GAO-20-195G, Cost Estimating and Assessment Guide

Total Page:16

File Type:pdf, Size:1020Kb

GAO-20-195G, Cost Estimating and Assessment Guide COST ESTIMATING AND ASSESSMENT GUIDE Best Practices for Developing and Managing Program Costs GAO-20-195G March 2020 Contents Preface 1 Introduction 3 Chapter 1 Why Government Programs Need Cost Estimates and the Challenges in Developing Them 8 Cost Estimating Challenges 9 Chapter 2 Cost Analysis and Cost Estimates 17 Types of Cost Estimates 17 Significance of Cost Estimates 22 Cost Estimates in Acquisition 22 The Importance of Cost Estimates in Establishing Budgets 24 Cost Estimates and Affordability 25 Chapter 3 The Characteristics of Credible Cost Estimates and a Reliable Process for Creating Them 31 The Four Characteristics of a Reliable Cost Estimate 31 Best Practices Related to Developing and Maintaining a Reliable Cost Estimate 32 Cost Estimating Best Practices and the Estimating Process 33 Chapter 4 Step 1: Define the Estimate’s Purpose 38 Scope 38 Including All Costs in a Life Cycle Cost Estimate 39 Survey of Step 1 40 Chapter 5 Step 2: Developing the Estimating Plan 41 Team Composition and Organization 41 Study Plan and Schedule 42 Cost Estimating Team 44 Certification and Training for Cost Estimating and EVM Analysis 46 Survey of Step 2 46 Chapter 6 Step 3: Define the Program - Technical Baseline Description 48 Definition and Purpose 48 Process 48 Contents 49 Page i GAO-20-195G Cost Estimating and Assessment Guide Key System Characteristics and Performance Parameters 52 Survey of Step 3 54 Chapter 7 Step 4: Determine the Estimating Structure - Work Breakdown Structure 56 WBS Concepts 56 Common WBS Elements 61 WBS Development 63 Standardized WBS 64 WBS and Scheduling 65 WBS and EVM 66 WBS and Risk Management 67 WBS Benefits 67 Survey of Step 4 69 Chapter 8 Step 5: Identify Ground Rules and Assumptions 71 Ground Rules 71 Assumptions 71 Global and Element-Specific Ground Rules and Assumptions 73 Assumptions, Sensitivity, and Risk Analysis 76 Survey of Step 5 79 Chapter 9 Step 6: Obtain the Data 81 Data Collection 81 Types of Data 84 Sources of Data 86 Data Applicability 89 Validating and Analyzing the Data 90 Data Bias 92 EVM Data Reliability 92 Data Normalization 93 Recurring, Nonrecurring, Fixed, and Variable Costs 94 Inflation Adjustments 96 Selecting the Proper Indexes 97 Data Documentation 98 Survey of Step 6 99 Chapter 10 Step 7: Develop the Point Estimate 102 Cost Estimating Methods 102 Page ii GAO-20-195G Cost Estimating and Assessment Guide Pulling the Point Estimate Together and Comparing to an Independent Cost Estimate 123 Survey of Step 7 127 Chapter 11 Step 8: Conduct Sensitivity Analysis 130 Sensitivity Analysis in Cost Estimating 130 Steps in Performing a Sensitivity Analysis 134 Identifying Factors for the Sensitivity Analysis 134 The Limitations of Sensitivity Analysis 136 Survey of Step 8 137 Chapter 12 Step 9: Conduct Risk And Uncertainty Analysis 139 Risk and Uncertainty 141 The Need for Cost Risk and Uncertainty Analysis 142 Conducting a Cost Risk and Uncertainty Analysis 144 Cost Risk Analysis Data and Methods 146 Cost Risk Analysis with Risk Drivers 149 Collecting Risk and Uncertainty Data 151 Correlation between Cost Elements 155 Cost Contingency 158 Allocating, Phasing, and Converting a Risk Adjusted Cost Estimate 160 Updating and Documenting a Risk and Uncertainty Analysis 163 Survey of Step 9 164 Chapter 13 Step 10: Document the Estimate 167 Elements of Cost Estimate Documentation 170 Other Considerations 173 Survey of Step 10 173 Chapter 14 Step 11: Present the Estimate to Management 176 Survey of Step 11 178 Chapter 15 Step 12: Update the Estimate 180 Update the Program Cost Estimate with Actual Costs 180 Survey of Step 12 183 Page iii GAO-20-195G Cost Estimating and Assessment Guide Chapter 16 Auditing and Validating the Cost Estimate 184 The Four Characteristics of a Reliable Cost Estimate and their Best Practices 184 Assessing the Reliability of a Cost Estimate 197 Assessing the Extent to Which Cost Estimating Best Practices Are Met 201 Assessing the Thoroughness of an Organization’s Estimating Guidance 203 Chapter 17 Earned Value Management 207 What EVM Is 207 Other Benefits of EVM 215 Obstacles to EVM 216 Federal and Industry Guidelines for Implementing EVM 220 Chapter 18 Earned Value Management Process 223 EVM Process 223 Chapter 19 Earned Value Management Execution 241 Validating the Performance Measurement Baseline and Integrated Baseline Reviews 241 Contract Performance Reports 243 Analyze Performance 252 Project Future Performance 264 Continue EVM until the Program is Complete 270 Chapter 20 Earned Value Management Validation, Surveillance, and Over Target Baselines 272 Validating the EVM System 272 Using System Surveillance to Keep the Performance Management Baseline Current 276 Developing a Corporate Surveillance Plan 278 Overtarget Baselines and Schedules 284 Key Steps of the Overtarget Budget-Overtarget Schedule Process 290 Keep Management Updated 296 Auditing EVM Systems and Data 297 Survey of EVM 299 Page iv GAO-20-195G Cost Estimating and Assessment Guide Appendix I Objectives, Scope, and Methodology 305 Appendix II Case Study Backgrounds 306 Appendix III Experts Who Helped Develop This Guide 340 Appendix IV Data Collection Instrument and Rationale 344 Appendix V Estimating Software Costs 347 Appendix VI Examples of Work Breakdown Structures 360 Appendix VII Learning Curve Analysis 378 Appendix VIII Technology Readiness Levels 386 Appendix IX Integrated Baseline Review 388 Appendix X Common Probability Distributions 397 Appendix XI Best Practices for the Analysis of Alternatives Process 399 Appendix XII The Cost Estimating Process and Internal Control 417 Page v GAO-20-195G Cost Estimating and Assessment Guide Appendix XIII GAO Contacts and Staff Acknowledgments 427 Glossary 428 References 436 Image Sources 462 Tables Table 1: Life Cycle Cost Estimates 20 Table 2: Other Types of Cost Estimates 20 Table 3: The Twelve Steps and their Best Practices 36 Table 4: Typical Technical Baseline Elements 49 Table 5: General System Characteristics 52 Table 6: Common Elements in Work Breakdown Structures 61 Table 7: Basic Primary and Secondary Data Sources 86 Table 8: Three Cost Estimating Methods Compared 103 Table 9: An Example of the Analogy Cost Estimating Method 104 Table 10: An Example of the Engineering Build-Up Cost Estimating Method 108 Table 11: An Example of the Parametric Cost Estimating Method 111 Table 12: Ranges of Cost by WBS 146 Table 13: Air Vehicle Risks, Likelihood, and Cost Effects 149 Table 14: Air Vehicle Uncertainty and Cost Effects 150 Table 15: Cost Estimate Documentation Elements 171 Table 16: Select Cost Estimating and EVM Criteria for Federal Agencies: Laws and Regulations 200 Table 17: The Twelve Steps and their Associated Tasks 203 Table 18: Key Benefits of Implementing EVM 214 Table 19: Eleven Common Concerns about EVM 217 Table 20: EVM Implementation Guides 221 Table 21: Typical Methods for Measuring Earned Value Performance 231 Table 22: Contract Performance Report Data Elements: Format 1 245 Table 23: EVM Performance Indexes 257 Page vi GAO-20-195G Cost Estimating and Assessment Guide Table 24: Best Predictive Estimate at Completion (EAC) Efficiency Factors by Program Completion Status 265 Table 25: Basic Program Management Questions That Earned Value Management (EVM) Data Help Answer 271 Table 26: Sample Factors in Selecting Projects 279 Table 27: Common Indicators of Poor Program Performance 288 Table 28: Overtarget Budget Funding Implications by Contract Type 289 Table 29: Options for Treating Variances in Performing a Single Point Adjustment 292 Table 30: EVM Best Practices 299 Table 31: Case Studies Drawn from GAO Reports Illustrating This Guide 306 Table 32: Common Data Collection Items 344 Table 33: Supplementary Common Data Collection Items 345 Table 34: Aircraft System Work Breakdown Structure 360 Table 35: Missile/Ordnance Systems Work Breakdown Structure 363 Table 36: Sea System Work Breakdown Structure 365 Table 37: Space System Work Breakdown Structure 367 Table 38: Ground Vehicle System Work Breakdown Structure 368 Table 39: Information Systems/Defense Business Systems (Investment) Work Breakdown Structure 370 Table 40: Technology Development Project Work Breakdown Structure 372 Table 41: Particle Accelerator System Work Breakdown Structure 372 Table 42: Environmental Management Work Breakdown Structure 373 Table 43: Pharmaceutical Management Work Breakdown Structure 374 Table 44: Process Plant Construction Work Breakdown Structure 376 Table 45: Telecom Work Breakdown Structure 376 Table 46: The Anderlohr Method for the Learning Lost Factor 382 Table 47: Integrated Baseline Review Risk Categories 391 Table 48: Common Probability Distributions 397 Table 49: The Four Characteristics of the AOA Process and Their Corresponding Best Practices 414 Table 50: Cost Estimating Steps Mapped to Selected Components and Principles of Internal Controls 425 Figures Figure 1: Cost Estimating Challenges and Mitigations 9 Figure 2: A Representative Life Cycle Cost Estimate for a System 19 Page vii GAO-20-195G Cost Estimating and Assessment Guide Figure 3: Cone of Uncertainty 24 Figure 4: An Affordability Assessment 26 Figure 5: The Cost Estimating Process 34 Figure 6: Disciplines and Concepts in Cost Analysis 42 Figure 7: A Product-Oriented Work Breakdown Structure 57 Figure 8: A Work Breakdown Structure with Common Elements 62 Figure 9: A Contract Work Breakdown Structure 63 Figure 10: A Learning Curve 121 Figure 11: A Sensitivity Analysis that Creates a Range around a Point Estimate 132 Figure 12: Tornado Chart for a Sensitivity Analysis 136 Figure
Recommended publications
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • Construction Cost Engineering
    Construction Cost Engineering Purpose and Background Pressure to deliver construction projects at a faster pace has grown and many owners are now demanding that engineers and construction professionals deliver completed facilities in half the time the industry was used to having in the recent past. As a result, the need to be able to accurately estimate the cost of new projects has grown more and more important. There is no time to rescope a project due to funding constraints. Owners, engineers and designers must be cognizant of the cost implications of design decisions throughout the project development process. To do this, they must understand the fundamental concepts of construction cost estimating from both the contractor’s and the owner’s perspective. Additionally, after contract award, this same group must be able to accurately analyze the cost consequences of change orders and thus facilitate the timely completion of the change process to minimize delay. Finally, the proliferation of the use of innovative project delivery methods such as Design- Build and Construction Manager-at-Risk have fundamentally changed the way engineers must approach cost engineering to account for the shifts in professional responsibility inherent to these new delivery methods. This seminar breaks down the construction cost engineering process into its component steps and reassemble it into a straightforward, logical methodology for the development of valid cost analyses of construction projects from the owner’s standpoint. The seminar alternates between lecture/discussion periods and short, high-impact team exercises that are designed to reinforce the preceding lecture’s learning objectives. It offers a comprehensive view of the cost engineering process as a fully integrated system rather than the conventional approach of separate but related activities.
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • A Case for Incorporating Pre-Construction Cost Estimating in Construction Engineering and Management Programs
    Paper ID #14387 A Case for Incorporating Pre-construction Cost Estimating in Construction Engineering and Management Programs Dr. Carla Lopez del Puerto, University of Puerto Rico, Mayaguez¨ Carla Lopez del Puerto, PhD Associate Professor Construction Engineering and Management Depart- ment of Civil Engineering University of Puerto Rico at Mayaguez email: [email protected] http://cem.uprm.edu Luis G. Costa Agosto, University of Puerto Rico, Mayaguez¨ Luis G. Costa Agosto Graduate Student Construction Engineering and Management University of Puerto Rico at Mayaguez email: [email protected] http://cem.uprm.edu Prof. Douglas D. Gransberg PhD, PE, Iowa State UIniversity Douglas D. Gransberg is the Donald and Sharon Greenwood Professor of Construction Engineering at Iowa State University. He received both his B.S. and M.S. degrees in Civil Engineering from Oregon State University and his Ph.D. in Civil Engineering from the University of Colorado at Boulder. He was a faculty member at the University of Oklahoma and Texas Tech University before joining ISU in 2011. His research spans the full life cycle of engineering, construction and maintenance, from the procurement of new projects using alternative project delivery methods such as Construction Manager/General Con- tractor and Design-Build to the preservation and maintenance of pavements and bridges. His research has received awards from the Transportation Research Board, several US state departments of transportation and the New Zealand Transit Agency. He is also a registered Professional Engineer in Oklahoma, Texas and Oregon, a Certified Cost Engineer, a Designated Design-Build Professional and a Fellow of the Royal Institution of Chartered Surveyors in the UK.
    [Show full text]
  • Introduction to Estimating
    CHAPTER ONE INTRODUCTION TO ESTIMATING 1–1 GENERAL INTRODUCTION The estimator is responsible for including everything con- tained in the drawings and the project manual in the submit- Building construction estimating is the determination of ted bid. Because of the complexity of the drawings and the probable construction costs of any given project. Many items project manual, coupled with the potential cost of an error, influence and contribute to the cost of a project; each item the estimator must read everything thoroughly and recheck must be analyzed, quantified, and priced. Because the esti- all items. Initially, the plans and the project manual must be mate is prepared before the actual construction, much study checked to ensure that they are complete. Then the estimator and thought must be put into the construction documents. can begin the process of quantifying all of the materials pre- The estimator who can visualize the project and accurately sented. Every item included in the estimate must contain as determine its cost will become one of the most important much information as possible. The quantities determined for persons in any construction company. the estimate will ultimately be used to order and purchase For projects constructed with the design-bid-build de- the needed materials. The estimated quantities and their as- livery system, it is necessary for contractors to submit a sociated projected costs will become the basis of project competitive cost estimate for the project. The competition controls (e.g., budget and baseline schedule) in the field. in construction bidding is intense, with multiple firms vying Estimating the ultimate cost of a project requires the in- for a single project.
    [Show full text]
  • Estimating Project Cost Contingency – a Model and Exploration of Research Questions
    Estimating Project Cost Contingency – A Model and Exploration of Research Questions David Baccarini Department of Construction Management, Curtin University of Technology, PO Box U198, Perth 6845, Western Australia, Australia. The cost performance of building construction projects is a key success criterion for project sponsors. Projects require budgets to set the sponsor’s financial commitment and provide the basis for cost control and measurement of cost performance. A key component of a project budget is cost contingency. A literature review of the concept of project cost contingency is presented from which a model for the estimating of project cost contingency is derived. This model is then used to stimulate a range of important research questions in regard to estimating project cost contingency and the measurement of its accuracy. Keywords: cost contingency, project cost performance, project risk management INTRODUCTION The cost performance of construction projects is a key success criterion for project sponsors. Project cost overruns are commonplace in construction (Touran 2003). Cost contingency is included within a budget estimate so that the budget represents the total financial commitment for the project sponsor. Therefore the estimation of cost contingency and its ultimate adequacy is of critical importance to projects. The primarily focus of this paper is a literature review, leading to a tentative model for the concept of project cost contingency. The literature on project cost contingency tends to focus predominately upon the micro-process of estimation. There is no model that sets out a macro perspective to provide a holistic understanding of the estimating process for project cost contingency. A model for project cost contingency, from the perspective of the project, is presented to stimulate the identification of research questions regarding the estimating of project cost contingency and measurement of its accuracy.
    [Show full text]
  • Social Control and Surveillance in the Society of Consumers
    International Journal of Sociology and Anthropology Vol. 3(6) pp. 180-188, June 2011 Available online http://www.academicjournals.org/ijsa ISSN 2006-988x ©2011 Academic Journals Review Social control and surveillance in the society of consumers Massimo Ragnedda Dipartimento di Economia Istituzioni e Società (DEIS), Facoltà di Lettere e Filosofia, Università degli Studi di Sassari, Piazza Conte di Moriana 8, 07100 Sassari, Italy. E-mail: [email protected]. Tel: +39 079229654. Fax: +39 079229660 Accepted January 21, 2011 The new Information and Communication Technologies (ICTs) introduced a highly automated and much cheaper systematic observation of personal data. ICTs advance the intensification and the extension of surveillance, such that an expanding quantity of data can now be collected, tabulated and cross- referenced more rapidly and more accurately than old paper files. This process contributes to the building a "new electronic cage" constraining the individual, on the basis of his e-profile and data- matching. Especially two agents of surveillance are interested in collecting and using such data: government authorities and private corporations. Massive stores of personal data held on ordinary people are now vital to both public services and private business purposes. The new electronic cage is more all-encompassing and complete, being able to produce a complete profile of citizens and consumers in real time. Both public and private information agencies rely on one another for creating and modelling the profiles of good citizens/consumers who, by definition, are well integrated into social life, exhibiting predictable behaviour that conforms to the general needs of contemporary consumer/ oriented social relations.
    [Show full text]
  • Estimating Project Cost Contingency – a Model and Exploration of Research Questions
    ESTIMATING PROJECT COST CONTINGENCY – A MODEL AND EXPLORATION OF RESEARCH QUESTIONS David Baccarini Department of Construction Management, Curtin University of Technology, PO Box U198, Perth 6845, Western Australia, Australia. The cost performance of building construction projects is a key success criterion for project sponsors. Projects require budgets to set the sponsor’s financial commitment and provide the basis for cost control and measurement of cost performance. A key component of a project budget is cost contingency. A literature review of the concept of project cost contingency is presented from which a model for the estimating of project cost contingency is derived. This model is then used to stimulate a range of important research questions in regard to estimating project cost contingency and the measurement of its accuracy. Keywords: cost contingency, project cost performance, project risk management INTRODUCTION The cost performance of construction projects is a key success criterion for project sponsors. Project cost overruns are commonplace in construction (Touran 2003). Cost contingency is included within a budget estimate so that the budget represents the total financial commitment for the project sponsor. Therefore the estimation of cost contingency and its ultimate adequacy is of critical importance to projects. The primarily focus of this paper is a literature review, leading to a tentative model for the concept of project cost contingency. The literature on project cost contingency tends to focus predominately upon the micro-process of estimation. There is no model that sets out a macro perspective to provide a holistic understanding of the estimating process for project cost contingency. A model for project cost contingency, from the perspective of the project, is presented to stimulate the identification of research questions regarding the estimating of project cost contingency and measurement of its accuracy.
    [Show full text]
  • Skills and Knowledge of Cost Engineering
    SAMPLE AACE International Skills and Knowledge of Cost Engineering Skills and Knowledge of Cost Engineering Sixth Edition Dr. Makarand Hastak, PE CCP, Editor 2015 Skills and Knowledge of Cost Engineering Sixth Edition Copyright © 1987-2015 by AACE® International 1265 Suncrest Towne Centre Drive, Morgantown, WV 26505-1876, USA Phone: +1.304.2968444 | Fax: +1.304.2915728 | E-mail: [email protected] | Web: web.aacei.org SAMPLE 1 AACE International Skills and Knowledge of Cost Engineering A Publication of Skills and Knowledge of Cost Engineering Sixth Edition Dr. Makarand Hastak, PE CCP, Editor A continuing project of the AACE International Education Board 2017- 2018 Education Board Chair: Michael R. Nosbisch, CCP PSP FAACE [email protected] Vice President - Education Board: Martin R. Darley, CCP [email protected] Members: Dr. Nakisa Alborz Michael Bensussen B. Steven Feng, II Andrea Georgopolous Omar Nava Mazzaoui, P. Eng. Bryan Payne, PE CCP CFCC Julianne Richards Marina Sominsky, PSP SAMPLE Contributing Members: Nelson E. Bonilla, CCP FAACE Trevor X. Crawford, CCP FAACE Clive D. Francis, CCP FAACE Hon. Life Kenneth W. Larison Thomas L. Long Neil D. Opfer, CCP CEP PSP Stephen O. Revay, CCP CFCC FAACE Debbie Richards, CCT PSP Brian Wilcox James G. Zack, Jr. CFCC FAACE Hon. Life AACE Headquarters Liaison: Teri Jefferson, CMP, Manager Education +1 (304) 296-8444 x. 1120 [email protected] 3 AACE International Skills and Knowledge of Cost Engineering 2015/2016 Education Board Members: Peter W. Griesmyer, FAACE (Chair) Dr. Nadia Al-Aubaidy Dr. Baabak Ashuri, CCP DRMP Michael Bensussen Chris A. Boyd, CCP CEP Dr. John O.
    [Show full text]
  • Editorial Marketing and the Rise of Commercial Consumer Surveillance
    Marketing and the Rise of Commercial Editorial Consumer Surveillance Jason Pridmore Detlev Zwick The DigIDeas project, Schulich School of Business, Zuyd University, York University, The Netherlands. Canada. [email protected] [email protected] Marketing Transitions With the widespread adoption of Fordist regimes of production and Taylorist regimes of management in early 20th century America (Gramsci 1971; Hardt and Negri 2000, 219-350), supply of commodities began to surpass market demand consistently for the first time in history. The advent of mass production required mass consumption and as a consequence, the profession of marketing management was developed. Though marketing management had its roots in agricultural economics and was characterized initially by pragmatic macro-economic concerns about distribution efficiencies and co-operative marketing of agricultural products (Bartels 1988), it obtained an increasingly dominant function within commercial practices as it focused on selling more of a particular product than the competition. The new priorities set by a nascent corporate capitalism that pitches companies directly against each other for scarce consumer resources produced novel needs for knowledge about the market, including knowledge about consumers. Hence, corporate marketing management developed early forms of market research to produce consumer knowledge that would help outsell any rivals. Early market research led to a view of the consumer as a relatively stable, homogeneous, and immobile set of preferences that could be managed and controlled with mass advertising (Beniger 1986). An understanding of the consumer as a psycho- socially complex and mutable collection of needs, wants, and desires did not emerge until the 1940s (Miller and Rose 1997; Rose 1997).
    [Show full text]
  • Electronic Surveillance in Workplaces and Their Legitimate Usage to Provide Transparency and Accountability Towards Employees
    © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Electronic surveillance in workplaces and their legitimate usage to provide transparency and accountability towards employees 1Gursimran Singh, 2Dr. Payal Bassi 1Research Scholar, 2Professor, 1 Department of Commerce and Management 1Regional Institute of Management and Technology, Mandi Gobindgarh, India Abstract: Companies used surveillance software’s, CCTV cameras to watch their employees, monitoring their e-mails or the websites content they visit. Sometimes managers used surveillance to provide protection of their companies from legal acquaintances that originates against the wrong doing behavior of their employees such as download of pornography material and provoke able e-mails or messages to other individuals and to provide protection against the inappropriate exposure of exclusive or confidential information on the internet. As the reasons of employers behind these processes can be valid, there are conflicting thoughts of the usage of this technology among the employees. This paper discusses the latest surveillance measures, technologies used by the employer, lawful disputes that can arise from surveillance as well as consequences or problems originate for the management. This paper also discusses some questions about the right of usage of internet or e-mails in the corporations for the personnel motives of the employees and to what extent their can use their right. To what extent the managers or companies lawfully monitor the workplaces or employees behavior on the internet. And about the employees expectations regarding the surveillance used in order to protect their online privacy and the legal options company have provided for them. The paper expresses the ways for further research in surveillance of employees and a more detailed reasoning in improving lawful and policy-making can be analyzed further.
    [Show full text]
  • Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-13-2017 Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D. Fortmeyer Southern Illinois University Carbondale, [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp Recommended Citation Fortmeyer, Nathaniel D. "Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State." (Spring 2017). This Article is brought to you for free and open access by the Graduate School at OpenSIUC. It has been accepted for inclusion in Research Papers by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE by Nathaniel Dean Fortmeyer B.A., Southern Illinois University, 2011 B.A., Southern Illinois University, 2013 A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science. Department of Mass Communication and Media Arts In the Graduate School Southern Illinois University Carbondale May 2017 RESEARCH PAPER APPROVAL SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE By Nathaniel Dean Fortmeyer A Research Paper Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the field of Professional Media and Media Management Approved by: Robert Spahr, Chair Graduate School Southern Illinois University Carbondale March 28, 2017 AN ABSTRACT OF THE RESEARCH PAPER OF NATHANIEL DEAN FORTMEYER, for the Master of Science degree in PROFESSIONAL MEDIA AND MEDIA MANAGEMENT, presented on MARCH 28, 2017, at Southern Illinois University Carbondale. TITLE: SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE MAJOR PROFESSOR: Robert Spahr The nature of digital information and the networked world has enabled the greatest advances in communication, education, art, science, and entertainment since the invention of the printing press.
    [Show full text]