Saturday, January 25, 2020

Impact of IT on Bank Performance

Impact of IT on Bank Performance IMPACT OF INTERNET TECHNOLOGY ON BANKS PERFORMANCE AND CUSTOMERS SATISFACTION ABSTRACT Internet technology is very popular and has many benefits for the users; however it does has some elements of security risks to the bank and its customers at large. In this research work, I intend to look at impact of internet technology on Bank, its employees and the customers. More importantly, efforts were also made to research into various risks associated with this technology such as hacking, spam-email, phishing, identity theft or frauds and many others. After critical look at this technology and its associated risks especially the identity theft, two sets of solutions were recommended. The first set solutions addressed physical access control while the second aspect deal with authentication through the process of fingerprint and voice recognition. 1.0 INTRODUCTION This project is trying to evaluate the impact of Internet technology on banks performance and customers satisfaction. Banking industry is the bedrock of economy, the state of Banks will dictate the state of economy. If it stables, so will the economy. The present global economy recession attests to this statement. Technology innovation like Internet is groundbreaking in banking system. Transactions worth of billions of dollars take place in seconds in the electronic circuit throughout the globe (Castells, 2001). The banking and financial industry is transforming itself in unpredictable ways (Crane and Bodies 1996). Prior to the rocket of technology in banking sector, the function of the branch was very unlike the function of present branch. Earlier before the 1970s, the structure of the branch and functions were similar to one and other. Product offerings were equally the same and branches were only avenue for customers to make bank transactions. Majority of these banks were only rel ying on one or two branches but with many staff and cashiers. Customers were subjected to long distant travelling before they could carry out banking transactions. Face to face traditional banking was only means to process bank loan, make lodgements and withdrawals and customers were subjected to long queue in the banking hall. But the increase in the level of banking technology made the banks started a process of metamorphose that proceed till the end of the 20th century. As part of process, many channels of distributions were introduced. Among these channels are Automated Teller Machine (ATM), Internet banking, Telephone banking, call-centre, electronic funds transfer, wireless banking, and voice messaging systems, videoconferencing and many others. Rapid growth and development in internet technology over the last four decades have great impact on organisations. The impact was highly noticeable in area of services, products offering and business processes. Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks have opportunities to perform better than their rivals. Banks through the innovation of internet technology were able to provide better and cheaper services than traditional system of branch banking. Apart from these, level of banking transactions were equally increased, Convenience and twenty four hours banking services were also witnessed in banking system. More importantly, the level of communication within and outside the banking environment were equally improved, access to the right information and high quality of services were not comp romised. The banking environment became more friendly and flexible. Information that can only available through the means of technology became an important aspect of the banking. Many people argued that it was advance in technology of 1990s that made it possible to develop those channel of distributions and system that allowed the banks to render an unprecedented high quality services. In final analysis, this research work assess an aspect of banking that is lacking in Traditional Bank an online banking and its impact on customer satisfaction and banks performance. 1.1 AIM AND OBJECTIVES The research on Internet technology in banking and acceptance of modern banking by customers have been viewed in different perspectives but few aspects of this topic are left with little exploratory. There is little research on the effects of Internet technology on banks profitability and customers satisfaction. Many researchers did not fully agree that Internet technology has immensely affected the profitability level of the banks. The rationale behind this is to offer a better understanding on how internet banking is evolving. This study intends to achieve the following objectives: 1. Research the problem of identity theft and card authorisation 2. Evaluate the problem concerning lost revenue 3. Research the other work done in this area. 4. Proffer solution to the problem of identity theft and card authorisation. 5. Implementing solutions and the cost benefits 1.2 CONTEXT OF THE STUDY Banks have use internet technology to cut operations costs, increase qualities, efficiencies and improve value-added services to the customers. Also, investment in technology gives competitive advantages to some Banks leading to some banks having opportunities to perform better than their rivals. This research work is focusing on two important key elements which are: 1) Impact of internet technology on Bank and its customers and; 2) Associated risks with internet technology with more emphasis on identity theft 1.3 EXPECTED CONTRIBUTION TO KNOWLEDGE The expected contributions to knowledge of this research work are to identify various theft and card authorisation, evaluate the problem concerning lost revenue and proffer solution to the problems. 2.0 LITERATURE REVIEW It is my intention to survey literature review to reveal the level of knowledge and understanding of people about identity theft. A number of text books, articles and journals internet search are used for this purpose. Among these are: a) 50 ways to protect your identity and your credit card Steve weisman The book is well written very relevant to the study and well referenced. Various types of identity thefts were discussed. It also explains that the motive behind identity theft could be for financial gain, revenge or malicious intent. The book goes further to suggest some protection rules such as only the credit cards that needed should be carried in the wallet, the practice of online account statement should be stick to, personal information should not be given on phone to unknown persons, shredding documents that containing personal detail after use and so on. But these protection rules only addressed offline identity theft, the issue of online identity theft or frauds which common to credit cards were not addressed at all. b) Business Information system (Technology, Development Management) Paul, et al The book looks at the issues of identity theft, brand abuse and costs of identity theft. The three issues discussed are equally paramount important to this research. The book is good for academic and well referenced. According to the book, â€Å"the term brand abuse is used to cover a wide range of activities, ranging from sale of counterfeit goods, for example software applications, to exploiting a well known brand name for commercial gain. It was further stated that with regards to identity theft, CIFAS(www.cifas.org), a UK-base fraud prevention service, report that there were 80,000 cases of identity theft in the UK in 2006.The coated in the companys web site showed that identity fraud cost UK economy  £1.5b in 2005 and generates a revenue of  £10m each day for fraudsters. c) Identity theft literature review- Graeme, R.N Megan M.M It is a well written article and equally well referenced. In this article, the authors focused on two important issues, the first one is the cost of identity theft while the second one focuses on the issue of legislations. The two issues discussed are very relevant to this research. The authors look at various identity legislations passed to control the crimes of identity. (www.house.gov/apps/list/press/ca29schiff/062304idThef2.html). d) Enquiry in to the credit card fraud in E- payment- Jithendra, D. Laxman, G In this article the authors look at credit card Hacking and types of credit card frauds. This article is not well referenced and authors failed to proffer adequate solutions at end of the discussion. In my opinion, the article is much related to this research work but the sources of documents used to write the article cannot be easily traced because it is not properly referenced. However, it is very helpful reading in understanding the background of the topic. e) Identity theft and credit card fraud Sarah P. Miller Sarah Millers article examines the various tactics the fraudsters use to commit credit card fraud. Some of these tactics are; opening a new credit accounts, existed accounts hijacking, skimming tactic among the other. The article also looks at various ways of protections against credit card fraud and come up with some of security measures to guard against credit card fraud in our society. The article is appropriately written and very useful for this research. The source of the article is also quoted as http://EzinArticles.com/?expert=sarahp.miller . f) Improving response time of authorization process of credit card system- Humid, siti Hafizan Ab It is a journal of computer science published in February 1 2008. The journal discusses the issue of credit card authorization process. It also explains the pitfalls and benefits of credit card authorization. The journal is very briefs about the topic but all the salient points are well discussed. It gives a website as the only source but fail to give other reference. It is very pertinent to mention that the journal would have been a great assistant to the realisation of the objectives of this research work if it has been properly referenced but the beauty of this journal is that it serves as basis of understanding of the topic. g) 7 precautions that minimize the Risk of identity theft Jesse Whitehead In this article, Jesse looks at financial costs of identity theft and estimated it to be $50 billion. He further explains that researchers are yet to discover a precaution that is hundred percent guaranties against the risk of identity theft. In final analysis, Jesse recommends the following precautions to reduce the threat of identity theft in our society. One, he recommends that social security number should not be disclosed to anybody unless otherwise require by law. Secondly, it was also suggested that social security number should not be carried all about. Shredding all important documents immediate after use is strongly recommended and more emphasis should be placed on e- statements from our banks and credit issuers. It was also suggested that a strong password and pin should be created and printing of Driver licence number on our checks should be highly discouraged. The author gives this website as the source of article http://EzinArticle.com/?expert=jessewhitehead but no other reference available. It is very relevant to this project as important aspect of the topic is being discussed. 2.1 DEFINITION OF INTERNET According to Paul et al, â€Å"internet refers to the physical network that links computers across the globe†. From this definition, the interconnectivity of many computer devices all over the globe is done through the world-wide computer network known as internet. These computer devices store and transmit information like World Wide Web and electronic mail (e-mail) messages. There are other devices like mobile computer, pagers, web TVs that are connected to the internet. All these devices are revered to as host or end system. Both electronic mail and world -wide web are network application programs that run on host or end system. Like other internet units, end system run protocols that regulate the sending and receiving of information in the internet domain. Internet has two major protocols popularly called TCP (Transmission control protocol) and IP (internet protocol). Communication links like coaxial cable, copper wire, fibber optics or radio spectrum link end systems together. Data transmission rate of all these links are not the same. This transmission rate is known as bandwidth and is measure in bit or second. End systems are indirectly join to one and other vial routers and a router receives information from the incoming communication links and send it to its outgoing communication links. The IP defines the format of receiving and sending information between the routers and end systems. The path on which information is transmitted is called route or path. The internet then utilises packet switching which gives room for multiple communicating end systems to share a path of a path simultaneously. Connection of network to the internet needs to follow specific name and address and it must be run on the IP protocol. The arrangement of interconnection of the internet is from bottom to top. End systems is connected to local internet service providers by means of access network and this access network is refers to as local area network (LAW) or phone based access network. The local internet service providers are then connected to regional internet service providers. The regional internet providers will also connected to national and international internet service providers. This type of internet is called public internet. There are other private networks that cannot be accessed by public. It can only be accessed within the organisations and refer to as intranet. It also makes use of the same internet technology that public internet is using. Another way of defining Internet is to look at its infrastructural that offers services to distributed application. Internet provides opportunity to distribute application on its end systems to share data with each other. The application could be inform of e-mail, file transfer, remote login, and world-wide web and so on. Web can be ran over network apart from the internet but this does not suggest that web is a separate network, instead it is one of the distribute applications that make use of services offer by the internet. Both connection-oriented services and connectionless services are two services offer by internet to the distributed application. 2.2 GROWTH OF INTERNET Internet and computer networks began early 1960s. During this period, telephone was commonly employed as means of communication. This telephone network utilises circuit switching to transmit information from a sender to receiver and since then, internet continue to grow from strength to strength. There are a number of factors that contributing to this development. Financial analysts observe that costs, competition, demographic issues and customer service are the major considerations that make bankers to constantly review their internet bank strategies. It is the belief of these analysts that demand for internet banking products and services will continue to increase. But the major task facing banks now is how to ensure that the benefits of internet banking outweigh its costs and the risks. The strategies adopted by each bank to increase its market share and cost reduction vary from one bank to another. Internet is a platform through which customers access accounts and general informa tion. It gives customers information about various products and services offer by the bank. 2.3 RISKS OF INTERNET SERVICE There are a number of internet threats around business world today. The threat continue to increase as internet become more acceptable means of conducting online business transactions. As banks so heavily rely on internet to reduce costs, so also they become more prone to some risks. Few examples of these risks are as followings: a) Hacking Hacking involves attempting to gain unauthorised access to a computer system, usually across a network. Hackers only need limited programming knowledge to wreak large amount of havoc. The fact that billions of bits of information can be transmitted in bulk over the public telephone network has made it difficult to trace hackers, who can make repeated attempts to invade bank system. For instant, much damage could be done if people gain authorised access to banks network service. Hacker may gain access to banks internal network for two major reasons. It could be for monetary benefit which usually associated with identity theft where personal information as well as credit card details is obtained to perpetrate fraud. It could also come inform of malicious intent ranging from deletion of file, deliberate introduction of computer viruses into a system or forwarding vital organisations information to rival. Counter measure like dial-back security can be used to prevent this problem. It ope rates by requiring the customer wanting access to the network to dial into it identity themselves first. The system then dials the customer back on their authorised number before allowing them access. Also, system can have firewall to prevent unauthorised access into bank system. Firewall software is use to monitor and control all incoming and outgoing traffic to deny intruders gaining access to the information system. b) Malicious Code Malicious code like worms, Trojan horse program and viruses are written to penetrate a system in order to have access to confidential information or disrupting the bank network. Through the help of the code, Fraudster can enter the network of a bank without its knowledge and valuable information can be stolen in the process. This stolen information can be used to commit identity theft or fraud. This code attacks are very delicate in that they can replicate and spread themselves without human intervention. c) Intrusion This is a process through which an intruder has access to bank network. Usually, the intruders are employees of the bank who have gained access to the authentication information of a bank customer. Intruder could also be an external person who has acquires some skills to get the authentication information of the bank customer. When internal or external intruders have unauthorised access to bank network, vital information about customers can be obtained and later use to perpetrate frauds or commit crimes. To guard against this ugly incident, bank must restrict its employees to some areas of its network. d) Denial of services Banks nowadays rely on internet for effective communication within and outside organisations. In the process of communication, the bank is subjected to the risk of denial of services. Communication channels of the bank can be blocked, web page may be changed or the system employ to process online business transaction may be attacked. A denial of service attack is associated with an attempt by attacker to prevent legitimate users of a service from using that service. The situation forces the bank to close down services until everything return to normal. This kind of criminal activity was hardly experience until 1999 when the crime became cankerworms in our business environments. The effect of this criminal activity is very great most especially when bank so heavily depend on the internet for online business transactions. Huge amount of money could be lost to the fraudster through the attack. Attack on Amazon and Yahoo servers in the year 2000 was a good example. The servers of Yahoo w as engulfed with series of attacks and â€Å"The attack was estimated as costing  £ 300,000 in the lost advertising revenue alone† (Financial Time of November 17, 2000). Another popular of denial of service attack was witnessed in 2004. During this time, a group of fraudsters from Russian embarked on a number of denials of service attack on UK bookmaker. The attackers demanded for certain amount of money before they could stop the attack, but the organisation in question (bookmaker) was not ready to give them any money at that time leading to a great losses of about forty million pound. The effect was very terrible on financial position of the company that very year. e) Brand Abuse It involves sale of counterfeit goods like software application to exploit a well recognised brand name for commercial benefit. Fraudster can imbedded the name of reputable organisation into a bogus web page just to portrait the page as high rank one. People that search for this reputable organisation can be routed to the false web page where the counterfeit goods are sold. A lot of people have intention of buying genuine products and services but end up in buying counterfeit one through the brand abuse. The effect of this is that people pay high price for less quality goods and services. The brand abuse practice costs most UK organisations huge amount of money and cost continue to increase year in year out. People also are no longer sure that the goods and services buy over web pages are actually genuine one. Many people have been victims of counterfeit unknowingly but thinking that they have bought the original goods and services they intend to buy even at exorbitant price. f) Credit Card Fraud The use of credit card online has become a global phenomenal. This card is being use all over the world to make payment for goods or services purchase on internet, retail shops or restaurants. The proliferation use of credit card online makes the users expose to various forms of risks. The risk could be in form of using peoples personal information to open new accounts, hijacking existing accounts. g) Opening of new account After important details like name, date of birth, social security number is obtained, the fraudster can pretend to be another person in order to create new lines of credits. The victims name can be used to secure credit cards and it may not be known to victim that someone has taken credit card on his or her name. Some people in many cases get to know when they receive calls from debt collectors or when they apply for loan and it is not granted due to bad credit rating. Many people have been forced to pay debt they didnt actually own through this process. h) Hijacking account Hijacking existing account is another method use to commit credit card fraud. Existing account can be hijacked by altering important details of the victims such as personal identification number, passwords, billing or mailing address. The purpose of this is to take perfect control of someones account illegally. The original owner of the account may find it hard to regain the control of the account. Even if they regain the control, fraudsters might have wreck serious havoc on financial reputation of the original owner of the account. It takes victims some time and money before they could clear their names from this mess. i) Skimming It is very common in the restaurants, stores or automated Teller machine. Skimming is done through the use of palm-sized card -reading devices. This device is capable of swiping credit card information. It is very delicate in that it may not be noticed until the victims witness unsolicited charges on the statement account of their credit cards. Many of these devices can be planted into Automated Teller machine slots or strategic locations that are not visible to the people. The aim and objective of doing this is to illegally capture important details of targeted victims. The details collected through this method can be used to perpetrate frauds on customers accounts or use to commit crime in the name of the victims. j) Phishing Phishing is another method that thieves use to lure people to supply their personal information through false e-mail and web sites. Customers may receive bogus electronic mail through a web site telling them to update their details. The web site may look like that of normal bank they use to visit. But when they access this web site, their account numbers and passwords will be demanded for. Both password and account number are collected through this method and later use to siphon money from customers accounts or credit cards. Barclays Bank and some highly reputable organisations were a victim of the crime in 2003.This method of stealing is hardly to detect because the e-mail and web site are made so similar to that of original banks. The only preventive measure is for the banks to educate their customers to ignore such e-mail whenever they receive it. Although this will not totally wipe out the crime because many online customers will still respond to such e-mail but additional measur e like authentication which involves adding an extra field to a record with the contents of this field derived from the remainder of the record by applying an algorithm that has previously been agreed between the bank and customers will go a long way in countering this crime. Multiple passwords can also be employed to counter the problem. Furthermore, there are many more of internet threats around but this research work will focus majorly on identity theft and card authorisation. 2.4 IDENTITY THEFT According to available information, identity theft and identity fraud are not new crimes. Both have been in existent for a while and continue to be among the fastest growing crimes in the UK. These two crimes can be perpetrated without a thief even burgling into your home or have physical contact with your computer system. The problem is likely to get even worse because of economy recession that grips all the nations. Information gathered from banks reveal that insurance fraud is increase by 17% and identity fraud seems to be following the same pattern. If bank customer identity is compromised he or she may find it hard to have good access to a loan, credit card or mortgage until everything is resolved. We are all victims of these crimes. We eventually pay highest prices in shops, highest interest rate on mortgages and higher premium on our insurance policies for no other reasons than this problem of fraud. Government and corporate individual organisations have been making frantic efforts to reduce these crimes. But in spite of all these efforts, the rate of identity theft and identity fraud are yet to reduce and number of victims of these crimes are also increasing on alarming rate. According to (UK payments, the UK trade association for payments, 2008) card fraud losses total  £609.9m, online banking fraud losses  £52.5m and cheque fraud losses  £41.9m. Furthermore, of identity fraud in 2007 was quoted to be 65,043 according to CIFAS, the UKs fraud prevention service. The 2003 survey of Federal Trade Commission (FTC) indicated that about 3.25 million Americans had lodged complaints that their personal detail was illegitimately used to get credit cards, obtain loans, rent apartment, and enjoy medical facility and some time use to commit crimes. Also, more than 5 million Americans were victims of credit card frauds where personal detail was used to obtain lines of credit and twent y five million plus have been victim of identity theft. WHAT ARE IDENTITY THEFT AND IDENTITY FRAUD THEN? Identity Theft is situation where by an individuals personal information or confidential detail is steal by another person without their knowledge. But Identity fraud is committed when thieves use this information to secure credit, goods or other services in the name of targeted victim without his or her knowledge. Another definition describe identity theft as â€Å"anyone who knowingly transfers or uses, without lawful authority, any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual with the intent to commit or aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law† (1998 identity Theft Act, U.S public Law 105-318). 2.5 REASON FOR IDENTITY THEFT FRAUD Reports so far on various form of identity thefts indicated that fraudsters commit identity theft for a number of reasons. But the most common one are: a) Concealment Many people commit identity theft simply because they want to cover their past criminal records. Some people in the past have committed one crime or the other and want to cover them to avoid arrest. A very good example of this scenario was that of September eleven terrorist. â€Å"All 19 of the September 11th terrorist were involved in identity theft in some way† (Willox and Regan 2002) many people were wrongly arrested because their identities have been stolen. Also, a number of people commit identity theft because they want to hide their bad financial records which denied them access to essential banks products or services such as bank loans, mortgage, account opening or credit card. In some situations, identity theft can be committed to avoid payment of existing debts. These type of people may want to enjoy normal life again and the only way they can achieve this is to masquerade themselves under the identity of another person. The effects of these criminal activities are t hat warrant arrest and prosecution may be issued in the name of victim customer. b) Financial benefit Investigation conducted from various banks indicated that many fraud cases reported in the recent past revealed that people committing identity theft for financial gain. In some cases, thieves steal personal information of innocent persons to open a line of credit cards accounts. Along the line many goods and services can be purchased in the name of targeted victims. In the same manner, details of another person can be used to secure loan from bank and account abandon later after fraudsters might have make a lot of money from the accounts of victims. A friend narrated his experience where fraudster obtained his personal details to secure a loan of about  £10.000 from a commercial bank without his knowledge. The fraud discovered some months later when he received a letter from the bank that sum of  £10.000 plus accrued interest is due for payment in his account. The fraudsters have used his identity to have illegitimate financial gain. The case took him some legal battles and time before he could exonerate himself from this mess. c) Revenge Many banks have witnessed identity theft through the activities of their employees. Some employees of bank may collude with fraudsters to steal details of customers as retaliation to the termination of their appointments or the bad treatments they received from their employers. In this process, valuable banks information may be sold to competitors leading the bank to various litigations and financial lost. Also the reputation of the bank may be seriously damaged. The effect of this is decline in profits and low patronage of the customers. 2.6 TYPE OF IDENTITY THEFT Many Bank customers have been victims of identity theft by one way or the other and type of identity will largely depend on the definition giving to it. But the most prominent one is credit card. Information available reveals that credit card fraud on internet has been seriously increase due to the opportunity offered by new improved internet technology. Apart from credit card fraud, there are other types of identity theft such as extortion, phishing, financial scam, avoiding arrest, organized identity theft and many others. a) Extortion Fraudsters have many ways of extorting money from banks and customers but the two common one are cyber squatting and the threat of leaking customers information. Cyber- squatting, this method of extortion related to registering a bogus internet domain to

Friday, January 17, 2020

Countries trade products Essay

In the world market, countries trade products they wouldn’t be able to produce on their own. Countries like Cuba specializes in cigar production, Japan in electronics, and Russia in rocket technology. However, even if a country has an absolute advantage in producing all goods, they still will benefit from trade. Many economic factors are involved with trade. Among the major factors are opportunity costs, comparative advantage, specialization and finally trade. Opportunity cost is defined as the value of the best alternative forgone when an item or activity is chosen. In other words, opportunity cost is the cost of choice. For example: the opportunity cost of producing a car is the time that could’ve been used to produce something else, say paper. For a country (country A) that has an absolute advantage ( the ability to produce something using fewer resources than other producers use ) in producing both cars and paper, the opportunity cost of producing say, 1 car is the production of 3 tons of paper. Thus, what product a country chooses to specialize on must be chosen so as to produce as much as possible while suffering as little opportunity cost as possible. Which goods the country should specialize on should be monitored by the law of comparative advantage, which states that: the country with the lowest opportunity cost of producing a particular good should specialize in producing that good. By specializing on a certain good, a country lowers the opportunity cost of that good by forgoing production of other goods. For example: Say country A has an absolute advantage in producing cars as well as paper, and the opportunity cost of producing 1 car is 3 tons of paper. Country B however, produces 1 car at an opportunity cost of 6 tons of paper. If these two countries specialized according to comparative advantage, country A produces 2 cars whilst country B produces 12 tons of paper. Therefore, country B should concentrate on solely producing paper and hand over the job of car production entirely to country A. To gain the maximum benefits of specialization among countries, countries should trade their products with products from other countries. In the example above, the total output of cars and paper has increased as a result  of specialization. But exactly how much should both countries trade to gain the highest possible benefits? By trading 1 car for 4 tons of paper, country A will gain 1 ton of paper while country B gains 2 tons of paper. Hence, both countries gain more paper by trade without increasing their resources. Country A Country B Cars Paper (tons) Cars Paper (tons) Without trade: Production and consumption 1 3 1 6 With Trade: Production 2 0 0 12 Trade Gives 1 Gets 4 Gets 1 Gives 4 Consumption 1 4 1 8 Gains from Trade: Increase in Consumption None +1 ton None +2 tons In conclusion, all the economic factors mentioned combined with trade allows benefits even to a country that has the ability to produce goods while using fewer resources than other countries.

Thursday, January 9, 2020

Differences Between Qualitative And Quantitative Research...

Qualitative research, still called in-depth study or study of motivation. The studies on expectations, motivations, images and other value judgments of the consumers while giving results which we cannot quantify. According to Choy this type approach is highly self-aware acknowledgment of social self, or of a research’s position in society (Choy, 2014:99). A quantitative research is a market study which the results can be quantified and the representativeness can be exactly measured. According to Choy this type of approach focus on a specific topic selected by the researcher. It is also refer to a â€Å"standardized questionnaires that administer to individuals or household which are identified through various forms of sampling usually sampling, and next is the data collection step† (Choy, 2014:99). This essay will critically examine the differences between qualitative and quantitative approaches to research. Indeed it will compare the difference between the two research and how they are used, the ontological orientation of those research’s and the different preoccupation. According to Griffin qualitative and quantitative research is just a simplification and cannot be helpful from the terminology (Griffin 2001:6). Also â€Å"qualitative research is usually concerned with the meaning, and in particular how people make sense of the world and how participants experience events form their perspective. (Griffin 2001:6). â€Å"To draw a theory, quantitative researchers have to look at theShow MoreRelatedDifference Between Qualitative And Quantitative Research968 Words   |  4 PagesOne of the major differences between the qualitative and quantitative research in regards to the sample was the size of the sample. The qualitative sample had nine participants and the qualitative had a return rate of 1695 students and 1556 teachers. Another difference between the two studies is the quantitative used a random sampling method, whereas the qualitative study used criterion sampling with the criteria being that they were teachers in K-12 who taught/used mobile learning devices. TheRead MoreDifference Between Quantitative And Qualitative Research752 Words   |  4 PagesFor many who are new to research, there is little difference between quantitative and qualitative research. Key words to define quantitative research include empirical and statistics, while words to denote qualitative include subjective and naturalistic. However, for many research scholars, the differences between the models are vast. Much of the debate centers around validity that surrounds the heterogeneous methods used to determine outcomes in qualitative research (Madill Gough, 2008). OpposingRead MoreDifferences Between Quantitative Research And Qualitative Research794 Words   |  4 Pages1. Explain the differences between quantitative research and qualitative research. Qualitative research collects non-numerical data to describe events or phenomena. On the other hand, quantitative research uses numeric data with statistical methods to investigate phenomena. (Melnyk Fineout-Overholt, 2015, p. 609). Qualitative studies address human responses to particular situations or events with an emphasis on interviews and observations. The results are reported from the participant’s pointRead MoreDifferences Between Quantitative And Qualitative Research1827 Words   |  8 Pagesunderstanding of the people who live within these societies. There are many differences between both Quantitative and Qualitative research. First starting with what quantitative research is data that uses statistical methods such as surveys dealing with large numbers of participants within a study is collected by doing research, most of these studies collect data in numerical form so that they can be counted(cite). While qualitative research is when sociologist seek to understa nd human behavior by learningRead MoreSimilarities And Differences Between Qualitative And Quantitative Research Essay1865 Words   |  8 Pagesthe Similarities and Differences in Qualitative and Quantitative Research Quantitative research is defined as research that gathers numeric data through controlled procedures and analyses to answer predetermined questions or test hypotheses (Ary et al, 2010). In contrast, Ary et al defines qualitative research as a generic term for a variety of research approaches that generally gather non-numeric data to study phenomena, without predetermined hypotheses. A few differences are noted in the definitionsRead MoreDifference between Quantitative and Qualitative Research Methods in Psychology606 Words   |  2 PagesThe quantitative problem statement: its question and proposed method I would like to see whether growth can be predicted for a certain company with introduction of a certain product. Quota sampling is ideal for this situation since it specifies the quota of particular people that need to be included to represent the population. In this case, we would want a balanced sample of all types of users as well as their amount of usage. (Breakwell, 2007). A survey would be conducted, either in the storeRead MoreEssay on Qualitative and Quantitative Research889 Words   |  4 Pages Qualitative and Quantitative study designs both can be beneficial in research design. They both provide valuable options for researchers in the field. These techniques can either be used separately in a research study or they can be combined to achieve maximum information. This paper will define the terms qualitative and quantitative; describe the similarities and differences between each; discuss how qualitative and/or quantitative research designs or techniques could be used in the evaluationRead MoreQualitative And Quantitative Research Methods936 Words   |  4 PagesQualitative and quantitative research methods are two alternative applications for research methods. Both are very different in how data is collected, what data is collected, and how data is measured. Both of these research methods are utilized amongst the major areas of psychol ogy and the social sciences. This paper will provide a brief description of qualitative and quantitative methods, provide the differences between the two approaches along with the terminology used for both; I will alsoRead MoreWeek 1 RSCH 8300860 Words   |  4 PagesInitial post Comparing Qualitative and Quantitative Approaches Researchers often times are faced with the decision of choosing a methodology of research; either Quantitative or Qualitative that they think best fits their study and objectives. This choice is guarded by the topic of study, the advantages and disadvantages, and the strengths and weaknesses of using either one or the other type of the methodologies. Researchers are sometimes using Quantitative and Qualitative research methodologies interchangeablyRead MoreThe Definition Of Science And Research Methods1189 Words   |  5 PagesWhat is science? A brief elaboration of the definition of science and research methods INTRODUCTION Science is a complex activity, which may be defined in a number of ways. To unite both the process and the product of science, one way to define science is as a process of constructing predictive conceptual models (Gilbert, 1991). Gilbert (1991) states, when referring to Kuhn (1970, Lunetta Hofstein (1981), Miller (1978) and Stevens Collins (1980) that in essence, ‘’the definition of science

Wednesday, January 1, 2020

The Old Testament Time Period - 1557 Words

Throughout the Old Testament there are many examples of strong and capable leaders. One of these leaders is Esther. Esther was a very cleaver leader who used the cultural expectations as the queen and Machiavellian leadership principles to increase her power in society. During the Old Testament time period, both within Israel and the surrounding cultures, the queen held little to no power. Her purpose was to serve the king and ensure there was a successor to the throne. When Esther became to queen to King Ahasuerus, this was what was expected of her. She was not supposed to be a leading in any capacity, unlike modern queens. The role of Esther as a leader did not come from her role in her culture, but from her using Machiavellian principles to take power and become a leader. Ester first demonstrates Machiavellian principles when she failed to reveal her people to King Ahasuerus or to the other women taken as potential brides for the king, â€Å"The girl pleased him and won his favor, and he quickly provided her with her cosmetic treatments and her portion of food, and with seven chosen maids to the best place in the harem. Ester did not reveal her people or kindred, for Mordecai had charged her not to tell. † By failing to reveal her Jewish heritage Esther was leading the king to believe that she was someone who was not. In this situation, Esther is displaying her ability to use her situation and culture to her advantage. In this situation Esther is taking advantage of the factShow MoreRelatedTaking a Look at the Old Testament868 Words   |  4 PagesIntroduction The Old Testament is a very complicated book. The meaning of the Old Testament is embedded in the history of the writers,people who read , people who passed it on, people who rewrote it and people who read it again. This statement implies that Old Testament was not written in one place or at one time. Some of the parts that make Old testament a rich literature is its complexity that resulted from its composition and redaction, which is believed to have took place a long time ago. One cannotRead MoreHistory of the Bible Essay1727 Words   |  7 Pagesthe Bible The process by which the English Bible, as it is known to the English culture today, was compiled is an extraordinary thing to see. The Bible consists of two parts: the Old Testament and the New Testament. The process by which both Testaments were written and then canonized into one book transpired over a period of many years. Once the canonization of the Bible officially came to an end, it was translated into English. Since then, many versions of the modern Bible have been made. Since theRead MoreThe Foundation of Orthodoxy and the Canon1447 Words   |  6 PagesThe Foundation of Orthodoxy and the Canon: There are several areas in the early church on essential issues such as the deity of Christ, nature, and humanity. This period of dispute was also characterized with the emergence of groups like Gnostics, which brought a completely new set of presumed beliefs to the faith that came alongside the faith and in total compromised tenets of the faith. These new beliefs were supposedly based on the truth of Christ’s teachings as presented to his followers.Read MoreJewish And Christian Sacred Text1001 Words   |  5 PagesJewish and Christian Sacred Text For years people have had a hard time distinguishing the difference between Christians and Jews. Even when reading about these two religions, they are very similar. There are two main differences that stand out the most amongst these religions. One of them is that Christians believe that Jesus is the Messiah while Jews believe He was a prophet. The other difference is their opinions on sacred text. Jewish people and Christians both have sacred text; however, ChristiansRead MoreAnalysis of Christopher J. H. Wright ´s Writings on The Old and New Testament1162 Words   |  5 Pagesdoctorate in â€Å"Old Testament economic ethics. Wright is now the international director of the Langham Partnership International (known in the United States as John Stott Ministries), providing literature, scholarships and preaching training for pastors in Majority World churches and seminaries.† [1] Wright has written numerous books which; he displays in many of these books, an aspiration to acce ntuate the significance of the Old Testament. Wright’s central message in his text is that the Old TestamentRead MoreAnalysis Of The Poem The Storm On The Galilee 1656 Words   |  7 Pageshis oil paintings of biblical scenes from the Old Testament. Christ in the storm on the Galilee is an oil painting done by Rembrandt, which depicts one of the most important moments in the old testament. Not only is it mentioned before the crucifixion of Christ, but also after his resurrection. In order to understand how Christ was seen and the significant moments of the old testament, the Sea of Galilee needs to be investigated. In the Old Testament, it was called the Sea of Chinnereth that JesusRead More A Comparison of the Divine in Gilgamesh, the Old Testament of the Bible, and Metamorphoses1132 Words   |  5 PagesDivine in Gilgamesh, The Old Testament, and Metamorphoses       Along with different languages, customs and traditions, ancient Hebrews, Middle-easterners and Romans had very different beliefs about the divine. For example, Hebrews are monotheistic, while Middle-easterners and Greco-Romans of early time periods believe in many gods. Writings from the ancient time period sketch these differences, as well as the many similarities between religious beliefs. The Old Testament is an excellent referenceRead MoreThe Heart of the Old Testament1105 Words   |  5 Pages| The Heart of the Old Testament | | BIB220 | | The Heart of the Old Testament | | BIB220 | The Heart of the Old Testament written by Ronald Youngblood is an informative and insightful book. Youngblood identifies the nine themes that form the foundation of the Old Testament. These themes show that the Old Testament is not any different from the New Testament and should not be consider irrelevant when compared to the New Testament. The nine themes include monotheismRead MoreThe Foundation Of Orthodoxy And The Canon1188 Words   |  5 Pageshistory, but ultimately all who contributed to the New Testament understood that Jesus was the main influence. Our Christian Orthodox founder is Jesus and His word. After Jesus’s death and resurrection he promised the Apostles that the Holy Spirit would guide them in their missionary tasks. As promised, the beginnings of Jesus deity began to a new growth and height of worshipers. The Age of the Apostles began the shaping of our New Testament Cannon in our affirmation of the deity of Jesus and howRead MoreImpact Of Jesus Has On Human Culture And Past1207 Words   |  5 Pagesseparated the human history into two halves when He died on the cross and rose again in three days. And great scholars originally called the first half of the period B.C, Before Christ, and named the second half of the period A.D, After Death. Due to the fact that many get offended by His name significantly, hence men changed the names of the periods from Before Christ to Before Common Era, and After Death to Common Era. To further push Jesus away, the culture views it as inappropriate and unprofessional