Free Essay

Ism Model for Analyses

In:

Submitted By nanditacho
Words 4774
Pages 20
Research Journal of Management Sciences ____________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci.

Interpretive Structural Modelling (ISM) approach: An Overview
Rajesh Attri1, Nikhil Dev1 and Vivek Sharma2
2

Department of Mechanical Engineering, YMCA University of Science and Technology, Faridabad, INDIA Department of Mechanical Engineering, Advanced Institute of Technology and Management, Palwal, INDIA

1

Available online at: www.isca.in
Received 27th November 2012, revised 27th January 2013, accepted 1st February 2013

Abstract
Interpretive structural modelling (ISM) is a well-established methodology for identifying relationships among specific items, which define a problem or an issue. This approach has been increasingly used by various researchers to represent the interrelationships among various elements related to the issue. ISM approach starts with an identification of variables, which are relevant to the problem or issue. Then a contextually relevant subordinate relation is chosen. Having decided the contextual relation, a structural self-interaction matrix (SSIM) is developed based on pairwise comparison of variables. After this, SSIM is converted into a reachability matrix (RM) and its transitivity is checked. Once transitivity embedding is complete, a matrix model is obtained. Then, the partitioning of the elements and an extraction of the structural model called ISM is derived. In this paper, key concept of ISM approach is discussed in detail. Keywords: ISM, SSIM, RM, variable, modelling.

Introduction
It is generally felt that individuals or groups encounter difficulties in dealing with complex issues or systems. The complexity of the issues or systems is due to the presence of a large number of elements and interactions among these elements. The presence of directly or indirectly related elements complicates the structure of the system which may or may not be articulated in a clear fashion. It becomes difficult to deal with such a system in which structure is not clearly defined. Hence, it necessitates the development of a methodology which aids in identifying a structure within a system. Interpretive structural modelling (ISM) is such a methodology1. ISM is defined as a process aimed at assisting the human being to better understand what he/she believes and to recognise clearly what he/she does not know. Its most essential function is organisational. The information added (by the process) is zero. The value added is structural2. The ISM process transforms unclear, poorly articulated mental models of systems into visible and well-defined models. Interpretive structural modelling (ISM): ISM is an interactive learning process. In this technique, a set of different directly and indirectly related elements are structured into a comprehensive systematic model3,4. The model so formed portrays the structure of a complex issue or problem in a carefully designed pattern implying graphics as well as words1, 5, 6, 7 . Interpretive structural modeling (ISM) is a well-established methodology for identifying relationships among specific items, which define a problem or an issue8. For any complex problem under consideration, a number of factors may be related to an International Science Congress Association

issue or problem. However, the direct and indirect relationships between the factors describe the situation far more accurately than the individual factor taken into isolation. Therefore, ISM develops insights into collective understandings of these relationships. ISM starts with an identification of variables, which are relevant to the problem or issue, and then extends with a group problemsolving technique. Then a contextually relevant subordinate relation is chosen. Having decided on the element set and the contextual relation, a structural self-interaction matrix (SSIM) is developed based on pairwise comparison of variables. In the next step, the SSIM is converted into a reachability matrix (RM) and its transitivity is checked. Once transitivity embedding is complete, a matrix model is obtained. Then, the partitioning of the elements and an extraction of the structural model called ISM is derived9. In this approach, a systematic application of some elementary notions of graph theory is used in such a way that theoretical, conceptual and computational leverage are exploited to explain the complex pattern of contextual relationship among a set of variables. ISM is intended for use when desired to utilise systematic and logical thinking to approach a complex issue under consideration10. Interpretive Structural Modeling is a computer-aided method for developing graphical representations of system composition and structure. ISM had its inception in Warfield’s4 perception of the need, when attempting to couple science to policy, for “a set of communication tools which have both a scientific and lay character serving as a linkage mechanism between science and the public, and having meaning for all who are involved” and which, in particular, are capable of communicating a holistic 3

Research Journal of Management Sciences ________________________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci. sense of the elements and their relations which define system structure. Warfield4 stipulates a set of requirements for these communication tools which include i. Provision for the inclusion of the scientific elements ii. Means for exhibiting a complex set of relations iii. Means for showing that complex set of relations which permit continuous observation, questioning and modification of the relations iv Congruence with the originators’ perceptions and analytical processes v. Ease of learning by public (or, by inference, multidisciplinary) audience. Graphical models or, more specifically, directed graphs (digraphs) appear to satisfy these requirements. In such a representation, the elements or components of a system are represented by the “points” of the graph and the existence of a particular relationship between elements is indicated by the presence of a directed line segment. It is this concept of relatedness in the context of a particular relationship which distinguishes a system from a mere aggregation of components11. Characteristics of ISM: This methodology is interpretive as the judgment of the group decides whether and how the different elements are related. It is structural on the basis of mutual relationship; an overall structure is extracted from the complex set of elements. It is a modeling technique, as the specific relationships and overall structure are portrayed in a digraph model. It helps to impose order and direction on the complexity of relationships among various elements of a system3, 6. It is primarily intended as a group learning process, but individuals can also use it. Literature review on Issue

List of factor related to an issue

Establishing contextual relationship between Xij between variables (i, j)

Obtaining expert opinion

Developing a structural self-interaction matrix (SSIM)

Developing a reachibility matrix

Developing the reachibility matrix in its conical form

Removing transitivity from the diagraph

Developing digraph

Replacing variables nodes with relationship statements

Is there any conceptual inconsistency? No

Yes

Representing relationship statement into model for factors related to an issue Figure-1 Flow diagram for preparing ISM model

International Science Congress Association

Necessary modification 4

Partitioning the reachibility matrix into different levels

Research Journal of Management Sciences ________________________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci. Steps involved in ISM methodology: Warfield4 developed a methodology that uses systematic application of some elementary notions of graph theory and Boolean algebra in such a way that when implemented in a man machine interactive mode, theoretical, conceptual and computational leverage is exploited to construct directed graph (a representation of the hierarchical structure of the system). This methodology has at least two desirable properties when compared to the similar approaches namely simplicity in the sense of not requiring from the user i.e. viewpoint of advance mathematical knowledge and efficiency in terms of economizing in computer time. The various steps involved in ISM modeling are as follows: i. Identify the elements which are relevant to the problem. This could be done by a survey or group problem solving technique. ii. Establish a contextual relationship between elements with respect to which pairs of elements would be examined. iii. Develop a structural self-interaction matrix (SSIM) of elements. This matrix indicates the pair-wise relationship among elements of the system. This matrix is checked for transitivity. iv. Develop a reachability matrix from the SSIM. v. Partition the reachability matrix into different levels. vi. Convert the reachability matrix into conical form. vii. Draw digraph based on the relationship given in reachability matrix and remove transitive links. viii. Convert the resultant digraph into an ISMbased model by replacing element nodes with the statements. ix. Review the model to check for conceptual inconsistency and make the necessary modifications. Various steps involved in ISM technique are illustrated in figure 1. The various steps, which lead to the development of an ISM model, are illustrated below. Step 1: Structural Self-Interaction Matrix (SSIM): ISM methodology suggests the use of the expert opinions based on various management techniques such as brain storming, nominal group technique, etc. in developing the contextual relationship among the variables10,12,13. For this purpose, experts from the industry and academia should be consulted in identifying the nature of contextual relationship among the factors. These experts from the industry and academia should be well conversant with the problem under consideration. For analysing the factors, a contextual relationship of ‘leads to’ or ‘influences’ type must be chosen. This means that one factor influences another factor. On the basis of this, contextual relationship between the identified factors is developed. Keeping in mind the contextual relationship for each factor and the existence of a relationship between any two factors (i and j), the associated direction of the relationship is questioned. The following four symbols are used to denote the direction of relationship between two factors (i and j): (a) V for the relation from factor i to factor j (i.e., factor i will influence factor j) (b) A for the relation from factor j to factor i (i.e., factor i will be influenced by factor j) (c) X for both direction relations (i.e., factors i and j will influence each other) (d) O for no relation between the factors (i.e., barriers i and j are unrelated). Based on the contextual relationships, the SSIM is developed. To obtain consensus, the SSIM should be further discussed by a group of experts. On the basis of their responses, SSIM must be finalised. Step 2: Reachability Matrix: The next step in ISM approach is to develop an initial reachability matrix from SSIM. For this, SSIM is converted into the initial reachability matrix by substituting the four symbols (i.e., V, A, X or O) of SSIM by 1s or 0s in the initial reachability matrix. The rules for this substitution are as follows: (a) If the (i, j) entry in the SSIM is V, then the (i, j) entry in the reachability matrix becomes 1 and the (j, i) entry becomes 0. (b) If the (i, j) entry in the SSIM is A, then the (i, j) entry in the matrix becomes 0 and the (j, i) entry becomes 1. (c) If the (i, j) entry in the SSIM is X, then the (i, j) entry in the matrix becomes 1 and the (j, i) entry also becomes 1. (d) If the (i, j) entry in the SSIM is O, then the (i, j) entry in the matrix becomes 0 and the (j, i) entry also becomes 0. Following these rules, the initial reachability matrix is prepared. 1* entries are included to incorporate transitivity to fill the gap, if any, in the opinion collected during development of structural self-instructional matrix. After incorporating the transitivity concept as described above, the final reachability matrix is obtained. Step 3: Level partitions: From the final reachability matrix, for each factor, reachability set and antecedent sets are derived. The reachability set consists of the factor itself and the other factor that it may impact, whereas the antecedent set consists of the factor itself and the other factor that may impact it. Thereafter, the intersection of these sets is derived for all the factors and levels of different factor are determined. The factors for which the reachability and the intersection sets are the same occupy the top level in the ISM hierarchy. The top-level factors are those factors that will not lead the other factors above their own level in the hierarchy. Once the top-level factor is identified, it is removed from consideration. Then, the same process is repeated to find out the factors in the next level. This process is continued until the level of each factor is found. These levels help in building the diagraph and the ISM model. Step 4: Conical matrix: Conical matrix is developed by clustering factors in the same level across the rows and columns of the final reachability matrix. The drive power of a factor is derived by summing up the number of ones in the rows and its dependence power by summing up the number of ones in the columns14, 15, 16. Next, drive power and dependence power ranks are calculated by giving highest ranks to the factors that have the maximum number of ones in the rows and columns, respectively.

International Science Congress Association

5

Research Journal of Management Sciences ________________________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci. Step 5: Digraph: From the conical form of reachability matrix, the preliminary digraph including transitive links is obtained. It is generated by nodes and lines of edges7,14, 15,16. After removing the indirect links, a final digraph is developed. A digraph is used to represent the elements and their interdependencies in terms of nodes and edges or in other words digraph is the visual representation of the elements and their interdependence17,18. In this development, the top level factor is positioned at the top of the digraph and second level factor is placed at second position and so on, until the bottom level is placed at the lowest position in the digraph. Step 6: ISM Model: Digraph is converted into an ISM model by replacing nodes of the factors with statements. Advantages of ISM approach: ISM offers a variety of advantages like: i The process is systematic; the computer is programmed to consider all possible pair wise relations of system elements, either directly from the responses of the participants or by transitive inference. ii The process is efficient; depending on the context, the use of transitive inference may reduce the number of the required relational queries by from 5080 percent. iii No knowledge of the underlying process is required of the participants; they simply must possess enough understanding of the object system to be able to respond to the series of relational queries generated by the computer. iv It guides and records the results of group deliberations on complex issues in an efficient and systematic manner. v It produces a structured model or graphical representation of the original problem situation that can be communicated more effectively to others. vi It enhances the quality of interdisciplinary and interpersonal communication within the context of the problem situation by focusing the attention of the participants on one specific question at a time. vii It encourages issue analysis by allowing participants to explore the adequacy of a proposed list of systems elements or issue statements for illuminating a specified situation. viii It serves as a learning tool by forcing participants to develop a deeper understanding of the meaning and significance of a specified element list and relation. ix It permits action or policy analysis by assisting participants in identifying particular areas for policy action which offer advantages or leverage in pursuing specified objectives. Limitations of ISM approach: There may be many variable to a problem or issue. Increase in the number of variables to a problem or issue increases the complexity of the ISM methodology. So we can only consider limited number of variables in the development of ISM model. Other variables which are least affecting a problem or issue may not be taken in the development of ISM model. Further experts help are taken in analyzing the driving and dependence power of the variable of a problem or issue. These models are not statistically validated. Structural equation modeling (SEM), also commonly known as linear structural relationship approach has the capability of testing the validity of such hypothetical model. Applications of ISM approach: ISM can be used at a high level of abstraction such as needed for long range planning. It can also be used at a more concrete level to process and structure details related to a problem or activity such as process design, career planning, strategic planning, engineering problems, product design, process re-engineering, complex technical problems, financial decision making, human resources, competitive analysis and electronic commerce19, 20, 21, 22 . Application of Interpretive structural modeling (ISM) process to analyze systems and problems in various fields is well documented in literature such as: Attri et al.16 have applied this approach for identifying and analysing their mutual interaction of the enablers in the implementation of Total Productive Maintenance (TPM). Attri et al.15 have applied Interpretive Structural Modelling (ISM) approach for identifying and analysing the barriers in the implementation of Total Productive Maintenance. Saxena et al.23 have identified the key variables using direct as well as indirect interrelationships amongst the variables and presented the results of the application of ISM methodology to the case of ‘Energy conservation in the Indian cement industry. Saxena et al.24 have used this technique to identify the key factors, objectives and activities for energy conservation in the Indian cement industry. They have superimposed some fuzzy considerations to determine the hierarchy of variables and to identify the key variable of the system. Raj et al.14 have utilised ISM approach for analysing the mutual relationships between the factors affecting the flexibility in FMS. Mandal and Deshmukh25 have analyzed some important vendor selection criteria with the use of ISM that shows the inter-relationships of criteria and their different levels. These criteria have been categorized depending on their driving and dependence power. Sharma et al.26 carried out ISM to develop a hierarchy of actions required to achieve the future objectives of waste management in India. Singh et al.6 have utilized this technique for the implementation of knowledge management in engineering industries. Thakkar et al.27 has used ISM approach for evaluating and comparing supply chain relationships, specifically when, small and medium scale enterprise (SME) is considered as focal company. Ravi et al.10 used this methodology to determine the key reverse logistics variables, which the top management should focus so as to improve the productivity and performance of computer hardware supply chains. Thakkar et al.28 have used ISM approach to propose an integrated qualitative and quantitative approach to the development of a balanced scorecard (BSC) for a real life case company KVIC (Khadi and Village Industries Commission, organic food sector, India). Qureshi et al.29 applied this approach to model the key variables of logistics outsourcing relationship between shippers and logistics service providers (LSPs) and to study their influence on productivity and competitiveness of the shipper company. Raj and Attri7 have applied Interpretive Structural Modelling (ISM) approach for identifying and analysing the barriers in the implementation of

International Science Congress Association

6

Research Journal of Management Sciences ________________________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci. Total Quality Management (TQM). Faisal et al.30 have utilized this to present an approach to effective supply chain risk mitigation by understanding the dynamics between various enablers that help to mitigate risk in a supply chain. Faisal et al.31 applied this approach to identify various information risks that could impact a supply chain, and developed a conceptual framework to quantify and mitigate them. Agarwal et al.9 used this methodology to identify interrelationship among the variables that have been identified for developing a framework for agility improvement of case supply chain. Singh et al.32 have utilized this technique to identify and develop the structural relationship among different factors for successful implementation of AMTs. Jharkharia and Shankar33 used this methodology to identify the enablers affecting the IT enablement of supply chain and to understand the mutual influences among these enablers. Bolanas et al.34 have utilized this approach to improve decision making process among executives working in different functional areas. MICMAC analysis: Matrice d’Impacts croises-multiplication appliqúe an classment (cross-impact matrix multiplication applied to classification) is abbreviated as MICMAC. The purpose of MICMAC analysis is to analyze the drive power and dependence power of factors. MICMAC principle is based on multiplication properties of matrices26. It is done to identify the key factors that drive the system in various categories. Based on their drive power and dependence power, the factors, have been classified into four categories i.e. autonomous factors, linkage factors, dependent and independent factors. Autonomous factors: These factors have weak drive power and weak dependence power. They are relatively disconnected from the system, with which they have few links, which may be very strong. Linkage factors: These factors have strong drive power as well as strong dependence power. These factors are unstable in the fact that any action on these factors will have an effect on others and also a feedback effect on themselves. Dependent factors: These factors have weak drive power but strong dependence power. Independent factors: These factors have strong drive power but weak dependence power. A factor with a very strong drive power, called the ‘key factor’ falls into the category of independent or linkage factors. systems perspective. ISM process transforms unclear, poorly articulated mental models of systems into visible and welldefined models. These models help to find the key factor related to problem or issue. After identification of key factor or element, strategy may be developed for dealing issue. ISM method is understandable to a variety of users in the interdisciplinary groups, provides a means of integrating the diverse perceptions of participating groups, is capable of handling a large number of components and relationships typical of complex systems, is heuristic in terms of assessing the adequacy of model formulation, and leads to insights about system behaviour. ISM is also easy to use and communicable to a larger audience. These features of ISM approach has resulted into wide use of this approach.

References
1. Raj T., Shankar R. and Suhaib M., An ISM approach for modeling the enablers of flexible manufacturing system: The case for India, International Journal of Production Research, 46(24), 1-30 (2007) Farris D.R. and Sage A.P., On the use of interpretive structural modeling for worth assessment, Computer and Electrical Engineering, 2, 149–174 (1975) Sage A.P., Interpretive structural modeling: Methodology for large scale systems, New York, NY: McGraw-Hill (1977) Warfield J.W., Developing interconnected matrices in structural modelling, IEEE Transactions on Systems Men and Cybernetics, 4(1), 51-81 (1974) Ravi V. and Shankar R., Analysis of interactions among the barriers of reverse logistics. Technological Forecasting and Social Change, 72, 1011-1029 (2005) Singh M.D., Shankar R., Narain R. and Agarwal A., An interpretive structural modeling of knowledge management in engineering industries, Journal of Advances in Management Research, 1(1), 28–40 (2003) Raj T. and Attri R., Identification and modelling of barriers in the implementation of TQM, International Journal of Productivity and Quality Management, 28(2), 153-179 (2011) Jharkharia S. and Shankar R., IT- Enablement of supply chains: Understanding the barriers, Journal of Enterprise Information Management, 18(1), 11-27 (2005) Agarwal A., Shankar R. and Tiwari, M.K., Modeling agility of supply chain, Industrial Marketing Management, 36, 443457 (2006)

2.

3. 4.

5.

6.

7.

8.

9.

Conclusion
Interpretive Structural Modeling (ISM), provides an ordered, directional framework for complex problems, and gives decision makers a realistic picture of their situation and the variables involved. The ISM process involves the identification of factors, the definition of their interrelationships, and the imposition of rank order and direction to illuminate complex problems from a

10. Ravi V., Shankar R. and Tiwari M.K., Productivity improvement of a computer hardware supply chain, International Journal of Production and Performance Measurement, 54(4), 239-255 (2005) 11. Watson R., Interpretive Structural Modeling- A useful tool for worth assessment? Technological Forecasting and Social Change, 11, 165-185 (1978)

International Science Congress Association

7

Research Journal of Management Sciences ________________________________________________________ ISSN 2319–1171 Vol. 2(2), 3-8, February (2013) Res. J. Management Sci.
12. Barve A., Kanda A. and Shankar R., Analysis of interaction among the barriers of third party logistics, International Journal of Agile System and Management, 2(1), 109-129 (2007) 13. Hasan M.A., Shankar R. and Sarkis J., A study of barriers to agile manufacturing, International Journal of Agile System and Management, 2(1), 1-22 (2007) 14. Raj T., Attri R. and Jain V., Modelling the factor affecting flexibility in FMS, International Journal of Industrial and System Engineering, 11(4), 350-374 (2012) 15. Attri R., Grover S., Dev N. and Kumar D., An ISM approach for modelling the enablers in the implementation of Total Productive Maintenance (TPM), International Journal System Assurance Engineering and Management, DOI: 10.1007/s13198-012-0088-7 (2012) 16. Attri R., Grover S., Dev N. and Kumar D., Analysis of barriers of Total Productive Maintenance (TPM), International Journal System Assurance Engineering and Management, DOI: 10.1007/s13198-012-0122-9 (2012) 17. Raj T. and Attri R., Quantifying barriers to implementing Total Quality Management (TQM), European Journal of Industrial Engineering, 4(3), 308-335 (2010) 18. Dev N., Samsher, Kachhwaha S.S. and Attri R.., GTA-based framework for evaluating the role of design parameters in cogeneration cycle power plant efficiency, Ain Shams Engineering Journal, http://dx.doi.org/10.1016 /j.asej. 2012.08.002 (2012) 19. Chidambaranathan S., Muralidharan C. and Deshmukh S.G., Analyzing the interaction of critical factors of supplier development using Interpretive Structural Modeling-an empirical study, International Journal of Advance Manufacturing Technology, 43, 1081-1093 (2009) 20. Li W.L., Humphreys P., Chan L.Y. and Kumaraswamy M., Predicting purchasing performance: the role of supplier development programs, Journal of Material Processing Technology, 138(1-3), 243-249 (2003) 21. Banwet D.K. and Arora R., Enablers and inhibitors of ecommerce implementation in India-an interpretive structural modelling (ISM) approach, In: Kanda A et al (ed) Operations management for global economy challenges and prospects, Phoenix, New Delhi, 332-341 (1999) 22. Rajesh K.S., Suresh K.G. and Deshmukh S.G., Interpretive structural modelling of factors for improving competitiveness of SMEs, International Journal of Productivity and Quality Management, 2(4), 423-440 (2007) 23. Saxena J.P., Sushil and Vrat P., The impact of indirect relationships in classification of variables: A MICMAC analysis for energy conservation, System Research, 7(4), 245253 (1990) 24. Saxena J.P., Sushil and Vrat P., Scenario building: a critical study of energy conservation in the Indian cement industry, Technological Forecasting and Social Change, 41(2), 121146 (1992) 25. Mandal A. and Deshmukh S.G., Vendor selection using interpretive structural modeling (ISM), International Journal of Operations and Production Management, 14(6), 52–59 (1994) 26. Sharma H.D., Gupta A.D. and Sushil, The objectives of waste management in India: a future inquiry, Technological Forecasting and Social Change, 48, 285–309 (1995) 27. Thakkar J., Kanda A., Deshmukh S.G., Evaluation of buyersupplier relationships using an integrated mathematical approach of interpretive structural modeling (ISM) and graph theoretic approach, Journal of Manufacturing Technology Management, 19(1), 92-124 (2008) 28. Thakkar J., Deshmukh S.G., Gupta A.D. and Shankar R., Development of Score card: An integrated approach of ISM and ANP, International Journal of Production and Performance Management, 56(1), 25-59 (2007) 29. Qureshi M.N., Kumar D. and Kumar P., Modeling the logistics outsourcing relationships variables to enhance shippers productivity and competitiveness in logistics supply chain, International Journal of Production and Performance Management, 56(8), 689-714 (2007) 30. Faisal M.N., Banwat D.K. and Shankar R., Supply chain risk mitigation: Modeling the enablers, Business Process Management Journal, 12(4), 532-552 (2006) 31. Faisal M.N., Banwat D.K. and Shankar R., Information risks management in supply chain: An assessment and mitigation framework, Journal of Enterprise Information Management, 20(6), 677-699 (2007) 32. Singh R.K., Garg S.K., Deshmukh S.G. and Kumar M., Modeling of critical success factors for implementation of AMTs, Journal of Modelling in Management, 2(3), 232-250 (2007) 33. Jharkharia S. and Shankar R., IT- Enablement of supply chains: Modelling the enablers, International Journal of Production and Performance Management, 53(8), 700-712 (2004) 34. Bolanos R., Fontela E., Nenclares A. and Paster P., Using interpretive structural modeling in strategic decision making groups, Management Decision, 43(6), 877-895 (2005)

International Science Congress Association

8

Similar Documents

Premium Essay

Reverse Logistics

...Factors influencing Reverse Logistics: An Interpretive structure modelling approach S. Barma, S. Narkhade, S. Panda, S. Patwa, T. Mandal, Symbiosis Institute of Operations Management, Nashik, Maharastra, India. Abstract: In the present competitive world the supply chain network of an organization plays an important role in defining its competitive edge over the other. Companies with stronger supply chain have higher competitive edge. Reverse logistics plays an important role in strengthening the supply chain. The objective of this paper is to understand the various factors influencing the reverse logistics and develop relationship among these influencing factors. Interpretive structure modelling (ISM) is used to develop the relationship among these factors. ISM helps to identify the factors that are most influenced by other (dependent variable). Also the factor which supports the other factors (driving variable). Micmac analysis was done to classify these factors. 1. Introduction Reverse logistics is the process of moving things upstream in the supply chain. It requires the cost effective planning, implementing and controlling of the flow of goods for reuse, resale, remanufacturing, recycling or disposal. A firm gets involved into this practice to extract benefit from the process of for reuse, resale, remanufacturing, recycling or disposal. People concern with sustainable development has created opportunities for firms or organizations to market their `green' products...

Words: 1911 - Pages: 8

Premium Essay

Organisational Structure

...Access Assignment Coversheet Subject: Business Studies Level 3 Access Assignment Coversheet Subject: Business Studies Level 3 Student Name | Centre | Unit Title Code 10233 Business and Organisation Structures 1 | Assignment Title2000 word assignment: You are employed as a business advisor in a firm of accountants. You have been asked to advise a client about business and organisation structures he needs to consider when setting up his business. Create an information booklet for your client providing an overview of business and organisational structures which he should consider.See overleaf for assignment brief | This unit is gradedGrade descriptors 1, 2, 4, 5 and 7 apply | No of credits: 6 | Date set | Date due | Date submitted | If a resubmission | Date due | Date submitted | Student Declaration: I understand that copying / taking ideas from other sources (e.g. reference books, journals, internet, and tutor handouts) without acknowledging them is plagiarism. I confirm that: * This assignment is all my own work * All contributions taken from other reading and research have been referenced accurately * Any direct quotations taken from other reading and research have been acknowledged and attributed accurately * I have attached a bibliography listing all sources used in producing this assignment. * I have added the word count below. NB unless specified otherwise, a 10% margin...

Words: 1400 - Pages: 6

Premium Essay

Course Outline

...results of this survey were used in weighing the subject areas and ensuring that the weighting is representative of the relative importance of the content. The Security Policy and Standards subdomain focuses on creating organizational security activities and policies; assessing information security risk; and implementing and auditing information security management programs, information assurance certification programs, and security ethics. Watch the following video for an introduction to this course: Competencies This course provides guidance to help you demonstrate the following 3 competencies: Competency 427.3.2: Controls and Countermeasures The graduate evaluates security threats and identifies and applies security controls based on analyses and industry standards and best practices. Competency 427.3.3: Security Audits The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices. Competency 427.3.4: Certifications and Accreditations The graduate identifies and discusses the Information Assurance certification and accreditation (C&A) process. Course Mentor Assistance As you prepare to successfully demonstrate competency in this subject, remember that course mentors stand ready to help you reach your educational goals. As subject matter experts, mentors enjoy and take pride in helping...

Words: 4354 - Pages: 18

Premium Essay

Effort, Reward & Dissatisfaction

...Effort, Reward & Dissatisfaction MGT1000 - Organisational Behaviour Essay 1 There are certain choices in life that dictate all future pathways and opportunities, that will shape a life of bliss or misery; job choice is one such decision. The thought processes and factors considered in such a process are complex and varied; however there have been studies that attempt to explain and quantify this decision process. This essay will apply two of these models, namely Herzberg’s Two Factor Theory and Vroom’s Expectancy Theory to the decision process of Michael Stirling and the choice he must make between a Deputy Principal position at his current school, or leaving to take up the prestigious position of principal at the International School of Melbourne. Through application of these theories, focusing primarily on motivation and job satisfaction variables, it will be clear that Sandra, Michael’s wife, opinion that the ISM position is a better fit for Michael is a reasonable statement. Although the role of Deputy Principal Head of IT is a closer match for Michaels expertise and passion, it will be proposed that this role will have to overcome greater factors of potential dissatisfaction and that the Principal postion contains motivators that will sustain for a longer period. This analysis will provide an insight into the internal thought processes and relationship to the discussed theories which will be summarized into a conclusive judgement. ‘Motivation can broadly be...

Words: 2234 - Pages: 9

Premium Essay

Teachers E-Learning Readiness

...COMPLEMENTING TRADITIONAL LECTURE-BASED TEACHING WITH E-LEARNING: A CASE STUDY Nicholaus Thomas Andrade Hall Department of Information Studies, University of Sheffield Western Bank,, Sheffield, S10 2TN, United Kingdom José Miguel Baptista Nunes Department of Information Studies, University of Sheffield Western Bank, Sheffield, S10 2TN, United Kingdom ABSTRACT The objectivist nature of lecture -based teaching is often perceived to be unsuited to encourage deep learnin g and the acquisition of contextualised transferable skills. On the other hand, collaborative and active e -learning is seen to be an approach capable of fostering these highly desirable outcomes in the learning process. However, given the pragmatic needs and constraints of teaching and learning in Higher Education (HE), lectures are still the prevalent mode of imparting knowledge to students. In order to try and improve the learning experience of students undertaking a course in Information Systems, the research team, with considerable experience in online learning, tried to combine objectivist lectures with a moderate constructivist learning process facilitated by a WebCT online resource. This paper presents the design and development of such an e -learn ing environment and discusses how e -learning can be applied to complement and support traditional on-campus teaching. The e -learning resource aims at providing students with content materials, self-assessment facilities, case-study materials and infrastru...

Words: 4186 - Pages: 17

Free Essay

Maritime

...Southampton Solent University Faculty of Business, Sport and Enterprise Research and Enterprise Working Paper Series Working Paper Number IX June 2010 THE PERCEPTION OF THE VALUE OF HIGHER EDUCATION AMONGST TANKER OFFICERS Quentin.Cox@Solent.ac.uk 1 Abstract Current international maritime legislation requires professional qualifications to be attained, in order for seafarers to be employed as senior officers on merchant ships. There is no requirement for higher educational qualifications to be held by these staff. Nonetheless, it is apparent that many officer employees are conscious of the desirability of possessing recognised educational qualifications. Several have, entirely voluntarily, taken steps to advance their higher education simultaneously with their seagoing careers. This is not a new phenomenon but an opportunity has been taken to gauge current attitudes toward the matter. The paper has been composed as a result of empirical research from a random sample of seagoing officers, whom have attended the Specialised Tanker Training Programmes at Warsash Maritime Academy, since the autumn of 2009. A sample, consisting of 61 course participants, was asked if any had undertaken, or had considered undertaking, higher education study. Of these, 21 had indicated such a preference and were then presented with a series of ten open-ended questions. The results of this survey are presented in this paper and the rationale behind their answers discussed. The paper has also...

Words: 4849 - Pages: 20

Premium Essay

Identify and Outline Briefly Major Trends in Approaches to Organisation and Management Since the Beginning of the 20th Century

...Identify and Outline Briefly Major Trends in Approaches to Organisation and Management Since the Beginning of the 20th Century | MD2206 Management, Organisation and Strategy | David Forrest | Natalie Louise Jones 20494877 | Word Count: 1938 Pages: 8 | Identify and Outline Briefly Major Trends in Approaches to Organisation and Management Since the Beginning of the 20th Century Management was classically defined by Henri Fayol in 1916. He described managing as “to forecast and plan, to organise, to command, to coordinate and to control”. It can be argued that this definition has held through time, however many other theorists have their own definition as to what management means, such as Breech (1957), Koontz and O’Donnell (1984) and Peters (1988). The definition of management can often depend upon the organisation it is within and the approach being taken. Throughout the twentieth century many managers and theorists have come up with their own approaches to management and organisation, many linked to the different trends of the time. One of the major trends to affect businesses is the development of technology. Kast and Rosenzweig (1970) believe that the advances made in technology represent the expansions and growth of large organisations. Dessler (1976) however, points out that the social and economic statuses at the time are closely linked with the development, in what he describes as a “chicken...

Words: 2121 - Pages: 9

Free Essay

Org Change

...wilkinson@lboro.ac.uk All authors are based at: Loughborough University Business School, Loughborough LE11 3TU, UK. Key Words: Employee Turnover, Organisational Change, NHS 1 Organisational Change and Employee Turnover Abstract This paper investigates employee turnover, using data from a recent study of 352 NHS nurse leavers. We explore individual decisions to quit in a context characterised by change, and suggest a mechanism whereby organisational and contextual change can prompt individual leaving decisions. We develop and test hypotheses designed to shed light on the links between organisational change and individual decisions to quit. We then develop a theoretical, heuristic model describing the relationship between organisational change and turnover. The managerial implications of this model are outlined and the paper concludes with an agenda for future research. Introduction Employee turnover is a much studied phenomenon (Shaw, Delery, Jenkins and Gupta 1998: 511). Indeed, one recent meta-analysis (Hom and Griffeth: 1995) alone reviewed over 800 such studies (Iverson 1999). However, there is no universally accepted account for why people choose to leave organisations (Lee and Mitchell 1994), even though it is predominantly in instances where the employee makes the decision (rather than in cases of involuntary turnover) that organisations and organisational theorists have an interest....

Words: 2731 - Pages: 11

Premium Essay

Cloud Computing

...Dublin Institute of Technology ARROW@DIT Dissertations School of Computing 2010-09-01 Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Dublin Institute of Technology, faith.shimba@gmail.com Recommended Citation Shimba, F.:Cloud Computing:Strategies for Cloud Computing Adoption. Masters Dissertation. Dublin, Dublin Institute of Technology, 2010. This Dissertation is brought to you for free and open access by the School of Computing at ARROW@DIT. It has been accepted for inclusion in Dissertations by an authorized administrator of ARROW@DIT. For more information, please contact yvonne.desmond@dit.ie, arrow.admin@dit.ie. This work is licensed under a Creative Commons AttributionNoncommercial-Share Alike 3.0 License School of Computing Dissertations Dublin Institute of Technology Year  Cloud Computing:Strategies for Cloud Computing Adoption Faith Shimba Mr. Dublin Institute of Technology, faith.shimba@student.dit.ie This paper is posted at ARROW@DIT. http://arrow.dit.ie/scschcomdis/1 — Use Licence — Attribution-NonCommercial-ShareAlike 1.0 You are free: • to copy, distribute, display, and perform the work • to make derivative works Under the following conditions: • Attribution. You must give the original author credit. • Non-Commercial. You may not use this work for commercial purposes. • Share Alike. If you alter, transform, or build upon this work, you may distribute the resulting work only under a license identical...

Words: 35464 - Pages: 142

Premium Essay

Buyers Behaviour

...(David) lee Bradley University Yongjun Sung and Sejung Marina Choi University of Texas at Austin This research examines young adults’ attitudes towards product placement in films and television shows from two countries that represent contrasting cultural distinctions: the US and Korea. The results suggest that young adults in both countries perceive film product placement in a similar way but, with respect to television, Korean respondents tend to perceive it as less effective in enhancing content realism and more unethical and misleading. In addition, the findings suggest that, for both film and TV, material- ism, attitude towards advertising, and realism enhancement appeared to be significant predictors of consumer cognitive response to product placement. However, cross-cultural differences were observed for TV product placement. In the US, materialism and real- ism enhancement were found to be most powerful predictors of cognitive response to product placement. In contrast, attitude towards advertising and materialism were found to be the strongest predictors in Korea. Implications for both advertising researchers and practitioners are provided. Introduction Movies have almost always been a popular medium for product placement. Product placement in movies can be an effective international marketing strategy since movies are often produced for and play to audiences across cultures (McKechnie & Zhou 2003). Television has followed this pursuit and has emerged as another...

Words: 10824 - Pages: 44

Premium Essay

Marketing Sample

...tingResearch Report ABOUT Automotive AUTOMOTIVE The global automotive marketing report The evolution of automotive marketing and advertising 2005 edition by Glen Smale © ABOUT Publishing Limited 2005 The global automotive marketing report The evolution of automotive marketing and advertising 2005 edition ABOUT Publishing Group 21 Noel Street London W1F 8GP United Kingdom The global automotive marketing report: 2005 edition ABOUT Publishing Group 21 Noel Street London W1F 8GP United Kingdom T: +44(0)20 7434 1269 F: +44(0)20 7434 1545 Email: admin@aboutpublishing-auto.com www.aboutpublishing-auto.com Copyright © 2005 ABOUT Publishing Limited. All rights reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of ABOUT Publishing Limited. The authors of ABOUT Publishing Group Research Reports are drawn from a wide range of professional and academic disciplines. All the information in the reports is verified to the best of the authors’ and the publisher’s ability, but neither can accept responsibility for loss arising from decisions based on these reports. © ABOUT Publishing Limited 2005 Contents ii ii iv 1 1 1 3 3 4 5 6 8 8 10 13 14 17 17 18 19 23 26 27 30 30 32 33 33 34 34 35 35 36 36 37 38 39 39 40 List of tables List of figures The author Chapter 1: Introduction...

Words: 3481 - Pages: 14

Premium Essay

Formulating Information Systems Risk Management Strategies Through Cultural Theory

...risk management as a means for security experts to manage stakeholders perceptions. Findings – A basic theoretical element of cultural theory is the grid/group typology, where four cultural groups with differentiating worldviews are identified. This paper presents how these worldviews affect the process of IS risk management and suggests key issues to be considered in developing strategies of risk management according to the different perceptions cultural groups have. Research limitations/implications – The findings of this research are based on theoretical analysis and are not supported by relevant empirical research. Further research is also required for incorporating the identified key issues into information security management systems (ISMS). Originality/value – IS security...

Words: 9716 - Pages: 39

Premium Essay

Leadership Styles and Organisational Citizenship Behaviour

...Wladislaw Rivkin, Stefan Diestel, Klaus-Helmut Schmidt* The positive relationship between servant leadership and employees’ psychological health: A multi-method approach** Servant leadership is thought to encourage socially responsible and moral behaviors. In the present article, we test the positive relationship between servant leadership and employees’ psychological health. We argue that servant leadership is positively related to employees’ health because servant leaders shape employees’ needs and create work environments that fulfill these needs. We examine the proposed relationship of servant leadership (a) competing for variance with different well-known stressors, (b) in multiple samples, (c) at the within- and between-person level, and (d) in relation to long- and short-term indicators of strain. On the basis of this multi-method approach we seek to demonstrate that our results are invariant across different methodological conditions. In Study 1 (N=443), we simultaneously tested the between-person level relationships of servant leadership and job ambiguity to emotional exhaustion and depersonalization as the core symptoms of burnout. In Study 2 (N=75), we simultaneously tested the relationships of person-level servant leadership and day-level emotional dissonance to day-level ego depletion and need for recovery as outcomes. The results of both studies demonstrate that servant leadership is negatively related to strain and accounts for unique variance in short- and long-term...

Words: 10028 - Pages: 41

Free Essay

Itil

...Published in association with the Best Management Practice Partnership The IT Service Management Forum An Introductory Overview of ITIL® V3 A high-level overview of the IT INFRASTRUCTURE LIBRARY The IT Infrastructure Library An Introductory Overview of ITIL® V3 Version 1.0 Written by: Alison Cartlidge Ashley Hanna Colin Rudd Ivor Macfarlane John Windebank Stuart Rance Alison Cartlidge Mark Lillycrop Xansa - Steria HP itEMS Ltd IBM Sun HP Xansa - Steria itSMF UK Edited by: Published by: The UK Chapter of the itSMF With thanks to all those who took part in the review process. © Copyright itSMF Ltd, 2007 This version first published 2007 Based on other copyright material with the permission of the copyright owners. ITIL® is a Registered Trade Mark, and a Registered Community Trade Mark, of the Office of Government Commerce (OGC) and is registered in the US Patent and Trade Mark Office. PRINCE® is a Registered Trade Mark, and a Registered Community Trade Mark, of the Office of Government Commerce (OGC) and is registered in the US Patent and Trade Mark Office. COBIT® is a Registered Trade Mark of ISACA and the ITGA. CMM® is registered in the USA Patent and Trademark Office. PMBoK® is a Registered Trade Mark of the Project Management Institute. M_o_R ® is a Registered Trade Mark and a Registered Community Trade Mark of the Office of Government Commerce. © Crown copyright material reproduced with the kind permission of OGC on behalf of the Controller of...

Words: 12782 - Pages: 52

Free Essay

Enterprise Security Services

...SECTION ONE INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on...

Words: 4428 - Pages: 18