1. To check if the Social Organization has well organized database.
2. To investigate if social security organization follows the procedures designed to improve effectiveness of network management in old age data.
3. To see the output of Network management in controlling Old age benefit data by comparing previous and current records.
1.4 RESEARCH QUESTIONS
The research study aims at answering the following research questions as far as effective communication is concerned;
- Is organization database has efficiency in controlling old age benefit data?
- Are rules and procedure followed to improve effectiveness of Network management in old age benefit data?
- To what extent Network management has become effective to the organization in controlling of old age benefit data?
1.5 IMPORTANCE OF THE STUDY:
-
The findings are also expected to benefit companies and organizations of appertaining using network technology to increase controlling and management of sensitive data like those of beneficiaries by rectify and make adjustment to the areas of weakness in the whole system of the Organization.
- It will enable the researcher to have practical experience through comparison between theoretical aspects and actual practice in the network field.
- The evaluations and recommendations from the study will be useful to the management of the social security organization, since it provide clear picture on how it can improve its Network Management in controlling old age benefit data.
1.6 SCOPE OF THE STUDY:
The scope of the study will be on the effectiveness of network management in controlling old age benefit data increasing better performance in the National Social Security Fund in Tanzania as a case study.
The study will be based on old age benefit procedures and OSI(Open System Interconnection) five conceptual areas of Network Management which are:
- Fault management
- Performance management
- Security Management
- Accounting Management
- Configuration Management
Computer and Benefit departments will be the most considered areas; other departments may be consulted to obtain further information and evidence.
1.7 LIMITATIONS OF THE STUDY
1. Lack of data may also be a limiting factor since the management and staff may not disclose all the needed information but researcher may search data through internet, libraries and other sources which relate to the place of study.
2. Sometimes the respondents may decide to give out data which may not correspond to the study.
3. The time given for field work is limited this is not enough to collect all data required for the study.
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 Theoretical Review
According to International Social Security Associations (ISSA) circular letter written “Nowadays nobody can be unaware of many upheavals caused by the use of IT and this is numerous fields of human activity. Social security administration is one of those where the impact of introducing this technology has been deeply felt.
‘‘Whatever the geographical location of the social security schemes and their stage of development, one of the priorities of their administrators is to improve the efficiency of their management and, by the same token, the quality of the service delivered to insured persons…….”.ISSA International review(1999).
“Information technology has become an essential tool in the administration of social security programs around the world. In recent years there has been another equally important development: the demand on the part of insured persons for better, more rapid, and more responsive service from social security institutions.” ISSA’s African News Sheet no.19 of February, 1999.
According to Whitepaper of 10th April,2006 “Network management is the execution of set of functions required for controlling, planning, allocating, deploying, co-ordinating and monitoring the resources of network……………….”
Also, the British author, Duck & Read (2003) put that: -
“..network management system must include the monitoring of network’s performance, handling failures when they occur and reconfiguring the network as a response to such failures.”
Stalling W (2001) explain that “Network management system consists of incremental hardware and software additions implemented among existing network components. The software used in accomplishing the network management tasks resides in the host computers and communication processors. Management station will have to do the following ensuring data are controlled:
- Set of management application for data analysis and fault recovery
- An interface by which the network manager may monitor and control the network
- Database of network management information extracted from the database of all the managed entities in the network.
- The capability of translating the network manager’s requirements into actual Monitoring and control of remote elements in network
2.2 EMPERICAL REVIEW
According to research done by Susan Grad, Social Security Administration(1999), office of research and statistics,Washington,D.C “Old age is a complex process involving various stage of withdrawal from the labor force and receipt of one or more types of retirement benefits………”
“……….full retirement process including reductions in work effort before beginning to receive retirement benefits, up through receipt of one or more retirement benefits and stopping work, may over many years, beginning for some well before age 60 and ending for others well past age 70.”
“The provision of income to retired persons is the subject of much debate and reform throughout the world with governments of countries at all stages of economic development expressing considerable interest in the topic and, in some cases, making far reaching decisions. The reasons for this significant awakening of interest in the development of National retirement income systems or programs during the past ten years vary between the countries………….” International Social Security Review (1999 page no.25)
Trends In Social Security no.1 of 2002 explain that Old age pension is payable at age of 60 to applicants who have made contributions for at least 180 months. It equals 30% of the average monthly earnings during the first 180 months of contribution. For every additional 12 months of contribution further 2% of average monthly earnings are added in calculating the benefit. The maximum payable is 80% of the average earning of the contributor, whereas the minimum is not less than 50% of minimum wage.
2.2.1 ISO NETWORK MANAGEMENT MODEL
The Open System Interconnection (OSI) has contributed a great deal to network standardization which specified the overall network management framework for the OSI model and gave general introduction and understanding to network management systems. The model consists of five conceptual areas, as discussed below.
2.2.2 Configuration Management
Modern data communication networks are composed of individual components and logical subsystems (e.g. driver in an operating system) that can be configured to perform many different applications. The same device for example, can be configured to act either as a router or as an end system node or both.
Configuration management is concerned with initializing a network and gracefully shutting down part or the entire network. It is also concerned with maintaining, adding, and updating the relationships among components and the status of components themselves during network operation.
The goal of OSI configuration management concern monitoring of network and system configuration of information so that the effects on network operation of various versions of hardware and software elements can be tracked and managed. . Also deals with improving or enhancing the network in terms of its functions or adding new features in the system.
Configuration management involves the following steps:-
- The collection of data concerning the current configuration of network components.
- Use this information to modify your network.
- Keep this information for future use and/or references.
Each network device has a variety of version information associated with it. An engineering workstation, for example, may be configured as follows:
- Operating system, Version 3.2
- Ethernet interface, Version 5.4
- TCP/IP software, Version 2.0
- NetWare software, Version 4.1
- NFS software, Version 5.1
- Serial communications controller, Version 1.1
- X.25 software, Version 1.0
- SNMP software, Version 3.1
Configuration management subsystems store this information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem.
2.2.3 Fault Management
Fault management is important feature of any network management for detection of faults, log, notify users and automatically fix network problems, repair and restoration of the system. to keep the network performance effectively. Fault management is the most widely implemented of the ISO network management elements, because faults can cause downtime or unacceptable network degradation.
Fault management involves the following steps:-
-
Detection of faults symptoms, isolating the problem. and passing on of error reports
In this first step in fault management, faults are detected and an alarm is set to indicate the presence of fault. A good indicator alerts a problem before it gets too big and helps recognition of ways to fix the problem. Then affected part is isolated to prevent prolong effects to the whole system.
2. The problem is fixed and the solution is tested on all-important
Subsystems
After problem detection and isolation the system restored to its normal operating
condition. This involves two processes:-
- Fall back switching which involves the replacement/fixing of a failed device by an immediately available back-up
-
Testing the fixed equipment step by step on all-important subsystems
to check whether it functions in its proper way.
3. Updating and documentation.
Lastly, after successful first steps of detection, isolation, fixing of problem and testing for proper performance the network should be updated to effect the changes. Documentation also is very important to be done for future reference.
2.2.4 Performance management
Modern data communications networks are composed of many and varied components which must intercommunicate and share data and resources. In some cases, it is critical to the effectiveness of an application that a communication over the network be within a certain performance limits. Performance management of a computer network comprises two broad functional categories – monitoring and controlling. Monitoring is the function that tracks activities on the network. The controlling function enables performance management to make adjustments to improve network performance.
Performance is an aspect of network management concerned with the monitoring of the network for optimal functioning. It deals with the monitoring and collection of data concerning the current performance of network resources in an open system and generation of performance error reports.
Performance management deals with measuring and making available various aspects of network performance so that internet work performance can be maintained at an acceptable level.
Performance management involves three main steps
1. Monitoring the throughput
First, the amount of data that can be transmitted per unit time is gathered on variables of interest to network administrators.
2. Data analyses and Response time
On this data is analyzed to determine normal (baseline) levels and measure of the speed of operation of the system. It can be defined as the time between an operator (user) sending a request and receiving the feedback of the request.
3. Availability
The appropriate performance thresholds are determined for each important variable so that exceeding these thresholds indicates a network problem worthy of attention. In most networks, system availability is the important measure of the amount of time that a system is available for use and can be accessed by users.
Each of described step is part of the process to set up a reactive system. When performance becomes unacceptable because of an exceeded user-defined threshold, the system reacts by sending a message. Performance management also permits proactive methods: For example, network simulation can be used to project how network growth will affect performance metrics. Such simulation can alert administrators to impending problems so that counteractive measures can be taken.
2.2.5 Accounting Management
These are internal accounting procedures rather than actual cash transfers, but they are important to the participating users nevertheless. Furthermore, even if no such internal charging is employed, the network manager needs to be able to track the use of network resources by user or user class for a number of reasons including the following:
- A user or group of users may be abusing their access privileges and burdening the network at the expense of the other users.
- Users may be making inefficient use of the network
- The network manager is in a better position to plan for network growth if user activity is known in sufficient detail.
The goal of accounting management is to measure network utilization parameters so that individual or group uses on the network can be regulated appropriately. Such regulation minimizes network problems (because network resources can be apportioned based on resource capacities) and maximizes the fairness of network access across all users.
2.2.6 Security Management
Security management is concerned with generating, distributing and storing encryption keys. Password and other authorization or access control information must be maintained and distributed. Security management is also concerned with monitoring and controlling access to computer networks and access to all or part of the network management information obtained from the network nodes. Logs are an important security tool, and therefore security management is very much involved with the collection, storage, and examination of records and security logs, as well as with the enabling and disabling of these logging facilities.
As pointed out in Microsoft (2004) that: - …‘Networks are subject to hacking or illegal access, so shared files and resources must be protected..’…..This implies that network management has to be implanted to control access to network resources according to local guidelines so that the network cannot be intentionally or unintentionally sabotaged. Also sensitive information can be accessed with appropriate authorization only
Duck & Read (2003) also explain about the network management by saying that.
” No systems are totally secure. Even a local isolated system is prone to some insecurity and such problems are multiplied as the size of the network increases. An open system is therefore is particularly vulnerable in this respect. ”
In addition Douglas I.J and P.J. Olson (1986), explain that the control and security of the network is vital as threats may be present due to the geographical areas in which parts of the network are located.
Under these geographical areas, we’ve three most essential security aspects namely:-
- Physical Security:
This largely refers to the controlling access to computer systems and data by restricting access to the computer room e.g. by keeping electric fence, security guards.
2. Logical Security:
This refers to the introduction of logical access security systems to protect communication networks against physical threat. makes an emphasis under this aspect in the sense that logical security access control ensure that access through computers and terminals to an organization’s data, programs and information is controlled in some way so that only authorized access is allowed, Doyle, S (2000, p. 214).
3. Network Security:
Most organizations make use of computer networks. This raises many additional security problems such as hacking and tapping.
CHAPTER THREE
3.0 RESEARCH METHODOLOGY
3.1 Research design.
The researcher will use case study design, whereby the answers to the research questions will be obtained through interviews and observation of all activities involving Network management and old age benefit.
3.2 Population Enquiring:
Will be conducted in the National Social Security Fund Head Quarter, selected sample will be 30. But the area of concentration will be Departments of Information Technology and Benefits.
3.3 Sampling Techniques:
Simple random sampling and judgmental procedure. This includes random selection of employees’ staff from IT and Benefit departments.
3.4 Sample size:
The sample size of the study will comprise at least 15 representatives from each IT and Benefit departments.
3.5 Data Collection methods:
3.5.1 Interviews
Interview will be carried out are face to face questions, and will base on the study and the interviewee will be able to answer the questions and express their opinions.
3.5.2 Documentation
This involves reading of Organization documents such as reports, letters, memoranda, brochures that concerned with Old Age benefit and Network.
3.6 TYPES OF DATA TO BE COLLECTED
Researcher expects to collect both primary and secondary data.
3.6.1 Primary Data:
Are those data that the researcher will collect through interview.
3.6.2 Secondary Data
Are those data that the researcher will collect through literature review, magazines, libraries books, internet as well as documentation.
CHAPTER FOUR
4.0 ANNEXES:
4.1 RESEARCH BUDGET;
4.2 SCHEDULE OF ACTIVITIES:
Table 1
MONTHS
4.3 REFERENCES
1. International Social Security Association (ISSA-1999): Current research in Social Security, published by ISSA
2. Grad, Susan (1999): American Statistical Association
3. International Social Security Association ISSA (1999) African News Sheet published by ISSA
4. Knox, David (1999): International Social Security Review published by ISSA
5. International Social Security Association (2002): Trends in Social Security, published by ISSA
6. Brown. Scott C (1999): Monthly Labor Review Article published by US dept of labour
7. Network Management [On line] available from www.bitpipe.com
8. Social Security Essays [On line] available from www.exampleessays.com:
9. William, Stallings, Dr (2004) – Business Data Communication 4th edition, New Delhi
10. Duck M and R.Richard (2003) Data Communications and Computer networks for Scientists and Engineers, (2nd edition), Prentice-Hall of India private Limited, New Delhi.
11. Kenneth, C. and Jane, P. (2002): Using Information System, (7th Edition), New Delhi: Mohan Makhijan Publisher
12. Stalling, W. (2000): Data and Computer Communications, (6th Edition), New Delhi: Pearson Education, Inc
13. Caelli, W.J. (1998): Computer Security In The Age Of Information, New York: Elsevier Science Publishers B.V
14. Microsoft Encarta Encyclopedia CD (2004) Delhi: Pearson education Inc.
QUESTIONNAIRE
Research Title: Effectiveness of network management in controlling old age benefit data in social security organization
Dear respondent; I am student of the Institute of accountancy Arusha currently undertaking a study of the mentioned topic. The objective of this questionnaire is to provide assistance in data collection which is aimed at evaluating the need of the network management in controlling old age benefit data in organization. The data collected will not be shared with any individual or institution, only aggregate data and summaries will be published.
I humbly request you to respond to the questions below, and wish to thank you in advance for your assistance.
Yours sincerely,
MLOLWA,Hamis
Please fill the name of your Organization and if convenient your designation
NOTE: Questionaire’s information will not be shared with any individual or institution(i.e will be confidential.)
Name of Organization……………………………………
Designation………………………………………………
Choose the correct answer
- Is benefit data availability in database it takes a short or long time when traced?
- Short
- Long
2. How long it will take a pensioner to get his/her pension after opening the claim?
- Less than a month
- A month
- More than a month ( )
3. Is there any special treatment of old age benefit data compared to other data in organization network?
- Yes
- No ( )
.
4. Are steps of configuration management followed?
- Yes
- No
5. Organization has any IT regulation or procedure to be followed?
- Yes
- No
If answer is yes which procedures:
………………………………………………………………………
………………………………………………………………………
6. Network administrator track the use of Network resources by user or user class
- Yes
- No
7. Network is effective to all or part of the Organization?
- All part
- Only a part
- Not at all ( )
8. What is the general level of performance of your network?
- Maximum
- Moderate
- Minimal ( )
9. If it is minimal performance what factors contribute to this?
- Viral infection
- Network overloaded due to the large number of users
. c) Others (Mention them) ( )
………………………………………………….
…………………………………........................
………………………………………………….
10. Regardless of the level of the security your system still can be accessed by unauthorized users. What tool can assist you to detect that unauthorized user has got into your system?
- Special software
- Report from users
- No specific tool for that
11. What are the tools used in security management?
- ASDIC
- User Lock
- Password policy Enforcer
- Others(mention them)
…………………………………………………………………………………
…………………………………………………………………………………
12. How do these tools used?
(i)………………………………………………………………………………………
(ii)………………………………………………………………………………………
(iii)………………………………………………………………………………………
13. What are special tools used in fault Management?
- ICMP message
- Ping and trace route
- Color and graph presentation to indicate failures
- Others(mention them)
…………………………………………………………………………….
…………………………………………………………………………….
……………………………………………………………………………
14. Give any of your options, advice or comment on network management and performance to the researcher.
…….
…….
……
“Thank You for your cooperation”