Good Chemical Derailment On Military Installation Business Plan Example
Type of paper: Business Plan
Topic: Risk, Information, Military, Management, Project, Organization, Stakeholders, Assessment
Pages: 3
Words: 825
Published: 2021/02/16
It is necessary to get all data related to risk and its management so that the project can be precise and relevant. Sources of threat or hazard information to execute the project includes assessment of existing threat and hazard analysis, previous incidents, local and neighboring communities, news reports and intelligence, community partners which also includes emergency management agencies, local and state risk mitigation offices, volunteer organizations research organization. Personnel of risk management agencies, emergency handling organizations and security official responsible for safety in military installations are important sources for valuable data about countermeasures to mitigate risks. These sources provide background of risks and the threat to assets / consequences and intensity of vulnerability. Individual with experiences and awareness about risks and management can give the most reliable information about counter-measures to reduce and remove the effect of potential risk (Hubbard, 2009). Experts on the military installations, its designs, structure and safety and countermeasure can give the reliable information on countermeasures. The data obtained from these sources will be of more credibility and usefulness.
Activities planned for the implementation of project includes;
data collection from governmental and military about the topic
interviews with risk management specialists
visits to important area like areas of incidents and derailments
meetings with risk management experts on military installations
These sources of information will require various approaches of interviews, personal visits to the area, meeting with someone holding relevant designation in military, or any other government organization, are expected to provide relevant information required for the project. Activities like visits to the sites to anticipate the level of vulnerability, meetings with a specialists, who has experience in handling such situation may be a useful source of vulnerability information, and statistical and assessment and/or studies made in previous such incidents are critically important. The importance of sources changes with time to time with respect to the research topic (Hubbard, 2009).
Data collection from the above sources will require the researchers to be very careful because it is a sensitive topic, hence the need to come up with a good plan. The first step will be to determine the sample that will be used for this research. This will include selecting the participants from the various sources. In the community, the participants can be selected in terms of age, gender, education level or their proximity to the military installation (Meera, n.d.). Other sources like the emergencies management agents, the participants can include the officers who have previously responded to emergencies in the Joint Base Naval Station Charleston. The second step on data collection will be to carry out a pilot-test of the instruments. This helps to confirm that the selected instruments for the research will work correctly when the actual research is carried out. Similarly, it helps to check whether the set guidelines of the research are easy to follow and if the selected sample is adequate. Ensure that the rights of the participants are protected throughout the research project. The researcher should make sure the participants are treated with dignity and their information is protected. Then the respective personnel will be trained on the data collection process and techniques and make sure they book the date and time for the interviews and personal visits and meetings. The next step will be to get the consent from the participants followed by the interviews, personal visits and the meetings. The research personnel will make sure all the participants have filled all the information required in the questionnaires. The last step will be to analyze the data then write a report (Meera, n.d.).
Countermeasure factors that will be used to mitigate the risks include actions that will assist to reduce or prevent the damages caused by the chemical derailment on military installation. These countermeasures include identifying the threats by forming a risk assessment team from all the sources involved in this research. It is very important that this team is lead by individuals who are experts in chemical derailment. These experts will help to lead the team throughout the process and give a report to the stakeholders (pci, 2012). If there are no experts then an organization that specializes in risk assessment can be contracted for this task. The use of expert individuals in this process is very vital because they ensure the correct threat identification is done and all the threats are removed. Countermeasures involve risk assessment methodology, which has three steps, namely; risk identification, profiling and treatment (pci, 2012).
Stakeholders
The stakeholders include; government security agencies, emergency handling agencies, private organizations of managing risks, military safety experts, military experts on transportation safety and logistics, military emergency services, Department of National Security, States and local government’s departments of risk managements, and environmental protection agency. All these departments and agencies are stakeholders along with the Federal government responsible to cater, react and mitigate any risk or threat immediately. As the project is based on risks of military installation, it is necessary to get assistance ‘above pay grade’ from them. There is little literature available for the study because it is a sensitive topic. High-level collaboration with all the stakeholders is needed to execute the project and successfully implement it (Hubbard, 2009). The incorporation of the Stakeholders is also important because they will assist in the funding of the research project. They will also give advice regarding the research process and their experience in minimizing chemical derailment on military installation.
References
Hubbard, D. (2009). The failure of risk management. Hoboken, N.J.: Wiley.
Meera. (n.d). Step 5: Collect Data. Retrieved 13 April 2015, from http://meera.snre.umich.edu/plan-an-evaluation/step-5-collect-data
pci,. (2012). Information supplement: PCI DSS Risk Assessment Guidelines. Retrieved 13 April 2015, from https://www.pcisecuritystandards.org/documents/PCI_DSS_Risk_Assmt_Guidelines_v1.pdf
- APA
- MLA
- Harvard
- Vancouver
- Chicago
- ASA
- IEEE
- AMA