GAO-09-3SP GAO Cost Estimating and Assessment Guide: Best

Total Page:16

File Type:pdf, Size:1020Kb

GAO-09-3SP GAO Cost Estimating and Assessment Guide: Best United States Government Accountability Office GAO Applied Research and Methods GAO COST ESTIMATING AND ASSESSMENT GUIDE Best Practices for Developing and Managing Capital Program Costs March 2009 GAO-09-3SP PREFACE The U.S. Government Accountability Office is responsible for, among other things, assisting the Congress in its oversight of the federal government, including agencies’ stewardship of public funds. To use public funds effectively, the government must meet the demands of today’s changing world by employing effective management practices and processes, including the measurement of government program performance. In addition, legislators, government officials, and the public want to know whether government programs are achieving their goals and what their costs are. To make those evaluations, reliable cost information is required and federal standards have been issued for the cost accounting that is needed to prepare that information.1 We developed the Cost Guide in order to establish a consistent methodology that is based on best practices and that can be used across the federal government for developing, managing, and evaluating capital program cost estimates. For the purposes of this guide, a cost estimate is the summation of individual cost elements, using established methods and valid data, to estimate the future costs of a program, based on what is known today. 2 The management of a cost estimate involves continually updating the estimate with actual data as they become available, revising the estimate to reflect changes, and analyzing differences between estimated and actual costs—for example, using data from a reliable earned value management (EVM) system.3 The ability to generate reliable cost estimates is a critical function, necessary to support the Office of Management and Budget’s (OMB) capital programming process.4 Without this ability, agencies are at risk of experiencing cost overruns, missed deadlines, and performance shortfalls—all recurring problems that our program assessments too often reveal. Furthermore, cost increases often mean that the government 1 Federal Accounting Standards Advisory Board, Statement of Federal Financial Accounting Standards No. 4: Managerial Cost Accounting Standards and Concepts (Washington, D.C.: July 1995). 2 In the context of the Cost Guide, a program refers to all phases in a capital asset’s life cycle—that is, concept analysis, technology definition, requirements planning, acquisition, and operations and maintenance. 3 EVM is a project management tool that integrates the technical scope of work with schedule and cost elements for investment planning and control. It compares the value of work accomplished in a given period with the value of the work expected in that period. Differences in expectations are measured in both cost and schedule variances. The Office of Management and Budget (OMB) requires agencies to use EVM in their performance-based management systems for the parts of an investment in which development effort is required or system improvements are under way. 4 Office of Management and Budget, Preparation, Submission, and Execution of the Budget, Circular No. A-11 (Washington, D.C.: Executive Office of the President, June 2006); Management of Federal Information Resources, Circular No. A-130 Revised (Washington, D.C.: Executive Office of the President, Nov. 28, 2000); and Capital Programming Guide: Supplement to Circular A-11, Part 7, Preparation, Submission, and Execution of the Budget (Washington, D.C.: Executive Office of the President, June 2006). www.whitehouse.gov/omb/circulars/index.html. GAO-09-3SP Preface i cannot fund as many programs as intended or deliver them when promised. The methodology outlined in this guide is a compilation of best practices that federal cost estimating organizations and industry use to develop and maintain reliable cost estimates throughout the life of a government acquisition program. By default, the guide will also serve as a guiding principle for our auditors to evaluate the economy, efficiency, and effectiveness of government programs. The U.S. Government Accountability Office, the Congressional Budget Office (CBO), and others have shown through budget simulations that the nation is facing a large and growing structural deficit in the long term, primarily because the population is aging and health care costs are rising. As Comptroller General David Walker noted, “Continuing on this unsustainable path will gradually erode, if not suddenly damage, our economy, our standard of living and ultimately our national security.”5 New budgetary demands and demographic trends will place serious budgetary pressures on federal discretionary spending, as well as on other federal policies and programs, in the coming years. As resources become scarce, competition for them will increase. It is imperative, therefore, that government acquisition programs deliver as promised, not only because of their value to their users but also because every dollar spent on one program will mean one less available dollar to fund other efforts. To get better results, programs will need higher levels of knowledge when they start and standardized monitoring metrics such as EVM so that better estimates can be made of total program costs at completion. 5 GAO, 21st Century Challenges: Reexamining the Base of the Federal Government, GAO-05-325SP (Washington, D.C.: February 2005), p. 1. ii Preface GAO-09-3SP CONTENTS Preface i Abbreviations xv Introduction 1 The Guide’s Case Studies 3 The Cost Guide in Relation to Established Standards 3 The Guide’s Readers 3 Acknowledgments 4 Chapter 1 The Characteristics of Credible Cost Estimates and a Reliable Process for Creating Them 5 Basic Characteristics of Credible Cost Estimates 6 A Reliable Process for Developing Credible Cost Estimates 8 Chapter 2 Why Government Programs Need Cost Estimates and the Challenges in Developing Them 15 Cost Estimating Challenges 17 Earned Value Management Challenges 23 Chapter 3 Criteria for Cost Estimating, EVM, and Data Reliability 25 Determining Data Reliability 29 Chapter 4 Cost Analysis Overview 31 Differentiating Cost Analysis and Cost Estimating 31 Main Cost Estimate Categories 31 The Overall Significance of Cost Estimates 36 Cost Estimates in Acquisition 37 The Importance of Cost Estimates in Establishing Budgets 38 Cost Estimates and Affordability 39 Evolutionary Acquisition and Cost Estimation 42 GAO-09-3SP Contents iii Chapter 5 The Cost Estimate’s Purpose, Scope, and Schedule 47 Purpose 47 Scope 47 Schedule 48 Chapter 6 The Cost Assessment Team 51 Team Composition and Organization 52 Cost Estimating Team Best Practices 53 Certification and Training for Cost Estimating and EVM Analysis 54 Chapter 7 Technical Baseline Description Definition and Purpose 57 Process 57 Schedule 58 Contents 58 Key System Characteristics and Performance Parameters 61 Chapter 8 Work Breakdown Structure 65 Best Practice: Product-Oriented WBS 65 Common WBS Elements 68 WBS Development 71 Standardized WBS 71 WBS and Scheduling 75 WBS and EVM 75 WBS and Risk Management 75 WBS Benefits 76 Chapter 9 Ground Rules and Assumptions 79 Ground Rules 79 Assumptions 79 Global and Element-Specific Ground Rules and Assumptions 80 Assumptions, Sensitivity, and Risk Analysis 82 Chapter 10 Data 89 Data Collection 89 Types of Data 91 Sources of Data 92 iv Contents GAO-09-3SP Data Applicability 95 Validating and Analyzing the Data 96 EVM Data Reliability 98 Data Normalization 100 Recurring and Nonrecurring Costs 101 Inflation Adjustments 102 Selecting the Proper Indexes 103 Data Documentation 104 Chapter 11 Developing a Point Estimate 107 Cost Estimating Methods 107 Production Rate Effects on Learning 121 Pulling the Point Estimate Together 122 Chapter 12 Estimating Software Costs 125 Unique Components of Software Estimation 126 Estimating Software Size 127 Estimating Software Development Effort 131 Scheduling Software Development 133 Software Maintenance 134 Parametric Software Estimation 135 Commercial Off-the-Shelf Software 136 Enterprise Resource Planning Software 137 Software Costs Must also Account for Information Technology Infrastructure and Services 139 Unique Components of IT Estimation 139 Chapter 13 Sensitivity Analysis 147 Sensitivity Factors 148 Steps in Performing a Sensitivity Analysis 149 Sensitivity Analysis Benefits and Limitations 150 Chapter 14 Cost Risk and Uncertainty 153 The Difference Between Risk and Uncertainty 153 Point Estimates Alone Are Insufficient for Good Decisions 154 Budgeting to a Realistic Point Estimate 155 Developing a Credible S Curve of Potential Program Costs 159 Risk Management 175 GAO-09-3SP Contents v Chapter 15 Validating the Estimate 179 The Cost Estimating Community’s Best Practices for Validating Estimates 179 Chapter 16 Documenting the Estimate 191 Elements of Cost Estimate Documentation 193 Other Considerations 195 Chapter 17 Presenting the Estimate to Management 197 Chapter 18 Managing Program Costs: Planning 199 Linking Cost Estimation as the Foundation for EVM Analysis 199 The Nature and History of EVM 202 Implementing EVM 204 Federal and Industry Guidelines for Implementing EVM 211 The Thirteen Steps in the EVM Process 215 Integrated Baseline Reviews 231 Award Fees 233 Progress and Performance-Based Payments Under Fixed-Price Contracts 234 Validating the EVM System 236 Chapter 19 Managing Program Costs: Execution 243 Validating the Performance Measurement Baseline with an IBR 243 Contract Performance Reports 249 Monthly EVM Analysis 255 Project Future Performance
Recommended publications
  • Law, Technology, and Public Health in the COVID-19 Crisis
    Privacy in Pandemic: Law, Technology, and Public Health in the COVID-19 Crisis Tiffany C. Li* The COVID-19 pandemic has caused millions of deaths and disastrous consequences around the world, with lasting repercussions for every field of law, including privacy and technology. The unique characteristics of this pandemic have precipitated an increase in use of new technologies, including remote communications platforms, healthcare robots, and medical AI. Public and private actors alike are using new technologies, like heat sensing, and technologically influenced programs, like contact tracing, leading to a rise in government and corporate surveillance in sectors like healthcare, employment, education, and commerce. Advocates have raised the alarm for privacy and civil liberties violations, but the emergency nature of the pandemic has drowned out many concerns. This Article is the first comprehensive account of privacy in pandemic that maps the terrain of privacy impacts related to technology and public health responses to the COVID-19 crisis. Many have written on the general need for better health privacy protections, education privacy protections, consumer privacy protections, and protections against government and corporate surveillance. However, this Article is the first comprehensive article to examine these problems of privacy and technology specifically in light of the pandemic, arguing that the lens of the pandemic exposes the need for both wide-scale and small-scale reform of privacy law. This Article approaches these problems with a focus on technical realities and social * Visiting Clinical Assistant Professor, Boston University School of Law; Fellow, Yale Law School Information Society Project. The author thanks Tally Amir, Chinmayi Arun, Jack M.
    [Show full text]
  • Construction Cost Engineering
    Construction Cost Engineering Purpose and Background Pressure to deliver construction projects at a faster pace has grown and many owners are now demanding that engineers and construction professionals deliver completed facilities in half the time the industry was used to having in the recent past. As a result, the need to be able to accurately estimate the cost of new projects has grown more and more important. There is no time to rescope a project due to funding constraints. Owners, engineers and designers must be cognizant of the cost implications of design decisions throughout the project development process. To do this, they must understand the fundamental concepts of construction cost estimating from both the contractor’s and the owner’s perspective. Additionally, after contract award, this same group must be able to accurately analyze the cost consequences of change orders and thus facilitate the timely completion of the change process to minimize delay. Finally, the proliferation of the use of innovative project delivery methods such as Design- Build and Construction Manager-at-Risk have fundamentally changed the way engineers must approach cost engineering to account for the shifts in professional responsibility inherent to these new delivery methods. This seminar breaks down the construction cost engineering process into its component steps and reassemble it into a straightforward, logical methodology for the development of valid cost analyses of construction projects from the owner’s standpoint. The seminar alternates between lecture/discussion periods and short, high-impact team exercises that are designed to reinforce the preceding lecture’s learning objectives. It offers a comprehensive view of the cost engineering process as a fully integrated system rather than the conventional approach of separate but related activities.
    [Show full text]
  • A Deep Dive Into the Technology of Corporate Surveillance
    Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Author: Bennett Cyphers and Gennie Gebhart ​ A publication of the Electronic Frontier Foundation, 2019. “Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance” is released under a Creative Commons Attribution 4.0 International License (CC BY 4.0). View this report online: https://www.eff.org/wp/behind-the-one-way-mirror ELECTRONIC FRONTIER FOUNDATION 1 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Behind the One-Way Mirror A Deep Dive Into the Technology of Corporate Surveillance BENNETT CYPHERS AND GENNIE GEBHART December 2, 2019 ELECTRONIC FRONTIER FOUNDATION 2 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction 4 First-party vs. third-party tracking 4 What do they know? 5 Part 1: Whose Data is it Anyway: How Do Trackers Tie Data to People? 6 Identifiers on the Web 8 Identifiers on mobile devices 17 Real-world identifiers 20 Linking identifiers over time 22 Part 2: From bits to Big Data: What do tracking networks look like? 22 Tracking in software: Websites and Apps 23 Passive, real-world tracking 27 Tracking and corporate power 31 Part 3: Data sharing: Targeting, brokers, and real-time bidding 33 Real-time bidding 34 Group targeting and look-alike audiences 39 Data brokers 39 Data consumers 41 Part 4: Fighting back 43 On the web 43 On mobile phones 45 IRL 46 In the legislature 46 ELECTRONIC FRONTIER FOUNDATION 3 Behind the One-Way Mirror: A Deep Dive Into the Technology of Corporate Surveillance Introduction Trackers are hiding in nearly every corner of today’s Internet, which is to say nearly every corner of modern life.
    [Show full text]
  • GAO-20-195G, Cost Estimating and Assessment Guide
    COST ESTIMATING AND ASSESSMENT GUIDE Best Practices for Developing and Managing Program Costs GAO-20-195G March 2020 Contents Preface 1 Introduction 3 Chapter 1 Why Government Programs Need Cost Estimates and the Challenges in Developing Them 8 Cost Estimating Challenges 9 Chapter 2 Cost Analysis and Cost Estimates 17 Types of Cost Estimates 17 Significance of Cost Estimates 22 Cost Estimates in Acquisition 22 The Importance of Cost Estimates in Establishing Budgets 24 Cost Estimates and Affordability 25 Chapter 3 The Characteristics of Credible Cost Estimates and a Reliable Process for Creating Them 31 The Four Characteristics of a Reliable Cost Estimate 31 Best Practices Related to Developing and Maintaining a Reliable Cost Estimate 32 Cost Estimating Best Practices and the Estimating Process 33 Chapter 4 Step 1: Define the Estimate’s Purpose 38 Scope 38 Including All Costs in a Life Cycle Cost Estimate 39 Survey of Step 1 40 Chapter 5 Step 2: Developing the Estimating Plan 41 Team Composition and Organization 41 Study Plan and Schedule 42 Cost Estimating Team 44 Certification and Training for Cost Estimating and EVM Analysis 46 Survey of Step 2 46 Chapter 6 Step 3: Define the Program - Technical Baseline Description 48 Definition and Purpose 48 Process 48 Contents 49 Page i GAO-20-195G Cost Estimating and Assessment Guide Key System Characteristics and Performance Parameters 52 Survey of Step 3 54 Chapter 7 Step 4: Determine the Estimating Structure - Work Breakdown Structure 56 WBS Concepts 56 Common WBS Elements 61 WBS Development
    [Show full text]
  • A Case for Incorporating Pre-Construction Cost Estimating in Construction Engineering and Management Programs
    Paper ID #14387 A Case for Incorporating Pre-construction Cost Estimating in Construction Engineering and Management Programs Dr. Carla Lopez del Puerto, University of Puerto Rico, Mayaguez¨ Carla Lopez del Puerto, PhD Associate Professor Construction Engineering and Management Depart- ment of Civil Engineering University of Puerto Rico at Mayaguez email: [email protected] http://cem.uprm.edu Luis G. Costa Agosto, University of Puerto Rico, Mayaguez¨ Luis G. Costa Agosto Graduate Student Construction Engineering and Management University of Puerto Rico at Mayaguez email: [email protected] http://cem.uprm.edu Prof. Douglas D. Gransberg PhD, PE, Iowa State UIniversity Douglas D. Gransberg is the Donald and Sharon Greenwood Professor of Construction Engineering at Iowa State University. He received both his B.S. and M.S. degrees in Civil Engineering from Oregon State University and his Ph.D. in Civil Engineering from the University of Colorado at Boulder. He was a faculty member at the University of Oklahoma and Texas Tech University before joining ISU in 2011. His research spans the full life cycle of engineering, construction and maintenance, from the procurement of new projects using alternative project delivery methods such as Construction Manager/General Con- tractor and Design-Build to the preservation and maintenance of pavements and bridges. His research has received awards from the Transportation Research Board, several US state departments of transportation and the New Zealand Transit Agency. He is also a registered Professional Engineer in Oklahoma, Texas and Oregon, a Certified Cost Engineer, a Designated Design-Build Professional and a Fellow of the Royal Institution of Chartered Surveyors in the UK.
    [Show full text]
  • Social Control and Surveillance in the Society of Consumers
    International Journal of Sociology and Anthropology Vol. 3(6) pp. 180-188, June 2011 Available online http://www.academicjournals.org/ijsa ISSN 2006-988x ©2011 Academic Journals Review Social control and surveillance in the society of consumers Massimo Ragnedda Dipartimento di Economia Istituzioni e Società (DEIS), Facoltà di Lettere e Filosofia, Università degli Studi di Sassari, Piazza Conte di Moriana 8, 07100 Sassari, Italy. E-mail: [email protected]. Tel: +39 079229654. Fax: +39 079229660 Accepted January 21, 2011 The new Information and Communication Technologies (ICTs) introduced a highly automated and much cheaper systematic observation of personal data. ICTs advance the intensification and the extension of surveillance, such that an expanding quantity of data can now be collected, tabulated and cross- referenced more rapidly and more accurately than old paper files. This process contributes to the building a "new electronic cage" constraining the individual, on the basis of his e-profile and data- matching. Especially two agents of surveillance are interested in collecting and using such data: government authorities and private corporations. Massive stores of personal data held on ordinary people are now vital to both public services and private business purposes. The new electronic cage is more all-encompassing and complete, being able to produce a complete profile of citizens and consumers in real time. Both public and private information agencies rely on one another for creating and modelling the profiles of good citizens/consumers who, by definition, are well integrated into social life, exhibiting predictable behaviour that conforms to the general needs of contemporary consumer/ oriented social relations.
    [Show full text]
  • Skills and Knowledge of Cost Engineering
    SAMPLE AACE International Skills and Knowledge of Cost Engineering Skills and Knowledge of Cost Engineering Sixth Edition Dr. Makarand Hastak, PE CCP, Editor 2015 Skills and Knowledge of Cost Engineering Sixth Edition Copyright © 1987-2015 by AACE® International 1265 Suncrest Towne Centre Drive, Morgantown, WV 26505-1876, USA Phone: +1.304.2968444 | Fax: +1.304.2915728 | E-mail: [email protected] | Web: web.aacei.org SAMPLE 1 AACE International Skills and Knowledge of Cost Engineering A Publication of Skills and Knowledge of Cost Engineering Sixth Edition Dr. Makarand Hastak, PE CCP, Editor A continuing project of the AACE International Education Board 2017- 2018 Education Board Chair: Michael R. Nosbisch, CCP PSP FAACE [email protected] Vice President - Education Board: Martin R. Darley, CCP [email protected] Members: Dr. Nakisa Alborz Michael Bensussen B. Steven Feng, II Andrea Georgopolous Omar Nava Mazzaoui, P. Eng. Bryan Payne, PE CCP CFCC Julianne Richards Marina Sominsky, PSP SAMPLE Contributing Members: Nelson E. Bonilla, CCP FAACE Trevor X. Crawford, CCP FAACE Clive D. Francis, CCP FAACE Hon. Life Kenneth W. Larison Thomas L. Long Neil D. Opfer, CCP CEP PSP Stephen O. Revay, CCP CFCC FAACE Debbie Richards, CCT PSP Brian Wilcox James G. Zack, Jr. CFCC FAACE Hon. Life AACE Headquarters Liaison: Teri Jefferson, CMP, Manager Education +1 (304) 296-8444 x. 1120 [email protected] 3 AACE International Skills and Knowledge of Cost Engineering 2015/2016 Education Board Members: Peter W. Griesmyer, FAACE (Chair) Dr. Nadia Al-Aubaidy Dr. Baabak Ashuri, CCP DRMP Michael Bensussen Chris A. Boyd, CCP CEP Dr. John O.
    [Show full text]
  • Editorial Marketing and the Rise of Commercial Consumer Surveillance
    Marketing and the Rise of Commercial Editorial Consumer Surveillance Jason Pridmore Detlev Zwick The DigIDeas project, Schulich School of Business, Zuyd University, York University, The Netherlands. Canada. [email protected] [email protected] Marketing Transitions With the widespread adoption of Fordist regimes of production and Taylorist regimes of management in early 20th century America (Gramsci 1971; Hardt and Negri 2000, 219-350), supply of commodities began to surpass market demand consistently for the first time in history. The advent of mass production required mass consumption and as a consequence, the profession of marketing management was developed. Though marketing management had its roots in agricultural economics and was characterized initially by pragmatic macro-economic concerns about distribution efficiencies and co-operative marketing of agricultural products (Bartels 1988), it obtained an increasingly dominant function within commercial practices as it focused on selling more of a particular product than the competition. The new priorities set by a nascent corporate capitalism that pitches companies directly against each other for scarce consumer resources produced novel needs for knowledge about the market, including knowledge about consumers. Hence, corporate marketing management developed early forms of market research to produce consumer knowledge that would help outsell any rivals. Early market research led to a view of the consumer as a relatively stable, homogeneous, and immobile set of preferences that could be managed and controlled with mass advertising (Beniger 1986). An understanding of the consumer as a psycho- socially complex and mutable collection of needs, wants, and desires did not emerge until the 1940s (Miller and Rose 1997; Rose 1997).
    [Show full text]
  • Electronic Surveillance in Workplaces and Their Legitimate Usage to Provide Transparency and Accountability Towards Employees
    © 2019 JETIR June 2019, Volume 6, Issue 6 www.jetir.org (ISSN-2349-5162) Electronic surveillance in workplaces and their legitimate usage to provide transparency and accountability towards employees 1Gursimran Singh, 2Dr. Payal Bassi 1Research Scholar, 2Professor, 1 Department of Commerce and Management 1Regional Institute of Management and Technology, Mandi Gobindgarh, India Abstract: Companies used surveillance software’s, CCTV cameras to watch their employees, monitoring their e-mails or the websites content they visit. Sometimes managers used surveillance to provide protection of their companies from legal acquaintances that originates against the wrong doing behavior of their employees such as download of pornography material and provoke able e-mails or messages to other individuals and to provide protection against the inappropriate exposure of exclusive or confidential information on the internet. As the reasons of employers behind these processes can be valid, there are conflicting thoughts of the usage of this technology among the employees. This paper discusses the latest surveillance measures, technologies used by the employer, lawful disputes that can arise from surveillance as well as consequences or problems originate for the management. This paper also discusses some questions about the right of usage of internet or e-mails in the corporations for the personnel motives of the employees and to what extent their can use their right. To what extent the managers or companies lawfully monitor the workplaces or employees behavior on the internet. And about the employees expectations regarding the surveillance used in order to protect their online privacy and the legal options company have provided for them. The paper expresses the ways for further research in surveillance of employees and a more detailed reasoning in improving lawful and policy-making can be analyzed further.
    [Show full text]
  • Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D
    Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Spring 4-13-2017 Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State Nathaniel D. Fortmeyer Southern Illinois University Carbondale, [email protected] Follow this and additional works at: http://opensiuc.lib.siu.edu/gs_rp Recommended Citation Fortmeyer, Nathaniel D. "Surveillance Self-Defense: Privacy in the Post-9/11 Mass Surveillance State." (Spring 2017). This Article is brought to you for free and open access by the Graduate School at OpenSIUC. It has been accepted for inclusion in Research Papers by an authorized administrator of OpenSIUC. For more information, please contact [email protected]. SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE by Nathaniel Dean Fortmeyer B.A., Southern Illinois University, 2011 B.A., Southern Illinois University, 2013 A Research Paper Submitted in Partial Fulfillment of the Requirements for the Master of Science. Department of Mass Communication and Media Arts In the Graduate School Southern Illinois University Carbondale May 2017 RESEARCH PAPER APPROVAL SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE By Nathaniel Dean Fortmeyer A Research Paper Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science in the field of Professional Media and Media Management Approved by: Robert Spahr, Chair Graduate School Southern Illinois University Carbondale March 28, 2017 AN ABSTRACT OF THE RESEARCH PAPER OF NATHANIEL DEAN FORTMEYER, for the Master of Science degree in PROFESSIONAL MEDIA AND MEDIA MANAGEMENT, presented on MARCH 28, 2017, at Southern Illinois University Carbondale. TITLE: SURVEILLANCE SELF-DEFENSE: PRIVACY IN THE POST-9/11 MASS SURVEILLANCE STATE MAJOR PROFESSOR: Robert Spahr The nature of digital information and the networked world has enabled the greatest advances in communication, education, art, science, and entertainment since the invention of the printing press.
    [Show full text]
  • Earned Value Management and Its Applications: a Case of an Oil & Gas Project in Kazakhstan1
    PM World Journal Earned Value Management and its Application: A Case of Vol. VII, Issue V – May 2018 an Oil & Gas Project in Kazakhstan www.pmworldjournal.net Student Paper by Assylkhan Ziyash Earned Value Management and its Applications: A Case of an Oil & Gas Project in Kazakhstan1 Assylkhan Ziyash Abstract This research is performed in the study of issues in project control and progress performance evaluation. Particularly, it focuses on the progress measurement by applying the Earned Value Management (EVM). EVM is one of the widely used approaches for project monitoring and control which allows one to assess project progress through scope, schedule, and cost measurements. In order to track the progress effectively the measurements data should be provided systematically. According to the previous research studies on this subject, there are a lot of benefits that have been associated with the use of EVM in Project Management (PM). The main purpose of this research is to assess how EVM, when applied to a real project, helps a project manager to be successful in terms of budget utilization and adherence to schedule. This study is aimed to well understanding of the actual cost expenditures versus planned costs and potential usage of EVM to compare and analyze the available data. For the purpose of data collection, this research evaluates a project that has recently been delivered in the oil and gas industry in Kazakhstan. The study compares actual spending against planned values. It should be noted that the current project did not apply the EVM methodology while being executed. The project had significant cost increase from original budget.
    [Show full text]
  • Opportunities and Challenges for Socially Responsible Business in China
    University of Mississippi eGrove Honors College (Sally McDonnell Barksdale Honors Theses Honors College) 2016 Opportunities and Challenges for Socially Responsible Business in China Liana Tai University of Mississippi. Sally McDonnell Barksdale Honors College Follow this and additional works at: https://egrove.olemiss.edu/hon_thesis Part of the Political Science Commons Recommended Citation Tai, Liana, "Opportunities and Challenges for Socially Responsible Business in China" (2016). Honors Theses. 582. https://egrove.olemiss.edu/hon_thesis/582 This Undergraduate Thesis is brought to you for free and open access by the Honors College (Sally McDonnell Barksdale Honors College) at eGrove. It has been accepted for inclusion in Honors Theses by an authorized administrator of eGrove. For more information, please contact [email protected]. Opportunities and Challenges for Socially Responsible Business in China © 2016 By Liana Christine Tai A thesis submitted to the faculty of The University of Mississippi in partial fulfillment of the requirements for completion of the Bachelor of Arts degree in International Studies Croft Institute for International Studies Sally McDonnell Barksdale Honors College The University of Mississippi University, Mississippi May 2016 Approved by: ______________________________ Advisor: Dr. Gang Guo ______________________________ Reader: Dr. Kees Gispen ______________________________ Reader: Dr. Seong Byun i ABSTRACT This thesis aims to demonstrate the unique circumstances that China poses for the development of socially responsible business in China. Socially responsible business is a concept that has emerged in Western nations in recent years, due to the growing environmental and social consciousness of consumers and their increasing demands for companies to meet higher standards in this regard. Socially responsible business refers to those corporate entities that use the market to stimulate change in peoples’ awareness of and attitudes toward a certain social issue and, ultimately, consumer behavior and habits.
    [Show full text]