TASK 1 CASE STUDY: Pressure to participate in fraudulent activity Outline of the case Helen Brady is a promising young accountant (ICA) who has just been promoted to manager of a mid-size firm XYZ Accounting. As part of Helen's promotion she has been given a large client Major Business Ltd and the partners of Helen's firm have advised her that if she can keep the client happy she may be offered a partnership promotion. Helen has worked hard and been very thorough in preparing the financial statements for Major Business Ltd in accordance with accounting standards. She holds a meeting with the business owners to discuss the results which are showing significantly higher profits than previous years. The client is not happy with the amount of tax they have to pay due to higher than usual profits. They advise Helen that she needs to ‘find' additional expenditure to reduce the yearly profit and to move some purchased plant and equipment off the balance sheet and into repairs and maintenance expense in the income statement. When Helen attempts to object to the suggestion, the client states that ‘XYZ Accounting do this every year and that Major Business Ltd is their biggest client'. Helen is feeling uncomfortable after the meeting with the client and approaches her senior partner who dismisses Helen by saying ‘keep the client happy'. Questions Decision making framework – how to resolve ethical problems Consider the following decision making framework below and answer the key questions. 1) Gather the relevant facts and identify the problems – Do I have all the facts relevant to the situation?– Am I making assumptions? If so, could facts be identified to replace these assumptions?– Is it really my problem? Can anybody else help?2) Identify the affected parties– Who are the individuals, organisations and key stakeholders affected?– In what way are they affected?– Are there conflicts between different stakeholders?– Who are my allies?3) Consider the ethical issues involved– Have I referred to APES110 Code of Ethics?– What are the professional, organisational and personal ethics issues?– Would these ethical issues affect the reputation of the accountancy profession?– Would these ethical issues affect the public interest?4) Identify which fundamental principles are affected– What are the threats to compliance with the fundamental principles of:– Integrity– Objectivity– Professional competence and due care– Confidentiality– Professional behaviour– If so, are the treats to compliance with the fundamental principles clearly insignificant?– At what point should I seek guidance from external sources such as ICAA5) Consider and evaluate alternative courses of action– Outline the possible courses of action I could take– Test the proposed course of action. Answer the following questions:– What are all the consequences associated with the proposed course/s of action? – Is there any reason why the proposed course of action should not stand the test of time?– Would a similar course of action be undertaken in a similar situation?– Would the suggested course of action stand to scrutiny from peers, family and friends?7) Implement the course of action and monitor its progress What course of action is recommended? TASK 2 ARTICLE Read the following article then complete the task. Why good employees do bad things The potential costs of unethical behaviour are extremely high. It can badly hurt a company's reputation – and sometimes ends in a lawsuit. Still, year after year there are cases ranging from minor fraud at a small business to giant accounting scandals that have rocked the business world. In the new white-paper Why Good People Sometimes Do Bad Things: 52 Reflections On Ethics At Work, Rotterdam School of Management professor Muel Kaptein explores the behavioural and psychological reasons why people step over the line. Here are a few of his key insights on how lapses occur, and what businesses can do to promote a more ethical culture. 1. Organisations and people develop tunnel vision. Setting and achieving goals is an essential part of any successful business. When employees have challenging and measurable goals, they've been shown to work harder, be more persistent and have better self awareness. When a goal becomes a fixation of a person or company, everything else (including ethical considerations), can fall by the wayside. When Enron offered large bonuses to employees for bringing in sales, they became so focused on that goal that they forgot to make sure they were profitable or moral. We all know how that ended. Being conscious of the type of goals being set, the behaviours they encourage, and putting them in a larger context is an important skill. 2. The power of names makes unethical behaviour seem trivial. When bribery becomes “greasing the wheels” or accounting fraud becomes “creative bookkeeping,” what's at least wrong and possibly criminal is brought down closer to the level of a joke between friends. Nicknames separate actions from their moral implications, making each subsequent instance seem less important until it becomes a normal practice. Staying alert to these euphemisms and making ethical divisions crystal clear can arrest such behaviour before it escalates. 3. How good behaviour leads to bad. Counterintuitively, doing the right thing can lead to bad behaviour in the future. One phenomenon Kaptein mentions is the compensation effect. When people have been model employees for a long time, they feel as though they've banked up a kind of “ethical credit”. Research from Nina Mazar and Chen-Bo Zhong found that people who have just bought sustainable products tend to lie and steal more afterwards than those who bought standard versions. Another issue is the “free rider” problem. That refers to situations where the norm is ethical, and the total damage of bad behaviour is limited. Someone might think “If nobody in an area pollutes, they won't notice if I do it just this once.” 4. Deadlines can cause moral blindness. Time pressure is inevitable in the workplace. Many people seek it out and do their best work in such situations. However, it can have negative ethical consequences. In research cited by Kaptein, a group of theology students were told to preach the story of the good Samaritan, then walk to another building where they'd be filmed. Along the way, they encountered a man in visible distress. When given ample time, almost all helped. When they were deliberately let out late, only 63 per cent helped. When encouraged to go as fast as possible, 90 per cent ignored the man. Focusing on a deadline blinds people to those around them and to the consequences of their actions. Making time for reflection needs to be a priority for organisations. Task The article above highlights the reasons that employees behave unethically. Describe the workplace conditions and management behaviour that would promote ethical behaviour. Reference at least four sources in your description.
The literature review of a dissertation is more than a “book report” that summarizes a set of research articles. The literature review is a synthesis of ideas. This synthesis illuminates a gap in the research literature that can be filled by additional research such as a doctoral dissertation. In this assignment, you will synthesize the articles you summarized in the Topic 2 assignment, and you will describe how the synthesis of the articles informs a gap in the research that your dissertation study will fill. General Requirements: Use the following information to ensure successful completion of the assignment: Refer to assignment from Topic 2 and the related instructor feedback on the assignment. Instructors will be using a grading rubric to grade the assignments. It is recommended that learners review the rubric prior to beginning the assignment in order to become familiar with the assignment criteria and expectations for successful completion of the assignment. Doctoral learners are required to use APA style for their writing assignments. The APA Style Guide is located in the Student Success Center. Directions: Locate your completed assignment form Topic 2 and the feedback from your instructor. Write a paper (1,250-1,500 words) that synthesizes the 10 studies you summarized in the Topic 2 assignment. Do that by including the following in your paper: A statement of common findings addressed in each of the articles. A statement of the conclusions that can be drawn when the articles are taken together as a single entity (synthesis). What is the overall message of the group of articles? (Benchmarks: Critically appraise and synthesize existing research.) A discussion of how these studies, when taken together, inform the research gap that your dissertation will fill.
Doc. Name : TitleStudent Overall Assessment Record SheetQualification Code: TitleBSB40215 CERT IV IN BUSINESSUnit Code: TitleBSBWHS401 Implement And Monitor WHS Policies, Procedure And Programs To Meet Legislative Requirements Student NameStudent IDTerm and yearDate Assessment ItemsResult S = Satisfactory NYS = Not Yet Satisfactory DNS = Did Not Submit C = Competent NYC = Not Yet CompetentAssessment 1PresentationSNYSDNSAssessment 2Written ReportSNYSDNSFinal Assessment Result for this unitCNYCStudent Declaration: I declare that the work submitted is my own, and has not been copied or plagiarised from any person or source.Signature: ____________________________ Date: _____/______/__________ Feedback to Student: …………………………………………………………………………………………………………………………………………………………… …………………………………………………………………………………………………………………………………………………………… Student Declaration: I declare that I have been assessed in this unit, and I have been advised of my result. I also am aware of my appeal rights.Signature: _____________________Date: ______/_______/__________Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student, and I have provided appropriate feedback. Signature: ________________________Date: ______/_______/_____________
Summative Assessment for Resourcing and Talent Planning (5RST/05) Learning outcomes: Understand key contemporary labour market trends and their significance for workforce planning. Be able to undertake talent planning and recruitment activities Understand how to maximise employee retention Know how to manage dismissal, redundancy and retirement effectively and lawfully. Assessment brief/activity You are required to provide written responses to each of the following seven questions: Question 1 Your organisation is based in two different countries (the UK and another country of your choice). Write a short account which briefly assesses the labour market trends in each country. In your account, briefly explain the significance of tight and loose labour market conditions and how organisations position themselves strategically in competitive labour markets. Question 2 Give a brief description of the role of government, employers and trade unions in ensuring future skills needs are met. Question 3 Briefly describe the main principles of effective workforce planning and give some examples of any tools that may be used for this. Question 4 Develop and provide a basic succession and career development plan Provide evidence to show your contribution to plans for downsizing an organisation Provide evidence to show your contribution to the development of job descriptions, person specifications and competency frameworks. Question 5 Explain some of the main legal requirements in relation to recruitment and selection and briefly assess the strengths and weaknesses of at least two different methods of recruitment and selection. Question 6 Briefly explain briefly why people leave or remain with organisations and provide a summary of some of the costs associated with dysfunctional employee turnover. Go on to assess the strengths and weaknesses of at least two different approaches to retaining talent. Question 7 Provide a brief summary of the advice you would provide to your organisation on good and lawful practice for managing dismissal, retirement and redundancies. Evidence to be produced/required Answers to each of the six questions of approximately, 3900 words in total (divided appropriately across the questions). You should relate academic concepts, theories and professional practice to the way organisations operate, in a critical and informed way, and with reference to key texts, articles and other publications and by using organisational examples for illustration. All reference sources should be acknowledged correctly and a bibliography provided where appropriate (these should be excluded from the word count). All submissions should be in the region of 3,900 words plus or minus 10% and references should be added in the Harvard Referencing Format. There is a Harvard Referencing tutorial in the Resources Area which outlines the formatting required.
Students are asked to:(1) First, consider (A) Botsman & Rogers’ (2010) treatment of collaborative consumption markets (product service systems, redistribution markets, collaborate lifestyles) and (B) Alibaba CEO Jack Ma’s (2014) philosophy on consumer-to-business (C2B) ventures. Given these innovations, you are tasked with creation of a new brand, service, or model for business based on services, sharing, or leasing from one group of consumer-providers to another group of consumer-end-users.(A) Following Botsman & Rogers (2010) theory on how to transfer from ownership of things to access to things (think iTunes), how might you create a product service system, a redistribution market, or a collaborative lifestyle brand? What would your brand provide, what would you be known for?(B) Following Jack Ma’s philosophy (2014), develop a new consumer-to-business (C2B) venture by inverting the traditional business format in a reverse auction model, a demand collection model, or a platform that facilitates consumer collaborative consumption. Examples of successful recent C2B ventures include uber, etsy, and trademe and have been based on a successful new platform technology sharing consumer services, an app, a blog or series of blogs, or review writing.• The goal of your business model is to take advantage of consumer-provided services, formalize and organize the efforts and share profits with consumers performing activities or services. In this task, you are identifying a market from a need that is being fulfilled in interpersonal, disorganized ways.• Your task is to uncover the service or ideas interchange, build a business that works with consumers as both suppliers of labour, service, or product and as end-users and provides value both to traditional consumers as end-users and consumer partners.(2) Describe the new model in a report with the following sections:1. A title page listing your project title, name, student ID2. What is the idea?3. Who is the target segment for service or product providers? Describe the segment you have identified with marketing research, as well as via a consumer profile. What specific benefit or marketing messaging will attract this segment of service providers to your service?4. Who is the target segment for ultimate end-consumer
Swimmingpool Co Pty Ltd employs Martin as the manager of their Tasmanian sales division. Martin is to quote to potential customers the cost of installing the various pools that the company offers, to draw up any new contracts on behalf of the company and further to ensure that a deposit is paid by potential customers, monies which are then deposited in the company’s bank account. Martin is on a fixed salary but his contract of employment allows for the payment of a bonus if he exceeds his annual target of signing new customers.The company is very impressed with Martin in the first month of his employment; he has signed at least 20 new customers and work has begun on at least half of the new projects signed.After the lapse of another month the company receives a number of complaints from customers who claim that the construction of their swimming pool is substantially different to what they had contracted for. A number of customers were given wrong advice on the suitability of the placement of their new swimming pool, which means some newly constructed pools are sinking into the ground, the repair of which will cost the company considerably. It appears also that some of the deposits have not been paid into the company’s bank. Martin appears to have kept part of the money collected. The company also discovers that Martin is in the process of setting up his own business which will compete with Swimmingpool Co.In considering the facts above make some legal observations on the following:1. Is Swimmingpool Co liable for Martin’s actions? On what basis in law would this be the case?2. Can the company claim they are not liable for Martin because he has not followed instructions? Explain.3. Is Martin liable to his employer for any of his actions? On what basis in law would he be liable?4. Has Martin breached any law if he is planning to set up his business? Explain.
SITXCCS007 Enhance customer service experiences Assignment 1 Case Study 8. Select 4 of the potential problems you identified in Question 7. Imagine that these problems have been escalated to you to solve. What solutions could you implement to solve the customer's immediate problem and also demonstrate high quality customer service (including replacements, refunds and alternatives) 10. Explain the procedures for dealing with conflict, outlining the steps and requirements for verbal and non verbal communication. What are your responsibilities as a supervisor/manager? 12. Develop a customer feedback form which would allow collection of: a. Details of customers to establish a database b. Responses to questions enquiring about the product and services you provide in your service area c. Additional comments or feedback from customers d. Special preferences of a customer 13. Explain how you will evaluate this feedback form, how you would utilise the collected data and how this would be useful to develop an ongoing customer relationship. 14. List 3 examples for customer with special needs or disabilities you may encounter in your work area. What are special requirements are likely for the examples you have provided? 15. List 3 factors which must be considered when you need to compensate a customer to ensure both, the interest of the business and the customer are satisfied?
Deep Analysis of the Flubot Malware Table of Contents 1. Summary 3 2. Introduction 3 3. Background 5 4. Research Focus 6 Research Problem 6 Research Question 7 Research Aim 7 5. Research Methodology 7 6. Proposed Contribution to Science 8 7. Literature Review 9 8. Conclusion 12 9. Recommendation 12 10. References 13 Summary The behavior analysis means to understand the behavior of some individual which helps the user to study about all the biological, experimental and the pharmacological factors which are related to both the human and the non-humans. This helps to highly and accurately manage the semantics of any kind of API calls that are created by the users. This paper includes information related to the flubot analysis and dynamic analysis that can be used for behavior analysis. Different research-oriented topics are discussed such as research problems, research questions and the aim of the research. The report also consists of the proposed contribution of the research paper to the field of science and the significance of its results. The literature review section includes the research which has also been carried out related to the research paper. And finally, the report is concluded by including the recommendation for the research paper. Introduction Malicious Software or Malware is an umbrella term that portrays any malicious code or program that is destructive or harmful to computer/mobile systems. Intrusive, Hostile and purposefully dreadful malware seeks to invade, harm or disable computers, systems, mobile devices, tablets, networks, often by assuming fractional control over a device’s operations. Similar to human flu, it meddles with normal functioning. (Malwarebytes, 2021) The thought process behind malware differs. Malware can be used to make money, sabotage work, make a political statement, or simply to boast. In spite of the fact that malware can’t harm the actual physical hardware of the computer system or network equipment, it is able to encrypt, steal, alter or delete data, seize central computing functions, and spy on all different computer activities without your consent or insight. Malware can access your system in two most common ways which are the Internet and email. So fundamentally, whenever you’re connected on the web, you are vulnerable. Malware can enter your computer system or mobile system through SMS text containing online link, surfing through hacked sites, genuine webpage serving malicious ads, downloading infected files, installing unfamiliar programs or apps, opening malicious email attachment or practically all the other things you download from the web on to your system that doesn’t have quality malware security software. Malicious applications can hide in apparently genuine applications, particularly when they are downloaded from sites or direct links (email, text, talk message) rather than official app store. So, it is really important to gander at the warning messages, particularly in the event that they ask for authorization to access your email or other individual data from you. FluBot is another such malware. FluBot is the name of a malicious program that is targeting mainly targeting smartphones through malicious text SMS. Cybercriminals convey FluBot by means of SMS messages, which they send in various languages as per targeted region with links to download sites for a phony app. This malware is found out to be targeting mainly android mobile devices to steal personal data of users. The link on the SMS text downloads a malicious APK file which is designed to be installed in the mobile device. Figure 1: Mobile Malware (Meskauskas, 2021) Background As referenced, cybercriminals disperse FluBot by means of SMS messages. They send messages (in various languages) as per region and target audience containing temping content such as fake delivery shipment tracking, government message etc. which is designed to download an APK file, which has comparative appearance to some genuine application installer. During installation, the phony application (FluBot malicious app) requests for different permissions in the mobile device. For instance, to read contacts, compose, read and send SMS messages, read the mobile phone state, keep the mobile device awake, make notifications and post them utilizing startForeground function, start calls without going through the Dialer UI, Erase packages, permit querying of any typical application introduced on the device, and permit applications to open network sockets. Flubot is able to receive commands via a command and Control server, this includes commands to uninstall apps, block cards, transfer SMS messages, open URLs (web address), extract user’s contact list to the hacker, incapacitate google play protect, and various other user’s commands. FluBot is primarily a banking malware that focuses on clients in various nations. Lately, FluBot has been very active in Australia as we can see people receiving malicious SMS texts. One way that the malware utilizes to steal delicate information is by showing windows requesting to provide bank card details. Along these lines, cybercriminals are able to use FluBot to trick mobile phone users into giving delicate data that could to utilized to steal identities, do fraudulent online purchases and exchanges, and so on. They may likewise utilize it to extract other personal information such as login credentials, usernames, passwords etc. (Meskauskas, 2021). Figure 2: FluBot Malware details (Meskauskas, 2021) Research Focus Research Problem Android mobile operating system dominates the global mobile operating system market with the market share of around 73% (“Statista,” 2021), which makes the android operating system more lucrative to attackers. Due to android being an open source and its market share, we can see many malwares particularly targeted at android users. At the time of writing, this particular malware ”Flubot” is also targeted to android users only. This malware starts as a plain text message, disguising the voicemail company or delivery company and has the link to access voicemail / track the package. When the victim clicks on the link then it downloads the malicious app disguised as a voicemail company or delivery company. Android lets users install the applications from outside the play store (Google’s authorized market store) whereas the Apple system does not provide that permission to the user. Now once the malware is installed in the phone, it asks for different permission which also includes accessibility permission. Attackers take advantage of this liberty of the android system, where users are to make the security decisions for the device and most of the users are not capable of making this decision by themselves (MacDuffie and Morreale, 2016) . Flubot malware is currently circulating in Australia now. This research paper focuses on ‘flubot’ malware and its properties. Research Question This research paper is to analyze the FluBot malware. We will try to understand the motivation behind the malware and the architecture behind it. Also, we will study how this malware is using the android system to infect other users and make them huge super-spreader. One other case that interests me is how the telecom companies, despite knowing the malware, are not successful in stopping it from spreading. Research Aim We aim to reverse engineer the malware using sandbox or any other decompiler. As this malware uses the C&C (command and control) server to communicate and upload the contacts and other sensitive details, we will also try to understand the mechanism behind it. This malware is also being updated by the attackers and the studies of the updates will also be performed. In short, we will do dynamic analysis of this malware and might do some small statistical analysis as well. Also, we aim to provide some prevention measures for this malware or any malware with similar attributes. We will also try to provide some information about being vigilant of such malware and how it can be avoided. Research Methodology The Flubot has affected globally although it is still in the earlier stage in Australia. Nevertheless, it has already reached over 100,000 people since August 4. Over 5500 cases of Flubot have been reported to Scamwatch although TPG blocked 14m scam SMS in a single week. The Flubot can bypass the existing security models and spread rapidly. The risk of being victim of the Flubot is higher if it is not disarmed as early as possible. The most existing solutions are unable to detect the Flubot because of its sophisticated method of propagation with DGA approach. The research is ongoing however, not much of its details can be found. Therefore, this research aims to study, analyse, and monitor the activities of the Flubot so that the malicious activities can be prevented, and the security can be restored to normalcy. Our research aims to combine a variety of methods. We will first analyse how the Flubot has emerged, what devices are affected and how it is evolving and bypassing the existing security mechanisms. We will reverse engineer the Flubot and perform static and dynamic analysis. The research will be completed in the following stages. Data analysis: We will continue to monitor the characteristics and the impact of the Flubot. The factual data will be updated from various sources like Scamwatch. We will further analyse what devices are affected, how the malware is being transmitted, who are targeted (race, gender, ethnicity, etc.), who have been successfully victimised, what impacts have been done (information or monetary loss), etc. We will try to reach the authorities or refer to official websites for these data. Reverse engineering: Cybercriminals are motivated, skilled, organised and well equipped with various intrusion techniques. By reverse-engineering the malware, we will understand their techniques and objectives that can be useful in preventing such attacks in future. We will do the reverse engineering of the Malware by using open-source online tools. Static Analysis: The Flubot will be decompiled and analysed without running it. Dynamic Analysis: We will run the malware in the sandbox and emulators so that the behaviour (system calls) and the effects can be observed safely. We will also use other open-source tools to broaden the area of our research. We will try to examine the effectiveness and weaknesses of the current security solutions. Network Analysis: We target to use Wireshark to analyse the network protocol and learn how the malware interacts with other machines. I.e., what connections are made and what data are sent. Wireshark captures all the data that enables deep inspection of numerous protocols. We can narrow down to the specific traffic by filtering the logs and analyse those packets. AI Models: We will also review some of the novel AI models with the state-of-the art performances and try to analyse their effectiveness in detecting the Flubot. Proposed Contribution to Science At the current rate of propagation, the Flubot will storm the whole community if it is not cared early. We will provide a comprehensive analysis of the Flubot’s emergence and evolution, features, targeted devices and impacts. Our research will focus on security, privacy and safety and provide a complete solution to neutralise the Flubot’s effectiveness. The comprehensive report will raise awareness in the community and promotes a better security culture by encouraging people to perform as a first line of defence. Our analysis and review of several AI modes will help to identify the novel model used for malware detection. The use of model will strengthen the effectiveness of anti-malware application in Android devices. Literature Review St1: In this era of digitalization, we use smartphones and computers to obtain information, create, communicate, and update our social profiles. While we are being more accustomed to technology, we are also storing a plethora of data identifying ourselves into our computers and phones. With smart phones being more accessible and cheaper, its users have increased significantly from 3.6 billion in 2016 to 6.3 billion in 2021 (“Smartphone users 2026,” 2021). As the use of smartphones has grown exponentially, hackers / attackers are now targeting smartphone users because of huge personal and business information being stored on it. 1.4 million malicious application installation packages are found on smartphones worldwide only in Q1(first quarter) of 2021 (Joseph Johnson, 2021), which shows how vulnerable the smartphones are and how attackers are constantly trying to attack smartphones to access the data. Apple’s iOS and Android mobile OS are the most widely used smartphone operating system in the world. Both operating systems have their own curated application market to protect their users, however with Android users can install the application from outside the google play store as well. Also, recent study has found that Google’s own play store is responsible for 67% of total malicious app installs and 10% came from alternative application markets (Kotzias et al., 2020). “In Android, app installations typically happen via the official and alternative markets, but also via other smaller and less understood alternative distribution vectors such as Web downloads, pay-per-install (PPI) services, backup restoration, bloatware, and IM tools” (Kotzias et al., 2020). Web downloads of the applications are rare but most dangerous and malwares usually use this methodology to enter the victim’s smartphone. Student2: Around the end of 2020 and the beginning of the year 2021, there was sharp increase in various fraudulent SMS campaigns. The FluBot malware gave notification of a package spoofing different kinds of companies, such as DHL or FedEx. The receiver of the malicious SMS text message was invited to install an application on their mobile device to track the item or discover the package’s location. After study of 3 different samples associated with these kinds of campaigns, the malware was identified as FluBot. This name as given to this malware because of its ability to spread as if it were a human influenza virus. In other regions, it is also known by names Fedex Banker or Cabassous. According to various forensics and investigations carried out by Swiss company PRODAFT, more than sixty thousand terminals may have been infected. And some eleven million telephone numbers may have been listed which is around 25% of Spain’s population. (FluBot, 2021) In regards to the malicious code’s functionality, the malicious app is able to track the identifiers of all the apps on the mobile device it starts and is able to inject superimposed pages when it detects a login of a session of the targe application once the malicious app is installed on the user’s phone. The user may think that they are inputting the credentials on the original website, whereas they are sending the data to the command and control (C2) controlled by the proprietor of the malicious app. Student3: Amir Aflantan, Salman Niketan, David Baptiste in 2020 proposed an article called Dynamic Analysis Evasion Techniques: A Survey which states that the current cyber world is infected with the malwares and then they are readily infiltrated with all the defense mechanisms and different vicious activity are performed by the users which are impacting the life of other peoples (Afianian, et al., 2020). This kind of understanding is pursued with the help of dynamic analysis which is conducted by the help of the sandbox which can be both manual and automatic. The comprehensive survey of the malware activity is performed using different kind of the dynamic evasion techniques and some detailed classifications are used to demonstrate how the works are efficiently performed to hold the technique of the organization. The primary tactic of the malware is the fingerprints which can be used in order to reverse the trend of the Turing test as well. Accordingly, to that, it is also important to peruse the generic defensive strategies which help for the path exploration techniques which can have potentiality to mitigate all the attacks related to the actions called in the system. The efficiency of the system holds different kinds of analysis approaches of the system, and it helps to evade the sandbox as well. The beginning of the reactive methods to the endeavours for the transplant analysis of the system from the readily foiled system to zero. There are advanced diverse techniques which can be used for the current defensive strategies as well. This article therefore helps to give a proper demonstration of how the overall workflow of the system is being utilized and performed in the system. Student4: Android is a flexible operating system with many user-friendly features. It is supported by Google as an open-source software. Android can run the applications written in Java too. The libraries and records are compressed as a file which can run only in the devices with Android OS. Android has gained more popularity and have been widely used due to its flexibility. However, this feature allows the developer with ill intent to create malicious application to perform cyber-attacks. As such, with the advancement in the technology, the Android device security are violated by novel malware attacks that are harder to detect and challenging to defeat (Javed et al., 2020). Smartphones are used to store and process user information in various forms like text, documents, images and videos besides makings the calls. These confidential user data in flexible Android phones makes them a lucrative target for cybercriminals and hack those information (Abuthawabeh & Mahmoud, 2019). The security researchers are alarmed by the increasing number of malware existence in Android devices. These malwares propagate mainly due to installation of third-party applications. Researches have been conducted and strict security measures have been enforced but still the sophisticated malware can bypass them. Nishimoto et al. introduced the method of analysing the API calls as dataset features to check whether the application is malicious (Nishimoto et al., 2013). The effectiveness of using such features influenced Chan & Chan for further research (Chan & Song, 2014). They introduced a list of 19 API calls and permission to identify the Malware. As malware remains evolving and the traditional methods could not effectively detect the new versions of malware, the researchers proposed a combined use of multiple features. For instance, Taheri et al. enhanced the performance of malware classification by using static features of permissions and intents, as well as Dynamic features of API calls (Taheri et al., 2019). However, although several research studies proposed the use of multiple features like permissions, intents and API calls, Flubot alike sophisticated malware are continuously evolving and succeeding to penetrate the well-guarded networks. This confirms the call for more research in this area. Conclusion Finally, the malware uses the concept of accessibility which helps to perform different kinds of activities such as the use of the overlay attack, targeted name of the packages exists in the triggered event as well. The screen text is taken from the flubot and the activity in the browser gets started and up and running. An overlay is created which also helps with the accessibility of the system. The sandbox is also important as it ideally helps to create an environment for the IoT botnet and their samples which helps to exhibit the bad behavior of the organization. The C&C servers’ connection are also established which helps to share the common libraries for the dynamic files and the folders and wide range of the CPU are also used for it. There the use of the flubot can help for the analysis of different API calls and the use of the sandbox can be used for the purpose of the dynamic analysis of the system. So, this can be used in order to maintain the overall working of the system. Recommendation Some of the recommendation for the research paper to be implemented in the organization are, there are different method which can be employed in the study for the purpose of the behavior analysis like the individual should be creating the baseline and look for the different deviation that can possibly occur during the behavior state of any kind of the people. The expected result out of this is that the researchers can identify the future data using the help of the previously analyzed behavior of the users. On the other hand, Flubot analysis using API calls is done so that it helps to identify the possible malware from the system. The studies are based upon the different kinds of API calls which help to detect the different features and then the malware can be extracted so that no viruses are created from the system. References Abuthawabeh, M. K. A., & Mahmoud, K. W. (2019). Android malware detection and categorization based on conversation-level network traffic features. Proceedings – 2019 International Arab Conference on Information Technology, ACIT 2019, 42–47. https://doi.org/10.1109/ACIT47987.2019.8991114 Afianian, A., Niksefat, S., Sadeghiyan, B. & Baptiste, D., January 2020. Malware Dynamic Analysis Evasion Techniques: A Survey. Association for Computing Machinery. Chan, P. P. K., & Song, W. K. (2014). Static detection of Android malware by using permissions and API calls. Proceedings – International Conference on Machine Learning and Cybernetics, 1, 82–87. https://doi.org/10.1109/ICMLC.2014.7009096 Incibe-cert.es. 2021. [online] Available at: [Accessed 29 August 2021]. Javed, A. R., Beg, M. O., Asim, M., Baker, T., & Al-Bayatti, A. H. (2020). AlphaLogger: detecting motion-based side-channel attack using smartphone keystrokes. Journal of Ambient Intelligence and Humanized Computing, 0123456789. https://doi.org/10.1007/s12652-020-01770-0 Joseph Johnson, 2021. Volume of detected mobile malware packages 2021 [WWW Document]. Statista. URL https://www.statista.com/statistics/653680/volume-of-detected-mobile-malware-packages/ (accessed 8.28.21). Kotzias, P., Caballero, J., Bilge, L., 2020. How Did That Get In My Phone? Unwanted App Distribution on Android Devices. ArXiv201010088 Cs. Le, H.-V. & Ngo, Q.-D., August 2020. V-Sandbox for Dynamic Analysis IoT Botnet. IEEE. MacDuffie, J.K., Morreale, P.A., 2016. Comparing Android App Permissions, in: Marcus, A. (Ed.), Design, User Experience, and Usability: Technological Contexts. Springer International Publishing, Cham, pp. 57–64. Malwarebytes.com. 2021. What is malware? Definition and how to tell if you’re infected | Malwarebytes. [online] Available at: [Accessed 29 August 2021]. Meskauskas, T., 2021. How to remove FluBot Malware (Android) – virus removal instructions (updated). [online] Pcrisk.com. Available at: [Accessed 29 August 2021]. Mobile OS market share 2021 | Statista [WWW Document], 2021. URL https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/ (accessed 8.28.21). Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y., & Sakurai, K. (2013). Detection of android API call using logging mechanism within android framework. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, 127 LNICST, 393–404. https://doi.org/10.1007/978-3-319-04283-1_25 Smartphone users 2026 [WWW Document], 2021. . Statista. URL https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/ (accessed 8.28.21). Taheri, L., Kadir, A. F. A., & Lashkari, A. H. (2019). Extensible android malware detection and family classification using network-flows and API-calls. Proceedings – International Carnahan Conference on Security Technology, 2019-October(Cic). https://doi.org/10.1109/CCST.2019.8888430
SBSUS501 Assessment Assessment 1: Short Answer Questions Question 1 What is an industry code of practice and what are the aims of such codes? Question 2 Why is it important to have a good understanding of environmental legislation that affects your business or the industry within which you work? Question 3 What is a formal organisational environmental policy? What might be covered by or included in an organisation’s environmental policies and procedures? Question 4 What is an environmental management system (EMS)? Question 5 What are the benefits of using procedures? How can staff find information about procedures and how should procedures be taught? Question 6 Outline at least 2 typical barriers. What strategies can address resistance or barriers when implementing policies and procedures in an organisation? Assessment 2: Project You have just been employed as a sustainability manager in ABC Company. As an organisation, ABC Company has embedded sustainability into its charter as is indicated by company mission statement and sustainability policy. The company business plan also mentioned sustainability policy, but neither it nor the current operational plan contain any detail for implementation of the sustainability initiatives in the policy. Your CEO developed your position description with an emphasis on transforming the mission statement and sustainability policy into a plan for implementation. You need to complete the tasks below. Access the ABC vision, mission and values statement and sustainability environmental policy. Examine the scope of these documents and review them against the criteria listed below: Minimising resource use Increasing resource efficiency Reducing toxic material and hazardous chemical use Employing life cycle management approaches Continuous improvement In examining the scope of these documents, you will also need to review the continuous improvement procedures, supplier policy, purchasing resource acquisition policy, purchasing resources acquisition procedures, risk management policy and risk management procedures. As an outcome of this examination, prepare a table that outlines how the scope of the ABC sustainability policy may need to change. Include a brief supporting justification. Review the ABC sustainability policy against federal and state/ territory environmental and sustainability legislation to ensure that the scope of the policy is adequate to accommodate legislative requirements. Make a table of relevant federal and state/ territory legislation that should be considered and the key aspects of each law that should be built into the sustainability policy. Prepare a further table that outlines how the scope of the sustainability policy may need to change in order to reflect the legislative requirements that you have determined are relevant. Include a brief supporting justification. Access the organisation charts and examine them to determine the roles of managers in the organisation. Using the current policies and procedures that you have reviewed, prepare a series of questions for each manager that will assist you in determining the current extent of implementation of sustainable practices at ABC. Present these questions in table form with an adjacent column that provides a short explanation of how each question will assist in planning and developing sustainability policy. Given that ABC is a large manufacturing and retail business, prepare a table of external information sources that could assist in planning and developing sustainability policy. List at least 2 sources with an adjacent column that provides a short explanation of the type of useful information that each source could provide. Prepare a table of stakeholders, internal and external, who should be consulted in planning and developing sustainability policy. List at least 2 stakeholders with an adjacent column that provides a short explanation of what influence each may have in planning and developing sustainability policy. The CEO has reviewed your scoping and consultation documents and provided feedback. She noted that there is nothing to indicate the positive effects that sustainable practices will have on the business such as cost savings, or increased sales or return on investments. Prepare a short briefing paper that could be presented to senior management, explaining how implementation of a sustainability policy could benefit the organisation financially. The current ABC sustainability policy has a number of sustainability initiatives. Prepare a table that lists each of these initiatives and also includes at least 2 more initiatives that you feel would be appropriate. For each of these initiatives, outline the steps or phases that would be required to implement them, and prepare some performance indicators that could be used to measure the ongoing outcomes of the initiatives. Revise the ABC sustainability policy based on the research and information collation that you have undertaken. You also need to make sure there are appropriate strategies at all stages of work for minimising resources use, reducing toxic material and hazardous chemical use and employing life cycle management approaches. Prepare a briefing document for ABC senior management that informs them of the reviewed policy and suggested sustainability initiatives. The briefing document should also outline the responsibilities of each senior management in implementing the policy and its initiatives. Prepare a short flyer that promotes the benefits of the sustainability policy to all staff. The flyer should list the policy, key initiatives and the people responsible for implementing the policy. Select 2 of the sustainability initiatives and develop procedures for their implementation. The procedures should include: Agreed outcomes Performance indicators Activities to be undertaken Assigned responsibilities Record-keeping, review and improvement processes The sustainability initiative to install a 150-megalitre rainwater tank needs to be reviewed because of cost, logistics and outcomes. The following points need to be considered in the review: There is a scale problem in the original policy initiatives as 1mega litre equals 1,000,000 litres ABC has 150 retail outlets and it is a better outcome to have rainwater collection facilities at each location rather than 1 large tank at the head office The rainwater is intended for use in flushing toilets. Data indicates that the average employee will use 30 litres of water per day in flushing toilets. The typical ABC location has approximately 30 employees The cost of installing a rainwater tank is estimated to be $1,000 per 5,000 litres The amount of available space at each location to install a rainwater tank is 10 metres x 10 metres The average rainfall at each location is 700 millimetres per year The average roof collection area for rainwater at each location is 2000 square metres Mains water is supplied to ABC facilities at an average cost of $2 per 1,000 litres Replacement of old toilets with new water-efficient models can reduce water consumption by approximately 50 per cent Installation of new water-efficient toilets can be achieved for approximately $15,000 at each ABC location Prepare a revised water-saving strategy for inclusion in the ABC sustainability policy. Justify the revised strategy based on calculations and consideration of other water saving options. Review the supplier policy, purchasing policy and purchasing procedures again. Note that these policies contain inconsistent information for evaluating suppliers on their sustainability credentials, and that the purchasing procedures contain no checks that link to sustainability policy. Prepare a revised version of the supplier policy, purchasing policy and procedures that incorporates consideration of suppliers that use packaging made from renewable resource rather than non-renewable resources. Consult and communicate effectively with finance manager, business operations manager, project managers, customer service manager and sales manager (your classmates) and CEO (your assessor) to develop, implement, monitor and review the new sustainability policy. You need to ensure your managers are clear about your new policy and answer all their questions. Assessment 2: Short Answer Questions Question 1 What are the key aspects of health and safety legislation? You need to outline the legal responsibilities and duties of management (PCBUs) and workers in relation to WHS risk management. Click here to enter text. Question 2 What processes or procedures might an organisation use to identify hazards and monitor risk control procedures? Click here to enter text. Question 3 Why is it important to provide information to work teams on the relevant health and safety legislation, the organisation’s health and safety policies, procedures and programs, and any identified hazards and their control? Click here to enter text. Question 4 Explain the importance of effective consultative mechanisms in managing health and safety risks and describe what they entail. Click here to enter text. Question 5 Explain how the hierarchy of control applies in the work area. Click here to enter text. Assessment 2: Case Study You have been employed by ABC Company as a supervisor in one of its distribution warehouses for over a year. It has been decided that it is tie to investigate how well the ABC WHS policies and procedures are being implemented within the organisation. You have been chosen to take on this project. There have been 2 WHS incidents in the past 2 months that led to workers taking time off work. In the first incident, a worker began to suffer chronic shoulder pain from prolonged siting at a computer entering data. In the second incident, a worker experience student strained her lower back while lifting stock from warehouse storage shelves. In each of the incident, it was reported that the correct procedures were being followed for the documented hazards. You will need to include these incidents in your project details. Here is some background information you will need: ABC has a WHS policy and a risk management policy in place There is also risk management procedure in place You do have a health and safety committee (HSC), but it does not have any health and safety representative (HSR) All supervisors are expected to fill the duties required of ‘Persons Conducting a Business or Undertaking’ (PCBU) Complete the following tasks. Analyse the current WHS policy, risk management policy and risk management procedures. Outline whether they meet the requirements under your state’s WHS legislation and make recommendations for improvements to meet the legislative requirements for ABC. Click here to enter text. Your investigation of the past WHS incidents at ABC has revealed workers are rarely consulted on matters such as hazard identification, hazard assessment and development of risk controls. There is also a problem with dissemination of WHS information, where people such as work experience students do not have access to all of the safety notices placed on the intranet. Prepare a brief report for the warehouse work teams that outlines these shortcomings in the framework of the responsibilities of workers and PCBUs. Practical recommendations for improvement that meets legislative requirements need to be included in the report. Click here to enter text. Complete a hazard analysis for the warehouse office for a typical office worker spending 8 hours per day doing computer data entry. Record your results on the WHS hazard identification form. If you do not have some information, you can make assumptions. Hazard Identification Form Date: Click here to enter text. Location of hazard: Click here to enter text. Description of hazard: Click here to enter text. Level of risk (high, medium, low): Click here to enter text. Action required: Click here to enter text. Reported by: Click here to enter text. Action taken: Click here to enter text. Supervisor’s signature: Click here to enter text. Date: Click here to enter text. Complete a risk assessment and recommend appropriate controls for each of the hazards identified for computer data entry operators. Use the risk management plan template. Risk management Plan Purpose of the risk management plan: Click here to enter text. Risk management procedure: Risk identification Click here to enter text. Risk analysis Click here to enter text. Risk response planning Click here to enter text. Risk monitoring, controlling, and reporting Click here to enter text. Risk management plan approval: Signature Click here to enter text. Print name Click here to enter text. Title Click here to enter text. Based on the results of your hazard analysis and risk assessment for computer data entry operators, research appropriate training programs and WHS information that would assist data entry operators in eliminating or reducing the risk from repetitive strain injuries. Document the WHS training you would recommend, its cost and other relevant details. According ABC financial and management plans, the company would like to invest in people and they have allocated $30,000 training funds every year for each store (you can make assumptions of employee’s hourly rate). Similarly, document the WHS information you would disseminate to the data entry operators. Use the report template for these recommendations. WHS training cost reportWHS training activityWorker/s affectedCostExpected outcomesClick here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text.Click here to enter text. Your investigations have found that manual handling procedures are well documented and all workers are following them. However, there is a problem with work experience students, as they tend to ignore the manual handling training provided. Using the WHS training plan, prepare a coaching and mentoring strategy that would ensure work experience students are using correct manual handling techniques. Click here to enter text. Prepare a short presentation to explain ABC WHS policies and procedures, communicate and consult the results of your hazard analysis and risk assessment with you team (assessors, classmates or friends), your proposed training plan and your proposed coaching and mentoring plan to the warehouse work teams. Click here to enter text. While you are visiting the other warehouse, you witness an incident where staff member (Sandy Walt) trips over a box of documents that was sitting next to a filing cabinet. At the time, the staff was checking her phone and did not see the box, which was sitting well out of the normal traffic zone in the office. The staff sprained her ankle and bumped her head, and was treated by the first aid officer, who bandaged her ankle. The staff was taken to the emergency department of the local hospital and was given 2 days off work to allow leg to recover. Using the incident and injury report fill out the details of this incident. Workplace incident report Report no: ABC01 Name: Click here to enter text. Address: 192 Mains Road, Brisbane Telephone: 04XXXXXXXX Date of injury: 1/02/20XX Time: 10am Details of injury: Click here to enter text. Bodily location of injury: Click here to enter text. Description of the circumstances of the incident: Click here to enter text. Description of incident by witness: Click here to enter text. Signature of witness: John Smith Details of action by management: Click here to enter text. Total time lost (days, hours, and minutes): Click here to enter text. Details of preventive measures taken: Click here to enter text. Name: Click here to enter text. Signed: Click here to enter text. Date: Click here to enter text. ASSESSMENT TASK A Part 1: Short written questions Purpose: Written questions assess the required knowledge needed to undertake the tasks as outlined in the performance criteria and elements. Candidate instructions: The candidate is to answer the following theoretical knowledge based questions correctly. The candidate may refer to their learning materials and conduct any research necessary when completing answers. Consider your current place of work. Provide a short overview of the ICT systems currently supported by your organisation, including: Which hardware platform you use The system security requirements of this hardware platform The current system functionality The operating systems supported by your organisation. (100 words) How will the current system functionality at your place of work impact on planning for future ICT developments? (50 words) How will the operating systems that are currently supported by your place of work impact on planning for future ICT developments? (50 words) Identify two internal factors impacting on your organisation (these can be positive or negative) and explain how these factors affect ICT needs. (50 words) Identify two external factors impacting on your organisation (these can be positive or negative) and explain how these factors affect ICT needs. (50 words) Discuss two examples of products or technology which can help you to identify future vendor and technology trends. (100 words) Describe the industry environment of your current place of work. (50 words) Explain how ICT support is helping your current place of work to achieve their organisational goals. (60 words) Explain where would you find the strategic plan at your current place of work? (10 words) Make two recommendations for ICT developments for your current place of work, to allow them to better achieve their goals. For each recommendation, give one advantage, and one disadvantage over the existing system or programme. (100 words) Explain the most effective method of communicating your recommendations at your current place of work. (50 words) Identify two methods of analysis you can use for technical problems in the workplace? (35 words) Discuss a planning approach you would use for managing a transition from one operating system to another. Part 2: Case Study Purpose: Case studies are used to assess the required knowledge and skills needed to undertake the tasks as outlined in the performance criteria and elements. Candidate instructions: Students are required to analyse the case study, interpret core concepts and apply their knowledge and skills to answer the following questions. Follow the link to read the strategic plan of the Australian Government Department of Industry, Innovation and Science. This strategic plan takes them from 2016 to 2020. Click to access Department-of-Industry-Innovation-and-Science-Strategic-Plan-2016-20.pdf After analysing this strategic plan, discuss the Department’s industry environment, including internal and external factors. (150 words) Identify three organisational goals that the Department has for the coming years until 2020. (50 words) Identify two opportunities for improvement or potential ICT gaps that you feel would assist the Department in working toward their strategic plan. Write an email reporting the effects of your proposed ICT developments to the appropriate person. You should assume that this person does not have a high level of understanding of ICT and related jargon. You should explain the effects of the proposed developments on: Organisational objectives The internal operating environment The external operating environment. (220 words) Discuss two implications of introducing changes to ICT systems at the Department of Industry, Innovation and Science. (120 words) ASSESSMENT TASK B Assessment task 3 Part 1: Student Project Purpose: Projects are used to assess the required skills needed to undertake the tasks as outlined in the performance criteria and elements of a unit of competency. This task allows assessors to evaluate behaviour and skills through practical demonstration by the candidate collected in a simulated setting and to make a judgement of satisfactory performance. Candidate instructions: Students are required to read and consider the following scenario and complete the tasks to demonstrate their ability to: Evaluate current business strategy and plans, technology and resources Evaluate effect of changes on IT system, on future technology needs and cost-efficiency Develop an action plan to implement new IT system Project scope: You are working as an IT Project Manager for Tursa Software, which specializes in developing LMS platforms and applications for college and universities in Australia. Currently, Tursa has a contract with Artline Graphic Design College to implement a new IT project. This project includes: the development of a new software application which will integrate their student reporting system with a student learning management system and updating/replacing current hardware and software in order to make the business more efficient. Different stakeholders are involved during the planning, execution and implementation of this project. Some of the stakeholders can be the senior management of Artline, administration personnel of Artline, external vendors of hardware and software required for the project and any other personnel involved in the project. Artline strategic goals: To integrate VetTrack student management system with Moodle LMS system The college will implement a proper software system which helps to record and maintain the information of students and a software system called Moodle which will deliver online courses and learning materials plus assessments to students. To update their current IT hardware and software systems: Currently, the college is using old software which was developed in Microsoft Access database. The computers being used by 5 admin staff within the college are old Pentium 4 processors with Windows XP operating systems and Microsoft 2007 and need updating in order to ensure administrative operations are managed more efficiently. Proposed IT system for Artline Graphic Design College: As the number of students and courses are growing, the college management has decided to implement VetTrack software to manage the students and reporting. The college is investigating Moodle open source software for their LMS and will be moving all course content onto this platform. All documents will be cloud based going forward. The college would like an integration between VetTrack and Moodle. Currently the college is using OnCourse software to manage their students and enrolments. The implementation of the new software mentioned above and the upgrade/purchase of new personal computers will help Artline to achieve its strategic goals. Time and budget constraints: Artline are proposing to implement the system within one month, with an expected testing phase of two weeks. Artline has allocated an initial budget of total AUD $20,000.00 for implementing the new software and upgrading the computers. As the cost of this project may change when the project is being implemented, some adjustment in the budget may be needed. Your trainer will act as the representative for Artline Graphic Design College and will act as your point of contact for all communication regarding the project. Read the above scenario and create an A4 report using relevant word processing software, which must include the following headings: IT opportunities identified Analyse the strategic goals for Artline Graphic Design College. Identify the possible opportunities or in terms of hardware, software, operating systems and integrations. Existing IT review Conduct an IT review for Artline and identify the advantages and disadvantages of the current and proposed IT systems and hardware. Current systemProposed System Objectives of proposed IT project Investigate and report on the objectives of implementing the new IT system Monitoring technology Explain ways that your client will be able to ensure that the selected technology is cost-effective and efficient. Action plan Provide a detailed action plan outlining the following areas: Implementation methodology Organisational standards, policy and procedures which must be adhered to Implementation targets or milestones with expected deadlines Resources to support the implementation process Expected costs and budget This task is to be conducted in a face-to-face setting and must be performed verbally with your trainer. The duration of the discussion should be ten minutes. Your trainer will participate in the discussion and will observe your oral communication skills, especially your ability to use plain English and use effective listening and questioning techniques. Scenario: You have been informed that the Managing Director of Artline, has been absent from work due to a terrible flu. You have completed your action and implementation plan however the project is estimated to be $5k over budget. Consult with the Artline representative in his absence (i.e your trainer) and discuss the following points verbally: Who will be responsible for approving the additional $5k for the project Who will review and receive project progress reports and communication The most appropriate delivery methods for progress reports and data to be sent
Read the scenario and in a report explain the steps you would take to develop a competent team. Your answers should be based on the information contained in the scenario and what you have learnt in this study unit about team dynamics. Your report should be approximately 3,000 words. It may contain an action plan, sample procedures or other types of documents to explain how you will lead this team. You have recently accepted an employment position with a large, high profile jewellers firm. The organisation manufactures, imports, and repairs jewellery for distribution to its many stores in all states. Your position title is Team Leader of Distribution and Warehousing—a frontline management position. There are 12 team members, from different backgrounds and with differing levels of expertise. Some team members have worked with the organisation and in this division, for a number of years. Other team members are relatively new, while some have worked in other departments/ sections of the organisation before being transferred to your division. The reason for your appointment is that departmental productivity (outputs) has not been meeting the organisation’s expectations. The senior managers of the organisation have identified some problems in the team: communication between team members appears to be strained at times levels of cooperation are falling communication with the other teams within the organisation is not as good as it should be there is no one currently taking on the leadership role prioritisation of tasks appears to occur on an ad hoc basis While each of the team members was selected for their role on the basis of demonstrated skills and expertise, they seem unable to work together effectively. Your initial role, therefore, is that of trouble-shooter, problem-solver and team facilitator. You need to bring this group of people together to form a cohesive, effective and productive team. How will you do this? Explain in logical sequence, what methods you would use to develop the working capacity of your team. Give reason for each of your actions and the expected outcomes. What are the time frames that these actions will occur within? What will you do if these measures do not work? In your report consider: team roles and dynamics the various stages of team development the importance of agreed goals skills/ competency analysis the need to link team’s goals with organisational goals, KPIs and individual performance measures strategies to encourage input into planning and decision-making the need for performance evaluations/ reviews providing praise and constructive feedback reward and recognition diversity constructive conflict trust, reliability, consistency and relationship building the importance of, and appropriate formats for, meetings initiative, responsibility, motivation, delegation the need to monitor, measure and evaluate the team’s development up-line communication the need to develop efficient networks with other teams in the organisation leader as role model Remember that you are the new team member. How does the introduction of a new member impact on team dynamics?