do
Meta-analysis with an appropriate analysis tool. Potential
outcomes need to be explained with good evidence of
analysis. The writing structure is fine but you need to improve
your English with good grammar and academic
writing. Referencing follows the Harvard style despite a few
journal references have been used in the proposal.
2. MBA Managerial Project Proposal
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
Executive Summary
Mobile Banking revolutionized the way people do banking.
Technology has brought the ease of doing a financial
transaction to the finger-tips. However, this radical
developmental has also lead to great negative impacts on the
customers due to security issues. This study seeks to investigate
the Security Issues in Mobile Banking System of the Maldives
and its Effect on Customers.
With the existing literature that demonstrates the Mobile
Banking and security issues and measures to counter, the study
will use Meta-analysis to bring a statistical solution to fill the
knowledge gap in the context of the research. Moreover,
existing models will be critically reviewed to find solutions to
the research questions and achieve objectives of the study.
Contents
Executive Summary 2
List of Figures 4
List of Table 4
1.0 Introduction 5
3. 1.1 Area of Research 5
1.2 Research context 5
1.3 Scope of the study 6
1.3.1Research Question 6
1.3.2Research aim 7
1.3.3Research Objectives 7
1.4 Rationale of the Study 7
2.0 Literature Review 8
2.1 Model of E-Fraud 8
2.2 Bio-metrics model for authentication 9
2.3 Literature Review Summary 9
3.0 Research Methodologies 10
3.1 Research Philosophy 10
3.2 Research Approach 10
3.3 Research Design 11
3.4 Research Instruments Data Collection Methods 11
3.5 Data Analysis Method 11
3.6 Ethical Issues 11
3.7 Expected Sources of Information 12
4.0 Potential Outcomes 13
4.1 Research Plan 13
5.0 Reference Cited 14
6.0 Bibliography 15
List of Figures
Figure 1. E-Fraud Model
…………………………………………………… 8
Figure 2. Bio-Metric Model for Authentication
…………………………………… 9
Figure 3: Research Approach
……………………………………………………………10
Figure 4: Research Design
…………………………………………………………….11
List of Table
Figure 4: Gantt Chart
4. ………………………..…………………………………………
13
Security Issues in Mobile Banking System of the Maldives and
Its Effect on Customers
1.0 Introduction
The technological advancement and the innovative trends that
endures to coerce the way of banking is perhaps convenient and
bringing customers more nearer to the banks. These
groundbreaking innovations has led to the establishment of
Mobile Banking where services have been brought to the finger-
tips of the customers all over the world in a very short span of
time. The advantage of technology is also abused by various
hackers and other cyber criminals. Thus, bringing the security
issue as a threat in using Mobile Banking Systems that have a
direct impact on customers.
1.1 Area of Research
The chosen area for research for this study is “Security Issues in
Mobile Banking System of the Maldives and Its Effect on
5. Customers”. 1.2 Research context
At this age of technology, robbing banks by using weapons and
physical force has almost become fictional. Cyber fraud or E-
frauds, Identity theft and phishing are common crimes
committed in stealing funds from bank accounts (Belcher,
2004). Furnell and Evangelatos (2007) has argued that degree of
trust among the mobile banking customers diminishes as E-
fraud usage occurs due to unauthorized transactions. Similarly,
they have also argued reliability is an important factor
determining the trust between the mobile banking system and
communication between the mobile device during transaction
(Furnell and Evangelatos, 2007).
In this context, the Maldives is not detached from the identified
problem and the Maldives Police has reported more than 65
cases and theft of more than half a Million Ruffiya (Maldives
Independent, 2017). Thus, security threats posing a significant
threat on customers.
Maldives, even though have a population less than a mere
400,000 people dispersed into over 200 islands, adapting to the
revolutionizing technology is fast and quick. According to the
Communications Authority of Maldives (CAM, 2019), total
mobile subscribers in the Maldives amounts to 839,528
depicting 1:2 in mobile subscription. In addition, CAM (2019)
also has published that there are 90,237 fixed broadband
subscribers and 266,495 mobile broadband subscribers. Bank of
Maldives or the national bank in the Maldives introduced the
vital service of Mobile Banking service to its customers in July
2015, with the launch of its new Mobile Banking Application
available for use on Apple and Android smartphones
(Aramudhan, 2008).
However, with the growing trend of technology many
individuals are still not using Mobile banking and opt to go for
the traditional retail branch banking. The reasons are unknown
to the banks as to why people do not want to adopt internet
6. banking. This remains the case in many other countries as well.
With the increase in technology currently Bank of Maldives
(BML), HSBC, State Bank of India (SBI), Maldives Islamic
Bank (MIB) and Bank of Ceylon (BOC) has adopted Mobile
banking in the Maldives. According to Harb, Farahat and Ezz
(2008) Banking via mobile is changing lives of people all over
the world whereby they can make banking transaction 24 hours
a day wherever they are. It has added up to the convenience of
adapting to new technologies. Furthermore, it has helped many
people who are too busy and have no time to visit traditional
bank branches and make transactions. Using mobile banking has
many advantages for users such as saving time and the accuracy
of information flow.
This study intends to study the Security Issues in Mobile
Banking System of the Maldives and its Effect on Customers.
1.3 Scope of the study
This study will focus on the security issues in the Mobile
Banking System in the Maldives on the one hand and its impact
on customers on the other hand.Security issues describes the
existing cybercrime techniques like phishing attacks, E-fraud,
virus attacks, spoofing and etc.
1.3.1Research Question
What are the Security Issues in Mobile Banking System of the
Maldives and its Effects on Customers?
The study will further try to investigate the following;
· What are the security issues in Mobile Banking System in the
Maldives?
· How reliable is the current Mobile Banking System with
reference to security in the Maldives?
· What are the effects of security issues on customers?
1.3.2Research aim
Through various models based on the literature, this study will
7. insist to find out the most fragile area in Mobile Banking and
how that threat could be minimized to increase the trust and
reliability to the Mobile Banking System in the Maldives.
1.3.3Research Objectives
The objectives are subjected to change as the research
progresses.
· To analyze the current Mobile Banking System.
· To identify the security issues in Mobile Banking System.
· To assess the reliability of the current Mobile Banking
System with reference to security.
· To examine the effect of security on customers.
1.4 Rationale of the Study
Literature survey reveals that there are models that would allow
to understand the context and mechanics of E-fraud. Therefore
the basis of this study will be to examine one of the models that
will help to build the trust in Mobile Banking and minimize
risks and effects on the prevailing security issues.
2.0 Literature Review
Various literature and models are available on the security
issues of Mobile Banking and its effect on customers.
Aramudhan (2008) has revealed that User Assigned Security
Policy Framework for m-commerce Applications increases its
security levels from both the user and server side to increase the
reliability. Similarly, Bangdao and Rosco (2010) has argued
that increasing the Mobile Electronic Identity through
biometrics secures payment on Mobile phones. In 2016, A.S.
Bhatt has identified the factors Affecting Customer’s Adoption
of Mobile Banking Services. Furthermore, Lee and Chung
(2009) argued that a Developed Information System model
would increase customer satisfaction and reliability on the
Mobile Banking services as payment transactions are made
without any human contact.
8. A study conducted Amola (2016) to analyze the factors
affecting customer’s adoption of Mobile Banking Services
revealed demographic, attitudinal, and behavioral
characteristics of mobile bank users are interconnected, but
security issues were not addressed. In another study by Palani
(2012) to examine customers perception towards Mobile
Banking in Indian Overseas Bank Chennai identified the
causative factors so that mobile banking can be used by
more people to make banking operations more cost effective.
However, one of the compelling model on E-fraud which is
relevant to this study was formulated by Malakedsuwan and
Stevens (2003) identifying key elements that describes E-fraud
and effective counter measures to increase customers trust.
2.1 Model of E-Fraud
E-Fraud Model ofMalakedsuwan and Stevens (2003) focuses on
five key elements to exhibit a reliable model to identify and
examine e-fraud and its impact. The model is illustrated below
with the key elements.
Perpetrator
Mode of Attack
Target System
Target Entity
Impact
Figure 1. E-Fraud Model
Key element one is the Perpetrator or the attacker. According to
Malakedsuwan and Stevens (2003) the perpetrator will be either
9. internal or external to the entity committing the fraud.
Secondly, the Mode of Attack describes the technique used to
execute the fraud. Malakedsuwan and Stevens (2003) states that
the fraudulent activity can be conducted through technical
modes like IP spoofing or malicious codes and non-technical
modes like identity stealing. The third element of Target System
describes the system through which the fraudulent activity is
conducted or perpetrated. Fourthly, Target Entity features
individuals or organizations by identifying the weaknesses in
the systems. The last element explains the Impact, whetherthe
perpetration has incurred financial losses or non-financial losses
like loss of competitive advantage and reputation.
2.2 Bio-metrics model for authentication
In 2011, Bilal and Sankar proposed a Bio-Metrics model for
Mobile Banking Authentication, where finger-print is the
mechanism to counter-measure the existing security issue. Their
study through literature review and study of existing systems
using login, password and SMS mechanisms showed that only
the authorized user will be able to use particular account.
Mobile Device
Bio-Metric Device
Bank System
Figure 2. Bio-Metric Model for Authentication
Bilal and Sankar (2011) in their study of Trust and Security
Issues in Mobile Banking and its effect on Customers showed
that 90% of the respondents strongly agreed that such a model
will increase the ease of use of Mobile Banking and 70% agreed
that this model will increase customer satisfaction while 60%
agreed it will reduce fraud, thus increasing trust and safety.
10. 2.3 Literature Review Summary
The literature review revealed that there are pros and cons of
using Mobile Banking in the evolving technological
phenomenon (Chandran, 2014). It is also evident as Bilal and
Sankar (2011) has suggested that invalidating security issues to
0% is not possible. However, with many security measures, it
can only be reduced and prevented (Chandran, 2014). Despite
the literature demonstrated in this section, upon analysis on the
context of this study, it will viable and suitable to use the E-
fraud Model by Malakedsuwan and Stevens (2003).
3.0 Research Methodologies
As Saunders, Lewis and Thornhill (2009) suggests, a research
can be classified into perspectives of (i) application of research
study (ii) objectives in undertaking the research and (iii)
inquiry mode employed. From these perspectives, in practice,
most studies are a combination of descriptive, correlational and
exploratory researches which is categorized under the second
perspective of objectives in undertaking the research. 3.1
Research Philosophy
The research philosophy intended to use in this study will be
Pragmatism in order to emphasize and use both positivist and
interpretivist elements of epistemology (Saunders, Lewis and
Thornhill, 2009). In this way, to adapt pragmatism Systematic
literature review will be conducted as the study will focus on
studying issues to bring out positive consequences by examining
the existing secondary sources to be synthesized and evidence
compared (Saunders, Lewis and Thornhill, 2009).
3.2 Research Approach
The Secondary data required for the research will be collected
with the help of the analysis of the historical records and
analysis of the documents. The Historical record presents the
data about the mobile banking which have been collected by the
various researchers in mobile banking field (Bloor et al, 2000).
The Secondary data will help in finding out the process of
adoption for any kind of new innovation among the users. Thus,
the research approach will be divided into the following four
11. phases.
PHASE 1
Research Design
PHASE 2
Conduct
PHASE 3
Analysis
PHASE 4
Structure and writing
Figure 3: Research Approach
3.3 Research Design
The research will designed as follows;
RESEARCH DESIGN
1. Contribution to the existing knowledge gap
2. Potential
Audience
3. Purpose of the
Research
4. Appropriate
Method
5. Search
Strategy
12. Figure 4: Research Design
3.4 Research Instruments Data Collection Methods
For collecting this data various news articles, magazines,
journal articles and data bases would be searched in order to
present the relative data about the research.
3.5 Data Analysis Method
After collection and reviewing of literature, Meta–analysis will
be used to answer the formulated research questions. Meta-
analysis enables to bring out a statistical solution by weighing
the reviewed literature into classification by codes (Saunders,
Lewis and Thornhill, 2009). This analysis method would
therefore enable the researcher to assess the impact of excluding
or down weighing unpublished studies, low quality studies and
out-of-date studies.
3.6 Ethical Issues
There will be no ethical issues, since this study will consist of
secondary research which will be fully cited and referenced.
3.7 Expected Sources of Information
The expected sources of information includes
i) Annual Reports of the Banks in the Maldives.
ii) Online Libraries for journal articles.
iii) Books.
iv) Online news articles.
4.0 Potential Outcomes
From this study, the author will be able to identify the security
issues that pertains in the Mobile Banking System in the
Maldives. In the light of the literature, the author will also be
13. able to find the gap in the existing literature on security issues.
In addition, identifying perpetrators, mode of attack, target
system, target entity and impact will help to find the answers
for the research questions and formulate counter measures.
4.1 Research Plan
Table 1: Gantt Chart
5.0 Reference Cited
Aramudhan M 2008, User Assigned Security Policy Framework
for m-commerce Applications, International Conference
Computer and Communication Engineering, ICCCE 2008, pp.
148-150.
Bangdao C and Rosco A W 2010, Mobile Electronic Identity:
Securing Payment on Mobile Phones, pp.1-15
Bhatt A S B 2016, Factors Affecting Customer’s Adoption of
Mobile Banking Services, Journal of Internet Banking and
Commerce, Vol.3, pp 8-13.
CAM (2019). Telecom Statistics – November 2019. [online].
Communications Authority of Maldives. [Viewed 2 March
14. 2020]. Available from http://www.cam.gov.mv/Statistics.htm
Chandran R 2014, Pros and Cons of Mobile Banking,
International Journal of Scientific and Research Publications,
Vol. 4, Issue 10, pp. 1-5
Furnell S and Evangelatos K 2007, Public awareness and
perceptions of biometrics, Journal of Computer Fraud &
Security, vol. 2007, pp. 8-13.
Harb H, Farahat H, and Ezz M 2008, SecureSMSPay: Secure
SMS Mobile Payment Model, 2nd International Conference on
Anti-counterfeiting, Security and Identification, 2008. ASID
2008, pp. 11-17.
Lee K C and Chung N 2009, Understanding Factors Affecting
Trust in and Satisfaction With Mobile Banking in Korea: A
Modified DeLone and McLean's Model Perspective, Journal of
Interacting with Computers, Vol. 21, pp. 385-392.
Maldives Independent (2017). More than half a Million Ruffiya
Stolen in phone scams. [online]. [Viewed 2 March 2020].
Available from https://maldivesindependent.com/society/more-
than-half-a-million-rufiyaa-stolen-in-phone-scams-120943
Palani P 2012, A Study On Customer Perception Towards
Mobile Banking In Indian Overseas Bank Chennai,
International Journal of Trend in Scientific Research and
Development (IJTSRD) International Open Access Journal, Vol.
2, pp. 259.6.0 Bibliography
Chuchen C 2016, The Perception of Mobile Banking Adoption:
The Study of Behavioral, Security, and Trust in Thailand,
Behavioral, Security, and Trust in Thailand, International
Journal of Social Science and Humanity, Vol. 6, No. 7, pp. 547-
550.
Coface.com. 2020. Risk Analyses And Evaluations / Our
Economic Studies / Our Business - Coface. [online] Available
at: <https://www.coface.com/Our-business/Our-economic-
studies/Risk-analyses-and-evaluations> [Accessed 22 February
2020].
Devaraj, S., Krajewski, L. and Wei, J., 2007. Impact of
eBusiness technologies on operational performance: The role of
15. production information integration in the supply chain. Journal
of Operations Management, 25(6), pp.1199-1216.
My New Desk (2014). Phishing Fraud (Maldives Mobile
Banking) [online] Bank of Maldives. [Viewed 11 March 2020].
Available from
http://www.mynewsdesk.com/mv/bankofmaldives/pressreleases/
phishing-fraud-maldives-mobile-banking-1043407
Mallat N, Rossi M and Tuunainen V. K 2004, Mobile Banking
Services, Communications of the ACM, Vol. 47, May. 2004, pp.
42–46.
Nie J and Hu X 2008, Mobile Banking Information Security and
Protection Methods, International Conference on Computer
Science and Software Engineering, 2008, pp. 587-590.
Peng L and Lai L 2009, A Study on Service Quality Assurance
in Mobile Commerce, Journal of Computer Science and
Engineering, pp. 207-211.
Pfitzmann A, Pfitzmann B, Schunter M and Waidner M 1997,
Trusting Mobile User Devices and Security Modules, Computer,
Vol. 30, pp. 61-68.
Wei D and Yanling T 2010, Research on Security Payment
Technology Based on Mobile E-Commerce, 2nd International
Conference on e-Business and Information System Security
(EBISS), 2010, pp. 1-4.
Ying L and Can Z 2010, Customer's Adoption Decision Analysis
of Mobile Banking Service, Journal of Management and Service
Science (MASS), pp. 1-4.
Zhuo Q Y and Li Y 2010, Chinese Mobile Banking Service
Evaluation Based on AHP Method, International Conference on
E-Product E-Service and E-Entertainment (ICEEE), 2010, pp. 1-
5.
14 | Page
16. What am I required to do in this assignment?
You should complete and submit the final dissertation to the
relevant submission link via Assessment & Feedback on BREO
by the deadline.
Note: Turnitin will be used for all submissions to check for
plagiarism. We also reserve the right to initiate a viva voce
examination if we have concerns regarding the originality of
your submission. Dates of the Viva will be provided during the
induction week. You need to be available for such an event
following the submission of your dissertation.
• Your f inal assessment will be an individual managerial
dissertation which will be a considered and comprehensive
response to your research objectives agreed with your
supervisor.
• Your dissertation will encapsulate your approach to the
research, the research methods that you have deployed, an
analysis of the knowledge generated as part of the
investigative process and a ref lection on your personal
development
as a consequence of this research p roject experience.
17. Submission Deadline Marks and Feedback
Before 10am on:
Click or tap to enter a date.
20 working days after deadline (L4, 5 and 7)
15 working days after deadline (L6)
10 working days after deadline (block delivery)
Click or tap to enter a date.
Unit title & code MBA Managerial Project; APO017-6
Assignment number and title 2 Dissertation
Assessment type Individual Written Report
Weighting of assessment 80%
Size or length of assessment 10000 words (+/- 10%)
Unit learning outcomes 1 Demonstrate the f ollowing knowledge
and understanding
• Demonstrate a systematic understanding and critical
appreciation of the
interrelationship of diverse theories in the MBA toolkit to
challenge existing
preconceptions and develop positive and enquiring approaches
to global
management and enterprise. Demonstrate an aptitude and ability
to solve a def ined
18. business problem through enquiry having drawn upon your
MBA studies and
appreciating the interrelated nature of organisations.
2 Demonstrate the f ollowing skills and abilities
Demonstrate intelligent practice by imaginative and critical
integration of theory and
practice to create a tangible deliverable through critical insightf
ul evaluation
stipulating areas of excellence and ref lecting on areas f or
development to improve
perf ormance in contemporary organisations.
2
• It will need to demonstrate your understanding of the topic
area in the context of contemporary academic theory, models
and debate. Your dissertation will comprise a number of
integrative elements all of which will contribute to the
achievement of the learning outcomes f or this unit.
• You will receive supervision and guidance through the process
by regular communication and f eedback on your progress
by the tutor.
• Please see the “Guided Learning” section of the BREO unit
site f or detailed guidelines f or writing each section of a
19. dissertation.
• The main assessment and marking criteria are listed at the end
of this assignment brief .
What do I need to do to pass? (Threshold Expectations from
UIF)
In order to PASS Assessment 2, you will need to:
• Demonstrate critical assessment of theories underpinning the
aim and objectives of the project and integrate this
understanding into a coherent f ramework f or analysing case
studies or other data/evidence.
• Develop a research design to identif y and assemble sources of
data and evidence and carry our data analysis as
appropriate to achieve the aim and objectives.
• Demonstrate critical analysis and evaluation of case
studies/evidence, debate the implications of the analysis and
develop a tangible deliverable.
How do I produce high quality work that merits a good grade?
We will be filling this section in together in class on Click or
tap to enter a date. make sure you have downloaded/printed out
the
Assignment Brief and bring it to the session with you.
20. We suggest that you avoid writing in the f irst person (“I”);
rather the third person is recommended (e.g. it can theref ore be
suggested
that...).
You may include headings and subtitles and a contents page if
you f eel this will help you to stay f ocused and create clearer
sign -
posting f or the reader.
Guide to writing the Project Report
Section / Title Details / Guidance
Title page Title of your report.
Executive
Summary
Concise summary of your report, including aim, analysis, key
conclusions and recommendations
(comes f irst, written last)
Contents Page Include page numbers.
Introduction Introduction to the report setting out what the aims
and objectives of the report are, the context,
what the report will cover, why and your method of analysis.
Must be supported by the ideas of
inf luential contributors using in text citations.
21. Methodology Justif y the choice of your research methodology
(e.g. primary or secondary) f or data collection
and analysis and design the approaches that best f it your
research project.
Consider any ethical issues considered and explain clearly your
sources of inf ormation
Literature Review You will need to draw on a wide range of
recent (2008-2018) quality academic sources, including
peer-reviewed material, combined with practical examples to
support your arguments. You will
need to critically evaluate the sources in relation to the
application of theory to practice.
Analysis You need to state and justif y the method of analysis
as appropriate to the aim and objectives of
your project. If using systematic literature review you will need
to present f ull details of the
3
Literature:
Use academic source, i.e. books, journal articles etc. Ref er to
respected industry sources DO NOT overuse the Internet, do not
use and / or quote from Wikipedia.
22. Reminder:
You are required to use proper in-text ref erence and the ref
erence list in the end using the Harvard Referencing System.
The writing:
Try to approach this assignment in a logical and systematic
way. Make sure you have a logical structure, a convincing
argument,
clear description of the situations which ‘set the scene’, and
clear explanation which relate to theories, and a conclusion that
draws
your argument together.
search(es) with number of results and inclusion/exclusion
criteria resulting in the f inal sample of
evidence f or review.
You need to present the evidence (data) published in quality
academic sources. You need to
analyse in-depth the evidence (data) and present the f indings
clearly.
For systematic review and comparative analysis methods a table
is usef ul to illustrate the
f indings.
Word count f or this section will depend on the topic of your
project and may vary widely between
23. projects
Discussion In the discussion, you will need to interpret your f
indings with ref erence to theories introduced in
the literature review. Apply the theory to the data, critically
analyse and evaluate in -depth the
ef f ectiveness of theory in applied in practice. What is the
unique insight f rom your research?
Conclusions This section should initially answer the report aim
and objectives and draw together the main
points f rom your analysis. It summarises what has been learned
f rom undertaking this project
concerning the application of theory into practice. What are
the main conclusions f rom your
project? No new inf ormation should be presented in the
conclusions.
Recommendations Make recommendations f or improvement
based upon your conclusions, clearly stating how they
can add value. Recommendations should be f ully f easible and
justif ied considering costs, priority
level, timescale, resources, who is responsible, benef its and
any f urther implications. Proposals
should be actionable (‘immediately implementable’) not just a
list of ideas.
Ref erence List A list of all sources cited directly in the text
using Harvard ref erencing style
24. Ref erences/Bibliography – NOT OPTIONAL
The ref erences/bibliography should comprise a variety of
sources used in the text, most of
which should be academic journal articles. Other sources could
include books, trade
publications, news articles, industry reports, company websites
etc.
Harvard ref erencing style is expected
How does assignment relate to what we are doing in scheduled
sessions?
The first sessions will provide an insight into the tools that can
be used to develop a proposal. Further help will be provided by
local tutors during workshops to develop a bespoken approach.
4
How will my assignment be marked?
25. Your assignment will be marked according to the threshold
expectations and the criteria on the following page .
You can use them to evaluate your own work and consider your
grade before you submit.
Criteria Pass Good Pass Commendation Distinction
Introduction
Weight 10%
40 to 49 %
A rea sonable
introduction with
objectives mentioned,
but not clea rly stated a nd
not put in context.
50 to 59 %
A good introduction with
clea r ba ckground
information a nd sta tement
of objectives which link to
resea rch questions.
26. 60 to 69 %
A well-presented
introduction with clea r
ba ckground information
a nd clea r statement of
objectives with ra tionale,
linked to purpose a nd scope
of the work.
70 to 100 %
A complete a nd thorough
introduction with clea r
ba ckground information
a nd sta tement of objectives
with a comprehensive a nd
persua sive ra tionale.
Literature Review
Weight 25%
40 to 49 %
Evidence of a limited
knowledge of the
27. releva nt litera ture. Some
critica l a rea s a re
included.
50 to 59 %
Evidence of a satisfactory
review of releva nt
litera ture, containing
a ca demically sound
sources.
60 to 69 %
Evidence of a
comprehensive review of
releva nt litera ture with a
ra tionale. The review
contains a good variety of
a ca demically va lid sources.
70 to 100 %
Evidence of critica l
eva luation of relevant
litera ture a nd a convincing
ra tionale. The review
contains a rea sonably wide
28. va riety of a cademically
va lid sources.
Research
Methodology
Weight 20%
40 to 49 %
Evidence of some
understanding of the
resea rch methodology
used, but la cking cla rity
a nd purpose.
50 to 59 %
Evidence of some
understanding of
methodology used a nd how
a re a ppropriate to the
resea rch question.
60 to 69 %
Evidence of a sound
29. understanding of the
possibilities a nd limita tions
of the methodology used
a nd a pply it rea sonably well
for da ta collection a nd
a na lysis.
70 to 100 %
Evidence of a n a dvanced
a wa reness of the
possibilities a nd limita tions
of the methodologies used
a nd a pply it soundly for
robust da ta collection a nd
a na lysis.
Analysis/Discussions
of findings and
conclusions
Weight 25%
40 to 49 %
Discussion is not so
releva nce to the research
30. question. Some evidence
of a nalysis support
reported findings.
50 to 59 %
Evidence of sa tisfactory
a na lysis a nd judgement.
Rea sonable a rguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed.
60 to 69 %
Evidence of sound a nalysis
a nd judgement. Persuasive
a rguments based on a firm
foundation from the
question through to the
conclusions constructed.
70 to 100 %
Evidence of robust a nalysis
a nd judgement. Precise a nd
31. persua sive arguments
ba sed on a firm foundation
from the question through
to the conclusions
constructed
Coherence
Weight 10%
40 to 49 %
Evidence of
prepa redness to state a
position on a n issue but
with a limited use of
supporting evidence.
50 to 59 %
Evidence of a bility to sta te,
on the ba sis of evidence a
personal position on a n
issue, a selection of
a ppropria te materia l with a
60 to 69 %
32. Evidence of a bility to sta te
a nd defend on the basis of
evidence a personal position
on a n issue. Clea r evidence
of a selection of a ppropriate
70 to 100 %
As for commendation with
a n a dditional fla ir a nd
ima gina tion. Cogent and
clea r sta tements reflecting
5
Where a n a rgument is
not presented in a
coherent or critica l form.
logica l structure a nd
coherent argument.
ma terial with a logica l
structure a nd coherent
a rgument, which displa y
33. high levels of critica lity.
findings a nd a statement of
future direction.
Structure, format,
language and
referencing
Weight 10%
40 to 49 %
Rea sonable structure,
a ca demically sound
la ngua ge a nd formatting,
a nd rea sonable
referencing.
50 to 59 %
Rea sonably well-structured
a nd proofread report,
linking to the question
through to da ta collection
to findings. Good use of
34. references.
60 to 69 %
Well-structured and
proofread report which is
linked to the research
question and findings.
Appropriate use of
references.
70 to 100 %
Very well-structured report
which is strongly linked to
the research question and
findings. Very well
presented supporting
references.
3rd Class – 40-49% Lower 2nd – 50-59% Upper 2nd – 60-69%
1st Class – 70%+