Tuesday, January 28, 2020
Radio Frequency Identification (RFID) System
Radio Frequency Identification (RFID) System Literature review 2.1 RFID The Radio Frequency Identification (RFID) system is a technology for automatedà identification. Exploration of RFID technology dates back to 1948 when Harry Stockman published hisà research titled Communication by means of the reflected power. Unfortunately technologies such asà integrated circuits, transistors and microprocessors were not yet available and RFID had to wait anotherà 20 years for its first commercial application (Landt 2005). Between 1970 and 1980 several researchà laboratories and academic institutions carried out work on RFID implementations for animal tracking,à theft prevention, item labelling and access control systems (Want 2006). Regardless of theseà applications, RFID systems remained obscure for many years. The first significant change to thisà occurred in the early nineties when companies across the world began to use RFID tags on a large scaleà due advancements in their energy efficiency and size reductions (Landt 2005).à Todays systems are usually composed of either passive or active RFID tags and RFID readers.à Active tags contain their own power source and thereby can transmit stronger signals and can beà accessed from further distances. Most commonly they operate on the ultra-high frequency (UHF) bandà and can achieve up to 100 metres range depending on the surrounding environment (Weinstein 2005).à There are currently two types of active tags. Transponders, also called semi-active tags, and Beacons.à Transponders stay in standby mode until receiving signal from the reader and then transmit a signalà back. Beacons emit signals and advertise their presence at pre-set intervals. Because of their on boardà power source, active tags are expensive, priced from $20 to $70 and vary in size from 2 centimetresà upwards (Williams et al. 2014). Passive tags do not incorporate a power supply and are powered by theà electromagnetic signal received from the reader through the tags antenna. The y operate on low, highà and ultra-high frequency with signals ranging up to 10 metres depending on the tags backscatter powerà (Weinstein 2005). The smallest passive tags can be size of a grain of rice and cost 1/10 of the price ofà the active tag (Williams et al. 2014).à Silva, Filipe and Pereira (2008) proposes a RFID based student attendance recording systemà that comprises of RFID readers operating at the 125 Kilohertz (KHz) frequency with an effective readà range up to 10 15 centimetres and passive RFID tags embedded into plastic cards. The tags store aà binary identifier which is unique to each student. Readers are connected to the local network with RJ45à connector through which they transfer scanned tag id to the server using the Transmission Controlà Protocol / Internet Protocol (TCP/IP). At least one reader is mounted in each of the classrooms andà students need to take their card out and place it near the reader in order to register their attendance.à Nainan, Parekh and Shah (2013) claimed that a similar RFID attendance registration system setupà decreased the time needed to record a students attendance by 98% compared to the manual entryà method. Collected data shows that the RFID system was able to record the attendance of 5 students perà second, however considering the short effective read range we have to conclude that multiple readersà were used during that experiment to achieve such result. Despite advances over the paper basedà registers, efficiency of attendance systems based on passive RFID tags is limited by the number ofà readers located in the classroom. Analogous systems based on the active RFID technology couldà increase ids collection efficiency by scanning multiple tags simultaneously from a further distanceà (Yoon, Chung and Less 2008), however such systems would introduce a number of additionalà technological and social issues. Bandwidth limitations coerce RFID tags to share a common broadcastà frequency and as a consequence multiple tags responding concurrently to the same reader can causeà packet collisions. Therefore to solve these issues, advanced anti-collision algorithms and methods mustà be employed during development process (Bin, Kobayashi and Shimizu 2005). Increased reading rangeà additionally raises serious privacy concerns as the users location could be tracked without their ownà consent (Ferguson, Thornley and Gibb, 2014). 2.2 Biometrics Numerous properties must be satisfied to categorise the biological measurement of a humanà physiological or behavioural characteristic as biometrics. The characteristics should be unique, everyà person should have it and it needs to be accessible so it can be measured. There are a number of differentà studies exploring biometric authentication for attendance registration systems. 2.2.1 Voice recognition Recent experiments by Dey et al. (2014) explore the capabilities of an attendance registrationà system based on voice recognition. The main core of the system is a Linux OS server integrated with aà computer telephony interface (CTI) card and pre-installed with interactive voice response (IVR)à software. The server is accessible only from the previously pre-defined phones which are installed inà the classrooms. Using installed phones users have to record a reference voice sample to enrol into theà system. During enrolment users are provided with a unique four digit speaker identification then theyà are asked to read for 3 minutes text of their own choice. Enrolled users can register their attendance byà entering the previously received speaker identification number and then answering some simple randomà questions generated by the system. The system logs user attendance if the recorded speech matches theà stored reference sample. Initial system evaluation performed o n the group of 120 students indicatedà very low efficiency. In order to achieve 94.2% recognition rate, each user needs to produce at least a 50à seconds sample. Authentication time is additionally extended by an average 26 seconds computationalà time needed to analyse provided speech sample. Additional limitations come with the maximum numberà of 32 concurrent calls that each server can handle. In essence, a long compulsory enrolment process,à the unnecessary burden of remembering a personal speaker identification number and the poorà registration efficiency time make the system a poor candidate for large group registers.à 2.2.2 Fingerprints According to Akinduyite et al. (2013) fingerprint attendance management systems can be moreà reliable and efficient than the voice based equivalent. They have achieved 97.4% recognition accuracyà with an average registration time of 4.29 seconds per student. The system implements fingerprintà scanners connected to a centralised server through the existing Wi-Fi infrastructure. As with the voiceà recognition system, an administrator has to capture reference fingerprint data from every user beforeà the system can be used. Collected fingerprint templates are stored on the server in a Microsoft SQLà Server database and later used to match scanned samples. Almost identical recognition rate of 98.57%à was achieved by Talaviya, Ramteke and Shete (2013) in the similar fingerprint system setup. Analogousà to the RFID based systems, the efficiency is closely related to the total number of the available scanners.à 2.2.3 Automated Face recognition All of the prior systems require users to provide a biometric sample manually by using one ofà the available scanners located in the environment. Kawaguchi et al. (2005) proposed a considerablyà different solution which automates sample collection. They introduced a face recognition method basedà on continuous observation. The system requires two cameras streaming live data to the centralized unità with preinstalled face detection and recognition software. The first camera, called the sensing cameraà is installed on the ceiling and points towards the rooms sitting area. The second camera, called theà capturing camera is located in front of the seats to capture students faces. The sensing camera scansà over the room in order to detect seats occupied by the students. Received image data is analysed usingà the Active Student Detecting (ASD) method developed by Nishiguchi et al. (2003). Once a student isà detected, the system directs the capturing camera to the found lo cation. The face image collected fromà the capturing camera is then processed by the system and the students attendance is recorded if aà matching template is found. Experiments in which the described system was evaluated on a group ofà 12 students revealed 80% accuracy in engaged seats detection and the same level during face detection.à The whole experiment took 79 minutes in which 8 scanning cycles were performed, resulting in 70%à total accuracy for the attendance registering. Despite advances in automated biometric samplesà collection, the described system seems to be inefficient, especially if we consider time required toà collect and analyse samples on such small group of students. Additional issues may arise if there areà any obstructions in the room which can restrict the cameras view or if a low ceiling prevents sensingà camera from covering the entire seating area. 2.2.4 Summary The biometric systems have many advantages over the other authentication technologies. Theà biometric characteristics are tightly linked to the owner and can prevent identity theft, are difficult toà duplicate and are very convenient as they are always available. Despite all these advances, all theà biometric systems share serious ethical, social and security implications. It was evidenced by manyà researchers that there is a fear of biometric technologies on the whole. The individuals and potentialà system users are concerned about privacy, autonomy, bodily integrity, dignity, equity and personalà liberty (Mordini and Tzovaras 2012; Kumar and Zhang 2010). The system administrators haveà additional overhead with the security of the collected biometric data. The individual biometricà characteristic cannot be replaced if they get stolen, therefore the legal responsibilities whilst storing thisà kind of data are colossal. 2.3 Wi-Fi An interesting and novel attendance registration method was proposed by Choi, Park and Yià (2015). The authors created a system which incorporates Wi-Fi technology built into smartphoneà devices. They had developed two versions of a smartphone application, one for the lecturers and oneà for the students. When a class session starts the lecturer has to create a Wi-Fi Access Point (AP) usingà his version of the application. The students attend the lecture and scan for the available Wi-Fi Accessà Points and if the lecturers AP is discovered and students device stays in its range for specified amountà of time then attendance registration process is triggered. To overcome limitations with the maximumà number of concurrent connections that single AP can handle, the created students version scans onlyà for the nearby networks but never connects to the found APs. Attendance is registered by submitting aà Message Digests 5 (MD5) hash token that combines a Service Set Identif ier (SSID) of the found APà and students smartphone Media Access Control (MAC) address. The hash token is uploaded to theà server which verifies submitted data and registers the students attendance in the local store. The systemà architecture requires collection of the reference MAC address of all the students for the purpose of theà later validation. The study does not describe what smartphone models were used throughout theà experiment, but it seems that they did not consider privacy features on iOS devices. According to Appleà (2013), since the release of iOS 7.0, the MAC identifier is no longer accessible through third partyà applications, moreover after iOS 8.0 release, real device MAC address is hidden from the access pointsà and swapped with a randomly generated one (Apple 2015 A). Taking into account that over 98% ofà iOS devices run on iOS 7.0 and above (Apple 2015 B), only confirms that the proposed system designà should be reviewed again. 2.4 Other 2.4.1 QR Code with face recognition Fadi and Nael (2014) combined biometrics with Quick Response Codes (QR). The proposedà methodology requires lecturers to generate a unique QR code and display it in the class. In order toà register their attendance, students need to download a mobile application, install it on their smartphonesà and use it to scan the presented QR code. The scanned code is then submitted to the server via theà existing University Wi-Fi infrastructure. Furthermore the application performs an identity check byà scanning the students facial image which is later used to create matching score by analysing a referenceà image stored on the servers. Lecturer can manually validate submitted images to confirm a studentsà identity if a low matching score raises any concerns. The QR code image could be effortlessly forwardedà to other students outside the classroom, therefore the system also collects a location stamp on the codeà submission. The apparent vulnerability of the system lies in the number of technologies that it dependsà on. Authors assumed that every student will have a smartphone device with front and back facingà cameras for the facial images and the QR scans and also a Global Positioning System (GPS) moduleà which will be accessible during the registration stage. Each classroom has to be also equipped with aà large screen to present codes to the students and this may not always be available.Ã
Monday, January 20, 2020
Saving Private Ryan Essay -- Film Movies
Saving Private Ryan In his review of the film ââ¬Å"Saving Private Ryanâ⬠, N.Cull claims that the film presentsâ⬠¦ ââ¬Å"a realistic depiction of the lives and deaths of G.Iââ¬â¢s in the European theatre in World War IIâ⬠. Do you agree with his assessment of the film? Argue your case. N.Cullââ¬â¢s assessment of the film Saving Private Ryan in that it portrays ââ¬Å"a realistic depiction of the lives and deaths of G.Iââ¬â¢s in the European theatre in World War IIâ⬠is an accurate one. Director Stephen Spielberg brings to the audience the ââ¬Å"sheer madness of warâ⬠and the ââ¬Å"search for decencyâ⬠within it. That search ends for a group of soldiers whose mission it is too save Private Ryan. Although the film shows horrific and realistic battle scenes along with historically correct settings and situations with weapons and injuries true to their time, the filmââ¬â¢s portrayal of war goes a lot deeper than that. The expressions and feelings of soldiers along with their morals and ideology are depicted unifyingly with the horror of war. The lives and deaths of American soldiers in the immediate part of the invasion of Normandy are illustrated more realistically than ever before. Saving Private Ryan captures the ââ¬Å"harsh reality of war as authentically as possibleâ⬠. The films historical accuracy of the Omaha beach landing begins with the ââ¬Å"angry seaâ⬠and the timing of the attack, taking place at dawn. The film starts with Ryan in old age remembering his fallen comrades and then the story goes back in time to the events from there. A group of armed soldiers aboard a transport vessel look almost discarnate as the boat is tossed around the ocean. The soldiers do not pay attention to the orders they are given. (Perhaps a cause of why there is so much confusion and disorganisa... ...Ryan may not be a complete representation of the invasion of Normandy because of its need to provide a storyline and make a profit at the cinemas. Yet its accurate historical detailing enables N. Culls assessment of the film to be ââ¬Å"a realistic depiction of the lives and deaths of G.Iââ¬â¢s in the European theatre in World War IIâ⬠Bibliography Primary Sources D. Breger. Private Breger in Britain. London, 1944 J. Robert Slaughter. D-Day, 1944. Source analysis. Sir W. Churchill. Words at War. June 15, 1940 Secondary Sources American Historical Review. Vol 103 no 4. October 1998 R. Wolfson. Years of Change 1891-1995. Hudder and Slaughton. London, 1993. S. Spielberg. Saving Private Ryan: The Men. The Mission. The Movie. http://www80.homepage.villanova.edu/james.dion/over.html 18/09/2001 T. Edwards. D-Day. Wayland Publishers. London, 1975.
Sunday, January 12, 2020
Growing Pluralisation and Fragmentation of Policing Essay
This essay aims to explore Buttonââ¬â¢s (1996) claim that ââ¬Ëthe growing pluralisation and fragmentation of policingâ⬠¦has challenged the public policeââ¬â¢s claim that to be the primary policing forceââ¬â¢. In order to do so, it will provide a general definition of both the public and private policing bodies within the United Kingdom, followed by a brief look at the history of the public Police, their progression and integration with private agencies. The essay will go on to discuss pluralisation and fragmentation, and how these are reflected within the context of the topic. Finally it will identify how various financial constraints have resulted in cutbacks and forced ââ¬Ëhybridââ¬â¢ policing in many areas. It will conclude with a reiteration of the main points, supporting Buttons claim that the public Police are not the primary policing force. Within this essay it is not possible to draw a definitive distinction between public Police and private policing bodies or indeed the perimeters in which each work, it is however important to understand the difference between the Police and ââ¬Ëpolicingââ¬â¢ ââ¬â a social function that Reiner (ibid:722 in Button 1996) describes as: ââ¬ËAn aspect of social control processes which occurs universally in all social situations in which there is at least the potential for conflict, deviance, or disorder.ââ¬â¢ Today the word ââ¬ËPoliceââ¬â¢ is used in many civilised countries to describe an organisation whom uphold the law and order in society (Met Police, 2012). Button (1996) describes the Police as: ââ¬ËThe body of men and women employed by the state who patrol the streets, deal with crime, and ensure order and who undertake a range of other social type functionsââ¬â¢. It could it be reasonably argued that the primary difference between public and private police is legislative powers i.e. public police have powers of arrest for arrestable offences not committed within their view where there are reasonable grounds for suspicion (private police can`t make these kinds of arrests) (Citizens Advice Bureau 2012). Circa 1856 members of public, ordinarily the victims, largely conducted policing activities. Any person suspected of committing a crime would be taken to the ââ¬ËParish Constableââ¬â¢, an unpaid position to uphold order (Victorian crime and punishment, 2006). The Police as we know them today were formed in 1829 following the collapse of the ââ¬ËParish Constableââ¬â¢ system (Met Police, 2012). Home Secretary of the time, Sir Robert Peel, was responsible for passing the first Metropolitan Police act forming the Metropolitan Police force, although this only really came to fruition in 1839 when the new City of London Police took control of all independent police activities (Met Police, 2012). G4S (2012) explain that private Police enterprises started out as a very basic, 4-man bicycle team, providing a guard-protection force. ââ¬ËThe earliest roots in the UK appeared in 1935 when a former cabinet minister launched ââ¬ËNight Watch Servicesââ¬â¢. Historically, pre World War II, private security was frowned upon, seen as thuggery, sneaks and spies with private interests, however, since the War private security has been accepted as a supplement to the much-overburdened public Police. More recently governments have actively encouraged the commercial private sector support to Police, accepting that the extensive and complex nature of crime requires more than the Police have to offer (Bayley and Shearing, 1996). To fully address Buttonââ¬â¢s statement, it is necessary to understand the definition of pluralisation and fragmentation, and importantly how this is represented within the context of the statement. It is generally accepted that, in many countries, ââ¬Ëpolicingââ¬â¢ is now both authorised and delivered by diverse networks of commercial bodies, voluntary and community groups, individual citizens, national and local governmental regulatory agencies, as well as the public police (Jones and Newburn, 2006). Jones and Newburn (2006:6) continue, suggesting that there has always been an array of policing bodies however the last decade has seen a rapid increase in ââ¬Ëvisibleââ¬â¢ policing providers. While Bayley and Shearing (1996) note that: ââ¬ËIn the past 30 years the stateââ¬â¢s monopoly on policing has been broken by the creation of a host of private and community-based agencies that prevent crime, deter criminality, catch law-breakers, investigate offences, and stop conflict. The police and policing have become increasingly distinct.ââ¬â¢ It is this fragmentation or use of numerous agencies to uphold law and order within the community that Button refers to as pluralisation. Whilst we can say that policing bodies have been coexistent for some time; in recent years heavy financial constraints placed upon the public Police have forced a much larger, lateral, recruitment of private agencies to assist in back room and specialist Police departments. Newburn and Jones (2002) suggest that this may be due to: ââ¬ËIncreasing constraints on police expenditure and that, as a consequence, other forms of provision have expanded to fill the gap.ââ¬â¢ This largely came to the public eye in 1983 when the Home Office issued a circular (114/83, Manpower, Effectiveness and Efficiency) outlining the need for the Police force to demonstrate value for money in line with other public services (Smith and Henry, 2007:27 in Johnston, 1992). During the 1980ââ¬â¢s Conservative administrations offered national police forces, financial incentives to, where possible, employ civilians in positions that did not require police power, training or experience (Jones and Newburn, 2002). This, however, is not a new concept, as explained by Jones, Newburn and Smith ((1994) in Jones and Newburn, 2002), ââ¬Ëthe employment of civilians in the police service has a long history, dating back to the early stages of this centuryââ¬â¢. Changes forced by financial shortages are highlighted by Houghton (2012), suggesting that due to budget constraints policing bodies have been forced to look at radical options such as privatisation as opposed to more common measures previously used like a minimum rate of change. Chief Superintendent Phil Kay was quoted in the Guardian (2012), as overseeing the joint West Midlands/Surrey ââ¬Å"transformationâ⬠programme, designed to deal with the challenging financial conditions the force currently faced. As part of the programme West Midlands and Surrey constabularies intend to out source a variety of policing activities such as investigating crimes, developing cases, managing intelligence, as well as more traditional back-office functions, such as managing forensics, finance and human resources. In 2010/11 the Police Officer training course profile consisted of a 95 day course followed by three further 5 day interventions over the full 2 year probationary period. The total cost of training a police officer under this model was estimated at à £16,694 (the Met, 2011). These figures are in addition to a starting wage in the region of à £28,000 ââ¬â à £32,000 per annum, housing allowance, contributions to private health care, free eye tests/spectacles and a London based Police Officer could expect to receive an additional à £6,500 per annum (The Met, 2012). In 2009-2010, à £1 from every à £7 of tax paid in England and Wales was used to pay a Police pension (The Telegraph, 2012). It is difficult to determine an accurate figure as to the raw cost of just one Officer per annum. However, when you begin to assess a similar monetary breakdown for a private contractor conducting a policing activity, such as a public space CCTV operator, the costs are poles apart. Individuals can complete a 30 hour course that will impart sufficient specialised knowledge for the user to be deemed competent and ââ¬Ëpossess the legal and technical expertise to operate CCTV systems according to the latest industry standards and the BS standardââ¬â¢, for a cost of approximately à £150 (AAB Training, 2012). Following the introduction of the Private Security Industry Act in 2001, to legally operate CCTV within a public space, operators must hold a current SIA licence, available at a cost of à £220 (SIA, Home Office, 2012). In a recent paper the Home Secretary, Right Honorable Theresa May MP (2010), claimed that: ââ¬ËSpending on the police has increased by 24% in real terms since 2000/01 and stands at à £13 billion a year today. Over the past decade the focus on public spending has been on money rather than value for moneyâ⬠¦ Government and police forces have wasted money.ââ¬â¢ In the UK, Police are continually trying to ensure that there is a ââ¬Å"visible presenceâ⬠, a member of the uniformed police, on the streets. However in 1985 Bayley documented that in the United States of America, due to ââ¬Ëstaffing and deployment rules, 10 additional officers must be hired in order to get one extra uniformed police officer on the streets around the clock throughout the yearââ¬â¢ (Bayley 1985, as cited in Bayley and Shearing, 1996). They continue to state that the incremental cost of a unit of ââ¬Å"visible presenceâ⬠on American streets is, therefore, about $500,000 ââ¬â 10 times a patrol officerââ¬â¢s average annual salary plus benefits (Bayley and Shearing, 1996). More recently in the UK financial constraints on the public Police have resulted in numerous cases of ââ¬Ëoutsourcingââ¬â¢ of back room and support staffing from the private sector. G4S have won several contracts to support the Police including a support services contract with the Bedfordshire, Cambridgeshire and Hertfordshire Constabularies. Managing Director of G4S Policing Support Services, John Shaw states: ââ¬ËClearly in these times of austerity forces are investigating alternative ways of delivering the support services that underpin effective and efficient police operations and we are confident that by working with G4S the three forces will be able to make considerable savings which they will be able to redirect to frontline policing (G4S, 2012)ââ¬â¢. ââ¬ËMany UK forces face budget cuts and had considered outsourcing work to save cash and bridge a 126 million pound funding gap.ââ¬â¢ (Reuters 2012). As we can see, budgetary constraints have forced the public Police to investigate various options in order to maintain societyââ¬â¢s persistent desire to see the Police force ââ¬Ëpolicingââ¬â¢, as in on the streets. This need to reassess and outsource has naturally left a ââ¬Ëgrey areaââ¬â¢ in the classification between the state, tax funded, public Police force and commercial, private policing bodies. Loaderââ¬â¢s (2000) theory, that this shift in approach, ââ¬ËPolice to policingââ¬â¢, is a transformation. He describes policing bodies that range from Government Police, through to ââ¬Ëhybridââ¬â¢ agencies, government provided services including CCTV monitoring etc. etc. (Loader, 2000, as cited in Mazerolle and Ransley, 2005). In 2003, following a Government Green paper, Policing: Building safer communities together (Tim Newburn, 2012), the first key, high profile, ââ¬Ëhybridââ¬â¢ style organisation designed as an integral support unit to the Police was formed. Whilst the Serious Organised Crime Agency (SOCA) was created and is funded by the central Government it remains operationally independent of the Police. Again a ââ¬Ëgrey areaââ¬â¢ emerges as recruitment is often from within the various established Police departments, NCIS, NCS MI5. The emergence of such hybrid policing is one of the largest and least studied changes affecting law enforcement. Largely as a result of privatisation and contracting-out, Britain now has the following semi-private, semi-public bodies: the Atomic Energy Agency Police; the Transport Police; the Customs and Excise Investigation Division; the National Rivers Authority, the Post Office Investigation Department; and so on and on (The Economist, 1997). Whilst many see the ever increasing ââ¬Ëprivatisationââ¬â¢ of the public Police force and their roles, it is important to remember that this is not a new concept. Private security agencies have been assisting in law and order in the UK for centuries; many have come to rely on them, seeing them as an integral part of homeland security. The Shadow Home Secretary, Yvette Cooper, recently stated that the future of policing should be based upon the principles set out by Sir John Peel, suggesting that ââ¬ËPublicââ¬âprivate partnerships can be really important for the police, especially on things like new technology, and the police will need new contracts (The Telegraph, 2012)ââ¬â¢. On one hand the continued employment of private sector personnel to conduct backroom and technical policing activities fulfills the need of Police Officers to be seen to be ââ¬Ëpolicingââ¬â¢ however in doing so it fuels the fire for the pluralisation and ââ¬Ëhybridââ¬â¢ policing bodies that are becoming increasingly common throughout the UK. As Button suggests ââ¬ËPolicing has become pluralized. Police are no longer the primary crime-deterrent presence in society; they have been supplanted by more numerous private providers of security (Bayley and Shearing 1996: 588).ââ¬â¢ In conclusion, there are many things that have shaped and changed the way in which the Police force operate and the manner in which they uphold the law. However, the role of the Police Officer has changed dramatically over the years, the UK population has increased exponentially, they have faced severe manning and budgetary cutbacks, coupled with the rapid pace of evolving criminality, all of which have forced the Police to assess what are the core functions that cannot be filled by anyone other than a uniformed, lawful, Police Officer with powers of arrest. As a result out sourcing to experts and or backroom personnel is rapidly becoming the norm. In essence Buttonââ¬â¢s claim is true, due to financial constraints and social change, the public Police are no longer the primary policing force, more accurately it is a ââ¬Ëhybridââ¬â¢ of both the public Police assisted by numerous private and Governmental agencies. References AAB Training, (2012), ââ¬ËCCTV Training Coursesââ¬â¢, http://www.aabtraining.co.uk/security_training/cctv_training.php, (Accessed 30th October 2012) Button, M. (2002) Private Policing, Cullompton: Willan David H. Bayley; Clifford D. Shearing (1996), ââ¬ËThe Future of Policingââ¬â¢, Law & Society Review, Vol. 30, No. 3, 585-606 G4S (2012), ââ¬ËElectronic monitoring for Scottish Governmentââ¬â¢, http://www.g4s.uk.com/en-GB/Media%20Centre/News/2012/09/21/Electronic%20monitoring%20for%20Scottish%20Government/, (Accessed 17th October 2012) G4S (2012), ââ¬ËHistoryââ¬â¢, http://www.g4s.uk.com/en-GB/Who%20we%20are/History/, (Accessed 17th October 2012) G4S (2012), ââ¬ËPolice outsourcing statementââ¬â¢, http://www.g4s.uk.com/en-GB/Media%20Centre/News/2012/08/22/Police%20outsourcing%20statement/, (Accessed 17th October 2012) John Houghton, (2012) ââ¬Å"The ââ¬Å"not so newâ⬠plans to privatise policingâ⬠, Safer Communities, Vol. 11 Iss: 4, 191 ââ¬â 194 Les Johnston (1992) in David J. Smith and Alistair Henry, (2007), ââ¬ËTransformations of Policingââ¬â¢, The Trajectory of Private Policing, Ashgate Publishing, Ltd Loader, (2000), From Police to policing: transformation and pluralisation, in L. Mazerolle and J. Ransley (2005), ââ¬ËThird Party Policing: Cambridgeââ¬â¢, 19 Reuters (2012), ââ¬ËWest Midlands police latest to axe outsourcing plansââ¬â¢, http://uk.reuters.com/article/2012/11/22/uk-britain-police-outsourcing-idUKBRE8AL0BB20121122, (Accessed 22 November 2012) Security HR (date unknown), ââ¬ËPublic Police and Private Securityââ¬â¢, Impact of Blurred Boundaries on Accountability ââ¬ËGapââ¬â¢, http://www.securityhr.co.uk/Private-Security-and-Public-Police-Blurring-Boundaries.pdf, (Accessed 19th October 2012) SIA, Home Office, (2012), ââ¬ËPublic Space Surveillance (CCTV)ââ¬â¢, http://www.sia.homeoffice.gov.uk/Pages/licensing-cctv.aspx, (Accessed 30th October 2012) The Economist, (1997), ââ¬ËWelcome to the new world of private securityââ¬â¢, http://www.economist.com/node/86147, (Accessed 30th October 2012) The Guardian (2012), ââ¬ËPolice Federation vice-chairman says privatisation could destroy serviceââ¬â¢, http://www.guardian.co.uk/uk/2012/mar/03/police-federation-vice-chairman-warn ing, (Accessed 19th October 2012) The Metropolitan Police Force (2011), ââ¬ËDirectorate of Human Resourcesââ¬â¢, http://www.met.police.uk/foi/pdfs/disclosure_2011/may/2011040001974.pdf, (Accessed 19th October 2012) The Metropolitan Police Force (2012), ââ¬ËNew Constableââ¬â¢, http://www.metpolicecareers.co.uk/newconstable/pay_and_benefits.html, (Accessed 29th October 2012) The Telegraph, (2012), ââ¬ËPolice pensions unaffordable as tax payer contributions near 2Bnââ¬â¢, http://www.telegraph.co.uk/finance/personalfinance/pensions/9110995/Police-pensions-unaffordable-as-taxpayer-contributions-near-2bn.html, (Accessed 29th October 2012) The Telegraph, (2012), ââ¬ËWe donââ¬â¢t want private companies patrolling the streetsââ¬â¢, http://www.telegraph.co.uk/news/politics/labour/9584002/Yvette-Cooper-We-do-not-want-private-companies-patrolling-the-streets.html, (Accessed 30th October 2012) Theresa May MP, (2010), ââ¬ËHome Officeââ¬â¢, Policing in the 21st century: Reconnecting Police and the people, http://www.homeoffice.gov.uk/publications/consultations/policing-21st-century/policing-21st-full-pdf?view=Binary, (Accessed 30th October 2012) Tim Newburn, (2008), ââ¬ËHandbook of policingââ¬â¢, Policing since 1945, Willian, Second edition. 100 Treveor Jones and Tim Newburn, (2006), Plural Policing: A Comparative Study. Routledge, 1 Trevor Jones and Tim Newburn (1994), ââ¬ËThe Transformation of Policingââ¬â¢, understanding current trends in policing, The Centre for Crime and Justice
Friday, January 3, 2020
Chinese Market Entry Strategies Tentative Guide For MNES - Free Essay Example
Sample details Pages: 12 Words: 3478 Downloads: 1 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Purpose and research methodology The Chinese market is a very wide and attracting one to all sorts of businesses. This was the main factor that drove me to choose the topic of entry strategies to china. In order to do so, I identified the subsequent keywords: entry modes, MNEs (multinational enterprises), investment, FDI (Foreign Direct Investment) and China. I used those keywords to search for relevant articles in peer reviewed journals. The latter were accessed through the databases provided by the Grenoble ecole de management. The databases used are the following: ABI inform global (ProQuest) Donââ¬â¢t waste time! Our writers will create an original "Chinese Market Entry Strategies Tentative Guide For MNES" essay for you Create order Business source complete (Ebsco) Science direct (Elsevier) Emerald management plus (Emerald) Proper filters were applied along my search in order to correctly direct the results. A concrete example to this procedure was to limit the search to a certain period of time: from 1995 till the present. My search resulted finally in 15 articles from which I selected 8 to include in the systematic literature review (SLR). Please check appendix A for a more detailed explanation concerning the inclusion/exclusion criteria. Following the choice of the articles, I thoroughly read the chosen articles and drew a table summarizing the topics and their presence in the different articles. Please check appendix B for the detailed table generated. The table was a very useful tool that allowed me to trace easily the topics and write the relevant information in the following literature review. Literature analysis Introduction Chinaà ¢Ã¢â ¬Ã¢â ¢s growth rate during the past decades is appealing to MNEs to set up operations in the Chinese market. However, the cultural, social, political and economical environment is difficult to handle from the international firmsà ¢Ã¢â ¬Ã¢â ¢ perspective. This point is crucial for international corporations Vis as Vis the choice of their entry mode to that particular market (Luo 2000). Since it opened up to the international market in 1979 and then entered the WTO in December 2001, the FDI rules in the popular republic of china are constantly changing. Multinational enterprises that are willing to invest in china have a lot of conditions and factors to take into consideration when studying their entry strategy. Entry modes and different strategies Equity joint ventures, EJV According to the EJV law, the foreign investorà ¢Ã¢â ¬Ã¢â ¢s share must be at least 25%. Each partner is supposed to supply tangible (cash, material, facilitiesà ¢Ã¢â ¬Ã ¦) assets and intangible (intellectual property rightà ¢Ã¢â ¬Ã ¦) assets. The duration of the EJV according to Sino-foreign agreements is unlimited. Practically set to 50 years and extendable upon the mutual agreement of the multiple parties in the EJV (Luo 2000). According also to Luo and Chen(1995), this mode has many benefits: risk reduction, economies of scale and scope, improved local acceptance. The EJV assures a long-term relation between the foreign firm and the Chinese market. From the Chinese government perspective, EJVs helps the transfer of technology to the domestic partner, and thus this mode is favored from the Chinese authority point of view. The mentioned above authors state that these benefits are challenged by several factors: China is a really hard market, different in every location and extremely changing: the marketplace is dynamically changing and becoming more and more competitive. Also the distribution channels in china are not as developed as in the west, thus making it hard to supply correctly your product in China. Also, the negotiations with the Chinese present several difficulties and become a burden to foreign companies (demanding the state-of-the-art technology when the adequate infrastructure is nonexistent) and the domestic partner often tries to avoid cash funding, presenting land and existing facilities instead (Luo 2000).According to Luo and Chen (1995), EJV are faced by several difficulties: these complexities are relevant especially in the field of operation and management since the outcome of the company depends heavily on intangible variables (personalities, cultures, etc). Establishing a joint venture in china means that you established a legal local entity (Cheung and Leung 2007). This entity will allow you to conduct business. Cheung and Leung (2007) also agreed that for MNCs to have business growth in china, they should have a physical presence in the Chinese market. But the licenses for a joint venture are difficult to obtain; hence even if they are preferred over some entry modes, it is difficult to be eligible for a JV. Wholly foreign-owned enterprise, WFOE Luo (2000) stated that this entry mode offers the foreign investor more flexibility and more expandability potential, avoiding the drawbacks of an uncooperative domestic partner. WFOE are established faster than EJVs since the Chinese authorities are bound to reply to a proposal within 30 days. This type of entry mode is offering little technology advancement for china and is therefore we see that the Chinese authority is always in favor of an EJV over a WFOE. In order to fight it, the Chinese set up several rules and regulations in order to complicate the process, especially in some sectors like the automotive and telecommunication sector. Despite the regulations that are making it the setup of a WFOE in china difficult, the rules can be tailored depending on what the foreign company is offering of value to the Chinese government. Some sectors totally forbid the setup of a WFOE; however the Chinese are opening up more and more and will therefore allow WFOE in some new industries. An other drawback is that the Chinese are reluctant to the idea of foreign companies taking over their country. Adequate decisions like appointing locals in managerial positions are crucial to the success of the setup of the WFOE: Motorola employs only Chinese managers. Moreover, a foreign company will rarely succeed in a foreign environment, especially like in the surroundings of china, and therefore will have to cooperate in a certain way with the locals which will make the situation more viable for the WFOE. (Luo 2000) Puck, Holtbrugge and Mohr (2007) concurred with the same definition concerning the joint ventures and the WFOEs. According to Luo and Chen (1995), a WFOE offers is better seen as a mode that restrict opportunistic behavior and is therefore more controllable than an EJV. The holder of a WFOE has a greater bargaining power over the domestic government. For Luo and Chen, a WFOE is more probable to do better than the EJV concerning financial risk aversion. Contractual joint ventures, CJV Luo (2000) explained what differs between EJV and CJV is that the profits and other responsibilities are assigned to each partner according to what is agreed upon in the contract and not necessarily proportional to the total capital contribution by the partners in the EJV. The CJV is often used in joint exploration projects (oil exploration is an example). Concerning liability, a CJV has the choice between having limited or unlimited liability (Vis a Vis the capital invested in by the partners) versus the EJV that is bound to the limited liability. CJVs with unlimited liability do not require the foreign investor to contribute a minimum of 25% of the total registered capital. For Luo (2000), both CJV and EJV have import tax exemptions on imported equipment used as part of the capital invested in. CJV has a greater flexibility versus EJV regarding managing assets, production and operation. This is a great advantage for foreign investment since it gives the MNEs greater flexibility. A CJV may allocate profits in cash and in operation output (petrol in the case of oil exploration) versus the EJVsà ¢Ã¢â ¬Ã¢â ¢ restriction to cash distribution. It is a great advantage to build-operate-transfer businesses and will keep its advantage in the foreseen future (Luo 2000) For Zhang, Zhang and Liu (2007), joint ventures are the most adequate entry strategy from the perspective that it minimizes the environmental risk and helps acquiring the resources of the domestic associate. But also according to Zhang, Zhang and Liu (2007), this method has its drawbacks from the perspective of that the foreign investor takes the risk of having opportunistic behavior from the domestic partner. Shapiro, Tang and Ma (2007)à ¢Ã¢â ¬Ã¢â ¢s article talks about three main categories of FDI in china. They defined EJVs, CJVs and WFOEs the same way that Luo (2000) did.Teng (2004) argued that joint ventures have been the way of entering the Chinese market. However he states that wholly owned subsidiaries are becoming more and more appealing because of the fact that the foreigners are in more control that the Chinese compared to a joint venture. Umbrella companies Luo (2000) explained that the proliferation of MNCsà ¢Ã¢â ¬Ã¢â ¢ operation in china has led to the necessity of a sort of simplifying structure. The MNCs opted for what is called an umbrella enterprise or also known as investment company or holding company. The advantage of such structure over the traditional structures is that the holding is able to combine all existing investments (sales, procurement, manufacturing and maintenance) under one umbrella; it also eases the establishment of new investments. This model is mostly effective for multi-disciplinary companies that are using several entry modes adequate to each division. For Luo (2000), the model eases profitsà ¢Ã¢â ¬Ã¢â ¢ transfer among the different business units of the same company for strategic purposes and also transfer of the profits outside the host country. The holding model helps the foreign investor centralizing the management of his various businesses and this helps in removing several operating barriers. The facilities for the strategic business units (SBU) provided by this model can be used without special approval from the Ministry of foreign trade and economic cooperation provided that the investment company hold at least 25% of the SBUà ¢Ã¢â ¬Ã¢â ¢s equity capital. However this model does not entitle the company to do whatever business it wants. And to establish such holding, foreign companies should have at least two foreign-invested enterprises (FIE). In order to benefit from the holding model, companies are subject to various criteria and conditions according to Luo (2000): minimum total asset value of US$400 million in the year prior to its application established one or more FIEs in which it has contributed at least US$10 million in registered capital A minimum of 10 FIEs in China established whose activity is based on manufacturing or infrastructure construction and that contributed at least US$30million in registered capital. The Chinese tax authority treats the holding company and its several FIEs as independent companies. Acquisitions According to Luo (2000), it is a relatively easy method, consisting of acquiring local or foreign businesses. This method has its advantages in entering sectors that were exclusive to the government. China acknowledged its lack of technological advance, satisfactory capital and management expertise. The acquisition of companies in the mentioned sectors by foreigners is seen as a complementary activity to what the Chinese are doing for their development. This policy is a long-term plan. Luo (2000) argues that this strategy is considered advantageous for the foreign investors since these acquired domestic companies have a great profitability potential with the right management and proper technology usage. The profitability of such companies if existent or will be existent has the tendency to come faster than in an EJV or WFOE; the reason for that is fairly simple: the companies have an already built capacity and are not startups. Such companies are mostly attractive when their market i s a niche market. Proper information concerning the company and its liabilities should be well researched and investigated in because the ownership procedure can be an obstacle. The Chinese corporate law does not let a minority shareholder to have a say in the management of the company. Attention should be taken in all cases since the Chineseà ¢Ã¢â ¬Ã¢â ¢s culture of state is very strong and privatization by foreigners may be clear on paper but the practicality of this transfer is not well under control (Luo 2000). Zhang, Zhang and Liu (2007) stated that the acquisitions of domestic firms are the fastest way to set foot in the domestic market, but is burdened by several factors including cultural clash and overpayments due to reluctance of the authorities regarding this entry strategy of foreign firms into the Chinese market since it means that the foreigners fully own the firm. For Teng (2004), the acquisitions have numerous appealing benefits: fast entry strategy that allows the foreigners to acquire the already existing resources of the firm and it means that the foreigners do not start from scratch. These benefits are challenged by the potentially very high cost of the operation of merger or acquisition. Exporting Exporting is a way of reaching the Chinese market with minimal cost regarding the exit strategy in case of the occurrence of some problem. (David, Yigang and Kevin 1997). According to Teng (2004), exporting is an entry strategy that allows the MNE to operate in the domestic market without having the trouble of a setting the business in china: it is fast, has a limited entry cost and risk and allows the total control of the foreigners concerning the operations they wish and can undertake in the Chinese market. Representative offices According to Luo (2000), if a certain foreign investor is risk-averse, depending on his business, he can choose the strategy of opening representative offices. This entry mode helps getting acquainted with the domestic market, building the firmà ¢Ã¢â ¬Ã¢â ¢s connections and reputation. Several conditions bound this type of entry strategy: its activities are fairly limited to non-commercial, product promotion, market research and negotiations on behalf of the headquarters of the company abroad. For Luo (2000), with these limitations come advantages such as flexibility, non bounding commitments with domestic partners and openness towards multiple sectors that are not as easily available when using different entry modes. Since the structure is moderately simple compared to other strategies, it is easier to close the office if a reason to do that occurred. Several disadvantages should be taken into account: startup cost might be difficult to preserve. It is a relatively small office whose business is quite big, and with little resources is hard to sustain, especially that the office cannot issue invoices to his domestic customers. Quick review on some other options Branch offices: the action of opening branches in several regions of the country (Luo 2000). Build-operate-transfer (BOT): useful in the utilities sector, to do a certain project and then move on (Luo 2000). Franchising and licensing: to profit from a large market without committing large funds, giving the subsidiary in the host country a package of resources and rights to exercise the business (Luo 2000). Greenfield investments are also a way to enter a market according to Zhang, Zhang and Liu (2007) and this mode consists of investing in virgin lands from scratch. It also means that the foreigners are the exclusive owners of the firm and that is why the Chinese authorities are reluctant vis a vis this foreign strategy. Conclusions and results The authors mostly agreed regarding their results and conclusions. Before 1997, joint ventures were the predominant entry strategy used by MNEs to enter the Chinese market. After 1997, MNEs preferred to establish WFOEs: it is explained by the fact that the Chinese authorities changed their regulations concerning numerous sectors and hence facilitated the creation of WFOEs that are more beneficial to the foreign investors. (Puck, Holtbrugge and Mohr 2007) According to the table below, provided by Zhang, Zhang and Liu (2007), we can see that the entry strategy of companies in china has changed from joint ventures to WFOEs also known as FIE. This conclusion is concurring with what the other authors are saying about the current situation of market entry in china. The entry mode choice depends on a choice affected by the tradeoff between the amount of risk affordable versus the return expected proportionally to that risk, and mostly firms tend to minimize the risk. The authors also point that that the entry mode should be dynamic and not static to one strategy (Zhang, Zhang and Liu 2007). It is the strategy of using sequential FDI, i.e. the strategy changes dynamically in response to what is more adequate to the firm. This approach agrees to what Cheung and Leung (2007) said. WOFEsà ¢Ã¢â ¬Ã¢â ¢ share in FDI rose to 35% in 2000. CJVsà ¢Ã¢â ¬Ã¢â ¢ share decreased until 1995 and EJVsà ¢Ã¢â ¬Ã¢â ¢ share is more stable but declining a bit declining: it had 43% of FDI in 2000 (Shapiro, Tang and Ma 2007). Companies at first try to open a representative office, to test the waters of the market and then attempt a joint venture for a better exploitation of the Chinese market (Cheung and Leung 2007) According to Luo and Chen (1995), the mo de of entrance is correlated to the strategy of the firm. If the foreign investors are aiming to reduce the risk and are opting for an optimal asset management, a WFOE is more adequate to their goals than a JV. However if their goal is pursuing local market share, a JV is more conventional. For David, Yigang and Kevin (1997), on a statistical approach, examining 2998 foreign operations in the Chinese market they found that 35% of the companies relied on exporting for their entry mode, 20.8% on licensing, 41.5% on joint ventures and 2.7% on wholly owned subsidiaries. Teng (2004), is agreeing with Luo and Chen (1995): JVs are better if the foreigners are in need of the local resources. However if they are aiming a better control of the firm, they ought to opt WFOEs. He also adds that the fastest solutions are exporting and acquisitions. The latter is more costly and in more need of commitment than exporting. Appendices Appendix A: References Included articles Luo, Y, (2000), Entering China today: what choices do we have?, Journal of global marketing, vol. 14. 1/2, 2000, pp.57-82. Puck, J. Holtbrugge, D. Mohr, A, (2007), Beyond entry mode choice: explaining the conversion of joint ventures into wholly owned subsidiaries in the peoples republic of China, Journal of international business studies, vol. 40. , pp.388-404. Zhang, Y. Zhang, Z. Liu, Z, (2007), Choice of entry modes in sequential FDI in an emerging economy, Management Decision, vol. 45. 4, pp.749-772 Luo, Y. Chen, M., (1995), Financial performance comparison between international joint ventures and wholly foreign-owned enterprises in Chinaà ¢Ã¢â ¬?, the international executive, vol. 37. 6, pp.599-613 David, K. Yigang, P. Kevin, Y, (1997), How MNCs choose entry modes and form alliances: the China experience., journal of international business studies, vol. 28. 4, pp.445-474 Cheung, F. Leung, W. , 1st Initial, (2007), International expansion of transnational advertising agencies in China: An assessment of the stages theory approach., international business review, vol. 16. , pp.251-268 Shapiro, D. Tang, Y. Ma, C, (2007), Mode of Entry and the Regional Distribution of Foreign Direct Investment in China, journal of Chinese economic and business studies, vol. 5. 3, pp.261-277 Teng, B, (2004), The WTO and Entry Modes in China, international business review, vol. 46. 4, pp.381-400. Note that the article are numbered for the sole purpose of the comparison table in appendix B Excluded articles and reasons of exclusion Zou, P. Wong, A., (2008), Breaking into Chinaà ¢Ã¢â ¬Ã¢â ¢s design and construction market, journal of technology management in China, vol. 3. 3, pp.279-291. Reason: this article is focused on a certain industry and do not bring relevant value to the studied topic. Claver, H. Quer, D., (2005), choice of market entry mode in China: the influence of firm-specific factors., journal of general management, vol. 30. 3, pp.51-70. Reason: this article was addressing the issue of characteristics of firms and was not stressing on the entry strategy Ling, F. Ibbs, W. Cuervo, J, (2005), Entry and business strategies used by international architectural, engineering and construction firms in China, construction management and economics, vol. 23. , pp.509-520. Reason: this article is focused on a certain industry and do not bring relevant value to the studied topic. Beamish, P. Jiang, R., (2002), Investing Profitably in China: is it Getting Harder?, long range planning, vol. 35. , pp.135-151. Reason: this article discusses profitability and not entry strategies. Gaba, V. Pan, Y. Ungson, G, (2002), Timing of Entry in International Market: an Empirical Study of U.S. fortune 500 firms in China, journal of international business studies, vol. 33. 1, pp.39-55. Reason: this article discusses too specific firms and is not tackling the entry modes in a deep manner Burgers, W. Padgett, D., (2009), understanding environmental risk of IJVs in china, management international review, vol. 49. 3, pp.337-358. Reason: this article is tackling only one entry mode which is joint venture. It does not help the purpose of this SLR. Bontempi, M. Prodi, G., (2009), Entry strategies into China: The choice between Joint Ventures and Wholly Foreign-Owned Enterprises An application to the Italian manufacturing sector., International Review of Economics and Finance, vol. 18. , pp.11-19. Reason: this article is focused on a certain industry and do not bring relevant value to the studied topic Appendix B: comparative table of included articles This table represents the article included and the topic discussed in the article, i.e. every topic that is ticked means that it is discussed in the respective article Article Topic 1 2 3 4 5 6 7 8 EJV X X X X X X X X CJV X X X X X X X WFOE X X X X X X X Umbrella X Acquisition X X X X Exportation X Other* X X X X *other can include: branching, representative offices, Greenfield investment, BOT, franchising, licensing, etc.
Subscribe to:
Posts (Atom)