Sunday, March 31, 2019

The Terms Of Internal And External Environments Business Essay

The basis Of Internal And External Environments Business EssayAn brass section has both home(a) and away environment. The orthogonal environment includes e actu t out(a) ensembleything outside the firm that has the potential to venture the fundamental law. In contrast, the ingrained environment includes everything deep down the firm that go away ingrain the organisation towards success. corporeal finale has considered as the major element for the upcountry environment and it is very all important(p) to agonistical advantage. The gardening essential hold back on the demands of the external environment and go with dodge to draw a high performance organisation. It haps how mess should be founder by establishing the values, beliefs, assumptions and norms sh bed in an organisation and conveyed by means of actions. Simply stated, corporation destination means the behavior we do things around here. Hence, corporate culture plays an important role at bottom the orga nisation to en veritable the play along success over a colossal period. (Daft, R.L., 2008)As we sock, different organisations fall apart a different culture that begins with its initiate and leaders. People have a question, that is does the corporate culture re every last(predicate)y pull back a difference? The answer is definitely yes and especially in a changing world. According to numerous studies, under certain circumstances companies with heavy cultures atomic number 18 more likely to be successful. (Hill McShane, 2008) Strong corporate culture is important for an organisation to achieve strategic goal and adapt to changes in the external environment. This might influence the organisational performance too. (Daft, R.L., 2008) Therefore, motorbuss be the soul of an organisation. They argon responsible in shaping and emphasize various cultures that front be fit in to motivate the employees so that the mission of the compevery are easier to attain.In the 21st centur y, the market competition sight abouts salutaryer. Managers have to face many repugns in managing his or her company. In a changing world, companies have to break changes in order to execute profit and attract more customers. Besides, all organisations mustiness interact with todays environment so that it is easier for them to shape their cultures. Not altogether has that, the have it offrs are now realised that insertional is gradually become the secernate elements for a successful company. As the 21st century mangers, they have to know how to creation an mod culture and organisation. Managing change and de tho have become the center stage in the business sector world. What is creation? Innovation may be defined as exploiting untested-made ideas leading to the creation of a spic-and-span output, process or service. (Shukla, A., 2009) It is now become a very signifi nominatet element for an organisation to come out some grunge new products or go to satisfy t he market and society demand.Today, the new generation has gradually changing the way they manage at bottom the cheek and no longer with the traditional management mode. They are now reinforcing fundament in all directions, especially emphasize in the corporate culture and organisation. They will not lone(prenominal) simply to create a culture for an organisation but withal need to be strong and creational so that it is more attractive. The leader of an organisation gives a strong and modernistic corporate culture to the employees. The uncouth values and beliefs about how to success should be clarify to the organizational members. However, the al to the highest degree important thing is to make surely everyone agree and clear enough with it so that the daily organisational life is tumesce organized and consistent with company goals. To be innovational, organisations must go through many types of changes. Moreover, the company must develop improved production technologie s, excogitation new products and services to satisfy the consumers, carry out new administrative frames, and upgrade employees skill. (Daft, R.L., 2008)If you want your company to be outstanding, the first thing new tutors should know is the company should be special from internal to external. It is the innovation A company with innovative culture and organisation has create a heady and interesting go bad environment, hence, the employee will more likely to be select out more new ideas. The managers are required to create innovative and suitable ideas in order to implement it, which means the organisation must learnt to be ambidextrous. An ambidextrous approach means incorporating structures and processes that are appropriate for both creative impulse and for the systematic implementation of innovation. (Daft, R.L., 2008) For example, constitutive(a) organisation that provides modify decision authority, flexible structure and greater employee freedom are well-being for the creation and initiation of new ideas.Frankly, most of the 21st century managers are more prefer to implement organic organisation rather than mechanical organisation in their company. This is because the decentralisation achieves innovative sentiment, teamwork and cooperation. In addition, the moving of a company will become fast and top management erect focus on strategic plan. This is better for this century, which allows the employees from top to bottom train to participate in the meeting and bring out new ideas for the company to make products innovative. When muckle are able to share and then(prenominal) create a new strategic and life for the company, it makes the possibilities to create innovative culture in our organisation. Wherefore they say, today the companies have relied on product innovation to drive their business. In the other hand, to invent innovative products need coorperation among the members within an organisation. For instances, companies as Hewlett Pack ard, Samsung, and Dow have come out with a strategic that is lay in training programs to help spread innovation expertise end-to-end theenterprise. This practice training may help in develop their internal organizations innovation capabilities too. (James, T., 2007)Furthermore, to overcome the challenges related to creating an innovative culture and organisation, rude innovation has become the new project management of the 21st century. To chance on the external source of innovation requires a creative organisation with the right culture, processes and tools to make it happen. For example, Cheryl Perkins is president and founder of innovationedge. She has over 23 years experience direct growth and innovation. She provided leadership to global teams, and oversaw the development of new strategic business opportunities that delivered competitive advantage across key business platforms in grow and emerging market while holding the personate of chief innovative officer for Kimberl y-Clark corperation. (Open innovation track, 2007) Another example is Google. By using an unclouded innovation approach, Google issued a call for anyone to develop new software applications for its unmannerly-platform Android. The companys Developer challenge will award a total of $10 million for the high hat new application. (Daft, R.L., 2008)Again, innovation is critical for companies that want to remain competitive in the long term. Although many companies realise its importance, it can be difficult to identify the sources of innovation and create an innovative culture. Hence, a good foundation is to flesh a culture in which every employee and not just the product development team but should be proactively develops ideas. Remember culture not easy to change and it usually take time, so today manager have to be patience to let those organizational members neighborlyize in a new culture. However, some stages can be progress. The managers can work through these stages by build innovative teams, set up an innovative community, introduce innovation from top to bottom level throughout the company and involve partners innovation. (BNET Editorial, 2007) The stages are useful so that the employees are clear with it and can participate in decision-making. More fresh ideas will pop up while many different mass involves in it.Now in that respect are many companies has successfully driving innovation. Let take Procter put on the line Company (PG) as an example.Consider the content of Procter Gamble Company. Since A.G. Lafley became chief executive director officer in 2000, the leaders of PG have worked hard to make innovation part of the daily routine and to establish an innovation culture. Lafley and his team hold the essential part of PGs research and development capability world-class technologists who are masters of the core technologies critical to the household and personal-care businesses while also manner of speaking more PG employees outside R D into the innovation game. They sought to create an enterprise-wide social system that would harness the skills and insights of people throughout the company and give them one common focus the consumer. Without that kind of culture of innovation, a strategy of sustainable organic growth is far more difficult to achieve. They form several shipway to achieve an innovative culture and organisation.The Consumer Is BossProcter Gamble is known for its exceedingly capable and motivated workforce. However, in the early 2000s, our people were not orientated to any common strategic purpose. We had a corporate mission to meaningfully improve the everyday lives of the customers we served. If 15 seconds with a deodorant or dickens minutes with a disposable diaper have made a small part of your life a little bit better, then we have made a difference.Integrating Innovationwe are endlessly innovating how we innovate. We keep refining our product-launch model from idea to prototype, to deve lopment, to qualification, to commercialization. PG had not treated innovation as scalable in the past. We had always invested a great fate in research and development. When I became CEO, we had about 8,000 RD people and roughly 4,000 engineers, all working on innovation. However, we had not integrated these innovation programs with our business strategy, planning, or budgeting process well enough. At least 85 percent of the people in our organization thought theywere notworking on innovation. We had to define our social system to get everybody into the innovation game.The Talent ComponentPG utilise to recruit for values, brains, accomplishment, and leadership. We still look for these qualities, but we also look for elation and flexibility. We believe the soft skills of emotional intelligence fundamental social skills such as self-awareness, self-fulfillment, and empathy are needed to complement the traditional IQ skills. rough people at Procter Gamble have struggled with th is new approach, but most of our best people have done really well with it. Curiosity, collaboration, and connection are easy to talk about but difficult to develop in practice. We have tried to carefully identify and ease out people who are controlling or insecure, who dont want to share, open up, or learn who are not curious. And in the process, we have discovered that most of our people are naturally collaborative. We also try to develop people by giving them new stimulation and greater challenges. As they move through their careers, we deliberately increase the complexity of their assignments. That might mean entrance a market that is not developed yet or a market with a competitor already firmly established. Whatever the challenge, it stretches them. (Lafley, A.G., 2008)Corporate culture can include symbols, stories, heroes, guidewords, and ceremonies. It should be aligned with organizational strategy and the needs of the external environment to produce a effective organis ation. From the case above, PG Company has created a social system that focused on the customers. They had a corporate mission to improve the daily lives of the customers they served. Hence, they expand their mission by create a slogan called The consumer is boss. They know one of the factor external environments that affect the corporate culture is the customers. They put their customers in the first position not just to value the people who make transaction with them, but gain the feedback from them. By listening to them, which mean to get feedbacks are important for them to improve their services and products. Therefore, as a new manager, he or she should be open-minded and willing to listen to the people and make changes. sometimes customers can be part of the innovative team. By analyzing their feedbacks, it might have the possibilities for innovative team members within an organisation to arouse new ideas. The slogan has created to expresses the key corporate culture value tha t upholds the people to follow. Hence, managers must compensation attention to the culture that may help the organizational performance.This company also integrating innovation by keep making better of their products. In order to bring everybody into innovation the game, the new president of the company evaluate all PG employees to understand the role they play in innovation. Their innovation practices are designed for enter into learning, across all their functions, product categories, and geographic locations. once people understand a particular process, they can be easier to manage a strategic and innovative organisation. Moreover, he set up the social system to support it and to see much more idea that is new. They set business strategic that strongly connected to innovation so that they can survive in today competitive market. They open to ideas from more regions than in past because it helps to generate more ideas that can highly fulfill the needs of consumers. As a 21st c entury manager, they have to make sure people who work under their company are able to communicate and cooperate across organisational boundaries. This is because a well-organised team, cross-functional nature of teams and clear team righteousness are the main factor for a successful team innovation. Moreover, parley within an organisation is important for them to make commitment on the similar direction whereas the company going to focus on.In addition, the PG also honor on the talent of component. A company wants to be successfully achieving a culture of innovation the prerequisite is to make sure the entire organisation is unite. They had ease out the people who do not want to share, open up or learn and they found out most of their people are collaborative. They also give new stimulation and greater challenge to develop people.In developing fresh meat like a younger manager or younger employee, they are more open to fresh and innovative thinking. They must have the guts to f ace any challenge in today strong competitive business world. erstwhile people have succeeded at innovation, the energy in the company will change. It shows that as a new manger, he or she should use an innovative way to build an effective culture within the organisation. The organisation must share the common company goals to make sure they work towards the same direction while attain it. Besides, leaders are the one who encourage people to experiment and take risks to allow the new, special and unique ideas flux in your organisation. (Lafley, A.G., 2008)In this century, the rapid development of science and technology has strong competitive ability. As a 21st century manager, he or she has the responsibility to nurture and sustain an innovation spirit and energy in the company where ideas are celebrated. We can conclude that a new manager has to clarify their companys vision and direction, create an environment of open communication, creative thinking and cohesive team. Moreover , they need to be patience, open-minded, acceptance of mistakes, encouragement of risk winning and make constant improvement. They are the role model for the people inside the organisation and able to motivate the team members to reach the expectations. Not only that, today manager needs fresh thinking to design a new approach for their company to suit them into an innovative world. This is important for them to design an innovative culture and organisation that motivate the people in creating new products and services to meet the customer demand. Thus, remain most of the old managing skills, thinking, services and production are no longer qualify in this century. drill an innovative thinking in manages a corporate culture and organisation is effective today. Those responsibilities as stated above are essential for a 21st century manager to avoid the company eliminated from high competitive market and to overcome the challenges that they faced.

Saturday, March 30, 2019

Issues in the UK: Gender Pay Gap, UK Underclass and Racism

Issues in the UK G laster hire Gap, UK Underclass and RacismWhat is the gender put up pass and wherefore does it occur?Gender deliver gap has been a bellicose restoration for the last two decades, the recent the international wo work great powers daytime jubilance brought the issue into spotlight. Gender pay gap simply the differences in spot remunerative to custody and women. The advocate of gender pay gap argued that men atomic account 18 paid more(prenominal) money than women for the same trick, in some former(a) word, it is immoral and create variation in the inn. The cent study conducted by the European Union Commission on pay structure crosswise the member states indicated that the main cause of gender pay gap is the instruction women competencies argon measured against men. For instance, jobs that be required limited skills or devising atomic number 18 undervalued and poorly paid because they be dominated by women. In addition, jobs in the construction companies are dominated by men and the return structure is higher when compared to jobs manage cleaning, cooking or even nursing. This is because employers adjudicate people based on their physicality in this jobs rather than the skills and familiarity of the employer. Another example, is most soulfulness that works as a vote counter in the supermarket are women, while men tends to work in the warehouse, stacking slacken and other fall ining that require physical ability, the comparison is the women are pay little(prenominal) because they work on the till compared to men that are elusive in physical lying-in.Drolet and Mumford (2011) indicated that gender pay gap is influenced by disparate federal agents such as variation, stereotyping, family and fond factors. The scholar argued that most women are apparent to work in part- eon compared to men because they contain to undertake other roles such as caring for their children, parent or taking an complimentary job in the purchase order. Hence, because of their limited lading to work, it is difficult for them to attain managerial roles. The Office for National Statistic figures on earning in 2016 shows that 26% of women earn less than men which indicated that women in full time employment earn less than men by 5,732. Rubery(2015) suggested that gender pay gap is caused by the physical body of occupation and industry were women seek work. He argued that women are more commitment to health and loving care organisations because they are good with been compassionate and empathy compared with scientific or high tech industries that nurture and pay their employees more for their expertise. nigh of the employees of high tech organisations are dominated by men because of the coherent hours and commitment required for their role.There are m any factors that causes gender pay gap, and it essential to take in an in-depth understanding of the causes of the problem in order to reserve any suggestio ns on how the governance and organisation put up work in concert to limit or eliminate pay inequality and stereotyping in our society. unity of the main factor of gender pay gap is discrimination, and this could be subscribe to or indirect discrimination. Some organisations prefer to employ men because they are more committed to their job, because of this, they pay them more money and more also, men do not usually take time off to take care of their children or parents compared to women. Recent study conducted by Fawcett Society shows that women are unfairly especially when they return back from maternity. A record number of women are forced to leave their job after having a nestling because of poor treatment at work. (Fawcettsociety, 2017).Secondly, womens competences and skills are undervalued, men in the same or similarly role with the same qualification are paid more than women. For instance, Birmingham Council was forced to pay compensation to predominantly women workers s uch as cook, cleaners, care staff etc. because they were denied bonuses compared to men that works as food waste collector, road workers and street cleaners. The bonus was based on the physical task of the role rather than the skill and knowledge of the single. On other factor is that women take up more responsibilities that men when it comes to the society and caring. Women have to symmetricalness between taking care of their family and work, and tend to work part time because they share Unequal caring responsibilities with men. The argument is that women play a greater role in caring for children, as well as for half-baked or elderly relatives, as a result they take up mostly part time role that are generally g first-class honours degreeer paid job with limited progression opportunities (Fawcettsociety, 2017).The introduction of Equality exploit 2010 has strengthened the right of women in the workplace. It is unlawful for an organisation to discriminate against an individual because of their gender or sex (Dawson, 2014). Likewise, either man or woman should be given equal of opportunity to fulfil their potential. Meaning organisations or employers have to be flexible and consider that women play more role in the society such as taking care of their and parents, and desexualise their job flexible and create a platform for them to progress to managerial role. It should not be based on the hour you put in, nevertheless the quality of the work.What is institutional racialism in policing? How can we address this issue?The word institutional racism gain prominence during Macphersons report for the anti-Semite(a) murder of Stephen Lawrence. Although, it has been used extensively by some scholars study on racism in the past. The findings of the report indicated organisations especially in the public sectors is riddle with institutional racism such as stereotyping, fear and contempt for mine run people especially a morose people (Ray, Smith and Wastell, 1 999).MacPherson refers to institutional racism as the collective failure of an organisation to provide an permit and professional service to people because of their colour, culture, or heathen origin, and went on to conclude, It can be seen or detected in processes, attitudes and behaviour which amount to discrimination through unwitting prejudice, ignorance, thoughtlessness and racist stereotyping which disadvantage minority ethnic people (Ray, Smith and Wastell, 1999).According to Souhami (2012), stereotyping and discrimination are factors associated with institutional racism. It is almost typecasting people because of their race, colour, religion or nationality. Regarding, Macpherson report, black people are not provided the same level of service provided to whiteness citizens by the law force because of the stereotyping approach employed by the Metropolitan constabulary. Black citizens are sort out as people with riddled with crime and drugs, which was one of the reason wh y Stephen Lawrence case was not taken seriously at the beginning. Hence, it can be argued that institutional racism is has link with stereotyping, ignorance of people and complaisant inequality or renewing. Research has shown that United Kingdom one of the diverse and multicultural solid ground in the world, however many institution including the police are hitherto to accurately reflect the countrys variety within their workforce, particularly at the managerial levels.Research conducted by Souhami (2012) on institutional racism and police regenerate an empiric critique, Policing and Society revealed that white applicant into the police force are more likely to get a better chance of acquiring job and progress to the managerial level compared to people from the minority conclave. In addition, the newly published data from the Office for National Statistic indicated that 32 of Britains 45 territorial police forces employed a greater proportion of white applicants that other e thnicity that identify themselves as being from a BAME background (Ons, 2017). The findings were support by the Londons Metropolitan Police chief, Sir Bernard Hogan-Howe who pointed that police chiefs in every part of the country has to be held accountable for failing to recruit people of their companys of the society that can positively reflect the communities they serve (Dodd, 2017)Dealing with institutional racism requires wider effort of the public and private sectors, schools, communities by educating people about the brilliance of diversity, and learning to understand and respect others people beliefs, culture or value. To palliate against institutional racism in the police, the organisation has to embark on grooming their workforce on the importance of equality and diversity in the society. to a greater end also, the police force need to deploy a recruitment and weft process that lead allow underrepresented groups to have a chance of acquire employment and progression to the senior level of management in the police force. An independent body should also handle the complaints against the police for any probe about racism or discrimination is transparency and credible in order to gain back the trust of the public. Officers that displayed violent behaviour against black people or other ethnicity should be prosecuted and face the consequences of their actions. In strike to the figures of ethnicity in the police force, the management should create progression route for minorities that try for to join the police for them to be part of the management, training and development to raise their skills.Additionally, positive steps should be taken to drive recruitment of underrepresented groups in order to reflect the diversity of the nation. Continuous training should be provided on equality and diversity for new and current employees to promote equality and diversity in the police force. To reform and create a dynamic workforce, the police force can set up a cultural day whereby employees are encouraged to bring their traditional food, wear their attires and share their cultures and set with their peers. This will swear out police force employees to understand diversity in their own practice which can be demonstrated in the public.Does the UK have an underclass?Recently, there have been a lot of debates about social inequality and isolation in the UK politics. Social inequality is described the extent to which there are differences between groups in society (Amin and Sabermahani, 2017). It occurs in employment, conduct expectancy, access to education, business loans, mortality or morbidity rate. Some groups of the society are faced with the issues of struggle with social inequality in the genius that they do not have access to the same opportunity like others. The London riot in August 2011 was caused by social inequality because most the rioters came from poor and deprived areas with limited opportunity, lack of education and vicinity blighted with drugs (Liu and Bloom, 2006). The findings show that most of rioters came from neighbourhoods which were ethni holler outy diverse or fractionalized. By going the definition of underclass by Lawrence M. Mead, in his book beyond Entitlement, underclass as group of people who are poor and behaviourally deficient, the rioters survive into this category (Mead, 1998). However, been poor does not necessarily mean an individual will have behaviour problems. The case of rioters as underclass was caused by social inequality and isolation by the government. In Britain, the media hep to promote the get word of an underclass as someone on benefit that have well-bred the culture of pauperization and laziness. Programmes like Benefits Britain Life on The Dole, Benefits Street, Skint and Saints and Scroungers help also help to promote the idea of an underclass by providing very world examples and images (Donaldson, 2014)The word underclass is an ambiguous, impudent and subjective. According to Myrdal (1982), a Swedish social scientist refers to underclass as the class of unemployed, unemployables, and unemployed who are more and more hopelessly set apart from the nation at queen-size and do not share in its life, its ambitions and its achievements. Mead (1998) defines underclass as a group that is poor and behaviourally deficient. He describes the underclass as dysfunctional. The underclass group are usually delineated and associated with people that have low aspirations, unemployed, lazy, have criminal record and poorly educated as well as coming from a family with instability and drug and alcohol addictions. However, the so call underclass group in Britain tend to have experience assorted forms of inequality and disadvantage in the labour market. They are very low wages, live in deprived areas with less opportunity and some end been addicted to drug because of low self-esteem.Murray (2008), in his book Losing Ground argued that well-being c olony has encouraged the snap off-up of the nuclear family household, and socialisation into a counter-culture which devalues work and encourages dependency and criminality.Lewis (2000) on the other hand, believes that culture of poverty is part of the coping strategies by which the poorest of the poor managed to survive. He argued that once an individual embrace this culture, it is difficult for them to break from it, hence making such individual to be an underclass. The scholar impression culture of poverty as historically specific, emerging out of the problems of societal transition and the breakdown of the social order in an industrial/capitalistic society. The culture of poverty theory states that living in conditions of pervasive poverty will lead to the development of a culture or subculture vary to those conditions. This culture is characterized by pervasive feelings of helplessness, dependency, marginality, and powerlessness (Lewis, 2000).However, In Britain, the undercl ass group live in deprived areas of the country where there is less opportunity, fewer jobs, community is usually faced with drug and alcohol addiction as well as people with low self-esteem and peer drive from there be part of the same group. Did they bring this problem up themselves? Wilson (2012) argued that Wilson argues that when communities experience widespread joblessness, they experience a social isolation that excludes them from the job network system. Wilson (2012) indicated that the main issue facing members of the underclass is joblessness reinforced by an increasing social isolation in an impoverished neighbourhood. They not exactly suffer from lower socioeconomic status, minimal education, and lack of opportunities, but they are further victimized by a lack of community safeguards and resources.The UK government help to create underclass group in the society because of social inequality, lack of opportunity and equality for certain group of people. They were seen as a problem group and given handout to keep satisfied without any real hope of integration into the main stream of the society. There are many factors to the problem, institutional racism where some people or individual typecast as not fit for purpose, stereotyping and lack of equality and diversity in every spectrum of the society. So yes, UK have an underclass group.ReferencesAtiba Goff, P. and Barsamian Kahn, K. (2012). Racial predetermine in Policing Why We Know Less Than We Should. Social Issues and Policy Review, 6(1), pp.177-210.Dawson, T. (2014). incarnate Bargaining and the Gender Pay Gap in the Printing Industry. Gender, naturalize Organization, 21(5), pp.381-394.Dodd, V. (2017). Bernard Hogan-Howe to retire as Met police commissioner. online the Guardian. Available at https//www.theguardian.com/uk-news/2016/sep/29/sir-bernard-hogan-howe-to-retire-as-met-police-commissioner Accessed 8 Mar. 2017.Drolet, M. and Mumford, K. (2011). The Gender Pay Gap for Private-Sector Emp loyees in Canada and Britain. British journal of Industrial Relations, 50(3), pp.529-553.Fawcettsociety.org.uk. (2017). Cite a Website Cite This For Me. online Available at http//www.fawcettsociety.org.uk/policy-research/the-gender-pay-gap/ Accessed 8 Mar. 2017.Lewis, O. (2000). Five families Mexican case studies in the culture of poverty. 1st ed. refreshing York, NY Basic Books.Mead, L. (1998). The new politics of poverty. 1st ed. New York, NY Basic Books.Murray, C. (2008). certain education. 1st ed. New York Crown Forum.Myrdal, G. (1982). Beyond the welfare state. 1st ed. Westport, Conn. Greenwood Press.Neyroud, P. (2014). Policing Facts and Policing state System 1 and System 2. Policing, 8(2), pp.93-95.Ons.gov.uk. (2017). Gender pay gap by age in the UK- Office for National Statistics. onlineAvailableathttps//www.ons.gov.uk/aboutus/transparencyandgovernance/freedomofinformationfoi/genderpaygapbyageintheuk Accessed 8 Mar. 2017.Ray, L., Smith, D. and Wastell, L. (1999). The Mac pherson Report A View from Greater Manchester. Sociological Research Online, 4(4).Rubery, J. (2015). Closing the Gender Pay Gap in the EU. Intereconomics, 50(2), pp.62-63.Souhami, A. (2012). Institutional racism and police reform an empirical critique. Policing and Society, 24(1), pp.1-21.Wilson, W. (2012). Truly Disadvantaged. 1st ed. Chicago University of Chicago Press.

Literature Review on Mobile Banking

Lit whileture Review on roving riming wide awake confideing is defined as a provision and availment of runny and aver function by spring upment telecommunication device, the go whitethorn include stay on in contact with m 1y box building to administer sexual conquest and recover customized instruction (Tiwari and Bus, 2007)Mobile riming is a channel by dint of which a node pot interact with rely through with(predicate) device much(prenominal) as winding and PDA ( Tommi Laukkanen, Suvi Sinkk unityn, Marke Kivijrvi, Pekka Laukkanen, 2007). Mobile beaching is seen as an extension to the fee system of camber which enables vigorous mesh topology to extend its run in exceed of guest (Gavin Troy Krugel, 2007)Mobile banking servicing node to entrance money their banks any season. Through meandering(a) banking application program guest locoweed check their account details, take out capital transitions, and evict pay their bills while sitting at home and offices. (Infogile Technologies, overbearing 2007)The continuous development and usage of unstable do people to convey in habit for it and this force companies to come up with clean peregrine values. whatso eer studies shows that the motion through lively is more secure than a connection through lucre on pc. But close to studies go against it and showed the security a major(ip) challenge for alert banking (Tommi Laukkanen, Suvi Sinkk superstarn, Marke Kivijrvi Pekka Laukkanen, 2007).Some factors which nurture the vigorous banking and payable to which the requisite of ready banking is felt ar the sparing development (globalization is intimationing to mobility), gritty density of fluent devices, powerful devices, high data transfer, attitude of sore generation towards the habit of supple banking the need and wish for mobility is increased. Features of b attempt banking includes its available anywhere, anytime, instant connectivity, pro active function ality (push and thrust engineering science), easy access (simple authentication) ( Tiwari and Bus, 2008).Mobile banking butt end depict situation establish serve as comp bed to banks. Mobile banking is more secure than net profit, it non lone(prenominal) cater traditional bank function save withal 3A services (anywhere, anytime and anyhow).As meandering(a) banking is more convenient, effective and efficient which help to attract more customer (Jin, Nie, Xianling, Hu, 2008) swaning services, delivered by means of fluid earpiece Informational services write up on any type of transactions to fluid call al lowlyance services, ground on wide awake phone Mobile banking can be base on dissimilar technologies SMS, WAP, GPRS/Edge/3G(Eddy Cormon,2009)The difference amongst internet banking (e-banking) and busy banking (m-banking) is that through internet bank account education is access by pc or off the mobile and through mobile banking account information is access ed by its two channels either via SMS or browser and by utilise mobile banking in advance era a customer get SMS alert of changes in account ( en dedicateable edge Associates, 2008). Mobile banking is argona in which the development can flourish and can runway to replace credit/debit humour. In past 2 to 3 years mobile banking advance itself to the finale that it increase terce times if we go on comparison with debit/credit card banking (Mahesh .K. harma , Ritvik Dubey, 2009) Mobile vernacularing Use of mobile device to connect to a pecuniary initiation to conduct customer self-service (CCS) includes viewing account balance, transferring nones between the accounts, paying bills or receiving accounting alerts. Mobile Payments Use of a mobile device to make a purchase or assorted allowance- connect transaction. Payments initiated in physical or virtual worlds, and can be conducted via SMS, MMS, mobile Internet, downloadable application, and NFC chips.(Breffni McGuire an d Marianne Crowe, 2008 )From the last ten years technology has been evolving itself by inclusion or replacement of separate technologies glide slope through as the day pass. This technology development has a great impact on banking industry. On the new(prenominal) hand the services of banking is also go through umpteen changes beginning from early eighties when telephone banking and computer banking took a lead and travel towards ambiance and internet banking applications. As the electronic banking was on its peak along with it change bring in mobile technologies as well including SMS, WAP, 3G and 4G technologies (Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijrvi Pekka Laukkanen, 2007).The state of Pakistan is exceed to 170 one meg million million but unfortunately in that respect ar approximately 16 million bank accounts and left field behind cx million people atomic number 18 without access to banks. The main focus of mobile banking is rural atomic number 18a, where p eople provoke 2500 branches of banks for 105 million people and 42000 lectors per branch, Whereas mobile phone drug drug users are raged to 97 million. So that Pakistan was a good foodstuff for Mobile Banking begning. (CGAP, February 2010)In Pakistan mobile banking is emerged and famous by the name of branchless banking. After the struggle of five years from 2005 to 2010 now Pakistan is able to make their people dreams come true and mobile banking is now on its success right smart. Back to march 2007 off fate time the policy and regulative makeup was issued by SBP on a base of branchless banking (which can support the fiscal services to the people who are underserved or unbanked). (CGAP, February 2010) fiscal institutions were antipathetic to make such huge and gambley initial investment. SBP insist on implementation of mobile banking and advice Financial Institution and Banks to process the work hang of mobile banking otherwise the that would be permitted to the MNO s (Mobile Network Operators) to start their own. SBP take stones throw with Ministry of information technology (MOIT) and Tameer bank. In 2009, Telenor has launched easypaisa( First Mobile banking Platform) with the help of Tameer Bank (A microfinance bank mostly owned by Telenor). In 2010 MCB, UBL and Allied Bank has apply the mobile banking and making it more profitable for banks and customers as well. (CGAP, February 2010)Benefits to clientCustomer can access his/her account by sitting at home. he/she dont need to at the counter of bank and answer the different questions of officers.Mobile banking is time saving.Mobile banking keep informing customers nigh his/her bank account all the time anywhere.Utility payments can be through with(p) through M-payment customers donot need to get in line and wait for his/her drama ( Uppal, 6 jan 2010).Benefits to BankBy reduction of transaction cost, banks can carry on big money as Government gain is Rs.12 or Rs.13out of e rattling(pre nominal) 100 rupees, through mobile banking this cost reduce to Rs. 2 measure saved by the bank through mobile banking can be utilize in expansion of business, marketing and sale activities etcBanks can be benefited in a way by getting commission from cellular companies for providing services through ATM i-e prepaid talk timeThose banks that are providing these services commence a competitive advantage over those who are not providing it (Uppal, 6 jan 2010).MODELS jibe to the policy paper issued on restrictive frame work of mobile banking by SBP there is solo bank direct lesson allowed. Non-bank instance will save be allowed after when players included in system get that much mature to scram a exceptional control on a system. Bank- led model can be implemented by joint venture of Bank and cellular companies (SBP, 2007).Mobile banking can be implemented by using One- to-One Model, One-to- more a(prenominal) and many-to-many model (SBP, 2007).One-to-one ModelIn this model only one bank gets in agreement with a telecom company to provide mobile banking services to the customer. The scope is contain because the services is specific to one telephone service customers but good service amount, greater customization and opportunity of Co-branding and Co-marketing (SBP, 2007).One-to-many modelIn this model a bank is in agreement with many telecom companies and provides service of mobile banking to their customers and e verybody who has mobile phone can reach to the mobile banking service. in that respect are several drawbacks of this model one is the telco cannot prioritize the mobile banking SMS services in differentiateing to provide dissolute transactions, secondly financial institution has to bear all expense associate to advert/marketing, lastly bank is responsible for the arrangement of product diffusion and cash inflows and bombardments (SBP, 2007).Many-to-many ModelIn this model many banks interact with many telecom companies in distingu ish to provide services to all those customers who have bank accounts. System leads under this model petition a profound transaction bear upon system which is handled by a financial institution or a third take time offy who had an agreement with bank. Transaction processing system must be responsible for provision of real time service, having all proves of transactions and provide daily basis expiation to the account holder. This model has minimum limitation and gives maximum connectivity to its customer like an ATM which can be use by the consumer for initiating another bank transaction (SBP, 2007).In 1997 Nokia, Motorola, Ericson and phone.com came together to have a one platform for WAP application because they believed that it is critical to have a uniform standard for implementation of radiocommunication internet universally. From that time 350 more companies join them for WAP (o.o.obe and V.F balogun, 2007).Mobile banking can be implemented through companies other than t elco such as burn down distribution companies, Pakistan post, chain stores etc by using technologies of mobiles and pc (SBP, 2007).According to the research, popularation of those people who doesnt have bank account are 4 one thousand million in this world which is more than two third of world macrocosm consist of low and middle income countries. In Pakistan the ratio of financial outflow is notwithstanding higher than inflow, the increase of inflows is become the critical component which lead to country economic development. Mostly developing countries had implemented mobile banking such as Kenya, south Africa, Philippines, Cambodia. (Syed Salim Raza, 2010)In Kenya mobile banking is implemented by largest mobile service supplier, Safaricom and launched M-PESA in 2007. With the increase of 10000 subscriptions per day, Kenya has now 7 million clients out of 38 million people. Kenya provides services of depositing and transfer of money, in order to operate M-PESA 10000 agent wa s hired. M-PESA is usful for those area where there is hard to reach to banks. According to study the income of Kenyan is increase to 30% since they had started mobile banking. (Syed Salim Raza, 2010)Philippines were the first user of mobile banking is ASIA. The central bank of Philippines (BSP) has taken step towards inauguration of mobile banking. Further than mobile banking is supported by two biggest mobile network street girls in Philippines, Global and Smart. The services provided by the chichi is smart money having 2.5 million out of 39 million subscriber and 1.2 million subscriber of Gcash services out of 23 million by Global. According to BPS, through traditional way customer was charge 2.5 or 5 % of remittances but in mobile banking this cost only less than 2% and Philippians are now charge US$ 50. (Syed Salim Raza, 2010).Mobile banking working found on its four constituent MNO, Banks, user applications, customers. These participant help to see the transaction initiat ed from customer to the format which can be understood by banking system. For the implementation of mobile banking bank use its core infrastructure with just about advancement in which a user is authenticated (usually a pin) through a platform usually a phone and a server, information is extracted from a user and pass it on to the bank then bank have format of processes for a transaction once the application is do with financial transaction it is switch back to the user by an realization usually in a form of bank account reconciliation (Gavin Troy Krugel, 2007).The technology use in mobile banking can be categories in two environments, technologies at server billet and technologies at customer side. SMS, IVR, USSD2 and WAP are server side technologies, on the other hand consumer side technologies includes applications, declaration and offer which is set in SIM or in user mobile such as emailprotected and J2ME (Java) (Gavin Troy Krugel, 2007).According to the study there are di fferent challenges faced by the mobile banking discussed by different author which relate to mobile banking through different prospects. Uniform standard is one of the most important challenge as there are many devices of different service providers and vendors are indulge. thither are no uniform canon had make for those electronic devices to work on one platform. Network security (unauthorized access), customer loneliness, and clearance of obligation on customer side as they go for loan because through mobile banking the subscriber has virtual account and there is financial stake involve in it. A challenge of receiving set carriers and financial institution dispute, both have different responsibility with respect to mobile transaction. (VENABLE, LLP, November, 2008). The lack of interoperability among mobile operators has limited the access of mobile payment (Kopicki and Miller, 2008). Some of the challenges which include profitability, can be generated by the initial payment paid by the customer for initiating a transaction. Which would be paid by the customer if the offer of mobile banking seems entrancing to him, if its not does so then the initial cost of banks would be a sunk cost. Interoperability, governory issues and security are major constraints. (Ref Upkar Varshney, December 2002).Financial loss seems more fearful for a customer because more or lessthing passing in air is not that much secure than physical transaction. Privacy risk which relate to the theft of underground information. There are many uncertainties related to customer for moral they think that they may not make drift while doing financial transaction through mobile. The loss of connection which left the transaction broken make customer hesitated for usage of mobile for its financial transaction. Ref (Tommi Laukkanen, Suvi Sinkkonen, Marke Kivijrvi, Pekka Laukkanen, 2007).The introduction of GSM technology helped to boost the idea and implementation of mobile banking in Nig eria. Some of the challenges faced by the Nigeria are sustainability of of growth and progress, segregation of funds for marketing of mobile banking, development of promotion of IT, Security and cover issues, Middleware issues devices, network and protocol limitation, different standards (o.o.obe and V.F balogun, 2007)As mobile banking is a new concept that will bring some challenges and issues as well, if these issues are puzzle out adequately it will be to be more benefited than other technologies. Some issues including awareness about mobile banking which cover rural and urban areas, the extent of resolving the issue of security and privacy these issues can be handled very carefully and effectively but the need to take an eye of lodge in (uppal, 2010)According to the survey more than 60% of users are worried about security of personal data and countersign protection while using mobile banking as mobile phone encryption ability is limited as compare to personal computer beca use of which the mobile cannot meet the use up of financial security. Various threats such as cloning and use of whoremaster cards in advance era make mobile unprotected. The applications of new technologies make the bank to keep on changing the competition rule in banking industry. The most competitive challenge is how to provide the banking services to the customer which is more convenient to them, awareness among people would be a atom smasher but also upgrade the business innovation and based on these services the mobile banking is the future (Zhong Wan, Weifeng Yin and Ronggao Sun, 2009).Issues in mobile banking are demo as there are large numbers of people who do not have bank accounts especially in rural areas, due to unawareness and distant factor the people dont know about banking. There are policies, regulatory and statutory, financial, security from malicious viruses, spam and malware attacks, information transfer (privacy of individual) and consumer protection, info rmation disclosure on tariffs and services, data security, technical issues which need to be tackle. While introducing various applications for mobiles such as WAP based solutions create bother in uniform standards. Standards need to be shell out security and privacy concerns of customer as well as to promote the interoperability between different implementations. Revenue sacramental manduction agreement is another major issue between service provider, banks, content providers, other service provider such as utilities, retailer (Sanjeev Banzal, 2008).Challenges faced by the bank during implementation of mobile banking in Bangladesh are, Difficulty in selection of right software, Huge Investment in purchasing the Software, License, inability to do interbank transaction as the national payment switch is not in place. Handling huge agent network to deliver and receive cash over the counter. Challenges for mobile operator includes, sharing network with multiple Banks and Operator, te chnical limitation to access other banks, breaches in data privacy, accounting errors, or fraudulent transactions could expose an operator to large liabilities and serious reputation damage, The complex delivery of financial services could distract management from its core communications business, perhaps stretching the abilities of little mobile operators, Additional Investment in Solutions. Challenges faced by solution providers are, most of the solution are telco led so bank do not feel guard, Huge Investment from their part as most of the Bank wants to share revenue, Some of the Banks are also not ready in terms of core banking or infrastructure for mobile baking solution. Challenges faced by government are prepare a proper guideline for the Mobile Banking system, maintaining track of all the financial transaction, setup a list of services and there charges for all the mobile Banking service, Ensuring the compatibility of the software in Bank Led Model, Allow Inter Bank transa ction( Muntasir B. Shahariar, 2010).In order to provide mobile banking services the service provider has faced a challenge of security and privacy of customer, service provider has to promise users a level of security, a solution for this challenge has been made by mobile service provider is PIN and pass grave to authorize valid customers and encrypted data for transfer along with the threat of password or PIN stolen if a mobile phone or wireless device is lost. Cope with low price charged to the customer is a also a hidden challenge for financial institutions because mobile banking is based on the revenue sharing model but in order to attract and retain customer low price than e-banking and previous banking service must be target(Caroline Boyd, 2007).Though mobile banking has a authorisation to improve saving rate and provide access to financial product but its still facing challenges which need to overcome includes high prohibition to entry, low rate of loan repayment because of less contact with customer and regulatory issues (John Erickson, 2010).Attackers are gaining experience in tricks and those techniques which are unknown in 1990 are become mainstreams in 2000s such as phishing, malware, pharming such as DNS poisoning, change magnitude advancement in phones now threats is increased more on mobile than pcs(Bankable Frontier Associates, 2008)Challenge regarding m-banking to policy-makers and regulators is two-fold Firstly, to encourage banks and mobile operators to develop solutions that are not proprietary, and secondly, to allow access to potential new entrants that can disrupt the profitable business models of the banks and mobile operators. The distinguish challenge is to do this while at the same time ensuring high levels of security and trust. Just like crossway forced the integration of broadcasting and telecommunications, so mobile banking is forcing the convergence of the financial and telecommunications sectors. Unfortunately, the conv ergence of two such heavily regulated industries means that this potential is unlikely to be met unless policy-makers lay the ground rules for innovation. (Comninos, Esselaar, Ndiwalana Stork, 2008)The bigger barriers in way of mobile banking is interoperability, fraud and security ,lack of awareness and understanding of benefits can materialize upon from mobile banking (Mahesh .K. harma , Ritvik Dubey, 2009). The common challenge policy makers and regulators have to supplementress is how to get up regulatory policy that balances the need to provide space for innovation whilst ensuring services are scaled up safely (GSMA, 2008)There are also other manifest security challenges in delivering banking and payment services through wireless channels. Banks and other providers must implement security measures that adequately address these risks and threats regardless of the underlying network and carrier infrastructure used in delivering their services( Tony Chew, 2002)PUBLIC KEY INFR ASTRUCTURE (PKI) FORMOBILE BANKINGTo understand the challenges of deploying PKI inmobile banking, it is assumed that two keys are important.One for encryption and another for decryption. only if thedecryption key must be kept secret it is called the privatekey. The corresponding encryption key call the public keycan be published.A Public key infrastructure works as follow. Eachmobile bank user is listed in a public directory, withhis/her public key. If mobile banking user wants to send a depicted object to the bank server, he/she obtains banks publickey from the directory and uses it to encrypt the message.The encrypted message is sent to bank application server.Only bank server is able to decrypt this message, becauseonly bank knows the corresponding decryption key.Further, mobile user can use his/her private key to digitallysign his/her message by encrypting the message (or itshash) with his/her private key. Although everybody canread public-key directories, they must be protecte d from deceit and abuse. Therefore,there is need maturate for anappropriate infrastructure called a public key infrastructure(PKI). (Narendiran, Rabara, Rajendran, 2010)In Jan 2010, for the security protection public key security measure was introduce by which the transactions made more secure than ever by using public key certificate, a special phone i-e smart phone used in which electronic signature is underpin the transaction and authenticate to access the banks website. For this purpose application based Microsofts ActiveX internet explorer was undeniable in order to download PKC. As mobile phone is a non- Microsoft browser and its do not support ActiveX for example iPhone , blackberry, Android, these phone do not support the designed procedure, therefore the mobile phones flip be used for mobile banking.In July 2010, Financial services commission extended its statute to allow other verification methods by which a lay man can having its simple mobile phone set can use mobi le banking services by introducing non-Microsoft browsers (CAU, 2010).The major regulatory issues which set around the branchless banking some of them are 1- the risk of failure after introduction, a high profile failure lead to failure of all branchless schemes in which a high risk involved, 2- Non-bank institution must be introduce why only trust bank and presently using model of bank led is not always successful there must be bank led model at bank because mobile operator is a trustable authorization and mobile operator can provide facilities such as a transaction can be traced geographically that a bank can never provide and mobile operator can know location exactly well than banks where a money is discharge to transfer and where its going to be received.3- appropriation of KYC code is necessary the suitability of application of customer should be under consideration. For example, if a customer transfer $30 and other is transferring $1000, will both undergo same KYC checks? I f the most basic KYC checks use to the poorest customer and full KYC checks would be applied to the customer who reached to the Max-limit this let looseation may lead to the risk of terrorist attacks (Paul Makin and McEvoy, 2009).Those regulation that have been used for traditional banking weight be used for mobile banking because the risks of traditional bank and risks of mobile banking cant be equal so there is a need to develop more regulation for mobile banking, there are some areas in which the regulator attention is more require for example, making legal anti money transaction, agency rule, fullfilment cost of regulation, Foreign exchange controls, Payment regulation for non-banks, i.e. mobile operators (GSMA,2008)The regulation against risk of fraud, loss of privacy of customer and even for loss of service for the establishment of trust among the customer and its the most necessary element for the development of mobile banking. A legal framework call for which give authori ty to receive or send payments in electronic form. The Regulations also require for the Banks to take corrective actions and result proof measures to provide protection against violation terms and conditions of licensing including power to suspend or purloin the license and if is there any violation done enforce financial penalty or regulate compensation. In order to formulate regulation the bank is eligible for issuance of rules, regulation and guidelines and directions for paper based payment items and the instruments used to complete the transactions and for presentation of electronic check. Moreover, the regulation is set by the bank to recognize new payment tools for the protection of refer of customer by ensuring security, integration, reliability of the payment system. In bank of India, the guidelines are only formulate by the reserve bank of India and it specifies that only those bank who have physical presence in India will be certify and supervised and will be allowed t o offer mobile banking in India. service shall be restricted only to customers of banks and holders of debit/credit cards issued as per Reserve Bank of India guidelines. SBP issued a policy paper on Mobile ( Rasheda Sultana, 2009)The development of mobile banking require some rules and regulation to be implemented for the protection of consumer, promote secure transactions, encourage economic stability. In regulation, intelligibly define those activities and institutional arrangements for mobile banking that directly focus on licensing, regulation and management by financial authority. It is require by those who are religious offering mobile banking to clearly expose prices and services offered by them along with it keep in line fair dealing and data protection for all consumer. It is also require that mobile banking facilitator supervise risks of fraud and illegal activities under the rules of Know Your customer (KYC) (CAU, 2010)Banking which elaborately discusses models of mobi le banking and associated risks. SBP recommends bank-based model with the scope of introducing non-bank-based model at later stage ( Rasheda Sultana, 2009)Financial crisis highlights need to make customer protection, financial access and financial stability mutually reinforcing Technological advances in mobile banking collect regulations that are flexible enough to accommodate innovation and customer pauperism yet stringent enough to protect customer privacy. The clarification of issues help banks and telecom companies to assess the risk involved in providing mobile banking in better way (CAU, 2010)A major issue that come arise while using mobile banking is to know your customer, new customer identity evertime verified whenever he have to use the service. In Kenya, identification is proved through national id card and M-PESA service which rely on id card authentication and it goes perfect. Some development in regulation allowed that only a bank can offer mobile banking services b ecause of the reason that mobile operator due to its lack of perception and recognition power, do not know how to apply same regulatory environment to the non- bank to some extent. As the security, protection (end to end encryption) can be done only by the mobile operators since the SIM in under control of mobile operator. There are two ways to resolve this issue one is to relax the SIM control, there will be a time reach in near future that the SIM will be public utility and some control rights would be taken away from mobile operator and granted to the third parties, second is relaxation of security As the implementation of mobile banking solely on mobile operator is not possible, it can be operated with comprehensive security and suitable control on appropriate reportage of maximum number of customers, transaction size and enhanced server based control. The regulator will have access to the necessary levels (Paul Makin and McEvoy, 2009)In order to achieve success in fulfillment of regulation and implementation of regulation, the regulator have to keep in mind that regulation must be apply in a proportionate manner to checker safe and sound mobile money transfer. The regulation must benefit customers by rise in competition which reduce the price and improve the role of service. The regulation must allow to be with the new mobile coming up for money transfer services. Financial regulation has to be substantial through a consultative approach with the mobile industry to ensure it closely tracks market development without becoming a regulatory barrier (GSMA, 2008)With respect to completing a mobile banking transaction, a mobile carriers legal obligation also differs in fundamental ways from a financial institutions. The mobile carriers obligation to verify the origination and termination of a telecommunications transmittance is mainly to ensure that a call is completed, and, that customers are accurately account for the service. To the extent that a trans mission is not completed, regardless of the content of that transmission, the liability of a telecommunications carrier is extremely limited as a study of law. Under longstanding common law precedents and statutory law, for the most part a customer is entitled to no more than a fall for the cost of a failed communications, even if that communication happens to involve digital transfers of very large sums of money(Frederick M. Joyce, 2010)Mobile banking has two security segments one is called handset zona users zone and other is mobile operator zone. Data security issues in mobile banking for example hackers, malware, viruses attacks etc some of the security issues that occur in mobile banking is as follow Information leakage, loss and alteration can be happen in mobile banking as the technology is based on wireless devices, the information is transferred from one end to another end by using radio waves modulation and demodulation. When the rays passes from the air there are many o ther rays with which the interference of respective wave can be happen by which information may be leaked, loss and distort or it can be intercepted hackers can extract the information by initiation devices on electromagnetic devices or may delete, modify or add in information which can damage the purpose of legitimate user which is initiated by him.Instability of communication channels and mobile devices lead to incomplete transaction. T

Friday, March 29, 2019

Health Education through Social Marketing

wellness Education through affable sellingSocial MarketingAccording to the WHO, information and precept provide the certain base for making choices. They be a necessary and core piece of wellness packaging, which aims at increasing noesis and disseminating information related to wellness. wellness promotion is adept of the close measurable components of wellness cargon and wellness upbringing forms the core of such promotional activity.wellness education is a process that informs, motivates and helps spate to adopt and maintain healthy practices and lifestyles, advocates environmental c diminishes as demand to facilitate these goals and conducts professional research and training to the same fetch up.Health education is some(prenominal) intentional activity which is de menageed to achieve health or illness related learning to find most a relatively permanent turn in an individuals qualification or disposition. There atomic number 18 different methods of healt h education. For sm all(prenominal) throngs the prevalent methods employed for health education put one over been health talks, demonstrations, role plays, and the economic consumption of audio-visual aids. For the general public, the health education tools have conventionally been the television, the radio, the press, films, health magazines, posters, health exhibitions and health museums. Mass media is non very effective in ever- changing human behavior because communication is usually one-way. If health education is provided, provided the products or services necessary to change behavior argon not easily for sale, then the hold dear of the health education is lost. It is therefore important to provide cheap and reliable services along with behavior changing health education. For instance, if health education brings ab come forward an awareness in a community that the occurrence of human immunodeficiency virus/AIDS female genital organ be importantly reduced by use of c ondoms, this message alone is of no value if condoms or not readily available either because of an unaffordable price or because of a difficult location. Making available these services is therefore as important as making wad aware of the benefits of the services.Health education is not a substitute to other(a) health services, but it is needed to ensure the proper use of available services. If the behavior of the individual separate or community can be the main cause of a health problem, then that same behavior can be neutered to serve as the main solution as well.In the dry land of selling and advertisement, it is often said that propaganda is one of the most powerful instruments in influencing people. Television, radio and the popular press have emerged as the most hefty vehicles for propaganda. There are three widely accepted strategies of mass communication. The psychodynamic vex depends on modifying cognitive factors to influence demeanour namely the needs, fears and attitudes of the individual. The socio cultural strategy requires persuasive messages to define the rules of complaisant behaviour for individuals or to redefine existing ones. This method is used widely by television commercials. The meaning anatomical structure approach works differently. It identified certain unintended influences on propose reference that were undesirable. Meaning construction or modification of meanings which people lay claim to some product, person, cause or issue can similarly bring about change in behaviour.Methods traditionally used to deliver health products and services in develop countries often do not render a large portion of the population, especially those at the lower end of the economic ladder. Overburdened public health systems generally do not have enough outlets and provide services that are often not valued by the consumer. umpteen studies have appoint that when people do not pay for a service they are less probably to value and u tilize it. Marketing health generally raises awareness and increases physical exercise rates. This has been effective in the campaign of diarrhea, malaria, undernutrition, vitamin deficiency, voluntary human immunodeficiency virus counseling and scrutiny and reproductive services. When people pay for these services, they tend to value it better.In hearty market, two concepts are important the exchange theory and the four Ps of marketing namely the product, the price, the sharpen and the promotion. The product is the behaviour, program or service exchanged for a price. The price is the cost to the bottom audience in terms of money, lifestyle and effort of engaging in that behaviour. The head is the outlet through which the product is available or the situations in which behaviour change can be do. Promotion is the combination of advertising, media relations, promotional events and amusement to communicate with the manoeuvre audience about the productThe choice of a tool for health education depends on a variety of factors the objectives, the target audience, the time constraints and the availability of resources.The concept of Social marketing was introduced by Kotler and Zaltman in 1971. Social marketing is defined as the design, implementation and control of programs which assay to increase the acceptability of a social idea or practice, in a target group. Social marketing is the use of commercial marketing concepts and tools in programs designed to influence individuals behaviour to improve their well cosmosness and that of society. It draws from various fields analogous economics, psychology and medicine. Social marketing is a impudently approach to very old human endeavours. Attempts have always been do to inform, influence and motivate people to reinforce positive behaviour or to modify risk taking behaviour.Traditional Educational programs are found to be more effective when the target groups are abstruse in the planning process and participatory approach has been found to increase pulmonary tuberculosis of health services. Many studies have been found to be limited in that the evaluation of health education programs is based more on deep outcomes the likes of morbidity and mortality rather than attitude change. For a social marketing program to be effective, two different research approaches are required to obtain the best picture about the issue being addressed, the target audience and the effectiveness of the program. These methods are qualitative and quantitative research. both(prenominal) these methods have their strengths and weaknesses when used in isolation, but complement each other when combined to produce the best research results. The research has to be consumer chargeed quantitatively to produce data that can be generalised for a larger target group and qualitatively to translate the nature of peoples attitude and behaviour both to the health issue problematic as well as to the health servi ces provided to them.Social marketing is a process of continuing development and testing. It has borrowed many of its techniques like focus group argueions, consumer marketing databases and intercept surveys from commercial market research, the difference being that social marketing sells public health.Issues that have to be examined are what the consumers feel they have to know, how they would like to know this and what are the barriers to change electric potentially harmful behaviour. Before any new educational material is launched, warning materials have to be pre-tested with consumer focus groupsSocial marketing has been used for health promotion in various fields like smoking, drinking, drug abuse, HIV/AIDS, breast cancer and mental ill health. Other issues like environmental pollution, education and human rights have been most effectively addressed by this process. Social marketing involves many different stake-holders the funding agency requires out intrusts in terms of g ains made and the target group gain the health outcome, but apart from these obvious stakeholders, there are many others involved in partnerships for the social marketing of health education. This partnership helps to maximise limited resources, pull ahead consistent messages and as well as help to reach diverse audience hence maximising adjoin of the program.This has been shown to function well in the case of HIV/AIDS. A nationwide strategy has been organised by many developing countries. The funding agencies are international bodies that work in collaboration with topical anesthetic governments. Non governmental or charity organisations are identified and trained by an initial training workshop. These agencies then conduct focus group discussions and let on informant interviews with those most likely to benefit from the health education program. These target groups could be those at high risk for HIV/AIDS due to call downual contact women in prostitution, youth and adoles cents. The groups are identified and their spot concerns are discussed. Barriers to their seeking healthy behaviour are identified. The groups also discuss the best health education methods and techniques pillowcaseable for their unique situation. Concerns of time and place of the health education session are detailed. Target groups from conservative societies did not prefer being inclined information about HIV/ back up in public places or in the presence of the opposite sex or their family members. They were more willing to listen to health messages that were non judgmental or coercive. All these suggestions are incorporated into the health education strategy. Along with the health education campaign, local and international agencies are involved to provide necessary health services in the form of cheap but reliable condoms, doctors trained in counselling and diagnosing HIV/AIDS as well as reliable referral and treatment centres. A small sampling is then identified and a pilot project is undertaken to do a field trial of the health education tools. Further changes are made as required and a large scale program is put into effect. Mid term participatory evaluation is conducted regularly apply immaterial evaluating agents to assess the knowledge, attitudes and practice of the high risk group. The other stakeholders are also involved in this evaluation to see how they could further improve their character to the health education and health seeking process. Thus the process is continuously evolving. At the end of the program, final evaluation is undertaken and the results are available for all the stake-holders. This serves as a learning lesson. During the final evaluation, issues of sustainability of the project are also addressed.This approach is very different from the regular health education sessions which are primarily a top-down approach and hardly participatory.The other employment of social marketing being very effective is in the case of nutrit ional educational programs targeting teenagers. The food intake data in countries like Britain and America indicate that the intake of nutritious food like fruits, grains, vegetables and dairy farm products is low dapple intake of foods cryptical in sodium, saturated fats and sugars are high. Any large scale intervention to target the scale and magnitude of this problem requires an in-depth knowledge of the target population, their food sources, their barriers to seeking healthy foods, the methods of health education available and required as well as the available resources in terms of healthy foods.Volunteers in the adolescent age group are asked what benefits they associate with increased consumption of nutrient rich food, what factors hamper them from consuming these foods, how they prefer to learn about foods and nutrition. They are also asked questions about what they think would be a cool advertisement for food, where they usually hang out and how they would market produc ts to their own age groups. Many of the youngsters indicate that they like yoghurt, chocolate drinks and fruits but not vegetables. They also prefer foods that are convenient and familiar while increasing scholastic and physical performance. Some of the suggestions given by the teenagers included disguising the insight and appearance of less favoured foods and ameliorate the taste of some foods by adding other foods. They also felt that the nutrient rich foods were less available as forms of snacks and more difficult to procure and prepare. The potential channels of delivery were posters, television, computers, billboards, cooking shows and radio contests. They also preferred give on experience of preparing foods. This then leads to the next step of social marketing of the health education program with focus on the placement, pricing and promotion of these nutrient rich foods. Traditional methods of health education do not take into account many of these issues. They may be outd ated and out of sync with the new generation which might most require the educational input. Rep eat the same message over and over again amounts to whipstitching a dead horse and is unlikely to have the desired outcome. The media can provide very strong and contradictory messages that can confuse the audience. Many television programs may re-inforce the message that drinking and smoking is a sign of maturity or that it is fashionable. Many of these commercial advertisements are televised following bulky Market research about what attracts and appeals to the audience. Beauty, style, health and being better than ones peer group are important reasons for the target audience to choose certain products. This play on psychology can be adopted to improve the health seeking behaviour of the target groups.Social marketing combines the best elements of the traditional approach to social change using the latest advances in communication techniques and marketing strategy.Though public health educators do not sell products, they use similar marketing skills to understand the consumers knowledge, the barriers to changing risky behaviour and the best methods of communicating. Before any new educational campaign is launched, prototype materials are pretested with consumer focus groups. This provides full of life information on how well the target audience understand the materials. This knowledge can be used to tailor the educational material to suit specific target groups. Charity organisations or other funding agencies lead to subsidise the process to take for it financially accessible and available for those marginalised groups that most need them.Some Primary Care Trusts had brought out videos for public cover charge on key health messages as envisaged in the White Paper. These videos were screened in busy shopping areas and a qualitative study was conducted to assess the impact of the video. No baseline research was conducted and the target group was not involved i n the decision making process. The study found that many people found the video irritating and intrusive some ignored it while others thought that it was a marketing gimmick. The suggestions given were that the video be screened in places where people are more likely to be relaxed like eating places. Many people also found the video clips to be wearisome and inconspicuous, the suggestion being to add more colour or vignette characters. If all these suggestions had been initially obtained and incorporated into the making and presentation of the video, the impact would have been a lot more beneficial. Thus traditional health education strategies would do well to adopt the social marketing methods before they introduce on any program of intervention.Thus health education is a constantly evolving process. It does not force people to modify their behaviours, but encourages them to deal their own choices for health. Health education must acknowledge the experiences and requirements of target groups. safe health education goes a long way in improving health of societies and the benefits gained are many, but a poorly planned and punish health education program is a waste of money and resources. existence health would gain to learn from the acumen of the market that sells products purely for a commercial purpose. The ultimate goal is for the target to use the product. This is best achieved by using social marketing skills. Thus social marketing of health education ensures maximum output to bring about behaviour change in large groups of people. This behaviour change is the basic requirement to make people responsible and responsive to their own health needs and is the but way to bring about empowerment of people for their own health.References sarin GG and Sawyer RG 2nd Edition (2000) Health Education Creative Strategies for teach and Community Health. Jones and Bartlett Publishers.Lefebvre RC and Flora JA (1988) Social Marketing and Public Health intervention Health Education Quarterly 15 299 315Neumark-Sztainer D, Story M, Perry C, Casey MA (1999) Factors influencing food choices of adolescents. Findings from focus group discussions with adolescents Journal of the American Dietetic joining 99(8) 929 937Vaughn S, Schumm JS and Sinagub J (1996) Focus group interviews in Education and Psychology universal gravitational constant Oaks CA Sage Publications.Ghai OP and Gupta P (1999) Essential Preventive Medicine A clinical and applied Orientation Vikas Publishing House.

Speech Recognition using Epochwise Back Propagation

wrangle apprehension exploitation eonwise Back PropagationInternational Journal of Computer Applications (0975 8887) Volume * nary(prenominal)*, ___________ 2013Speech Recognition development the Epochwise Back Propagation by style of condemnation AlgorithmNeelima Rajput S.K.VermaDepartment of C.S.E. Department of C.S.E.GBPEC, Pauri Gharwal, GBPEC, Pauri Gharwal,Uttrakhand, India. Uttrakhand, IndiaABSTRACTIn this paper, artificial anxious meshworks argon employ to accomplish the English first rudiment quarrel recognition. The ambitious issue in the atomic number 18a of barbarism recognition is to design an faithful and effective tongue recognition dust. We implemented a sore selective information classification rule, where we use skittish lootworks, which argon turn backed using the careful term determine of audio target. This method gave comparable result to the already implemented anxious meshworks. In this paper, Back denotation uneasy network calculating machine architecture used to recognize the date varying infix information, and provides correct accu regularise results for the English Alphabet linguistic process recognition. The Epochwise Back Propagation by time (BPTT) algorithmic rule uses the eon stupefy of remark bode to control the network structures and yields the satisfactory results.Key enunciates Artificial flyaway net profit, Back Propagation queasy lucre, Epoch, Speech Recognition.I INTRODUCTIONSpeech recognition establishment enables the forge to project the human actors line and react accordingly. It on the whole toldows the machine to automatic each(prenominal)y understand the human spoken utterances with the speech signal inter-group communication on and pattern recognition. In this approach is the machine converts the voice signal into the suitable text or command through the process of identification and understanding. Speech recognition is emerges as a vast technology in cu rrent time. It also plays an grievous role in information theory, acoustics, phonetics, linguistics, and pattern recognition theory and neurobiology disciplines. speech recognition technology become a key technology in the computer information bear upon technology as there is speedy advancement in the software, hardware and information technology. The features of remark audio signal are compared with the voice template stored in the computer database in speech recognition st posegy by using the computer systems. Recognition results are mainly depends upon the matching techniques used for matching the audio signal characteristics. To ameliorate the recognition rate and fail recognition results spooky networks are used.A queasy network is a powerful tool which used to alter and represent the complicated input end products. unquiet nets are underlying aloney co-ordinated networks of relatively simple processing unit of measurements, or nodes that work simultaneously. They are designed to mimic the function of human neuron biological networks. The processing units of neural networks are termed as neurons. A neural network provides better results every(prenominal) over the living approaches in speech recognition systems 1.2 BASICS OF aflutter NET spirtSThe basics of neural networks are discussed as follows. There are some(prenominal) different types of neural networks, unless they all have four basic and common attributes affect units Connections Computing procedure raising procedure.Processing UnitsA neural network contains several processing units, which are just ab come to the fore analogous to neurons in the human brain. All these units activate in couple and perform the task simultaneously. Processing units are responsible for the overall numeration there is no any other unit for the corporation of their activity. separately processing unit computes a scalar function of all its topical anaesthetic inputs at every moment of time and consequently further dissipate the result to their neighboring units 2. The units in a neural network are basically classified into input units, which used to receive data from the away(p) recondite units, used to internally transform the data and output units, which service decisions or target signals.2.2 ConnectionsAll processing units in a neural network are organized in to a defined network topology by a dress of connections, or weights, shown as lines in a diagram. all(prenominal) weight consist a real value, which ranging from to + . The value of a weight represents how much impact a unit has on its neighbor units a positive weight causes one unit to excite another, piece a negative weight causes one unit to inhibit another. Weights of the processing units are normally one-directional (from input units towards output units), but it may be two-directional sometimes, especially when there is no distinction amid input and output units.Figure 1.Neural network topologie s (a) unstructured, (b) layered, (c) recurrent, (d) modular 3.The above figure shows the topology of different neural networks. Unstructured Neural Network is mainly used in processor which is operated in parallel to provide the deliberational power for the speech recognition system. Layered neural net algorithms are self-organizing and their internal speech model maximizes the military operation and stimulates better results comparable to existing systems.Recurrent Neural network are mainly used in pattern sequencing as it follows the sequences changes time to time. Modular neural network are used in designing of complex systems by using simple components.Neural nets set up an approach to computation that mimics biological nervous systems. Algorithms base on neural nets have been proposed to conduceress speech recognition tasks which humans perform with lower-ranking apparent effort.2.3 Computation ProcedureComputation of neural networks begins after applying an input data t o the input units of the network. Then the energizing function of all the units is reckon either simultaneously or independently depends upon the structure of the neural network. The computation process in the unstructured network is termed as spreading activating and in layered network is known as forward file name extension as it proceed from the input units to the output units. First we compute the net input of the processing unit and and so we compute the output activation function of the net input to update a accustomed processing unit.2.4 Training ProcedureTraining a network means enable the connections adaptive so that the network shows the actual computational behavior for all the input patterns. In training process usually weights are updated but sometimes the modification of network topology also takes place, i.e., addition and ablation of connections from the network topology 4. Modification of weight is easy and beneficial than topology modification as a network wi th bulk connections able to set any of its weight zero, which is equivalent as deleting such weights.3. RELATED WORKThe past research concluded that the use of the neural networks in the speech recognition system provides the better recognition result compared to the other existing approaches. The latest field of neural networks actually started in the 19th century, when neurobiologists prototypic introduce the extensive studies of the human nervous system 5. Cajal (1892) determined that the nervous system is comprised of some basic units i.e. discrete neurons, which communicate with the other neurons by sending electrical signals down their long axons, which ultimately activated and touch the dendrites(receptive areas) of thousands of other neurons, transmitting the electrical signals through synapses (points of contact, with variable resistance). Firstly, the different kinds of neurons were identified, and then analyze their electrical responses, and finally their patterns of co nnectivity and the brainsgross functional areas were mapped out. According to the neurobiologists study the functionality of individual neurons are quite simple and easy. Whereas to determine how neurons worked together to pass high level functionality, such as perception and cognition are very difficult.6In 1943 McCulloch and Pitts proposed the first enumeration model of a neuron, named as binary threshold unit, whose output was either 0 or 1 depending on whether its net input exceeded a given threshold. There are various approaches proposed by the researchers to design an accurate speech recognition system for various purposes. In 7 Al-Alaoui algorithm is used to train the neural network. This method gives the comparable better results to the already implemented recondite markov model (HMM) for the recognition of the words. This algorithm also overcomes the disadvantages of the HMM in the recognition of sentences. An algorithm based on neural network classifier 8 for speech reco gnition used a new Viterbi net architecture which is recognized the input patterns and provided an accuracy of recognition rate more than 99% on a large speech database. This system is used for isolated word recognizer. In 9 source accomplishes the isolated word speech recognition using the neural network. The methodology of this approach is to invoke the feature of speech signals using the Digital Signal Processing techniques and then classification using the Artificial Neural Network. This algorithm concluded that the better accurate recognition results are obtained from the probalistic Neural Network PNN. In 10 author implemented a pre- trained deep neural network using the hidden markov model (DNN-HMM) hybrid architecture which is used to train the DNN to produce the better recognition results of large vocabulary speech database.4. PROPOSED WORKSpeech recognition using the Epochwise Back annex through time algorithm is proposed in this paper.In the proposed system neural netw ork training is based on the calculation of epoch of the audio signal and then used these epoch value for the training of the neural network. The input data sets used to train the neural network bottomland be partitioned in to the independent epochs. Each epoch representing a temporal value of the input data. Back propagationneural network used in the system in following steps.First have and fix the architecture for the network, which will contain input, hidden and output units, all of which will contain sigmoid functions.Assign the weights between all the nodes. The assignments of weights usually between -0.5 and 0.5.Each training example is used, one after another, to re-train the weights in the network.After calculating from each one epoch for input audio data, a termination condition is checked.In neural network architecture the weights of input and hidden layers are adjusted according to the target output values 11 The input data is considered as E which is propagated throug h the network so that we can record all the observed values Oi(E) for the output nodes Oi. At the same time, we record all the observed values hi(E) for the hidden nodes. Then, for each output unit Ok, we calculate its epoch as follows(1)The epoch harm from the output units are used to calculate epoch ground for the hidden units. In fact, this method gets its name because we propagate this information backwards through the network 12. For each hidden unit Hk, we calculate the epoch as follows(2)Here, we take the epoch term for every output unit and regurgitate it by the weight from hidden unit Hk to the output unit. We then add all these together and multiply the sum by hk(E)*(1 hk(E)). Having work out all the epoch values associated with each unit (hidden and output), we can now murder this information into the weight changes ij between units i and j. The calculation is as follows for weights wij between input unit Ii and hidden unit Hj, and summation of all units are as(3)Ba ck Propagation Neural Network architecture is shown in below figureFig.2 Back propagation Neural NetworkThe main steps of this system are defined as follows. represent the input audio Signal.Extract the epoch valuesTrain the neural network on the al-Qaida of epoch values.Applied the back propagation neural network for the classification.Matching the input data with the trained data. recognise the input.The data flow diagram of the proposed system represented in given figureCFigure 2 Proposed approaches for Speech Recognition5. experimental RESULTSThe experiment conducted on the audio database of English alphabets. Matlab R2010a (Math works) in Windows 7 was used to implement the proposed algorithm. The input signal is used to calculate the epoch values and then by using calculated epoch values the neural network is trained.The epoch rate of multi-layered networks over a training set could be calculated as the number of miss-classified data values. There are many output nodes, all of which could potentially misfire (e.g., giving a value close to 1 when it should have output 0 and vice-versa), we can be more sophisticated in our epoch evaluation. In radiation pattern the overall network epoch is calculated asThis is not as complicated as it first appears. The calculation simply involves working out the difference between the observed output for each output unit and the target output and squaring this to make sure it is positive, then adding up all these squared differences for each output unit and for each input signal. The calculated epoch values for audio signal A is listed in tabular form.Table 1 Calculated Epoch values for input dataThen epoch values are basically instant of noteworthy excitation of the vocal-tract system during production of speech. Table 1 represented the Epoch values for the input English alphabet A in terms of time in mili seconds. These epoch values are stored in the computer for the further matching by using the neural networks to the recognition purpose. Similarly, epoch values are calculated for each input English alphabet and then train the network through these input patterns and stored in the system for recognitionFigure 3 Performance graphs of epoch values.The figure 3 shows the performance of the system based on epoch values. The best organisation performance epoch value is selected from the different epoch on the basis of Mean Square error. The graph is plotted on epoch and means squared error values.Table 2 Performance of the proposed systemIn Table 2 the recognition rate is calculated for five input English alphabet which is 98.8%. The new proposed Epochwise Back propagation through time algorithm yields the satisfactory results.6. CONCLUSIONIn this paper, we implemented the Epochwise Back propagation through the time varying epoch calculation. The experiment is conducted on the humble set of English Language alphabet to calculate the recognition rate of the system. Some different sound samples ( i.e., with different sampling frequency) of each alphabet are taken and used for testing the system. The above results show the performance of our proposed algorithm in speech recognition.7. REFERENCESJianliang Meng, Junwei Zhang,Haoquan Zhao, Overview of the speech Recognition Technology, 2012 fourth part International Conference on Computational and Information Sciences.L. Fausset, Fundamentals of Neural Networks. PrenticeHall Inc., 1994, ch 4.Jiang Ming Hu, in the Yuan Baozong, Lin Biqin. Neural networks for speech recognition research and progress. Telecommunications Science, 1997, 13(7)1-6.H. Boulard and N. Morgan, unceasing speech recognition by connectionist statistical methods, IEEE Trans. Neural Netw., vol. 4, no. 6, pp. 893909, Nov. 1993.Mohamad Adnan Al-Alaoui, Lina Al-Kanj, jemmy Azar, and Elias Yaacoub, Speech recognition using Artificial Neural Network and confidential Markov Model, IEEE Multidisciplinary Engineering Education Magazine Vol. 3, No.3, September 2008. RICHARD P. LIPPMANN, Neural Network Classifiers for Speech Recognition The Lincoln Laboratory Journal, Volume 1, Number 1 (1988)Gulin Dede, Murat Husnu Sazl, Speech recognition using artificial neural network. Digital signal processing 2009 Elsevier Inc.George E. Dahl, Dong Yu, Li Deng, Alex Acero, Context-Dependent Pre-Trained Deep Neural Networks for Large-Vocabulary Speech Recognition , IEEE Transaction on Audio, and Language Processing, Vol. 20, No.1, January 2012.H. Paugam-Moisy, Parallel neural computing based on network duplicating,in Parallel Algorithms for Digital Image Processing, Computer resource and Neural Networks, ed., I. Pitas, 305340, JohnWiley, (1993).Stefano Scanzio, Sandro Cumani, Roberto Gemello, Franco Mana, P. Laface, Parallel implementation of Artificial Neural Network Training for Speech Recognition. Pattern recogonition letters, 2010 Elsevier B.V.N. Morgan and H. Bourlard, Continuous speech recognition using multilayer perceptrons with hidden Markov mode ls, in Proc. ICASSP,1990, pp. 413416.Y. Hifny and S. Renals, Speech recognition using augmented conditional haphazard fields, IEEE Trans. Audio, Speech, Lang. Process., vol.17, no. 2, pp. 354365, Feb. 2009.