Saturday, August 31, 2019

An admission essay Essay

â€Å"Finance is like art† you have to analyse every aspect before making just a decision. I believe that if someone is good at art, he would be good at finance because you need logic; everything has a set order and method. Each piece is placed carefully and has a high significance amongst its environment. You need analytical skills to take apart every piece of information and use it to make your own decisions. After three years studying at University of Tirana- Finance Department I am once again seeking career advancement and this is the reason why I applied to this program. Taking into consideration my foundation and my interests, graduating from this studying program is the next logical step. I have got ambition to climb the career ladder, but in my opinion to reach the highest positions you must be motivated to keep your skills updated and motivation is one of my greatest skills. Motivated from the above sentence my goal is to work in a reputable investment bank or the treasury departments of an international bank. But also I would like to work as a financial advisor, which is my short term goal. My education has provided me with an excellent introduction to business, and they have sparked my interest in finance. I have the ability to pick up skills and knowledge quickly and am independent enough to conduct my own study and research. I have become more flexible in identifying what concepts need to be used and when, thus, helping me achieve the greatest results possible are the studies of this program. This is the way my education contributed to my decision to enter the program. At this point in my life, I consider the studies of the program necessary since I need to gain a broader understanding of finance and to sharpen my analytical skills in order to be successful in corporate finance. This program will assist me achieving my future career goals because it will allow me to concentrate in finance, strengthen my global business perspective, and provide me with the opportunity to study with and learn from people with varied backgrounds. It will also help me to develop my self-confidence and will give me greater powers of resilience. Upon graduation from the program, I will seek a position as an associate within the corporate finance department of a large, Wall Street, investment-banking firm. In three to five years, once I have become adept in financial analyses, drafting prospectuses, preparing business presentations and other financial advisory work, I will move into a senior associate position. Here I will develop my abilities to anticipate client needs and to engineer solutions that address these needs. In approximately 10 years, I will have the experience necessary to take on upper-level management.

Friday, August 30, 2019

Business Continuity Plan as a Part of Risk Management

Celem niniejszej pracy jest zaprezentowanie roli i znaczenia Planu Ciaglosci Funkcjonowania Przedsiebiorstwa w calosciowym procesie zarzadzania ryzykiem w firmie oraz przedstawienie przykladowej tresci takiego planu.Rozdzial pierwszy zawiera ogolne wprowadzenie do zagadnienia zarzadzania ryzykiem. Przedstawia on definicje ryzyka w sensie, w jakim jest ono rozumiane w niniejszej pracy. Ponadto, znajduje sie w nim opis wielorakich zagroSen, ktore sa zwiazane z funkcjonowaniem przedsiebiorstwa, a takSe lista metod sluSacych do pomiaru ryzyka oraz opis przykladowych postaw, jakie sa przybierane wobec zagroSen. W rozdziale drugim zaprezentowano pojecie Zarzadzania Ciagloscia Funkcjonowania Przedsiebiorstwa. Znajduje sie tu charakterystyka ewolucji tego zagadnienia oraz wyjasnienie, dlaczego Plan Ciaglosci FunkcjonowaniaPrzedsiebiorstwa jest dokumentem o ogromnym znaczeniu dla firmy i jej interesariuszy. Ponadto, w rozdziale tym poddano dyskusji pewne szeroko rozpowszechnione mity dotyczac e Zarzadzania Ciagloscia Fukncjonowania Przedsiebiorstwa. Ta czesc pracy konczy sie opisem Analizy Wplywu na Przedsiebiorstwo jako glownego narzedzia, ktorym posluguje sie opisywany typ zarzadzania. W rozdziale trzecim przedstawiono rezultaty dokonanej przez autorke analizy roSnych Planow Ciaglosci Funkcjonowania Przedsiebiorstwa i ich szablonow.To studium bylo podstawa do zaprezentowania przykladowej struktury Planu oraz opisu najczesciej spotykanych w nim bledow. Ostatni rozdzial zawiera takSe charakterystyke faz wprowadzania i testowania Planu, ktore sa rownie waSne jak etap jego przygotowania. Wspolczesne przedsiebiorstwa nie moga sobie pozwolic na postawe reaktywna wobec realnych zagroSen, gdyS wydarzenia bedace w stanie zaklocic ich funkcjonowanie sa liczne i moga zaistniec zarowno w wewnetrznym, jak i zawnetrznym srodowisku firmy. Profesjonalnie przygotowany i skrupulatnie 5 aktualniany Plan Ciaglosci Funkcjonowania Przedsiebiorstwa cechuje postawe proaktywna. Jest nie tylko ogromnie pomocny w przezwycieSaniu trudnosci, ale dla interesariuszy firmy stanowi takSe dowod jej wiarygodnosci. MoSna wiec oczekiwac, Se coraz wiecej przedsiebiorstw bedzie sie staralo zdobyc ten nieoceniony atut. 6 ABSTRACT The aim of this thesis is to present the role and significance of a Business Continuity Plan (BCP) in the holistic process of a company’s Risk Management, and to provide a characteristic of exemplary BCP contents. The first chapter contains a general introduction into Risk Management.It delivers the definition of risk as it is understood in the context of the present thesis. Moreover, there is a description of multiple risks which are relevant to a company’s activity, as well as a list of the risk measurement methods and an account of exemplary attitudes towards threats. The second chapter presents the question of Business Continuity Management (BCM). It characterizes the evolution of this concept and explains the reasons why the BCP is a documen t of utmost importance to the company and its stakeholders. What is more, certain wide-spread myths concerning BCM are also disputed there.This part of the thesis ends with a description of Business Impact Analysis as the main tool of Business Continuity Management. The third chapter provides the results of the author’s analysis of various Business Continuity Plans and their templates. That study has been the basis for the presentation of an exemplary structure of a Business Continuity Plan, as well as for the description of the most frequent mistakes which occur in BCPs. The last chapter also contains a characterization of implementation and testing phases which are as significant as the preparation of a Business Continuity Plan.Modern companies cannot afford a reactive stance towards possible threats as the dangers which may disrupt their functioning are multiple and come both from the inner and outer environment. A professionally prepared and carefully updated Business Con tinuity Plan characterizes a proactive attitude. Not only does it significantly help to overcome difficulties, but it is also a convincing proof of the firm’s reliability to all its stakeholders. Therefore, it may be expected that more and more companies will attempt to acquire this invaluable asset. 7 INTRODUCTIONThe present thesis is the result of the author’s interest in various aspects of Risk Management, especially in the procedures which are applied by companies in case their functioning is faced with a serious threat. The most effective method used by business units is called Business Continuity Management (BCM) and focuses on the preparation and implementation of a Business Continuity Plan (BCP). The aim of this thesis is to present the role and significance of a Business Continuity Plan in the holistic process of a company’s Risk Management, and to characterize the contents of an exemplary Plan.The first chapter contains a general introduction into Risk Management and includes, inter alia, a description of multiple threats which are relevant to the company’s activity and a list of risk measurement methods. The second chapter discusses the concept of Business Continuity Management, explains the importance of Business Continuity Plan and characterizes the steps which lead to the development and implementation of this document. In the third chapter, there is a description of the contents which should be included in a Business Continuity Plan.That presentation is based on the author’s analysis of various BCPs and their templates. The exemplary materials enclosed in appendices have been provided by Punk, Ziegel & Company, Business Link, London Borough and Wallsal Council. All the translations which are enclosed in the present thesis have been made by the author. The references have been edited in accordance with the traditional Footnote/Endnote System. 8 CHAPTER 1 RISK MANAGEMENT This chapter contains an introduction into the nature and types of risk, as well as a description of the methods by which risk is assessed and managed.All these issues are inseparably connected with the concept of Business Continuity Plan, which aims at making provisions for the whole spectrum of present and future threats that may put a company's proper activity into danger. When a company decides to prepare and implement such a plan, it has to carry out a complex and accurate analysis of all the factors which may influence its operation, so that even the least expected dangers are taken into consideration. The first phase of drafting a BCP requires the recognition of existing and prospective risks, evaluation of their possible impacts and assumption of particular attitudes towards them.These vital steps are covered by Risk Management, which helps to organize the findings and solutions in a logical way. The proactive nature and principles of this comprehensive process will be presented and explained in the following chapte r. 1. 1. The Definition of Risk Risk and uncertainty are inseparable parts of every aspect of life. As Jan Mikolaj writes, â€Å"risk is connected with human activity, while uncertainty applies to the environment. †1 When these terms are used in the scientific context, they must be precisely defined.Some of the authors of economic and financial literature do not stress the difference between them. For example, Allan Willet states that â€Å"risk is objective uncertainty of the occurrence of an undesirable event. †2 In his opinion, â€Å"risk changes in accordance with uncertainty, not with probability level. †3 Similarly, Joseph Sinkey defines risk as â€Å"uncertainty connected with some occurrence or profit 1 2 Jan Mikolaj, Risk Management, (RVS FSI ZU, Zilina 2001), p. 17. Allan Willet, The Economic Theory of Risk Insurance, (Philadelphia 1951), p. . 9 in the future. †4 Frank Reilly thinks that â€Å"risk is the uncertainty that the investment may not bring the expected return. †5 However, the prevailing trend in modern professional literature is to differentiate between them. According to the Dictionary of Economic and Financial Terminology by Bernard and Colli, risk is â€Å"the probability of incurring losses by a business unit as a consequence of making a certain economic decision by this unit. The probability results from the uncertainty of the future. 6 The same source states further that â€Å"the concept of uncertainty is used in the situation when calculus of probability cannot be applied, whereas the term risk concerns recurrent events which possibility of occurrence can be calculated using the calculus of possibility. †7 Similar classification is introduced by Frank Knight. In his opinion, risk is a â€Å"measurable uncertainty,†8 while â€Å"immeasurable uncertainty†9 is uncertainty sense stricto. According to Irving Pfeffer, â€Å"risk is the combination of hazard and is measurable by pr obability mathematics, whereas uncertainty is measured by the level of confidence.Risk is a state of the world while uncertainty is a state of mind. †10 To summarize, risk means â€Å"a condition in which there exists a possibility of deviation from an outcome that is expected or hoped for. †11 Risk â€Å"can be expressed as a probability, ranging from 0 to 100 percent. †12 What is important, although not often mentioned in professional literature, there is not only the negative aspect of risk, but also the positive one. Thus, it is a possibility of loss as well as gain. 3 4 ibid. Joseph Sinkey, Commercial Bank Financial Management, (New York: Macmillan Publishing Co. 1992), p. 391. 5 Frank Reilly, Investments, The Dryden Press, (London: Intenational Edition, Collins, 1988), p. 463 6 Bernard and Colli, Slownik ekonomiczny i finansowy, (Wydawnictwo â€Å"KsiaSnica†, 1995), p. 156. 7 ibid. , p. 157. 8 Frank Knight, Risk, Uncertainty and Profit, (Boston: Univ ersity of Boston Press, 1921), p. 233. 9 ibid. 10 Irving Pfeffer, Insurance and Economic Theory, (Illinois: Irvin Inc. Homewood, 1956), p. 42. 11 Reto Gallati, Risk Management and Capital Adequacy, (New York: Mc Graw Hill, 2003), p. 7. 12 ibid. , p. 8. 10 1. 2. Risk in Business ActivityThe volume and diversity of risk obviously depend on a company’s type and branch of economy, but risk as such is a phenomenon which accompanies in its versatile forms any kind and field of business activity. It may come from the external environment of a company as well as from the internal one. For some entrepreneurs, risk is a necessary evil, whereas for others it is an additional motivation, if not the main one. Whatever the point of view is, if a given business activity is to succeed, it is essential to recognize what are the kinds of possible risk, asses their possible impact and acknowledge ways of reacting towards them.Such identification will considerably help in developing a suitable a ttitude, which allows minimizing a potential loss and maximizing a gain. 1. 2. 1. Types of Risk Types of risk which threaten a company’s activity are complex and numerous. Classifications of risk provided by professional literature differ with regard to the assumed criteria. The following comprehensive categorization is based mainly on the division presented in the book Risk Management in Emerging Markets.How to Survive and Prosper by Carl Olsson13: †¢ business risk (also called strategic risk) concerns potential results of inappropriate strategies, inadequate allocation of resources and changes in economic or competitive environment; †¢ market risk is associated with potential results of changes in market prices. It can be divided into: – interest rate risk, –foreign exchange risk, – commodity price risk, Carl Olsson, Risk Management in Emerging Markets. How to Survive and Prosper, (London, Pearson Education United, 2002), pp. 35-36. 13 11 shar es price risk; †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ credit risk means that a debtor may not pay in due time; industry risk regards operating in a particular industry; liquidity risk applies to inability to pay debts because of the lack of available funds; operational risk means potential results of actions by people, processes, and infrastructure; accounting risk concerns a possibility of financial accounts not being in accordance with the reality; reputation risk regards the results of changes in a company’s reputation; country risk is associated with effects which the mother ountry’s and foreign countries’ economic policies may have over the company; sovereign risk applies to lending money to the government or a party guaranteed by the government; political risk means results of changes in political environment; legal/regulatory risk is associated with the consequences of non-compliance with legal or regulatory requirements; environmental/ecological risk applies to the changes in natural environment which affect a company; systemic risk concerns small events which may produce much larges results than expected; technological risk is associated with the consequences of bringing new technology products to the market and introducing new IT systems; natural risk concerns natural and space disasters. All these risks usually appear simultaneously and their effects are synergic. Therefore, none of them should be ignored when considering the company’s situation. After realizing the large number and complex nature of different types of risk involved in all aspects of business activity, a logical step is to try to estimate their potential impact and results. 12 1. 2. 2. Methods of Risk Evaluation An assessment of a particular risk, both internally- and externally-driven, allows taking an appropriate attitude towards it.As Andrzej Stanislaw Barczak writes, such a measu rement involves both subjective and objective elements. 14 The subjective component consists in assuming a priori particular stipulations of a given evaluation tactic, as well as interpreting obtained results in a specific way. The objective constituent derives from the common agreement of the business circle on the methods widely applied to the assessment of risk. Two main types of risk measurement tactics are quantitative risk assessment and qualitative risk assessment. 1. 2. 2. 1. Quantitative Risk Assessment The main conception of quantitative risk assessment is to determine the cost of a given unwelcome occurrence, i. e. o calculate how big the loss would be if an adverse event happened. As it is pointed out in The Security Risk Management Guide, â€Å"it is important to quantify the real possibility of a risk and how much damage, in monetary terms, the threat may cause in order to be able to know how much can be spent to protect against the potential consequence of the threat . †15 This method involves: †¢ evaluation of assets (determining the overall value of a company’s assets, the immediate financial impact of losing the asset and the indirect value of losing the asset); †¢ measurement of the Single Loss Expectancy (SLE), which means â€Å"the total amount of revenue that is lost from a single occurrence of the risk. 16 It is calculated by â€Å"multiplying the asset value by the exposure factor (EF). The 14 Andrzej Stanislaw Barczak, Ryzyko – kategoria obiektywna czy subiektywna? , (Poznan: WSB, 2000), s. 30. 15 Microsoft, The Security Risk Management Guide, (Microsoft Corporation, 2004), p. 19. 16 ibid. , p. 18. 13 exposure factor represents the percentage of loss that a realized threat could have on a certain asset. †17 †¢ assessment of the Annual Rate of Occurrence (ARO), which is â€Å"the number of times that one can reasonably expect the risk to occur during one year. †18 This step is very diffi cult; it bases on historical data and previous experiences, and requires consultation with experts. calculation of the Annual Loss Expectancy (ALE), which stands for â€Å"the total amount of money that an organization will lose in one year if nothing is done to mitigate the risk. †19 This figure is established by multiplying the SLE and the ARO. †¢ valuation of the Cost of Controls (ROSI), i. e. establishing â€Å"accurate estimates on how much acquiring, testing, deploying, operating, and maintaining each control would cost. â€Å"20 It is estimated by using the following equation: (ALE before control) – (ALE after control) – (annual cost of control) = ROSI Although quantitative risk analysis provides clearly defined goals and results, all of the involved calculations are based on subjective estimates, which may prove inaccurate. Moreover, the whole process can be long and costly. 1. 2. 2. 2. Qualitative Risk AssessmentIn opposition to the quantitative method, qualitative risk assessment does not â€Å"assign hard financial values to assets, expected losses, and cost of controls†21 but instead, 17 18 ibid. , p. 19. ibid. , p. 19. 19 ibid. , p. 19. 20 ibid. , p. 19. 21 ibid. , p. 20. 14 â€Å"calculates relative values. †22 It involves distribution of questionnaires among people in the company who have relevant skills and knowledge, and workshops. The questionnaires are designed to discover what assets and controls are already deployed, and the information gathered can be very helpful during the workshops that follow. In the workshops participants identify assets and estimate their relative values.Next they try to figure out what threats each asset may be facing, and then they try to imagine what types of vulnerabilities those threats might exploit in the future. The information security experts and the system administrators typically come up with controls to mitigate the risks for the group to consider and the approx imate cost of each control. Finally, the results are presented to management for consideration during a cost-benefit analysis. 23 This tactic does not require a lot of time and it is not a big burden for the people involved. What is more, the results of the implemented solutions are quickly visible. However, the estimated figures are often perceived as too vague.These two presented approaches are often used together in order to obtain the most comprehensive information about a potential threat. Although scientific methods of risk assessment are helpful in estimating the possible impact which particular occurrences may have on the company’s activity, it is essential to remember that none of the methods can be perceived as 100% trustworthy and absolutely infallible. However, even if it is impossible to predict all threats and provide for all undesirable events, the significance of risk evaluation tactics combined with human knowledge, experience, imagination and intuition canno t be questioned. 1. 3. Risk Management in Business ActivityThe fact that the phenomenon called risk is measurable and its occurrence may be predicted means that it is also possible to take preventive measures and proactive attitude towards it. As Reto Gallati stresses, â€Å"the term Risk Management is a recent creation, but the actual practice of risk management is as old as civilization itself. †24 In everyday life, people face risk in a varying degree all the time and they manage it in a natural way so as to minimize undesired impact and render possible profits. 22 23 ibid. , p. 20. ibid. , p. 20. 15 Certain individuals even enjoy plunging into extraordinarily dangerous situations in order to check how they will cope in difficult moments.However, Andrew Holmes notices that â€Å"at the individual level, if a person takes a risk and fails to manage it properly, the damage is limited to him, and maybe his near relatives,†25 while â€Å"the management of risk for orga nizations is not as simple. †26 As it was presented in the part 1. 2. 1, the company is a subject to various and multiple threats. Holmes stresses that â€Å"ultimately, all risks have a financial impact. †27 The complexity of the required actions aimed at coping with the risk means that â€Å"within the modern corporation, risk management must encapsulate managing strategic, business, operational, and technical risks, rather than those associated with pure finance such as credit, interest rate, and currency risk. †28 Nowadays, Risk Management is not an extra feature added to a company’s basic activity, but â€Å"an essential skill of all modern corporations. †29 All usiness units should realize its great importance, because it is essential not only for their success but simply survival. According to Holmes, a company’s attitude towards the risk depends on its risk sophistication, which can be divided into five stages30: †¢ at the lowest level of sophistication (reactive stance), risks are dealt with only when they turn into live issues or when crisis strikes. There is no effort to recognize and measure possible risks in advance. †¢ At a slightly more sophisticated stage, a company understands the importance of risk management and takes the trouble to identify and manage threats more actively. It tends to seek out the best practice and views adverse events in a wide context. At the next level, there are organizations which acknowledge the need to manage risks throughout the organization and usually develop some form of 24 25 Reto Gallati, Risk Management and Capital Adequacy, (New York: McGraw Hill, 2003), p 11. Andrew Holmes, Risk Management (Oxford: Capstone Publishing, 2002), p. 2. 26 ibid. 27 ibid. 28 ibid. 29 ibid. 30 ibid. , p. 8. 16 risk management framework to ensure consistency of approach. †¢ At the following stage, a company understands the link between risk and reward. It is aware that for eve ry risk there is an associated opportunity which can be exploited. Such a business unit is often a market leader and is willing to take risks to achieve its strategic objectives. At the ultimate level of risk sophistication, there are organizations which integrate risk management with the goal of enhancing shareholder value. Thus, they shift the responsibility for risk management away from the traditional areas of audit and compliance to everyone within the organization. Of course, the active process of Risk Management requires commitment and focus as it means following a deliberate set of actions which are designed to identify, quantify, manage and then monitor the events or actions that could lead to financial loss. Often, there is too little data about a given risk, and therefore, this kind of management may involve a large degree of judgment and assumptions concerning the future. 1 Yet, all the effort is worthwhile as â€Å"successful organizations tend to be excellent risk man agers, not only because they understand the risks they face, but also because of how they manage them. Conversely, those organizations that are poor at risk management spend no time scanning the risk horizon, instead leaving their futures to fate. This invariably means shocks, falling market share, takeovers and missed opportunities. †32 As Holmes reflects, â€Å"risk management is both an art and a science, and being successful depends on how well the two are kept in balance. †33 1. 3. 1. Methods of Risk Management John Holliwell, the managing director of Smith Williamson Consultancy, once said, â€Å"There is nothing wrong with risk.It is the lifeblood of business and the test of entrepreneurs and managers. What matters is how you handle risk and the culture in 31 32 ibid. ibid. 17 which you operate. ’’34 A similar thought is expressed by Clifford Tijok, â€Å"Entrepreneurial behaviour demonstrated in real life entails, i. a. , the ability to enter int o calculated risk, so that return-driven opportunities can be pursued and the ability to identify the relevant risks associated with these opportunities and the decision on appropriate behaviour to address these risks. †35 When a company decides on its risk management techniques, it usually analyses the following features: Table 1. Factors influencing the type of risk management framework required by the organization36ors the type of risk managementframework required by an organizatio FACTORS INFLUENCING RISK MANAGEMENT REQUIREMENT DIMENSIONS TO CONSIDER Strategy risk appetite of owners/risk managers industry geographical coverage aggressive or conservative risk taking or risk averse sunrise or sunset industry; primary, manufacturing, service sector local, national, regional or global is the company critically dependent on critical success factors one or two factors which require close management? volatility is the environment likely to change significantly or unpredictability ? monopoly, few or limited number of osition in industry players, or free market with many players and no barriers to entry is the area of operations highly controlled by regulatory environment legislation and/or regulatory bodies? are regulators intrusive or hands off? 33 34 ibid. ibid. , p. 2. 35 Clifford Tijok, Risk Management in Finance, (Lehrverangstaltung, 2005), p. 8. 36 Carl Olsson, Risk Management in Emerging Markets†¦ pp. 110-111. 18 is deregulation occurring or the level of regulation increasing? management style centralized or decentralized adequate or inadequate people and resources technology resources, financial position – adequate funds available, highly or lowly geared. tatus/ownership Organizational culture Public or privately owned Is the culture strong or weak? are they simple and predictable or nature of risks faced complex/ unpredictable? is the size of risks manageable or is catastrophic risk a cause for concern? Such an analysis leads to adopting one of the main risk management techniques, as presented by Cliff Tijok37: †¢ †¢ †¢ risk limitation – a company establishes its range of tolerance towards a given risk and constantly monitors whether the limits are not breached; risk avoidance – a company chooses the least risky option or none of them; risk transfer – a company reduces or completely transfers specific risks by hedging against a risk (i. e. , obtaining insurance) or diversification.Whatever the approach is, managing risks â€Å"takes a degree of courage and requires the organization to take responsibility for its actions. †38 It is a continuous process, which is â€Å"based on a distinct philosophy and follows a well-defined sequence of steps. †39 After the application of the methods and rules provided by risk management, the obtained data are organized in a clear and logical way. This is the basis which allows the company to go one level up and prepare action schedul es that will be used in case a recognized danger occurs. An essential part of such planning is encompassed by Business Continuity Management and will be discussed in the next chapter. 37 38 Cliff Tijok, Risk Management†¦ pp. 12-13. Andrew Holmes, Risk Management†¦ p. 2. 39 Reto Gallati, Risk Management†¦ p. 11. 19 CHAPTER 2 BUSINESS CONTINUITY MANAGEMENT This chapter provides information on what is Business Continuity Management, when it appeared in the history of management, what purposes it serves and how it should be organized and introduced into a company’s activity. Moreover, it contains a description of the steps which lead to the preparation of a Business Continuity Plan and of the implementation process that follows. Business Continuity Management forms an integral part of Risk Management. It met with particularly deep interest in the 1990s as the result of the frenzy which concerned the year 2000.At that time, there were many anticipated business conti nuity problems, implicated by the date change in computer systems. Business Continuity Management became even a bigger focus of attention in 2001, after the terrorist attack in New York. As Michael Gallagher observes, that huge calamity â€Å"increased awareness of business interruption issues, resulted in a better understanding of critical processes and vulnerabilities and improved co-operation and collaboration between public and private sectors on emergency management questions. †40 Lyndon Bird adds that â€Å"‘business today has far more economic interdependency between regions than ever before. There are often global consequences when risk becomes reality. 41 Yet, at the same time â€Å"there is a growing awareness of what business continuity really is about and why it is so important to both businesses and individuals. †42 8 2. 1. The Concept of Business Continuity Management Business Continuity Management (also called BCM) is defined by the Business Conti nuity Institute as â€Å"a holistic management process which identifies potential Michael Gallagher, Business Continuity Management, (Edinburgh: Pearson Education Limited, 2003), p. 7 41 Lyndon Byrd, â€Å"Business Continuity Management in a shrinking world,† Business Continuity & Risk Management (a supplement distributed in The Times), July 26 2006, p. 2 40 20 mpacts that threaten an organization and provides a framework for building resilience and the capability for an effective response that safeguards the interests of its key stakeholders, reputation, brand and value creating activities. † Its main purpose is to enable the company’s regular functioning, even though everyday operations are disrupted. As Lorraine Lane observes, â€Å"organizations must be capable of withstanding the shocks that can so easily distract management from their primary purpose of meeting and beating their ‘normal’ operational goals. †43 BCM appears as the solutio n that is exactly needed to guarantee such stability to the business. Obviously, BCM looks different in various companies as each organization is a unique system of multiple factors and interdependencies.Dr David Smith explains that â€Å"because of its all-embracing nature, the way BCM is carried out will inevitably be dependent upon, and must reflect, the nature, scale and complexity of an organization’s risk profile, risk appetite and the environment in which it operates. †44 Gallagher supports this view by stating that â€Å"the plan must fit comfortably with the culture and management style of the organization. For example, the type of plan that suits a financial institution would be totally inappropriate in a radio or television broadcasting organization. †45 It is also very important to acknowledge that the company’s BCM must be continuously revised and tested, in order to stay valid and fulfill its tasks. As Dr Smith emphasizes, â€Å"BCM is, by necessity, a dynamic, proactive and ongoing process. It must be kept up-to-date and fit-for-purpose to be effective. 46 Maintaining the validity of proper plans and policies is actually more difficult than establishing them, but this is what constitutes the point of developing BCM by a business. On the following page, there is an approximate structure of steps involved in Business Continuity Management, which is focused on planning. 42 43 ibid. â€Å"Corporate resilience: the new regime,† Business Continuity & Risk Management,†¦, p. 11 44 David Smith, â€Å"Business continuity and crisis management,† Management Quarterly, July 2003, p. 27 45 Michael Gallagher, Business Continuity Management,†¦, p. 43 46 ibid. 21 Scheme 2. 1. Procedures involved in Business Continuity Management47 INPUTS 1. 2. 3. 4. 5. 6. scope definition desired objectives policies and standards inventory – information, technology, people management commitment financeANALYSIS ASSET ASS ESSMENT BUSINESS IMPACT ANALYSIS TECHNICAL REQUIREMENTS 1. analyze BIA and Asset Assessment 2. list technical strategies based on the analysis of each asset and business process in scope 3. document drawbacks and advantages of each listed strategy 1. identify and quantify asset needs 2. document ownership 3. assign weight based on importance 4. assess exposure 5. identify access control and other preventive measures 1. rate processes based on criticality 2. identify dependencies 3. identify custodian 4. identify threats and consequences 5. identify safeguards needed/possible 6. list critical resource requirement 7. quantify acceptable owntime and and losses DEVELOPMENT 1. 2. 3. define continuity goals and chosen strategy in the form of a plan acquire resources needed for preparing and implementing the continuity plan test the plan RESULTS 1. 2. 3. 4. preventive control Business Continuity Plan continuity team training plan for team 47 Padmavathy Ramesh, Business Continuity Planning, (Tata Consultancy services, 2002), p. 28 22 2. 1. 1 The Evolution of BCM As Halls observes, â€Å"Business Continuity Management is a relatively modern idea. Its first mentions can be found in the 1980s, although it was only in the very late 1990s that it became a more widespread as a business discipline. 48 In fact, Business Continuity Management is â€Å"the outcome of a process that started in the early 1970s as computer Disaster Recovery Planning (DRP) and then moved through an era where the emphasis was on business continuity planning rather than on management. †49 In that time, computer managers were responsible for DRP. Soon, they realized that â€Å"the concentration of systems and data in itself created new risks; computer operations management introduced formal procedures governing issues such as backup and recovery, access restrictions, physical security, resilience measures such as alternative power supply, and change control. †50 In 1970s, if a big probl em appeared, the tolerated downtime was not measured in hours, but days. Therefore, â€Å"the cost of back-up computers sitting idle in an alternative location waiting for a disaster to happen was prohibitive. However, for some companies, data safety was a priority; no matter at what cost it would be obtained. As Gallagher points out, â€Å"organizations such as banks were in a more vulnerable position and invested considerable resources in installing and testing computers at alternative sites. Back-up tapes or disks were increasingly stored at protected locations well away from the computer centre. †51 Later, in the 1980s, commercial recovery sites offering services started to appear, often on a shared basis. â€Å"This was the start of the sophisticated recovery centers that operate today,†52 notes Gallagher. However, they all concerned mainly IT: â€Å"The disaster recovery plans documented the actions required to safeguard and restore computer operations.These co vered computer processing, computer applications, telecommunications services and data after a disruptive event. The objectives were to 48 49 Michael Halls, â€Å"What is Business Continuity Management? † †¦ Michael Gallagher, Business Continuity Management,†¦, p. 6 50 ibid. 51 ibid. 52 ibid. 23 prevent or at least minimize the impact that such an event would have on the business. †53 Such plans were far from being perfect as â€Å"they were more concerned with, for example, restoring a company’s financial systems to an operational state than with worrying about whether there would be accommodation available to allow the staff of the finance department actually to use the systems. 54 Not much attention was paid to implementing BCL into every aspect of the company’s activity. In 1990s, a significant change in the IT environment took place and the movement from DRP to Business Continuity Planning became considerably quicker. Gallagher confirms tha t â€Å"throughout this decade, and into the 2000s, there were significant changes in the IT approach to DRP/BCP and in what constituted acceptable downtime. The emphasis moved from being mainly on IT to an approach that considered all aspects of an organization’s business and relationships. †55 It is only then that â€Å"BCP has become BCM with the emphasis on management – not just planning.This encompasses the emphasis on risk management and the measures to be taken to reduce risk. BCM is no longer regarded as a project – it is now a program, emphasizing that it is a continuous process rather than a task with a defined enddate. †56 The next step is to make managers of all companies aware of the importance of BCM as â€Å"the increased recognition of BCM means that a greater budget allocation may be available to it. More significantly, the message preached by business continuity practitioners for years that business continuity principles should b e an integrated part of the business planning process may be heard. † 57 2. 1. 2 The Significance of BCMThanks to proper Business Continuity Management, a company has a professional plan which allows acting as quickly and efficiently as possible in case a dangerous 53 54 ibid. ibid. 55 ibid. 56 ibid. 57 ibid. 24 event happens, because â€Å"BCM not only aims to provide continuity in customer service at a minimum acceptable level, it also aims to limit the impact on the financial position of an organization by ensuring that its critical functions continue to operate during a crisis and that the remainder are recovered in a controlled manner. †58 Therefore, when a BCP is applied, there are no chaotic, haphazard attempts to minimize the losses as clear and logical procedures have been devised earlier and communicated to the staff.As Mel Gosling notices, â€Å"decisions made in the first few hours of an event that causes serious disruption to an organization’s opera tions are critical, and actions undertaken in the first few days will have a significant financial impact†59 and â€Å"a company that has an effective and well-tested Business Continuity Plan is more likely to take the right decisions in the first few hours and to subsequently undertake the best actions to limit the impact on its financial position. It has a better chance of incurring significantly less additional expenditure at the time of a disruption. †60 Moreover, â€Å"one of the benefits that implementing business continuity management brings to a firm, which is not immediately apparent, is an understanding of what the business does and what is important to it. †61 In this way, a company can analyze its allocation of resources and improve it, as well as â€Å"find out what is critical and of value, and what can be outsourced or left undone. †62 Besides, certain companies, e. g. , financial institutions, are legally obliged to develop BCM and maintain an effective business continuity plan.It is also becoming increasingly common that businesses require from their suppliers to be presented with their BCM plans. This facilitates the process of assessing the supplier’s infallibility and constitutes an element of developing a sound business relationship. Mel Gosling, â€Å"Why invest in business continuity,† 1 February 2007, . 59 ibid. 60 ibid. 61 ibid. 62 ibid. 62 ibid. 58 25 The investment into Business Continuity Management is beneficial not only in the matter of a business being prepared for multiple diverse crises. It also adds significantly to the company’s reputation and brand image by â€Å"demonstrating effective and efficient governance to the media, markets and stakeholders. 63 Moreover, it enhances the competitive advantage of the business, because to some investors and customers it may be a vital factor in deciding to which company they should entrust their capital. Osborne explains it as follows, à ¢â‚¬Å"To a firm’s shareholders it’s part of investor relations – you are showing your commitment to keeping their investment safe. To a firm’s staff it is labour relations – you are showing your willingness to protect the livelihood of your staff. †64 Furthermore, he stresses that â€Å"it’s customer relations too – you’re demonstrating your commitment to providing a service for them even in the most extreme of circumstances. †65 Last but not least, devising professional plans and keeping them updated increases the company’s credibility in the eyes of nsurers and auditors because they are becoming increasingly aware of the importance of BCM. As Osborne observes, â€Å"Five years ago, auditors simply would have said to their clients, do you have a plan in place? A couple of years ago, they would have wanted to inspect it, to see if every contingency was covered and how practical it appeared to be. Nowadays, they will ask how it worked in practice. When it was last tested and what were the results? †66 What is more, â€Å"insurers like to see evidence that all reasonable steps have been taken to understand the past accident record and that actions have been put in place to prevent them from happening again. 67 This is confirmed by Gosling, who states that â€Å"insurance companies themselves are now starting to realize the opportunities that business continuity provides for loss reduction, and it is becoming increasingly common for a condition of insurance cover to be the existence of a business 63 64 David Smith, â€Å"Business continuity and crisis management,† †¦ p. 27 Ask the panel of business continuity experts,† †¦ 65 ibid. 66 ibid. 67 â€Å"Pro-active Risk Management: Avoiding catastrophe. † Business Continuity & Risk Management,†¦, p. 14 26 continuity plan. †68 All in all, devising and implementing an effective BCM plans brings ve rsatile advantages to a company, while the failure to do so â€Å"means taking an unnecessary risk with an organization’s future and profitability. †69 2. 1. 4 Continuity Culture in a Company A vital step in forming Business Continuity Management in a company is to instill a proper attitude in the staff.Michael Gallagher believes that â€Å"it is about creating a continuity culture in the organization. This can be at least as important as producing the actual plans. †70 He also states that â€Å"for BCM to work, it must be driven from the top. â€Å"71 Therefore, senior managers must understand that BCM is â€Å"not just another expense but also a significant resource,’ 72 as Mike Osborne assures. However, the amount of data that has to be taken into consideration while developing preventive measures is overwhelming. Lane points out that â€Å"while responsibility for corporate resilience sits firmly with the executive board, the skills and experience required to combat the growing list of disruptive threats exists throughout the organization. 73 Thus, in large companies, it is a wise move to appoint a full-time Business Continuity Manager, whose tasks are to accumulate the relevant knowledge from all departments and co-ordinate proper procedures, as well as devise professional plans and keep them updated. Smaller businesses may use the services offered by consulting companies. The staff’s awareness of specific procedures ready to be applied in case of any foreseeable disaster enhances their efficiency and identification with the company. Instructing them of the specific plans encourages them to pay bigger attention to the safety issues, which significantly contributes to the BCM process. 68 69Mel Gosling, â€Å"Why invest in business continuity,† †¦ ibid. 70 Michael Gallagher, Business Continuity Management,†¦, p. XI 71 ibid. 72 â€Å"Ask the panel of business continuity experts,† Business Continu ity & Risk Management,†¦, p. 12 73 David Smith, â€Å"Business continuity and crisis management† †¦ p. 27 27 Gallagher explains that â€Å"if the business continuity culture is sufficiently developed, the continuity considerations will be a natural part of the development of the plans. †74 2. 2 BCM and the Company’s Size For the definite majority of large corporations, BCM is a regular part of their activity but, as Gallagher states, â€Å"there is a feeling that it is not a matter of concern to the smaller business. 75 This happens because â€Å"a lot of the emphasis in the business continuity press, and in business continuity material generally, relates to large organizations and to the financial services industry. †76 While â€Å"for the largest corporations and those with enormous sums of money at stake, the complexity of planning is breathtaking,†77 â€Å"small and medium-sized enterprises tend to get ignored when talking about bus iness continuity planning. The planning is more prosaic. The challenges are fewer. And most importantly, their budgets are smaller. †78 Another problem is the fact that â€Å"smaller companies are typically less aware of the correct procedures than larger firms where systems have been developed. 79 The managers of small and medium-sized businesses simply tend to think that their company’s size is a kind of safeguard against a disaster, or that potential recovery will be quick and simple, so â€Å"the process of developing a plan is perceived as too complicated, involving excessive costs and management time. †80 However, Mike Osborne emphasizes that â€Å"the issue for small to medium sized businesses is that they often do not have the inherent resilience that say, a UK multinational has. †81 He warns the managers against an illusive safety feeling as â€Å"smaller firms often trade from a single location and do not benefit from vast armies of support sta ff and Michael Gallagher, Business Continuity Management,†¦, p. 88 Michael Gallagher, Business Continuity Management,†¦, p. 28 76 ibid. 7 Michael Halls, â€Å"What is Business Continuity Management? † Business Continuity & Risk Management,†¦, p. 3 78 Michael Halls, â€Å"Small is still beautiful (but riskier too),† Business Continuity & Risk Management,†¦, p. 10 79 ibid. 80 â€Å"It’s never too late to plan for the future,† Business Continuity & Risk Management,†¦, p. 15 75 74 28 specialists who can react to and recover from an incident. If they are hit by a disaster, the impact is greater then it would be the case in a larger organization. †82 This view is supported by Gallagher, who states, â€Å"Small businesses should remember that their biggest threats do not come from high profile incidents such as earthquakes or terrorist bombs.It is the dozens of relatively minor issues such as prolonged power outages or computer ne twork failures that may cause the problems. The vast majority of problems are caused by people or process failures. †83 He points out that â€Å"this is where the effort and investment should be concentrated. Because of size, the process is simpler and the cost will be proportionally less than for larger organizations. The consequences of not having a plan are, however, likely to be disastrous. †84 Therefore, as Michael Halls stresses, â€Å"Business Continuity Management is a must for companies of all sizes. A small firm that loses its data will go out of business just as surely as a larger one. †85 2. 3 BCM in Relation to InsuranceSome managers wonder why they should engage themselves into Business Continuity Management while their company is insured. To them, devising a BCM plan seems to be an unnecessary waste of time and money, because they think that risks are looked after by the insurers and thus, there is no need to worry. But these are absolutely false c onclusions. As Mark Baylis emphasizes, â€Å"insuring the risk is not the answer, because it is better for the business that the problem does not happen at all. † 86 This view is supported by Gallagher, who states that â€Å"insurance is simply a necessary part of the total business protection and recovery plan – but it is only a part. 87 Although it is true that insurance provides financial aid in case a disaster strikes, the money may 81 82 ibid. ibid. 83 Michael Gallagher, Business Continuity Management,†¦, p. 28 84 ibid. 85 Michael Halls, â€Å"Small is still beautiful (but riskier too),† †¦ 86 Mark Baylis, â€Å"Weak links in the supply chain,† Business Continuity & Risk Management,†¦, p. 11 87 Michael Gallagher, Business Continuity Management,†¦, p. 33 29 arrive after quite a long period. Moreover, â€Å"insurance for loss of profits, or for increased cost of working, will cover only a defined period – which in practice may prove to be inadequate. †88 Besides, â€Å"proving loss of profits can be very difficult.The outcome may be based on historical performance and may not take account of recent market developments. †89 It is also very important to notice that insurance will not â€Å"keep customers supplied or guarantee that market share will be recovered,†90 nor will it â€Å"protect the organization’s reputation and image. †91 Last but not least, as it was mentioned in the previous paragraph, there may be a situation when the insurer refuses to provide a cover unless the company devises a BCM, because nowadays businesses are required to act more actively in protecting themselves from various possible risks. Therefore, it is vital for a firm to have efficient Business Continuity Management in order to obtain insurance on favourable terms.To sum up, managers must remember that â€Å"insurance is reactive – while it has its place, the whole protection proce ss must be more proactive and BCM is the key. †92 2. 4 Business Impact Analysis Business Impact Analysis (also known as BIA) is the most important tool of Business Continuity Management. Gallagher defines it as â€Å"a management-level analysis that identifies the impacts of losing company resources. It measures the effect of resource loss and escalating losses over time in order to provide senior management with reliable data upon which to base decisions on risk mitigation and continuity planning. †93 The BIA process â€Å"identifies and ranks the business processes, 88 89 ibid. , p. 34 ibid. 90 ibid. 91 ibid. 92 ibid. 93 ibid. , p. 146 30 criticalities and dependencies. 94 It is closely related to risk analysis, which was discussed in the previous chapter, therefore, it may base on the materials that have already been gathered during the general Risk Management process in the company. The method by which BIA is carried out â€Å"depends on the nature of the organiza tion – size, structure, local or international, etc. †95 Generally, in order to maximize the efficiency of a BIA processes, standardized questionnaires should be used. They should contain questions which are formed in such a way as to provide information that concerns the following issues: †¢ †¢ the nature of given problems; the impact of the problems, which should be presented from different perspectives, e. g. the company’s reputation, costs involved, loss of future business, etc. †¢ †¢ †¢ the influence that may be caused by the problems at different times of the day, week, month and year; the kind of resilience that may be currently provided in a quick and easy way; the recovery from the addressed problems (time needed for recovery, priorities for resumption, duration of backlog, additional costs, insurance cover); †¢ †¢ the available workarounds and the way they operate; the continuity and recovery requirements, e. g. , acco mmodation, computer systems, etc. 96 After the questionnaires have been filled in, the Business Continuity Manager prepares a comprehensive report which presents the company’s Business Impact Analysis. The report is composed of the following parts: 1. Introduction 2. Executive Summary 3. Background to Study 94 95 ibd. , p. 47 ibid. 96 cf. Michael Gallagher, Business Continuity Management,†¦, p. 57 31 4. Current State Assessment 5. Threats and Vulnerabilities 6. Critical Business Functions/Operations 7. Business Impacts – Operational and Financial 8. Potential Strategies 9. Recommendations 10. Conclusion 11.Appendices97 Thanks to the logical and substantial structure, the report fully represents the current standing of the company, clearly indicates its weak points and realistically describes possible procedures. Business Continuity Management is an extremely important process, which not only enables the assumption of proper attitudes towards multiple threats that endanger a firm’s functioning, but it also significantly deepens the understanding of the business and improves the staff’s morale. Proper implementation of BCM in a company leads to the creation of a Business Continuity Plan, which will be discussed in detail in the following chapter. 32 CHAPTER 3BUSINESS CONTINUITY PLAN In the previous chapters, the importance of Business Continuity Management was explained and it was stated that devising a Business Continuity Plan is one of the main tasks of this type of management. This chapter provides information on how to construct, implement and test a Business Continuity Plan. Moreover, it contains a description of the most frequent mistakes that appear while drafting a BCP and advises how to avoid them. The exemplary plans and templates on which the analysis is based are attached as Appendices B, C, D, E and F at the end of the present thesis. 3. 1 The Structure of an Exemplary Business Continuity PlanBusiness Continuity Plan s vary in length and are divided into different parts, which mostly depends on the size and type of a company. However, certain sections are vital and thus common for all the plans. They should be organized in such a way as to enable quick access to the required information. These crucial parts will be successively discussed herein. 3. 1. 1 Front Page and Introduction On the front page of a Business Continuity Plan, there should be written the name of the company, the issue date and a distinct lettering stating BUSINESS CONTINUITY PLAN. Moreover, if the Plan is confidential, it should be indicated on the front page as well. Optional elements inserted here may include contact details for feedback, references, the revision date, etc.These components are followed by an introduction, which consists of a distribution list (copy number, name and location) and a table of contents. 97 cf. Michael Gallagher, Business Continuity Management,†¦, p. 57 33 3. 1. 2 Aim This section should con tain the description of the purpose for which the Plan has been created. It usually gives examples of possible disasters and explains the objectives which the plan is intended to meet in case of a calamity. What is more, a company which wishes to convey an especially powerful message concerning its reliability may include in this part a summary of the extensive works and professional researches which have been involved in the development of the Plan. 3. 1. 3 Critical Functions ChecklistCritical Functions are these activities without which the company would not be able to perform. In order to prepare a Critical Functions Checklist, the following steps should be completed: †¢ †¢ †¢ †¢ †¢ the identification of Critical Functions, e. g. , sales and distribution; the description of the Functions in terms of the impact which may be caused by their interruption in the first 24 h, 48 h, one week and two weeks; the prioritization of the Functions; the ascription of a reasonable timeframe within which the recovery is possible; the determination of resources which will be necessary in the recovery process, such as: a) the staff – the required number of people, their knowledge and skills; b) alternative location – e. g. the staff working at home or provisional premises; together with necessary equipment like computers, cars; c) data – information and documents, e. g. , insurance certificate, service, customers and suppliers details; d) communications – all ways in which customers, suppliers, the staff and media can be contacted in case of disaster. 34 Such a Checklist allows ensuring that â€Å"critical tasks are completed on time and according to a pre-agreed priority schedule. It may also be used to provide a handover document between different shifts in the recovery process. †98 3. 1. 4 Risk Analysis Table This part should contain a table comprising a list of dangers which may interrupt and threaten the activi ty of the company.The matrix presented below may be used to ascribe values to the particular risks with regard to the likelihood of their occurrence and their potential impact. Table 3. 1. 4 Risk Matrix LIKELIHOOD NEGLIGIBLE CATASTROPHIC RARE UNLIKELY POSSIBLE PROBABLE M M M L L H H M L L VH VH H M L VH VH H M L VH VH H M L IMPACT SIGNIFICANT MODERATE MINOR INSIGNIFICANT Legend: L – low, M- medium, H – high, VH – very high Moreover, there may be also attached a list of possible losses, endangered people and equipment, as well as the actions which had to be taken in case a particular risk occurs. 98 Appendix D, p. 77. 35 3. 1. 4 Emergency Response Checklist Such a Checklist greatly facilitates the performance of people involved in fighting a potential adverse event.It also acts a concise register of actions that were taken after the disaster happened. It should be later analyzed, developed and improved. It is preferable that tasks to be completed are organized in the form of a table, together with a column in which the date of termination will be written down. The actions may be listed as follows: †¢ during the first 24 h a) to establish the Actions and Expenses Log, which is a more detailed and comprehensive version of the Emergency Response Checklist; b) to contact emergency services; c) to identify and approximately assess the damage which has been incurred by the staff, equipment, buildings, data, etc. d) to determine the critical functions which have been interrupted; e) to decide on the steps that need to be taken within the recovery process, which is based on the Critical Function Checklist; f) to contact the staff, customers, suppliers, insurers, relevant authorities and other stakeholders in order to assure them that the situation is under control; g) to issue a special PR statement to the media. †¢ daily within the recovery period a) to update the Actions and Expenses Log; b) to provide valid information to the staff, cu stomers, suppliers, insurers, relevant authorities and other stakeholders, as well as the media; †¢ after the recovery period a) to interview the staff with respect to their welfare needs; b) to analyze the Emergency Response Checklist and Actions and Expenses Log in order to introduce possible improvements into the Business Continuity Plan. 36As it can be seen, the response to the crisis should focus on its effects, not on the causes. The reasons of the adverse event should be identified as quickly as possible, but a comprehensive analysis of them must not be performed before the main steps of the recovery process have been taken. 3. 1. 5 Roles and Responsibilities This section should contain information and contact details regarding the people who are responsible for the shape and content of the Business Continuity Plan (e. g. , Business Continuity Manager, the BCM Team). Moreover, there may be included a list of duties which are ascribed to the particular staff members in ca se an adverse event happens.Last but not least, it is necessary to indicate the names and contact details of the co-ordinators of the recovery process, help-line numbers (possibly, with pre-recorded messages) and location of meeting rooms and the Business Recovery Command Centre, together with maps. 3. 1. 6 Contact List In this part, there should be listed the following contact details: †¢ staff members (divided in respect to the departments) and their next of kin a) name, b) address, c) work telephone number, d) home telephone number, e) mobile telephone number, f) e-mail address; †¢ key suppliers a) name, b) provided goods, c) address, d) telephone/fax number, 37 e) e-mail address; †¢ key customers a) name, b) service/good used, c) address, d) telephone/fax number, e) e-mail address; †¢ mergency services (ambulance, fire service, flood line, hospitals, police) a) address, b) telephone number; †¢ utilities (water, telecommunication, gas and electricity comp anies) a) name, b) telephone number, c) e-mail address; †¢ insurers and banks a) name, b) address, c) telephone/fax number, d) e-mail address; †¢ authorities a) name b) address c) telephone/fax number; †¢ media a) name, b

Thursday, August 29, 2019

Louis Vuitton Case Study Example | Topics and Well Written Essays - 500 words

Louis Vuitton - Case Study Example Since the brand has loyal and a choosy customer base, its customers are highly likely to interpret such a move as a loss in the brand’s worth. The brand, however, may benefit from an increased presence in emerging high income countries and unexploited markets such as India. At an exchange rate of $ 1.50, the value of $ 8, 000 is equivalent to 10, 000 euros. When the price reduces by 10 percent, the value of revenues in dollars become $ 7, 200. At a strengthened exchange rate of $ 1.25, this presents a value of 9, 000 euros. The company, therefore, loses 1000 euros at the new exchange rate. It is essential to highlight that when the exchange rate weakens, the company loses some money out of the current revenues. The demand curve of a typical Louis Vuitton customer shapes differently because of notable reasons. To begin with, it is essential to note that a normal demand curve should show an inverse relationship between prices and level of consumption. This is because as prices increases, consumers buy less of given goods because their budgets are constrained. Louis Vuitton, however, is different because it sells luxury products that entail superior craftsmanship. A knowledgeable and loyal customer, therefore, is able to face a premium price in purchasing a given item. Besides, the brand builds on exclusivity and classiness that it would always strive to drive away its goods from mass consumption (Haig, 2006). Loyal customers are willing to pay higher prices because such prices exclude other ordinary customers from accessing the Louis Vuitton goods. Besides, the luxury market that Louis Vuitton exploits has wealthy customers whose demand curves are inelastic to price increases. In close relat ion to this, the performance of developed economies such as the US and Europe can withstand such price increases. When individuals face improved economic lives, there arises a new set customers of Louis Vuitton

Wednesday, August 28, 2019

Study Skills Essay Example | Topics and Well Written Essays - 1000 words - 1

Study Skills - Essay Example Study skills are never attained fully formed, any more than a grown man pops out of his mother’s womb. According to Cottrell(2003 p3)They evolve and mature through repetition, trial and error, critique from others and continued reflection as you progress through your individual journey as a learner The purpose of this module is to provide the opportunity to acquire and develop the study skills that will be necessary to successfully complete this course to a standard that I am aiming for. Being a competent independent learner is derived from being self motivated, being able to manage personal learning processes, good time management skills and continually reflecting on what and how you learn best and tailoring your energies to suit. Within this portfolio I will examine the development of learner independence, time management, self evaluation of personal learning, production of an action plan and improving my essay writing skills. If as anticipated this is completed successfully it will add additional skills to my current ones and aide me in my current quest to secure a higher second grade result on this degree course. Learner independence or autonomy can be defined as â€Å"capacity to take responsibility for, and control of, your own learning, whether in an institutionalised context, or completely independent of a teacher or institution† (Thornbury, 2006). Learner independence is the ability of the learners to control their learning process (Holec, 1981). In the present age, when knowledge is growing at very fast pace because of the ongoing research work and rapid advancements in technology, the importance of independent learning cannot be overemphasized. Learners must understand that the education they are provided with at institutions is time-constrained, and what they need to learn is not limited to what they are taught in schools. Most learners used to learning in

Tuesday, August 27, 2019

The Role of Fluid Mechanics in Aircraft Design Article

The Role of Fluid Mechanics in Aircraft Design - Article Example The advancement in fluid mechanics has paved the way for the development of the more comprehensive computational model which is crucial in the production of flight vehicles. Fluid mechanics has been regarded crucial in the understanding of Airway Smooth Muscle (AMS), a crucial element of the narrowing of the airways as a result of asthma, and how it works. The development of various fluid mechanics models aided in the application of mathematical principles in understanding inflammation and hyperresponsiveness in the airways (Mathematics in Medicine, â€Å"Mathematical Modelling†), which is critical to achieving the understanding of what actually happens during an asthma attack. Until today, there is no known cure for asthma. Partly, this is due to the weak and inadequate â€Å"predictive animal models† of how the human body works and how it reacts to the existing treatments available. Following a stroke, many patients are suffering from the inability or difficulty of swallowing. There are an estimated 40% of people who are suffering from dysphagia (Mathematics in Medicine, â€Å"Mathematical Modelling of Normal Swallow). Effective management of swallowing disorders is very important in order to improve health conditions among patients who suffered the stroke and other related diseases. In the recent years, fluid mechanics has been considered as one of the key approaches toward understanding the rheological properties of foods and liquids (Mathematics in Medicine, â€Å"Mathematical Modelling of Normal Swallow). Today, medicine is trying its best to develop a comprehensive and all-encompassing mathematical model of the swallowing process.

Monday, August 26, 2019

Economic policies of Ronald Regean Essay Example | Topics and Well Written Essays - 750 words

Economic policies of Ronald Regean - Essay Example budget deficit, crisis in the loans and savings markets, etc.) were deemed inconsequential or a consequence of the fact that the Democrats were at the time in charge of the Congress. In contrast, the Democrats maintain that the beneficial economic changes that took place in the 1980s were not a consequence of Reagans policies, whereas any negative alteration was a result of his failed measures. At the time when Ronald Reagan entered office, the American economy was facing one of the highest rates of inflation since 1947. Reagan supported income tax cuts and reductions in social welfare spending, and he focused on reviving the economy, which was suffering a high rate of inflation combined with an economic recession. His fiscal policies are generally referred to as "Reaganomics". As a result of the tax reductions taken and the increase in the defense-related expenditure (consequence of the ongoing Cold War), a great economic growth and expansion was observed together with an improvement of the job market. While these factors made President Reagan very popular among the general population, a fraction of economic experts criticized his measures as too liberal. And they were right: in order to cover federal budget deficits complicated by increased spending by Congress and by the fact that Reagan never submitted a balanced budget to Congress, the US borrowed heavily both domestically and abroad. The deficits in the budget soon became evident creating enormous increases in the national debt, which tripled from $1 to $3 trillion (circa 40% of the domestic gross product, the highest level since 1963); the country owed more to others than it was owed. Similarly, federal tax receipts doubled from $130.2 to $263.7 billion. In order to alleviate the situation, he appointed the Greenspan Commission, which resolved the crisis through a series of reforms which included, for example, increases in the payroll tax. He also reformed the Social

Sunday, August 25, 2019

Semiconductor devices and circuits Coursework Example | Topics and Well Written Essays - 1500 words

Semiconductor devices and circuits - Coursework Example Each atom after sharing electrons will attain a full outer shell. Conductors: Conductor materials have large number of free electrons and thus conduct easily. Examples of a good conductor are copper and aluminum and they have, at room temperature, many electrons for conduction. Insulators These are materials which do not conduct. For insulators, there is a very large gap between the two bands i.e. conduction and valence bands. Insulators can only conduct at extremely high temperatures or when they are subjected to very high voltage. Examples of insulators are, wood, glass, paper and mica. Semiconductors: These materials are between conductors and insulators. They are neither conductors nor insulators. They can easily conduct at room temperatures. Examples of these materials are silicon and germanium. Intrinsic semiconductors: These are pure semiconductors since the content of impurity is minimal. These materials are cautiously refined to achieve this form of purity. When intrinsic se miconductors are subjected to room temperature, valence electrons absorb heat energy breaking the covalent bond and move to conduction band. Electrons and holes conduction In intrinsic semiconductors, holes and free electrons are the major charge carriers. Holes and electrons which are generated at room temperatures move in a random motion and can’t conduct any current. ... This allows electric current to flow as a result of electrons movement in the conduction band. The motion of holes in semiconductors is opposite to that of electron. As a result of electrons escape from valence band to conduction band, holes are created in the valence band. When current is applied the electron break and moves to feel the holes present, at the same time this electron leaves another hole and this process continues. The movement of these holes in the valence band leads to current flow referred to as whole current. Extrinsic Semiconductors Small amounts of other materials are added to intrinsic semiconductor to alter the properties and this result to extrinsic semiconductor. This is process of adding an impurity to improve the conductivity of the semiconductor is referred to as doping. The materials used as impurities are called dopant. These semiconductors are the most widely used in practice since they have better conductivity compared to intrinsic semiconductors and a re used in manufacture of electronics components such as transistors and diodes. There are two types of extrinsic semiconductors and each depending on the type of impurity used. They are n-type and p-type. N- Type Atoms with five electrons in their outer most shell are referred to as pentavalent atoms. When these pentavalent atoms are used to dope intrinsic semiconductors, they donate a free electron to the semiconductor and they are called donor dopers. Examples of donor materials are phosphorous, arsenic and bismuth. The resulting semiconductor has a large quantity of free electrons and is called n-type semiconductor. Example of n-type semiconductor formation is when arsenic atom with five electrons on the outermost shell combines with silicon with four

Saturday, August 24, 2019

Evidence-Based Pharmacology Paper Research Example | Topics and Well Written Essays - 3750 words

Evidence-Based Pharmacology - Research Paper Example Pneumonia is a disease that indicates towards the inflammatory condition of lungs. It can be further elaborated that the infection in the lung tissue is regard as a state of pneumonia. During the attacks of pneumonia, a lung does not function properly that is likely to cause risk on the health of concerned person. People are affected by pneumonia due to a large numbers of reasons such as bacteria, viruses, fungi, idiopathic as well as parasites. In this regard, the diagnosis of pneumonia is referred to as significant for the providing an effective treatment to the patients. Pneumonia can be diagnosed by evaluating the symptoms and signs of an acute lower respiratory tract infection. Besides, the symptom of pneumonia can also be identified through a chest X-ray that that is effective in examining any kind of infections (Lutfiyya, Henley, Chang & Reyburn, 2008). Initially the treatment of Community- acquired Pneumonia (CAP) dependent on the physical examination, laboratory results as well as characteristics of patients. However, the treatment of pneumonia has identified the need of hospitalization for medical aid. There are two types of pneumonia treatment process that are outpatient and inpatient treatment. Specifically, mentioning that the treatment of the diseases is highly depending upon types of pneumonia. The medical practitioner’s suggest patients to consume antibiotics for treating pneumonia effectively (Caballero & Rello, 2011).

Communication Term Paper Example | Topics and Well Written Essays - 1750 words

Communication - Term Paper Example However, I believe that the convenience and ease that mobile phone communication brings have a drawback and that is making the quality of communication superficial. In my opinion, the impersonality of communication that mobile phones have brought into people’s lives actually moves people apart and allows them to go their own way and refuse socialization which then creates a disconnected society. Upon reading Louis Menand’s article entitled â€Å"Thumbspeak. Is Texting Here to Stay?† it made me think about the underlying effect of the kind of communication that mobile phones bring into our society. True indeed that mobile texting has become a worldwide phenomenon because it delivers the message to the recipient in a fast, convenient and, most importantly, affordable manner (Menand). It does not matter anymore where the receiver of the message is located because a mobile text message can reach anybody from any part of the globe. I will not deny the fact that the us e of mobile phones brings many benefits to its users. The most apparent advantage of texting is that it accelerates communication (Menand). For instance in the road, the speedy form of communication brought by mobile phones can actually save lives when there is a pressing need to call the emergency hotline. With the use of cell phone, people can immediately call for help that often minimizes the emergency response time and saves more lives on the road. In terms of business, the advantages of using cell phone for businessmen and women are endless, and this encompasses cell phone use even while driving. Business people are supposed to be always reachable especially by their clients because it is going to be huge loss if they miss just one transaction. For business people, work-related issues are on the top of their list and this means being available to address and resolve these issues at any time, regardless of the locations. In terms of relationships, it is not new anymore that ther e are times when men and women rather communicate their thoughts or emotions towards another person through texting or calling via their mobile phone. â€Å"A less obvious attraction of texting is that it uses a telephone to avoid what many people dread about face-to-face exchanges, and even about telephones—having to have a real, unscripted conversation† (Menand). The use of cellular phones on a daily basis is an indication of the construct of efficiency and multi-tasking. It has emphatically made people’s lives easier, particularly communication. Imagine the convenience of talking to a family member or a colleague while we are at the mall and doing shopping. Imagine the ease of having a three-way business conference while we are at home doing household chores or, perhaps, caring for our children. Cellular phones have indeed allow people to do various tasks all at the same time. But while allowing people to efficiently multi-task and immediately reach and commu nicate with people, cellular phones have also marked a greater superficiality to the manner that people communicate today. However, communication is essential to keep any relationship stronger and to develop deeper connection with other people. Accordingly, it is better to have a close interaction or personal contact rather than

Friday, August 23, 2019

Small and Medium Enterprises Essay Example | Topics and Well Written Essays - 3000 words

Small and Medium Enterprises - Essay Example The economic downturn brought about financial difficulties in SMEs and at the same time, lenders could not guarantee access to additional funds. Some of the SMEs were forced to shut due to financial difficulties and bankruptcy. The level of investments in SMEs also declined due to lack of funds for investments (Stokes and Wilson, 2010). One of the factors that limited the ability of SMEs to access credit during the recession was the tight credit controls. The government efforts to control the level of money supply lead to high interest rates. Banks had to raise their lending rates and tighten their credit policies to comply with government regulations. Consequently, the SMEs that could not meet these new credit terms could not access funds from banks to finance their operations. SMEs were more vulnerable to the negative effects of the recession of business operations compared to large firms. This is because SMEs lack resource and market manpower to withstand sudden environmental chan ges. The changes in the global economic environment brought about by the 2008 recession had severe effects on SMEs especially on the young and new business (Stokes and Wilson, 2010). The 2008 recession forced organisations to lay off many employees to survive. The level of production reduced and layoffs were used as a way of reducing the cost of production. SMEs were not spared from this move and they too had to lay off a significant number of their employees. This means that they would later incur additional labour costs of recruiting and training new employees after the economic recovery. The performance of SMEs in terms of output production and revenues was severely affected during the recession. The effects on performance were more severe in high risk SMEs relative to low risk SMEs. High risk organisations tend to have high debt to assets ratios. These organisations were forced to take drastic measures of laying off their employees and reducing the dividends paid to shareholders (Stokes and Wilson, 2010; Richard 2011). The profitability of SMEs reduced during the recession and the level of competition increased as well. The demand for products was low and thus, firms intensified their marketing activities to attract customers. However, the effectiveness of the marketing strategies was limited by the reducing purchasing power of the consumers during the recession. The SMEs across Europe faced excessive regulations administration, lack of skilled human resources and high costs of productions (Richard 2011). Question 2: Reasons why small firms dominate some market structures There are many theories that explain why small firms dominate certain market structure. The technical efficiency theory argues that the existence of small firms in a certain market will depend on economies of scale. Industries with large economies of scale compared to the market size tend to have many small firms and a few large firms that control the market. However, the number of small firms in such markets may increase if the concentration ratios and the economies of decline. The size of a market or its geographical distance has an effect on its composition. A large geographical distance will results in high transportation costs for large firms. Such a market will also have diseconomies of scale. Consequently, there will be more small firms than large firms in the market.  

Thursday, August 22, 2019

Preferential Treatment for Disabled Veterans Essay Example for Free

Preferential Treatment for Disabled Veterans Essay The Disabled Veteran Affirmative Action Plan requires that special steps be taken when recruiting disabled veterans. The DVAAP requires that the federal government award three percent of all federals contracts to disabled veterans. The Disabled Veteran Affirmative Action Plan requires that disabled veterans must be hired if they are able to work and willing. This affirmative action requires that there should be promotion of maximum of employment and job opportunities for disabled veterans within the federal government. This therefore supports the argument that disable veterans should get preferential treatment than other veterans who are not disabled. This act defines a disabled veteran as the veteran who has the right to receive compensation under the laws administered by VA. It also defines a veteran as a person who was released from duty due to a service connection disability. The DVAAP program aims to raise the number of disabled veterans in profession positions through interval jobs advancement opportunities. It also focus on increasing the number of disabled veterans in technical position through recruitments DVAAP seeks to promote efforts that ensures disabled veterans are included in recruitment efforts. (Sowell, 2004).   Ã‚  Ã‚  Ã‚   Disabled veterans are accorded preferential treatment than other veterans who are not disabled because, the DVAAP act dictates that are all state agencies and institutions increase employment opportunities fro disabled veterans. The veteran’s affairs department advocates nard for assistance to be granted to veterans owned small businesses. The federal regulations for disabled veterans provide that employments should not request self identities during recruitment opportunities. Veterans must not identify their disability status before they have been offered a job. On many occasions, disabled veterans, even when willing to work and qualified, are shut of the workforce due to the discrimination. The federal law provides that preferential treatment be given to veterans seeking employment. The law ensures that the disabled veterans on a preferential basis, the full employment services presented by law. Disabled veterans should be provided with intensive employment and training services to prepare them accordingly for the jobs. Affirmative Action for women and minority   Ã‚     Ã‚  Ã‚  Ã‚  Ã‚   Affirmative action for women and minority is established with an attempt to redistribute economic power equally by ensuring that employers give preference to women and minorities during recruitments. Affirmative action is a plan initiated to remedy any cases of discriminating behavior that have occurred in an institution in the past. Affirmative action gives preferential to women through a range of measures such as lower scores for test for jobs or recruitment procedures. Due to the long history of discrimination cases occurring based on race and sex, affirmative action programs have been initiated and directed towards women and minorities. This has been done to promote recruitment, retention, promotion and educational opportunities accorded to women and minority. (Charles J Muhl.). Strategies used in affirmative action programmes are focused on expanding the pool of job or admission applicants. This can be done through using strategies that reach outside the traditional channels set especially by placing employment notices in areas where the women and minorities will easily see them. Affirmative action programs are increasing on the job training opportunities that encourage occupation mobility within the workplace. Affirmative Action Programs for women and minority have been instituted and granted the force of law. Affirmative actions for women and minority in employment were implemented to prohibit discrimination by employers based on sex. Women should be accorded equal opportunities just like their male counterparts. The affirmative action for women and minorities addresses issues such as prevention of sexual harassment in the workplace, recruitment and hiring methods, discrimination complaints and promotions.      Ã‚  The federal law requires that institutions determine whether women and minorities are being underutilized in their companies. If this is the case, companies must take steps to correct this situation, especially through the use of recruitment and outreach programs and also put more emphasize on eliminating barriers that hinder equal employment opportunities. Institution managers and supervisors must ensure that steps are taken to ensure women and minorities are aware of available job opportunities. Women and minority groups must be given full and fair consideration based on their abilities and qualifications. Due to the discrimination of women and minorities in the learning centers, affirmative action programs have been initiated to ensure that these groups are accorded equal opportunities in the education system. This also ensures that trained women and minority are included in the hiring and promotional activities. Affirmative action for women and minorities ensure that qualified women and minorities are included in the candidates’ pool. (Ball, Haque, 2003). Affirmative Action Arguments   Ã‚   Based on the affirmative action, three arguments have been offered, which include social good also known as the utilitarian consideration, compensatory justice referred to as deontological theory and the ideal of equality. The social good, states that the society will benefit more by initiating programs that enrich and empower women. By advancing women, the society is required to offer employment opportunities to women and minorities based on their qualifications. However, this affirmative action has led to more qualified men being left out of job opportunities in order to promote women who are even less qualified. As a result, institutions are using the quota system instead of the merit system to allocate jobs. Many people have argued that this system has promoted less qualified candidates and left out the more qualified candidates. Affirmative action therefore creates a big wedge between individual worth and economic success. This is evidence enough that the quota system does not benefit the society. Women who succeed in their companies are not accorded the respect they deserve. This is because many people claim that the women succeed due to preferential treatment policies that are directed to the women and minority. The implementation of affirmative action created a bad tradition in the workplace, whereby employers are quick to promote women without qualification or place them in inappropriate job positions so as to meet the affirmative action requirements. By doing this, employers put women and minorities at a higher risk of failing in their jobs and their after lay the blame on their sex, race and preferential treatment policies. (Gilbert, Stead, Ivancevich, 1999).   Ã‚  Ã‚   The compensatory justice argument, also known as deontological theory, claims that if a person causes injury to someone else they should remedy the damage. Affirmative action claims that even the descendants of the injured person should be compensated as well. Objections to this argument state that those individuals being compensated are not victims in any way and those being forced to pay the compensation have not done any wrong. Those objecting to this argument claim that since some minority groups have been subjected to historical prejudice previously, this has been used to classify all low earning groups as victims of injustice. This argument claims that since women have been victims of prejudice and discrimination in the employment and education sectors, they should be given preferential treatment when recruiting, training or hiring.   Ã‚  Ã‚  Ã‚   The ideal of equality is the most common moral argument for affirmative action programs. Under this argument women and minority groups should be accorded equal treatment and rights just like men and other groups. Under law employers must not use discriminatory biases such as gender, race, or national origin to hire or recruit candidates. However, some government agencies and constitutions have implemented policies that oppress both the women and minorities. Some government policies restrict the employment of certain groups especially women and people of color in certain job categories. The main objection of this argument is that equality means that everyone should be granted equal treatment and not being given priviledges. Most women advocating for equal treatment, are actually advocating for priviledges in employment opportunities. (Allen, 2003).   Ã‚   In the compensatory justice argument, both men and women should be given justice because; all human beings should be given what they individually deserve. Men should be given employment opportunities just like women. According to the deontological theory, the rightness of the means justifies the action. According to this, both men and women should be accorded their rights equally. Conclusion   Ã‚  Ã‚   Disabled veteran affirmative action program is a way of promoting the lives of disabled veterans released from active duty due to service disability, by ensuring they get equal employment opportunities like other veterans who are not disabled. Affirmative action for women and minorities on the other hand, seeks to promote women and minority groups at the expense of other qualified candidates. Affirmative action for women has led to the employment of women with less qualification at the expense of more qualified men. Affirmative action for women and minorities, to some extent, does not promote race or gender equality. However, the Disabled Veteran Affirmative Action Program promotes equality among all veterans, whether disabled or not disabled. References Allen, R. (2003). Examining the implementation of affirmative action in law enforcement. Public Personnel Management, 32(3), 411. Ball, C., Haque, A. (2003). Diversity in religious practice: Implications of Islamic values in the public workplace. Public Personnel Management, 32(3), 315. Charles J Muhl. Monthly Labor Review. Washington: Jan 1999. Vol. 122, Iss. 1; p. 48 (2 pages). Gilbert, J.A., Stead, B.A., Ivancevich, J.M. (1999). Diversity management: A new organizational paradigm. Journal of Business Ethics, 21(1), 61-76. Sowell, T. (2004). Affirmative Action around the World: An Empirical Study. Yale University Press.

Wednesday, August 21, 2019

Technical Education Excellence Through Innovation

Technical Education Excellence Through Innovation TECHNICAL EDUCATION EXCELLENCE THROUGH INNOVATION. INTRODUCTION: Maidanavaruna general authority and power in the world of technology is an effective analytical tool due to global engineering education internationalization of education is a concept that shifts has turned out. Education excellence in manufacturing initiative primarily of an organization to obtain good fit and intelligent functionality in the context of the paucity of technical institutions in the country, second tier are available in number. India is now a major driver for innovation and engineering teaching has to be a balance of entertainment and Engineering Journal of teaching in the part of the company to engage with ISTE is the next to join the exciting and hearting . Acceleration of technical change is a feature of modern society leading. International National Stadium in technology has become a powerful tool for projecting power and strength. Research and increase advance and free enterprise excellence and official approval Process manufacturing contribution SUMMARY: The world faces sociological problem that is the result predominantly of the practical advance such as trouble of fast and extreme use of valuable and depletes raw resources. Engineering subject is bilateral and lectures from side to side â€Å"Chalk and Talk† may not be sufficient. With great latent obtainable with newest high speed CD computer, it has been possible to develop suitable teaching aids to conceptualize difficult engineering phenomena and products. The rapid advancement in ICT are making it inexpensively feasible to gather, store, procedure and transmit information at breathtaking speed, reduced cost particularly the transaction cost, raise output and increase financial good. Connectivity†: The access budding for in order and communiquà © skill must be slow by improving living infrastructure. â€Å"Capacity†: There is a require to increase person’s ability from side to side training to deploy in order and communication skill wisely and in their own notice. â€Å"Content†: in order and message technology application and happy must be urbanized and provided as necessary or related to the reality of life i.e., the in order in the net must be available even in the local lingo. There is a greater than ever fear that the enlargement of ICT will go later than alive appearance of shared and financial system difference and perhaps even make stronger prevalence example of shared care out. During India, literacy was 65.4% according to the latest poll in 2001. Not additional than 10%of our inhabitants has education above 10th benchmark. The National information assignment (NKC) constitute by management of India has purposeful on a integer of issues to add to autonomy and answerability and improved quality in higher edification Class of tuition at any level depends on the class of higher learning; of course the stress should be on improving the quality of teachers. Tutoring and research are continuous processes of advancing science and skill. We have a long way to go in the area of delve into publications and outcome of research students. Since there is a shortage of experienced and trained research engineer and technologist it would be appropriate to expand these facilities particularly in the engineering departments of the University, in its place of creating new research cells outside. Inter departmental collaboration of investigate and growth work would be and be grateful for means for such growth. CONCLUSION: It twisted third main technological and technical personality survival of significant R$D institution, fourth major army and railway system. India is produce all her required of purchaser goods a bull of creator kit. Making do, novelty and performance are vital constituent in understanding of a lively technical society of the prospect considerably depends on your ability to think authenticity. ENGINEERING EDUCATION AND INNOVATION. INTRODUCTION: Education is an important input both of the swelling of the society as strong as for the individual instruction opens new horizon for an personage. Knowledge and developed are product of elementary discover in basic science inventive genius tried to use these discover of new developed product and for other human needs. Novelty Engineering is to help persons reignite culture of novelty within their organizations by transform the mindset of both the management and the labor force. This is accomplished by educating and enable innovation changeThe engineering education in India arose out of necessity for the tanning of obverses intended for construction and maintenance of public structure, road candle and port, and of the training of artisans and craftsmen. Role of technical education in the growth of India has been recognized in independent India pt. Nehru our first primenister, referred to India’s first IIT at kharagpur as’’ representing India urges India future in the making symbolic of the changes that are coming. One of the essential purpose of higher education is produced original thinker’s who revel in expending frontiers of knowelegement engineering education is a key part higher education system in India. SUMMARY: It must also be realize that public costs on edification have also better many folds throughout last two tactics and the central government have shaped many new and modernism institute such as IIT and NISER in adding to new IIT and IIM and central universes. Administration tactics to set up thirty new universities, five new Indian institutes of science education and research. During a variety of period of our history this core of learning continued but new addition were made by thickness, education and run through people in each era consisted with the need of the society later. Novelty in curriculum and programmes teaching means and aids interdisciplinary. Enduring learning and the qualitative alteration and. Recognize ion and assessment. Scholar satisfaction method. Industry feedback. Developed of more demanding curriculum material. Govt. set standard, ongoing programme for intensive teacher training. Student appraisal, restricting of learning location. The aooroches and development used for it can be any or all of the following, modeeernized of syllabi, enlarged and branch and increased allotment of funds. As India as all the resource and potential to became a regional therefore an increasing number of student from neighbour country will choose the countries as their preferred destination for higher education. Our system of assessments and benches making must be integrated with those of the world. The process must be transparent and based on the parameters used globally for such benchmarking. Composition of teams at work place both organized and unorganized sector shall be must skilled multi cultural mulltingul and multi ethnical system employer would have no simple say in choosing the team. The total number of university stood at 367 now. CONCLUSION: The earth need freedom from strife, progress, collective cohesion and muscle to live tighter readily available is a require to express our young age group to idea of ordinary patience and peace. The prospect programme for teaching will be to empower person assure high quality of existence and pave way to knowledge society. The new scheme of teaching has to be entrenched culture and dyed-in-the-wool to progress and makes feel superior to be Indian. Who revel in expending frontiers of knowelegement manufacturing education is a key part superior teaching arrangement in India. KNOWLEDGE INFRASTRUCTURE FOR EXCLLENCE IN ENGINEERING EDUCATION, RESEARCH AND INNOVATION. INTRODUCTION: Knowledge rigorous education and research environment, it is important to strengthen knowledge infrastructure in engineering institution to foster world classiness, tech-savvies and quality of service for excellence in education, research and innovations. The society has made a significant contribution to the growth of academic quality, to the promotion of quality UG and PG project, to the causes of Faculty Development and to the causes of bridging the gap between the current state of technology and knowhow and the knowledge and skill set imparted in the institutions. The national knowledge commission in its Report to the Nation 2006 has called for creating a synergy between Education and Research in the technical education. Creation of such a network for the country shall empower our higher education system to take full advantage of the power of connectivity and power of networking which will then be utilized to create advantage India in higher education, more so in technical. Furth er the cause of excellence in technical education in India and for that reason anywhere else in the world cannot be effectively served in the connected knowledge economy today without the access and use of the vast knowledge warehouse available on the net. SUMMARY: Crisis of India as an information Superpower in the new years is now life form well recognized approximately the globe. India, porcelain and WE are being future as the top three economies of the world. India’s rapid progression to a fastest growing economy could be likely primarily since of important growth of science and technology institution well-known in the country during the last 4 decades. Innovation Engineering is a new field of college study and industrial live out based on a body of knowledge comprise of 48 Skills. It is a multi-disciplinary field blending the humanities, engineering, production, and obvious law. In piece of information, the world famous IT organization such as a Microsoft, Intel, AMD, Oracle, CISCO and others have utilize the genius of Indian manufacturing graduates to propel technology innovation and manufactured goods development. Extra, Research centre being set up in India both by Indian and foreign company keep on to attract manufacturing and technology alumni from Indian institutions. In the near era where knowledge reigns utmost, it is important to identify that the maturity of a country is propel by the supremacy of scientific and technological innovations and is driven by the growth of knowledge easy industrial background. focus of engineering and technology institutions, except the IITs and a few selected PG institutions, has been primarily to provide undergraduate studies in engineering and technology while the postgraduate studies and research have been limited to approximately 35000 candidates in 268 AICTE approved institutions of engineering and technology in addition to 54167 candidates enrolled in MCA in 1012 institutions as per the Annual Report 2003-2004 of AICTE. Creating Knowledge Infrastructure in engineering and technology institutions is a dire need at present if we have to transform Indian engineering education system to a system tuned to technology and product innovation alongside with the development of world-class quality human capital. Research and Development – programs that support innovation through investments into research projects and/or investments into research centres and equipments, by establishing Centres of Excellence for Information and Communication technology. It is an asset to prepare Indian Technology Universities to rasp the challenges of the acquaintance age. CONCLUSION: The nationally Knowledge duty in its account to the realm has outline the urgency of create the synergy between lessons and research in institutions of higher in order. acquaintance modernization nurture in the ST in India on the might of the inventive genius and back by a in the soft tissue powerful knowledge interactions can go faster the pace of India’s march on the Knowledge super pathway. extra, in the area of technical education leveraging benefit technology assist by the power of technology innovation can help in considerably improving the quality of teaching and research, effectively meeting the challenge of acute sense shortage and current low pace of world class research and new manufactured goods development. Let us make an unconditional assure to fostering a new era of excellence in technical tutoring, investigate and innovation in our institutional campus.