Sunday, February 23, 2020

Risks management analysis during Development stage of the Channel Term Paper

Risks management analysis during Development stage of the Channel Tunnel Project, Including management of environmental risks du - Term Paper Example (Yan-juan, Ding-li, & Jian-jun, 2009 p2). This is then followed by the assessment of the influence of the excavation on underground strata structures, and how such excavation might lead to their deformation. To reduce the probability of these risks, the Construction, Design and Management Regulations have been developed to aid the monitoring and avoidance of the risks. The necessary controls are then implemented immediately, to prevent the occurrence of the risks (Aritua, 2011 p304). When all that information is collected, a program detailing the nature of the strata and how it might be influenced by the excavation of the tunnel is developed (ProQuest, 2012 p2). The details of the settlement and deformation of the strata are recorded, and a scheme to control the occurrence of the deformation of the strata then generated (Yan-juan, Ding-li, & Jian-jun, 2009 p3). The monitoring and current control strategies are then established, to ensure that the influences of the excavation are cons tantly monitored and Consistent management of the site and the assessment of the structures is done on a real-time basis, and any necessary control and rectification implemented. The risks that were poorly identified were the risks to do with site investigation, which forms the basis for providing adequate information regarding what type of products can be undertaken on the area. This resulted to the establishment of risk registers for tunneling that details every aspect of the site, to ensure that all ground risks have been assessed, and the appropriate features registered, to inform the nature of the most viable project (ProQuest, 2012 p1). Environmental Risk Management during the project life cycle The project life cycle consists of four main stages namely the identification, definition, implementation and the closure stage (Lycett, 2004 p292). However, there are various environmental risks factors that are associated with these stages of the project lifecycle, which contributes to the complexity of the project. The competition for contractors was identified as the major environmental risk, since the construction companies with critical resources and the ability to mobiles are always in constant competition (Aritua, 2011 p310). The organizational structure and the project team coordination is yet another environmental risk factor that was identified, that contributes to the complexity of the project, if not adequately addressed. Social complexity is yet another environmental risk factor, which is contributed by the various actors in the project, and their diverse interests, who may include the politicians and the surrounding communities. Their conflict of interest serves to delay the implementation of the project (Clifton, 2011 p47). However, the reputational risk was poorly assessed. This risk emanates from the direct relationship between the project and the end-users, as well as the stakeholders, since the reputation of a project, is considered a vulnerab le asset, which depends on the project environment to have it sustained (Eisner, 2000 p12). The environmental risks were assessed through assessing the interaction between the project, the people and the organizations, in terms of aspects such as politics and ambiguity, which serves to complicate the

Friday, February 7, 2020

Cybercrime Essay Example | Topics and Well Written Essays - 1250 words - 1

Cybercrime - Essay Example The most feared setback in computer technology is cyber crime (Ross 2010). Cybercrime is a criminal activity that is done through the use of computers and the internet as a tool to target a victim. This illegal activity involves downloading illegal music files to the theft of millions of dollars from online banking systems. It also involves non-monetary crimes such as distributing and creating viruses on other computers or even the posting of confidential business information and data on the internet. On the other hand, cyber crime is classified into three different groups (Kiesbye 2012). This occurs among the government and a business entity through the use of unauthorized access over the computer system without knowing the owner. It is also meant to send programs with the aim of crashing the computer system virus trafficking software. Cybercrime has developed to become one of the fastest growing areas of crime. An increasing number of criminals have been exploiting the convenience, speed and anonymity that the modern technologies offer so as to commit a diverse range of criminal activities. Moreover, the world’s nature of internet usage has given criminals an opportunity to commit any criminal activity any place around the globe. This has made it important for each and every country to adapt domestic offline to detect and cover crimes committed out in cyberspace. In recent years, cybercrime has evolved. In the past it was committed by small groups or by individuals. Nowadays, there has been an emerging trend where traditional organized crime syndicates and criminal minded technology experts working in hand in combining their resources and expertise (Stefoff 2009). There are two types of cybercrime. They are cybertheft and cybervandalism. Cybertheft is the activity of using the internet to steal property or interference with another person’s enjoyment of resources through computers for making illegal