Tuesday, December 24, 2019
Article Review ââ¬Åthe Religious Sources of Islamic...
1. The article ââ¬Å"The Religious Sources of Islamic Terrorismâ⬠by Shmuel Bar takes an in-depth look into the potential justifications of terrorism in regards to religion. In this article, Bar attempts to identify the differences between the religion of Islam and the duties associated with being a Muslim including participating in jihad. The author explains the various differences between the ideas of both the traditional Muslim as well as the moderate Muslim. He goes on to identify jihadist-type acts that could potentially be changed if the right movement and implementation of rules were set. The key points and concepts in this article are: â⬠¢ the explanation of the Islamic religion; â⬠¢ the jihadist movement; â⬠¢ the traditional versus theâ⬠¦show more contentâ⬠¦4. The ideas of the traditionalist versus the moderate Muslim are conflicting in how they interpret various teachings of their scripture. Participation in jihad may be considered an obligation due to the occupying of so many countries by non-Muslims; however, the idea that it must be fought with acts of terror remains debated. The traditionalists will take a more literal interpretation resulting in acts of violence and terror; even though this initiative tends to have more political motives rather than religious. The moderate Muslim struggles with the possibility that their less orthodox beliefs will appear as though they are abandoning their religion. Due to the fact that the traditionalist is more likely to resort to violence, there is also a fear of retaliation against the moderate Muslim. Unfortunately, with that mentality, the radical Islamists prevail. 5. A long-term strategy has to include ideas and not necessarily weapons and a bunch of rules. The author explains that the solution is a lot deeper than the acts they are committing on the surface. Creating a strategy to potentially combat a radical, religious ideology seems as though it would be impossible. A long-range strategy that outlines the teachings of their religion and focuses on how terrorism is actually against their scripture could succeed. The author acknowledges the idea that Western civilization must
Monday, December 16, 2019
Contexts for Contemporary Business Paper Free Essays
string(136) " desire of greed that leads many people to undertake illicit and moral conduct which eventually lead to immoral and depraved behaviors\." It is by helping to produce these public benefits that vices ultimately lead to good. Madeleine writes, ââ¬Å"Private vices may be made public benefits through skillful management by a wise politician ââ¬Å"(ibid. , volume 1, p. We will write a custom essay sample on Contexts for Contemporary Business Paper or any similar topic only for you Order Now 169). Certainly one could argue that the very nature of the human condition is that we all are afflicted by sin; and it is through this sin that things like greed, avarice, and insatiability arise and manifest themselves in the form of Emceesâ⬠. Are there any differences in the degrees to which vice and greed that occurred during Mandibleââ¬â¢s generation were committed versus ice and greed committed by members of present day societies? Does Mandibleââ¬â¢s vision regarding the concept of vice and the way it helped to produce public benefits at the turn of the 17th century in England, still hold true in our modern-day, globally oriented society? I propose that ââ¬Å"societal viceâ⬠in the context of a modern-day, global scale economy is actually much more harmful and detrimental to societies, and to world economies as a whole, than it is advantageous. I also propose that present day vice, greed, and corruption executed in the financial world by politicians, dockworkers, bankers, and other important members of society in positions of power are now able to be performed and executed on a much larger and more poisonous level than Madeleine probably ever dreamt of. The vice and greed of the investors and the ordinary citizens are detrimental because their actions help fuel the much larger system as a whole. In essence, all investors have the vice of greed and the reason they invest is to improve their financial condition and situation. While there are many hardworking people who prudently and cautiously invest their money, here are also similar people who blindly and speculatively invest their money in the hopes of making exorbitant profits. I liken both groups of individuals to people who are working in the basement of an extravagant mansion, throwing logs into a large fireplace. The mansion could be compared to the ââ¬Å"global financial machineâ⬠throughout the world and the people throwing the logs into the fire are the small investors in this great machine. Some invest a few logs into the fire while others invest more logs. Both have the desire and ââ¬Å"greedâ⬠to get warm, gain wealth, and improve their financial condition. In Mandibleââ¬â¢s day, even though every member of society had greed and vice in them, the ââ¬Å"financial fireplaceâ⬠of this large mansion was much smaller and not as interconnected with other financial mansions, as in a contemporary, globally connected world. The real problem arises when the bankers and stockbrokers who are working at higher levels of the mansion, take the benefits of the hard work that has occurred in the basement, and then greedily invest this hard work in the hopes of making even more money. The bankers and stockbrokers are managing each of these large ââ¬Å"financial housesâ⬠and have few legal or moral constraints placed on them. In a global economy all of the financial houses are placed very closely together and interconnected to each other through a very sophisticated set of phones and computers. The bankers and stockbrokers use this elaborate communication mechanism the trade heat back and forth as needed, with little regard to the potential negative effects it could have on the ââ¬Å"basement investorsâ⬠. This scenario works reasonably well as long as the fireplace is in good working order and there is a need for heat. Each investor in the basement happily places logs in the financial fireplace with little regard to the negative consequences hat could occur. I refer to these negative consequences as the ââ¬Å"fine printâ⬠that is included with all investments; the same fine print that many investors never read because it is simply too complicated to understand. The problems can arise if the financial fireplace becomes damaged, if the fire in this fireplace becomes too hot, or if the outside economic climate changes and the heat of the fire is no longer needed. If the fireplace becomes damaged because the fire was too hot and had too many investors, the resulting damage could burn down the entire financial house. This loud cause every house in the financial neighborhood to also burn down because all of the houses are placed so closely together in a global setting. Publicsââ¬â¢ attitudes reflect their economic reality ââ¬â and the global downturn that started after 2007 has had a profound impact on many countriesââ¬â¢ economies. Annual growth rates have slowed over recent years in most nations surveyed. This slowdown has been particularly severe in the advanced economies, which had a median annual growth rate of 3. 5% in 2007 but Just 1. 4% in 2012. Growth has also declined in the developing economies (median of 6. 8% to 3. %) and the emerging markets (median of 6. 3% to 3. 9%). Now placed closely together and are reliant on each other. Theater is cold and heat is needed from the fireplace, but when the weather warms and the need for heat slows down very closely they were Many hardworking people at the lower levels are the low level investors are similar to people who are throwing logs into a fireplace in the hopes of achieving Advancements in technology, evolutions in the complexity in which money and liquid capital are bought, sold, and exchanged on the international market, and the ever increasing rules and regulations that govern he national and international financial markets are all factors that are frightening and alarming. In 2003 Rabbi Benjamin Belch wrote about greed in his book, Taking Stock; a Spiritual Guide to Rising Above Lifeââ¬â¢s Financial Ups and Downs the following; ââ¬Å"Greed will always leave you dissatisfied because youââ¬â¢ll never be able to get everything you desire. Greed never allows you to think you have enough; it always destroys you by making you strive ever harder for more. â⬠I believe it is this overwhelming desire of greed that leads many people to undertake illicit and moral conduct which eventually lead to immoral and depraved behaviors. You read "Contexts for Contemporary Business Paper" in category "Papers" During Mandibleââ¬â¢s time, performing vice and illicit behaviors were limited by the constraints of technology, limited access to financial markets, and by rudimentary forms of transportation. Banking and economic systems were definitely much more restricted than they are in todayââ¬â¢s global economy. Insatiability and greed which lead to vice are the same today as they have been throughout human history; however the method and means used to actually implement this greed and vice has changed immensely since Mandibleââ¬â¢s time. Technology has advanced at an unheralded pace in Just the last one hundred years alone. With the development of the world- wide internet, advanced satellites and global positioning systems; financial transactions and business relations are able to be performed on a more wide-spread scale, much faster than ever before. It is by increasing the ease and speed with which global financial transactions occur that societal problems can arise. Modern- day financial managers and bankers can buy and sell currency and trade stocks and bonds quickly, using only the touch key of a computer. This rapid advancement in genealogy coupled with interconnected global financial and economic markets makes all the businessmen and bankers from the different countries throughout the world much more interdependent on each other than in Mandibleââ¬â¢s time. Madeleine, who was born in 1670 and died in 1733, probably never envisioned how easy it would be to be corrupt and perform vice on such a grand scale. Vice involving financial matters is now able to be completed much easier and faster than in the past and, since it is done on a much more wide-spread scale, it has the potential to more negatively affect all members of society. Subsequently our current global economy and financial markets are much more inter-connected and since vice is able to now be completed on a much larger scale than ever before, the chances of economic and fiscal collapse are also much greater than in Mandibleââ¬â¢s time. In ââ¬Å"The Grumbling Hive; Or Knaves Turned Honestâ⬠Madeleine writes, Thus every part was full of vice, Yet the whole mass a paradise; Flattered in peace and feared in wars, They were the esteem of foreigners, And lavish of their wealth and lives, The balance of all other hives. Such were the blessings of that state; Their crimes conspired to cake them great: And virtue, who from politics Had learned a thousand cunning tricks, Was, by their happy influence, Made friends with vice; and ever since, The worst of all the multitude Did something for the common good. Even though Madeleine writes ââ¬Å"every part was full of viceâ⬠, the society was a ââ¬Å"paradiseâ⬠that was ââ¬Å"esteemedâ⬠by their foreign neighbors and they were admired for the lavish and wealthy lives they led. He writes that the tricks to harnessing this vice were learned from politics and clearly shows that, even though every level of society was filled with ice, that there are good consequences that came from this vice. This is in stark contrast to the current political situation in the United States. Publicsââ¬â¢ attitudes of 6. 3% to 3. 9%). It produced blessings on the state and promoted more lavish lives for every member of society. Through the producing of public benefits that , ultimately leading to good. It is through this idea that vices are beneficial that has . Once the bees become He promotes the idea, that vice essentially is the lubrication that aids the society to operate more smoothly and help produce public benefits, ultimately leading to good. More specifically, although the actual vice is not good, the benefit to society is that by employing vice, good is ultimately produced. Reports that in society that ââ¬Å"viceâ⬠is universal to a society and that every person in a social order has their own vices. Madeleine suggests that these vices, which represent each personââ¬â¢s immorality and moral failings, ultimately aid the society by are found in each person of society writes Madeleine. He writes the following; ââ¬Å"As sharper, parasites, pimps, players, Pickpockets, coiners, quacks, soothsayers, And all those that in enmity With downright irking, cunningly Convert to their own use the labor Of their good-natured heedless neighbor. These were called knaves, but bar the name, The grave industrious were the same:â⬠Essentially Madeleine is suggesting that there is no difference between the desires and actions of the lowest members of society and those ââ¬Å"of their good-natured heedless neighborâ⬠by writing ââ¬Å"The grave industrious were the sameâ⬠. Every level of society is afflicted by vice, sin, and depravity and Madeleine expands on this idea by his writing shown in the following lines, ââ¬Å"All reads and places knew some cheat; No calling was without deceit. In other words, the attorneys, physicians, soldiers, and those in the ministry were the same as the ââ¬Å"pickpockets, coiners, quacks, and soothsayersâ⬠and ââ¬Å"No calling was without deceitâ⬠writes Madeleine. He promotes the idea, that vice essentially is the lubrication that aids the society to operate more smoothly and help produce public benefits, ultimately leading to good. More specifically, although the actua l vice is not good, the benefit to society is that by employing vice, good is ultimately produced. He mutinous by writing; Thus every part was full of vice, Yet the whole mass a paradise; Flattered in peace and feared in wars, They were the esteem of foreigners, And lavish of their wealth and lives, The balance of all other hives. Such were the blessings of that state; Their crimes conspired to make them great: And virtue, who from politics Had learned a thousand cunning tricks, Was, by their happy influence, Made friends with vice; and ever since, The worst of all the multitude Did something for the common good. Even though Madeleine writes ââ¬Å"every part was full of viceâ⬠, the society was a ââ¬Å"paradiseâ⬠that was ââ¬Å"esteemedâ⬠by their foreign neighbors and they were admired for the lavish and wealthy lives they led. He writes that the tricks to harnessing this vice were learned from politics and clearly shows that, even though every level of society was filled with vice, that there are good consequences that came from this vice. It produced blessings on the state and promoted more lavish lives for every member of society. Madeleine, B. (1705). The Grumbling Hive; or Knaves Turned Honest. It is also interesting to me when Madeleine wrote, ââ¬Å"So Vice is beneficial found, [425] When itââ¬â¢s by Justice [illegal. ], and bound; His meaning that vice has to be pruned and placed under the control of Justice to be beneficial made me wonder whether or not Mandibleââ¬â¢s ideas would still apply in todayââ¬â¢s more technologically advanced and interconnected global society. I began to think that the more technologically advanced a society becomes and also the more global and intertwined different economies become, that this increased technology and growing global capacity allow vice and greed to be committed on a much more grand scale. Specifically, it could be argued that when modern day embers of political parties, bankers, stock brokers, and heads of state are involved in wide spread vice or greed, that this will ultimately be detrimental and harm society as a whole because modern day global greed is too broad and advanced to be reined in by Justice. A recent example of this occurred with the 2008 United States supreme mortgage crisis and the subsequent recession that this interruption in the flow of credit caused to businesses and customers on a worldwide scale. These events coupled with the real estate bubble and preceding crashing of the real estate arrest in 2006 were caused largely in part due to greed, vice, and corruption of bankers, politicians, stock brokers, etc. On a grand and global scale. Trillions of dollars were lost in deflated home prices and in retirement accounts by almost all members of society worldwide and very few, if any member or members of any of these political parties or banking institutions have ever been Jailed or brought to public trial. Certainly, it could be argued in this instance that global society as a whole did not benefit from the vice and greed of a much smaller number of bankers and politicians. I think it can also be correctly argued that the majority of people throughout the world are presently, in many ways, worse off due to increased debt levels, higher unemployment rates, and generally more stagnant economies, due in part to the excessive greed and vice of this smaller minority. I wonder what Mandibleââ¬â¢s thoughts would be regarding trying to prune this ââ¬Å"vineâ⬠once it has grown to be large and magnificent on a much more global scale than he probably ever envisioned? Sources; o Rabbi Benjamin Belch, American academic and writer. Taking Stock: A Spiritual Guide to Rising Above Lifeââ¬â¢s Financial Ups and Downs (2003). How to cite Contexts for Contemporary Business Paper, Papers
Sunday, December 8, 2019
Implementation of Distributed Firewall in Hotel Industry A Case Study
Question: Describe about the implementation of distributed firewall for the handling of customers information was conducted on Abbey Apartments, Brisbane, Australia? Answer: Abstract The study on the implementation of distributed firewall for the handling of customers information was conducted on Abbey Apartments, Brisbane, Australia. In order to answer the research questions, the researcher has collected data both from primary and secondary sources. The quantitative data have been gathered from 30 employees of Abbey Apartments and the qualitative data have been gathered from 3 managers from the same organisation. The findings of the research reveal that distributed firewall is not very widely used in this organisation for the purpose of handling of customers data. It is mainly used in order to collect and verify the technical information of the firm. In addition, distributed firewall is used for the passing of the information among the employees of the organisation. 1.0 Introduction: The purpose of this thesis is to concentrate on the implementation of distributed firewallin managing customers information effectively. In order to conduct the study on a specific organisation, the researcher focuses on the hotel industry in Australia, thereby stressing on Hotel Abbey. Abbey Apartments stands out as quite a popular hotel in Brisbane in Australia, thereby offering a wide adequate amount of services to its customers, such as proper accommodation facilities, spa and sauna, outdoor pools, proper parking areas and many more (Abbeyapartments.etourism.com.au, 2015). It is to be noted that in the era of globalisation and introduction of open markets; organisations do get the opportunity of bagging in wide range of customers. However, it becomes necessary to maintain the details the customers appropriately not to maintain free flow of communication with them but even to maintain customer relationship management (Chris Adalikwu, 2012, p- 54). Hence, with the advancement in technology, organisations have come up with latest upgraded equipments to handle the customer information. Distributed firewall stands out as one of the newly developed and effective technique in managing the customers information as well as stay in constant contact with them. The problem statement of the thesis is that, even though Abbey Apartments uses distributed firewall strategies for customer details handlings, there are certain issues related to it. It is found that the hotel uses adequate internet techniques in order to handle customer database via its computers and the secured software. Problems related to cross connections or inadequate flows of conversation over the phone are detected (Red'ko Bui, p- 2004, p- 478). It is also found that the customer care department does face problems in communicating with the customers while verifying their identity proof or addresses over the mobile phones. They are unable to interact properly by sending SMS to the customers in order to make the verifications of customers details (Rasila, 2010, p- 91). Thus, the research question of this thesis is: What is the implementation of distributed firewall in hotel industry to evaluate direct impact while managing customers information in reference to Abbey Apartments in Brisbane in Australia. The researcher decides to present the problem statement, background of the research and organisation, and the research question in the beginning, following to which there is an extensive study of the existing theories and concepts in the literature review portion. Moving on, the research methodology is presented to conduct the study by using appropriate research methods, with the help of which ultimately data is collected. An analysis of data is done thereby detecting the loopholes based on which conclusions are made. 2.0 Literature Review: 2.1 The concept of CRM- As mentioned by Ahmed (2010, p- 16), CRM or Customer relationship Management refers to the system of managing the interactions of an organisation with the current and the future customers. In this era of advanced technology, for managing the relationship between the organisation and the customers, usage of technology is of utmost importance. Goldsmith (2010, p- 26) opines that in order to manage the interactions of the customers in an effective way, an organisation should be aware of the effective means of managing, recording and evaluating customer interactions. Effective CRM systems facilitate organisations to compile data on consumers across different channels. Thus, various communication channels such as mobile phone, social media, organisational website, email, live chat can be utilised for better interactions with the customers. Chris Adalikwu (2012, p- 97) comments that effective systems of CRM enable employees to access various customers information such as purchase history, purchasing preferences, personal data and concerns. Hospitality and tourism organisation in Australia is highly competitive due to the existence of several powerful players. Therefore, in order to gain competitive advantage, organisations should take CRM into consideration. If organisations are not able to record and evaluate customers information in an effective way, the scope of offering poor services arises. Therefore, in order to minimise the scope, various data on customers should be recorded and handled in an effective way. Research carried out by Rasila (2010, p- 91), reveals that distributed firewall is getting popular in CRM. Though the personal data of the customers are recorded in various channels, mobile phone is the most popular tool that is preferred for recording of customers personal data (Ranjan, 2010, p- 408). The findings of the research revealed that mobile phone is preferred, as it can be easily accessed anytime and anywhere. The latest smart phones are widely used for this purpose, as it helps not only to record the phone numbers of the customers but also personal email ids, social media communication links and many more thing (Ahmed, 2010, p- 21). 2.2 Relational Database Theory- As defined by Red'ko Bui (2004, p- 476), A database is an organised, machine-readable collection of symbols, to be interpreted as a true account of some enterprise. A database is machine-updatable too and so must be a collection of variables. A database is typically available to a community of users, with possibly varying requirements. On the other hand, a relational database refers to a kind of database the symbols of which are arranged into a set of relations. Kent (2011, p- 121) opines that the core concept of relational database theory is nothing but relation. In order to organise data into a collection of relations, there is a need of effective DBMS (database Management System). DBMS is nothing but a piece of software, which facilitates the users to manage database and access the database when needed. As put forward by Red'ko Bui (2004, p- 477), a DBMS generally works as a server in order to facilitate several simultaneous users. As commented by Lin (2011, p- 475), in hospitality and tourism industry, organisations must use effective DBMS for handling the information of the customers. In this context, the recording of the information is not the ultimate thing. The accessibility issues also must be taken into consideration. As a database can be accessed simultaneously by various users, organisations must restrict the access of any unwanted user to the database. As personal information of the customers such as contact numbers, email ids, addresses are recorded in the database, accessibility of unwanted users may hamper the privacy of the users, which may eventually lead to legal complications. 2.3 Role of Internet and Mobile in Handling of Customers Information- In todays highly advanced technological environment, mobile phone and internet has become synonymous due to the wide usage of smart phones. Study conducted by Lu, Chen Wang (2010, p- 193), reveals that in hotel industry, most of the employees in superior designations are likely to use smart phones. The wide usage of smart phones has facilitated the users to access the internet anytime and from anywhere. Various customers information such as complaints lodged by the customers can be accessed and handled with the help of internet. Jiang (2008, p- 232) opines that as recently, the use of the internet has increased to a great extent throughout the world, instead of making offline complaints via mobile phone, customers post their review on social media sites and on the official websites of organisations. Thus, the complaint lodged by a customer can be visible to various other customers. However, in case of a serious problem, when customers want immediate solutions, they prefer distribute d firewall. Therefore, the implementation of distributed firewall in this context cannot be denied. 3.0 Research Methodology: This particular part of the thesis outlines the usage of suitable research methods in order to make sure that the research question is suitable answered and that the research problems are resolved. 3.1 Type of Investigation- In order to find out the effectiveness of distributed firewall as applied by Abbey Apartments in managing customer information, the researcher follows the positivism philosophy along with deductive approach while carrying out the study. Moreover, the researcher applies descriptive research design finding it to be appropriate. The researcher investigates on over the topic, thereby using mixed research methods, i.e. primary research and secondary research, based on descriptive design. Both the research methods are used in order to obtain in-depth as well as extensive amount of knowledge from the theoretical underpinnings as well as the empirical studies done. Even quantitative and qualitative techniques of data collection are applied. It is to be noted that the researcher follows the suitable steps of research onion so that the work can proceed in a coherent manner. Figure 1: Research Onion (Source: Saunders et al. 2009, p. 52) 3.2 Research Design- Exploratory, explanatory and descriptive are found to be the three major kinds of research designs used in different research works as per their convenience. It is to be noted that, descriptive design seems to be appropriate for this study because it helps in evaluating the effectiveness of distributed firewall in customer information handling in context to different paradigms. As Sachdeva (2009, p- 47) points out, while exploratory design is applicable only in those studies where the research question is not decided from the beginning and it is found to develop as the research progresses; on the contrary explanatory design focuses on merely building up connections between the two variables that the topic consists. Nonetheless, descriptive design contributes in investigating and understanding the research problems from different perspectives and paradigms. Moreover, the research question and the flow of the research are already decided (Saunders Lewis Thornhill, 2009, p -447). 3.3 Study Type- It is to be noted that out of the two primary study types, i.e. Deductive Approach and Inductive Approach, the researcher chooses deductive type to be appropriate. As Harrison Reilly (2011, p- 25) opine, deductive type focuses on maintaining the testing theory approach, thereby exploring through the theories, deciding on the hypothesis, collecting adequate data and determining the authentication of the theories in relevance to the topic. Nonetheless, inductive type emphasizes on theory building approach where the data is collected at the beginning, create hypothesis, refer to theoretical underpinnings, find the gaps and build a new theory (Truscott et al. 2010, p- 326). 3.4 Hypothesis- H0: Distributed firewall is effective in handling customer information H1: Distributed firewall is not effective in managing customer information 3.5 Variables- It is to be noted that the researcher focuses on the usage of fixed and non-fixed variables. The theories referred to in this thesis are fixed variables whereas the organisation (i.e. Hotel Apartments) and the respondents are the non-fixed variables. 3.6 Data Collection Methods- The researcher uses mixed data collection procedures in this study with a motive to obtain augmented and extensive data so that the findings can help in detecting the problems clearly that occur within the organisation and attempt resolve them. Method of Quantitative Data Collection: Quantitative data collection method proves to be beneficial in researches since it helps in obtaining first hand information. Moreover, it is a cost effective and time saving method for obtaining data from huge population (Toloie-Eshlaghy et al. 2011, p- 151). Hence, the researcher uses quantitative method, thereby applying Questionnaire Survey technique, where close ended questions are made. Online distribution of the survey questionnaire is done on a sample size of 30 employees of Abbey Apartments, who are chosen by probability and random sampling method. The researcher then analyses the data by making conversions of the data into percentages and representing them to tables and graphs and charts. Method of Qualitative Data Collection: Qualitative data gathering method is undoubtedly helpful in obtaining augmented knowledge based on the real life experiences and perceptions of the respondents (Lu, Chen Wang, 2010, p- 193). Thus, the researcher applies qualitative method by arranging telephonic interviews and asking open-ended questions to a sample size of 3 managers of Abbey Apartments, who are chosen by non-probability, convenient sampling technique. Eventually a thorough study of the prepared transcripts is done to assess the data. 4.0 Findings: 4.1 Quantitative Findings- Q 1) Do you use distributed firewall for receiving customer feedbacks and complaints? Options No of respondents Total respondents Response % Yes 30 30 100% No 0 30 0% Table 1: Use of distributed firewall for receiving customers information Figure 2: Use of distributed firewall for receiving customers information Findings- All the respondents (100%) have replied that distributed firewall is used in Abbey for the receiving of the information of the customers. Q 2) Have any customer ever complained about the leakage/misuse of his/her personal information in this organisation? Options No of respondents Total respondents Response % Yes 8 30 27% No 22 30 73% Table 2: Occurrence of customers complaints regarding leakage/misuse of customers personal data Figure 3: Occurrence of customers complaints regarding leakage/misuse of customers personal data Findings- Most of the respondents (73%) informed the researcher that none of the customers have ever complained regarding the misuse or leakage of their personal information in Abbey. The rest of the participants (27%) opposed the view by opining that the issue of customer compliant regarding the misuse or leakage of personal information happened in the organisation. Q 3) Do all the employees have an open access to the database that holds the personal information of the customers? Options No of respondents Total respondents Response % Yes 9 30 30% No 21 30 70% Table 3: Employees access to the database of the customer information Figure 4: Employees access to the database of the customer information Findings- Maximum number of the respondents (70%) informed the researcher that the all the employees have an open access to the database that is consists of the personal information of the customers. On the other hand, 30% of the respondents disagreed to this view by saying that all the employees can access the database of customers information. Q 4) what are the other channels, apart from distributed firewall, for receiving the information of the customers? Options No of respondents Total respondents Response % Social media channels 4 30 13% Email 12 30 40% Official website of Abbey 9 30 30% All of these 5 30 17% None of these 0 30 0% Table 4: Use of other channels apart from distributed firewall for the receiving of customers data Figure 6: Use of other channels apart from distributed firewall for the receiving of customers data Findings- Most of the participants of the quantitative research (40%) opined that email is used apart from distributed firewall in order to receive information from the customers. According to a significant number of the respondents (30%), official website of the organisation is prioritised for receiving customers information. 17% of the respondents have selected all of the options for this purpose. Social media channel is selected by 13% of the respondents. None of the respondents have selected the option none of this. Q 5) Do the employees, responsible for interactions with the customers use Smart phones? Options No of respondents Total respondents Response % Yes, all the employees 7 30 23% No, no employee 0 30 0% Some employees 19 30 63% Most of the employees 4 30 13% Table 5: Use of smart phones among the employees Figure 7: Use of smart phones among the employees Findings- The substantial part of the respondents (63%) opined that some of the employees, who are responsible for interacting with the customers, use smart phones. In accordance with 23% of the participants, all the employees use smart phones. The option, most of the employees was selected by 13% of the respondents. 4.2 Qualitative Findings- Q 1) How do you ensure effective CRM in Abbey with the help of customers data handling? Combined answer from 3 managers- As informed by the managers, they understand the value of CRM in retaining the customers. They admitted that customers data handing has a great role in CRM. For ensuring effective data handling of the customers, data are received from reliable sources. In case of the personal data of the customers, it is only the customers from which, the required data are sourced. Limited number of employees, who are responsible for customers data handling, can only access the personal data of the customers. Q 2) Do you think that distributed firewall is important for handling of customers information? Combined answer from 3 managers- All the managers have agreed that distributed firewall plays a significant role in the handling of customers information. In case of receiving information from the customers, distributed firewall is widely used in Abbey. Sometimes, the customers are communicated via phone calls for the verification of data. They informed the researcher that distributed firewall is also used for the communication among the employees for the purpose of data handling. Q 3) How do you ensure safe handling of customers personal information? Combined answer from 3 managers- The managers commented that for the safe handling of data, the access to the database that contains the personal information of the customers has been restricted. Only employees with the responsibility of customer database management are permitted to access the database. Information such as complaints of the customers, purchase history, preferences and this kind of other data can be viewed by most of the employees of Abbey. 5.0 Analysis: 5.1 Analysis of the Quantitative Findings- As per the quantitative study, distributed firewall is widely used in Abbey, especially for the purpose of receiving information from the customers. As not all the employees, who are responsible for handling the information of the customers, use smart phones, the data, received by them via mobile cannot be stored in the mobile phones. In other words, information can easily be received with the help of distributed firewall, but in order to store or record those data temporarily, mobile is hardly used in the organisation. However, for passing the received information among the employees, mobile phone is used. It can be assumed that the personal data of the customers are effectively handled to some extent. As some off the employees opined that complaints regarding the misuse/leakage of information were experienced in Abbey, the researchers assumption is that in past, the database management system in Abbey was of poor quality and in the recent years, this limitation was resolved. For this reason, some of the employees are not aware of the complaint issues. As there was a difference among the respondents regarding the access to the database, it can be assumed that not all of the employees are aware of the accessibility issues. They might believe that the customers; database can be accessed by all of the employees. After analysing the quantitative findings, the researcher has found out that though distributed firewall plays a great role in handling of customers data, in Abbey customers data handling with the help of distributed firewall is only restricted to the receiving of customers data. 5.2 Analysis of the Qualitative Findings- The response of the managers shows that they are well aware of the implementation of distributed firewall in handling of the customers information. By the response of the managers, the researcher has analysed that in Abbey, distributed firewall is mainly used for the receiving and verification of the customers data. Communication among the employees for the passing of information is also done via distributed firewall, but data are not stored in mobile phones. Though the managers have informed the researcher that not all the employees can access the database that contains the personal information of the customers, the quantitative findings have disclosed access of all the employees to the database. Therefore, the researcher can assume that though not all the employees are permitted to access the customers database, the system for monitoring the access of the employees is not very strong in Abbey. This may lead to misuse of data or leakage of customers personal information. 5.3 Shortcoming of the Study- Budget and time constraints are the two major issues that affect the quality of the research. Due to the limitation of word count, the researcher has not been able to conduct a full-fledged research on the research topic. If the researcher was allowed to conduct a full-fledged research project, more literary sources could have reviewed and more questions could have been asked to both the respondents of the quantitative and qualitative findings. 6.0 Conclusions and Recommendations: From the entire research, it can be concluded that in Abbey, the employees with the help of distributed firewall gather customers data. As the personal data of the customers are sourced only from the customers, distributed firewall is preferred for receiving of data over the other ways of data collection. Within the organisation, the data are passed from one employee to the other with the help of distributed firewall. As the entire employee, responsible for customers data handling do not use Smartphone, data cannot be stored in their mobile phones. Based on the findings of the quantitative and qualitative research, the researcher recommends the increase of distributed firewall for the handling of data of the customers. Use of Smartphone is sure to increase the scope of distributed firewall for the effective handling of customers information. Reference List Books: Sachdeva, J. K. (2009). Business research methodology. Mumbai [India]: Himalaya Pub. House. Saunders, M. N., Lewis, P. Thornhill, A. (2009) Research methods for business students, Page 52, 5th ed. Harlow: Prentice Hall Journals: Ahmed, A. (2010). Customer Relationship Management through Communication Strategy. International Journal Of Customer Relationship Marketing Management, 1(3), 15-26. doi:10.4018/jcrmm.2010070102 Chris Adalikwu,. (2012). Customer relationship management customer satisfaction. AFRICAN JOURNAL OF BUSINESS MANAGEMENT, 6(22). doi:10.5897/ajbm12.634 Goldsmith, R. (2010). The Goals of Customer Relationship Management. International Journal Of Customer Relationship Marketing Management, 1(1), 16-27. doi:10.4018/jcrmm.2010090402 Ranjan, J. (2010). Integrating analytical Customer Relationship Management with Customer Relationship Management in organisations. IJIL, 8(4), 408. doi:10.1504/ijil.2010.035750 Rasila, H. (2010). Customer relationship quality in llordÃâà tenant relationship. Property Management, 28(2), 80-92. doi:10.1108/02637471011037107 Kent, W. (1983). A simple guide to five normal forms in relational database theory. Commun. ACM, 26(2), 120-125. doi:10.1145/358024.358054 Lin, X. (2011). A Relational Database Complexity Computing Model. KEM, 474-476, 1464-1469. doi:10.4028/www.scientific.net/kem.474-476.1464 Red'ko, V., Bui, D. (2004). Foundations of the theory of relational database models. Cybern Syst Anal, 32(4), 471-478. doi:10.1007/bf02366768 Jiang, P. (2008). Adopting mobile internet: a demographic usage perspective. International Journal Of Electronic Business, 6(3), 232. doi:10.1504/ijeb.2008.019106 Lu, Y., Chen, Z., Wang, B. (2010). Understing distributed firewall entertainment service usage: a comparison study. International Journal Of Internet Enterprise Management, 6(3), 193. doi:10.1504/ijiem.2010.032169 Harrison, R. L. Reilly, T. M. (2011) "Mixed methods designs in marketing research", Qualitative Market Research: an International Journal, 14(1), pp. 7 26 Toloie-Eshlaghy, A., Chitsaz, S., Karimian, L. Charkhchi, R. (2011) A Classification of Qualitative Research Methods, Research Journal of International Studies, 20(4), 106-152. Truscott, D. M., Smith, S., Thornton-Reid, F., Williams, B. Matthews, M. (2010) A cross-disciplinary examination of the prevalence of mixed methods in educational research: 1995-2005, International Journal of Social Research Methodology, 13(4), pp. 317-28 Websites: Abbeyapartments.etourism.com.au,. (2015).Abbey Apartments - Brisbane CBD, Brisbane Accommodation. Retrieved 5 February 2015, from https://abbeyapartments.etourism.com.au/
Subscribe to:
Comments (Atom)