Tuesday, May 26, 2020
New Epoch of Information and Technology - Free Essay Example
1. INTRODUCTION 1.1 Background and Motivation The new epoch of information and technology has begun. The use of the internet is transforming how business is done locally and globally. Due to major technical developments, the internal information system development is moving to an external development and provision model, driven by the needs for lower costs, faster implementation, easier-to-use applications and effective use of scarce resources (Locket et al., 2006). The internet has revolutionised the computer and communication world like nothing before. The invention of the internet has a worldwide broadcasting capability, it is a medium of collaboration and interaction between individuals and their computers without any limitation in their geographical location. The origin of the internet can be found in the United States department of defences Advanced Research Project Agency (ARPA). The aim of the ARPA was to develop a nationwide computer system where military personnel could share message without any barrier irrespective of their location (Freedom, 2008). In 1960s United States funded researchers in California to explore ways through which computers could share information. In 1969, the research group connected the computers of some universities in the United States to share information being physically apart. The network was named as ARPA network or ARPAnet (Freedom, 2008). The last few years have witnessed technological changes among which prominent is electronic commerce, or the exchange of products (tangible and otherwise) and payments via telecommunication systems (Kalakota Whinston, 1997). Payment systems are a core group of strategic information system which contribute towards economic development, especially in emerging economies, and forms the foundation for financial sector. Most of the industries have been influenced in some way or the other by e-commerce, nowhere the effect of e-commerce is more apparent in online banking (e Marketer, 2000). The online banking overcomes the traditional banking and its way of queuing up to get the transaction done. Internet banking is no more taking out time from the schedule to go to the bank, it is the easiest and the safest way of banking. An individual can get reports about the account, statement etc. with just click of a button (Online banking question, 2008). Apart from ease of use there are some barrie rs in online banking. The main issue is that of trust. Customers may wonder if their transaction went through successfully or the clicked the correct button. Also online banking can take some time to start and can be difficult to learn at first for the beginners. Thus, the physical separation of the bank with the customers and that of the customer with the financial advisor, the overall perceived insecurity of the internet provides unique challenge to the bank to develop a safer internet banking (Mukherjee, ) The internet technology are rapidly changing the personal financial services are being delivered. Several banks in India have introduced internet banking to make the banking faster, easier and to reduce the costs. Despite such developments by the banks these facilities are largely unnoticed by the customers. Online banking is the newest channel for retail banking services. Online banking refers to several types of services in which the customer can carry out most of the services balance reporting, inter-account transfer and bill payment (Sathe, 1999). Europe has been the leader in online banking technology (Schneider, 2001). At the end of 2000 only 20 percent of the United States banks offered online banking ad only 20 percent of the customers with internet connection used online banking. In Europe 75 million users used online banking by 2005. Most popular Online banking Activities Most Popular Internet Activities 2005 Ãâà Ãâà Ãâà Ãâà Visitor Activities E-mail General web surfing/ browsing Reading news Shopping/ buying goods online Entertainment news Looking for and reading information about hobbies Online banking Looking for and reading medical information Instant messaging Looking for and reading travel information and making travel arrangements Table: Most popular internet activities in 2005 Source: U.S.C. Annenberg School Center for Digital Future, 2005 cited in Laudon and Traver, 2007, p.220) However, one of the major concerns regarding not using the internet has been highlighted by many authors and that issue is security. Chesher and Kaura (1998) points that the most important reason that has kept both consumers and business away from the internet is its security issue. Security is considered as the primary issue than any other issue. Nevertheless, efforts have been made to overcome this issue in the form of software, digital certificate, signed message, encrypted message and so on (Chesher ad Kaura, 1998 M) As the organisation continue to invest in ICT, the usage behaviour of the consumer becomes very important topic in research on its implementation. To understand the usage behaviour of the consumers we will use technology Acceptance Model (TAM), this is an established model of computer usage and has been validated through testing with a number of technologies. From the Asian market experience, it is clear that internet banking is here to stay and would be major way to acquire and provide service to the customers. The banks that have launched online banking products and services increased from 6% in 1998 to 75% in 2003. According to IDC, in countries like Korea and Singapore 10% of their population uses internet banking. These markets are way ahead of India both in terms of online banking penetration and internet penetration. India is a big potential market and is fast catching up with its counterpart (Kannaberan, Narayan, 2005). Despite all the efforts and investment undertaken by the banks, e-banking facilities have been unnoticed by the customers of India. Therefore, customers perception and trust is of utmost importance. The Indian market has been increasingly attractive for global marketers in the recent years. Although the overall per capita GDP (Gross Domestic Product) is low at $421 (Budhwar, 2001). There are 203 million middle class consumers who are well educated and with salaries more than $5000 in local purchasing power (Ramchandaran, 2000). As a result FDI (Foreign Direct Investment) flow to India increased from $103 million in 1990-91 to $5.1 billion in 2000-01. 1.2 Aims and Objective: The aim of the study is to determine the importance of trust in relation to the online banking. This will lead to explore a range of issues related to trust, security and how well Indian banks adopted online banking. This research also aims to investigate the internet adoption strategy in established banks. The research problem chosen of a great importance especially in developing country like India where banking sector witnessed a major revival in the last decade. The research question is important because the entire multinational bank that came to India tried to persuade people to use online banking but still people dont use it because they dont trust online banking. The research will basically deal with customers trust in online banking and factors that affect it. This is one of the major areas where the bank should concentrate and work upon it. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. In spite of the recent boom in electronic commerce, customers are reluctant to provide sensitive information to websites. Generally the customers are comfortable in providing general information but they are uncomfortable in providing sensitive information like credit card details, personal details. Internet banking sites are one location where most personal information is carried out, that is, financial information. This inhibits the usage of internet banking by customer. Therefore unlike traditional information system, the perceived usefulness and perceived ease of use may not fully reflect customers acceptance of internet banking. Research on customers acceptance of internet banking may therefore enhance the understanding of a customers belief to use internet banking. TAM is an established model of computer usage and has been validated through testing with a number of technologies (Davis et al., 1989; Igbaria et al., 1994, Lederer et al., 1998). And it has also been found that TAMs ability to explain attitude towards using an Information System is better than other models like Theory of Reasoned Action, Theory of Planned Behaviour (Mathieson, 1991 (CP)). The studies have proved that TAM explains around 40% of the variance in the usage extension ad behaviour. We will use Technology Acceptance Model (TAM) as a base model for this research, and adjust the model to reflect the characteristic of Internet banking and Trust. 2. Literature Review 2.1 Introduction to ICT The world is it the midst of general purpose technology revolution. Information and communication technology has developed in the context of rapidly changing business environment. For several years, there have been talks about topics like new global political and economic orders, liberalization of trade, growing environment concerns, deregulations, rapid technological developments especially information and communication technology and terrorists attack and so on. For business perspective only few are driving forces while others are just facilitating or inhibiting factors (Li, 2007 M). Two changes that have contributed to the current transformation are the changing nature of the economy and rapid development and proliferation of the ICTs. ICT in general and internet in particular are changing the way businesses are done all over the world. The internet is a source of data and information and its value depends on the provider, its relevance timeliness and accuracy (Lany and Powell, 2003 M). The internet has created new communication channel that is bringing people together cheaply, efficiently and presenting many opportunities and challenges for the business community. People around the world are using the internet to service their need and wants and thus the internet is presently the potential for extending markets, developing new products, services and achieving profitability (Combe, 2006). Due to this the worldwide number of internet users has increased from record 16 million in 1995 to 1.5 billion in 2008 (Internet worldwide stats, 2009). The ICT revolution has already led to some profound changes and many more yet to come. The internet is particularly important as it is acting as a contemporary platform on which many of the new important developments are taking place. 2.2 Internet Banking and India Internet banking has witnessed wide acceptance internationally and catching up fast in India with more and more banks entering into fray. The British legacy left behind large and small privately held banks. In the late 60s all the private banks were nationalised, which led to the emergence of the public sector banks. In 1960s banks used latest technologies in massive way, led in particularly by new private or Multinational Banks. In the context of online banking private banks have been early adopters whereas public banks are lagging behind. Reserve Bank of Indias survey in 2001 revealed that 46 major banks operating in India, around 50% of them either offered internet banking services or planned to offer in the near future. Only 1% of the internet users utilised internet banking services in 1998, the internet banking user base increased by 16.7% by 2000 (Icmrindia,). Major Banks like ICICI bank, HDFC bank, IDBI, Bank of Punjab etc were offering online banking services. The banks began to collaborate with utility companies to provide online services to the customers. ICICI bank collaborated with Infinity, which was already a leader in online banking in India to pay their online bills. HDFC through payment gateway allowed its customers to make online payments. As more banks entered into online banking fray, the competition between the banks deepened. This forced the banks to search for new market, customers and adopt new technology. Multinational and private banks have been very successful in India in setting up internet banking, this is because they already had automated banking environment. Most of the multinational banks have already have internet banking in other countries that can be copied in India. Unfortunately nationalised banks or public sector banks have been unable to evolve as fast as private banks because in many organisations there may be a mix of both automated and manual system, both the system runs parallel created by the small vendors. This creates chaos and makes network management a nightmare. ICICI Bank started banking way back in 1996 and other banks soon followed it. During 1995-99 ICICI Bank invested Rupees 50 million in online banking technology solutions. Year 1996 to 1998 marked the adoption phase because of the increased usage of internet in 1999 due to the lower internet service provider charges. The industry estimates the cost of internet banking at Re. 0.10 per transaction whereas the charges of other conventional methods such as ATM at Re. 0.45 per transaction, phone banking at Re. 0.35 per transaction. Thus, this shows that internet banking is more cost effective. State Bank of India (SBI), which is one of the oldest bank of India launched internet banking in July 2001 and it has 18,000 registered customers across 150 branches. Some of the reason why public sector banks are lethargic because there is a lack of zeal and mindset towards adopting new technology , second reason is the highly politicised unions which act as a barrier as they feel that internet bank ing will expose their low productive levels. The list of the Indian banks includes: Allahabad Bank Andra Bank Axis Bank Ltd. Bank of Baroda Bank of India Bank of Maharashtra Canara Bank Central bank of India City Union Bank Ltd. Corporation Bank Dena Bank Development Credit Bank Ltd. HDFC bank Ltd. IDBI Ltd Indian Bank Indian Overseas Bank Indusind Bank Ltd. Ing Vysya Bank Ltd. Kotan Mahindra Bank Ltd. Nainital Bank Ltd. Oriental Bank of Commerce Punjab National Bank Punjab Sindh Bank SBI Commercial and International Bank Ltd. State Bank of Bikaner Jaipur State Bank of Hydrabad State Bank of Indore State Bank of Mysore State Bank of Patiala State Bank of Travancore Syndicate Bank Tamilnad Mercantile Bank The Bank of Rajasthan Ltd. The Catholic Syrian Bank Ltd. The Dhanalakshmi Bank Ltd. The Jammu Kashmir Bank Ltd. The Karnataka Bank Ltd. Karur Vysya Bank Ltd. The Lakshmi Vilas Bank Ltd. The Ratnakar Bank Ltd. The Sangli Bank Ltd. The South Indian Bank Ltd. The United Western Bank Ltd. UCO Bank Union Bank of India United Bank Of India Vijaya Bank Yes Bank (Financial Technologies, 2009) The services offered by the banks on the internet are: Information Kiosks: In this the bank provides information about various products and services offered by the banks. The bank solves the queries of the customers through emails. Basic Internet banking: In this the banks allows the customers to open the account and pay bills. E-Commerce banking: Banks acts as a e-market place and enables the customers to transfer the money from their account, bill payment, sale and purchase of securities etc. The Wallis report (1997) stated that consumers will use those financial products and suppliers which offer best value for money and they are educated about it. Hence, in case of adoption of internet banking, it is necessary that bank should make consumers aware about availability of the product and how it adds value to the products. The perceived usefulness and in electronic banking according to Trethowan and silicone (Daniel, 1999) was sales orientation, convenience and low costs. The importance of perceived usefulness has been recognised in the field of internet banking (Gwiting, Ndubisi, 2006; Ericson et al. , 2005; Polatoglu and ekin, 2001). According to them usefulness is probability that technology can improve how user completes a task. However, Gerrard and Cunningham (2003) stated that perceived usefulness depend upon the services offered like checking bank balance, applying for a loan, paying bills, transferring money abroad and obtaining information on mutual funds. The grea ter the perceived usefulness of electronic banking services, the more electronic banking will be adopted. Threats to information security and fraud related to electronic transaction have increased at an alarming rate, resulting in reduced trust in transactions online (The Hindu, 2009). In online banking in India not many fraud activities have taken place. But in internet banking one cannot depend heavily on luck. No institution or bank can afford to depend on luck. The institutions have to adopt security procedures to suit the environment, in order to increase the trust ad faith in the user of online banking. Trust in online banking is new and emerging field of internet in management research. Literatures on online banking are focussed more on general (main). For example Khiaonarong (2000) examined electric payment system and discussed laws supporting electric payment system, risk reduction method. Tan and Teo (2000) explored intentions to use internet banking services through attitude subjective norms and behavioural controls. Daniel (1999) examined online banking issues like culture of innovations, market share and organizational restrictions. Mole (1998) examined behavioural issues pertaining to online banking, such as satisfaction, price sensitivity. Sathye (1999) studied the effect of security, ease of use, awareness and pricing. Trust has been defined in various ways. Trust is willingness to rely on an average partner in whom one has confidence (Moorman et. al ., 1993). Morgan and Hunt (1994) felt trust exists When one party has confidence in an exchange partners reliability and integrity. Mc.Knight and Chervany classifies the definition of trust in four types: deposition of trust, institution-based trust, trusting belief and trusting intention. Deposition of trust means the extent to which one displays consistent willingness to be dependent in general in any situation. This is primarily derived from psychology. Institution-based trust means that one believes that conditions conducive to situational success in an endeavour or aspect of ones life are in place. This type of trust is derived from sociology. Trusting belief is one where one beliefs that the other party has one or more characteristic beneficial to oneself. Trusting intention means that one is willing to depend on the other party even though one c annot control that party. Thrusting belief and trusting intention are primarily derived from social psychology. Husted (1989) states that the trust is a complicated construct because of wide spectrum of approaches that defines it, makes it difficult to define ad operationalise. Trust can be defined in three perspectives Cognitive, economic and social. A cognitive definition of trust represents an optimistic expectation for an outcome of an event. To be specific it is a confidence I the result of an uncertain event. Zand (1972) defines trust as it is a positive expectation about the outcome, with a lack of control over the actions of others. The transaction-cost theory of trust states that a potential trustor examines the cost and benefits inherent in trusting abother party. The cost of trust is examined because the trustee may ivolve opportunistic or detrimental behaviour to maximise self interest (RBSir). The social perspective states that the trust can arise irrespective of economic consideration. When a number of people share common values, beliefs are known as reference groups. This helps in building trust in the group. Howard (1994) states that the group has a strong influence on individuals beliefs and their valuation of products and services. The question of trust may be even more important in online banking environment than in offline banking environment. Because building trust is particularly important where there are risk and uncertainty. In the internet environment all the users are spread around the world that access critical files on computers and information via internet. Therefore, internet becomes risky from the view point of security because parties involved in the transaction that is customer and the bank are not at the same place. Customers cannot depend on physical activity, handshakes and body signals because the customer cannot see the teller. Because of this, customer trust is of major factor enhancing the growth of internet banking (Shu, Han). The growth of online e-commerce activity has encouraged a lot of research on user trust in online environment. Researchers in this area have generally used institutional trust developed by Zuker (1986). Institutional trust refers to the development of trust within a n economic framework and using third party mechanism such as certification ad regulation to establish trust. 2.3 Dimensions and antecedents of Trust Now we will discuss about trust and its dimensions, antecedents and consequences. The dimensions of the trust are: Reputation Perceived Risk Reputation: Reputation is one of the dimensions of trust. Reputation is defined as Overall quality character as seen or judged by people in general (Malaga, 2001). When customers uses online banking they would have banks reputation in mind. Reputation is very important for trust worthiness. The more the reputation of the bank the more it will encourage people to do online transactions. And if the people think that a bank has a poor reputation, then they will be discouraged to use online banking. Reputation arises from a particular brand name, previous interaction, endorsement from trusted third parties (Egger, 2000). Perceived Risk: Perceived risk is a key dimension of trust. The issue of trust arises as the bank and the customers are physically apart, difficulty in predicting problems, relationships are difficult to maintain and also the cyber laws are not well defined (main). The issue of trust also arises because economic transactions involve risk (main). Experienced online banking users have more information about online banking, thus leading to less risk and more trust in online transactions (Ba, 2001). The extent to which they trust the electronic system is likely to co-relate with trust when engaging in online banking (lee, Turban, 2001). When customers assess their trust certain issue that arises in their mind are competency of electronic system, network and download speed, reliability, connectivity and availability (Lee and Turban, 2001). The main issue to the customers would be reliability of the network because when customer transfers important financial data over the network there are provision that unauthorised parties ca intercept the transfer of information. Antecedents of Trust Shared Value Communication Opportunistic Behavior Shared Value: Extent to which both the partners have common belief about goals, policy and behaviours whether they are wrong or right important or unimportant (main). In online banking environment shared value means extent to which they have common beliefs on ethics, security and privacy. Ethical value means chances of being given incomplete or wroEthical value means chances of being given incomplete or wrong product information and selling customers information to the third party. Honesty and Ethics help build trust (Huemer, 1998, main). A number of surveys have found high level of customers concern about privacy in online banking (Ackerman et al., 1999, main). The main concern for customers is privacy violation which means misusing personal information of the customers. Due to technical development and low cost of data transmission, now it had become easier for companies collect data from the customers and sharing it with the third party (Clay and Strauss, 2000). Security is one of the most important factors in building trust. Customers believe that internet payment channel are not secure and can be intercepted, this reduces customers trust in online banking and discourages them in using it (main). However, recent development in the internet environment has made the customers less concerned about internet security (Swaminathan et al., 1999). Communication: Communication can be defined as sharing of formal as well as informal and timely information (Anderson and Narus, 1990). The variables of the communication are openness, speed of response and quality of information. Trust is build by openness in communication and their relationship with the bank. Geten and Straub (2001) research found that electronic system plays an important role in building trust with the customers. The ability of the site to communicate with the customer in terms of openness, speed of response and quality of information will influence the site to address the need of the customers, who in turn will respond to it. Thus, the higher the degree of communication displayed by the banks site, the greater will be the influence on the customers trust. Ways to increase online communication by the sites include fast response, personalized message and real-time interactions (Geten and Straub, 2001). Opportunistic Behaviour: Opportunistic behaviour can be defined as self-interest seeking guile (Williamson, 1975). The integrity of the online banks and obligations depend on the extent of regulatory control, which is a major determinant of the customers trust in online banking environment (Lee and turban, 2001, main). Customers have low level of trust due to high risk of opportunistic behaviour by online banks and poor developed rules (Clay and Strauss, 2000, main). Online identities can be forged (Ba, 2001, main), sites can be counterfeit (bailey and Bakes, 1997, main). Because of the lack of adequate regulatory control customers believe that their personal information may be used without their consent during or after navigation (Li et al., 2001). Klang (2001) stated that customers first access banks interest and then judge its integrity. Thus, it can be seen that integrity of the online bank is very important in gaining the trust of the customers. 2.4 Technology Acceptance Model Organisations invest in Information Systems for many reasons. For example cutting costs, producing more at the same cost, improving quality of services and products (lederer et al., 1998 (CP)). Users attitude towards the acceptance of new Information System plays an important role in successful adoption of the information system (Venkatesh and Davis 1996 (CP)). The more accepting the new information system the user are, the more they are willing to accept changes in their practices (Succi and walter, 1999 (CP)). Thus, the usage of a system can be an indicator of information system success. If the user does not rely on the system their behaviour would become negative for the Information System. One of the most widely used model for studying Information System acceptance is Technology acceptance Model (TAM) which helps in determining the use of system. The TAM model is an information system that shows how the users accept and use a technology. The model reflects that when a user is give or provided with a new software package, a number of factor will influence their decisions. They are: Perceived Usefulness: Fred Davis defines perceived usefulness is the extent to which a person believes that using a particular system would enhance their job performance. Finally perceived usefulness is influenced by ease of use and external variable, which could be training, documentation and user support. Perceived Ease of Use: Davis defined this as a the extent to which a person believes that using a particular system would be free from effort (Davis 1989). According to Technology Acceptance Model (TAM) the two factors are very important in determining computer acceptance. TAM is an adoption of the TRA (Theory of Reasoned Action) which was developed by Ajzen and Fishbein. TAM was developed by Fred Davis (1986, 1989) to explain software adoption based on TRA. Theory of Reasoned Action (TRA) is based on the assumption that consumers behave rationally and they evaluate systematically all the available information. TRA also assumes that people take into account the effect of their actions ad based on this reasoning make decision to whether take action or not (Ajzen and Fishbein, 1980 (CP)). Individuals will use computers if they feel that there would be positive benefits associated with it. Technology Acceptance Model hypothesises that: The more the perceived usefulness of the technology the more is the adaptation. The more is the ease of use of technology, the more is the adoption. The lower the benefit of the innovation the less is the adoption. In addition to individual characteristics like age, gender, qualification and previous experience in adopting technology, there are some social factors. They are: Apprehensiveness: it refers to the anxiety of using a new medium or technology (Rao, ). The adoption of the telephone in early years led to apprehensiveness. A firm would never risk by adopting indigenously developed technology as it involves cost and chances of failure are enormous (Rao, ). For example, bank employees are always worries about computerisation of data. Intrinsic Motivation: It leads to activities where there is no reward for the work but the activity itself. Intrinsic motivation arises from people need to feel satisfied and competent in dealing with their environment. There is an inner motivation to learn. For example: in case of new recruits, learning for them is an investment. Compatibility: it is the judgement of the decision makers to evaluate the compatibility of the new technology. The more the new technology is similar to the existing one, the higher is the confidence to learn the new technology. Social pressure: Social norm have most significant affect on system usage. Norm is the most frequent occurring and observable for the members of a particular society. For certain products, the social message that the product conveys to its users is the only benefit that the adopters receive (Rao, ). Enhanced Value: Apart from the benefits derived directly, there could be some benefits that are derived indirectly such as generations or enhancement of quality image. Such benefits can create extra value for the user. Therefore, adopting a new technology may not only be from the firms utilisation point of use but also the extra value added with the new technology. The more experience an adopter has, the better will be the understanding of a new technology. This will lead to the appreciation of the added value with the new technology by the user or the adopter. Technology suppliers commitment: new technology teds to carry high risk. A good commitment from the supplier can help reduce the level of risk related with it. It can be done through providing adequate information to the user. Resource commitment from the supplier can help the adopter to accept the new technology. In this world when the technology is changing rapidly the buyer is worried about the life of the technology that he is adopting. This problem can be delt by the supplier by promising to upgrade their product or buy back of hardware and change of the software. Adoption experience: adoption experience is the accumulated knowledge of the user and working relationship with the suppliers. Any previous experience with the technology helps the adopters to collect all the relevant information related to technology. The adopters know the needs and the requirements of the new technology and can understand the support required from the supplier of the technology. 2.5 Some other Information System Some other Information Systems are: Theory of Reasoned Action: Theory of reasoned Action (TRA) was developed by Martin Fishbein and Icek Ajzen (1975, 1980). Theory of reasoned action consists of three components: Behaviour intention Attitude Subjective norm. Behaviour intention is a measure of ones intention to execute a specified behaviour. Attitude is defined as an individuals positive or negative feelings for behaviour (Warshaw, Bagozzi and Davis, 1989). Subjective norm is a persons perception of what people think that the individual should do. Subjective norm is a type of pressure. A persons participation in any behaviour is influenced strongly by people around them. In this theory persons behaviour consists of two factors: Belief that certain behaviour would lead to some outcome. An evaluation of the outcome of the behaviour. Thus, if an outcome is beneficial for the individual then he/she tends to participates in the behaviour (Mischigan State University, 2008). Theory of Planned Behaviour: The theory of planned behaviour (TPB) was proposed by Icek Ajzen. Theory of planned behaviour helps us to understand how we can change the behaviour of the people. TPB is an extension of Theory of Reasoned Action of Ajzen and Fishbein (1975, 1980). There are three considerations that guide human behaviour. Behavioural belief: behavioural belief is an individuals belief about consequences of certain behaviour. Normative Belief: It is the perception about certain behaviour which is influenced by the judgement of others. Control Belief: Control beliefs are the belief that facilitate or impede the performance of behaviour. Behavioural Beliefs generates favourable or unfavourable attitude towards behaviour, normative belief results in social pressure and control beliefs gives rise to behavioural control. Thus, in combination attitude towards behaviour leads to the formation of behavioural intention. If the attitude is more favourable, the perceived control will be greater and the persons intention to perform the behaviour will be stronger (12 Manage, 2009). Task Technology fit Model: Task technology fit model was developed by Goodhue (1995), Goodhue ad Thompson (1995) at individual level. At group level it was developed by Zigrus and Buckland (1998). TTF model states that a good fit between technology, task and team can lead to better performance (Dennis et al, 2001, Goodhue, 2005, Zigrus and Buckland, 1998). In TTF Goodhue examines three factors: 1. Individual ability 2. Technology characteristic 3. Task requirement. He evaluates the influence of these three factors on performance and user evaluation of information technology system. Goodhue argues that TTF is the extent to technology functions, matches task requirements and individual abilities. Goodhue and Thompson (1995) developed a measure for TTF that consists of eight factors. They are as follows: Quality Locatability Authorization Compatibility Ease of use Production timeliness System reliability Relationship with the users. Each factor is evaluated between two to ten questions with responses on seven point scale from strongly agree to strongly disagree. However TTF focuses only of fit between user and technology and task and technology. It ignores the interaction between user and task (Mehlan et al, 2006). Goodhue argues that user evaluation is a substitute of TTF and it is appropriate for both mandatory and voluntary user information technology system. TAM is one of the models that are used widely to explain the factors that affect user acceptance of Information System (Suh, Han). However traditional information system is different from Internet Banking, which uses emerging technology like WWW and internet. With the advancement of WWW and internet, various researches have adjusted TAM to WWW environment to overcome TAMs lack of task forces. Recent studies of user acceptance of WWW have paid attention to perceived playfulness, because WWW is used both for pleasure and play. The studies have verified that perceived playfulness has a significant impact on user acceptance of WWW. Technology Acceptance Model 2 (TAM2) is the extension of TAM and it includes additional constructs like social influence process (Subjective norm, Voluntariness and Image) and cognitive instrumental process (job relevance, perceived ease of use, output quality). TAM2 reflects three interrelated social forces faced by an individual to adopt or reject a new technology. They are: Subjective norm, Voluntariness and image. Subjective norm can be defined as persons perception that most people who are important to him think he should or should not perform the behaviour in question (Fishbein and Ajzen, 1975, p.32). Subjective Norm is included as a direct determinant of behavioural intention in Theory of Reasoned Action (Fishbein and Ajzen, 1975). The reason for the direct effect of subjective norm is that people may choose behaviour even if they do not agree towards the behaviour or its consequences, but if one or more referent thinks that they should then they are influenced to do so. Voluntariness and compliance with social influence: mixed findings regarding subjective norm was discovered by Hartwick and Barki (1994). After separating the respondents into mandatory and voluntary usage, they found that the subjective norm had a great effect on mandatory but not on voluntary setting. Casual mechanism is referred as compliance. TAM 2 theorizes that the direct compliance based effect of subjective norm on intention, perceived usefulness and perceived ease of use will occur on mandatory but not on voluntary system usage setting (Venkatesh and Davis, 2000). Voluntariness as a moderating variable defined as the extent to which potential adopters perceive the adoption decision to be non-madatory (Agarwal and Prasad, 1997, Hartwick and Barki, 1994). If the users do not accept the information system the organisation will not be benefitted from the information system (Davis, 1993. Davis ad Venkatesh, 1996). The more willing to the information system users are the more willing they are to make changes in their practices and time to start using new information system (Succi and Watler, 1999). Usage of a particular system is an indicator of information system success and acceptance of computer. If the users do not trust the system and its information then their behaviour towards could be negative. Therefore, it is important to find out the reason why people use or do not use the information system. This information will help both the designer and the developers in their work (Mathesion, 1991). According to Technology Acceptance Model (TAM), the two factors, Perceived usefulness and perceived ease of use are of primary significance for computer acceptance. This is because if a user feels that using a particular information system will enhance his job performance and would require less effort, then only the user will use the information system. In case of online banking and Technology Acceptance Model, Perceived Usefulness is the degree to which individual feels that using online banking will enhance his/her performance and perceived ease of use refers to the degree to which an individual feels that using online banking would be free from effort. Thus online banking involving complex procedures or requires customers to learn new software will discourage people from using online baking. The case to TAM will arise only when people trust online banking and use it, TAM will be not used when people are not using online banking. TAM comes into play or use only when people use onli ne banking. Thus, this shows that trust is the centre to online banking and TAM and it is a basic foundation for the use of online baking and Technology Acceptance Model. Therefore, we hypothesise that as trust increases the use of online banking also increases. Hypothesis Stated in formal fashion, my study two five hypothesis. There is a positive relationship between ease of use and trust. There is a positive relationship between perceived ease of use and trust. 3. Research Methodology: 3.1 Research Design: The research design for this study investigates the factors that have an influence on customers acceptance of internet banking. I present an additional belief, trust and its dimensions to the Technology Acceptance Model to reflect the importance of trust in online banking environment. Online banking is of great use to the customers. It helps in saving time, cost, it can be used at anytime of the day irrespective of the location. All these benefits enhance the performance of the customers banking activity. A customer will therefore expect these services when he/she uses online banking. Trust is identified by three main antecedents. They are shared value, communication and opportunistic behaviour whereas Technology Acceptance Model is identified by two main characteristics like Perceived ease of use and Perceived usefulness. Verifying the TAM-Trust related hypothesis in the context of Online Banking will help us determine the importance of trust in Online Banking. Shared value is the extent to which the customers and bank share a common belief about what goal, policies are important or unimportant, right or wrong (Morgan ad Hunt, 1994). Based on the operational definition of Perceived usefulness, I assume that Perceived usefulness will help establish trust or shared value if the customers believe that online banking is useful. (Suh, Han). H1. Perceived Usefulness has a positive impact on Shared Value of the customer. Trust id negotiated through openness in communication. Communication has various variables like speed of response, quality of information and openness (Mukherjee and Nath). A customer will trust online banking only when his/her communication with the bank is fast, open and useful. Slow communication and low response rate from the bank will discourage people from trusting the bank. Thus, more the communication will be useful and open to the customer the greater will be the trust between the customer and the bank. H2. There is a positive relationship between communication and Perceived Usefulness in building trust. Opportunistic behaviour is conceptualised as regulatory control and information asymmetry. Due to high risk of opportunistic behaviour by online banks and poor developed rules and regulations, customers have low level of trust in online banking (Mukherjee and Nath). Thus, less opportunistic behaviour showed by the bank will increase the level of trust and usefulness from the customers point of view. H3. There is a negative relationship between Opportunistic Behaviour and Perceived Usefulness. Perceived ease of use is the extent to which using of a system would be free from effort (Davis, 1989). If the terms and conditions of the shared value of the bank is easy and free from effort then it will enhance trust and encourage customer to use online banking. H4. There is a positive relationship between Perceived ease of use and shared value. The customers trust also depends upon his/her communication with the bank. Communication is directly related to Perceived ease of use. If the communication of the customer with the bank is effort free and comfortable, customers would be encouraged to use online banking. So we hypothesise H5. There is a positive relationship between communication and Perceived ease of use. 3.2 Research Method This chapter covers the operational description of the research explaining the methodology strategy used in this study. In order to achieve the research objectives, the most appropriate method to collect the data. Data is collected both by primary and secondary research. The reasons for using these methods and how the overall study was conducted will be explained in this section. The methodology used has some limitations which will be discussed at the end of this chapter. Research is a systematic study on a particular matter employing facts investigation and data collection (Collins, 1989). Research can also be defined as a systematic and methodical process of enquiry and investigation with a view of increasing knowledge (Collins and Hussey, 2009). The objectives of the research can be summarized as follows: To provide solution to the problem. To explore and analyse more general issues. To generate new knowledge To explain new phenomenon. (Collins and Hussey, 2009) Research is conducted using two main strategies. They are Qualitative and Quantitative. (Bryman and Bell, 2008). Quantitative method is a phenomenon which concentrates on phenomena of measurement. In this the data can be shown in mathematical format or in statistical software by producing different charts and graphs. In simple words quantitative method can be measured. 3.2.1 Choosing Quantitative method This research mainly used quantitative method because quantitative method can be construed as a research strategy that emphasizes quantification in the collection and analysis of the data and also because: It involves a deductive approach between theory and research in which the accent is placed on the testing of theories. It involves a view a social reality as an external, objective reality. It incorporated the practices and norms of the natural scientific model and of positivism in particular (Bryman and Bell, 2008). Quantitative Data Analysis There are two types of quantitative data analysis. Descriptive analysis Inferential analysis Descriptive data analysis is also called as exploratory data analysis. It is concerned with describing data, it is also useful for summarising data and presenting it in tables, charts, graphs and other diagrammatic forms which enables us to comprehend pattern and relationships which are not apparent in raw data. Graphical presentation does not only present data in more compact form but the form that positively aids hypothesis confirmation (Hussey and Hussey, 1997). The four main groups of techniques which can be used are: presenting frequencies, measuring location, measuring dispersion ad measuring change. Inferential data analysis is also known as confirmatory data analysis. It involves using quantitative data collected from a sample to draw conclusions about a complete population (Hussey and Hussey, 1997). Four groups of inferential statistics which are used while conducting confirmatory data analysis are: estimating form samples, measuring associations, measuring difference, forecasting. [WHY DISCRIPTIVE] 3.2.2 Primary Data Primary Data Collection: Primary Data is the information that is collected first hand by the author (William, 2003). The data is original and is used for the first time in the research. There are many methods of collecting Primary data for example interview, questionnaire and observations. This research adopted self-completion questionnaire. It is sometimes referred to as self-administered questionnaire. In self-completion questionnaire the respondents answer the question by completing the questions themselves (Bryman and Bell, 2008). Self-completion questionnaire can be done in several forms. One of the most used methods is mail or postal questionnaire. In this the questionnaire is sent to the respondents through the post, who in turn after filling the questionnaire is asked to return it by post. In many ways self-completion questionnaire and interview are similar methods of business research. The basic difference between them is that there is no interviewer to ask the question, the respondent must read the questions and answer themselves (Bryman and Bell, 2008). As there are no interviewer to ask the question must be simple and easy to follow. As compared to interview the self-completion questionnaire should be: The questionnaire should have fewer open questions and more closed questions because they are easier to answer. Questionnaire should have easy-to-follow to reduce the risk that the respondents will fail to answer (Bryman and Bell, 2008). 3.2.3 Why Questionnaire In this research the author has use questionnaire to collect primary data. Some advantages of self-completion questionnaire over interview are: It is cheaper to Administer: The cheapness of the self-completion questionnaire is especially advantageous if you have a sample that is geographically widely dispersed (Bryman and Bell, 2008). Interviewing can be expensive. The postal questionnaire will be much cheaper because interviewing involves a lot of time as conducting personal interview is a long process. Thus, the postal questionnaire enjoys cost advantage. Quicker to administer: questionnaire can be sent out by post or distributed in large numbers at a same time but in interviews conducting personal interview takes a lot of time. Many questionnaires can be sent out by post in one batch. Also, it is very important to note that all the sent questionnaire do no t come back immediately ad they may take several week to be returned. There may be a need to send a follow up letter to those who fail to return the questionnaire. No variability of the interviewer: Self-completion questionnaire do not suffer from the problem of question being asked in different ways by the interviewer. Convenience for respondents: Completing a questionnaire is convenient for respondents because they can fill the questionnaire whenever they want and at the speed that they want. 3.3 Sample Selecting a sample is a fundamental element of a positivist study. A sample is made up of some members of a population. A population may refer to a body of people under consideration for research purpose. (Hussey and Hussey, 1997). A good sample is one in which the result obtained for a sample can be taken as true for the whole population. A sample technique is broadly classified in two categories: probability and no probability sampling technique. In probability sampling technique sample is selected randomly from a sampling framework. In a non probability a sample is drawn based on the personal judgement of the researcher (Malhotra, 2007) This study has used non probability sampling technique to collect data because of the restriction of time, unavailability of sample framework of online banking users in India. The study conducted online surveys to collect data. For online surveys a snowball sampling technique was to distribute questionnaire online. An initial group of 20 respondents were identified from personal sources. These respondents were asked to suggest people and questionnaire was distributed among them. The final valid respondent sample to the structured questionnaire consisted of 120 internet surfers in India. The respondents chosen were students, professionals, self-employed and housewives. Reliability and Validity A research is evaluated using two most prominent criteria namely reliability and validity from a methodological point of view. Reliability refers to a consistency for a measure of a concept in a piece of research (Finn et al., 2000). Reliability has greater importance in a quantitative research. For example: if you ask the same question to a respondent repeatedly, the answer would be same (Bryman and Bell, 2008). According to Bryman and Bell (2008, p.165) Validity refers to the issue of whether or not an indicator that is desired to gauge a concept really measures that concept. Validity is the most important criterion of research. It is also concerned with the integrity of the conclusion that are generated from research. There are different types of validity. There are mentioned below: Measurement Validity: It is also known as Construct Validity. Measurement validity primarily applies to quantitative research and to the search for measures of social scientific concept. It is generally related to whether or not a measure that is desired of a concept really does reflect the concept that it is supposed to be denoting. Measurement validity is very much related to reliability. If a measure of a concept is unstable, fluctuates then it is unreliable. It cannot provide a valid measure of the concept (Bryman and Bell, 2008). Internal Validity: It is concerned with a question of whether a conclusion that incorporates a casual relationship between two or more variable holds water. For example: In our study shared value causes trust, can we be sure that it is only shared value that is responsible for causing trust and nothing else. Thus, Internal Validity raises question: how confident can we be that independent variable is responsible for the change identified in dependent variable. External Validity: External Validity refers to the question of whether the result of a study can be generalised beyond specific research context. How people or organisations are selected to participate in research becomes very crucial in this issue. It is because of External Validity that the quantitative researchers are so keen to generate samples. Ecological Validity: The issue of Ecological Validity relates to the naturalness of research approach and has considerable relevance to quantitative research. The criterion is concerned whether social scientific findings are applicable to peoples every day, natural social setting. Thus, business research may sometime produce findings that are technically valid but little to do with the happenings in the peoples everyday life. Furthermore, result deriving from a study using questionnaire the unnaturalness of the fact of having to answer a questionnaire may mean that the findings have limited Ecological Validity, but the questionnaire may have measurement validity and reasonable level of internal validity. (Bryman and Bell, 2008).
Tuesday, May 19, 2020
Youth Addiction Alcohol Causes And Concerns - 1544 Words
Youth Addiction to Alcohol ââ¬â Causes and Concerns Instruction In todayââ¬â¢s society, alcohol use and heavy drinking is very common among young adults and adolescence. Since the end of the 20th century, more and more of the younger populations have started participating in alcohol consumption. Unlike in the early 1900ââ¬â¢s when alcohol was heavily regulated ââ¬â alcohol was even banned in the United States from 1919 ââ¬â 1933 due to prohibition ââ¬â it is now normal for anyone above the legal drinking age to walk into a liquor store and buy as much alcohol as desired with no restrictions or regulations. Alcohol has changed the way we live our lives. It is now widely believed that alcohol makes socializing easier and has even become a tradition to serve and drink alcoholic beverages at social events. In fact, it may even be considered ââ¬Å"uncoolâ⬠or ââ¬Å"lameâ⬠to attend or host a dry social event in todayââ¬â¢s society. Alcohol has become a common drug among the youth. More and more adolescents are experien cing the consequences of alcoholism at a young age, which has created a social issue in todayââ¬â¢s society. In todayââ¬â¢s norm, young adults tend to correlate having a good time with alcohol and drinking. Imagine this, youââ¬â¢re at a party with your friends in celebration of the last day of school; you are not typically a heavy drinker but a few of your friends are and they push you to have a few bottles of beer; eventually, the few bottles become many bottles, and soon you are taking shots of hard liquorShow MoreRelatedShould Marijuana Be Legalized?1638 Words à |à 7 PagesCannabis Should Be Legalized in the United States In 1920 when alcohol prohibition began the war against cannabis had been going strong for a decade. In 1910 the Mexican Revolution created a surplus of Mexican immigrants in the United States; American citizens were frightened by the Mexican culture, including their recreational use of cannabis (Marijuana Legalization, 2015, para 7). Politicians continued to use fear and racism to grow disapproval and hatred of cannabis. Beginning in 1915 twenty-nineRead MoreA Deeper Look On The Alcoholic Environment1350 Words à |à 6 Pages A Deeper Look On The Alcoholic Environment Nowadays the exposition to alcohol consumption is becoming very common among adults and teenagers. Alcoholic addiction is developed in social environment such as living around heavy drinkers, people often are tempted to the taste of alcohol which then becomes an addiction. Either it is a party or a celebration, alcohol is most of the times available; however, there are concerns in society, since the consumption of this drug can bring dangerous consequencesRead MoreSubstance Abuse Is A Serious Condition892 Words à |à 4 PagesSubstance addiction afflicts one in twelve Americans and involves millions more family members and friends. The statistics are scary; in the United States an estimate of 88,000 deaths a year is a result of excessive alcohol abuse while deaths from cigarette smoke exceed 480,000 a year. About 100 Americans per day died from drug overdose in 2013(Kane, G. 2015). Substance abuse is a serious condition that should not be ignored or minim- ized. It is a devastating disease with serious social consequencesRead MoreThe Influence Of Little Timmy On Children Essay1443 Words à |à 6 Pagesto become even more interesting as he began his exploration of alcohol. The kids at school would never believe what an amazing night he was going to have. In multiple countries throughout the world the legal drinking age is eighteen years old, however, in the United States, the legal drinking age is twenty-one. Despite eighteen years old being the age of a legal adult in the United States, citizens are unable to legally drink alcohol until the age of twenty-one. At the age of eighteen a United StatesRead More Drug And Alcohol Abuse Essay994 Words à |à 4 Pagesof Missouri, the issue I would encourage him to address is the manufacture of drugs and the use of drugs and alcohol throughout our state. The advice I would give him is to impose stiffer penalties for those who manufacture drugs and focus on prevention, and, most importantly, rehabilitation, of those who abuse alcohol or drugs.According to the Missouri Department of Mental Health, alcohol and drug abuse affects more than 259,000 Missourians and another 800,000 who are family members of substanceRead MoreAddiction : The Canadian Aboriginal Community1690 Words à |à 7 Pages Shivanna Sookoo 212-988-283 Monday, March 28th, 2016 SOWK 2020 M Addiction in Contemporary Society Professor Wayne Skinner The Canadian Aboriginal community consists of a strong support system founded on tradition, heritage, and spirituality. However, the history of Natives in Canada is polluted with marginalization, abandonment, and powerlessness. It has been argued that this history is the foundation for the addiction in Canadian indigenous communities, where the rates of substance abuseRead MoreMarijuana Is The Most Commonly Used Illicit Drug Worldwide926 Words à |à 4 Pages discussed and researched by our government, health professionals, and law enforcement. I personally donââ¬â¢t agree with the legalization of the drug knowing how dangerous its usage can be. The effects marijuana has on its users, I believe, is cause for concern along with the other known problems that arise with its use. Marijuana is derived from the leaves, stems and flowering parts of the hemp plant, Cannabis sativa. The discovery of cannabis can be traced back to 2900 B.C. China, and has been usedRead MoreNotes On Adolescence And Substance Use Essay1291 Words à |à 6 Pagesbefore adulthood. Risky behaviors can include drug or alcohol use or abuse (Broderick Blewitt, 2015). This paper will examine the relationship between adolescences and alcohol use, and the effect that alcohol have on the developing brain. As well as, how a healthy spiritual development can effect substance use in adolescences. In addition, it will discuss the issue of local drug or alcohol use, and examine the presence of drugs or alcohol within the community. Finally, it will examine and analyzeRead MoreThe Legal Drinking Age Act1179 Words à |à 5 Pagesage and whether it should lower from twenty-one, or remain. On July 17, 1984, Ronald Reagan was in office when the National Minimum Drinking Age Act was passed, prohibitin g anyone under the age of twenty-one from publicly possessing and purchasing alcohol. After the Act was passed in 1984, the states that failed to abide by Ronald Reaganââ¬â¢s National Minimum Drinking Age Act were withheld from federal highway construction funds. By creating this punishment, states were almost forced to comply with theRead MoreAddiction and Addictions Internet Addictions1321 Words à |à 6 Pagesdamaging today s society. Addictions are a fast growing concern, it has branched off and caused many problems whether it be related to drugs, alcohol, gambling, sex, Internet, or eating. Addictions are something society faces everyday. Although there are many reasons behind why addiction are growing, and where they stemmed from, today s society has focused primarily on how someone with an addictions problem can seek help. Also the many Gaps and Barriers around addictions are enabling people who wish
Saturday, May 16, 2020
Analysis Of Toni Morrison s Beloved - 920 Words
1. In Toni Morrisonââ¬â¢s Beloved, she takes her audience back to a past where the oppressed (slaves) did not have a voice. How does Beloved compare to other slave narrative, and why is it important? How does memory involve itself within this concept? ââ¬Å"A Different Remembering: Memory, History and Meaning in Belovedâ⬠is Marilyn Sanders Mobleyââ¬â¢s attempt to distinguish the difference of Morrisonââ¬â¢s novel from the established white literary tradition that critics were trying to place it in. Mobley argues that Morrisonââ¬â¢s use of the trope of memory revises the slave narrative genre and makes the slave experience more accessible to contemporary readers. This is done by expanding what traditional slave narrative excluded by using memory as the ââ¬Å"metaphorical sign of the interior life to explore and represent dimensions of slave lifeâ⬠(Mobley 357). Therefore, just like slave narrative interrupted the system of slavery through its intervention, Beloved demonstrates an interference that disrupts the cultural perception that the untold story of Sethe, a black slave mother, is just the past to be forgotten. The emphasis on the past of slavery allows for the discovery of modern aspects of meaning roote d in the text. Accordingly, the rationale behind Morrisonââ¬â¢s composition is to encourage black readers to return to the part of their past that many have repressed, ignored or forgotten, instead of persuading white readers consider the slaveââ¬â¢s humanity. The critical essay uses examples fromShow MoreRelatedAnalysis Of Morrison s Beloved, By Toni Morrison Essay941 Words à |à 4 PagesMorrison and Twain each present freed slave mothers as self-sacrificing. Each woman s traumatic experiences as slaves create a deep fear of her children s enslavement. In Morrison s Beloved, Sethe is so distressed by her past; she murders her child to save her from slavery. Morrison uses Sethe s drastic sacrifice to comment on slavery s psychological effects. Meanwhile, Twain s Pudd n Head Wilson portrays Roxy as a sacrificial mother to create sympathy for black people. From a culturalRead MoreAnalysis Of Toni Morrison s Beloved1458 Words à |à 6 Pagesinequality between races, class es, and genders. Toni Morrisonââ¬â¢s novel Beloved is a story that truly shows how oppressive slavery was during the setting of the book. Similarly to the inequality faced during the time of slavery, while Morrison was writing the her novel the issue of womenââ¬â¢s equality was present, and being fought for. Morrison, through Beloved, is able to show the world her views on inequality, and how it is still present in life today. Morrison is African American, she was born into a familyRead MoreAnalysis Of Toni Morrison s Beloved1615 Words à |à 7 PagesIn her novel Beloved, Toni Morrison utilizes a circular narrative to emphasize the similarities, or lack thereof, between her characters. In Philip Pageââ¬â¢s article, ââ¬Å"Circularity in Toni Morrisonââ¬â¢s Beloved,â⬠he writes, ââ¬Å"The plot is developed through repetition and variation of one or more core-images in overlapping waves... And it is developed through... the spiraling reiteration of larger, mythical acts such as birth, death, rebirth, quest-journeys, and the formation and disintegration of familiesâ⬠Read MoreAnalysis Of Toni Morrison s Beloved1200 Words à |à 5 Pages ââ¬Å"Weââ¬â¢ve all got both light and dark inside of us. What matters is the part we choose to act on (Sirius Black) â⬠. Toni Morrisonââ¬â¢s novel Beloved dedicates her novel to the 60 million and more exposed to the darkness within the people set out to hurt them. The novel depicts how cruelty leads ex-slaves to make irrational decisions and shape the people they are at the end . The cruelty inflicted on one including but not limited to slavery causes a chain reaction of hatred, pain and suffering and theRead MoreAnalysis Of Toni Morrison s Beloved943 Words à |à 4 Pages It is within human nature to fear that which we do not understand. In Toni Morrisonââ¬â¢s Beloved, this idea is explored through the lens of racial discrimination. In this passage, Morrison uses animal imagery as a means to criticize the whitesââ¬â¢ dehumanization and subsequent fear of the blacks. With a focus on this inherent, primal fear, this section stresses the novelââ¬â¢s theme of the ââ¬Å"Otherâ⬠and reinforces the existence of racial prejudice. While this piece of the narrative emphasizes that this ââ¬Å"otheringâ⬠Read MoreAnalysis Of Toni Morrison s Beloved1547 Words à |à 7 PagesToni Morrisonââ¬â¢s Beloved extends beyond a description of individuals held captive by their past through the exploration of human responses to slavery. The manipulation of language and its controlled absence reinforces the mental enslavement that persists after individuals are freed from physical bondage. It is when language is amplified into song that an individual or community may free themselves from the constraints of mental enslavement, therefore enabling their ability to claim ownership of themselvesRead MoreAnalysis Of Toni Morrison s Beloved1323 Words à |à 6 PagesToni Morrisonââ¬â¢s Beloved is a masterwork of fiction that allows the reader to have many different experiences based on the novels that you pair the book with. When you read Beloved in a modernist light you get a story with slightly different themes then if you read it through a feminist lens. It is a credit to Morrison that her thoughtfully crafted piece of art is able to stand on it own in so many varying ideas. One of the lens that doesnââ¬â¢t get discussed enough is the lens of African AmericanRead MoreAnalysis Of Toni Morrison s Beloved1200 Words à |à 5 Pagesââ¬Å"Weââ¬â¢ve all got both light and dark inside of us. What matters is the part we choose to act on (Sirius Black) â⬠. Toni Morrisonââ¬â¢s novel Beloved dedicates her novel to the 60 million and more exposed to the darkness within the people set out to hurt the m. The novel depicts how cruelty leads ex-slaves to make irrational decisions and shape the people they are at the end . The cruelty inflicted on one including but not limited to slavery causes a chain reaction of hatred, pain and suffering and the cycleRead MoreAnalysis Of Toni Morrison s Beloved871 Words à |à 4 Pagesvery important motif in both Morrison and Faulknerââ¬â¢s stories. In Beloved, the reader is presented with a sad and depressed portrait of Sethe. Her life seems dark and bleak. However, once Beloved enters into her life, the reader sees an apparent shift in Sethe as a character. She begins to see color again, and it is Beloved who brings about this sudden transformation (Beloved, 65). And in the end, after Beloved has left, Sethe states, ââ¬Å"She was my best thingâ⬠(321). Beloved was her redeeming quality,Read MoreAnalysis Of Toni Morrison s Beloved 702 Words à |à 3 PagesWilliams 2 period Book by: Toni Morrison Book Titled: Beloved Beloved is about a lady they call Sethe who lives in Bluestone with her daughter Denver and her mother in law Baby Suggs. Fifteen years before the story starts, Sethe kills her baby because she was trying to keep her kids from being brought into slavery. The community knew about her killing her baby and judges her. Her sons Buglar and Howard left fifth teen years before the book started. After Baby Sugg s died, Denver and Sethe are alone
Wednesday, May 6, 2020
Essay about Black Americans - 2559 Words
Black Americans Black Americans are those persons in the United States who trace their ancestry to members of the Negroid race in Africa. They have at various times in United States history been referred to as African, coloured, Negro, Afro-American, and African-American, as well as black. The black population of the United States has grown from three-quarters of a million in 1790 to nearly 30 million in 1990. As a percentage of the total population, blacks declined from 19.3 in 1790 to 9.7 in 1930. A modest percentage increase has occurred since that time. Over the past 300 and more years in the United States, considerable racial mixture has taken place between persons of African descent and those with other racial backgrounds, mainlyâ⬠¦show more contentâ⬠¦Others landed as slaves in the West Indies and were later resold and shipped to the mainland. Slavery in America The earliest African arrivals were viewed in the same way as indentured servants from Europe. This similarity did not long co ntinue. By the latter half of the 17th century, clear differences existed in the treatment of black and white servants. A 1662 Virginia law assumed Africans would remain servants for life, and a 1667 act declared that Baptism do not alter the condition of the person as to his bondage or freedom. By 1740 the SLAVERY system in colonial America was fully developed. A Virginia law in that year declared slaves to be chattel personal in the hands of their owners and possessors . . . for all intents, construction, and purpose whatsoever. In spite of numerous ideological conflicts, however, the slavery system was maintained in the United States until 1865, and widespread antiblack attitudes nurtured by slavery continued thereafter. Prior to the American Revolution, slavery existed in all the colonies. The ideals of the Revolution and the limited profitability of slavery in the North resulted in its abandonment in northern states during the last quarter of the 18th century. At the same time the strength of slavery increased in the South, with the continuing demand for cheap labour by the tobacco growers and cotton farmers of the Southern states. By 1850, 92 percent of allShow MoreRelatedBlack Of Black And Black Americans870 Words à |à 4 Pageslife for black people in the United States of America that has always remained consistent is white racial hostility. A history of slavery, segregation, unequal protection of the law, and second class citizenship inflicted by a white power structure that dominates on a national level has created a harmful reality for black people. Every aspect of black public life must either be under the control of or in opposition to white supremacy. Every state-sanctioned institution works to use black bodies asRead MoreThe Violence Of Black Americans Essay1532 Words à |à 7 Pagesis evident that Black Americans are un-proportionally living in poverty and without easy access to achievement. This harsh reality is not helped by our media-driv en society. In a world so heavily integrated with mass media hysteria, we scroll past posts that can have the countering effects of degradation or empowerment through our identities. While movements of Black Power can be painted through media, it also not hard to see the difference between the ways in which Black Americans are manipulatedRead MoreBlack Americans And Indian Americans2476 Words à |à 10 Pages Black Americans and Indian Americans Institute of affiliation Name Date ââ¬Æ' Abstract This paper explores the cultures of the dominant Indian-American culture and the Black American ethnic communities. Their way of life including their historical pasts, languages, religious ways and social relations will be deeply enumerated. A comparison will be included and similarities and differences drawn between the two groups. The groups will be compared on how they can interact in a professional settingRead MoreThe Black Of African Americans879 Words à |à 4 PagesThroughout history African Americans have always suffered hatred and have always been rejected by Americans. As of today they are still [being treated like slaves as always ranked lower then rest of the people]*How then do you account for an African-American being the CEO of one of the top global companies?*. ââ¬Å"Going to meet the manâ⬠a story by James Baldwin is a great example of how African Americans were treated in late 1900s; how they were used as entertainment for white people and how they wereRead M oreThe Death Of Black Americans1273 Words à |à 6 Pagesused following the tragedy of death. Within the past few years, black Americans have been specifically targeted as victims of racial hate crimes. In 2016, more than 250 black Americans were killed by police (Huffington Post). The deaths of black Americans have become an epidemic, one that will have lasting effects on society. One effect is that of the ââ¬Å"Black Lives Matterâ⬠movement which was birthed after the murder of an unarmed black teen in Sanford, FL. On February 26, 2012, Trayvon Martin wasRead MoreThe Dignity Of Black Americans1701 Words à |à 7 Pagesdignity of Black Americans is being taken away by the same people who are getting paid by American tax dollars, to protect and serve. Because of this rash of recent deaths, Black Americas have started an initiative to ban together to fight the racial injustice in this country. Black Lives Matter is an organization of American activist who created a grass roots movement to abolish the degradation and demonization of Blacks Americans. This movement formed after the shooting death, of Florida Black AmericanRead MoreThe Inequality Of Black Americans923 Words à |à 4 PagesFace Inequality Realism ââ¬Å"Black people can not be racist, prejudice yes but not racist. Racism describes a system of disadvantage based on race. Black people can not be racist, since we can not stand to benefit from such a system,â⬠(Dear White People). In the United Statesââ¬â¢ society, the oppression of black Americans is ingrained and rooted in history (ââ¬Å"The Oppressionâ⬠). With our country of immigrants, blacks were bought here by force and were kept as slaves for one-hundred fifty years (ââ¬Å"The Oppressionâ⬠)Read MoreBlack Americans And The Black Freedom Struggle1372 Words à |à 6 PagesMany have thought that the end of the civil war was also the end of the suppression against Black Americans. However, real freedom hasnââ¬â¢t been present to them. Discriminations against Black Americans were transformed and still exist in other aspects. The life of a Black American was planned before he or she was born, not much freedom in their hands. Black American experience dis advantage and discrimination in many different institutions that all prove the existence of Neocolonialism. From housingRead MoreThe Diversity Of Black Americans1402 Words à |à 6 PagesDiversity is now, more than ever before, at the forefront of the American conversation. Black people have been slowly but surely making gains in todayââ¬â¢s society and in ways that were not possible before. African Americans are more educated and more affluent, and more important as consumers than ever before. By 2017, they are expected to have a spending power of 1.3 trillion dollars (Resilient, 2013). Young, influential, and brand loyal, this group should be the target of many companies. InterestinglyRead MoreThe American Dream And The Black American Reality908 Words à |à 4 Pagesthe ideals of the American Dream through her characters: Walter, who embodies the quest for an opportunity for prosperity, Beneatha who wants the freedom to be herself and embrace her African heritage, and Lena (M ama) who buys a home in a white neighborhood pushing the boundaries of social mobility during that time. The Youngers are in a state of poverty, because of this as suggested by Lloyd Brown ââ¬Å"their deprivations expose the gap between the American Dream and the Black American realityâ⬠(241).
The Response to the Spread of Buddhism in China Differed...
The response to the spread of Buddhism in China differed according to oneââ¬â¢s social position. Confucian scholars and the emperor attacked Buddhism as an outlandish, barbaric belief. ââ¬Å"The Memorial of Buddhismâ⬠written by Han Yu, a Confucian scholar, opposes Buddhism when the emperor decides to bring ââ¬Å"the finger bone of Buddhaâ⬠into the Chinese palace. He shows the unjust actions of the emperor by referring back to Confucian teachings such as keeping ââ¬Å"[ghosts and spirits] at a distanceâ⬠. The scholar also describes how Buddhism is barbaric because it does not conform to any Chinese laws or Confucian teachings (Doc. 4). As a Confucian scholar, he favored the relationship between ââ¬Å"sovereign and subjectâ⬠and traditional dress. He did not wantâ⬠¦show more contentâ⬠¦As a Chinese scholar, he was probably looking for an end to suffering when China was invaded by nomads. His point of view is significant because he implies that Buddhi sm gives a chance for everyone to reach nirvana. In a state of political chaos, this greatly comforted and hugely appealed to the Chinese. An additional document by a Chinese Buddhist follower during the nomadic invasions would be helpful because it would show how Buddhism provided a distraction and relief in political disunity. Buddhist and Chinese scholars defended Buddhism by attempting to prove that Buddhism was as good as other Chinese philosophies. In document 3, an anonymous Chinese scholar utilizes a question and answer organization to drive off the common attacks on the Buddhist belief. The scholar thinks it would be unrealistic to compare Confucianism and Buddhism because the Confucian Classics do not contain everything. He also defended the monksââ¬â¢ celibacy by saying that they had given up their family for ââ¬Å"accumulating goodness and wisdomâ⬠. As an anonymous scholar, he probably hid his name to escape punishment because most people were Confucians at the time. Likewise, Zong Mi, a Buddhist scholar, was also trying to defend Buddha as an equal to Laozi and Confucius. He said that all three sages lead to an orderly society, and like doc 3, all three philosophies could existShow MoreRelatedIndian Caste System5772 Words à |à 24 PagesThe Indian caste system describes the system of social stratification and social restrictions in India in which social classes are defined by thousands of endogamous hereditary groups, often termed jà tis or castes. Within a jà ti, there exist exogamous groups known as gotras, the lineage or clan of an individual. In a handful of sub-castes such as Shakadvipi, endogamy within a gotra is permitted and alternative mechanisms of restricting endogamy are used (e.g. banning endogamy within a surname). TheRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pagesperspectives on the past) Includes bibliographical references. ISBN 978-1-4399-0269-1 (cloth : alk. paper)ââ¬âISBN 978-1-4399-0270-7 (paper : alk. paper)ââ¬âISBN 978-1-4399-0271-4 (electronic) 1. History, Modernââ¬â20th century. 2. Twentieth century. 3. Social historyââ¬â20th century. 4. World politicsââ¬â20th century. I. Adas, Michael, 1943ââ¬â II. American Historical Association. D421.E77 2010 909.82ââ¬âdc22 2009052961 The paper used in this publication meets the requirements of the American National Standard
Leadership in Management
Question: Discuss about the Leadership in Management. Answer: Introduction Leadership can be defined as the process of influencing the social environment that aims at maximizing the efforts of other people towards achieving a set goal. On the other hand, leadership analysis can be defined as the act of breaking down the traits that are related to leadership into basic components that aim at assisting during a study and can be used by the practitioners. Leadership, therefore, has nothing to do with one's seniority in a different capacity or a given hierarchy. This means that the leadership analysis is a complex process that aims at exploring both negative and positive traits. In this article, I have therefore explored the process of leadership analysis and the theory that are related to leadership analysis. It has further expounded on the traits of leadership and the change of behaviors (Chen 2008). The application of leadership behavior has also been explicitly defined, and a detailed analysis was done to highlight the changes in the management of leadershi p analysis. Leadership Analysis Leadership analysis can well be defined as the act of breaking down the traits related to leadership into basic components that aim at assisting in a study by practitioners. Therefore, good leadership analysis should take into consideration the qualities of the leader in the context of all times and factors. The analysis is based on the positive impacts and negative impacts. The analysis of leadership, however, is done with considerations of the current environment. According to the theories that are set to explore on the leadership analysis, it is important to note that leadership analysis is seen in different ways (Daft 2014). Some of these theories are categorically slated to define the current impacts and some of the resultant impacts made in the current environment. In most of these theories, leadership analysis is deemed as a channel of exploring the relationship between the current social environment and the people involved. Traits of Leadership There are traits that are used for assessing leadership styles. Some of these traits involve the ability to distinguish the environment and the people associated with the environment. Leadership is seen as a set of behaviors that aims at evaluating the traits of successful leaders and identifying the broad leadership styles (Hayes 2014). The traits are seen as some of the core values in defining what leadership entails. These traits may categorize into two categories. There are moral traits and immoral traits. In leadership analysis, it is important to note that the moral traits are recommended as the better for establishing a suitable working environment. These traits are seen as successful traits that are evaluated by the leadership analysis theories. However, the immoral traits usually affect negatively on the working environment. Leadership Behaviors It is easy to understand leadership behaviors, but this may need some effort to perform what it entails consistently. A change in behavior will give one a way forward to increasing the effectiveness in performing the duties (Herman 2011). These behaviors can be learned however some seem to be inborn. Leadership may involve different practices such as: To inspire the vision Modeling the way Challenging the Status Quo Encouraging the heart Enabling others to work These practices may line up well with the leadership behaviors. Leadership behavior, therefore, needs determination in ensuring that directing, delegating, coaching and supporting other activities through different theories is effectively managed (Srivastav 2006). Change Management Analysis: Everyone needs changes and development in any organization or even in any working environment. Even in the modern world of today, people have no choice but to adapt to the ever-changing environment. Leadership plays a significant role in shaping and bringing changes to many organizations. There is a need for people or even organizations to cope up with the changing world. This will require greater personalities that may as well be termed as good leadership. Good leadership has seen many firms or even working environments grow rapidly. We need leaders with bigger minds such that they can keep up with the pace of the rapidly changing environments. Organizations have also benefited from leadership development since they require changes. These changes are only made available through better leadership. Changes in any working environment require new mindsets and not just new skills. These mindsets are made at our disposal through the good leadership (Walumbwa 2010). The strategies and plans that are introduced by the leaders play a significant role in defining the changes that are brought to any working environments. Leaders play a big role in opening the closed doors such that there is a positive competition that aims at bringing necessary changes in our working environments Applying the Leadership Theory: Leadership theory takes the challenge to which it is molded in various form. The leaders need to apply multiple practices to achieve their desired goal. This may involve the moral and ethical dilemma. The leader needs to ensure that his/her main state goal for applying leadership theory is to lead the followers and to ensure that he/she develops a sense of empowerment that aims at sharing a vision or his/her desired future. This application will, however, depend on the type of leadership that has been used. For instance, transformational leadership may require the leader to inspire her followers by her morals. This leadership aims at addressing the deeper intangible needs of the followers. Secondly, servant leadership provides a guide through a difficult time on who to follow. For such scenario, servant leader may face the wrath of accomplishing trust and even earning respect. There are many theories that explain how leadership theory can be applied especially during time of dilemma and hardship Conclusion: We have realized that it the ability of leaders to assess the situation in any given area and to have a full comprehension the respective followers. This article has provided a detailed analysis of what leadership is and what leadership analysis entails. It is for this matter that we have realized that there are different theories that explicitly directs the leaders to understand each scenario and on which theory he/she should adopt, to realize the maximum results (Wang, Waldman and Zhang 2014). We have also realized that leadership has nothing to do with personalities or where someone is and what hierarchy one is accorded. The traits further explain what is entailed in leadership analysis and some of the related changes that are brought about by leadership analysis. Bibliography Chen, C.C. and Lee, Y.T., 2008.Leadership and management in China. Cambridge Univ. Press. Daft, R.L., 2014.The leadership experience. Cengage Learning. Hayes, J., 2014.The theory and practice of change management. Palgrave Macmillan. Herman, R.D., 2011.The Jossey-Bass handbook of nonprofit leadership and management. John Wiley Sons. Hill, C.W., Jones, G.R. and Schilling, M.A., 2014.Strategic management: theory: an integrated approach. Cengage Learning. Srivastava, A., Bartol, K.M. and Locke, E.A., 2006. Empowering leadership in management teams: Effects on knowledge sharing, efficacy, and performance.Academy of management journal,49(6), pp.1239-1251. Walumbwa, F.O., Wang, P., Wang, H., Schaubroeck, J. and Avolio, B.J., 2010. Retracted: Psychological processes linking authentic leadership to follower behaviors.The Leadership Quarterly,21(5), pp.901-914. Wang, D., Waldman, D.A. and Zhang, Z., 2014. A meta-analysis of shared leadership and team effectiveness.Journal of Applied Psychology,99(2), p.181.
Tuesday, May 5, 2020
Management Concepts Success and Efficient Growth
Question: Discuss about theManagement Concepts for Success and Efficient Growth. Answer: Introduction: The management concepts are considered to be very crucial for the success and efficient growth of a particular organization. This research paper will help in highlighting the different aspects and the use of the management concepts within a hospitality industry. Identification of the visionary leader with a particular firm or an industry helps in recognizing his or her skills related to the execution of the business process of the firm. On the other hand, the motivational theories are supposed to be of immense importance as they help in evaluating the significant growth of the firm to a large extent (Becoming the Evidence-Based Manager: Making the Science of Management Work for You by Gary Latham, 2011). There are certain barriers in the hospitality industry which needs to be identified as the acts vital challenge for the execution of the work concerned. The visionary leaders play the major part in revaluing the desired success for the organization concerned. There are different visionary leaders throughout the hospitality industries. The manager is the visionary leader in the hospitality industry. The manager within the hospitality industry executes the most vital role as to maintain the effectiveness throughout the firm related to the services offered to the customers (Cornelissen, 2013). The manger maintains the effectiveness of the business process and increases the profitability of the organization. The vision of the managers related to the carrying out of the work is considered to be of immense importance as it helps in bringing out the desired spark in the employees associated with the concerned firm. It helps in understanding the exact requirements of the employees as well as the customers. It is the primary responsibility of a visionary manager to increase the efficiency of the workplace by managing the relationship with the customers as well as the customers (Fabozzi and Markowitz, 2011). The leaders become more effective by the use of effective communicational skills. It is very crucial for the hospitality industry to maintain effective leadership by motivating others, managing the desired change, fostering the teamwork and delivering on the different promises. The leaders need to understand the business requirements as well as they aim to provide complete satisfaction to the clients as per their needs. Effective leaders provide some sort of spark to the others associated with the firm in order to increase their work effort and this finally brings out the positive results for the firm on a large scale. Use of the innovative tools by the leaders helps the other employees to achieve their set targets and goals of the concerned business within the hospitality industry (Desbordes, 2013). It is considered to be great important that the managers or the other leaders should maintain the effectualness and effectiveness throughout the industry concerned. The different theories of motivation are considered to be of great importance as they help in encouraging the employees associated with the concerned firm (Havewala, 2012). The motivational theories are supposed to be of large importance as they help in improving the desired skills of the managers in managing the workforce of the firm concerned. Employee motivation plays the most crucial role in evaluating the desired will power of the employees to carry out their work in more effective and efficient manner. Some of the motivational theories for managers in the hospitality industries are Theory x and theory y, Hierarchy of needs, equity theory, Hawthorne effect and many others. A manager needs to use the Maslow Hierarchy of needs for motivating of all of the employees in their organization. This consists of various other factors such as the food security, self-actualization needs, social needs and various others. There are some other means such as providing incentives programs, awards programs, referral bonus and many others for motivating t he employees towards their work (Quinn, 2011). There needs to frequent arrangement of the cultural programs other than the working time as this will help in reducing the work pressure of the employees and more the promotions after a certain period of time will also help in retaining the employees the firm concerned. There are certain challenges within the hospitality industry which need to be identified n order to maintain efficient workflow. Some of the crucial challenges are technology, innovation, Human Resources and Global Challenges (Rachui, 2012). These are the certain challenges which need to be overcome in order to evaluate the effectiveness of the entire hospitality industry. The barriers to the creative thinking are considered to be very crucial for the growth of the organization concerned. The individual perceptions are of great importance and they play a most vital role in evaluating the significant growth of an organization throughout the travel industry. There is a certain commonality of barriers such as time, money, management problems and various other problems. It becomes very important for the respective managers to recognize their personal benefits. Highlighting the real along with the perceived barriers affects the planning system in a different way. It is crucial for the man agers to understand the desired requirements of the employees associated with the firm as this will help in managing the barriers coming within creative thinking in the hospitality industry. On the other hand, there are some of the demographic factors which generate crucial impact on the thinking of the individuals related to the hospitality industry (Safir, 2013). The needs of the employees along with the business should be properly understood by the managers or the leaders. The managers need to formulate effective strategies as to bring out the positive results for the company. Some other barriers while creative thinking is making assumptions, being open minded, following rules and being over-reliance on the logic. Conclusion The research paper critically highlighted the different facts related to a visionary leader in hospitality industries. Moreover, the use of the motivational theories helps in enhancing the desired effectiveness of the workplace. Use of the effective communicational skills is other vital aspects in order to become the effective leaders throughout the hospitality industries. Trust and belief on the employees are other crucial points which need to be understood by the effective leaders as this increases the satisfaction of the employees regarding their work. References Becoming the Evidence-Based Manager: Making the Science of Management Work for You by Gary Latham. (2011).Personnel Psychology, 64(1), pp.266-269. Cornelissen, B. (2013).Mastering System Center 2012 Operations Manager. Indianapolis, Ind.: Wiley. Desbordes, M. (2013). Latest sponsorship strategies and the need for research.International Journal of Sports Marketing and Sponsorship, 14(3), pp.1-1. Fabozzi, F., and Markowitz, H. (2011). The theory and practice of investment management. Hoboken, N.J.: John Wiley Sons. Havewala, P. (2012).Oracle Enterprise manager cloud control 12c. Birmingham, UK: Packt Pub. Quinn, R. (2011).Becoming a master manager. Hoboken, NJ: Wiley. Rachui, S. (2012).Mastering System Center Configuration Manager 2012. Indianapolis, IN: Wiley. Safir, R. (2013).Marketing and merchandising for musicians. Boston, MA: Course Technology, Cengage Learning.
Subscribe to:
Posts (Atom)