Thursday, October 31, 2019

MAKING STRATEGY Assignment Example | Topics and Well Written Essays - 3000 words

MAKING STRATEGY - Assignment Example Lastly, the report’s concluding part comprises of integrated statement of strategic intent and process commentary. This part demonstrates strategy as issue management process. Issue map are known as tidied hierarchical map having priorities marked. In addition this section analyses strategy as the prioritisation and management of key issues (Ackermann and Eden 2011). The general point concerning making strategy is about agreeing on which strategic issues to practically concentrate cash, energy, effort and emotion (Raimond and Eden 1990). The strategic issues that need to be resolved in order to assure the long term success of the organization over next 2 to 5 years concern revenue gain for Edinburgh airport (Edwards 2004). The issues are shown in strategy as a management issue map below (Ackermann and Eden 2011). Surfaced issues concerning opportunities Edinburgh airport is facing such as round robin (procedural justice), negative issues and opportunities, cause and effect and action orientation issues (Ackermann and Eden 2011). Linked issues: Strategic issues are not autonomous, they influence one another. The process of linking issues adds significance to the workshop in different ways. The first advantage is that through the linking procedure participants (team members) can start to recognize in more aspects how the surfaced issues connect to each other (Raimond and Eden 1990). Significantly the procedure progress from thematic clusters to action clusters where a number of the connections identified transverse the thematic clusters also within them. This issue map is action-oriented since it captures a means-ends framework where each connecting arrow denotes a ‘means’ statement and an ‘ends’ statement (Ackermann and Eden 2011). The priorities denote essential perspectives of strategy; a bargained agreement concerning where to

Tuesday, October 29, 2019

Racial and Ethnic Relations Assignment Example | Topics and Well Written Essays - 500 words - 2

Racial and Ethnic Relations - Assignment Example The reason is very obvious. No matter how modern and liberal we have become, we still have not been able to come out of the so-called pride and prejudice system regarding gender and race. In the workplaces and outside, women of Color are always treated as low class citizens. If we survey through organizations, we come to know that white men are given high level job positions while employees of Color, and especially women of another race or other underrepresented minority groups, are given low level positions due to which there often arise interpersonal conflicts and the overall organizational culture gets affected. Complaints by women of Color regarding discrimination are not even heard. Due to this fact, there are a lot of discrimination cases at workplaces that go unidentified because the victims are always sure that they will not be given an ear and their problem will never be solved. The reason for this is that the offender is always someone who is at a higher job level or is of the other gender. This makes the complainant apprehensive about the issue. Women of Color also have to undergo sexual harassment at times.

Sunday, October 27, 2019

Bicycle Thieves And Italian Neo Realism Film Studies Essay

Bicycle Thieves And Italian Neo Realism Film Studies Essay It is evident that Italian Neorealism and the life of post-war shaped the film Bicycle Thieves (1948). However, with much debate, one can argue that the sentimental nature of the film overwhelms the films potential to make a forceful political statement. With reference to important scenes from the film, Italian neorealist principles and the usage of sentiment; one can justifiably claim that the forceful political statement is not overwhelmed by sentiment, and in fact enhances the message the film aims to give off. Neorealism was an influential and significant movement in film history, which took place in Italy at the ending of World War II. Italy moved from fascism and dictatorship, whereby much was revolved around a single-party state seen in World War I, to an equal and democratic society. This change in society brought about characteristics and principles which became noticeable in cinema during this time period. These principles not only molded the film Bicycle Thieves, but were used to bring about a message to the audience. The filmmakers and directors believed they had an ethical responsibility to use cinema to promote the social change that had just occurred post the war. Ideally, it wasnt so much about the storyline of the film, but more about making the public aware of the difficulties that working people had to face. Here we see a Marxist approach on the rebuilding of Italy whereby unlike the mythology of Classic Hollywood, no single person can change the world and the ultimate society would be a classless society. Neorealisms origin of strength lies in the documentary excellence which is used to portray the realism of the story. One might speculate what Bicycle Thieves would be like in colour, however the black and white aspect highlights the tone of the film being a bleak, depressing emotion contrary to the usage of colour which would highlight liveliness and energy and go against the tone of the film. Thus, clearly showing that the sentiment brings about the tone of the film which enhances the message of presenting the gloomy conditions of poverty in post-war Italy. The reconstituted reportage, based on daily life and events, also adds more truth to the film and is not the making of a documentary but rather shown and seen in a documentary-type way and aids to make available the focus of temporary altering and moving from one area or subject to another. Truth is an important principle of neorealism, as truth brings realism. This can be seen through the truth of the characters, lighting, location, dà ©cor, camera shots, camera angles and editing. This not only brings about authenticity but also creates a much stronger message for the audience. In Bicycle Thieves, there is a correlation between truth and sentiment, and truth and the political statement Which are justifiably both used in this film without over powering one another in order to positively enhance the films message. Inevitably, in order for a director to get an actual event (post-war) understood by his audience truth and realism is the most effective approach. Neorealism focuses on the characters and themes without much focus on the plot itself as the plot is seen to warp the truth about people. Thus, the film wouldve not only been boring if there was no sentiment (due to there not being enough material if there was no storyline about characters), but to know and understand a situation, one must be put in a position where you have the opportunity of learning a great deal about the faith and frustrations of a human being. Equally, a boring film is a failed film. Through this, neorealists are able to portray truth to a greater extend through bringing about simplicity yet a means of understanding the real life; a main appeal in films even today. The storyline being as simple as the search for a bicycle doesnt take the political statement too far away from the message. Likewise, the actual characters in the film are everyday normal people. The workman was found in the factory, the child was wondering around the streets and the wife was a writer. This is known as Typage whereby there is no star system which immediately creates a far more realistic/truth approach and feel. Similarly, the locations and dà ©cor are real and not built-up or made-up, the lighting is natural which attempts to present reality as it is, the editing is invincible which enhances truth and the camera is free which is unrestricted and brings about a far more convincing viewing. With the storyline of the characters and the truth which is by principle brought about, I fully agree that it brings about sentiment. However, It puts you (the audience) in a far more heart-felt and understanding position which I believe brings about the political statement in a far more expressive way, rather than a theoretical and cold approach. And as some agree, its not even sentimental its just painful. (REFERENCE 6) Instead of a cold theoretical approach, we are introduced to a family who are ordinary and by no means are glamorous heros which is commonly seen in Classical Hollywood. Quite frankly, if we werent introduced to characters and the sentiment they bring, which play a role in this film, I personally dont think much of a political statement would be made as one needs interest to grasp a statement. The character of Ricci is the focus of the film, however we are not interested in him but rather what will happen next in the films sequence of events. And even though characters bring about sentiment and the viewer starts becoming attached to the role the characters plays, in Bicycle Thieves, Bruno the son unsentimentally still criticizes his father. In response to the representation of the political statement made in this film, we are clearly able to see this in noticeable scenes in the film. In the first scene, the camera follows Ricci from the unemployment gathering to his wife where the housing project is in the background, which is fully exhibited to the viewer showing the bleak conditions. We see the men and woman arguing about employment and shortage of water. This emphasis on long and medium shots which appeals to the truth in the film enhances the political message due to the events getting exhibited on a whole Whereas close up would bring more sentiment. Long and medium shots show the actor loosely framed in his environment and allow the viewer opportunity to look around in that environment with the added enhancement of the shots taken at eye level. As well as minimized jumps and shifts through editing to bring more real life to the cinema audience. Thus we see here that sentiment is not overwhelming the political statement, but rather the political statement is actually taking dominance in the shots. Of course the neorealist did move in for close-ups every now and then which in effect is therefore very strong and still strings along the story of the characters and the central object, which is needed to (as mentioned earlier) keep the audience interested and not bored. The central object is the bicycle. They are everywhere and yet precious, and the frailty of the Ricci familys position is enforced when Antonios bicycle is stolen. Here, the object brings sentiment to enforce the political statement, and what I find even more interesting is how the title changed from Bicycle Thief to Bicycle Thieves as ultimately it becomes a vicious cycle of survival as one has to steal their own bicycle back from the thief, therefore becoming a thief resulting in thieves. This therefore constitutes to the message of the film, for the continuous struggle of the haves and have-nots. Through the character of Antonio, It is the hope that drives him and allows him to move on in his quest to find his stolen bicycle. Although the directors glumness drives the plot, it is ultimately the clash with human optimism which gives the film affective power and without the human sentiment one can argue that the film would not produce affective power. If we look at three scenes, we are able to see how sentiment brings power to the political statement. In one scene we see Antonio and Maria trade in their bed linen. The camera moves away from them and we see the heaps of bed-linen behind the counter, a tacit bleak reminder of the extensive nature of unemployment while recognizing its effect on the heart of families household lives. Again we see how realistic the lighting is and the framing is loose to incorporate the environmental conditions to promote the political message. In another scene we see Ricci reporting his bicycle stolen and is directed by the policeman to the piles of alike reported cases. His account and circumstances are not singular, and we see here how it is not only this family that is going through this but also a lot of people. Thus portraying the political message that goes beyond this familys personal sentiment. Here we are also shown how humanitarianism prohibited Ricci from pressing official charges anti the thief, and the same moral fiber that spared him after he was caught stealing a bicycle. After seeing Bruno in tears, the sufferer understood Riccis condition and let him go. Such a film was essential in Italy as through this family we have the opportunity of being a bystander to the brutality of a civil war between fascists and its on going of killing and reprisals through seeing how this effects one, and how not only effecting this family but many others. Italy in post-war was in need of healing and compassion even at the cost of a perceived injustice. (Paul Baxa, 2011) Healing does not come from the government and leaders of the country, but come from within the everyday man on the streets you and me. Thus, from the Riccis, those being affected by the war and living within such conditions as well as the audience viewing this film who can in many ways relate. In another scene, arguably the most sentimental scene yet what I believe portrays the political message more powerfully than any other- we see the father and sons relationship come to a mend. It is understood with looking into the Italian family lifestyle, that the father and sons relationship is by far the strongest and most special. Little Brunos appearance when taking his fathers hand in the last scene is merely a realistic point of life and is a means of facing life with your father an important part in Italian culture. With Bruno being the witness of the tragedy and finally coming to realize his father is not a hero after all (contrary to Classic Hollywood), much like the audience being a witness too, this scene gives off a sense of aggravation, humiliation, paradox and most of all acceptance to survival. These sentimental feelings therefore expresses the political statement as this ending of when the father and son take hands, expresses manhood and the hardship and survival one needs to go through with still looking for a sense of acceptance. Bicycle Thieves therefore inevitably portrayed the political statement through expressing the social conditions without expressing solutions. One might argue that this is a downfall, however at this moment in time solutions were not theoretical and if healing was going to occur it was going to have to come from the people. Thus, this film is inevitably awareness that needs to be found in each individual, which will create its own solution. Much like the theme and characters inevitably creating a plot on its own in Neorealism. The neorealist approach doesnt have an inbuilt political meaning solution, as the most widespread attribute of neorealism is; on location shooting and the feeling of truth. (REFERENCE) Exactly what Bicycle Thieves so effectively does. One must also remember when viewing this film in the 21st century that twenty-five percent of the Italian workforce was unemployed at the time and if you were employed, getting to work was with the use of a bicycle. The object of the bicycle thus symbolized survival. In conclusion, one can therefore justifiably argue that the sentimental nature of Bicycle Thieves does not overwhelm the political statement but essentially enhances it. If the political statement made in the film was to feed off a means of a solution, and the solution could only be found in the common individual like the Riccis family then one needs to understand the individuals situation as well as have an opportunity to walk in their shoes. Through sentiment that is not overly used in this film, one can see the hardship for survival through the story of these characters in order to become aware, as well as stay intrigued. Without focalizing power of the central character but rather the political statement through the characters, this film uses The death of one man is a tragedy, the death of millions is a statistic. (Joseph Stalin, 1953) to its advantage by effectively showing the tragedy of individuals with indication to the masses statistic.

Friday, October 25, 2019

Achilles Respect for Authority in The Iliad :: Iliad essays

Achilles Respect for Authority in The Iliad Respect for authority plays an important role in The Iliad. Achilles is a major character in it whose views on authority change throughout the book. In Book One, he seems to have no respect for King Agamemnon. Achilles questions his judgment as well as rebelling against his authority. This is shown best when Achilles says, "What a worthless, burnt-out coward I'd be called if I would submit to you and all your orders." (Pg. 87 line 43-45). This is an outright lack of respect directed toward Agamemnon. By Book Twenty-four however, his views seem to have changed. Achilles talks to King Priam of Troy with respect. An example in Book twenty-four is when Achilles and King Priam weep together over their losses. Book One portrays Achilles as an individualist. This was the accepted way of life in the Bronze Age, which is when Achilles lived. The people who lived in Greece during that era were very selfish and self-centered. Achilles is not the only character in The Iliad who acts this way. Agamemnon, king of the Greeks, is also a very selfish character in this epic poem. The conflicts between these two major characters have catastrophic results. Because Agamemnon doesn't want to give up Chryseis, his war-prize, Apollo cast a plague on the Greeks. Achilles goes to Agamemnon and asks him to return the girl to her father so the plague will end. He agrees to return her, but he doesn't want to be left empty-handed. He returns Chryseis to her home, and he takes Briseis, a war-prize of Achilles. Achilles is so angry with Agamemnon that he vows to stop helping him fight the Trojans. As the battle goes on, Agamemnon realizes how important Achilles and his Myrmidons are to the Achaean troops. The King of the Greeks then swallows his pride and offers gifts to Achilles if he will come back and help fight. Achilles, however, is so stubborn that he refuses all the gifts and will not allow his troops to fight. When he is offered the gifts he rudely responds, "I hate the man [Agamemnon] like the very gates of death who says one thing but hides another in his heart."(Pg. 262 lines 378-379) This quote shows how much

Thursday, October 24, 2019

Circumplex Model

Introduction Marriage and Family are very important aspects of the human experience. These two units play vital roles in who individuals are and who they may become. Many times issues or problems arise in the marriage and family structure thus, requiring therapy in order to make matters better. The Circumplex Model of Family and Marriage has been used and has been affective in the treatment process when helping dysfunctional families. The Circumplex Model of Marriage and Family Therapy developed by David Olson and other colleagues provides a road map in understanding the marriage and family experience. Circumplex Model of Marriage and Family As previously mentioned, the Circumplex model of Marriage and Family Therapy was developed by David Olson and several of his colleagues. This model focuses on the three central dimensions of marital and family systems: cohesion, flexibility, and communication (Olson, 1999). In these dimensions the family system is ranged from balanced, to mid-ranged, to extreme. The family system is further ranked as chaotic, flexible, structural, or rigid. This model was developed in an attempt to narrow the separation of research, theory, and practice (Olson, 1999). Olson states that the model is specifically designed for clinical assessment, treatment planning, and outcome effectiveness of marital and family therapy. Three Dimensions of the Circumplex Model As stated prior, the three dimensions of the Circumplex Model are cohesion or togetherness. The second being flexibility or the amount of change in the families leadership, role relationships, and relationship rules, and the last dimension is communication. Following is a clearer definition of each dimension: †¢Cohesion:Described as the emotional bonding that family members have toward one another. Family cohesion can be considered as emotion bonding, boundaries, coalitions, time space, friends, decision-making, and interests and recreation. The focus of cohesion is how systems balance their separateness versus togetherness. There are four levels of cohesion ranging from disengaged (very low) to separated (low to moderate) to connected (moderate to high) to enmeshed (very high). It is hypothesized that the central or balanced levels of cohesion (separated and connected) make for optimal family functioning. The extremes or unbalanced levels (disengaged or enmeshed) are generally seen as problematic for relationships over the long term (Olson, 1999). †¢Flexibility:This is the amount of change in its leadership, role relationships, and relationship rules. The specific concepts include leadership (control, discipline), negotiation styles, role relationships and relationship rules. The focus of flexibility is on how systems balance stability versus change. The four levels of flexibility range from rigid (very low) to structured (low to moderate) to flexible (moderate to high) to chaotic (very high). As with cohesion, it is hypothesized that central or balanced levels of flexibility (structured and flexible) are more conducive to good marital and family functioning, with extremes (rigid and chaotic) being the most problematic for families as they move through their life cycle. Flexibility focuses on the change in a family’s leadership, roles and rules (Olson, 1999). †¢Communication:This aspect is considered critical for facilitating movement on the other two dimensions. Because it is a facilitating dimension, communication is not graphically included in the model along with cohesion and flexibility. Communication is measured by focusing on the family as a group with regard to their listening skills, speaking skills, self-disclosure, clarity, continuity tracking, and respect and regard. In terms of listening skills, the focus is on empathy and attentive listening. Speaking skills include speaking for oneself and not speaking for others. Self-disclosure relates to sharing feelings about self and the relationship. Tracking is staying on topic, and respect and regard relate to the affective aspect of the communication and problem solving skill in couples and families and have found that balanced systems tend to have very good communication, whereas unbalanced systems tend to have poor communication (Olson, 1999). Circumplex Model: Couple and Family Map The three dimensional Family Circumplex Model Each of the dimensions in the Circumplex Model are key elements in the how Olson’s view of marriage and family are based. Olson believes that the way families interact with each other is based on togetherness, flexibility, and communication. Studying and evaluating these areas can lead to answers and solutions of troubled families and marriages. Treatment Planning Using the Circumplex Model The Circumplex Model has been a useful tool in the treatment process of helping dysfunctional families. A major job for research outcomes is to determine which elements of intervention are most appropriate and effective with which presenting problems and with which elements of family functioning (Olson, 1999). This model was formulated to lead families towards more functional patterns and rise above behavior what is not socially correct or accepted. The model provides a conceptual framework for assessing family system functioning on two dimensions of family organization: cohesion and flexibility (Olson, 1999). Families that are monitored under the Circumplex Model from either extreme intervention strategies can be set in place to guide them towards a more balanced system in a step by step process. Clinicians need to be very attentive to prevent wavering that can occur. The clinician has to evaluate and rate each aspect of the treatment process in order to affectively rank the family or couple in the model. In doing this, the clinician has to determine which area is the outweighing factor that is causing the most conflict in the family. Using the Circumplex Model in my Practice After careful research and studying of the Circumplex Model, I have found the components of the model to be quite interesting. It is believed that the model, if careful used and used in depth to assess issues of family and marriage can be very useful in determining the root cause of the dysfunction that the family is stricken by. I personally would attempt using the Circumplex Model once I have become a therapist because I believe it would lead me to ways that can shed light on key causes of family problems and possibly could be a path to other therapeutic processes to help the client. Because I believe that this model does pin point problems of clients whether there is a lack of togetherness, too much togetherness, a lack of flexibility or too much flexibility, or a lack of communication, this model provides enough information to give the necessary treatment to help clients overcome their problems. Conclusion The Circumplex Model of Marriage and Family ultimate goal is to bridge the gap between research, theory, and clinical practice (Olson, 1999). It is designed for clinical assessments and treatment planning with couples and families. Through the three dimensions of cohesion, flexibility, and communication, studies are performed to evaluate the extremities of each dimension thus, shedding light on what the family or couple maybe lacking or overly possessing. Clinicians must have a central goal of the presenting problem and symptoms of family members to achieve intervention focuses on changing a dysfunctional type of couple or family system (Olson, 1999). The basic assumption is that the current pattern of interaction in the family system dynamics are helping to maintain symptomatic behaviors (Olson, Gorall, 2006). Before the problems of the families and marriages can be alleviated, the current pattern of interaction in the family needs to be changed. The Circumplex Model of Marriage and Family can be very helpful to clinicians in providing treatment and very beneficial to clients who maybe seeking assistance to resolve matters in his or her family structure of marriage. References FACES IV & the Circumplex Model, David H. Olson & Dean Gorall, 2006 www. lifeinnovations. com Circumplex Model of Marital & Family Systems, David H. Olson, 1999

Wednesday, October 23, 2019

Statement of Intent

Statement of Intent The title of my Final Major Project is â€Å"Military Hero†. I will focus on the area of fashion and will work towards producing a small capsule collection consisting of a jacket/coat and a dress that I hope to create and display on show. It will be based around the ever popular military style; which has always been a favourite of mine. In my pathway project my theme was â€Å"Architecture in Fashion† of where I looked at structure and form, I found this theme to be very broad and endless.I also produced a garment based on the theme of shirt-making for a design competition, as I am progressing to University of Ulster to study the BA Hons Degree in Textile Art, Design and Fashion I feel I have made the right area and theme to work with for this project. I will start by looking at period weapons, medals, and armour of which I will use to produce a range of observational studies at A1 size.As I am focusing on Military Fashion I will take my inspiration from fashion designers Frida Giannini, Christopher Bailey, Alexander McQueen and John Galliano as I find their work and style to have elements of what I’m aiming to achieve as a final outcome for my final major project. I will also refer back to the uniforms worn by the armed forces and paramilitaries of various nations. Fashion magazines and the internet as well as my college’s library are also resources I will use. On completion of my visual recording and references I intend to begin the design cycle of the final outcome.I will start by researching the style of garments I shall design through creating moodboard’s relating to colour, style and my military theme; I will then produce a capsule collection board of fashion designs which I will then develop further. Through completing class critiques I will refer to my peer comments and advice from specialism tutors to make a final decision. Once decided I will move on to creating a pattern that will then lead on to the making of a toile this will help me to make any adjustments needed. After this is completed I will compose the final pieces onto fabric that I have chosen.To make sure I do not have to deal with any complications I aim to do each stage two weeks in advance. All work that I do will be critically evaluated as I go along, this will help me to stay on track and I will also record websites, ideas and my schedule in my daily diary. The military styled capsule collection will be on exhibition and modelled on two size 10 mannequins at my college’s end of year show. I will have couture photography of the garments mounted in the background and will also have my project sketchbook displayed on a plinth.If I have any spare time I will also make myself a top based around my military theme. Appendix Bibliography Books: Antonio Mancinelli, (2010), â€Å"Fashion Box: The Immortal Icons of Style†, Thames & Hudson. Richard Martin, (2001), â€Å"The Fashion Book†, Phaidon. Kr istin Knox, (2010), â€Å"Alexander McQueen: Genius of a Generation†, A & C Black Publishers. Bonnie English, (2010), â€Å"Fashion: The 50 Most Influential Fashion Designers of All Time (Icons of Culture)†, Barrons. Websites: Who What Wear http://www. whowhatwear. com/Style http://www. style. com/ Vogue http://www. vogue. co. uk/ Lookbook http://lookbook. nu/ Fashion Is My Inspiration http://fashionismy-inspiration. blogspot. co. uk/ Polyvore http://www. polyvore. com/ Wikipedia http://www. wikipedia. org/ Trendstop http://www. trendstop. com/ Fashion Era http://www. fashion-era. com/ What I Wore http://whatiwore. tumblr. com/ Gucci http://www. gucci. com/ Fashion Net http://fashion. net/ Style and the City http://www. styleandthecity. com/ Alexander McQueen http://www. alexandermcqueen. co. uk .

Tuesday, October 22, 2019

Social Media ROI How to Prove It With Google Analytics

Social Media ROI How to Prove It With Google Analytics Social media is an essential part of any marketing mix. But, what happens when your boss or client asks you to prove organic ROI for your campaigns? â€Å"I don’t know is not a good enough answer. In fact, â€Å"I don’t know† should not be in the vocabulary of your social media team. Fortunately, you can prove your ROI with some hard work and the right tools. And by the right tools, I mean Google Analytics and . The following blog post is going to walk you through how to: Set up tracking UTM tags on your social media messages. Create a custom report in Google Analytics. Set goals in Google Analytics to track your ROI. This may seem like a daunting task, but once your team falls into a rhythm and starts seeing results, you’ll never look at social media the same way again. How To Prove Your Organic Social Media ROI With Google AnalyticsFirst Things First: Get Your Social Media ROI Report Template Before you continue reading, download our social media channel ROI report template. Itll help you track everything you need to prove to your organization that social media marketing is paying off (and show that youre earning your paycheck). Did You Know†¦ can save you time with our Google Analytics  and bit.ly  integrations by doing all the hard work for you. automatically creates trackable URLs that integrate with your Google Analytics custom reports.Start a trial or schedule a demo today and try it yourself. Why Is Tracking Organic Social Media ROI Important? Your bottom line is the heart and soul of your business. It’s what keeps the doors open and the lights on. Tracking your ROI helps prove to your organization and your clients that investing their dollars in social media campaigns is contributing to that bottom line. It proves beyond a shadow of a doubt that your efforts are worth both your time and your company’s time. Because if your team is investing their precious time in something you can’t prove is working, that’s just a waste of resources. And nobody wants that. If you can't prove your social media marketing is working, then you're just wasting resources.Step 1: Goal Setting In Google Analytics Setting up goals is going to be your first step in using Google Analytics to track your organic ROI. Goals are a way to have Google Analytics record conversions that are being generated from social media. What are conversions? Conversions are an event that is triggered by a customer, audience member or fan following through with an action that you wanted them to take. Conversions can be anything from: Buying a product Signing up for an email list Subscribing to your podcast Downloading an e-book you wrote This list could go on. Setting up goals in Google Analytics allow you easily track those conversions and prove to your team that the messages that you are sending out on your social media channels are driving your customers to take action. To start open your Google Analytics account and scroll down to Admin: Scroll across to Views: Select Goals and then click on Create New Goal: In the new window, name your goal. Be specific and try to remember as you’ll need to search for this name later: Next, you’re going to select your goal type. There are three different goal types in Google Analytics: Custom Template Smart For this example, we’re going to focus on custom goals (destination, duration, pages/screens per session and events): Click Continue and another drop down menu will appear. In this section, you’re going to put in the URL of the landing page that you want your customers to end up on. For example, say that after purchasing a product a thank you landing page appears. If that landing page surfaces it means someone bought something from you. Therefore a conversion that you need Google Analytics to track has happened: Under Value, toggle the button to On and enter the monetary value that your company will earn if that conversion happens: Click Save and your destination goal will be tracked. Step 2: Create Your Custom Report The next step in your social media ROI tracking process involves creating a custom report in Google Analytics that will allow you to easily find and track data coming in from the goals you set up earlier. To start, go back to your home screen and select Customization: Select Custom Reports: Select New Custom Report: Your new report template will appear, and the first thing you need to do is title it: The next step is to add your metrics. First, click +add metric. Then select Goal Conversions: Then find your goal and select the one that says [title of your goal] completions. You need to make sure that it says completions as you’ll want to know how many people went all the way through and converted: The second metric you need to add is the value. Adding only one will give you only half of the metrics you need to see. And the value you’re getting from each conversion is the important part! To add it into your report, select Goal Conversions, then [goal title] value: Now you need to add your dimension drilldowns. First click + Add Dimension, the search for Source: From source, add your second dimension which should be Medium: Your final dimension should be Campaign: Your report should populate and show you all the conversions and the value that you made through people ending on your intended link: Step 3: Set Up Your Custom URL Tags The final step in your process is setting up your URL tags for each of your social media messages. These URL links allow Google Analytics to track where your audience is coming from once they have completed the assigned conversion. To get started,  open this campaign URL  builder from Google Analytics: The second thing you need to do is enter the URL your Google goal is tracking: Next, you need to fill in your campaign Source. This is a vital part of your URL because if you scroll back up to the custom report section, source is part of your drilldown dimensions: Campaign Medium  is the next part of your URL building process and is going to refer to the social channel that your audience is coming from: Campaign Name refers to the keywords that you want this link to rank for in Google Analytics: Campaign Term is used for paid search, and since we’re focusing on organic content, it won’t need to be filled in for this example. Campaign Content is used for A/B testing targeted ads which are also outside our focus for this post. After you have all of that information filled in Google will generate a URL at the bottom of the page. That URL seems long right? That’s where URL shortener like bit.ly come in handy. To use bit.ly  you need to create an account. Once you’re logged in, you’ll see their main page: Paste your link into the bar and copy the shortened URL link: The shortened URL can now be added to your social media messages and tracked by Google Analytics. Recommended Reading: 3 Hidden Google Analytics Reports to Help You Understand Your Audience Step 4: Record Your Results The last step in your ROI tracking process is going to be looking at your report and recording your results after your social media campaign has ended. The first thing you need to do is adjust the time and date on your custom report to reflect the length of your campaign. This can be found in the upper right-hand corner. As you page through your results, look for things like: Total conversions generated Total ROI generated Breakdown of ROI generated per channel Breakdown of conversions generated per channel Use that data to help you adjust your efforts in your next campaign. Recommended Reading: How to Build a Marketing Report Quickly (Free Template) Remember The Report You Downloaded Earlier? Let’s run through that quick. Your social media channel ROI report will allow you to pull the information that you’ve grabbed from Google Analytics and create a robust breakdown of what’s happening on each of your social media channels. In the report you’re going to see a tab for each social channel: Record the name of your campaign in the first column of your report and the dates your campaign ran in the second: The next three columns are going to play a major role in your report. Did you notice the graphs on the left side of your report. These are recording and collecting data based on your messages sent, conversions and ROI. The first graph is gathering data from your total at the bottom of your spreadsheet: As you continue to add numbers for each on of your campaigns, they will adjust and automatically update your graphs. The second graph is a per channel breakdown of each of your campaigns. To edit this chart and add more information your need to click on the graph and then select Chart Design and Select Data: A pop-up window will appear. You need to change the data range by adding the next column of information that you just plugged into the spreadsheet. You can do this by highlighting the new range of data you would like to include: Then you need to rename each campaign that you added to your graph: You will also need to update the Horizontal Axis  labels in the bottom of the pop-up window: Now For A Short Cut Building all those URLs kind of sounds like a time suck right? Granted, it’s a time suck that’s worth it, but what if I told you that has built-in integrations that work with both Google Analytics  and Bit.ly so that all you need to do is set up your goals and custom report in Google? To start you need to turn on both the bit.ly and the Google Analytics integrations. To do this go to Settings and then Integrations: Now that the integrations are turned on Google Analytics will begin to gather data from every social media message you send. To find that data collection, open your analytics account select Acquisition then Campaigns. In campaigns click on to see a full breakdown of your post analytics. It’s that easy. Schedule a demo  and see how can get you moving farther, faster.

Monday, October 21, 2019

How to Fix a Database Connection Error

How to Fix a Database Connection Error You use PHP and MySQL together seamlessly on your website. This one day, out of the blue, you get a database connection error. Although a database connection error could indicate a bigger problem, it is usually a result of one of a few scenarios: Everything Was Fine Yesterday You could connect yesterday and havent changed any code in your script. Suddenly today, its not working. This problem probably lies with your web host. Your hosting provider may have the databases offline for maintenance or because of an error. Contact your web server to see if that is the case and, if so, when they are expected to be back up. Oops! If your database is on a different URL than the PHP file you are using to connect to it, it could be that you let your ​domain name expire. Sounds silly, but it happens a lot. I Cant Connect to Localhost Localhost doesnt always work, so you need to point directly to your database. Often its something like mysql.yourname.com or mysql.hostingcompanyname.com. Replace localhost in your file with the direct address. If you need help, your web host can point you in the right direction. My Host Name Wont Work Double-check your username and password. Then, triple-check them. This is one area people often overlook, or they check so quickly they dont even notice their mistake. Not only do you need to check that your  credentials are correct, you should also make sure you have the correct permissions required by the script. For example, a read-only user cant add data to the database; write privileges are necessary. The Database Is Corrupt It happens. Now were entering the territory of a bigger problem. Of course, if you keep your database backed up regularly, youre going to be all right. If you know how to restore your database from a backup, by all means, go ahead and do it. However, if youve never done this, contact your web host for help. Repairing a Database in phpMyAdmin If you use phpMyAdmin with your database, you can repair it. Before you begin, make a backup of the database- just in case. Log in to your web server.Click the phpMyAdmin iconChoose the affected database. If you only have one database, it should be chosen it by default.In the main panel, you should see a list of the database tables. Click Check All.Choose Repair Table from the drop-down menu.

Sunday, October 20, 2019

Advantages Of Human Resource Planning Business Essay

Advantages Of Human Resource Planning Business Essay Human resource planning is really important that without this all planning will finally end up as a mere guess work. Even if the predictions or forecast is not always successful, it is still needed because the forecasts can be quite useful which will give a basis. Upon this basis it is able to avoid ad hoc problems to an extent. Therefore human resource planning should be articulated along with the organisational planning. A dearth of particular category of employee or particular kind skills will affect the organisation in achieving its goals. Rapid changes in technology, marketing, management etc., will result in need of particular category an skilled persons. Changes within an organization in its design and structure will affect manpower demand. Demographic changes like the altering profile of the manpower in terms of age, sex, education etc. The Government policies in regard to reservation, child labour, working conditions etc. Different labour laws affecting the demand and suppl y of labour. Pressure from trade unions, politicians etc. Advantages of Human Resource Planning: Human Resources Planning (HRP) expects not just the needed quality and quantity of employees instead decide the accomplish plan for all the occasions of human resource management .The major advantages of Human resource planning are: It assures the corporate plan of the firm. The HRP elucidates doubts and alters to the upper limit potential and enables the organization to have right kind of people at right time in right place. It allows background for progress and growth of employees through training, development etc. It aids in anticipating the cost of salary increasing, improved benefits etc. It also helps to predict the cost of pay offs, incentives and all other cost of human resources which facilitates the formulation of budgets in an organization. To forecast the changes in abilities, aptitude and attitude of personnel. It results in the advancement of different origins of human reso urces to encounter the organizational goals and objectives. It also aids in taking measures to amend human resource shares in the form of enhanced output ,business turnover etc It facilities the control of all the functions, operations, contribution and cost of human resources Planning as an organisational business strategy: Planning process in a strategic way is often accomplished by networking with in and outside the organisation. The focus is therefore on strengthening the networking with the internal human resource professionals and external human resource persons which will be rooted in sharing information, technology, tools necessary for planning and development of personnel. The outcome depends on effective implementation of the developed tools and resources needed. Out of these a sustainable and feasible strategy has to be formulated. The most important thing to be noted here is that the strategy formulated should be articulated with the overall business strategy of the orga nisation. For this they will consult different human resource managers and all the line managers in the organisation. In order to ensure highest possible utilization of the tools they will work in close conjunction with the managers. This will be aimed in creating a sound personnel data base and tools for the line managers.

Saturday, October 19, 2019

Non-Western CUltures and Decentering Essay Example | Topics and Well Written Essays - 750 words

Non-Western CUltures and Decentering - Essay Example This gave them advantage over non-westerners in terms of political, military, and economic power. Compared to the modernity of the west, non-western cultures were not able to match up when it comes to technology and communication. As a result, western influence has dominated other cultures. First, there was colonization; which means that western countries expand their territories by occupying indigenous lands. Because of this, westerners were able to further expand their power, profit, and most importantly, they were able to exert their influence over other non-western nations. As western nations progress, non-western cultures struggle to held on to their ways and tradition. In a way, the people become resistant to change and modification of their own culture. Their ways and values handed down from generation to generation were simply incompatible with what the westerners introduce. However, the struggle against western influence had become futile as it cannot be helped that non-western nations are dominated by the west’s influence. The decentering of culture happens when non-western cultures are unable to preserve their cultural identities as a result of foreign influence. Prior to the arrival of the Europeans, African culture was already established throughout the region. Rich traditions and cultural practices were already observed within the African community. While Africans live differently from Europeans, they were able establish a unique civilization in villages which are inhabited by families and village leaders. African culture is characterized by rich display of music, art, and dance. Sayre (2010) described African dance celebrations as the â€Å"stages of human development, the passing of the seasons or stages of the agricultural year†. This means that African nations were agriculturally developed and they do not need to expand their territories for food. Moreover, Hermitt

Friday, October 18, 2019

Playwright discussion Assignment Example | Topics and Well Written Essays - 250 words

Playwright discussion - Assignment Example It is thus the investigators’ strong assertions that no reputable or successful author will create a story not embedded on a blueprint otherwise disjointed and unstable stories will be arguably inevitable hence attracting reviewers to rip such works to shreds. Based on Lenny Bruce’s Comedy gold Performance, the significant of playwright is revealed with respect to its unique and legacy set up. This performance managed to override other performance culminating to ‘standup comedy’. It is embedded on a proactive blueprint making it organized putting ideas cohesively peddled by some problematic guy on stage and cornered at deadlock with the establishment and solely has his wits as the weapon. Bruce climax is interesting as he is delighted by Carnegie Hall being in his palm, being funny with respect to marriage and brilliantly offers poised introduction to political philosophy. Its working playwright has allowed his ideas not to be disjointed and being stable compared to Living Colour’s,’Cult of Personality.’ In a snapshot, playwright is the blueprint that drives story development layers upon layers to weed out chances of disjointed stories and lack of basis for

Seismic action and methods od analysis Dissertation

Seismic action and methods od analysis - Dissertation Example Earthquakes trigger one mode of vibration which is the lowest fundamental mode besides higher modes which take place as a result of tremors. 2.1 Development of Seismic Regulations The Building Seismic Safety Council was put up in 1997 as an affiliate of National Institute of Building Sciences. Its main purpose is to promote safety of the public by providing guidelines to construction, designing, planning, utilization and regulation of buildings. It deals with reduction of risks posed on buildings by earthquakes. The main areas which the Building Seismic Safety Council focuses on are structures, kinds of buildings and related facilities. The Building Seismic Safety Council believes that the level of risks vary and therefore has a versatile approach to seismic safety that considers the risk of each region or community separately. It works together with construction industry, governments, non-governmental organizations and public in general to meet its objectives (Housner, 1990). It adv ocates for earthquake risk reduction measures to be adopted by organizations and institutions. The Building Seismic Safety Council main goals are; to catalyse development of seismic safety, promote use of appropriate seismic voluntary standards, assess implementation of recommendations and find out opportunities for improving regulations on seismic safety. 2.2 Design Seimic Actions Earthquake is a great disaster to lives and economy and there is need for design of buildings and structures which are resistant to seismic actions. The effect of an earthquake can be enormous to the extent that a region may not be able to help itself. Collaboration between architect and engineers in the foundational planning will help bring out an expertise to improve safety. There is lack of structural undertakings to curb seismic hazards in the world. The design of new buildings must be able to significantly counter earthquakes. Most current buildings lack resistance and others even have more vulnerabi lity to earthquakes. 2.2.1 Seismic Zones of Seismicity of Greece Greece experience earthquakes regularly although they are mild and therefore do not cause significant damage. It is an active region with small earthquakes annually. This has made builders in Greece to develop structures that are safe during earthquakes. The neighboring Turkey has less-strict building regulations and small earthquakes normally cause them large damages. Greece faces potential earthquakes from active volcanoes such as Nysiros Volcano. Most of Greece islands also have fault lines align in different directions. Most of Greek earthquakes originate from under seas which shake the surrounding islands. In 1999, the Athens Earthquake affected its outskirts and people killed, others displaced and buildings collapsed. Ancient Greece also faced earthquakes majorly caused by volcanoes (NATO ADVANCED RESEARCH WORKSHOP ON EARTHQUAKE MONITORING AND SEISMIC HAZARD MITIGATION IN BALKAN COUNTRIES & HUSEBYE, 2008). This i ncluded the Eruption of Thira and Earthquake of 365. 2.2.2 Ground Seismic Acceleration Seismic waves move in the ground causing vibration of the crust. This energy causing vibration is continually transmitted anything that is attached to the ground including buildings and structures. The structures are damaged since they resist making sudden change because of their inertial forces. The rate of move of speed of seismic waves on the ground is dependent on some factors. These include; the type

Thursday, October 17, 2019

The concept of corporate social responsibility (CSR) Thesis

The concept of corporate social responsibility (CSR) - Thesis Example Aims and Objectives of the Research Acknowledging the vital role of CSR in the present global economic market, this research intends †¢ To analyze corporate social responsibility †¢ To analyze the impact of CSR to companies in the banking and pharmaceutical sectors of Australia †¢ To evaluate the CSR performance of some banking and pharmaceutical organizations in Australia †¢ To conduct a comparative study of CSR performance of some companies in the banking and pharmaceutical sectors of Australia †¢ To examine the relationship of the CSR performance vis-a-vis the financial performance of the companies †¢ To determine the continued relevance of CSR in the 21st century This research is significant in the face of the controversies surrounding CSR after the Enron, Exxon, BP Shell, and other similar events. Likewise, the research is necessary, as it will provide a conceptual analysis of CSR with the context of the several criticisms in CSR. This is significan t based on the idea that CSR should be given a re-look as it has been used to conceal illicit activities (Lin-Hi, 2009). Moreover, it will help in providing a better understanding of the relationship between CSR and the organization by learning how does CSR contribute both to the growth of the corporations and to the good of the society. Finally, the research is crucial, as it will shed light to the issue whether CSR is still appropriate for the global economic market or there is already a need for a new paradigm (Karnani, 2010; Ries et al, 2005). Research Question This study has one vital problem â€Å"Is there still relevance for CSR in the 21st Century?† In order to address this question, the researcher will be addressing three key sub-questions. These are 1. What is the... This study has one vital problem â€Å"Is there still relevance for CSR in the 21st Century?† In order to address this question, the researcher will be addressing three key sub-questions. These are: 1. What is the nature of CSR? 2. How does CSR shape or influence the importance of an organization? 3. What is the relationship between CSR and CFP? Corporate Social Responsibility (CSR) is an integral part of organizations in the modern era (Hemingway, 2002). It re-affirms the notion that organizations are not removed from the reality of the society where they are incorporated (Crane et al, 2008). Instead, it shows the fact that people have seemed modern organizations as actors in society and as such, are responsible to all the identified stakeholders of the company (Orliztsky, Seigle and Waldman, 2011). In this framework, the literature review will look into the factors that have contributed to the misgivings regarding CSR, the status of the current debates regarding the ‘g oods’ derived from CSR, and the common understanding of CSR. This is important, as it will help clarify any conceptual ambiguities that may be inherent in the concept of CSR, and at the same time, guides in the understanding of CSR within the context of the 21st century â€Å"Great Destruction†. This conceptual clarification will assist in evaluating and determining not only the relationship of CSR with the financial performance and social performance of the organizations, but it will assist in the determination of the continued relevance of CSR in the 21st century.

Explanation of how alcohol is metabolised in a human body Essay

Explanation of how alcohol is metabolised in a human body - Essay Example Acetaldehyde is a poison that is related to formaldehyde. The acetyl acid is a component of vinegar and its radical is the combining form of the acid. The acetyl acid radical combines with Coenzyme A in the formation of acetyl-CoA that goes into the Krebs Cycle that acts as the basic powerhouse in the body of a human being. In the Krebs Cycle, the acetyl acid radical is broken down into water and carbon dioxide. The figure below shows how alcohol is metabolized in a human body When metabolizing alcohol, the human body uses three different enzymes to convert alcohol into acetaldehyde. All the three enzymes work in their different ways to strip two hydrogen atoms from the alcohol molecule. This process converts the alcohol molecule into an acetaldehyde molecule. The acetaldehyde is converted to acetyl radical by a different enzyme. The three enzymes include the alcohol dehydrogenase (ADH), cytochrome P450 (CYP2E1), and catalase enzymes. The three enzymes are found in different parts of the body and handle the hydrogen atoms in different ways. Non-liver tissues, such as the brain metabolize alcohol with Cytochrome and catalase enzymes (Starr, et al., 2008, p. 103). It has been found that some people get intoxicated more than others do, for instance between men and women, East Asians and American Indians, older males, menopausal women and people with liver damage among others. The reason behind this is that women have much lesser alcohol dehydrogenase enzyme in the stomach compared to men. Therefore, women get drunk more than men do when they drink the same amount of alcohol under same conditions. In terms of East Asians and American Indians, they produce ALD2*2 that is less efficient in converting acetaldehyde compared to ALD2. They also have a more efficient alcohol dehydrogenase than any other genetic background. Older males produce less alcohol dehydrogenase and are likely to be more intoxicated than younger men are. Hormone changes in menopausal women make the m become more intoxicated. Therefore, more or less intoxication can be attributed to the production of less or more alcohol dehydrogenase and ALD2*2. This factor is important in traffic accidents because a person may consume a less amount of alcohol but because his body mechanism produces less alcohol dehydrogenase, he or she will become drunk and likely cause an accident. This applies similarly to people who produce ALD2*2 that is less effective in breaking down acetaldehyde. The Breathalyzer is used in measuring the amount of alcohol found in a person’s breath. A Breathalyzer works works in a similar manner to the diabetic testing strips or pool testing kits. It contains a collection gadget; that is, a straw that is attached to a cylinder. The cylinder has two vials that have a solution of potassium dichromate, silver nitrate, sulfuric acid and water. The person being tested blows air into the straw for about 2 to 4 seconds. The air goes through the vials where the silver n itrate will act as a catalyst to initiate and fasten the process. The sulfuric acid eliminates the alcohol from the air and produces the acidic condition that enables the next process to go on. The alcohol is then absorbed into the liquid solution where the potassium dichromate breaks it down into chromium sulfate, acetic acid, water and potassium sulfate. This process causes a color change. The chromium ion is green while the dichromate ion is reddish orange. The color change reflects the amount of alc

Wednesday, October 16, 2019

Landslide Assignment Example | Topics and Well Written Essays - 250 words

Landslide - Assignment Example Road systems following the contouring system created by layered rocks were disrupted as displaced rock continued to consume the width of the roads. The aftermath of the landslide is budgeting to fix the damage which will hinder development of Ohio as a state. While damage to property or injury to humans was not registered, disruption of the road system continues to mount economic setbacks (Ohio State Wide Imagery Program 1). The affected area is made up of colluvium above the geologic formations like the Ordovician age Kope formation. With retreating glaciers from previous glacial ages, clayey is deposited around lakes formed as a result. The instability of the underlying rock is caused by the weakening bonds between the retreating solid ice and the spaces existing between the particular structures of the underlying rock. The forces associated with the contextual landslide involve gravitational pull of dense earth as opposed to the underlying weak bedrock (Ohio State Wide Imagery Program, 1). The dense and heavier surface slides over the weak bed rock or exerts pressure on it resulting into a horizontal

Explanation of how alcohol is metabolised in a human body Essay

Explanation of how alcohol is metabolised in a human body - Essay Example Acetaldehyde is a poison that is related to formaldehyde. The acetyl acid is a component of vinegar and its radical is the combining form of the acid. The acetyl acid radical combines with Coenzyme A in the formation of acetyl-CoA that goes into the Krebs Cycle that acts as the basic powerhouse in the body of a human being. In the Krebs Cycle, the acetyl acid radical is broken down into water and carbon dioxide. The figure below shows how alcohol is metabolized in a human body When metabolizing alcohol, the human body uses three different enzymes to convert alcohol into acetaldehyde. All the three enzymes work in their different ways to strip two hydrogen atoms from the alcohol molecule. This process converts the alcohol molecule into an acetaldehyde molecule. The acetaldehyde is converted to acetyl radical by a different enzyme. The three enzymes include the alcohol dehydrogenase (ADH), cytochrome P450 (CYP2E1), and catalase enzymes. The three enzymes are found in different parts of the body and handle the hydrogen atoms in different ways. Non-liver tissues, such as the brain metabolize alcohol with Cytochrome and catalase enzymes (Starr, et al., 2008, p. 103). It has been found that some people get intoxicated more than others do, for instance between men and women, East Asians and American Indians, older males, menopausal women and people with liver damage among others. The reason behind this is that women have much lesser alcohol dehydrogenase enzyme in the stomach compared to men. Therefore, women get drunk more than men do when they drink the same amount of alcohol under same conditions. In terms of East Asians and American Indians, they produce ALD2*2 that is less efficient in converting acetaldehyde compared to ALD2. They also have a more efficient alcohol dehydrogenase than any other genetic background. Older males produce less alcohol dehydrogenase and are likely to be more intoxicated than younger men are. Hormone changes in menopausal women make the m become more intoxicated. Therefore, more or less intoxication can be attributed to the production of less or more alcohol dehydrogenase and ALD2*2. This factor is important in traffic accidents because a person may consume a less amount of alcohol but because his body mechanism produces less alcohol dehydrogenase, he or she will become drunk and likely cause an accident. This applies similarly to people who produce ALD2*2 that is less effective in breaking down acetaldehyde. The Breathalyzer is used in measuring the amount of alcohol found in a person’s breath. A Breathalyzer works works in a similar manner to the diabetic testing strips or pool testing kits. It contains a collection gadget; that is, a straw that is attached to a cylinder. The cylinder has two vials that have a solution of potassium dichromate, silver nitrate, sulfuric acid and water. The person being tested blows air into the straw for about 2 to 4 seconds. The air goes through the vials where the silver n itrate will act as a catalyst to initiate and fasten the process. The sulfuric acid eliminates the alcohol from the air and produces the acidic condition that enables the next process to go on. The alcohol is then absorbed into the liquid solution where the potassium dichromate breaks it down into chromium sulfate, acetic acid, water and potassium sulfate. This process causes a color change. The chromium ion is green while the dichromate ion is reddish orange. The color change reflects the amount of alc

Tuesday, October 15, 2019

Political Economy Essay Example for Free

Political Economy Essay Approaches to study of Politics Falls under Political Science We’re made to do the impossible Summary 1 paragraph will do. Provide the insight -Data -Theory used -approach used use other references to prove your point 3 x 5 Surname all caps first name email address mobile number On approach deals with different meaning of politics Political Science What is Politics its scope ? Banned words Politics is dirt Politics is nothing more than a means of rising in the world Samuel Johnson Systematic organization of hatred Henry Adams Art of governing mankind by deceiving them. BASIS of POLITICS Intellect and Will Man Capable of Thinking Politics as a rational activity Man has the capacity to think and realize his wants, needs and interest which are potentially in conflict with others’ wants, needs, and interests. Man cannot survive on its own. He needs someone else Politics as a social activity 2 or more persons Politics as a social activity 2 or more persons Associate with society Politics is concerned with social dynamics. POLITICS AS THE ART OF GOVt What concerns the state Study of government and exercise of authority Authoritative allocation of social values Framework Definition does not provide David Easton Authoritative binding to all Allocation done by the government Social Values anything held important by society budget allocation, privatization, elections Henry Mayo 3 characteristics that separate the political from non-poitical Politics is focused on the governing function through which are: Limitation on Easton on Mayo’s concept of Politics POLITICS DOES NOT ONLY HAPPEN IN THE GOVERNMENT POLTICS AS PUBLIC AFFAIRS State DIFFERENCE OF GOVERNMENT AND PUBLIC AFFAIRS PUBLIC PRIVATE State Civil Society Institutions of the State ( apparatus of government, infrastructure, economy, taxes Autonomous bodies (family, kinship groups, private businesses, trade unions Funded at the public’s Expense Set up and funded by individual citizens Responsible for the collective organization of community life Responsible for the satisfaction of own interests rather than the interest of the larger society. Private with this definition EX: RH Bill It should not be affair of the government. Public Sphere vs Private Sphere Restricted to the acitivites of the state itself and the responsibilities that are properly exercised by public bodies Politics should not meddle on personal affairs and institutions POLITICS AS COMPROMISE CONSESUS A daily activity in which differing interests within a given unity of rule are conciliated by giving them a share in power in proportion to their role in the welfare and the survival of the community Bernard Crick Everything will just be fine – for no matter big or small the dispute is, at the end of the day we will just arrive in a compromise. Assumption: Conflict is inevitable Resolving conflict through compromise conciliation and negotiation, rather than violence and coercion. Not limited to government POLITICS IS INEVITABLE LINKED TO THE PHENOMENA OF CONFLICT COOPERATION Politics as master science Why Make use other things to make things in order. Existence of rival opinions- conflict People recognize that they have to work with others cooperation Hannah Arendt- Acting in Concert Otto Von Bismarck- Politics is the art of the possible. POWER AS POWER DISTRIBUTION OF RESOURCES What is power? X has power over Y insofar as Robert Dahl X is able, in one way or another, to get Y to do something That is more to X’s liking And which Y would not otherwise have done. Faces of Power As decision-making – you shape there decisions As agenda setting – You are preventing the person to make a decision As thought control- You are imposing your preference in an indirect or subtle way. Definition of Politics through POWER and allocation of resources FIND THE FOLLOWING QUOTES OF FAMOUS SCIENTISTS Adrian Leftwich- Politics is at the heart of all collective social activity, formal and informal, public and private, in all human groups, institutions and societies. Harold Lasswell Politics is, in essence power: the ability to achieve a desired outcome, through whatever means. Kate Millett â€Å"Politics is a power-structured relationships, arrangements whereby one group of persons is controlled by another. â€Å"POLITICS†- as the constrained use of social power. Robert Goodin Hans- Dieter Klingemann Constrained because there are already laws establish. Politics takes place in all social activities; politics happen at every level of social interaction Politics concern production, distribution and use of resources in the course of social existence. -Ability to achieve a desired outcome, through whatever means . Approaches to the study of Politics Ontology- the nature of being Epistemology -How do you know what we know? Theoretical – concept idea Empirical- Evidence, observation History- both theory and experience Methodology How do we exactly know what we know

Monday, October 14, 2019

Risk Management of Terminal Development at Airport

Risk Management of Terminal Development at Airport Dissertation Objectives Investigate the problems at the terminal 5 opening, especially with the baggage handling system despite extensive simulated testing using thousands of bags and more than two thousand volunteers in the run up to the opening of T5 Identify the necessary risk strategies to be considered for such mega-projects, the benefits of such approaches, taking into account previous failed and successful projects, and any lessons to be learnt Discuss the implementation approach adopted by BAA and the risk associated with this approach Provide formative evaluation summarising key findings and conclusion based on evidence gathered from research T5 Synopsis The terminal 5 project in addition to being a statement of intent for the future of British aviation was built with the aim of improving customer experience and to exhibit Heathrow as a world class international airport. The baggage handling system at T5 was designed to be the largest baggage handling system in Europe for a single terminal. The system consists of a main baggage sorter and a fast track system. The system was designed by an integrated team from BAA, BA and Vanderlande Industries of the Netherlands, with the aim of handling both intra-terminal and inter-terminal luggage. Its processing capacity was intended to be 70,000 bags a day. Bags are meant to undergo several processes on the way through the system, these include; automatic identification, explosives screening, fast tracking for urgent bags, sorting and automatic sorting and passenger reconciliation. The scheduled completion and opening date was March 2008, and T5 was on time and on budget. This was a remarkable achievement especially in a sector where project delays and vast overspends are commonplace (the Millennium dome, Wembley stadium and the Scottish Parliament buildings were all opened late and cost a lot more than the original estimate). However, on its first day in operation, T5s bespoke baggage system was affected by technical software problems, which led to a number of issues, such as cancelled flights, lost baggage, and substantial delays, but more importantly, BAs challenge were its people issues and integrating teams of staff. Initial reports suggest that the day one issues were less to do with technology issues and more to do with inadequate staff training, and this was not just for one group of people but at all levels. Below is a summary of its problems on the opening day: Hundreds of staff found it difficult finding the staff car park entrance Check-in staff struggled with their systems, these problems ranged from very simple tasks such as logging into the baggage system to complex tasks Security personnel who were totally ignorant of their new roles and had to be taken through new procedures in the morning in front of passengers Ground staff and crews and ground staff getting lost in the huge building Baggage handlers struggled to get a hang of the new baggage system Baggage truck drivers got lost within the terminal and needed directions to the aircraft Baggage drivers and handlers could not get luggage from the conveyors to the gates On nine occasions, inspectors from the department of transport had managed to bypass security checks during trials of the terminals new systems and that the terminals alarm system was not working properly Going through these problems therefore suggest that the entire problem was down to lack of adequate training or simply inappropriate appraisal of risk involved. This is very surprising as this was a very high profile project and taking into account that this was a simple 3 team process get baggage, take baggage to aircraft and load baggage onto aircraft. Training System Testing Prior to Opening Based on initial interviews with BAs CIO, it would suggest that the human elements were given the importance it required. BAs CIO, Paul Coby told CIO UK [in March 2007] â€Å"the IT work to support such a large-scale, new-build project was also going well. â€Å"Devices are deployed, connections are being integrated and 2007 will be testing year. The airline is moving onto the T5 systems, so they run for a year ready to operate at the new terminal when it opens in 2008†. According to XXXXX, in the run up to the opening of T5 there were a series of overnight baggage-systems tests using thousands of bags, up to 2000 volunteers and full trials of the check-in procedure for all the IT systems. According to the spokesman for Vanderlande Industries, in testing the baggage handling system, emulation models were utilized broadly to test the low-level controls software, while computer programs took the place of the baggage handling system, and which behave (almost) the same as the part they replace. The report also suggests that for the high-level controls software, the emulation model was broadened by connecting the loose individual models into a large integrated system in which the physical equipment was replaced by a number of interconnected emulation models. According to a number of the volunteers who tested the system prior to its opening commented that the demos were extremely impressive and felt the system was ready in advance of its opening. T5 System Simulation Prior to Opening According to the spokesman for Vanderlande Industries, low-level emulation models were utilized in place of the physical transport equipment in each of the conveyor lines. The low and high level models that were developed produced the same electrical outputs in response to the same electrical inputs as their corresponding physical equivalent (motors, photo-electric cells, barcode scanners, etc), which in the view of both the software developers and management of BA, proof of extensive system testing. System interaction was facilitated with the use of control panels, and with the right frequency, set of bags or multiple bags were generated. During the testing, the conveyor motors were stopped and started utilizing different scenarios in order to generate as much errors as possible with the hope of fixing them. The spokesman also stated that the transport time between two photocells in emulation was equal to the actual time using the real equipment. The same measurement also applied to the total transport time. In addition, during testing the T5 project, over 90 individual low-level emulation models were created as individual models were integrated into 5 different configurations. A separate team spent 4800 hours on building and testing these emulation models. Questions: Training Testing But the first set of questions now has to be asked: how adequate was the tests and training were carried out in relation to T5s baggage systems in advance of the opening? What were the results? What were the problems revealed? and what steps were taken to resolve the problems revealed? Were the tests re-run and, if so, what was the result? Was the right implementation strategy adopted? Or would it not have been better to open Terminal 5 on a phased basis, to make sure that all its systems were working before going fully operational? The second set of questions to be asked would be: knowing that extensive simulation testing was carried out on the baggage system successfully; doesnt that then suggest that carrying out simulated testing without the real customers is inadequate? With regards to the people issues, what sort of dry runs were carried out? If they were indeed adequate, why were the opening day hiccups not identified? Where there extra staff or volunteers in anticipation of potential glitches? If yes were these trained adequately? For every eventuality or possible scenario, what were the contingency plans? In spite of the extensive testing carried out on the baggage system and the confidence which this would have placed on top management, from the experience on the opening day, we can conclude that in reality, the prospects of operating an airport terminal of such magnitude and scale would require more than simulated testing as the operations are virtually impossible to fully replicate. This then suggests that the risk management utilized by the BA was not robust to take the people issues into account. Good risk management might have come to the conclusion, if there was the possibility of failure. Risk Management: Definitions In order to manage risks we have to understand what a risk is. Smith and Merrit (2002) said that three essential aspects of risk are uncertainty, loss and time, see Figure 1. Uncertainty: A project manager has to identify as many uncertainties as possible. A risk may or may not happen. This inherent uncertainty cannot be eliminated, but it can be made little clearer by clarifying the probability of occurrence of the risk, to get at better understanding of the consequences and alternatives if the risk occurs and determine the factors that influence the magnitude and likelihood of occurrence of the particular risk. This means that an uncertainty can never be completely eliminated, but it can be reduced to a level the project find tolerable. This means that even with the best plans there cannot be any guarantees that there will be no surprises [3]. Loss: A risk is always something that involves some kind of loss. If there is no loss possible, then the project is not concerned about the risk, because it cannot compromise the project [3]. Time: Associated with every risk there is a time where the risk no longer exists. Either the risk has occurred and the loss has been suffered or the potential problems that could cause the risk have been resolved and no longer pose a threat. It is important to know when this time has arrived so the risk can be removed from the agenda [3]. Among writers and in the literature there are differences in the meaning of risk management and risk analysis. Frosdick (1997) says that there are no clear views of the differences and what one writer defines as risk management another writer is calling it risk analysis. Frosdick‘s own view is that he separates them by saying that risk analysis is the sum of the processes of risk identification, estimation and evaluation and risk management is about planning, monitoring and controlling activities that are produced by the risk analysis activity. The Association for Project Management (Chapman, Simister 2004) definition of risk analysis is similar to Frosdick‘s, they have however divided the risk analysis into two stages. The first stage is called the Qualitative Analysis and it is where risks are identified and subjectively assessed. These identified risks are then analysed in terms of e.g. cost and time estimates and that is called the Quantitative Analysis. Just like for Frosdick it is then followed by the risk management process. In their definition it is the process of formulating responses, both proactive and reactive ones. Pennock Haimes (2001) said that risk management could be represented in six steps, three each for risk assessment/analysis and risk management, where each step is a question. Risk assessment/analysis What can go wrong? Identify as many risks as possible. The risks can be of any kind financial, time, resources etc. and no risk is too small to not be included [3]. What is the likelihood for the risk to occur? Try to measure how likely, or unlikely, it is for the risk to occur. Maybe some risks are dependent on each other [3]. What are the consequences? What will be the impact on the project if the risk occurs, is it a minor risk or maybe a stopping fault that endangers the whole project [3]. Risk management What can be done and what options are available? How to decrease the chance of a risk occurring, for example get more resources or have them readily available [2,3]. What are the tradeoffs in term of all costs, benefits and risks among the available options? For every risk there is somewhere a limit for how costly measures one can put in, where there is no economy in putting in more measures. Often the budget is not enough to eliminate all risks therefore one must choose which risks to put more emphasis on [2,3]. What are the impacts on current decisions on future options? [3] The official definition provided by Professor James Garven, University of Texas at Austin is from the American Risk and Insurance Association: Risk management is the systematic process of managing an organizations risk exposures to achieve its objectives in a manner consistent with public interest, human safety, environmental factors, and the law. It consists of the planning, organizing, leading, coordinating, and controlling activities undertaken with the intent of providing an efficient pre-loss plan that minimizes the adverse impact of risk on the organizations resources, earnings, and cash flows. Another definition given by Larry Krantz, Chief Executive of Euro Log Ltd in the UK, states that A risk is a combination of constraint and uncertainty. We all face constraints in our projects, and also uncertainty. So we can minimise the risk in the project either by eliminating constraints (a nice conceit) or by finding and reducing uncertainty []. The objectives of risk management/analysis The Association for Project Management (Chapman, Simister 2004) defines Risk Management/Analysis as a process designed to remove or reduce the risks that threaten the achievement of project objectives. Properly undertaken it will increase the likelihood of successful completion of a project in terms of cost, time and performance objectives. PMBOK (PMBOK Guide, 2004) describes it similarly where they say that the objectives of project management are to increase the probability and impact of positive effects and decrease the probability and impact of events adverse to project objectives. Kendrick (2003) list seven benefits on the use of risk management: Project Justification: Project risk management is undertaken primarily to improve the chances that a project will achieve its objectives. While there are never any guarantees, broader awareness of common failure modes and ideas that make projects more robust can significantly improve the odds of success. The primary goal of project risk management is either to develop a credible foundation for each project, showing that it is possible, or to demonstrate that the project is not feasible so that it can be avoided, aborted, or transformed [1]. Lower Costs and Less Chaos: Adequate risk analysis reduces both the overall cost and the frustration caused by avoidable problems [4]. The amount of rework and of unforeseen late project effort is minimised. Knowledge of the root causes of the potentially severe project problems enables project leaders and teams to work in ways that avoid these problems. Dealing with the causes of risk also minimises fire-fighting and chaos during projects, much of which is focused short-term and deals primarily with symptoms rather than the intrinsic sources of the problems [1]. Chadbourn (1999) describes it similarly when he likened the uncertainties to chaos, where a poorly designed project could be described as a room full of mousetraps, each with a ping pong ball [5]. Before you know it, someone not under your control tosses in the first ball, thus mayhem and chaos erupts [5]. In the ideal project the mousetraps are gone. In their place there is a network of dominos, where each action and reacti on could be foreseen [5]. It is within the role of organisations to try and identify these mousetraps and replace them with an orderly string of dominos [5]. Project Priority and Management Support: Support from managers and other project stakeholders and commitment from the project team are more easily won when projects are based on thorough, understandable information [11]. High-risk projects may begin with lower priority, but a thorough risk plan, displaying competence and good preparation for possible problems, can improve the project priority [11]. Whenever you are successful in raising the priority of your project, you significantly reduce project risk—by opening doors, reducing obstacles, making resources available, and shortening queues for services [11]. Project Portfolio Management: Achieving and maintaining an appropriate mix of ongoing projects for an organisation uses risk data as a key factor. The ideal project portfolio includes both lower- and higher-risk projects in proportions that are consistent with the business objectives [13]. Fine-Tuning Plans to Reduce Risk: Risk analysis uncovers weaknesses in a project plan and triggers changes, new activities, and resource shifts that improve the project. Risk analysis at the project level may also reveal needed shifts in overall project structure or basic assumptions [14]. Establishing Management Reserve: Risk analysis demonstrates the uncertainty of project outcomes and is useful in setting reserves for schedule and/or resources. Risky projects really require a window of time (or budget), instead of a single-point objective. While the project targets can be based on expectations (the most likely versions of the analysis), project commitments should be established with less aggressive goals, reflecting overall project risk. The target and committed objectives set a range for acceptable project results and provide visible recognition of project risk [18]. Project Communication and Control: Project communication is more effective when there is a solid, credible plan. Risk assessments also build awareness of project exposures for the project team, showing how painful the problems might be and when and where they might occur. This causes people to work in ways that avoid project difficulties. Risk data can also be very useful in negotiations with project sponsors. Using information about the likelihood and consequences of potential problems gives project teams more influence in defining objectives, determining budgets, obtaining staff, setting deadlines, and negotiating project changes [18]. Risk Assessment Risk Control There are two stages in the process of Project Risk Management, Risk Assessment and Risk Control. Risk Assessment can take place at any time during the project, though the sooner the better. However, Risk Control cannot be effective without a previous Risk Assessment. Similarly, most people tend to think that having performed a Risk Assessment, they have done all that is needed. Far too many projects spend a great deal of effort on Risk Assessment and then ignore Risk control completely [19]. Risk Assessment has three elements: Identify Uncertainties In this element, the entire project plans are explored, with special focus on areas of uncertainty [20]. Analyse Risks In this element, the requirement is to specify how the areas of uncertainty will have an impact on the performance of the project, either in duration, cost or meeting the users requirements [20]. Prioritise Risks At this stage the requirement is to establish which of the Risks identified should be eliminated completely [20]. This step is only is carried out due to the potential extreme impact, which should have regular management attention, and which are sufficiently minor to avoid detailed management attention [20]. In the same way, Risk Control has three elements, as follows: Mitigate Risks According to Mobey et al (2002), risk mitigation would include taking the necessary actions that are possible in advance to reduce the effect of Risk. It is better to spend money on mitigation than to include contingency in the plan [20]. Plan for Emergencies For all those Risks which are deemed to be significant, have an emergency plan in place before it happens [19]. Measure and Control This involves tracking the effects of the risks identified and managing them to a successful conclusion [19]. Different strategies There are different strategies and methods that have different approaches toward risk management. JISC (Joint Information Systems Management) says that the focus for risk management should be on risks related to the particular project, not project management in general (http://www.jisc.ac.uk/proj_manguide15.html). The overall goal according to Kendrick (2003) for risk management in a single project is to establish a credible plan consistent with business objectives and then to minimise the range of possible outcomes. That is why risk management in a project is about identifying potential risks, analyse the ones that have the greatest likelihood of occurring, grade their different levels of impact on the project and define a plan of how to avoid the risk and if it occurs how to reduce its impact (Heldman, 2005). Smith Merrit (2001) sees risk strategy as a five step process. Figure 3 shows the flow through the five-step process and lists deliverables from each step: Step 1: Identify risks that you could encounter across all facets of the project [28]. Step 2: Analyse these risks to determine what is driving them, how great their impact might be, and how likely they are [28]. Step 3: Prioritise and map the risks so that you can choose those most important to resolve [28]. Step 4: Plan how you will take action against the risks on this short list [28]. Step 5: On a regular basis, monitor progress on your action plans, terminate action plans for risks that have been adequately resolved, and look for new risks [28]. Frosdick (1997) also mentioned Strutt‘s, definition of the concept of risk analysis that is a seven stage process. Systematic assessment (item by item question every part of the system) [13]. Identification of risks [13]. Assessment of risks (frequencies and consequences) [13]. Establish acceptable/tolerable levels of risk [13]. Evaluate the risks. Are they acceptable? Can they be reduced and at what cost? Determine whether the risks are as low as reasonably practicable [13]. Determine risk reduction measures where appropriate [13]. Risk Assessment Evaluation There are many ways and different techniques to evaluate what the risks are, what the effect they have on the project and what measures can be put in if the risks should occur [19]. Risk assessment is by most people divided into two areas, Quantitative Risk Analysis and Qualitative Risk Analysis. Quantitative In its most basic form the formula for risk quantification is: à ¢Ã¢â€š ¬Ã¢â‚¬ ¢Rate of occurrenceà ¢Ã¢â€š ¬Ã¢â‚¬â€œ multiplied by the à ¢Ã¢â€š ¬Ã¢â‚¬ ¢impact of the eventà ¢Ã¢â€š ¬Ã¢â‚¬â€œ = risk. Methods based on this method are often called à ¢Ã¢â€š ¬Ã¢â‚¬ ¢expected value analysisà ¢Ã¢â€š ¬Ã¢â‚¬â€œ and include models like Annualized Loss Expectancy (ALM), the Courtney formula, the Livermore Risk Analysis Methodology (LRAM) and Stochastic Dominance (Snyder, Rainer Jr., Carr 1991). The advantages of Quantitative Risk Analysis methodologies are that they are good at identifying the most critical areas that, if something happens, will have the largest impact on the project. There are also disadvantages to Quantitative Risk Analysis. When one measures the probability of damage to the project the quantitative approach tends to average the events leading up to a problem (Snyder, Rainer Jr, Carr 1991). Qualitative Qualitative methods attempts to express risks in terms of descriptive variables rather than an economic impact. These approaches are based on the assumption that certain threat or loss of data cannot be appropriately expressed in terms of dollars or pounds and that precise information is impossible to obtain. These methodologies include Scenario Analysis/Planning, Fuzzy Metrics and questionnaires (Snyder, Rainer Jr., Carr 1991). The advantages of Qualitative Risk Analysis methodologies are that they save time, effort and expense over quantitative methods. This is because assets do not need exact values in dollars or pounds nor do threats need to have exact probabilities. It is also a valuable methodology in identifying significant weaknesses in a risk management portfolio. There are disadvantages with this method as well. Qualitative Risk Analysis is inexact, the variables used (e.g. low, medium and high) must be understood by all parties involved (Snyder, Rainer Jr., Carr 1991). Risks Reduction Once risks have been identified and evaluated they have to be responded to in some way. Wideman (1992) lists seven basic responses on identified risks: Recognised but no action taken (absorbed as a matter of policy) Avoided (by taking appropriate steps) Reduced (by an alternative approach) Shared (with others, e.g., by joint venture) Transferred (to others through contract or insurance) Retained and absorbed (by prudent allowances) Handled by a combination of the above Dorfman (1997) says that all techniques to manage the risk fall into one or more of these four major categories (remembered as the 4 Ts): Tolerate (aka Retention) Treat (aka Mitigation) Terminate (aka Elimination) Transfer (aka Buying Insurance) Bliss (2005) listed these five types of similar risk responses as Dorfman and Wideman. Risk avoidance: Also known as risk removal or risk prevention, risk avoidance involves altering the original plans for the project so that particularly risky elements are removed. It could include deciding not to perform an activity that carries a high risk. Adopting such avoidance techniques may seem an obvious way to deal with all risks. However, often the areas of the project that involve high risks are also the areas of the project that potentially contain the highest worth or the best value for money. Avoiding such risks may also result in removing potentially the best bits of a resource, and an alternative strategy that retains these risks may be more appropriate [13]. Risk reduction: Risk reduction or risk mitigation involves the employment of methods that reduce the probability of a risk occurring, or reducing the severity of the impact of a risk on the outcome of the project. The loss of highly skilled staff is a considerable risk in any project and not one that can be totally avoided. Suitable risk mitigation could involve the enforcement of a notice period, comprehensive documentation allowing for replacement staff to continue with the job at hand and adequate management oversight and the use of staff development programmes to encourage staff to stay [20]. Risk transfer: Risk transfer moves the ownership of the risk to a third party normally by contract. This also moves the impact of the risk away from the project itself to this third party [20]. Risk deferral: The impact a risk can have on a project is not constant throughout the life of a project. Risk deferral entails deferring aspects of the project to a date when a risk is less likely to happen. For example managing the expectations users have about the content and delivery of a resource can be time-consuming, one way to reduce this risk is by not making a web resource available until user testing is complete [20]. Risk retention: Whilst a certain number of the risks to the project originally identified can be removed by changing the project plan or dealt with by transferring the responsibility of the risk to third parties inevitably certain risks have to be accepted as a necessary part of the project. All risks that have not been avoided or transferred are retained or accepted risks by default [20]. Previous Successful Project: St Pancras International Rail Station According to XXXXXX, before St Pancras International rail station was opened; a number of days were devoted to testing all the systems and processes, using an army of thousands of volunteer passengers. These tests were carried out much before the opening day, thus providing enough time to resolve issues that might have occurred during testing [26]. By carrying out the testing in phases much long before the opening, members of staff were able to familiarize themselves with the systems and get actual hands-on experience before the station was opened to Eurostar traffic. Dry-runs were carried out as well with the vital lessons were learnt and adjustments made before exposing paying customers to the St Pancras experience. Inevitably the result was that on the opening day, everything went without glitches on the first day of international service [26]. Previous Failed Project: Denver International Airport The Denver International Airport was scheduled to open on October 31, 1993 with all three of its concourses fully running on the BAE automated baggage handling system that. On February 28, 1995, the new airport finally opened. Its opening came sixteen months late. The automated baggage system was supposed to improve baggage handling by using a computer tracking system to direct baggage contained in unmanned carts that run on a track. BAE systems presented the City of Denver with a proposal to develop â€Å"the most complex and automated [and integrated] baggage system ever built. Original target opening date for the airport was (delayed seven times over the next three months). City of Denver invited reporters to observe the first test of the baggage system without notifying BAE. This was a public disaster! Reporters saw piles of disgorged clothes and other personal items lying beneath the Telecars tracks. Lots of mechanical and software problems plagued the automated baggage handling system. When the system was tested, bags were misloaded, sent to different routes, and fell out of automated telecarts, thus causing the system to jam. The automated baggage system still continued to unload bags even though they were jammed on the conveyor belt, because the photo eye at this location could not detect the pile of bags on the belt and hence could not signal the system to stop. Main Lessons One of the lessons BA and BAA might have been learnt from the Denver project, was that BAE actually built a prototype of the automated baggage handling system in a 50,000 sq. ft. warehouse near its manufacturing plant in Texas. But as similar to the T5 project, there was no evidence of adequate training and the results from simulation testing has been proven to be different to a real world scenario with real customers. I addition, research also shows that BAE had given an initial estimate of at least a year to test the system and get the system up and running, but United airlines and the other stakeholders pressed for a much shorter timeframe. City of Denver got the same story from technical advisers to the Franz Joseph Strauss airport in Munich (that less complicated system had taken 2 years testing and was running 24 hours a day for 6 months before the airport opened. Risks recognised early in the Project Very large scale of the project. Enormous complexity. Newness of the technology. Large number of entities to be served by the system. The high degree of technical and project definition uncertainty. Risk Identification PMBOK (PMBOK Guide, 2004) lists five tools and techniques for risk identific Risk Management of Terminal Development at Airport Risk Management of Terminal Development at Airport Dissertation Objectives Investigate the problems at the terminal 5 opening, especially with the baggage handling system despite extensive simulated testing using thousands of bags and more than two thousand volunteers in the run up to the opening of T5 Identify the necessary risk strategies to be considered for such mega-projects, the benefits of such approaches, taking into account previous failed and successful projects, and any lessons to be learnt Discuss the implementation approach adopted by BAA and the risk associated with this approach Provide formative evaluation summarising key findings and conclusion based on evidence gathered from research T5 Synopsis The terminal 5 project in addition to being a statement of intent for the future of British aviation was built with the aim of improving customer experience and to exhibit Heathrow as a world class international airport. The baggage handling system at T5 was designed to be the largest baggage handling system in Europe for a single terminal. The system consists of a main baggage sorter and a fast track system. The system was designed by an integrated team from BAA, BA and Vanderlande Industries of the Netherlands, with the aim of handling both intra-terminal and inter-terminal luggage. Its processing capacity was intended to be 70,000 bags a day. Bags are meant to undergo several processes on the way through the system, these include; automatic identification, explosives screening, fast tracking for urgent bags, sorting and automatic sorting and passenger reconciliation. The scheduled completion and opening date was March 2008, and T5 was on time and on budget. This was a remarkable achievement especially in a sector where project delays and vast overspends are commonplace (the Millennium dome, Wembley stadium and the Scottish Parliament buildings were all opened late and cost a lot more than the original estimate). However, on its first day in operation, T5s bespoke baggage system was affected by technical software problems, which led to a number of issues, such as cancelled flights, lost baggage, and substantial delays, but more importantly, BAs challenge were its people issues and integrating teams of staff. Initial reports suggest that the day one issues were less to do with technology issues and more to do with inadequate staff training, and this was not just for one group of people but at all levels. Below is a summary of its problems on the opening day: Hundreds of staff found it difficult finding the staff car park entrance Check-in staff struggled with their systems, these problems ranged from very simple tasks such as logging into the baggage system to complex tasks Security personnel who were totally ignorant of their new roles and had to be taken through new procedures in the morning in front of passengers Ground staff and crews and ground staff getting lost in the huge building Baggage handlers struggled to get a hang of the new baggage system Baggage truck drivers got lost within the terminal and needed directions to the aircraft Baggage drivers and handlers could not get luggage from the conveyors to the gates On nine occasions, inspectors from the department of transport had managed to bypass security checks during trials of the terminals new systems and that the terminals alarm system was not working properly Going through these problems therefore suggest that the entire problem was down to lack of adequate training or simply inappropriate appraisal of risk involved. This is very surprising as this was a very high profile project and taking into account that this was a simple 3 team process get baggage, take baggage to aircraft and load baggage onto aircraft. Training System Testing Prior to Opening Based on initial interviews with BAs CIO, it would suggest that the human elements were given the importance it required. BAs CIO, Paul Coby told CIO UK [in March 2007] â€Å"the IT work to support such a large-scale, new-build project was also going well. â€Å"Devices are deployed, connections are being integrated and 2007 will be testing year. The airline is moving onto the T5 systems, so they run for a year ready to operate at the new terminal when it opens in 2008†. According to XXXXX, in the run up to the opening of T5 there were a series of overnight baggage-systems tests using thousands of bags, up to 2000 volunteers and full trials of the check-in procedure for all the IT systems. According to the spokesman for Vanderlande Industries, in testing the baggage handling system, emulation models were utilized broadly to test the low-level controls software, while computer programs took the place of the baggage handling system, and which behave (almost) the same as the part they replace. The report also suggests that for the high-level controls software, the emulation model was broadened by connecting the loose individual models into a large integrated system in which the physical equipment was replaced by a number of interconnected emulation models. According to a number of the volunteers who tested the system prior to its opening commented that the demos were extremely impressive and felt the system was ready in advance of its opening. T5 System Simulation Prior to Opening According to the spokesman for Vanderlande Industries, low-level emulation models were utilized in place of the physical transport equipment in each of the conveyor lines. The low and high level models that were developed produced the same electrical outputs in response to the same electrical inputs as their corresponding physical equivalent (motors, photo-electric cells, barcode scanners, etc), which in the view of both the software developers and management of BA, proof of extensive system testing. System interaction was facilitated with the use of control panels, and with the right frequency, set of bags or multiple bags were generated. During the testing, the conveyor motors were stopped and started utilizing different scenarios in order to generate as much errors as possible with the hope of fixing them. The spokesman also stated that the transport time between two photocells in emulation was equal to the actual time using the real equipment. The same measurement also applied to the total transport time. In addition, during testing the T5 project, over 90 individual low-level emulation models were created as individual models were integrated into 5 different configurations. A separate team spent 4800 hours on building and testing these emulation models. Questions: Training Testing But the first set of questions now has to be asked: how adequate was the tests and training were carried out in relation to T5s baggage systems in advance of the opening? What were the results? What were the problems revealed? and what steps were taken to resolve the problems revealed? Were the tests re-run and, if so, what was the result? Was the right implementation strategy adopted? Or would it not have been better to open Terminal 5 on a phased basis, to make sure that all its systems were working before going fully operational? The second set of questions to be asked would be: knowing that extensive simulation testing was carried out on the baggage system successfully; doesnt that then suggest that carrying out simulated testing without the real customers is inadequate? With regards to the people issues, what sort of dry runs were carried out? If they were indeed adequate, why were the opening day hiccups not identified? Where there extra staff or volunteers in anticipation of potential glitches? If yes were these trained adequately? For every eventuality or possible scenario, what were the contingency plans? In spite of the extensive testing carried out on the baggage system and the confidence which this would have placed on top management, from the experience on the opening day, we can conclude that in reality, the prospects of operating an airport terminal of such magnitude and scale would require more than simulated testing as the operations are virtually impossible to fully replicate. This then suggests that the risk management utilized by the BA was not robust to take the people issues into account. Good risk management might have come to the conclusion, if there was the possibility of failure. Risk Management: Definitions In order to manage risks we have to understand what a risk is. Smith and Merrit (2002) said that three essential aspects of risk are uncertainty, loss and time, see Figure 1. Uncertainty: A project manager has to identify as many uncertainties as possible. A risk may or may not happen. This inherent uncertainty cannot be eliminated, but it can be made little clearer by clarifying the probability of occurrence of the risk, to get at better understanding of the consequences and alternatives if the risk occurs and determine the factors that influence the magnitude and likelihood of occurrence of the particular risk. This means that an uncertainty can never be completely eliminated, but it can be reduced to a level the project find tolerable. This means that even with the best plans there cannot be any guarantees that there will be no surprises [3]. Loss: A risk is always something that involves some kind of loss. If there is no loss possible, then the project is not concerned about the risk, because it cannot compromise the project [3]. Time: Associated with every risk there is a time where the risk no longer exists. Either the risk has occurred and the loss has been suffered or the potential problems that could cause the risk have been resolved and no longer pose a threat. It is important to know when this time has arrived so the risk can be removed from the agenda [3]. Among writers and in the literature there are differences in the meaning of risk management and risk analysis. Frosdick (1997) says that there are no clear views of the differences and what one writer defines as risk management another writer is calling it risk analysis. Frosdick‘s own view is that he separates them by saying that risk analysis is the sum of the processes of risk identification, estimation and evaluation and risk management is about planning, monitoring and controlling activities that are produced by the risk analysis activity. The Association for Project Management (Chapman, Simister 2004) definition of risk analysis is similar to Frosdick‘s, they have however divided the risk analysis into two stages. The first stage is called the Qualitative Analysis and it is where risks are identified and subjectively assessed. These identified risks are then analysed in terms of e.g. cost and time estimates and that is called the Quantitative Analysis. Just like for Frosdick it is then followed by the risk management process. In their definition it is the process of formulating responses, both proactive and reactive ones. Pennock Haimes (2001) said that risk management could be represented in six steps, three each for risk assessment/analysis and risk management, where each step is a question. Risk assessment/analysis What can go wrong? Identify as many risks as possible. The risks can be of any kind financial, time, resources etc. and no risk is too small to not be included [3]. What is the likelihood for the risk to occur? Try to measure how likely, or unlikely, it is for the risk to occur. Maybe some risks are dependent on each other [3]. What are the consequences? What will be the impact on the project if the risk occurs, is it a minor risk or maybe a stopping fault that endangers the whole project [3]. Risk management What can be done and what options are available? How to decrease the chance of a risk occurring, for example get more resources or have them readily available [2,3]. What are the tradeoffs in term of all costs, benefits and risks among the available options? For every risk there is somewhere a limit for how costly measures one can put in, where there is no economy in putting in more measures. Often the budget is not enough to eliminate all risks therefore one must choose which risks to put more emphasis on [2,3]. What are the impacts on current decisions on future options? [3] The official definition provided by Professor James Garven, University of Texas at Austin is from the American Risk and Insurance Association: Risk management is the systematic process of managing an organizations risk exposures to achieve its objectives in a manner consistent with public interest, human safety, environmental factors, and the law. It consists of the planning, organizing, leading, coordinating, and controlling activities undertaken with the intent of providing an efficient pre-loss plan that minimizes the adverse impact of risk on the organizations resources, earnings, and cash flows. Another definition given by Larry Krantz, Chief Executive of Euro Log Ltd in the UK, states that A risk is a combination of constraint and uncertainty. We all face constraints in our projects, and also uncertainty. So we can minimise the risk in the project either by eliminating constraints (a nice conceit) or by finding and reducing uncertainty []. The objectives of risk management/analysis The Association for Project Management (Chapman, Simister 2004) defines Risk Management/Analysis as a process designed to remove or reduce the risks that threaten the achievement of project objectives. Properly undertaken it will increase the likelihood of successful completion of a project in terms of cost, time and performance objectives. PMBOK (PMBOK Guide, 2004) describes it similarly where they say that the objectives of project management are to increase the probability and impact of positive effects and decrease the probability and impact of events adverse to project objectives. Kendrick (2003) list seven benefits on the use of risk management: Project Justification: Project risk management is undertaken primarily to improve the chances that a project will achieve its objectives. While there are never any guarantees, broader awareness of common failure modes and ideas that make projects more robust can significantly improve the odds of success. The primary goal of project risk management is either to develop a credible foundation for each project, showing that it is possible, or to demonstrate that the project is not feasible so that it can be avoided, aborted, or transformed [1]. Lower Costs and Less Chaos: Adequate risk analysis reduces both the overall cost and the frustration caused by avoidable problems [4]. The amount of rework and of unforeseen late project effort is minimised. Knowledge of the root causes of the potentially severe project problems enables project leaders and teams to work in ways that avoid these problems. Dealing with the causes of risk also minimises fire-fighting and chaos during projects, much of which is focused short-term and deals primarily with symptoms rather than the intrinsic sources of the problems [1]. Chadbourn (1999) describes it similarly when he likened the uncertainties to chaos, where a poorly designed project could be described as a room full of mousetraps, each with a ping pong ball [5]. Before you know it, someone not under your control tosses in the first ball, thus mayhem and chaos erupts [5]. In the ideal project the mousetraps are gone. In their place there is a network of dominos, where each action and reacti on could be foreseen [5]. It is within the role of organisations to try and identify these mousetraps and replace them with an orderly string of dominos [5]. Project Priority and Management Support: Support from managers and other project stakeholders and commitment from the project team are more easily won when projects are based on thorough, understandable information [11]. High-risk projects may begin with lower priority, but a thorough risk plan, displaying competence and good preparation for possible problems, can improve the project priority [11]. Whenever you are successful in raising the priority of your project, you significantly reduce project risk—by opening doors, reducing obstacles, making resources available, and shortening queues for services [11]. Project Portfolio Management: Achieving and maintaining an appropriate mix of ongoing projects for an organisation uses risk data as a key factor. The ideal project portfolio includes both lower- and higher-risk projects in proportions that are consistent with the business objectives [13]. Fine-Tuning Plans to Reduce Risk: Risk analysis uncovers weaknesses in a project plan and triggers changes, new activities, and resource shifts that improve the project. Risk analysis at the project level may also reveal needed shifts in overall project structure or basic assumptions [14]. Establishing Management Reserve: Risk analysis demonstrates the uncertainty of project outcomes and is useful in setting reserves for schedule and/or resources. Risky projects really require a window of time (or budget), instead of a single-point objective. While the project targets can be based on expectations (the most likely versions of the analysis), project commitments should be established with less aggressive goals, reflecting overall project risk. The target and committed objectives set a range for acceptable project results and provide visible recognition of project risk [18]. Project Communication and Control: Project communication is more effective when there is a solid, credible plan. Risk assessments also build awareness of project exposures for the project team, showing how painful the problems might be and when and where they might occur. This causes people to work in ways that avoid project difficulties. Risk data can also be very useful in negotiations with project sponsors. Using information about the likelihood and consequences of potential problems gives project teams more influence in defining objectives, determining budgets, obtaining staff, setting deadlines, and negotiating project changes [18]. Risk Assessment Risk Control There are two stages in the process of Project Risk Management, Risk Assessment and Risk Control. Risk Assessment can take place at any time during the project, though the sooner the better. However, Risk Control cannot be effective without a previous Risk Assessment. Similarly, most people tend to think that having performed a Risk Assessment, they have done all that is needed. Far too many projects spend a great deal of effort on Risk Assessment and then ignore Risk control completely [19]. Risk Assessment has three elements: Identify Uncertainties In this element, the entire project plans are explored, with special focus on areas of uncertainty [20]. Analyse Risks In this element, the requirement is to specify how the areas of uncertainty will have an impact on the performance of the project, either in duration, cost or meeting the users requirements [20]. Prioritise Risks At this stage the requirement is to establish which of the Risks identified should be eliminated completely [20]. This step is only is carried out due to the potential extreme impact, which should have regular management attention, and which are sufficiently minor to avoid detailed management attention [20]. In the same way, Risk Control has three elements, as follows: Mitigate Risks According to Mobey et al (2002), risk mitigation would include taking the necessary actions that are possible in advance to reduce the effect of Risk. It is better to spend money on mitigation than to include contingency in the plan [20]. Plan for Emergencies For all those Risks which are deemed to be significant, have an emergency plan in place before it happens [19]. Measure and Control This involves tracking the effects of the risks identified and managing them to a successful conclusion [19]. Different strategies There are different strategies and methods that have different approaches toward risk management. JISC (Joint Information Systems Management) says that the focus for risk management should be on risks related to the particular project, not project management in general (http://www.jisc.ac.uk/proj_manguide15.html). The overall goal according to Kendrick (2003) for risk management in a single project is to establish a credible plan consistent with business objectives and then to minimise the range of possible outcomes. That is why risk management in a project is about identifying potential risks, analyse the ones that have the greatest likelihood of occurring, grade their different levels of impact on the project and define a plan of how to avoid the risk and if it occurs how to reduce its impact (Heldman, 2005). Smith Merrit (2001) sees risk strategy as a five step process. Figure 3 shows the flow through the five-step process and lists deliverables from each step: Step 1: Identify risks that you could encounter across all facets of the project [28]. Step 2: Analyse these risks to determine what is driving them, how great their impact might be, and how likely they are [28]. Step 3: Prioritise and map the risks so that you can choose those most important to resolve [28]. Step 4: Plan how you will take action against the risks on this short list [28]. Step 5: On a regular basis, monitor progress on your action plans, terminate action plans for risks that have been adequately resolved, and look for new risks [28]. Frosdick (1997) also mentioned Strutt‘s, definition of the concept of risk analysis that is a seven stage process. Systematic assessment (item by item question every part of the system) [13]. Identification of risks [13]. Assessment of risks (frequencies and consequences) [13]. Establish acceptable/tolerable levels of risk [13]. Evaluate the risks. Are they acceptable? Can they be reduced and at what cost? Determine whether the risks are as low as reasonably practicable [13]. Determine risk reduction measures where appropriate [13]. Risk Assessment Evaluation There are many ways and different techniques to evaluate what the risks are, what the effect they have on the project and what measures can be put in if the risks should occur [19]. Risk assessment is by most people divided into two areas, Quantitative Risk Analysis and Qualitative Risk Analysis. Quantitative In its most basic form the formula for risk quantification is: à ¢Ã¢â€š ¬Ã¢â‚¬ ¢Rate of occurrenceà ¢Ã¢â€š ¬Ã¢â‚¬â€œ multiplied by the à ¢Ã¢â€š ¬Ã¢â‚¬ ¢impact of the eventà ¢Ã¢â€š ¬Ã¢â‚¬â€œ = risk. Methods based on this method are often called à ¢Ã¢â€š ¬Ã¢â‚¬ ¢expected value analysisà ¢Ã¢â€š ¬Ã¢â‚¬â€œ and include models like Annualized Loss Expectancy (ALM), the Courtney formula, the Livermore Risk Analysis Methodology (LRAM) and Stochastic Dominance (Snyder, Rainer Jr., Carr 1991). The advantages of Quantitative Risk Analysis methodologies are that they are good at identifying the most critical areas that, if something happens, will have the largest impact on the project. There are also disadvantages to Quantitative Risk Analysis. When one measures the probability of damage to the project the quantitative approach tends to average the events leading up to a problem (Snyder, Rainer Jr, Carr 1991). Qualitative Qualitative methods attempts to express risks in terms of descriptive variables rather than an economic impact. These approaches are based on the assumption that certain threat or loss of data cannot be appropriately expressed in terms of dollars or pounds and that precise information is impossible to obtain. These methodologies include Scenario Analysis/Planning, Fuzzy Metrics and questionnaires (Snyder, Rainer Jr., Carr 1991). The advantages of Qualitative Risk Analysis methodologies are that they save time, effort and expense over quantitative methods. This is because assets do not need exact values in dollars or pounds nor do threats need to have exact probabilities. It is also a valuable methodology in identifying significant weaknesses in a risk management portfolio. There are disadvantages with this method as well. Qualitative Risk Analysis is inexact, the variables used (e.g. low, medium and high) must be understood by all parties involved (Snyder, Rainer Jr., Carr 1991). Risks Reduction Once risks have been identified and evaluated they have to be responded to in some way. Wideman (1992) lists seven basic responses on identified risks: Recognised but no action taken (absorbed as a matter of policy) Avoided (by taking appropriate steps) Reduced (by an alternative approach) Shared (with others, e.g., by joint venture) Transferred (to others through contract or insurance) Retained and absorbed (by prudent allowances) Handled by a combination of the above Dorfman (1997) says that all techniques to manage the risk fall into one or more of these four major categories (remembered as the 4 Ts): Tolerate (aka Retention) Treat (aka Mitigation) Terminate (aka Elimination) Transfer (aka Buying Insurance) Bliss (2005) listed these five types of similar risk responses as Dorfman and Wideman. Risk avoidance: Also known as risk removal or risk prevention, risk avoidance involves altering the original plans for the project so that particularly risky elements are removed. It could include deciding not to perform an activity that carries a high risk. Adopting such avoidance techniques may seem an obvious way to deal with all risks. However, often the areas of the project that involve high risks are also the areas of the project that potentially contain the highest worth or the best value for money. Avoiding such risks may also result in removing potentially the best bits of a resource, and an alternative strategy that retains these risks may be more appropriate [13]. Risk reduction: Risk reduction or risk mitigation involves the employment of methods that reduce the probability of a risk occurring, or reducing the severity of the impact of a risk on the outcome of the project. The loss of highly skilled staff is a considerable risk in any project and not one that can be totally avoided. Suitable risk mitigation could involve the enforcement of a notice period, comprehensive documentation allowing for replacement staff to continue with the job at hand and adequate management oversight and the use of staff development programmes to encourage staff to stay [20]. Risk transfer: Risk transfer moves the ownership of the risk to a third party normally by contract. This also moves the impact of the risk away from the project itself to this third party [20]. Risk deferral: The impact a risk can have on a project is not constant throughout the life of a project. Risk deferral entails deferring aspects of the project to a date when a risk is less likely to happen. For example managing the expectations users have about the content and delivery of a resource can be time-consuming, one way to reduce this risk is by not making a web resource available until user testing is complete [20]. Risk retention: Whilst a certain number of the risks to the project originally identified can be removed by changing the project plan or dealt with by transferring the responsibility of the risk to third parties inevitably certain risks have to be accepted as a necessary part of the project. All risks that have not been avoided or transferred are retained or accepted risks by default [20]. Previous Successful Project: St Pancras International Rail Station According to XXXXXX, before St Pancras International rail station was opened; a number of days were devoted to testing all the systems and processes, using an army of thousands of volunteer passengers. These tests were carried out much before the opening day, thus providing enough time to resolve issues that might have occurred during testing [26]. By carrying out the testing in phases much long before the opening, members of staff were able to familiarize themselves with the systems and get actual hands-on experience before the station was opened to Eurostar traffic. Dry-runs were carried out as well with the vital lessons were learnt and adjustments made before exposing paying customers to the St Pancras experience. Inevitably the result was that on the opening day, everything went without glitches on the first day of international service [26]. Previous Failed Project: Denver International Airport The Denver International Airport was scheduled to open on October 31, 1993 with all three of its concourses fully running on the BAE automated baggage handling system that. On February 28, 1995, the new airport finally opened. Its opening came sixteen months late. The automated baggage system was supposed to improve baggage handling by using a computer tracking system to direct baggage contained in unmanned carts that run on a track. BAE systems presented the City of Denver with a proposal to develop â€Å"the most complex and automated [and integrated] baggage system ever built. Original target opening date for the airport was (delayed seven times over the next three months). City of Denver invited reporters to observe the first test of the baggage system without notifying BAE. This was a public disaster! Reporters saw piles of disgorged clothes and other personal items lying beneath the Telecars tracks. Lots of mechanical and software problems plagued the automated baggage handling system. When the system was tested, bags were misloaded, sent to different routes, and fell out of automated telecarts, thus causing the system to jam. The automated baggage system still continued to unload bags even though they were jammed on the conveyor belt, because the photo eye at this location could not detect the pile of bags on the belt and hence could not signal the system to stop. Main Lessons One of the lessons BA and BAA might have been learnt from the Denver project, was that BAE actually built a prototype of the automated baggage handling system in a 50,000 sq. ft. warehouse near its manufacturing plant in Texas. But as similar to the T5 project, there was no evidence of adequate training and the results from simulation testing has been proven to be different to a real world scenario with real customers. I addition, research also shows that BAE had given an initial estimate of at least a year to test the system and get the system up and running, but United airlines and the other stakeholders pressed for a much shorter timeframe. City of Denver got the same story from technical advisers to the Franz Joseph Strauss airport in Munich (that less complicated system had taken 2 years testing and was running 24 hours a day for 6 months before the airport opened. Risks recognised early in the Project Very large scale of the project. Enormous complexity. Newness of the technology. Large number of entities to be served by the system. The high degree of technical and project definition uncertainty. Risk Identification PMBOK (PMBOK Guide, 2004) lists five tools and techniques for risk identific