Tuesday, December 31, 2019

Chandra Manning And The Civil War - 1169 Words

On April 18, 1865, the Civil War was ended by an agreement reached between Joseph E. Johnston and William T. Sherman following the surrender of the Confederate Army. Decades later, historians still question how the Civil War began. Although they view slavery as an underlying cause of the Civil War, there is still controversy in accepting that it was the main cause of conflict between the North and the South. In What This Cruel War was Over, Chandra Manning argues that the North fought for the purpose of protecting their ideals of liberty, morals, and self-government, whereas the South fought for individualized self-interests. Through the use of primary and secondary sources, Manning examines the viewpoints of both Union and Confederate soldiers in order to assert that most soldiers during the time period viewed slavery to be the underlying cause of the war. Chandra Manning is an American historian who graduated from Mount Holyoke College and received her PhD from Harvard in 2002. She is currently an assistant professor at Georgetown University. Her most notable award is the Avery O. Craven Award, making her a credible source used by historians such as Paul D. Escott in North Carolinians in the Era of the Civil War and Reconstruction. Written in chronological order, What This Cruel War was Over is divided into six chapters with both an introduction and conclusion. In the first chapter, Manning argues that the sole purpose for commitment and existence of Confederate troopsShow MoreRelatedSignificance Of Slavery And The Civil War Essay1979 Words   |  8 Pageslead up to the American Civil War of 1861. In order to evaluate the significance of slavery, the investigation will evaluate the social and economic role of slavery in the South and the North; the religious aspects of slavery will be investigated along with the portion of the civilian population that depended on slaves for an income. The years 1850 to 1865 will be the focus of this investigation, to allow for an analysis of the tensions leading up to the war as well the war period itself. FurthermoreRead MoreThe Legacy Of The Civil War Essay1488 Words   |  6 PagesThe Civil War was one of the most bloody and divisive conflicts in United States’ hist ory. While the conflict may have spanned over four years, its origins date back to the birth of the nation. The fracturing of the early political system on the basis of location, party, economic visions were the beginning of fundamental differences between the states. As the political, social, and economic patterns developed throughout the nation, the regional and ideological differences only deepened, leading toRead MoreThe War On The Battlefield1726 Words   |  7 PagesWars aren’t fought in a vacuum, and those who study the Civil War should know this. While the Confederacy lost the war on the battlefield, a failure to exam the social and political climate before the first shot fired on Fort Sumter and the furling of the CSS Shenandoah’s Confederate Navy Ensign— the war’s final surrender— does not capture the war’s impact on the nation. Certainly, one can’t discuss a war and never mention a battle. The field’s foundation is in traditional military history, but IRead MoreThe Reasons For Confederate Defeat Of The Civil War1973 Words   |  8 Pagesdefeat in the Civil War is an oft-debated historical question. Originally attributed to the overwhelming manpower and industrial capacity of the North, a more nuanced series of explanations have come to the forefront in modern historical circles. Generally, they attribute Southern defeat to either external or internal factors. Externalists believe that â€Å"the North won the war,† due to better military leadership and other mitigating factors. Internalists believe that â€Å"the South lost the war† because ofRead MoreIndian National Army and Its Role in Independence Struggle7239 Words   |  29 Pages......................................................................................................... 6 The First Indian National Army................................................................................................. 8 Subhash Ch andra Bose and the Second Front ......................................................................... 11 The Second Indian National Army .......................................................................................... 13 INA in Action ...Read MoreAbraham Lincoln’s Presidency Essay2162 Words   |  9 Pagesupheaval and Civil War. Lincoln entered the White House burdened by an oppressive set of domestic issues; the most pressing was the rift between the North and South. Before Lincoln’s inauguration, the Union was dissolving, and he was left with only one choice, to preserve America and to make war against the South. On a scale of one to ten, ten being the highest, Lincoln and his administration would rank as an eight. Lincoln’s presidency was unique, for it was the only one that endured a Civil War thatRead MoreWhy Did Judge Hall Choose John Jameson for Celia’s Defense? Essay4850 Words   |  20 PagesPresidency of Abraham Lincoln,[citation needed] and the American Civil War.[citation needed] Although the Supreme Court has never overruled the Dred Scott case, the Court stated in the Slaughter-House Cases of 1873 that at least one part of it had already been overruled by the Fourteenth Amendment in 1868:[4] The cause of the civil war: Election of 1860 The United States presidential election of 1860 set the stage for the American Civil War. The nation had been divided throughout most of the 1850sRead MoreThe American Civil War : The United States8725 Words   |  35 PagesThe American Civil War, known in the United States as simply the Civil War as well as by other sectional names, was a civil war fought from 1861 to 1865 to determine the survival of the Union or independence for the Confederacy. Of the 34 states that existed in January 1861, seven Southern slave states individually declared their secession from the United States and went on to form the Confederate States of America. The Confederacy, often simply called the South, grew to include eleven states, althoughRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pages Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed., Rethinking the Cold War Eric Foner, ed., The New American History. Revised and Expanded Edition E SSAYS ON _ T WENTIETH- C ENTURY H ISTORY Edited by Michael Adas for the American Historical Association TEMPLE UNIVERSITY PRESS PHILADELPHIA TempleRead MoreColonial Rule Of Independence And Independence10047 Words   |  41 Pagesfinds that the Japanese used both forms of rule by greatly concentrating power in Seoul complemented with a densely bureaucratic periphery. He concludes that this provided the foundation for the development that occurred in South Korea after the Korean War. The type of colonial rule is closely linked to whether the colonial institutions became embedded and intertwined with the society. The governing coalition in colonies exposed to indirect rule experiences a duality of institutional structures as customary

Monday, December 23, 2019

Problems of Working Students in Palawan State University...

PROBLEMS OF WORKING STUDENTS IN PALAWAN STATE UNIVERSITY DURING THE SCHOOL YEAR 2012-2013 A Research Proposal Presented to The Faculty of Palawan State University Laboratory High School Puerto Princesa City In Partial Fulfillment of The Requirements for the Subject RESEARCH 01 CORDERO, MICHAEL JOHN A. SENA, SHANNEN KRISHNA S. VILLENA, SAMANTHA MARIELLA T. October 2012 CHAPTER 1: PROBLEM RATIONALE AND BACKGROUND 1.1 BACKGROUND OF THE STUDY The financial burden of education fees are rising. Due to the increasing price of tuition fees, school fees and other education finances, families tend to face financial crisis particularly on managing the budget of the family basing on their family income. These†¦show more content†¦By knowing these factors students who prefer to work and study simultaneously will be responsive and ready for the situation he/she entering. Further significance is the non-working students and faculty members will be able to understand the situation of the working students and help them to cope up with their studies. This study has significant implications to provide an idea to people on solving the problems encountered by working students. This study may be a source for further research regarding the problems of working students. 1.4 SCOPE AND DELIMITATIONS OF THE STUDY The study focused on the problems encountered by working students of Palawan State University. The study also encompasses the reason of students of Palawan State University to work and study simultaneously, the advantage and disadvantages of being a working student, and their aspirations in life to pursue working even if it causes problems to them. The main location of the study will be the Palawan State University and the most target respondents would be the working students specifically the college students, but possibly, the researcher will also request other students or also school administrator and faculty members to gather some information and will use other resources to be able for this research to become possible andShow MoreRelatedCoco Energy Drink14921 Words   |  60 Pagesinside young, green coconuts. The coconut’s many benefits have long been acknowledged in the Philippines, since the country is abundant in such cr op. However, the idea to use it as an energy drink took root somewhere else. In the United States, the use of coconut water as an energy drink has become a hundred-million dollar industry. With the many opportunistic entrepreneurs that operate within the country, it is only a matter of time before the Philippines catches on to thisRead MoreFeasibility Study Paper About E-Jeepney11403 Words   |  46 Pageshealth problems to millions of people. It takes different forms of energy like heat, noise, and light. Everything can be polluted like air, water, and even the pollution itself. One thing that most of the people use which enhances pollution to our environment are the vehicles. Jeepneys are the most popular means of public transportation and most reliable source of transportation in the Philippines. They have become a ubiquitous symbol of Philippine culture. Since Central Luzon State University aimsRead MorePageant proposal10491 Words   |  42 PagesJune 22, 2013 MS. GRACE CELLA REBUELTA-MEJIA DEAN COLLEGE OF TOURISM AND HOSPITALITY MANAGEMENT DE LA SALLE UNIVERSITY - DASMARIÑAS Dear Ms. Rebuelta-Mejia, Greetings of peace! We are pleased to inform you that the 3rd year BS Tourism Management Events Class 2013 of De La Salle University-Dasmarià ±as is proposing to organize the third â€Å"Ms. Tourism Student Philippines Beauty Pageant† with its theme â€Å"Tourism and Sustainable Energy: Powering Sustainable Development.† It is a beauty pageant that

Sunday, December 15, 2019

Human Profile Free Essays

string(70) " training and monitoring are basic steps for minimizing human errors\." Chapter 5 Human Factors in Aviation Security Contents Page INTRODUCTION . . . We will write a custom essay sample on Human Profile or any similar topic only for you Order Now . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 Background on Human Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA AND HUMAN FACTORS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 FAA Policy and Plans for Human Factors and Aviation Security . . . . . . . . . . . . . . . . . . 80 FAA Requirements for Aviation Security: Human-Factors Implications . . . . . . . . . . . . . 82 Other Issues for Human Factors and Profiling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 Policy Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88 Box Box Page 5-A. UAL Hi-Tech Screening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 C hapter 5 Human Factors in Aviation Security factors in these cases can greatly improve the utilization of technology for airline security. Dramatic accidents caused by human errors in the nuclear power, chemical, and transportation industries have increased public attention to human performance issues during the past decade. Additional training requirements, revised operating procedures, warning devices, and expanded government oversight are typical recommendations following accident investigations. However, these stopgap measures address only the surface of problems that are rooted in the complex interactions of people and equipment within the larger system and the institutional and organizational structures and procedures that drive the planning, design, and management of these systems. Following the ground collision of two jetliners in Detroit in December 1990, Dr. John Lauber, a member of the National Transportation Board, said that â€Å"basically the [aviation] system, the way we’re operating it, almost demands nearly error-free [human] performance. Similar concerns can be echoed for the aviation security system—a number of successful airline terrorist events have been traced to a human failure. 2 â€Å"The challenge is to design a system. . which is tolerant of those errors when they do occur and which detects and traps them before we have [a catastrophe]. †3 Multilayered defenses are employed at many commercial airports and airline terminals, and se curity managers and government authorities are turning to new technologies to buttress these systems. Heretofore, Federal requirements and industry use of security technologies have usually been with specific functions in mind. As long as the technical goals could be met effectively, the equipment was considered satisfactory and human performance problems related to the technology were resolved through revised training and procedures. Technology use in counterterrorism will likely increase dramatically over the next decade, but if early and INTRODUCTION Human resources are critical to aviation security. Security personnel—passenger and baggage screeners, guards and law enforcement officers, and airport and airline employees in general-are important elements of a system that prevents and deters hostile acts against air carriers. Technology can enhance, but cannot replace, the capabilities of these people and the many services they provide. Moreover, management practices based on behavioral research findings can further improve human performance. This chapter considers the function of screeners in weapons and explosives detection, and the role of guards, officers, and other aviation employees in discovering (and deterring) suspicious individuals or situations. Within the past 20 years, technology has greatly increased the capability and productivity of these security people. Metal detectors and x-ray devices are faster, more accurate, and more socially acceptable tools for screening passengers and baggage than manual searches. Remote television and other monitoring devices, computer-controlled access to restricted areas, and communication and data systems allow comprehensive surveillance and threat assessment. While these technologies raise the capabilities of a security system to new levels, their ultimate success and actual performance depend on the people who design, operate, and maintain them. Many security assignments require repetitive tasks and close monitoring for rare events— functions that humans perform poorly. Selecting well-suited individuals, training them properly, designing their work environment and rotation schedule to elicit the best possible performance, and providing motivating incentives are fundamental requirements for successful operations, regardless of the type of technology in place. These functions involve human performance; application of human p. A17. IJohn Lauber quoted by John H. Cushmau Jr. , â€Å"Test for Aviation: Coping with Human Shortcomings,†The New York Times, Dec. 0, 1990, ~ne example was the destruction of a Korean Air Lines flight over the Andaman Sea by a bomb planted by North Korean agents. The device, in a carry-on bag, was ahnost detected at a security checkpoint in Baghdad at an earlier stop. When a security guard wished to remove the batteries from a radio, one terrorist turned the radio on, proving it operated, a nd then raised a hue and cry, yelling and complaining. Instead of using this as a reason to stop the two suspect individuals and to examine their belongings minutely, the security forces decided to avoid trouble by allowing them to proceed. Lau~r, op. cit. , footnote 1. –79– 80 q Technology Against Terrorism: Structuring Security methodic attention is not given to human performance issues, we may expect that system efficiency and effectiveness will be substantially impaired. Background on Human Error The human role in a security system is complex; thus the nature of human errors, from mental to physical, varies widely. Mental or cognitive errors can include improper judgment or decisionmaking, while physical errors may stem from motor skill deficiencies or faulty equipment design. A combination of physical and mental processes may influence other kinds of errors, such as those involving communication, perception, or alertness. Human factors, a discipline combining behavioral sciences and engineering, focuses on improving the performance of complex systems of people and machines. Designing and operating a system so that it does not induce human error (in fact, designing it so that human error may be minimized) is one critical component of human factors and limiting the impact of a human error once it occurs is another aspect. Many types of human error are systematic, following certain predictable patterns; once these patterns are identified, countermeasures can be developed. For example, poor location of switches or dials can induce manual or perceptual errors. For those types of human error that do not follow predictable patterns, mitigation techniques are difficult to develop. Some examples of mitigation techniques include automatic monitoring and warning devices. These subsystems, when properly designed and implemented, can be invaluable tools for negating human error. Employee selection—allowing into the system only those people least likely to make mistakes— and continued quality control maintained through training and monitoring are basic steps for minimizing human errors. You read "Human Profile" in category "Papers" Potential errors can be forestalled by the use of standard procedures and checklists for routine and emergency tasks, planning work shifts and assignments so as not to induce inattention and 4EM1 L. hlC. , fatigue, and properly designing the work environment. â€Å"If human factors engineering is done properly at the conceptual and design stage, the cost is high, but paid only once. If tranin g must compensate for poor design, the price is paid every day. † 4 According to one expert, there does not appear to be a strong need for new basic research in human factors related spectifically to security-behavioral science findings in general and experience with human performance problems in other industries are probably sufficient to enhance current security operations. 5 For example, such knowledge is being used to upgrade security screener selection by airlines, and to improve training standards. However, the mechanisms to identify early on and to address effectively the human performance issues stemming from new security technologies, such as explosives detection systems, are not yet in place in industry or the Federal Government. Shifting boring and repetitive tasks that people perform poorly to machines is an approach that can reduce errors. However, automated devices (or any new technology) may create new sources of human error. 6 Excessive false alarms unnecessarily distract operators and may lead to the device being ignored or disabled. During unusual or emergency circumstances, the lack of flexibility in many automated systems can be a serious limitation and the human backup may not be mentally or physically prepared (or possibly even capable) to take over. Consequently, a full system approach is required for reducing total human errors. FAA AND HUMAN FACTORS FAA Policy and Plans for Human Factors and Aviation Security In a report released in July 1988, OTA concluded that FAA attention to the spectrum of human performance problems in commercial aviation fell far short of the level warranted, since human error is the leading cause of aviation accidents. Later that same year, Congress passed the Aviation Safety Nagel wiener, $~cw~it Automation’ Hu~n ~ac~or~ in Aviation, Eu1 L. wiener and David c. (eds. ) (Sm Diego, CA: Academic PESS, 1988) p. 454. SH. c~fion FoUShee, c~ef scien~lc and Tec~~ Advi,qor for Human FaCto~, FAA p~so~ wmmunimtio~ 1991. 6see wiener, op. cit. , f~~ote 4, Ch. 13 for a discussion of new a nd subtle types of human error that have resulted from the introduction of automation into aircraft cockpits. W. S. Congress, OffIce of Technology Assessment Safe Skies for Tomorrow: Aviation Safefy in a Competitive Environnzent, O’E4-SET-381 (Washington, DC: U. S. Government Printing Offke, July 1988). Chapter 5-Hurnun Factors in Aviation Security q 81 Research Act, which directed the FAA to expand its research efforts on human performance in aviation and authorized funds specifically for that purpose. 8 The FAA responded by creating the position of Chief Scientific and Technical Advisor for Human Factors, responsible for coordinating for the FAA various human-factors research efforts within the FAA NASA, and the DOD and for opening lines of communication within the FAA and industry. Communication among Federal agencies is critical, since decisions made by the aviation industry and the operational and regulatory sections of the FAA often drive the need for new human-factors research and could benefit from an understanding of humanfactors research findings and products. The FAA has made progress in addressing the earlier criticism of its human-factors programs and understanding in aircraft and air traffic control (ATC) equipment and operations. However, the key shortcomings in FAA human-factors efforts that OTA cited in its 1988 study-insufficient agency expertise, uncoordinated research efforts, and regulations and certification standards that do not reflect human-factors principles-still exist within FAA civil aviation security programs. During the course of its study, OTA examined closely many of the technology development programs and regulatory efforts underway in the security sections of FAA and found a general lack of awareness and understanding of the human-factors issues involved with possible new security technologies. An exception to this situation, however, and a hopeful indicator of a new trend, has been the hiring of a human-factors expert at the FAA Technical Center to oversee human-factors research as it relates to airline security. However, at present, it appears that the FAA is ill-prepared to identify and address possible human-factors concerns with the increasingly complex and diverse security technologies now under development. The dearth of trained humanfactors specialists in areas of the FAA responsible for civil aviation security is a serious deficiency. Until recently, the Aviation Security RD Service of the Technical Center would have merited similar concerns, but this shortcoming is being redressed, at least in part. Some of the expertise that the FAA is developing on human factors for other uses could also be applied to security issues. One potential vehicle for bringing human-factors knowledge into aviation security efforts is the National Plan for Aviation Human Factors (HF Plan), the first major product of the heightened FAA attention to human performance issues following the enactment of the Aviation Safety Research Act. The HF Plan identifies significant human performance issues and lays out a 10-year blueprint for establishing and coordinating research programs and conveying the results across Federal agencies and industry. The HF Plan’s development depended strongly on advisory committees composed of a cross-section of research, operational, and regulatory representatives from government and industry and approximately 50 of the nation’s leading human-factors researchers. The good news for aviation security is that the Plan appears to provide a strong foundation for multi- and cross-disciplinary efforts and understanding in human factors and has begun to institutionalize and focus consideration of human-factors issues in FAA decisionmaking. The bad news is that nowhere in the Plan is security mentioned—the Plan addresses the following five aviation environments only: aircraft flight deck, air traffic control, aircraft maintenance, airway facilities maintenance, and flight deck/ ATC integration. This should not be construed as criticism of the general thrust of the HF Plan—the human-factors categories considered have historically been more critical to aviation safety and are considerably more complex than human performance issues in security-and it is beyond the scope of this study to analyze in detail the specifics of the HF Plan. However, some objectives and products of the HF Plan maybe directly transferable to aviation security, provided that lines of communication are established and security experts are included in committee structures. The Plan has eight objectives, all of which can apply to aviation security, but the following two are especially pertinent, given the present attention to technologies for countering terrorism: . to encourage the development of principles of ‘human-centered’ automation and the design of SAviation Stieu Research A@ I%blic bW 100-591. %J. S. Department of Transportation Fedeml Aviation Administratio~ â€Å"The National Plan For Aviation Human Factors,† vol. I, draf~ November 1990. 82 q Technology Against Terrorism: Structuring Security dvanced technology that will capitalize on the relative strengths of humans and machines; . to develop human factors-oriented validation and certification standards for aviation system hardware and personnel that will enhance both safety and efficiency . 10 The HF Plan is designed to be reexamined and revised periodically and aviation security could be added explicitly as a focus area if need and resources warrant. Crucial to the deve lopment and future success of the HF pian is the Human Factors Coordinating Committee (HFCC), formed by the FAA administra11 tor in September 1989. HFCC has representatives from each major division of FAA and serves as ‘‘an advisory body for senior management of FAA in all matters involving human performance and [is] intended to assure that human factors issues are represented in all FAA activities. ’ ’12 Until very recently, the Assistant Administrator for Civil Aviation Security was not represented on this committee. However, this omission has since been recti13 critical-flight safety is at risk only when security performance fails at the same time that a threat occurs. Moreover, FAA staff and the agency â€Å"cul- ture† are predominantly interested in aviation technology and operations and protecting facilities and countering terrorism are not an inherent part of aviation, l4 However, the increasing Complexity of screening technologies and the continuing (possibly increasing) terrorist threat make the performance of aviation security systems more critical to flight safety. fied. Aviation terrorist events in the 1980s made apparent the shortcomings of the minimum Federal security requirements. The FAA and the airlines both focused attention on screener selection and training, detection and screening technologies, and airline management of security programs and systems. The FAA has increased requirements and oversight of security personnel (selection, training, and management) and equipment (weapons and explosives detectors), but has not yet addressed how security personnel and equipment perform as components of a system. Screener Selection and Training For years, the people who screened airline passengers and baggage for domestic flights generally received little training, low wages, and few benefits. Consequently, alarmin g numbers of domestic 15 FAA Requirements for Aviation Security: Human-Factors Implications Aviation security personnel and equipment have received (and have not needed) the same level of regulatory and certification attention that the FAA places on flightcrew, air-traffic controllers, and ground support personnel and their respective aviation equipment. The FAA has focused its regulatory efforts on elements of the aviation system essential to flight safety. For example, the performance of pilots and aircraft systems are continuously critical for maintaining safety-a failure could cause an accident. On the other hand, the performance of the security system (other than as a deterrent) is rarely not screeners failed unannounced FAA tests (22 percent failure rate in 1988). 16 Since there has not been a severe domestic terrorist threat against aviation in the United States, these shortcomings have not resulted in life or property losses. 17 In light of public pressure following the Lockerbie disaster and costly fines stermming from FAA inspections, the Air Transport Association (ATA) developed an extensive set of screener selection, training, and compensation standards. ATA pro- 1%id. , p. 3. lllbid. , p. 28. l%id. , p. 28. lsundm tie FAA ~rga~tio~ s~c~e fi plaW in 1988 ~ou@ 1990, tie Office of Aviation Security wu represented @ the Executive Director for Regulatory Standards and Compliance, to whom it reported. 14fiowl~ge of aviation tw~olow ~d Operatiom i5 impo~t to fic~t ad @ofi s~ty. For e~ple, spec~ characteristics of aviatio~ Such as large volumes of people and luggage that must be screened quickly, drive the security system design and functions. IsHowever, ~~es ~ustom~y ~ve ~gher s~n~ds for security personuel working h ktWtEitiOlld OpelZitiOllS. 16Lpe Osmus, office of Aviation Security, FW, personal COllMIluIlktitiOIL Feb. 22, 1991. ITDepend@ on tie deffitio~ he des~ction of a PSA ftight in 1987, caused by a disgruntled ex-emPIOYW Who Shot tie flying Crew in f@h4 @@t aircraft be considered a terroris4 as well as criminal, act. In this case, theex-employee had an identifkation card with which he gained access to the so screener training was not an issue. Chapter 5-Human Factors in Aviation Security 83 posed that airlines (or their security contractors) 18 consider education and health criteria, the ability to speak English, and aptitude test results before hiring screeners, and that they offer competitive wages, benefits, and incentives and follow a comprehensive training curriculum. In March 1990, the ATA asked the FAA to adopt its proposal as requirements for all airlines. Based on this cooperative industry effort, the FAA has required some of these suggested upgrades in training measures for screeners. (Most U. S. irlines have adopted at least some of the ATA recommendations; the failure rate on random checks has since dropped significantly. )19 The FAA decided not to include selection and wage standards because such a change would require public comment (i. e. , through the Federal Register), thereby calling attention to perceived or actual security weaknesses. rewards to those who detect test weapons and explosives (and even higher rewards to those who find the real thing); and increasing wages to at least the â€Å"local prevailing rate. For comparison, in Israel, screeners are paid at a level considered a â€Å"good† salary, far higher than minimum wage. In Switzerland, they are paid at the rate of about $lOper hour. In the United States, rates are often near minimum wage. Management Practices and Human Performance The FAA mandates certain positions in an airline’s organizational s tructure, such as a security director for the airline and security coordinators at each airport, but airline management practices and philosophy usually fall outside the scope of FAA 20 regulatory authority. In Safe Skies for Tomorrow, OTA found that the effect of airline operating or management practices on airline safety, and changes in those practices, were rarely addressed in FAA safety analyses. 21 The FAA’s Human Factors plan cites the influence of management â€Å"culture† on human performance as one area where basic research is needed. 22 If the organizational â€Å"climate† (i. e. , working conditions, wages, management, organizational culture, etc. ) does not allow an individual to perform at his or her peak, it may not matter how well he or she is trained or how well designed the technology is. 3 The ATA proposal for upgrading screener standards suggests giving screeners employee benefits common in many industries (vacation, holiday, medical) that contractors often don’t receive); offering to contractors the advantages of airline employment (e. g. , low-cost travel) and career opportunities to top performers; providing monetary The United Airlinesâ €™ approach to improving screener performance on all flights from selected airports delineates one set of management techniques (box 5-A). Another approach has been undertaken by American Airlines, lthough only for its international flights. 24 American treats its international screeners as part of the American team. They are hired as full-fledged airline employees, not employees of a contracted security agency, and enjoy the same salary levels and benefits that ticketing agents do. The educational level of entrants appears relatively high, with a few individuals having advanced degrees. There appears also to be a real opportunity for advancement within American Airlines, and not just in the security division. Before starting work, the entrants are brought to Dallas (from across the world; many screeners are hired from the countries in which they will be working) for 2 weeks of training at American’s headquarters. The training includes emphasis on the screening questions as well as on what to look for on the x-ray screens. The screeners ask the standard questions as to who packed the baggage and whether anyone could have placed contraband in it. But they also ask general questions regarding destination and travel plans, somewhat akin to the lines of questioning performed by El Al. Indeed, American has used Israeli security consultants in designing their security system. The screeners look for a number of specific characteristics, which remain proprietary to the company. If too many of the characteristics match a passenger, the individual’s baggage will receive much closer inspection. Screeners are ro- 18Most scree~g for domestic flights in the United States is conducted by security Contractors, nOtairhe employC%S. l~we Osmus, op. cit. , footnote 16. ~u. s. Conwss, OffIce of Technology Assessment, op. it. ,fOOtiOte 7. 211bid. , p. 88. 22U. S. Department of Transportatio~ Federal Aviation Administration op. Cit. , fOOtnOte 9, p. 15. ‘Ibid. 24s0~~: Site visit t. D* A@o% December 1$)90, and Homer Bo@oq Chief of Sedty, American Airlines, perSOIlal COmm~CatiO~ December 1990. 84 q Technology Against Terrorism: Structuring Security tated between looking at x-ray screens and interviewing passengers. Periodically, security systems are tested by contractors, who choose an American employee to play a terrorist. A specific scenario is given to this impostor, and the reaction of the security personnel is noted. If they do not perform their functions, they may be subject to severe discipline, including termination. The result of the overall approach, using incentives and threat of discipline for negligence, appears to be a well-motivated and alert force. Box 5-A—UAL Hi-Tech Screening United Airlines is focusing on management practices in its program, called Hi-Tech Screening, to improve the quality of pre-departure screening and the public perception of this highly visible function. Begun in 1987 at Chicago O’Hare and San Francisco Airports, the program incorporated many of the selection and incentive steps later recommended in the ATA proposal, and also attempted to integrate technology and people by reconfiguring the screening environment to make it more pleasant for screeners and passengers as well as to improve operations. Although wages are still low, successful workers have the opportunity to join the UAL organization, instead of working as contract security personnel. Improvements include direct communication links to supervisors for oversight and advice to screeners, layout designed to minimize passenger delays, and multiple cues to passengers that security measures are being taken in a professional reamer (security supervisor in an elevated booth, passengers see themselves on video monitors as they go through metal detectors, signs describing procedures are clear and concise). United believes that the program has been successful to date in increasing public awareness and employee morale and competence. At Chicago, the employee attrition rate dropped by half and weapon detections and FAA test scores increased significantly (79 percent detection rate on FAA weapons tests prior to Hi-Tech and 92 percent subsequently). United has also installed Hi-Tech Screening systems in Denver, LOS Angeles, Seattle, and Washington Dunes, with plans for additional implementation in the future. SOURCE: Site visit to O’Hare, April 1990, and Richard Davis, Operational Security, United Airlines, Jan. 3,1991. Security Equipment Currently, the FAA requires airlines to employ relatively few types of security equipment— primarily x-ray devices and metal detectors. The FAA established minimum performance standards for detecting weapons and explosives, and since these technologies are radiation-based, the FAA also requires that they meet Federal health and safety standards . 25 There are no standards governing operator interaction with the equipment, such as the layout of controls and display symbology options. At the time the FAA established x-ray and metal detector requirements (early 1970s), it had little expertise in human factors. Moreover, these technologies were relatively simple compared with aircraft cockpit and ATC consoles that the FAA had to certify without objective human-factors criteria, making humanfactors standards for security a relatively low priority. However, many behavioral experts argue that properly developed human-factors standards could improve system performance for aviation security as well as safety. In recent years, the FAA has issued regulations for security technologies-computer-controlled access at airports and explosive detection systems—that are considerably more complex and have wider system implications than x rays and metal detectors. As has is evidenced in the explosive detection system (EDS) regulations published in September 1989 26 and the subsequent performance of TNA, the only device to date that could meet the FAA standards. Beyond setting detection criteria, which are critical to the security system performance, the FAA also included requirements for throughput of the device (which is primarily an economics issue—see ch. 4) and a requirement for 100-percent automated detection decisionmaking. Several lines of reasoning could lead to a design goal of total automation, including lower operating costs over the long run een commonly the case whenever new technology is used to solve a problem, attention is focused on the positive aspects of the technology—how effective it is—without giving full consideration to possible new human-factors problems caused by the technology. The lack of attention to man/ machine human-factors and system operating issues ~F~r ~xmple, ~. ray ~y~tms ~~~ P-Y for c W. on baggage must meet tie s~n~ds set by the Food and Drug Administration. x54 Federal Register 36938 (Sept. 5, 1989). Chapter 5-Human Factors in Aviation Security q 85 nd possibly removing human error from the operating loop. However, it maybe useful, and sometimes vital, to keep the human in the operating/decisionmaking loop, especially if he or she must respond during emergency or unusual conditions. As has been shown so far in TNA tests, the false alarm rate is well above earlier goals and human intervention is required quite often. While automation, in the context of an EDS, is a useful tool, and total automation may be an understandable goal, requiring 100 percent automated functions in an EDS is not justified at this time. The E D S regulations provide an example of where input from a group such as the FAA’s Human Factors Coordinating Committee could help flag potentially troublesome human-factors aspects of security regulations. Airline passenger profiling, in most cases, must be fast (and consequently cursory) enough so as not to impose excessive delays. In other security contexts, such as screening for the â€Å"insider threat† profile within an organization where time is not so critical, much more detailed background data and questioning is possible. A different, although overlapping, form of profiling is used by law enforcement and investigatory agencies. Given pertinent data and evidence from a crime scene or threat, experts compile a profile of likely social, psychological, and physical characteristics of the criminal. However, much of the work and methodology could be transferred from one of the broad profiling regimes to the other. FAA Requirements for Profiling-Under Federal regulations, U. S. airlines must apply a relatively simple form of passenger profiling for international flights (e. g. questions regarding electronic devices), although airlines are not prohibited by FAA/DOT from conducting any form of profiling at any time. Whether or not a passenger is selected for closer scrutiny, such as a manual baggage search, depends on where his passport was issued (a factor that varies based on threat intelligence) and on responses to a series of questions aimed at identifying potential terrorist â€Å"dupes. † Addition ally, airlines must conduct random baggage inspections on a small percentage of otherwise unselected passengers for each flight. These requirements do not apply to domestic flights or to foreign airlines, which results in an obvious gap in protection for Americans. The fact Passenger Profiling In-depth questioning of all airline passengers and detailed examin ation of each of their personal belongings and baggage is impossible in a modern transportation system. Since most of the millions of passengers that fly on U. S. airlines each year pose no security risk, targeting security resources on the small number of passengers who exhibit some elements of the threat â€Å"profile† is one way to increase security without clogging transportation flows. rofiling can be a valuable component of a transportation security system, providing an independent complement to hardware-based (and often more expensive) explosives and weapons detection technologies. Successful profiling depends on a large support system including comprehensive intelligence networks and threat analyses, information system technology to process large databases, behavioral research and analysis, and trained and motivated screening personnel. There are two general approaches to operational profiling. One compares passenger demographic and other background data (age, sex, nationality, travel itinerary, etc. ) to historic or recent intelligencederived â€Å"threat profiles. † The other is based on the examiner’s psychological assessment of the passenger, taking into account nervousness, hostility, or other suspicious characteristics. Most profiling systems currently use elements of both approaches to varying degrees. that foreign airlines that compete with U. S. airlines on international routes do not have to satisfy these requirements imposes an economic penalty on domestic carriers and weakens their ability to compete successfully with foreign carriers, which, in addition, are usually statesubsidized. Domestic airlines complain, with justification, that a â€Å"level playing field† should be established to avoid this unfair disadvantage. An option would be to compensate U. S. airlines for the additional costs, either from Federal subsidies or from the Airport Trust Fund. 7 Alternatively, foreign carriers could be required to apply similar security measures on flights landing in the United States to those demanded of U. S. carriers. The United States has forced better security practices in foreign 2% l$)7(j, Congress estiblishedaprecedent for compensating U. S. air carriers forsecuritymeasures incurred in international operatiombyautioritig nearly $10 million for fiscal years 1976-78 (Public Law 94-353, sec. 24). In 1982, Congress extended the authorized limit to $15 million (Public Law 97-248, sec. 24(d). Nearly this much was actually disbursed to four U. S. carriers. 84 q Technology Against Terrorism: Structuring Security revocation of landing rights of carriers from those countries in the absence of improvements. airports by threatening coordinating security management decisions and for providing a conduit for a detailed database. 30 The FAA is considering making CPSP mandatory, but a number of carriers oppose it, citing security officer vigilance problems caused by distraction by computer keyboard and display. Knowledgeable FAA and airline personnel claim that airline opposition stems mainly from the increased oversight capabilities that such a system would give the FAA CPSP would provide a detailed record of all airline profiling actions (and errors or failures) that could be used for civil penalty proceedings. Presently, the FAA oversees airline profiling procedures through random or scheduled field visits. The FAA counters that if a would-be malefactor sneaks through, CPSP also can provide documented proof that the airline followed FAA-required procedures, shifting some liability for a profiling failure to the FAA. 1 Additionally, there is substantial U. S. airlines operating on European routes have been permitted to substitute their own profiling programs for FAA requirements. 28 Most U. S. airlines and many foreign carriers conduct more extensive profile screening than minimum FAA requirements at foreign airports and some U. S. international gateways. Some airlines train their interna tional employees in profiling techniques while others hire contractors to handle security for their international flights. Proprietary profiling procedures used by these airlines are modeled generally on the Israeli El Al method of profiling which is more comprehensive (and intrusive) than FAA requirements and reportedly includes psychological, social, and political factors. Complaints by certain groups, such as Arab-Americans, claiming harassment, stem from carrier-initiated profiling, not Federal requirements. 29 During the past 5 years, the FAA has developed and tested a computer-based profiling tool aimed at potential terrorist hijackers and saboteurs. The Comprehensive Passenger Screening Profile (CPSP) is both a checklist and decision aid for field officers and a data collection system to support profiling enhancements. It encompasses the current FAA required profiling procedures plus additional factors based on a data profile of terrorists, using historical and intelligence sources. The decision process for selecting a passenger for further examination is automated through a series of mathematically weighted yes/no questions (some of which do not require passenger interviews), that the security officer responds to via a keyboard. CPSP is designed for easy modication if intelligence or data analysis indicates a need. In early 1990, the FAA offered CPSP as an option for airlines to meet profiling requirements. Continental Airlines and United Airlines have tested versions of CPSP at a few locations, and have been generally pleased with its performance, especially as a tool for centrally ~ho Boiv@ FAA htelligence, personal communication Oct. 1*, 1990%llid. analytic value to the large data set that would come from CPSP. As discovered during TNA testing, little is known about the baseline average passenger and baggage; therefore, general background data, regardless of how well CPSP works operationally, would be valuable for security planning. No names of passengers are (or legally can be) included in such a data set maintained by the Federal Government. 32 However, as private entities, airlines can and do maintain such lists. Other Issues for Human Factors and Profiling Research and Development Due to security and proprietary concerns, profiling systems in place today are shrouded in secrecy. The technical aspects of their development and quantitative measures of their performance are difficult to obtain, although the widespread use at airports across the world attest to airline confidence in profiling Given industry acceptance of profiling technology, the unregulated environment in which profiling systems were developed, and the potential enhanced capabilities and future needs, there is a ~JO~Be~~l~q Director, Comorate s~~~, COntinenM fi~es, ~rson~ commtication, od. 15, 1990 and Glen W- Director, @XtitiOI. Ud Security, United Airlines, personal communication, Oct. 6, 1990. 31c)P. cit. , footnote 27. qzfiid. Chapter 5-Human Factors in Aviation Security q 87 role for a concerted Federal (DOT) effort in profiling R. The primary research fields of interest are in the behavioral sciences and in large database collection and analysis. A useful but neglected approach would be to investigate the role of cultural differences in establishing profiles. Since patterns of behavior co nsidered anomalous in one culture are normal in others, understanding cultural effects better could lead to more effective and, possibly, less discriminatory use of profiles. 3 Relevant behavioral research with applications for profiling is being conducted by a number of Federal agencies, although they generally do not coordinate these research efforts. There is a need to coordinate research and experience in developing terrorist profiles among concerned agencies. Also, some work is going on to establish databases of past incidents and known terrorists in order to help develop profiles. The FAA conducts a modest profiling research effort that produced the CPSP and is analyzing profiling field tests. However, this effort is housed in the in aviation security. It has worked with in-house experts, with other agencies, and with behavioral scientists under contract. There should be steps taken to guarantee that this institutional knowledge is not lost, due to needed secrecy or personnel turnover. There should also be an effort to bring together knowledge on profiling from the Intelligence Community, from the Federal Bureau of Investigation, from the Immigration and Naturalization Service, and from the FAA, so that all agencies may profitably pool their knowledge. One way of helping assure such interagency communication would be the institution of annual interagency conferences on the topic (see ch. 3). Profiling techniques and related technologies are being added to current security R plans at the FAA Technical Center. The operational aspects of using automated profiling systems, such as data entry and human/computer interaction, are similar to those of many other technologies, and could benefit from further research and development. intelligence section under the Assistant Administrator for Civil Aviation Security with no direct link to FAA’s R division. Historically, the FAA pioneered the use of profiles in aviation in the late 1960s and early 1970s during the upsurge of hijackings to Cuba. A team of experts under the leadership of the FAA Office of Aviation Medicine was involved in the development of the initial profiles. Limited use of profiles was made during the early 1970s and again in 1980, when immigrants from the Mariel Boatlift began hijacking aircraft to Cuba. [Profiles were employed on a limited basis to help stem the wave of hijackings to Cuba by some â€Å"Marielitos†. In the 1970s, the FAA also developed a profile for domestic use to identify persons who might be carrying explosives or incendiary devices in checked baggage. This â€Å"checked bag† profile included several objective elements and was intended for use by airline personnel at ticket counters. This profile was never applied rigorously, although some of its elements were automated by at least one U. S. air carrier. Thus, the FAA has had substan tial experience with developing and implementing profiles for use A near-term research need is how best to combine profiling systems with the new security technologies now in the pipeline. In fact, arguments have been made that the TNA device can only function effectively when combined with profilebased selection of baggage to inspect, since false alarm rates are high. This is, in fact, being done at the Gatwick tests. Presently, the profiling process results in binary decisions—let the passenger pass into the normal security process (more than 95 percent of passengers) or conduct a manual search of the passenger and his baggage. One possibility would e to expand and refine the decision outcome from profiling to provide multiple screening paths for passengers depending on the level of threat and the availability of advanced detection equipment (see ch. 4). A longer term research option is to investigate new technologies to enhance profiling. Rapid access in the field to Federal, international, and, possibly, private databases (i. e. , hotel, credit card) could greatly enhance capabilities. Remote sensing of respiration and heart rates and other biological parameters, combined with large population databases, automated facial-recognition systems, and SsCustom offici in the Northern ~ Islands, a U. S. -flag territory, incorporate cultural characteristics in looking for anomalies for profding. â€Å"a 88 q Technology Against Terrorism: Structuring Security biometric passports, all offer new possibilities for on-the-spot psychological and physiological assessments. From past experience, cultural factors particular to the country where the event is taking place frequently influence decisionmaking by local authorities. Some observers report that U. S. fficials who were involved would, on occasion, have benefited by a more detailed knowledge of the dynamics of local social systems. For example, in some cases, although crisis management officials were supposed to be in charge of handling an incident, local cultural or political factors have resulted in the crisis being directed instead by senior office holders, who are untrained for the purpose and unable to provide the rapid decisionmaking that is often required. Some research into sy stematizing knowledge of relevant aspects of different social systems would be useful. In this area, as in profiling, the construction of appropriate databases would be of use to U. S. officials who may be called on to participate in resolving a crisis. At present, there appears to be little coordination among agencies in understanding behavioral aspects of incident management. This lack provides another argument for strengthening interagency coordination in counterterrorism (see ch. 3). Civil Liberties Security systems in general, and profiling methods in particular, trade certain freedoms (e. g. privacy) for safety. profiling methods, based on specific individual characteristics, may be derived from historical experience (e. g. , the large number of Cuban refugees who hijacked aircraft to Cuba in the early 1970s or the examples of hijacking engaged in by members of various Middle Eastern terrorist groups). These characteristics sometimes include physical and cultural features, since these traits are the easiest indicators to verify. Often such subjects belong to read ily distinguishable minority groups. Therefore, people who possess the characteristics in question but who have no ill intentions (obviously, the great majority) could be subjected to scrutiny that could be considered to encroach on individual freedoms. This study describes measures to meet compelling public safety interests. It is, however, beyond the scope of this study to discuss the many legal and societal civil liberties issues involved (e. g. , how much intrusiveness on privacy is countenanced by a compelling interest of the state? ). It is certain that the technical ability to investigate and record personal histories and characteristics and the demand for the use of such ability will greatly expand, thereby increasing the potential for crossing the fine line protecting constitutionally guaranteed individual liberties. Legislative attention will have to address the tradeoff between public safety and welfare and civil liberties. Policy Options The following policy options address human factors and aviation security. 1. Enhance FAA attention to human factors in security: 34 q Explicitly address aviation security in agencywide human-factors planning. The FAA has taken measures to move in this direction. Bolster human-factors expertise under the Assistant Administrator for Civil Aviation Security and the Aviation Security Research and Development Service at the FAA Technical Center by adding professionals to their respective staffs, especially in light of plans to increase staff levels of both sections significantly during the next few years. One such professional has already been added. Incident Management Human factors also play a role in managing incidents abroad. When U. S. citizens are held hostage in a foreign country, the United States often plays a role in resolving the incident. Some foreign security officials are trained in the United States under assistance programs. But the United States also may participate actively, as it did in responding to a number of airline hijackings in the 1980s. q ~~e follo~ r=omenhtiom included in earlier drafts of this repofi has already been implemented by tie FAA q Add a designee of the Assistant Administrator for Civil Aviation Security to the FAA’s Human Factors Coordinating Committee. Chapter 5-Human Factors in Aviation Security q 89 2. Consider conducting R on combining passenger profiling techniques with other security technologies. 3. Give consideration to methods for â€Å"leveling the playing field† when imposing requirements on U. S. carriers but not on competing foreign ones. 4. Give consideration to civil liberties issues 5. stemming from Federal aviation security requirements. Coordinate behavioral research into profiling and incident management being conducted in the Federal Government. Arrange periodic interagency conferences on related topics. How to cite Human Profile, Papers

Saturday, December 7, 2019

Strategic Management In Oil and Gas Merger and Acquisition

Question: Critically analysing how the strategy of merger and acquisition has been used in the energy sector during the oil price drop of 2014 to 2016. Answer: Introduction The strategic management has a significant role in recognizing the needs of organisations. It consists of setting objectives and examining the internal and external factors, affecting operations of the organisation (Sadler, 2003). In the recent decade, setting objectives, executing and implementing strategies are the most significant activities performed in the oil and gas organisations. The strategic management can enhance its effectiveness if organisations priorities get aligned with shareholders expectations, potential of corporate, and market conditions (Lynch, 2012). Therefore, to succeed in the market, it is essential for the oil and gas organisations to review and compare their performance with the prevailing companies in the market (Inkpen Moffet, 2011). The paper intends to conduct an analysis on the energy sector to evaluate the process of using merger and acquisitions as a strategy during the period of oil price drop in 2014-2016. Discussion The Impact of Internal and External Factors in the Management The strategic management in an organisation can be considered as a set of decisions, which are required to formulate by the management to obtain the designed objectives (Lynch, 2012). The scope of succeeding the strategic management consists of the decisions, time scales and activities performed in the organisation. There are mainly three phases of strategic management, namely formulating plans, executing those plans and controlling the activities. The formulation of plans comprises of setting goals, objectives, visions, mission of the organisations and accordingly the second phase consists of putting the plans into practice. The implementations mainly focus on developing alternative strategies to reinforce previous strategies based on which the management can evaluate and control the existing strategy to enhance its effectiveness in accomplishing the organisational objectives. Thus, reassessing of the strategies is essential to examine the potential of the internal and external fact ors (Johnson. et al, 2013). In this regard, the strategic management can be considered as the guideline to obtain competitive advantage by leveraging the internal and external factors affecting the organisation. There are several internal factors that are continuously affecting the smooth functioning of the oil and gas companies in current market, which have been elaborated through the below sections (Grant, 2012). Work Force: The success of an organisation largely depends on the performance of its employees. Therefore, the process of recruitment and training should be conducted carefully to enhance the capability of the organisation. Inefficient financial condition restricts the organisations to conduct proper training and development programs in enhancing employees skills and abilities. The turnover or the absenteeism of employees affects the functioning of an organisation. Organisational Configuration: Effective structuring of job roles, specifications along with different levels of organisations will result in smooth flow of the work procedure. Proper management can easily reduce the possibilities of errors and chaos amid the workforce. However, inefficiency in the performance can pose challenge for the management to accomplish the acquired goals and objectives. Hence, inappropriate configuration of the organisation can create conflict among the supervisors and the subordinates, which ultimately leads to indecent coordination and inflexibility within the internal environment. Execution: Parallel to planning implementing the strategies is also an essential element in which the managers play a significant role to maintain the team and encourage them to follow the instruction aligning with strategic priorities. Thus, improper management can force employees to become unenthusiastic in the decision making process or other activities. Finance: Financial ability is a key factor that affects an organisation to ensure proper functioning along with risk management. Financial position of an organisation uplifts the business and helps to gain competitive advantages in the market. Thus, with the help of financial support the organisations can adapt new technologies to expand its market opportunities and preferences. Market Competition: In the recent market, competition is one of the external factors that are continuously affecting organisations in both positively and negatively. The company needs to make new strategies to compete in the market, which on one hand enhance its future potential while on the other hand can lead towards complicated scenario. Therefore, the managers need to be updated with the trending situation in the market to manage the risks and aligning them according to the organisation goal. Technology: The technological changes in the market have largely affects the cost and quality of supplying the energy. New and innovative technologies have been adopted in the energy industries such as nuclear power and solar energy to make the operations more effective for which the organisations concentrate on the improvements in conventional technologies and innovative designs in nuclear power (Oil Gas Journal, 2016). Geographic Influences: Nowadays, the numbers of organisation in the energy sector have visibly been increased for which the landscapes are dug in more depth to extract the resources. Therefore, there is a possibility of occurring geological hazard and continuous severe weather or climatic changes might become a vital threat for the energy industry. Political Legal Factor: For the extraction of oil and petrol, companies need to fulfil the statutory requirements. However, there are differences in rules and regulations based on the states or regions. Apart from this, continuously increasing rate of taxes can also become a threat for the oil and gas organisations. SWOT Analysis The weaknesses, strengths, opportunities and threats are evaluated considering the internal and external factors of the organisations in the energy industry. Strengths: Effective organisational structure promotes efficiency in management and successful leadership styles. To gain expected outcome from the strategy it is important to maintain appropriate leadership style within the internal environment (Robinson Scott, 2011). The oil and gas companies have more concentrated on enhancing the abilities of its workforce, which will eventually be beneficial in attaining the organisational objectives. Therefore, the companies have utilized proper execution and management style to obtain values and competitive advantages in the current market. Weaknesses: It has been apparent that the oil and gas companies face issues regarding developing the resources due to weak financial condition, which on the other hand results in large uncertainty and price volatility. Although the companies opt for merger and acquisition, the energy industry still in an uncertain position wherein the companies with lower financial support will face huge challenge to survive in the market (Ventures Africa, 2015). Opportunities: The innovative technologies have enables the energy industries to accelerate its growth in the market. The strategy provides huge opportunity specifically to the companies with comparatively weak financial condition by merging with other companies to increase its potential in long-run. The change in demographic factors such as increasing income level of the people also creates an opportunity to expand the business (Ventures Africa, 2015). Threats: Consistently increasing rate of taxes is considered as a threat to the oil and gas companies. The current price environment is unsustainable wherein wide ranges of opportunities available but for limited companies. In this circumstance, companies with lower financial support can be dominated by other competitors. Furthermore, the drilling process adopted by the companies might also give rise to certain geological hazards, resulting environmental issues (Oil Price. com, 2012). BCG Matrix The BCG matrix is the guidelines for proper allotment of resources and compare among various business entities. The BCG matrix is usually divided into two aspects namely market growth and relative market share. Growth Rate of the Market represents the increase in sales or revenues of organisations, wherein high growth rate indicates more opportunities. Relative market share measures the market share of organisations against the existing competitors in the market in which large market share indicates large number of competitors in the market (Grant, 2010). Figure 1: BCG Matrix Source: (Muilwijk, 2014) Oil and gas companies usually capture the maximum market shares across the world in which IT strategies enable the companies to adopt innovative drilling and extraction technologies. To retain the profitable position in the market, the companies must focus on the upstream for production and exploration, since it helps to obtain high profit and investment rates. The downstream consists of low capital in comparison to the upper stream (EY, 2015; Duică, et al., 2014). With the support of the merger and acquisition strategy implemented by the industry, the oil and gas companies have huge scope to expand their business along with high profitability. Companies can merge or acquire other companies that can provide geographical advantages and strengthen the financial positions. Thus, this particular strategy of merger and acquisitions enables companies to obtain competitive advantages by reducing the price and increasing the market share as well (EY, 2015; Duică, et al., 2014). In this regard, although the oil and gas companies concentrate on expansion, the market share might be still low even with high capability to prosper. To mitigate this concern, the companies can further adopt innovative technologies by using previous experience of exploration and production process (EY, 2015; Duică, et al., 2014). Involving large numbers of employees or acquiring higher position can further lead the companies towards more complicated scenario, wherein conflicts within the internal environment can become a threat. This factor can also force the companies towards downturn i.e. dog position. Therefore, maintaining the operations along with appropriate techniques and strategies help the management to run the business more effectively (EY, 2015; Duică, et al., 2014). In this perspective, it can therefore be affirmed that the strategy of merger and acquisition leads the energy industry in the star position. Due to continuous increase in operational cost and other factors the companies force to increase the oil price, which on the other hand consistently threaten to development of the industry. Thus, to improvise the profitability and the position in the market, the strategy of merger and acquisition have provided expected outcome through which the companies successfully managed the cost and other risk factors (Duică, et al., 2014). Strategy of Merger and Acquisition (MA) Applied during the Oil Price Drop, 2014-2015 MA in Strategic Management The merger and acquisitions are the part of the business strategies in which the companies are integrated together to attain growth in the industry. The decisions regarding merger and acquisitions are based on the current business status of the companies, future threats and opportunities. In addition, the success of the companies can also be determined based on the effectiveness of strategy implementation process and priorities (Pennwell Corporation, 2016). Concentrating on the oil and gas companies, in most of the situations, large companies seek to merge with the small companies with higher potential as through this it can attain profitability with own financial abilities and others potential. There are various processes to be followed by the two business entities for merger and acquisitions. However, the strategies might differ based on the company goal, strategic priorities and work process (Sunkara, et al, 2015). Merger and acquisition strategy is a common practice in the energy industry to improve their technical and financial possessions. The companies seek to merge with other companies to enter into a new market or concentrate on surviving in this competitive market. The drop in price of oil and gas during 2014-2015 forced the energy industry to adopt this particular strategy to retain its market along with high profitability (Sunkara, et al, 2015; Gupta, 2012). How the MA are Beneficial in the Oil and Gas Organisation There are several opportunities that can be availed by oil and gas companies through financial position development. The increase in profit eventually reduces the costs of capital and increases the market share. In this situation, companies intend to purchase the undervalued assets or the companies with geographic advantage, core competencies and introduce the business from new dimensions. Through this strategy the companies aim to deal with the challenges, evident in dynamic business environment. In certain circumstances, companies cannot compete with the existing competitors in the market for which they choose to merge with other companies or being acquired. Thus, it can be considered as a tool to improve their declining profit margin (Sunkara, et al, 2015; Gupta, 2012). It has often been apparent that the oil and gas companies face issues due to delay in capital projects and supply shortage. The downturn in the industry significantly indicates weaknesses of the companies, which ne eds to be corrected to remain viable in long-run. In this regard, the merger and acquisitions will enhance the abilities of the companies by expanding and diversifying the business with support of other companies in the industry (Gupta, 2012). This can be reflected through the example of Royal Dutch Shell and Britains BG Group Plc, which merged in 2015 for about $70 billion cash and stock. Through the merger, the Shell expects to expand their projects to East Africa and Latin America and the BG Group anticipates the market capitalization of about $240 billion. The merger is expected to facilitate with the savings of about $2.5 billion and thereby leveraging on the increasing cost and the spending incurred in oil and energy exploration approximately by 50% (Ventures Africa, 2015). Similarly, the companies can further enhance their business through adoption of innovative technologies, which can be cited through the example of acquisition between the Permian shale and Occidental Petroleum Corporation (OXY). The acquisition between the Permian shale and Occidental Petroleum Corporation (OXY) has enabled the OXY to enhance their productivity. This has also facilitated the OXY to adapt new technologies and enhance potential for further expansion (Mawji, 2016). The acquisitions of energy transfer to Williams made the remarkable record as Second Largest Midstream in US, which performed between the Energy Transfer Equity LP and the Williams Companies Inc., approved by the directors of both the entities valued approximately $37.7 billion (Oil Gas Financial Journal Staff, 2015). Challenges Faced After Adopting the Merger and Acquisition Strategy Parallel to the opportunities due to merger and acquisition strategy, it also contributes certain limitations to the companies in implementing this strategy or strengthening financial and technological position in the market (Alam, Khan, Zafar, 2014). The strategy of merger and acquisitions played significant role in uplifting the energy industries during period of 2014-2015 (Caves, 2008). However, there are certain other challenges faced by the oil and gas companies elaborated in the following sections: Impact on the Employees and Shareholders: Due to the merger the companies will have the opportunities to access the technology and workforce of other companies for which they might decide to downsize the number of employees. In such circumstances, dedicated employees have to leave the organisations. The stated scenario can also lead the internal environment more complicated wherein the managements face issues to encourage employees according to the organisation goal due to the presence of miscommunication and misunderstanding as well as they can also be less intrigued to participate in the decision-making activities (Khartukov, 2016; Caves, 2008). Organisational Culture: after merger and acquisition companies need to change their management and work procedure due to which the organisational culture, hierarchical flow might get affected. This factor often causes conflict and chaos within the work environment of companies. Employers need to structure new top management comprising members from both the companies for which they often face challenges in integrating common business strategies or priorities (Alam, et al., 2014; Caves, 2008). Loss of Customers: The customers are considered as the main assets for business growth and expansion. After the integration of two different companies, maintaining coordination and trust among them is a vital concern during which the management unable to accomplish the necessities of the people, which ultimately results as loss of potential customers (Alam, et al., 2014; Caves, 2008). Role Conflict: The confliction on the role is a common problem occurred after combining the two different business entities. The mangers and the employees having different organisational background and job roles might lead to confusion. The mangers might be unable to manage large numbers of employees of other companies, which often give rise to conflict on roles and responsibilities (Alam, et al., 2014; Caves, 2008). Conclusions The paper emphasized on the external and internal factors affecting oil and gas companies in the current market during the price drop in 2014-2016. The internal and external factors are illustrated by using SWOT analysis and BCG matrix presents different strategies adopted by the companies to maximize its market share. Based on the information and presented discussion, it can be concluded that the strategies of merger and acquisition have a significant role in strengthening the financial and technical resources of organisations. Although the companies are driven to follow the strategy due to low cost in oil and gas, they have successfully reinforced the current depleting business status. Apart from this, there are certain challenges evident in the process of merger and acquisition, which need to be corrected to obtain competitive advantages and gain expected outcome of the strategy. Thus, companies must develop certain techniques by concentrating on employees priorities and expectati ons of other stakeholders as well. References Alam, A., Khan, S. Zafar, F., 2014, Strategic management: managing mergers acquisitions, Journal of BRIC Business Research (IJBBR), vol 3, no 1, pp. 1-10. American University, 2011, Why mergers fail, American University, pp. 1-30. Caves, R., 2008, Effects of mergers and acquisitions on the economy: An industrial organisation perspective, Federal Reserve Bank of Boston, pp. 149-172. Duică, A., et al., 2014, The rise and fall of B.C.G. model, In the 8th International Management Conference, pp. 143-152. EY, 2015, Global oil and gas transactions review, EYs Annual Review, pp. 1-19. Grant, R., 2012, Contemporary strategy analysis: concepts, techniques, applications, Blackwell, Hoboken. Gupta, P. K., 2012, Mergers and acquisitions (MA): The strategic concepts for the nuptials of corporate sector, Innovative Journal of Business and Management, pp. 60 68. Inkpen, A, Moffett, M, H., 2011, The Global oil and gas industry: management, strategy and finance, PennWell, United States. Khartukov, M. E., 2016, MA in the global petroleum industry, A Primer for Energy Executives on Oil and Gas Mergers and Acquisitions, viewed 23 July 2016, https://www.ogfj.com/articles/print/volume-13/issue-2/features/m-a-in-the-global-petroleum-industry.html. Lynch R., 2012, Strategic management, Prentice Hall, United States. Mawji, O., 2016, The case for Occidental Petroleum (OXY) buying Apache (APA), Energy Security, viewed 23 July 2016, https://www.geopoliticalmonitor.com/the-case-for-occidental-petroleum-oxy-buying-apache-apa/ Muilwijk, E., 2014, BCG-matrix, Marketing, viewed 23 July 2016, https://www.intemarketing.org/marketing-information/marketing-models/bcg-matrix Oil Gas Financial Journal Staff, 2015, Energy transfer to Acquire Williams, creating second-largest midstream company in US, News, viewed 23 July 2016, https://www.ogfj.com/articles/2015/09/energy-transfer-to-acquire-williams-creating-second-largest-midstream-company-in-us.html Oil Gas Journal, 2016, Technology will continue to profoundly affect energy industry, PennWell Corporation, viewed 23 July 2016, https://www.ogj.com/articles/print/volume-96/issue-13/in-this-issue/general-interest/technology-will-continue-to-profoundly-affect-energy-industry.html Oil Price. com, 2012, Factors that could threaten the oil gas industry in the future, Energy Digital, viewed 23 July 2016, https://oilprice.com/Energy/Energy-General/Factors-that-Could-Threaten-the-Oil-Gas-Industry-in-the-Future.html Pennwell Corporation, 2016, Mergers acquisitions, Home, viewed 23 July 2016, https://www.ogfj.com/mergers-acquisitions.html Robinson, C. Scott, A., 2011, Strategic planning for the oil and gas industry, Making Choices among Strategies, Heriot-Watt University, pp. 1-13. Sadler, P., 2003, Strategic management, Kogan Page Publishers, London. Sunkara, R., 2015, MA outlook for oil and gas deals, Monitor Publishing Inc., viewed 23 July 2016, https://www.oilgasmonitor.com/category/mergers-and-acquisitions/ Ventures Africa, 2015, These are the top three mergers and acquisitions in 2015, Business, viewed 23 July 2016, https://venturesafrica.com/these-are-the-top-three-mergers-and-acquisitions-in-2015/