Background Information

This is a paper review conducted on one of the papers written by the students. It aims at looking at the content, organization, style, mastery, methods, applications and quality of the work, in order to gain an in-sight about the main aspects associated with the delivering leadership recognized in a particular project. Rules of grammar, punctuation, sentence structure, among other aspects of writing are looked into in this paper review.

The aim of origin paper

The paper that is being reviewed was a response to the question below:

What are the leadership styles and qualities most appropriate to complete projects and operational activities? To do this the following check list will be used.

Company Profile and History

Enterprise Inc. is a family-owned and family-run business. It started its operations in 1957. It has been in operation for over 50 years. Mr. and Mrs. Nicholson have passed on the mantle of leadership to their children. They remained the principal shareholders. The current Chief Executive Officer is Mr. Pam Nicholson.

The company deals with transportation. It started with only seven cars. The company has grown over the years. It is now one of the worlds largest transportation service providers. Enterprise Inc. now has more than 1.5 Million vehicles assigned to various customers. It has a head office in St. Louis in the state of Missouri. It has operations in more than 70 countries in the world. The company has also employed over 90, 000 workers. The report is an investigation on Enterprise Inc. to find information that enables one to choose to work for the company.

The Structure

Enterprise Inc has a Board of Directors at the top. The family has five members with executive roles. The Chief Executive Officer is also part of the board. The CEO is in charge of the company operations and executes the boards decisions. The management includes the Chief Accountant, the Human Resource Manager, the Transport Manager and the Sales and Marketing Manager. All the other employees serve under these managers according to their roles. It also has branch executives and staff in over 50 countries.

Company Mission

The company wants to be the best transportation service provider in the world. It would also exceed the customers expectations for service, quality, and value. The company provides an enabling environment for its employees. They have the opportunity to share their ideas.

Corporate Social Responsibility

Enterprise Inc. has always worked with the communities where it has its operations. It has also partnered with various medical institutions to offer free and or affordable medical services to patients suffering from various communicable diseases. It has also contributed hundreds of millions of dollars to local non-profit organizations in the communities. Enterprise will plant 50 million trees within the next 50 years.

Internships

Enterprise offers opportunities to students and graduates to practice their skills before official employment. It has a lot of internship programs, such as Management Trainee summer intern, Sales Management Trainee Intern, Summer Accounting Intern, Enterprise CarShare Intern, and others. I like the Summer Accounting package. It requires a minimum of 10 weeks during the summer of 2016. I will have closed school. All the internships have roles and responsibilities. For the accounting intern, the responsibilities include:

  • Assist in preparing financial statement & analysis

Introduction

The Chrysler Corporation was first founded on June 6, 1925, by Walter Percy Chrysler with the residual assets of Maxwell Motor Company. Laying the groundwork for an empire that would rival General Motors and Ford, Chrysler started by taking over Dodge and adding two new makes that incorporated Plymouth and DeSoto. In 1998 Chrysler was purchased by Daimler-Benz, and still stays one of the leading American automotive producers, best known for their many manufacturing features and leading presentation edge.

Intangible resources

Around the world, Chrysler more than 75,000 employees are working together That heritage provides a firm foundation upon which to build our future success. Were excited about the evolution of our strong brands and the new products were developing.

The requirements for the candidates are:

  • GPA of 3.5  based on a 4.0 scale
  • Automotive internship or work experience or applied research position
  • Proven strengths in analysis, creative problem solving, communication, interpersonal relationships, self-motivation, and leadership
  • Have applicable work experience or internship
  • Demonstrated written/oral communication skills
  • Ability to interact with others in a team atmosphere
  • Automotive or supplier quality interest
  • Active in extracurricular activities such as student organizations, business or social organizations, or athletics

Borrowing capacity

Chrysler Corporation announced today that it has exercised its option to increase its borrowing capacity. The Revolving Credit Facility, which is scheduled to mature in February 2011, bears interest based on either a base rate plus a margin ranging from 0 to 50 basis points or at the London Interbank Offered Rate (LIBOR) plus a margin ranging from 75 to 150 basis points. The applicable margin rates are subject to adjustment based on the Companys leverage ratio. Any amounts that were drawn under the Revolving Credit Facility, including the $100.0 million expansion, currently, bear interest at a base rate or a LIBOR plus 75 basis points. The Company currently has no amounts drawn against the Revolving Credit Facility, but has $35.6 million of letters of credit outstanding under a sub-facility, reducing the borrowing capacity under the Revolving Credit Facility to $214.4 million. All other terms of the Revolving Credit Facility remain the same.

Structure

Communities are an integral part of the Daimler-Chrysler business model. They are apparent in the strategy of the organization and its structure and are a part of employees daily work. Direct benefits include A more agile product development process.

and the project selection process. It is important to note that the Diamond Philosophy has four main drivers.

Diamond Philosophy

Procter and Gamble use the Diamond Philosophy to guide its business product innovation efforts. The Diamond is a symbol of all the aspects that come together during the business product innovation process. Indeed, some of the things that are considered during this process include resources, the innovation strategy, the SIMPL new product process

be able to learn and adjust faster than their competitors. This results in a competitive edge

Introduction

With increased management strategies and mechanisms, facilitated by increased competition among companies, there is a new wave of management to knowledge management. Globalization and competition has resulted in companies looking for intellectual assets management over and above traditional business assets like physical and human resource.

The move has been facilitated by advancement in technology with homemade and commercial tools used to produce and distribute information within and without a business. These tools include internet, intranet, CRMs, and advance intellectual data management tools. Business intelligence tools are also considered as knowledge management tools.

The major difference that can be seen between the traditional factors of production (land, labor and capital) is that the tradition approaches offered a diminishing marginal rate of return; however, with every other knowledge learnt, there is an increasing marginal rate of return (Singh & Soltani, 2010). This paper discusses how a business can use knowledge management in its operation and how knowledge management influences business restructuring and how it might help an organization better leverage its knowledge resources.

Knowledge Management

Knowledge management cannot be given a single definition but it entails a combination of issues and processes. They are intangible assets which are unique to different businesses and can be improved with experience and information interpolation.

The most important factors considered are human assets that a company have. Human beings have different talents and capabilities; however, tapping this asset requires strategic operation and management. Other than utilizing the knowledge and experience that the employees have, there is the need to use available information to grow and develop knowledge and expertise in employees.

Information can be internal and external and how well the information is utilized can result in growth of knowledge, effectiveness, and efficiency in doing business. To effectively utilize information, organizations should move from information hoarding to sharing of information that they are holding for the benefit of others; this is so despite the fact that there are some private information that a company can hold (March & Kim, 1988).

Other than physical, financial, and human resources being available in an organization there is need to integrate an intellectual asset where these resources can be managed and measures developed to ensure a company has a competitive advantage. Knowledge management is a process which involves understanding the current operation, understanding the potentials and weakness of a company then strategies to get relevant business information and knowledge developed.

The following are the objectives of a knowledge management process;

To develop knowledge based competence for decision making; this will assist a firm to adapt to changing business environment

Introduction

The International Conference on Cryptocurrency 2023 is a highly anticipated event with the potential to bring together top engineers and scientists from all over the world to Singapore. The Carlton Hotel Singapore has been selected as the venue to work on this event. This report aims to provide a comprehensive justification for the proposed venue, menu, and package for this piece of business and ultimately secure the International Conference on Cryptocurrency 2023 for the Carlton Hotel Singapore.

Function Room Setup

Hotel Capacity Chart

The Carlton Hotel Singapore offers an extensive range of function rooms for all events, from smaller gatherings to large-scale conferences. The hotel offers a variety of seating arrangements for up to 1,000 persons in various sizes and styles, from traditional boardroom style to theatre style. The hotel chart is shown in appendix figure 7. The hotel also offers a variety of audio-visual equipment and other necessary amenities to ensure the successful completion of the event.

Function Room and Setup

The most suitable function room set up for the press conference on 17 August 2023, 9 am to 11 am, is the theatre/auditorium style as shown in figure 1 in the appendix. This allows the event organizers to easily arrange the seating in a way that focuses the audiences attention towards the main stage, podium, or presentation area (Ryan, 2020). This setup also makes it easier for the event organizers to control the flow of the event and ensure that the guests can easily hear and view the speaker.

The ideal arrangement for the buffet lunch on 17 August 2023, from 12 pm to 2 pm, would be the banquet rounds as shown in figure 2 in appendix. This arrangement allows guests to enjoy the buffet more conveniently as they can move around the room freely and access the various food selections. This setup also allows the servers to easily move around the tables and serve the guests quickly and efficiently.

For the two breakout rooms on 17 August 2023, 2 pm to 5 pm, the most suitable function room setup would be the boardroom/conference style as shown in figure 3 in appendix. This setup allows for a more intimate seating arrangement for the guests, facilitating more efficient discussion and collaboration between the participants. This setup also allows the event organizers to easily control the flow of the event by ensuring that all guests can hear and see the presenter.

The appropriate function room set up for the two training rooms on 17 August 2023, 2 pm to 5 pm, is the U-shape/horseshoe style as shown in figure 4 in appendix. This setup allows the presenters to move easily around the room and ensure that all participants can follow their instructions and view the presentation (Allen et al., 2022). The U-shape also allows the event organizers to easily control the flow of the event and ensure that all guests can hear and view the presenter.

For the closing dinner on 18 August 2023, from 7 pm to 11 pm, the ideal function room setup would be the crescent/cluster/cabaret style as shown in figure 5 in appendix. This setup allows the guests to enjoy their dinner more relaxed as they can move around the room freely and access the various food selections (Ryan, 2020). This setup also allows the servers to easily move around the tables and serve the guests quickly and efficiently.

Finally, for the outside catering on 19 August 2023, 10 am to 12 pm, the most suitable function room setup would be the cocktail reception as shown in figure 6 in appendix. This setup allows the guests to enjoy the food more conveniently as they can move around the room freely and access the various food selections. This setup also allows the servers to move with ease and serve the guests quickly and efficiently.

Table 2: Event Venues and setup

Assessment  High/ Med/Low HML H/M/L
1 Content Is the content of the manuscript likely to be of interest to sophisticated managers or scholars interested in managing projects in business? If not, are there key parts missing or is the manuscript misaligned with what you believe is essential to this discipline? H
2 Organization Is the manuscript organized in clear and logical manner? If not, how can it be improved?
Checklist guide:
Introduction:
Explains the:
purpose of the paper
” scope and any relevant limitations
” context by providing the rationale of any case study examples
Theoretical Framework:
Includes:
” intelligent discussion of ALL required readings
” evidence of additional knowledge through further cited references
” concisely refers to relevant theory relating to the topic
Data/Evidence used in Case Study Examples
Includes:
” Explanation of the context of the source of data used (validity of observational data  if yours in what way is this of value? Explain
its context to your experience or others that you have drawn this
evidence or data from)
” Highlights any data/evidence characteristics (ie this may be
limited to a specific type of organisation e.g. an NGO or public sector organisation or a global business corporation etc.
” Highlights limitations (e.g. this may be an example in a rapidly
changing environment so things may have changed drastically
since this example was experienced)
Discussion and Evaluation of Data/Evidence Findings
This should compare the theory identified with the data and evidence presented. It should demonstrate that:
” Evidence or data is clearly and concisely presented
” Evidence or data is shown to be valid and credible (i.e. it is
convincing) and relevant to the argument
” Theory and observation of evidence is well matched (i.e. no
extraneous un-discussed data/evidence is introduced but not
commented upon or that theories/concepts are not introduced
that are not then used to compare with presented data/evidence)Conclusions
8 DPM
This should wrap up the paper and not introduce anything new. It should:
” Clearly and concisely summarize the purpose of the paper and how
it was fulfilled
” It should clearly and concisely summarize the main findings or
observations
” It should highlight just a few of the most salient and critical and
useful findings
Booked Venue Type of Event Setup
Empress 5 Press conference Auditorium
Esplanade 1& 2 Buffet lunch Banquet rounds
Istana 2 & 3 Breakout Rooms Boardroom style
Connaught Training Rooms U shaped
Empress 4 & 5 Closing Dinner Cabaret style

Banquet Event Order

Account:

Post as: Sales Manager

Address: 76 Bras Basah Road Singapore, 189558

Event Date: 18 August 2023
Contact:+65

Phone:+65 6338 8333

Fax:+65 6339 6866

Deposit: $137,8000

Payment: N/A

Booked By: Carol Goh

Catering Sales Manager: Student Name

Banquet Operations Manager: Carol Goh

Banquet Event Details
Time Booked Venue Type of Event Setup Required Guarantee Pax Expected Pax
7pm  11pm Hall 1 Closing dinner cabaret style 312 300
Event Flow
From To Remarks
7:00 pm 7:30 am Guests arrive and are welcomed with a drink reception.
7:30 pm 8:00 pm Guests are seated for dinner.
8:00 pm 9:00 pm Dinner is served.
9:00 pm 10:00 pm Speeches and awards ceremony.
10:00 pm 11:00 pm Entertainment and Event concludes.
MENU SETUP
Appetizer:

  • Grilled Portobello Mushroom Caps with Balsamic Reduction
  • Spinach and Feta Stuffed Bell Peppers

Soup:

  • Butternut Squash Soup with Roasted Pepitas

Main Course:

  • Grilled Eggplant Steaks with Tomato Basil Relish
  • Pan-Seared Tofu with Soba Noodles and Veggie Stir Fry
  • Pan-Roasted Lamb Chops
  • Grilled Beef Tenderloin with Red Wine Reduction

Dessert:

  • Mixed Berry Tart with Chantilly Cream
  • Dark Chocolate Ganache Tart with Raspberries
  • Banquet tables
  • 300 chairs
  • Linen napkins
  • China and glassware
  • Stage
AUDIO VISUAL
  • Sound system
  • Microphones
  • Lighting
BEVERAGE
Soft drinks
” Fruit juices
” Sparkling water

  • Selection of Western Australian wines

Introduction

Blockchain belongs to the number of technologies that are gaining momentum in various industries due to their hypothesized ability to change the world by improving the principles of data management. The technology was first presented more than ten years ago, and the number of its potential applications has significantly increased since then. The use of blockchain in various business activities presents an interesting research topic since it allows keeping track of its evolution. This paper presents a review of twenty research papers focused on the real and potential business applications of blockchain.

Problem Statement, Significance, and Objectives

In the modern world, the emergence of blockchain technologies is often regarded as one of the most promising trends that will help people to revolutionize a wide range of processes that impact peoples quality of life. Being aware of the key achievements of blockchain-based services and companies, some individuals are likely to overestimate the actual success of these technologies and start promoting the unrealistic image of blockchain.

Therefore, the research problem that explains the need to review the existing literature about the blockchain technology in business is based on potential incoherencies between the hard-driving ambitions of blockchain proponents and the actual situation with their use in commercial activities. To put it in other words, the research problem that encouraged the creation of the paper is centered on the necessity to categorize various studies in the field to separate the real-life uses of blockchain in different aspects of business operations from propositions for future research. Achieving the goal above will help understand the state of the art.

The problem of ambitions versus reality exists in any field of research, and its practical implications make it specifically important. About blockchain in business, the problem deserves special attention since its proposed applications are numerous. The significance of the research problem is inextricably connected to blockchains status of disruptive technology. In the context of commercial activities, disruptive innovations alter the existing systems of business values and the principles of competition.

Taking that into account, if the universal use of such technologies is not preceded by many years of thorough research focused on both theoretical and practical challenges, it can lead to a variety of large-scale problems and crises. Studying blockchain technologies and their real and planned applications in business is a significant task due to the projected benefits of their universal implementation. The latter is expected to drastically change the basic approaches to business-making by eliminating the need for some excessive steps in business operations and reducing bureaucracy.

Apart from numerous process optimization opportunities typically associated with blockchain, it is necessary to conduct literature reviews devoted to the chosen topic because of the technologys said ability to transform business ethics. According to popular opinions, the key advantage of blockchain relates to the mechanisms helping to establish trust-based relationships between some parties and revolutionize this process.

Using the logic of independent researchers and blockchain proponents who support this viewpoint, it is possible to say that in the fullness of time, blockchain will lead to the extinction of fraud in the business. Taking into account the potential benefits associated with this goal, it is particularly important to contribute to blockchain research by reviewing the available studies and evaluating the practicality of some far-reaching propositions and scientific claims.

To summarize the points presented above, blockchain research is a very young scientific field, and any contributions are required to help separate the practically viable applications of the technology from statements that are still groundless. With that in mind, this literature review is aimed at reaching the following objectives:

  • Conduct a literature search to evaluate the degree to which blockchain innovations are of interest to modern researchers;
  • Analyze blockchain technologies concerning the current state of knowledge;
  • Define popular trends surrounding the uses of blockchain technology in business activities;
  • Study different authors scientific propositions to make conclusions concerning the most promising applications of blockchain;
  • Differentiate between the actual use cases and the proposed ideas related to blockchain in business.
  • Identify the research gaps to be addressed by future specialists in IT and business.

The Review of Literature

Cryptocurrencies, Payment Opportunities, and Associated Disadvantages

The first important theme that is present in academic papers devoted to blockchain relates to new payment opportunities that are available to customers and possess numerous advantages compared to more traditional options. Speaking about the topic, it is necessary to pay attention to cryptocurrencies, a widely discussed but controversial topic. In their research on payment options and new opportunities to find clients and make some businesses more visible and valuable, many authors focus on bitcoin, its uses in the international market, and related threats (Grinberg, 2012; Grover, Kar, & Vigneswara, 2018; White, 2017).

The earliest known application of the blockchain technology, bitcoin, presents a digital currency that is decentralized, partially anonymous, not backed by any legal entities or governments, and cannot be redeemed for other commodities (Grinberg, 2012, p. 160). Among the widely acknowledged advantages of its use is integrity, being immune to inflation and deflation rates, and increased affordability of international financial transactions, and new opportunities for underbanked populations (Sun, Yan, & Zhang, 2016; Grinberg, 2012; Önder & Treiblmaier, 2018). Therefore, since its emergence, bitcoin has been regarded as a promising innovation.

The use of cryptocurrencies is also supposed to benefit some small businesses due to the lack of limitations related to the number of payments. Considering their advantages such as liquidity and the ability to make payments instantly, the proponents of such payment systems state that they can become the best option for micropayments (Grinberg, 2012; Grover et al., 2018). The opportunity to accept micropayments can be listed among the most important applications of blockchain technology in business to consumer transactions.

To some extent, it changes the principles of competition and helps customers to make donations to support some organizations that face the problems of political censorship (Grinberg, 2012). Using the proof-of-work system that ensures the safety of monetary transactions, cryptocurrencies and e-commerce micropayments are generally believed to improve the flow of online business activities (Belle, 2017). Thus, opportunities related to micropayments make cryptocurrencies a driver of change that enables businesses to receive funding from interested parties all over the world.

Despite the perceived ability of cryptocurrencies to simplify business-making and improve its security, modern researchers list a variety of risk factors that mainly relate to legal definitions and the implementation of anti-terrorism laws and policies. Being a combination of game theory and cryptography, the technology makes the exchange of monetary resources less controlled by official financial institutions, thus causing specific problems (Belle, 2017, p. 280).

For instance, the availability of fast and anonymous transactions is sometimes believed to contribute to crime rates, especially when it comes to the illegal drug trade and the sponsorship of terrorism (Grinberg, 2012). Apart from that, the criticism of cryptocurrencies in B2C activities can be related to energy economy considerations. As it is stated in the study by Belle (2017), some types of blockchain that utilize the proof-of-work methods are a waste of computing power since the amount of energy used to create the bitcoin blockchain is almost equal to the energy consumption rates in some Central Asian countries (p. 281). Based on that, the applications of cryptocurrencies in contemporary businesses are limited due to the legal status of electronic cash systems and access to resources.

Despite the existing disadvantages, many scholars still believe that further research will help individuals involved in businesses to benefit from the use of cryptocurrencies. As an example, Önder and Treiblmaier (2018) suppose that by adopting digital currencies everywhere and studying their benefits for end-customers, it is possible to facilitate the work of new customer-to-customer markets in the tourist industry. Continuing on research directions, it needs to be said that similar to valuable goods in the physical world, digital money can be stolen by criminals or simply lost due to several reasons such as security flaws (Grinberg, 2012).

New approaches to proof-of-work mechanisms to be used in peer-to-peer payment systems have been outlined by Chinese researchers (Zhao, Fan, & Yan, 2016). To address the actual security concerns raised by bitcoin cash opposers, it is possible to increase the total number of nodes participating in mining activities, thus minimizing the opportunity to conduct successful majority attacks (Zhao et al., 2016). Overall, despite blockchain technologies significantly increase the number of available payment options, cryptocurrencies are not used universally.

Identity Management, Fraud Prevention, and Consumer Protection

It is clear from modern researchers findings that new payment options are not the only application of blockchain technology in the world of business. Innovations in blockchain research are usually centered on commercial benefits and the ways to increase some businesses competitive advantage (Grover et al., 2018; Önder & Treiblmaier, 2018). Despite that, more attention is now being paid to blockchain technologies in solving some global challenges that relate both to businesses and ethical issues. For example, blockchain-based projects are supposed to help improve some commonly used business models and providing new tools for personal data management (Kewell, Adams, & Parry, 2017). However, particular methods helping to achieve these goals are not widely discussed in the existing literature.

Financial inclusion is especially important for businesses since it strengthens the links between entrepreneurs and their target clients, thus impacting sales volumes and other important performance indicators. According to Kewell et al. (2017) who study the links between blockchain and social good, the technology can be used to reduce financially excluded populations by providing new solutions for managing peoples data. Identity management and authentication are among the promising applications of blockchain in B2G business models (Grover et al., 2018).

Blockchain-based applications for the formation of legal identity are supposed to improve global business processes in four different ways. They include the following: ensuring compliance with immigration policies, addressing national security concerns, increasing political engagement with the help of new options for voters, and making crimes that involve the misuse of others data less common (Grover et al., 2018; Kewell et al., 2017; Zhao et al., 2016).

To achieve the fourth objective, Kewell et al. (2017) believe, it is pivotal to decentralize identity, reverse the process of its formation to build identities from the bottom up, and enable users to manage their profiles and hide some attributes for safety (p. 434). Nowadays, companies and initiatives involved in the development of such systems include the Blockchain Border Bank, BitNation, and the ID2020 project (Kewell et al., 2017). It is immediately apparent from the points above that business applications of the blockchain technology are not limited to methods that improve low-level events in business and are focused on profit maximization.

Apart from helping businesses to prevent consumer fraud, modern uses of the technology in question allow protecting the safety of clients data with the help of the trusted user interface. The latter is supposed to facilitate instant social sharing, make it easier for clients to share information, and reduce numerous risks related to malicious software and data privacy (Grover et al., 2018, p. 330; Kewell et al., 2017; Hawlitschek, Notheisen, & Teubner, 2018).

Despite its numerous advantages, the trusted user interface and some problems peculiar to its creation are underresearched. According to Hawlitschek et al. (2018), the issue manifests itself in the absence of clear terminology since the word trust and other key terms tend to have dissimilar meanings depending on the context. The studies by Hawlitschek et al. (2018) and Kewell et al. (2017) share some similarities when it comes to the future of the trusted user interface. According to them, the impact of the human factor (peoples understanding of trust in business, technical aptitude, and personal experience) presents a limitation that negatively affects progress.

Smart Contracts in Various Industries and Theyre Potential

The use of smart contracts to reach agreements and define the rights and responsibilities of interested parties is a common application of blockchain in business. A smart contract is usually defined as a transaction protocol executing the terms of a contract, and its applications in business are numerous (Zheng, Xie, Dai, Chen, & Wang, 2018, p. 370). Even though such contracts possess numerous advantages when it comes to business-making, they are not immune to cyber-attacks. There have been several cases of smart contract hacks resulting in the loss of funds, and vulnerability is a factor that prevents the global implementation of this tool (Zheng et al., 2018).

Speaking about the benefits of using blockchain and smart contracts in business, many researchers refer to new opportunities related to paperwork processing (Guo & Liang, 2016; Mengelkamp, Notheisen, Beer, Dauer, & Weinhardt, 2018). For example, smart contracts can be effectively used in financial services to control the interactions between the key trading parties and ensure the timeliness of payments (Guo & Liang, 2016). Therefore, despite smart contracts vulnerability to cybercrime, their use is beneficial to operate costs.

In modern studies devoted to blockchain in business, smart contracts are often seen as an option that saves time and ensures the safety of transactions. In particular, the article by Guo and Liang (2016) mentions some problems surrounding large financial transactions such as the need to use the letters of credit for risk elimination. Since they include over thirty different documents that should be prepared, checked, and delivered, these letters create numerous operational risks (Guo & Liang, 2016). With the help of the technology being discussed, it is possible to create smart contracts responsible for performing this procedure, and therefore, reduce the time needed for document processing to one hour (Guo & Liang, 2016).

In general, smart contracts present a blockchain-based tool that can be implemented in any type of business since such contracts add credibility to agreements and facilitate the timely fulfillment of contract provisions (Zheng et al., 2018). The feature that makes them valuable for modern businesses is the immutability of contract provisions: parties signing a smart contract are supposed to have no opportunities to falsify any data to pursue their interests (Zheng et al., 2018).

Also, the use of self-executing contracts can be beneficial to businesses since they are based on the principles of data transparency and the updatability of information  any events that relate to the collaboration of parties become visible to all participants instantly (García-Bañuelos, Ponomarev, Dumas, & Weber, 2017; Zheng et al., 2018; Sun et al., 2016). As it follows from the benefits listed above, the features of smart contracts make them a good option for various types of businesses.

As the chosen research articles demonstrate, smart contracts can be successfully applied to business activities in different industries. For instance, Mengelkamp et al. (2018) utilize blockchain technology to create a model of a local energy market, the mechanism of which is based on a self-executing contract on a non-public blockchain written in Solidity. The model allows using smart contracts to control the release of payments and process orders placed by consumers (Mengelkamp et al., 2018). Similar to Mengelkamp et al. (2018), García-Bañuelos et al. (2017) utilize Solidity supported by Ethereum to demonstrate the uses of self-executing contracts for the optimization of business activities with the intent of reducing initialization costs and maximizing the throughput of operations.

In addition to local electricity markets, smart contracts can find extensive use in land registration businesses and even help to regulate conflicts in relationships. The second generation of blockchain technology allows conducting several transactions right after a particular event (García-Bañuelos et al., 2017). If the principle is applied to land registries, the system automatically withdraws tax payments, transfers funds, and changes property titles once a sales transaction is conducted (García-Bañuelos et al., 2017).

Apart from the registration of property, the creation of self-executing contracts helps regulate any types of relationships, ranging from the collaborative work of two suppliers to matrimonial alliances (Beck, Avital, Rossi, & Thatcher, 2017; García-Bañuelos et al., 2017). As an example, according to Beck et al. (2017), Ethereum allows creating contracts that introduce the rules helping to divide marital property in case of divorce.

The examples found in the reviewed literature prove the point that smart contracts apply to different businesses. However, the extent to which it can affect industries that involve contractors that do not know each other and have to make international payments presents a significant concern. Discussing the research propositions related to blockchain in the tourist industry, Önder and Treiblmaier (2018) suggest that smart contracts present an ideal option for such contractors and, therefore, they can change the future of customer-to-customer tourism marketplaces. Continuing on the relevance of smart contracts to long-distance business partnerships, Sikorski, Haughton, and Kraft (2017) list their potential uses in the construction and the chemical industries to prove that this tool will revolutionize business processes.

Given that self-executing agreements leave no room for fraud, their use can help address the problem of construction delays caused by the breach of promises such as the non-payment of salaries, insufficient financing, and similar factors (Sikorski et al., 2017). The suggestions above that refer to the great opportunities of smart contracts in business process optimization are also supported by Viriyasitavat, Da Xu, Bi, and Sapsomboon (2018) who study their potential in the context of cyber manufacturing.

The Role of Blockchain in Supply Chains: Management and Traceability

Supply chains involve multiple risks related to the presence of untrustworthy contracting parties, the complexity of business operations, cybercrime, and other factors. Analyzing risk mitigation in supply chains, the studies by Tian (2016), Tieman and Darun (2017), Apte and Petrovsky (2016), and Saberi, Kouhizadeh, Sarkis, and Shen (2018) list the actual and potential applications of blockchain technology that facilitate the delivery of services and goods from suppliers to end-users.

The benefits of the technology in supply chains found in the existing literature include increases in transparency and synergy due to well-organized inter- and intra-level collaboration, risk management opportunities, the absence of single points of failure, and quality assurance.

Understanding the importance of product quality in the delivery of perishable goods, modern researchers discuss the uses of blockchain in the food industry. For instance, Tieman and Darun (2017) apply it to the supply of halal food in both non-Muslim and Muslim countries and theorize about the benefits of blockchain-based supply chains. In their understanding, the ability of blockchain to improve the traceability of alimentary goods and immediately report any parties defaults from their obligations are particularly important in the halal food industry due to strict quality standards and related penalties (Tieman & Darun, 2017).

Just like Tieman and Darun (2017), Tian (2016) studies traceability in food supply chains with special attention to the prevention of food fraud. In contrast to the previous researchers, he demonstrates the compatibility of different technologies such as blockchain and RFID and offers the following advantages of his theoretical model: opportunities for real-time product tracking, the credibility of product safety data, and fraud prevention (Tian, 2016). Therefore, an important research problem related to the supply chain applications of the technology being discussed is the ability to propel food safety inspections to the next level.

The security of supply chains in different industries remains an open question despite the statements made by many researchers interested in the given topic. The work by Apte and Petrovsky (2016) reviews the state of the art in business applications of the technology and summarizes the key suggestions related to the advantages of blockchain for supply chains (traceability, fraud prevention, the timeliness of delivery, etc). In their discussion, the researchers focus on the production of pharmaceutical drugs. The findings listed in the given work align with the propositions of other researchers who center their analysis on supply chain management in other industries.

In line with the previously mentioned researchers, Apte and Petrovsky (2016) list traceability, the immutability of key data, and the speed of operation as the most promising features of blockchain technologies. Even though these benefits characterize the uses of blockchain in supply chains positively, modern scholars acknowledge that the technology is now incapable of replacing traditional quality and auditing

processes (Apte & Petrovsky, 2016, p. 77; Tian, 2016). To some extent, the limitations related to the reliability of blockchain-based systems for supply chain management are distilled down to issues with equipment and cybersecurity mentioned in the studies by Belle (2017), Grinberg (2012), Hawlitschek et al. (2018), and other authors. These potential problem areas include the possibility of majority attacks that allow entering unwanted transactions into blockchain-based systems.

About supply chain management and the peculiarities of the field, the problems can manifest themselves in changes in product quality documentation, exclusivity, preferred suppliers, and logistics strategies (Apte & Petrovsky, 2016, p. 77). To be put in other words, many issues surrounding the uses of blockchain in supply chains are inextricably connected to different parties competing interests.

Summarizing the findings related to the applications of blockchain technologies in supply chain management, it is possible to say that despite their increased data traceability, their use does not guarantee the absence of mistakes or opportunities for data falsification. Generalizing on the technologys ability to revolutionize product tracking in supply chains, Apte and Petrovsky (2016) state that blockchain is of great help when it comes to delivery, but its use does not alleviate the need for quality audits (p. 78).

Similar ideas are expressed in the study by Saberi et al. (2018) that lists security challenges among the greatest barriers to the implementation of blockchain in supply chain management. According to Saberi et al. (2018), the establishment of blockchain-based systems can help to achieve sustainability, but success will be heavily dependent on the quality of technical solutions for overcoming inter- and intra-organizational barriers. Judging from the positions of other specialists whose works are listed in the section, the majority of modern authors recognize the critical role of further research based on practical cases in unlocking the full potential of blockchain-based solutions for supply chains.

Gaps in the Reviewed Literature

All studies included in the review discuss the applications of blockchain in business in a detailed way, but there is still a range of problems that require attention and additional research. To begin with, when it comes to the discussion of real-life projects that are based on blockchain technologies, the majority of studies tend to list the same examples such as Everledger, Ethereum, Bitcoin, and some websites that provide cryptocurrency exchange services. As for the additional examples that deal with financial services and other fields of business, they are not always analyzed with attention to the history of development and their actual financial outcomes.

Based on that, many studies from the list review only the most well-known examples of blockchain-based businesses, whereas the increased focus is placed on theorizing, planning, and outlining new opportunities. The tendency is manifested in the chosen works to a different degree. For instance, the studies by Önder and Treiblmaier (2018) and Tieman and Darun (2017) are focused solely on research propositions related to blockchain in the tourism industry and halal food supply. Therefore, the first important gap presents the relation between the actual uses of the blockchain (with the analysis of practical outcomes) and the proposed applications that are still untested.

In addition to that, the existing gaps include a range of problems linked to the barriers to blockchain implementation. Almost all studies included in the review apply the principles of critical thinking to the discussed uses of blockchain in business and present several concerns related to the practical aspects of the technologys applications. Despite that, taking into account the state of things in blockchain research, practically implementable strategies that would help overcome these barriers are not proposed, and this problem presents a significant research gap.

Speaking about the issues that require further research centered on practical problem solving, it is pivotal to mention the absence of legal frameworks that would help businesses that utilize blockchain and cryptocurrencies to build effective partnership relationships and avoid jurisdictional issues (Grinberg, 2012; Belle, 2017). Also, the approaches to the prevention of criminal activities using blockchain are not thoroughly discussed in the studies.

One more research gap that deserves attention is related to the optimization of blockchain-based tools for businesses. Although modern authors pay close attention to the ability of blockchain to make business processes more focused and efficient, the discussion seems to be limited by the recognition of its operating disadvantages. Interestingly, this research gap is the most obvious in the studies devoted to the supply chain applications of blockchain technologies.

For instance, many authors acknowledge the high implementation costs of blockchain-based supply chain management systems, but no solutions are presented (Tian, 2016; Grover et al., 2018; Saberi et al., 2018). Based on that, it is possible to say that many gaps in the available literature are directly related to blockchains actual immaturity and the financial peculiarities of disruptive technologies.

Conclusion

To sum it up, blockchain technology is supposed to be a promising innovation that has the potential to revolutionize a range of business processes in various industries. As it follows from the existing studies, the current applications of blockchain in business include new payment options due to the emergence of cryptocurrencies, micropayments, self-executing contracts that reduce fraud, e-commerce, and many others.

At the same time, some initiatives and suggestions are not fully implemented into practice and require further research. They include the use of blockchain for personality identification, reducing the number of financially underserved people, product tracking in supply chains, the creation of smart cities, new opportunities for voters and property owners, and so on.

According to the review, the key advantages of blockchain in the world of business include increased credibility of transactions, new conflict resolution principles in commercial relationships, and customer satisfaction due to the transparency of businesses. Additionally, among these benefits are the speed of international financial operations, new tools to verify the quality of goods and services, the effectiveness of financial inclusion strategies, and the transformation of competition in the global market.

Although the degree to which the potential of blockchain in business is unlocked constantly increases, several research gaps still need to be addressed to make the best use of the technology in question. These gaps are strictly interconnected with real and potential problems that occur during the development and implementation of blockchain-based tools for businesses. Among them are high implementation costs, the existing threats to the security of assets, and inconsistencies between the actual applications of blockchain and legal systems in different countries.

In general, despite the presence of detailed projects that aim to adopt blockchain for various purposes, many applications of the technology are still in the pilot stage. Taking these problems into consideration, it is possible to conclude that researchers in the field still need to fill in several gaps directly related to practice and real interactions in business.

References

Apte, S., & Petrovsky, N. (2016). Will blockchain technology revolutionize excipient supply chain management? Journal of Excipients and Food Chemicals, 7(3), 7678. Web.

Beck, R., Avital, M., Rossi, M., & Thatcher, J. B. (2017). Blockchain technology in business and information systems research. Business and Information Systems Engineering, 59(6), 381384.

Belle, I. (2017). The architecture, engineering and construction industry and blockchain technology. In G. Ji & Z. Tong (Eds.), Digital Culture p‡ Proceedings of 2017 National Conference on Digital Technologies in Architectural Education and DADA 2017 International Conference on Digital Architecture (pp. 279284). Nanjing, China: China Architecture Industry Publishers. Web.

García-Bañuelos, L., Ponomarev, A., Dumas, M., & Weber, I. (2017). Optimized execution of business processes on the blockchain. In J. Carmona, G. Engels, & A. Kumar (Eds.), Business Process Management/: The Proceedings of the 15th International Conference (BPM 2017) (pp. 130146). Barcelona, Spain: Springer. Web.

Grinberg, R. (2012). Bitcoin: An innovative alternative digital currency. Hastings Science & Technology Law Journal, 4, 159207. Web.

Grover, P., Kar, A. K., & Vigneswara, P. (2018). Blockchain for businesses: A systematic literature review

Abstract

The present article sets out to employ the ever-evolving knowledge of design science in information science research to conceptualize the problem of incorrect academic certifications doing rounds in places of employment or in academic institutions, which primarily originates from illegal activities such as forgery or identity theft. To prevent these instances, we propose an electronic web-based Certification Verification Program.

Using the Stakeholders perspectives to understand the problem and implement an effective and efficient web-based artifact aimed at dealing with this menace, the article discusses the various phases and processes entailed in enlisting the stakeholders concerns, proposing a solution to the problem, prototyping, and building and evaluating the artifact against specific benchmarks, such as utility and efficiency of the proposed artifact in real-world settings.

Through the incorporation of various security levels, authentications, and user and content access control mechanisms in each of the components that function to serve the different stakeholders, in our case  the sender, receiver, and controller, this article sufficiently demonstrates how the Certifications Verification Program could be beneficial to all stakeholders, particularly with regard to ensuring transparency and accountability in policies and privacy practices, ensuring the quality of data, enhancing data collection limitation, guaranteeing purpose specification, and safeguarding the consent of users.

Introduction

Although the boundaries and contours of design sciences continue to experience numerous definitions and refinements as we progress deeper into the 21st century, and in spite of the fact that the sciences of design are seen as a comparatively new entrant to the prism of methodologies, paradigms, and perspectives that have been dominated by ongoing debates formerly only positioned as positivist versus interpretive and quantitative versus qualitative (Purao et al, 2008), academics and practitioners are in agreement about the fundamental importance and value of the subfield to the information systems discipline (March & Storey 2008). Although this shift became visible in the information systems (IS) discipline only since the mid-1990s, according to these authors, design science has in the past received widespread attention and indeed practiced as an important mode of research in other specialized disciplines, including architecture, building economics and engineering. The seminal works of Hevner et al (2004) highlighted design science research as a clear alternative to the IS discipline, leading to the progression of two paradigms that characterized research in the IS discipline, namely behavioral research and design science.

The present article seeks to utilize the knowledge that has so far been gathered in design science to design, implement and evaluate a proposed information technology artifact, known as the Certifications Verification System, which could be used not only to prevent some illegal activities associated with paper-based certificates but also facilitate the storage, management, and retrieval of academic certifications papers for students. Available literature demonstrates that such an artifact, if well designed and implemented, could have the capacity to improve the efficiency and performance of business/learning institutions (March & Storey 2008), but also maximize their value and competitiveness (Germonprez et al 2011).

To understand the dynamics of the proposed IT artifact, it is important to provide an overview of design science research, as follows.

An Overview of Design Science Research

Hevner et al (2004) acknowledge that the design-science paradigm in IS discipline &seeks to extend the boundaries of human and organizational capabilities by creating new and innovative artifacts (p. 75). The paradigm is placed at the confluence of people, organizations, and technology (Hevner et al 2004), and is endowed with the functionality of developing, implementing, using, and managing information systems within organizational contexts with the view to change existing situations into preferred ones. Design science researchers operating within organizational contexts can therefore utilize information technology (IT), among other resources, to design and outline work systems and processes through which critical organizational objectives are achieved.

Simon cited in March & Storey (2008) noted that design science research is grounded in two important phases, namely (1) the definition of the problem space, and (2) optimization techniques to search it. According to these authors, the problem space denotes the desired end situation, the present organizational situation, and the variations between the desired end situation and the present situation. The optimization techniques, on their part, denote actions that may be taken by design and management professionals to eradicate acknowledged variations between the desired end state and the present state.

Hence, it is important to note that &the representation of design problems and the generation and evaluation of design solutions are the major tasks in design science research (March & Storey 2008, p. 726). As noted by these authors, the challenges for design science research in the IS field to develop and evaluate IT artifacts that facilitate management and IT, staff, too, among other things, (1) describe desired organizational information processing capabilities and their relationship with present and desired organizational situations, and (2) develop actions that enable them to implement information processing capabilities that move the organization towards desired situations (p. 726). It is the major purpose of this paper to develop and evaluate an IT artifact known as the Certifications Verification System, based on the central tenets of design science research in the IS discipline.

The Certifications Verification System

The emergence of information technology (IT) and related applications continue to create novel challenges for the education system, not only in terms of building IT-oriented infrastructure to transfer content and learning materials in between the students and the instructors but also in ensuring the students are graded efficiently and results disseminated to the students in a secure cost-effective way. Today, more than ever before, IT professionals and experts in the education sector are working with increasingly complex problems to come up with technology solutions that not only assist in moving information around from one region or place to another, but also facilitate connections between groups of students, learning institutions, and external learning resources (Rye 2009).

Most of these technologies, as typically suggested in Shields (2011), have been focused on the provision of on-line course materials, grading and distance education; however, this article seeks to design, develop and evaluate a unique IT-enabled artifact that can account for students academic progress and provide certifications to students who have successfully attained the set educational goals. The need to design and develop the Certifications Verification System arises from the corresponding demands to (1) safeguard educational quality though the processing and dispensing of authenticated certificates to students and employers, (2) expand access to the certificates for students, (3) increase economic competitiveness for institutions which adopt the proposed system, and (4) facilitate inclusion and equitable distribution of the certificates in a rapidly expanding global information system.

Every certification program, whether paper-based or automated, has its own vulnerabilities which include identity theft and forgeries (Gorard 2010). Considering that certificates are the physical evidence of our academic achievements needed to support further studies and gain formal employment, ensuring that the programs design is flawless is of utmost importance to learning institutions. The proposed IT-oriented artifact must therefore not only expose and address challenges related to such system vulnerabilities but must also address privacy and confidentiality issues if the system is to achieve the desired end state and sufficiently meet its demands as outlined above.

Representation of Design Problems

First, it is imperative to note that the representation of design problems for the proposed Certifications Verification Program will be conceptualized around three stakeholders, namely: (1) the receiver  potential new employer or educational facility, (2) the controller  a graduated person who is going to control the access permissions and authorizations, and (3) the sender  an academic institution that processes the certification. Each of these stakeholders has some demands and concerns (design problems), conceptualized, and illustrated as follows.

The receiver

This stakeholder demands the right certification and the right person, primarily driven by real or perceived concerns about the circulation of fake certifications and identity fraud. It has been reported in the literature that these illegal activities emerge due to paper-based certificates (Murthy 2011), not mentioning that some online sites engaged in providing fake certificates to potential customers (Shields 2011).

This article will focus on two such illegal activities, namely:

Forgery

Forgery is defined in State v. Lutes,38 Wn.2d 475, 479, 230 P.2d 786 (1951), as & the false making of an instrument, which purports on the face of it to be good and valid for the purposes for which it was created, with a design to defraud any person or persons&.( State v. Goranson 1965). Unfortunately, the convergence of the technology revolution witnessed in the 21st century has made the creation of fake paper-based documents a reality. In recent years, there are a number of sites available on the Internet which issue fake degree certificates. It is a growing trade worldwide in counterfeit university degree certificates and academic transcripts, which in turn creates potential damage to the universities and employment systems. In May 2004, an audit showed that around 463 employees in the federal government in the US had fake academic degrees (Murthy, 2011).

Identity Fraud

Identity fraud occurs when an individual &with malicious intent consciously creates the semblance of an identity that does not belong to him, using the identity of someone else or of a non-existing person (Koops and Leenes 2006). In the scope and context of this article, identity fraud involves a person who, with prior knowledge, wrongfully and deceitfully obtains and uses personal or academic data of another person and passes them as own, characteristically for economic or academic gains. In recent years, the internet has become a fertile ground for criminals to acquire data of other people without their consent and passing them as their own to achieve selfish interests (US Department of Justice n.d.).

Identity fraud can best be described by the works of sociologist and criminologist Cressey (1973) cited in Malgwi & Rakovski (2009), who developed the Fraud Triangle Theory to argue that fraud is likely to occur due to one or more of the three elements in the fraud triangle: perceived pressure, perceived opportunities, and rationalization. Figure 1 illustrates the elements of the Fraud Triangle Theory.

Elements of the Fraud Triangle Theory.
Figure 1: Elements of the Fraud Triangle Theory.

As described by Malgwi & Rakovski (2009), the pressure is what causes a person to commit fraud, and can be ignited by a multiplicity of variables, including medical bills, expensive tastes, and addiction problems, among others. Most of the time, pressure arises from a significant financial need/problem. Opportunity is the ability to commit fraud. Because fraudsters dont wish to be caught, they must also believe that their activities will not be detected. Opportunity is created by weak internal controls, poor management oversight, and/or through the use of ones position and authority. Failure to establish adequate procedures to detect fraudulent activity also increases the opportunity for fraud to occur. Rationalization is a crucial component in most frauds and involves a person reconciling his/her behavior (stealing) with the commonly accepted norms of decency and trust (Malgwi & Rakovski 2009).

The Controller

The controller, who in this context happens to be the graduate, must have the necessary control and access permissions and authorizations to ensure that his data are only accessed by the authorized person. Consequently, it is in order to conceptualize privacy concerns and access control needs in the proposed IT-oriented artifact.

Privacy concerns

Privacy is a serious issue in any electronic transaction. Culnan (2000) defines privacy as &the ability of an individual to control the terms under which their personal information is acquired and used. An individuals privacy, as such, is always in an inherent state of tension, since it must be defined in conjunction with the capabilities of others to transact business and even to control their own privacy.

Privacy has four basic categories: information privacy, bodily privacy, communications privacy, and territorial privacy. Internet privacy is mostly information privacy, which means the ability of the individual to control information about ones self. Invasions of privacy occur when individuals cannot maintain a substantial degree of control over their personal information and its use (Davies 1996).

In the last two decades, record access has received much attention from legislators and regulators. On the other hand, privacy protection laws have affected the accessibility and therefore the appraisal of records containing personally identifiable information. The privacy statutes have attempted to protect individual privacy by legislating what information may be collected, the circumstances under which it may be retained, and to whom the data may be released; and by prescribing remedies for violations and sanctions against violators (Barritt 1986).

According to above, the concept of (PII) had been defined as any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individuals identity, such as name, social security number, date and place of birth, mothers maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information (Gallagher 2010).

Access Control Needs

Access control approaches combine cryptographic protection and authorization access control to enforce access control via selective encryption, which implies the receiver can access and decrypt only the data they are authorized to access. Most of these approaches contain a structure called the user tree hierarchy, which represents the relationship between receiver and information items (Hue et al 2011). The challenge here is to satisfy the controllers needs, depending on his rights, by giving him full control of access to his information, with a multi-level of permission such as the permission to view, download or print.

The Sender

The sender, who in this context comprises the academic institution charged with the responsibility of processing certifications, must put security concerns at the center of the whole exercise for the model to succeed. Security is defined as &the protection of data against accidental or intentional disclosure to unauthorized persons, or unauthorized modifications or destruction (Yazdanifard et al 2011). The sender concerns could be within some security attributes level or computer infections, conceptualized as follows.

Security Concerns

Security is the combination of processes, procedures, and systems used to ensure confidentiality, authentication, and integrity of data (Akhlaq et al 2006). The senders concerns are to make sure of the security of the information sent via the infrastructure by employing four security attributes, namely: confidentiality, authentication, integrity, and non-repudiation. In confidentiality, the sender must have the capacity to keep the information sent unreadable to unauthorized users, while in authentication, the sender must demonstrate the capacity to decipher the identity of the receiver to avoid identity fraud, which leads to loss of critical data to unauthorized users. The integrity component denotes the senders capacity to ensure that the information sent is not illegally altered or destroyed during transmission. Finally, non-repudiation entails putting in place mechanisms that will ensure the infrastructure will acknowledge that it indeed sent information or data to the receiver (Akhlaq et al 2006).

Infections and Intrusions

Computer infections, such as viruses and worms, spread over networks of contacts between computers, with different types of networks being exploited by different types of infections. The structure of contact networks affects the rate and extent of spreading computer infections (Balthrop et al 2004). The sender must bear concerns of being affected by any of these viruses and worms through his connection to other networks. Additionally, the sender must bear concerns for intrusion threat, which is defined as the potential possibility of a deliberate unauthorized attempt to access information, manipulate information, or render a system unreliable or unusable (Kumar 1995). The figure next page represents an illustration of the conceptualization of the problem from stakeholders perspectives.

The Conceptualization of the Problem from Stakeholders Perspectives.
Figure 2: The Conceptualization of the Problem from Stakeholders Perspectives.

Designing the Components of the Solution

In order to synthesize the solution, it is imperative to understand the critical components of the solution, described as follows.

The Internet and the Web

In common usage, the words Internet and Web are often used interchangeably. Although they are strongly related, there are some differences between them. The term Internet, in particular, is the more general term and implicitly includes physical aspects of the underlying networks as well as mechanisms such as email and peer-to-peer activities that are not directly associated with the Web. The term Web, on the other hand, is associated with the information stored and available on the Internet. It is also used to indicate other complex networks of information, such as webs of scientific citations, social relations, or even protein interactions (Baldi et al 2003). The Web has ushered an era of anytime, anywhere, any place communication. Widely accepted standards such as HTML use the Web to fully function (Aalst& Kumar 2003). Consequently, it is ideal to use the internet in designing the solution, particularly in availing a link between the different stakeholders, due to its availability, ease of accessibility, and low cost.

XML Exchange Language

The proposed solution is based on web service technology, which relies on XML for communicating the service request and response messages. XML is a data exchange technology, which has not only rapidly evolved into an international standard but has also permeated every sector of business  from aviation and accounting to weather and workflow. In technical terms, XML is a subset of SGML (Standard Generalized Markup Language), modified and optimized for delivery over the Web (Aalst & Kumar 2003).

By using structured data formats like XML the developers have the benefit to get great flexibility on the application because it has the capability to define the contents of documents through a set of elements or tags (Aalst& Kumar 2003). Additionally, XML provides a structured representation of data that can be implemented broadly and is easy to deploy. Evidence from the literature demonstrates that XML provides a data standard which can encode the content, semantics, and schemata for a wide variety of cases ranging from simple to complex, implying that it can be used to mark up a purchase order, an invoice, payment advice, a doctors prescription and information about people and organizations, among other functionalities (Aalst & Kumar 2003).

Overall, XML ensures that structured data will be uniform and understandable across a variety of applications, vendors, and customers. The resulting interoperability has provided the impetus for a new generation of business and electronic commerce Web applications to grow (Aalst& Kumar 2003). Consequently, with XML language, which gives us the ability to connect different applications with different data types, the solution will rely on its capacity to transfer massages among the different stakeholders.

Access Control

Identity Based Access Control (IBAC)

Under this model, permissions to access a resource are directly associated with a subjects identifier (e.g., a user name). Access to the resource is only granted when such an association exists. An example of IBAC is the use of Access Control Lists (ACL), commonly found in operating systems and network security services. An ACL contains a list of users and their access rights such as read, write, or execute (Yuan & Tong 2005).

Role-Based Access Control (RBAC)

The RBAC model restricts access to a resource based on the business function or role the subject is performing. The permissions to access a resource are then assigned to the appropriate role or roles, rather than directly assigned to subject identifiers (Yuan & Tong 2005).

Lattice-Based Access Control (LBAC)

The LBAC model is manageable when there are a relatively small number of static security labels and categories (as the total combinations of labels and categories are potentially n*m), and therefore is only effective for certain coarsely-grained security scenarios and lacks flexibility and scalability (Yuan & Tong 2005).

In our solution, we think the most appropriate model to use is the Role Based Access Control (RBAC). With this access control model, the controller will be allowed to give permission to the appropriate role or roles to access the information.

Antivirus

An antivirus can be described as a protective software primarily designed to protect computers and networks from malicious software, which include: viruses, Trojans, Keyloggers, hijackers, dialers, and other codes that vandalizes or steals the computer contents. Anyone who accesses other networks on a regular basis using the internet should develop and implement an antivirus strategy (Patil et al 2010).

Antivirus products are categorized into three major divisions: Internet Security [IS], Total Security [TS], and Antivirus [AV]. Antivirus products are primarily focused on detecting and remedying viruses and Spyware, while Internet Security products provide all the virus and Spyware removal features of an AV, as well as additional functions to provide greater internet protection. These features may include protection against phishing, rootkit detection, firewalls, and scanning of web pages and HTTP data. Total Security products provide data migration and backup features on top of all security features common to IS products (Patil et al 2010).

The most recent updated antivirus programs, that going to be used in the solution, will guarantee secure transaction of data among stakeholders.

Characteristics of the Solution

As noted by Hevner et al (2004), the solution to the problem will be characterized &with respect to the artifacts use (intention to use), perceived usefulness, and impact on individuals and organizations (net benefits) depending on the system, service, and information quality (p. 77). Based on the above, it is in order to develop constructs and models that provide a unique problem-solving approach for developing an IT-oriented artifact that could allow all stakeholders to share information. A design framework for the Certifications Verification System would therefore entail the following key characteristics:

Components

Components entail &technological subunits that can be combined to form higher-level technologies (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of XML queries by the sender (institutions holding critical certifications information) using either synchronous or asynchronous techniques. The XML query will contain metadata fields for use by the controller, but will also be constructed in such a manner that it will allow for specific control attributes to be used.

Products

Products entail &technologies that interact with the user in a given usage context (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of full access control by the controller, which inarguably allows them to provide access to the receiver (potential employers or institutions of learning).

Infrastructure

Infrastructure entails &technologies that support and extend the use of product technologies (Adomavicius et al 2008, p. 786). Here, we conceptualize the use of a website on the internet which provides the controller with a basic account. The controller can log into the website with the correct authorizations and access their certifications for downloading, printing, or sending to the receiver (potential employers or institutions of learning). The figure next page illustrates the proposed solution to this problem.

Proposed Solution to the Problem.
Figure 3: Proposed Solution to the Problem.

The Prototype

According to Ambler (2012), &prototyping is an iterative analysis technique in which users are actively involved in the mocking-up of the UI [User Interface] for a system. This author further notes that prototypes serve several functions, which include (1) analysis artifact  enables IT, professionals, to explore the problem space with other stakeholders, (2) requirements artifact  enables the initial envisioning of the system, and (3) design artifact  enables IT, experts, to explore the solution space of the proposed system. The proposed prototype is design-oriented, implying that it will enable the developers to explore the solution space for the proposed IT artifact. This further implies that the proposed prototype will not only have the capacity to determine the artifacts desired functionality and its architecture but will be instrumental in creating the actual artifact (Peffers et al 2008).

The prototype for the proposed solution will have three components, namely (1) the controller component, (2) the receiver component, and (3) the sender component. Each of these components is discussed in detail below.

The Controller Component

The Controller Registration Process

In order to use the artifact, the controller will have to register in order to get the subject identifiers (username and password). The registration process is made up of simple steps as elaborated in the figure next page, which illustrates the controllers registration model. Considering that the artifact is web-based, the controller has to register through the proposed website.

This diagram represents the interface of the controllers registration form. The form is designed to collect important information about the controller such as names, school ID, email address, and date of birth among others. This information is saved in the sender database and has to be matched by inputted data whenever someone wants to log in as a controller. This ensures that only the selected controller accesses the account, thereby guaranteeing accountability if the account is misused.

The second step is to verify the provided information with the sender database. If the provided data does not match with the sender data the registration process will terminate. If not the system will send an e-mail to the controller, including their user name and password.

The Registration Process Model.
Figure 4: The Registration Process Model.

The purpose of using this method in the registration process is to implement the easiest way for the controller to create his account, rather than make them contact the university to apply for the account. We are assuming that only the controller knows this information, so, no one else can provide it but them. Moreover, we are assuming that the controllers e-mail will be in the sender database, so no one will receive the user name and password except the real graduated person from the university.

The figure next page shows the interface of the controller registration form, and also demonstrates the key pieces of recommended information to create the controller account.

 The Interface of the Controller Registration Form.
Figure 5: The Interface of the Controller Registration Form.

The Controller Sign-in Process

After the controller receives the registration e-mail which consists of their user name, password, and the link of the sign-in page, they can now enter the artifact web service, as shown in Figure 6

The Interface of the Controller Registration.
Figure 6: The Interface of the Controller Registration.

The Controller Interface Design

After the controller sign in successfully to the web artifact, he will be directed to the controller interface, which contains the elements that make him with full control generated from the web links to the receiver. These elements are outlined in the following table.

Table 1: Elements in the Controller Interface Design.

General Information Link Generator Type of Access
  • Controller Name
  • Account number
  • University name
  • Beneficiary name
  • The validity of link (single, multiple, and expiry date)
  • View only
  • View and print
  • Download
  • Data only
Content to be Accessed Previously Generated Links
  • Degree only
  • Full transcript

Introduction

Background of the Study

China is the worlds most populous country. The country is rated the second largest in the world by land area. The country also has the fastest growing economy in the world, having overtaken other major world economies except for the United States. The population growth of this country is high. From the figures that are available from the report given by Brown, Kroszner and Jenn (2002, p. 23), the population of this country is expected to hit a record 2 billion people by 2050. This means that the country must develop mechanisms that would enable it to sustain this huge number of citizens. In this regard, a number of projects must be set up to counter the negative influence of population growth.

There is an emerging trend in the country where most of the citizens of this country prefer staying in town as opposed to staying in urban centres. There is a massive migration of people from rural to urban centres. As at the moment, the population of Chinese in urban centres is well over 200 million people. This number is expected to shoot to about 350 million people by 2025, according to the report by McKinsey Global Institute (2009). This means that the country must be ready to sustain this population and even more by the above stated time to have self-sustaining cities.

In response to this need, the government, through various urgencies, has initiated a massive project that is expected to develop sustainable cities in various selected locations that would be able to sustain the expected population. China Sustainable Cities Program is one of the most ambitious projects ever to be designed on the face of the earth. The financial consequences, the expected time, and other costs that would be directed to this project are massive. If successfully implemented and completed as per the specification, the result would be a city that is self-sustaining, a city that the Chinese have always dreamt of for the last century.

Problem Statement and the Research Hypotheses

The future of our environment heavily depends on what we do today. Several environmental organizations, especially the Green Belt Movement, have categorically stated that China is the worlds leading country in pollution. This is understood because the country is currently home to various international manufacturing firms. The consequence of this is not only felt by China itself but also the rest of the world at large. However, the fact that the cities are fast-growing and the consequences that come with this will be felt by China as an individual country. Therefore, there was a need to develop a sustainable city program that would ensure that the rising urban population is put under check. As stated above, this project is very ambitious, and its successful completion would result in cities that are not only attractive to the Chinese but also foreign investors.

Though, one problem that the management committee of this project must put into serious consideration is the possible risk factors that may accrue in the process of implementing this project. Attractive it is, but if care were not taken to keenly identify the possible risks that may affect the project, then the whole program would be a white elephant, and the taxpayers money would be lost through failed projects.

Therefore, this study seeks to follow the path taken by May (2010, p. 77) on those lessons from Huangbaiyu. The researcher intends to analyze the possible risks that the project may face, and design risk management techniques that would help the implementing authorities of the project work with the least possible problems. The researcher seeks to identify these risks and develop means of averting them in the entire implementation process. In essence, the researcher seeks to reject the null hypotheses stated below (and accept the alternative hypotheses) through quantitative data analysis.

H1o. Perception of risk management is not related to perceptions of project maturity, corporate culture, and project sustainability.

H1a. Perception of risk management is related to perceptions of project maturity, corporate culture and project sustainability.

H2o. Identification, quantification, and mitigation are not the three main areas in the activities of China sustainable cities program, and response control is not the key accompanying tool for environmental issues.

H2a. Identification, quantification, and mitigation are still the three main areas in the activities of China sustainable cities program, and response control is the key accompanying tool for environmental issues.

H3o. Risk quantification technique is not an appropriate mathematical method in dealing with international project uncertainty.

H3a. Risk quantification technique is an appropriate mathematical method in dealing with international project uncertainty.

Justification of the Study

Bussey Bridge in Boston, the United States, was one of the most attractive projects that were expected to generate revenue that would exceed the cost of its construction in less than one year. However, because the implementing authorities failed to analyze the possible risk factors that could be associated with the project, the result of the entire program was the infamous Forest Hill Disaster where the iron railroad collapsed under a train, killing thirty people and injuring over forty on March 14, 1987, not to mention the wasted due to the fallen bridge. This is just but one incident. Other numerous ugly accidents have happened due to inappropriate measures taken to mitigate risks in massive projects. China Cities Sustainable program has been hailed as a massive project that stands to benefit many. Researchers have extensively reported on how the country stands to benefit from it. However, little research exists on risk factors that may come with the project and mitigation measures that come with it. It is upon this basis that the researcher decided to conduct this study.

Aims and objectives

Through this study, the researcher seeks to achieve the following objectives.

  1. To investigate the possible risk factors that may be associated with the China Sustainable Cities Program.
  2. To determine the mitigation measures that may help avert the identified risk factors in the project.
  3. To identify individuals and authorities that would be in the best positions to implement the above-identified mitigation procedures.

Scope of the Study

This research aims at assessing China Sustainable Cities Program and determining the risk factors that are associated with the project. Therefore, the study is limited to this specific project. The findings of this study, its conclusions and recommendations are specifically meant for this project. The scope of the study is also limited to China as a country. Although the study may be helpful in other countries and in other projects, it was specifically meant for the above-stated project.

Significance of the Study

This study aims at developing measures that would help avoid the risks that may be associated with this massive project. As such, the researcher hopes to eliminate such incident that may occur in the process, or after the completion of the project that may cost lives of people or damage of properties or the project itself. Because this is a scholarly research, the report would also be useful to future researchers in this and other related fields.

Literature Review

This chapter is a detailed analysis of the existing literature on China Sustainable Cities Program and other related literature about project management, especially the management of risk factors. In this literature, the researcher hopes to find supporting clues that would help in supporting the alternative hypotheses set in the research proposal by rejecting the null hypotheses. Below are the hypotheses that the literature review in this chapter is trying to respond.

H1o. Perception of risk management is not related to perceptions of project maturity, corporate culture, and project sustainability.

H1a. Perception of risk management is related to perceptions of project maturity, corporate culture, and project sustainability.

H2o. Identification, quantification, and mitigation are not the three main areas in the activities of China sustainable cities program, and response control is not the key accompanying tool for environmental issues.

H2a. Identification, quantification, and mitigation are still the three main areas in the activities of China sustainable cities program, and response control is the key accompanying tool for environmental issues.

H3o. Risk quantification technique is not an appropriate mathematical method in dealing with international project uncertainty.

H3a. Risk quantification technique is an appropriate mathematical method in dealing with international project uncertainty.

The Nature And Characteristics Of China Sustainable Program

China has the largest population in the world. Cadle and Yeates (2004, p. 45) state that China is home to about 1.3 billion people. Some of the provinces within this vast nation are partially autonomous, with their own governments and other relevant facilities. The cities within this country are expanding at an alarmingly high rate. Chandra (2009, p. 11) states that Shanghai alone has had about 56 per cent increase in population in the past twenty years. The rate of expansion of these cities is expected to increase, especially with the expansive economy of the country and the fact that the country is currently the leading manufacturer in the world. The cities would have to host not only the Chinese but also other nationals who would come to trade, as casual laborers, or expertise in various production facilities within the country. Having realized the looming crisis in the country following the expected growth of population in the cities, the concerned authorities have realized the importance of having the cities upgraded to reflect the current needs. According to the report by Dong and Yang (2008, p. 33), the authorities have come to terms with the reality on the ground, and have come to the realization that not much can be achieved out of the cities if programs to implement current changes are not implemented as soon as possible.

Engineers from China designed most of the cities, several years back. Though good enough to sustain the current population, the rate at which the cities population is growing is a clear pointer that the country stands to lose many revenues if immediate changes are not met. Therefore, many of the authorities have considered outsourcing the expertise of UK urban designers and planners. Dressel (2001, p. 87) argues that most of the cities in the United Kingdom are designed in such a way that they can sustain an unexpected upsurge of the population without causing an upset to the available facilities. This scholar notes that because of this, these United Kingdom cities have remained sustainable even with the increasing population. This is what the authorities seek to borrow from these cities in an attempt to ensure that these Chinese cities become sustainable with the expanding population. Changsha, Chongqing, Hangzhou, and Wuhan are some of the cities that have clearly come out to seek the expertise of the UK urban designers and planners. This research seeks to study the projects of two of the four cities: Hangzhou and Wuhan.

The Action Plan 2011-2012 for the UK-Hangzhou Sustainable City Partnership is a project that is expected to improve the Hangzhou by planning and designing it in a way that would be sustainable in the coming future. Within this city, there four sections that define the entire project. The first section is the delivery of the action plan, which involves defining the main players of the project. UKTI Shanghai will be the link to the UK planers and designers of urban centres. The Hangzhou Municipal Foreign Trade and Economic Cooperation Bureau will be the leading Chinese stakeholder in the project. The second section involves defining activities and projects of the action plan 2011-2012. Geschwind (2001, p. 32) says that a good project should have all the activities clearly defined and the tasks appropriately assigned. This argument is supported by Earl, who emphasizes on the need to define and assign activities of a project with the clear timeline clearly stated.

This scholar further explains that the individuals should then be grouped into units based on the closeness of their projects. This section has clearly stated the roles of different participants and the expectations after the completion of the project. The third section of this project is the scope of the plan. Horlick-Jones (1995) argues that every project must have a scope. The scope, according to this scholar, would help the planers know what to include in the project, and what to avoid. The participants in this project agreed that besides the activities stated in section two, both of them would give consideration for further cooperation if such a need would be. This is very important for the success of the project. Insag (1992, p. 65) notes that a projects success has its genesis from the trust between the two concerned parties.

This would eliminate any conspiracy that may arise where one participant wants to demonstrate that the other is ineffective in undertaking the assigned duties. Broadening a narrowly defined scope leaves the participants with a room to expand the current scope to include some factors that were not included in the initial plan. Section four of this project defines the commencement date, the duration that the project is expected to take, and a room for the termination of the project. This, according to Kunreuther (1997, p. 20), is a very important aspect of a project. This scholar holds that a good project should have the time constrain should be spelt out so that the supervision of the project is made easier. This argument is supported by May (2008, p. 17) who says that when specifying the time, it is important for the participant to specify the time that they will complete the projects so that their performance may be determined as at the stated time intervals. Wuhan Sustainable Cities Initiative project has the same procedure as that of the Hangzhou Project stated above.

China Sustainable Programs Drivers And Constraints

Register (1987, p. 42) defines project drivers as the items that have brought the initiative to put up the project. According to this scholar, project drivers are the opportunities that may be gained if the project is implemented or the possible threats that must be avoided for a successful operation of the firm. This project had a number of drivers that forced the two cities to implement the project. According to Steffen (2010, p. 38), Wuhan and Hangzhou are some of the fastest-growing cities in China. The current population of these two regions is already having a heavy impact on the two cities. There is every need to ensure that the cities develop proper structures that would help it sustain itself. The first driver of this project is the numerous benefits that this firm stands to gain by successfully implementing the project. By implementing the project, the cities would open up for foreign investment. This would increase the revenues collected by the two councils in tax and other charges. The region will also experience a general improvement of the living standards of the citizens of this country, as there will be increased job opportunities. There also some negative drivers that the cities are trying to avoid.

According to the report by Slovic, (1993, p. 67), most of the cities in China have an increased level of urban sprawl. This is partly due to poor urban planning, as Suzuki, Dastur, Moffatt and Yabuki (2009, p. 25) note. This has had a negative effect on these cities, especially the sanitation and traffic movement. With the increasing population, Wuhan and Hangzhou risk having their environs to become completely polluted due to the increased demand posed by the higher population. These are the main drivers that made the councils of the two cities settle on the decision to implement the sustainable cities program. Abdurrahman (2010, p. 39) observes in his report that there are situations where the forces become so strong that trying to resist them may prove foolhardy. In such situations, this scholar notes that it may force the concerned authorities to act in a way that would avert the forces of nature.

The project has some constrains that must be observed by both partners that are involved in the project. According to Abu and Faruq (2010, p. 78), the leading constrain in a project is always a time factor. This is also supported by Andrzej and Buchaman (2007, p. 42), who argue that a project must have a time constrain clearly spelt out, stage by stage for there to be a proper monitory mechanism. By spelling out time for the project, Earl says that it becomes very easy for all the involved participants to determine the success of the project stage by stage, from the onset of the project. Hangzhou had divided the project into four faces. The first face of the project was stipulated to begin in 2009 and run until 2010. The second face was set to begin in 2011 and run until 2015. The third face of the project would begin in 2016 and run until 2020.

The last face would run from 2020 to 2050. The participants must observe these time constrain there to be a successful implementation of the project. It would be possible now, to determine the success of the project by looking at the first face, which by now is expected to be complete. Barbara (2005, p 6) says that another important constrain that must be considered in project management is the available finances. Wuhan has various projects each estimated to cost differently based on their magnitude. The third project, which aims at eco-system protection, is estimated to cost the council RMB 15.875 -13824. Waste Water Treatment Project, which is the fifth project, is estimated to cost the council $ 11 million. The seventh project; the Caidian Wetland Ecological Park Scheme Project is estimated to cost the council 4.57 billion shillings.

The eighth project of building Tianxing Ecological scheme would cost about $ 2 billion, while the ninth project of building commercial and residential complex scheme would cost the council RMB 6 -13824. Barry (2005, p. 12) notes that defining the value of each project the way Wuhan Council has done is very important. It allows the implementers of the project to determine if the available resources would be enough to finance the intended projects. Barthe (2010, p. 22) on the other hand thinks that although the art of defining a large project in small subproject may help assign value to each project, the strategy is far more costly than when the project is defined in entirety. By defining the entire project, it becomes possible for the council to negotiate a lower price and award one firm the entire project. This scholar also notes that this would foster uniformity of the construction. Both partners must ensure that they work within the set constrains if the best result is expected.

China sustainable programs global network and collaborations

China Sustainable Program is designed in a way that it incorporates various stakeholders. The two councils conducted a research, and it came to their realization that the cities in the United Kingdom were designed in a way that they reflect the current needs of highly-populated urban centres. The cities have been designed to sustain population influx, although the growth rate of the country does not indicate the possibility of having this influx in the near future. Therefore, the councils have decided to collaborate with firms from the United Kingdom in developing sustainable cities that would help it come up with the desired cities designed to meet the increasing population of China. The Hangzhou Municipal Government has signed a contract with a leading UK trade and investment authority, known as UKTI (United Kingdom Trade and Investment). The two have agreed to work in collaboration to ensure that the entire project is successful in its implementation. This firm would be the global link of Hangzhou in the international forum. It would be responsible for outsourcing the best expertise from the United Kingdom and other world regions. This is in line with the explanation given by Belanger (2011, p 21) on projects global networks and collaboration.

Wuhan Municipal Government has also outsourced the services of UKTI in implementing the various projects that it has set in a bid to ensure that its city is planned and designed to reflect the current and expected future demand. UKTI has entered into a collaboration with this government to ensure that the projects get the right personnel that would be in a position to ensure that Wuhan is transformed into one of the ultra-modern cities not only in China but also the entire world. This reflects Bells (2001, p 38) advice on project networking.

China Sustainable Programs Organization And Corporate Governance

Biswas (2011, p. 55), observes that it is very important to realize that a project, just like any corporate task, must have a clearly defined organizational structure in order to achieve the desired result. This scholar further notes that corporate governance is very important in project management, especially if the magnitude (in terms of the financial need and the impact it has on the society in general) is huge. In both municipalities, the magnitude of the projects is huge. As Bowe, Briguglio and Dean (1998, p. 61) state, the concerned authorities have clearly defined the organizational structures of the projects and corporate governance that would ensure the success of the projects. Wuhan has ten projects that should be completed within a varying period.

Having realized their capacities and the deficits they have in expertise and facilities, Wuhan Municipal Government has developed a management pattern that has seen it assign UKTI some tasks. The council is not without expertise. Therefore, this council has entered a partnership with UKTI to handle some tasks in the project that would help ensure that the projects are completed at the least cost possible. Clement and Henry (2010) say that this is important because it helps strengthen the bond between the outsourced firm and the client. Clement and Rodney (2004, p. 15) further observe that this would enable the participants to work as a team. Both sides will benefit from the experience of the other. Most of the projects activities would be carried out within Wuhan, while others would be done in the UK and Beijing.

The same strategy is applied by Hangzhou in managing its projects. In both cases, the management is reduced to the individual level and is assigned to the participant. Each participant would be responsible for the management as regards to the assigned task and ensuring his or her success, as suggested by Clinton (2011, p. 63).

Project Management Maturity Model And Capability In China Sustainable Program

Project Management Maturity Model is a tool that is used in measuring project management maturity. It provides a roadmap with the necessary steps that should be taken towards the project management performance improvement and maturity advancement. Drake, Wong, and Salter 2007) state that this model provides a logical path towards progressive development and strategic plan for the advancement of a project. The levels given in the figure below (levels 1 to five) shows projects advancement towards maturity and the activities that should be carried out towards the same, from the initial stage to the optimizing stage. In the rows are the tasks to be taken out at these stages. This model shows that the China Sustainable cities program has a clear-cut strategy that would help it in achieving the desired objectives. Also important to note is the fact that the stakeholders have factored in risk management policies, as shown in the model below. This would help in ensuring that the project management team is in a position to identify the risks and act upon them as soon as would be possible. This would help in ensuring that the risks are identified at an earlier stage so that the consequences of late identification are eliminated.

The Nature Risk And Risk Management In China Sustainable Programs

Ewens (1972, p. 76) notes that it is very important to come up with a workable definition of projects risks in order to be able to identify them in the course of the project and work upon them as soon as possible in order to eliminate their consequences. This idea is supported by Falah (2005, p. 111). According to this scholar, risks refer to exposure to uncertainties, which may potentially have negative consequences, and therefore affect the project negatively. French, McNayr and Escher (2010, p. 112), on the other hand, define risks as unforeseen consequences that may result in loss of money, labour or time of a project. In every project, there is always the need to ensure that all the risks are well calculated, and their consequences factored in. As Hirschey, Kose and Makhija (2004, p. 20) say, there is no project that comes without risks. Every project has its own risks. The most important thing should be ensuring that these risks are well-identified and appropriate measures taken to manage their consequences. China Cities Sustainable Programs is a massive project that would have a huge impact on the cities. However, it would be very important to appreciate the fact that this would come with some risks that must be factored in for it to be possible to be successful.

According to the reports by the UN-Habitat, there is a huge movement of people from the rural set-ups to urban centres in the world over in this twenty-first century. China is one such country that is experiencing this influx in its cities. This program is designed to help ease the congestion in these cities. However, obvious risks lurk in the implementation of these cities. Kalmbach and Carr (2010, p. 19) note that there are some factors that are known to cause risks to the project implementation process. Volatility is one such factor. According to Kent and Thompson, when the nature of change and its dynamics is volatile, a project risks various challenges.

This is especially so when the project is to take a long period because what is considered relevant today may be irrelevant after a short while. Uncertainties, as Kent and Thompson (2005, p. 30) explain, is another risk factor. This scholar explains that when the project implementers cannot predict the future, it becomes impossible to design the project in a way that it would satisfy the future needs for which it is intended to. The management may end up designing a project that may not satisfy future needs. Complexity is another problem that a project may face. When the project has hidden cause-effect inter-connectivity, it may be challenging to come up with a clear means of approaching issues that may cause a threat because it is difficult to single them out. In other cases, this is rare, though, the project implementation team may be vague in defining the project.

Kline (2010, p. 34) observes that there are a host of project risks that an organization may face. One such risk is inadequate sponsorship. When the project lacks a proper sponsor, it may fail, however ambitious it could be. A slow or poor decision-making process is another risk that a project may face Krathwohl (2004, p. 50). When a project lacks a clear decision-making organ that is efficient and effective, there is a huge risk that the project may fail to pick up at the expected pace. Kurtz and Boone (2010, p. 100) note that a project without a clearly defined scope is another risk that should be taken care of. When the scope is not defined, the project may risk being considered vague. Change management is another factor to be considered. Lacity, Willcocks and Feeny (2004, p. 127) argue that change is the most permanent factor in every aspect of a project. It is therefore very important to ensure that the implementing parties take either into consideration future changes that may affect the project before it is completed or after its completion. The resources, as Lall and Narula (2004, p. 467) note, must also be available. When the resources are available, it becomes easier to implement the project within the shortest time possible.

Qualitative And Quantitative Approaches In Risk Management

As Majer (2011, p. 62) observes, risk analysis is always performed in two ways, either quantitatively or qualitatively. It is very important that when assessing the two types of risks, the two approaches are clearly understood. Manaschi (1998, p. 87) states that risk analysis is very important. Through this, the supervisory task players would recognize the possible and existing vulnerabilities, fears and other dangers that can potentially derail the overall performance of the program. Therefore, care should be taken at this stage. When conducting a risk analysis, it is important that the approach chosen is compatible with the project itself. Michael, Lino and James (1998, p. 16) say that when conducting a risk analysis for a project, it is important the scope and approach should be harmonized with the project size, time availability and the expenditure.

Minja (2009, p. 14) supports this by noting that it is illogical for an individual to conduct a massive risk analysis that consumes a lot of time and money on a small and inconsequential project. Similarly, it would be suicidal to conduct a mini risk analysis on a huge project that has taken a lot of time and resources to complete. As Moran (2011, p. 80) simply puts it, risk analysis should be proportional to the project itself. A huge project like China Sustainable Cities Program should have an equally detailed risk analysis because it has a huge financial consequence.

The risk analysis team chooses to use quantitative, qualitative or both approaches in conducting risk analysis. This would be based on the requirements of the project and the available resources. The main difference between qualitative and quantitative risk analysis approaches is based on the objective. The objective of performing qualitative risk analysis to a project is to acquire security against identified risks and heighten the alertness of team members, the management and all other concerned people who may be vulnerable to the risks Panagariya (2008, p. 46). According to Proulx (2011, p. 69), this approach is important in the identification of impediments of project management that have the potential of becoming risk factors. Alternatively, a quantitative investigation is apprehensive of the execution process that is, the essential safety procedures that have already been recognized in order to put off all the dangers that have been described. When this approach is employed, Ruddar and Sundharam (2009, p. 141) note that the management would be in a position to conduct a conscious analytical interpretation which would help in the development of measures of risks resolution. Given the magnitude of China Sustainable Cities Program, there is a need to conduct both quantitative and qualitative risk analysis approaches.

Opportunity Management

According to Safizadeh, Field and Ritzman (2003, p. 557), effective risk management involves learning how best the team can recognize and subsequently capitalize on the available opportunities, besides recognizing failure points. This fact is emphasized by Shachaf (2008, p. 131), who notes that risk management should not be narrowly defined as identification of risks and how best these risks should be countered. This scholar notes that the team should not just concentrate on being on the defensive. It should also focus on being on the offensive by going for the existing opportunities and making the

Introduction

The history of economic growth in India is now often perceived through the lens of social disruption. While the overall view of the developing country may suggest that the economy of India is booming, a closer look at the states communities reveals a growing divide between the richest and the poorest people. The latest decade of such increase in prosperity and poverty has been compared to the United States Gilded Age which the country entered after the Civil War.

Crabtree (2018), for instance, notes that the path which India has chosen now furthers the distinction between classes and creates more opportunities for people with high incomes to gather even more financial wealth than before. On the other hand, individuals and families with limited resources suffer from barriers to resources which affects their future aspirations (Dehejia, 2018; Genicot & Ray, 2017). The difference between the incomes and the inequality of conditions in which people live further exacerbate the instability of Indias economy.

Thus, the issue arises that enquires which policies may be necessary for the country to reduce its economic divide. One may consider multiple approaches, but all of them require some research on the causes that lead to the unstable implementation of capitalism in the developing state. Among various suggestions and proposed reforms, it is possible to outline an option that affects the economic future of India most directly since it is focused on the youth.

Policies related to education are advised as a way to reduce inequality in India  they do not address the economic state explicitly, but they may significantly alter this sphere. Mass education challenges the ideologies of people from all backgrounds, as well as provides impoverished people with an ability to improve their financial state while addressing the issues related to ethnic, socioeconomic, and gender inequality.

Research Question

The introduced research question considers the ways in which external causes influence income inequality in India and the countrys overall state of the economy with the focus on future changes. There are many ways in which the financial situation of the nation may be analyzed. Some people focus on political reforms that challenge corruption, while others address the idea of taxes being imposed on the most prosperous Indian citizens and reduced for the poorest parts of the nation. However, the notion that some global actions such as education may mitigate economic issues is also a vital part of changing the countrys development patterns.

In fact, the concept of change being encouraged from the youngest generations is likely to be highly influential in many instances. In their research, Uslaner and Rothstein (2016) show how the ideas of education and corruption may be connected, for example. Thus, this research question is formed to relate these ideas to each other and to implement them in the case of Indias economy.

Topic Relevancy and Current Problem

Apart from explaining why education may be linked to economic inequality, it is also vital to understand why India needs these studies in the first place. According to Dehejia (2018) and Crabtree (2018), India is currently undergoing changes that are similar to the ones that happened to the U.S. in the Gilded Age. During this time, the Western country has experienced rapid growth in production and economic prosperity which, however, led to a sharp separation between the rich and the poor. In India, the same problem has risen, and it persists to this day  poor peoples income does not decrease, but it also does not improve.

As a contrast, the wealthiest people multiply their revenues, thus increasing the divide between the classes. In the years from 2006 to 2015, billionaires have started acquiring six times more wealth than before, while hired employees pay have not increased for more than 2% (Income inequality gets worse, 2018, para. 4). These numbers indicate an apparent discrepancy that affects all sides of peoples lives apart from the countrys economy as a whole.

The shift to the increase in wealth and peoples separation into classes has been discussed for approximately a decade. Moreover, the problem continues to affect the population as its 1% of wealthiest persons is the owner of more than 70% of all wealth in the state (Income inequality gets worse, 2018). This situation does not signify a growing economy but the opposite of improvement. Although the banks and the government may have more liquid capital that moves between industries, manufacturers, and businesses, it is occupied by a small number of people who make rather dangerous decisions and harm the economic stability in the long term.

The system implemented in India at the moment fails to supply the majority of its population with resources for basic survival, not considering the means of life improvement such as healthcare and education. Minimal wage workers who are responsible for producing vital resources cannot afford safety and comfort, thus experiencing high levels of uncertainty in their future.

The need to fix the problems of India through government action is highlighted by scholars. Policies are proposed as a way to regulate the unstable economic situation which places some people above others because of their financial prosperity. Government-induced changes have an opportunity to introduce changes that will provide the necessary limitations to those who currently have a significant influence on the market. Furthermore, they should introduce strategies for poor people to overcome and eliminate existing barriers.

After analyzing the currently active systems in India, it becomes clear that the topic discussing the inequality of people in the state is highly relevant to contemporary economic research. Moreover, this pressing issue requires more attention each day because of the difference between poor and rich people affects the countrys economy, politics, social tensions, and even the environment. As the main concern relates to the ways of fixing income inequality, future considerations and policies should be investigated and proposed. The idea of education being a catalyst for change, as an outcome, should be assessed in order to determine its potential.

Conceptual Framework

The main idea behind the proposed research question is formulated on the basis of a framework that is introduced by Uslaner and Rothstein (2016). The scholars also use a theory which implies that a change from corrupt particularism to ethical universalism is beneficial for a population (Uslaner and Rothstein, 2016, p. 234). In this case, education is not seen as a general sense of teaching people new information. Instead, the authors consider free learning opportunities that are accessible to all members of the population. Universal education is a policy that, according to Uslaner and Rothstein (2016), serves as a robust foundation for reforms of the countrys economic and political situation.

The present research adopts this framework in order to see whether India can benefit from universal education. Moreover, this concept suggests specific changes to the economy which will be father discussed in the literature review. However, it is essential to note why these alterations are expected of the country. First of all, Uslaner and Rothstein (2016) argue that the implementation of free education influences the publics perception of the government. People believe that their country is focused not on a particular goal that can be achieved only by a small number of rich people. Instead, the state firmly trusts in its citizens to move forward towards the common good together.

This is the first implication that creates political advantages without directly addressing economic policies. Secondly, the education itself is seen as a source of positive change. Higher education, in particular, produces professionals who can acquire profitable and stable jobs, leading the economy into a more service-focused and less resource-reliant infrastructure. Finally, training of all people promotes equality and social change that creates different ideologies of money, wealth, prosperity, and values.

Literature Review

First of all, it is required to address the findings that describe Indias current situation in more detail. According to Crabtree (2018), the idea that Indias problems are similar to the United States Gilded Age is based on a number of implications. The author compares the super-rich of India to those in America, noting, however, that India based its growth on the industrial system, while the U.S. overwhelmed insurance companies and banks (Crabtree, 2018).

Crabtree (2018) also mentions how current issues of wealth-hoarding and cronyism are reminiscent of Americas rise of corporations after the Civil War. Here, the focus on industries is notable in regards to the present research  it outlines the lack of education requirements in many professions exploited by the system. At the beginning of the twentieth century, the educated elite was the group that first was exposed to an increase in wealth (Crabtree, 2018). However, the later investments ignored such spheres as community education and healthcare, thus neglecting social improvement in favor of financial growth. The social aspect, as a result, was completely overlooked which contributed to inequality and led to resource limitations for people.

The scholar indirectly supports the proposed framework by introducing the problem of upper-middle class creating barriers of entry for other people in such spheres as urban life, education, and technology use. Crabtree (2018) notes that Indian billionaires do not invest in workers lives, instead limiting innovation and improvement to highly urbanized areas where the rich live. The increase in inequality, is, therefore, induced not just by the lack of resources but their inaccessibility by poorer parts of Indian society. As an outcome, the gap continues to widen and create classes that differ not only in financial but also health- and training-related positions.

These ideas are supported by the most business publications which discuss how the rich in India influence the countrys economic and political decisions. One of many authors, Dehejia (2018) proposes an idea that Indian billionaires act similarly to robber barons of the U.S. These people, at some point, contributed to the growth of economy but also implemented the system of corruption and inequality based on ones earnings and socioeconomic background.

The role of education in such economic situations is considered to be vital by many scholars. Autor (2014) suggests that there exists a link between skills and earnings, proposing an idea that inequality in access to learning creates a similar divide in peoples wages. The scholar also argues that industrialized countries are particularly susceptible to this problem in the modern world. According to Autor (2014), the wage gap has significantly increased not only between the rich and the poor but also between people with and without higher education. As it can be seen in Figure 1, the earnings of people with a diploma have grown significantly, although the difference between men and women also became apparent.

The author explains that the evolving market with the addition of global trade has affected developed countries where unskilled labor is no longer deemed valuable. Nonetheless, this change also had an impact on developing countries where this labor was now used in exploitative ways. Thus, the living conditions of the poor did not improve, and their access to education became restricted by the overwhelming need for cheap labor.

College/High School Median Annual Earnings Gap
Figure 1. College/High School Median Annual Earnings Gap (Autor, 2014, p. 849).

The connection between education inequality and the income gap, therefore, are directly correlated with each other. Autor (2014) finds that market-based capitalism that does not result in economic mobility (a model that can be attributed to India) results in increasing inequality and social instability. Furthermore, the scholar suggests that opportunities for people of all backgrounds that are focused on providing them with knowledge and professional skills lead to the elimination or decrease of the gap and create a more stable economy. While this change does not produce quick results, it has long-term benefits for the country as a whole and for people who may suffer under the current system.

The findings of Autor (2014) are also supported by Uslaner and Rothstein (2016) who implement the learning-based idea into research of both developed and developing countries. The researchers discover that the implementation of universal education is linked to societies that regulate corruption effectively. Moreover, countries with mass learning programs rank higher than others in regards to having a robust economic system.

Uslaner and Rothstein (2016) provide statistical analyses which reveal that corruption levels and education are highly correlated, especially noting that people who spend more years in school also have more power over the economy. While this link does not imply that education will solve all problems that developing nations may have due to income inequality, it shows how learning may improve peoples understanding of the financial world. More than that, Uslaner and Rothstein (2016) argue that mass education elevates people from all socioeconomic backgrounds and lowers the rate of separation among the population.

The authors also connect exploitation of colonized nations and lower levels of exposure to the quality of education. Uslaner and Rothstein (2016) provide such examples as India being colonized by the British. The colonizers that utilized cheap labor did not contribute to mass education, keeping the nation employed for their needs instead. Other instances such as the native peoples of Uruguay also showed similar results, being forced into unskilled jobs, while other regions and people acquired access to learning. Therefore, the history of education has laid a foundation for communities to possess different values in the capitalist market which have persisted after India became independent.

The economic manipulation of colonialism affected the country through education along with other limitations. The authors find that India was among the nations with the shortest duration of mean school years, showing high levels of corruption as well.

The impact of politics on education is also a vital contributor to inequality among people of different socioeconomic backgrounds. This idea is proposed by Krafft and Alawode (2018), who explore such countries as Jordan, Egypt, and Tunisia. The authors find that higher education is much more restricted for people from lower economic classes. Notably, the scholars adjust their results to exclude the factor of scores.

They reveal that high scores are not as detrimental to peoples acceptance into schools as their economic situation. Furthermore, Krafft and Alawode (2018) argue that the countries where schools are publicly funded (Tunisia and Egypt) are currently receiving less financial support than before which leads to the decrease in equality among attending and potential students. Here, the research relates to the explored topic since Krafft and Alawode (2018) show how higher education is restricted in places where social support is lowered while the concept of merit is accepted. Here, the connection between capitalism-based beliefs and the rapid expansion of the rich is revealed.

Thus, limited socioeconomic mobility creates inequality which is further exacerbated by the lack of funding for people from lower class households. Krafft and Alawode (2018) show how education can affect the growth of the economy. At the same time, the authors suggest that the financial decisions of countries have a substantial impact on peoples education. The link is a circle in which all factors influence each other. As a result, Krafft and Alawode (2018) reinforce the idea that mass education is vital for the economic stability of developing countries. Such rapidly changing states need to balance their personal growth and external relations with developed countries.

Studies that specifically research the effect of education on India come to conclusions about the present and the future of the nations economy that are similar to those of Uslaner and Rothstein (2016). Kayet and Mondal (2015) examine the expenditures of rural Indian territories on public education and the connection of these programs to income inequality in these areas. The scholars find a positive correlation between these two variables, noting that states which contribute more money to learning initiatives and schools than others have reduced rates of income inequality.

Interestingly, they utilize the two main approaches of Indian politicians  relative inequality and absolute inequality, covering both ideologies expressed by the left and right sides of the political debate. According to the first view, inequality considers the overall growth of income, while the second point focuses on the increase in the wages of the poor, in particular. Kayet and Mondal (2015) find that, in both instances, the link between education expenditures and decreasing inequality is positive. The income grows for all people because all of them receive an education, thus being able to perform better than before.

This research suggests that policies for mass education are vital for relieving the current crisis that affects all regions of India. Kayet and Mondal (2015) argue that policy-based support of schools and wider access to learning should supply the population with the necessary resources to improve the state of the economy in the long term. The authors also propose that the gaps change will not decrease the overall financial development but help the poor part of the population to raise their level of life, thus eliminating related problems. The conclusion of this study highlights the importance of raising the financing of schools in rural districts in order to solve the problem of the Billionaire Raj  the phenomenon of rich people designing self-helping rules.

Another interesting study connects education, income, and political outcomes for India. Huber and Suryanarayan (2016) argue that ones socioeconomic status in India affects the way they perceive the political situation in the country and with which party are they more likely to affiliate themselves. The authors find that a correlation of such factors as income, education level, and party affiliation is strong. Huber and Suryanarayan (2016) note that professional training has been gaining more significance in the country during the last decade, as many people start using technology or participating in industries other than agriculture.

Thus, peoples income also becomes tied to their level of education. The authors compare the outcomes of higher education and peoples access to goods such as phones and clothes. They find that the formers analysis yields a stronger connection with inequality than the latter. Huber and Suryanarayan (2016) explain that skill acquisition is a better indicator of wealth in the long term in contrast to purchased goods since it usually results in people acquiring well-paid jobs. As a result, inequality between those who obtain higher education and those who do not grows as well.

A conclusion to which the scholars come is also interesting because they propose that ethnic voting is correlated to the mentioned above aspects. Specifically, areas of India where levels of inequality are extremely high have the most ethnically-driven bases for voting. Therefore, Huber and Suryanarayan (2016) argue that class differences also contribute to voting results that are not based on political campaigns focused on economics but on the participants ethnic background. Here, the problems of economic changes are grossly overlooked or misrepresented by parties depending on their foundational beliefs.

Finally, a study by Jerrim and Macmillan (2015) investigates an approach called the Great Gatsby Curve (GGC). This concept suggests that states where income inequality reached great levels have communities with low intergenerational mobility. The authors propose an education-based solution and investigate its potential to reduce the rates of immobility and inequality. Jerrim and Macmillan (2015) conclude that education of both parents and children is the main driving force behind the offsprings growing income. Moreover, they find a stronger connection between learning and inequality reduction than inequality and financial returns.

This signifies that apart from providing people with professional skills, education may also improve other parts of peoples lives. The authors also stress that developing countries which do not invest in public education have higher rates of inequality than others (Jerrim & Macmillan, 2015). Therefore, the need to supply the nation with mass learning opportunities arises as a result.

Evidence Analysis

The academic findings analyzed above show how the introduced framework can assist India in overcoming its problem of income inequality. The studies address both an overall connection of education and economy and the outcomes that some initiatives can have on India. A particularly interesting consequence is expressed in the work of Uslaner and Rothstein (2016) who link mass learning to reduced levels of corruption.

Notably, India is also suffering from the absence of legal control over the business of the so-called Bollygarchs  Indian class of billionaires. According to Linge (2018), these people do not invest in the social infrastructure of the country, focusing on their personal concerns and wishes instead. This phenomenon is not unique to India  research has shown that countries with high inequality rates produce rich people with high levels of greed and self-centered views (Piff, 2014). In India, nonetheless, these billionaires often live in close proximity to the poorest people of the state.

Sometimes, this divide is visually represented, representing the stark difference between the richest and the most impoverished communities. Mukesh Ambani, the wealthiest man in the country, lives in a skyscraper with entire floors dedicated to pools, gardens, single-person apartments, and garages (Linge, 2018). Out of this lavish building, however, one can see one of the largest slums in the country, since the skyscraper is located in Mumbai, a city with the most apparent divide between classes. Here, the separation between the current conditions of the two communities becomes undeniable.

The introduced scholarly works show that these particular environments are exposed to corruption. Most importantly, they are unstable  while the rich currently propel some sectors of the economy, their relationship with the lower class creates disturbances which are bound to unbalance the economy and lead to devastation if not fixed. The scholars who propose mass education as a financial reform to reduce inequality do not deny that this change is not a universal solution of all economic problems of developing countries. At the same time, they suggest that learning can lead to many positive outcomes that will bring long-term effects.

Expected Outcomes

Based on the discussed research, one can formulate a number of results that may be expected of the country if it introduces policy changes. First of all, it is essential to note which particular reforms are proposed. Mass education is an initiative that will provide all people with school and university or professional education, and individuals will receive it regardless of their economic abilities.

This policy requires substantial amounts of financing which means that the countrys government should not wait for short-term successes. The budget of government support should be focused on schools in the regions where the majority of children and adolescents cannot afford education. As proposed by Kayet and Mondal (2015), increased support of rural states is vital for the results of this policy. According to Jerrim and Macmillan (2015), these territories are often ignored by governments especially if the latter work in the environment of economic inequality. The initiative includes resources for schools as well as people since the places of education should be equipped as well.

As one of the outcomes, India can expect an increasing number of highly-skilled professionals entering the market. The expansion of education will provide people with the ability to compete for stable jobs with higher income.

However, it does not mean that industries with unskilled labor will suffer from the lack of workers. One of the potential results of education is the change in production methods, as research-driven individuals are likely to reform the industry and provide technological advancements that will improve the state of labor instead of diminishing its importance. One should note that all studies suspect that education will also improve social mobility (Jerrim & Macmillan, 2015). This suggests that currently, disadvantaged people will be able to choose other professions and acquire more finances to satisfy personal needs.

Furthermore, the education of citizens may lead to changes in aspirations. Genicot and Ray (2017) find that people who have greater confidence in their future tend to design investment-driven goals. The authors also suggest that higher aspirations which may be expressed by rich people with a tendency to make reckless decisions lead to frustration. Thus, a contrast between stable growth and inequality is highlighted for long-term changes. Genicot and Ray (2017) use India as an example of a country with unequal aims and goals that are primarily reliant on social factors. Inequality is found to be an aspect that exacerbates peoples unsteady expectations. A policy of mass education for rural communities may combat these issues and provide people with focused aspirations.

It should be noted that India is making steps towards improving its access to education. However, rural territories still struggle with enrollment rates, and the funding of public facilities is not enough to provide the students with programs that are adjusted for contemporary problem-solving. Thus, the primary outcome of the proposed policy is expected to considerably change the state of rural communities and their rise in professionalism. As an outcome, a different labor force may come out of the change, and people may be more likely to engage in skill-improving education.

Implications for Future Research

The research, while employing the information from many academic sources, still does not cover the topic entirely. It is vital to acknowledge that the proposed policy change should be researched in order to find specific measures which would result in the most effective use of federal resources. In India, income inequality should be addressed from other points as well, including increased taxes for the wealthy and governmental regulations of businesses.

The studies of these propositions should also connect education to their results in order to see how the system of change may affect India in the long-term. Furthermore, it is necessary to include some considerations of Indian history into the following research. While the current paper talks briefly about the colonial past of the country, the effect of the British Empire that is strongly correlated to the economy and inequality of India is not discussed thoroughly.

Global trade and the impact of contemporary relations with Western countries should also be considered when assessing the ways in which India can alleviate its most pressing concerns. The cheap labor that some countries and local businesses utilize is affected by international ties and contracts that may also be reviewed in relation to the policy of the country. Overall, political considerations are another field of research that may yield many interesting findings that will support or upgrade the presented results.

Finally, the state of rural schools in India and its impact on the economic situation in these territories can be explored further, focusing on the inequality of genders as well as education. As noted above, the earnings gap found by Autor (2014) happened at the same time when a gender difference started becoming more apparent. In Indian schools, these two aspects are connected as well, especially in rural settings. The implications of a policy that addresses both socioeconomic characteristics and gender in education may propose some additional support for social change.

Conclusion

The state of the economy in India continues to be closely tied to the concept of the Billionaire Raj. Government regulation in the fields of business and tax is lacking which leads to inequality between the rich and the poor in the country. Currently, the richest 1% of the nation possesses more than 70% of the wealth. This divide is also apparent in economic research which warns about the adverse outcomes of such unstable growth.

While the general view of the Indian economy may suggest a positive change, a closer look reveal the growing issue of the rich increasing their incomes and the poor suffering from barriers to essential resources. Thus, some considerations for future change should include state policy and its possible effect on the income gap. The proposed framework views the current problem of inequality through the lens of opportunity, connecting mass education in rural regions with lowered rates of corruption. Moreover, it confirms that learning leads to high social mobility and industry reform.

The results of analyzing recent studies show the significance of acknowledging rural territories a