The health and safety (H&S) of employees is a very significant issue to consider with relation to
the attainment of organizational goals. The broad objective of the study is to examine the level of relationship
between safety management system and organizational performance of two plastic industries in Awka
metropolis. Three research questions and hypotheses were formulated in line with the specific objectives. The
study is anchored on Heinrich Theory. In pursuance of the objective of the study, the descriptive survey design
was adopted. The study worked with the population of eighty. Pilot study was conducted using a test retest
method to establish the reliability of the research instrument. The validity of the instrument was also tested. Chi
square was used for data analysis and Z test was also used to test the Chi square at 0.05 level of significance.
The findings revealed that safety management has a positive influence on firm’s profitability, that there is a
relationship between safety management and customer satisfaction, that safety management has influence on
employee commitment and that safety management reduces cost for organization. The study recommends that
Safety should therefore be afforded the highest priority, taking precedence over commercial, operational,
environmental or social pressures, in that staff must be given responsibility for their own actions, and managers
held responsible for the safety performance of their organisations.
This document discusses various topics related to cyber security including:
1) SIEM, technical cyber security architecture, IT environment phasing, deep packet inspection tools, and disaster recovery and business continuity plans.
2) Implementing a cyber risk governance grid within an organization as a central breach management tool and compliance-centric cyber risk mitigation strategies.
3) Key areas related to cyber security breaches, threats, malware detection, cloud security, cyber risk impact management, and business recovery.
This document discusses e-governance in Nepal. It begins with an introduction to e-governance and its evolution in Nepal from 1972 onwards. It then addresses the challenges of implementing e-governance in Nepal, including technical issues like privacy and security, as well as social and political issues. The document concludes by providing recommendations to address these challenges, such as ensuring computer education in schools and replacing traditional paper-based systems with web applications.
Hacking involves stealing data and interrupting networks, while cyber security protects online data and software from unauthorized access. Common hacking techniques include phishing, tabnapping, man-in-the-middle attacks, and exploiting unpatched software vulnerabilities. Cyber security aims to defend against these threats and establish safe internet usage, but hackers often target user negligence around updating software. Experts recommend vigilance in maintaining cyber security protections.
3 Most Common Threats Of Information SecurityAna Meskovska
The document discusses the most common threats to information security, including malware, email threats, spam, social engineering (phishing), and the top 10 internet threats. It provides details on each threat such as possible consequences and recommended protections. Some key threats mentioned are viruses, worms, Trojan horses, spyware, phishing scams seeking personal/financial information, and social engineering attacks. The document stresses the importance of user education, strong passwords/authentication, antivirus software, and caution when sharing information or opening email attachments.
The document summarizes key aspects of policy enforcement for cyber security including critical infrastructure protection, e-governance initiatives, the roles and training frequencies for different user types, and an overview of India's National Cyber Security Policy from 2013. It discusses threats like the Target and Google incidents and how interconnectivity increases vulnerability which policy aims to address through awareness training tailored to roles like privileged users, normal users and administrators.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
The document provides an overview of computers and their impact on society. It discusses how Sir Timothy Berners-Lee invented the World Wide Web in 1990, prompting a drastic growth in computer usage. Computers are now used in many spheres including education, business, science, art, communication, and governance. Estonia is highlighted as an example of an e-government with many public services available online. Both positive and negative effects of computers on society are outlined, such as increased efficiency but also risks of cybercrime, addiction, and reduced social interaction. The components that power Estonia's digital services are explained in detail. Finally, the document poses discussion questions and provides concluding quotes about society's relationship with computers.
This slide is a small introduction for cyber security.
What is cyber security?
Why do we need cyber security?
What are the benefits of cybersecurity?
Types of cyber security threats
How to prevent the breaches?
Some real attacks
This document discusses various topics related to cyber security including:
1) SIEM, technical cyber security architecture, IT environment phasing, deep packet inspection tools, and disaster recovery and business continuity plans.
2) Implementing a cyber risk governance grid within an organization as a central breach management tool and compliance-centric cyber risk mitigation strategies.
3) Key areas related to cyber security breaches, threats, malware detection, cloud security, cyber risk impact management, and business recovery.
This document discusses e-governance in Nepal. It begins with an introduction to e-governance and its evolution in Nepal from 1972 onwards. It then addresses the challenges of implementing e-governance in Nepal, including technical issues like privacy and security, as well as social and political issues. The document concludes by providing recommendations to address these challenges, such as ensuring computer education in schools and replacing traditional paper-based systems with web applications.
Hacking involves stealing data and interrupting networks, while cyber security protects online data and software from unauthorized access. Common hacking techniques include phishing, tabnapping, man-in-the-middle attacks, and exploiting unpatched software vulnerabilities. Cyber security aims to defend against these threats and establish safe internet usage, but hackers often target user negligence around updating software. Experts recommend vigilance in maintaining cyber security protections.
3 Most Common Threats Of Information SecurityAna Meskovska
The document discusses the most common threats to information security, including malware, email threats, spam, social engineering (phishing), and the top 10 internet threats. It provides details on each threat such as possible consequences and recommended protections. Some key threats mentioned are viruses, worms, Trojan horses, spyware, phishing scams seeking personal/financial information, and social engineering attacks. The document stresses the importance of user education, strong passwords/authentication, antivirus software, and caution when sharing information or opening email attachments.
The document summarizes key aspects of policy enforcement for cyber security including critical infrastructure protection, e-governance initiatives, the roles and training frequencies for different user types, and an overview of India's National Cyber Security Policy from 2013. It discusses threats like the Target and Google incidents and how interconnectivity increases vulnerability which policy aims to address through awareness training tailored to roles like privileged users, normal users and administrators.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
The document provides an overview of computers and their impact on society. It discusses how Sir Timothy Berners-Lee invented the World Wide Web in 1990, prompting a drastic growth in computer usage. Computers are now used in many spheres including education, business, science, art, communication, and governance. Estonia is highlighted as an example of an e-government with many public services available online. Both positive and negative effects of computers on society are outlined, such as increased efficiency but also risks of cybercrime, addiction, and reduced social interaction. The components that power Estonia's digital services are explained in detail. Finally, the document poses discussion questions and provides concluding quotes about society's relationship with computers.
This slide is a small introduction for cyber security.
What is cyber security?
Why do we need cyber security?
What are the benefits of cybersecurity?
Types of cyber security threats
How to prevent the breaches?
Some real attacks
This document discusses the evolution of cyber security and its growing importance. It covers how cyber security now impacts individuals, businesses, and geopolitics. The document also defines key cyber security terms and concepts, examines perspectives like threat management and information assurance, and argues that cyber security must take an integrated, holistic approach going forward. It concludes by noting that with modern society's growing digital interconnectedness, not taking a comprehensive view of cyber security may be the biggest risk.
This webinar discussed cyber security threats facing the Government of Canada and strategies to prevent and mitigate risks. It covered:
- Types of cyber threats including state-sponsored actors, cybercriminals, hacktivists, and script kiddies.
- Sectors of government information that are targeted, such as personal information, trade secrets, and natural resources data.
- The importance of patching systems and applications to prevent known vulnerabilities from being exploited.
- Additional best practices like network segmentation, limiting internet access points, and anticipating compromises to harden defenses.
- The need for government agencies, private sectors, and vendors to work together on cyber security as it requires a team effort.
This document provides an overview of topics related to cybercrime and security that will be covered. It lists the team members and topics to be discussed including the history of cybercrime, authenticity, security and privacy, database security, social engineering, cyber attacking methods, and security tips. Database security features like digital certificates, encryption, firewalls, and proxy servers will be explained. Responsibilities of database administrators and built-in database protections will also be covered. Specific cyber attacks such as Trojan horse attacks, backdoors, keyloggers, DDoS attacks, and man-in-the-middle attacks will be described. The document concludes with safety tips and references.
Cyber crime can take many forms, including hacking, virus dissemination, intellectual property crimes, and software piracy. It is defined as unlawful acts involving computers as tools or targets. Common types are hacking, spreading viruses, cyber pornography, intellectual property theft, software piracy, email spoofing, cyber stalking, cyber defamation, and phishing. Cyber crimes are difficult to detect and prevent due to the ease of storing data online and accessing the internet. Criminals range from children to organized hacking groups to discontented employees. Prevention methods include antivirus software, firewalls, password protection, and monitoring children's online activity. Cyber crime poses a major global threat.
Siblu Khan presents on cyber security. Cyber security refers to online security to protect information. With more people online, security threats are increasing. Cyber security is necessary to secure data from theft and safeguard systems from viruses. Major security problems include viruses, hackers, malware, Trojan horses, and password cracking. The presentation provides definitions of these terms and recommends solutions like installing security software and using strong, unique passwords. The conclusion stresses that cyber security is everyone's responsibility and hopes to increase awareness of threats and prevention methods.
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
Cyber crime involves unlawful acts where a computer is used either as a tool or target. The document discusses the history of cyber crimes from the first recorded incident in 1820. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Various types of cyber crimes are explained such as hacking, DDoS attacks, viruses, phishing, and cyber terrorism. The document emphasizes that cyber crimes threaten national security and discusses cyber security and Indian cyber laws.
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
Cyber security in Sri Lanka faces several challenges. Sri Lanka's cyber security body, SLCERT, is understaffed and has limited technical knowledge compared to the private sector. Sri Lankan cyber security resources and attention are also less than neighboring countries. To improve, Sri Lanka should coordinate cyber activities across institutions, regulate with business involvement, and extend national security policies to include cyber security. Public-private partnerships and international cooperation are also needed to bolster Sri Lanka's cyber defenses.
This document discusses cyber security and cyber crimes. It defines cyber security as technologies and practices to protect networks and data from unauthorized access and cyber crimes as criminal activities carried out using computers or networks. The document describes common cyber attacks like man-in-the-middle attacks, DDoS attacks, SQL injection, and phishing. It also discusses preventive security measures and advantages of cyber security like protecting against viruses and data theft. The conclusion is that cyber crimes cannot be fully stopped but cyber security can help prevent them.
The United Nations uses a risk management process that involves assessing the criticality of programs to balance security risks. It uses a risk matrix to determine risk levels and requires a program criticality assessment for activities with high or very high residual risks. The assessment evaluates the contribution of activities to strategic results and their likelihood of implementation against criteria to designate them as Priority 1 activities that are lifesaving or directed by the Secretary-General. Risk level and program criticality are determined separately without consideration of each other.
This document discusses cyber security and cyber crimes. It begins with an introduction that defines cyber security and notes the increasing security threats online. It then covers key topics like the meaning of cyber, the need for cyber security, major security problems like viruses and hackers, and solutions for implementing and maintaining security. Specific security issues are explained like viruses, worms, different types of hackers, malware, Trojan horses, and password cracking. The document concludes with sections on cyber security being a shared responsibility and overviews of cyber crime growth, India's cyber security strategy, and some of the biggest cyber attacks in 2020.
This training creates the awareness of the security threats facing individuals, business owner’s, and corporations in today’s society and induces a’ plan-protection’ attitude. It enriches individuals, students’, business owners’ and workers’ approach to handling these threats and responding appropriately when these threats occur.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document provides an introduction to cyber security. It defines cyber security as protecting cyberspace from attacks, and defines a cyber attack. It explains that cyberspace is where online communication occurs, via the internet. Cyber security is important because it affects everyone who uses computers and networks. Cyber security training is needed to establish human controls. Cyber attacks can target businesses, governments, institutions and individuals. Attackers include hackers, criminals, spies and nation-states who use methods like malware, social engineering, and network attacks. Defenders of cyber security include ICT teams, security vendors, manufacturers, and governments. Information systems and quality data are important assets to protect. Emerging cyber threats include cloud services, ransomware, spear ph
This document discusses cyber security and the need for protecting online information. It defines cyber security as protecting computer systems, software, data and services from disruption or theft. Common security threats are discussed such as viruses, hackers including white hat, grey hat and black hat hackers, malware like Trojan horses, and password cracking. The document provides solutions for implementing security like using antivirus software, firewalls, strong unique passwords, and backups.
This document discusses cyber security and awareness, defining it as the security offered through online services to protect online information. It notes that as more people go online, security threats that can cause harm are increasing as well. The document then covers the meaning of the term "cyber", the need for cyber awareness and security to secure data and safeguard systems from viruses, malware, hackers, and other threats. It provides examples of different types of viruses, hackers, and trojan horses that pose cyber security risks.
This document defines key concepts related to computer ethics, law, and crimes. It discusses the differences between ethics and law, outlines four types of intellectual property laws, and describes ways to protect privacy online. Authentication methods like passwords, smart cards, and biometrics are explained. The effects of pornography and slander are contrasted. Examples of computer crimes and the purpose of cyber laws in Malaysia are provided.
This document discusses cyber security, including types of threats like ransomware, malware, social engineering and phishing. It also covers cyber security vendors and the advantages and disadvantages of cyber security. The main benefits are protection of data and networks, prevention of unauthorized access, and improved recovery from security breaches. Cyber security helps defend against hacks and viruses but can slow systems down and require frequent software updates.
Workplace accidents cost billions annually and theories of accident causation aim to understand why accidents happen to prevent them. The document outlines several theories including: the Domino Theory which views accidents as resulting from a series of factors; the Human Factors Theory which attributes accidents to human error from overload, inappropriate responses or activities; and the Systems Theory which sees accidents as outcomes of interactions between people, machinery and the environment. A combination of theories may provide the best approach to solving safety problems.
This document provides a comprehensive literature review on the causes of accidents in industries, with a focus on three primary factors: human factors, work environment, and management.
The review examines numerous studies that have investigated: (1) how human errors are a leading cause of accidents due to factors like behavior, training and motivation; (2) how the physical work environment and safety protocols can influence accident frequency; and (3) how management decisions around issues like procedures, communication and leadership impact workplace safety culture. The literature demonstrates that accidents typically result from complex interactions among human, environmental and management factors, and emphasizes the need for organizations to adopt comprehensive prevention strategies that consider all of these dimensions.
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
This document discusses the evolution of cyber security and its growing importance. It covers how cyber security now impacts individuals, businesses, and geopolitics. The document also defines key cyber security terms and concepts, examines perspectives like threat management and information assurance, and argues that cyber security must take an integrated, holistic approach going forward. It concludes by noting that with modern society's growing digital interconnectedness, not taking a comprehensive view of cyber security may be the biggest risk.
This webinar discussed cyber security threats facing the Government of Canada and strategies to prevent and mitigate risks. It covered:
- Types of cyber threats including state-sponsored actors, cybercriminals, hacktivists, and script kiddies.
- Sectors of government information that are targeted, such as personal information, trade secrets, and natural resources data.
- The importance of patching systems and applications to prevent known vulnerabilities from being exploited.
- Additional best practices like network segmentation, limiting internet access points, and anticipating compromises to harden defenses.
- The need for government agencies, private sectors, and vendors to work together on cyber security as it requires a team effort.
This document provides an overview of topics related to cybercrime and security that will be covered. It lists the team members and topics to be discussed including the history of cybercrime, authenticity, security and privacy, database security, social engineering, cyber attacking methods, and security tips. Database security features like digital certificates, encryption, firewalls, and proxy servers will be explained. Responsibilities of database administrators and built-in database protections will also be covered. Specific cyber attacks such as Trojan horse attacks, backdoors, keyloggers, DDoS attacks, and man-in-the-middle attacks will be described. The document concludes with safety tips and references.
Cyber crime can take many forms, including hacking, virus dissemination, intellectual property crimes, and software piracy. It is defined as unlawful acts involving computers as tools or targets. Common types are hacking, spreading viruses, cyber pornography, intellectual property theft, software piracy, email spoofing, cyber stalking, cyber defamation, and phishing. Cyber crimes are difficult to detect and prevent due to the ease of storing data online and accessing the internet. Criminals range from children to organized hacking groups to discontented employees. Prevention methods include antivirus software, firewalls, password protection, and monitoring children's online activity. Cyber crime poses a major global threat.
Siblu Khan presents on cyber security. Cyber security refers to online security to protect information. With more people online, security threats are increasing. Cyber security is necessary to secure data from theft and safeguard systems from viruses. Major security problems include viruses, hackers, malware, Trojan horses, and password cracking. The presentation provides definitions of these terms and recommends solutions like installing security software and using strong, unique passwords. The conclusion stresses that cyber security is everyone's responsibility and hopes to increase awareness of threats and prevention methods.
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
Cyber Security & Data Protection India Summit 2018 aims to convene the best minds in Cybersecurity under one roof to create an interactive milieu for exchange of knowledge and ideas. The event will endeavour to address the emerging and continuing threats to Cybersecurity and its changing landscape, as well as respond to increasing risk of security breaches and security governance, application security, cloud based security, Network, Mobile and endpoint security and other cyber risks in the India and abroad.
Cyber crime involves unlawful acts where a computer is used either as a tool or target. The document discusses the history of cyber crimes from the first recorded incident in 1820. It categorizes cyber crimes as those targeting computers or using computers as weapons to commit real-world crimes. Various types of cyber crimes are explained such as hacking, DDoS attacks, viruses, phishing, and cyber terrorism. The document emphasizes that cyber crimes threaten national security and discusses cyber security and Indian cyber laws.
Cyber security , an Analysis of State Security in Sri LankaEvan Pathiratne
Cyber security in Sri Lanka faces several challenges. Sri Lanka's cyber security body, SLCERT, is understaffed and has limited technical knowledge compared to the private sector. Sri Lankan cyber security resources and attention are also less than neighboring countries. To improve, Sri Lanka should coordinate cyber activities across institutions, regulate with business involvement, and extend national security policies to include cyber security. Public-private partnerships and international cooperation are also needed to bolster Sri Lanka's cyber defenses.
This document discusses cyber security and cyber crimes. It defines cyber security as technologies and practices to protect networks and data from unauthorized access and cyber crimes as criminal activities carried out using computers or networks. The document describes common cyber attacks like man-in-the-middle attacks, DDoS attacks, SQL injection, and phishing. It also discusses preventive security measures and advantages of cyber security like protecting against viruses and data theft. The conclusion is that cyber crimes cannot be fully stopped but cyber security can help prevent them.
The United Nations uses a risk management process that involves assessing the criticality of programs to balance security risks. It uses a risk matrix to determine risk levels and requires a program criticality assessment for activities with high or very high residual risks. The assessment evaluates the contribution of activities to strategic results and their likelihood of implementation against criteria to designate them as Priority 1 activities that are lifesaving or directed by the Secretary-General. Risk level and program criticality are determined separately without consideration of each other.
This document discusses cyber security and cyber crimes. It begins with an introduction that defines cyber security and notes the increasing security threats online. It then covers key topics like the meaning of cyber, the need for cyber security, major security problems like viruses and hackers, and solutions for implementing and maintaining security. Specific security issues are explained like viruses, worms, different types of hackers, malware, Trojan horses, and password cracking. The document concludes with sections on cyber security being a shared responsibility and overviews of cyber crime growth, India's cyber security strategy, and some of the biggest cyber attacks in 2020.
This training creates the awareness of the security threats facing individuals, business owner’s, and corporations in today’s society and induces a’ plan-protection’ attitude. It enriches individuals, students’, business owners’ and workers’ approach to handling these threats and responding appropriately when these threats occur.
Cyber security expert Vivek Agarwal presented on cyber security. His presentation covered internet security, types of cyber crimes like hacking, child pornography, virus dissemination and cyber terrorism. It also discussed primary online risks like cyberbullies, predators, viruses and identity theft. The presentation provided steps individuals can take to boost cyber security such as using firewalls, automatic updates, antivirus and antispyware software. It emphasized educating families on internet safety and managing personal information.
This document provides an introduction to cyber security. It defines cyber security as protecting cyberspace from attacks, and defines a cyber attack. It explains that cyberspace is where online communication occurs, via the internet. Cyber security is important because it affects everyone who uses computers and networks. Cyber security training is needed to establish human controls. Cyber attacks can target businesses, governments, institutions and individuals. Attackers include hackers, criminals, spies and nation-states who use methods like malware, social engineering, and network attacks. Defenders of cyber security include ICT teams, security vendors, manufacturers, and governments. Information systems and quality data are important assets to protect. Emerging cyber threats include cloud services, ransomware, spear ph
This document discusses cyber security and the need for protecting online information. It defines cyber security as protecting computer systems, software, data and services from disruption or theft. Common security threats are discussed such as viruses, hackers including white hat, grey hat and black hat hackers, malware like Trojan horses, and password cracking. The document provides solutions for implementing security like using antivirus software, firewalls, strong unique passwords, and backups.
This document discusses cyber security and awareness, defining it as the security offered through online services to protect online information. It notes that as more people go online, security threats that can cause harm are increasing as well. The document then covers the meaning of the term "cyber", the need for cyber awareness and security to secure data and safeguard systems from viruses, malware, hackers, and other threats. It provides examples of different types of viruses, hackers, and trojan horses that pose cyber security risks.
This document defines key concepts related to computer ethics, law, and crimes. It discusses the differences between ethics and law, outlines four types of intellectual property laws, and describes ways to protect privacy online. Authentication methods like passwords, smart cards, and biometrics are explained. The effects of pornography and slander are contrasted. Examples of computer crimes and the purpose of cyber laws in Malaysia are provided.
This document discusses cyber security, including types of threats like ransomware, malware, social engineering and phishing. It also covers cyber security vendors and the advantages and disadvantages of cyber security. The main benefits are protection of data and networks, prevention of unauthorized access, and improved recovery from security breaches. Cyber security helps defend against hacks and viruses but can slow systems down and require frequent software updates.
Workplace accidents cost billions annually and theories of accident causation aim to understand why accidents happen to prevent them. The document outlines several theories including: the Domino Theory which views accidents as resulting from a series of factors; the Human Factors Theory which attributes accidents to human error from overload, inappropriate responses or activities; and the Systems Theory which sees accidents as outcomes of interactions between people, machinery and the environment. A combination of theories may provide the best approach to solving safety problems.
This document provides a comprehensive literature review on the causes of accidents in industries, with a focus on three primary factors: human factors, work environment, and management.
The review examines numerous studies that have investigated: (1) how human errors are a leading cause of accidents due to factors like behavior, training and motivation; (2) how the physical work environment and safety protocols can influence accident frequency; and (3) how management decisions around issues like procedures, communication and leadership impact workplace safety culture. The literature demonstrates that accidents typically result from complex interactions among human, environmental and management factors, and emphasizes the need for organizations to adopt comprehensive prevention strategies that consider all of these dimensions.
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Safety ManagementSafety Management
S
Corporate
Culture
Examining its effects on safety performance
By Judith A. Erickson
SAFETY PERFORMANCE is divided into two
aspects: safety program elements and safety process
elements (Erickson, 2006). The program elements
deal with basic safety functioning: regulations, legis-
lation, training, audits and related items. These ele-
ments are considered hard skills and are under
control of the safety professional. The process ele-
ments are the underlying factors within an organi-
zation that either help or hinder the safety effort.
These soft skills are indicators of the corporate cul-
ture, and they are not under the safety professional’s
control (Erickson, 1994).
To achieve optimal safety functioning, both cultur-
al elements and compliance issues must be
addressed. The scientific evidence is overwhelming
that both hard and soft skills are needed to attain opti-
mal safety and business performance (Erickson, 1994;
2001; Shannon, Mayr & Haines, 1997; DeJoy, Schaffer,
Wilson, et al., 2003; Vredenburgh, 2002; Zohar &
Luria, 2004; Parker, Axtell & Turner, 2001; Hofmann &
Morgeson, 1999; Hofmann, Morgeson & Gerras, 2003;
Turner & Parker, 2003; Maierhofer, Griffin & Sheehan,
2000; Maister, 2001; Drucker, 1954; O’Toole, 1996;
Maister, 1997; Buckingham & Coffman, 1999).
However, some in the technical or engineering
fields believe that soft skills are not measurable by
any standard technique or protocol. Within acade-
mia, natural and physical research scientists often
posit this view when discussing the social sciences.
Yet, with rigorous research design and protocol,
social scientists can conduct scientific research that is
quantitatively and statistically equivalent to that of
natural and physical scientists. Through such meth-
ods, the effects of these soft skills have been statisti-
cally correlated with safety performance and
organizational functioning. These measurements are
available to researchers to help organizations im-
prove their safety and business performance.
When assessing organizational culture, SH&E
professionals must be aware of the scientific bases of
the cultural interventions they select. They must
Abstract: Research
demonstrates that cor-
porate culture influences
an organization’s safety
performance. When
assessing organizational
culture, SH&E profession-
als must be aware of the
scientific bases of the
cultural interventions
they choose. This will
help them decide ration-
ally and logically how
they will assess their cul-
tures and not be influ-
enced by flavor-of
the-month trends. This
will lead to informed,
intelligent decisions
that will provide corpo-
ratewide benefits.
decide rationally and logically how they will assess
their cultures and not be influenced by flavor-of the-
month jargon. This will enable them to make
informed, intelligent decisions that will provide cor-
poratewide benefits.
How Corporate Culture
Affects Safety Performance
Assessing corporate culture as.
Human factors, particularly human error, impacts how everyone works. Understanding how human factors affects productivity, quality, profitability, and prosperity in a global market. In the fourth industrial revolution, which is occurring now, it's very important to understand not only the work but how the works gets done. Using technology and innovations can help improve speed and reliability but humans are the driver for safety culture and behavior. Engineering, administrative controls and the use of personal protective clothing and equipment can help protect workers but understanding and doing the correctly each and every time will lead toward sustainable objectives and reduce waste and maximize time toward product/service output. Where emphasis is placed within the organization depends on the risk governance and strategic management objectives. The higher the risk the greater the reward or catastrophic loss. Understanding people and how they work is the safety catalyst in maximizing profits, productivity and quality.
uction safety has been achieved, the industry still continues to lag behind most other industries with regard to safety. The construction safety of any organization consists of employee’s attitudes towards and perceptions of, health and safety
behaviour. Construction workers attitudes towards safety are influenced by their perceptions of risk, management, safety rules
and procedures. A measure of safety could be used to identify those areas of safety that need more attention and improvement.
The aim of the study was to identify factors in the safety management that any lead project success. these factors influence
construction safety. In this project questionnaire is framed to find safety in major organisations. data is collected on the basis
of questionnaire. Employees of various construction firm are interviewed. Collected data is analysed statistically. this analysis
is show the safety environment among organisation. it also gives suggestion to improve safety at construction site.
Analysis of Factors Affecting the Success of Safety Management Programs of Fo...AJHSSR Journal
This study sought to analyze the factors affecting the success of safety management programs
of food manufacturing companies in Nairobi County, Kenya. Specifically the study analyzes the effect of,
Personal Protective Equipment, communication, Safety Training and Management Commitment on the success
of safety management programs of national food manufacturing companies in Kenya. To achieve its objectives
the study adopted a descriptive design with quantitative approach where semi-structured questionnaires were
administered. The target population included 2510 employees of 12 registered food-manufacturing companies in
Nairobi County as per the Information Centre, Directorate of Occupational Safety and Health office Safety
House Ministry of Labor (2016). A sample size of 365 employees was obtained using the Fisher's formulae a
response rate of 91.5%. Statistical Package for Social Sciences was used to generate descriptive and inferential
data. A regression model was developed to establish the strength and direction of the relationship between the
dependent and the independent variables. The regression was significant and had R squared of 0.283 with the
following coefficients; Personal Protective Equipment 0.063, communication 0.386, Safety Training 0.236 and
Management Commitment 0.231. R squared value of 0.283 shows that the variables under this study only
contribute 28.3% towards the success of safety management programs. Thus the study recommends that other
studies be carried out to determine other factors affecting the success of safety management programs in the
food manufacturing industry. Of the variables under study communication was found to have the highest effect
and thus the study recommends that managers should ensure effective communication about safety training
programs.
This document summarizes a study that assessed and compared the safety cultures of two petrochemical plants in Algeria. A survey was distributed to employees at both plants to evaluate factors of safety culture and safety performance. The results showed that Plant A, managed by British and Norwegian leaders, had higher safety culture maturity and better safety performance than Plant B, as evidenced by lower accident rates. Specifically, Plant B needed most improvement in managers' commitment, training, incentives, communication, and employee involvement. Overall, the study confirms a relationship between strong safety culture and positive safety outcomes in high-risk industries like petrochemical facilities.
The document discusses the importance of using lead indicators like Safety Climate over lag indicators to proactively manage safety. Lead indicators can predict safety outcomes by assessing employee perceptions, while lag indicators only provide retrospective data on past incidents. Safety Climate specifically refers to shared employee perceptions of safety priorities and predicts compliance and participation. Ongoing monitoring of Safety Climate using pulse surveys allows organizations to address potential issues before incidents occur. This enables more effective safety management compared to relying solely on lag indicators.
Tareq FallatahProf Barbara Class 122NNS-05April 20,.docxmattinsonjanel
Tareq Fallatah
Prof: Barbara
Class: 122NNS-05
April 20, 2014
Meaning of safety
Historically, recurrent incidences of workplace accidents, subsequent injuries, and resulting conditions have significantly affected the wellbeing of employees in various working environments. Some of the notable cases of such accidents include “falls, being struck by objects, electrocution and getting caught-in/between operational machines “(OSHA). According to Personick and Ethel experts from the Bureau of Labor Statistics, it is because of increasingly worrying numbers of injuries and illnesses in work environments that the positions of safety inspectors and supervisors were created. In modern workplace management practices, emphasis is laid on creating the best and safest work environment for employees in varied professions. To achieve this, all workplaces must be reviewed and evaluated for compliance to safety policies by safety inspectors. Other important considerations include employee training and opinion based focus in work environments. Admittedly, workplace scrutiny by safety inspectors ensures that work environments are safe, healthy, and secure for all workers. Additionally, the continued presence of safety supervisors guarantees continued adherence to safety policies, rules and regulations.
Bringing someone new into the safety program to supervise the working environment provides a fresh non-biased opinion to the safety of the workplace. Opponents of safety practices involving inspectors and supervisors argue that the whole process may be too costly and time consuming. Nonetheless, the overall impact of omitting a safety inspector from the safety process in the workplace may lead to life loss or traumatic injuries if precautions are not taken. Notably, being from outside the company, safety inspectors normally present non-biased opinions. Additionally, most of them are highly trained and experienced in their areas of specialization. As a result, they possess outstanding abilities in identifying safety hitches that would be costly in the long-term. Furthermore, being professional in practice makes them release all observed information; whether negative or positive. To this extent, they substantially enrich the safety programs of various work environments. According to the career guide to the safety profession that has been published by the American Society of Safety Engineers Foundation, safety inspectors not only help to identify and reduce workplace hazards but also support in reducing costs and assist all workers within the company (Brown).
Experience is a vital attribute that companies concern when promoting an employee from lower position to supervisor. Experienced safety employees are equipped with better career elements through long-term interaction with other employees, thus initiating a well-structured cognitive behavior. They have suitable and ideal experience by helping in maintaining rationality towards employees they supervise. In a ...
The document discusses key concepts in industrial safety engineering including the evolution of modern safety concepts, safety policy, safety organization, and accident prevention. It defines important safety terms like accident, injury, unsafe acts, and unsafe conditions. It also outlines the need for safety organizations, safety posters, safety displays, safety pledges, and safety incentive schemes to promote a culture of safety in industrial settings.
This document discusses human factors in safety management and risk governance. It notes that while hazards are understood, human risks can be uncertain. Major accidents tend to focus on hardware over the human experience. Designs increase in complexity but the human element remains unchanged. Three key drivers for effective human factors in safety management are commitment from leadership, cognizance of human and organizational impacts, and competence in safety tools. Predictive analysis can help manage human factors issues. Organizational challenges include properly evaluating the human element and balancing hard and soft skills.
Study on Safety Management System of Manufacturing Industry IRJET Journal
This document discusses safety management systems in manufacturing industries. It begins with an introduction stating that while manufacturing has grown, safety aspects have been lacking. The document then outlines three key indicators of safety management systems and safe workplaces: organizational safety culture, behavioral safety, and safety performance. It provides details on each indicator, such as how safety culture can be improved through communication and leadership. Behavioral safety focuses on identifying safe and unsafe behaviors through training and motivation. Safety performance is evaluated using metrics like inspection and compliance rates. The goal of a strong safety management system is to minimize workplace accidents by addressing human factors, environmental factors, and management systems.
This document provides an analysis of the occupational health and safety management at Saman Grinding Mills in Sri Lanka. Through observations, the author identified several health and safety issues at the factory including exposure to noise, dust, chemicals, and cutting hazards from sharp tools. Recommendations are provided such as engineering controls to reduce noise levels, providing personal protective equipment like masks and respirators, improving maintenance procedures, and addressing work-related stress. The document aims to develop effective occupational health policies and practices to protect workers at Saman Grinding Mills.
Questions for the article ----Safety Climate How can you measure .docxmakdul
Questions for the article ----Safety Climate/ How can you measure it…..
1. What do you think that Jane the truck driver and Joe the lineman should do?
2. You are to describe the difference and similarities between the terms safety culture and safety climate.
3. The authors suggest that employees’ perceptions are influenced by what they see, such as how well supervisors and managers support safety. What do you think influences these perceptions?
a. What specifically would you suggest to a supervisor/manager should do to influence the perceptions of their employees?
b. Why are we paying so much attention to perceptions?
4. What is the difference between validity and reliability? How would I know that my survey is both valid and reliable?
5. The survey shows that safety climate affects safety behavior. What is it that the authors suggest through their research that supports the previous statement?
6. The authors tell us it is important to have all employees be given an opportunity to take the survey. Do you agree with that position, or not? Be prepared to defend your answer.
7. In the event that you have an employee who is illiterate:
a. Would it be important for that/these individuals to participate in the survey?
b. If it were important to have them complete the survey, how would you accommodate their inability to read?
8. What is the ultimate purpose of attempting to measure safety climate in an organization?
9. The author suggests that once the surveys are completed, one of the issues that should be checked are differences between locations and/or departments (IE pilots, mechanics, ATC, etc.). Do you think this is a meaningful analysis? Why or why not?
28 ProfessionalSafety january 2017 www.asse.org
Yueng-Hsiang (Emily) Huang, Ph.D., is a senior research scientist
at Liberty Mutual Research Institute for Safety (LMRIS) in Hopkin-
ton, MA. She holds a Ph.D. in Industrial-Organizational Psychology/
Systems Science from Portland State University. She conducts both
laboratory and field research in areas such as occupational injury and
accident prevention, and organizational culture and climate. She is a
Fellow of the American Psychological Association and the Society for
Industrial-Organizational Psychology. Huang is an associate editor of
Accident Analysis and Prevention.
Susan Jeffries is a research specialist at LMRIS where she recruits
companies as potential partners in research for field studies and
serves as liaison between the institute and corporate safety profes-
sionals in such initiatives. She conducts qualitative research through
in-depth interviews and focus groups to investigate issues relating to
safety in the trucking industry and other lone worker environments.
Jeffries holds a B.S. in Marketing from Boston College.
George D. (Don) Tolbert, CSP, is technical director, organizational
practices, with Liberty Mutual’s Risk Control Service department.
His responsibilities incl ...
SF 470Assignment #3For this assignment you are to read the.docxlesleyryder69361
SF 470
Assignment #3
For this assignment you are to read the article titled “Corporate Culture” by Judith Erickson.
1) You are to read and summarize the article, identifying the key points made in the article. Reflect on the issues you find enlightening.
2) Identify at least three points that you agree and/or disagree with that the author made in her article. Present cogent arguments, from your perspective, with supporting citations. Be sure to cite your support sources.
Safety ManagementSafety Management
S
Corporate
Culture
Examining its effects on safety performance
By Judith A. Erickson
SAFETY PERFORMANCE is divided into two
aspects: safety program elements and safety process
elements (Erickson, 2006). The program elements
deal with basic safety functioning: regulations, legis-
lation, training, audits and related items. These ele-
ments are considered hard skills and are under
control of the safety professional. The process ele-
ments are the underlying factors within an organi-
zation that either help or hinder the safety effort.
These soft skills are indicators of the corporate cul-
ture, and they are not under the safety professional’s
control (Erickson, 1994).
To achieve optimal safety functioning, both cultur-
al elements and compliance issues must be
addressed. The scientific evidence is overwhelming
that both hard and soft skills are needed to attain opti-
mal safety and business performance (Erickson, 1994;
2001; Shannon, Mayr & Haines, 1997; DeJoy, Schaffer,
Wilson, et al., 2003; Vredenburgh, 2002; Zohar &
Luria, 2004; Parker, Axtell & Turner, 2001; Hofmann &
Morgeson, 1999; Hofmann, Morgeson & Gerras, 2003;
Turner & Parker, 2003; Maierhofer, Griffin & Sheehan,
2000; Maister, 2001; Drucker, 1954; O’Toole, 1996;
Maister, 1997; Buckingham & Coffman, 1999).
However, some in the technical or engineering
fields believe that soft skills are not measurable by
any standard technique or protocol. Within acade-
mia, natural and physical research scientists often
posit this view when discussing the social sciences.
Yet, with rigorous research design and protocol,
social scientists can conduct scientific research that is
quantitatively and statistically equivalent to that of
natural and physical scientists. Through such meth-
ods, the effects of these soft skills have been statisti-
cally correlated with safety performance and
organizational functioning. These measurements are
available to researchers to help organizations im-
prove their safety and business performance.
When assessing organizational culture, SH&E
professionals must be aware of the scientific bases of
the cultural interventions they select. They must
Abstract: Research
demonstrates that cor-
porate culture influences
an organization’s safety
performance. When
assessing organizational
culture, SH&E profession-
als must be aware of the
scientific bases of the
cultural interventions
they choose. This will
help them decide ration-
ally and logically how
they w.
The document evaluates the effectiveness of a behavior-based safety initiative (BBSI) card system introduced at a cement manufacturing company in Zimbabwe. The following key points are made:
- Accident and injury rates significantly decreased after the card system was introduced based on a comparison of rates before and after as well as a paired t-test.
- A negative correlation was found between the number of cards issued and the number of accidents/injuries, indicating more cards issued correlated with fewer accidents/injuries.
- Employee attitudes toward safety practices were found to be positively influenced by the card system based on a questionnaire administered to employees.
The card system was effective in reducing accidents and injuries at the company according to
Human Factors (HF) covers a variety of issues that relate primarily to the individual and workforce, their behavior and attributes. Human error is still poorly understood by many stakeholders and so the risk assessments of operations or process often fall short in their capture of potential failures. There is little consideration of human factors in the engineering design of equipment, operating systems and the overall process, procedures and specific work tasks. Operational human factor issues are often treated on an ad-hoc basis in response to individual situations rather than as part of an overarching and comprehensive safety management strategy. The role that human factors play in the rate of incidents, equipment failure and hydrocarbon releases is poorly understood and underdeveloped.
IRJET- The Health and Safety Management Performance of Construction Smes i...IRJET Journal
This document summarizes research on health and safety management practices in the construction industry in Gujarat, India. It finds that construction work is hazardous and small-to-medium enterprises (SMEs) dominate the industry in Gujarat. The document reviews literature on factors affecting safety performance and identifies barriers to effective health and safety management in Gujarat's construction SMEs. These include a lack of safety training and awareness among workers, inadequate safety policies and monitoring, and failure to integrate health and safety training. The document concludes more focus on safety is needed from the industry and recommends owners take a more active role in safety management.
In contemporary work settings, ensuring the safety and well-being of employees stands as a paramount concern. Each year, workplace incidents lead to countless injuries and substantial financial losses for businesses globally. Consequently, implementing proactive safety measures becomes imperative. Enter HIRA – Hazard Identification and Risk Assessment. HIRA serves not merely as another safety protocol but as a strategic approach aimed at identifying potential hazards and evaluating associated risks. This proactive methodology not only elevates workplace safety but also instils a culture of prevention and readiness within organizations. In this blog, we will delve into the significance of HIRA, its implementation process, and benefits it presents in transforming workplace safety standards.
WHAT IS HIRA?
HIRA, which stands for Hazard Identification and Risk Assessment, embodies a systematic approach utilized to identify potential hazards within the workplace and evaluate their corresponding risks. HIRA serves as a critical component in the field of occupational health and safety. It’s a two-step process aimed at first uncovering potential hazards within a workplace, then evaluating the extent of risks these hazards might pose to employees, processes, or the environment. The core objective of HIRA is centred on proactively preventing accidents, injuries, and occupational illnesses by addressing potential hazards before they escalate into safety incidents. Through a methodical analysis of hazards and risk assessment, organizations can effectively prioritize mitigation efforts, allocate resources efficiently, and establish a safer work environment for all stakeholders involved.
BENEFITS OF IMPLEMENTING HIRA?
Implementing a robust workplace safety program, such as the HIRA (Hazard Identification and Risk Assessment), offers numerous benefits to organizations, including:
• Employee Health and Well-being: Prioritizing workplace safety minimizes accidents and injuries, resulting in a healthier workforce with fewer instances of illness or disability.
• Cost Reduction: Preventing accidents reduces healthcare expenses, workers’ compensation claims, and potential legal costs. It also minimizes downtime and enhances productivity by curbing absenteeism.
• Enhanced Morale and Productivity: A safe work environment boosts employee morale, leading to increased productivity and job satisfaction. This positive atmosphere can also reduce turnover rates.
• Quality Enhancement: A safe workplace correlates with higher quality output as employees are more focused and less error-prone when supported by effective safety protocols.
• Competitive Advantage: A strong commitment to workplace safety differentiates an organization from its competitors, appealing to clients and partners who prioritize employee well-being.
Similar to Safety management and organizational performance of selected manufacturing firms in Awka Metropolis (20)
STUDY ON THE DEVELOPMENT STRATEGY OF HUZHOU TOURISMAJHSSR Journal
ABSTRACT: Huzhou has rich tourism resources, as early as a considerable development since the reform and
opening up, especially in recent years, Huzhou tourism has ushered in a new period of development
opportunities. At present, Huzhou tourism has become one of the most characteristic tourist cities on the East
China tourism line. With the development of Huzhou City, the tourism industry has been further improved, and
the tourism degree of the whole city has further increased the transformation and upgrading of the tourism
industry. However, the development of tourism in Huzhou City still lags far behind the tourism development of
major cities in East China. This round of research mainly analyzes the current development of tourism in
Huzhou City, on the basis of analyzing the specific situation, pointed out that the current development of
Huzhou tourism problems, and then analyzes these problems one by one, and put forward some specific
solutions, so as to promote the further rapid development of tourism in Huzhou City.
KEYWORDS:Huzhou; Travel; Development
Enhancing Losari Beach Exploration: Augmented Reality for Immersive Visualiza...AJHSSR Journal
ABSTRACT: South Sulawesi, commonly known as Makassar, boasts rich cultural heritage and customs,
making it a prominent destination for tourism. Among its attractions, Losari beach stands out as a focal point for
visitors seeking to explore the city's natural beauty and cultural offerings. In this context, leveraging modern
technology such as augmented reality presents an innovative approach to showcasing Losari beach to potential
tourists. This research endeavors to introduce tourism assets in a more visually captivating manner through the
use of augmented reality. Utilizing software tools like Unity and Adobe Illustrator, the study focuses on creating
an immersive experience where tourists can interact with virtual representations of Losari beach. By simply
pointing their mobile phone cameras at designated markers or using barcode scanners, tourists can access
augmented reality features embedded within the application. The findings of this research aim to provide
valuable information, particularly for foreign tourists, about Losari beach, positioning it as a compelling
destination within South Sulawesi's diverse array of tourist attractions. Through this technological innovation,
the study seeks to enhance the visibility and appeal of Makassar city's tourism offerings on a global scale.
KEYWORDS: Visualizing, Losari Beach, Augmented Reality
DEVELOPMENT STATUS AND COUNTERMEASURES OF TMALL DURING THE COVID-19 EPIDEMICAJHSSR Journal
ABSTRACT:China's e-commerce enterprises have developed rapidly, among which Tmall has become one of
the largest retail shopping websites in China.But in the past year, the Covid-19 epidemic has brought a huge
impact to Chinese e-commerce enterprises, and Tmall is no exception.Therefore, the development status of
Tmall in the new crown epidemic situation was analyzed, and the viewpoint was put forward :Tmall1 stabilized
the situation in the face of the epidemic situation and made a very correct countermeasures.The influence of this
epidemic on Tmall was deeply analyzed, and the conclusion was made: the new crown epidemic is both a
challenge and an opportunity forTmall.
KEYWORDS:Tmall; COVID - 19 outbreak ; The electronic commerce
Factors affecting undergraduate students’ motivation at a university in Tra VinhAJHSSR Journal
ABSTRACT: Motivation plays an important role in foreign language learning process. This study aimed to
investigate student’s motivation patterns towards English language learning at a University in Tra Vinh, and factors
affecting their motivation change toward English language learning of non-English-major students in the semester.
The researcher used semi-structured interview at the first phase of choosing the participants and writing reflection
through the instrument called “My English Learning Motivation History” adapted from Sawyer (2007) to collect
qualitative data within 15 weeks. The participants consisted of nine first year non-English-major students who learning
General English at pre-intermediate level. They were chosen and divided into three groups of three members each
(high motivation group; average motivation group; and low motivation group). The results of the present study
identified six visual motivation patterns of three groups of students with different motivation fluctuation, through the
use of cluster analysis. The study also indicated a diversity of factors affecting students’ motivation involving internal
factors as influencing factors (cognitive, psychology, and emotion) and external factors as social factors (instructor,
peers, family, and learning environment) during English language learning in a period of 15 weeks. The findings of
the study helped teacher understand relationship of motivation change and its influential factors. Furthermore, the
findings also inspired next research about motivation development in learning English process.
KEY WORDS: language learning motivation, motivation change, motivation patterns, influential factors, students’
motivation.
The Impact of Work Stress and Digital Literacy on Employee Performance at PT ...AJHSSR Journal
ABSTRACT :This research aims to analyze the correlation between employee work stress and digital literacy
with employee performance at PT Telkom Akses Area Cirebon, both concurrently and partially. Employing a
quantitative approach, the study's objectives are descriptive and causal, adopting a positivist paradigm with a
deductive approach to theory development and a survey research strategy. Findings reveal that work stress
negatively and significantly impacts employee performance, while digital literacy positively and significantly
affects it. Simultaneously, work stress and digital literacy have a positive and significant influence on employee
performance. It is anticipated that company management will devise workload management strategies to
alleviate work stress and assess the implementation of more efficient digital technology to enhance employee
performance.
KEYWORDS -digital literacy, employee performance,job stress, multiple regression analysis, workload
management
The Settlement of Construction Disputes Through Dispute Councils From the Per...AJHSSR Journal
ABSTRACT:This research differs from the practice of business activity in the construction services industry,
which may lead to construction disputes. The settlement of construction disputes is a consensus based on the
basic principle of debate. If the discussions between the parties do not reach an agreement, the parties may take
measures to resolve the dispute through the dispute council. Because the standard governing the disputes
committee was not fully regulated, they did not comply with the principle of legal certainty. Therefore, further
research was needed to establish a theoretical basis for regulating the disputes committee in settling construction
disputes. This research is a standard legal research using a legal regulatory, conceptual, and comparative
approach. The research results show that the ideal concept of resolving construction disputes through a dispute
council based on the value of legal certainty is to establish that the position of the dispute council is a special
court that has the authority to resolve construction disputes under construction services agreements. To realize
the position of the Court of Disputation as a special court, it must be based on the creation of philosophical
values, the creationof legislative regulations, and the creation of the institutional structure of the Court of
Disputation.
KEYWORDS-Construction Disputes, Dispute Council, Special Court
VALUES OF ORAL LITERATURE IN THE SOCIETY: A STUDY OF FOLKTALES OFOGBA IN RIVE...AJHSSR Journal
ABSTRACT : Oral literature is a creative work of art that portends high merit and has the creative use of
imagination in preliterate societies. It adopts the genres of literature: drama, prose and poetry in the oral milieu,
using performance as its hallmark. It thrives on the use of oral data because of its orality. This paper focuses on
the moral values or oral literature in the society using Ogba as a spring board. The study was carried out in
communities ofOgba. The population of the study consists of ten towns and village, in Ogba. The theoretical
framework used is Dell Hyme’s ethno-poetics because the works of oral literature relate to the society. This
paper concludes that oral literature serves to against all odds; communicate ideas, emotions, beliefs and
appreciation of life. The folktales in Ogba for instance, serve similar purpose through their
rendition/performance. Through the stories, the younger generation in Ogba society is familiarised with the
customs, traditions, and rituals prevalent in the society. This paper therefore recommends the use of oral
literature in all its genres to inculcate moral values and lessons to the teenagers and youths. Against this
background, Ogba (African) themselves must cease to regard oral literature as primitive and fetish.
KEYWORDS: Values, Oral Literature, Society, Ogba, Folktales
Pormalistikong Pagdalumat sa mga Tula ni Ron CanimoAJHSSR Journal
ABSTRACT: Nilayon ng pag-aaral na ito na masuri ang dalawampung (20) tula ni Ron Canimo gamit ang
pormalistikong dulog batay sa mga sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at
Simbolismo, (c) Imahen, (d) Tema, at (e) Diksiyon. Layunin din nitong mataya ang antas ng pagtanggap ng
ginawang pagsusuri gamit ang nabuong instrumento sa pagtataya nito. Sinunod dito ang Input-Process-Output
na balangkas ng pag-aaral at ginamitan ng kwantitatib-deskriptib-ebalwatib na pamamaraan. Sa pamamagitan
ng talatanungang ibinatay sa ginamit ni Morales (2014) na naimodipika ayon sa kahingian ng kasalukuyang
pag-aaral, tatlong (3) gurong eksperto ang nagsilbing tagataya dito na siyang tumiyak sa kahusayan ng nabuong
pagsusuri ng mananaliksik. Gamit ang Content Analysis, natuklasan na makabagong pamamaraan ang istilo na
ginamit ni Ron Canimo sa pagsulat ng mga tula. Lahat ng kanyang mga tula ay walang sinusunod na sukat at
tugma, may iba‟t ibang tayutay at simbolismong ginamit, magkaibang pandama ang pinagana dahil sa mga
imahe at paglalarawang ginawa, iba‟t ibang uri ng pag-ibig ang tinalakay at gumamit ng pormal, impormal o
kumbersasyonal na wika at makabagong istilo sa pagsulat ng tula. Gamit ang mean at standard deviation,
lumabas na “Mataas” ang antas ng pagtanggap sa kabuuan ng mga gurong eksperto na tumaya sa nabuong
pagsusuri. Lumabas din na “Mataas” ang antas ng kanilang pagtanggap sa nabuong pagsusuri batay sa mga
sumusunod na elemento: (a) Sukat at Tugma, (b) Talinghaga at Simbolismo, (c) Imahen, (d) Tema, at (e)
Diksiyon. Mula sa natayang pagsusuri at kinalabasan ng antas ng pagtanggap dito, naitala ang mga paksa sa
Junior High School Filipino na maaaring lapatan at gamitan ng nabuong pagsusuri.
KEYWORDS: Kumbensyunal, Pagdalumat, Pormalistiko, Ron Canimo, Tula
SCHOOL CULTURE ADAPTATION AMONG INDIGENOUS PEOPLES COLLEGE STUDENTS AT A PRIV...AJHSSR Journal
ABSTRACT: This qualitative study investigates the adaption experiences of indigenous college students at the
University of Mindanao, Matina-main campus. Eight major themes emerged, including difficulties with language
proficiency, online learning, classroom interaction, examination systems, grading procedures, school regulations,
resource accessibility, coping mechanisms, and future goals. Implications include the requirement for targeted
language proficiency and technology use support, an understanding of adaption processes, interventions to
improve resource accessibility, and equitable public administration policies. The study underlines the importance
of adaptation in various educational contexts, as well as the role of educators and legislators in creating inclusive
learning environments.
KEYWORDS: indigenous college students, adaptation, educational challenges, coping strategies
The effect of Institutional Ownership, Sales Growth and Profitability on Tax ...AJHSSR Journal
ABSTRACT: This research aims to test, analyze and obtain empirical evidence about the influence of
institutional ownership, sales growth and profitability on tax avoidance. The object of this research is
manufacturing companies in the consumer goods industry sector listed on the Indonesia Stock Exchange (BEI)
in 2018-2022. This research used quantitative research methods and causal research design. The sampling
technique in this research used non-probability sampling with purposive sampling as the basis for determining
the sample so that a sample of 55 samples was obtained. The data used is secondary data obtained from the
official website of the Indonesia Stock Exchange (BEI) during the 2018-2022 period. The data analysis method
used was multiple linear regression analysis with several tests such as descriptive statistical tests, classical
assumption tests, and hypothesis testing using SPSS version 26 statistical software. The results showed that the
institutional ownership variable has no effect on tax avoidance, while the sales growth and profitability has a
negative and significant effect on tax avoidance.
KEYWORDS: Institutional Ownership, Sales Growth, Profitability, Tax Avoidance
MGA ESTRATEHIYA SA PAGTUTURO KAUGNAY SA PASALITANG PARTISIPASYON NG MGA MAG-A...AJHSSR Journal
ABSTRAK: Ang mga estratehiya sa pagtuturo ay mahalagang kasangkapan sa paghahatid ng mabisang
pagtuturo sa loob ng silid. Tinukoy sa pag-aaral na ito ang antas ng kagustuhan ng mga mag-aaral sa pagsasadula,
pangkatang talakayan at paggawa ng mga koneksyon sa tunay na karanasan sa buhay bilang mga estratehiya sa
pagtuturo ng panitikan sa Filipino at pasalitang partisipasyon ng mga mag-aaral sa Baitang 7 ng Misamis
University Junior High School, Ozamiz City. Ang ginamit na disenyo sa pananaliksik na ito ay deskriptivcorrelational. Ang mga datos sa pag-aaral ay nagmula sa kabuuang populasyon na 120 na mag-aaral at tatlong
mga guro na tagamasid sa pasalitang partisipasyon ng mga mag-aaral. Ang Talatanungan sa Kagamitan sa
Pagtuturo ng Panitikan at Checklist batay sa Obserbasyon sa Pasalita na Partisipasyon ay ang instrumentong
ginamit sa pagkalap ng datos. Mean, standard deviation, Analysis of Variance at Pearson Product-Moment
Correlation Coefficient ang mga ginamit na estatistiko na sangkap. Inihayag sa naging resulta na ang tatlong piling
estratehiya sa pagtuturo ng panitikan sa Filipino ay may pinakamataas na antas ng kagustuhan ng mga mag-aaral.
Ang antas ng pakilahok ng mga mag-aaral sa paggamit ng tatlong estratehiya sa pagtuturo ng panitikan ay
pinakamataas na nagpapahiwatig na aktibong nakilahok ang mga mag-aaral sa mga gawain. Inihayag din na
walang makabuluhang kaibahan sa antas ng kagustuhan ng mga mag-aaral sa mga estratehiya sa pagtuturo ng
panitikan sa Filipino. Ito ay nangahulugan na gustong-gusto ng mga mag-aaral ang pagkakaroon ng mga
estratehiya sa pagtuturo. Walang makabuluhang kaugnayan ang kagustuhan sa mga estratehiya at antas ng
pakikilahok ng mga mag-aaral. Hindi nakaapekto sa kanilang pakikilahok ang anumang estratehiyang ginamit ng
guro.
KEYWORDS : estratehiya, karanasan, pagsasadula, pagtuturo, pangkatang talakayan
The Role of the Instruction of Reading Comprehension Strategies in Enhancing ...AJHSSR Journal
ABSTRACT :Throughout my studies and teaching English in different language centers and higher studies
institutions, I have come to conclude that students consider Reading comprehension as a nightmare that
frightens them and hinders their language acquisition in the Moroccan EFL Context. This may cause them to
develop an internal psychological obstacle that grows as their lack of the necessary instruments or tools to
overcome are not equipped with. They become lost and unaware about or unfamiliar with the necessary reading
comprehension strategies that could help them to face the problem of misunderstanding or non-understanding
of English texts. Respectively, this article which is only one part of my whole study aims at showing the effect
of teaching reading strategies in enhancing the S1 students‟ familiarity with reading strategies and raising their
frequency use. A sample of 283 University students in EFL context have been chosen randomly and have
attended the usual academic reading classes, yet only 76 are subject to this survey. 38 of them constitute the
experimental group who have attended the treatment regularly in one of the language centers and the other 38
participants are chosen randomly from the whole population to constitute the Control group. They all have
Psychosocial Factors and Deviant Behaviors of Children in Conflict with the L...AJHSSR Journal
ABSTRACT:This study aims to determine the relationship between psychosocialfactors and deviant
behaviors among children in conflict with the law (CICL) inDavao Region. The researchers want to discover the
prevalent factors thatdrive these children to their behaviors. Further, the study sought to determinethe
manifestation of psychosocial factors in terms of life satisfaction, emotionalsupport, self-esteem, and personality
traits. The study's data came from N-83children in conflict with the law (CICL) at the Regional Rehabilitation
Center forYouth (RRCY) in Bago Oshiro, Davao City; all respondents are male. This studyused a total
enumeration sampling technique due to the relatively smallpopulation size. The researchers adapted the
Psychosocial surveyquestionnaires by Zabriskie & Ward (2013) and by John and Srivastava (1999)as well as the
Deviant Behavior Variety Scale (DBVS) by Sanches et al. (2016).Through the use of a validated questionnaire,
the mean and standard deviationare determined. The researchers modified this questionnaire and translated itinto
the respondents' mother tongue (Cebuano) for them to comprehend itbetter. The study discovered no significant
relationship between psychosocialfactors and deviant behaviors of children in conflict with the law (CICL) in
theDavao Region
KEYWORDS :Children in Conflict with the Law (CICL), deviant behaviors, psychosocial factors
Entropy: A Join between Science and Mind-SocietyAJHSSR Journal
ABSTRACT: Entropy is join, intersection and interaction between natural science and human mind-society.
We proposed that if internal interactions exist in isolated systems, entropy decrease will be possible for this
system. Management in system is a typical internal interaction within the isolated system. The purpose of
management is to use regulating the internal interactions within the system, and to decrease the increasing
entropy spontaneously. We propose the principle of social civilization and the developing direction is: freedom
of thought, rule of action. Both combinations should be a peaceful revision and improvement of social rules and
laws. Different countries and nations, different religions and beliefs should coexist peacefully and compete
peacefully. The evolution of human society must be coevolution. Its foundation is the evolution of the human
heart and the human nature.
KEYWORDS: entropy, science, society, management, mind, evolution.
A Model of Disaster Resilience Among Colleges and Universities: A Mixed Metho...AJHSSR Journal
ABSTRACT :This research paper aimed to create a comprehensive framework for measuring disaster
resilience in colleges and universities. The study used a mixed method through Exploratory Factor Analysis
(EFA), which involved analyzing data from a survey questionnaire. The questionnaire was developed based on
in-depth interviews with 12 selected participants from the University of Mindanao, as well as relevant literature
and studies. It was reviewed and validated by 10 experts using a method called Content Validity Ratio (CVR).
This questionnaire was then administered to 400 students from 10 different colleges in University of Mindanao.
After conducting the Exploratory Factor Analysis and performing rotations and iterations, the researchers
identified five main constructs that characterize disaster resilience among colleges (1) disaster preparedness, (2)
disaster awareness, (3) community readiness, and (4) disaster management, (5) disaster resilience. The
researchers aimed to create an organization called “Council of College Disaster Volunteers (CCDV)” which
consist of student volunteers. These factors can be used to develop effective management strategies and
strengthen efforts in preventing and managing disasters and accidents.
KEYWORDS:content validity ratio, criminology, disaster resilience, disaster management, exploratory factor
analysis, and Philippines.
Environmental Struggles and Justice Among Lumad Farmers of Davao CityAJHSSR Journal
ABSTRACT : The study described the various environmental struggles experienced among the participants
and their status in accessing justice. The study followed a qualitative multiple-case study approach; the
participants are the Lumad farmers of Marilog, Davao City selected through a Critical sampling method and
aims to present the environmental violations experienced by the Lumad farmers in Davao City and how it
affected their families and sustenance further, their status in accessing justice is also explored. The study
concluded that the most common struggles the participant experience are Illegal logging and improper waste
disposal, which affect their farms, family, health, and income. Their preferred means to accessing justice is
through barangay settlement; the rigors of accessing courts, such as distance, expenses, fear of ruling, and the
hassle of being called to be present in court, are the most prevalent barriers that hinder the lead farmers from
accessing justice or seeking legal action. Nevertheless, the participants believed that the government would help
them in accessing justice.
KEYWORDS :access to justice, criminology,environmental justice, environmental struggles, lumadfarmers
CYBERBULLYING EXPERIENCES OF UNIVERSITY OF MINDANAO CRIMINOLOGY STUDENTSAJHSSR Journal
ABSTRACT:This paper explores the cyberbullying experiences among Criminology students at the
University of Mindanao. A simple random sampling method was used to distribute the study's online
questionnaire to the respondents and to survey the target population. This study has four hundred (400)
respondents, and the respondents are Criminology students at the University of Mindanao. The findings of this
study revealed that the level of cyberbullying experiences is sometimes manifested. On the other hand, the
cyberbullying experiences of the students indicate a moderate level, which indicates that the cyberbullying
experiences of the respondents are sometimes manifested. Also, the computations showed that among the
indicators presented, the highest mean is obtained in the psychological effect, which implies that there is a
significant effect of cyberbullying experiences of the respondents in terms of the Gender level of the
respondents. Therefore, respondents with a low level of cyberbullying experiences tend to have a moderate level
of cyberbullying experience. However, there is no significant effect in terms of age and year level of the
respondents according to the results regarding the psychological, emotional, and physical impact of
cyberbullying.
KEYWORDS :cyberbullying, emotional, experiences, psychological,physical effect, and simple random
sampling method.
A philosophical ontogenetic standpoint on superego role in human mind formationAJHSSR Journal
ABSTRACT: One of the most significant contributions of psychoanalysis to understand the human being is the
elaboration of a model about the mind from a topical and dynamic perspective. Freud explains the mind by the
constitution of the preconscious, conscious, and subconscious. Later, by three dynamic components: the id, the
ego and the superego. Such an organization of the psychic apparatus supposes not only individual elements, but
social influences along the process of hominization. In this paper, we recover the findings of the renowned
anthropologist Lewis Morgan, trying to link some of them to the psychoanalytic theory. Especially highlighting
the importance of superego in Haidt’s social intuitionism.
Keywords: evolutionism, intuitionism, psychoanalysis, Freud, Haidt, Morgan
Psychological Empowerment and Empathy as Correlates of ForgivenessAJHSSR Journal
ABSTRACT: The study explores Psychological Empowerment and Empathy as Correlates of Forgiveness.
The two variables are regarded to have influence on the decision one makes to forgive another. The study aimed
at examining the relationships between psychological empowerment and forgiveness, empathy and forgiveness
and to identify which one of the two,Psychological Empowerment or Empathy, is the more powerful predictor of
forgiveness. The study took a survey design with a sample of 350 drawn from a population of university students
using a self-administered questionnaire with four sections: Personal information, Psychological empowerment
scale, Toronto Empathy questionnaire, and the Heartland Forgiveness Scale (HFS). Data analysis employed
Pearson’s product moment correlation and regression analysis to test hypotheses. The results show significant
relationships between psychological empowerment and forgiveness as well as empathy and forgiveness.
Empathy was found to be the more powerful predictor of forgiveness.
KEY WORDS: Psychological empowerment, empathy, forgiveness
Exploring The Dimensions and Dynamics of Felt Obligation: A Bibliometric Anal...AJHSSR Journal
ABSTARCT: This study presents, to our knowledge, the first bibliometric analysis focusing on the concept of
"felt obligation," examining 120 articles published between 1986 and 2024. The aim of the study is to deepen our
understanding of the existing knowledge in the field of "felt obligation" and to provide guidance for further
research. The analysis is centered around the authors, countries, institutions, and keywords of the articles. The
findings highlight prominent researchers in this field, leading universities, and influential journals. Particularly,
it is identified that China plays a leading role in "felt obligation" research. The analysis of keywords emphasizes
the thematic focuses of these studies and provides a roadmap for future research. Finally, various
recommendations are presented to deepen the knowledge in this area and promote applied research. This study
serves as a foundation to expand and advance the understanding of "felt obligation" in the field.
KEYWORDS: Felt Obligation, Bibliometric Analysis, Research Trends
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Safety management and organizational performance of selected manufacturing firms in Awka Metropolis
1. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 143
American Journal of Humanities and Social Sciences Research (AJHSSR)
e-ISSN :2378-703X
Volume-02, Issue-11, pp-143-153
www.ajhssr.com
Research Paper Open Access
Safety management and organizational performance of selected
manufacturing firms in Awka Metropolis
1
DR. DIM ETHELMARY 2
OKOYE ANTHONY CHUKWUMA
3
OKOYE OGOCHUKWU JOY
1
Department of Business Administration, Chukwuemeka Odumegwu Ojukwu University,
Igbariam Campus, Anambra State, Nigeria.
2
Department of General Studies, Anambra State Polytechnic, Mgbakwu, Anambra State, Nigeria.
3
Msc Student of Business Administration Department, Chukwuemeka Odumegwu Ojukwu University,
Igbariam Campus, Anambra State, Nigeria.
ABSTRACT: The health and safety (H&S) of employees is a very significant issue to consider with relation to
the attainment of organizational goals. The broad objective of the study is to examine the level of relationship
between safety management system and organizational performance of two plastic industries in Awka
metropolis. Three research questions and hypotheses were formulated in line with the specific objectives. The
study is anchored on Heinrich Theory. In pursuance of the objective of the study, the descriptive survey design
was adopted. The study worked with the population of eighty. Pilot study was conducted using a test retest
method to establish the reliability of the research instrument. The validity of the instrument was also tested. Chi
square was used for data analysis and Z test was also used to test the Chi square at 0.05 level of significance.
The findings revealed that safety management has a positive influence on firm’s profitability, that there is a
relationship between safety management and customer satisfaction, that safety management has influence on
employee commitment and that safety management reduces cost for organization. The study recommends that
Safety should therefore be afforded the highest priority, taking precedence over commercial, operational,
environmental or social pressures, in that staff must be given responsibility for their own actions, and managers
held responsible for the safety performance of their organisations.
Keywords: safety, performance, management, organization.
I. INTRODUCTION
Background of the study
The widespread concern about employee safety and health in United States led to the passage in 1970 of the
most comprehensive law regarding worker safety. This act is known as the Occupational Safety and Health Act
of 1970 but is frequently referred to simply by its initials: OSHA. At the time OSHA was passed, approximately
15,000 work-related deaths occurred in the United States every year (Denisi & Griffin, 2005).
Incorporating safety management systems into normal business operations does appear to reduce accidents and
improve safety in high-risk industries.
There exists more accident rate in the manufacturing industry compared to other industry. The health and safety
(H&S) of employees is a very significant issue to consider with relation to the attainment of organizational
goals. Health and safety policies and programs are concerned with protecting employees and other people
affected by an organisation’s activities, products and services against hazards.
Formal organizations are consciously directed toward attainment of set goals. Goal accomplishment is a
function of the coordinated and interactive effort of organizational resources (human, material, financial,
informational, etc).
The realization of human resource as the most important of all the assets, in contemporary management, may be
based on its inevitable role in the manipulation of all other organizational assets or resources for productivity.
2. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 144
Management perception of human importance in the organizational setting has been exhibited through deliberate
strategic decisions directed at the attraction of desired labour, to the verge of exit. One of such strategic
decisions can be epitomized by effort to provide safe work environment.
In Nigeria, the average annual fatal accident rate is likely to be higher than the European Union average due to
the prevailing weak safety management legislation and the absence of a central safety council charged with the
responsibility of monitoring safety management compliance of organizations (Agwu, 2011).
There are two approaches to safety management, namely; reactive safety management and proactive safety
management. ICAO Safety Management Manual (Doc, 9859) reactive safety management approach is useful
when dealing with technological failures, or unusual events. While the proactive approach in the safety
management is based on the following risk management strategy that includes identifying hazards before they
materialise into incidents or accidents and taking the necessary actions to reduce the safety risks.
Safety management is commonly understood as applying a set of principles, framework, injuries and other
adverse consequences that may be caused by using a service or a product. It is that function which exists to
assist managers in better discharging their responsibilities for operational system design and implementation
through either the prediction of system’s deficiencies before errors occur or the identification and correction of
system’s deficiencies by professional analysis of safety occurrence. Safety management is an organizational
function, which ensures that all safety risks have been identified, assessed and satisfactorily mitigated.
Effort of OSHA notwithstanding, Denisi & Griffin (2005) admonished organizations to take several precautions
in its effort to create a safer work environment, especially regarding accidents at work. According to them, one
important approach is to employ the services of safety engineers to carefully study the workplace, identify and
isolate dangerous situations, and recommend solutions for dealing with those situations. Other steps to minimize
the rate of accidents at work may include the use of relevant protective clothing and devices such as helmets, ear
protectors in environment with loud noise, eye goggles and face masks in welding rooms, hand gloves, boots
and other safety shoes, waist support belts, wrist and elbow supports and screen filters, appropriate chairs and
desks, etc.
ISHA (1970), A safety management system is a series of defined, organization-wide processes that provide for
effective risk-based decision- making related to your daily business. It focuses on maximizing opportunities to
continuously improve the overall safety system of an industry, where the key processes are : Hazard
Identification – a method for identifying hazards related to an organization; Occurrence Reporting – a process
for the acquisition of safety data; Risk Management – a standard approach for assessing risks and for applying
risk controls; Performance Measurement – management tools for analyzing whether the organization’s safety
goals are being achieved; and Quality/Safety Assurance – processes based on quality management principles
that support continuous improvement of the organization’s safety performance.
The importance of risk and safety management is increasingly emphasized in enterprises, and the importance of
overall safety in the company’s profitability, business and competitiveness is significant. The world’s leading
companies have started to increasingly invest in different sectors of safety, and safety is a central precondition
of competitiveness, as well as an integral part of high-quality business operations (Pekka, 2009). This study
focuses on safety management and organizational performance.
New Millennium Industry Awka is located at No 1 – 12, millennium drive, Enugu- Onitsha express way in
Awka south, Anambra state Nigeria. The industry was established in 2005. They provide quality and affordable
plastic products such as chairs, cups tables, buckets etc, with over eighty factory workers working with them.
Fino Plastika industry located at plot 1and 2 Ikenga Industrial Layout, Agu Awka, Anambra, Nigeria was
established twenty five years ago. They engaged in producing different plastic Bowls and Pressure Pipes with
over fifty staff working for them.
The influence of an enduring employee’s safety culture on organisational productivity and loss control in the
Nigerian manufacturing industry cannot be over emphasized, especially in the areas of setting minimum safety
management standards, safe work procedures and environmental management standards. It is assumed that an
organization’s employees safety culture have a direct relationship with employees’ productivity in view of the
fact that assigned tasks can only be safely accomplished when the work environment is safe and conducive for
the execution of the assigned duties, be it manufacturing, construction or servicing industries, thus, any
3. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 145
phenomenon that affects human production capacity will invariably affect organizational productivity hence
improving workers wellbeing offers a company the opportunity of enhancing its performance(Galliker,2000).
And the purpose of this study is to find out the extent of relationship between safety management and
organizational performance.
Statement of problem
Often times, employees working with manufacturing firms sustain one injury or another which result in loss of
hands, legs, any other part of their body or even lost of lives. Technology pressure and intense global
competition not only bring tremendous changes in organizational safety but also threatens it (Rollah,
2010).There are dangers and threats in every occupation and it is imperative that managers and workers alike
become aware of the hazards associated with their jobs, as well as the preventive measure necessary for
minimizing them. It is against this backdrop that the researcher wants to find out the level of the relationship
between safety management system and organizational performance.
Objectives of the study
The broad objective of the study is to examine the level of relationship between safety management system and
organizational performance, while the study specifically seeks:
1. To examines the extent to which safety management will lead to profitability of firms in Anambra state.
2. To determine the extent to which safety management will lead to customer satisfaction.
3. To determine the extent to which safety management influences employee commitment.
Research questions
The following research questions are designed in an attempt to achieve the objective of the study. They are:-
1. What is the extent of relationship between safety management and firm’s profitability?
2. To what extent will safety management lead to customer satisfaction?
3. What is extent of relationship between safety management and employee commitment?
Hypotheses
H1. Safety management has influence on firm’s profitability.
Ho. Safety management has no significant influence on firms profitability.
H1. There is a relationship between safety management and customer satisfaction.
Ho. There is no significant relationship between safety management and customer satisfaction.
H1.Safety management has influence on employee commitment.
Ho. Safety management has no significant influence on employee commitment.
II. REVIEW OF RELATED LITERATURE
Conceptual Review
The realization of human resource as the most important of all the assets, in contemporary management, may be
based on its inevitable role in the manipulation of all other organizational assets or resources for productivity.
Improving performance in organization may be demonstrated by way of intensifying effort towards increasing
output level and quality. To accomplish this goal means that efforts of employees are required in task
performance. Effective execution of such essential employee responsibility, to a great extent, depends on the
level of health and safety in the workplace.
Under work environment, Hall and Goodale (2006) describe employee health as the absence of illness or disease
resulting from the interaction of employee and the work environment. In general term, health means a state of
complete physical, emotional, mental, and social ability of an individual to cope with his environment, and not
merely the absence of disease or infirmity (Hippocrate, 1981). Health is the art and science of preventing
disease, prolonging life, promoting physical and mental health, sanitation and personal hygiene, control of
infections and organization of health services (Lucas, 2001).
On the other hand, safety means freedom from the occurrence or risk of injury or loss (Aswathappa, 2004). He
described industrial or employee safety as the protection of workers from the danger of industrial accidents.
Safety can as well be referred to as the absence of injuries due to the interaction of the employee and the work
environment.
Safety constitutes one of the essential human needs, as postulated by Abraham Maslow in his theory of needs
hierarchy. Feeling safe at work ranks as a very important factor in job satisfaction (Kreitner, 2007). In attempt to
satisfy this need certain organizations incorporate into their policy thrusts, guaranteeing workers’ safe work
4. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 146
execution under a climate capable of enhancing the physical, mental, and emotional conditions. Organizational
policy of this nature is often categorized under health and safety.
Organizational safety policy, Aswathappa (2004), specifies the company’s safety goals and designates the
responsibilities and authority for their achievement. According to him, such policy statement must emphatically
declare four fundamental points- (i) the safety of employees and the public: (ii) safety taking precedence over
expediency: (iii) every effort made to involve all managers, supervisors and employees in the development and
implementation of safety procedures: (iv) safety legislation to be complied with.
In a general perspective, safety means a condition of being safe from undergoing or causing hurt, injuries or
loss. Hence, safety management may encompass activities directed at either reducing or complete removal of
hazardous conditions capable of causing bodily injuries (Lucas, 2001).
ILO (2005), organizational health and safety focuses on the development of specific measures and programmes,
aimed at protecting employees in the course of performing their duties to maximize productivity and improve
the overall organizational performance. Organizational health and safety is concerned with the health and safety
of workers, which Annah (2004) described as part and parcel of human security and as a basic human right.
A safety management system (SMS) can be defined simply as a planned, documented and verifiable method of
managing hazards and associated risks (Bottomley, 1999). Further, as the International Civil Aviation
Organization (ICAO) defines in a little more detail, a safety management system (SMS) is a systematic
approach to managing safety, including the necessary organizational structures, accountabilities, policies, and
procedures. (ICAO, 2009).
The basic common attributes of an SMS include: 1. identification of safety hazards 2. remedial action to
maintain safety performance 3. Continuous monitoring and regular assessment of safety performance 4.
Continuous improvement of the overall performance of the SMS (ICAO, 2009). Wikipedia viewed safety
management system as a term used to refer to a comprehensive business management system designed to
manage safety elements in the workplace.
Perezynozalez, (2005) opines that safety management is the reduction of risk to a level that is as low as is
reasonably practicable.
Shell (1998) views safety management system as an integrated quality management system designed for
managing risks within the organization, so as to ensure the protection of people, assets, reputation and the
environment from the hazards of the operating organization. This system consists of eight subsystems namely:
management leadership and commitment, policies and strategic objectives, system organization, hazards and
effects management process, planning and procedures, implementation and performance monitoring, audit and
management review.
Goetzel (2000), inculcating safety culture in employees, is directly related to the productivity and profitability of
organizations. Further, he identified some interesting common success factors that are peculiar to the inculcation
of safety culture in employees: Companies that inculcate safety culture in their employees focus on
safety/productivity management, not because it is a human resource activity, because of its alignment with the
business purpose of the organisation. Companies that inculcate safety culture in their employees consider many
factors that may impact on workers’ productivity in addition to those associated with specific safe work
procedure. Safety professionals are the primary drivers and champions of employees’ safety culture in
industrial activities. Companies that inculcate safety culture in their employees emphasize safety/productivity
management not just because it is cost-effective, because it means an improvement of the quality of industrial
life. Safety data measurement and evaluation are vital for organizations that inculcate safety culture in their
employees. Organisations that inculcate safety culture in their employees act on the belief that internal
benchmarking is as important as external benchmarking. To support investments over time, safety culture
oriented organisations should be able to demonstrate return on investments for specific programmes related to
safety management, both prospectively and retrospectively.
The Origin of Health and Safety Management System
Health and safety management systems emerged as a key prevention strategy in the mid-1980s. The Bhopal
disaster is credited as the catalyst for attention to management systems in the process industries (Sweeney,
1992), although the concept of a systems approach had been evident since the 1960s (Lees, 1980). An estimated
5. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 147
2500 people were killed and ten times as many injured by leaking methyl isocyanine at Bhopal in December
1984. Issues identified as contributing to the disaster were inadequate attention to design of plant and process,
maintenance and testing of plant and protective equipment, training and emergency planning, as well as the
failure to implement safety audit recommendations and a lack of attention to the broader planning issues
associated with the location of hazardous plants in residential areas (Kletz, 1985). Following the Bhopal
disaster, many enterprises in the high risk process industries extended the focus of health and safety activity
beyond the traditional emphasis on process technology and technical safeguards towards management practices,
procedures and methods, while attention was directed at industry level to models for system development and
performance measurement (Sweeney, 1992).
The mid-1980s also saw the appearance of health and safety management systems beyond the process
industries. In Australia, manuals on health and safety management systems were published by consultancy
companies, employer organisations and governments (Chisholm 1987, Confederation of Australian Industry,
1988, Department of Labour (Vic), 1988, Work Cover (SA), 1989). However, while the 'systems' terminology in
these manuals was new, the system elements were consistent with the health and safety programs of previous
years. Just how similar or different the new approach to health and safety was in relation to its antecedents
might be tested by tracing the development of health and safety management systems and exploring the
influences which have shaped them.
The United States literature places the formative period for health and safety management programs as the
1950s and the 1960s. At this time the concept of health and safety was presented as being as much a part of the
discipline of management as of engineering (Smith and Larson, 1991). Indeed, Petersen (1988) refers to the
1950s and 1960s as the 'safety management era', characterised by the incorporation of concepts and techniques
from a number of other disciplines. Management and personnel techniques included policy setting, definition of
responsibilities, and employee selection and placement. Statistical techniques used in the quality control field
were introduced. Ergonomics, or human factors engineering, was incorporated also into the role of the health
and safety professional, alongside new responsibilities relating to fleet safety, property damage control and off-
the-job safety. Occupational hygiene duties had already filtered into the role of the health and safety
professional following changes in workers compensation law defining compensable industrial diseases
(Petersen, 1988).
The developments in health and safety management outlined above are only part of the story. The changes
described may have broadened the role of the health and safety professional, but at a deeper level there appears
to have been little change in the basic elements of a health and safety program. The genesis of health and safety
programs in the workplace is placed earlier in the century as a response to the need for health and safety
organisation following the introduction of workers compensation legislation (Grimaldi and Simonds, 1989). The
three organising principles of the early health and safety programs, engineering, education and enforcement of
rules (Colling, 1990) provided the framework for a seminal work on safety management by H. W. Heinrich
(1959) first published in 1931.
Organizational Performance
Organizational performance alone could be gauged in many different ways, with financial or non-financial
indicators. There are several approaches to organizational performance measurement which include different
stakeholders’ perspectives. The Balanced Scorecard (BSC) is a performance management tool for measuring
whether small-scale operational activities of a company are aligned with its large-scale objectives in terms of
vision and strategy. (Chen. M, Hung. M, & Cheng Y. (2009) include four perspectives: financial, customer,
internal process and innovation and learning perspective. The financial perspective examines if company’s
implementation and execution of its strategy contributes to bottom-line improvement (Robinson, H. S. Et al;
2006) some of the commonly used financial measures are economic value added, revenue growth, costs, profit
margins, cash flow, net operating income etc. The customer perspective defines the value proposition that an
organization will apply to satisfy customers and generate more sales to the most desired customer groups (Chen/
et al, 2009; Robinsion, et al, 2006).
The measures should cover both the value that is delivered to the customer which may involve time, quality,
performance and service, and the outcomes that as a result of this value proposition, such as customer
satisfaction and market share. The internal process perspective focuses on all the activities and key processes
required in order for the company to excel at providing the value expected by the customers (Robinson, H. S. Et
al; 2006). The clusters for the internal process perspective are operation management (by improving asset
utilization, supply chain management), customer management (by expanding and deepening relations),
6. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 148
innovation (by new products and services) and regulatory & social (by establishing good relations with external
stakeholders). The innovation and learning perspective focuses on the intangible assets of an organization,
mainly on the internal skills and capabilities that required to support the value creating internal processes
(Robinson, H. S. Et al; 2006). In addition to these four perspectives, some researchers (Robinson, H.S. et al;
2006) include the supplier perspective, which is also important in assessing non-financial performance.
Organizational performance reflects an organization’s understanding and knowledge regarding customer needs
and expectations (Slater & Narver, 1995). Razalli, (2008) found that hotel performance could be improved
through good leadership practice and provision of customized service design for select clientele in the service
sector. Hence, business organization can maximize their customer satisfaction for better profitability, increased
sales volume, which ultimately improves overall performance benefit (Baker & Sinkula 1999). Generally,
organizational performance is assessed by the application of financial or both financial and non-financial
measures. There are number of studies in the Literature that used non-financial measures to evaluate the
effectiveness and performance of organization (Quinn & Rohrbaugh, 1983: Venkatraman & Ramanujam, 1986).
It is suggested that four models i.e human relations; internal process; open system and rationale goal model
could represent the organizational performance (Quinn & Rohrbaugh, 1983). Wheelen and Hunger (1998)
argued that appropriate performance measures depend on the organizations and their objectives i.e. profitability,
market share and cost reduction.
Financial indicators, such as return on investment (ROI), earnings per share (EPS) and return on equity (ROE)
are used by the number of organizations to measure their progress. Return on investment is used to reflect the
profitability while corporate performance was measured by operating cash flows and return on investment
capital (hasnan, 2006; Sorenson, 2002). Rashid et al. (2003) measured firm’s financial performance using the
financial indicators, such as return on assets, return on investments and current rations. Financial rations reflect
the financial performance of the organization by an examination of financial statements, as indicated by
profitability, liquidity, leverage, asset utilization and growth ratios (Ho & Wu, 2006). In today’s global dynamic
and competitive environment, banks could improve and diversify their products and services to meet changing
customers’ demands and enhance their performance for successful survival.
Approaches to Safety Management
There are two approaches to safety management, they are; reactive and proactive safety management. Reactive
safety management: According to ICAO safety management manual (Doc 9859), reactive safety management
approach is useful when dealing with technological failures, or unusual events.
Proactive safety management: the proactive approach in the safety management is based on the following risk
management strategy that includes, identifying hazards before they materialise into incidents or accidents and
taking the necessary actions to reduce the safety risks.
Components of proactive safety management strategy are:
Unambiguous safety policy ensuring the senior management commitment to safety;
1. Hazard identification and risk assessment using state- of – the – art risk assessment methods;
2. Safety reporting systems used to collect , analyze and share operational safety related data;
3. Component investigation of safety occurrences with sole purpose of identifying systemic safety
deficiencies;
4. Safety monitoring and safety oversight aimed to asses safety performance and eliminate problem areas;
5. Dedicated safety training for personnel.
Health and safety at work
According to the International Labour Organization (ILO) and the World Health Organization (WHO), health
and safety at work is aimed at: the promotion and maintenance of the highest degree of physical, mental and
social well-being of workers in all occupations; the prevention among workers of leaving work due to health
problems caused by their working conditions; the protection of workers in their employment from risks resulting
from factors adverse to health; the placing and maintenance of the worker in an occupational environment
adapted to his or her physiological and psychological capabilities; and, the adaptation of work to the person
and of each person to their job. Health and safety is given a wide definition in the European Union context,
going beyond the avoidance of accidents and prevention of disease to include all aspects of the worker’s well-
being. The competence of the EU to intervene in the field of health and safety at work is defined by the
provision in Article 153 of the European Treaty, which authorises the Council to adopt, by means of directives,
minimum requirements as regards ‘improvement in particular of the working environment to protect workers’
7. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 149
health and safety’ (a provision originating in the Single European Act 1986). The significance of this broad
scope of ‘health and safety’ is immense, as it underpins the potential of EU health and safety policy to prescribe
minimum standards to protect all aspects of the worker’s well-being.
Cost of Safety
Safety comes at a price. All organizations have limited resources to devote to safety, and must deal continually
with the conflicting goals of safety versus productivity, efficiency, or customer service objectives which
ultimately determine profitability. Financial health in any business will be influenced not only by good
management and internal efficiency, but by the external economic environment. A stated commitment to safety
is necessary but not sufficient to enable safety improvements. The commitment must be supported by
appropriate resourcing of technology and equipment, training and expertise, policies and systems that promote
operational safety. The commitment to safety should be consistent and visible regardless of any financial
pressure facing the organization, whether internally or externally generated. The extent to which an
organization’s financial health operates and is committed to safety will be apparent from information about the
following decisions and practices:
What budgetary changes affecting safety are made when times are tough?
To what extent are productivity or efficiency pressures increased at these times?
Do management priorities, messages and most importantly their actions change from a focus on safety to other
organizational goals, such as their bottom line?
Theoretical Framework
The study is anchored on Heinrich Theory (1931), states that an injury are traced back to its causes. An injury,
he reasoned, was caused by an accident, and an accident was caused by either an unsafe act on the part of the
injured person or an unsafe condition in the environment. This was a major breakthrough in the safety
profession because it removed some of the blame from an individual worker.
Heinrich theory emphasises that an accident might indeed be caused because a worker was "careless" but it
might also have been caused because the machine the worker was given to work with was poorly designed or
maintained and therefore made it likely that whoever worked with it would be injured.
III. RESEARCH METHOD
Research Design
The study employed survey research method. In this method, data will be collected directly from the
respondents. Survey research is the systematic gathering of information from the participants for the purpose of
understanding and/or predicting some aspect of the behaviour of the population of interest.
Population of the Study
The total staff of 80 factory workers were chosen from the two plastic manufacturing industries in Awka
Metropolis serves as the population of this study. The factory workers chosen were 50 those with at least one
year experience at New Millennium industry. While 30 from FinoPlastika. Complete enumeration method was
adopted, as the researcher made use of the entire population that acquired at least one year experience both in
New Millennium and FinoPlastika industry.
Selected plastic manufacturing firms
New Millennium industry 50
Fino Plastika industry 30
Method of Data Collection
Primary source of data were generated through the use of structured questionnaire. The questionnaire were
structured to place the respondents on objective response for each statement on a five point Likert scale. The
response scoring weight were 5 for strongly agreed (SA), 4 for Agree (A), 3 for Strongly Disagreed (SA), 2 for
Disagreed (D), I for undecided (U). The researcher administrated copies of the questionnaire to 80 staff of the
industry under study.
Sources of Data
Primary data and structured questionnaire were the major tools used to get information from the staff of the two
selected manufacturing firms. Questionnaire was used as appropriate research tools to reveal sensitive issues
which respondents would otherwise feel uncomfortable to talk about in an interview. A pre- test survey will be
conducted in order to evaluate the validity and reliability of the questionnaire. Question that proved to be
8. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 150
unclear to the respondents will be modified, rephrased. Edward (2003) posits that pretesting of instrument in the
field can serve as a reality check indicating to the researcher how well conceptualization of the problem matches
the actual experience of the practitioner.
Validity of the Instrument
To ensure that the questionnaire measure what it is suppose to measure accurately, a copy of the instrument with
a copy of the study containing statement of the problem, purpose of the study, research questions and hypothesis
was sent out to some experts in the field of management, who looked at it to check the face validity by ensuring
all words and items that will not confuse the respondent filling the questionnaire. They also checked the content
validity to ensure that the instrument (questionnaire) contain all the aspect of the subject that should be included
in the questionnaire.
Reliability of the Instrument
This is the degree of a test to measure what it is purpose to measure consistently. The reliability for this research
study will be determined using the test re- test method. The data generated were correlated using Rank-Order
correlation formula. A reliability co-efficient of 0.7 was obtained which was considered high enough as a
reliability of an instrument.
1--- 6(d2
)
N (N2
-1) =
Test Retest D2
1.20
2.15
15
12
52
32
34
1-6(34) =
20(202
-1)
1-204
20(202
-1)20 = 1-204
(400-1)
= 1-204
7, 980
1-0.0256 = 0.9744 = 0.9
Method of Data Analysis
The Z-test will be used in analyzing the data were generated with the questionnaire to test the hypothesis; it is a
statistical tool that is used to test the impact of one event over another.
Z0
=(x-y)
S2
1 + S2
2
n1 + n2
Also, data from the research were collected from primary source. Copies of structured questionnaire were
administered, and the participants were placed on objective response for each statement on a five point Likert
scale. The response scoring weights of the structured questionnaire were:
Stronger Agreed (SA) 5
Agreed (A) 4
Strongly Disagreed (SD) 3
Disagreed (D) 2
Undecided (U) 1
The scale was calculated using the formula below.
Where X = Fx
N
Where X = 5+4+3+2+1 = 15
5
IV. DATA PRESENTATION AND ANALYSIS
This covers the presentation and analyses of data collected from the field. The presentation covers test of
hypothesis.
9. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 151
Test of Hypothesis:
The formulated hypotheses were tested with chi-square (X2
) as shown below.
Decision Rule: Reject Ho if the calculated chi-square is less than the table value.
Hypothesis 1
H1: Safety management has influence on firm’s profitability.
Ho. Safety management has no significant influence on firms profitability.
Formula for expected frequency = Row total x column total
Grand total
S/N SA A SD D U TOTAL
1. 48 (34) 27 (36) 2 (4.3) 1 (3) 2 (2) 80
2. 30 (34) 40 (36) 7 (4.3) 3 (3) 0 (2) 80
3. 25 (34) 42 (36) 4 (4.3) 5 (3) 4 (2) 80
103 109 13 9 6 240
X2
= Σ (0f – ef)2
ef
Where X2 =
Chi square
0f=observed frequency
ef= expected frequency
X2
= 10.57 + 4.6 + 6.73 + = 21.9
Degree of freedom at 0.05 level of significance
df = (r-1) (C-1)
(3-1) (5-1)
2 x 4 = 8
Table value of df on 8 upon 0.05
X2
critical value = 15.507
Therefore since the calculated chi-square is greater than the critical table value we reject Ho and accept H1
which state that Safety management has influence on firm’s profitability.
Hypothesis II
H1. There is a relationship between safety management and customer satisfaction.
Ho. There is no significant relationship between safety management and customer satisfaction.
S/N SA A SD D U TOTAL
1. 50 (38.3) 28 (35) 1 (3) 1 (3) 0 (0.3) 80
2. 30 (38.3) 40 (35) 6 (3) 3 (3) 1 (0.3) 80
3. 35 (38.3) 38 (35) 2 (3) 5 (3) 0 (0.3) 80
115 106 9 9 1 240
X2
= 7.93 + 7.13+2.5 + = 17.56
Degree of freedom at 0.05 level of significance
df = df = (r-1) (C-1)
(3-1) (5-1)
= 2 x 4 = 8 upon 0.05 = 15.507
Therefore we reject the Ho since the calculated value is greater than the chi-square critical value. We then
accept H1 which state that there is a relationship between safety management and customer satisfaction.
Hypothesis III
H1.Safety management has influence on employee commitment.
Ho. Safety management has no significant influence on employee commitment.
S/N SA A SD D U TOTAL
1. 48 (35) 32 (38.3) 0 (1.7) 0 (3.3) 0 (1.7) 80
2. 37 (35) 43 (38.3) 0 (1.7) 0 (3.3) 0 (1.7) 80
10. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 152
3. 21 (35) 40 (38.3) 5 (1.7) 10 (3.3) 4 (1.7) 80
106 115 5 10 4 240
X2
= 11.27 + 7.39+28.8 + = 47.46
Degree of freedom at 0.05 level of significance
df = df = (r-1) (C-1)
(3-1) (5-1)
= 2 x 4 = 8 upon 0.05 = 15.507
Therefore we reject the Ho since the calculated value is greater than the chi-square critical value. We then
accept H1 which state that Safety management has influence on employee commitment.
Findings:
The following findings were made in this study after subjecting the responses retrieved from the respondents to
statistical analysis. From hypothesis I, the study revealed that Safety management has influence on firm’s
profitability. This is in line with the assertion of Goetzel (1999), which state that inculcating safety culture in
employees, is directly related to the productivity and profitability of organizations.
Hypothesis II revealed that there is a relationship between safety management and customer satisfaction. This
finding backed by other findings by Robinson, H. S. Et al (2006) & Chen,M et al (2009) sees customer
perspective as one of the commonly used financial measures which defines the value proposition that an
organization will apply to satisfy customers and generate more sales to the most desired customer groups. The
measures should cover both the value that is delivered to the customer which may involve time, quality,
performance and service, and the outcomes that as a result of this value proposition, such as customer
satisfaction and market share. Hence, business organization can maximize their customer satisfaction for better
profitability, increased sales volume, which ultimately improves overall performance benefit Baker & Sinkula
(1999).
From the test of hypothesis III, the study revealed that Safety management has influence on employee
commitment. Galliker (2000) opines that an organization’s employees safety culture have a direct relationship
with employees’ commitment and productivity in view of the fact that assigned tasks can only be safely
accomplished when the work environment is safe and conducive for the execution of the assigned duties, be it
manufacturing, construction or servicing industries, thus, any phenomenon that affects human production
capacity will invariably affect organizational productivity, hence improving workers wellbeing offers a
company the opportunity of enhancing its performance.
From the test of hypothesis IV, the study revealed that Safety management reduces cost to the organization. This
is in line with the assertion of (ILO,2005) which states that safety comes at a price and that in a business
setting, the goal of employers is usually to decrease employee turnover, thereby decreasing training costs,
recruitment costs and loss of talent and organizational knowledge. Many employee retention policies are aimed
at addressing the various needs of employees to enhance their job satisfaction and reduce the substantial costs
involved in hiring and training new staff.
V. CONCLUSION
From the discussion of the findings, the following conclusions are drawn:- Safety management is an
organizational function, which ensures that all safety risks have been identified, assessed and satisfactorily
mitigated.
When an organizations safety management focuses on the development of specific measure and programmes,
and also aimed at protecting employees in the course of performing their duties, it will help them maximize
productivity and improve the overall organizational performance.
Business organization can maximize their customer satisfaction for better profitability, increased sales volume,
which ultimately improves overall performance benefit.
An organization’s employees safety culture have a direct relationship with employees’ productivity and
commitment in view of the fact that assigned tasks can only be safely accomplished when the work environment
is safe and conducive for the execution of the assigned duties.
11. American Journal of Humanities and Social Sciences Research (AJHSSR) 2018
A J H S S R J o u r n a l P a g e | 153
In a business setting, the goal of employers is usually to decrease employee turnover, thereby decreasing
training costs, recruitment costs and loss of talent and organizational knowledge.
Recommendation
Having discussed the findings and drawn conclusion, the study recommends that:
Safety in service provision demands management commitment to implementation of Safety Management
Systems (SMS) which addresses safety in an explicit, formal and documented manner operated by trained
personnel using dedicated methods, procedures and tools.
If organizations promptly inform their workers about the risks and hazards associated with their jobs, on the
basis of such information, workers themselves could be seeking periodic medical attentions and checks and
choose to use appropriate equipment and tools.
Management should imbibe the culture of Proactive safety management, which will help in identifying hazards
before they materialise into incidents or accidents.
REFERENCES
[1] Akpan, E. I. (2009). Participative goal-setting: A strategic approach to achieving increased productivity
in contemporary organizations. Oxford Mosaic Journal of Business Strategy, 1, 37-47.
[2] Alberta. (2006). Building an effective health and safety management. [Online] Available:
http://employment.alberta.ca/documents/WHS/WHS-PS-building.pdf (January 6, 2010)
[3] Annan, K. (2004). Production Decision and Controls. New York: Alexander Hamilton Institute Press.
(Chapter 15).
[4] Antonelli, A. Baker, M., McMahon, A., & Wright, M. (2006). Six SME case studies that demonstrate the
business benefit of effective management of occupational health and safety. Berkshire: Greenstreet
Berman Ltd, (Chapter 5). Aswathappa, K. (2004). Human resource and personnel management: Text and
cases. (3rd ed.). New Delhi: Tata McGraw–Hill Publishing Company Limited, (Chapter 20).
[5] Ayodele, R. B., & Olubayo-Fatiregun, M. A. (2010). Workability of safety education and training for
workers’ strategy in accident induction in selected manufacturing industries in Lagos. International
Journal of Sustainable Development, 3, 8-14. Cole, G. A. (2002). Personnel and Human resource
management. (5th ed.). London: Biddles Limited, (chapter 40). Denisi, A. S., & Griffin, R. W. (2005).
Human Resource management. (2nd ed.). Boston: Houghton Mifflin company, (chapter 15).
[6] Eklof, M. (2008). The impact of systematic health and safety management for occupational disorders and
long-term work attendance. Social Science and Medicine, 67, 965-970.
[7] EU-OSHA. (2009). Occupational safety and health and economic performance in small and medium –
sized enterprises. [Online] Available: http://europa.eu (October 3, 2010)
[8] Hall, D., & Goodale, J. (2006). Human resources management: strategy, design and implementation.
Illinois: Forman and Company, (chapter 23).
[9] Heinrich, H. W. (1941), Industrial Accident Prevention, 2nd Ed, McGraw Hill, New York.
[10] Hippocrates, A. (1981). Health in organizations. New York: McGraw-Hill Inc, (chapter 12).
[11] ILO. (2005). National health policy and strategy to achieve health for all. New York: ILO Publishers,
(chapter 16). Kreitner, R. (2007). Management. (10th ed.). Boston: Houghton Mifflin company, (chapter
23).
[12] Lucas, O. (2001). Heal]th and safety policies. London: McGraw – Hill Inc, (chapter 21).
[13] Mossink, J & De Greef, M (2002) Inventory of social economic cost of work accidents, European
Agency for Safety and Health at Work.
[14] Ogbo, A. I. (2009). Occupational safety and management adherence for sustainable development in
Nigeria. Journal of Nigerian Institute of Management, 44, 14-19.
[15] OSHA – Occupational Safety and Health Administration.(2008). OSHA Regulations (Standards – 29
CFR).
[16] Professional Health and Safety Consultants. (2009). Demonstrating an effective health and safety
management system. [Online] Available: http://www.healthandsafety.co.uk/corporate manslaughter-safe-
system of work-october-2009, html. (January 6, 2010) Robbins, S. P & Judge, T. A. (2007).
Organizational behavior. (12th ed.). New Jersey: Pearson Prentice – Hall, (chapter 6).
[17] (http://www.eurofound.europa.eu/areas/industrialrelations/dictionary/definitions/healthandsafety.htm).