Introduction: Wildlife conservation is one of the major concerns of the modern age regarding the critical deterioration of the environment and climate change. For this reason, much attention is given to protecting animals in their natural habitat. Thus, illicit wildlife trafficking remains a serious problem impacting the outcomes of conservation activities and requiring immediate action. For this reason, the offered study focuses on investigating the problem of wildlife trafficking within the civil aviation sector and how to resolve it. Most regulatory agencies working within the sphere, such as ICAO, IATA, ACI, and other international bodies, such as the UN, also recognize the issues critical importance. They work together to introduce new policies and make declarations to create a new framework for resisting wildlife trafficking and attaining desired outcomes.

Research Questions and Objectives: The pivotal aim of the given study is to investigate the major documents linked to the problem, such as policies, declarations, and conventions, and conclude about their impact on the further development of aviation. Regarding the purpose, the following research questions are introduced:

  • What are the major policies governing aviation regarding wildlife trafficking?
  • What are the priorities among international aviation bodies regarding wildlife trafficking?

By answering these questions, it is possible to acquire a better understanding of the current approach to struggling against wildlife trafficking. Regarding the research aims, the following objectives were introduced:

  • identify whether there are policies regulating wildlife trafficking in aviation
  • explore how the major priorities outlined in the existing documents are linked to wildlife trafficking and affect it
  • to reveal strategies introduced by international agencies and governments to address illicit wildlife trafficking
  • to reveal the major themes covered by policy documents and existing agreements
  • to conclude about the relevance of current goals and their clarity.

The objectives help to guide the research, collect necessary information, and answer the research question.

Literature Review: The theoretical framework for the research is formed by reviewing the relevant and credible sources devoted to the problem. The data collected in the course of the literature review shows that global cooperation is viewed as the most powerful solution to the problem. For this reason, international agreements, such as CITES, the Buckingham Palace Declaration, and UN Resolutions, are introduced to guide further actions and help airlines to develop a stronger response. The literature review also helps to familiarize with the current information and selected documents that should be analyzed to answer the research questions.

Methodology: The study uses qualitative methods of data collection and analysis supported by inductive reasoning. The major assumptions are formulated after the investigation as the acquired information serves as the basis for cogitations. Inductive coding and thematic analysis are used as the primary tools for working with information and its processing. The dataset is comprised of the documents, policies, and conventions offered by the international agencies, such as ICAO, UN, ACI, UfW, and IATA:

  • United for Wildlife Transport Taskforce Buckingham Palace Declaration
  • ACI Resolution #2. Sustainable Development of the Aviation Ecosystem
  • CITES Strategic Vision: 2021 2030
  • UN Resolution 71/326. Tackling illicit trafficking in wildlife
  • ICAO Facilitation Panel. Collaborative Approach in the Fight Against Wildlife Trafficking
  • Convention on International Trade in Endangered Species of Wild Fauna and Flora
  • H.R.2494  Eliminate, Neutralize, and Disrupt Wildlife Trafficking Act of 2016
  • IATA Resolution on the Illegal Trade in Wildlife

The offered codes are:

  1. Policy
  2. Information sharing
  3. System
  4. Illegal wildlife trade
  5. Zero tolerance policy
  6. Awareness
  7. Training
  8. Collaboration and cooperation
  9. Criminalization
  10. Integrated framework
  11. Convention

Regarding the codes, the following themes were established:

  1. International cooperation
  2. Systemic approach
  3. Law enforcement and punishment
  4. Working with individuals

Results: The themes mentioned above helped to analyze the dataset and acquire the necessary outcomes. Thus, investigation shows that every theme is mentioned in the selected documents numerous times (international cooperation  21; systemic approach  30; law enforcement and punishment  33; working with individuals  18). It means that the selected themes are relevant to the problem. Moreover, the thematic analysis proves that international cooperation is viewed as the only possible way to address the problem and acquire desired outcomes. Regarding the high level of criminalization, it is also critical to introduce specific punishments for traffickers and ensure the international and national law is prepared for struggling against the problem.

Conclusion: Altogether, the study emphasizes the topicality of the problem of wildlife trafficking in the civil aviation sector. The information acquired from various sources shows that the number of animals transported illegally remains high, increasing the risks of the critical deterioration of the environment. For this reason, numerous international agencies emphasize the necessity of creating a collaborative approach and a new framework supported by enhanced data sharing, training and reporting. The possible research bias is addressed by using credible sources, a transparent data analysis process that can be repeated, and the validity of acquired outcomes. The investigation can also be used as the basis for future research on the same topic, focusing on working with the personnel and improving existing security systems.

  • IATA  International Air Transport Association
  • ICAO  International Civil Aviation Organization
  • ACI  Airports Council International
  • UN  United Nations
  • CITES  Convention on International Trade in Endangered Species of Wild Fauna and Flora
  • ROUTES  Reducing Opportunities for Unlawful Transport of Endangered Species
  • UfW  United for Wildlife
  • IPCC  the Intergovernmental Panel of Climate Change
  • UNDOC  United Nations Office on Drugs and Crime

Aviation and Wildlife Conservation: A CLOSER LOOK INTO WILDLIFE TRAFFICKING AND Collecting Data

Introduction

Aviation is one of the most fast-evolving industries the modern world. Its fast development is explained by the high strategic importance and the constantly growing demand for air travel. The globalised world introduces the need to reach various destination areas in short periods. It leads to constructing new airports, diversifying existing routes, and constantly growing traffic. Following the International Civil Aviation Organizations (ICAO) (2021) report, the number of passengers carried on scheduled services comprised about 4,5 billion. It is a 4.9% growth compared to the previous year (ICAO, 2021b). The number of passenger-kilometers also grew, evidenced by the increased demand (see Figure 1):

Passenger-kilometers performed 
Figure 1.1: Passenger-kilometers performed 

However, aviations role is not limited only to carrying passengers or cargoes. On the contrary, the evolution of technologies provides it with new opportunities and spheres where it can be applied. As a result, nowadays, aircraft are used to address specific attention and control issues. Aviation provides specialists with unique advantages, such as access to complicated areas, more effective monitoring, fast travel, and research (Boratto. And Gibbs, 2021). For this reason, it is broadly used to address the existing challenges and resolve them. For instance, wildlife conservation and monitoring illegal trafficking efforts are critical for the modern world and are supported by aviation (Sollund, 2014). It can help to avoid new wave of extinction and attain positive shifts.

Several factors explain the decision to address the problem of illicit transportation of animals. First of all, the last decade has been characterised by the increased importance of environmental concerns. Climate change, human activity, and the high pollution level negatively impacted wildlife. Statistics show that about 5 animals have become extinct in the last 50 years, while many others are at the edge of complete disappearance (Boratto. and Gibbs, 2021; Swaisgood, 2020). Moreover, poaching also poses a severe threat to specific animals and should be addressed (Ihwagi. et al., 2019). Under these conditions, introducing new policies to regulate this aspect becomes the most effective method to address problems and control the state of the population.

In such a way, aviation is nowadays widely used in addressing environmental concerns and the problem of illegal trafficking. For this reason, the research focuses on performing several tasks. First, it is to explore the problem of wildlife trafficking. Second existing regulations, and agreements on the topic should be reviewed. Finally, it is vital to investigate how aviation is used to prevent the illegal trade of animals, to improve wildlife conservation efforts, and create awareness. The thesis is presented as follows. Firstly a literature review, it is followed by the research questions, and the methodology sections.

Literature review

The gradual deterioration of the environment, climate change, and disappearance of numerous animals natural habitats are significant modern age concerns. For instance, the Intergovernmental Panel of Climate Change (IPCC) (2014) report states economic and population growths are the most critical drivers of negative change, increasing CO2 emissions, and promoting the radical alterations in the world and the extinction of multiple species. The primary causes of wildlife decline include exploitation, climate change, loss of habitat, and its change (see Figure 2).

Causes of wildlife decline
Figure 2.1: Causes of wildlife decline

Furthermore, most scientists offer a discouraging forecast, stating that even more animals will become extinct by the end of the decade, while others face a high risk of complete disappearance (Lee, 2018). The following figure represents the scope of threats and the current state of the problem:

Wildlife population threats 
Figure 2.2: Wildlife population threats 

The figure shows that wildlife faces numerous threats, while exploitation, habitat degradation, habitat loss, and climate change are the most significant. These factors promoted a critical extinction of species, as data shows that from 1970 to 2012, about 39% of terrestrial, 76% of fresh water, and 39% of marine species disappeared (McCarthy, 2014). Under these conditions, wildlife conservation acquires the top priority. It is the activity aimed at protecting plant and animal species in their habitats and preserving the balance of existing ecosystems (LEDee et al., 2021; Hinton et al., 2022). Today, numerous tools and technologies are used to succeed in the given sphere and ensure endangered species are protected and can live in areas typical for this animal.

Unfortunately, the positive effects of using aviation in protecting wildlife are reduced because of its use for illegal purposes. For instance, poachers have specific air routes to deliver the parts of animals to various locations and sell them (Miao et al., 2021). It results in killing endangered species and reducing their population (Spevack, 2020). Moreover, there is a big illegal business focusing on capturing and trading animals that are protected by the laws (Spevack, 2021). This activity results in thousands of species being replaced from their natural habitat to other locations, deprived of the necessary conditions for survival (Utermohlen, 2019). Aviation plays a vital role in this process as it provides criminals with an opportunity to deliver such products to the final destination and generate income (Utermohlen and Baine, 2017). Under these conditions, it is critical to address the outlined issues and attain positive change.

Scope of the Problem

For this reason, wildlife trafficking is a critical problem linked to preserving the natural balance and protecting animals. The problem is that illegal gathering, transportation, and distribution of animals cause severe damage to nature and the environment (Boratto. and Gibbs, 2021). Millions of animals and plants are removed from the wild annually (IATA, 2022a). The process has several critical effects on the environment. First, illegal poaching, or trade, reduces the biodiversity of specific areas and destroys the balance within a particular biome, which might result in its deterioration and disappearance (Boratto. and Gibbs, 2021; Moore et al., 2017). Second, the transported animals suffer from poor transportation conditions, lack of specific goods, and improper care (Boratto. and Gibbs, 2021). As a result, they risk dying within several years after being sold (Goyes and Sollund, 2018). It constitutes a critical problem for wildlife preservation attempts.

The scope of the problem is evidenced by the fact that regardless of the latest effort to reduce the number of animals transported illegally, their number continuously grows. The official statistics state that about 23$ billion is generated annually due to the illicit transportation of animals from their natural locations (UNDOC, 2020). Illegal wildlife markets are highly specialised and depend on destination points (Antonopoulos, 2021; UNDOC, 2020). At the same time, there is a list of the groups that are at a higher risk of being captured and transported:

Type of endangered wildlife
Figure 2.3: Type of endangered wildlife

The figure shows that fine wood (rosewood) and protected animals, such as elephants, rhinos, tortoises, and others, are captured and transported (UNDOC, 2020). In many cases, their parts valued at markets might also be an object of trade, which also results in the death of an animal and increases the topicality of wildlife trafficking (UNDOC, 2020). Under these conditions, it is critical to address the problem and promote positive change within the sphere.

The topicality of the question resulted in global agencies numerous attempts to ensure there is a collaborative effort to resist the threat. Agencies such as ICAO, IATA, and others started working together to guarantee that the new policies were introduced and implemented (IATA, 2022a). It can contribute to the increased effectiveness of struggle and promote better results within the given sphere (IATA, 2016a). At the same time, there is a serious problem as wildlife trafficking is a global issue, meaning that only international cooperation can help to guarantee that species might benefit from the wildlife conservation efforts to survive.

Criminalization

The problem is also linked to the fact that criminal gangs use the global aviation network to transport illicit wildlife goods throughout the globe. In numerous cases, such activities are performed using aviation (IATA, 2016c). For this reason, regulatory agencies such as International Air Transport Association (IATA) (2016b) introduce specific measures to address the problem. This implies entering international agreements and collaboration to mitigate the adverse effects of the activity. For instance, IATA introduced a particular statement focused on struggling against illicit wildlife trade and trafficking (Burbridge, 2018). It created the basis for the increased effectiveness of wildlife conservation efforts and attempts to reduce illegal traffic (Jaclin, 2016). Furthermore, the resolution encouraged airlines to educate employees, customers, and passengers about the nature, scale, and consequences of illicit wildlife trade, to cooperate with airports and freight forwarders to exert pressure on enforcement agencies, and consider adopting policies to discourage trafficking, such as ensuring incidents are reported and information shared (Utermohlen and Baine, 2018). It became an essential step toward better understanding the scope of the threat and addressing it.

The document mentioned above also promoted the unification of various efforts in this field. For instance, the Wildlife Conservation Society (WCS) views it as a guideline for starting combating illegal wild trafficking (Spevack, 2021). It provides airlines and leading carriers with tools to identify and respond more effectively to red flags that may indicate suspicious cargo and better understand and mitigate against wildlife trends and patterns (ROUTES, 2019). In this way, it would be impossible for wildlife traffickers to exploit and misuse the worlds leading airlines (ROUTES, 2019). It will help to attain significant improvement in the sphere and avoid further deterioration of the situation. Thus, according to WCS (2022), illicit trafficking affects both animals and human beings, making it a more complex problem. Usually, such byproducts are transported: ivory, rhinoceros horn, enormous cat skins, and live lizards, birds, and turtles. (Reals, 2015). The figure below shows that much effort is put into concealing such objects and transporting them.

Illegal wildlife products
Figure 2.4: Illegal wildlife products

As a result, the environmental effects of these activities are negative. Statistics show that almost one-third of the worlds elephants were illegally killed in the last decade (Reals, 2021). For smaller species that supply the illicit live and exotic pet or food trade, it is assumed that about ten more have died in transit per live animal that makes it to market (WCS, 2022). Furthermore, there is a high risk of disease transmission because of the poor management as such cargoes are not controlled and checked for infection (Hesse Rea and Booth, 2010; Hitchens and Blakeslee, 2020).

Other global companies are trying to address the problem. For instance, Emirates has painted five of its Airbus A380s with the United for Wildlife logo and images of endangered animals to bring attention to the issue, which is followed by some other airlines (Stephenson, Lohmann and Spasojevic, 2018). The company also engaged in international collaboration with other groups to educate them about possible threats and reduce wildlife trafficking risks (Anom, 2021). It can be viewed as a result of the UWTTs efforts to promote align better coordination between various airlines and increase awareness related to the problem (Anom, 2021). It also justifies the necessity of the collaborative effort to promote positive change.

At the same time, numerous barriers should be considered. First, traffickers might be aware of the security mechanisms and often attempt to circumvent them (IATA, 20). There are numerous examples of how criminals used existing breaches in security systems to transport byproducts and generate income (Huggins, 2018; Lavorgna et al., 2020). China, India, and other regions often suffer from such activities (Anom, 2021; Reals, 2016; Wong, 2021). Under these conditions, it becomes critical to address the problem. Africa, Asia, the Middle East, Europe, Americas should be viewed as the major hubs for illegal trafficking (Connelly and Peyronnin, 2021; Nguyen and Roberts, 2020). Unfortunately, for an extended period, wildlife trafficking had been considered only an environmental problem (IATA, 2016b). However, due to the IATA and other agencies efforts, it is now viewed as organised crime, and new methods to help aviation are offered.

Collaboration

The realisation of the problem is one of the major factors leading to its resolution. Thus, IATA highlighted the weaknesses in the global air transport security network that are being exploited by traffickers (IATA, 2016c). There are groups and specific routes used by them to move illegal cargoes (IATA, 2016c). For this reason, it is critical to train passengers and workers to recognise and report suspicious behavior and address the problem (IATA, 2016d). Thus, civil aviation remains fundamental for struggling against wildlife trafficking and are a critical component of the strategy (IATA, 2016d). For this reason, it should be given much attention and support.

The International Air Transport Association (IATA) and the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) are also involved in the process. They introduced a Memorandum of Understanding (MOU) to struggle against illegal trade (IATA, 2016e). They also formulated a framework for addressing the problem based on the IATA Live Animals Regulations, the IATA Perishable Cargo Regulations, and the CITES Guidelines for the Non-Air Transport of Live Wild Animals and Plants (CITES, 1983). CITES will also guarantee that 181 states will focus on addressing illicit trafficking (Sollund, 2022). Thus, these conventions are critical for aligning the collaborative effort and introducing the guidelines to act together and avoid problems in the future (IATA, 2019). At the same time, there are some shortcomings, such as the lack of information about trafficking and critical issues (Arroyo-Quiroz and Wyatt, 2019; ROUTES, 2019). For this reason, there is a need for additional research in the sphere. It is necessary to train personnel as a source of information about dangerous cargoes and the method to address such issues (IATA, 2019). CITES and IATA play a crucial role in supporting the incentive and promoting further success in the field.

Resolutions on Illegal Trade

The central idea of the cooperation is to resist organised crime and offer a robust response to it. IATA (2016e) proclaims that agencies and airlines are responsible for addressing poaching and illicit trade as significant challenges to wildlife conservation efforts. At the 72nd Annual General Meeting, IATA (2016d) approved the resolution on the illegal trade. It became a starting point for developing the efforts demonstrating good results today. The resolution included the following points:

  1. encouraged airlines to increase awareness of the nature

  2. involved governments in the struggle
  3. invited airlines, airports, and other stakeholders to unite in their struggle
  4. encouraged airlines to adopt appropriate policies (IATA, 2016d)

As a result, agencies became more potent in struggling against illegal trafficking. The wildlife trade endangers numerous species, and the efforts mentioned above are critical for improving the current state of the issue (IATA, 2016e). Governments were also viewed as essential actors as they might help to achieve the following goals:

  • promote awareness among main stakeholders
  • work with airports to solve the issue
  • introduce necessary changes to rules, procedures, and regulations (IATA, 2016e)

IATA also supported the project initiated by the British royal family. The Declaration signed in 2016 stated that many airlines and organisations should cooperate to raise awareness about the current state of the problem and the ways to address it (IATA, 2016e). It will help to stop criminal gangs and create a new environment beneficial for better outcomes and results. The agreement proves the growing role of aviation in resisting illicit wildlife trafficking and improving the situation.

The resolution contributes to the increased activity of the aviation sector in this region. A memorandum of understanding was signed with the Convention on International Trade in Endangered Species during last years 71st IATA Annual General Meeting (CITES). At international airports in Nairobi and Bangkok, two awareness-raising seminars for airline and airport employees were organised (IATA, 2016c). In addition, IATA joined the Reducing Opportunities for Unlawful Transport of Endangered Species (ROUTES) Partnership of the US Agency for International Development (USAID) (ROUTES, 2019). A new set of guidelines for airlines has been released, and an IATA Environment Committee Wildlife Taskforce has been established to monitor progress and advise the following actions.

Thus, airlines and other civil aviation organisations are encouraged to unite to reduce the number of illegal animal trade animals and find significant routes to eliminate them (IATA, 2022a). Today, leading international carriers are participating in the agreement aimed at preventing illegal trafficking and returning animals to their natural habitat (IATA, 2022a). It has become one of the essential tasks of the existing civil aviation sphere and requires specific resources. At the same time, disregarding the problem might precondition the critical deterioration of the situation.

United for Wildlife (UfW) Transport Taskforce

For this reason, several international incentives are accepted as the way to address the problem. For instance, the United for Wildlife (UfW) Transport Taskforce is one of the agencies established to help the wildlife conservation efforts (IATA, 2022a). It examines the role of aviation in the illicit wildlife trade and outlines the methods to break links between transporters and consumers (IATA, 2022a). The agency cooperates with international environmental groups and governments to ensure the most popular routes are discovered and destroyed. It helps save thousands of animals per year and avoid critical harm done to protected areas. It means that incentives such as UfW play an essential role in wildlife conservation efforts and contribute to the gradual resolution of the illegal wildlife trafficking problem.

ICAO also plays a vital role in promoting positive change within the given sphere. Thus, Facilitation Panel introduced in 2021 outlines the major regulations as part of the collaborative approach in flight against wildlife trafficking (ICAO, 2021a). It focuses on creating the policies necessary for resolving the problem and creating the framework for the collaboration. Thus, it adheres to the ideas outlined by the United Nations and UfW and views them as fundamental for existing practice (ICAO, 2021a). Furthermore, it considers adopting a new recommended practice by states as a part of an integrated framework focused on resisting crime. Under these conditions, ICAO introduces policies necessary for addressing the issue and resolving it.

Conventions on International Trade

Furthermore, Facilitation Panel emphasises the critical importance of Live Animal Regulations (LAR) offered by IATA. It is one of the essential documents introducing a set of policies and necessary actions to ensure that airports and airlines can function appropriately and deliver on their wildlife commitments (IATA, 2022b). For this reason, LAR is viewed as the global standard for transporting live animals using aircraft (IATA, 2022b). The major goal of the given set of policies is to ensure that animals enjoy safe and humane environments during their transportation and are safe (IATA, 2022b). At the same time, violation of LAR can signalise the potentially high risk of wildlife trafficking and require specific responses from the authorities. In such a way, LAR establishes the paradigm for the successful functioning of airlines regarding wildlife trafficking. The violations of the major policies outlined by the document might lead to the emergence of critical problems and worsening of the situation in the sphere.

The convention on International Trade in Endangered Species of Wild Fauna and Flora supports the ideas offered by LAR and views it as the central document helping to regulate the sphere. CITES also emphasises the importance of the IATA Perishable Cargo Regulations (PCR) because of its significance for the aviation industry and the transportation of animals and species that require specific conditions (IATA, 2022b). The inability to create the necessary conditions and ensure animals are safe might be considered a serious violation of the existing policy and should be investigated by the authorities to ensure no cases of wildlife trafficking are observed (IATA, 2022b). For this reason, IATA and CITES offer fundamental regulations for aligning the stable work of various agencies within the sphere and guaranteeing there is a significant improvement in the sphere attained due to the collaborative effort of all actors involved in the process.

As stated previously, the United Nations is an important actor in promoting international collaboration and integration. Thus, the United Nations General Assembly Resolution 71/326 Tackling illicit trafficking in wildlife is one of the significant documents introducing the policies to address the problem. It encourages all Member states to take part in the process and ensure the problem is recognised, addressed, and managed effectively (United Nations General Assembly, 2017). The policy views wildlife trafficking as a significant threat to wildlife diversity and conservation (United Nations General Assembly, 2017). For this reason, it becomes critical to address the problem and guarantee that airlines know how to address the problem and avoid helping criminals to transport animals, causing harm to them.

CITES Strategic Vision: 2021 2030 is a crucial document

Project Management Plan

Introduction

Company X is a big automotive retail firm located in the United Kingdom that recently closed three showrooms in Leeds, Bradford, and Halifax in order to construct a single supersite showroom in Manchester. It entailed reorganizing departments and laying off a number of managers and salespeople. The goal of the project is to build a supersite with over 4000 automobiles, 128 salespeople, and 42 supervisors.

The plan encompasses a project team of six company X employees who have not worked together before and includes a new Account Manager, remaining site Managers, and a new Manager, whereas the groups CEOs nephew has been assigned to the team. The team consists of individuals with a wide range of abilities, expertise, and experience in the establishment of showrooms. Harper, a German partner, and Jennings, a UK franchise partner, are among the companys stockholders. Due to Company Xs struggles to acquire finances as a result of branch closures in Halifax and Bradford, the two partners have contributed £250,000 to assist in setting up the showroom. The cash will be used to help fund the project, but it will be refunded once the site generates revenue.

The board of directors of firm X is putting pressure on senior management to transform the site into a profitable operation. This is owing to the high relocation expenses associated with procuring land in Manchester, as well as the building expenditures. The Salford location was contentious because it is next to a green nature reserve and a determined community organization known as the Green Crusaders, which has fought the building of the retail vehicle shop. Despite the local authoritys approval to operate the vehicle showroom, green crusaders continue to protest in the local media and residential areas. The board is eager for the project team to open the site as soon as possible to demonstrate the sustainability of a Manchester showroom, and everyone is eager to open the doors in a matter of months in order to protect sales and employees employment. Although the organization has acknowledged the project manager, it is concerned that a premature opening may result in supervision issues. Due to the current COVID-19 limits, automobile supply is low in the group, and it is expected that just 40% of the stock will be available for Manchesters grand opening.

Project Approach, Plan, and Monitoring

Project Schedule

In project management, scheduling is the planning of activities, milestones or deliverables in a project (Armenia et al., p. 26). A timetable often contains a beginning and completion date, as well as the timeframe of each activity and the staff assigned to it (Bröchner, no pagination). Project scheduling is a critical component of time management success (Epler and Leach, p.114). The goal of the project schedule is to generate realistic schedules and milestones. Because of the projects complexity, the team chose to employ a work breakdown structure based on deliverables. A Deliverable-Based Work Breakdown Structure depicts the correspondence between project scope and deliverables.

Project Schedule

The project timetable has various dependencies, according to a careful examination. Dependencies may be exploited to the companys advantage through the AON if one can figure out how to speed up important route activity execution (Nijhuis et al., p. 62). Before starting actual work, for example, key planning activities would have to be completed. Similarly, interior work had to be postponed until the team had completed the majority of the outside work (Palumbo et al., p. 416). It was determined that the project would require a critical route because of these constraints. The longest series of jobs in your network diagram is represented by activity on node (AON) (Petrulevich et al., p.18). The critical route is a set of crucial tasks that must be done for the project to be finished on time (Tereso et al., p.6). The following basic AON may be used to demonstrate this relationship.

AON diagram
Figure 1. AON diagram

The project would not hire any extra personnel due to a restricted budget, and all activities would be governed by the length of the existing assigned staff members. The contractor would be responsible for four weeks of external work and seven weeks of interior work. Following the contractors completion, the contents would take two weeks to complete on a tight timeline. All other actions that are not interdependent would be carried out at the same time.

Super-site Showroom

The progress of the activities was shown on a Gantt chart, as seen above, to keep track of them.

Cost Analysis

The act of breaking a cost summary into its constituent pieces and investigating and reporting on each one is known as cost analysis. It is the comparison of expenses (as of standard versus actual, or for one time period versus another) with the goal of identifying and reporting on situations that can be improved (Wang et al., p.36). Each participant must meet the following requirements in order to get the project cost estimates provided in the case study.

Table 1. Cost estimates

Item/ Player Cost Total weeks needed Total Cost
Building contractor £3000 weekly 11 £33000
Consultant £3500 weekly 6 £21000
Administration and overhead costs £3000 weekly 11 £33000
Project Team
Sales managers £1200 weekly 5 £6000
Account Manager £1500 weekly 6 £9000
New Manager £1000 weekly 4 £4000
Total Labour costs £106000

Impact Assessment, Risk Analysis, and Contingency Plans Development

Impact Assessment

Table 2: Project Assessment Criteria

Time-frame The business case has been prepared and is ready for approval by the board of directors.
April 20, 2022 When the Board accepts the proposal, begin detailed project planning and implementation. This presumes that it will be approved by the Board sometime in May or at the May Board of Directors meeting.
April 25, 2022 A project team was formed, consisting of a Strategic HR Advisor, a project manager, a new account manager, a site manager, the CEOs nephew, and the Finance Manager, who oversaw the site migration project team.
April 28, 2022 No later than April 30, 2022, staff will be advised of the decision to relocate to Manchester. If staff gained aware of the permitted idea, they would be notified immediately.
April 302022 The pricing includes a one-month consultation term. Employee representatives, rather than the employees themselves, have been given a month to comment on the proposed relocation to Manchester.
Following the evaluation period, the CEO will decide how the transfer to Manchester will be carried out within the parameters established by the Board.
May 15, 2022 A one-month consultation time is included.
Bradford, Leeds, and Halifax employees were offered the choice of relocating to Manchester or obtaining career transition assistance. During this transition period, each employee will be consulted about their specific circumstances, including information about parking at the Manchester location and workplace accommodations. Employees had a maximum of one month to tell the CEO in writing of their decision.
Key workers have been asked to agree to other forms of employment and to inform the CEO if they intend to transfer to Manchester after September 31, 2022.
Career transition assistance will begin immediately for workers who opt to change careers before the end of August. Professionals will be required to do their duties until their contract expires.
June 30, 2022 A one-month transition time is provided.
Assistance with a career transition is given to employees who are not relocating to Manchester. On and after August 1, 2022, employees who are unable to find other work will have their contract terminated with a redundancy payout. This may occur sooner depending on when the staff makes their choice.
Halifax, Bradford, and Leeds-based key personnel agree to spend three days a week in Manchester to commence remote work.
By the end of August 2022, workers transferring to Manchester (or being recruited) will be assigned to Sydney-based duties.
The current Manchester board room will be dismantled and replaced with temporary workstations during the relocation. Meetings will take place in a boardroom on the outside.
July 25, 2022 The Bradford, Halifax, and Leeds locations have been closed.
August 30, 2022 After the move, develop and consolidate staff and processes.
September 25, 2022 It is no longer practicable to accommodate critical personnel who work remotely. The transition process for critical workers who have not opted to move to Manchester (one month). Remote career transitions are possible for these personnel. If employees are unable to obtain other employment before January 31, 2023, their job will be terminated with a redundancy payment. There may be talks with key personnel about independent contractor agreements that extend beyond June 30, 2023, but these discussions are irrelevant to this planning application.
September 30, 2022 The projects work comes to an end.

Risk Analysis

Risk analysis is the process of calculating the likelihood of a risk arising during a project. There are two techniques to risk analysis, according to Zhang et al. (no pagination), quantitative and qualitative. Because the project incorporates both qualitative and quantitative data, it employs both of these methodologies. The green leisure space close to the showroom is the first emphasized worry in the development license (Yoe, no pagination). Given that the local government has already given the go light, this threat is unlikely to materialize. However, thanks to the work of a local advocacy group, it is still a possibility. However, the impact would be significant since the entire operation would come to a standstill. Any improvements done on the property should be ecologically friendly.

Company X should engage in corporate social responsibility by introducing electric automobiles and planting trees to offset this risk (Walton et al., p.241). This action would alleviate the problem and allow the company to include a strong feeling of corporate social responsibility into its marketing strategy (Stekelorum, p. 228). CSR is becoming increasingly important for the automobile sector, as automobiles are one of the worlds biggest carbon emitters. COVID-19s health risks were determined to be another danger. With daily COVID-19 infections being reported daily, the possibility of this danger is quite high (García-Rosell, p. 1019). These can infect key employees, such as contractors and managers. Depending on the severity and the resulting isolation of COVID-19 patients and the time delayed might vary from four weeks to months (Rogelberg, no pagination). To reduce the risks presented by the COVID-19 pandemic, the construction site will adhere to all necessary federal and international health standards (Pamidimukkala and Kermanshachi, p. 100). Handwashing, using protective masks, and maintaining social distance are among them.

Contingency Plans

This is the most critical yet often overlooked aspect of project management after risk identification. It aids in the assessment of risks, the identification of threats, and the development of backup plans to protect your mission-critical activities from unanticipated setbacks (Coco and de Souza Dias, p.218). The project will be canceled if one of the team members is at risk of conducting COVID-19 throughout the project. In this scenario, the procedures listed below will be necessary (Zhao, Feng, and Shi, p. 1167). Since the closure of the previous three showrooms, the company has been able to replace an important team member. Because of the enormous number of personnel at the companys disposal, this capacity to replace has been made feasible. The company should also formulate an elaborate policy on the recruitment of talent and the dismissal of employees (Morrison-Smith and Ruiz, p.5). There should also be clear documentation on what the company should do in case of employees resign or in case of a labor crisis.

Issues Affecting Project Performance

Inexperienced Employees

Scope of the Problem

Workers that are unable to operate as a team will be a source of contention for Company X. When one of your employees fails to meet your expectations, its time to step in. Performance is a mix of talent and willpower. Employees must be capable of performing their given tasks as well as motivated to do so (Pillemer and Rothbard, p. 356). Identifying the source of the performance issue might aid in determining the best course of action. Nonetheless, firm Xs personnel will have problems forming teams because the projects people have never worked together before.

Lack of commitment is one of the most difficult aspects of partnering. A lack of commitment is demonstrated when a group refuses to fix the difficulties. The goal is to acquire buy-in from everyone on the team, including the boss. Furthermore, teams that avoid confrontation do poorly (Gary p. 90). Avoiding debate and disagreement adds little to the development of trust and much less to the achievement of desired outcomes. Teams that avoid confrontation are doomed to fail. Commitment is a collection of skilled, motivated people who, despite their inherent differences, believe in a certain course of action. To put it another way, persistence is the capacity to keep going in the face of adversity.

Furthermore, team members lack trust, are averse to confrontation, and are unable to commit. Rather, they prioritize their safety and the maintenance of tight relationships. To prevent conflict, people cease listening to other peoples issues. Conversations appear to be becoming more civilized at this point. Teammates who are overlooked or alienated from one another feel excluded. Due to their unwillingness to join, they are less likely to get on board. A teams development is harmed when decisions are postponed or duties are not completed. The euphoria surrounding the project begins to dissipate, and arguments become all too prevalent. Several members of the team are unaware of the teams achievements.

Proposed Solution

To assuage fears about team loyalty, make sure the employees are challenged and delighted. Employees that are excited about the current project will be dedicated to their team and the company. The purpose of management is to instill gratitude in the team members (Isin, p.344). Individuals are more willing to contribute when they believe their effort has a significant impact on the company, according to the findings. Furthermore, people should be encouraged to engage on their terms (Mouritz, pp.115-124). Allowing team members to form their workgroups increases the likelihood that they will give their all and stay committed to the teams goals.

Extra Team Members

Scope of the Problem

Bringing in fresh people as a project managers is not a bad idea when considering their competencies and how much the project requires such capabilities. Integrating new members into established teams, on the other hand, is a challenge (Macaulay, p.198). The important qualities necessary for project success are soft skills, which vary greatly depending on the circumstances ( Hemachandra and Sharkasi,p.50). As a project manager, you understand how difficult it can be for teams to communicate, which may lead to severe project management challenges. The new teams will require resources to train, especially if they have never worked on a project of this scope before.

Proposed Solution

It is the project managers role to provide direction throughout the project, ensuring that each team member is aware of their responsibilities. The projects success hinges on effective communication with all project stakeholders (Ellinas, p.63). Another alternative is to provide project management training to new team members to improve their communication skills.

Nepotism

Scope of the Problem

The CEOs family members must be closely monitored. However, it can be challenging for a project manager to achieve such actions (Zell). Given how tough it is to fire someone who has a conflict of interest. A CEOs nephew may take over top positions. If a relative is employed, other workers on business Xs project may feel envious, believing it implies favoritism. This nepotism is most evident when a family member or acquaintance is elevated over a non-related relative or friend. Personal problems can be brought into the workplace (Spurk and Straub, no pagination). Other workers may become anxious as a result of this move, making the job more difficult to complete. Workplace problems may be brought home to the family. They may also have an impact on our interpersonal ties within the company (Kurbonov, p.5). Making necessary career changes would be much more difficult if they might endanger a family member who works for them.

Proposed Solution

If relatives are sure of their ability to do the task, they should be employed. A family member or acquaintance who is inept will not have to be fired. A good alternative is to hire a family for a three-month trial period (Shekhawat, p.53). After that, if the CEO is pleased with their work, they may be hired on a long-term basis. Make it plain to family members that they will be treated equally with other employees (Stankov and Tsochev, p.29). This strategy implies that they might be fired in the same way as other employees. Each relative should sign a formal contract outlining their roles and obligations inside the company, as well as their pay (Aguinis). A legal document might help them de-stress and advance in their careers.

Inadequate Financing

Scope of the Problem

It looks like the project is underfunded. Without adequate money, the effort for business X will struggle to get critical resources and, as a result, will have a difficult time generating the cash required. The funds offered by the companys partners are insufficient to finish the project on schedule. Because numerous elements depend on personal financial decisions made for the project, spectrum and program-building professionals must have made this a top concern.

Proposed Solution

Despite the challenges, Company X is nevertheless able to raise financing. The purchase of loans from financial institutions is one of these strategies. It can also take on public debt by borrowing money from the general population (Philippas and Avdoulas, p.360). Furthermore, because the corporation is not facing bankruptcy, it has choices such as market placement of securities, syndicating of long-term commercial loans, and borrowing money from government organizations (Kovács and Falagara Sigala, p.41). The increased funds would be used to address both unanticipated and anticipated risks.

Pressure from the board of directors

Scope of the Problem

Board requirements are rarely mentioned as a driver of big data initiatives in businesses, although they are; these demands are then carried from the C-level to the companys middle management, which is in charge of project implementation and analysis. Directors are responsible for directing the Associations operations and complying with the law while acting in the best interests of the members (Lee and Tang, p. 983). Directors must fulfill several responsibilities to maintain their fiduciary duty, which is a legal obligation to act only in the best interests of another party. It is vital to use caution with the management and stakeholders (Levy). A talents responsibility includes a duty to avoid conflicts of interest. Directors consider the personal and social consequences of their decisions.

When a director has a vested interest in or stands to profit directly from a board-managed issue, it is called a conflict of interest. When a director is a member of two groups with opposing purposes, a conflict of interest may arise (Craighead, Ketchen, and Darby, p. 838). When a director, a family member, or a friend stands to profit financially from a board decision, the director must declare any actual or perceived conflict of interest and be barred from making decisions regarding that option (Manstead, p.267). While carrying out the associations goal, directors must act honestly and in good faith in the best interests of the members. They must use the same level of prudence and diligence as a reasonably prudent individual in similar circumstances.

Proposed Solution

Important decisions should be made by consensus whenever possible. Due to the short period of the initiatives, opinions and consensus are frequently formed before the meeting (Ucko, p. 251). More discussions in the boardroom are planned to cement the agreement and fine-tune the decision. To begin, one could argue that being a manager, even at the highest level, equates to being a member of a board of directors (Chakraborty and Ganguly, p. 180). This is critical in our project because some of the duties demand the participation of the entire team. Having previously served on a board of directors can help you understand the differences between duties and responsibilities (Alvarenga et al., no pagination). Board members need to continue learning and take notes. If everything is in order, the solutions will aid the board in its decision-making.

The Covid-19 Pandemic

Scope of the Problem

COVID-19 has changed the way project managers think about project management. When it comes to how governments and corporate boards of directors are responding to the COVID-19 problem, agile management appears to have become the de-facto standard way of coping with the unexpected (Kanapathipillai, p. 4). Decisions are made under ambiguous conditions, with reduced planning timeframes and activity changes in reaction to pandemic symptoms (Dagens et al., p.369). Both internally and internationally, organizational communication has evolved (Chede. p.4197). This aspect of project management has to be changed right away. Separately, internal and external communication is handled. It has the potential to transform firms that have never dealt with remote workers before.

No change was reported by global players who previously had virtual teams. The best part is that we can communicate remotely and rapidly catch up on lost information (Zhang and Wang, p. 101). The disadvantages stem from the accidental loss of knowledge about the projects history and complexity that would have been uncovered at numerous coffee meetings. A face-to-face conversation is something we miss. It may be wearier as a result of the extra work and focus required for online interaction. Furthermore, reaching an agreement on specific project challenges and ensuring that everyone is on the same page takes time.

Proposed Solution

We will continue to adjust to working and living in a digital world as the trend toward remote work continues. With the help of modern technology, meetings, interviews, and employee training are all being altered to match a more socially distant way of life (Gasmi, pp 100 -409). Despite the hurdles and hazards, we may all benefit from a better experience. Attending a conference call while urgently trying to quiet oneself might be humiliating. To optimize the time given, it is advisable to be in the lobby 5-10 minutes earlier than the meetings start time (dEttorre et al., p. 601; Hasanah,.p 6). Before participating, please double-check that the camera feed and microphone are both working. If one enters a counterargument, corrective and disciplinary measures should be implemented.

Project Resourcing and Finances

Human resource is an essential part of any organization as people are responsible for the formulation and setting of standards. The following sections address human and financial resource management principles used in the project.

Human Resource Management

The HR department is tasked with the recruitment of employees into an organizational workforce. As Company X goes through the completion phase of its supersite, most of the construction work will be carried out by the contractor. The Human resource department is responsible for the distribution of tasks among employees and should ensure the best-qualified persons are tasked with critical tasks (Jiang and Messersmith, p.6). As a result, the overall company operations will be manageable. The department should also embark on performance management to reward employees based on their output. Learning and development programs will also be developed to equip employees with new skills. A succession plan will be developed to ensure a smooth transition from one team to another. The plan will define what should be done when recruits are onboard, after promotions, or resignations.

Financial management

Financial resources are sued by businesses to acquire the funds they require to finance their investments, capital, and ongoing operations. Financial Institutions, Capital Markets, and Owners Equity are the three main sources of financing for a business. There are three types of decisions made in financial management: investment, financing, and dividend decisions. Since the company does not pay dividends, the main concern will be investment and financing decisions. Company X closed three branches to consolidate its operations and raise revenue finance and kick-start operations in the supersite. The company will consolidate the accounts of the closed branches to bring in more stock and finance other essential operations.

Reference List

Alvarenga, J.C., Branco, R.R., Guedes, A.L.A., Soares, C.A.P. and e Silva, W.D.S., 2019. The project manager core competencies to project success. International Journal of Managing Projects in Business.

Aguinis, H., 2019. Performance management for dummies. John Wiley & Sons.

Armenia, S., Dangelico, R.M., Nonino, F. and Pompei, A., 2019. Sustainable project management: A conceptualization-oriented review and a framework proposal for future studies. Sustainability, 11(9), p.26-64.

Bröchner, J. (2021). Construction project management fiction: Individual values. International Journal of Project Management.

Chakraborty, T. and Ganguly, M., 2019. Crafting engaged employees through positive work environment: Perspectives of employee engagement. In Management Techniques for Employee Engagement in Contemporary Organizations (pp. 180-198). IGI Global.

Chede, B., 2021. Scope of Digital Manufacturing in India after Covid-19. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(10), pp.4197-4201.

Coco, A. and de Souza Dias, T., 2020. Prevent, respond, cooperate: states due diligence duties vis-à-vis the Covid-19 pandemic. Journal of international humanitarian legal studies, 11(2), pp.218-236.

Craighead, C.W., Ketchen Jr, D.J. and Darby, J.L., 2020. Pandemics and supply chain management research: Toward a theoretical toolbox. Decision Sciences, 51(4), pp.838-866.

Dagens, A., Sigfrid, L., Cai, E., Lipworth, S., Cheng, V., Harris, E., Bannister, P., Rigby, I. and Horby, P., 2020. Scope, quality, and inclusivity of clinical guidelines produced early in the covid-19 pandemic: rapid review. bmj, 369.

dEttorre, G., Ceccarelli, G., Santinelli, L., Vassalini, P., Innocenti, G.P., Alessandri, F., Koukopoulos, A.E., Russo, A., dEttorre, G. and Tarsitani, L., 2021. Post-traumatic stress symptoms in healthcare workers dealing with the COVID-19 pandemic: A systematic review. International Journal of Environmental Research and Public Health, 18(2), p.601.

Ellinas, C., 2019. The domino effect: an empirical exposition of systemic risk across project networks. Production and Operations Management, 28(1), pp.63-81.

Epler, R.T. and Leach, M.P., 2021. An examination of salesperson bricolage during a critical sales disruption: Selling during the Covid-19 pandemic. Industrial Marketing Management, 95, pp.114-127.

García-Rosell, J.C., 2019. A discursive perspective on corporate social responsibility education: A story co-creation exercise. Journal of Business Ethics, 154(4), pp.1019-1032.

Gary, S.N., 2019. Best interests in the long term: fiduciary duties and ESG integration. U. Colo. L. Rev., 90, p.731.

Gasmi, A., Noor, S., Tippairote, T., Dadar, M., Menzel, A. and Bjørklund, G., 2020. Individual risk management strategy and potential therapeutic options for the COVID-19 pandemic. Clinical Immunology, 215, p.108409.

Hasanah, U., Nurulita, V.W., Budiman, A. and Kanita, G.G., 2021. Analysis of Marketing Communication Strategies in Increasing Sales Volume of Rinis Cake During the Covid-19 Pandemic. A Social Science and Entrepreneurship Journal, 1(1), pp.6-11.

Hemachandra, S. and Sharkasi, N., 2021, June. Digital Transformation Induced by the Covid-19 Pandemic. In Digital Marketing & eCommerce Conference (pp. 50-61). Springer, Cham.

Isin, A.A., 2018. Tax avoidance and cost of debt: The case for loan-specific risk mitigation and public debt financing. Journal of Corporate Finance, 49, pp.344-378.

Jiang, K. and Messersmith, J., 2018. On the shoulders of giants: A meta-review of strategic human resource management. The International Journal of Human Resource Management, 29(1), pp.6-33.

Kamalirad, S. and Kermanshachi, S., 2018, April. Development of project communication network: A new approach to information flow modeling. In Construction Research Congress (CRC).

Kanapathipillai, K., 2020. The Impact of The Silent Enemy (Covid-19 Pandemic) On the Marketing Efforts Undertaken by The Automotive Industries in Malaysia. European Journal of Management and Marketing Studies, 5(4).

Kovács, G. and Falagara Sigala, I., 2021. Lessons learned from humanitarian logistics to manage supply chain disruptions. Journal of Supply Chain Management, 57(1), pp.41-49.

Kurbonov, K., 2021. Strategy of debt management. Scientific research archive, 1(1).

Larsson, J. and Larsson, L., 2020. Integration, application and importance of collaboration in sustainable project management. Sustainability, 12(2), p.585.

Lee, H.L. and Tang, C.S., 2018. Socially and environmentally responsible value chain innovations: New ope

Research Methodology

The chapter presents an in-depth analysis of the view that technology has significantly influenced the fashion industry. The research seeks to understand whether the correspondents view of AI in fashion is a new concept or whether the idea is lucrative enough to influence fashion users purchasing patterns and behavior through marketing strategies. The qualitative data collected form the basis for the research topic. The research method used is the interview format. Interview questions are selectively structured to provide a variety of responses from the open coding, axial coding, and selective coding method. Participants demography is diverse, offering a wide and varied answer to the research question.

The methodology used is the interview method; the interview response will be analyzed and used to draw findings supporting the research topics. Done online via software called Teams; the online mode was employed because the participants were from various worldwide locations. Those chosen to participate directly or indirectly are related to fashion and technology. They were in different parts of the world and experienced technological changes before and during the Pandemic.

Participants

The number of interviews conducted amounted to 10 from different cities in Europe; London, Romania, Scotland, Monaco, Switzerland, and Montreal. The participants had an age group between 22 and 27 years old, representing the younger audience, interacting more with technology. The small sample represents a population of diverse ethnicity, occupation, technological interests, and socioeconomic status. interviews were conducted online; the information is vital since the research saw most participants during a pandemic and how their shopping patterns changed.

Interviews Procedure

The qualitative data analysis method used open coding. Open coding is a subset of Grounded Theory, which provides the theoretical framework for analyzing and understanding qualitative data of an experience during the research (Belotto, 2018). The method allows for data to be studied and then create codes that summarize primarily the text obtained from the interviews. The categories also allow for a link among various phenomena under study. Open coding deals with collecting data. i.e., transcriptions in interviews and then breaking the data into codes and labeling them into codes or categories. The categories used are based on one or more existing categories or subcategories. Data segmentation into valuable expressions uses short words and sequence that allows for quick data comparison. This method, as used in qualitative data, is dependent on several factors like research questions, data, and the style of research (Belotto, 2018). The result of open coding gives a list of characterizing categories to explain the content of the research findings.

Arguably, open coding allows for more discovery as opinions, experiences, and thoughts are tentatively collected and analyzed from the interview with no limitation by the researcher. The description of the codes or categories is the objectively transcribed summary of the interview questions. From the response, the researcher can then identify a pattern, links, and concepts repeated throughout the data collection, and interviews were conducted online. This allowed for easy access to research as many respondents as possible since the geographical location; online methods permitted the transcendence and immediacy of responses from the interviewees.

When it comes to axial coding, categorization is critical in order to structure the raw data into an organized framework of information. The interview process has eight identifiable categories, which include the participants demographics, background, relationship with social media, as well as thoughts, opinions, and goals on the future of fashion. In addition, other categories are belief and experience with NFTs, opinions on marketing, purchasing habits during the pandemic, and interaction with various brands and marketing dynamics.

The main reason why the demographics and background categories required separation is due to the interview being international, which implies age sensitivity and location sensitivity. These two subcategories required a separate category to provide more precision and accuracy to the data presented. For example, the subcategories for location included Romania, the UK, Scotland, Monaco, Switzerland, and Canada. However, the educational background and interests involved attending schools, education, current status, employment, internships, passions, and business goals. Hobbies Thus, it can be concluded that due to the axial coding procedure in the grounded approach, one can objectify the subjective diagnostic material. The axial coding technique makes it possible to analyze the qualitative data obtained using the association method and formulate further diagnostic tasks.

In the case of selective coding, the raw data collected and open-coded are used to organize in accordance with their themes. The interview process has four major identifiable themes, which are centered around consumer experience, consumer attitudes and behaviors, demographics, and background. The latter two required separation due to age sensitivity and location sensitivity of the interview process. The reasoning is the same as with the axial coding because the interview was collected from a specific age group with diverse national origins. Consumer attitudes and behaviors reflect how the interviewees proactive interaction with the subject of interest, which is manifested in how their approach and act on the topics included in the questions and demonstrations. The sub-categories included opinions on AI, NFTs, fashion, and technology in fashion. In addition, there were attitudes and approaches towards advertising, marketing, brands, offline shopping, and online shopping. However, consumer experiences are more about the receptive element of the interviewees. These include preferred shopping styles, brand, and marketing preferences, reflections, understandings, expectations and anticipations, and experiences with the pandemic. In other words, the given theme reveals the perceptional aspect of the selected subjects, such as reflections, understandings, opinions, and experiences.

Interviews

The ten interviews were structured to obtain data based on opinions, experience, and observation. The participants have had technology influence their fashion consumption patterns. With Open coding, transparency was highly obtained, as the questions were not leading but entirely based on open-minded questions. In the case of this research study, the interview questions considered their demographic composition, age, occupation, interest use of social media, top complex affairs like NFTs, AI, and thoughts on the future of IT (The Business of Fashion, n.d.). For example, each participant had a varied understanding of AI, and various discussion topics were introduced. The responses on NFTs varied from participant to participant, raising a phenomenon on accessibility, awareness, preference, and technological understanding of NFTs.

Codes Used for the Interview Questions

  • Age
  • Location
  • Background
  • Interests Apps
  • Technology in Fashion
  • Opinion on AI
  • Likes AI to a certain level
  • Examples of AI in Fashion
  • Balenciaga virtual try on
  • Prefers the real life
  • AI and Machine learning affect the spending on a brand
  • Brands
  • Still in the process of understanding
  • Thoughts on brands advertised in a video game
  • Influencer marketing
  • Thoughts on Metaverse
  • AI used as a marketing tool by brands
  • Prefer the real world more
  • Real Life
  • Shopping habits changed
  • during the Pandemic
  • Social Media
  • Technology influence today
  • Depends on the brands identity
  • Big data customer experience
  • Product returns
  • Good for a brand
  • Thoughts on consumers purchasing more from NFTs
  • NFT is progressing
  • Buying an NFT item
  • Fashion brands incorporating NFTs or AIs
  • Thoughts on technology being the future
  • Marketing
  • Positive Outcome

Data Collection

Ten interviews were contacted to participate in the study. Take collection took place via software called Teams. The software audio features allowed for the interviews to be fully recorded. The interviews were later transcribed to have the data in text. The language used in the research was simple and understandable to the participants being interviewed. Since the participants came from various places worldwide, an online reach was the ideal mode of getting all of them.

It was structured into sections, categories, or codes:

  • Participants demographics
  • Occupational careers
  • Their relationship with social media
  • Their thoughts, opinions, and goals for the future of fashion
  • Their belief and experience with NFTs
  • Their opinions on marketing
  • Their purchasing habits during the Pandemic
  • Their interaction with various brands and their marketing dynamics

As the participants careers range from students in a different fashion, marketing, technology, and behavioral science, the questions intended to highlight the potential aspect of Artificial Intelligence and its impact on purchasing attitudes throughout the study.

Data Analysis

The collected data were transcribed, coded, analyzed, and interpreted; The transcription process helps the researcher gain an in-depth understanding of the subject. The codes apply to the keywords that are essential in qualitative research. The subsequent data analysis stage involved breaking the data into themes that exhibited similarities and differences among the participants interviews (Jain, 2020). The final step is thorough and detailed verification of the transcribed data for verification and proving and disapproving of the hypothesis. The findings considered the diversity of the population in the study and their noticeable and diverse differences in ages, location, career, opinions, and experience as shaped by their daily lives.

Limitations of the Study

During the undertaking of the study, a couple of limitations were encountered. Due to the small number of participants, caution had to be made in generalizing the qualitative research findings. Large-scale research would be beneficial to create room for a comprehensive data analysis. However, the semi-structured interviews facilitated meaningful answers and in-depth responses from the participants. This chapter has outlined the methodological approach used during the study. The framework for questions, the method for data collection, and how the final data was categorized to facilitate a more straightforward data analysis. The limitation of the study and the data analysis process was also identified.

Findings and Analysis

The analysis of this method is based on open coding data that insightfully explores the purchasing patterns and attitudes towards embracing AI as used in the marketing by Fashion Brands. The key themes identified during the study were: the fast growth of Artificial Intelligence, preference for online shopping, a need for knowledge of Artificial Intelligence, the importance of marketing, and the future of tech in fashion (Schmelzer, n.d.). This chapter will draw on the themes present throughout the findings during the interviews and the data analysis process. A brief profile of the participants is given to provide background information.

The findings and analysis are drawn from 10 in-depth interviews highlighting their interaction and know-how of AI on their purchasing behavior. The study topic ranges from shopping habits during the Pandemic, interest, ethical concerns, and technology. The compilation of specific interview responses has been analyzed to expand upon the categories that guided the questions. In fashion, social media usage, Metaverse thoughts on brands, experience with NFTs, Technology being the future, opinions on brands use of AI, and what they do for a living.

Interest/Hobbies

All participants had a bearing on fashion, Artificial Intelligence, Marketing, and online presence. Either they were working in a related industry, studying to be in the industry, or actively pursuing a career related to technology in fashion (Schmelzer, n.d.). One participant described their interest in fashion, marketing, and communication. I am potentially opening a business in the fashion industry and have an educational background in fashion and communications. (Participant 1) One participant described their interest in technology linked to sustainability. I am interested in the sustainable business model. They work in a fashion and distribution company and are curious about how companies implement technology for sustainability.

Shopping Habits During the Pandemic

The study research was conducted after the global COVID-19 Pandemic; therefore, a pattern concerning shopping habits was identified (Jin and Shin 2020). All participants acknowledged having altered their shopping habits from in-stores and in-person to more online shopping. Some participants never took part in online shopping until the onset of the Pandemic. I am open to shopping online and have never shopped before the Pandemic. (Participant 7) One participant explained how the Pandemic did not significantly affect their shift to online shopping. My shopping habits did not change much, as I was already very much online focused. I was doing most of my shopping online. (Participant 9). The 8th interviewee stated, Even before the Pandemic, I leaned on online shopping. During the pandemic, the percentage of online shopping has increased in terms of clothing.

Creative marketing strategies during the Pandemic were needed to appeal to an audience that had never shopped online before, as encouraged by (Wijayanto and Sanaji, 2021) in their journal that explained the role of Entrepreneurial Marketing in increasing product innovation during a pandemic. It was apparent from the data analysis that during the Pandemic, there was widespread use of online shopping. Some loved shopping online and being in an online space. My shopping habits drastically changed. I live shopping digitally and being engaged in the digital space. (Participant 10) I started engaging more in online shopping. I was buying leisure clothes instead of fancier going-out clothes.

Technology Influences Today

Everything starts with technology, which is a necessary experience for any industry. All participants acknowledge how technology is influencing their everyday lives. Technological devices are available, from phones to laptops, at home or in the workplace. One participant recognized the ability to have internet access anytime and anywhere and read the news, go on social media and see new trends. With globalization and digitization, (Nash, 2019) observes technologys influence on social media is becoming widespread. One participant describes todays impact: Technology is a big part of our generation.

Two participants observed how technology is affecting everyday life. One participant working at a behavioral science consultancy company added how technology influences human behavior today. Another participant working in marketing makes a similar observation. They add the impact technology has on everyday life. Technology influences every aspect of their day from wake up, communicating with others and Affecting their circadian rhythms (Participation 7) technology is part of every single thing they do. Wake up because of your phone, listen to music, use technology to get the tube, and use a laptop and phone to surf the world.

Technology has influenced people in various ways and serves multiple needs. Depending on what an individual wants on the internet, with a specific technological device, they meet their specific needs, only specific to them. Social media and all the apps spread quickly  provide many inspirations (Participant 1) technology, as explained by one participant, also plays a role in decision making. As expounded by place (Campbell et al., 2019), because of the large amount of data leveraged by AI, information online enables them to make varied decisions based on purchasing and creating marketing techniques that create value.

Social Media

Social media are online communication platforms that allow for interactions. With technological advancement, social media platforms have evolved from just sources of information to online shopping and marketing platforms (Nash, 2019). Marketing has widely employed the use of social media to attract clients and boost sales as well. It is arguably the most influential and powerful tool in the fashion industry today. Social media has influenced the participants in the study to make purchases. By employing apps, influencers, and Inspired by Instagram or Pinterest for products to shop (Participant 1), TikTok and Instagram use influencers to promote products (Participant 3). Artificial Intelligence in social media is aided by the algorithm that has enabled users to be targeted directly by using advertisements specific to them. The algorithm will recommend brands that will be attracted to those who sell ads by them. According to the testimony of one participant, I am more open to Pinterest  no direct ads, stated the 5th participant.

It was apparent from the data analysis that Instagram and Pinterest are mentioned as highly used applications to target users to make significant fashion purchase decisions (Staniewski and Awruk, 2022). Instagram ads or any social media advertising that puts you into a certain population group and then recommends you fashion based on that. (Participant 5). Social media exhibits various advantages. Participant Four states, Nowadays people spend a lot of time on social media; Designs and brands pop up after searching for them previously or looking at a specific design. I like that the positive aspect of social media is the Online size recommendations. The participant explains that they have started a beauty tech start-up called Vite. The ease of access to brands you only want is essential in saving time and resources that would have been used during in-person shopping. Vite delivers fashion and beauty products within hours. They have seen how social media has aided in the growth of the company as well as the marketing. They are always sitting on their phone and texting people. Online adverts such as Instagram persuade shopping because you are likely to see what you need when using the app.

Technology in Fashion

The website features and evolution over the years, specific method of operation, and the ease of shopping online are enabled by commerce all over the world (Henry et al., 2022). Concerning technology in fashion, two of the participants stated that that phenomenon is related to Artificial Intelligence (AI). Some participants think of websites when technology is mentioned. Changed a lot since their teenage years when websites were clunky and had trouble with items in stock or the right size. Now it has evolved, and it is easier to shop online than in person all the time (Participant 1).The degree of adoption and acceptance of AI by the fashion audience varies. Some participants expressed being impressed by AI while others did not like it, while some preferred a certain level of AI application in the brands they would interact with. Some participants prefer the application of AI to be kept simple and ordinary. If a brand incorporates AI, it does not make them want to buy more from the brand, as long as AI is kept simple and common.

The participant further acknowledges that depending on how creative and innovative the use of AI is in corporate din a Fashion brand; they are more likely; to engage in it. Trying vertical lipsticks and colors with a tool on a website is innovative. Prefer to stick to the real world rather than having everything online and virtual. As long as AI is helpful to buy products and choose something is great, but if it is more than that, they need to think about it (Participant 1). Online shopping has developed so much more. The website allows you to try something before buying it, which is good seeing it more and more within different higher-end fashion brands. Through AI, they have an option to try on clothes from being in their living room, particularly glasses and sunglasses.

Artificial Intelligence has completely revolutionized the fashion industry with various exciting features like Avatars to create an impact on their audience. Major fashion houses like Balenciaga have been on the roadmap to change the fashion world dramatically (Schmelzer, n.d.). A participant noted that; Instagram created avatars which have partnered with Balenciaga and Thom Browne brands where you can dress your avatar without paying the price for Balenciaga. Digital outfit dressing that people can see (Participant 3). Another participant described AI use in fashion as the process of getting more digitized. The Pandemic brought about an exciting use of AI as 3d and 2d models on the fashion runway of major Fashion Houses. Due to the constraints that resulted from the global Pandemic. Fashion designs embody a more futuristic approach to design, creation, marketing, and delivery (Schmelzer, n.d.). The mode is all aided by Artificial Intelligence. All fashion brands try to incorporate AI, whether it is through models, online shops, in-store experiences, or catwalks.

Real-Life Experience

Artificial Intelligence still cannot be compared to real-life experience. Some participants acknowledge that AI is great compared to real life, while others consider it innovative and cool. AI is not the same as real life. The varied experience some participant has with fashion brands had mixed reviews. Other participants would prefer the real-life experience because it is nostalgic and classy (Sayem, 2022). Prefers old school shopping style and sticking to classy brands which do not go above and beyond with their marketing (Participant 3). Still prefer to go to a store and buy the product there (Participant 4). They like trying on a pair of sunglasses online to see how it fits their face, but it is not the same as in the real world. (Participant 1). Some participants were disappointed by how wrong some orders were; shopping online for clothes was new and exciting. Often items would not fit and had to mail back Less rewarding experience than shopping in person.

Knowledge of AI and Machine Learning

Artificial Intelligence is progressively growing and affecting every aspect of human lives. However, having knowledge of AI and machine learning is on the other end of the spectrum. The participants ranged from individuals who knew more about AI and Machine learning to those who had little. Used to work at a beauty company that used machine learning to communicate better with the customer, and analyze how the products work (Participant 6). Expert knowledge of AI and Machine learning gives a fashion brand an added advantage over the competition because they can use the ability to enhance their fashion brand. AI used to market something individual. Attracting their interests and demands Fashion brands using AI then developing and keeping up the trends is great (Participant 8). Participant nine has observed a brand using machine learning to enhance customer experience with its brand (Medium 2020). Burberry uses machine learning models to achieve hyper-personalization for their customers (Participant 9). AI knowledge is preferred as it offers a platform for interaction with people of similar interests and is a clever and exciting aspect of fashion.

AI as Used in Marketing by Brands

Marketing is a form of communication to persuade a target audience to purchase e a product or service. Marketing factors are hinged on making a profit, creating awareness, launching and relaunching brands, and impacting individuals to take action upon specific campaigns. The incorporation of AI in Marketing is increasingly buzzing in the technology and fashion industries. The Call to Action embedded in AI is crucial in creating a never-before-seen experience and the ultimate representation of a peculiar world to a target audience.

Importance of AI in Marketing

AI can attract and increase the number of brand customers; it attracts more customers. Maybe the younger generations. Thinks that trying a product or having a tool in real life is better (Participant 1). Attracting a range of customers (Participant 5). Excellent marketing tools and brands are aiming to achieve that. AI can help a business grow and put you on edge over competitors (Wijayanto and Sanaji, 2021). Smart move as the world is constantly evolving, and they feel that brands need to keep up with the next level of innovation to help the business grow in the fashion world. The use of AI is unavoidable at this point (Participant 2). AI appeals to the younger generation who use Instagram and TikTok, which also happens to be most internet users (Yeo et al. 2022). Brands like Balenciaga are very edgy, and Nike low dunk sneakers these brands are targeting Gen Z, and everyone who is on Tik Tok and follows Tik Tok stars would work for them because it is having what is cool and what everyone sees and wants, which in a way works.

AI appeals to the audience because of its creative, innovative, engaging, and exciting appeal. According to one participant, AI is a novel idea, and it appeals more to people because it offers the ultimate shopping experience that real life cannot provide (Sayem, 2022). Smart idea. It is engaging and makes people and customers convert to a brand. It is a consumer experience that makes them engaged comfortably. Convert people to more sales. Engaging in an online digital shopping experience

AI targets a specific audience, hence aiming at increasing sales; One participant describes AI as being used in marketing as necessary to target audiences. AIs analytical and evaluation features enable fashion brands to spend fewer resources on target market research. AI helps in the automation process and, in most cases, tailoring brand information to an audience that will need it. It can meet and exceed expectations. Brands use AI to target their specific audience and increase sales (Participant 8). According to (Henry et al., 2022), AI adoption in marketing must be done correctly to make a significant impact and influence. Adopting the right AI for a fashion brand will depend on money, audience, and products or services. It can be difficult at the beginning of the implementation process.

However, with time and in-depth research, the outcome can be satisfying and increase the value of a fashion brand. One participant noted similar concerns when it came to the implementation of AI. Need something different. It can initially be complicated, but good outcomes (Participant 6). Keep in mind that some participants did not like the use of AI. Some persuasion is needed to facilitate the widespread adoption of AI in the fashion industry. Do not use too much technology and remove the average human experience that participants considered classic and normal. Participant seven describes AI as evoking emotions of Exiting and scary, simply at the pace in which AI is incorporated.

Thoughts on NFTs

With a safeguarded transaction record in the blockchain, NFTs are digital tokens that prove ownership over an item or asset. Most participants had not enough information on NFTS but were aware of the celebrities who owned NFTs. When asked if they could consider buying an NFT, Not informed enough about NFTs in fashion brands, knows rappers such as DJ Khaled and Tyga who have purchased NFTs products. (Participant 1). When asked if they could consider buying an NFT, answers ranged from no to yes and dependent on factors like investment, revenue, ownership to not realistic. Its preferable to consider purchasing an NFTs item for business and investment purposely but not necessarily admiring, to make money because of the high resale value.

Others considered buying NFTs for peer influence and social reasons. However, they felt like they were not at the point to purchase them yet; They do not think people from their age group have begun to purchase more. It is a fashionable and trendy topic within friend groups, but not quite at the point of their lives where they are interested in buying an NFT (Participant 2). NFTs represent business and investing opportunities for fashion brands interested in marketing to the younger generation. Personally, would not buy an NFT item; You should buy an NFT either because you like artwork or speculating that the value of the NFT will increase with time. Not a field that grabs their attention (Participant 9). Concerns about owning an NFT were significant concern among the participants. The overall theme, however, lies in understanding NFT, the need to purchase, the currency to buy, and the impact it had on the consumer and fashion brand they used.

NFTs in Fashion

Fashions offer a more comprehensive representation of NFTs in terms of ownership. They can be posted in a virtual environment or physical dimensions. According to Vogue Business Index, NFTs have increased in popularity, and its luxury market is continuing to grow. NFTs in fashion started to trend during the onset of the global Pandemic. Brands, therefore, found alternative ways to connect to their audience through digital means of any shape and form. Such as video games and personalized user experience on their websites and social media applications (Business of Fashion 2022). Fashion brands got to try clothes virtually that were very exclusive to a brand and even got the recommendation of the sizes and preferred body fit based on an algorithm the capitalization of NFTS in fashion is experienced in various ways.

Augmented Reality Clothing

Despite the digital asset, consumers still want to wear the clothing item, hence the need for an AR model or avatar marketing strategy (Miao et al., 2021). This way, they have the same experience and feel as they would in ordinary life. The combination of AR with NFTs technology has seen an increase in the use of AI technology and purchases from such brands. Instagram-created avatars partnered with Balenciaga and Thom Browne brands, where you can dress your avatar without paying

Enrollment and Graduation Rates

Higher education is among the fields where racial disparities are most evident. This is mainly because higher education in the United States is optional, and thus there are many factors that affect students willingness and ability to enroll and graduate. Native American students are at a disadvantage in the U.S. higher education context. According to recent studies, the overall number of students enrolled in postsecondary education in the United States was 19.8 million in 2017 (National Center for Education Statistics, 2019).

Most of these students were enrolled in undergraduate-level programs (16.8 million), whereas 3 million were enrolled in post-baccalaureate education (NCES, 2019). Students of color remain a minority in higher education, and Native American students are the smallest group. The data from NCES (2019), show that in 2017, 19% of students enrolled in higher education were Hispanic, 14% were black, and only 0.7% were American Indian or Alaska Natives. Hence, Native Americans are the smallest student population in the United States.

The low total population of Native American people in the U.S. only partly explains these disparities. A much more obvious explanation is the low level of transition from school to postsecondary education. According to Adelman, Taylor, and Nelson (2013), Native American students are less likely to leave school with a diploma than other groups, with about 30% of students not obtaining a secondary education diploma. Out of those students who have graduated from school successfully, 30 percent of students did not pursue any form of higher education at all, which is higher than the rate observed in other groups (Adelman et al., 2013). Based on statistical data, it is evident that poor rates of school graduation and academic progression influence Native Americans enrollment in higher education significantly.

Still, students who continue to postsecondary education face challenges on their way to graduation, which impacts Native American students graduation rates. Adelman et al. (2013) explain that with respect to Native Americans who go on to postsecondary education, only about half of those who enroll in major colleges and universities survive the first year as compared to almost 70 percent of the general population (p. 31).

This means that about half of Native American students drop out of college in the first year. The NCES (2019) also notes that, for the 2011 cohort, the 6-year graduation rate for Bachelors degree programs was 74% for Asian students, 64% for whites, 57% for mixed-race students, 55% for Hispanics, 40% for African Americans, and only 38% for Native Americans. Therefore, although the share of Native American students who go to college after school is rather low, the percentage of Native American students who graduate with a Bachelors degree is even smaller. Given that a Bachelors degree is required for further study, this correlates with the low number of Masters and Doctoral degrees received by Native American persons.

Long-Term Trends

What is particularly interesting in relation to educational disparities faced by Native American students is that the governments efforts to promote educational attainment in diverse populations had little effect on them. Long-term trends in higher education show significant improvements in achievement among other races but almost no changes for Native Americans. For example, Garibaldi (2014) reports on racial disparities in higher education between 2002 and 2012. The overall student enrollment in higher education grew by 24.3% nationally during this period, with only 7.5% growth attributed to white students (Garibaldi, 2014).

Hispanic and African American populations showed the most significant improvements in enrollment rates, with 79.3% and 49.7% growth, respectively (Garibaldi, 2014). For Asian American students, the growth rate was over 17%, thus supporting the authors conclusions about improved access to higher education for students from immigrant families (Garibaldi, 2014). During the same period, Native American enrollment grew just by 4.2%, which is insignificant compared to other populations (Garibaldi, 2014). In other words, government efforts and policies targeting minorities served to improve the enrollment of diverse students in higher education, but had almost no effect on Native American students enrollment rates.

Preventing students from dropping out of higher education is also an urgent priority, and thus, action was also taken to enhance minority students graduation rates. The general trend with respect to Bachelors degree attainment was positive, with a growth of 32% throughout the United States. In Hispanic, Black, and Asian American student populations, changes were the most obvious as they showed a growth rate of 90.6%, 49.3%, and 43.4%, respectively (Garibaldi, 2014).

For white students, Bachelors degree attainment grew by 21.8%, whereas for American Indians, the change constituted 16.3% (Garibaldi, 2014). This shows that both enrollment and graduation rate growth among Native American students was lower than among white students, who were historically in a better position with regard to educational attainment, and thus did not benefit from government policies targeting minorities.

Trends in enrollment and graduation also affect further academic progression among Native American students. The growth in Masters degree attainment between 2002 and 2012 was significant, reaching a national average of 45.4% (Garibaldi, 2014). The number of Native American students receiving Masters degrees grew by just over 28%, which is almost half the level of national growth (Garibaldi, 2014). For comparison, Masters degree attainment among Hispanic students grew by 103.4 percent in the same period, whereas African American populations saw an 89% growth (Garibaldi, 2014).

In Doctoral education, the situation is similar; despite the national growth rate of 39.9%, Doctoral degree attainment by Native Americans grew by 20% (Garibaldi, 2013). This is lower than the growth shown by white (32.4%), Asian American (49.8%), African American (55.8%), and Hispanic (67.5%) student populations (Garidbaldi, 2014). As a result, the overall level of education among Native Americans remains lower than among people of other races, which contributes to the disadvantaged position of this population in the job market.

Representation in Computer/Technology Education and Workforce

The representation of Native Americans in computer or technology-related education and workforce remains rather understudied. Most diversity reports concerning this sector focus on black, Hispanic, and Asian American populations since their share in the workforce is more significant. However, some data on computer and tech-related work and education among Native Americans is still available.

First of all, it is evident that science and technology education still suffers from limited diversity. Museus et al. (2011) explored the enrollment of diverse students in science, technology, engineering, and mathematics (STEM) fields. The researchers noted that in 2006, the share of science and engineering-related degrees given to Native American students was just 0.7%, which is lower than that of Hispanic (7.7%) or black (8.3%) students (Museus et al., 2011).

Additionally, Native American students showed some of the lowest rates of degree completion among all student populations in STEM fields. Only 14% of Native American students in STEM fields completed their education, compared to 13.2% of black students, 15.9% of Hispanics, 67% Asian Americans, and 60% of whites (Museus et al., 2011). These trends undoubtedly contribute to the low representation of Native Americans in the IT and technology sectors.

The overall position of Native Americans in the U.S. labor force is rather weak, and it is even worse in the technology sector. Based on the report of the U.S. Bureau of Labor Statistics (BLS, 2019), the Native American population suffers from a high rate of unemployment and lower salaries. For example, the general unemployment rate throughout the U.S. was 3.9% in 2018, but among Native Americans, it reached 6.6% (BLS, 2019). Native Americans were slightly less likely to participate in the labor force altogether, with 59.6% of Native Americans working or looking for work compared to 62.9% of the general population (BLS, 2019).

In addition, racial disparities in occupation and salary were also evident. As reported by the BLS (2019), only 25% of Native Americans were involved in management, professional, or related occupations, compared with 39.7% of the total U.S. population. The share of Native Americans was larger in service, sales, and office occupations, as well as in natural resources, construction, maintenance, and production workforce (BLS, 2019).

This means that the share of white-collar workers among Native Americans is generally low, which affects their career achievements and income. With regard to the latter, less than 19% of Native American workers made $1,200 or more per month, compared to 31.6% of the general U.S. workforce (BLS, 2019). These data also show that well-paid occupations, such as IT, do not engage Native Americans sufficiently.

A report targeting the high tech sector in particular confirms this suggestion. The U.S. Equal Employment Opportunity Commission (2017) reported that the high tech industry is limited in terms of diversity despite accounting for almost 10% of the labor force in the United States. The share of white workers in high tech is larger than across all industries, with 68.5% of workers being white (EEOC, 2017). The percentage of black and Hispanic employees in this industry is smaller than in the general workforce. Approximately 7.4% and 7.97% of employees in the high tech sector are black and Hispanic, compared to 14.38% and 13.86% of employees across all industries (EEOC, 2017).

American Indians represent around 0.4% of workers in the high tech sector and 0.6% of all employees in the United States (EEOC, 2017). Although the difference is not as significant as with other minorities, the fact that Native Americans constitute 1.1% of adults in the U.S., underrepresentation is still a significant issue (BLS, 2019). Given the popularity and potential future growth of the high tech sector, underrepresentation prevents Native American people from accessing the opportunities that could help them to leverage their income and achieve long-term career success.

Background of Tribal Colleges and Universities

Tribal colleges and universities have become an essential source of education for Native Americans in the United States. According to Al-Asfour and Abraham (2015), tribe leaders initiated TCUs in the late 1960s in order to improve Native American students access to higher education in reservations. During that time, access to education was a significant concern for people from minority backgrounds, as people of color struggled to achieve racial equality in the United States. Despite allowing students from Native American backgrounds, mainstream educational institutions failed to understand and respect their cultural differences and largely ignored students needs and concerns (Al-Asfour & Abraham, 2015). As a result, tribal leaders became determined to control education delivered to Native American students.

The concern for the experiences of Native Americans in mainstream educational institutions drove the establishment and popularization of TCUs. Issues like discrimination, limited social support, cultural alienation, and cultural conflict affect Native American students in higher education today, and they were even more prominent in the 20th century (Thompson, Johnson-Jennings, & Nitzarim, 2013). These problems affected not only students subjective psychological experiences, but also their graduation rates and academic success (Al-Asfour & Abraham, 2015). Segregated education of Native American students in reservations aimed to prevent these issues and improve students experiences with education, thus encouraging education attainment.

In their attempts to accommodate students in TCUs, tribal leaders faced significant barriers. At first, proposals to the Bureau of Indian Affairs to establish American Indian educational institutions were not successful (Warner & Gipp, 2009). The expansion of American higher education overall, supported by the development of community colleges, allowed for tribal leaders to initiate local education (Warner & Gipp, 2009).

Navajo Community College became the first tribal college in the United States. Although it still faced problems, such as underfunding, the model of education offered in it became successful among tribe members, leading to the establishment of more than thirty other TCUs throughout the United States (Warner & Gipp, 2009). The original educational model and vision were retained by the TCUs that continue to exist today.

The community college model used as a framework for the first TCU impacted this type of educational institutions in several ways. First of all, TCUs retained philosophies of academic access similar to the open enrollment policies of community colleges (Al-Asfour & Abraham, 2015). In order words, the accessibility of higher education became the fundamental premise on which TCUs emerged and continue to exist. Secondly, as explained by Warner and Gipp (2009), the functions of TCUs and mainstream community colleges are very similar: both strive to serve their communities as comprehensive institutions providing programs that respond to community and student needs (p. 20).

In contrast to mainstream universities that expect students to conform to standards and requirements throughout their degree programs, TCUs offer a more flexible approach, wherein education can be tailored to the students needs. The primary element of education in TCUs that distinguished them from mainstream colleges was the preservation and support of Native American Identity. Al-Asfour and Abraham (2015) state that students in TCUs were supported in retaining their cultural identity since the institutions mission, vision, policies, and even their curricula embedded it. Other differences between TCUs and community colleges were related to their funding sources and jurisdiction (Warner & Gipp, 2009). Still, TCUs shared the educational promises of community colleges, as well as their goals to improve education attainment, promote retention, and broaden young peoples career and development opportunities.

The Role of Tribal Colleges and Universities

Today, the role of TCUs in Native American education is significant. As reported by the United States Department of Education (2019), there are 32 fully accredited TCUs in the United States and one institution awaiting accreditation. On the whole, these TCUs offer 358 programs that range from apprenticeships and certificates to Bachelors and Masters degree programs (USDE, 2019). Most of the TCUs are located in the Midwest and Southwest due to the proximity of American Indian reservations.

The total number of states where TCUs are present is 14, and these include Alaska, Arizona, Kansas, Michigan, Minnesota, Montana, Nebraska, New Mexico, North Dakota, South Dakota, Washington, Wisconsin, Oklahoma, and Wyoming (USDE, 2019). The proximity of many TCUs to Indian reservations enables them to provide access to education to young people who do not consider going to college elsewhere. This contributes to the role of TCUs in improving education attainment among Native Americans in the United States.

The popularity of TCUs among Native American people is generally higher than that of mainstream educational institutions. Because TCUs are tightly connected to American Indian culture and are part of tribal heritage, they are in line with Native values and beliefs, which supports their popularity. As of 2019, there were approximately 30,000 students enrolled in TCUs throughout the country (USDE, 2019). Of these students, 78% were American Indian or Alaska Native, although the remaining students were from other ethnic backgrounds (USDE, 2019). Based on the 2010 enrollment data, 32 accredited TCUs accounted for 8.7% of Native American college student enrollment (USDE, 2019).

It is also important to note that, although the overall enrollment of Native Americans in higher education institutions only increased by 4.2 percent between 2002 and 2012, the number of Native American students in TCUs increased by 23% between 2001 and 2006 (Garibaldi, 2014; USDE, 2019). This suggests that TCUs become more and more attractive to Native American students, and are likely to play a significant part in the future of Native American education.

TCUs Strengths

TCUs are unique not only because of their intended purpose but also due to their ability to function successfully under challenging circumstances. As explained by Al-Asfour and Abraham (2013), most TCUs are severely underfunded, often located in dilapidated facilities, and enroll students from some of the most impoverished communities in the United States. The socioeconomic conditions in which these educational institutions exist put pressure on faculty and staff to meet students needs with limited resources. Based on the data from the Minority University Research Education Project (MUREP) for American Indian and Alaska Native STEM Engagement (MAIANSE), Allen (2018) states that nearly 80 percent of TCU students require financial aid to support their education. Moreover, 74 percent of Native American students at TCUs require remedial math, and 50 percent require remedial reading or writing (Allen, 2018, para. 6).

For many students, these issues lead to a lack of confidence and motivation to study, thus increasing the threat of them dropping out of college (Allen, 2018). Functioning under such severe conditions is a challenge in itself, and TCUs developed numerous strengths to be able to continue operations.

The first strength that is evident in TCUs is that they seek support through well-established partnerships with federal agencies and non-profit organizations. For instance, Warner and Gipp (2009) mention that most TCUs work closely with the Bureau of Indian Affairs and a number of other governmental agencies. Moreover, the institutions actively seek support from philanthropic organizations, such as the W. K. Kellogg Foundation and the Bush Foundation, as well as from private entities. In 1989, the American Indian College Fund was instituted, allowing donations from both individuals and companies, which support scholarships, management, and further fundraising (Warner & GIpp, 2009). These partnerships and connections enable TCUs to acquire funding for their activities and survive when federal funding is not sufficient.

Apart from funding, TCUs also have established relationships that support them through improved staffing and other services. For instance, retention of experienced and competent faculty members has always been a challenge for TCUs, and it affected the instruction in science and mathematics in particular (Warner & Gipp, 2009). In order to address this problem, many TCUs form close partnerships with non-Indian educational institutions.

These institutions can lend faculty members to TCUs, act as funding conduits for TCUs awaiting accreditation, and participate in cross-registration of students (Warner & Gipp, 2009). Additionally, partnerships with other colleges and universities enable TCUs to provide unique academic opportunities to students, including research initiatives, teacher training programs, and easier transfers (Warner & Gipp, 2009). Hence, ties with other educational institutions are also a valuable asset for TCUs.

Another strength of TCUs is their ties with American Indian communities. According to Warner and Gipp (2009), most TCUs are governed by boards of trustees that are composed of local American Indian Community members. At the same time, boards of trustees do not require approval from local tribal leaders on their policies or activities.

Warner and Gipp (2009) show that while most American Indian decision-making entities (including tribal governing councils) must seek the approval of the Secretary of the Interior for their important decisions, boards of trustees of TCUs do not have to do so (p. 29). This enables colleges to make decisions that concern education and survival without the influence of tribal leaders, although the wellbeing of local American Indian communities is usually taken into consideration by boards members.

Lastly, an essential asset of TCUs is the education model that complies with their primary mission, which is to offer a culturally inclusive approach for Native Americans to attain higher education. The model applied in TCUs has four core characteristics: strong connections to the physical and cultural spaces on which they reside, cultural content in curriculum, indigenous pedagogy, and community outreach and education that is rooted in tribal identity and practice (Gallup, Inc., 2019).

The first characteristic supports TCUs mission by ensuring that local tribes are involved in the educational process, thus providing students from Native American communities with greater access to education. Cultural content in education is also crucial as it helps students to maintain their cultural identity and benefit from a higher level of cultural support throughout their study. Indigenous pedagogy, in turn, assists TCUs in meeting students needs by ensuring that educators are aware and respectful of American Indian customs, traditions, values, and experiences. Lastly, community outreach programs strengthen the links between TCUs and local communities, helping students to maintain connections with their communities, and preventing cultural alienation. In this way, the innovative education model of TCUs has become a crucial asset that enables these colleges to fulfill their promise to Native American individuals and communities.

Benefits of TCUs for Native American Students

TCUs provide many benefits to Native American students, both throughout their studies and later after graduation. However, there is an evident lack of recent research data comparing the personal, professional, and academic experiences of TCU students to Native American students in other universities or colleges. As part of its partnership with the American Indian College Fund, Gallup, Inc. (2019) carried out a large-scale study focused on the alumni of American TCUs. Although it targeted past students rather than current students, the study was unique due to the comparisons drawn. The reported outcomes show how TCU alumnis professional and personal lives differ from the experiences of college graduates nationally and from Native American college graduates specifically.

First of all, students of TCUs enjoyed their experience in college more than college graduates nationally and American Indian graduates from other colleges. One of the significant contributors to students lives during college was the emotional support received from mentors and professors. About 80% of students in TCUs agreed that they had at least one professor or instructor who made them feel excited about learning, compared to around 70% of graduates nationally (Gallup, Inc., 2019). Additionally, 59% of alumni agreed that their professors or instructors cared about them, compared to just over 30% national average for all groups of graduates (Gallup, Inc., 2019).

Mentorship was also a positive experience for students at TCUs, as 53% of graduates agreed that their mentors encouraged them to pursue their goals and dreams, compared to the 30% of Native American graduates from other colleges (Gallup, Inc., 2019). With regard to experiential learning, students who attended TCUs did not differ significantly from other graduates. Still, it is vital to note that 60% of students at TCUs had internships or job placements (Gallup, Inc., 2019).

This experience is crucial to college students as it teaches them to apply their knowledge outside of the classroom and prepares them for future work. On the whole, 59% of graduates from TCUs agreed that these colleges are perfect for Native American students, compared to 37% of American Indian graduates nationally (Gallup, Inc., 2019). This shows that TCUs contribute to Native American students academic engagement and support them in attaining education to a greater extent than mainstream colleges.

In terms of employment, students who graduated from TCUs tend to enjoy better opportunities than those who attended other colleges. The study found that 42% of TCU graduates working full-time reported being engaged in their work, compared to 36% of non-TCU Native American graduates (Gallup, Inc., 2019). The levels of active disengagement were significantly lower, with just 6% among TCU alumni compared to 14% and 15% for college graduates nationally and non-TCU Native American graduates, respectively (Gallup, Inc., 2019). Furthermore, 40% of TCU graduates agreed that their institution prepared them for life outside of college well, which is significantly higher than the national average (27%) and the score among Native American Graduates from other colleges (24%) (Gallup, Inc., 2019).

The job satisfaction of TCU graduates also tended to be higher than that of other alumni. For example, 53% of TCU alumni agreed that they were interested in their job, and 37% stated that their job was ideal for them (Gallup, Inc., 2019). For college graduates nationally, the same responses occurred in 38% and 22%, respectively (Gallup, Inc., 2019). Therefore, attending TCUs provides benefits to students in the form of increased job satisfaction and a higher level of engagement, which are both crucial to long-term goal attainment.

The levels of wellbeing among TCU graduates were also higher than in other populations of graduates. The study considered welfare in terms of physical, community, financial, social, and career elements, thus providing comprehensive data for comparison. With respect to community, financial, social, and career wellbeing, TCU graduates showed statistically better results than non-TCU graduates, including Native American Graduates. The difference was particularly significant in the career element, where 62% of TCU alumni stated that they liked their daily work and are motivated to achieve their goals, compared to 43% of all graduates in the U.S. (Gallup, Inc., 2019).

Community wellbeing was also significantly higher for TCU graduates (47% compared to 37% nationally), which is likely due to TCUs connections with local Native American communities (Gallup, Inc., 2019). The financial wellbeing of TCU alumni was slightly higher than the national average of 31% and reached 36% (Gallup, Inc., 2019). Overall, TCU graduates reported being more satisfied with their lives after college than students who attended other educational institutions. This means that the benefits derived from studying at TCUs extend beyond students academic experiences and that TCUs provide Native American students with a way of enhancing their quality of life in the long term.

TCUs Offering Degrees in Tech/Computer-Related Fields

Despite the potential benefits of TCUs for students, their funding remains limited, which affects the range of degrees and programs provided. Financial concerns and staff shortages often force community colleges to rely on the availability of faculty instead of broadening the scope of academic programs available (Warner & Gipp, 2009). As a result, the number of TCUs offering degrees in tech or computer-related fields is limited. The American Indian College Fund (2019) provides information about all TCUs in the United States, including the types of degrees offered. Based on the data from the page and from links to institutions websites, less than one-third of American TCUs provide education in these fields.

In Alaska, Ilisagvik College offers Associate degrees and certificates in Information Technology. Diné College in Arizona, which is the oldest TCU in the country, formerly known as the Navajo Community College, offers certificate programs in computer technology. In Michigan, Bay Mills Community College offers an Associate of Applied Science degree in Computer Information Systems. Minnesotan Leech Lake Tribal College does not offer degrees in IT specifically, but there are elective computer and IT courses that students can pursue apart of their Associate of Arts degree with STEM emphasis.

Fort Peck Community College, located in Montana, offers a range of IT-related degree programs, all in the Associate of Applied Science branch, which include Information/Networking Technology, Business Technology, and Communication Technology. Montana also has two other TCUs providing computer-related degree programs. The Salish Kootenai College offers four types of IT-related programs: workforce certification in Computer Applications, the Associate of Arts degree in Digital Design Technology, the Associate of Science in Information Technology, and Bachelor of Science in Information Technology. The Stone Child College also offers the Associate of Science degree in Information Technology.

In North Dakota, there are four TCUs offering degrees in computer or tech-related specialties. Nueta Hidatsa Sahnish College (Fort Berthold) offers the Associate of Science degree in Computer Science, whereas the Sitting Bull College  provides the same degree program in IT and a certificate program in IT. The Turtle Mountain Community College offers just one IT-related specialty, which is the Associate of Applied Science program in Computer Support Specialist.

Lastly, the United Tribes Technical College provides the Associate of Applied Science degrees in Computer Information Technology. In South Dakota, opportunities for studying IT in TCUs are also present. Sinte Gleska University provides Bachelor of Science programs in Computer Science, the Oglala Lakota College offers IT as a major in Bachelor of Science and Associate of Applied Science programs, and the Sisseton Wahpeton College teaches Computer Systems technology at the Associate of Applied Science level. Finally, in New Mexico, the Southwestern Indian Polytechnic Institute offers the Associate of Applied Science degree in Network Management, which is also relevant to the IT profession.

Factors Influencing Retention and Persistence of American Indian Students in STEM

Given the low rate of graduations among Native American students in higher education, there are growing concerns associated with retention and persistence. STEM fields of education are widely considered to be more challenging than other majors, and they are crucial to career success in computer or tech-related areas (Smith, Cech, Metz, & Huntoon, 2014). Hence, understanding the factors that affect the retention and persistence of American Indian students in STEM is essential to improve approaches to STEM education in this student population.

One particular factor that relates to Native Americans persistence in Science and Engineering education is community engagement. According to the study by Smith et al. (2014), the endorsement of communal goals by Native American STEM majors at the start of their college careers were negatively associated with their stated intentions to persist, and negatively associated with their perceived performance after their first semester in college (p. 423).

This is mainly because STEM fields do not offer students sufficient opportunities to contribute to their tribal communities, and the predominant culture of mainstream higher education institutions is individualistic (Smith et al., 2014). Students feelings of belonging also affected their persistence and intention to stay. It is likely that this factor also stems from the tribal orientation of Native American students and the cultural alienation they experience in mainstream education (Smith et al., 2014). Hence, students ties with Native Ame

Introduction

For my assignment, I have chosen the Mass Transit Railway (MTR), a Hong Kong-based company. Out of the various ongoing projects, I plan to do the Project Management Report on the West Island Line (WIL) project. The length of the route will be about 3 km, and the capacity and frequency of the train shall be 85,000 passengers per hour per direction.

Principles of Project Management

Background and Principles of Project Management

Gray & Larson (2008) define a project as a unique entity that aims at a previously defined goal, consisting of complex, interrelated tasks, and is limited by time, costs and its scope. Both the contractor and the client aim for the goal in pursuance of strategic targets. The goal of the MTR West Island line is to provide a fast, efficient and reliable commuter service to residents of the Western District of Hong Kong Island (MTR, 2013).

Gray & Larson (2008, 26) state that each project is unique, as it has never been done before and is unlikely to be repeated. Project objectives are determined by the parameters of time, cost, and quality (also referred to as performance). The time scheduled for the completion of the WIL project is just under five years, from July 2009, which marks the beginning of construction, until the end of 2014, when the project is to be completed in its entirety (MTR, 2013). They are also limited by costs, as resources are limited, which restricts each project to a limited budget. The cost of the entire WIL Project is estimated to be HK$ 15.4 billion, and by the date of its completion, it is estimated that it will have employed 6,600 people (MTR, 2013).

Time, cost and quality/performance have to be balanced for the most favourable outcome. Thus, time, cost, and quality/performance are a triangle of objectives, referred to as the magic triangle of project management. If one is affected, the two other objectives will also be affected. However, the quality/performance objective is often considered paramount (Lock 1996, 9). The government intends the West Island Line to provide a dependable railway service to Hong Kong Island. It will serve a population of 200,000 people in the Western District, by offering them access to Sai Ying Pun Station within 8 minutes, and seamless access to Tsim Sha Tsui station in Kowloon (on the Hong Kong-mainland) within 14 minutes. Furthermore, the majority of the residents of the Western District will walk to access the WIL.

Viability of Projects

The West Island Line is a viable project, and this assertion is supported by the results of several studies, based on successful projects in Hong Kong, which used the tunnel excavation methods that are currently being used in the construction of the West Island Line. An example of such a viable project is the Island West Transfer Station, which is an underground waste transfer facility on Hong Kong Island. At the time of its completion, it was the largest ever excavated rock cavern in Hong Kong, with a length of 60 metres, a width of 27 metres and a height of 12 metres (CEDD 2009, 9). The construction of such a large cavern on Hong Kong Island, near the site of the West Island Line, proved that it would be viable to excavate railway tunnels on Hong Kong Island.

Project Viability is assessed through the process of Project Viability Screening, which is a merit-based analysis, which ranks projects using a set of project viability criteria (Orr & Tchou, 2009, 19). It consists of seven steps, as stated below:

  1. Establish an Integrated Team
  2. Develop Project Viability Criteria
  3. Deal-Breaker Screening
  4. Project Viability Screening
  5. Prepare Project Short-List
  6. Prepare Feasibility/Business Case
  7. Obtain Board Approval (Orr & Tchou, 2009, 20).

The West Island Line (WIL) was viable at its inception in 2009. This is attested to by the endorsement by the Hong Kong Executive Council of the funding schedule for the WIL Project (HK$15.4 billion over five years) in May 2009, and the subsequent funding approval given by the Legislative Council in July of the same year (MTR, 2009). Therefore, the relevant authorities were confident that the project could be built within its scheduled cost right from the start. In terms of meeting the projects performance/quality specifications, it was anticipated that the West Island Line would be capable of transporting 85,000 passengers per hour per direction. As the West Island, Line would be an extension of the MTR Island Line, and as Mass Transit Railway (MTR) would operate it, the performance/quality aspects of the project were also considered viable from the start (MTR, 2013).

Systems and Procedures

The systems and procedures used in the project are set out below.

Initially, the Project Agreement was signed between MTR and the government of the Hong Kong Special Administrative Region (SAR) in 2009 (MTR, 2013). The determination of project milestones followed this. The appendix outlines the process of selecting key events, titles, definitions, deadlines, and decision points that framed the project. These milestones are set out in Appendix 1. In collaboration with the associate project manager and the control account manager, the project manager, identified the intermediate (short-term) milestones, which are shown in Appendix 3. From this point, the control account manager developed a detailed schedule for each control account. The Project Manager gives details work and milestones related to specific work packages and allocates them to sub-contractors. They were then integrated into the project milestones. The project manager then approved the project detail schedule, and the project schedule baseline was drawn up and integrated into the activity schedule in the schedule baseline to form the project Time-Phased Cost Profile, in conformance with AGCA (2003, 11).

Key Elements

The construction of the tunnel from Sheung Wan Station via Sai Ying Pun Station and Kennedy Town was managed in two phases. A consortium of firms, Dragages, Maeda and BSG, did the tunnel between Sheung Wan and Sai Ying Pun Stations. The section of tunnel between Sai Ying Pun and Kennedy Town Stations, including the construction of Hong Kong University Station, is a joint venture between Gammon Construction Ltd, Nishimatsu and WIL. Gammon Construction Ltd. is constructing Kennedy Town Station. These sub-projects are ongoing and nearing completion (MTR, 2013). The termination of these parts of the project should follow a laid down procedure. Once the project manager considers the work completed, but before workers leave the project, he should prepare a list of items requiring correction or completion. Subcontractors should promptly satisfy such requirements and arrange for any contractually required tests (AGCA, 2003, 55). Thus, each of the subcontractors and or joint ventures working on different sections of the tunnel should be prepared to conduct these tests and to do any other work, which the project manager considers necessary before the project, can be said to be complete (Schwalbe, 2013).

Once each subcontractor has substantially completed the work or designated portion thereof as listed, the project manager should verify that each subcontractors work is substantially complete and then request a prompt substantial completion inspection by the project client (in this case, MTR) as contractually required. The project manager should be present during the inspection process, along with the project representative(s) of the subcontractor(s) whose work is being inspected (AGCA, 2003, 55).

Once the completion inspection has been done, the project manager should carry out a Post-project appraisal. Post-project appraisals (PPAs) are evaluations of the effectiveness of projects based on systematic data collection. Specifically, PPA represents an opportunity to determine if the project was completed well, and how to improve future restoration design (Skinner 1999, adapted from Sadler 1988). The PPA allows the project manager to assess whether the sections of the project performed by different sub-contractors work together as an efficient, harmonious whole.

Project Organization

Organizational structure

The organization chart of the MTR-WIL is appropriate for WIL as it is specifically designed for the WIL project. MTR is the parent organization, and WIL has been established to build the Western Island Line. Some of the project participants are permanent employees of MTR, while others are experts who have been hired for the WIL project. The organization chart is shown in Appendix 2 (Kay, 1993).

The CEO of MTR is the head of the Executive directorate. Other members of the Executive directorate are the heads of different divisions of the project. Senior managers in supervising the project and apprising the board (of MTR) of the progress and performance assist the heads of such departments. Following is the management team at WIL:

  • Mr Rod Hockin: General Manager  WIL/SIL, who has overall responsibility for the completion of WIL. Reports to the Executive Office.
  • Mr Brenden Reilly: Project Manager  WIL Civil, in charge of civil engineering aspects of the WIL project. Reports to General Manager.
  • Mr Dono Tong: Project Manager  WIL/SIL E&M. He coordinates the project objectives (time, cost and performance/quality). Reports to General Manager
  • Mr Stephen Hamill: Construction Manager  WIL. Supervises construction and reports to Project Manager.
  • Mr David Salisbury: Construction Manager  WIL. Supervises construction and reports to Project Manager.
  • Mr Herbert Leung: Construction Manager  WIL/SIL Control System. Supervises installation of the control system and reports to the Project Manager.
  • Mr K. M. Lock: Construction Manager  WIL/SIL Building Services. Supervises construction and reports to Project Manager.
  • Mr P. W. Lau: Design Manager  WIL. Is responsible for designing and implementing the final appearance of the WIL. Reports to Project Manager.

Following is the list of engineers from various departments within WIL:

  • Mr Tom Barret: Senior Construction Manager  Tunnels
  • Mr Ashley Calvert: Senior Construction Manager  Tunnels

The two Senior Construction Managers/Engineers above are responsible for the supervision of all tunnelling aspects of the project. As the project has been divided into sections under different subcontractors, who use different methods of tunnelling, each construction manager will have separate responsibilities. They report to the Construction Managers.

  • Mr Patrick Cheng: Senior Construction Manager  Civil
  • Mr Walter Lam: Senior Construction Manager  Civil

The two Senior Construction Managers/Engineers for Civil Engineering will oversee all civil engineering work on the project. Similar to their superiors, they supervise different subcontractors who are performing different sections of the project. They report to the Construction Managers.

  • Mr James Ho: Senior Construction Manager  Comms & Radio

He implements and supervises the work of installing and testing the communication and radio systems for the WIL. He reports to the Construction Manager  WIL/SIL Control System.

  • Mr Kenneth Lo: Senior Construction Manager  BS

He and his team are tasked with the construction (building services) that takes place after the tunnelling has been completed. He reports to the Construction Manager  WIL/SIL Building Services.

  • Mr Rodney Ng: Senior Construction Manager  MCS

He and his team are responsible for the installation and operation of the WIL Main Control System (MCS). He reports to the Construction Manager  WIL/SIL Control System.

Project Implementation Control

The project manager at WIL controls and coordinates the project through the managerial actions of planning, organizing, and leading, among others. Project managers actions are constantly aimed at change, while other managers jobs involve maintaining a stable working environment (Brown 1998, 13.)

Thus the WIL project manager has to be a team manager, by interacting with project members, from the General Manager, Construction Managers and Engineers to the builders, drillers and technicians at the site. As the WIL project involves international expertise, the project manager has to build team ethos in a multicultural and multilingual group of project staff. Earning the respect of the team is crucial for the project manager; therefore, he/she must be a person of utmost honesty, integrity and vision. (Lockyer & Gordon 1996, 17). The project manager shall control the project constraints to ensure that everything goes as planned. The constraints are time constraint, quality constraint, cost constraint, and scope constraint. The manager will do this by checking project specifications, schedule, and budget allocations. The project manager will use the tools outlined below for that purpose (Chase & Aquilano, 2006).

Control Point Identification Chart

The chart below will be useful for tracking areas that may go wrong and anticipating ways in which the project manager will solve the problems to avoid nasty surprises. Table 1 shows some of the problems that may occur during the WIL project, how to identify the problem, and the possible solutions.

Table 1 Control Point Identification Chart

Control Parameter What is likely to go wrong? How and when to identify The solution
Quality There may be less qualified employees Personal inspection of every stage Substandard work to be redone
Cost/Budget Cost of any sub-unit may exceed budget When sale deals are sealed Seek alternative partners, consider alternative materials input
Time/Schedule Time to complete any subunit may exceed schedule Monitoring progress along the critical path of network diagram Improve efficiency, recoup time from other areas, consider overtime if within budget

Milestone Charts

This powerful implementation tool summarizes the status of a project by highlighting key events. Milestone charts state what events in the projects life have been completed. Also, the chart states the duration it took to complete the events, and, whether this is the duration, the project manager had scheduled for the event (Chase & Aquilano, 2006). Hence, the manager continually records the variance between the actual and scheduled times. Also, it outlines the remaining events and the project managers anticipated completion time. Table 2 below shows the Milestone chart for the WIL Project. The project is at its fourth year and as the table indicates, the actual completion times for the remaining milestones have not yet been determined.

Table 2: Milestone Chart

Milestone Scheduled Completion (years) Actual Completion (years)
1.0 Station Work
1.1 Kennedy town station and overrun tunnel construction
2 2.5
1.2 Adjustment of Sheung Wan Station 0.5 0.9
2. Tunnelling
2.1 Accessing Kennedy town Praya shafts and Hill road
1 1.2
2.2 Constructing transitory underground magazine 0.8 1
2.3 Constructing the Sheung Wan to Sai Ying Pun Tunnel 0.5 0.5
2.4 Instrumentation and monitoring 0.5 0.5
2.5 Sai Ying Pun and Hong Kong University Station 0.2 0.2
3. Overground Works
3.1 Project site office and works area
1.5 1.7
3.2 Tree transplanting 0.3
3.3 Phase 1 reconstruction of Kennedy Town swimming pool 0.1
3.4 Re-provisioning of David Trench Rehabilitation Centre 0.8
3.5 Slope upgrading and natural terrain mitigation works 0.1
4. Track work and overhead line 0.5

Project and Budget Control Chart

Project and budget control charts record cost, schedule performances to ascertain actual and planned performances of the project. Normally these are based on the nature of the work breakdown structure (Chase & Aquilano, 2006). It makes use of the work packages. In this project, this may not be as applicable but may be useful. The project manager will obtain cumulative amounts for the actual and scheduled performances and drawbar graphs for comparison, as shown in Table 3 below. The above analysis may act as an early indicator as to whether the project manager will meet the parameters of the project (Reiss, 2007). Hence, it may be used as an effective tool to source for additional time or resources from management. If it is a strict-schedule project, this parameter may offer a way for the manager to organize for overtime and to crash the network diagram for a scheduled finish (Chase & Aquilano, 2006).

Table 3: Project and Budget Control Chart

CostPerformance
(000,000 Dollars)
SchedulePerformance
(years)
Project Item Budget Actual Variance Planned Actual Variance
1.0 Station Work 5,000 4,950 -150 2 1.8 -0.2
2. Tunnelling 5,000 5,600 600 1.5 1.8 0.3
3. Overground Works 4,000 3,800 -200 1.5 1.9 0.4
4. Track work and overhead line 2,000   2.0  

Work Breakdown Structure (WBS)

Work Breakdown Structure

The project manager will subdivide the project scope into manageable segments, assign them to the respective individuals, and document that information. The project manager shall specify the specific requirements of each subunit. This includes approximate budgetary allocation, performance standards, and durations. The project manager will aggregate this information into a clear format for ease of reference. Figure 1 below is a representation of WILs Work Breakdown Structure.

Work Breakdown Structure
Figure 1: Work Breakdown Structure

Project Leadership Requirements

According to Lockyer & Gordon (1996, 17), requisite skills of a project manager include technological understanding, being well versed in project economics, skill in man management, competence in systems design, maintenance, planning and control, financial competence, procurement competence, and good interpersonal communication skills. Their character traits ought to include drive, enthusiasm, dedication and humour, and a willingness to support their staff when things go wrong (Lockyer & Gordon, 1996, 17).

At WIL, Project leaders are selected based on their leadership qualities. For instance, the project manager organized a press conference to spread the awareness of noise pollution and how MTR will reduce this kind of pollution (MTR 2012, 1). He also arranged with renowned people from society for a similar purpose. This shows his communication skills. Whenever the workers have any technical problem, they always take advice from the project manager. This shows his expertise in technical matters as well. The project manager is an efficient leader as well, and he can keep unity among the workers. This develops a feeling of teamwork, and the work is accomplished with ease.

To keep the work going on smoothly, it is very crucial to maintain an organized workforce. The project manager is an expert in leadership qualities. He knows how to handle such a huge workforce. At weekends, after the duty hours, he gathers all the workers and arranges tea and snacks for them. He addresses them sympathetically and asks for any problems that they might have. This behaviour of the project manager garners honour and respect for him. The workers come forward and express their problems, and in turn, the project manager tries his level best to find solutions (Johnson, Whittington & Scholes, 2011).

Communications Matrix

Information Provider Recipient(s) Frequency Medium Location
Status Report PM Board of Directors Every 1.5 weeks Presentation Company headquarters
Report Marketing Manager Project Manager Two weeks Email Share point
Budget Performance Accountant Project Manager Two weeks Email Share Point

Risk Matrix

Risk Probability (L, M, H) Severity (L, M, H) Mitigation Approach
Team skill sets diverse and inconsistent. M H Train team members on new technology
The budget may be too small M H Allow for the board of directors to review budgets upon request of project manager
Allocated time may not be enough L M Consistent review to adjust any time. Also, the use of PERT, CPM to predict, and mange time (Reiss, 2007).
Poor final product L H Input all necessary resources and constantly review progress to allow for timely adjustments (Reiss, 2007).

Human resources and requirements for MTR project

At the start of the MTR West Island Line Project in 2009, it was anticipated that the project would create a total of 6,600 jobs over the five year period of line construction, with peak employment numbers of 3,000 employees maximum (MTR, 2009). However, the vast majority of the jobs created during the construction phase are temporary, with permanent operational staff to be engaged once the West Island Line is complete. The temporary construction employees include 1,500 people who were hired in October 2011 (MTR, 2011, 2). As regards operational staff, MTR has not yet released figures for the number of people to be employed, but it is anticipated that they will do so once they are prepared to hire them.

Project Process and Procedures

Project Plan

The WIL project is scheduled for completion by 2014. A project plan of MTR is tabled at Appendix 1. A detailed schedule is at Appendix 3.

The WIL project plan can be described in terms of the six project phases developed by Brown (1998, 10.) namely initiation, specification, designing, building, installation and operation. The gazettal of the WIL project under the Railways Ordinance falls under the initiation stage, in which the terms of reference and objectives of the project are set up, and budgets are approved.

The scheme authorization of the WIL project under the Railways Ordinance, which occurred in 2009, is part of the specification phase.

This is followed by the design phase, where the project stakeholders (architects, construction managers, engineers) explain how the project will meet the commuter needs stated in the specification phase. The next phase is building. WIL entered this phase in July 2009, with the commencement of West Island Line construction. Although the prior phases were carried out over nearly two years, Brown (1998, 12) insists that projects should not rush directly into the building, as poor specification and design may result in delays and budget overlaps. The construction phase included some civil work in neighbourhoods that have been affected by the WIL, such as the re-provisioning of David Trench Rehabilitation Centre, and the re-provisioning of Kennedy Town Swimming Pool (Phase I) which were completed in April and May 2011, respectively. The laying of the railway track began in June 2012, while the mechanical and electrical work started in September 2012. The breakthrough of railway tunnel from Sheung Wan station to Kennedy Town station occurred in November 2012 (MTR, 2012). The track laying, mechanical, and electrical work is ongoing.

The government expects that WILs installation phase will be complete by 2014. The final phase is operation and review. It can be said to be a continuation of testing. Once the project is operational, there should be reports at periodic intervals detailing how the project is running and any flaws that need to be corrected.

Project scheduling, estimating and cost control techniques

Project scheduling, estimating and cost controls are the main factors of a project management system. For companies engaged in future construction, the right forecast of the future project cost is very significant (Manfredonia et al., 2010).

The WIL Project Plan, mentioned above, is the basis of the project scheduling and cost control in WIL. Once the prospective subcontractors have been informed of the deadline for completion of their subcontracts, they submit their bids. Those, which fit within the WIL project plan parameters of time cost and quality, are selected and permitted to proceed. This is carried out at the specification phase. However, this is an ongoing process, as a subcontractor may go over budget. This is the responsibility of the particular subcontractor involved, who will cover all extra costs (MTR, 2013).

Scheduling often begins tentatively, with more detailed schedules being developed as the process proceeds. This requires consistent communication between the project manager and project stakeholders, as they will need to be informed of scheduling changes or delays in implementation. It is due to the tentative nature of scheduling that cost control is also a dynamic process. The initial schedule and cost estimates need to be revised in the light of new information acquired during the project lifespan. This means that scheduling and cost control will fluctuate during the project, as the project manager adjusts to changing circumstances.

Network Diagrams

There are two types of network diagrams. These are very useful tools in project control. There are two types of network diagrams: Project Evaluation and Review Technique (PERT) and Critical Path Analysis (CPM). They are complex decision-making tools that enable project managers to organize work and plan workflows. They provide necessary information that is vital in scheduling and budgeting. This information includes the earliest start times of a project, the latest completion times, time floats, and the critical path. The critical path is the longest route in a network diagram that indicates the time the project will take. It is hard to construct a network diagram for a project with complex times and huge budgets, but the availability of software for that purpose makes it easy. In this project, the techniques may be useful to the project manager in evaluating the progress of the project.

Use of a Gantt chart

This projects project manager may find it quite useful to engage the use of a Gantt chart in managing complexity in cost and time. A Gantt chart is an intricate tool used for the management of interrelated tasks with different durations. When using a Gantt chart, the project manager assumes that the tasks are linear, and their durations can be determined beforehand with a high degree of precision (Reiss, 2007). However, management should have duration estimates with the relevant possible contingencies.

A Gantt chart has several benefits to the project manager. First, diagrammatically represents the whole project. This makes it easy for the project manager to identify the activities to complete first and clearly, shows the relationships between tasks. Second, it shows the duration of a project. However, in as much as it may show the tasks clearly, it does not indicate dependencies among tasks and the project manager may not know from the Gantt chart how the delay of one task may affect another. For this purpose, the project manager will have to use the network diagrams (Chase & Aquilano, 2006). Figure 2 below shows the Gantt Chart for the WIL project. It indicates the start times and durations for each activity. However, it does indicate the costs. The durations are indicated in months.

Table 4: Activity Durations for Gannt Chart

Activity start duration
1.1 Kennedy town station and overrun tunnel construction 0 6
1.2 Modification of Sheung Wan Station 0 1
2.1 Access shafts at Kennedy town Praya and Hill road 7 1
2.2 Temporary underground magazine construction 7 7
2.3 Sheung Wan to Sai Ying Pun Tunnel Construction 10 4
2.4 Instrumentation and monitoring 30 4
2.5 Sai Ying Pun and Hong Kong University Station 17 3
3.1 Project site office and works area 27 4

Introduction

Illegal immigration is one of the main topics that have dominated debates across the United States for several decades. The federal government defines illegal immigration as the situation where a foreigner acts in disregard to the countrys immigration laws by either gaining entry into the United States without a visa or choosing to remain in the country beyond the expiry date of a temporary permit (Haines 16). According to the Department of Homeland Security (DHS), there are more than 15 million illegal immigrants living in the United States. The biggest percentage of the immigrant population in the country constitutes of Mexicans. The others come from Central America, Asia, Africa, South America, Europe, the Caribbean, and Canada (Varsanyi 209). Illegal immigration has been a cause of disagreement among policy makers and the public owing to the fact that the number of unauthorized residents keeps increasing every year.

The growing trend of illegal immigration in the United States is worrying because the country has one of the most complex and active immigration systems. Over the years, this topic has been a hotly contested issue in presidential campaigns, as various candidates present their proposals to the electorate on the most effective approach they would use to address the challenge (Berry 18). For example, in the ongoing 2016 presidential campaigns, many candidates participating in the party primaries have been criticized for their positions with regard to this growing policy issue. For example, Rick Perry is one of the candidates running to secure the Republican presidential ticket. He argues that the growing size of the illegal immigrant population in the country is largely attributable to the laxity shown by the federal immigration agents with regard to accepting the reality on the ground and coming up with effective strategies for addressing the issue.

Discussion

One of the main challenges the federal government faces in dealing with this situation is establishing the actual size and composition of the illegal immigrant population in the country (Varsanyi 223). Although the United States border patrol agents argue that the problem of illegal immigration is not widely spread, they have been challenged to concur with its reality. Information gathered through numerous surveys indicates that there are approximately more than 10 million illegal immigrants living in the country (Haines 21). However, the population size of illegal immigrants in the country has stabilized a lot over the last couple of years. One of the main factors that have influenced the decline is the global financial crisis that resulted in the reduction of job opportunities by a great margin. In 2012, a report released by Pew Research Center showed the population of illegal immigrants to be slightly over 11 million, which was a decline from the 12.2 million they had reported five years earlier (Haines 24).

The report also indicated that 28% of the population constituted of Mexicans who also had the highest percentage in the list of people waiting for their visas to be approved (Borjas 195). However, this number is just a rough estimate because immigration agents manage to apprehend close to 50,000 people every year as they attempt to enter the country illegally. Most of those apprehended are unaccompanied minors and women. A 2014 federal report on illegal immigration indicated that most of the illegal immigrants apprehended get into the country in order to reunite with their family members already living in the country, while others are motivated by a desire to attain a more stable livelihood (Berry 60). There is a growing concern that the number of illegal immigrants in the country is very high compared to that of legal immigrants. This phenomenon has been created by the strict immigration policies laid out by the federal government, thus barring foreigners with a desire to reside or work on the United States (Varsanyi 236).

The trends exhibited by illegal immigrants moving into the United States have changed a lot over the years. Initially, most of the foreigners who entered and remained in the country illegally lived in areas with Hispanic communities (Laham 116). However, this trend has changed a lot since the turn of the century because most illegal immigrants have managed to settle within various communities across the country. A report released by the federal government in 2006 indicated that the state of California had the highest number of illegal immigrants followed by the states of Texas, Florida, Illinois, New York, Arizona, Georgia, New Jersey, North Carolina, and Washington respectively (Borjas 207).

In 1990s, most illegal immigrants in the country had small families because they could not manage to support one without meaningful income. However, a report released in 2012 indicated that millions of people living in the country belonged to families that were headed by an illegal immigrant (Haines 39). Most of the illegal immigrants who gained entry into the United States after the turn of the century have managed to get jobs because they are educated. Unlike those that came into the country before, most of the 21st Century illegal immigrants have college education that has enabled them secure employment (Berry 71). They work in various sectors of the countrys economy such as agriculture, service industries, and construction. Their income bracket is very low compared to that of legal immigrants and Native Americans. However, the longer one stays in the country the better chance they have of earning more (Laham 123). It is also important to note that the illegal immigrant population is generally less educated compared to the Native American population.

Causes of the illegal immigration challenge in the United States

According to international relations experts, the United States ranks as one of the most desirable countries to live in because of its strong economy, prolonged political stability, and social environment (Laham 132). Most people that have immigrated to the country argue that they moved away from their native countries in search for better jobs, freedom, a serene political environment, good medical services, and increased access to education (Heron 31). These elements have played a major role in attracting foreigners seeking a chance at a better life and a secure future. However, most of the foreigners who have made their way into the United States over the years used illegal means. According to various federal reports, 5 % of the American labor force constitutes of illegal immigrants, especially in the states of Nevada, California, and Texas (Varsanyi 269). A number of factors are responsible for the emergence and the continued growing trend of illegal immigration in the country. They include geopolitical forces, economic incentives, the countrys immigration system, and the network effect.

Geopolitical forces attribute to a great share of illegal immigrants that come to the United States every year. For example, most of the immigrants that come from Mexico attribute the harsh political environment characterized by oppression and harassment by government officials as their reason for choosing to move into the United States (Heron 36). Such an environment easily pushes someone to use illegal means to cross the American border, especially when they know their visa might take long to be accepted or it might be declined. This normally happens because of a certain reasons as stipulated in the countrys immigration and customs law. Illegal immigrants from Asia and Africa also attribute lack of political will with regard to development of policies for economic empowerment and social development as their main reason for moving to the United States (Laham 140).

Poor development and implementation of social policies has forced many people from these two regions to illegally, make their way into the country where they work as commercial sex workers, indentured servants, and in some unfortunate cases as sex slaves (Varsanyi 300). Most illegal immigrants who come from Europe and the Middle East move to the United States in search for a better future, as well as the need to link up with family members already settled in the country (Heron 40). In countries such as Mexico and some from the Asian continent where the fertility rate is very high, a rapid growth in population over the years has created a huge strain on the available resources, thus making the future very unpredictable (Haines 52). This phenomenon coupled with a lack of political with regard to coming up with effective policies on sustainable development have made many people to move to the United States in search for better opportunities (Berry 100).

Economic incentives are also a major cause of illegal immigration in the United States. For example, most immigrants in the country earn more money than they would if they had similar jobs back at home. Due to the strong American economy, most employers offer their employees good wages that other countries cannot match. Therefore, many foreigners keep looking for ways to make an entry into the countrys labor market (Haines 69). A study conducted among Mexican immigrants in the United States showed that even with all the expenses incurred living in a foreign country, their revenue in a year was three times that of their counterparts back home (Borjas 149).

The slow rate of economic growth in most countries is attributable to weak economic policies that do not offer the right solutions for dealing with the increasing demand for better income and higher living standards. Some of the factors that enable employers in the United States to hire illegal immigrants include changes in the global economic structures, lack of policies to control illegal economic migration, as well as weak labor policies (Heron 66). Changes in the global economic structures have made it easy for foreign investors to have operations in the United States. This means that low-skilled workers have a higher chance of getting well-paying jobs in the United States compared to their native countries. The concept of global migration of labor has influenced many people to move across the world in search for better jobs.

The nature of the immigration system in the United States is also a major cause of the increasing size of the illegal immigrant population. The system exists based on three pillars, namely promoting family reunion, meeting labor demands, and protecting Native Americans from the competition brought by foreigners (Berry 223). According to international relations experts, the American immigration system has channels for legal migration that many foreigners exploit in order to get a chance at experiencing the American dream. The biggest available channel is the one that allows employers to hire low-skilled workers through temporary visas in order to meet the demand in the labor market. Most of the foreigners who gain entry into the United States through this channel often refuse to go back home after the expiry of their visas (Berry 231).

Most of them are apprehended by federal agents and often deported, while others remain in the country illegally. Another immigration channel that many foreigners often exploit in order to gain entry into the United States is the 675,000 ceiling that the federal government has set on the number of permanent visas that can be given in a year (Berry 235). Many people get into the country in the capacity of being spouses, children, and parents of foreigners with permanent residence because they are not included in the aforementioned limit. This element of the system means that several people that cannot gain entry into the country through legal means, thus the option of using illegal avenues to cross the border (Haines 108). In most cases, people who get temporary work related visas choose to extend their stay in the country after their expiry dates because they know getting another opportunity is difficult and cannot stand a chance of loosing a well-paying job (Heron 73). Although it is illegal for any employer to hire an employee who is in the country unlawfully, the trend keeps growing owing to the fact that it is extremely difficult to verify the authenticity of documents.

One of the decisions that have played a major role in illegal immigration in the United States is the cancellation of the Bracero program, which allowed Mexican citizens special visas to work in American farms during the harvesting season (Laham 153). The program lasted for 22 years from 1942-1964, a period in which the United States benefited a lot from the input of Mexicans who replaced American citizens that had joined the army during the World War II. Although the program provided legal permits to qualified Mexicans, a great number of them that had failed to meet the qualification grade moved to the United States illegally in search for employment (Laham 155). Following the termination of the program in 1964, many Mexicans working in the United States chose to remain in the country illegally. International relations experts argue that the main reason as to why the Mexican workers were not willing to go back home at the time was the fact that they were not offered any monetary incentive to substitute the income they were getting (Laham 157). This phenomenon explains why the biggest percentage of the illegal immigrant population in the United States constitutes of Mexicans.

Another cause of illegal immigration in the United States is the network effect that develops out of the family reunification pillar of the immigration system. This effect is common among Mexican immigrants who have been in the country for several decades. Most people in Mexico keep making efforts to reunite with members of their extended family living in the United States (Borjas 236). Since most of them cannot get visas, they choose to use illegal means to be in the country. There more the illegal immigrants keep settling in the country, the larger the community gets over time. These communities slowly act as bait to the people in their native land to move to the United States and become part of the growing family in a foreign country (Heron 107).

The development of the network effect is attributable to several factors that have also influenced the growing number of illegal immigrants in the United States. These factors include the low cost of communication, transportation, and information services between the United States and Mexico (Haines 118). These factors have played a major role in the high number of Mexicans living illegally in America because the cost of crossing the border is far much less compared to foreigners coming from Asia, Europe, and Africa. Most Mexicans unsuccessfully attempt to cross the border several times before managing to get to the United States because a singe effort does not cost much (Borjas 251).

Impacts of illegal immigration in the United States

According to federal reports on illegal immigration in the United States, it is very clear that the phenomenon has had huge impacts on numerous elements of the American culture. The mushrooming size of illegal immigrant population has affected the countrys economy, health delivery system, the environment, as well as the security parameters (Berry 330). One of the economic impacts is that illegal immigrants have led to a breakdown in the wage structure due to the entry of low-skilled labor (Lee 8). Many American employers prefer hiring the illegal immigrants because their labor is cheap and would not complain even if when subjected to exploitation (Arnold 500).

This has led to a decline in the minimum wage offered to employees working in certain sectors. The counter effect of this change is the widening gap between the rich and the poor owing to the fact that there is an uneven distribution of wages and employment opportunities for legal American citizens greatly reduce (Lee 10). Another economic impact of illegal immigration is increase in housing prices, as residential real estate developers have acquired a culture of exploiting the growing communities of illegal immigrants (Arnold 519). A study on the state of the countrys real estate industry established that the prices of houses are very high in regions with a huge number of illegal immigrants (Berry 312). This means that legal American citizens living in those regions tend to suffer a lot because the housing prices in other regions remain within normal rates.

Taxation and provision of social services are important elements of the American economy. According to federal reports, illegal immigrants receive a lot of money through social services although they do not contribute a lot through taxation (Haines 211). This has in turn affected the effectiveness of federal, state, and local budgets because there are very many people supported in various ways without making any notable contribution (Lee 14). However, the availability of illegal immigrants has attracted the attention of financial institutions through mortgages as they sought to grow their revenue from the unexploited resource. This discovery led to numerous changes in the banking industry characterized by criticisms of financial institutions for encouraging illegal immigration through lucrative incentives. Many critics argue that the trend of giving mortgages to illegal immigrants exposes the countrys economy to great danger because unsustainable lending practices were inevitable (Lee 19). However, many banks exuded confidence in their decision citing it as a one of the avenues for economic growth because the poor implementation of immigration laws meant that their clients would not be easily deported. Financial analysts argue that this trend, which started a few years after the turn of the century, was one of the factors that led to busting of the housing bubble that had a huge influence on the global financial crisis (Arnold 535).

Illegal immigration in the United States has also led to the federal government incurring many expenses in law enforcement efforts. For example, the process of apprehending and deporting illegal immigrants uses many resources, which put a lot of financial strain on the government. The apprehended foreigners often have to be detained at a cost of $ 90 per person everyday before they are deported from the country (Lee 25). This is a huge expense that the government incurs every year in its efforts to protect the sovereignty of its people. Due to the dynamic nature of strategies applied by foreigners entering and staying in the United States illegally, the boarder control agents have employed the latest technology in monitoring the countrys boarders (Haines 238). The DHS reports that the number of people apprehended trying to cross the boarder illegally has tripled from the time the technology was installed.

The health care delivery system is another element that suffers a lot due to illegal immigration in the United States. Federal reports indicate that the high number of illegal immigrants have reduced the quality of emergency preparedness and the public health management systems. The DHS argues that their efforts with regard to developing emergency systems have become fruitless because they cannot establish the exact population in certain areas owing to the high number of illegal immigrants (Lee 27). The same case applies when delivering public health services in areas where the exact number of people in need of assistance is hard to determine. Lack of documentation showing the demographic composition of a region affects the effectiveness of delivery plans (Haines 300). Public health delivery systems cannot work without enough funding and workforce, all of which are provided depending on the exact number of people being served. The effectiveness of the health care delivery system is further heightened by lack of good communication between health care workers and illegal immigrant who do not understand any other language apart from their native one (Arnold 601).

Illegal immigration also influences a lot on the state of security in the United States. According to the DHS, there are a significant number of illegal immigrants involved in various forms of crime across various regions in the country. A study conducted on the security status in the state of California established that 17% of inmates were illegal immigrants who were waiting to be deported as soon as they finished serving their jail term (Haines 356). Although most illegal immigrants act keenly in order to avoid any form of interaction with law enforcement agents, lack of employment pushes them to commit petty crimes for survival. Interestingly, regions with a high number of illegal immigrants have fewer cases of violent crime. Studies that have been conducted with regard to the relationship between immigration and crime rates in the United States have contradicting results that make it hard to make a reliable conclusion. However, the DHS reports that cases of violent crimes involving illegal immigrants are very common in border counties (Haines 359).

These cases mainly involve smuggling of goods and human trafficking. Once those involved in these forms of crime manage to settle in the country, they continue with their criminal activities. For example, in 2009 the federal government released a report on the state of crime in los angels and identified a number of illegal immigrants that were members of the 18th street gang. According to the report, 80% of the gang members who had a questionable immigrant status were identified as natives of Mexico and Central America (Arnold 631). The main criminal activities of the gang were drug trafficking, carjacking, extortion, and homicide. In addition, the gang was also associated with the numerous cases of robbery, identification fraud, and drive-by shooting cases reported in the city (Arnold 636). Illegal immigrants are also involved in cases of terrorism, which ranks as one of the major threats to the security of the United States.

The federal government has also noted environmental degradation as one of the major impacts of illegal immigration, especially in its border with Mexico. The degradation often develops from the high number of abandoned cars in the lands along the border (Roberts 6). In addition, the high numbers of illegal immigrants that walk trough the lands as they enter the country leave a lot of litter behind, which eventually lacks someone to collect. Reports by the immigration department also state that the illegal immigrants are responsible for the numerous wild fires reported on various American borders as they use them to distract the movements of immigration agents watching the borders. These fires destroy thousands of acres land that also cost a lot in taxpayers money with regard to damage control (Lee 30). Other reports indicate some illegal immigrants die or suffer serious injuries during their attempts to cross the American border (Roberts 13). This normally happens when the foreigners try gaining entry into the country through dangerous zones that have wild animals or have do not have somewhere one can seek help.

Policies for addressing illegal immigration in the United States

Since the first cases of illegal immigrants were reported in the United States, the federal government has come up with a number of legislation geared towards stopping its development. According to the countrys immigration laws, any illegal immigrant apprehended is liable to a fine, jail term or both. It is illegal for anyone living in the United States to dodge inspections carried out by immigration agents, as well as providing false information in order to gain entry and remain in the country (Berry 470). These offenses attract a maximum jail term of two years depending on the degree of violation. The federal government has developed a number of policies geared towards preventing illegal immigration. One of the policies on employment stipulates that illegal immigrants in the United States are not viable to receive privileges such as getting a professional license to work (DeLaet 80).

However, due to the numerous efforts human rights groups, states such as California have made amendments to the policy in a bid to reduce crimes related to work permits. During the tenure of President George W. Bush, the federal government created a policy that would require employers to submit information about their employees for auditing in a bid to uncover illegal immigrants (DeLaet 85). This policy has been very effective under the current government led by President Barrack Obama, who has often reiterated the need to clean up the mess that is denting the countrys immigration system. Illegal immigrants uncovered through the audit process often face deportation as soon as their immigration status is confirmed.

Over the years, the federal government has made numerous efforts to increase the security and patrol activities in its borders in a bid to apprehend foreigners gaining entry into the country through places that are not designated as immigration points (Berry 486). One of the plans has been fencing the countrys border with Mexico, which has been a major entry point for many illegal immigrants in the country. The federal government has invested many resources in securing the countrys borders by employing thousands of patrol agents (DeLaet 89). However, the fence that covers a third of the 2000 miles long border has slowly been turned into a political issue and a source of attack from human rights groups (Arnold 700). The current administration has had to deal with numerous challenges while addressing this problem owing to the intense pressure coming from various human rights groups. They argue that the government should propose a new strategy for dealing with them because in reality they make a huge contribution to the growth of the economy (Haines 501). However, the countrys strict policy on threats to national security such as terrorism has left the government with no choice other than employing tough measures to stop illegal immigration.

One of the legislation that has helped in addressing this problem is the U.S. Patriot Act of 2001. This legislation came following the September 11 terror attack that alerted the federal government on the huge threat posed by laxity that was going on within immigration department (DeLaet 100). This act gave federal agents and the DHS to apprehend and deport any illegal immigrants suspected of involved in terrorist activities. In addition, any illegal immigrant found to have any form of association with a group or organization marked as a threat to the countrys security should be deported immediately. Over the last couple of years, the Obama administration has faced a lot of criticism from human rights groups with regard to the implementation of this legislation, which they feel has greatly violated the rights of the apprehended people. The act provides that an apprehended illegal immigrant should not be given a hearing, but otherwise deported immediately. The federal government argues that it cannot take chances on the safety of its people by showing mercy on criminals.

Terrorism has been a major issue with regard to homeland security, and reports indicate that illegal immigrants in the country have often been easy targets for terrorists seeking people to help them in their missions (Roberts 20). In some cases, the apprehended individuals are tried for being in the country illegally before being deported. However, the process of deportation has its own complications that have made the process of reducing the illegal immigrant population less effective. One of the challenges is importing children who are American citizens by birthright yet their parents are illegal immigrants (Roberts 27). Many human rights groups have used this issue as the basis for attacking the federal government over it policy on illegal immigration. They argue that deporting an illegal immigrant parent yet their children are legal American citizens is a violation of the constitutional rights of the minors. However, the government has refused to change its position as provided for in the deportation laws of 1996 (DeLaet 109). The only change that has happened under the leadership of President Obama is a reduction in the number of deportations, owing to the introduction of a system categorizing illegal immigrants into priority groups based on their possible threat to the countrys security.

Another legislation that has formed the basis for illegal immigration policies in the United States is DREAM Act that has failed to pass since its introduction to the senate in 2001 (DeLaet 129). This legislation focuses on the development and education needs of alien minors. According to the provisions in the act, illegal immigrants that have minors born in the country can get temporary residency that involves a number of conditions that have to be met before receiving permanent residency (Arnold 778). Its proponents argue that it would be a good strategy for reducing the number of illegal immigrants because they would be registered, thus making it easy for the government to track their movements. However, the administration of President Obama has enacted a few provisions from the act in a bid to regulate the cost incurred by the federal government while addressing the problem. For example, eligibility for Deferred Action for Childhood Arrivals (DACA) requires the applicants to prove that they started living in the country before turning sixteen years, have enrolled in high school or completed, acquired a GED certificate, as well as their innocence with regard to conviction for any offence (Roberts 44).

Conclusion

The United States of America is one of the most desirable countries to live in owing to its stable economy, good political environment, education system, and good record in promotion of human rights. There are several conclusions with regard to the issue of illegal immigration in the United States. First, the challenge of illegal immigrants in the country is a reality that the federal government needs to address with the utmost priority. The mushrooming size of the illegal immigrant population is a huge source of threats to homeland security. Owing to the fact th

Wellbore stability definition

Wellbore stability refers to sustainability of the borehole from falling or breaking down and is achieved through use of drilling fluid programs, casing programs and efficiencies of drilling operating procedures (Simangunson et al, 2006). Wellbore stability is achieved through identification; adoption and implementation of best practices (cf. Yongfeng et al, 2009). Sustainability of wellbore stability is influenced by appropriateness of data while drilling operations are in progress. Effectiveness of wellbore stability and predictions depends on physical properties of the rock, present stresses and pore pressures and variability of the drill model prediction (Gisolf et al, 2009).

The wellbore stability is influenced by controllable factors and natural factors (uncontrollable factors).

The engineering controllable factors that influence wellbore stability

  • The mud density and prevalent bottom hole pressure
  • Inclination and Azimuth of the well
  • Transient pore pressures
  • Chemical properties of the rock and subsequent rock-fluid interaction
  • Physical properties of the rock and subsequent rock-fluid interaction
  • Vibration level of the drill string
  • Thermal temperatures
  • Absence or presence of erosion

The engineering natural factors that influence wellbore stability

  • Incidents of Faults formations
  • Incidents of Natural fratures on rock
  • Incidents of increased Stresses especially high-in-situ
  • Incidents of increased Stressed formations for instance tectonic
  • Prevalence of Formations that are unconsolidated
  • Prevalence of induced over-pressured shale collapse
  • Prevalence of naturally over-pressured shale collapse
  • Possible prevalence of mobile formations

Mechanism of achieving wellbore stability

Wellbore stability (Weinheber et al, 2010) could be achieved through conducting finite element analysis. Finite element analysis via FLAC makes it possible to determine factors that affect depth that a fluid penetrates. The depth that a fluid penetrates is important considerable factor when carrying out horizontal drilling (cf. Cantaloube et al, 2010). Finite element analysis makes it possible to determine wellbore stability when simulated production is in progress.

Wellbore stability could be achieved by controlling coal fine content (Kristiansen, 2004) that is generated when drill bit action carries drilling fluid into cleat system. This results into plugging of the permeability pathways and contributes into formation damage.

In the event wellbore develops instability subject to pressure drawdown (Estep et al, 2010), a perforated or slotted production liner could be used. The depth of fluid penetration should be maintained at 2.2 metres (cf. Chen et al, 1998). The 2.2 metres is recommended if there are no opportunities for filter cake formation (Weinheber et al, 2010). Finite element analysis via SLAC has demonstrated a small diameter for instance 5 centimetres has a higher preference subject to its contribution in wellbore stability.

Wellbore stability (Hawkes & McLellan, 1997) that is negatively influenced by lost circulation and differential sticking should be achieved through pulling of the drill pipes. This provides opportunity for running casing. There should be management of annulus and frictional pressure losses that influence of effective circulating density (ECD). Management of ECD (Zhang et al, 2006) results into management of possible lost circulation. As a result, lower mud weights are recommended since they make it possible to achieve required bottom hole pressure that contributes into sustainability of the wellbore stability.

Advantages of wellbore stability

  • Decreased damage to formation due to low reactivity of the water
  • Minimization of clay sweeling and wellbore stability problems
  • Stabilization of temperatures
  • Reduction of waste production
  • Improved rate of penetration and efficiencies of circulation
  • Increased lubrication that decreases chances for friction
  • Prevention of hydrate formation

Disadvantages of wellbore stability

  • It increases costs
  • Increases time

Wellbore instability

Wellbore instability (Nguyen et al, 2007) is defined in terms of nature or mechanism the rocks respond to natural or induced overpressures about the wellbore when drilling operations are in progress. The response of a wellbore depends on concentration of stress. Wellbore instability (Chen et al, 1998) differs based on formation damage and level of interaction of the drilling fluid. Thus, wellbore instability is influenced by interplay of mechanical factors, chemical, hydraulic and thermal factors (cf. Hawkes & McLellan, 1997).

Management of wellbore instability ought to consider a rock as a continuous material which means; failures that occur in a wellbore and affect wellbore stability should be taken as single initial failure point. While consideration for single initial failure point ought to be put into account (Maury & Sauzay, 1987), the rock ought to be considered as a discontinuous material and is subjected to stress. This means, instability of a wellbore arises due to single point failure (Hawkes & McLellan, 1997).

Despite influence of single point failure as contributor to wellbore instability, the wellbore should be capable of accommodating casing controls (Gaurina-Medimurec, 1994) and possible installation of a downhole apparatus. This is in the event of considering possibilities of noncircular and irregular layout of the rock subject to discontinuity or continuity of the materials. Wellbore instability (Maury & Sauzay, 1987) is managed well through grain scale Discrete Element Modeling (DEM).

DEM takes into account the discontinuity or continuity of the rock material. DEM is achieved through rock modeling as a function of grains that are bound by cement like content and there exists pore spaces between the grains (Gauriona-Medimurec, 1994). This implies any possibilities of a micro crack of the rock because of influence of tensile failure or shear failure is attributed to concentration of stress.

Causes of wellbore instability

Wellbore instability (Nguyen et al, 2007) is classified on the basis of mechanical or chemical properties. The mechanical factors (Gaurina-Medimurec, 1994) that predispose wellbore instability include mechanical failure of the rock which occurs around the wellbore (Yongfeng et al, 2009), high mechanical natural (Chen et al, 1998) or induced stress (Gaurina-Medimurec, 1994), low tensile strength of the rock (Hawkes & McLellan, 1997) or low shear strength of the rock (Chen et al, 1998) and implementation of inappropriate drilling practices (Nguyen et al, 2007) that impact negatively on the wellbore stability.

The chemical causes of wellbore instability are brought about by chemical interaction (Nguyen et al, 2007) of the drilling fluid and the rock subject to presence of minerals that are water soluble. Mechanical and chemical wellbore instabilities contribute into drilling complications that make the process unsustainable in terms of costs incurred in managing wellbore instability predisposing factors (Zhang et al, 2006). This implies analysis of wellbore stability during planning phase should account for economies of scale brought about by wellbore instability.

Wellbore instability (Nguyen et al, 2007) results from inaccurate determination of pore pressures. These inaccuracies are made when carrying out wellbore stability analysis and contribute into costs incurred through stuck pipes, lost wellbore, damaged formations, increased costs of drilling operations and increased incidents of wellbore lost circulation.

The major contributors for wellbore instability that are secondary to mechanical and chemical causes include washing, reaming and overpull (Nguyen et al, 2007), vulnerability of bottom hole assembly to sticking (Gaurina-Medimurec, 1994), losses of the drilling fluids (Chen et al, 1998), and failure of the casing reaching the bottom (Maury & Sauzay, 1987). The wellbore instability has been managed through drilling of a sidetrack. There is therefore need for improving geomechanical models and optimization of drilling practices in order to reduce chances of wellbore instability.

The indirect indicator for prevalence of wellbore instability

  • Prevalence of friction that contributes into high torque and drag forces
  • Rising incidents of circulating pressures
  • Possibilities of hanging up of drill strings casing or coiled tubing
  • Possibilities of rise in circulating pressures
  • Incidents of stuck pipes
  • Incidents of increasing drillstring vibrations
  • Possibilities of drill string failure
  • Incidents of control problems
  • Incidents of incapabability to control and run logs
  • Incidents of inappropriate logging responses
  • Incidents of leakage of gases subject to poor cementing procedures
  • Vulnerability of keyhole seating
  • Incidents characterized by rising doglegs

The direct indicators of wellbore instability

  • Poor calibration leading to oversized hole
  • Poor calibration leading into undergauge hole
  • Vulnerability to excess volume of cuttings
  • Vulnerability to excess volume of cavings
  • Possibilities of cavings at the surface
  • Possibilities of hole fall post tripping
  • Utilization of excess cement

Problems with wellbore stability

Problems that affect wellbore stability are based arise during initial planning phase (Wolfe et al, 2009). The planning phase fails to provide a stable design that accounts for possibilities of casing and fluid plan, nature of trajectories and challenges that affect the trajectory. This implies, unmanaged geomechanical problems that could affect the stability of the design contribute into wellbore instability. This predisposes the wellbore to collapse, lost circulation, stuck pipes and possibilities of casing collapse (Cantaloube et al, 2010).

It also provided environment for damage of the reservoir and inability to achieve required logging data which makes wellbore real time stability forecasts difficult and undependable. Some challenges that affect drilling as a function of wellbore stability problems include vulnerability to deviated wellbore, near salt, stress based areas (Simangunson et al, 2006). The stratums in tectonic zones pose problems of wellbore instability. Possibilities of intersection of weak bedding planes and unfavorable angles present problems to wellbore stability since they have capacity to provide opportunities for mud and fluid infiltration that finally contribute into collapse (Tan et al, 2004).

Methods for recovering wellbore stability

Wellbore stability could be recovered by recovering lost circulation material (Estep et al, 2010). This is based on a method for recovering lost circulation materials that involves directing fluid into the drill. The material should have sufficient magnetic property than the material being recovered (Zhang et al, 2006). This should be followed by magnetic separation of the materials based on strength of magnetism. The materials that cannot be recovered through use of magnetic separation should be separated through centrifuging or solution process. This utilized the property of different solubility properties of the materials. The materials that cannot be recovered should be disposed off safely (Tan et al, 2004).

Methods for managing the materials that cannot be recovered

The materials are disposed offshore or discharged overboard from the drilling vessel, a process that is termed as offshore discharge (Chen et al, 1998). The materials are treated by using solid control equipments. This occurs if the materials have no negative impacts on the aquatic life (Gaurina-Medimurec, 1994). The materials could be disposed off through offshore reinjection by being ground into fine materials before they are disposed. The materials could also be onshore disposed. In onshore treatment, the materials undergo thermal desoption or are used for land filling and land spreading.

Maintaining wellbore stability

Maintenance of wellbore stability is important process in drilling operations. Maintenance of wellbore stability has been based on failure studies on wellbore stability (Tan et al, 2004). Maintenance is achieved through use of managed pressure drilling. This involves use of surface pressure. Downhole problems should be reduced by appropriate casing control measures (Zhang et al, 2006). This involves casing while drilling method.

In presence of high tectonic stresses, wellbore stability should be maintained by decreasing opportunities that could result into collapse of the wellbore subject to interferences of over pressured shale. There should be balance between hydrostatic pressure and fracture pressure (Cantaloube et al, 2010). Adequate casing off of the formation damages should be done. This should be coupled with use of sufficient drilling fluid.

Preventing wellbore instability

Prevention of wellbore instability is important step in drilling operations. The approach for managing wellbore instability affects sustainability of drilling operations like cement zonal isolations (Hawkes & McLellan, 1997). Wellbore instability increases costs and affects completion. Wellbore instability should be prevented by wellbore stability forecasts through use of wellbore real time stability analysis. There should be ongoing wellbore measurements in order to determine mechanism through which drilling operations affect wellbore (Nguyen et al, 2007). Drilling operations impact on LWD measurements hence need to use real time images and drilling data in order to ensure remedial strategies for risk management are implemented timely.

Differences between onshore and offshore wellbore stability and instability

Onshore drilling is affected more by wellbore stability than offshore drilling (Nguyen et al, 2007). This means, approaches towards management of wellbore stability should be concentrated on onshore drilling than offshore. Improved approaches for management of wellbore stability in onshore drilling could result into decrease of costs in terms of well construction and production operations. This is due to higher temperatures and unconsolidated sand. Onshore drilling is affected more by presence of deposits of gas hydrates and pore structure fractures that impact negatively on the wellbore stability (Chen et al, 1998).

In onshore, possibilities of increased wellbore stresses are much higher than in offshore which impacts on wellbore stability. The problems of lost circulation are more pronounced in onshore than in offshore. As a result, incidents of stuck pipes and wellbore collapse are much evident in onshore than in offshore. Due to incidents of wellbore stability and instability in onshore drilling, it is important to carry out wellbore stability modeling (Hawkes & McLellan, 1997).

Wellbore stability modeling facilitates in wellbore design by helping to determine wellbore trajectory. The process results into identification of hazards that could be incurred. This helps in risk analysis and mitigation. The wellbore stability real time forecasts are therefore important in onshore drilling and operations. Real time forecasts help in determining possibilities of breakout areas and possibilities of drill induced fractures (Maury & Sauzy, 1987). This means, adoption of wellbore real time stability forecasts plays an important role in geomechanical analysis of rock materials on basis of discontinuity or continuity hence positively impacting on the success for the drilling operation.

In onshore drilling, geomechanical responses are influenced by variation in depressurization induced gases that are produced from deposits of onshore hydrates. As a result, a reservoir wide pressure decline occurs (Nguyen et al, 2007). Due to variation in pressures, differences emerge between vertical and horizontal wellbore. In offshore, reservoir depressurization results into anisotrophic stress that contributes into shear failures. This results into decrease in the loads casing as observed in vertical wellbore. The management of the failures requires management of perforation. The problems in onshore arise due to rise of compression on the upper segments of wellbore casing. As a result, there occurs local shear failure and local shear yielding which affects bonding between grains (Yongfeng et al, 2009). The outcomes are characterized by formation of cavities within the perforations. The stability could be maintained by managing localized shear failures.

Significance of Wellbore stability forecasts

Wellbore stability forecasts are important in drilling operations because they facilitate in determination of drilling related failures (Wolfe et al, 2009). The common drilling failures arise from unstable boreholes subject to possibilities of lost circulation, stuck pipes and lack of casing control. Wellbore stability forecasts makes it possible to determine behavior of wellbore stability and utilize the knowledge that is acquired post forecasts to carry out modeling in real time (Estep et al, 2010).

Wellbore stability forecasts helps in providing real time wellbore instability incidents and their prevalence rates. It facilitates in determining mode of failure hence institute appropriate mitigation approach timely. This helps to minimize costs and pave way for time management. Wellbore stability forecasts provide opportunity for designing and development of stable trajectories and determination of mud weights hence identification of optimal equivalent circulating density (Zhang et al, 2006).

Wellbore stability forecasts and wellbore real time stability makes it possible to gain knowledge on prediction of pore pressure and management of failure modes, provides opportunity for planning and trajectory optimization as well as prediction of reservoir compaction (Cantaloube et al, 2010). The primary function of wellbore stability forecasts is to determine reservoir stimulation designs in onshore drilling, determine appropriate perforation design that could be implemented and provide necessary information on earth stress analysis. It also makes it possible to determine selection of mud weights hence facilitate in wellbore cleaning designs that could be effectively be implemented.

Advantages of conducting wellbore stability forecasts

  • To decrease opportunities for non-drilling time
  • To decrease opportunities for casing strings
  • To decrease production time by optimizing on operational time and production resources
  • To facilitate selection of the mud
  • To make it possible to implement appropriate wellbore cleaning design

Wellbore real time stability

Wellbore real time stability is a function of real time updates that is realized through the use of geomechanical modeling outputs (Zhang et al, 2006). The model outputs are generated based on actual geomechanical conditions as drilling operations progresses. Wellbore real time stability is fundamental in providing real time updates within a timeframe that could create environment for proactive decision making as operations processes progresses (Simangunson et al, 2006). Wellbore real time stability contributes into close to real time monitoring of drilling operations as well as providing foundation for wellbore stability modeling.

Wellbore real time stability forecasts provide opportunity for remote monitoring of drilling operations. Thus, modeling and wellbore risk management strategies are appropriately allocated (Kristiansen, 2004). This helps in improving drilling performance and safety assurance. Wellbore real time stability analysis provides real time streaming data that facilitates conceptualization of stability incidences.

It provides opportunity for conducting sanding studies and determination of completion design through identification of uncertainties through uncertainty analysis (Estep et al, 2010. Wellbore real time stability provides vital information that is important in carrying out kick analysis, reservoir studies, provision of drilling reports and provision of geophysical data with regard to sonic, density and seismic impacts.

Software used to model well to predict wellbore stability

A variety of software is used in wellbore modeling to predict wellbore stability. The software is used based on the needs for the wellbore stability. For instance, the Borehole Integrity Analysis System (BIAS) whose copyrights are owned and controlled by Bakers Atlas has capability to compute the quantity of wellbore breakout that could be achieved subject to variation of mud weights (Simangunson et al, 2006). BIAS makes it possible to select the right mud weight that conforms to determined size of breakout. Thus, BIAS make sit possible to use lower mud weight. BIAS makes it possible to stimulate drilling induced features.

Bias provided necessary information on stuck pipe of loose mud. Another software that could be used is a window based ERDesigner (Gisolf et al, 2009). The window based ERdesigner makes it possible to generate colored reports automatically, development of a preliminary well plan. The window based ERdesigner makes it possible to determine rig type and power requirements and provides analytical data that could be used for implementation of the drilling program. DRILLWORKSPREDICT PROFESSIONAL 2004TM software family could be used.

The DRILLWORKSPREDICT PROFESSIONAL 2004TM includes software like Drillworksproject, Drillworkspressbase, Drillworks3D, DrillWorksPREDICTTM and DrillWorksGeostress. For instance DRillworksAnaseis software is known for coreection of seismic bias and makes it possible to carry out seismic processing which is improntant element in geopressure analysis. The software makes it possible to conduct real time wellbore stability analysis (Estep et al, 2010). It makes it possible to identify and correct opportunities for shear failures, fracture and lost circulation.

Data needed to predict wellbore stability

Prediction of wellbore stability requires use of sonic data either in form of DTP or DTS (Estep et al, 2010). The density related data and shale indicators are communicated. The process of data communication is carried out in real time. The rock mechanical analysis, assessment and evaluation are carried out on site through a LWD system that is installed on site (Cantaloube et al, 2010). In absence of an on site LWD system, the data could be communicated over the internet to the office for further analysis. LWD caliper measurements are done, based on logging toll and wellbore wall. Maximum and minimum axes of ellipse could be computed in order to determine orientation of the axes. The outcomes are a three dimensional wellbore caliper images. These are created after logging.

Use of high resistivity images (Simangunson et al, 2006) that are either two or three dimensional make sit possible to determine orientation of fractures. The information makes it possible to optimize on wellbore direction that could contribute into higher production. Other data elements that are important include fracture frequency, fracture size and fracture location (Zhang et al, 2006). The three elements of fracture contribute in design, remedial plan development and analysis of a reservoir and its corresponding future engineering processes. Angles of trajectory are also determined.

The failure modes and economic significance

The common failure modes that impact on wellbore stability are brought about by incidents of tensile failure (Wolfe et al, 2009), shear failure or possibilities of matrix or collapse of the pore (Zhang et al, 2006). The common indicators of preeminent failure modes include vulnerability to hydraulic fractures that may be natural or synthetic. It could also be elevated by possibilities of local mobilization of existing faults.

Failure modes could be stimulated by incidents of spalling that arise subject to incidents associated with swabbing and tripping (Wolfe et al, 2009). Failure modes in onshore drilling could be brought about by effects of drag force. Drag force has capability to contribute into increasing sand production. Failure modes have also been identified to develop from ductile formations that arise from subsalt or salt, their corresponding evaporates. Possibilities of soft shales could result into squeeze that could result into restriction of the wellbore. Incidents of swelling have higher capability of contributing into failure modes (Kristiansen, 2004).

The stability of the shale

The stability of the shale is affected by interaction of one or more several factors for instance period of exposure (Simangunson et al, 2006), the degree of filtrate chemistry applicable or degree of solution process (Tan et al, 2004), the rate of ionic transport and feasibility of dehydration. The chemical property of the shale could result into chemical instability. The outcome is characterized by impact on the mud weight and possibilities of water influx (Weinheber et al, 2010).

Influx of water as ionic component could contribute elevates instability. Water infiltration contributes into increase of wellbore pore pressure that in turn results into decrease of the strength of the shale. The outcome manifests itself due to existence of a potential gradient between the wellbore pressure and the shale pore fluid pressure (Nguyen et al, 2007). It could also result from possibilities of chemical potential difference which contributes into local gradient between the drilling and the shale pore fluids.

The smectitic shales

Smectitic shales are characterized by increasing ductility and creepiness (Yongfeng et al, 2009). Smectitic shales contribute are associated with features like decreased wellbore pressures. The wellbore pressure impacts negatively on stability through acceleration of the creepiness (Maury & Sauzay, 1987). The smectitic shales result subject to sensitivity of the mud filtrate ionic strengths that is subject to chemical properties. However opportunities for inhibition could result following sweeling and slouging of the shale (Chen et al, 1998). Smectitic shales are managed through use of salt, gilsonite and synthetic polymers that have capability to increase stability by decreasing ductility which tends to translate smectitic shales into illitic shales.

The significance of illitic shales

Illitic shales are characterized by higher concentration of quartz (Zhang et al, 2006). This makes illitic shales to demonstrate higher stability compared to smectitic shales. Due to decreased ductility property, the illitic shales exhibit brittleness and hence inert (Kristiansen, 2004). The failures that are associated with illitic shales are brought about by increased pressure drawdown. This is subject to brittleness and energy that has been stored between the pore fluids.

Costs of damage and solutions

Wellbore construction costs fall into three categories namely the lost circulation costs, stuck pipes and flat time that are encountered during casing points (Wolfe et al, 2009). Delay in responding to wellbore instability creates environment for increase of the costs due to changes in geopressures and geo-stresses. The costs with regard to wellbore stability should be determined at wellbore planning phase, wellbore real time stability forecasts as the drilling operations are ongoing and during post drilling analysis.

The costs of the damages are caused by lack of wellbore real time stability forecasts (Zhange et al, 2006). Wellbore real time stability forecast helps to identify failure criteria models hence contributing into improvement of drilling methods or proposal for implementation of improved drilling method operations. Wellbore real time stability forecasts helps to determine strength of the existing rock hence designing of improved methods of improving wellbore stability and managing wellbore instability.

The management of costs of damage should be based on impact of time and fluid chemistry of the rock material which would contribute into understanding of wellbore stability and instability (Kristiansen, 2004). The cost of damage should be a function of relationship between analytical and finite element modeling. The methods that should be implemented should be based on feasibility towards management of wellbore stability and instability subject to application or remodeling of existing models for prediction of wellbore stability (Wolfe et al, 2009).

Analysis should provide balance between impacts of temperature and interaction of streamlined workflow based on utility of stochastic modeling. The outcome of temperature and streamlined workflow should be evaluated against correlation data on the strength of the rock material. Use of stochastic modeling should be based on designing and constructing a predictive model.

Sustainability of wellbore stability

Sustainability of strategies for managing wellbore stability and wellbore instability lies in capacity to development of software that can provide close to real time pore pressure and prediction of fracture gradient (Estep et al, 2010). This would result into implementation of real time drilling productions and processes. There is need for improvement of methodologies for managing wellbore stability and instability at onshore and offshore operations. There is need for research and development on prediction of subsalt pore pressure (Weinheber et al, 2010). This should be achieved through the use of three dimensional earth modeling.

The oil and gas drilling industries should focus on maintenance of wellbore integrity. The requirement for integrity should be achieved through efforts and investment in research in order to attain casing reduction and decreased mud related expenses (Cantaloube et al, 2010). This should be based on contingency casing designs. This means identification and adoption of best practices should form core foundation for improving wellbore stability prediction and real time forecasts.

References

Cantaloube, F., Spickett, R., Yekta, K. and M. Anderson, (2010) Optimization of stimulation treatments in naturally fractured carb

Abstract

The September 11 attacks in the US brought mixed fortunes to the safety of the aviation industry because over the years, the world has witnessed increased aggression by terrorists and other criminals in launching airport attacks. Even though terrorism is a big threat to the safety of commercial airports, the scope of this paper transcends terrorist threats to include other aspects of safety in the operation of commercial airports. Some of these aspects include the building of residential and commercial buildings (in and around airports), runway incursions, runway excursions and bird strikes (among other natural disasters that may pose a risk to the safety of commercial airports). These are the existent security threats identified in most commercial airports around the world. Based on these security threats, this paper questions the usefulness of traditional safety considerations for commercial airports. Instead, this paper proposes new methods of improving the safety of commercial airports by recognizing the diversity of airport threats and the need for integrating human inputs into safety management systems. However, this paper recognizes the need to maintain traditional security measures but it also challenges the relevant authorities to improve such systems by incorporating new security measures that can deter present-day criminals. The realization of improved safety in our airports therefore warrants a renewed focus on how we perceive airport security threats.

Introduction

Flying is the safest mode of transport (Gladwell 2001, p. 53). This statement characterizes the airline safety perception among most travelers. From, this statement, undoubtedly, the level of safety in the transport industry is a crucial factor to consider while making the decision to determine which mode of transport to use. Though there is a common perception among many observers that airline transport is the safest form of transport, few people know the extremes that airline personnel have to undergo to ensure the industry remains safe (Wiener 1988, p. 433). However, many people are involved in ensuring that airline transport is safe. They include, flight engineers, pilots, airline manufacturing companies, commercial airline companies and air traffic organizations. These institutions are mandated to ensure the airline industry remains safe and newer methods of airline safety control are properly integrated into existing safety systems.

The commitment to ensure airline safety is normally evident in different aspects of airline traffic control including aircraft design, avionics, engine design, and system designs. However, airline safety is also extended to less-known aspects of safe operations such as airport designs, and dimensional standards (National Research Council 2007, p. 1). Safety is therefore an integral part of the operations in the airline sector and it may manifest in different forms, including standard operating procedures, adoption of new technology and ensuring that safety is the driving force behind airport operations (Parasuraman 1996, p. 91). The Airports Council International (ACI) believes that safety in the airline industry is not only defined by what the industry is but what is done (on a daily basis) to ensure air traffic safety (National Research Council 2007).

Since the aviation industry is a dynamic and multifaceted industry, many people ponder what airport security entails. Rome (2010) explains that, airport security refers to the security and techniques used to protect airports and aircrafts from crime (p. 73). Indeed, alongside seaports, railways and roads, airports witness large volumes of human traffic. Due to the sheer volumes of people within this transport terminus, airports remain a prime target for crimes such as terrorism. Furthermore, due to the high concentration of people within one aircraft, many terrorists perceive aircrafts to be a prime lethal weapon and target for their operations (Davies 1982). Indeed, the September 11 attack in the US is a prime example of how terrorists have targeted airports and aircrafts to launch their attacks. The world has witnessed other terrorist attacks such as the 1976 Cubana flight 455 which was shot down by terrorists (Marks 2010). This attack claimed 73 lives. Among other fatal attacks, which were caused by a lapse in airport security is the death of nearly 400 people which was realized after Air India (flight 182) was bombed by terrorists. The attack happened after airport officials failed to detect a bomb that was planted on the flight. The attack happened in 1985 (National Research Council 2007). The year 1994, also played host to another airport attack on Philippines Airlines (flight 434) that caused the death of one person after airport security detected the threat and foiled the attack before any more casualties were reported (National Research Council 2007). In 1972, three members of the Japanese Red Army launched an indiscriminate attack on civilians at an airport by firing at civilians and throwing grenades at innocent people (National Research Council 2007). The three assailants were later contained by airport officials (but after killing 24 people). Rome and Vienna airports also played host to similar attacks after unknown gunmen opened fire at innocent civilians on the airport terminus. The attack saw close to a dozen people dead (National Research Council 2007). In 2002, a similar attack was reported at a Los Angeles airport. The assault resulted in the death of two people (National Research Council 2007).

From the history of airport attacks, airport authorities have always been on high alert to avert any terrorist attacks. Such cautiousness has seen several airport attacks averted. For example, in 2006, British authorities detected a terrorist plot targeted at bombing aircrafts originating from the US and UK and averted the same (National Research Council 2007). This terrorist threat accounted for the first red alert in the US.

To many aviation authorities, airport security may amount to different things. However, to common people, airport security involves the provision of measures that protect people from grave harm. Across the globe, drug seizures and the trafficking of human beings has also been reported as a real threat to airport security (National Research Council 2007). In addition, the trafficking of illegal goods across airports is one such aspect of airport security that most people perceive to be important in airport security management. The perpetrators of such activities are often attracted to airports because of their accessibility to other countries. Airports are also targeted transit points for illegal goods such as ivory, and drugs. Smugglers are known to use airports for transmitting illegal goods across continents, thereby contravening international laws governing the same. These illegal goods may cause grave human harm if their trade is left to flourish. However, most importantly, if this trade is allowed to go on, it amounts to great airport security contravention. Aside from this fact, the biggest danger associated with illegal trade across airports is the fact that such illegal traders are often dangerous and they do not care about the wellbeing of other people (House of Commons 2010). Therefore, such criminals may pose a threat to the security of airport officials and by extension, the public.

Despite the surge in terrorist attacks and other forms of airports security violations, air traffic volumes are still set to increase in the coming decades. For instance, in the next two decades aircraft manufacturers estimate that air traffic is expected to grow by nearly 168% (House of Commons 2010). The growth in passenger numbers during the same period is estimated at 5%. Currently, the US department of homeland security estimates that about 730 million people use airport services every year and nearly the same number of people has their luggage checked for items that contravene airport security rules (annually) (House of Commons 2010). Airports are just a small part of the factors leading to an infringement of air traffic safety. For example, a recent survey by Burke (2008) shows that about 30% of all air traffic accidents involved an oversight of one aspect of airport safety. However, airports are complicated areas of operations because there are some factors in the airport environment, which may not necessarily be within the control of airport authorities. Such issues may include the weather, inadequate air safety guidance (and the likes). Therefore, many causal factors may cause a lapse in airport safety. Some researchers such as Burke (2008) estimate these causal factors to be more than 70 but the House of Commons (2010) groups these factors into seven categories including, lighting and marking, runways and taxiways issues, information issues, external hazards, apron and ramp issues, ATC operations and procedures issues, and aerodrome issues. The sheer size of airport related issues highlights the importance of all stakeholders in the maintenance of airport security to work together.

Nonetheless, the main problem associated with the understanding of airport security is the lack of proper data collection and data synchrony among different airports in the world. For example, there is poor quality of information regarding which airport security problems originate from ground operations and which ones originate from maintenance operations. Within the same sphere of understanding, Burke (2008) explains that, Within the accident information which is being collected, a general lack of attention to the organizational factors and corporate culture factors in data collection taxonomies is present which further impedes deeper insight (p. 45). The poor focus of organizational structures and corporate cultures (as impediments to understanding airport security) has however not been witnessed in all parts of the world. There are some statistics, which show the main causes of airport security lapses such as recent reports by the European accident investigations, which highlight the different lapses in safety system information among various airport safety institutions as another barrier to understanding airport security (Harris 2002, p. 1). For example, the 1995 Daventry accident and the 1991 Edinburgh accidents were mainly attributed to poor maintenance and poor handling of ground operations (Harris 2002, p. 1).

Understanding the importance of airport safety in todays multifunctional society is therefore gaining increased importance, especially with increased emphasis on non-traditional concerns such as environmental factors. For instance, there is reduced public tolerance to environmental effects of airport activities and third party casualties associated with poor air traffic controls (Harris 2002, p. 1). These new and emerging trends are further piling up more pressure to airport authority officials to maintain high safety standards through integrating new technology and coming up with innovative ways of tackling airport security issues (Rasmussen 1986). However, airport authorities are still expected to meet the growing capacity issues and environmental concerns associated with air traffic operations. From this growing complexity of operations, there is increased attention to the fact that safety is no longer perceived to be an objective in airport operations but rather a constraint (Harris 2002, p. 6). To complicate further the situation, new hazards are slowly emerging and the existing ones are becoming more difficult to manage (especially with the changing technology).

There is a growing emphasis on third party risk as another important factor in all airport safety considerations because airports attract huge volumes of human traffic and people who live close to these facilities suffers an involuntary risk of living next to airports. Even though there is a low probability of air traffic accidents occurring (like one in a million), the local risk level associated with air traffic disasters is significant. Concerning this observation, Price (2008) reports that, The resulting annual probability of an accident at a typical large airport is therefore much greater than the small probability of being involved in an aircraft accident as a passenger (p. 23). Furthermore, Price (2008) explains that air traffic accidents normally occur within the vicinity of the airports (during take-offs and landings).

Based on the above understanding, airports need to have strong safety measures to mitigate any risk of an accident. It is therefore important to uphold airport security to prevent the occurrence of airport attacks and uphold the high safety standards associated with industry. The effectiveness of guaranteeing high safety standards within our airports will therefore ensure that there is reduced crime, reduced terrorism and reduced instances of illegal trade within our borders. The importance of airport security can therefore not be underestimated because it serves different purposes including protecting the airport and country from any threatening events, to reassure the traveling public that they are safe and to protect the country and their people (House of Commons 2010, p, 3). The U.S. Federal Aviation Administration also emphasizes this point by asserting that, The goal of aviation security is to prevent harm to aircraft, passengers, and crew, as well as support national security and counter-terrorism policy (Burke 2008, p. 23).

This paper seeks to investigate the safety considerations for a commercial airport based on the current security threats that face modern airports today. To have a correct conceptualization of the research problem, this paper will be categorized into five sections. The literature review will be relied on to provide a proper model framework for analyzing the research problem. Here, the works of previous researchers will be evaluated to establish what other people have written regarding the research topic. The next section will be the research methodology, which will elaborate how the findings of the study were arrived at. This will be a thought out account of how the findings of the study were reached and why some of the research tools were used. The final section of this paper will be the conclusion section. This section will reinforce the findings of the study and open the outcomes to more scrutiny.

Literature Review

Safety considerations for a commercial airport have been analyzed from different angles. One aspect that has been evaluated by many researchers is the policy aspect of safety consideration for airport designs and operations (Harris 2002, p. 6). Different countries have different policies, but lately, most of these policies have been harmonized to international safety standards. Such standards have been developed by different organizations including the United Nations International Civil Aviation organization (ICAO) which was formed to regulate air traffic operations around the world (Harris 2002, p. 6). The formation of such organizations and policies started after the Second World War where airports started to report huge volumes of commercial air traffic. This period also characterized the evolution of aircrafts from small propeller driven machines to large aircrafts that can travel halfway around the world and carry more than 500 people in the same trip (Wittes 2009). Throughout this transition, air travel has not been as dangerous as other forms of transport. Partly, the main fact that has led to this observation is the formulation of common standards for aerodrome design. Wittes (2009) explains that, Todays ICAO Annex 14, dealing with Aerodrome Design and Operations, is a comprehensive document covering standards and recommended practices for aerodrome physical characteristics, obstacle restrictions, visual aids, electrical systems, aerodrome services and maintenance (p. 33). From the above assertion, Wittes (2009) notes that policy provisions have ensured that different aspects of airport design are safe. Furthermore, most of these policy provisions are renewed annually to ensure they cover all aspects of airport safety (today).

The standards for operating procedures in different commercial airports around the world have also been harmonized to reduce the risk of accidents in airports. This is another safety measure identified by Harris (2002) as having contributed to increased safety standards in commercial airports today. In reference to this observation, Harris (2002) emphasizes that:

The introduction of standard operating procedures employed by airport operators, airlines, pilots, air traffic control organizations, as well as the companies that provide important services such as ground handling and re-fuelling, have played a very important role in airport safety (p. 5).

Through the above assertion, there is a common agreement among all stakeholders that safety precautions are often added to an already safe system by improving the standard operating procedures in commercial airports. The effectiveness of these procedural operating standards cannot be underestimated because they cover most aspects of an airports operations, including airfield operations, all operations at the apron and all sensitive areas in airport safety such as gates and maintenance warehouses (Harris 2002, p. 8). For instance, most airports around the world have a provision for the maximum speed that a car should be driven on the apron and the stipulated distance for vehicles driving behind aircrafts with running engines. Similar provisions also define the rules for crossing taxiways. In fact, many airports have more stringent rules for any vehicle driving in the runways or any contact that is to be made with the control tower (Harris 2002, p. 8).

Similar rules and procedures also apply for airport personnel who control aircrafts. These rules are usually meant to safeguard the personnel and the aircrafts (Vicente 2004). For instance, all personnel are normally required to wear earmuffs and visible jackets when they are on the airfield so that they are visible to the pilots. Moreover, airport personnel are usually required to stand at a safe distance from the aircraft. These rules and procedures are normally inculcated into the safety culture of the aviation industry during the training period of new personnel.

Training is another safety aspect that has been identified by many researchers such as Filipczak (1996) because they highlight this aspect of air traffic control to be important in maintaining airport safety. Vicente (2004) purports that, it is vital for a safety culture to be engrained from the top management downwards, including the notion of a just culture, whereby reporting of safety hazards and occurrences is encouraged, with the intention of learning from these events and discussing solutions, which leads to a continuous reduction in the rate of accidents (Vicente 2004, p. 3).

Many organizations are involved in training airport personnel on the right safety standards to adopt. Most of these organizations vary in different countries. However, the Airport Council International (ACI) is very vibrant (internationally) in the training of airport personnel and imparting new knowledge on various aspects of airport safety. Such training normally occurs in short courses such as the ACI Global Safety Network Course (Swezey 1992, p. 219). Concerning such courses, Howell (1989) explains that, Airport Staff can obtain the ACI Global Safety Network Diploma after the completion of the three modules on: safety management systems at aerodromes, airside safety and operations and emergency planning and crisis management (p. 121). Training is therefore perceived to be a critical aspect of airport safety because poorly trained personnel are more prone to making security errors (which may turn out to be fatal).

Technology, systems and equipment are perceived to be tools that can greatly improve airports safety if properly used and improved. More importantly, the adoption of new technology in airport safety has greatly improved airport safety standards around the world. Different areas, influencing airport safety (such as new lighting systems, precision approach and landings systems, surface movement radar, visual docking guidance systems, and automated meteorological systems) have greatly benefitted from improved systems and equipment. These airport control fields are just a few areas that have benefitted from the improvement of systems and equipment.

The greatest advantage of using systems and equipment in maintaining airport safety is that they can be improved often. The use of modern safety systems and equipment in fire fighting and rescue missions is testament to the evolution of technology in improving airport safety (Swezey 1992, p. 219). Over the decades, other systems and equipment (used in emergency and evacuation situations) have also been improved using new systems and equipment. However, the entire notion of improving safety measures is to reduce the reliance on emergency and evacuation systems. Nonetheless, though this fact stands, it does not demean the importance of using modern equipment and systems in emergency services. Rough weather conditions that are known to worsen airport safety are also mitigated using modern systems and equipment in air traffic control. For example, advanced surface movement guidance and control systems have been widely adopted in many airports as an advanced tool to guide pilots during night landing and in times of rough weather (Swezey 1992, p. 219). These systems work the same way as traffic lights because they act as a clearance for landing. There are ongoing efforts in research and development to devise new safety measures to be engrained on the airports cockpit so that pilots can know their aircrafts position on the airfield and where other vehicles or moving objects are located on the same platform. It is estimated that testing such systems will commence soon and such equipment should be available in the market sooner (Swezey 1992, p. 219).

Safety management systems have also been identified as important tools for the maintenance of a good safety environment in the airport. The safety management system is nothing more than a procedural and structural way of managing airport operations such as structures, accountabilities, policies, procedures and similar aspects of importance to airport operations. ICAO is normally known as the main oversight body for the implementation of safety management systems. It works by having a strong regard to local aviation regulations and international aviation regulations. For instance, since the year 2003, most airports around the world have been required to have a manual that stipulates how all equipment and procedures (used in the airport) work (Vicente 2004, p. 3). The safety management system has replaced an older type of safety precaution that relied on periodic audits to ensure airport safety procedures were upheld. In relation to the establishment of a safety management system, Vicente (2004) recommends that all airports should have a safety management committee that includes all stakeholders who control the operations of all airport departments (including the apron, taxiways and runways). Through the establishment of the safety management committee, airport accidents such as runway incursions can be prevented. Nonetheless, the establishment of a safety management system requires many safety assessments to be done within specific intervals of times. Within each safety assessment, a risk assessment is done to reduce or eliminate the possibility of an accident occurring. Aerodrome safety has been upheld in many airports in this way.

There are certain structural designs that have been pointed out by Vicente (2004) to be important in the reduction of airport accidents and the improvement of airport safety. One such improvement is the establishment of fewer crossings on the runways. This can be done by changing the layout and design of the airport. The establishment of perimeter taxiways is also another strategy that can be used to improve airport safety, although many airports around the world find this strategy to lack feasibility because of a lack of space.

The provision of safety guidance materials has also been identified by some researchers such as Vicente (2004) as being vital to the improvement of airport safety. Concerning this identification, Vicente (2004) says that, Industry guidance material has been produced on the elimination or reduction of major risks such as runway incursions, excursions and confusion (p. 34). Currently, many issues are being reviewed as part of important air safety precautions. For instance, runway excursions are being reviewed for the risk of poor braking or aircrafts deviating from the runway due to poor weather. There are even more concerns currently being expressed about the presence of runway debris on the aircraft pathways which may potentially cause aircraft accidents during take-offs and landing. Some of this debris can cause severe mechanical malfunctions such as the presence of stone-sized objects, which may be sucked into aircraft engines (thereby causing mechanical failure). Similar objects may also be sucked into an aircrafts fuel tank, thereby blocking the fuel pathway. In Chicago, OHare airport has been identified to suffer such security risks because litter, rocks and unwanted materials are identified to characterize the airports environ (thereby posing a strong security threat to the aircrafts that land or take-off from the facility) (Airport Internationals US Correspondent 2009, p. 1). Most of these litter and unwanted materials were left on the airport during the construction of the taxiways and the expansion of the runways. Referring to the runway debris at O hare airport, Airport Internationals US Correspondent (2009) explains that:

The construction materials were found lying on demarcated runway safety areas at the ends of the airports newest runway and this concerned the debris found on the runways themselves: these safety areas being used in the event of emergency aircraft take offs or landings (p. 14).

At the same airport, there were other security threats on the runway, which emanated from the authorization to use airport facilities without properly training airport employees on the same (Guzzo 1988, p. 63). For example, some airport officials drove around undesignated areas of O Hare airport because they were not trained to properly use airport facilities.

Like runway excursions, runway incursions have also been identified as a real security threat to airport operations. A recent report detailing the risks of runway incursions and excursions have painted a grim picture on airport security by highlighting that passengers are often safer when they are airborne than when they are on the ground (Consumer Affairs 2009, p. 1). Partly, this security risk is attributed to runway incursions, which is identified by Consumer Affairs (2009) as any incident involving an unauthorized aircraft, vehicle, or person on a runway (p. 1). Over the years spanning the 2000s period, incidents of runway incursions have been on the rise. The year 2004 alone played host to a 38% increase in runway incursions in America (Consumer Affairs 2009, p. 1). Again, in 2008, more than 24 serious runway incursions were reported in the US. Some of these incidents were mere accidents brought about by poor weather while others were caused by negligence and other human errors (Reason 1990). In the US alone, several airports have been identified as bearing the greatest threats to runway incursions and excursions. These airports are located in Baltimore; Boston; Charlotte, North Carolina; Chicago; Fort Lauderdale, Florida; Los Angeles, New York City, Philadelphia; Phoenix; San Francisco; and Washington, D.C (Consumer Affairs 2009, p. 1). In 2005, an incident of airport incursion was reported at Chicago midway when an aircraft skid off the runway (due to bad weather), thereby causing four fatalities and 18 injuries. In California, another incident involving a jetliner flight which was trying to land at Bob Hope airport caused more than 44 injuries when it skid off the runway due to a lack of enough safety zones on the highway (Consumer Affairs 2009, p. 1). Due to such safety concerns, the FAA has listed more than 1000 airports in the US alone for not complying with the stipulated safety zone procedures. About a quarter of the listed cases are said to pose big threats to the safety of the passengers (Consumer Affairs 2009, p. 1).

However, concerning runway excursions and incursions as possible security threats, there are specific physical and training measures that have been taken to reduce such risks. Some countries are warming up to the challenges of such eventualities. For example, some nations are building longer runways (more than the recommended) to internally mitigate the risk posed by runway excursions. The establishment of an arrestor bed at the end of the runway is also another measure taken by airports to prevent runway excursions (Consumer Affairs 2009, p. 1). These risk mitigation measures are however done within the provision of ICAO regulations. Many airport authorities are further exploiting the possibility of mitigating other risks such as runway confusion and wrong runway operations.

However, the above measures are identified to (still) be insufficient at curbing all the possible threats to airport security. For example, there are other threats identified by Consumer Affairs (2009) concerning the location of certain international airports around wetlands and trees as another issue that greatly contravenes airport security because such environments attract animals and other living creatures to inhabit airport environs. Bird strikes are the greatest threat to airport security emanating from the close proximity of airports to wetlands, grasslands and forested lands. In fact, many airport officials facing this threat perceive the threat of bird strikes to be omnipresent. Airport threats of this nature have been reported in many parts of the world, with the most recent (and notable) airport security threat detected involving a flight take-off from New Yorks LaGuardia Airport in 2009 (Consumer Affairs 2009, p. 1). Hundreds of geese, which were wandering on the runway, obstructed the flight take-off. However, there were no deaths reported (Consumer Affairs 2009, p. 1).

Many aviation authorities such as the US federal Aviation Administration (FAA) have stressed the importance of airport authorities to mitigate the risk of bird strikes because airfields should not have any form of floating debris around their vicinity (Wagner 2012, p. 1). Nonetheless, not many airports around the world comply with set regulations regarding the topography of airport environs. For instance, few airports comply with the provision that grasslands surrounding the airports should not be more than six inches long. In addition, fewer airports comply with the regulation requiring all paved surfaces around airports to be free from all forms of vegetation.

The development of residential homes around airports has also been identified as another issue contravening airport security in many parts of the world (McNeil 2010, p. 1). Growing human populations in major urban centers around the world has exacerbated this problem. This increase in population has consequently led to a surge in housing developments, which have created more pressure to use idle airport land. Some of these developments have been necessitated by the growing pressure among investors to build commercial centers around airports to take advantage of the immense business opportunities, which exists from airport services. Such establishments include hotels, restaurants, recreational facilities and the likes. Due to these factors, pilots have been forced to fly dangerously close to residential and commercial establishments built around airports.

The danger posed by the establishment of residential and commercial buildings next to airports is increased by the threat o

Aim

There have been many developments in the field of aviation ever since the introduction of aircrafts. Different techniques and aids are constantly being improved for the execution of safe and smooth landings so as to complete this trickiest phase of a flight with less difficulty and more perfection. The aim of this paper is to look into the characteristic features of various prominent precision approaches such as, Instrument Landing System (ILS), Microwave Landing System (MLS), Wide Area Augmentation System (WAAS) and Local Area Augmentation System (LAAS); their components, the principle of operation; their limitations and probability of improvements in future. It also focuses on the comprehensive study of the future precision approach system called Smart Path, a ground based augmentation system, developed by Honeywell, and selected by FAA as an upcoming replacement for ILS in its Next Gen program. This paper also evaluates the importance of these systems in providing safety and reducing operational expenditures of airlines. Hence, the aim of this paper is to analyze the adequacy and accuracy of the landing aids and their implementation with respect to their requirements and practicability in aviation at present and in the years to come.

Executive Summary

Landing is the most crucial and demanding phase of a flight. For a smooth and safe landing of an aircraft it is necessary that the pilot is assisted with some landing aids. There are several technological navigation aids that help in the execution of a precision approach and landing.

The ILS is a combination of both approach lighting and radio beacons including their best qualities within one system. Though it is an important landing aid providing the lateral and vertical guidance necessary for a precision approach but in view of the future aviation requirements, it has certain limitations which prohibit or restrict its use in many circumstances.

MLS offers many advantages over ILS besides overcoming its confines. Accurate precision navigation guidance is provided by this system relative to the alignment and landing of aircraft. It is appropriate for the autoland approaches where the aircraft is controlled by the equipment as it allows safer landings in extreme weather, with zero visibility.

Further, two augmentations systems are developed, known as LAAS and WAAS, to assist the GPS in the civil aviation with space based navigation. Global, standardized navigation services for all types of aircraft operations and all phases of flight can be made available with the use of differentially corrected GPS service, with the support of WAAS and the LAAS.

The requirement of GPS to get some assistance from the ground for rapid descending of an aircraft quite near to the ground paved the way for a ground based augmentation system (GBAS), which is also called Smart Path and is an effective system to smarten up air-traffic control. The replacement of ILS with GBAS technology has been recognized crucial for the enhancement of the air traffic capacity in the FAAs Next Gen program and Euro controls Single European Sky ATM Research Program. GBAS avionics have become an integral part of most current-production Airbus and Boeing aircraft. GBAS, described as SmartPath by Honeywell, is the initial stage of an infinite plan to refurbish air-traffic control.

The limitations of older technologies in ensuring safe landings where only short-length airstrips are available due to deserts or vegetated areas and in rough seas, led to the development of autoland system. Different climate and weather conditions affect the approach and landing phase of an aircraft considerably. Autoland systems are used to ensure a safe landing in extreme weather conditions and intense levels of visibility.

Advancements in avionics such as the SmartPath, introduced by Honeywell and the autoland system are not only cost effective but also suggest an increasing role for flight inspections chances, in the coming years, with respect to the navigation and landing aids.

Development in Aircraft Landing Technology

Introduction

Landings are the most crucial phase of a flight and carry significant safety messages with their execution. Missing of any essential correction and misjudgments at any point may result into an immense calamity. Most of the accidents are caused by inaccurate procedures in the landing phase (Horne 2011).

The complexities involved in the process generate chances of accidents taking place. So, in order to return the aircraft back to the earth safely and firmly, a skillful execution of the landing phase is highly required. It is essential to have an ideal knowledge of the various aspects such as: what should be the speed, knowledge regarding the rate of descent and glide path along with an absolute judgment of glide path (Nirjharini 2011).

To achieve a smooth and secure landing a number of technological navigation aids can be used by the pilot. Initially, there were only people-powered landing aids where people used to stand on the field with flags to provide direction to the aircraft. They used to wave red, green, or white cloths symbolizing different signals (Mola n.d.).

Gradually, the radio controllers were developed to provide some landing aid to the pilots. Moreover, red or green lights were also utilized to present the view of the runway threshold and sides in the airport. This helped the pilot to judge the remaining distance and angle to be taken for landing (Mola n.d.).

History

Development of aircrafts: Before the existence of airports and introduction of any landing aids, the pilots used to be guided by the direction of the wind, in landing the aircrafts. With the constant growth of air traffic, the airports were developed and landing was restricted to definite directions. The complexities faced during the landing of an aircraft were resolved to some extent with the development of the landing aids that enabled pilots to stick to a correct landing course, thus making it safer (Mola n.d.).

Use of lights: Airports began the use of lights in the late 1920s.Landing fields were marked with rotating lights that offered guidance to the pilots in the dark. The use of approach lighting in the airports in the early 1930s helped the pilots by guiding them to take proper descent and ensured that they were on the right direction. The approach path was called the glide path or glideslope (Mola n.d.). In course of time, the International Civil Aviation Organization (ICAO) provided a standardized form of the colors of the lights and their rates of flash to be recognized in all over the world (Molan.d.).

Introduction to slop-line approach: The slope-line approach was the first system implemented as landing aids that was a cone shaped formation of rows of lights (funnel) providing guidance to the pilot to reach the finishing point of the runway. In case of some deviation to the right or left, or too high or low other patterns of lights were exhibited. Although this system, developed in 1940s was economical to build and operate but some constraints restricted it from being used in certain airports (Molan.d.).

Introduction of radio navigation aids: Next, radio navigation aids were developed for getting assistance in landing. In 1929, the establishment of a four-course radio-range with the power of Morse code signals guided the pilot in taking right decisions in maneuver. Another types included a low-frequency radio beam, which flickered outward from the landing point forming a v shape. Although, the wide space offered for flying towards the end of the runway offered convenience to the pilot but the narrow space at the landing point often misled the pilot in striking the center point for landing. The method of tuning into a certain frequency at a distant checkpoint, and using a stop watch to come down at an exact rate to the touchdown area also proved to be complicated (Molan.d.).

Development of Instrument Landing System: The instrument Landing System was the next step in the development of landing aids. Tests of this system began in 1929, and it got approval for installation in 1941 at six locations by the Civil Aeronautics Administration (CAA).In the Instrument Landing System the approach lights and radio beacons both were included to build a system combining the best features of both. The pilot could view the glide path personally with the help of the electronic picture of glideslope in the cockpit instruments. The ILS system was tested for the first time on January 26, 1938, when a scheduled U.S. passenger airliner Pennsylvania-Central Airlines Boeing 247-D, from Washington, D.C., to Pittsburgh, using ILS landed in a snowstorm (Molan.d.).

Adoption of the standardized ILS: Several types of ILS system were tried before standardizing it. At last, a system comprising a localizer for the lateral guidance, a glide path or landing beam to provide vertical guidance, and two marker beacons denoting the progress of approach to the landing field, was adopted as a standardized form of ILS. The pilot was enabled to receive the information with the help of the equipment in the airplane so that he could see the runway and bring the aircraft on the right flight path (Mola n.d.).

In 1949, the International Civil Aviation Organization (ICAO) adopted the standard set by the U.S. Army, by introducing an ILS with a higher frequency transmitter to reduce static and create straighter courses, for all member countries. It was called the Army Air Forces Instrument Approach System Signal Set 51. The first ILS equipment, without any visual aids, achieved a safe landing in 1960s (Molan.d.).

During World War II, the development of radar showed the way to the introduction of a new precision-beam landing aid which is known as the ground control approach (GCA). GCA performed well in association with the ILS in making the landing easier for the pilots at more active airports. By 1948, distance measuring equipment (DME) for measuring the distance of the airplane from the ground was set up. The data acquisition relating to the planes distance from the ground was made available with the help of distance measuring equipment (DME). Along with the air-route supervision type of radar other radar were also installed at a number of airports in the mid-1950s helping air traffic controllers in dealing with air-traffic efficiently (Molan.d.).

Instrument Landing System:

ILS description: The ILS is an important landing aid providing the lateral and vertical guidance necessary for a precision approach. A precision approach suggests an approved procedure of descending an aircraft with the help of a navigation facility associated with a runway. An integrated ILS system along with the approved approach procedure leads to the proper execution of a precision approach (Carnegie 2008).

ICAO Categorization with respect to RVR: The current ILS was developed and standardized in the United States during the World War II. Three categories of visibility are defined by ICAO relative to the runway visual range (RVR) (Powell 1981).

This categorization is based on the principle that there should be adequate short visual reference for the range of permitted decision heights. These categories are defined graphically in the following illustration (Pallet & Coyle 1993).

Runway Visual Range (meters)
Fig: 1 Runway Visual Range (meters)

Category 1: Category 1 illustrates that there should be minimum 200ft decision height and runway visual range of 800m for the possibility of successful approach.

Category2: A high possibility of success rate is described below 200ft decision height and runway visual range from 800m, and as low as 100ft decision height and 400m runway visual range (Pallet & Coyle 1993).

Category3: Category 3 illustrates the visual range of minima 200m, with external visual reference during the final phase of the landing down to the runway.

Category3B: The visibility to and along the runways and taxiways is to be sufficient for visual taxiing equivalent to runway visual range of minima 50m (Pallet & Coyle 1993).

Category3C: No external visual reference is required to and along the surface of the runway and taxiways (Pallet & Coyle 1993).

Main Components of the ILS: The total system is divided into three parts consisting of a transmitter on the ground and receiver and signals in the aircraft. A localizer is provided for the lateral steering for front-course and back-course. Vertical navigation, for the front course, is provided by the glide slope. For getting distance checks, marker beacons are used (Powell 1981).

Fig: 2 
Fig: 2 

The above illustration is depicting the vertical needle of the localizer and the horizontal needle of the glide slope. The dots are representing center of the ILS or distance from center of ILS. The round button is used for the airport selection. The signs provided by marker beacons are shown below. Important runway information is put on view in floating text beside instrument (040_ILS Instrument Landing System n.d, Para 4).

Instrument landing system (ILS) provides accurate and reliable navigation facility to an aircraft in IFR conditions. In this system the position of the aircraft is ensured with reference to the instruments. ILS comprises four main instruments.

Fig: 3 
Fig: 3 

The above picture illustrates the sequence of 18 important tasks performed by the pilot in changing over from cruise flight to touchdown with the use of ILS (Niquette 1996).

Localizer

Ground Equipment: The localizer is the main component of the ILS. It makes the lateral guidance available. It is a VHF radio transmitter and antenna system with similar general range as VOR transmitters (between 108.10 MHz and 111.95 MHz).The frequencies are only on odd-tenths, with 50 kHz spacing between each frequency (Carnegie 2008, Para B.1).The transmitter and antenna are located on the centerline on the other end of the runway from the approach entrance. Some ILS systems also include the localizer back course which is normally available with a75MHz back marker facility or NDB positioned 3to 5 NM from touchdown. To ensure its positioning with specified tolerances the course is checked time to time (Carnegie 2008).

Signal Transmission: The localizer spreads out the signal in the air. These signals generate two vertical overlapping patterns identical to the shape of a fan. These patterns are aligned absolutely with the centerline of the runway. The right side of this pattern is symbolized by blue and is called the blue area. It is modulated at 150 Hz. The left side of the pattern which is symbolized by yellow is called the yellow area. It is modulated at 90 Hz. The overlap existing in the middle of the two areas is helpful in providing the signal relating to the runway. The navigational beam is regulated so as to enable about 700 ft wide track signal acquisition at the runway threshold. The localizer is recognized by a two-letter audio signal (preceded by the letter I for example I-OW) overlaying the navigational signal (Carnegie 2008).

Since the primary strength of the signal is aligned with the runway centerline, the reception range of the localizer is at least 18 NM within 10º degrees and at least 10NM between l0º to 35º of the on-track signal (Carnegie 2008).

Localizer Receiver: There is a localizer receiver in the aircraft which functions in amalgamation with the VOR receiver in a single unit to receive signals in the aircraft. The localizer and the VOR use common electronic circuits. There is a common frequency selector, a volume control, and ON-OFF control for the two receivers (Carnegie 2008, Para 5).

Fig: 4 
Fig: 4 

From left to right, the aircraft is 1° Right of course, two dots (turn left to return); On course; and 1° Left of course (turn right to return)(Wood 2008, Para 10).

On receiving a localizer signal, the vertical needle or the track bar(TB) is set in motion. Suppose, a final approach track is aligned north and south, an aircraft taking position in the east of the extensive centerline of the runway (position 1) is in the area modulated at 150 Hz, will avert the TB to the left. On the other hand, if the aircraft is taking position to the west of the runway centerline, the 90 Hz signal the TB will deviate to the right (position 2).Force is applied to the needle by both the angles in the overlap area. This force redirects the needle in the direction of the strongest signal which helps in placing the aircraft in accurate position. The point showing equivalent intensity of both the 90 Hz and 150 Hz signals, TB being centered, indicates the precision approach (Carnegie 2008, Para 10).

However, it is advisable that the pilot should set the track selector most of the times for the approach track. This is because the track selector setting in the localizer function is not dependable in most cases. The obstructions in between the transmitting antenna and the aircraft often cause difficulty in receiving the signals clearly. The weak signals make the vertical needle to deflect a little or indicate an OFF flag in front of it.

Glide Slope Equipment

Transmitter: The vertical guidance for the landing approach is provided by the glide slope which is formed with the help of a ground-based UHF radio transmitter and antenna system (Carnegie 2008). These channels in the u.h.f. band function at a range of328.6-335.4 MHz at 150kHz spacing. The frequencies, allocated to the glide slope, are paired with the localizer frequency as both serve the same runway (Powell 1981, p.70-71). The positioning of the glide slope transmitter is about 750 to 1,250 feet down the runway from the entrance, offset 400 to 600 ft from the centerline of the runway (Carnegie 2008).

The glide slope signal also consists of two beams where one beam lie on top of the other. These beams are adjusted at 90 Hz and 150 Hz. The signals spread out by the glide slope are aligned above each other and emitted mainly down the approach track. The thickness of the overlap area is 1.4º or.7º above and.7º below the optimum glide slope.(Carnegie 2008).

The adjustment of this glide slope signal varies between 2º and 4.5º above a horizontal plane. In view of obstructions along the approach path and the runway slope, it is adjusted between 2.5º to 3º.Several glide path angles along the glide slope may produce false signals. The false signal approximately 6º degrees above horizontal will be a mutual signal for the fly up and fly down commands and these commands will be reversed. The false signal at 9º will be sloping just as the true glide slope. However, there are no false signals generated below the genuine slope (Carnegie 2008, Para 11).

Signal Receiver: A UHF receiver is made available in the aircraft to receive the glide slope signals in combination with the VOR controls to receive the proper glide slope frequency by tuning it automatically when the localizer frequency is selected (Carnegie 2008).

A glide slope needle, positioned in conjunction with the TB, is set in motion by the glide slope signal. There is a special OFF flag for the glide slope needle which is visible in the navigation indicator in case of a weak signal. There is a constant deviation in the glide slope needle and it stops deflecting only after reaching that point where the signals overlie on one another. The needle deviates towards the stronger signal and slowly comes to the centered position horizontally when both the signals are equal indicating that the aircraft is proceeding in the right direction on the glide path (Carnegie 2008).

Fig: 5 
Fig: 5 

An accurate location relative to the approach path can be accessed by referring to a single instrument. The Glide Slope Signal Pattern figure, above, position1, illustrates that the aircraft is located in the center of the approach path as both the needles are in the centered position. In Position 2 it is evident that the aircraft needs to fly down and towards the left to rectify the approach path whereas position3 is shows the requirements to fly up and towards right for catching the proper path(Carnegie 2008, Para 12).

With the aircraft coming closer, the instrument picks up its operation accordingly. It is important that at this point of time; the pilot must monitor the deflection of the needle to know whether the aircraft is high, low or in a centered position (Carnegie 2008).

ILS Marker Beacon: The marker beacon is used for the modulation of signals. It radiates upwardly using the frequency of 75MHz (Powell 1981).These are low-power transmitters; that operate with 3 W or less rated power output. There are some preset points along the approach track in Instrument Landing System which are recognized by the marker beacons to provide information regarding distance from the runway. They radiate an oval beam upward from the ground at an altitude of 1,000 ft. which is 2,400 ft long and 4,200 ft wide and considerably increases with higher altitudes (Carnegie 2008).

Descriptions of the ILS components

Fig: 6 
Fig: 6 
Fig: 7 
Fig: 7 

Here is a three-dimensional depiction of the Instrument Landing system. We can see the Localizer antennas close to the end of runway (Wood 2008, Para 4).

Outer Marker (OM): Within 250 ft of the extended runway centerline, the outer marker is located 3 1/2 to 6 NM from the entry. At around 1,400 ft above runway elevation a point is marked by OM crossing the glide slope vertically. It also marks the estimated point from where an aircraft starts the final approach plan. The signal is adjusted at 400 Hz, which is a low tone but easy to hear with continuous Morse code dashes. For receiving these signals, a 75 MHz marker beacon receiver is incorporated in the aircraft. The pilot can hear a tone over the speaker or headset in harmonization with flashing of a blue light. Geographical conditions may affect the positioning of the outer marker. So, a DME unit may be used to enable the pilot in making a positive position fix on the localizer. An NDB is used in place of the OM in the majority of ILS installations (Carnegie 2008, Para 14).

Middle Marker (MM): The middle marker is located about.5 to.8 NM starting from the threshold and going along the complete runway centerline. It intersects the glide slope at about 200 to 250 ft above the runway elevation and is close to the missed approach point for the ILS Category l approach (Carnegie 2008).

Back Marker (BM): About four to six miles from the runway threshold, usually, the back course marker (BM) is located. These are located on the localizer back course. The BM low pitched tone (400 Hz) is heard as a series of dots(Carnegie 2008,para4).

The aircrafts white marker beacon light is enlightened by these dots. The BM can be replaced by an NDB or DME fix quite often (Carnegie 2008).

Lighting Systems

There are many approved runway environment lighting systems in the ILS system. These lighting systems ensure the safe landing of the aircraft by providing proper visual guidance to the pilot. These are: approach light system (ALS), sequenced flashing light (SFL), touchdown zone lights (TDZ) and centerline lights (CLL-required for Category II [Cat II] operations.)(Carnegie 2008,para 4).Out of these any one or all the lighting systems may be provided at a specified facility (Carnegie 2008).

Runway Visibility Measurement: Before coming downwards to the decision height (DH) or the missed approach point (MAP) it is essential that the pilot has a clear view of the approach path with the help of the appropriate visual aids. The transmissometer is located adjoining the runway to provide visibility information. The photo electric cell receiver separates the light source by 500 to 700ft.The relative transparency or mistiness of the air is measured by the receiver, connected to the instrument readout in the airport tower. The readout is standardized in feet in respect of the visibility and is known as the runway visual range (RVR) (Carnegie 2008).

Runway Visual Range (RVR)

At the runway the maximum distance utilized for taking-off or landing is known as RVR. It is specified with light or markers so that it can be seen from a height matching to the pilots average eye-level at touchdown. It is normally expressed in hundreds of feet e.g. RVR24signifies that the visual range along the runway is 2,400 ft. Visibility differs in different runways so the RVR value differs accordingly. Even different points along the same runway may have varying visibility. To deal with this condition, there are many types of equipment fixed at the departure end and the central point of the runway. Runway Visual Range reports denote the capability of a pilot to have the visibility of the runway in the touchdown zone. However it is to be noted that the positioning of the transmissometer establishes the actual visibility at other points down the runway. RVR enables the pilots to decide their executions in the ultimate stages of an instrument approach. The information regarding the Runway visual range is sent to the ATC arrival control, and the control tower or FSS. The pilots are offered this information as per their requirement. The light settings can be adjusted on demand by the pilot. Two different light settings can be provided for the landing of consecutive flights. Since there are complex equipment involved, RVR is usually made available at busier airports only(Carnegie 2008).

NDBs

Supplementary aids like NDB also exist for assisting the pilot in reaching the final approach fix. It is a non-directional beacon which can be sited with the outer marker (OM) or back marker (BM) and also used to replace the OM or BM. Its transmitting power is about 25 watts (W) and frequency range is 200 kilohertz (kHz) to 415 kHz. The radio beacon can receive the signal spread out in the area of at least 15 nautical miles (NM)(Carnegie 2008).

ILS limitations

Even after providing navigation precision guidance well in the past so many years and adopting a lot of measures for improving its performance and consistency, the Instrument Landing System(ILS) has come up with certain limitations. In view of the future aviation requirements, the ILS has some basic limitations such as: site sensitivity and high installation costs; it adopts single approach path; multi path interference; and has only 40 channels (Carnegie 2008).

The limitations prevailing in the ILS generated a necessity of a more fool  proof landing aid that could prove to be accurate for safe landings. The following limitations in the ILS cause its degradation (Crabtree 2009).

  • There are certain restrictions relative to ILS techniques and operations which affect the flight path flexibility and airport throughput (Crabtree 2009,para 6).
  • ILS gets easily affected by signal interference due to weather and other impediments resulting in major chaos in the airport traffic, causing delays (Crabtree 2009).
  • There are many ground related constraints with ILS. It requires a relatively flat terrain as ground irregularities and poor weather affect its performance (M.L.S. 1995).
  • The channel range is limited to 40 channels only (M.L.S. 1995).
  • ILS uses a single approach path causing much confusion and chaos in the air traffic control (M.L.S. 1995).
  • It has a high user cost and is dependent on expensive ground equipment (Parkinson 1996).
  • Basic ILS is suitable only for the FAAs non precision and Category I landing requirements and only the improved ILS system can execute a landing with Category III required accuracy (Parkinson 1996).
  • Moreover, the noisy ILS signals need to be processed with a smoothing filter (Parkinson 1996).

Disasters with ILS

Although, ILS has been perceived as an efficient landing aid for past so many years, inaccuracy and errors in the guidance information through this system have led to several disasters in the aviation history (Phelan 2001).

A false instrument landing system (ILS) is assumed to have caused the disastrous Korean Air Boeing 747-300 accident at Guam in August 1997.The glideslope indication may have been a chief contributory factor to this mishap. Recent studies by Air New Zealand (ANZ), have declared that the problem may have led the crew to believe that they were on the correct descent when the aircraft crashed into Nimitz Hill 5km (3nm) from touchdown. ANZ believes that the new findings indicate that 40 other controlled flight into terrain (CFIT) investigations call for review now (Phelan 2001).

On July 29, 2000, during a standard instrument landing system (ILS) approach to Faleolo at night, an Air New Zealand Boeing 767 with 165 passengers and 11 crew on board commenced a go-around after descending to an altitude of about 400 ft, some 6 mi. short of the runway (ILS System Failure  A Free Lesson 2010, Para 2). It was revealed after thorough investigations that flawed guidance information was being transmitted by the ILS glide path (GP) transmitter. The cockpit GP and localizer indications were normal. The Civil Aviation Authority (CAA) of New Zealand has publicized the matter widely so as to warn the ILS operators about the risks involved with this approach. Hence, a valuable insight into the recognized weakness in ILS systems is provided by this serious incident. It has annunciated the necessity to adhere to ICAO standards and guidance material during ILS operations and maintenance to avoid extreme hazards (ILS System Failure  A Free Lesson 2010, Para 2).

Another instance indicating the failures of the ILS system came into light when a First Air Boeing 737-200, regi

Introduction

Over the ages, a great number of analysts have spoken about women leadership, their role, how they lead and the challenges they face when leading a company or an organization and how they have achieved good results in their leadership. It is imperative to note that leadership is a process whereby a person socially influences another individual or a group to perform a task and achieve desired goals (Fabra, & Cesar, 2009, p. 603).

In the UAE, women have in the past struggled to get job promotions and occupy leadership positions amidst many challenges brought about by many beliefs expressed in their culture and religious practices. Al Gharaibeh says that traditions and laws primarily hold women back from their full leadership participation in the economy and politics of the nation (2011, p. 96). This essay will explore the perceptions that surround women involvement and participation in leadership. Besides, it will critically analyze how culture, religion and perceptions impact on women leadership in the UAE.

Women leadership in UAE

In the United Arab Emirates, the achievements of women over the years has immensely impressed me and made me understand that the seeds of the great effort that women planted are bearing fruits today. It is imperative to note that in UAE, up to and until the 1970s, there were hardly any educated women, save even those who could occupy leadership positions (Fatima, 2001, p. 33). Research studies indicate that this could have been attributed to the traditional practices that surrounded and defined gender roles among Muslims.

Indeed, and as Fatima points out, even if women during that time intended to occupy leadership positions, they were still illiterate and less prepared. Al Gharaibeh in his publication says that discrimination against women that has been carried forward into the constitution of the land was caused by adherence to historical remnants of a society that does not exist anymore (2011, p. 96). None of them could have wished to rise and challenge men in a male-dominated society.

Today, a lot has changed as the UAE country has begun to depend on women for leadership since they are vital for social and economic developments. According to the president of the UAE, Sheikh Zayed bins Sultan Al Nayan, women in this region have been major contributors and stimulus for economic growth (Arab Law Quarterly, 2000, p. 416). The development history of UAE from a desert land to desert farms, landscaped gardens, high towering skyscrapers, modern hospitals, and schools, without doubt, owes its brilliance to evolvement and involvement of women (Mora & Ferrer-i-Carbonell, 2009, p. 586).

Religion, Culture, and feminism

It is traditionally known that the place for the Arabic woman is the home. Her life revolves around her family; her children, her husband and generally keeping the home habitable. According to Mora & Ferrer-i-Carbonell, the place of a Muslim woman has been defined by religion and culture. Efforts to create change in the perceptions culture and religion have on women have met diverse setbacks. Changing deep-rooted religious and cultural practices requires people to change their attitudes. In her article, Fatima Mernissi says that Everyone is afraid of change, but Muslims are more so because what is at stake is their fantasies about power (Mernissi, 1987, p. 10).

Indeed, this is true in the sense that men in the Muslim society, backed by their culture and religion, dominate most leadership positions and feel that creating room for women to lead alongside them will rob them of their power fantasies. The gender debate on culture and feminism continues to point out the roles of Islam women in UAE. Khalaf & Alkobaisi argue that the cultural practices that have been in this country have continued to undermine, marginalize and place women employees in adverse positions of subordination (Khalaf & Alkobaisi, 1999, p. 290).

They further claim that cultural attitudes on feminism have been negative especially on the leadership and roles of women in a society dominated by males. Al Gharaibeh says that discrimination against women is one key indicator of the failure of a political system in the democratic process, while participation is considered to be one of its most important elements (2011, p. 99). This is indeed true since the Quran states that both genders are equal, it also indicates that women are supposed to be subordinates and serve their husbands (Khalaf & Alkobaisi, 1999, p. 290). This combined with culture has seen women in UAE experience discrepancies in job descriptions, seniority, and education.

According to Mernissi (1987, p. 14), despite many campaigns and achievements made in having women leaders, UAE women still face diverse challenges in their bid to occupy leadership positions in their own country or to work outside the UAE. Some of the challenges include religion that requires them to keep themselves veiled and be submissive (Mernissi, 1987, p. 14). She argues that as such when employed, the effect of their cultures makes them assume less important sections and make important decisions in the nation.

For instance, one of the problems that have impeded the ability of women to make decisions is a cultural setback that requires women to be submissive and seek permission from their male partners before engaging themselves in any decisions. This is indeed a challenge as it takes a long time before a woman can embark on serious business since most decisions on any important idea are made by men. This adversely affects their ability to make decisions that will grow the business bearing in mind that they have to compete equally with other male business rivals in the design market.

Besides, organizational structure, like in our partnership, is a representation of a business program that has a chain of command whereby officers of the company and the employees are categorized in units that show their level of importance and responsibility (Khalaf & Alkobaisi, 1999, p. 290). The organizational structure defines the relationship that should exist between the chain of command regardless of gender. With this in place, a company stands a better chance of minimizing costs and maximizing results since everyone in the company will know how to interact with one another and with the departments in the company (Madar Research Group., 2004, p. 10).

Also, workers get to understand their place and their duties. Tanmia (2006, p. 167) points out that an effective system of good governance forms its foundation in an organizational structure that is competently built. This kind of organizational structure ensures that there is increased productivity through assigning areas of duty and power to leaders, ensuring that the staff are not under too much pressure or are neglected based on gender. Additionally, Tanmia argues that right from the perspective of gender, stereotypes emerge such as the one that ascribes to the inability of a woman to manage personal business well without getting assistance from a male person (Tanmia 2006, p. 167).

In agreement, Al Gharaibeh says that womens freedom to enter the public sphere reflects to a large extent the nature of the political and social system of a country, and their equal access to political processes reflects the principles of social justice in a society (2011, p.100). For this reason, important ideas and decisions that women make must wait for men to approve. However, it is imperative to note that today, there are organizations that are managed professionally to assist in raising the level and expertise of women involvement in business enterprises without being sidelined by gender and other cultural stereotypes.

Khalaf & Alkobaisi express that unemployment among females in UAE is acute especially among those women who are educated (Khalaf & Alkobaisi, 1999, p. 290). On the other hand, Clark, Frijters & Shields feel that although this may be argued to be a general trend across the divide, it is worth to note that how women have been subjected to societal treatment is not the same at all compared to their fellow men (Clark, Frijters & Shields, 2008, p, 109).

The significance of this can be better appreciated when one takes into consideration the fact that women make up a large portion of those graduating from universities, as compared to men (Marshall, 1995, p. 15). Women who are educated are thus not willing to join the construction industry, in effect increasing the number of unemployed women in the society. This is like creating a sustainable source of income, given that women entrepreneurs tend to deviate from the normal and conventional fields of investing, such as construction and oil extraction and processing industries.

Cultural change

According to Tanmia (2006, p. 167), women evolvement and leadership in UAE draws its beginning from universal education. It is imperative to note that education has empowered UAE women to compete for leadership positions like men do. As such, Fatima Mernissi points out that women have unveiled themselves, and that todays UAE is in a situation where fundamentalist men and women and nonfundamentalist women have a conflict of interest (Mernissi, 1987, 11).

Besides, she argues that in schools, both men and women have the same educational privilege (Mernissi, 1987, p.11) and that the number of women is now high above that of men and their illiteracy has dropped by approximately 11.3% (Clark, Frijters & Shields, 2008, p, 109). In higher colleges of technology, 70 % of students and in Universities such as Al Ain, over 15,000 students (60%) are women. In 2002, university chairs were occupied by approximately 57% (Dencker, 2008, p. 460).

Through education, women have been able to obtain and occupy leadership positions, act independently and be able to reason. Reports from statistics carried out by the UN indicate that leadership among women in UAE countries has been contributed by the blossoming of women in terms of education (Arab Law Quarterly, 1996, p. 59). From this backdrop, it is evident that women in the entire United Arab Emirates (UAE) bloc are indeed emerging as equal competitors as their counterpart men.

According to Bahgat (1999, p. 132), due to the high levels of education, women in the UAE have been opened to countless career choices. Baghat argues that as such, they have been able to rise to leadership positions in diverse roles such as doctors and teachers (Bahgat, 1999, p. 132; Neal, Finlay & Tansey, 2005, p. 245). The number of total workforce and heads of departments in UAE countries is made up of 20% women but is much higher in the government sectors with over 27% of them being decision-makers, 57% heading banking sectors and 40% labor force (EL-Haddad, 2006, p. 286; Webb, 1997, p 159).

It is imperative to note that the degree with which women have advanced in UAE countries puts them in a position where they can be directly involved in making decisions involving the country just like it is with the western countries. In UAE, there are over 23,000 businesswomen with a total of 62 billion dollars in their account (Gallant, & Pounder, 2008, p. 29). By 2008, it was reported that a total of ten business executives who were women from the Middle East made their record as among the best 100 bankers worldwide, indicating how women have not only excelled in conducting business but are also great entrepreneurs and skilled in the business world (Grandey, Cordeiro & Crouter, 2005, p. 319).

This is an interesting point of departure for UAE women in the sense that although the capital has been a major impeding factor in their growth in the business world, they are not badly off. Indeed, the aforementioned factors are great incentives for UAE women who are planning to engage in leadership activities, including those who are in various businesses (Gaad, 2006, p. 291).

According to Stephenson (2010, p. 231), both the public and private sectors play an integral role in building the economy of the United Arab Emirates country. While the public sector is run and managed by the government, the main players in the private sector are individuals who set up their businesses and run them as private entities (Al-Jenaibi, 2010, p. 236; Behery, 2008, p. 860; Bristol-Rhys & Rugh, 2009, p. 766). Each of these sectors has unique merits and demerits. For instance, some individuals would prefer to be employed in the public sector largely due to job security and a stable salary. However, the private sector may also promise better salaries among other fringe benefits that come along with various jobs being offered. The working environment may be enjoyable alongside flexibility at work which enhances creativity as well as skill development.

According to Claros & Zahidi (2005, p. 453), the existence of women leaders in businesses in UAE and their variance has been remarkable over the past ten years both in terms of quality and number. This has also been the trend across the world. Leadership in the private sector is steadily supplementing the public sector through spontaneous growth (Claros & Zahidi, 2005, p. 453; El-Baz & El-Sayegh, 2010, p 1088). Moreover, small businesses have remarkably shaped the way business is done and as a result, the UAE economy is experiencing growth mainly due to the existence and expansion of small businesses.

Women and leadership progress

Dating back in history, women have been embroiled in a struggle in the society to prove their worth, and also to take their rightful places in the society as far as all aspects of life are concerned (Al-Tarrah, 2010, p. 22). Al Gharaibeh explains this situation by saying that in UAE Women suffer the harmful, life-threatening effects of traditional and cultural practices that continue under the guise of cultural and social conformism and religious beliefs that discriminate between genders (2011, p. 102).

This struggle, Al Tarrah (2010, p. 22) argues, has been extended to obtaining leadership positions, where women are trying to prove that they are as good as men when it comes to managing entities. Up to now, women in UAE, due to the already industrialized, strong and vibrant economies, seem to have made significant gains in terms of leadership. It is estimated that women run and control about a third of all business enterprises in this society. These businesses owned and managed by women are playing a very significant role in the economy of these countries, and their impact in the whole society in extension cannot be downplayed.

Women leadership, as a result, has continued to attract the attention of scholars in society. There is interest in analyzing how this historically discriminated segment in the society is fairing on in a field that has been controlled by men for a very long time now (Anon., 2011, p. 288). Al Gharaibeh says that however, women often feel embarrassed to complain, and as a result, they remain silent because they know they will not be supported, and because they fear of sullying their reputation or ruining their career (2011, p. 101) To this end, several studies have been conducted, addressing various attributes of this field.

This ranges from the challenges that women face in their leadership roles, their rate of success and such other factors. Businesswomen in the UAE have especially attracted a lot of attention from these scholars. This is given the fact that the women of this region are especially known for their subordinate role in the society because men have traditionally dominated many spheres of leadership in this region for a very long time (Randeree, & Chaudhry, 2007, p. 225). They control business, family issues, politics, and such other important areas. Heckathorn (2002, p. 20) points out that Sheikh Fatima, UAEs First Lady, has played a great role in ensuring that women have made great achievements in leadership roles.

She established an organization for women in 1975 as well as an umbrella society for all women called UAEs women Federation. At the beginning, the federation aimed at linking UAE women with international organization, raising their cultural standard through planned activities, ensuring needy women is reached by social care and services, eradicating illiteracy and developing self-esteem and image of women (Heckathorn, 2002, p. 20; Miller, 2001, p. 160). Today, Miller (2001, p. 160) argues that through the federation, women have risen to occupy positions of leadership in fields such as insurance, designing, engineering, cosmetics, banking, architecture, and all media aspects. Some examples of women leaders in UAE include Sheikh Zayed, UAEs First Lady, and Farida Kamber, an emirate businesswoman (Heilmann, Bell & McDonald, 2009, p. 90).

The latter, besides being a leader of an interior design company, has won numerous awards. It is imperative to note that the first lady has been on a campaign for UAE women to members of the national council, members of parliament and work in media houses. She has desired to have women from all walks of life have full rights in decision-making processes, participate in politics and be equal with male their compatriots (Omair, 2009, p. 416). Some of them had been motivated from the early beginnings from the success witnessed in their male counterparts.

The fact that men have always succeeded in leadership has greatly boosted the confidence of UAE women to start and independently lead others or run their enterprises without relying on men (Randeree, 2006, p. 65). On the same note, the cultural dilemma that had faced most women in past has indeed gone down and as a result, women are no longer viewed as house-keepers but as equal competitors both in the academics and in the business world

In my perspective, women play a momentous role in facilitating change and development in the UAE countries. According to Al-Ajmi (2001, p. 103), their daily contribution to the socio-economic well being of the nation cannot be overstated here. As indicated, the areas of importance where UAE women play an integral leadership role are in the private sector and even the public sector (Al-Ajmi, 2001, p. 103). In private sectors, their contributions are seen through the establishment of businesses. Since not all women in the UAE are finding it easy to compete against men in leadership, many of them have been encouraged through women organizations not to give up as the society has a place for women especially in leadership in the business cycles.

Indeed, this situation has prompted many women entrepreneurs to compete favorably and stiffly with their male counterparts (Richardson & McKenna, 2006, p 18). It is interesting to note that despite the challenges experienced by women entrepreneurs in UAE, there are still a host of motivating factors that keep them going as observed. For instance, as aforementioned, it has been noted that women form a huge chunk of university graduates in UAE in the sense that most of them are indeed well educated, a scenario that put s them into favorable competing ground in terms of leadership with another individual especially men. This is especially so considering that they are the majority in the society, making up about fifty-one percent of the worlds population. This being the case, it is important to note that empowering women in society will go a long way in helping everyone there.

Leadership development

As indicated earlier, it was traditionally known that the place for the Arabic woman is the home. Her life revolves around her family; her children, her husband and generally keeping the home habitable. As such, it attracts a lot of attention to see how UAE women have developed in their leadership styles and are now spreading their wings far and wide, beyond the confines of the four walls of their houses even to leadership in the society. Richardson & McKenna (2006, p 18) argue that women in UAE have indeed been inspired to focus their effort on taking leadership roles bearing in mind that the formal sector is largely dominated by males and few women find employment opportunities there.

The available opportunity in the government public sector is also highly competitive compelling women to seeking leadership roles to increase their efforts (Richardson & McKenna, 2006, p 18). It is also worthy to note that UAE countries seem to be offering vast leadership opportunities for women even though they need to step out of their comfort zones and prove their worth in a male-dominated society (Metle, 2002, p. 259). Opportunities for leadership are vast. As such, the available leadership opportunities for women in the UAE can only be explored if the right effort, commitment, and knowledge are put in place (Metle, 2002, p. 259).

It is important for women engaging in leadership to get to know that real commitment and application of stringent leadership skills cannot be evaded at any given time during any operation. Also, women need to understand that whenever they set their focus on leadership, they should expect challenges that come with it. Al Gharaibeh says that women are discriminated against in the workplace based on their gender, despite their broad participation in the workforce. Discrimination occurs subtly as well as blatantly. An example of subtle discrimination is in the choice of careers(2011, p. 103). As most studies have pointed out, most women performing leadership roles reaches a period when they are faced with challenges.

Many women leaders in UAE have indicated that in their leadership, they have been faced with a myriad of challenges but they have always been determined to remain afloat and persistent. It is instructive to note that both men and women in the UAE have unique roles that they play in society (Rose, 2005, p. 460). Although they have equal opportunities in life, the latter has historically struggled to assume leadership positions in a male-dominated world. Despite this, the case of the developed world is rather unique since women seem to be at the center stage of development controlling many sectors in the economy. These developed economies are being transformed by females (Talhami, 2004, p. 16).

My main worry is that employment opportunities for women in the construction and public works sector cannot sustain the population for a longer period of time. For example, jobs in the construction sector last as long as the construction boom lasts (Hutton, 1995, p. 64). The jobs from this sector are more or less cyclical, meaning that they are unable to provide a stable or high-quality employment in the future. Those who are working in the construction and public works sector are less likely to be able to enter into employment in other sectors when the construction boom comes to an end. They are likely to revert to the unemployed class, in effect widening the unemployment rates in the country.

Even though employment is generally high in UAE, the case is different when one considers the women who are in leadership in the construction and public works industry. This is given the fact that they are unable to work in this industry, where most of the employment opportunities are to be found (Metle, 2001, p. 320). As such, it indicates that unemployment among the male population is declining, that among the female population is on the rise.

Conclusion

To sum up, the challenges posed by gender on the issue of leadership is not limited to the UAE only. Even though no evidence segregate enterprise ownership along gender line, current statistics, as already mentioned, reveal that a lesser percentage of organizations are owned by women while the remainder are owned by males. Furthermore, there is minimal statistical evidence on the growing number of women engaging in decision making and leadership activities. As already noted, the UAE economy has grown, resources are abundant, and the government support women leadership. As such, the economy provides the best opportunity for women to excel in leadership roles.

Additionally, women have also extended their struggle to obtaining leadership positions, where women are trying to prove that they can perform as men or even in a better way contrary to what the society has belied in for decades now. Up to now, women in the wider United Arab Emirates (UAE), owing to the well-developed economies, seem to have made huge strides in terms of leadership. It is approximated that women run and control about thirty percent of major business organizations in the UAE. These businesses owned and managed by women are playing momentous roles in boosting the economic development of this economic bloc. Therefore, their impact on modern society cannot be underestimated.

References

Al-Ajmi, R. 2001. The Effect of Personal Characteristics on Job Satisfaction: A Study Among Male Managers in the Kuwaiti Oil Industry. International Journal of Commerce & Management. 11(3/4), 91-110.

Al Gharaibeh, F. 2011. Womens Empowerment in Bahrain. Journal of International Womens Studies, 12(3), 96-113.

Al-Jenaibi, B. 2010. Differences between gender treatments in the work force/les différences de traitement entre les sexes dans la population active. Web.

Al-Tarrah, Ali (2010). Women in the development of Kuwait. Digest of Middle East Studies. 2, 1-33.

Anon. 2011. Work-to-family conflict: a review and agenda for future research. Job Occupation Health Psychol. 5(2), 278-308.

Arab Law Quarterly 2000. Dubai technology, electronic commerce and media free zone law No. 1 of 2000. Arab Law Quarterly. 15(4), 411-417.

Arab Law Quarterly. 1996. UAE: Recent developments. Arab Law Quarterly. 11(1), 50- 68.

Bahgat, G. 1999. Education in the gulf monarchies: Retrospect and prospect. International Review of Education / Internationale Zeitschrift fur Erziehungswissenschaft / Revue Internationale de lEducation, 45(2), 127-136.

Behery, M. 2008. Leadership, knowledge sharing, and organizational benefits within the UAE. Web.

Bristol-Rhys, J. & Rugh, A. 2009. the political culture of leadership in the united arab emirates. Web.

Clark, A. E., Frijters, P., & Shields, M. 2008. Relative income, happiness, and utility: An explanation for the Easterlin Paradox and other puzzles. Journal of Economic Literature. 46(1), 95-144.

Claros, A. L., & Zahidi, S. 2005. Womens empowerment: Measuring the global gender gap. Web.

Dencker, J. C. 2008. Corporate restructuring and sex differences in managerial promotion. American Sociological Review 73(3), 455-476.

El-Baz, H. & El-Sayegh, S. 2010. Competency domain model and the perception of engineering managers in the United Arab Emirates. Web.

EL-Haddad, M. 2006. Nursing in the United Arab Emirates: an historical background. International Nursing Review. 53(4), 284-289.

Fabra, M. E. & Cesar, C.2009. Direct and Indirect Effects Of Education On Job Satisfaction: A Structural Equation Model For The Spanish Case. Economics of Education Review 28(5), 600-610.

Fatima, A. 2001. Women and economic changes in the Arab gulf: the case of the United Arab Emirates. Digest of Middle East studies 10(2), 17-39.

Gaad, E. 2006. Systems analysis of UAE education system. International Journal of Educational Management, 20(4), 291.

Gallant, M. & Pounder, J. S. 2008. The employment of female nationals in the United Arab Emirates (UAE): An analysis of opportunities and barriers. Education, Business and Society: Contemporary Middle Eastern Issues 1(1), 26-33.

Grandey, A. A., Cordeiro, B. L. & Crouter A. C. 2005. A longitudinal and multisource test of the work-family conflict and job satisfaction relationship. Journal of Occupational and Organizational Psychology. 78(3), 305-324.

Heckathorn, D. D. 2002. Respondent-Driven sampling II: deriving valid population estimates from chain-referral samples of hidden populations. Social Problems 49(1), 11-34.

Heilmann, S. G., Bell, J. E. & McDonald, G. K. 2009. WorkHome Conflict: A Study of the Effects of Role Conflict on Military Officer Turnover. Intention Journal of Leadership & Organizational Studies. 16(1), 85-96.

Hutton, T. (1995). Education for individual living. Educators Journal, 45(3), 64-66.

Khalaf, S., & Alkobaisi, S. 1999. Migrants strategies of coping and patterns of accommodation in the oil rich gulf societies: Evidence from the UAE. British Journal of Middle Eastern Studies, 26(2), 271-298.

Madar Research Group. 2003. Dubai knowledge economy 2003-2008 Volume I (13). Dubai: Madar Research Group.

Madar Research Group. 2004. Dubai knowledge economy 2003-2008 Volume II. Dubai: Madar Research Group.

Madsen S. R. 2009. Transformational learning experiences of female UAE College students. Web.

Marshall, J. 1995. Women managers moving on: exploring career and life choices, New York:Green Publishing services.

Mernissi, F. 1987. Beyond the veil: male-female dynamics in modern Muslim society.Indiana: Indiana University Press.

Metle, M. 2001. Education, job satisfaction and gender in Kuwait. The International Journal of Human Resource Management 12(2), 311-332.

Metle, M. 2002. Traditional culture and job satisfaction among kuwaiti women employees in the kuwaiti public sector. Women in Management Review 17(6), 245-261.

Miller, J. 2001. Women and family honor: the face of feminine identity in Jordan. Web.

Mora, T. & Ferrer-i-Carbonell, A. 2009. The job satisfaction gender gap among young recent university graduates: evidence from catalonia. Journal of Socio- Economics 38(4), 581-589.

Neal, M., Finlay, J & Tansey, R. 2005. My father knows the minister: A comparative study of Arab womens attitudes towards leadership authority. Web.

Omair, K. 2009. Women executives; gender; clothing; Middle East. Gender in management: An International Journal 24(6), 412-431.

Randeree, K. 2006. The impact of historical and cultural effects on the advancement of women in the economy in the Arabian Gulf Region: Participation of women in the Arabian Gulf. International Journal of Knowledge, Culture and Change Management, 6(1), 65-68.