Category Archives: Uncategorized

CREDIT CHECK AND IDENTITY MANAGEMENT SYSTEM: THE CONSUMER REPORTING AGENCY IN NIGERIA

Abstract

Nigeria remains one of the most challenging environments for any entrepreneur to start up a business and thrive. The country is also a very difficult place to have a formal business-inclined relationship across the spectrum of associations between people – customer to customer, business to customers and to a large extent, business to business, despite the presence of a legal system that can intervene in the event of a contractual breakdown, and this causality is as a result of the absence of trust in the society. This paper is being written to identify the multiple systems the Nigerian Government presently use in establishing a citizen’s identity. To provide an analysis of these systems, including but not necessarily limited to – their strengths, weaknesses; To look for the opportunity to create a possible alternative system or initiate a better process that provides the necessary increase in accuracy and efficiency that can be achieved,using our approach. The paper identifies the fundamental cause of these challenges, after critical analysis, and profers an improvising solution that can work effectively within the Nigeria environment.

 

 

 

Introduction

When Ebay was founded in 1995, it started as an online marketplace for buying and selling personal items in a very rudiment way by today’s standards – with no guarantee, no payment platform, no fee or 3rd party interaction. Critics thought it was a foolish idea, and expected a scenario where a seller will ship a bad item and the buyer in return, mail a bounced check.

eBay outgrew Pierre Omidyar, the CEO’s, personal account within 5 months and had to be moved to a business account. Buyers and sellers who became members of the online communinity were charged a small fee to participate on the platform. eBay continued to grow by leaps and bounds and “Omidyar in an interview told the New York Times that he had so many checks piling up at his door, he had to hire an assistance to open them all” (Wells, 2018). Pierre Omidyar is now worth roughly $11 billion.

Societies become more wealthy as the level of trust and cooperation between members of that environment increases. Ebay was able to grow in leaps and bounds because it was a business that was built based on trust, in an almost entirely trustworthy society.

But how was the United States able to develop the level of trust within its population? Over the years, societies in the western worlds, have been able to efficiently gather every single relevant information about an identity within its population. These information gathering are consistently cross-checked and updated, and even given score points, fundamentally to have accurate information about an individual and to be able to plan social welfare, but as a subset, to also ensure good behavior and citizenship.

An efficient information gathering on citizens is lacking in Nigeria and in effect, businesses are unable to flourish, thereby causing business-like citizen to citizen relationship to be grounded in so much distrust, dishonesty and bad faith.

Identity: Individual and Social Identity

 

For the vast history of man, humans lived in small groups of 50 that never grew past 150. Scientists believe that from a genetic stand point, we are only built to cooperate with as many people as we can know well. Everybody knew everyone. If you stole someone’s dinner, or did not defend the group against an enemy, everyone knew you and you will get punished.
“But when you start having strangers in the group, people you don’t know well, it means people can free ride and cheat in the group with impunity” (Azim, 2018). As societies start to expand in population, groups started experiencing cheaters within them, making the groups unable to self-sustain. The group needs a level of cooperation for it to act and work harmoniously, and this can only be achieved through the identification of people.

We often define ourselves internally with limited reference to others, and social identity is used to define a “person’s sense of who they are, based on their membership” (Tajfel, 1979) to that tribe or population.

“A person’s identity is defined as the totality of one’s self-construal, in which how one interprets oneself in the present expresses the continuity between how one interprets oneself as one was in the past and how one interprets oneself as one aspires to be in the future”; this lets us define some aspects of identity, for instance: “One’s ethnic identity is defined as that part of the totality of one’s self-interpretation made up of those dimensions that express the continuity between one’s understanding of past ancestry and one’s future aspirations in relation to ethnicity”.

“Group such as social class, family, football team or nation, which people belonged to were an important source of pride and self-esteem” (Tajfel, 1979).

There are many considerations that add toward the identity of an individual, and this can be classified in the following identity components:

  1. Socio-demographic characteristics– “Includes characteristics such as gender, age, ethnic group, household size, or employment status. It is based on the premise that demographic groups are relatively homogenous and lends itself easily to quantification, measurement and classification. Additionally, it is difficult to falsify unless a false identity is being used” (Dr. F, 2018).
  2. Benefit sought after– “The benefits desired from pursuing certain behaviour, including the underlying motivation. It focuses on common values and attitudes across cultural groups. It may be extremely difficult to observe and is not suitable to assess individual, rather than group, behavior” (Dr. F, 2018).
  3. Behaviour displayed – “In relation to the financial institution. That is, based on data resulting from actions of the account holders, such as the length of relationship with the bank, modes of payment and shopping preferences, product ownership, and contributions to political, religious, and charitable groups. An underlying assumption prevails that past or current behaviour offers the best predictor of future behaviour. It is very useful in anti-money laundering, but easy to falsify and often difficult to measure” (Dr. F, 2018).

 

The capacity to construct a profile for an identity using one or more of the above components, is how societies have been able to identify people, so as to create an enabling and a successful environment for them.

 

 

Data Collection and Identity Documents

In the United States, the US Passport document and the Social Securit ID can be legally used as national identification, however, the state-issued driver’s license or state-issued identity card, is what is mostly used as a means of identification, nationally.

There is nothing like the term official national identity card from a federal agency that is mandatory for all US citizens. The uniformity of driving in the United States makes the driver’s license, which is issued by each State, the unofficial national identity card.

“A driver’s license or the State ID card contains a wealth of private information. In addition to full name, date of birth, signature, and photograph, licenses and state ID cards typically bear one’s home address, color of the eye, gender, and height. Some states go beyond that, including natural hair color, weight, Social Security number, and fingerprints (the latter two being stored in the license or state ID’s barcode)” (Wong, 2014).

One point to note is that despite having federal jurisdiction, the social security card cannot verify an identity. They are essentially used to comply with Social Security payroll tax laws and to verify the match between the name of an identity and an assigned Social Security Number.

 

Secondary Identity Verification Documents

There are other secondary documents that can be used to establish the identity of a person, which are naturally unacceptable as a primary form of identification. However, they are also useful in obtaining a primary form of identification, when a primary documentation have been lost or stolen. “These other documents include:

  • The Internal identification card issued by one’s employer, university, or school
  • Voter’s registration card
  • Credit cards and debit cards
  • Proof of professional certification for members of regulated professions
  • Health insurance card issued by a private health insurance company, by Medicare, or by a government agency
  • Library cards
  • Membership or Loyalty cards issued by private companies such as, supermarkets, warehouse club stores, etc.
  • Utility bills, which are often used as proof of residence or address”.

Credit System

 Micro to Macro Impact of Credit on an Economy

From personal experiences, we have a general understanding of how credit works. We borrow money from the bank or other people, to purchase goods and services immediately, and then repay with interest at a later date. The immediate purchase could be, to buy a house, a car, or grocery shopping.

However, there are other agendas and different objectives which economic policymakers have, so as to create an impact on the broader economy.

“Instead of having to save for long time in order to obtain a big-ticket item like a house or a car, credit allows the borrower to have the item immediately, while using future earnings to make repayments over a period of time” (Butler, 2009). Economic policymakers understand that access to credit expands purchasing power, allowing people the ability to buy more things. The more transactions are conducted, the more the economy booms.

Economy policymakers understand that having easy credit access, is a main factor in growing economies. Unfortunately, 3rd world economies such as Nigeria, performs poorly in understanding and implementing such policies. According to the International Finance Corporation, which is the lending arm of the World Bank, “Lack of access to finance is a key constraint on the growth of small and medium enterprises in Sub-Saharan Africa, and thus also an important limitation on employment, economic growth and shared prosperity”.

 

 

 

 

In any case, for a society to credibly run a functioning credit system, there are two important subsystems that have to be reliably put in place – A credit bureau and a reliable system to background checks. From these two, any registered Consumer Reporting Agency can pull records and provide reliable information about an identity.

 

Credit Bureau

“Consumer credits are granted by banks, retailers and a variety of other lending institutions and this is a sector of the economy that has seen rapid growth over the last few decades”. Credit scoring, which is broadly applied in consumer lending, is a statistical approach that predicts the probability that a credit applicant will default or become delinquent. Credit analysis, which consists of the valuation of the financial history and financial statements of the applicant credit background, aims to evaluate the borrower’s probability of repayment, to determine the financial strength of the borrower, and to minimize the risk of non-payment to an acceptable level. Good borrowers with low credit risk would be granted a loan, while a high risk borrower would be denied” (Roszbach 2004)

“The procedure with which an applicant’s creditworthiness is being determined, was based on the 6 C’s namely Character, Capacity, Cash, Collateral, Conditions and Control” (Rose, 1993), which some experts find unreliable. However, this augmented demand for credit has since led to the innovative idea of a credit scoring system. The “credit scoring methods have produce more precise classifications in comparison with subjective judgmental assessments by loan officers” (Rosenberg et al. 1994). An advantage to this is that it makes credit scoring  more efficient, while also assisting lenders to review the borrowers’ creditworthiness more regularly.

“Credit scoring enhances and sometimes replaces the traditional subjective assessment, since it measures the credit risk of applicants much more accurately and quickly than the latter one. This method of measuring credit risk is mostly used in consumer loans, especially in credit cards but, nowadays, has become commonly used in mortgage lending and in complex business loans as well” (Roszbach 2004)

 

The United States has three major credit reporting agencies, and they are, Equifax, Experian and TransUnion. “They were set up to help keep track of consumer and corporate spending and repayment history, thereby protecting creditors.

Prior to this, a consumer could default on a financial obligation and simply shift over to obtain financing from an unsuspecting creditor who had no way to know that the consumer was a credit risk” (Rotter, 2018). In the case of Nigeria, for instance, the Asset Management Corporation of Nigeria, recently mentioned that about “350 Nigerians are responsible for more than 80 per cent of the $15bn debt portfolio of the company” (AMCON, 2015), out of 180 million people living in the country.

 

 

 

 

 

 

 

Ahmed Kuru, CEO AMCON, in an interview with the News Agency of Nigeria, disclosed that “the 350 Nigerians or their businesses, owe a whopping $12bn of the $15bn debt profile of the company, an amount which is over 50 per cent of the 2018 Budget of Nigeria”.

 

 

These 350 individuals have registered businesses and are able to accumulate this substantial debt profile, by seeking loans from one bank to the other using the same credentials, and defaulting on these loans.

Thankfully, the advent of internet which as further eased efficient data collection and error correction, has reduced the ability to defraud creditors

 

Background Check

“There are different types of background checks, that contain overlapping results. For instance, a criminal background check can reveal sex offender crimes, but there are also sex offender-only background checks (Criminalwatchdog, 2018).

Below is a list of the different kinds of background checks:

  • Arrests
  • Convictions of felonies and misdemeanors
  • Court records (dockets, judgements, etc.)
  • Warrants
  • Sex offenses
  • Incarceration records

Background checks from a county are self explanatory, containing records of arrests and convictions within that particular county. Whereas State background checks, vary. Some states have just a handful of county records on file, while other states have all county records in their databases” (Criminalwatchdog, 2018).

 

Employment Screening

Employment verification exercise is the most common type of background check carried by people and organizations, and these checks produce the following kind of information

Criminal history, Character references, Social security number verification, Education verification.

One point to however note is, pre-employment verification checks differ depending on the need of the employer and the type of job involved. If an employer is seeking to hire an account officer or a Chief Finance Officer, running a credit check is ideal. Whereas, a parent seeking the services of a nanny will most likely specifically look for sex offenses.

Tenant Screening

“Landlords use this exercise to screen potential tenants in order to make sure they are responsible. This background check review criminal records, credit reports, and contact past landlords for personal references” (Criminalwatchdog, 2018)

In Nigeria, there have been many cases where tenants are unable to fulfill their rental obligations. These free rent seekers are able to twist around laws that protect the tenant, enabling them stay rent free for a duration up to 6 months.

Childcare Background Checks

Extensive background checks is always required for childcare workers. The requirements for screening nannies or childcare workers vary, but most will require checks from:

  • State criminal records
  • State and federal fingerprint records
  • Child abuse and neglect list records
  • State and federal sex offender records

 

 

 

 

 

 

Consumer Reporting Agencies

Every credit report contain rich of information that lenders are able to use to assess applicant’s risk as a borrowers.

This information have details about their credit account, the type of account, the credit limit and account balance, and payment history, or collections that are in the account holder’s name.

“The information in this credit report comes directly from companies that have extended credit in the past. Credit card companies, banks, credit unions, retailers and mortgage lenders all report the details of the credit activity to the credit reporting agencies (CRAs)” (Equifax, 2014).

“CRAs also receive information from debt collectors, and they purchase public records, such as bankruptcies, from public record providers”. (Equifax 2014)

 

The Importance of Conducting Background Checks

The hiring of new employees can be a difficult experience. It is important to find the right candidate with the education and capacity to do the job. In an environment such as Nigeria, verifying claims are problematic, and many employers have found themselves in circumstances where they have hired incompetent employees that are discovered later to be unable to perform the task they were hired for.

“To be effective in hiring practices involves delving into the background of applicants to get a better idea of their abilities and employment performance. However, this has to be restrained with respect for the privacy of each individual candidate as well as being compliant with relevant laws” (TheAdvancedGroup, 2011).

Primarily, background checks are run to determine the accuracy of the information provided by an applicant. It also an opportunity to assist in creating a profile for the applicant beyond what can be discovered in a short encounter. For instance, a security officer position is not open to anybody with a criminal record.

 

 

Legal Issues with Background Checks

“Before a background check is initiated, proper evaluation for the purpose is important. Some activities of a background check may not be necessary. An organization can easily go overboard in a background check to err on the side of caution. Certain information such as medical and credit history require written consent from the applicant” (TheAdvancedGroup, 2011).

Employers have the right to know who they are hiring and background checks are legal. Technically, any information that comes up on a background check is usually public record. “Employers can therefore research this information and take it into account when making hiring decisions and most employers exercise this right. According to a survey conducted by CareerBuilder, 72% of employers conduct background checks on every new employee” (Klazema, 2018)

Background Check Laws and Limitations

It is vital to note that there are several laws that limit an employer’s ability to use background checks in making hostile decisions about hiring. Both employers and applicants should always check what information is legal about the background check that will be run.

The limitations that often apply to employment background checks:

FCRA Compliance

In United States, “the Fair Credit Recording Act (FCRA) is one of the most important documents that protects the legality of employment background checks. The FCRA documents does not prohibit employers from conducting background checks on applicants” (Klazema, 2018). Instead, it provides a process that employers must go through before and after checks are run on prospective employees.

“Before the check, an employer must follow a rigid set of rules to obtain a candidate’s written consent to the check and after the background check, if the employer wishes to make an adverse hiring decision based on the findings of the report (Klazema, 2018), it must first:

  1. Inform the candidate in writing about the decision,
  2. Provide a copy of the background check report that led to the decision
  3. The candidate must be given the details of the company that prepared the background check report
  4. Tell the candidate the background check company did not make the hiring decision, despite preparing the relevant report
  5. Inform the candidate that he or she can request an additional copy of the report from the background check company
  6. Inform the candidate of their right to contact the background check company and dispute the report’s accuracy” (Klazema, 2018)

 

 

Information Gathering and Identification In Nigeria

In Nigeria, the Bank Verification Number, which is widely known as the BVN is an identification system executed by the Central Bank of Nigeria to reduce illegitimate banking transactions in the country. “It is a modern security measure in line with the Central Bank of Nigeria Act 1958 to reduce fraud in the banking system”.

“BVN verification works by recording the fingerprints and facial photograph of the applicant. It uses a biometric technology to register customers in the financial system.  It records these unique physical features, such as the fingerprints and eye of an individual. A BVN is generated once a person’s biometrics have been recorded” (Punch, 2015). The mandate is to protect bank customers, reduce fraud and strengthen the Nigerian banking system.

The BVN have been a successful venture ecause of its Biometric enrolment technology, as it “is helpful to people who cannot read and write. Their finger prints and pictures would serve the same purpose as signatures” (Punch, 2015). Bank customers who have multiple account with different banks would be covered when they do a single registration in any of the banks where they have accounts.

“BVN was initiated to help the banking system reduce situations where loan defaulters, for instance, move from one bank to the other and the banks extend new credits to them, without knowing their history.  Banks would be able to track transactions across all banks in Nigeria with more ease” (Vanguard, 2015). The BVN project has captured no fewer than 31 million Nigerians, with its unique identifier number.

According to Dipo Fatokun, CBN Director, Banking and Payment System, “disclosed in a paper titled, `Nigeria’s progress towards the creation of a robust, trusted and inclusive Financial Services Environment’, that CBN had also linked a total of 43,959,282 banks accounts” (Vanguard, 2015).

The objectives include the following: “increase access, convenience, service levels across the industry; enable greater financial inclusion and integration of financial services into the economy, with its attendant positive impact on economic development’’ (Fatokun, 2015).

According to Fatokun, “the BVN has also helped to increase deterrent controls on financial transactions and reduce or mitigate fraud risk and identity theft. Most importantly, it has created avenues for people who cannot write regular signature to make financial transactions, thus, facilitating financial inclusion” (Vanguard 2018).

 

Drivers License

Everywhere in the world, because of the common use of vehicle licensing, the driver’s license remains a document which users get after a well defined process. “As an official document, it permits individuals to operate any motorized vehicles, such as motorcycle, car, truck or bus on public roads in accordance to the law of the country” (Odumade, 2018).

In Nigeria, “the first and most important purpose of driver’s license is to identify the owner as duly certified by the state to operate a motor vehicle. It is the first document a state enforcement officer will demand from a driver, without which a driver has no right to operate a vehicle on public roadway” (Odumade, 2018).

The Nigerian driver’s license serves as an official document which can be presented to open a bank account, when applying for government benefits and loans. “A current driver’s license is a universally accepted form of personal identification, because it displays contact information and picture of the holder. In the instance of accident or emergency, it has also been structured to provide vital information concerning contact details of the next of kin, blood group of driver, which sometimes determine treatment to be administered during casualty” (Odumade, 2018)

However,” many Nigerians try to circumvent the application process of securing driver’s license because of the cumbersomeness involved. They often engage in the services of middlemen who have knowledge about the system are contracted to fasts track the process. A document that is officially obtained for $20 for a three year license will be obtained unofficially for $60. This middleman arrangement is also facilitated by the corruption of many officials who have been compromised”  (Odumade, 2018). An additional consequence is, a different false identity can also be created.

 

Integrating Existing Identification Systems

The “National Identity Management Commission (NIMC) is a statutory Nigerian organization that operates the country’s national identity management systems. The NIMC Act No. 23 of 2007 established the commission to create, operate and manage Nigeria’s a national identity card database, integrate the existing identity database in government institutions, register individuals and legal residents, assign a unique national identification number and introduce general multi-purpose cards” (Nwezeh, 2010).

This project is an initiative to create a national identity database and to prevent both double identity and identity fraud by assigning a unique identifier number, just as done with the Social Security Number, in the United States.

Every citizen and legal resident of Nigeria are required to enrol for the National Identification Number (NIN).

The NIN is a unique set of numbers assigned to Nigerian citizens after their biometric records have been taken and the National Identity Database confirms that there is no previous entry of the same data. The NIN once issued to a person cannot be reissued, even if the number was previously assigned to a dead person.

The NIN references all records from other agencies such as Vehicle Licensing office, Tax ID, Passports, BVN, etc about a person in the database, harmonize the data and, used to check the identity verified.

Challenges Deploying the National Identification Number

One of the challenges facing the National Identity Management Commission is the  production of national identity cards for everyone who enrolled for it, despite the huge public clamour for it. According to the commission, “national identity cards that are ready are mainly for people who enrolled in 2012 and 2013, adopting a first-come, first-served approach”, the Director-General, NIMC, Aliyu Aziz. He also expressed concern in the huge cost being incurred in the identity management of different sectors in Nigeria.

Aziz said that the “duplication of efforts have led to uncoordinated identity approach, as well as unreliable identity information due to lack of interoperability and disconnected databases”.

He said NIMC was tasked with the responsibility to ensure absolute integrity and security of this information. He added that the linkages between agencies such as the birth and death agencies would be an advantage.

“The Identity Management System in Nigeria is rigged with many other challenges such as underfunding from the Nigerian Government; corruption; the inability to integrate identity systems from other government agencies – NIMC, NPC, INEC, FRSC, National Passport Office; and Incompetence from the NIMC administration and its inability to coordinate its processes along the framework of the agency” (Ibanga, 2017)

Developing Credit and Identity Check Solution

AO Incorporated has been looking at various opportunities for its organization to apply the IT and Software capabilities of the Company in some potential new markets and has decided to be registered as an authorized Consumer Reporting Agency in Nigeria. As part of its research on possible projects, developing a robust private driven credit and identity check system comes highly recommended, in such a way that it would help the Nigerian Government tackle some of its citizen’s identity crisis while also spurning economic growth.

In order to optimize the delivery of a cost effective, yet an efficient solution that provides value for users and the Nigerian environment as a whole, AO Inc will be limiting its identity check scope of service to the development and deployment of a bespoke solution that addresses specific background check services for

 

  • Nanny Solution: To conduct background checks on any household employee. AO Inc. will offer different levels of screening options and also provide the ability for additional secondary searches.

Nigeria has an expanding middle class, which mean many parents are having to work longer hours and at the same time, not having time for child care. Unfortunately, theft and abuse crimes are existing in the childcare world. No parent will want to endanger the life of their child. In Nigeria, when many families find a nanny they really like, they feel a background check is unnecessary. This is aside the fact that going about a background check is not a straightforward process and easily accessible.

To do a Nanny Background Check, the information will search for

Identity Confirmation – NIN number, Full name, Driver’s license

Criminal Records – 5 year non criminal activities, 5 year address history, sex offenses, court cases, misdemeanors

Reference Check – work history

Driving records – If any

 

  • Employee Verification Solution – To offer a comprehensive class of background screenings, including an abundance of checks designed specifically for most industry workers. In addition, AO Inc. will conduct deep criminal history searches and provide a wide variety of verifications, such as those for past education and employment. For example, CBC News of Canada reported that fraud in the workplace cost Canadian Businesses over $3.2 Billion in 2011

The employment verification solution will check for job competency. For many employers, a background check is a reliable way of verifying claims made by job seekers during the hiring process. With a tight employment market, the appeal of overstating educational qualifications or enhancing job histories, can grow.

The employment verification will also check that it has enough information to protect against workplace safety and theft. Employers know that most business theft today is performed by insiders. A background check can help employers to make intelligent and informed hiring decisions to help reduce their risk of theft.

  • Credit Check – To offer a solution that reveals credit history, including paying habits, judgments, liens, and bankruptcies for the individual. This information is useful in determining financial responsibility and money management for the applicant.
  • Tenant Screening Report – A service that runs a thorough search and screening process on a potential tenant, to help a landlord avoid future problems by detailing a history of past rental behavior and rental responsibility.

 

 

AO Inc. IDM Application Software Flow Charts

 

Chart 1 – AO Inc. IDM System

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Chart 2 – AO Inc. IDM Services

 

 

 

 

 

 

 

 

 

 

Chart 3 – Interaction between AO Inc. IDM and Integrated Identification Agencies in Nigeria to pull Identity

 

 

 

 

 

Project Management

 

 

 

 

 

Project Milestone

 

 

 

 

 

SOAR on Consumer Reporting Agency in Nigeria

This section will be focusing on a brief analysis of the business opportunities and strengths of running a consumer reporting agency such as which, AO Inc intend to engage in Nigeria. This SOAR analysis will be a useful approach for the strategic planning of the project.

AO Inc is looking at registering as a consumer reporting agency in Nigeria to be able to carry out various checks on an identity – from credit reporting to other forms of background checks.based on research and findings, there is only one existing company Background Check Internation https://www.bcilimited.com/about/, BCI, which as a first market mover, is already running similar services, and is also the only kind of organization presently registered in Nigeria offering such services.

The following AO Inc core organization strengths and assets are determined to be

  • A state of the art technology, covering applications and equipment, that we will be bringing from the United States
  • An excellent training program that will be designed specifically for new field operation personnels
  • A solid long term relationship with top key Nigeria Government officials who are willing to fast track licensing and other regulation requirements

Opportunities are already identified and that’s why AO Inc will be limiting its scope of services to areas of specific need to the average Nigerian – Employment verification, Tenant Screening, Credit reporting and Nanny Services. Based on research, it was found that the competitor, BCI, running similar services charge a steep cost to run its services. AO Inc will be bringing down the cost implication to a fraction lower, making it more affordable and covering a larger, marginalized customers within the market space.

Conclusion

This paper is written to look at the opportunities where AO Inc will be able to apply its IT and Software capabilities in some potential market. Nigeria as a business environment does not have a credible and or easily assessible Consumer Reporting Agencies that offer a robust private driven credit and identity check systems, in such a way that it would benefit the Nigerian Government and its people, and also help to tackle some of its citizen’s identity crisis.

A thriving and booming economy is one which has people having a high level of cooperation and trust. To develop trust and cooperation, individuals within that environment must be identifiable, and a system has to be designed to force them into having credible values and uprightness. Will AO Inc. mission and vision be able to achieve this project?

“When your vision becomes your mission, your business will become a movement.” A successful business can create change that affects neighborhoods, cities, even the world.

The last chapter using the SOAR analysis already explored the strengths and opportunities that are there for embarking on this project, and a final motivating need to go ahead, is that AO Inc. has as part of its vision, the moral obligation to contribute to creating enabling societies, around the world.

Paper Written by: Ade Oyinloye

References

Suzanne Wells. (July 2018). The Beginnings of eBay. The Balance Small Business.

https://www.thebalancesmb.com/how-did-ebay-start-1140007

Saul McLeod, (2008). Social Identity Theory.

https://www.simplypsychology.org/social-identity-theory.html

Weinreich, Peter (1988) [1986]. “14: The operationalization of identity theory in racial and

ethnic relations”. In Rex, John; Mason, David. Theories of Race and Ethnic Relations. Comparative Ethnic and Race Relations. Cambridge: Cambridge University Press.pp. 299ff. ISBN 9780521369398. Retrieved 2018-08-30.

(DR), F. (n.d.). D2.2: Set of use cases and scenarios. Retrieved from

http://www.fidis.net/resources/fidis-deliverables/identity-of-identity/int-d2200/doc/23/

Wong, A. (2014, April 04). Driver’s Licenses Contain Too Much Personal Info to Use at a Bar.

http://www.slate.com/blogs/future_tense/2014/04/04/proof_of_age_cards_drivers_licenses_display_too_much_personal_info_to_use.html

  1. David Garson, Public Information Technology and E-governance: Managing the

Virtual State (Sudbury, MA: Jones & Bartlett Publishers, 2006), 171.

Okumagba (Nov. 2014) Vanguard. Access to credit and Nigeria’s economic development.

https://www.vanguardngr.com/2014/11/access-credit-nigerias-economic-development/

Roszbach, K. F. (2004). Bank Lending Policy, Credit Scoring and the Survival of

Loans. SSRN Electronic Journal. doi:10.2139/ssrn.488522

What Types of Background Checks are There? (n.d.). Retrieved from

https://www.criminalwatchdog.com/faq/types-of-background-checks

Why It’s Important To Conduct Background Checks and How To Do It Legally. (2011, September 23).

https://www.theadvancegroupjobs.com/2011/09/23/why-its-important-to-conduct-background-checks-and-how-to-do-it-legally/

Backgroundchecks.com. (Michael Klazema, Dec 2018). Are Background Checks Legal?

https://www.backgroundchecks.com/community/Post/5266/Are-Background-Checks-Legal

Vanguard. (2015, March 11). Importance of Bank Verification Number. Retrieved from

https://www.vanguardngr.com/2015/03/importance-of-bank-verification-number/

Vanguard. (2018, May 01). CBN captures 31m Nigerians in Bank Verification Number

Project. Retrieved from https://www.vanguardngr.com/2018/05/cbn-captures-31m-nigerians-bank-verification-number-project/

Odumade, (January, 2018). Road Safety And Driver’s License. (n.d.). Retrieved from

https://www.pmnewsnigeria.com/2018/01/20/road-safety-drivers-license/

Kingsley Nwezeh. (March, 2010). ID Card – FG Targets 100 Million Citizens, This Day (Lagos),

March 28, 2010

Okechukwu Nnodim (April, 2018). We can’t produce national identity card for everyone –

NIMC. Retrieved from https://punchng.com/we-cant-produce-national-identity-cards-for-everyone-nimc/

Only 350 Nigerians responsible for 80% of N5.4 trillion debt – AMCON. (2018, June 28).

https://www.premiumtimesng.com/business/business-news/274261-only-350-nigerians-responsible-for-80-of-n5-4-trillion-debt-amcon.html

Time On Site

Time On Site

 

We often delude ourselves into believing we have control over the use of our mobile technologies

 

What you do not realize is, behind the screen, there are over a thousand Engineers and Developers whose jobs is to keep you addicted to that screen

 

It’s called Time On Site

 

Time On Site is the currency with which the performance of web and application Platforms – mobile app, app, websites etc are being rated on. It measures how long a visitor stays on the user interface of the site, which further translates into how successful that site interests and involves you, and every other user.

 

Web platforms don’t just want you to cursorily browse through their sites, they want you to spend a great amount of your time resources, not just once, but repeatedly.

 

So, think YouTube, Facebook, Google, Instagram, Snapchat & Twitter.

 

These Tech companies most likely have a Chief Psychology Officer or some social scientists, whose job is to tell Engineers and Developers how to build persuasive algorithms into these platforms. Persuasive algorithms that can alter your habit and behavior.

 

The more you stay glued to a site, the more successful the platform provider is expected to be, in terms of campaign and site visitation to the site. Web analytics calculate this ToS almost accurately.

 

Web analytics do not calculate the period you have a page open but dozed off on your seat. Neither does it consider the time you are downloading a movie file or reading a site content

 

Time on Site record all requests and engagement on the site.

 

You think you’re in control?

Someone somewhere is making a decision that will affect your life.

 

You think you can get rid of your habits?

There are people more intelligent behind the screen whose job is to keep you persuaded and distracted

 

Have you noticed on your Facebook mobile app, that when you click the back button to exit the app – believing you’re done gossiping on family & friends’ pictures and timeline stories – the app doesn’t close, but instead scrolls up to display timelines of other friends you may have missed?

 

Have you noticed that when you’re done watching an episode on Netflix, the next episode shows in a small box and a timer starts to count down – persuading you to stay on watching?

Or a new related movie is suggested, based on your movie choice?

 

Think about how YouTube automatically plays the next music video – trying to persuade you to stay on the app.

 

Think about all the notifications from Twitter, Netflix and Snapchat, you wake up to see on your mobile device, in the morning.

 

These social platforms wake you up in the morning, to divide your daily time resource into time slots, each taking a block of your time, away.

 

Don’t you just love it when these Platforms do exactly what you desire or do things on your behalf that you didn’t even think of?

Yup! Those are deliberate designs and persuasive algorithms built into our technologies

#TimeOnSite is all #Hammjustsaying

The Characteristics of an Agile MIS Infrastructure – Adebola Oyinloye

Agile MIS Infrastructure is the combination of an organization’s hardware, software and telecommunication equipment, all working together as a system to support the goals of that organization. The system must be scalable such that, if an organization demand for resources grow by a percentage, the existing infrastructure must be able to handle the percentage growth without having any adverse effect on the functionality of the company’s operation.

The following are characteristics of an Agile MIS Infrastructure that can ensure a system meet and perform under any unexpected or unplanned changes

  1. Accessibility – The operation of the system must be easily accessible at any time without restriction by all users of the system, according to their authorization or access level.
  2. Availability – In today’s world where Ebusiness mean the operation of a system must be 24/7/365, availability means the period within which the system must be operational. When the system is unavailable, then it cannot be used. A system that is tagged High Availability, like the type used by Internet Service Providers, mean the system is continuously operational at all times
  3. Maintainability – The system must be flexible enough to meet all types of company changes and business changes, without a complete system failure. For example, some businesses fail to plan for global customers. Soon as the first order comes from a global customer, it may cause a business process issue. Systems must be built with flexibility to meet business change.
  4. Portability – This is the ability of an application to operate on any device or software platforms. These days, applications are built to run on any device like PC, mobile phones and tablets. They are also able to run on operating systems like Windows, Mac or Linux.
  5. Reliability – This is the ability for a system to function accurately and provide reliable information to the users.
  6. Scalability – This describes how well a system can scale up or adapt to growing demands. If a company grows fast, it may find it difficult to function properly if it has to rely on limited resources from an existing system. For example, a SOHO router built for 50 users will have operational difficulty, and may eventually break down, if users on the network increases to 100.
  7. Usability – This describes the user friendliness of a system. The system must be easy to use while also being efficient. Windows Operating Systems are always perceived to be more user friendly than Apple Mac’s IOS

 

References

 

  1. Paige Baiztan. (2016). Business Driven Information Systems: Fifth Edition. New York NY. 10121 McGraw-Hill Education

Your Phone Photo shot better than iPhone 7?

If you live in a larger city, chances are you’ve seen the ‘Shot on iPhone’ billboards that have been dotted around for a few years now.The award-winning campaign has long been an impressive way to highlight the quality of images that can be captured on Apple’s phones, with the photos showcasing various different subject matters…

via Can photos from your phone look like they were ‘Shot on iPhone 7’? — TechRadar – All the latest technology news

Top 5 Best Online Communication Tools in 2017

With the rise of the internet, computers and mobile technology, so much has changed in the business world over the decades. And of course, it’s critical to implement the right devices and applications into your everyday operations, not just to boost productivity, but to keep up with – or stay ahead of – the competition.If…

via Top 5 best online collaboration and communication tools in 2017 — TechRadar – All the latest technology news

WhatsApp enables two-step verification

Looking for a little more security in your digital life? If you’re a WhatsApp user, you’re in luck.The messaging service has just turned on two-step verification for all its billion-plus users. Once you activate the optional feature, anytime you (or anyone else) tries to verify your phone number, a six-digit passcode created by yourself must…

via WhatsApp enables two-step verification for added security — TechRadar – All the latest technology news

 

Case Study: Mount Cedar Technologies Inc.

2016-06-17 15.30.36

Introduction to Mount Cedar Tech Inc

Mount Cedar Technologies, which began as an importer and distributor of computer accessories but later grew into an IT infrastructure integrator that specializes in hardware, software and security solutions, from an employee of 6 to 170 in 2006, is having an organizational behavior challenge. The company lacked an organization structure that can help improve on its operations’ effectiveness. Even though the decision making was highly decentralized, there was no cooperation among the managers therefore, each department were making independent decisions, without coordination or communication.

 

Mount Cedar Technologies Vision

In trying to analyze and provide suggestions that can improve or enhance Mount Cedar Technologies’ organizational challenge, we need to find out what the company’s vision is. According to Neil Kokemuller (2017), A mission and vison are standard and critical elements of a company’s organization strategy. Most established companies develop organizational vision statements which serves as foundational guides in the company’s objectives. The case study has not mentioned any mission or vision statement for the company, and this is an underlying factor in shaping an organizational culture. Where mission relates to goals and refers to the overriding purpose of the organization, Vision refers to the desired future state of the organization” (Johnson et al., 2011 p.8).

Hans Hinterhuber and Wolfgang Popp (1992, p.106) defines vision as “an orientation point that guides a company’s movement in a specific direction. If the vision is realistic and appeals both to the emotions and intelligence of employees, it can integrate and direct a company”.

 

Assessing the Leadership Style

Even though John Curtis, the CEO, has been instrumental to the growth of the business, his present leadership style had become problematic to many including the top management. He surprised people by showing uninvited to meetings and employees are expected to provide impromptu responses to unprepared questions thrown at them. Since Curtis has been perceived as being an issue, he cannot be recommended as a change leader. So, Mount Cedar Tech. need to restructure its organization, and what the company need is a distributed leadership which could be used to effect an organizational change. Research has also shown how change is driven by large number of organizational members, in an approach that is called “leadership constellations” (p. 17)

 

Creating an Organizational Structure that Promotes Creativity

The case study identified that the company lacked an organization structure that can help improve on its operations’ effectiveness. And one way to achieve this to create an organizational structure that promotes creativity. According to “Making Innovation Structures Work”, a McKinsey Global Survey results, Executive say their companies use multiple organizational approach to drive innovation and that the success of these efforts depends on integrated strategy.

While 86% say the structure of their separate functions positively influences outcomes, results however suggested that the most important factor of success is how creativity is integrated into corporate strategy. Therefore, some of the general characteristics of organizational innovation Mount Cedar Tech. can put in place to promote creativity, are

  • Allowing everybody understand that they are capable of generating creative ideas
  • Organizational culture that can smother creativity
  • If any one comes up with a great idea, let them understand – ‘no need to tell, just show it’

 

Improving Mount Cedar Tech. using Communication and Employee Empowerment

At Mount Cedar Technologies, decision making was highly decentralized which resulted in the loss of possible gains to be obtained from cooperation among managers. Ideally, having a flat structure and decentralized decision making should make an organization work more efficiently, and allow it to react quickly to business situation, however, if there is no coordination or proper communication, there will be a resulting silo effect in which each department will make decisions by itself.

Research has shown that effective lateral and work group communication leads to an improvement in overall company performance. Here are a few ways organization communication can increase decision making effectiveness and a productive organizational behavior

  • When information is not transferred correctly to the right people, there might be miscommunication as seen at Mount Cedar Tech. it is important to have a good communication system, so that everyone understands the goal and can work together towards it. E.g. to launch a new product on Facebook, new goals and tasks should be properly communicated to the employees
  • Effective communication can also empower employees and improve productivity if they have more information, about specific tasks. Mount Cedar Tech employees where not empowered and were not encouraged to risk taking. In fact, department managers acknowledged that they were busy reacting to problems and customer issues, allowing them no time to coordinate or listen to their employees. This is because managers don’t have information about how to deal with specific tasks.
  • Communication also creates healthy and productive cultures in an organization. If employees and managers have good working relationships with each other, the organizational behavior of the company improves.
  • Effective organizational communication also increases accountability. When employees and managers are provided with clear instructions, they know what is expected from each of them. This will break silo effect in an organization, and managers can work together in tandem with the organization mission and vision.

 

Addressing Diversity and Minority

Christensen and Cornelissen (2011, pp. 402-3) argue that organizations have to work with many voices, with different views and ideas, so that communication can be ambiguous and inconsistent for this reason of accommodating diversity in an organization: “vague and equivocal language allows organizations to talk about themselves in ways that integrate a variety of members and stakeholders without alienating anyone”. This is key to Mount Cedar Tech. as it was also lagging in the advancement of women and minorities.

 

Organizational Motivation and Reward

Finally, it is important to keep employees motivated and rewarded. Mount Cedar Tech, experienced complaints from employees who did not feel equitable treated, which resulted in the loss of talented employees. According to Lipman (2013) here are 5 easy ways (which are self-explanatory) to motivate employees

  • Align individual economic interests with company performance
  • Take a genuine interest in the future path of an employee’s career
  • Take a genuine interest in their work-life balance
  • Listen
  • Do unto others as you would have done unto you

 

Mount Cedar Technologies Inc.

Designing A High-Performance Organization

 

Adebola Oyinloye

California Miramar University

ORGANIZATIONAL DEVELOPMENT AND CHANGE

 

References

Palmer, I., Dunford, R., Buchanan, D.A. (2016). “Managing Organizational Change”: A Multiple Perspectives Approach. New York NY. McGraw-Hill Education

Neil Kokemuller (2017). “Importance of Mission Vision in Organizational Strategy” http://smallbusiness.chron.com/importance-mission-vision-organizational-strategy-16000.html

McKinsey & Company (September 2012). Making Innovation Structures work: Mckinsey Global Survey results. http://www.mckinsey.com/business-functions/strategy-and-corporate-finance/our-insights/making-innovation-structures-work-mckinsey-global-survey-results

Pavel Aramyan (Octoboer, 2015). 5 ways workplace communication effectiveness can increase productivity. http://explore.easyprojects.net/blog/5-ways-workplace-communication-effectiveness-can-increase-productivity

Victor Lipman (March, 2013). 5 Easy Ways to Motivate and and Demotivate Employees. Forbes. http://www.forbes.com/sites/victorlipman/2013/03/18/5-easy-ways-to-motivate-and-demotivate-employees/#344ce3e9682d