Information Technology Role in E-learning Systems Success

Introduction

E-learning is a systematic mode of studying where students learn by interacting with various tools for information and communication technology (ICT). Interactive technologies provide support for various capabilities. As technological changes continue to occur, more platforms of sharing information and learning materials among students and tutors also emerge. Hence, e-learning advances with evolution in information technology (IT). E-learning may be defined as the deployment of new technologies together with applications to support learners and the learning process (Henry, 2001).

The set of technologies that are used in e-learning align well with the argument that students must take full responsibility for their learning by engaging their teachers and other students. Information technology provides the appropriate tools to enhance virtual interactions between teachers and learners. From this hypothetical perspective, this paper discusses the role of information technology in the success of e-learning systems. It also investigates various success factors for e-learning systems with reference to DeLone and McLean’s model.

Background to E-learning

The current world depends on technological advancement to develop new ways of accomplishing vital tasks in the society. The power of technology can now be accessed via 3G mobile phones. Eom, Ashill, Arbaugh, and Stapleton (2012) confirm that it is unacceptable for organisations in a hi-tech world to empower their employees via out-dated and traditional approaches in learning and development. This finding calls for managers and organisational leaders to emphasise adapting their learning models to the emerging technologies. Thus, e-learning is an approach that finds application at an organisational level and in higher education.

Many nations and learning institutions recognise the purpose and contribution of e-learning in enhancing scholarship process. Eom et al. (2012) claim that the worldwide market demands for e-learning technology hit US$27.1 billion by the end of 2009. They further estimate that the growth of this demand will remain elevated (at 12.8%) annually so that its demand will hit the US$49.6 billion mark by 2014.

This estimate may imply that scholars unanimously accept the e-learning as the most effective approach for learning in higher institutions and other organisations. However, Henry (2001) suggests that even though hi-tech distinctiveness envisage learners’ enthusiasm to utilise and/or interact in virtual education settings, additional features such as students’ inspiration, intellectual uniqueness, and/or peer maintenance are likely to be reliable determinants of the students’ academic status. This observation highlights the necessity for establishing definitive and consistent research findings on the correlation between technological traits of approaches for enhancing e-learning and the positive learning outcomes.

Eom et al. (2012) assert that lack of correlation between the traits of technologies that are used to enhance e-learning and learning outcomes may be explained by the manner in which people conceptualise the role of information technology in enhancing e-learning. In the case of online learning environments, which are the primary concerns of this paper, TAM (technology acceptance model) constitutes the chief approach that is deployed on a wider scope to conceptualise the part played by technology in achieving learning outcomes.

TAM
Fig. 1: TAM. Source: (Eom et al., 2012).

Despite its high influence, the purpose of the model was mainly to predict acceptability and adoption of various learning technologies (Eom et al., 2012). MIS scholars developed other models for use in an offline environment. However, they have gone without testing. Hence, their discussion is beyond the scope of this paper. However, two plans, the DeLone and McLean’s and the CFC (Critical Success Factor), warrant discussion since they help explain the contribution of technology in teaching and learning in an online environment.

The Critical Success Factor Model

The concept of CFC found its way into the literature on effective learning models during 1980s. In this time, many organisations were interested in determining the reasons behind the success of some organisations and not others in enhancing organisational learning. Selim (2007) defines CFC as those things that organisations must do to ensure success in organisational learning. Figure 2 shows this model.

Six Critical Success Factors for IT Governance Implementation.
Fig 2: Six Critical Success Factors for IT Governance Implementation.

The CFC approach to the establishment of various success factor for e-learning holds that critical success factors need to be limited, controllable, and assessable to help determine the degree of success of any learning model. Based on this assertion, Papp (2000) identified some of the essential CSFs in a university learning environment. They include academic assets, appropriateness of lesson resources for e-learning settings, constructing the e-learning lessons, e-learning class sessions, and safeguarding e-learning syllabus and platform. He further suggested that these factors could be studied both separately and as a combination to ensure possible enumeration of the aspects, which are most effective in fostering e-learning. Benigno and Trentin (2000) advise that while evaluating CSF, one needs to consider students’ outcome in terms of performance, quality, and sufficiency of the e-learning courses that are offered by institutions of higher learning.

Using the CSF approach, Volery and Lord (2000) deployed the results from a study that used a sample size of 47 students who had taken part in a managerial course in an e- learning environment within the Australian universities. The researcher identified technology, instructor, and previous experience of the technology use as essential success factors for e-learning. Based on this study, technology is one of the essential areas of consideration in the evaluation of the role of IT in enhancing the success of e-learning systems. It refers to the simplicity of admission and course plotting, interface planning, and intensity of communication. Aspects that connect with tutors comprise one’s thoughts towards learners, teachers’ methodological aptitude, and classroom relations (Eom et al., 2012).

Hence, success for e-learning requires the interaction of IT-based systems and the input of human decision makers who also supply the necessary information to be shared between learners and instructors. In this extent, IT acts as a tool for enhancing the ease of dissemination of information between participants in e-learning.

The main agenda of e-learning is to achieve learning objectives, which may range from technological and environmental to instructor-related objectives. Technologically, an essential attribute of e-learning systems is the ease of accessibility and reliability of software and hardware applications. IT acts as the means for evaluating and developing software and user interface models, which are reliable and dependable depending on the current technological developments in IT knowledge. IT can also help in the generation of better asynchronous and/or synchronous e-learning systems in higher education and organisational settings.

The DeLone and McLean’s Model

DeLone and McLean’s model comprises six main measures for success of the e-learning system. They include superiority of the structure, eminence of information, contentment of the learner, significance of the method on persons, and business repercussion of the model (Eom et al., 2012). These measures are not only interdependent, but also interrelated. The model holds that “the system use is a mediating variable that is functionally determined by information quality and system quality” (Eom et al., 2012, p.148). In this context, IT acts as a tool for enhancing system quality in a bid to foster the interaction between e-learning system and its users.

System quality relates to measures for speed and accuracy of information processing of an e-learning system. For higher education and organisational e-learning systems, these parameters include elasticity of the system, steadiness, accessibility, consistency, convenience, and the capability of the system to ease the learning process. Perhaps, any e-learning system must make the process of availing information to learners easier as opposed to complicating it. Thus, learners must access the information with minimal effort input to operate the system. This situation requires the existence of mechanisms of mediating the system’s functionality and learners’ knowledge level for the system use. Through the development of software, which simplifies machine language into a language that nonprofessional learners can easily understand, IT ensures optimal system accessibility.

DeLone and McLean’s model considers technological traits of e-learning systems beyond the perspective of easiness of system use. This claim suggests that the model can find applicability in examining e-learning success even in situations where the use of technology is involuntary. It also discusses the learning outcomes, apart from the role of technology adoption in enhancing success of e-learning. As such, it constitutes an important pedagogy for conceptualising the role of IT in enhancing e-learning in an online environment, which is the main concern of the paper.

Success Factors for E-learning Systems using DeLone and McLean’s Model

Quality of E-learning System

The success of IT in enhancing effectiveness of the e-learning system depends on its capacity to enhance the achievement of various variables, which contribute to the preference of an e-system in learning. The main variables include the ease of system use and satisfaction of users with the system usability. DeLone and McLean’s model considers these two variables as dependent on the information quality and system characteristics such as dependability, reliability, and availability (Eom et al., 2012).

TAM approach to evaluation of the effectiveness of the e-learning system holds that system quality depends on one’s perception of the usefulness and capacity to use the system with ease. Perception of usefulness acts as motivation for intention to utilise e-learning system amongst learners. This motivation correlates positively with the actual utilisation of the system (Selim, 2007). Perhaps, an e-learning system is only effective if learners have motivation, which translates into actual system use, to achieve learning objectives. This finding implies that even if the system may be used, it is highly ineffective if it does not help learners attain their learning objectives. In this extent, tools such as IT, which enhance optimal utilisation of an IT system, are of paramount importance in terms of fostering effective e-learning processes.

Any tools that enhance IS quality receive scholarly support. For instance, Livari (2005) finds a positive correlation between satisfaction of users and quality of information system in case of mandatory systems. Livari (2005) also finds such relationship for decision support information systems. In higher learning settings, Arbaugh (2005) identified the capacity of ease of usability of internet blackboards as having positive relationship with learners’ perception of internet e-learning platform usability amongst university students. These platforms are developed through information technology. Consequently, IT plays the role of increasing e-learning system usability, which in turn increases the perception of the usefulness of internet-based e-learning platforms and the actual utilisation of the system by learners.

Quality of Information

Information quality refers to the various attributes of information that is offered through e-learning systems. They include precision, trustworthiness, set-up, clarity, and timelessness (Eom et al., 2012). Although many of these qualities depend on the information developer, IT may provide a means of availing information processing applications to ensure timeliness and unlimited availability of the information to learners.

Usability and Satisfaction of Users

E-learning system use refers to the utilisation of IS, which makes it possible for e-learning to take place, and the outputs of the e-learning system. From the perspective of its usability and user contentment, significant measures that may facilitate the determination of the role of IT in enhancing the success of e-learning system include parameters such as promptness, rate of recurrence, and extent of the system use (Eom et al., 2012). If IT enhances the success of e- learning systems, it implies that it can augment the development of applications that correlate positively with these parameters. Hence, it produces positive effects on e-learning system’s usability. It has individual positive effects in the learning process. For this goal to happen, IT must ensure that any e-learning system leads to satisfaction of its users.

System Usability and the Individual Implications

Any procedure or tool for enhancing the effectiveness of achieving learning objectives needs to produce positive individual impacts that enhance people’s utilisation of e-learning systems. DeLone and McLean define individual impacts with respect to IS e-learning systems as “the effects of information on the behaviour of the recipient” (Eom et al., 2012, p.153). While measuring the impacts of IT in the success of e-learning systems, possible measures may include learners’ performance levels and test scores. Incorporating IT in e-learning also needs to enable learners increase their speed and accuracy of decision-making processes in terms of their preferred learning systems such as e-learning or direct teaching in classrooms. Perhaps, learners should select a learning system, which reduces the amount effort that is required to achieve specific learning objectives and outcomes.

Satisfaction of Users and Individual Implications

Contentment with a particular learning methodology is critical in enhancing motivation of learners. Indeed, IT can aid in the development of interactive tools that ensure that learners consider e-learning the best option for learning. These tools may include animations of course contents and simulations. Such applications can produce positive implications on the leaner in terms of enhancing their capacity to grasp information. In fact, in an e-learning environment, Eom et al. (2012) confirm the positive correlation between user satisfaction and the anticipated e-learning outcomes.

Contribution of IT in enhancing E-learning

Information technology (IT) interweaves the lives of all learners. However, they may not perceive their dependence on computers, the internet, and online learning resources as a representation of the incorporation of IT in learning processes. Therefore, future generations of learners may not know any other way of learning apart from interactions with e-learning IS. In support of this assertion, Eom et al. (2012) assert that IT encompasses one of the essential tools and resources for facilitating learning together with teaching in all educational levels. In higher institutions of learning, IT enhances timeless interaction and collaboration of students and university teaching community.

The effectiveness of e-learning in attaining the objectives of learning and its outcomes depends on the incorporation of customised IT products in strategies of enhancing the distribution of the information through platforms such as university e-learning blackboards. Through IT, learning institutions also develop systems for information management, applications of object-oriented learning, and the creation of virtual classrooms.

Henry (2001) appreciates the significance of IT in e-learning when he defines it learning as “the appropriate application of intranet and internet technologies to support the delivery and management of learning, skills, and knowledge” (p. 250). Although this definition may attract some controversies, it evidences the need for development of applications for enhancing the dissemination of knowledge and skills through the internet. Software applications are developed by IS specialists and experts who deploy IT as a major tool for their developments. Thus, effective e-learning in an online environment cannot be achieved without the exploitation of IT as an organisational resource for enhancing the effectiveness of information systems.

Information technology is rapidly becoming the resort for organisations that seek to reach learners in different geographical locations. This finding implies that e-learning is not confined to classroom settings. Indeed, Henry (2001) suggests that through the power of IT, technology application replaces classroom session in many higher institutions of learning and some courses that were traditionally offered through direct instructions within a university. However, for success to be realised, direct instruction as a learning methodology requires applications with the capability of easing the process of accessing information that is offered through various platforms that support e-learning initiatives. Indeed, the e-learning industry may be divided into three main sectors, namely services, products, and technology.

For the product sector, learning materials are ineffective in terms of reaching the target audience (learners) without technology. As revealed before, technology for enhancing easiness of the use of e-learning platforms requires integration of the best practices and approaches for information technology in e-learning.

The characteristics of technologically driven generation make IT possess a noble role in enhancing the success of e-learning. In an era of information sharing through 3G mobile applications and broadband internet, learners use technology in recreation, work, and in school settings. Eom et al. (2012) support this argument by adding that whenever new technologies emerge, people embrace them in a bid to take advantage of their associated benefits. In particular, new technologies offer convincing learning powers. For instance, through IT applications, people can have access to information in either synchronous or asynchronous modes, or even both.

Selim (2007) asserts that students encounter challenges such as inexperience in using computers, especially due to inadequate skills in the use of basic computer applications, which affect their ability to engage successfully in e-learning. Although this claim is imperative, interaction with technological devices is becoming a common way of life in the digital era.

Upon noting the difficulties in the use of technological gadgets, IT experts develop applications that mediate people’s knowledge and experience levels in the use of the gadgets and languages that such gadgets understand. For instance, high programming languages have replaced machine languages in an effort to ease and enhance the utilisation of computers by people who have different skills and experience levels.

System Usability

E-learning differs from conventional learning approaches since it requires the unitisation of digital technologies. Wu and Hwang (2010) reveal that e-learning requires the transfer of various course materials through self-directed approaches without which it becomes impossible to achieve effectiveness in learning. Students are likely to take e-learning courses when they have experience in the use of e-learning platforms so that they can compare their benefits with the conventional approaches. Therefore, the more they utilise them, the higher the chances of selecting the platforms among a set of alternatives of learning modes.

In this extent, Wu and Hwang (2010) suggest, “students’ use of e-learning influences e-performance positively” (p.315). Encouraging the use of e-learning requires the development of platforms that meet usability expectations. Since IT forms the foundation for the development of computer-based platforms for information systems, it is possible that it also influences success of e-learning by providing mechanisms of enhancing e-learning system usability.

Usability is a function of perceptions of user satisfaction, efficiency, and effectiveness of the e-learning system. In the context of Kirkpatrick’s model for training and development, it refers to the reaction level. Reaction of trainee on training programmes influences the overall outcomes of the learning process (Wu & Hwang, 2010). Extending this claim to e-learning context, the reaction of e-learning system users affects their performance. Quoting the evidence from the work of Wu and Hwang (2010), usability produces positive implication on the realisation of the anticipated outcomes of e-learning.

Higher institutions of learning, which deploy e-learning methodologies to reach geographically isolated learners, must evaluate the reactions of learners to their e-learning systems, especially whether they meet learners’ expectations. From these reactions, Web 2.0 applications, which require the input of IT expertise, can help in fostering two-way communication between an institution’s staff and learners who are scattered across the world. Through learners’ response, it becomes possible to develop customisable e-learning platform specifications to meet different needs of culturally diverse learners. In this context, IT-based technologies help organisations improve their e-learning system usability in an effort to increase their effectiveness in delivering the goals and objectives of e-learning.

Studies that investigate the roles of IT in enhancing usability of e-learning systems pose the interrogative on the most significant usability requirement, which can be enhanced through IT. Responding to this interrogative, Eom et al. (2012) identify system architectural design as one of the factors that influence learner motivation to use a given system. Wu and Hwang (2010 support this attribute of the e-learning platform by adding that well designed systems for e-learning increase the intentions of learners to use them and the effectiveness of the learning process. Research on e-learning technologies supports this conclusion as it contends that people interact with information systems, which match their experience and knowledge levels in the use of IT-based learning tools (Henry, 2001).

In the e-learning, instructors may encounter challenges such as the need to communicate through writing as opposed to easier ways of articulating thoughts and the intended messages verbally. IT solves this challenge, which may influence the preference of e-learning among instructors. It avails tools such as video conferencing and video link sharing through social networking platforms. For learners who might find e-learning unsuitable for them due to usability challenges that are associated with difficulties in decoding information, IT technologies provide a solution through the provision of applications for translating written contents that are offered through e-learning programmes. Therefore, as new IT knowledge develops, many of the recurrent challenges that affect the usability of e-learning systems also become easier to solve.

Information Quality

Information quality constitutes integral traits of any effective e-learning system. Information that is provided through e-learning system needs to be reliable and dependable (Eom et al. (2012). Students should receive learning contents in the exact form in which the instructors compose it. Additionally, for reliability in terms of the period in which information is held in the system, the risk of information manipulation should not exist. In the online environment, e-learning systems interact with potential threats to information accuracy, system reliability, and dependability. Therefore, organisations or higher institutions of learning that engage their target audience in e-learning must provide a means of protecting information from malicious manipulation. Investments in IT applications for mitigating threats of information loss or unauthorised manipulations in an online environment are necessary.

IT can help in enhancing the effectiveness of e-learning systems by providing tools for guaranteeing information quality through mitigation of risks of espionage and sabotage. Espionage entails the practice or act of acquiring organisational or national secrets, especially on classified information and sensitive secrets from competitors, individuals, and even another government. The main motivation for engaging in this malpractice is to take advantage over other organisations via internet’s illegal exploitation of computers, software, and networks. In the derivation of strategies to mitigate such threats, applications that are developed through knowledge-sharing in IT such as firewalls become essential in guaranteeing quality of information from e-learning systems.

Sabotage is yet another risk to the quality of information from e-learning systems. Through sabotage, enemies intercept communication networks by partially or completely disrupting or replacing correct signals within wrong ones. Through malicious programmes, enemies may disable networks for an e-learning system, thus prompting the disruption of information flow process between learners and institutions. Consequently, reliability and dependability of the systems are threatened. In an attempt to curtail these risks, IT can help in the development of programmes for protecting or alerting an organisation on potential threats to the security of its e-learning systems.

Conclusion

Information technology permits institutions of learning to engage geographically isolated learners in an effective learning process. In an online environment, this effectiveness depends on e-learning system usability and quality of information. Quality of information is a function of consistency, steadfastness, and availability of an e-learning system while usability depends on design architecture of the system. Through the provision of knowledge for developing the applications of mitigating the risk of disruption or manipulation of information that is shared across e-learning networks, the paper has revealed how IT acts as an essential tool for ensuring quality of information, which is a key determinant of success of an e-learning system. By providing knowledge that is necessary for designing of user-friendly e-learning systems, IT increases the probability of users reporting a positive experience with an organisation’s e-learning system. The magnitude of positive reports on user experience with a system forms an important parameter for measuring the effectiveness of the IS system.

Nevertheless, negative reports also provide a mechanism of identifying necessary improvements to the system. In this extent, the paper has confirmed that IT provides tools such as Web 2.0 applications, which enable an organisation engage in a two-way communication with learners in an effort to resolve challenges that are associated with the usability of e-learning IS platforms.

Reference List

Arbaugh, J. (2005). Is there an optimal design for on-line MBA courses? Academy of Management Learning and Education, 4(2), 135-149. Web.

Benigno, V., & Trentin, G. (2000). The evaluation of online courses. Journal of Computer Assisted Learning, 16(3), 259–270. Web.

Eom, S., Ashill, N, Arbaugh, A., & Stapleton, J. (2012). The Role of Information Technology in E-Learning Systems Success. Human Systems Management, 3(1), 147-163. Web.

Henry, P. (2001). E-Learning Technology Content and Services. Education and Training, 43(4), 249-255. Web.

Livari, J. (2005). An empirical test of the DeLone-McLean model of Information system success. The DATA BASE for Advances in Information Systems, 36(2), 8-27. Web.

Papp, R. (2000). Critical success factors for distance learning. Paper presented at the Americas Conference on Information Systems. California, CA: Long Beach. Web.

Selim, H. (2007). Critical success factors for e-learning acceptance confirmatory factor models. Computers and Education, 4(9), 396-413. Web.

Volery, T., & Lord, D. (2000). Critical success factors in online education. The International Journal of Educational Management, 14(5), 216–223. Web.

Wu, W., & Hwang, L. (2010). The Effectiveness of E-Learning for Blended Courses in Colleges: A Multi-Level Empirical Study. International Journal of Electronic Business Management, 8(4), 312-322. Web.

Read more

Communication Technology Impacts

Introduction

The world is changing due to the changes brought about by the emerging technologies. According to Chandra (2003), communication technology is one of the main aspects of emerging technologies that has affected many sectors of the economy in various ways. As the world gets increasingly globalized, the need to share information has become greater than before. The business sector needs improved communication system in order to run its operations effectively. In the education sector, there has been need to share information among researchers, learners and teachers. In the health sector, medical practitioners need a communication system that can enable them share their new ideas on various issues.

The social environment has massively been affected by the advancement in information technology. The Facebook, YouTube, Tweeter, and other forms of social media have transformed the social structure of the global society. The political class has also found advancement in information technology affecting them in one way of the other. In this research, the focus will on the impact of advanced communication technology on education and business sectors.

Impact of Communication Technology on Business

Communication is one of the key components of the emerging technologies that have transformed the world into a global village. With the help of the advanced communication technology, it is now possible for a person in New York to chat with friends in Dubai, Nairobi, Berlin, London, and Tokyo at the same time using Facebook. The business sector has benefited a lot due to this advanced communication system. According to Aswathappa (2006), business units in the current society highly value information. This scholar says that information in the business sector has a major impact and can define the ability of the firm to fail or succeed in its operations.

For this reason, firms have found it helpful to use the emerging technologies to gather relevant information about the changing customers’ needs and preferences. The marketing department needs improved communication system in order to coordinate with other departments within a firm in order to deliver quality products into the market. It means that improved communication technology has had positive impact on marketing strategies of firms in the modern world. However, it is important to note that some firms have suffered in their marketing and production strategies because of improved communication system.

Chandra (2003) says that in the modern society, stealing of data in the business sector has become very common. It means that the improved technology has subjected firms to data insecurity. There have been attempts to address this negative impact, but a concrete solution is yet to be found. Improved communication systems have had positive impact on the logistics units in the business sector. Many business units are currently able to trace the movements of their products from one location to the other. This makes it easy for them to determine if the movement of these products has been faced with any form of problem. In case there is a problem, it would be easy to dispatch rescue team within the shortest period possible. This has seen this department become efficient in the modern-day business environment.

Managers of business entities have benefited a lot from the improved communication technology. In the past, managers of multinational organizations had to travel from one country to the headquarters in order to hold conferences. This was not only a costly process, but it was also consuming a lot of time. With the invention of video-conferencing technologies, this problem has found a perfect solution. Such conferences can now be held by these managers at their respective offices without the need to make any travels. Some of the multinationals that have implemented this technology have benefited from it. However, Chandra (2003) warns that this also comes with some challenges that a business entity must be ready to face. For instance, there is need for experts that can ensure that the system does not fail while the conference is in progress.

Improved communication technology has played a major role in helping firms develop their brands. The social media has been seen as the solution for firms that seek to reach wider market coverage.

Impact of Communication Technology on Education

The field of education has massively been affected by the advanced communication technology. For a long time, learning was considered to be a rigid process where a learner and a student had to interact physically in a classroom set-up. This made education very expensive, especially among those who were forced to leave their countries to overseas nations in search of education. However, the improved communication technology has successfully solved this problem.

Learners all over the world can attend a class at the same time without the need to move to the campuses of these institutions. Online classes have become popular as people embrace the emerging technologies. The field of research has also received a massive boost from the advancement in the field of information technology. With the advanced online information sharing platforms, researchers can easily share their findings and ideas over various issues in order to achieve the best solution to the research problem.

According to Chandra (2003), there is a culture that is growing in various parts of the world where learners shun books. They claim that the bulkiness of books makes it complex to carry and read these books. Advanced communication technology has helped address this problem. The e-books are now available for the learners. This has promoted the culture of reading among learners. The emergence of wikis has also played a major role in promoting consultative forums among the learners. The wikis enable learners from various parts of the world to share information and ideas freely on different fields.

According to Bak and Stair (2011), information communication technology has been very helpful in integrating stakeholders into an environment where they can freely share relevant information. Teachers can now reach parents and share with them the performance of their children or any other relevant issue. This makes it easy to address issues that may have negative impact on the learners. Teachers also use this emerging technology to promote consultative environment within the learning institutions. Management of institutions of learning has also found advanced communication technology very important in managing both the staff and students.

However, it is important to note that these benefits come at a cost. Wright (2000) says that when learners are allowed to access the internet, they rarely visit academic sites. They spend most of their time on social media, especially on Facebook and YouTube. This reduces the amount of time they dedicate to learning. Some even access sites with adults’ content that may end up polluting their mind. This has a serious negative impact on quality of educations learners receive.

References

Aswathappa, A. (2006). International business. New Delhi: Tata McGraw-Hill. Web.

Bak, O., & Stair, N. (2011). Impact of e-business technologies on public and private organizations: Industry comparisons and perspectives. Hershey, PA: Business Science Reference. Web.

Chandra, R. (2003). Universal education and technology in 21st century. Delphi: Kalpaz Publications. Web.

Wright, C. A. H. (2000). Issues in education and technology: Policy guidelines and strategies. London: Commonwealth Secretariat. Web.

Read more

Uninterruptible Power Supply Systems

Introduction

A power outage is the failure of equipment or equipment due to power failure. A power failure has been a major problem for both the industrial and domestic sectors. There have been issues of basic equipment in the housebreaking down due to power failure. Issues of television sets, fridges and even ovens breaking down due to this menace are very common in the current households. In the industrial sector, machines break down daily due to the power failures which occur very frequently (Brown 20).

Definition of a power failure and its effect

Electricity is indeed the source of power for most individuals currently. This implies that any slight interruption in its supply would lead to the suffering of several individuals. The data used in hospitals, institutions, offices, airports, and homes would be lost with the failure of power supply. For this paper, the HL and Wilman Company have also experienced the problem, and I have to provide solutions to the management. Unfortunately, power failures are inevitable due to brownouts, spikes, sags, and surges. Therefore, it is paramount to have a reliable and uninterruptible power supply like the UPS in most of the sectors.

Power failures are a threat to human life. Uninterruptible power supply becomes very synonymous with continuous power failures (Maniktala 45). The UPS can generate electricity then pass on to the electrical appliances to run should the mains fail to release power due to factors like faulty wires, sags, and surges. They also protect the electrical systems from damage due to physical factors, which could have, occurred due to fluctuation in the voltage. They are usually linked to battery packs that are charged to dispense electricity during a power failure.

Instituting uninterruptible power supply systems

There are two models of uninterruptible power supplies. These are the on-line mode and offline mode. The online mode operates even when the power is on while the offline mode operates when there is no power (Maniktala 45). The online model operates automatically when altering the situations while the offline must be operated manually to give it a start. Major stores that use on line models get booming businesses because they never cut short of power supply.

Types of power supply systems

There are two types of power supply. These are the AC and the DC, and AC is a variable type of power supply (Brown 22). It is usually prone to fluctuations in the voltage. This makes it the best in controlling the power failures as it will alternate to another form of power supply once the mains go off. THE normal AC line is in the order +/- 10%. This can go to higher levels when overloaded. When testing for stress issues like the weaknesses in the circuit line, the AC variable power supply must be used. AC was used in the correction of brownouts.

The voltages generation is by the use of transformers. Autotransformers can as well serve as the transformers (Brown 22). The transformer has multiple taps that help the switches in alternating the current. The most common AC used in monitoring the electric flow is the voltage, current, and power. Some products like the B&K Precision model 1655A are available for both variation and isolation. It is very applicable to soldering iron. The DC power supply is a little different from the AC. This simply fixes the power directly without alternating the current.

There are different types of DC power supplies. These are as follows. The battery eliminator is the least expensive in the market. It is both the least expensive and convenient for business use. They become expensive when one has to work on some battery-operated equipment. The constant voltage supply maintains the voltage set regardless of the resistance placed by the load (Maniktala 45). This only works well in homes and other small companies. Constant current supply will also maintain the set current regardless of the transformations in the resistance of the load. It has some jack terminals between the positive and the negative terminals. This applies mainly to the laboratories. The laboratories need a very safe power supply due to chemicals available in the laboratory.

Multiple output supply contains three DC outputs. They are useful and cost-effective but give very low voltage for the company (Brown 23). However, it can be used in timed operations where the power requirement is at some times. This would come in handy to the company should they need a power supply that timed but with low voltage. It also needs a computer to operate.

Conclusion

To crown up the issues in this paper, I hereby find it to be necessary to avert that the AC power supply is the best alternative power supply for the company. Other types of DC supply may be used to back up the AC. The AC supply power can alternate the current, and this makes it very viable to be used in the power supply line which is ever failing. This would enable my team to work efficiently and clear the work in time as stipulated by your company. The efficient and timely clearing of the work will squarely depend on the power failures experienced in the premise. Therefore, it is paramount to consider this issue before others.

Works Cited

Brown Marty. Power Supply Cookbook. Chicago, Newnes; 2001. Print.

Maniktala Sanjava. Switching Power Supplies A to Z. Chicago, Newnes; 2006. Print.

Read more

Information Security Program Implementation

What are the key considerations in the effective implementation of an information security program/ architecture?

Executive Summary

Information security has come to play a significant role in modern pacing, but the perpetually technically sensitive environment. Consequently, organizations need secured communications to benefit from the advance the information technology brings. The significance of this factor is to ensure adequate measures are implemented, and also to ensure the much-needed protection measures meet the acceptable level of security competency of an organization.

A trusted and secure environment for stored and shared information primarily enhances an organization’s business, efficiency and performance benefits. Conversely, an unsafe information systems environment establishes serious damage to individuals, organizations and other entities that could significantly compromise their security needs. Hence, a strong security program provides the basis for the successful implementation of the security-related program(s) in the organization. This provides the primary means an organization should endeavor to minimize the risk of inappropriate use of the organization’s information resources. Therefore, it is essential, when implementing a security program/architecture to consider several factors.

One factor worth noting is identifying information vulnerability and threats. This factor allows an organization to determine shortfalls that create loopholes to the security of information, and fix a fitting strategy to avert any security threat. Additionally, understanding organization technology advancement is critical. This allows an organization to determine the appropriate security program fitting their demands.

Other factors critical in while implementing a security program/architecture include; the level of security needed by an organization, cost-benefit analysis, organization structure, and data center availability among others. An organization that embraces these factors stands a better chance of having a reliable and effective system that guarantees the safety of its Information resource systems. Besides, the organization will benefit by reducing costs connected to an uncertain security breach. This paper seeks to explore these factors, among others in greater detail.

Introduction

Information security refers to the measures taken to protect information and the systems thereof against any illegal manipulation, access or destruction. An information security program, on the other hand, refers to the software and tools that provide the controls for the protection of information. When faced with an issue related to the security of information, the most probable response is normally that of implementing security measures.

However, this is not always the best action and hence calls for an analysis of the major considerations of an information security system. The main objectives of a security program in any setup include; providing protection, assisting in risk management and providing a basis for the setting up of security policies (Peltier 2001 p. 26). Any organization needs to ensure that the information security program in use is effective and suits the needs of the organization. For this to happen, several factors need to be considered.

Information vulnerability and threats

Information vulnerability and threats refer to the shortfalls that create loopholes to the security of information. An analysis of the vulnerabilities and threats is an indispensable element in establishing possible risks, hence dictating the security procedures and architectures that should be implemented (Peltier, 2002). The process of establishing the risks in an information system is fundamental before implementing an information security system.

The aspects of credible and reliable information that are primarily affected by unidentified risks include integrity, availability, and confidentiality among others. The workforce involved in risk assessment according to James Madison University (2010) publication is made up of people from various departments in the organization. They ensure the risks in all departments are covered. The most vulnerable points, however, arise where human involvement is particularly needed.

The first component involved in establishing threats and vulnerabilities is determining the value of information and assessing the threats in each case. Threats in the views of McCarthy and Grossman (2008) fall into four categories, which include “malicious actions both internal and external, acts of nature, acts of war and accidents” (2008, p.15). Secondly, carrying out the vulnerability assessment test, which involves; determining the possibility that certain vulnerability will be abused. This also entails evaluating the security policies and standards and quality control measures. The third step is determining the impact of each threat to information. This step is significant because it prioritizes the risks and the appropriate security measures. The final step is the identification, evaluation, and implementation of the security controls in order of the priority determined in the third step.

Vulnerabilities and threats are a key consideration in the effective implementation of an information security program. They determine the actual risks facing the information system. A proper analysis of these two tends to reduce the impact of the risks should they occur. A proper analysis of these two tends to reduce the impact of the risks should they occur, as stipulated by the National Institute of Standards and Technology (2003). This is because the risks are identified and safeguarding measures are incorporated in the security program implementation. Through this, it is also possible to determine the possibility of the occurrence of uncertain risks, hence coming up with counteracting measures should these risks occur. The areas that are identified to be most vulnerable are given the highest priority in the implantation. This increases the reliability of the entire system.

Research and previous experience with information security systems indicate that most programs are faced with vulnerability threats during the maintenance procedures. “This is as a result of the parties involved in maintenance who in most cases are usually third parties and the fact that they have to access the information systems” (Kiountouzis & Kokolakis, 2001, p. 17). The other threat that should be put into consideration is that posed by the malicious codes and viruses.

These programs are typically developed with the sole purpose of destroying and hacking into discrete information. Viruses are known to thrive in a remarkably dynamic process and the parties involved in developing and maintaining the information systems should be well versed with these malicious programs such that they can initiate measures of preventing them from infesting the information system, hence tampering or exposing the information (Layton, 2007).

Legal and regulatory requirements

Before implementing any information security program, the legal and regulatory requirements should be met to ensure that the organization complies with the law. The most salient feature, in this case, is ensuring that intellectual property rights have been adhered to as indicated by Martinez-moyano et al (2010). Martinez-Miyano et al claim that “this requires the integration of the comprehensive legal requirements so that the security procedures being used in the organization are globally acceptable procedures” (2011 p. 400). For this point to be fully provisioned, several elements need to be considered according to the NIST SP 800-53 (2007) article on information security implementation.

The first consideration is the possible legal actions that might come up against the information security program. Once this is established, it will be possible to assess the relevant legal requirements in place to avoid such confrontations. The second consideration is the cost of legal compliance about the benefits to be accrued from the information security program. If the cost exceeds the benefits, this means a different program or architecture should be adopted.

Next is the timeline aspect; that is the time required to implement the program as well as the period needed before the program requires maintenance. This is also necessary since it contributes to the cost of running the entire security system. Finally, it is the bulk of contracts that need to be put in place before the security system is implemented. This matters in the sense that a contract that requires multiple parties for it to be commissioned takes more time and resources and might prove inadequate (NIST SP 800-53, 2007).

The legal and regulatory requirements are, however, faced with several challenges according to an article by Sarajlic and Malkin (2007, p. 124). “One and the most important of this; is the changing nature of the global laws, regulations, and policies” (Sarajlic and Malkic, 2007, p.124). Research shows that there is a high level of conflict between the growing security requirements and the increasing legal challenges posed by globalization.

In the earlier years, compliance with legal procedures only involved being at par with the rules and regulations of that country or region. This has, however, changed with globalization since there has to be the integration of laws and regulations from different regions that the organization is in operation. The dynamic nature of laws and regulations and security issues is also another factor to be considered. Things are changing so fast that the information security programs being put in place should be dynamic (NIST SP 800-39, 2008).

Organizational structure

Organizational structure is another factor that should be considered when implementing an information security system in the sense that it determines who is authorized to access specific information (Zhang et al., 1988, p. 206). Zhang and his colleagues suggest that it is usually advisable to adopt the segregation of duties system since this ensures that no specific person has all the control of the information. He provides an illustration “where there is a chief information officer; there should be a chief information security officer who is directly in charge of the security team” (Zhang et al., 1988, p. 217). The responsibility of the chief information officer, therefore, in this case, is to assign responsibilities to the security team; the responsibilities should be rotated such that no one person has a designated area of interest. With this organizational structure, it is not possible to manipulate information in the wrong way since any such operation will have to involve multiple parties.

The organizational structure is a concern in the implementation of an information security program since it determines the level of confidentiality that should be put in place. In cases where the segregation of duties structure is in place, then little detail is set in the security system since this in itself is a solid security measure. Otherwise, security measures should be put in place to reduce the accessibility of information to unauthorized persons. Organizational structure is also a factor when determining who should access information and in what form. According to NIST SP 800-37 Revision 1 (2008), most organizations own internal information that is not supposed to be exposed to the public. The organizational structure in this case, therefore, provides a guideline to the team implementing the information security program.

Cost-benefit analysis

About the implementation of the information security program, cost refers to the resources required to put the system in place, while the benefits are the advantages that the security system will accrue to the organization. The cost, in this case, is about the development and maintenance of the security system. This alone cannot be considered as a factor without looking at the benefits that can accrue to the organization, as suggested by Yungton et al (1998). Youngtown et al allege “Some security measures are costly to implement, but they end up saving the organization a lot of losses as a result of information manipulation; on the other hand; other security systems could be expensive, but not effective to the needs of the organization” (Yungton et al., 1998, p.212). This means that implementing the latter would cost the organization more since it brings about less benefit.

The cost-benefit analysis is carried out by researching the security methods being applied in other organizations of the same nature. This method was proposed by McConnell (2001) and Melvin (2009) came to agree with the proposition. The merits and demerits of the security programs are analyzed to come up with a combination that will be advantageous to the organization’s needs and cost of operation (McConnell, 2001). In most cases, information security implementation procedures are generally outsourced.

This is because of the cost involved in developing the infrastructure from the root. Outsourcing has proved to be the best option since it involves getting into a contract with an organization that specializes in offering these services (Melvin 2009). The organization contracted already has the necessary infrastructure. This has proved to be cost-effective in most organizations. It should, however, be noted that in case the information security issue is a long-term need, it is usually advisable to have an internal system. Despite the cost involved in developing this system, the long term benefits exceed the cost, hence making it effective.

According to a discussion brought forth by Khalfan (2004), “the benefits of security investments are often seen only in events that do not happen”. Khalfan (2004) alleges it is impossible to prove a negative, hence wonders what value an organization places on cost avoidance” (2004, p.35). This is a challenge that has not only affected the security concern but has also contributed to the deterioration of processes such as “improving the quality of information security software, conducting security testing, maintaining appropriate documentation, and maintaining the software and hardware records stock records” (Khalfan, 2004).

Cybercrime is the most dreaded threat to information security, research conducted by the National Institute of standards and technology (NIST SP 800-39, 2008) indicated “investigations into the stock price impact of cyber-attacks show that identified firms suffer losses of one to five percent in the days after an attack. For the average, New York Stock exchange Corporation; price drops of these magnitudes; translate into shareholder losses of between $50 million and $200 million” (NIST SP 800-33, 2001). From this, we can conclude that the cost of not having an information security program is higher than the initial cost of implementing one.

Level of protection required

Before an information security system is implemented, another factor that should be considered is the level of protection required. Setting the scale for measuring this aspect can be challenging but it can be simplified by indicating the strengths and weaknesses of each security model proposed. The weakest factors that pose the greatest danger to the information security should be identified and given priority when developing the security system, as proposed by Aikins (2008) in his article “Implementing a Sound Public Information Security Program”.

Aikins explains that these should be the determining factors as to security measures being put in place (2008, p.21). For example, there are organizations whose majority of employees are made up of unskilled labor. The greatest internal risk to information, in this case, will typically be faced by the hard copy information since most of the employees are either un-computed or under-computed. The security measures in this case, therefore, will largely revolve around having lockable chests and ensuring that some areas have restricted access (Aikins 2008, p. 23).

This is, however, not the case in organizations dealing with computed individuals, (Danchev, 2003). In these instances, the information that is at risk is generally that which is stored as soft copy. This is most cases is usually the most sensitive information in the organization. Therefore, it requires more intelligent security measures such as storing information in encrypted formats or having files and folders under passwords. “This is, however, vulnerable to individuals who are acquainted with hacking, hence the need for a more dynamic security system that is unpredictable” (Danchev, 2003).

Technological advancement in the organization

Different organizations have adopted technology at different levels. This is the reason why information security measures being applied in one organization cannot automatically apply to another organization. According to Bernard and Ho (2009) organizations that have adopted high-level technology face more information security challenges owing to the creation of loopholes during the integration of the information technology systems (Bernard and Ho, 2009). Therefore, technology advancement should encompass high – tech security programs that can detect vulnerabilities that already exist and those that can come about. When dealing with security issues related to the advancement in technology, there are some factors that the organizations have to face.

First is the urge to undo some security details to accelerate the process of integrating technology. This might not be done cautiously, but the whole process of installing more advanced technological systems or improving the existing ones automatically creates a loophole. This is an issue that in most cases cannot be controlled, but security measures should be put in place to counter any security issues that can occur as a result of this. The second factor that should be considered is the legacy of the existing security measures if any.

Bernard and Ho indicate in their article that there are those security measures which might have existed in the organization for a long time, but have been deemed obsolete owing to technological advancements, hence needing replacement (2009). Any other security program being put in place should not divert so much from this, instead; only the relevant changes should be put in place to save on resources (Klein & Menendez, 2003).

Information systems are known to mature over time and during this time more vulnerable areas and risks tend to be exposed. This is why any information security program being installed should be dynamic, and be able to change with the changing nature of the organization according to the stipulations brought forth by Peterson (2006) in his article. Again as the information systems grow, they become more complex hence requiring an equivalent security level. Peterson explains “an information security system that stands the test of time and proves effective should be maintained in the organization, with only minor changes being conducted when the need arises” (2006, p.47).

According to this discussion, therefore, it is necessary to consider the organizational information technology trends when implementing a security program. The program is put in place should be flexible enough to cater for the changing needs of the organization. This will save the organization from the need to frequently change the information security system about the changing technology. In some cases, however, it is never about new or old technology, but existing technology whose potential had never been realized. Some security measures might have been used under different circumstances earlier on just to be discovered for a different application. In such a case, it is not necessary to totally transform the entire security program but just to make some relevant changes to the existing ones.

Datacenter availability

The other factor that should be considered before implementing a security program is the availability of a data center in the organization. Dhillon defines a data center as a repository for vast quantities of computing power and storage upon which applications are built” (2007, p.12). He goes ahead to explain that this is a department handling information both in raw and processed forms. In the presence of a data center, the safeguard measures to be taken to protect information are minimal since it only revolves around a few individuals who are in charge of the data center. However, this area requires exceptional attention since it carries the entire information of the organization. Any unauthorized access to this information endangers the organization since it can lead to a leak of extremely confidential information.

The data center is normally connected to the other departments via LANs which are interconnected through all the departments. This is where all this information is analyzed, and the possibility of fraudulent activities detected. In large organizations, there usually exists more than one data center, hence increasing the need for more security measures. These data centers are a crucial consideration when implementing the information security programs since they are at the core of the organization’s security concerns. For any malicious activity to be conducted, the parties involved have to begin from the data center since that is where incriminating evidence will be obtained (NIST SP 800-33, 2001).

When dealing with organizations that have data centers, caution should be exercised because of the complications that can arise from this department. Where multiple data centers are involved, it might be difficult to determine exactly where the problem has occurred. One of the best measures to put in place in such cases is that of random rotation of duties, such that a mess caused by one person can be detected by another one and action taken to prevent further losses. Random rotation of duties means that it is not possible to determine who will be handling which duties in a day or two. This minimizes the possibility of an individual or a group of individuals to organize any misdemeanor of the information.

Putting into consideration a data center when planning a security program has several advantages. First is the ability to track all the operations in the organization from the data center. This happens with the help of CCTV cameras and motion sensors. As a result of this, it becomes possible to know who was where at what time, hence being able to recognize the people who perpetrated crimes in case they occur. The other advantage is the ability to store and disseminate information in different formats. From the data centers, information can be stored in different ways and transmitted depending on the intended recipient. This control enables the filtering of information such that people in the organization get access to information that is only relevant to their needs. The information security team must consider having a data center in place when developing a security program or architecture.

Conclusion

Information security is a continuous mechanism of ensuring the highest level of protection of information from unauthorized access and manipulation. This implementation according to Peterson (2007) involves consistent training, evaluation, response and reviewing. From this, it is clear that information security is an ongoing procedure that lasts through all the cycles of the organization. It is not possible to have a perfectly effective security system. Perhaps, this is why any information security system should be flexible enough to change with the changes taking place in the organization.

References

Aikins, S K 2008, ‘Implementing a Sound Public Information Security Program’, In G Garson & M Khosrow-Pour (Eds), Handbook of Research on Public Information Technology, Florida, pp. 689-698.

Bernard, S & Ho, M 2009,‘Enterprise Architecture as Context and Method for Designing and Implementing Information Security and Data Privacy Controls in Government Agencies’ In P Saha (Eds), Advances in Government Enterprise Architecture, pp. 340-370.

Danchev, D 2003, ‘Information security best practices’ checklist for best practice IT security measures, Web.

llon, G 2007, ‘Principles of Information Systems Security’, Text and Cases, Vol. 2 no. 5, pp. 12 – 14.

James Madison University, 2010, Computer Science applications: The information Security problem. Web.

Khalfan, A 2004, ‘Information security considerations in IS/IT outsourcing projects: a descriptive case study of two sectors’, International Journal of Information Management. Vol. 24, pp. 29-42.

Kiountouzis, E & Kokolakis, S 2001, ‘Information systems security’, facing the information society of the 21st century, Vol. 15 no. 2, pp. 17 – 19.

Klein, S, & Menendez, J 1993, ‘Information security considerations in open systems architectures’, IEEE Transactions on Power Systems (Institute of Electrical and Electronics Engineers), Vol. 8 no.1 pp. 224-230.

Layton, P 2007, ‘Information Security’ Design, Implementation, Measurement, and Compliance. Vol. 1 no. 12, pp. 123 – 221.

Martinez-mono, I, Conrad, S, & Andersen, D 2011, ‘Modeling behavioral considerations related to information security’, Computers & Security, no. 30, pp. 397-409.

McCarthy, R & Grossman, M 2008, ‘Privacy and Security’, Where do they fit into the Enterprise Architecture Framework?. In R Subramanian (Ed.), Computer Security, Privacy and Politics: Current Issues, Challenges, and Solutions, pp. 180-194.

McConnel, K 2001, Information security program; information security office. Web.

Melvin, C 2009, Information security program, information security, cal poly, Web.

National Institute of Standards and Technology 2003, DRAFT FIPS Publication 199, Standards for Security Categorization of Federal Information and Information Systems, Web.

NIST SP 800-33 2001, Underlying Technical Models for Information Technology Security, Web.

NIST SP 800-37 Revision 1 2008, Draft Guide for Security Authorization of Federal Information Systems: A Security Lifecycle Approach, Web.

T SP 800-39 2008, Draft Managing Risk from Information Systems: An Organizational Perspective, Web.

NIST SP 800-53 2007, Recommended Security Controls for Federal Information Systems, Web.

Peltier, R 2001, Information Security Risk Analysis, Auerbach Publisher, Florida.

Peltier, R 2002, Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Vol. 2, no. 2, pp. 13.

Peterson, G 2006, Security Architecture Blueprint, Web

Peterson, G 2007, ‘Top Ten Information Security Considerations in Use Case Modeling’ Web.

Sarajlic, N& Malkic, J 2007‘Data protection, and association rules analyses in IT network management’ Information System Security. pp. 121-127.

Youngtown, J, Reilly, P, & Teich, J 1998, ‘A software architecture to support a large-scale, multi-tier clinical information system’, Proceedings / AMIA… Annual Symposium. AMIA Symposium. pp. 210-214.

Zhang, Y, Yang, L, Zhou, Y & Kuang, W 2010, ‘Information security underlying transparent computing: Impacts, visions and challenges’, Web Intelligence and Agent Systems: An International Journal. Vol. 8, pp. 203-217.

Read more

Fire Service Risk Management Plan in the UK and Iran

Abstract

This paper compares risk management planning in the fire service in the UK and Iran. According to Rasbash (2004, p. 12), a risk management plan is described as a document prepared to predict hazards, evaluate impacts, and explain responses to concerns. In addition, it also covers risk management matrix. On the other hand, a risk is defined as an indefinite occurrence which could have either a negative or positive impact. Risk is intrinsic in any kind of society and policy makers should consider risks constantly so as to develop proper strategies in addressing them. One of the most risky events in any organisation or society is fire. Fire outbreaks cause much devastating, effects ranging from destruction of properties and ecosystem, resulting in loss of lives. Therefore, fire service organisations have been developed in all countries worldwide.

According to Smalley (2005), fire service is described as a public or private institution that offers firefighting and rescue services in a particular jurisdiction including a metropolis, province, or fire safety district. Generally, a fire service comprises of one or several fire stations, which could be operated by professional firefighters or volunteers or even a combination of both. In addition, a fire service could also offer a fire safety or fire avoidance services. In these services, firefighters could make a visit to different households and offer their proficient fire safety advices or fix fire gadgets such as smoke alarms to the families. In most nations, fire protection or preclusion is perceived as a significant responsibility for the fire service, since the very act of preventing the fire occurrence can apparently save lives. Most civic or metropolitan fire service sectors also conduct an implementation role, to make sure that commercial houses such as offices, hotel rooms, workshops, and many more are fitted with enough fire protections to make sure that during fire outbreak, individuals can securely relinquish the buildings without any injury. However, fire service also faces risk along the line of their duties, which makes it necessary to have proper risk management plans.

Introduction

The fire service available in the UK function under distinct jurisdictive and organizational structures in wales, Northern Ireland, England and Scotland. Fire service sector have experienced substantial modifications since the start of the 21st century. This has been impelled by the decentralization of the federal goverment powers, new set of legislations as well as a transformation to effective measures with regard to terrorism attcks and fears. One of the facilitator for the transformation arose from the 2002 write-up of an evaluation of the fire service in the UK, which was conducted by Professor Sir George Bain. His review was entitled ‘independent review of the Fire service’, and it resulted into fast modifications to the fire and rescue services in the UK. Laws concerning fire services in both England and Wales started operating in 1865 when an act reffered to as Fire Brigade Act was enacted. It took the obligation of providing fire services from insurance to corporations. During that time, there were approxiamtely 1,600 brigades all over the united kingdom.

In Iran, fire services are provided by firefighting organizations. Creation of these institutions have been facilitated by advancements in technology and industry throughout the last decade. The first major firefighting service in Iran was started in 1842 when Tabriz was inhabited by the Russian troops (Houtsma, 1993). Currently, there are several firefighting organizations distributed all over Iran. The aims and objectives of this paper is to illustrate a comparison between risk management in the fire service in the United Kingdom and Iran. This paper is based on a research conduceted through reviewing already established works on this topic. Some of the research works that have been presented that focus on this issue is reviewed to help in providing a more insight. Finally, the results of the reserch is provided. Even though, there are several issues discussed with several authors, which present diverse views in this topic, only publications that help in illustrating a comparison in the risk management planning in the fire service in the UK and Iran is analyzed.

In line with Rasbash (2004), a risk management plan entails an examination of the expected risks with both high and low effects, and extenuation plans to help in curtailing the harmful impacts of an unpredictable event should it occur; like fire outbreak in this case. Risk management plans have to be revised sporadically by the professionals and policy makers to evade having the study become old and not insightful of the real potential hazard. One of the most important elements of risk management plans is the inclusion of a risk strategy. Generally, there are four major approaches, with several disparities. These include; risk avoidance which involves strategies to avoid the risk, risk vindication to diminish the likely impact through intermediary steps, risk acceptance that involves taking the chance of the harmful effect, And Transferring of risk, which involves subcontracting the risk to a third entity that can manage the consequences. For instance, this could be accomplished financially by employing insurance contracts or prevarication dealings or operationally by subcontracting an activity. Risk management is considered an indefinable term, and it raises contemplations of safety surveys, invasive checkups, subjective regulations, as well as consequences for desecrations. Even though risk management has been largely embraced by the private industry because they realize the importance of proper risk management plans, the fire service has conventionally assumed a more inconsiderate approach toward this subject.

A good risk managements plan will provide a guarantee that objectives set by the fire service will be achieved, unpredictable events will have more injurious impacts, and generally set goals are likely to be met (Grant & Hoover 1994, p. 92). It does not eradicate risks; rather it helps in managing these risks to minimize their devastating impacts. The prospective advantages of a proper risk management plans are: supporting tactical and fire service planning, assisting in the efficient utilization of resources, enhancing an uninterrupted improvement in service delivery, minimizing jolts and undesirable shocks, rapid clutch of fresh prospects, improving proper communication between fire service providers and the public and encouraging stakeholders in the fight against fire risks.

Methodology

The preliminary phases of this research involved visiting three diverse fire and rescue areas in both the United Kingdom and Iran to get a clear picture of the present practices regarding fire risk management planning undertakings. In the course of such visits, semi-structured discussions were employed in developing a comprehension of an integrated risk management planning associated with undertakings and the tools utilized by the Fire risk and rescue services. In the United Kingdom, the three fire and rescue areas visited include: Fire rescue and service station 1 located in South west of England, station 2 in East Midland and finally station3 located in Scotland. In Iran, the three stations visited were located in the Shiraz municipality Firefighting and protection service society. The results obtained from these stations will be presented later. In addition, much of the secondary research was also conducted in the Library and internet.

The research will adopt purposive research technique/method that holds requisite incentives to ensure the realization of credible results. The technique is relevant in ensuring that, the purposive nature of the study (risk management planning in the fire service in the U.K. and Iran) is achieved. This research will go through research design, literature review, primary data collection, data compilation, analysis, and derivation of the intended findings. This will involve both primary and secondary methods where raw and established data will e utilized respectively. Purposive research technique will provide the researcher with superior study mechanism that is relevant in executing investigations with well-orchestrated objectives. The technique ensures that the purposive nature of the topic under study is understood adequately. This will help in identifying viable sampling techniques including respondent identification and delivery of credible information.

As indicated, the primary methods will help in identifying resources and respondents. This will be based on professional judgment and relevancy in providing pertinent information. In the primary context, the study will be executed successfully by applying the designed techniques comprehensively (Flick 2011, p. 98). Consequently, the research method used will provide potential guidelines to facilitate the identification of credible data collection techniques. On secondary methods, electronic materials from credible sources will be used. This will incorporate the adoption of superior data gathering procedures where use of questionnaires and electronic resources will be applied in this context (Goddard & Melville, S 2001, p. 55). The questionnaires will be presented randomly to the selected sample size. Indeed, the techniques will provide superior and detailed information based on the research topic formulated. For this research, a review of established works available online as well as library was selected as they were considered appropriate.

Justification of this methodology

As indicated, the methods hold immense relevance and significance in driving purposive research ventures. They give the researcher a superior guideline and freedom to choose the sampling size, population, and data collection procedures based on his/her professional judgment and relevance. According to Russell & Purcell (2009, Pg. 73), a research methodology is very significant in any dissertation not only so as to accomplish the set aims and objectives but also collect sufficient data. The greatest advantage of using online research method is the instantaneous accessibility of the required information. There are several databases with much information that could be accessed any time. Information from various publications such as articles, books, as well as scholarly journals written by professionals on the subject could be accessed easily. The library provided the best source of primary information available in the books, newspapers, original diaries and maps. Actually, library provided more primary source of information for this research compared to the internet. There are several reasons for selecting library as a major approach for this research. Besides the availability of lots of reference publications such as several books, professional encyclopedias and magazines, there also librarian assistants and numerous computers to use (Mann 2005, Pg. 102)

Even though internet and library provided good sources of information on fire service in the two countries, there were some challenges encountered with these methods. For instance some of the articles and journals found in the internet have never been assessed or carefully screened by professionals. This implies that some information from these sources could be false, not accurate or not valid. Materials available online are highly disorganised, prompting much research or excellent skills in conducting research to find the most appropriate information. Besides, there is a charge paid for accessing articles that proved costly for some materials. Equally, library research also takes much time since several books and publications have to be checked from time to time to ensure that the information is in consistent with the subject matter. Some materials also could not be found in the library because they are lost, misplaced or borrowed.

To overcome these challenges, careful assessment of the material used for research was taken into consideration. In order to assess an appropriate source of information the author of the particular publication was analyzed. In addition, the author was checked if he or she has a relation with any trustworthy institution and whether the publication is his or her own or acquired from somewhere else. Finally, the date of review was considered to find out if the material is outdated or it is current. Adequate amount of time was allocated for this research so as to find appropriate materials from the internet and the library.

According to Keith et al (2007), researchers have to apply rigorous judgment in making appropriate decisions with regard to which library or internet source is used in a research. The core issue in the suitability of any source used for this research is relevance to the topic and suitability for this particular research and explicit research questions. In considering the suitability of any source of information for this research there were some factors that were considered. These include the scope, audience and timeliness. The scope involved careful analysis of the topics as well as subtopics covered by the source and the universal impression of the subject matter. The target audience considered the intentional readers of that particular publication and how best it could be in line with the expectations and the purposes of this research. The crucial factor for fruitful assessment of an internet information research source, just like any other study sources, involves applying careful reading as well as intelligent thinking about the content.

The proposed study purposively chose all the samples within the chosen parameters. After this purposive selection, there was an application of random sampling procedures with equal chances and opportunities given to all the possible partakers into the proposed research. Application of various statistical formulas and inferences including the use of the Fischer’s formula in determining the sample size requirement will be applicable. The exclusion and inclusion criteria will therefore depend on whether the research is to be extensive or not. The samples will be chosen due to their intensive involvement with the fire problems and solutions within a relatively new environment.

Due to this factor, they are reportedly bound to experience notable challenges within the UK and Iran’s fire systems, and particularly, on the topic of effective comprehension of fire problems. Both the qualitative and quantitative approaches of research were applicable in the proposed study. This mixed methodology was critical in enhancing the triangulation objective and determining the best applicable strategies for unveiling the results. The quantitative approaches considerably involved the application of such mechanisms like the structured questionnaires and general questions. The approach of secondary methods was widely applicable for most studies across different investigative fields. This is mainly because the approach has the competency to offer the unique and powerful depths of the distinct outcomes and results.

Literature Review

A lot of research has been done in the field of risk evaluation and management not only with regard to fire but also on other emergencies. However, much of these works have largely been based on determining the likelihood of risks as well as their effects measured in terms of destruction of properties and lives. This has been done by modeling fire progression and spread. In the United Kingdom, development of fire service risk management planning at present is based on the incorporation of the routine and usefulness of prevention and security measures applied in constructions. This is done with an aim of allocating equitable resources for better services. However, less attention has been focused on this approach.

In recent times, an effort was made by the department of communities and local government, the home office, and the office of the Deputy Prime Minister carried out an investigation on evaluation of risk in line with the creating suitable system for planning Fire service Emergency Cover. Relatively, this research work gave rise to the advancement of a toolkit to evaluate risk, plan for suitable response action, and model the magnitudes of resource utilization. Nevertheless, the new necessities of an integrated risk management planning in the UK that require an all-inclusive and incorporated method and emphasize on prevention are creating extra research difficulties. Some of these challenges include; Lack of substantiation centered approaches for the evaluation of the efficiency of the prevention and security measures used in various houses, complications in evaluation and forecasting assets, heritage, and human loss, and finally necessity for rational decision making gears to help in selecting the cost effective provision of prevention and protection resources.

Risks that influence structures and threaten the lives of human beings are increasingly becoming key concerns of the 21st century society (Grant & Hoover 1994). Management of these jeopardies and developing appropriate response mechanisms to emergencies like floods, fires, and terrorist attacks is significant and necessitates proper planning so as to effectively guarantee negligible influence on the society. In 2003, the government of the United Kingdom published a white paper titled ‘Our Fire and Rescue Service’. This paper triggered reforms that emphasized on the responsibility of the Fire and rescue service in preventing the occurrence of fires as well as mitigating the impacts. In addition, this paper extended the mandate of fire and rescue service in handling other emanating threats that are associated with change of climate and artificial disasters (Smalley 2005). Consequently, a new constitutional framework is currently available that puts the obligation of producing integrated risk management plans to fire and rescue services. Besides helping in planning for emergencies, this strategy also assists in responding to them.

Even though there is minimal research that has been conducted with regard to the fire services in Iran, there are literatures that touch on this topic. For instance, the department of fire service and rescue services based in Shiraz did a research in the history of the development of firefighting and rescue service in Iran. According to this research progress and developments in the fire service has resulted into a decline in the risk associated with them. This research reveals that a lot of effort has been made to ensure that there is proper risk management planning in the fire service in Iran. In 2003, a research was conducted by Mahdavi, Fallah Shamsi, and Nazari on Forests and rangelands’ wildfire risk zoning using secondary techniques. According to this research wildfire that occurs, mostly, in the forests and rangelands despite their causative factors are regarded as an ecological disasters (True 2001).

The management risk employed by the Iranian government in dealing with these disasters majorly includes the risk management planning. According to these researchers, zoning of the natural regions based on their vulnerability to fire or fire risk is significant to prevent the incidences and decreases the disastrous losses that could result from these fires. Therefore a sound fire risk management plans is one of the key factors towards the realization of this factor. In their research, they used a zoning map that focused on the wildfire menace in the forest and rangelands using GIS (Geographic information system), Analytical Hierarchical Processing as well as remote sensing methods. A total area of 196,000 hectares of land positioned in the western parts of Iran was used as a study area (Louis, C 2007).

To be able to plan effectively to reduce risks in the provision of fire services, knowledge of inducing factors are very important. The major factors that contribute to the occurrence of wild fires in Iran is comprised of the present land use or cover, presence of roads and rivers, in addition to physiographic, environmental and anthropogenic themes. They calculated weight for each factor that is likely to result into fire hazard and classified them into different categories. This assisted in the development of a map of factors and production of the eventual map of the wildfire risk zoning.

Lastly, the zoning map of the danger of wildfire that was produced through this process. The map comprised of five different classes of the risk graded from high risk to low risk. The results from the research indicated that 50% and 40% of the fires in this region, originated from the areas that were manifested as high risk and risky areas indicated on the map, correspondingly (Kreimer & Arnold 2003). The outcomes from this research showed a high agreement of the map of wildfire risk developed in the research and the positioning of the fires in the area under research. This study proved very important in this research because could help in predicting well over 90% of the fires taking place in the forest and rangelands. The data from this research is used by the fire risk management and planning not only at regional level but also national levels (Rafilson 2009).

Contextually, Quality Assurance services are always vital for the fire rescue services as they ensure that the life of the general public is safe. Through the application of the quality assurance services, the fire companies will be able to respond to various emergencies on time; hence, prevent casualties that might arise (Grant & Hoover, H 1994). For instance, any fire company will be able to quickly respond to more grievous occurrences. This include when people are captured in buildings, and other rescue operations that require specific skills and equipment. By applying various strategies and techniques, the chances of the casualties occurring will be slim. Moreover, workers of the west Yorkshire fire service will be able to save property and lives citizens.

There are a number of quality assurance services that can be used by the west Yorkshire fire service to ensure that their business, workers and the society at large have access to better services (Great Britain 2006). The company should ensure that it has necessary equipment and machines that can ensure that they are ready to quickly respond to an emergency on time. According to Rafilson (2009) quality assurance services like installing smoke alarms in large organisations, institutions and schools will greatly help through quick response. For instance, the alarms will alert people who are at risk. West Yorkshire fire service will provide thorough training to their members and the public at large to ensure that they are on the safer side (Clark 1991).

The company will also provide adequate measures on how to obtain more information regarding operational risk (IAFC & NFPA 2009, p. 213). For any fire company to achieve its goals and objectives, the community must also pay an important role through active participation in the mentioned processes. On the other hand, the Iran government should also ensure that it recognizes and evaluates some of the areas that are prone to face various risks including fighting fire, solving problems of civil strife, domestic crises of terrorism and chemical seepages and spills. Additionally, the Iran and U.K. government should also work close with the communities and a number of partners within their country and internationally (Clark 1991, p. 60).

The UK government is providing some funds to the company to ensure that they are able to purchase the necessary equipment used fighting various crises (University of Surrey, 2012). Consequently, this will reduce the number of deaths and injuries that might arise in the various disasters. The Iranian fire departments should improve their control rooms to ensure that they are able to receive information from different parts of the country. Therefore, they will be able to respond to the crisis on time and rescue lives and properties. West Yorkshire Fire & Rescue Service has introduced computer application to store their important information and to receive complaints from the local and international community (Shelley, Cole & Markley 2007). In addition, they can easily forecast and manage the availability of their workers.

The other quality assurance systems that can be used by the West Yorkshire Fire & Rescue Service (FRS) in regard to quality enhancement within the organisation is by presenting some fresh command support trucks that can be used to help the incident commanders. Consequently, the commanders will be able to easily handle some of the complicated incidences that might arise (Cote 2004). The commanders will also be able to easily communicate with the fire control operators to ensure that their operation is successful. Basically, nonetheless, property losses due to fire breaks should be averted at all costs. In this context, a fire department is provided by the local administration to ensure that any emergency cases are easily dealt with by a group of dedicated and professional persons. Crowd management, disaster management, and injury management are some of the duties of fire departments. With fire departments playing these crucial roles in Yorkshire, several matters related to the running and services of Yorkshire Fire & Rescue Service departments have been litigated upon. Most of them have been judicial precedents, which have influenced the management, service delivery, and set up of fire departments. A few might not have had an impact, but generally, court decisions being binding to states have forced new legislation as a way of protecting the public (Kreimer & Arnold 2003).

Results

The results obtained from this research indicate that United Kingdom adopts an integrated risk and management planning approach towards firefighting in their jurisdiction. In all the stations visited in the Fire and rescue services regions, an integrated risk and management planning in done as a constituent of their commercial or business planning process. The guidance transcriptions intended for integrated risk and management planning are clearly written and quite easy to apprehend. However, these guidelines are not openly linked to the content and the scope of the plans that takes place in the actual ground. In addition, it was sensed that these guidelines lacks lucidity in comparison to the earlier guidance documents. There have been key modifications in the manner of fire and rescue services plan for delivery of their services, particularly subsequent to the introduction of the integrated risk management planning. The scope of planning progressed from a perspective based, which was subjugated by the operational subjects, to planned approach that focuses at the safety of the community. This concept results into change of outlook within various stations at all ranks creating some pressures associated with allocation of budget for the security of the community and operating charges. It was debated that it is challenging to measure the actual benefits of prevention processes that have been embraced.

There is a disparity in a manner in which the integrated risk management planning is perceived by the community and local government as well as the various fire and rescue services in the regions. The community and local government is in quest for a broadly described impending plan for the fire risk services. However, fire risk services comprise of a comprehensive planning and precise operational consequences. Fire risk services need to preserve some sovereignty and thus assent to the trade-off between the community and local government providing clear guidelines and being too authoritarian. Furthermore, planning for adjacent establishments can be intricate particularly when boundaries overlap and thus risking some regions. Generally, even though fire risk services in the United Kingdom enjoy the autonomy of creating their integrated risk management plans individually, there is some deficiency in the lucidity in the integrated risk management planning process. Therefore it is necessary to adopt appropriate practices in the development of guidelines in the management of fire risk (Kreimer & Arnold 2003, p. 147).

One of the major factors that facilitate fire risk management planning in the United Kingdom is fire safety audit. During fire safety audit, there are audit forms that are used by various stations visited. Station 1 and station 2 used the most current version of the chief fire officer association fire safety audit forms. On the other hand, station 3 used the Scottish Fire safety audit forms. The major variation is that the risk assessment section that exists at the bottom of the audit form is not included in the Scottish Fire safety Audit Form. Station 1 and station 2 employed a GIS based approach for the evaluation of risks and resource planning, while station 3 used a Fire Service Emergency Cover for the same purpose. Equally, staff of station 1 and station 2 interviewed indicated that this approach is very easy to use and was very effective in providing accurate data required. The system could be configured to meet their requirements for any kind of project they need to work on. These systems were very helpful in the planning of adequate resources to be used in management of fire services risk (Barr & Eversole 2003, p. 82).

In Iran, the three stations in Shiraz municipality visited included station 1 which was founded in 1972 in the Horr Square, station 2 in 1977 in Khold-e-Barin Park and finally station 3 founded in station 3 founded in 1979 in Khatoon Square. Shiraz firefighting institute was founded by the firefighting division in the organization of Shiraz municipality. Currently, the organization has a total of thirteen stations located in different areas in Iran. Accordingly, the visit revealed that they have 44 light and heavy duty gadgets, well equipped with wireless communication systems. One of the major strategy that they have put in place at the moment to reduce the risk of fire is the employment of rescue unit. This is to help in combating the firefighting challenges in both ancient urban structures, present buildings and to prevent losses associated with fire risk.

The use of motor vehicles in providing fire services have proved very effective to them with regard to decreasing the responding time during such emergencies. Training is offered by the pertinent personnel (Russell & Purcell 2009). Further interview with the staff from the three stations revealed that nearly 360 qualified and trained personnel have been employed in various sectors. As part of their fire risk management planning, the staff has been grouped into six different categories. These teams include; the firefighting team, the rescue team, the motor-cycle rescue team, the water diver rescue team, the mountain rescue team, and finally the well rover rescue team. Categorizing of the staff is very significant in planning for resources to be used for firefighting risk management (Cote 1988, p. 142).

By examination of pertinent document used for this research, firefighting started in Iran from very early times. It was started by Russian troops that colonized Iran. They did not provide services for individuals in the society but for their own political benefits. They started a firefighting station in Tabriz, which historically became the first fire-fighting station in Iran. Owing to the formation of different economic infrastructure all though Iran, start of fire service units began in various locations. Much of these stations were located in economic and industrial regions of the nation. The major planning strategy was to ensure protection of the major investment centers and the amenities established. This was to serve a prevention and protection role for the incidences of the fire outbreak that could result into destruction of properties.

The effective response to fire emergencies is a matter that the public is keen on and the water rescue department has to be well prepared for such emergencies. Addition of equipment in the fire brigade companies is a strategy that would be used as the head of department in the fire rescue team. The rescue team must be well equipped so that they perform highly. Flocculation devices, foams, and CO2 gases are also other equipment that the team must have other than the medical supplies. However, it is important would complement this strategy with others so as to improve the efficiency of the firefighting departments. The combination of high quality knowledge, experienced professionals, and field trainings are other strategies to be adopted. The staff in the fire rescue department must know basic defensive swimming tactics to assist them avoid injuries improve their safety when paddling. The staff must also know some of the basic strategies of swimming in floods that are calm and those that are violent (Collins, 2004). The fire rescue team members must always wear a personal floatation device when going into the fires. During crisis, reasonable decisions can be compromised if things are not done promptly and appropriately. Burning under fire is likely to occur if the firefighting devices are not used.

The department can also buy throw-rope bags. Officials in the department should learn how to use them. Consequently, the rescue officials can utilize them during rescue missions by throwing them to the burning victims. The foam must never be thrown to the rescuer as the fire currents may pull him/her in the fire and worsen situation. The department can also secure tragedy scenes as another strategy to ensure that no burning takes place. Securing the scene ensures that untrained people in the area do not get in the fire as they are likely to suffer. Concurrently, it will be easy for the ambulance services to operate. During this process, the team will also assess factors such as the speed of the fire, debris, and even contamination (Collins, 2004). This is done to consider how the fire can affect the victims and the rescuers.

Finally, it is important to ensure that the department responds quickly to emergencies through on-site command centers. This enables the team to quickly and accurately examine the situation. Firstly, the command center has to know the number of victims, their conditions, and then plan on how to help (Rhea & Rousseau, 2010). The plan should start with the victim facing the lowest risk and move to the one in the most risky position. The options usually are to reach the victim or throw him a rope if you cannot reach him. If the rescuer is in a boat, he can row and move towards the victim. The command center must always check the factors that can affect the rescue mission for example the fire level. The medical personnel must also be ready at the command center to give attention to people who have been saved.

It is important to work as a life guard. The job involved being at hazardous areas beach watching swimmers. I had to be keen and assist any of the swimmers who had difficulty getting out of the fire. This job relates to the work of the fire rescue team as they both involve assisting or removing victims from the fire to avoid death. Life guards and rescue team members must be trained in basic swimming and boat rowing (Smith & Smith, 1994). These will help them be able to reach the victims of drowning with ease. They also have to be trained on how to use equipment such as personal floater device and rope throw bags so that they may work efficiently.

However, there are other trainings that they should undergo even though they do not fall under their area of specialization. One such training is on how to administer first aid to victims. The rescuers are the first to be in contact with the victims and should therefore be able to offer care to the victim before the medical experts arrive. The other training that may be necessary is in communication and negotiation. The rescue workers must be able to effectively communicate with the victims and be able to persuade them to stay calm. Panicking is likely to make the situation worse and victims who panic are likely to drag the rescuer. Leadership is also a training that is necessary for the team members as they must have a leader when they go to a mission. Finally, they have to be cross-trained in disaster management to enable them know how to handle a crisis beginning with assessment, planning, and execution.

As a fire rescue team director, it is important to develop a training plan that includes topics in rescue tactics, identification of potential dangers, safety use of equipment, and site survey. With regard to fire management requirements, these trainings help the rescuer be safe and able to assist the victim. Additionally, the training program would include firefighting tactics, leadership, communication skills, and first aid administration. The course will target the rescue team members for their professional development. However, it may be offered to other professionals such as the fire service workers and people in law enforcement. The people to be admitted to the course must be physically and medically fit and at least 18 years old.

It is a course that would not take more than a week as it is simply a development program. The overall objective of the training will be to make the individual an all round professional capable of tackling all situations effectively. Additionally, manipulating the objectives of the concerned project might help in evading the risks involved. This occurs in accordance to the demands of UK. Another response strategy is mitigation, a process where the project’s management crew tries to diminish the probability and impacts of the suspected risks. This move will reduce the credible losses when the risk occurs. This response strategy is best done by verifying the stipulated processes for the concerned project. Lastly, the UK can transfer the responsibility of the probable risk to another organization that it outsources to execute the project. This response strategy evades the liability over risks. Conversely, risks fronting opportunities will necessitate exploitation, sharing, acceptance, and enhancement as their response strategies.

A comparison between the risk management planning in the fire services in the United Kingdom and Iran can be drawn from the research in both the interviews as well as the information obtained from different publications in the library and on the internet. Even though there is no substantial research that has been conducted to clarify the major differences between fire service risk management planning in U.K and Iran, available information indicates that the government of the United Kingdom has largely embraced an integrated approach towards firefighting unlike Iran. Most of the Iranian fire services are located in the major economic and industrial regions to protect the great destruction of property in these locations (Grant & Hoover 1994). In addition, there are different teams established by the fire service providing organizations to help in proper planning of sufficient resources in the management of fire risk. In contrary, United Kingdom embraces the application of technology based GIS system to effectively monitor and plan their fire services. However, even though there are differences in terms of fire service delivery between the UK and Iran, the major similarity in both countries is the focus on prevention and protection of fire incidences.

Risk appraisal (in the context of fire outbreaks) entails the quantitative and qualitative impacts of possible risks depending on their probability. This provision is an integral part of the management plan. It is crucial to study the impacts and effects of probable risks. The move helps in curbing any eventualities that might emerge when the project is in progress. Establishing corrective measure in such context might help in managing the prospective risks. While considering the mentioned risks, escalating budgets and probable misuse of resources can affect the corporation significantly. This risk will deter the growth of UK and Iran since the funds that could have been used in developing other sectors will disappear in a futile infernos. Additionally, assessing the project on how it might interfere with the market response and demands is of intensive impact to fire management. When the countries invest on the products that do not sell in the market or do not meet the fire management requirements, then it might lose its safety focus despite the efforts to empower its employees to adapt and embrace fresh technologies. In fact, the move (empowerment) might harm both countries grievously compared to when other entities were resistant to changes and continued with their previous operational technologies.

Another evident consideration is the reduced productivity emerging from the dormant phases when adapting to new fire management technologies. The time and revenue that will be lost during this period are remarkable. Upon assessment, this translates to diminished productivity and reduced revenues. The UK and Iran’s fire management companies have potential employees striving to achieve their objectives despite the challenges. The mentioned project might risk this determination following the duration needed to establish, ratify, and evaluate its progress. Additionally, it is crucial to recognize that some risks within the project might influence the operational cultures of both countries. The company has its operational norms, which it hardly intends to lose.

Enacting new technologies might interfere with is stand despite their viability to the organization. When the country compromises its business cultures, resources, and market relevancy to favor the empowerment of employees, it is risking its market survival. Hence, the fire project has massive risks necessitating the provisions of proper risk management. Reducing the productivity and consuming times meant for other activities are noteworthy risks evident in the project. Additionally, the risk of allocating limited funds to the fire control provisions might hinder its establishment, execution, and evaluation. Personnel resistance to the proposed empowerment might hinder the accomplishment of the proposed project. It is the mandate of both the UK and Iran to identify the reactions of their staff towards the introduction of novel fire technologies.

Conclusion

In conclusion, fire occurrences remain the most disastrous events throughout the world. Measures to prevent, protect and mitigate the harmful effect of fire have been developed in most countries. All countries have their strategies for fire service risk management planning. This research focused on the risk management in the fire service in both UK and Iran. Results indicated that there are similarities and differences in the strategies used by these nations. One of the major differences is heavy reliance of technology in the management of fire services in UK as compared to Iran. However both countries focus on prevention and protection of fire incidences. Risk monitoring will involve a continuous process of assessing the systems to ensure that the fire management processes are congruent in both countries. This process must be conducted through the company’s independent monitoring and disaster management control unit in order to enhance continuity in the adjustment procedure.

There also have to be scheduled periods in which major monitoring operations are conducted within all departments in charge of data processes. Fire/disaster management tools have to be collectively developed. This will ensure a proper understanding of the tools applied in monitoring fire outbreaks as well as security issues within both countries. In order to comply with other global bench marking requirements, the UK and Iran might also be obligated to outsource for external monitoring experts to conduct critical fire system evaluations and compile necessary reports. Analysis of progress reports from the monitoring unit by the management would help in forecasting future challenges or limitations that might accrue from the present data systems. The experts within the IT department have to institutionalize skilled approaches to data security monitoring so as to avoid accidental or intentional data breaches.

As mentioned earlier, the fire service available in the UK operate under distinct jurisdictive and organizational structures in wales, Northern Ireland, England and Scotland. Fire service sector have undergone through substantial modifications since the start of the 21st century. This has been impelled by the decentralization of the federal governemnt powers, new set of legislations as well as a transformation to effective measures with regard to terrorism attcks and fears (Rasbash, D 2004). One of the facilitator for the transformation arose from the 2002 write-up of an evaluation of the fire service in the UK, which was conducted by Professor Sir George Bain. His review was entitled ‘independent review of the Fire service’, and it resulted into fast modifications to the fire and rescue services in the UK. It is vital to agree that the laws concerning fire services in both England and Wales started operating in 1865 when an act reffered to as Fire Brigade Act was enacted. This is also relevant in the Iran’s context. It took the obligation of providing fire services from insurance to corporations. During that time, there were approxiamtely 1,600 brigades all over the united kingdom.

It is notable that in Iran, the 3 stations in Shiraz municipality included; station 1 founded in 1972 in the Horr Square, station 2 founded in 1977 in Khold-e-Barin Park, and finally station 3 founded in station 3 founded in 1979 in Khatoon Square. Shiraz firefighting institute was founded by the firefighting division in the organization of Shiraz municipality as indicated earlier. Currently, the organization has a total of thirteen stations located in different areas in Iran. According to the discussion that was conducted with the staff of the organization during the visit, it was evident that they have both light and heavy duty gadgets, well equipped with wireless communication systems to help in combating fire incidences. One of the major strategy that they have put in place at the moment to reduce the risk of fire is the employment of rescue unit.

This is to help in combating the firefighting challenges in both ancient urban structures, present buildings and to prevent losses associated with fire risk. The use of motor vehicles in providing fire services have proved very effective to them with regard to decreasing the responding time during such emergencies. In other contexts, training is offered by the pertinent personnel. The amalgamation of high quality knowledge, experienced professionals, and field education are other strategies to be adopted. The staff in the fire rescue department must know basic defensive firefighting tactics to assist them avoid injuries improve their safety when controlling fire. The staff must also know some of the basic strategies of managing fire floods that are calm and those that are violent (Collins, 2004). The fire rescue team members must always wear a personal floatation device when going into the fires. During crisis, reasonable decisions can be compromised if things are not done promptly and appropriately. Burning under fire is likely to occur if the firefighting devices are hardly utilized (Louis 2007).

The fire service available in the UK operates under distinct teritorial provisions and organizational structures in wales, Northern Ireland, England and Scotland. In this context, fire service sector have experienced substantial modifications since the start of the 21st century. This has been impelled by the decentralization of the federal governemnt powers, new set of legislations as well as a transformation to effective measures with regard to terrosism attcks and fears. Importantly, one of the facilitator for the transformation arose from the 2002 write-up of an evaluation of the fire service in the UK, which was conducted by Professor Sir George Bain. His review was entitled ‘independent review of the Fire service’, and it resulted into fast modifications to the fire and rescue services in the UK. Laws concerning fire services in both England and Wales started operating in 1865 when an act reffered to as Fire Brigade Act was enacted.

It took the obligation of providing fire services from insurance to corporations. During that time, there were approxiamtely 1,600 brigades all over the united kingdom. This is also considerable in the Iran’s context. Most risks occur as threats to the survival of the project hence stringent response strategies are necessary. Firstly, the organization can avoid such risks through various means before they strike on the project. Some projects are very sensitive to risks hence such remedial approach might enhance their progress. Avoidance is the best course to follow; nonetheless, it might compromise the realization of the concerned objectives. Contextually, empowering employees to embrace new technologies has bountiful risks as mentioned earlier; hence, avoiding its ratification is unworthy. It is crucial to avoid the probable risks as one of the response approaches for the threatening risks. The mentioned avoidance can be achieved by altering the project’s processes and allocating resources in a suitable manner. This might help in responding to the mentioned risks.

List of References

Barr, C & Eversole. M 2003, The fire chief’s handbook, PennWell Corp. Tulsa, Okla.

Cote, A 1988, Organizing for fire and rescue services: a special edition of the Fire protection handbook, National Fire Protection Association, Quincy, MA.

Grant, K & Hoover, H 1994, Fire service administration, National Fire Protection Association, Quincy, MA.

Houtsma, M 1993, E.J. Brills first encyclopaedia of Islam: 1913-1936, Brill Press, London.

Kreimer, A & Arnold, M 2003, Building safer cities: the future of disaster risk, World Bank, Washington, DC.

Louis, C 2007, Research Methods in Education, Routledge, London.

Mann, T 2005, The Oxford guide to library research, Oxford University Press, Oxford.

Rasbash, D 2004, Evaluation of fire safety, Wiley, England.

Russell, B & Purcell, J 2009, Online research essentials: implementing and designing research studies, Jossey-Bass, San Francisco, CA.

Smalley, C 2005, Protecting life and property from wildfire, National Fire Protection Association, Quincy, MA.

True, A 2001, Wildfire: a reader, Island Press, Washington, DC.

Rhea, R. & Rousseau, B 2010, Fundamentals of technical rescue, Jones and Bartlett Publishers, Sudbury, MA.

Read more

Knowledge Management Systems and Network Design

Introduction

The increase in the use of Information Technology systems revolutionized information management, making it a powerful resource that organizations can use to build a sustainable competitive advantage. Information Technology trends in the present-day business contexts entail integrating information technology with the organizational activities, with the main objective of offering support and efficient execution of management and organizational operations.

The nature of IT systems deployed in an organization is determined by how individuals in an organization interact with the technology and the underlying data, with the principal aim of supporting business processes (Awad, 2004). This implies that information technology is becoming an important part of the organizational functions that can be used to establish a competitive advantage in the present business context. In the modern business world, organizations are increasingly dependent on the use of information systems to enhance business efficiency and address the challenges imposed by the business environment (Alavi & Leidner, 2001).

The selected information technology trend for this paper is knowledge management within the organization. This paper describes how knowledge management is affecting businesses in the present times. The paper also discusses how the identified portfolio exhibits related to the trend of knowledge management. Finally, the essay discusses the positive and negative feedback arising from this trend.

How knowledge management affects businesses

Knowledge management refers to the detailed management of critical knowledge and information processed by organizational members in such a manner that it can be used and shared at the organizational level to transform the corporate intellectual and organizational knowledge into business intelligence. Knowledge management strategies can be deployed by organizations to facilitate the creation, distribution, representation, and the implementation of organizational insights (Awad, 2004).

The knowledge-sharing culture at organizations principally involves sharing knowledge with the internal employees and stakeholders and external entities such as the government, suppliers, customers, and financial institutions. This is important in increasing the competitive advantage of the organization. Currently, the business relies on its intranet and informal communication platforms such as email, memos, and bulletin boards to facilitate employee communication and knowledge sharing. These kinds of insights usually consist of knowledge that the individuals in an organization can use during organizational processes.

Knowledge management is diverse and incorporates concepts such as business administration and management of information systems and organizational management (Alavi & Leidner, 2001). This implies that knowledge management is important in the formulation of business strategies in an organization. This section provides an overview of the important parts of the decision process when an organization expands its Information and Communication Technologies (ICTs) infrastructure to a Knowledge Management system.

A needs analysis primarily involves assessing the key areas that require the implementation of the formulated policies and the various staff members of the organization who will be addressed. A needs analysis is a critical success factor during an overhaul of ICT infrastructure to a KM system, which transforms into organizational success. This is because needs analysis offers an important meaning to the adoption of the KM system through facilitating the identification of critical organizational processes that require the implementation of knowledge management. Therefore, a KM system implementation strategy requires recognizing the core performance indicators of the organizational success factors to serve as a framework for measuring the performance of the KM system (Alavi & Leidner, 2001).

Another important consideration is that employee involvement vital in ensuring the successful implementation of a KM system. In the organizational context, it is arguably evident that employee involvement in the decision-making process is necessary before implementing any organizational strategy, and the implementation of a KM system is not an exception. This is mainly because employees play a significant role in meeting the organization’s business goals and objectives. Employee training refers to the extent to which employees in an organization share the available information, knowledge, rewards, and power across the organizational framework (Awad, 2004).

Also, employee knowledge is increasingly becoming a tool for competitive advantage, which is mainly achieved by facilitating the sharing of knowledge across the organization and establishing an organizational culture that promotes employee involvement in decision processes. The underlying argument is that knowledge multiplies only if it is shared among the employees. The significance of employee involvement during the implementation of a KM system is based on the underlying assumption that an employee productivity and performance improvement does not rely on work organization and their skills, but also on the willingness of the employees to transform the implicit knowledge regarding the work to constant process improvement and innovation.

Also, employee involvement during the implementation of a KM system facilitates the gathering of information across all the organizational levels, which is vital for the survival of the organization (Bagad, 2009).

The top management’s commitment is also critical in guaranteeing a successful implementation of KM systems in an organization. With this respect, the commitment from the top management of the organization plays an integral role in ensuring that the KM system being adopted receives a positive response from the organizational members. The top management team’s leadership and commitment also facilitate the effectiveness of knowledge creation and sharing among the organizational members at all levels. The organization’s top management should realize the value of knowledge in ensuring the success of the organization.

The available knowledge should be managed effectively to be beneficial to the organization, which is increasingly becoming a business tool for building a competitive advantage. Research surveys have reported that most KM systems have failed because of a lack of commitment and leadership by the top management. Organizational leadership should establish an organizational culture that values the importance of knowledge and knowledge sharing in fostering success. Lack of support from the top management team is likely to impede the successful implementation of the KM system (Bagad, 2009).

Another important consideration during the implementation of a KM system is establishing a strong organizational culture that is knowledge-friendly. A strong organizational culture means that the organizational operations and activities favor the realization of the organization’s goals and objectives and enhances organizational learning and innovation that attempt to motivate employees to increase their organizational knowledge base. This involves informing the employees within the organization of the significance of adopting change as important in determining the organizational performance (Awad, 2004).

The KM system implementation strategy should, therefore, attempt to streamline the business processes, the employees, and the organizational goals and objectives. A knowledge-friendly organizational culture is established by cultivating trust and confidence and the spirit of knowledge sharing, which are vital in encouraging knowledge application and development at the organization (Alavi & Leidner, 2001).

Performance measurement is also important during the implementation of KM systems within an organization. Performance measurement primarily entails gathering relevant data regarding the people’s productivity and efficiency within an organization, functional units, and the entire organization. Research studies have reported a positive correlation between performance measurement and the successful implementation of KM systems, implying that it is vital to incorporate performance measurement as a core requirement during the implementation of KM systems (Awad, 2004).

Other significant considerations during the adoption of KM systems include eliminating organizational constraints, benchmarking, and the establishment of information systems that meet the requirements of the organization’s knowledge management (Alavi & Leidner, 2001).

How each of the identified portfolio exhibits relates to this trend

Effective knowledge management is based on information sharing within the organization. Therefore, any project or related work that facilitates access and sharing of information within the organization can be integrated to facilitate the development of knowledge management systems. With this regard, the identified potential exhibits that can be applied during the development of KM systems include a network diagram that was constructed for computer network, the software product created, an information management systems paper written for an academic course, and pages of a web site developed (Alavi & Leidner, 2001). The following section discusses how portfolios relate to the trend of knowledge management.

Network design diagram

The following is the network design diagram constructed using a Cisco packet tracer when implementing a network for an organization. Network implementation is an avenue through which an organization can share and manage information (Awad, 2004).

Network design is a sequential process that requires a thorough analysis of the needs of the business enterprise. The physical and the logical layout structure of the network have to match the design and the business needs in that particular context. The main objective of the design of this particular network is to enhance the sharing of resources and provide access to the internet. Having a clearly stated objective plays a significant role in determining the strategy that is during network design. Evaluation of the business requirements, goals, and objectives forms the preliminary stage in network planning, design, and implementation. The design requirements are also important during planning and design (Alavi & Leidner, 2001).

The design requirements of a network depend on business needs. One of the significant design requirements for the network is providing access to multiple email addresses. It is also important for the network to have access to the internet for communication purposes. Another significant design requirement that needs to be incorporated into the network is to host at least two workstation computers, which have been configured to share resources as the printer and the point of sale application. Network security is not a major concern; therefore, low-level security measures similar to the home networks are efficient (Alavi & Leidner, 2001).

Network planning and entails coming up with a logical and physical layout of the network components. In this case, there are no complex issues because the network requires hosting only two workstations. Variables such as network availability, reliability, performance, standards compatibility, and scalability play a significant role during the design phase (Alavi & Leidner, 2001).

Network design diagram

A software product created

Groupware applications are mainly used to manage organizational knowledge by offering a means through which the organizational members can communicate and collaborate using an application suite. Most of the groupware applications deployed by businesses include emailing platforms, file sharing repository, bulletin boards, blogs, forums, and other platforms through which the employees of an organization can engage in organizational learning (Alavi & Leidner, 2001).

Also, the effectiveness of groupware application in aiding the realization of knowledge management goals depends on how the employees use the KM groupware. For example, a limited number of users are likely to share emails and documents containing knowledge concerning problem-solving on a large scale. Such constraints must be eliminated for the KM groupware to realize the organizational goals and objectives. This paper discusses the way employees communicate in Air Asia and compares the difference between knowledge management and the company’s legacy system with respect to knowledge sharing.

Organizations are completely dependent on Information technology systems to facilitate communication between their employees and other company stakeholders. The groupware has also helped business enterprises generate and integrate the core information assets with organizational decision-making and knowledge building strategies. Business enterprises rely on collaboration, mobile work, business intelligence, business process management, content management, and knowledge sharing to ensure that there is effective communication between the employees in the organization.

Also, organizations use the integrated Human Resource Management system that plays an important role in employee communication with the top management team to enhance organizational efficiency. Businesses can also use an integrated performance management system to help in enhancing the efficiency of its employees. The e-learning portal offers educational and training resources to its employees, which helps in the development of human capital for the organization (Alavi & Leidner, 2001).

An information management systems paper written for an academic course

Information management is an important aspect of technical communication within an organization. As a result, information management can be integrated into the trend of knowledge management. Sound information security management among business organizations is significantly constrained by the resources required to implement security controls in comparison with larger organizations and government agencies.

Research studies have reported significant constraints associated with information security culture, awareness, and the use of information security policies among the organizations. The inference in the context of business entities and organizations is that the establishment of an Information Security Management System is primarily dependent on the size of the organizations, implying smaller organizations have a minimal capability of implementing information security strategies and controls (Alavi & Leidner, 2001). The industry sector also plays an important role in influencing the implementation of an Information Security Management System.

The basic argument is that industry sectors like banking prioritize the significance of information security management. For instance, most of the individual financial institutions have implemented their own information security management system. The justification of implementing ISMS in business enterprises is backed by the increasing lack of awareness of the significance of information security in the business context (Alavi & Leidner, 2001).

System failures are becoming a dominant scenario in the digital computing age. Such failures can result in hardware that can cause access to the data difficult or result in data loss. Apart from data loss due to system failures, there are cases associated with accidental deletion of data. Data recovery strategies aimed at salvaging data from digital storage media may be because of a damaged or corrupted disk that renders the data inaccessible using normal access methods.

The main objective behind implementing a Disaster Recovery Plan is to normalize the organization’s activities after a major disruption. As a risk management strategy, a DRP is implemented before speculations of an impending disaster; these are moments that the organization cannot intrinsically support its core activities. An important aspect of a disaster recovery plan is that it should run automatically, with minimal decision-making scenarios during occurrences of disruptions (Awad, 2004).

Pages of web site developed

Information sharing within the organization is not of significant benefit if it does not support flexibility and accessibility because people can access the information irrespective of their geographical location. With this regard, electronic commerce is of significant benefit to the organization. E-commerce refers to the process of buying and selling goods and services over the internet; in most cases, it uses the World Wide Web as a platform to carry out business transactions. The use of e-commerce to carry out business transactions facilitates reaching a wide customer base since the internet is widely available and internet users are growing day by day.

Therefore, e-commerce offers an effective way of marketing and selling a company’s products and services (Awad, 2004). The basic elements of e-commerce include electronic transfer of funds, online marketing, the processing of transactions using online methods, and electronic data interchange. Modern e-commerce systems encompass the use of the internet and, in some cases, the emailing system, whereby business transactions can take place between business-to-business (B2B) and business-to-consumer (B2C).

Possible implications regarding the use of knowledge management

There are diverse strategic benefits associated with the use of knowledge management systems at the organization. One of the strategic advantages of knowledge management at the company is that it fosters organizational efficiency, which is achieved by ensuring that there is smooth organizational information and workflow (Bagad, 2009). By using automation, organizational tasks are executed effectively promptly because knowledge management eliminates the need for the manual system and that organizational tasks are undertaken manually.

Also, information systems facilitate the organizational management process by offering frameworks through which employees can be tracked and their work monitored. Also, the information system integrates all the business functions within the organization, such as sales and human resource management. This generally ensures that there is organizational efficiency.

The second strategic advantage of Information systems at the company is that it provides avenues to communicate and share knowledge. This means that the Information system incorporated at the company incorporates an aspect of Knowledge management, which plays n important role in ensuring organizational effectiveness. Knowledge management refers to the detailed management of critical knowledge and information processed by organizational members in such a manner that it can be used and shared at the organizational level to transform the corporate intellectual and organizational knowledge into business intelligence.

Knowledge management strategies can be deployed by organizations to facilitate the creation, distribution, representation, and the implementation of organizational insights. These kinds of insights usually consist of knowledge that the individuals in an organization can use during organizational processes. Therefore, knowledge management is important in the formulation of business strategies in an organization, which helps enhance organizational effectiveness (Awad, 2004).

Knowledge management systems are vital in the present knowledge-based economy. Knowledge management strategies can be deployed by organizations to facilitate the creation, distribution, representation, and the implementation of organizational insights. These kinds of insights usually consist of knowledge that the individuals in an organization can use during organizational processes. The use of knowledge management in the organization’s marketing strategy is an effective approach to ensuring the company’s expansion. This is so because the strategy involves integrating organizational behavior and business management without impairing the organizational goals and objectives (Awad, 2004).

Conclusion

Information is a critical success factor for any organization in the present business context. This implies that business enterprises should strive to secure their information to establish a competitive edge. This means that firms should establish an information-friendly organizational behavior, with the main objective of ensuring that the implementation of information management projects within the firm is a success.

References

Alavi, M., & Leidner, D. E. (2001). Review: Knowledge Management and Knowledge Management Systems: Conceptual Foundations and Research Issues. MIS Quarterly, 23 (8), 78-90.

Awad, E. (2004). Knowledge Management. New Delhi: Pearson Education India.

Bagad, D. (2009). Computer Networks. New York: Technical Publications.

Read more

Mobile Learning as a New Stage of E-Learning

How mobile technology changed the way we teach and learn

Without a doubt, technology has revolutionized how teaching and learning take place in the contemporary world. This notwithstanding, it is obvious that the general approach to teaching has not changed. With or without the use of technology, teaching always involves teachers talking to students. Unlike the traditional way of teaching, however, mobile technology enables teachers to spread the learning processing far and wide. While access to learning was initially limited to only a few privileged individuals it is now possible for people to access educational materials quite easily regardless of their status in society. As long as one has access to an Internet connection, he or she should be in a position to access the learning materials.

Experience of using a smartphone

I own a smartphone and have used it on many occasions to conduct very interesting sessions with my students. With the help of social media networks, I have been able to hold lengthy sessions with my students as long as they have smartphones and can connect to the Internet. A very useful feature of the smartphone is the ability to use the whassup application. I recently guided my students to create a whassup group for teaching and learning purposes and the experience has been great. Through the whassup group, students are free to ask questions and I can respond quite easily.

The group has also created a forum for students to exchange ideas and students can respond to each other’s questions. The beauty of using this technology is that every member of the group has access to every trail of conversation and no one misses out. The greatest challenge of using a smartphone for teaching and learning lies in the fact that not every student has access to a smartphone. While those with smartphones are happy and enjoy the use of whassup and other social network services for learning purposes, those without are disadvantaged and have to rely almost entirely on their classmate’s goodwill to access conversations.

Key factors to consider when developing a learning environment that makes use of m-learning technology

In developing a learning environment that utilizes them-learning technology, I will pay special attention to ensuring that the technology is, first and foremost, easily accessible to all. As earlier explained, the cost of owning a smartphone may be quite prohibiting and students from a less privileged background may be left out. For wide coverage and to incorporate as many students as possible, it may be helpful to create mobile phone applications that can easily be integrated with computers. Doing so will certainly benefit many students since access to computer services may not be as difficult as access to smartphones. For students who do not have personal computers, they can access services through Internet kiosks at a reasonable cost.

The use of mobile phone technology has made the learning process to be a collaborative exercise rather than an individual effort. Other mobile phone technologies that may be used by teachers and learners include Google Drive and Dropbox. Mobile phones have also made learning to be active and not passive since teachers as well as students have to be fully engaged. Through the use of mobile phone technologies, learners are also able to personalize their learning experience. The use of mobile phone technologies also makes it possible for both teachers and learners to multitask.

Key ideas presented in literature regarding the impact of mobile technology on informal learning

Generally, informal learning refers to learning that takes place outside a school environment. It is the learning that occurs as individuals carry on with their daily activities. Research concerning informal learning has tended to focus on the development of applications that can effectively support informal earning. However, very little evidence exists about the effects of modern mobile technologies on informal learning.

Research indicates that there is potential for global positioning system (GPS) technologies to support situated informal learning, collaboration, group creation, and sharing of content. Location-aware mobile technologies are expected to have an impact on the learning process of informal learners. Studies have also identified several areas that mobile technologies that have impacted informal learning. First, the use of mobile technology expands the learning space beyond the traditional learning environment and enables educators to reach scores of learners who would otherwise not be reached.

Mobile technology also makes it possible for informal learners to gain access to situated content just like other learners in a traditional setup. Also, learners can learn through knowledge sharing and active interaction with other learners. Through the help of technology, new learning sites are created and collaboration is promoted.

Favorite sites for my learning

As an educator, I spend a huge percentage of my time researching different topics while preparing to meet my students. Typically, my research activities involve the use of textbooks, journal articles, magazines, and online resources. Among my favorite sites are tizag.com and w3schools.com. These sites provide materials for different computer-related concepts and are designed with a simple interface that almost anyone can navigate quite easily. The fact that the learning information presented through the sites is freely accessible further enhances access to all and encourages many to learn. Undoubtedly, these sites are regarded as a very useful source of information for individuals willing to gain knowledge in different computer-related concepts.

Concept map illustrating the benefits and disadvantages of mobile technology and informal learning

Figure 1 shows how technology has greatly revolutionized the learning process. As can be seen from the figure, it is evident that mobile learning depends on three important aspects. First, the technology itself needs to be mobile. Among other things, the mobility of technology facilitates a mobile learning environment and ultimately, the mobility of the learner.

Technology and Mobile Learning.
Figure 1: Technology and Mobile Learning.

There are various benefits and disadvantages associated with both mobile technology and informal learning. Figure 2 is a conceptual map illustrating the benefits and disadvantages of mobile technology and informal learning.

Conceptual Map.
Figure 2: Conceptual Map.

Figure 2 shows several benefits and disadvantages that are linked to mobile technology and informal learning. Among the benefits are flexibility, increased accessibility, and reduced cost of learning. Mobile technology and information learning create a flexible environment for learners and any individual who can not fit in a traditional learning environment is not left out. There is also increased accessibility in the sense that learners can access learning materials from wherever they without a problem.

The learning space is thus expanded. Mobile technology and information learning also make learning affordable since learners do not have to spend heavily to learn. Two obvious disadvantages of mobile technology and informal learning are lack of follow-ups and the need for self-discipline. Unlike the traditional setup where the learners’ activities are closely monitored, the success of mobile learning depends so much on the learners’ attitude.

Read more
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp