Category Archives: Technology



Nigeria remains one of the most challenging environments for any entrepreneur to start up a business and thrive. The country is also a very difficult place to have a formal business-inclined relationship across the spectrum of associations between people – customer to customer, business to customers and to a large extent, business to business, despite the presence of a legal system that can intervene in the event of a contractual breakdown, and this causality is as a result of the absence of trust in the society. This paper is being written to identify the multiple systems the Nigerian Government presently use in establishing a citizen’s identity. To provide an analysis of these systems, including but not necessarily limited to – their strengths, weaknesses; To look for the opportunity to create a possible alternative system or initiate a better process that provides the necessary increase in accuracy and efficiency that can be achieved,using our approach. The paper identifies the fundamental cause of these challenges, after critical analysis, and profers an improvising solution that can work effectively within the Nigeria environment.





When Ebay was founded in 1995, it started as an online marketplace for buying and selling personal items in a very rudiment way by today’s standards – with no guarantee, no payment platform, no fee or 3rd party interaction. Critics thought it was a foolish idea, and expected a scenario where a seller will ship a bad item and the buyer in return, mail a bounced check.

eBay outgrew Pierre Omidyar, the CEO’s, personal account within 5 months and had to be moved to a business account. Buyers and sellers who became members of the online communinity were charged a small fee to participate on the platform. eBay continued to grow by leaps and bounds and “Omidyar in an interview told the New York Times that he had so many checks piling up at his door, he had to hire an assistance to open them all” (Wells, 2018). Pierre Omidyar is now worth roughly $11 billion.

Societies become more wealthy as the level of trust and cooperation between members of that environment increases. Ebay was able to grow in leaps and bounds because it was a business that was built based on trust, in an almost entirely trustworthy society.

But how was the United States able to develop the level of trust within its population? Over the years, societies in the western worlds, have been able to efficiently gather every single relevant information about an identity within its population. These information gathering are consistently cross-checked and updated, and even given score points, fundamentally to have accurate information about an individual and to be able to plan social welfare, but as a subset, to also ensure good behavior and citizenship.

An efficient information gathering on citizens is lacking in Nigeria and in effect, businesses are unable to flourish, thereby causing business-like citizen to citizen relationship to be grounded in so much distrust, dishonesty and bad faith.

Identity: Individual and Social Identity


For the vast history of man, humans lived in small groups of 50 that never grew past 150. Scientists believe that from a genetic stand point, we are only built to cooperate with as many people as we can know well. Everybody knew everyone. If you stole someone’s dinner, or did not defend the group against an enemy, everyone knew you and you will get punished.
“But when you start having strangers in the group, people you don’t know well, it means people can free ride and cheat in the group with impunity” (Azim, 2018). As societies start to expand in population, groups started experiencing cheaters within them, making the groups unable to self-sustain. The group needs a level of cooperation for it to act and work harmoniously, and this can only be achieved through the identification of people.

We often define ourselves internally with limited reference to others, and social identity is used to define a “person’s sense of who they are, based on their membership” (Tajfel, 1979) to that tribe or population.

“A person’s identity is defined as the totality of one’s self-construal, in which how one interprets oneself in the present expresses the continuity between how one interprets oneself as one was in the past and how one interprets oneself as one aspires to be in the future”; this lets us define some aspects of identity, for instance: “One’s ethnic identity is defined as that part of the totality of one’s self-interpretation made up of those dimensions that express the continuity between one’s understanding of past ancestry and one’s future aspirations in relation to ethnicity”.

“Group such as social class, family, football team or nation, which people belonged to were an important source of pride and self-esteem” (Tajfel, 1979).

There are many considerations that add toward the identity of an individual, and this can be classified in the following identity components:

  1. Socio-demographic characteristics– “Includes characteristics such as gender, age, ethnic group, household size, or employment status. It is based on the premise that demographic groups are relatively homogenous and lends itself easily to quantification, measurement and classification. Additionally, it is difficult to falsify unless a false identity is being used” (Dr. F, 2018).
  2. Benefit sought after– “The benefits desired from pursuing certain behaviour, including the underlying motivation. It focuses on common values and attitudes across cultural groups. It may be extremely difficult to observe and is not suitable to assess individual, rather than group, behavior” (Dr. F, 2018).
  3. Behaviour displayed – “In relation to the financial institution. That is, based on data resulting from actions of the account holders, such as the length of relationship with the bank, modes of payment and shopping preferences, product ownership, and contributions to political, religious, and charitable groups. An underlying assumption prevails that past or current behaviour offers the best predictor of future behaviour. It is very useful in anti-money laundering, but easy to falsify and often difficult to measure” (Dr. F, 2018).


The capacity to construct a profile for an identity using one or more of the above components, is how societies have been able to identify people, so as to create an enabling and a successful environment for them.



Data Collection and Identity Documents

In the United States, the US Passport document and the Social Securit ID can be legally used as national identification, however, the state-issued driver’s license or state-issued identity card, is what is mostly used as a means of identification, nationally.

There is nothing like the term official national identity card from a federal agency that is mandatory for all US citizens. The uniformity of driving in the United States makes the driver’s license, which is issued by each State, the unofficial national identity card.

“A driver’s license or the State ID card contains a wealth of private information. In addition to full name, date of birth, signature, and photograph, licenses and state ID cards typically bear one’s home address, color of the eye, gender, and height. Some states go beyond that, including natural hair color, weight, Social Security number, and fingerprints (the latter two being stored in the license or state ID’s barcode)” (Wong, 2014).

One point to note is that despite having federal jurisdiction, the social security card cannot verify an identity. They are essentially used to comply with Social Security payroll tax laws and to verify the match between the name of an identity and an assigned Social Security Number.


Secondary Identity Verification Documents

There are other secondary documents that can be used to establish the identity of a person, which are naturally unacceptable as a primary form of identification. However, they are also useful in obtaining a primary form of identification, when a primary documentation have been lost or stolen. “These other documents include:

  • The Internal identification card issued by one’s employer, university, or school
  • Voter’s registration card
  • Credit cards and debit cards
  • Proof of professional certification for members of regulated professions
  • Health insurance card issued by a private health insurance company, by Medicare, or by a government agency
  • Library cards
  • Membership or Loyalty cards issued by private companies such as, supermarkets, warehouse club stores, etc.
  • Utility bills, which are often used as proof of residence or address”.

Credit System

 Micro to Macro Impact of Credit on an Economy

From personal experiences, we have a general understanding of how credit works. We borrow money from the bank or other people, to purchase goods and services immediately, and then repay with interest at a later date. The immediate purchase could be, to buy a house, a car, or grocery shopping.

However, there are other agendas and different objectives which economic policymakers have, so as to create an impact on the broader economy.

“Instead of having to save for long time in order to obtain a big-ticket item like a house or a car, credit allows the borrower to have the item immediately, while using future earnings to make repayments over a period of time” (Butler, 2009). Economic policymakers understand that access to credit expands purchasing power, allowing people the ability to buy more things. The more transactions are conducted, the more the economy booms.

Economy policymakers understand that having easy credit access, is a main factor in growing economies. Unfortunately, 3rd world economies such as Nigeria, performs poorly in understanding and implementing such policies. According to the International Finance Corporation, which is the lending arm of the World Bank, “Lack of access to finance is a key constraint on the growth of small and medium enterprises in Sub-Saharan Africa, and thus also an important limitation on employment, economic growth and shared prosperity”.





In any case, for a society to credibly run a functioning credit system, there are two important subsystems that have to be reliably put in place – A credit bureau and a reliable system to background checks. From these two, any registered Consumer Reporting Agency can pull records and provide reliable information about an identity.


Credit Bureau

“Consumer credits are granted by banks, retailers and a variety of other lending institutions and this is a sector of the economy that has seen rapid growth over the last few decades”. Credit scoring, which is broadly applied in consumer lending, is a statistical approach that predicts the probability that a credit applicant will default or become delinquent. Credit analysis, which consists of the valuation of the financial history and financial statements of the applicant credit background, aims to evaluate the borrower’s probability of repayment, to determine the financial strength of the borrower, and to minimize the risk of non-payment to an acceptable level. Good borrowers with low credit risk would be granted a loan, while a high risk borrower would be denied” (Roszbach 2004)

“The procedure with which an applicant’s creditworthiness is being determined, was based on the 6 C’s namely Character, Capacity, Cash, Collateral, Conditions and Control” (Rose, 1993), which some experts find unreliable. However, this augmented demand for credit has since led to the innovative idea of a credit scoring system. The “credit scoring methods have produce more precise classifications in comparison with subjective judgmental assessments by loan officers” (Rosenberg et al. 1994). An advantage to this is that it makes credit scoring  more efficient, while also assisting lenders to review the borrowers’ creditworthiness more regularly.

“Credit scoring enhances and sometimes replaces the traditional subjective assessment, since it measures the credit risk of applicants much more accurately and quickly than the latter one. This method of measuring credit risk is mostly used in consumer loans, especially in credit cards but, nowadays, has become commonly used in mortgage lending and in complex business loans as well” (Roszbach 2004)


The United States has three major credit reporting agencies, and they are, Equifax, Experian and TransUnion. “They were set up to help keep track of consumer and corporate spending and repayment history, thereby protecting creditors.

Prior to this, a consumer could default on a financial obligation and simply shift over to obtain financing from an unsuspecting creditor who had no way to know that the consumer was a credit risk” (Rotter, 2018). In the case of Nigeria, for instance, the Asset Management Corporation of Nigeria, recently mentioned that about “350 Nigerians are responsible for more than 80 per cent of the $15bn debt portfolio of the company” (AMCON, 2015), out of 180 million people living in the country.








Ahmed Kuru, CEO AMCON, in an interview with the News Agency of Nigeria, disclosed that “the 350 Nigerians or their businesses, owe a whopping $12bn of the $15bn debt profile of the company, an amount which is over 50 per cent of the 2018 Budget of Nigeria”.



These 350 individuals have registered businesses and are able to accumulate this substantial debt profile, by seeking loans from one bank to the other using the same credentials, and defaulting on these loans.

Thankfully, the advent of internet which as further eased efficient data collection and error correction, has reduced the ability to defraud creditors


Background Check

“There are different types of background checks, that contain overlapping results. For instance, a criminal background check can reveal sex offender crimes, but there are also sex offender-only background checks (Criminalwatchdog, 2018).

Below is a list of the different kinds of background checks:

  • Arrests
  • Convictions of felonies and misdemeanors
  • Court records (dockets, judgements, etc.)
  • Warrants
  • Sex offenses
  • Incarceration records

Background checks from a county are self explanatory, containing records of arrests and convictions within that particular county. Whereas State background checks, vary. Some states have just a handful of county records on file, while other states have all county records in their databases” (Criminalwatchdog, 2018).


Employment Screening

Employment verification exercise is the most common type of background check carried by people and organizations, and these checks produce the following kind of information

Criminal history, Character references, Social security number verification, Education verification.

One point to however note is, pre-employment verification checks differ depending on the need of the employer and the type of job involved. If an employer is seeking to hire an account officer or a Chief Finance Officer, running a credit check is ideal. Whereas, a parent seeking the services of a nanny will most likely specifically look for sex offenses.

Tenant Screening

“Landlords use this exercise to screen potential tenants in order to make sure they are responsible. This background check review criminal records, credit reports, and contact past landlords for personal references” (Criminalwatchdog, 2018)

In Nigeria, there have been many cases where tenants are unable to fulfill their rental obligations. These free rent seekers are able to twist around laws that protect the tenant, enabling them stay rent free for a duration up to 6 months.

Childcare Background Checks

Extensive background checks is always required for childcare workers. The requirements for screening nannies or childcare workers vary, but most will require checks from:

  • State criminal records
  • State and federal fingerprint records
  • Child abuse and neglect list records
  • State and federal sex offender records







Consumer Reporting Agencies

Every credit report contain rich of information that lenders are able to use to assess applicant’s risk as a borrowers.

This information have details about their credit account, the type of account, the credit limit and account balance, and payment history, or collections that are in the account holder’s name.

“The information in this credit report comes directly from companies that have extended credit in the past. Credit card companies, banks, credit unions, retailers and mortgage lenders all report the details of the credit activity to the credit reporting agencies (CRAs)” (Equifax, 2014).

“CRAs also receive information from debt collectors, and they purchase public records, such as bankruptcies, from public record providers”. (Equifax 2014)


The Importance of Conducting Background Checks

The hiring of new employees can be a difficult experience. It is important to find the right candidate with the education and capacity to do the job. In an environment such as Nigeria, verifying claims are problematic, and many employers have found themselves in circumstances where they have hired incompetent employees that are discovered later to be unable to perform the task they were hired for.

“To be effective in hiring practices involves delving into the background of applicants to get a better idea of their abilities and employment performance. However, this has to be restrained with respect for the privacy of each individual candidate as well as being compliant with relevant laws” (TheAdvancedGroup, 2011).

Primarily, background checks are run to determine the accuracy of the information provided by an applicant. It also an opportunity to assist in creating a profile for the applicant beyond what can be discovered in a short encounter. For instance, a security officer position is not open to anybody with a criminal record.



Legal Issues with Background Checks

“Before a background check is initiated, proper evaluation for the purpose is important. Some activities of a background check may not be necessary. An organization can easily go overboard in a background check to err on the side of caution. Certain information such as medical and credit history require written consent from the applicant” (TheAdvancedGroup, 2011).

Employers have the right to know who they are hiring and background checks are legal. Technically, any information that comes up on a background check is usually public record. “Employers can therefore research this information and take it into account when making hiring decisions and most employers exercise this right. According to a survey conducted by CareerBuilder, 72% of employers conduct background checks on every new employee” (Klazema, 2018)

Background Check Laws and Limitations

It is vital to note that there are several laws that limit an employer’s ability to use background checks in making hostile decisions about hiring. Both employers and applicants should always check what information is legal about the background check that will be run.

The limitations that often apply to employment background checks:

FCRA Compliance

In United States, “the Fair Credit Recording Act (FCRA) is one of the most important documents that protects the legality of employment background checks. The FCRA documents does not prohibit employers from conducting background checks on applicants” (Klazema, 2018). Instead, it provides a process that employers must go through before and after checks are run on prospective employees.

“Before the check, an employer must follow a rigid set of rules to obtain a candidate’s written consent to the check and after the background check, if the employer wishes to make an adverse hiring decision based on the findings of the report (Klazema, 2018), it must first:

  1. Inform the candidate in writing about the decision,
  2. Provide a copy of the background check report that led to the decision
  3. The candidate must be given the details of the company that prepared the background check report
  4. Tell the candidate the background check company did not make the hiring decision, despite preparing the relevant report
  5. Inform the candidate that he or she can request an additional copy of the report from the background check company
  6. Inform the candidate of their right to contact the background check company and dispute the report’s accuracy” (Klazema, 2018)



Information Gathering and Identification In Nigeria

In Nigeria, the Bank Verification Number, which is widely known as the BVN is an identification system executed by the Central Bank of Nigeria to reduce illegitimate banking transactions in the country. “It is a modern security measure in line with the Central Bank of Nigeria Act 1958 to reduce fraud in the banking system”.

“BVN verification works by recording the fingerprints and facial photograph of the applicant. It uses a biometric technology to register customers in the financial system.  It records these unique physical features, such as the fingerprints and eye of an individual. A BVN is generated once a person’s biometrics have been recorded” (Punch, 2015). The mandate is to protect bank customers, reduce fraud and strengthen the Nigerian banking system.

The BVN have been a successful venture ecause of its Biometric enrolment technology, as it “is helpful to people who cannot read and write. Their finger prints and pictures would serve the same purpose as signatures” (Punch, 2015). Bank customers who have multiple account with different banks would be covered when they do a single registration in any of the banks where they have accounts.

“BVN was initiated to help the banking system reduce situations where loan defaulters, for instance, move from one bank to the other and the banks extend new credits to them, without knowing their history.  Banks would be able to track transactions across all banks in Nigeria with more ease” (Vanguard, 2015). The BVN project has captured no fewer than 31 million Nigerians, with its unique identifier number.

According to Dipo Fatokun, CBN Director, Banking and Payment System, “disclosed in a paper titled, `Nigeria’s progress towards the creation of a robust, trusted and inclusive Financial Services Environment’, that CBN had also linked a total of 43,959,282 banks accounts” (Vanguard, 2015).

The objectives include the following: “increase access, convenience, service levels across the industry; enable greater financial inclusion and integration of financial services into the economy, with its attendant positive impact on economic development’’ (Fatokun, 2015).

According to Fatokun, “the BVN has also helped to increase deterrent controls on financial transactions and reduce or mitigate fraud risk and identity theft. Most importantly, it has created avenues for people who cannot write regular signature to make financial transactions, thus, facilitating financial inclusion” (Vanguard 2018).


Drivers License

Everywhere in the world, because of the common use of vehicle licensing, the driver’s license remains a document which users get after a well defined process. “As an official document, it permits individuals to operate any motorized vehicles, such as motorcycle, car, truck or bus on public roads in accordance to the law of the country” (Odumade, 2018).

In Nigeria, “the first and most important purpose of driver’s license is to identify the owner as duly certified by the state to operate a motor vehicle. It is the first document a state enforcement officer will demand from a driver, without which a driver has no right to operate a vehicle on public roadway” (Odumade, 2018).

The Nigerian driver’s license serves as an official document which can be presented to open a bank account, when applying for government benefits and loans. “A current driver’s license is a universally accepted form of personal identification, because it displays contact information and picture of the holder. In the instance of accident or emergency, it has also been structured to provide vital information concerning contact details of the next of kin, blood group of driver, which sometimes determine treatment to be administered during casualty” (Odumade, 2018)

However,” many Nigerians try to circumvent the application process of securing driver’s license because of the cumbersomeness involved. They often engage in the services of middlemen who have knowledge about the system are contracted to fasts track the process. A document that is officially obtained for $20 for a three year license will be obtained unofficially for $60. This middleman arrangement is also facilitated by the corruption of many officials who have been compromised”  (Odumade, 2018). An additional consequence is, a different false identity can also be created.


Integrating Existing Identification Systems

The “National Identity Management Commission (NIMC) is a statutory Nigerian organization that operates the country’s national identity management systems. The NIMC Act No. 23 of 2007 established the commission to create, operate and manage Nigeria’s a national identity card database, integrate the existing identity database in government institutions, register individuals and legal residents, assign a unique national identification number and introduce general multi-purpose cards” (Nwezeh, 2010).

This project is an initiative to create a national identity database and to prevent both double identity and identity fraud by assigning a unique identifier number, just as done with the Social Security Number, in the United States.

Every citizen and legal resident of Nigeria are required to enrol for the National Identification Number (NIN).

The NIN is a unique set of numbers assigned to Nigerian citizens after their biometric records have been taken and the National Identity Database confirms that there is no previous entry of the same data. The NIN once issued to a person cannot be reissued, even if the number was previously assigned to a dead person.

The NIN references all records from other agencies such as Vehicle Licensing office, Tax ID, Passports, BVN, etc about a person in the database, harmonize the data and, used to check the identity verified.

Challenges Deploying the National Identification Number

One of the challenges facing the National Identity Management Commission is the  production of national identity cards for everyone who enrolled for it, despite the huge public clamour for it. According to the commission, “national identity cards that are ready are mainly for people who enrolled in 2012 and 2013, adopting a first-come, first-served approach”, the Director-General, NIMC, Aliyu Aziz. He also expressed concern in the huge cost being incurred in the identity management of different sectors in Nigeria.

Aziz said that the “duplication of efforts have led to uncoordinated identity approach, as well as unreliable identity information due to lack of interoperability and disconnected databases”.

He said NIMC was tasked with the responsibility to ensure absolute integrity and security of this information. He added that the linkages between agencies such as the birth and death agencies would be an advantage.

“The Identity Management System in Nigeria is rigged with many other challenges such as underfunding from the Nigerian Government; corruption; the inability to integrate identity systems from other government agencies – NIMC, NPC, INEC, FRSC, National Passport Office; and Incompetence from the NIMC administration and its inability to coordinate its processes along the framework of the agency” (Ibanga, 2017)

Developing Credit and Identity Check Solution

AO Incorporated has been looking at various opportunities for its organization to apply the IT and Software capabilities of the Company in some potential new markets and has decided to be registered as an authorized Consumer Reporting Agency in Nigeria. As part of its research on possible projects, developing a robust private driven credit and identity check system comes highly recommended, in such a way that it would help the Nigerian Government tackle some of its citizen’s identity crisis while also spurning economic growth.

In order to optimize the delivery of a cost effective, yet an efficient solution that provides value for users and the Nigerian environment as a whole, AO Inc will be limiting its identity check scope of service to the development and deployment of a bespoke solution that addresses specific background check services for


  • Nanny Solution: To conduct background checks on any household employee. AO Inc. will offer different levels of screening options and also provide the ability for additional secondary searches.

Nigeria has an expanding middle class, which mean many parents are having to work longer hours and at the same time, not having time for child care. Unfortunately, theft and abuse crimes are existing in the childcare world. No parent will want to endanger the life of their child. In Nigeria, when many families find a nanny they really like, they feel a background check is unnecessary. This is aside the fact that going about a background check is not a straightforward process and easily accessible.

To do a Nanny Background Check, the information will search for

Identity Confirmation – NIN number, Full name, Driver’s license

Criminal Records – 5 year non criminal activities, 5 year address history, sex offenses, court cases, misdemeanors

Reference Check – work history

Driving records – If any


  • Employee Verification Solution – To offer a comprehensive class of background screenings, including an abundance of checks designed specifically for most industry workers. In addition, AO Inc. will conduct deep criminal history searches and provide a wide variety of verifications, such as those for past education and employment. For example, CBC News of Canada reported that fraud in the workplace cost Canadian Businesses over $3.2 Billion in 2011

The employment verification solution will check for job competency. For many employers, a background check is a reliable way of verifying claims made by job seekers during the hiring process. With a tight employment market, the appeal of overstating educational qualifications or enhancing job histories, can grow.

The employment verification will also check that it has enough information to protect against workplace safety and theft. Employers know that most business theft today is performed by insiders. A background check can help employers to make intelligent and informed hiring decisions to help reduce their risk of theft.

  • Credit Check – To offer a solution that reveals credit history, including paying habits, judgments, liens, and bankruptcies for the individual. This information is useful in determining financial responsibility and money management for the applicant.
  • Tenant Screening Report – A service that runs a thorough search and screening process on a potential tenant, to help a landlord avoid future problems by detailing a history of past rental behavior and rental responsibility.



AO Inc. IDM Application Software Flow Charts


Chart 1 – AO Inc. IDM System















Chart 2 – AO Inc. IDM Services











Chart 3 – Interaction between AO Inc. IDM and Integrated Identification Agencies in Nigeria to pull Identity






Project Management






Project Milestone






SOAR on Consumer Reporting Agency in Nigeria

This section will be focusing on a brief analysis of the business opportunities and strengths of running a consumer reporting agency such as which, AO Inc intend to engage in Nigeria. This SOAR analysis will be a useful approach for the strategic planning of the project.

AO Inc is looking at registering as a consumer reporting agency in Nigeria to be able to carry out various checks on an identity – from credit reporting to other forms of background checks.based on research and findings, there is only one existing company Background Check Internation, BCI, which as a first market mover, is already running similar services, and is also the only kind of organization presently registered in Nigeria offering such services.

The following AO Inc core organization strengths and assets are determined to be

  • A state of the art technology, covering applications and equipment, that we will be bringing from the United States
  • An excellent training program that will be designed specifically for new field operation personnels
  • A solid long term relationship with top key Nigeria Government officials who are willing to fast track licensing and other regulation requirements

Opportunities are already identified and that’s why AO Inc will be limiting its scope of services to areas of specific need to the average Nigerian – Employment verification, Tenant Screening, Credit reporting and Nanny Services. Based on research, it was found that the competitor, BCI, running similar services charge a steep cost to run its services. AO Inc will be bringing down the cost implication to a fraction lower, making it more affordable and covering a larger, marginalized customers within the market space.


This paper is written to look at the opportunities where AO Inc will be able to apply its IT and Software capabilities in some potential market. Nigeria as a business environment does not have a credible and or easily assessible Consumer Reporting Agencies that offer a robust private driven credit and identity check systems, in such a way that it would benefit the Nigerian Government and its people, and also help to tackle some of its citizen’s identity crisis.

A thriving and booming economy is one which has people having a high level of cooperation and trust. To develop trust and cooperation, individuals within that environment must be identifiable, and a system has to be designed to force them into having credible values and uprightness. Will AO Inc. mission and vision be able to achieve this project?

“When your vision becomes your mission, your business will become a movement.” A successful business can create change that affects neighborhoods, cities, even the world.

The last chapter using the SOAR analysis already explored the strengths and opportunities that are there for embarking on this project, and a final motivating need to go ahead, is that AO Inc. has as part of its vision, the moral obligation to contribute to creating enabling societies, around the world.

Paper Written by: Ade Oyinloye


Suzanne Wells. (July 2018). The Beginnings of eBay. The Balance Small Business.

Saul McLeod, (2008). Social Identity Theory.

Weinreich, Peter (1988) [1986]. “14: The operationalization of identity theory in racial and

ethnic relations”. In Rex, John; Mason, David. Theories of Race and Ethnic Relations. Comparative Ethnic and Race Relations. Cambridge: Cambridge University Press.pp. 299ff. ISBN 9780521369398. Retrieved 2018-08-30.

(DR), F. (n.d.). D2.2: Set of use cases and scenarios. Retrieved from

Wong, A. (2014, April 04). Driver’s Licenses Contain Too Much Personal Info to Use at a Bar.

  1. David Garson, Public Information Technology and E-governance: Managing the

Virtual State (Sudbury, MA: Jones & Bartlett Publishers, 2006), 171.

Okumagba (Nov. 2014) Vanguard. Access to credit and Nigeria’s economic development.

Roszbach, K. F. (2004). Bank Lending Policy, Credit Scoring and the Survival of

Loans. SSRN Electronic Journal. doi:10.2139/ssrn.488522

What Types of Background Checks are There? (n.d.). Retrieved from

Why It’s Important To Conduct Background Checks and How To Do It Legally. (2011, September 23). (Michael Klazema, Dec 2018). Are Background Checks Legal?

Vanguard. (2015, March 11). Importance of Bank Verification Number. Retrieved from

Vanguard. (2018, May 01). CBN captures 31m Nigerians in Bank Verification Number

Project. Retrieved from

Odumade, (January, 2018). Road Safety And Driver’s License. (n.d.). Retrieved from

Kingsley Nwezeh. (March, 2010). ID Card – FG Targets 100 Million Citizens, This Day (Lagos),

March 28, 2010

Okechukwu Nnodim (April, 2018). We can’t produce national identity card for everyone –

NIMC. Retrieved from

Only 350 Nigerians responsible for 80% of N5.4 trillion debt – AMCON. (2018, June 28).

Good Hotel: Doing Good, Doing Well?

Good Hotel was taken over by a San Francisco based Hotel Management Company owned by Joie de Vivre in 2008 and was rebranded, modeled after the triple bottom line framework that focuses on Social, Environmental and Financial. A concept that is adopted, in evaluating performance from a broader perspective to create greater business value. Good Hotel became known “as the first to be branded as a “hotel with a conscience” – encompassing a positive attitude, environmental sensitivity and philanthropy” (Pierce and Robinson, 2013).


The Vision and Mission behind the Good Hotel concept

The mission and vision statements behind the Good Hotel concept are as follows: –


Good Hotel as a hotel is focused on enriching the quality of life for its host communities, with a positive approach that inspires the “good in us all” ideology being the most eco-friendly hotel.

Part of its mission statement states – “As we practice philanthropy and believe in doing good for the planet, we are committed to operating in an economically, socially and environmentally responsible manner while balancing the interest of diverse stakeholders, promoting sustainable lifestyle and differentiating our guests personal experience”.

Good Hotel endeavors to make a difference in the lives of its guests and associates through a shared passion for life, work and personalized experiences


Good Hotel, being customer focused, endeavor to be a leader in hospitality industry that intends to exceed customer’s expectation, have passionate employees and owners while striving to be a responsible steward of the environment and sustainable development of society.


Reflect on the pros and cons of the alternatives Pam Janusz is considering for her recommendation to the new ownership of Good Hotel.

“During 2007-2009 economic downturns, occupancy levels dropped because of declines in the demand for lodging accommodation. As a result, it led to declining in both revenue and profits, and dramatically led to decreasing in net income. Hotel management team were able to reduce operating expenses in response to declining levels of occupancy and revenue” (Pierce and Robinson, 2013).

Pam Janusz ran a SWOT analysis on the business and was considering recommending to the new Good Hotel management between continuation and expansion of the business or suspending the current business model that Good Hotel is currently using for its management style. Continuing the concept would mean not to introduce new variables in the hotel’s operations, as the staff are trained and happier, the guests were giving positive reviews more often, and the financial gains have surpassed the goals.

According to the considerations to continue, Good Hotel had good customer service. · High customer satisfaction and loyalty. · Unique hotel design to attract customer · Caters to a wide variety of customer’s needs and wants. · High employee commitment and satisfaction. · Employees are well trained and aware of the hotel’s safety and green program · Strong Online customer review

Another argument to continue with the business model is, San Francisco tourism were mostly influenced by Caucasian. “As of 75 % of Caucasian, 62% were green consumers. Responding to green consumers, Good Hotel can get consumers to think of the products as their needs and wants” (Pierce and Robinson, 2013). Also, the consumers can feel that by staying in such eco-friendly hotel like Good Hotel, they are doing their part to make life more sustainable. Also, Good Hotel can focus on Caucasian as targeted customers.

However, there were cons in continuing the business model. “During the period 2008 – 2010, the industry experienced the longest downturn which was expected to drop occupancy level about 55%―the worst since the Great Depression” (Pierce and Robinson, 2013). Continuing the business model would mean Good Hotel will be susceptible to a high level of uncertainty in the ever-changing business atmosphere, and this could change and hurt the business. In addition, Good Hotel was considered as not aggressive enough in marketing, rely heavily on internet booking, with a potential for staff turnover after the change in management. The new management could also disband current concept and identity of Good Hotel entirely.


The impact of ‘sustainability’ on businesses in general and the U.S. lodging industry in particular. Is it high, medium, or low? Analyze and explain the reasons.

As of October 2009, the U.S. lodging suffered from chronic overcapacity with about 4.8 million rooms―approximately one room per 64 U.S. residents. This has since been improved on.

First, the threat for a potential new entrant is considered weak in this lodging industries. If there are new entrants to the lodging industries, there are some hurdles that they must overcome. “The barriers to new entrant are due to the high capital investments that are required to start and operate a hotel. They also need many efforts to differentiate themselves from those who are already existing, recognized by customers and accomplish customers” (Pierce and Robinson, 2013). Due to these factors, the threat of new entrants is weak for the lodging industry.

Hotel business has the advantage of controlling suppliers in their hands. As business is being hospitality and tourism industry, there are many suppliers that are able to supply hotels with the essentials needed to operate the business. For example, hotel face low switching if they want to change the suppliers such as the suppliers of hotel’s furniture and fixtures, and the suppliers of food and beverages.

Furthermore, In lodging and hotel industry, buyers have a strong bargaining power. First, the cost of switching to a competing hotel is low. In addition, the buyers’ power is strong because the buyers demand for using hotel rooms have decreased while there are greater number of rooms are offered. Another thing that makes the buyers’ power strong is that hotels rely on unpredictable travelers.

On the flip, the threat of substitutes in the lodging industry seem to be strong. This is because there are always good substitutes that are available to be used by consumers. “For instance, there are always the availability of cheaper priced lodging places. If substitutes offer consumer comparable features that they would receive at hotel, consumers are more likely to change. Also, the switching costs to use the substitutes are very low for buyers” (Pierce and Robinson, 2013).

In addition, continuing the business model without a variation of change also meant that in the lodging industry, hotels are open to rivalry among competitors. This force seems to be strong because the customers’ switching cost is low. They can change their mind to stay at a different hotel at any time. “Due to economic downturn, hotels began to notice a declining RevPAR rate. The RevPAR rate offers a convenient way for a company to see how well the fill its rooms as well as how much they are able to charge for using them” (Pierce and Robinson, 2013).

Based on analysis using SWOT on the lodging industry, I believe the impact on sustainability of businesses in the lodging industry is medium and very sustainable.


If you were the new the new owner, would your team discontinue, continue or expand the Good Hotel concept? Why?

If I were the new owner, I would recommend that Good Hotel should continue and expand by maintaining and further developing the hotel concept, and also adhere to the strategic formula recommendation. The strategic formula include

  • Create different activities and services to please the customers and make them feel that it is worth choosing Good Hotel.
  • Good Hotel should focus on developing their green programs and their energy-saving activities in order to reach LEED certification
  • Create a membership system that allows customers to accumulate points in exchange for special gifts, services, or a discount.
  • Use effective marketing as a tool to alternate solution to increase occupancy rate within a targeted budgeting.
  • Advance and update the hotel’s website to attract more customers because most customers plan their trip using internet.
  • Employ other low-cost method of marketing


Adebola Oyinloye

California Miramar University


Strategic Management: Planning for Domestic & Global Competition. 13th ed.

by John Pearce & Richard Robinson. McGraw-Hill Irwin. 2013

ISBN:  978-0078029295

Paige Baltzan M: Information Systems. 3rd ed. McGraw-Hill 2015

ISBN:  978-0073376912

Schroeder, R. G., & Goldstein, S. M. (2018). Operations management in the supply chain: Decisions and cases. New York: McGraw-Hill Education.

Operational strategy and business strategy. (n.d.). Retrieved from


Time On Site

Time On Site


We often delude ourselves into believing we have control over the use of our mobile technologies


What you do not realize is, behind the screen, there are over a thousand Engineers and Developers whose jobs is to keep you addicted to that screen


It’s called Time On Site


Time On Site is the currency with which the performance of web and application Platforms – mobile app, app, websites etc are being rated on. It measures how long a visitor stays on the user interface of the site, which further translates into how successful that site interests and involves you, and every other user.


Web platforms don’t just want you to cursorily browse through their sites, they want you to spend a great amount of your time resources, not just once, but repeatedly.


So, think YouTube, Facebook, Google, Instagram, Snapchat & Twitter.


These Tech companies most likely have a Chief Psychology Officer or some social scientists, whose job is to tell Engineers and Developers how to build persuasive algorithms into these platforms. Persuasive algorithms that can alter your habit and behavior.


The more you stay glued to a site, the more successful the platform provider is expected to be, in terms of campaign and site visitation to the site. Web analytics calculate this ToS almost accurately.


Web analytics do not calculate the period you have a page open but dozed off on your seat. Neither does it consider the time you are downloading a movie file or reading a site content


Time on Site record all requests and engagement on the site.


You think you’re in control?

Someone somewhere is making a decision that will affect your life.


You think you can get rid of your habits?

There are people more intelligent behind the screen whose job is to keep you persuaded and distracted


Have you noticed on your Facebook mobile app, that when you click the back button to exit the app – believing you’re done gossiping on family & friends’ pictures and timeline stories – the app doesn’t close, but instead scrolls up to display timelines of other friends you may have missed?


Have you noticed that when you’re done watching an episode on Netflix, the next episode shows in a small box and a timer starts to count down – persuading you to stay on watching?

Or a new related movie is suggested, based on your movie choice?


Think about how YouTube automatically plays the next music video – trying to persuade you to stay on the app.


Think about all the notifications from Twitter, Netflix and Snapchat, you wake up to see on your mobile device, in the morning.


These social platforms wake you up in the morning, to divide your daily time resource into time slots, each taking a block of your time, away.


Don’t you just love it when these Platforms do exactly what you desire or do things on your behalf that you didn’t even think of?

Yup! Those are deliberate designs and persuasive algorithms built into our technologies

#TimeOnSite is all #Hammjustsaying

The Characteristics of an Agile MIS Infrastructure – Adebola Oyinloye

Agile MIS Infrastructure is the combination of an organization’s hardware, software and telecommunication equipment, all working together as a system to support the goals of that organization. The system must be scalable such that, if an organization demand for resources grow by a percentage, the existing infrastructure must be able to handle the percentage growth without having any adverse effect on the functionality of the company’s operation.

The following are characteristics of an Agile MIS Infrastructure that can ensure a system meet and perform under any unexpected or unplanned changes

  1. Accessibility – The operation of the system must be easily accessible at any time without restriction by all users of the system, according to their authorization or access level.
  2. Availability – In today’s world where Ebusiness mean the operation of a system must be 24/7/365, availability means the period within which the system must be operational. When the system is unavailable, then it cannot be used. A system that is tagged High Availability, like the type used by Internet Service Providers, mean the system is continuously operational at all times
  3. Maintainability – The system must be flexible enough to meet all types of company changes and business changes, without a complete system failure. For example, some businesses fail to plan for global customers. Soon as the first order comes from a global customer, it may cause a business process issue. Systems must be built with flexibility to meet business change.
  4. Portability – This is the ability of an application to operate on any device or software platforms. These days, applications are built to run on any device like PC, mobile phones and tablets. They are also able to run on operating systems like Windows, Mac or Linux.
  5. Reliability – This is the ability for a system to function accurately and provide reliable information to the users.
  6. Scalability – This describes how well a system can scale up or adapt to growing demands. If a company grows fast, it may find it difficult to function properly if it has to rely on limited resources from an existing system. For example, a SOHO router built for 50 users will have operational difficulty, and may eventually break down, if users on the network increases to 100.
  7. Usability – This describes the user friendliness of a system. The system must be easy to use while also being efficient. Windows Operating Systems are always perceived to be more user friendly than Apple Mac’s IOS




  1. Paige Baiztan. (2016). Business Driven Information Systems: Fifth Edition. New York NY. 10121 McGraw-Hill Education

HOW NETFLIX DISRUPTED THE VIDEO INDUSTRY Through Organizational Development (Research Paper)


This paper is a research on how Netflix went through organizational development from a DVD post-to-mail rental business back in 1997 to an online video streaming platform, during a period when Blockbuster was the biggest DVD rental business and very little people in America had access to DVD players. The research also explores the role Netflix played in changing the entire video streaming industry. This study utilized various articles and opinion piece from select experts within the industry and video streaming users of various platforms other than Netflix.

Today, Netflix is a foremost Worldwide Online Streaming, Video and TV Production business.

According to Statista, video streaming online is one of the most widely used internet activities in the world. As at 2015, internet video viewers surpassed 200 million in the United States where most users viewed funny videos, movie trailers and music videos. And with the inclusion of mobile devices like smartphones and tablets, video streaming over the internet is set to consume about 1.46 million TB per month with mobile device users reaching 137 million in 2019, in the United States alone.

“More than a few video-on-demand companies have made their name in the area of paid streaming content, with Netflix being the most widely known example” having a 37 percent of peak period downstream traffic. Netflix made revenue of $5.5 billion, in 2014. (Statista, 2016)

Netflix Inc, is an entertainment company which was founded 1997 in California by Reed Hastings and Marc Randolph. It began by shipping DVD via US mail to customers who will watch it and mail the disc back. However, Netflix had two major challenges that it faced as a startup that would operate in an already established industry.

First, only 2% of the United States household had DVD players in their homes and secondly, there was Blockbuster, a provider of VHS home movie and video games that run video rental shops across the US, which was the “undeniable video rental leader, having over 2,800 stores in the US (Phillips, Ferdman 2013) and eventually 8,000 worldwide with about 60,000 employees”.

This research explores the external environmental pressure for change at Netflix which with a handful startup of 30 employees, was able to take on a big organization such as Blockbuster. It will also explain the following key organizational development process that made Netflix a success: The difference between Netflix organizational model and its other competitors – The organizational strategy used at Netflix for its development, how the use of technology revolution was responsible for Netflix success and how Netflix present structure with its disruptive innovation is sustaining change within the organization.


Netflix Organizational Structure and Strategy

October 19 1985, the founder of Blockbuster, David Cook opened the first store in Dallas, Texas. Cook had a creative background experience in the management of large databases, so after opening a few stores, he built a $6 million warehouse that could serve as a logistic center to many stores in one day. Then he came up with a strategy that allows him to customize each store according to the neighborhood in which the store is opened, stocking up the store with movies that fit the demographic profile of people who live in that neighborhood. Using this organizational model, at its prime in 2004, Blockbuster opened about 8,000 store nationwide. This business strategy included having customers to pay a large flat fee of about $65 to offer unlimited movie rentals for the lifetime of the membership. Blockbuster would charge customer, a first day rental of $2.99 for new released movies and $1.99 for older movies. A late fee charge of 99 cents per day for up to 10 days was also applied, capping fees at $10 (Laura 2010). “In 2000, Blockbuster had collected an approximately $800 million in late, representing 16% of its revenue”, AP published in 2010. Blockbuster business model and strategy was so successful that it started acquiring many other businesses to expand.

The most defining moment for Blockbuster was however when customer Reed Hasting was charged $40 on late fee for the return of a VHS movie, Apollo 13, in 1997 (Harress, 2013). Hasting, out of anger on the high cost of fee, started up Netflix. In view of the Blockbuster organizational model, Netflix understood it could not immediately match the capacity of Blockbuster multi stores structure, so it remodeled the Blockbuster’s organizational structure. The concept of Netflix started in the early days of DVD where only about 2% of the US households had DVD players. But Netflix saw that if the market grew to about 20% of the households, it will become a successful company.

The key to its strategy was that few movie stores had DVD for rent. So, Netflix leveraged on the light weight of the discs by shipping DVDs directly to people’s home at an affordable rate – VHS was heavy. People did not have to leave their homes to rent and watch videos. This also saved Netflix the huge capital cost of setting up video stores across the US. Netflix also offered DVD rental for $4, plus $2 shipping for a seven-day period and it did away with late fee policy. Multiple options were offered the customers. Disc could be kept longer for additional fee, new movies on DVD copies were sold at 30% discount and customers could decide to buy the copy, at a favorable cost, if they did not want to return the DVD copy. In addition to these, Netflix was one of the first few companies to rent DVD by mail.


Netflix Technology Innovation to sustain Development and Change

First, the pricing model. Hastings was a tech entrepreneur with a Masters in Computer Science from the Stanford University. Within two years after startup, Hastings leveraged on technology innovations at the time, the internet, to create a pricing model of – using the service for as long as you want, for a fixed monthly fee. Customers could now also browse a large collections of movie titles online and receive in their mailboxes. In addition, because of the low-cost production of the DVD and the compactness, Netflix could eventually do away with the late payment policy.

Netflix also tapped on another technology trend – streaming. Broadband internet and WiFi service was on the rise. Portable mobile devices were getting cheaper and widely in use. By 2007, Netflix launched a service to stream video contents directly to user’s portable devices and home TVs. Netflix bet heavily on the use of technology to drive its business that it kept on spending to entice customers to its website, on the assumption that it would become more profitable after the brand has established itself better. Netflix used technology to develop an extensive custom-made video-recommendation system based on customer’s reviews. This made it easier for customers to pick a very good movie without having to, first, view it. In 2003, Netflix crossed the 1 million subscriber mark, opening additional 5 shipping centers. By 2005, it was shipping 1 million DVDs by mail every day with over 35,000 titles to choose from its web services.

Sustaining Development through Vision and Internal Change Drivers

Netflix Vision and Mission statement states that “Our core strategy is to grow our streaming subscription business domestically and globally. We are continuously improving the customer experience, with a focus on expanding our content, enhancing our user interface and extending our streaming services to even more interconnected devices”. This was a clear vision statement from the CEO, Reed Hastings for the future of Netflix

Netflix continued to innovate and sustain its development. It started to develop its own content called Netflix Originals. These were contents that are distributed exclusively on their services. A success story of the use of technology to create content is “House of Cards”.

House of Cards is a show that was created from data-driven programming. Netflix with 27 million subscribers in the US and 33 million worldwide, collected data – like when you pause, rewind, fast forward, reviews, ratings; from its customers to create a bespoke show. With this strategy, Netflix was able to connect more with its customers and further increase customer’s satisfaction. Many industry experts believe Netflix has affected the way audience watch TV content. Neil Hunt, Netflix CPO, believes that Netflix strategy has created a model on how television will be viewed in 2025, that is, watching shows and TV content at their own pace. People will no longer be forced into a 30 or 60-minute slot once a week.

In conclusion, Netflix was able to remodel Blockbuster’s organizational structure by taking advantage of the many flaws from its big size and multi stores model, using disruptive technology innovations and continuous technology improvement to sustain its development and self-changing strategy by linking selection to objectives and measuring progress, as it grows. Blockbuster, on the other side, failed to adapt and change.

Finally, Netflix understood that making timely modifications in the light of experience will normally be more effective than attempting not to deviate from plan (Palmer, Dunford and Buchanan (2016). Netflix did a lot of fine-tuning as it expands its business, “building the plane as it flies”. By 2011, Netflix had become an American success story for an organization with well-paid, well-managed employees and happy customers. It had overtaken a big competitor using technology, or as Harvard Business Review called it “big bang disruption.” Netflix shares hit $299 a share in 2011 from a 2003 $22 per share, becoming the first platform one will think of, when it comes to Online Video Streaming.


Oyinloye Adebola

California Miramar University




Pouge, David. (January 25, 2007). “A Stream of Movies, Sort of Free”. The New York Times

Stellar, Brian. (October 21, 2013). “Netflix hits Milestone and Raises Its Sights”. The New York Times.

BBC News. (December 2013). “Blockbuster to close more stores as 427 more jobs to go”.

Wired. (May 2014). “What Television will look like in 2025, according to Netflix”. .

Staistics Portal. (January 2016). “Statistics and Facts about online video usage”.

Laura Heller (Mar 3rd, 2010). “Late fees are back at Blockbuster; goodluck with that”. AOL Finance

Associated Press (September 2010). “Blockbuster tries to rewrite script in bankruptcy”

Paul Holland (June 2015). “The netflix startup story”. Venture Beat.

Palmer, I., Dunford, R., Buchanan, D.A. (2016). “Managing Organizational Change”: A Multiple Perspectives Approach. New York NY. McGraw-Hill Education

David Carr (Feburary 2013). “Giving Viewers What They Want”. NY Times.



Case Study: Mount Cedar Technologies Inc.

2016-06-17 15.30.36

Introduction to Mount Cedar Tech Inc

Mount Cedar Technologies, which began as an importer and distributor of computer accessories but later grew into an IT infrastructure integrator that specializes in hardware, software and security solutions, from an employee of 6 to 170 in 2006, is having an organizational behavior challenge. The company lacked an organization structure that can help improve on its operations’ effectiveness. Even though the decision making was highly decentralized, there was no cooperation among the managers therefore, each department were making independent decisions, without coordination or communication.


Mount Cedar Technologies Vision

In trying to analyze and provide suggestions that can improve or enhance Mount Cedar Technologies’ organizational challenge, we need to find out what the company’s vision is. According to Neil Kokemuller (2017), A mission and vison are standard and critical elements of a company’s organization strategy. Most established companies develop organizational vision statements which serves as foundational guides in the company’s objectives. The case study has not mentioned any mission or vision statement for the company, and this is an underlying factor in shaping an organizational culture. Where mission relates to goals and refers to the overriding purpose of the organization, Vision refers to the desired future state of the organization” (Johnson et al., 2011 p.8).

Hans Hinterhuber and Wolfgang Popp (1992, p.106) defines vision as “an orientation point that guides a company’s movement in a specific direction. If the vision is realistic and appeals both to the emotions and intelligence of employees, it can integrate and direct a company”.


Assessing the Leadership Style

Even though John Curtis, the CEO, has been instrumental to the growth of the business, his present leadership style had become problematic to many including the top management. He surprised people by showing uninvited to meetings and employees are expected to provide impromptu responses to unprepared questions thrown at them. Since Curtis has been perceived as being an issue, he cannot be recommended as a change leader. So, Mount Cedar Tech. need to restructure its organization, and what the company need is a distributed leadership which could be used to effect an organizational change. Research has also shown how change is driven by large number of organizational members, in an approach that is called “leadership constellations” (p. 17)


Creating an Organizational Structure that Promotes Creativity

The case study identified that the company lacked an organization structure that can help improve on its operations’ effectiveness. And one way to achieve this to create an organizational structure that promotes creativity. According to “Making Innovation Structures Work”, a McKinsey Global Survey results, Executive say their companies use multiple organizational approach to drive innovation and that the success of these efforts depends on integrated strategy.

While 86% say the structure of their separate functions positively influences outcomes, results however suggested that the most important factor of success is how creativity is integrated into corporate strategy. Therefore, some of the general characteristics of organizational innovation Mount Cedar Tech. can put in place to promote creativity, are

  • Allowing everybody understand that they are capable of generating creative ideas
  • Organizational culture that can smother creativity
  • If any one comes up with a great idea, let them understand – ‘no need to tell, just show it’


Improving Mount Cedar Tech. using Communication and Employee Empowerment

At Mount Cedar Technologies, decision making was highly decentralized which resulted in the loss of possible gains to be obtained from cooperation among managers. Ideally, having a flat structure and decentralized decision making should make an organization work more efficiently, and allow it to react quickly to business situation, however, if there is no coordination or proper communication, there will be a resulting silo effect in which each department will make decisions by itself.

Research has shown that effective lateral and work group communication leads to an improvement in overall company performance. Here are a few ways organization communication can increase decision making effectiveness and a productive organizational behavior

  • When information is not transferred correctly to the right people, there might be miscommunication as seen at Mount Cedar Tech. it is important to have a good communication system, so that everyone understands the goal and can work together towards it. E.g. to launch a new product on Facebook, new goals and tasks should be properly communicated to the employees
  • Effective communication can also empower employees and improve productivity if they have more information, about specific tasks. Mount Cedar Tech employees where not empowered and were not encouraged to risk taking. In fact, department managers acknowledged that they were busy reacting to problems and customer issues, allowing them no time to coordinate or listen to their employees. This is because managers don’t have information about how to deal with specific tasks.
  • Communication also creates healthy and productive cultures in an organization. If employees and managers have good working relationships with each other, the organizational behavior of the company improves.
  • Effective organizational communication also increases accountability. When employees and managers are provided with clear instructions, they know what is expected from each of them. This will break silo effect in an organization, and managers can work together in tandem with the organization mission and vision.


Addressing Diversity and Minority

Christensen and Cornelissen (2011, pp. 402-3) argue that organizations have to work with many voices, with different views and ideas, so that communication can be ambiguous and inconsistent for this reason of accommodating diversity in an organization: “vague and equivocal language allows organizations to talk about themselves in ways that integrate a variety of members and stakeholders without alienating anyone”. This is key to Mount Cedar Tech. as it was also lagging in the advancement of women and minorities.


Organizational Motivation and Reward

Finally, it is important to keep employees motivated and rewarded. Mount Cedar Tech, experienced complaints from employees who did not feel equitable treated, which resulted in the loss of talented employees. According to Lipman (2013) here are 5 easy ways (which are self-explanatory) to motivate employees

  • Align individual economic interests with company performance
  • Take a genuine interest in the future path of an employee’s career
  • Take a genuine interest in their work-life balance
  • Listen
  • Do unto others as you would have done unto you


Mount Cedar Technologies Inc.

Designing A High-Performance Organization


Adebola Oyinloye

California Miramar University




Palmer, I., Dunford, R., Buchanan, D.A. (2016). “Managing Organizational Change”: A Multiple Perspectives Approach. New York NY. McGraw-Hill Education

Neil Kokemuller (2017). “Importance of Mission Vision in Organizational Strategy”

McKinsey & Company (September 2012). Making Innovation Structures work: Mckinsey Global Survey results.

Pavel Aramyan (Octoboer, 2015). 5 ways workplace communication effectiveness can increase productivity.

Victor Lipman (March, 2013). 5 Easy Ways to Motivate and and Demotivate Employees. Forbes.


Organizational Change: External Environment Alerts and Internal Pressures to Change

Business organizations are not protected from external environment threats, neither have they been able to successfully create an infallible system to guard against internal organizational pressures when the need for unintended Organizational Change arises.


Change managers, who are either the CEOs of a company or Project Managers are often part of the organizational process to help an organization do things differently or achieve a specific goal, and when external environment is the reason for change within an organization, they are on ground to identify these potential problems.

Here are a few Potential Threats from External Environment Influence that can force an organization to change its structure

  • Economic or political factors that influences External environment cause for organization change are often the most complex issues to address, as it affects the entire socio-environment in which the organization exist.

The 2015 Nigerian economic collapse into a ‘forced recession’ as a result of the transition from One political party to another, is a strong indication why organization must be adaptable, as consumers tighten their belt during such crisis, causing a demand-supply flow issue. Companies that were ill-prepared have since closed-shop

  • Competition with other business organizations are a common threat which any Change Manager can easily identify and should, somewhat, always be prepared for; For example, if the competition releases a range of new product; this can threaten market share and may result to hiring and firing


  • Other external environment factors include Technology, which is a constant evolving threat and often shapes how an organization is restructured, in terms of using technology to deliver quality service or its effect on organization staffing – employee lay-offs, recruitment or job description change.


  • And Globalization, which is a new entrant. This often related to business organization aspiration for global expansion and the need to capture new market.


In contrast, Organizations do often assume they have complete control over most internal environment factors that may effect change, because organization owns its people, culture, process and structure. However, one of its biggest pressure for change is Growth.

Organizations are expected to grow over the years as a sign of success (Dylan 2004). However, growth or lack of growth can both create some sort of complexity that pressures for change in an organization. And this change could lead to Organizational Restructuring (either employee down-sizing where growth is stalled or new recruitments, where its growing).

Introduction of a new CEO or a functional manager and internal power grabs and politics between stakeholder interests and decision makers are also internal environment pressures, that can call for change in organization

For instance, the introduction of a New CEO “can significantly impact business strategy and corporate culture”

In my opinion, since both external and internal environment factors are both influential to any organizational change process, the external factors are most impactful.

Most organizations are started out of the vision and goals of its sponsors and stakeholders, which often comes with a change process as contained in the organizational internal process, to address most expected threats that may arise.

However, the effect of external environment factors is highly unpredictable to an organization. For example, the political transition to President Mohammed Buhari in 2015, and his subsequent economic fumble have triggered a lot of instability across most business organizations in all sectors in Nigeria, forcing many businesses to close, downsize or restructure


Class Presentation by Adebola Oyinloye, Jan 2016

Organizational Development and Change Class



October 23, 2016

I thought to make my household a tech-savvy environment, with the intent to expose my kids, early in life, to technology use. I made it a point to buy them a tablet on their 5th birthdays – the older got separate ones while the younger, shares with a parent.

These days, children are known to always show this pure inquisitive interest toward any portable gadget within their reach, right from an early age, and I naturally do not want a situation where my kids mistakenly mess around with my working tools; or put simply – damage them.

So I bought my boy a tablet on his 5th recently. Many months after, this picture popped up on my spare phone – which doubles as a “guardian tablet” to my kids’ devices. LOL!



You can’t imagine what children do behind you. And oh yes! I have since learnt some lessons. This’ my spare phone monitors most of their activities online, aside the parental control I have implemented on both the Wi-Fi access router and their individual devices

Kids don’t require much help to navigate around a device. They know where the download app is and what favorite games or any other useful app to download. I guess the familiarity comes by instinct or while sharing with their parents.

I remember getting my daughter, hers. A couple of months later, I coincidentally came across her tablet and interestingly decided to go through it. As I flipped the numerous apps she had downloaded, mostly “Barbie” related stuff, a favorite for early aged girls; I noticed some disturbing Naked Barbie apps which alarmed me and raised my curiosity!


Child protection have always been a lifelong humanity concern, hence the reason why it is not surprising the Child Online Protection Act was passed into law in 1998 in the United States for the protection of minor on the internet. The COPA required that all commercial distributors of material considered harmful to children should restrict their sites from access by minors. In 2010, the Nigeria Communications Commission followed suit by organizing a stakeholder forum to develop a framework on Child Online Protection with particular emphasis on the Information, Communication and Technology industry. This was being championed by the Ex First Lady, Mrs. Patience Jonathan.

But how effective are these regulations in the protection of a minor from the dangers of the internet? According to online resources, “Material harmful to minors” was defined as content that by “contemporary community standards” was judged to appeal to the “immodest interest” and that showed sexual acts or nudity (including female breasts).

As with all creations in life, the internet is a very valuable tool that provides as much good information as harmful ones. The protection of minors on the internet requires a multi-level approach to implementing the needed security. Inasmuch as there are current child online protection laws or in the case of Nigeria which still has its bill as a work in progress; the need to properly protect a child starts from the child’s immediate environ. Just the way a child can wander in life without proper parental guidance is the same way a child can ramble into a world of obscenity on the internet without proper parental or content control.

It is estimated in 2003 that 20% of all pornography traded over the internet was child pornography, which have since increased by 1500%. The US Department of Justice states that “at any one time there are estimated to be more than one million pornographic images of children on the internet, with 200 new images posted daily.” Child pornography on the internet is becoming more brutal and graphic, and about 80% of the children in the abusive images are female under the age of 12!

To further drive home my point; statistics from survey shows that 90% of children that have access to the internet make use of the internet and 60% of these children communicate in chat rooms. About 80% of children with access to internet freely share personal information about themselves and family members, and there is a high probability that a small percentage of these kids can be targeted by pedophile or other undesirable visitors. We should also not forget cyber-bullying, online gaming and other addictions.

What a lot of parents don’t know is there is a wide gap between what parent think and what children know. When parents say they have rulebooks and do monitor their kids, a percentage of these kids do confess to that fact that their parents have no idea! In the UK, according to online source, 60% of children between 9 – 16 year olds say they have seen online pornography. If one checks, these patterns are consistent to most countries across the world, Nigeria not excluded.

As the increase in the internet penetration grows in Nigeria, there will also be an increase in its home use. The internet has brought a lot of untold benefits to people around the world and it will not be uncommon to have Nigerian families embrace it as it gets more affordable, just as it is the case in advance climes. But while the good of the internet is not in denial, it has also raised disturbing issues every parent should be anxious about, and so, the need to be able to identify technological or other methods that will help reduce access by children to material that is harmful to minors on the internet.

The first step in protecting children online is the necessity for parents to be aware of the kind of dangers lurking on the internet. Next is to have internet access points with parental and content control capabilities. This should however be properly configured by the parents or a consultant, if need be. There are so many online materials that can assist in these configurations.

In addition to the steps above, I ensured, in the case of my children, that the home internet access point provides internet connectivity to her device only when either of the parents can monitor and at all time during weekends.

Child online protection starts at home.

Ade of Nigeria is an IT Consultant

Samsung Galaxy Note 7: The Smartest Smartphone Unveiled

The South Korea Technological Giant, Samsung Electronics, has released what it consider, its most Intelligent Smart Phone ever – the New Galaxy Note 7.

For gadgets lover like me, this is one of the most exciting news that can make you shoot off in all directions, looking classy this summer.

Yeah – you know that casual, “drop the phone on the table” during a meeting with other business partners, or “lets take a selfie” at a party, with your cool friends, feel? No one can burn you for it. You are who you are. Why? Because this phone, with its expected heavy price tag, is Impressively BOLD!




The Galaxy Note 7 features the same high end, first class material and a distinctive symmetrical edge design, with a finish, better than any of Samsung previous phones. It has a 12 megapixel and a 5 megapixel front camera. And for the very first time in any smartphone, the new HDR recording.

Think of it, High Dynamic Range imaging is the contemporary standard for TV picture quality. Very expensive and limited. Samsung had to partner with Amazon Prime streaming service, for content and quality HDR video streams.

The phone will also be available in more colors than before – Blue, Black, Yellow, Silver and Gold.

Enter the Game Changer: Iris Scanner

According to the Guardian, the Note 7 “biggest selling feature is a new biometric option in the form of an infrared iris scanner that takes just seconds to set up and unlock the phone with a glance of either eye.”

The scanner detect patterns in your iris. Just pointing it at your eyes will unlock the phone, and it does so really fast. But you must first be registered to the device.

This is an extra layer of security, even though the fingerprint scanner under the home button, still remains.

The Galaxy Note 7 is expected to hit the Nigeria market by September 2016

You can visit the Samsung Newsroom for more details on the Galaxy Note 7 features.


By Ade Oyinloye @hammdriller

Why is my Internet so slow?


“My Internet speed is very slow!” This is a common phrase that is used by many Internet subscribers in Nigeria today to express concern and dissatisfaction with their Internet service.

If statistics are right, about 70% of subscribers in Nigeria have a deplorable ‘web browsing’ experience and mostly feel short-changed by their Service Providers. While many of them have lost complete hope with the assumption that Internet browsing experience is put up to be slow in a developing country like ours, those with more financial means end up having about 2 to 3 Internet modems from different ISPs just to fulfill their expected experience. Some corporate organizations even go as far as providing its key staff a modem each!

When a potential subscriber goes to purchase data package from a service provider, one of his assumed most important question is; “is your Internet speed faster than my former ISP’s?” Unfortunately, this kind of question is self-destructive and will pose challenges in the provision of that quality Internet.

Instead of jumping ship or asking the wrong questions, here are a few tips to consider with Internet speed and eventually having a good web browsing experience

Internet Need

Most Internet subscribers feel that once they have purchase any Internet package, they have unlimited access to all the delightful things the Internet can offer. This is a very common wrong assumption. There are so many cases where corporate organizations purchase dongle type connection or the likes, which are generally designed for single and mobile users, to serve as Internet access for the entire office operation. To subscribe, one should first identify the need for the Internet access and discuss this need with an ISP so the provider can assist you choose your bandwidth plan.

Understand Your Bandwidth Plan (Internet is not yet cheap)

Because of the dearth of last-mile Internet infrastructure, Internet subscription in Nigeria is still one of the highest for a fast developing nation like ours. So you may think you are paying a lot, whereas, your Internet is slow because you are paying for slow Internet connection. Inasmuch as service providers may play ‘sales with words’, you need to understand that there is a BIG difference in; “speed up to 1Mb” and “1MB dedicated bandwidth.” If in doubt, check your bandwidth agreement plan for your subscription and then run an online speed test (there are so many free online speed test tools). If the numbers match up to what you are paying for, then your Internet is working just fine. You are definitely paying for slow Internet connection. An upgrade is the best way to speed it up.

Troubleshoot your LAN or Device

And just before you go running your ISP down, have you checked your router or Local Area Network? A quick reset on your router sometimes will do the trick. If there are multiple devices on your network and the Internet problem only happens on one device, the problem is that device, not your router or ISP. Sometimes your subscription may have been designed for just one personal computer, but you have added other mobile devices (phone, tablet, etc) all with background downloads. This will definitely make you experience a slow connection.

If it is the LAN, you may have to check the router configuration. Cheap routers are notorious for losing configuration information caused by power fluctuation. You might also have spyware/malware infecting your devices and secretly using your Internet bandwidth. What about that employee using social media or ‘skyping’ a friend or watching online movies during office hours with company resources?

ISP Coverage or WiFi Coverage

Because of the capital cost in building Internet infrastructure and guaranteeing full coverage, ISPs don’t necessarily have blanket coverage over areas that are deemed not viable. Just because a service provider is providing quality service at your office in Lekki does not mean you can get the same level of service at your home in Akute. You need to check coverage areas with your choice ISP.

What about that WiFi system installed at your premises that make your work area look very tidy with little or no cables showing? Your Internet and router may be fine but your WiFi signal is weak. You may need to relocate, boost the signal or tweak it. You need to also be aware that your microwave oven and radio devices can degrade your WiFi Internet signal.

Bandwidth Consuming Plugins and Apps

From monitoring reports, statistics have it that when a LAN is working in order and the Internet speed is cross-checked yet you have slow speed, there are most likely other programs hogging the connection and BitTorrents are usually the culprit. If you are downloading files or movies with BitTorrent, normal web browsing is going to be slower. In addition, most Windows PCs come with automatic update ON. When download occur in the background and we are unaware as it leeches on our bandwidth, we tend to complain about poor Internet service. Simply identify these applications and turn them OFF.

Confirm your DNS Server

DNS servers are used to resolve domain names with IP addresses, such that, computers can understand our web request. They are usually provided by the ISPs but there are also some public DNSs available. If your DNS setting is outdated or wrong, Internet traffic will be directed to the wrong addresses on your ISP network causing intermittent browsing performance.

There was a large firm that have had to change 3 good service providers due to slow or inconsistence Internet browsing experience without realizing that the firm’s DNS server was broken! It took the intervention of the 4th ISP and its troubleshooting experience to detect and solve the client’s local issues.


These are just some of the many possibilities why your Internet is slow. If you keep experiencing slow connections, speak to a reliable ISP who has got the experience, technical support and a good customer service, in your neighborhood.