Saturday, January 25, 2020

Analysis Of Bps Operational Risk Management Management Essay

Analysis Of Bps Operational Risk Management Management Essay British Petroleum PLC (BP), one of the worlds largest oil and gas companies, is headquartered in London, United Kingdom. It provides its customers with fuel for transportation, energy for heat and light, retail services for gasoline and petrochemical products for everyday items (About BP, 2011). The Companys operations primarily include the exploration and production of gas and crude oil, as well as the marketing and trading of natural gas, power, and natural gas liquids. At present, BP employs over 80,000 people and operates in more than 100 countries. It produces approximately 3.8 million barrels of oil per day and has 22,400 service stations worldwide (BP, PLc Swot Analysis, 2010). In 2010, the Company incurred incredible losses from the Deepwater Horizon Oil Spill Incident in the Gulf of Mexico due to lack of oversight and control of operational risks (McDonald, BP Oil Disaster Breaks Records, Puts Spotlight On Risk Management Failure, 2010). The Incident has caused disastrous biological environment, 13 peoples deaths and 17 others injuries (McDonald, BP Oil Disaster Breaks Records, Puts Spotlight On Risk Management Failure, 2010). Immediately after the Incident, the Companys risk management practices were investigated. The scrutiny ultimately led to the dismissal of its CEO, Tony Hayward (McDonald, BP Oil Disaster Breaks Records, Puts Spotlight On Risk Management Failure, 2010). In this report, we will explore how BP unsuccessfully managed its operational risks prior to the Incident, and the strategic steps that have been taken in order to mitigate the losses and prevent a similar crisis from happening again. Reasons that Led to BPs Exposure to the Incident According to McDonald, the Incident was mainly attributable to the poor operational risk management of the corporate executives who placed a low priority on the safety issues (McDonald, BP Oil Disaster Breaks Records, Puts Spotlight On Risk Management Failure, 2010). McDonald also mentioned that Hayward appeared to know nothing about the front-line operations in the Company (McDonald, BP Oil Disaster Breaks Records, Puts Spotlight On Risk Management Failure, 2010). Furthermore, BPs history of oil spill incidents demonstrated its poor operational risk management in the past years. These previous tragic incidents included the U.S. refinery explosion in 2005 and the Prudhoe Bay oil spills in 2006 and 2007 (Fineberg, 2007). Since the Company continued to ignore the safety issues and risk management even after these incidents, a more serious Incident in the Gulf of Mexico has occurred. Finally, BP failed to inspect the oil rig on a monthly basis as prescribed in the government regulation (Strickler, 2010). A government inspection report revealed that BPs Deepwater Horizon oil rig had missed 16 inspections in total since January 2005(Strickler, 2010). Financial Losses and Reputational Damage following the Incident Following the Incident, BP was required to reduce planned capital expenditures and increase asset disposals in order to provide additional liquidity (BP p.l.c, 2010). Moreover, a total pre-tax charge of $40.9 billion was recognized during 2010 (BP p.l.c, 2010). However, BP is still uncertain about the total amount that will ultimately be paid. The Company is currently being charged in a number of lawsuits that could lead to substantial costs (BP p.l.c, 2010). These costs may include the amount of pending and future claims, the potential expenses of implementing remedies sought in the various proceedings, and the amount of fines ultimately levied on BP (BP p.l.c, 2010). As seen in Appendix A, Moodys Investors Services and Standard Poors have downgraded BPs credit ratings immediately after the Incident. Although there have been slight improvements ever since, the current credit ratings are still lower than they were immediately before the Incident. The lower credit ratings prompted a large number of investors, who were holding BPs US Industrial Revenue/Municipal bonds, to exercise their option to tender the bonds for repayment (BP p.l.c, 2010). This caused BP a total repayment of $2.5 billion (BP p.l.c, 2010). The lower credit ratings could also limit the Companys access to new financing. In addition, the Incident has led to a significant drop in BPs share price. On June 25 of 2010, the share price went down to the lowest point of $27. 02, as compared to $60.48 on April 23 of 2010, the day of the Incident (BP plc (ADR) (Public, NYSE:BP) ). Along with the financial losses, the Incident has damaged BPs reputation, which may have a long-term impact on the Companys ability to build business relationships with new counterparties and access new opportunities (BP p.l.c, 2010). Moreover, the current counterparties, concerned about the additional financial and business risks following this Incident, may require the Company to provide collateral or other forms of financial security for its obligations (BP p.l.c, 2010). Risk and Liquidity Management After the Incident, BP has taken preventative measures to mitigate future unexpected events related to poorly-managed operational risks (McDonald, All Road Lead to CEO, 2010). On September 29 of 2010, the new CEO, Bob Dudley, announced a plan to establish a new safety division with sweeping powers to oversee and monitor the Companys operations around the world (BP Creates New Safety and Risk Division, 2010). The new division has been given the authority to intervene in all aspects of BPs technical activities. The divisions experts will be embedded in BPs operating units, including exploration projects and refineries. These experts have the responsibility to ensure that all operations are carried out in compliance with government regulations and auditing standards (BP, 2010). In order to further reinforce this new practice, Dudley has requested the head of the safety division to report directly to him so that all information regarding the Companys current operational risk status can b e conveyed in a timely manner (McDonald, All Road Lead to CEO, 2010). BP has also reinforced its accountability of risk management by restructuring its exploration and production segment from a single business into three separate functions-exploration, development and production (BP, 2010). This makes it easier for BP to monitor each function separately. To increase available liquidity, BP cancelled the ordinary share dividends in the first three quarters of 2010, secured additional bank lines totaling $12 million and announced its intention to sell up to $30 billion of assets (BP p.l.c, 2010). Conclusion Prior to the Incident, BPs executives overlooked the necessity of operational risk management. This made the Company vulnerable to operational risks. Even after the two oil spills between 2005 and 2007, BP still did not take effective measures to improve its risk management practices. Fortunately, the problem has finally been recognized by Dudley, who has initiated constructive plans to enforce operational risk management across all divisions in the Company. Appendix Appendix A: A comparison of BPs Credit Ratings before and after the Incident Before Immediate After Current Moodys Investors Service Aa1 (stable outlook) A2 (negative watch) A2 (stable outlook) Standards Poors AA (stable outlook) A (negative watch) A (negative outlook) Source: BP p.l.c. (2010, December 31). Annual Report and Form 20-F 2010. Retrieved March 20, 2011, from BP Global: http://www.bp.com/assets/bp_internet/globalbp/globalbp_uk_english/set_branch/STAGING/common_assets/downloads/pdf/BP_Annual_Report_and_Form_20F.pdf

Friday, January 17, 2020

Manifest Destiny Essay

Manifest Destiny is defined as â€Å"a belief that it was God’s will that Americans spread over the entire continent, and to control and populate the country as they see fit.† Many expansionists conceived God as having the power to sustain and guide human destiny. It was white man’s heavy burden to conquer and Christianize the heathen and savage land. While the positive side of Manifest Destiny was a surge of enthusiasm and energy from the white settlers for pushing West, the negative side was the belief that the white man had the right to destroy anything and anyone — namely Indians — who got in the way. Tracing the path of Manifest Destiny across the West would highlight mass destruction of tribal organizations, confinement of Indians to reservations, and full blown genocide. The dark side of Manifest Destiny revealed the white man’s belief that his settlement of the land and civilization of its native peoples was preordained. While the whites were occupying the land, they decimated the Indian population, causing many tribes to flee their relentless onward push, or try to compromise with treaties and agreements. One such tribe to fall victim to the white encroachment upon their territory was the Nez Perce of North Western Oregon. The Nez Perce agreed to an 1855 treaty that guaranteed the tribe most of their traditional homeland in the Wallowa Valley of northeast Oregon to try to accommodate the white people who were beginning to invade their lands. Unfortunately, gold was soon discovered upon the Nez Perce land and the settlers wanted a larger portion of that land. The resulting 1863 treaty was agreed to by some tribal chiefs, but not all. Those who refused to sign were given an ultimatum in 1877, and rather than risk war, the non-treaty Nez Perce chiefs–Joseph, Looking Glass, White Bird, Toohoolhoolzote, Bald Head–decided to move their people onto the smaller remaining section of the reserva tion, towards Fort Lapwai. Look more:  manifest destiny essay There were nearly 800 of the Nez Perce–men, women and children–and a herd of about 2,000 Appaloosa horses on the trek. On the way to Lapwai, things fell apart. A few young warriors were goaded into taking revenge on several whites who had killed tribal members in the past, and the U.S. Army retaliated by attacking the Nez Perce at White Bird Canyon, Idaho. Giving up the attempt to move to the reservation, the Nez Perce chiefs resolved to  flee to the east and seek out their Crow allies in Montana. When the Crow tribes showed them no friendship and tried to steal their horses, the Nez Perce set off for Canada. They almost made it, but the U.S. Army caught up with them and defeated them 45 miles shy of the border. Although the Nez Perce were one of the welcoming tribes that met Lewis and Clark, their kind efforts led to revenge, misunderstanding, deceit, greed and death. Another tribe which was victimized by the United States were the Cupeà ±os. The Cupeà ±os were a small tribe, one of the smallest Native American tribes in Southern California. It was unlikely that they ever numbered more than 1,000 at a time. They once occupied a territory approximately 10 square miles in diameter in a region of the San Luis Rey River in the valley of San Jose de Valle. Before 1810, the Cupans had very little contact with outsiders — Spanish or otherwise. They had lived on their land for countless generations, their land including the medicinal hot springs and the village called Cupa. Unfortunately for the Cupenos, the pioneers who trekked West through the southern route, took a trail which trespassed upon their territory. To add insult to injury, American officials in San Diego concluded that a reasonable source of revenue would be taxation upon the Indians of the back country. The Cupans were assessed a $600 tax that with great resentment was finally paid by the villagers. By the late 1800’s the hot sulfur springs found on the Cupa territories were becoming very popular and attracting visitors from Los Angeles and San Diego. The popularity of the destination and the growing California population began the events which ultimately led to the expulsion of the Cupans from their homeland. Four years after California became a state, a land survey commission was formed, and cattleman Juan Jose Warner claimed 47,500 acres of what is now Warner Springs. Warner Springs makes up the majority of the Cupan homeland. The property was later purchased by former California Governor John Downey in 1880. Downey then filed a lawsuit — later pursued by his heirs after  his death — claiming title to the land and demanding eviction of the Cupenos from the property. The Cupas argued before the courts that Mexican law, as well as the peace treaty that ended the war between Mexico and the United States, ensured Indian rights and precluded the hostile takeover of their land. They argued to no avail. The California courts agreed with Downey and in 1901 the United States Supreme Court affirmed the judgment ordering removal of the Indians. President Rutherford Hayes, prompted by the Supreme Court holding, declared the Indians â€Å"trespassers† and ordered the tribe relocated to Pala, California, just beyond the Palomar Mountains where a 10,000-acre reservation had been established. Pala was a Luiseno reservation then, not Cupa. This act marked the first time in U.S. history that two distinct Indian tribes were herded together in one reservation. This was a blemish upon a nation that prided itself on leading the world into the 20th Century and the cultural and political renaissance that accompanied such a transition.

Thursday, January 9, 2020

Primary Physical And It Security Threats - 1731 Words

Primary Physical and IT Security Threat to Organizations Name of Course Your Full Name Name of Institution Abstract This paper is written in the form of an advice by a chief security officer to the CEO of a company. It shows the general physical and IT threats that a company is faced with and how it can be dealt with. The study shows that there are physical threats that affect a firm’s computer hardware. This includes threats to the hardware itself and threats to the premises and intermediary systems. IT threats includes threats to data security and breaches to the system. This can be handled through a strategic approach that involves risk assessment, formulation of an IT security plan and its implementation. Introduction Information is an important aspect of every organization. Information technology (IT) is a tool for competitive advantage and it is important for the efficient and effective utilization of resources in an organization. Therefore, keeping information within our IT infrastructure and Information Systems is an important part of ensuring that we achieve the main goals of our investments into the IT systems and processes. In this paper, the Chief Security Officer of an organization outlines the primary challenges of physical security threats and IT security threats. The scope of the paper will cover the two individually and collectively. The paper will show ways of balancing the two threats and achieving the best and optimal results in using a firm’sShow MoreRelatedPublic Safety Communications Security Awareness Guide774 Words   |  4 Pages Public Safety Communications Security Awareness Guide There are growing concerns that our current emergency response communications systems have flaws that place first responders at risk. Some of the problems include unsecure communication network systems, facilities, and a lack of security awareness that compromise critical information. Despite efforts to procure innovative technologies to improve security, limited access from disruptions continue and affect how emergency responders addressRead MoreThe Vulnerability Of Network Infrastructure Vulnerabilities1436 Words   |  6 Pages Security services are an integral part of any network design. Assessing the vulnerability of network infrastructure to disruptive events is recognized as an important component of network planning and analysis. This section provides an overview of common network infrastructure vulnerabilities, essential network security concepts analysis and present. It illustrates the possible placement of servers including access paths to the Internet, intrusion detection systems (IDS), and firewalls. This paperRead MoreSecurity : A Critical Management Function1421 Words   |  6 PagesCCJS 345 Intro to Security Management Project 2: Paper on Security Roles 11 September 2014 â€Æ' Security is a critical management function in most businesses. Where security strategies and operations were almost unheard of 35 years ago, there are now vice presidents of loss prevention and even chief security officers (CSOs) at most multi-national corporations who report directly to the chief executive officer (CEO) or the chief operating officer (COO). In most instances, the security position has becomeRead MorePrinciples of Information Security 4th Ed Chapter 1 Review Questions801 Words   |  4 PagesKevin Kovack Chapter 1 Review Questions 1. What is the difference between a threat agent and a threat? A threat is a constant danger to an asset, whereas a threat agent is the facilitator of an attack. 2. What is the difference between vulnerability and exposure? Vulnerability is a fault within the system, such as software package flaws, unlocked doors or an unprotected system port. It leaves things open to an attack or damage. Exposure is a single instance when a system is openRead MoreThe Basic Components Of A Public Key Infrastructure1107 Words   |  5 Pages. Public Key Infrastructure (PKI) provides the framework services, technology, protocols, and standards that manage strong information security systems. Without a public key infrastructure, public key technology is not generally suitable for large-scale enterprise deployment. The purpose of a public-key infrastructure is to manage keys and certificates, which are used for documentation, entitlements, authentication, and confidentiality. Through managing keys and certificates, an organizationRead MoreIs4550 Week 5 Lab1611 Words   |  7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreNational Security in Foreign Policy645 Words   |  3 Pagesinstruments are used, the primary objective of states in outlining their foreign policies is to maximise their national security. †¢ States can go about maximising national security through different means such as by military force, economic prosperity and/or the general welfare of its people. †¢ Difficult to analyse to what extent national security is a primary objective of states – theories of IR will help explain states’ motives and how they go about maximising state security, if it is their prime objectiveRead MoreA Brief Note On Terrorism And The European Charter Of Human Rights1073 Words   |  5 PagesIt’s noted that the greatest threat Europe faces isn’t cyberwarfare, cyber terrorism, or espionage, but rather software and hardware failure. (Information Management Journal, 2015). One of the key challenges to resolving infrastructure weakness is that each country approaches it differently. In recent years, cybersecurity was an intermediary international concern in Europe and privacy was the principal concern for Europeans. On the Internet, Europeans promote the â€Å"right to be forgotten† and theyRead MoreComptia a+972 Words   |  4 Pages1. Actions that can damage an asset A threat: Flood, earthquake, severe storms. 2. Laws to protect private financial information * Federal information security management act(FISMA) * Sarbanes Oxley act (SOX) * Gramm leach Bliley act(GLBA) * Health insurance portability and accountability act(HIPAA) * Children’s internet protection (CIPA) * Family educational rights and privacy act (FERPA) 3. Parts of layered security that supports confidentiality * Defining organizationRead MoreThreats, Vulnerabilities And Risks1673 Words   |  7 Pages 3 Threats, Vulnerabilities and Risks 3.1 Vulnerabilities According to Rufi (2006) the vulnerabilities in any network are divided into three primary weaknesses; technology vulnerabilities, configuration vulnerabilities and security policy vulnerabilities. However, the company’s network suffers from a number vulnerabilities that fall under these three primary weaknesses and other kinds of vulnerabilities includes: †¢ Technology vulnerabilities: according to Rufi (2006) TCP/IP protocols are naturally

Wednesday, January 1, 2020

Why School Nurses Must Required More Mental Health Training

School Nurses Require More Mental Health Training This article attempts to establish that it is imperative for all school nurses to be properly trained in mental health issues. Ensuring they have the confidence needed to recognize the early signs of mental issues so they may support and intervene in a cohesive manner. The reason this article is important to mental health nursing is that it relates to many newly graduated registered nurses, who may feel inadequate in assessing mental health illnesses and how to handle each individual case. These issues must be addressed in order to eliminate unwanted self-harming individuals. Article Summary Mental health is a specialized field in which most school nurses did not think being a school nurse would require such skills. Hence numerous school nurses expressed their concerns relating to whether they were providing the student who had suicidal thoughts the correct advice or not. Due to these concerns mental health agencies and the government were then encouraged to define and implement a five year plan, to support and train school nurses. This E-program via webinars was designed to increase school nurses confidence in mental health issues. Emphasis on a comprehensive mental health assessment and prevention program will allow all school nurses to be on the same page, opposed to making up their own questions to ask a student in evaluating the seriousness of a mental health issue. However mentioning the following statistics willShow MoreRelatedDevelopment Of The Psychiatric Mental Health1199 Words   |  5 PagesThe development of the Psychiatric Mental Health Nurse Practitioner (PMHNP) specialty began in the late 19th century as reform began to take place within the mental asylums of the time. Focus began to shift from restrictive treatment and the â€Å"baby-sitting† of patients towards actual medical treatment of those with mental illness (ANA, 2012). In 1882, Dr. Edward Cowles established the first hospital for the insane with a formally organized nurse training school. Central to the operation of theRead MoreA Brief Note On The Health Care Jobs1609 Words   |  7 Pages In the medical field, there are different health careers to choose from. My topic is about two health care jobs, which anywhere in the world have a high demand. How they are similar to each other. How they differ, and why these both are significant jobs that will nev er be phased out. One of the health care careers that I would consider popular today is the Nursing Assistant. It offers a vast array of benefits. You can go to school and be trained in the basics of nursing assistant inRead MoreThe Process Of Becoming A Nurse1588 Words   |  7 Pagesof Becoming A Nurse As a young child everyone was told from their parents to either go into the business or medical field because they are great professional field that also pays well; which, the outcome of the job will better many peoples future if this path is taken. The first step on becoming a nurse is first is figuring out what type of nursing branch or field will suit professional needs such as adult (elderly), children (pediatric), learning disability or mental health. Also, what certainRead MoreAn Individual s Health Status Of Your Vulnerable Group1700 Words   |  7 PagesMENTAL ILLNESS Predisposing factors and how it presents in the lifestyle/health status of your vulnerable group. An individual’s mental health or psychological well being determine if the person will be able to lead a fulfilling life. Mental health may affect a person’s emotional, social, and personal aspect of their life. Individuals who have biological relative with mental illness, exposure to toxins, drugs or alcohol during pregnancy, stress, chronic medical condition, brain damage, traumaticRead MoreNursing Philosophy : Nursing And Nursing Essay1660 Words   |  7 Pagesphilosophy is defined as a nurse or students thought of what they believe to be true about the nature of the profession of nursing and to provide a base for nursing practice. (2016, para.1) The nursing field continues to develop into a professional scope of practice and nurses continue to work to develop a high standard for the profession. The values and skills that nurses’ learn as they care for patients continue to develop into rules and regulations for future nurses. As a nurse it is important to c reateRead MoreWorkforce Instability Due At The Nursing Field1549 Words   |  7 Pagesoverworked volunteers in mental health clinics. He compared the loss of idealism in these volunteers to a building--once a vital structure--that had burned out, and he defined burnout as the progressive loss of idealism, energy, and purpose experienced by people in the helping professions as a result of the condition of their work (Freudenberger 1970 as cited in Copper, 2001). Though nurses themselves may be overwhelmed, distraught, and unhappy. A high patient-to-nurse ratio have been shown toRead MoreFamily Nurse Practitioner1131 Words   |  5 Pagesï » ¿ Family Nurse Practitioner Family Nurse Practitioner Healthcare in the United States in the 1950’s and 1960’s experienced an upheaval with the expanded availability of the Medicare and Medicaid programs and the increased specialization of medicine. The shortage in providing health care coverage to low-income women, children, the elderly, and people with disabilities gave clinically experienced nurses the opportunity to fill the primary care void. This wasRead MoreWomens Health Care For Teens Through Menopause, Family Planning2566 Words   |  11 Pagesa healthy pregnancy and a healthy life begins with the help of a midwife nurse. According to Caroline Porter Thomas, an expert in nursing career explains,† Certified nurse midwives (CNMs) are responsible for providing medical care to women before, during and after pregnancy. They can also provide primary women’s health care for patients in any stage of life† (Caroline Porter Thomas). Which means that midwife nurses are more known for maintaining a women healthy throughout her entire pregnancy andRead MoreBecoming An Intellectual And Competent Nurse1600 Words   |  7 Pagesintellectual and competent nurse, I believe that I should strive to be well-rounded in a variety of aspects. My experiences as a former outpatient, a nursing assistant trainee, and being part of a patient’s family make up the foundation of my personal nursing philosophy. Furthermore, I am aware that self-care, empathy, culture, communication, advocacy and education are some of the most significant factors that all individuals should be informed of before choosing a career path in the health care setting. IRead MoreHealthcare Professions Examined : Registered Nurse3654 Words   |  15 Pages Healthcare Professions Examined: Registered Nurse My goal is complete my degree in B.A. in Science Health and to continue with my education and become a Registered Nurse. The nursing field is an important field and it interests me due to wanting to help other people. I would like to explore my options within the field but I feel compelled to work with children that have disabilities or have developmental delays. I am not sure where I would like to work, a hospital setting may be too stressful