Friday, November 29, 2019

Three Cups of Tea

Table of Contents Introduction Book Summary Analysis Conclusion Work Cited Introduction Three Cups of Tea: One Man’s Mission to Promote Peace †¦ One School at a Time (2006) is a book by Greg Mortenson and David Oliver Relin, published by Penguin Books. The book details the author’s (Mortenson’s) shift from mountaineering to a humanitarian mission aimed at reducing poverty levels and championing for girls’ education in remote areas of Pakistan and Afghanistan.Advertising We will write a custom essay sample on Three Cups of Tea specifically for you for only $16.05 $11/page Learn More Following his newfound passion, he co-founded the Central Asia Institute, a humanitarian organization that has grown over the years and as at 2010, had supervised the construction of more than 171 schools. These schools educate more than 64,000 children, mostly girls, in isolated areas of Pakistan and Afghanistan. Book Summary In 1993, Greg Mortenson, an expert mountaineer, tried to scale K2, the world’s second highest mountain, located in the northern area of the Pakistan-controlled Kashmir. He wanted to achieve this feat as a tribute to his sister, Christa, who had passed on earlier, and had intended to place her necklace on the top of K2. After being on the mountain for more than 70 days, Mortenson and his fellow mountaineers had their climb disrupted as they required to complete a 3-day life-saving exercise to assist a member of their team. Mortenson then lost his way while descending K2 and became emaciated after wandering through mountain, by good luck, he came across Korphe village, where he was welcomed warmly and taken in by the village chief. To show his gratitude for their kindness and generosity, Mortenson undertook to construct a school for the villagers. He encountered financial constraints, but was later introduced to Jean Hoerni, a silicon transistor pioneer who contributed money that was requir ed to build the school. Hoerni later became the co-founder of Central Asia Institute (CAI) before his death on January 12, 1997. The CAI was charged with constructing schools in remote areas of Pakistan and Afghanistan. Mortenson faced major difficulties in his quest to promote girl education, especially in funding the construction of more than 55 schools in Taliban-controlled areas. Other challenges included intimidation by the Islamic fighters, long durations of being away from his family, and abduction. Mortenson reflects on the situation of the world after 9/11 and asserts that extremism in the region can be prevented through a joint effort to lessen poverty and increase literacy levels, particularly for girls. Previously, educational institutions had targeted boys, but because learned boys tend to move to the cities to look for job opportunities, they hardly ever come back.Advertising Looking for essay on british literature? Let's see if we can help you! Get your first pap er with 15% OFF Learn More However, learned girls are likely to remain in the village and use the skills acquired at school to improve livelihoods. Hence, Mortenson proposes that educating girls has a more permanent advantage to the community (Mortenson Relin, pp. 122). Analysis Three Cups of Tea presents an extraordinary account of bravery and compassion. The authors present several points of interest to the reader based on normative statements and politics against a background of cultural discourse that is being used to justify the continuing war on terrorism by America and its allies. Mortenson’s activities in Pakistan and Afghanistan are vital to our perception of how humanitarian activists, policy makers, and the common person can assist the disadvantaged in the simplest of ways, it also enables us to understand the regions where Mortenson’s intervened, and its people. With stability and elegance that is synonymous with business executives and politician s, the authors reveal the problems of terrorism and firmly suggest a solution in form of the school-building program. Despite countering extensive disapproval of his activities due to strict Muslim beliefs on girl child education, Mortenson sends a strong message that education is the solution to the world’s enemies: poverty, diseases and war. And he begins the dangerous journey from Pakistan into Afghanistan, coming across many challenges, mostly military, including an abduction in Waziristan. He manages to convince the locals to buy his ideas, and slowly, they begin to accept his vision of an educated society. The book reveals Mortenson’s patience and stability at ensuring that he fulfils his mission. On the downside, the book does not question the idea of a ‘humanitarian’ intervention by an imperial power such as the US; it simply discusses the mode of such intervention- that any military intervention should go together with humanitarian acts, which wou ld benefit the local community and the US and its allies. The authors do not comment on the US’ previous military interventions and their outcomes, or any assessments of America’s intentions and interests in the region. The authenticity of Washington’s humanitarian intervention is a matter that sends mixed signals to the inhabitants of these areas.Advertising We will write a custom essay sample on Three Cups of Tea specifically for you for only $16.05 $11/page Learn More Politics and international relations aside, the book is a must read for sociologists in order to understand how simple acts can have a domino effect towards solving the problems that we currently face. Conclusion From the first journey towards triumphing over the world’s tallest mountains in the harshest environments, Mortenson revisits his roots, fighting strict religious forms, to create a society of literate boys and girls. Work Cited Mortenson, Greg and R elin, David Oliver. Three Cups of Tea. New York: Penguin Books, 2006. This essay on Three Cups of Tea was written and submitted by user Deanna I. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Medical Ethics1 essays

Medical Ethics1 essays Medical Ethics Bioethics comprise every possible aspect of health care, medical, moral, social, political, religious, legal and financial? (Weiss 3). This includes the questions raised by new research. It takes a look at the results of that research that is used on patients. It takes into consideration contemporary ideas of personal freedom and human dignity. It deals with growth in medical services available in the United States and the sky rocketing cost. Bioethics also deals with the medical advances in technology that has reshaped traditional medical ethics. Medical ethics have changed drastically over a period of years. From old commandments to new commandments, guidelines that provide structural framework, classic experiments that challenge that framework, or even how things are defined in medical ethics.Medical progress goes on, and the perils of progress must be heeded? (Leone 165). Changing times have in turn changed our codes of ethics. There are five old commandments of et hics and five new commandments of ethics. These commandments come from many years of heavily advised dictates from various people. A commandment by definition is, ... a dictate or a strongly advised piece of advice? (Halsey 201). The first traditional commandment is, Treat all human life as of equal worth? (Singer 190). This statement is very difficult to follow; almost no person believes this statement whole-heartedly. The statement makes more sense on paper or just being heard, but its application in life is almost impossible to ensure. In comparison to the first old ethic, the first new ethic states,Recognize that the worth of human life varies? (Singer 190). This statement allows for variation and livability in society. It gives way for someone to say, if a person is a vegetable, has no vital capabilities, this person's life is of no worth anymore. Without this sort of change in today's advancing civilization, it would make it ethically wrong topull ...

Thursday, November 21, 2019

Voting Essay Example | Topics and Well Written Essays - 1500 words

Voting - Essay Example Americans have more opportunities to vote then any other country in the world, and the impact of voting is felt in every aspect of American life. From the beginning of American history, it has been proven that voting is important. History highlights the importance of voting and the terrible conditions that occur when this right does not exist or is suppressed. During the Revolutionary Era the French, Haitians, and Americans recognized the destructive power of living under a government without a voice. The French masses starved while the aristocrats dinned well under the regime of Louise XIV. Like the Americans, the masses were taxed heavily without representation. No taxation without representation was an ideology that spurred on the American Revolution once the Stamp Act was enacted. In addition, after the implementation of the Stamp Act, "ordinary people came together to call for the boycotting of British goods" (Woods, 1992, p. 244). People began to understand how coming together to influence policy would make a difference in government. The Haitian Revolution demonstrates the biggest impact of living under a government without representation. There were 600,000 black slaves living in Haiti (Girard, 2005). The other ruling groups were comprised of French Officials, white planters, and free blacks total population was approximately 60,000 (Girard, 2005). As the Americans and French lived under unfair laws, the Haitian slaves lived under the Black Codes (Ros, 1991). The Black Codes invited white men and women planters to decide the fate of a black slave on a whim. One woman burned her slave alive in an oven, because of a slightly burnt pie (Ros, 1991). There weren't Civil Rights for the 600,000 slaves, who were bound to the earth and deprived of social mobility. They lived in dirty huts in a society where torture instruments were hung in the windows of prominent businesses (Girard, 2005). The Haitian, French, and Americans eventually won their freedom, but it was at great risks and many deaths. The sacrifices made the n and the perils the people endured emphasize the importance of the average person participating in the government. Common people must remain vigilant to the new laws created and make sure they benefit the entire society. No pure democracy is in existence. Democracy is a work in progress. Constant participation by the public is vital to ensure there is a balance in society, where the average person has a voice. Next, with the protective laws passed such as the Family and Medical Leave Act, the Civil Rights Act, and the American with Disabilities Act, many Americans feel they are safe from unfair treatment. They don't need to participate in the government or provide balance. The current governmental system will simply take care of itself and them. Voting isn't necessary. Yet, there are a growing number of individuals that don't believe that we need regulatory laws that will govern discriminatory behavior. A very popular American President, Ronald Regan supported this notion. He "enacted the Executive Order 12991 in 1981, where no regulatory action can be undertaken unless the potential benefits to society outweigh the potential cost" (Bennett-Alexander & Hartman, 2007, p. 4). Supporters of this policy state that businesses want to make profit. They will hire the most qualified person without discriminating, because it will give them a strategic

Wednesday, November 20, 2019

Principles of Microeconomics Essay Example | Topics and Well Written Essays - 250 words

Principles of Microeconomics - Essay Example The river which the company emits chemical waste has plenty of uses to the society. The society fetch water for domestic use from the river, practice fishing on the river and swim on the river for leisure. Emission of chemical waste onto this river pollutes it discouraging fetching of water for domestic use and swimming. This pollution also contaminate the water killing fish and other aquatic lives discouraging fishing which create income to some individuals in the society. Due to the seriousness of these adverse effects, the manufacturing company’s activities have to be controlled to reduce the impact of these effects. The company itself can initiate projects to reduce these negative effects. The company can do that by cleaning the river to avoid contamination of the water. The company can also channel its chemical waste into another site or devise a good means of disposing them. In a bid to control this negative externality, the local government can impose rules and regulations that prevent the water pollution. Some of these laws will include heavy taxation of this company and charging it fines on water pollution. Regulations that control the disposing of waste in the water would also help the situation (Mankiw,

Monday, November 18, 2019

Over the next 30 years, what are the risks to National Security posed Essay - 2

Over the next 30 years, what are the risks to National Security posed by increased competition for energy and food resources; and what initiatives might Qatar pursue to reduce these risks - Essay Example Massive reliance on imports poses the risk of biological or chemical attack, or even intentional food contamination by international suppliers1. There is, therefore, a critical concern to national security when a country relies heavily on international supplies. Another key risk relates to price factors in both food and energy. Economic and political disturbances around the world spread shockwaves to the affected states. In such an event, Qatar and other GCC members would be on the receiving end. The influence of global states when it comes to prices could cripple domestic operations designed to enhance national security. In other words, food security that primarily depends on international trade comes with price-based risks2. Finally, the risk of terrorism will heighten as competition for food and energy increases. To reduce these risks, Qatar will need to secure her imports from around the world, as well as enhance food security at the domestic level3. Most importantly, initiatives to dismantle extremist groups and terrorists will play a fundamental role in reducing threats to national

Saturday, November 16, 2019

Risk Management of Terminal Development at Airport

Risk Management of Terminal Development at Airport Dissertation Objectives Investigate the problems at the terminal 5 opening, especially with the baggage handling system despite extensive simulated testing using thousands of bags and more than two thousand volunteers in the run up to the opening of T5 Identify the necessary risk strategies to be considered for such mega-projects, the benefits of such approaches, taking into account previous failed and successful projects, and any lessons to be learnt Discuss the implementation approach adopted by BAA and the risk associated with this approach Provide formative evaluation summarising key findings and conclusion based on evidence gathered from research T5 Synopsis The terminal 5 project in addition to being a statement of intent for the future of British aviation was built with the aim of improving customer experience and to exhibit Heathrow as a world class international airport. The baggage handling system at T5 was designed to be the largest baggage handling system in Europe for a single terminal. The system consists of a main baggage sorter and a fast track system. The system was designed by an integrated team from BAA, BA and Vanderlande Industries of the Netherlands, with the aim of handling both intra-terminal and inter-terminal luggage. Its processing capacity was intended to be 70,000 bags a day. Bags are meant to undergo several processes on the way through the system, these include; automatic identification, explosives screening, fast tracking for urgent bags, sorting and automatic sorting and passenger reconciliation. The scheduled completion and opening date was March 2008, and T5 was on time and on budget. This was a remarkable achievement especially in a sector where project delays and vast overspends are commonplace (the Millennium dome, Wembley stadium and the Scottish Parliament buildings were all opened late and cost a lot more than the original estimate). However, on its first day in operation, T5s bespoke baggage system was affected by technical software problems, which led to a number of issues, such as cancelled flights, lost baggage, and substantial delays, but more importantly, BAs challenge were its people issues and integrating teams of staff. Initial reports suggest that the day one issues were less to do with technology issues and more to do with inadequate staff training, and this was not just for one group of people but at all levels. Below is a summary of its problems on the opening day: Hundreds of staff found it difficult finding the staff car park entrance Check-in staff struggled with their systems, these problems ranged from very simple tasks such as logging into the baggage system to complex tasks Security personnel who were totally ignorant of their new roles and had to be taken through new procedures in the morning in front of passengers Ground staff and crews and ground staff getting lost in the huge building Baggage handlers struggled to get a hang of the new baggage system Baggage truck drivers got lost within the terminal and needed directions to the aircraft Baggage drivers and handlers could not get luggage from the conveyors to the gates On nine occasions, inspectors from the department of transport had managed to bypass security checks during trials of the terminals new systems and that the terminals alarm system was not working properly Going through these problems therefore suggest that the entire problem was down to lack of adequate training or simply inappropriate appraisal of risk involved. This is very surprising as this was a very high profile project and taking into account that this was a simple 3 team process get baggage, take baggage to aircraft and load baggage onto aircraft. Training System Testing Prior to Opening Based on initial interviews with BAs CIO, it would suggest that the human elements were given the importance it required. BAs CIO, Paul Coby told CIO UK [in March 2007] â€Å"the IT work to support such a large-scale, new-build project was also going well. â€Å"Devices are deployed, connections are being integrated and 2007 will be testing year. The airline is moving onto the T5 systems, so they run for a year ready to operate at the new terminal when it opens in 2008†. According to XXXXX, in the run up to the opening of T5 there were a series of overnight baggage-systems tests using thousands of bags, up to 2000 volunteers and full trials of the check-in procedure for all the IT systems. According to the spokesman for Vanderlande Industries, in testing the baggage handling system, emulation models were utilized broadly to test the low-level controls software, while computer programs took the place of the baggage handling system, and which behave (almost) the same as the part they replace. The report also suggests that for the high-level controls software, the emulation model was broadened by connecting the loose individual models into a large integrated system in which the physical equipment was replaced by a number of interconnected emulation models. According to a number of the volunteers who tested the system prior to its opening commented that the demos were extremely impressive and felt the system was ready in advance of its opening. T5 System Simulation Prior to Opening According to the spokesman for Vanderlande Industries, low-level emulation models were utilized in place of the physical transport equipment in each of the conveyor lines. The low and high level models that were developed produced the same electrical outputs in response to the same electrical inputs as their corresponding physical equivalent (motors, photo-electric cells, barcode scanners, etc), which in the view of both the software developers and management of BA, proof of extensive system testing. System interaction was facilitated with the use of control panels, and with the right frequency, set of bags or multiple bags were generated. During the testing, the conveyor motors were stopped and started utilizing different scenarios in order to generate as much errors as possible with the hope of fixing them. The spokesman also stated that the transport time between two photocells in emulation was equal to the actual time using the real equipment. The same measurement also applied to the total transport time. In addition, during testing the T5 project, over 90 individual low-level emulation models were created as individual models were integrated into 5 different configurations. A separate team spent 4800 hours on building and testing these emulation models. Questions: Training Testing But the first set of questions now has to be asked: how adequate was the tests and training were carried out in relation to T5s baggage systems in advance of the opening? What were the results? What were the problems revealed? and what steps were taken to resolve the problems revealed? Were the tests re-run and, if so, what was the result? Was the right implementation strategy adopted? Or would it not have been better to open Terminal 5 on a phased basis, to make sure that all its systems were working before going fully operational? The second set of questions to be asked would be: knowing that extensive simulation testing was carried out on the baggage system successfully; doesnt that then suggest that carrying out simulated testing without the real customers is inadequate? With regards to the people issues, what sort of dry runs were carried out? If they were indeed adequate, why were the opening day hiccups not identified? Where there extra staff or volunteers in anticipation of potential glitches? If yes were these trained adequately? For every eventuality or possible scenario, what were the contingency plans? In spite of the extensive testing carried out on the baggage system and the confidence which this would have placed on top management, from the experience on the opening day, we can conclude that in reality, the prospects of operating an airport terminal of such magnitude and scale would require more than simulated testing as the operations are virtually impossible to fully replicate. This then suggests that the risk management utilized by the BA was not robust to take the people issues into account. Good risk management might have come to the conclusion, if there was the possibility of failure. Risk Management: Definitions In order to manage risks we have to understand what a risk is. Smith and Merrit (2002) said that three essential aspects of risk are uncertainty, loss and time, see Figure 1. Uncertainty: A project manager has to identify as many uncertainties as possible. A risk may or may not happen. This inherent uncertainty cannot be eliminated, but it can be made little clearer by clarifying the probability of occurrence of the risk, to get at better understanding of the consequences and alternatives if the risk occurs and determine the factors that influence the magnitude and likelihood of occurrence of the particular risk. This means that an uncertainty can never be completely eliminated, but it can be reduced to a level the project find tolerable. This means that even with the best plans there cannot be any guarantees that there will be no surprises [3]. Loss: A risk is always something that involves some kind of loss. If there is no loss possible, then the project is not concerned about the risk, because it cannot compromise the project [3]. Time: Associated with every risk there is a time where the risk no longer exists. Either the risk has occurred and the loss has been suffered or the potential problems that could cause the risk have been resolved and no longer pose a threat. It is important to know when this time has arrived so the risk can be removed from the agenda [3]. Among writers and in the literature there are differences in the meaning of risk management and risk analysis. Frosdick (1997) says that there are no clear views of the differences and what one writer defines as risk management another writer is calling it risk analysis. Frosdick‘s own view is that he separates them by saying that risk analysis is the sum of the processes of risk identification, estimation and evaluation and risk management is about planning, monitoring and controlling activities that are produced by the risk analysis activity. The Association for Project Management (Chapman, Simister 2004) definition of risk analysis is similar to Frosdick‘s, they have however divided the risk analysis into two stages. The first stage is called the Qualitative Analysis and it is where risks are identified and subjectively assessed. These identified risks are then analysed in terms of e.g. cost and time estimates and that is called the Quantitative Analysis. Just like for Frosdick it is then followed by the risk management process. In their definition it is the process of formulating responses, both proactive and reactive ones. Pennock Haimes (2001) said that risk management could be represented in six steps, three each for risk assessment/analysis and risk management, where each step is a question. Risk assessment/analysis What can go wrong? Identify as many risks as possible. The risks can be of any kind financial, time, resources etc. and no risk is too small to not be included [3]. What is the likelihood for the risk to occur? Try to measure how likely, or unlikely, it is for the risk to occur. Maybe some risks are dependent on each other [3]. What are the consequences? What will be the impact on the project if the risk occurs, is it a minor risk or maybe a stopping fault that endangers the whole project [3]. Risk management What can be done and what options are available? How to decrease the chance of a risk occurring, for example get more resources or have them readily available [2,3]. What are the tradeoffs in term of all costs, benefits and risks among the available options? For every risk there is somewhere a limit for how costly measures one can put in, where there is no economy in putting in more measures. Often the budget is not enough to eliminate all risks therefore one must choose which risks to put more emphasis on [2,3]. What are the impacts on current decisions on future options? [3] The official definition provided by Professor James Garven, University of Texas at Austin is from the American Risk and Insurance Association: Risk management is the systematic process of managing an organizations risk exposures to achieve its objectives in a manner consistent with public interest, human safety, environmental factors, and the law. It consists of the planning, organizing, leading, coordinating, and controlling activities undertaken with the intent of providing an efficient pre-loss plan that minimizes the adverse impact of risk on the organizations resources, earnings, and cash flows. Another definition given by Larry Krantz, Chief Executive of Euro Log Ltd in the UK, states that A risk is a combination of constraint and uncertainty. We all face constraints in our projects, and also uncertainty. So we can minimise the risk in the project either by eliminating constraints (a nice conceit) or by finding and reducing uncertainty []. The objectives of risk management/analysis The Association for Project Management (Chapman, Simister 2004) defines Risk Management/Analysis as a process designed to remove or reduce the risks that threaten the achievement of project objectives. Properly undertaken it will increase the likelihood of successful completion of a project in terms of cost, time and performance objectives. PMBOK (PMBOK Guide, 2004) describes it similarly where they say that the objectives of project management are to increase the probability and impact of positive effects and decrease the probability and impact of events adverse to project objectives. Kendrick (2003) list seven benefits on the use of risk management: Project Justification: Project risk management is undertaken primarily to improve the chances that a project will achieve its objectives. While there are never any guarantees, broader awareness of common failure modes and ideas that make projects more robust can significantly improve the odds of success. The primary goal of project risk management is either to develop a credible foundation for each project, showing that it is possible, or to demonstrate that the project is not feasible so that it can be avoided, aborted, or transformed [1]. Lower Costs and Less Chaos: Adequate risk analysis reduces both the overall cost and the frustration caused by avoidable problems [4]. The amount of rework and of unforeseen late project effort is minimised. Knowledge of the root causes of the potentially severe project problems enables project leaders and teams to work in ways that avoid these problems. Dealing with the causes of risk also minimises fire-fighting and chaos during projects, much of which is focused short-term and deals primarily with symptoms rather than the intrinsic sources of the problems [1]. Chadbourn (1999) describes it similarly when he likened the uncertainties to chaos, where a poorly designed project could be described as a room full of mousetraps, each with a ping pong ball [5]. Before you know it, someone not under your control tosses in the first ball, thus mayhem and chaos erupts [5]. In the ideal project the mousetraps are gone. In their place there is a network of dominos, where each action and reacti on could be foreseen [5]. It is within the role of organisations to try and identify these mousetraps and replace them with an orderly string of dominos [5]. Project Priority and Management Support: Support from managers and other project stakeholders and commitment from the project team are more easily won when projects are based on thorough, understandable information [11]. High-risk projects may begin with lower priority, but a thorough risk plan, displaying competence and good preparation for possible problems, can improve the project priority [11]. Whenever you are successful in raising the priority of your project, you significantly reduce project risk—by opening doors, reducing obstacles, making resources available, and shortening queues for services [11]. Project Portfolio Management: Achieving and maintaining an appropriate mix of ongoing projects for an organisation uses risk data as a key factor. The ideal project portfolio includes both lower- and higher-risk projects in proportions that are consistent with the business objectives [13]. Fine-Tuning Plans to Reduce Risk: Risk analysis uncovers weaknesses in a project plan and triggers changes, new activities, and resource shifts that improve the project. Risk analysis at the project level may also reveal needed shifts in overall project structure or basic assumptions [14]. Establishing Management Reserve: Risk analysis demonstrates the uncertainty of project outcomes and is useful in setting reserves for schedule and/or resources. Risky projects really require a window of time (or budget), instead of a single-point objective. While the project targets can be based on expectations (the most likely versions of the analysis), project commitments should be established with less aggressive goals, reflecting overall project risk. The target and committed objectives set a range for acceptable project results and provide visible recognition of project risk [18]. Project Communication and Control: Project communication is more effective when there is a solid, credible plan. Risk assessments also build awareness of project exposures for the project team, showing how painful the problems might be and when and where they might occur. This causes people to work in ways that avoid project difficulties. Risk data can also be very useful in negotiations with project sponsors. Using information about the likelihood and consequences of potential problems gives project teams more influence in defining objectives, determining budgets, obtaining staff, setting deadlines, and negotiating project changes [18]. Risk Assessment Risk Control There are two stages in the process of Project Risk Management, Risk Assessment and Risk Control. Risk Assessment can take place at any time during the project, though the sooner the better. However, Risk Control cannot be effective without a previous Risk Assessment. Similarly, most people tend to think that having performed a Risk Assessment, they have done all that is needed. Far too many projects spend a great deal of effort on Risk Assessment and then ignore Risk control completely [19]. Risk Assessment has three elements: Identify Uncertainties In this element, the entire project plans are explored, with special focus on areas of uncertainty [20]. Analyse Risks In this element, the requirement is to specify how the areas of uncertainty will have an impact on the performance of the project, either in duration, cost or meeting the users requirements [20]. Prioritise Risks At this stage the requirement is to establish which of the Risks identified should be eliminated completely [20]. This step is only is carried out due to the potential extreme impact, which should have regular management attention, and which are sufficiently minor to avoid detailed management attention [20]. In the same way, Risk Control has three elements, as follows: Mitigate Risks According to Mobey et al (2002), risk mitigation would include taking the necessary actions that are possible in advance to reduce the effect of Risk. It is better to spend money on mitigation than to include contingency in the plan [20]. Plan for Emergencies For all those Risks which are deemed to be significant, have an emergency plan in place before it happens [19]. Measure and Control This involves tracking the effects of the risks identified and managing them to a successful conclusion [19]. Different strategies There are different strategies and methods that have different approaches toward risk management. JISC (Joint Information Systems Management) says that the focus for risk management should be on risks related to the particular project, not project management in general (http://www.jisc.ac.uk/proj_manguide15.html). The overall goal according to Kendrick (2003) for risk management in a single project is to establish a credible plan consistent with business objectives and then to minimise the range of possible outcomes. That is why risk management in a project is about identifying potential risks, analyse the ones that have the greatest likelihood of occurring, grade their different levels of impact on the project and define a plan of how to avoid the risk and if it occurs how to reduce its impact (Heldman, 2005). Smith Merrit (2001) sees risk strategy as a five step process. Figure 3 shows the flow through the five-step process and lists deliverables from each step: Step 1: Identify risks that you could encounter across all facets of the project [28]. Step 2: Analyse these risks to determine what is driving them, how great their impact might be, and how likely they are [28]. Step 3: Prioritise and map the risks so that you can choose those most important to resolve [28]. Step 4: Plan how you will take action against the risks on this short list [28]. Step 5: On a regular basis, monitor progress on your action plans, terminate action plans for risks that have been adequately resolved, and look for new risks [28]. Frosdick (1997) also mentioned Strutt‘s, definition of the concept of risk analysis that is a seven stage process. Systematic assessment (item by item question every part of the system) [13]. Identification of risks [13]. Assessment of risks (frequencies and consequences) [13]. Establish acceptable/tolerable levels of risk [13]. Evaluate the risks. Are they acceptable? Can they be reduced and at what cost? Determine whether the risks are as low as reasonably practicable [13]. Determine risk reduction measures where appropriate [13]. Risk Assessment Evaluation There are many ways and different techniques to evaluate what the risks are, what the effect they have on the project and what measures can be put in if the risks should occur [19]. Risk assessment is by most people divided into two areas, Quantitative Risk Analysis and Qualitative Risk Analysis. Quantitative In its most basic form the formula for risk quantification is: à ¢Ã¢â€š ¬Ã¢â‚¬ ¢Rate of occurrenceà ¢Ã¢â€š ¬Ã¢â‚¬â€œ multiplied by the à ¢Ã¢â€š ¬Ã¢â‚¬ ¢impact of the eventà ¢Ã¢â€š ¬Ã¢â‚¬â€œ = risk. Methods based on this method are often called à ¢Ã¢â€š ¬Ã¢â‚¬ ¢expected value analysisà ¢Ã¢â€š ¬Ã¢â‚¬â€œ and include models like Annualized Loss Expectancy (ALM), the Courtney formula, the Livermore Risk Analysis Methodology (LRAM) and Stochastic Dominance (Snyder, Rainer Jr., Carr 1991). The advantages of Quantitative Risk Analysis methodologies are that they are good at identifying the most critical areas that, if something happens, will have the largest impact on the project. There are also disadvantages to Quantitative Risk Analysis. When one measures the probability of damage to the project the quantitative approach tends to average the events leading up to a problem (Snyder, Rainer Jr, Carr 1991). Qualitative Qualitative methods attempts to express risks in terms of descriptive variables rather than an economic impact. These approaches are based on the assumption that certain threat or loss of data cannot be appropriately expressed in terms of dollars or pounds and that precise information is impossible to obtain. These methodologies include Scenario Analysis/Planning, Fuzzy Metrics and questionnaires (Snyder, Rainer Jr., Carr 1991). The advantages of Qualitative Risk Analysis methodologies are that they save time, effort and expense over quantitative methods. This is because assets do not need exact values in dollars or pounds nor do threats need to have exact probabilities. It is also a valuable methodology in identifying significant weaknesses in a risk management portfolio. There are disadvantages with this method as well. Qualitative Risk Analysis is inexact, the variables used (e.g. low, medium and high) must be understood by all parties involved (Snyder, Rainer Jr., Carr 1991). Risks Reduction Once risks have been identified and evaluated they have to be responded to in some way. Wideman (1992) lists seven basic responses on identified risks: Recognised but no action taken (absorbed as a matter of policy) Avoided (by taking appropriate steps) Reduced (by an alternative approach) Shared (with others, e.g., by joint venture) Transferred (to others through contract or insurance) Retained and absorbed (by prudent allowances) Handled by a combination of the above Dorfman (1997) says that all techniques to manage the risk fall into one or more of these four major categories (remembered as the 4 Ts): Tolerate (aka Retention) Treat (aka Mitigation) Terminate (aka Elimination) Transfer (aka Buying Insurance) Bliss (2005) listed these five types of similar risk responses as Dorfman and Wideman. Risk avoidance: Also known as risk removal or risk prevention, risk avoidance involves altering the original plans for the project so that particularly risky elements are removed. It could include deciding not to perform an activity that carries a high risk. Adopting such avoidance techniques may seem an obvious way to deal with all risks. However, often the areas of the project that involve high risks are also the areas of the project that potentially contain the highest worth or the best value for money. Avoiding such risks may also result in removing potentially the best bits of a resource, and an alternative strategy that retains these risks may be more appropriate [13]. Risk reduction: Risk reduction or risk mitigation involves the employment of methods that reduce the probability of a risk occurring, or reducing the severity of the impact of a risk on the outcome of the project. The loss of highly skilled staff is a considerable risk in any project and not one that can be totally avoided. Suitable risk mitigation could involve the enforcement of a notice period, comprehensive documentation allowing for replacement staff to continue with the job at hand and adequate management oversight and the use of staff development programmes to encourage staff to stay [20]. Risk transfer: Risk transfer moves the ownership of the risk to a third party normally by contract. This also moves the impact of the risk away from the project itself to this third party [20]. Risk deferral: The impact a risk can have on a project is not constant throughout the life of a project. Risk deferral entails deferring aspects of the project to a date when a risk is less likely to happen. For example managing the expectations users have about the content and delivery of a resource can be time-consuming, one way to reduce this risk is by not making a web resource available until user testing is complete [20]. Risk retention: Whilst a certain number of the risks to the project originally identified can be removed by changing the project plan or dealt with by transferring the responsibility of the risk to third parties inevitably certain risks have to be accepted as a necessary part of the project. All risks that have not been avoided or transferred are retained or accepted risks by default [20]. Previous Successful Project: St Pancras International Rail Station According to XXXXXX, before St Pancras International rail station was opened; a number of days were devoted to testing all the systems and processes, using an army of thousands of volunteer passengers. These tests were carried out much before the opening day, thus providing enough time to resolve issues that might have occurred during testing [26]. By carrying out the testing in phases much long before the opening, members of staff were able to familiarize themselves with the systems and get actual hands-on experience before the station was opened to Eurostar traffic. Dry-runs were carried out as well with the vital lessons were learnt and adjustments made before exposing paying customers to the St Pancras experience. Inevitably the result was that on the opening day, everything went without glitches on the first day of international service [26]. Previous Failed Project: Denver International Airport The Denver International Airport was scheduled to open on October 31, 1993 with all three of its concourses fully running on the BAE automated baggage handling system that. On February 28, 1995, the new airport finally opened. Its opening came sixteen months late. The automated baggage system was supposed to improve baggage handling by using a computer tracking system to direct baggage contained in unmanned carts that run on a track. BAE systems presented the City of Denver with a proposal to develop â€Å"the most complex and automated [and integrated] baggage system ever built. Original target opening date for the airport was (delayed seven times over the next three months). City of Denver invited reporters to observe the first test of the baggage system without notifying BAE. This was a public disaster! Reporters saw piles of disgorged clothes and other personal items lying beneath the Telecars tracks. Lots of mechanical and software problems plagued the automated baggage handling system. When the system was tested, bags were misloaded, sent to different routes, and fell out of automated telecarts, thus causing the system to jam. The automated baggage system still continued to unload bags even though they were jammed on the conveyor belt, because the photo eye at this location could not detect the pile of bags on the belt and hence could not signal the system to stop. Main Lessons One of the lessons BA and BAA might have been learnt from the Denver project, was that BAE actually built a prototype of the automated baggage handling system in a 50,000 sq. ft. warehouse near its manufacturing plant in Texas. But as similar to the T5 project, there was no evidence of adequate training and the results from simulation testing has been proven to be different to a real world scenario with real customers. I addition, research also shows that BAE had given an initial estimate of at least a year to test the system and get the system up and running, but United airlines and the other stakeholders pressed for a much shorter timeframe. City of Denver got the same story from technical advisers to the Franz Joseph Strauss airport in Munich (that less complicated system had taken 2 years testing and was running 24 hours a day for 6 months before the airport opened. Risks recognised early in the Project Very large scale of the project. Enormous complexity. Newness of the technology. Large number of entities to be served by the system. The high degree of technical and project definition uncertainty. Risk Identification PMBOK (PMBOK Guide, 2004) lists five tools and techniques for risk identific Risk Management of Terminal Development at Airport Risk Management of Terminal Development at Airport Dissertation Objectives Investigate the problems at the terminal 5 opening, especially with the baggage handling system despite extensive simulated testing using thousands of bags and more than two thousand volunteers in the run up to the opening of T5 Identify the necessary risk strategies to be considered for such mega-projects, the benefits of such approaches, taking into account previous failed and successful projects, and any lessons to be learnt Discuss the implementation approach adopted by BAA and the risk associated with this approach Provide formative evaluation summarising key findings and conclusion based on evidence gathered from research T5 Synopsis The terminal 5 project in addition to being a statement of intent for the future of British aviation was built with the aim of improving customer experience and to exhibit Heathrow as a world class international airport. The baggage handling system at T5 was designed to be the largest baggage handling system in Europe for a single terminal. The system consists of a main baggage sorter and a fast track system. The system was designed by an integrated team from BAA, BA and Vanderlande Industries of the Netherlands, with the aim of handling both intra-terminal and inter-terminal luggage. Its processing capacity was intended to be 70,000 bags a day. Bags are meant to undergo several processes on the way through the system, these include; automatic identification, explosives screening, fast tracking for urgent bags, sorting and automatic sorting and passenger reconciliation. The scheduled completion and opening date was March 2008, and T5 was on time and on budget. This was a remarkable achievement especially in a sector where project delays and vast overspends are commonplace (the Millennium dome, Wembley stadium and the Scottish Parliament buildings were all opened late and cost a lot more than the original estimate). However, on its first day in operation, T5s bespoke baggage system was affected by technical software problems, which led to a number of issues, such as cancelled flights, lost baggage, and substantial delays, but more importantly, BAs challenge were its people issues and integrating teams of staff. Initial reports suggest that the day one issues were less to do with technology issues and more to do with inadequate staff training, and this was not just for one group of people but at all levels. Below is a summary of its problems on the opening day: Hundreds of staff found it difficult finding the staff car park entrance Check-in staff struggled with their systems, these problems ranged from very simple tasks such as logging into the baggage system to complex tasks Security personnel who were totally ignorant of their new roles and had to be taken through new procedures in the morning in front of passengers Ground staff and crews and ground staff getting lost in the huge building Baggage handlers struggled to get a hang of the new baggage system Baggage truck drivers got lost within the terminal and needed directions to the aircraft Baggage drivers and handlers could not get luggage from the conveyors to the gates On nine occasions, inspectors from the department of transport had managed to bypass security checks during trials of the terminals new systems and that the terminals alarm system was not working properly Going through these problems therefore suggest that the entire problem was down to lack of adequate training or simply inappropriate appraisal of risk involved. This is very surprising as this was a very high profile project and taking into account that this was a simple 3 team process get baggage, take baggage to aircraft and load baggage onto aircraft. Training System Testing Prior to Opening Based on initial interviews with BAs CIO, it would suggest that the human elements were given the importance it required. BAs CIO, Paul Coby told CIO UK [in March 2007] â€Å"the IT work to support such a large-scale, new-build project was also going well. â€Å"Devices are deployed, connections are being integrated and 2007 will be testing year. The airline is moving onto the T5 systems, so they run for a year ready to operate at the new terminal when it opens in 2008†. According to XXXXX, in the run up to the opening of T5 there were a series of overnight baggage-systems tests using thousands of bags, up to 2000 volunteers and full trials of the check-in procedure for all the IT systems. According to the spokesman for Vanderlande Industries, in testing the baggage handling system, emulation models were utilized broadly to test the low-level controls software, while computer programs took the place of the baggage handling system, and which behave (almost) the same as the part they replace. The report also suggests that for the high-level controls software, the emulation model was broadened by connecting the loose individual models into a large integrated system in which the physical equipment was replaced by a number of interconnected emulation models. According to a number of the volunteers who tested the system prior to its opening commented that the demos were extremely impressive and felt the system was ready in advance of its opening. T5 System Simulation Prior to Opening According to the spokesman for Vanderlande Industries, low-level emulation models were utilized in place of the physical transport equipment in each of the conveyor lines. The low and high level models that were developed produced the same electrical outputs in response to the same electrical inputs as their corresponding physical equivalent (motors, photo-electric cells, barcode scanners, etc), which in the view of both the software developers and management of BA, proof of extensive system testing. System interaction was facilitated with the use of control panels, and with the right frequency, set of bags or multiple bags were generated. During the testing, the conveyor motors were stopped and started utilizing different scenarios in order to generate as much errors as possible with the hope of fixing them. The spokesman also stated that the transport time between two photocells in emulation was equal to the actual time using the real equipment. The same measurement also applied to the total transport time. In addition, during testing the T5 project, over 90 individual low-level emulation models were created as individual models were integrated into 5 different configurations. A separate team spent 4800 hours on building and testing these emulation models. Questions: Training Testing But the first set of questions now has to be asked: how adequate was the tests and training were carried out in relation to T5s baggage systems in advance of the opening? What were the results? What were the problems revealed? and what steps were taken to resolve the problems revealed? Were the tests re-run and, if so, what was the result? Was the right implementation strategy adopted? Or would it not have been better to open Terminal 5 on a phased basis, to make sure that all its systems were working before going fully operational? The second set of questions to be asked would be: knowing that extensive simulation testing was carried out on the baggage system successfully; doesnt that then suggest that carrying out simulated testing without the real customers is inadequate? With regards to the people issues, what sort of dry runs were carried out? If they were indeed adequate, why were the opening day hiccups not identified? Where there extra staff or volunteers in anticipation of potential glitches? If yes were these trained adequately? For every eventuality or possible scenario, what were the contingency plans? In spite of the extensive testing carried out on the baggage system and the confidence which this would have placed on top management, from the experience on the opening day, we can conclude that in reality, the prospects of operating an airport terminal of such magnitude and scale would require more than simulated testing as the operations are virtually impossible to fully replicate. This then suggests that the risk management utilized by the BA was not robust to take the people issues into account. Good risk management might have come to the conclusion, if there was the possibility of failure. Risk Management: Definitions In order to manage risks we have to understand what a risk is. Smith and Merrit (2002) said that three essential aspects of risk are uncertainty, loss and time, see Figure 1. Uncertainty: A project manager has to identify as many uncertainties as possible. A risk may or may not happen. This inherent uncertainty cannot be eliminated, but it can be made little clearer by clarifying the probability of occurrence of the risk, to get at better understanding of the consequences and alternatives if the risk occurs and determine the factors that influence the magnitude and likelihood of occurrence of the particular risk. This means that an uncertainty can never be completely eliminated, but it can be reduced to a level the project find tolerable. This means that even with the best plans there cannot be any guarantees that there will be no surprises [3]. Loss: A risk is always something that involves some kind of loss. If there is no loss possible, then the project is not concerned about the risk, because it cannot compromise the project [3]. Time: Associated with every risk there is a time where the risk no longer exists. Either the risk has occurred and the loss has been suffered or the potential problems that could cause the risk have been resolved and no longer pose a threat. It is important to know when this time has arrived so the risk can be removed from the agenda [3]. Among writers and in the literature there are differences in the meaning of risk management and risk analysis. Frosdick (1997) says that there are no clear views of the differences and what one writer defines as risk management another writer is calling it risk analysis. Frosdick‘s own view is that he separates them by saying that risk analysis is the sum of the processes of risk identification, estimation and evaluation and risk management is about planning, monitoring and controlling activities that are produced by the risk analysis activity. The Association for Project Management (Chapman, Simister 2004) definition of risk analysis is similar to Frosdick‘s, they have however divided the risk analysis into two stages. The first stage is called the Qualitative Analysis and it is where risks are identified and subjectively assessed. These identified risks are then analysed in terms of e.g. cost and time estimates and that is called the Quantitative Analysis. Just like for Frosdick it is then followed by the risk management process. In their definition it is the process of formulating responses, both proactive and reactive ones. Pennock Haimes (2001) said that risk management could be represented in six steps, three each for risk assessment/analysis and risk management, where each step is a question. Risk assessment/analysis What can go wrong? Identify as many risks as possible. The risks can be of any kind financial, time, resources etc. and no risk is too small to not be included [3]. What is the likelihood for the risk to occur? Try to measure how likely, or unlikely, it is for the risk to occur. Maybe some risks are dependent on each other [3]. What are the consequences? What will be the impact on the project if the risk occurs, is it a minor risk or maybe a stopping fault that endangers the whole project [3]. Risk management What can be done and what options are available? How to decrease the chance of a risk occurring, for example get more resources or have them readily available [2,3]. What are the tradeoffs in term of all costs, benefits and risks among the available options? For every risk there is somewhere a limit for how costly measures one can put in, where there is no economy in putting in more measures. Often the budget is not enough to eliminate all risks therefore one must choose which risks to put more emphasis on [2,3]. What are the impacts on current decisions on future options? [3] The official definition provided by Professor James Garven, University of Texas at Austin is from the American Risk and Insurance Association: Risk management is the systematic process of managing an organizations risk exposures to achieve its objectives in a manner consistent with public interest, human safety, environmental factors, and the law. It consists of the planning, organizing, leading, coordinating, and controlling activities undertaken with the intent of providing an efficient pre-loss plan that minimizes the adverse impact of risk on the organizations resources, earnings, and cash flows. Another definition given by Larry Krantz, Chief Executive of Euro Log Ltd in the UK, states that A risk is a combination of constraint and uncertainty. We all face constraints in our projects, and also uncertainty. So we can minimise the risk in the project either by eliminating constraints (a nice conceit) or by finding and reducing uncertainty []. The objectives of risk management/analysis The Association for Project Management (Chapman, Simister 2004) defines Risk Management/Analysis as a process designed to remove or reduce the risks that threaten the achievement of project objectives. Properly undertaken it will increase the likelihood of successful completion of a project in terms of cost, time and performance objectives. PMBOK (PMBOK Guide, 2004) describes it similarly where they say that the objectives of project management are to increase the probability and impact of positive effects and decrease the probability and impact of events adverse to project objectives. Kendrick (2003) list seven benefits on the use of risk management: Project Justification: Project risk management is undertaken primarily to improve the chances that a project will achieve its objectives. While there are never any guarantees, broader awareness of common failure modes and ideas that make projects more robust can significantly improve the odds of success. The primary goal of project risk management is either to develop a credible foundation for each project, showing that it is possible, or to demonstrate that the project is not feasible so that it can be avoided, aborted, or transformed [1]. Lower Costs and Less Chaos: Adequate risk analysis reduces both the overall cost and the frustration caused by avoidable problems [4]. The amount of rework and of unforeseen late project effort is minimised. Knowledge of the root causes of the potentially severe project problems enables project leaders and teams to work in ways that avoid these problems. Dealing with the causes of risk also minimises fire-fighting and chaos during projects, much of which is focused short-term and deals primarily with symptoms rather than the intrinsic sources of the problems [1]. Chadbourn (1999) describes it similarly when he likened the uncertainties to chaos, where a poorly designed project could be described as a room full of mousetraps, each with a ping pong ball [5]. Before you know it, someone not under your control tosses in the first ball, thus mayhem and chaos erupts [5]. In the ideal project the mousetraps are gone. In their place there is a network of dominos, where each action and reacti on could be foreseen [5]. It is within the role of organisations to try and identify these mousetraps and replace them with an orderly string of dominos [5]. Project Priority and Management Support: Support from managers and other project stakeholders and commitment from the project team are more easily won when projects are based on thorough, understandable information [11]. High-risk projects may begin with lower priority, but a thorough risk plan, displaying competence and good preparation for possible problems, can improve the project priority [11]. Whenever you are successful in raising the priority of your project, you significantly reduce project risk—by opening doors, reducing obstacles, making resources available, and shortening queues for services [11]. Project Portfolio Management: Achieving and maintaining an appropriate mix of ongoing projects for an organisation uses risk data as a key factor. The ideal project portfolio includes both lower- and higher-risk projects in proportions that are consistent with the business objectives [13]. Fine-Tuning Plans to Reduce Risk: Risk analysis uncovers weaknesses in a project plan and triggers changes, new activities, and resource shifts that improve the project. Risk analysis at the project level may also reveal needed shifts in overall project structure or basic assumptions [14]. Establishing Management Reserve: Risk analysis demonstrates the uncertainty of project outcomes and is useful in setting reserves for schedule and/or resources. Risky projects really require a window of time (or budget), instead of a single-point objective. While the project targets can be based on expectations (the most likely versions of the analysis), project commitments should be established with less aggressive goals, reflecting overall project risk. The target and committed objectives set a range for acceptable project results and provide visible recognition of project risk [18]. Project Communication and Control: Project communication is more effective when there is a solid, credible plan. Risk assessments also build awareness of project exposures for the project team, showing how painful the problems might be and when and where they might occur. This causes people to work in ways that avoid project difficulties. Risk data can also be very useful in negotiations with project sponsors. Using information about the likelihood and consequences of potential problems gives project teams more influence in defining objectives, determining budgets, obtaining staff, setting deadlines, and negotiating project changes [18]. Risk Assessment Risk Control There are two stages in the process of Project Risk Management, Risk Assessment and Risk Control. Risk Assessment can take place at any time during the project, though the sooner the better. However, Risk Control cannot be effective without a previous Risk Assessment. Similarly, most people tend to think that having performed a Risk Assessment, they have done all that is needed. Far too many projects spend a great deal of effort on Risk Assessment and then ignore Risk control completely [19]. Risk Assessment has three elements: Identify Uncertainties In this element, the entire project plans are explored, with special focus on areas of uncertainty [20]. Analyse Risks In this element, the requirement is to specify how the areas of uncertainty will have an impact on the performance of the project, either in duration, cost or meeting the users requirements [20]. Prioritise Risks At this stage the requirement is to establish which of the Risks identified should be eliminated completely [20]. This step is only is carried out due to the potential extreme impact, which should have regular management attention, and which are sufficiently minor to avoid detailed management attention [20]. In the same way, Risk Control has three elements, as follows: Mitigate Risks According to Mobey et al (2002), risk mitigation would include taking the necessary actions that are possible in advance to reduce the effect of Risk. It is better to spend money on mitigation than to include contingency in the plan [20]. Plan for Emergencies For all those Risks which are deemed to be significant, have an emergency plan in place before it happens [19]. Measure and Control This involves tracking the effects of the risks identified and managing them to a successful conclusion [19]. Different strategies There are different strategies and methods that have different approaches toward risk management. JISC (Joint Information Systems Management) says that the focus for risk management should be on risks related to the particular project, not project management in general (http://www.jisc.ac.uk/proj_manguide15.html). The overall goal according to Kendrick (2003) for risk management in a single project is to establish a credible plan consistent with business objectives and then to minimise the range of possible outcomes. That is why risk management in a project is about identifying potential risks, analyse the ones that have the greatest likelihood of occurring, grade their different levels of impact on the project and define a plan of how to avoid the risk and if it occurs how to reduce its impact (Heldman, 2005). Smith Merrit (2001) sees risk strategy as a five step process. Figure 3 shows the flow through the five-step process and lists deliverables from each step: Step 1: Identify risks that you could encounter across all facets of the project [28]. Step 2: Analyse these risks to determine what is driving them, how great their impact might be, and how likely they are [28]. Step 3: Prioritise and map the risks so that you can choose those most important to resolve [28]. Step 4: Plan how you will take action against the risks on this short list [28]. Step 5: On a regular basis, monitor progress on your action plans, terminate action plans for risks that have been adequately resolved, and look for new risks [28]. Frosdick (1997) also mentioned Strutt‘s, definition of the concept of risk analysis that is a seven stage process. Systematic assessment (item by item question every part of the system) [13]. Identification of risks [13]. Assessment of risks (frequencies and consequences) [13]. Establish acceptable/tolerable levels of risk [13]. Evaluate the risks. Are they acceptable? Can they be reduced and at what cost? Determine whether the risks are as low as reasonably practicable [13]. Determine risk reduction measures where appropriate [13]. Risk Assessment Evaluation There are many ways and different techniques to evaluate what the risks are, what the effect they have on the project and what measures can be put in if the risks should occur [19]. Risk assessment is by most people divided into two areas, Quantitative Risk Analysis and Qualitative Risk Analysis. Quantitative In its most basic form the formula for risk quantification is: à ¢Ã¢â€š ¬Ã¢â‚¬ ¢Rate of occurrenceà ¢Ã¢â€š ¬Ã¢â‚¬â€œ multiplied by the à ¢Ã¢â€š ¬Ã¢â‚¬ ¢impact of the eventà ¢Ã¢â€š ¬Ã¢â‚¬â€œ = risk. Methods based on this method are often called à ¢Ã¢â€š ¬Ã¢â‚¬ ¢expected value analysisà ¢Ã¢â€š ¬Ã¢â‚¬â€œ and include models like Annualized Loss Expectancy (ALM), the Courtney formula, the Livermore Risk Analysis Methodology (LRAM) and Stochastic Dominance (Snyder, Rainer Jr., Carr 1991). The advantages of Quantitative Risk Analysis methodologies are that they are good at identifying the most critical areas that, if something happens, will have the largest impact on the project. There are also disadvantages to Quantitative Risk Analysis. When one measures the probability of damage to the project the quantitative approach tends to average the events leading up to a problem (Snyder, Rainer Jr, Carr 1991). Qualitative Qualitative methods attempts to express risks in terms of descriptive variables rather than an economic impact. These approaches are based on the assumption that certain threat or loss of data cannot be appropriately expressed in terms of dollars or pounds and that precise information is impossible to obtain. These methodologies include Scenario Analysis/Planning, Fuzzy Metrics and questionnaires (Snyder, Rainer Jr., Carr 1991). The advantages of Qualitative Risk Analysis methodologies are that they save time, effort and expense over quantitative methods. This is because assets do not need exact values in dollars or pounds nor do threats need to have exact probabilities. It is also a valuable methodology in identifying significant weaknesses in a risk management portfolio. There are disadvantages with this method as well. Qualitative Risk Analysis is inexact, the variables used (e.g. low, medium and high) must be understood by all parties involved (Snyder, Rainer Jr., Carr 1991). Risks Reduction Once risks have been identified and evaluated they have to be responded to in some way. Wideman (1992) lists seven basic responses on identified risks: Recognised but no action taken (absorbed as a matter of policy) Avoided (by taking appropriate steps) Reduced (by an alternative approach) Shared (with others, e.g., by joint venture) Transferred (to others through contract or insurance) Retained and absorbed (by prudent allowances) Handled by a combination of the above Dorfman (1997) says that all techniques to manage the risk fall into one or more of these four major categories (remembered as the 4 Ts): Tolerate (aka Retention) Treat (aka Mitigation) Terminate (aka Elimination) Transfer (aka Buying Insurance) Bliss (2005) listed these five types of similar risk responses as Dorfman and Wideman. Risk avoidance: Also known as risk removal or risk prevention, risk avoidance involves altering the original plans for the project so that particularly risky elements are removed. It could include deciding not to perform an activity that carries a high risk. Adopting such avoidance techniques may seem an obvious way to deal with all risks. However, often the areas of the project that involve high risks are also the areas of the project that potentially contain the highest worth or the best value for money. Avoiding such risks may also result in removing potentially the best bits of a resource, and an alternative strategy that retains these risks may be more appropriate [13]. Risk reduction: Risk reduction or risk mitigation involves the employment of methods that reduce the probability of a risk occurring, or reducing the severity of the impact of a risk on the outcome of the project. The loss of highly skilled staff is a considerable risk in any project and not one that can be totally avoided. Suitable risk mitigation could involve the enforcement of a notice period, comprehensive documentation allowing for replacement staff to continue with the job at hand and adequate management oversight and the use of staff development programmes to encourage staff to stay [20]. Risk transfer: Risk transfer moves the ownership of the risk to a third party normally by contract. This also moves the impact of the risk away from the project itself to this third party [20]. Risk deferral: The impact a risk can have on a project is not constant throughout the life of a project. Risk deferral entails deferring aspects of the project to a date when a risk is less likely to happen. For example managing the expectations users have about the content and delivery of a resource can be time-consuming, one way to reduce this risk is by not making a web resource available until user testing is complete [20]. Risk retention: Whilst a certain number of the risks to the project originally identified can be removed by changing the project plan or dealt with by transferring the responsibility of the risk to third parties inevitably certain risks have to be accepted as a necessary part of the project. All risks that have not been avoided or transferred are retained or accepted risks by default [20]. Previous Successful Project: St Pancras International Rail Station According to XXXXXX, before St Pancras International rail station was opened; a number of days were devoted to testing all the systems and processes, using an army of thousands of volunteer passengers. These tests were carried out much before the opening day, thus providing enough time to resolve issues that might have occurred during testing [26]. By carrying out the testing in phases much long before the opening, members of staff were able to familiarize themselves with the systems and get actual hands-on experience before the station was opened to Eurostar traffic. Dry-runs were carried out as well with the vital lessons were learnt and adjustments made before exposing paying customers to the St Pancras experience. Inevitably the result was that on the opening day, everything went without glitches on the first day of international service [26]. Previous Failed Project: Denver International Airport The Denver International Airport was scheduled to open on October 31, 1993 with all three of its concourses fully running on the BAE automated baggage handling system that. On February 28, 1995, the new airport finally opened. Its opening came sixteen months late. The automated baggage system was supposed to improve baggage handling by using a computer tracking system to direct baggage contained in unmanned carts that run on a track. BAE systems presented the City of Denver with a proposal to develop â€Å"the most complex and automated [and integrated] baggage system ever built. Original target opening date for the airport was (delayed seven times over the next three months). City of Denver invited reporters to observe the first test of the baggage system without notifying BAE. This was a public disaster! Reporters saw piles of disgorged clothes and other personal items lying beneath the Telecars tracks. Lots of mechanical and software problems plagued the automated baggage handling system. When the system was tested, bags were misloaded, sent to different routes, and fell out of automated telecarts, thus causing the system to jam. The automated baggage system still continued to unload bags even though they were jammed on the conveyor belt, because the photo eye at this location could not detect the pile of bags on the belt and hence could not signal the system to stop. Main Lessons One of the lessons BA and BAA might have been learnt from the Denver project, was that BAE actually built a prototype of the automated baggage handling system in a 50,000 sq. ft. warehouse near its manufacturing plant in Texas. But as similar to the T5 project, there was no evidence of adequate training and the results from simulation testing has been proven to be different to a real world scenario with real customers. I addition, research also shows that BAE had given an initial estimate of at least a year to test the system and get the system up and running, but United airlines and the other stakeholders pressed for a much shorter timeframe. City of Denver got the same story from technical advisers to the Franz Joseph Strauss airport in Munich (that less complicated system had taken 2 years testing and was running 24 hours a day for 6 months before the airport opened. Risks recognised early in the Project Very large scale of the project. Enormous complexity. Newness of the technology. Large number of entities to be served by the system. The high degree of technical and project definition uncertainty. Risk Identification PMBOK (PMBOK Guide, 2004) lists five tools and techniques for risk identific

Wednesday, November 13, 2019

In Search of King Arthur :: Internet Literature Essays

In Search of King Arthur Ever since I was a little girl, I was fascinated by stories of courageous knights and virtuous ladies, who populate the covers and pages of books and screens of the movie theaters. Their splendid attire, glamour of the courts and impeccable manners attracted and conquered the imagination of the little girl. Robin Hood was one of my favorite characters, however there was one hero, who troubled my imagination most of all. I have heard and read numerous stories of a magnificent, just and most generous king of all, King Arthur. Legends and myths surrounding the adventures of this character preoccupied my thoughts and pulled me into reading marathons. Today, several years later, I am continuing to indulge my interests. Luckily there is so much material available on the Internet on the subject of King Arthur's and his knights' adventures that I don't have any trouble locating the material interesting to me. Moreover, I have found the following Internet sites most useful in studying the top ic of King Arthur's adventures: Britannia.com (http://www.britannia.com/history/h12.html), The History and Historicisation of Arthur (http://www.users.globalnet.co.uk/~tomgreen/arthur.htm) and Legends (http://legends.dm.net/kingarthur/index.html.). Britannia.com is a very well-structured website. The home page of this Internet site is organized in a manner that allows a viewer to locate necessary information speedily and with ease. However, besides being well structured, the site contains all the essential information related to King Arthur and other main characters of the legend such as Merlin, Guinevere. Information on Geoffrey of Monmounth, the author of the History of the Kings of Britain, is also available. A viewer only needs to click on Arthur, the King (http://www.britannia.com/history/arthur/kaking.html) in order to find numerous hypotheses of King Arthur's birth and origin as well as general theories of his existence: "Arthur, it seems, is claimed as the king of nearly every Celtic Kingdom know" (Arthur, the King, p.1). Here King Arthur is claimed to be a Breton king, a Dumnonian king, a Cumbrian king, an Elmet king, a Scottish king, a Powysian king, among others. Many historians such as Geoffrey Ashe, Graham Philips and Martin Keatman identify Arthur with various noble houses that occupied territories of Great Britain and Scotland. Furthermore, Britannia.com contains links to such material as Timeline of Arthurian History (http://www.britannia.com/history/timearth.html). These pages contain a detailed timeline, starting from 63 A.D., with Joseph of Arimathea's coming to Glastonbury, bringing with him the Holy Grail, and ending in 1090 A.

Monday, November 11, 2019

Importance of Mother Nature

More and more people are becoming aware of the importance of saving mother earth. Indeed, the sense of urgency behind the drive to save the environment is stronger than ever before. After all, we only have one planet; if this one becomes totally ruined, our children, grandchildren and great-grandchildren will not have a home. If we all do our part to save mother earth, it is definitely possible. Therefore, people should learn as much as they can about ways that they can help save the environment; by working together, our planet can remain habitable for centuries to come.Save Mother Earth Tip #1: RecyclingThe popularity of recycling has increased a great deal in recent years, as people search for ways of saving mother earth. Recycling can have a dramatic impact on helping to save the environment. Many different things can be recycled and reused, reducing waste and garbage in landfills and around the planet. In terms of helping to save the environment, recycling is an excellent strateg y. It makes sense, in saving mother earth, to reuse her resources as much as possible. Increasing recycling efforts can help us save the environment.Save Mother Earth Tip #2: EducationTeaching our children about the importance of saving mother earth is a great way of instilling lifelong habits that can help save the environment. Schools are increasing the teaching of subjects that pertain to helping to save the environment. Young children are encouraged to help save mother earth by engaging in various habits that promote eco-friendly techniques. Parents can also increase the green-education of their children by demonstrating every day strategies for helping in the fight to save the environment.If everyone does their part, today’s children will be tomorrow’s environmentalists, helping to save our planet from ruin.One major problem of the environment is lack of knowledge. If that little girl knew that she killed trees when she crumples the paper if she draws an oval inst ead of a circle, I think she wouldn’t continue doing that. And if she still did, it will be lesser compared to before. If only she knew. If only we knew. If only we knew earlier.

Friday, November 8, 2019

Search for E.T. essays

Search for E.T. essays Can the Earth be the only place in the Universe that harbors life? Most astronomers don't believe this is true. Certain statistics in the Universe provide evidence that living beings may be common place through out the universe, on planets of other stars besides the sun. In this paper I plan to discuss the various viewpoints of those that believe that extraterrestrials exist and have even been visiting Earth, and the viewpoints of skpetics that believe that aliens don't exist and have not been visiting Earth. To get into the topic we must first start at the base of the subject. First the question must be dealt with of life being only indigenous to planet Earth. One of the most basic materials that are essential to form life are basic carbon compounds. These carbon compounds are very abundant throughout the Universe. Carbon compounds exist not only on planets but on comets and free floating asteroids and gas clouds in space. Although, even with the abundance of all these compunds in the Universe the chances of these compounds forming into living beings aren't so great, however it is true that the odds of carbon forming into life sustaining compounds is greatly increased with an increase in time. The Universe works on a basis backward to the human way of thinking. The Universe becomes more orderly with time while we would tend to think that time breaks down structures. This means to us that the chances of life evolving on any part of the Universe increases as time moves forward. Another factor that is necessary for life evolving is a Star's size. Our Sun is a very ordinary star in terms of it size and temperature. Statistics show that there are billions of stars like the sun in our galaxy alone. ( Henbest & Couper, 1989, paragraph 5 ) Life evolving in one of these star systems may have developed in the same way humans have. Philosophers have argued for centures about how to define life. " If we study living things on the Earth, we find...

Wednesday, November 6, 2019

Free Essays on Black Girl in Paris

Black Girl in Paris is a coming of age story about a smart, young girl named Eden who boldly states in the first chapter, â€Å"I’m not afraid of anything.† Embracing the courage and determination of this young woman’s adventuresome spirit to buy a one-way ticket to Paris, I flipped pages wondering what would become of her. Eden many times has to remind herself of the same thing in France. She is following her dream to live in Paris, following, too, in the footsteps of some of her mentors, most notably, James Baldwin. Along the way, Eden learns many lessons and is forced to make sacrifices of her own personal dignity. She takes jobs that she wouldn’t put on her â€Å"dream job† list, but does so out of a need to survive. Much of this book chronicles these "alternative" modes of employment. And each chapter is named after her new professional exploit. The jobs stretch the gamut: museum guide, traveling companion, artist’s model, au pair, poet’s helper, lover, English teacher, and thief. Throughout, she is challenged to reinvent herself, and forced to question and reassess the core of her being. Moving from job to job, Eden explores issues of who to trust, where her sexuality lies, and what it is really like to be black in Paris? Much of her journey is focused on her desire to write, to prove that she can write, and that she can somehow rub up against the talent of other fellow Black writers by following in their footsteps. Shay Youngblood took a similar trip to Paris as a young girl and this story could be mistaken for memoir. Regardless of how accurate these accounts are, this novel is a tale of the vibrant spirit of a strong young woman. It is a testament of the adaptability of the human spirit and how our path of survival pushes us to become more resilient.... Free Essays on Black Girl in Paris Free Essays on Black Girl in Paris Black Girl in Paris is a coming of age story about a smart, young girl named Eden who boldly states in the first chapter, â€Å"I’m not afraid of anything.† Embracing the courage and determination of this young woman’s adventuresome spirit to buy a one-way ticket to Paris, I flipped pages wondering what would become of her. Eden many times has to remind herself of the same thing in France. She is following her dream to live in Paris, following, too, in the footsteps of some of her mentors, most notably, James Baldwin. Along the way, Eden learns many lessons and is forced to make sacrifices of her own personal dignity. She takes jobs that she wouldn’t put on her â€Å"dream job† list, but does so out of a need to survive. Much of this book chronicles these "alternative" modes of employment. And each chapter is named after her new professional exploit. The jobs stretch the gamut: museum guide, traveling companion, artist’s model, au pair, poet’s helper, lover, English teacher, and thief. Throughout, she is challenged to reinvent herself, and forced to question and reassess the core of her being. Moving from job to job, Eden explores issues of who to trust, where her sexuality lies, and what it is really like to be black in Paris? Much of her journey is focused on her desire to write, to prove that she can write, and that she can somehow rub up against the talent of other fellow Black writers by following in their footsteps. Shay Youngblood took a similar trip to Paris as a young girl and this story could be mistaken for memoir. Regardless of how accurate these accounts are, this novel is a tale of the vibrant spirit of a strong young woman. It is a testament of the adaptability of the human spirit and how our path of survival pushes us to become more resilient....

Monday, November 4, 2019

Gemma Lynns Catering Services Term Paper Example | Topics and Well Written Essays - 3000 words

Gemma Lynns Catering Services - Term Paper Example The report will be divided accordingly: The first section of the report will discuss the principles of bookkeeping and accounting, giving an understanding as to why financial statements are important and how Gemma can use these financial statements to aid her in decision making. It will also answer the Gemma's first question regarding her profits. The second part of the report will discuss Gemma's business as it compares with the industry figures. Based on the figures, the report will also indicate the areas in her business that require improvements and provide suggestions on how these can be improved. The third part of the report will discuss Gemma's plans for expansion and provide suggestions on how profitability can be ensured during and after expansion. A section to coordinate the whole report will come after and provide concluding comments regarding the whole report. Gemma's catering business is a private enterprise under single proprietorship. Even though this does not obligate her to publish her accounts, it does not exclude her from having to document her financial records for taxation and other legal purposes. There are at least three minimum documents needed to properly audit her company's finances. Among these are the balance sheet, the income statement, and the cash flow statement, each of which has a specific purpose within a business enterprise.The balance sheet, from which a company's assets are balanced with their liabilities, "shows a 'snapshot' of the firm at the particular point in time"(Blandon, 2001). It contains important information such as the company's assets (cash in the bank, stock, debtors, and fixed assets), liabilities (creditors, tax payables, other types of liabilities such as long-term loans), and net worth.

Saturday, November 2, 2019

Essay (see instructions) Example | Topics and Well Written Essays - 500 words

(see instructions) - Essay Example Every neighboring country of China finds its support in the matter of international relations. For instance, Pakistan seeks Chinese vote in the UN for the disputed territory of Kashmir. Similarly, Bangladesh finds (and gets) military support from China. This tactic might be based on China’s interest of keeping the upper hand against the rising power of Indian military but in the process Chine wins a strategic ally. There are very few economic powers in the world that are non-threatening. When it comes to Chinese neighbors, the country has kept neutral or friendly relations with most of them. Soviet Union was a Eurasian giant, but it was ruthless and had volatile relations with its neighbors. China is relatively non-threatening to its neighbors. Its policies are helpful and seek long term stability with its partners. Chinese trade relations with other countries are based on the preferences of their leaders. This is a long term and a highly rewarding strategy for China. It also helps win China the influence it needs to dominate Asia. In recent times, China has dramatically improved its relations with Korea and South East Asia. For this reason, it was the mediator in the North Korean nuclear crisis. The Chinese economic exchange with its neighbors also supports its internal economics. Its economic engine gets the essential fuel it requires to run at a steady pace. Its influence in Asian territories is non-threatening because China engages with its neighbors frequently. Its neighbors are not afraid of its rising economic and military power. Asian countries also support China because they consider it an icon for the international balance of power. The U.S. has significant voice and presence in the international politics. It is only natural to have the power (like China) that can counter the American dominance in the world. In addition, there is an urge in the Chinese people to return China to its