Economics and managEmEnt
Transcription
Economics and managEmEnt
UNIVERSITY OF DEFENCE / CZECH REPUBLIC Economics and Management 2012 UNIVERSITY OF DEFENCE / CZECH REPUBLIC ECONOMICS AND MANAGEMENT 3 2012 Economics and Management - p. 3 - 2012 Brno 31 Dec 2012 Published by University of Defence in Brno ISSN 1802-3975 EDITORIAL BOARD EDITOR IN CHIEF Pavel FOLTIN Faculty of Economics and Management, University of Defence, Brno Czech Republic EDITORIAL BOARD Ladislav ANDRASIK Faculty of Electrical Engineering and Information Technology, Slovak University of Technology in Bratislava, Slovak Republic Ghita BARSAN “Nicolae Balcescu“ Land Forces Academy, Sibiu, Romania Vasile CARUTASU “Nicolae Balcescu“ Land Forces Academy, Sibiu, Romania Miroslav CEMPIREK Faculty of Economics and Management, University of Defence, Brno Czech Republic Marijana CINGULU Faculty of Economics & Business, University of Zagreb, Chorvatsko Petr CECH AWD, Brno, Czech Republic Monika GRASSEOVA Faculty of Economics and Management, University of Defence, Brno Czech Republic Frantisek HANZLIK Faculty of Economics and Management, University of Defence, Brno Czech Republic Hubert HRDLICKA Language Training Centre, University of Defence, Brno Czech Republic Josef KALAS Faculty of Economics and Management, University of Defence, Brno Czech Republic Ales KOMAR Faculty of Economics and Management, University of Defence, Brno Czech Republic Miroslav KRC Faculty of Economics and Management, University of Defence, Brno Czech Republic Oto KUBIK Academy STING – Private College, Brno, Czech Republic Marek KULCZYCKI The Tadeusz Kosciuszko Land Forces Military Academy, Poland Stefan KURINIA National Defence University, Warszaw, Poland Ivan MALY Faculty of Economics and Administration, Masaryk University, Brno, Czech Republic Ivan MRAZ General Staff, Prague, Czech Republic Ladislav POTUZAK Faculty of Economics and Management, University of Defence, Brno Czech Republic Milan SOPOCI Armed Forces Academy of General Milan Rastislav Štefánik, Liptovský Mikuláš, Slovak Republic Oleg STANEK The University of Quebec at Rimouski, Canada Jiri URBANEK Faculty of Economics and Management, University of Defence, Brno Czech Republic Jaroslav ZELENY Faculty of Economics and Management, University of Defence, Brno Czech Republic Iva ZIVELOVA Faculty of Business and Economics, Mendel University of Agriculture and Forestry in Brno, Czech Republic EXECUTIVE EDITOR Vitezslav JAROS Faculty of Economics and Management, University of Defence, Brno Czech Republic Copyright © 2012 All rights reserved. No part of this publication may be reproduced without the prior permission of University of Defence in Brno University Press. CONTENTS Martin BLAHA, Ladislav POTUŽÁK and Milan KALINA SETTING A METHOD OF DETERMINATION OF ‘FIRE FOR EFFECT’ FIRING DATA ……....................................................................................…….... p. 7 František BOŽEK, Lenka JEŠONKOVÁ, Jiří DVOŘÁK and Alexandr BOŽEK GENERAL PROCEDURE OF RISK MANAGEMENT …….............……........ p. 15 Miroslav CABÁK, Jan MRNUŠTÍK, Nataša POMAZALOVÁ and Stanislav MOŽNÝ THE TRAINING COURSE OF THE ISL MANAGEMENT: THE STUDY OF THE UNITS’ SHOOTING TRAINING …………......…………...………..……. p. 25 Danuše KRATOCHVÍLOVÁ, jun., Danuše KRATOCHVÍLOVÁ and David ŘEHÁK BASIC MEASURE OF CIVIL PROTECTION IN THE AREA OF BUILDINGS ESTABLISHED FOR THE GATHERING OF LARGE NUMBERS OF THE POPULATION ………………...............................................…………............….. p. 32 Radka LOPOUROVÁ MULTICRITERIA EVALUATION OF TENDERS IN THE CZECH ARMED FORCES – CONTEMPORARY STATE OF THE ART ……..……....……….. p. 40 Tomáš LUDÍK, Josef NAVRÁTIL and Karel KISZA SYSTEM DEVELOPMENT FOR SIMULATION AND EVALUATION EMERGENCIES ..................................................................................................... p. 46 Jaromír MAREŠ, Nataša POMAZALOVÁ and Václav ZAJÍČEK TEST RESULTS OF THE ENVIROX ADDITIVE’S INFLUENCE ON COMBUSTION ENGINES’ OPERATION ….………..........…………….....….. p. 55 Jan NOHEL INFORMATION SUPPORT FOR THE COMMANDERS’ PLANNING AND DECISION–MAKING PROCESS AT COMMAND AND CONTROL TACTICAL LEVEL …….........................................................……………………………...….. p. 64 Jakub ODEHNAL, Marek SEDLAČÍK and Jaroslav MICHÁLEK AN ANALYSIS OF THE IMPACT OF INSTITUTIONAL ENVIRONMENT ON TERRORISM RISK ................................................................................................ p. 74 Jaromír PITAŠ WORK BREAKDOWN STRUCTURE - A TOOL FOR SOLVING DECISION MAKING PROBLEMS IN PROJECT MANAGEMENT ………….…............ p. 84 Martin REJZEK, Martin VLKOVSKÝ and Tomáš BINAR THE SELECTION OF METHODS OF LAND MILITARY EQUIPMENT DIRECT LASHING ON RAILWAY GOODS WAGONS AND THEIR VERIFICATION BY MEANS OF CALCULATION ….............. p. 90 5 Ján SPIŠÁK ALLIED JOINT PUBLICATION FOR OPERATIONS PLANNING (AJP – 5) AS A NEW CHALLENGES FOR MILITARY PLANNERS …………….....…...... p. 99 Mária ŠIKOLOVÁ, Nataša MOCKOVÁ ARABIC AS THE SECOND FOREIGN LANGUAGE AT THE FACULTY OF ECONOMICS AND MANAGEMENT ……………...…………….................... p. 106 Vladimír ŠILHAN COMPARISONS OF MILITARY POWER ……………………...……........... p. 112 Marek ŠOLC RISK MANAGEMENT IN SYSTEMS OF „SECURITY” AND „SAFETY” ………………………………………………………………………………..…… p. 122 Jiří F. URBÁNEK, Jitka RACLAVSKÁ, Albert SRNÍK, Olga ŠIFFEROVÁ and Jaroslav VONLEHMDEN ORGANIZATION CONTINUITY PLANNING & MANAGEMENT AND SOCIETAL SECURITY SCENARIOS …………..…………..……...…............ p. 129 Jana VODÁKOVÁ FINANCIAL STATEMENTS OF THE PUBLIC SECTOR ENTITIES AND THEIR UTILISATION FOR ECONOMIC MANAGEMENT ……..…..…… p. 138 Dana ZERZÁNOVÁ, Marek SEDLAČÍK, Ivana ČECHOVÁ, Martin POP and Jana BERÁNKOVÁ APPLYING LEARNING MANAGEMENT SYSTEM AS EFFECTIVE DISTANCE LEARNING TOOL: EXPERIENCE FROM THE FACULTY OF ECONOMICS AND MANAGEMENT …………………………….……..…… p. 145 The Authors´ Bibliographies: .................................................................................. p. 153 The Reviewers´ Bibliographies: .............................................................................. p. 156 The language revision has not been made. The authors are responsible for the papers content. 6 SETTING A METHOD OF DETERMINATION OF ‘FIRE FOR EFFECT’ FIRING DATA Martin Blaha, Ladislav Potužák and Milan Kalina Abstract: This paper is focused on setting a method of determination of Fire for Effect firing data in the perspective of automated artillery fire support control system. Artillery units of the Army of the Czech Republic, reflecting the current global security neighbourhood, can be used outside the Czech Republic. The paper presents problems in the process of complete preparation, from results arising from creating a fictional auxiliary target; by using an adjustment gun; abridged preparation and Simplified preparation. The paper presents problems of current Artillery communication and information system and suggests requirements of the future system. Keywords: complete preparation, adjustment gun, simplified preparation, Fire for Effect 1. Introduction There are several ways to set firing data for Fire for Effect (FFE) of artillery units. They differ in accuracy and terms, which permit us to apply FFE. For FFE it is important to decide the most accurate way of setting the firing data in every situation. This decision making action was provided by artillery commanders during training activities, where they generally had only instruments and information, which usually resulted in one and the only way of setting firing data for effective fire. While using Artillery Fire Support Control System (ASRPP-DEL) it is necessary to define specific terms for setting firing data for effective fire by different means. Firing data for FFE can be set by these methods: - Complete preparation – Accurate Predicted Fire (APF); - By results from creating fictional auxiliary target; - By using an adjustment gun; - Abridged preparation; - Simplified preparation. [3] Terms and Conditions which permit the subsequent FFE are available in the czech publication Pub-74-14-01 “Pravidla střelby a řízení palby pozemního dělostřelectva”. This chapter defines conditions by which ASRPP-DEL sets the way of FFE firing data computation. 2. Accurate Predicted Fire Complete preparation (APF) is the way of setting FFE firing with such accuracy that adjustment of fire is not necessary. This is the key to achieving the effect of surprise. Due to this reason APF is the main way of setting firing data for effective fire. For calculation of data using complete preparation these measures have to be included: 1. Topographical-geodetically preparation. 2. Reconnaissance and target detection. 3. Meteorological preparation. 4. Ballistic preparation. 7 These conditions are mentioned in Scheme 35-The way of setting firing data for complete preparation, Complete preparation. 2.1. Topographical - geodetically preparation Publication Pub-74-14-01 “Pravidla střelby a řízení palby pozemního dělostřelectva” sets terms and conditions of topographical-geodetically preparation for complete preparation as follows: - Fire position coordinates have to be set geodetically by using GPS, topographically by using a map of geodetically data and using instruments or topographical connector; - Orientation bearings to aim guns have to be set gyroscopically, astronomically or geodetically and by switching a bearing by simultaneously aiming on luminary object or by directional order and magnetically including calculation of compass rectification set in 5 km distance from fire positions and for leading set KPzP including calculation of correction of device for set place. [3] These conditions have to be perfectly known and applied by members of reconnaissance teams. These members have to mark an accuracy of gained coordinates and orientation bearings in “Sketch of topographical-geodetically positioning” (Basis for topographicalgeodetically preparation for ASRPPDEL, 2 Content of “Sketch of topographical-geodetically connection”) [1]. On the basis of setting coordinates and orientation bearings, accuracy standards for mentioned ways (attachment 1 and 2) and technical possibilities of current instruments, it is possible to set maximal norms of accuracy for setting angle coordinates on the value of 40 m and orientation bearings on the value of 3 units of artillery quantity (dc). 8 However there is one question remaining. Are topographical connectors, which are currently included in equipment of artillery units, able to reach this accuracy and in which conditions? In rules of fire from 1992 use of this topographical connector was restricted by length of marching axis (axis of march) for maximum of 3 km. This distance, by the mistake of 3% of driven distance set by technical parameters of the instrument, represents a total mistake up to 90 m. But in publication Pub-74-14-01 there is no restriction for marching axis distance. From the reason of securing an accuracy of artillery units fire and so its efficiency, it is useful to cut out a regulation about setting angle coordinates and orientation bearings using topographical connector from conditions for complete preparation until any instruments will be able to reach standards for topographicalgeodetically positioning 2.2. Reconnaissance and target acquisition (TA) Publication Pub-74-14-01 “Pravidla střelby a řízení palby pozemního dělostřelectva” sets, that for complete preparation target coordinates must be set with a maximal probable circle mistake of 50m. This is conditioned by carrying out the following requirements: - Targets must be found in bounds of effective range of artillery (TA) instruments (DPz); - Reconnaissance emplacement has to be desired geodetically, by GPS or topographically via a map and by using instruments or by using navigation instrument; - Orientation bearings have to be set gyroscopically, astronomically, geodetically with possibility of switching a bearing, or magnetically including rectification of compass set in the distance of 5 km from emplacement. [3] The term “effective range” of instrument is not defined anywhere. But it can be characterized as a distance at which it is possible to reliably acquire the target data necessary for artillery fire. Technical range of artillery TA optical instruments is mentioned in the table 1. However, acquisition of targets at the instruments maximal technical range is unreal, since above 10 km it is not possible to precisely identify objects. That means unreliable determination of target (if the target is a person, animal, civilian or a soldier, military or civilian vehicle, etc.). This is given by optical attributes of instruments (mainly magnification) and by possibility of “detection” of object by using optical instruments mentioned in table 1. It is necessary to bear in mind that detection means discovering the object (a person, personal vehicle, helicopter, etc.), not its determination. So it is necessary to count with an effective range of current optical instruments used by artillery units on its effective range up to 10 km. In the case when new artillery TA instrument is established with such attributes, which allow this instrument to identify targets on distance above 10 km, this instrument will have to meet more strict norms on orientation accuracy so that spatial norm for determination target coordinates will not be exceeded. The mistake for setting coordinates of emplacement for PzPK Sněžka using navigation instrument is 0,2% of the driven distance. This means, 20ms fault of 10kms movement. A probable mistake for setting the target coordinates by using a radar type SCB 2130 L-2 is 10 m in a distance and 2 units of an artillery quantity in a direction. The mistake in distance is constant and this accuracy is invariable with increasing distance. The mistake in direction increases with increasing distance and at the distance of 15 km the mistake is of 30m. In a case where PzPK is moving on a distance of 10 km, the setting of target coordinates accuracy for complete preparation for targets in a distance above 15 km would not be allowable. If the PzPK emplacement position determination is more accurate and it is set on a value of 0,1% of driven distance, the target coordinates determination accuracy will be allowable for the target distance up to 20 km. From the mentioned dependences it is possible to deduce a relation for calculation of maximum target distance from an emplacement for PzPK Sněžka: dp = ½ [50 – (0,002 x dpř)] where, dp = observer distance; ½ = constant, invert value of probable mistake for setting target coordinates using radar type SCB 2130 L-2 in direction (2 dc); 50 = constant, characterizing maximal mistake for setting target coordinates in direction in meters, which results from maximal probable circle mistake for setting target coordinates; 0,002 = constant, characterizing a mistake for setting emplacement for PsPK Sněžka coordinates using navigation instrument (0,2 %); dpř = movement distance before taking observer emplacement by PzPK Sněžka in meters. A calculated observer distance (dp) is possible to take for an effective range of radar SCB 2130 L-2. The probable circle mistake for setting target coordinates, detected by radar ARTHUR in range of its technical possibilities, is 50 m including mistakes of its own positioning, which meets the requirement for APF. Effective range of radar ARTHUR is identical to its technical range. [2] The accuracy of artillery TA instrument positioning (setting coordinates) is defined with table T-2.1 in publication Pub-74-14- -01. From this publication it is clear that the artillery TA 9 emplacement has to be pinpointed with the same accuracy as gun firing positions. This means, up to 40 ms in length and 3 units of artillery quantity in orientation direction. In the case of compliance with the mentioned requirements, the conditions for determining target coordinates for APF are met. An artillery observer has to count on described values (target coordinates determination accuracy and artillery reconnaissance instrument positioning) and in the case of call for fire (CFF), according to CFF in ASRPPDEL, he will declare information “accurate” or “inaccurate”, mentioned behind the figure target position. 2.3. Meteorological preparation The publication Pub-74-14-01 Pravidla střelby a řízení palby pozemního dělostřelectva determines that for complete preparation, meteorological conditions have to be determined from meteorological message METC, METEO-STŘEDNÍ or METEOSTŘEDNÍ PŘIBLIŽNÁ. All these messages have to comply with spatial and time validity. METCM is valid for distances up to 50 km and for a 4h time period. Nevertheless in the message is stated time validity, which has to be considered in the case where the time period is shorter than standard validity of 4 hours. METEO-STŘEDNÍ is valid for distances up to 10 km and for a 3 hour time period, or the distance up to 35 km and for 2 hours time period. METEO-STŘEDNÍ PŘIBLIŽNÁ is valid only for division units, whose meteorological squad created this message and it is valid for 1 hour time period. All these norms are valid for stabilized weather conditions. ASRPP-DEL has to have available actual local time and overview of the real deployment of units, placing a great emphasis on fire positions. From meteorological messages the system gathers information about meteorological station position, about the time of processing the message and about its validity. On a basis of these mentioned entry data ASRPP-DEL automatically provides an overview about actuality of meteorological message from the time and space point of view. In a case where the time of the end of validity of the message is coming up (e.g. 30 minutes before the end of validity), it automatically sends a signal to starting probing. Table 1 The range of reconnaissance instruments S.n. Instrument 1 Infrared camera SOPHIE 2 3 4 5 6 7 10 Laser range-finder HALLEM II Night vision KLÁRA Laser range-finder VECTOR IV Day overview camera Day aiming camera Infrared camera TD 92 B2 Parameter Range (target detection): - person - tank - helicopter Range Value Note IPzS LOS, KPzP Range 3 km 9 km 11,5 km 50 – IPzS LOS, KPzP 15 000 m 2,5 km KPzP Range 4 km KPzP Range (detection) target: to 5 km IPzS LOS Range (detection) target: to 10 km Range (detection) target: to 9 km IPzS LOS PzPK SNĚŽKA 8 9 Laser range-finder MOLEM Radio locator SCB 2130 L-2 10 Laser range-finder LPR-1 11 Radio locator ARTHUR 20 km PzPK SNĚŽKA Range (detection) target: - person 9 km - tank 33 km Range 20 km PzPK SNĚŽKA Range Substitute reconnaissance instrument (by PzPK SNĚŽKA) Range: mortars, 20 km guns, rocket launchers, 30 km tactical rockets launchers 40 km 2.3. Ballistic preparation The publication Pub-74-14-01 determines that ballistic fire conditions have to be set, especially total change of beginning projectile speed. This means that for meeting conditions for complete preparation it is necessary to determine distance correction for: - total change of muzzle projectile speed; - change of propellant temperature; - cartridge case of Czechoslovakian type (alternatively of the other, newly established type); - unpainted projectile. [3] Into weapon set individual corrections there is included distance correction for projectile weight change. 3. Fictional auxiliary target creation – Registration fire According to the results of fictional auxiliary target creation (FPC) it is possible to determine data for FFE with such accuracy, after which it is not necessary to adjust fire. At the same time the following restrictions have to be met: - observer distance of created FPC cannot exceed artillery reconnaissance instruments technical possibilities (table 1); - adjusted distance and direction corrections can be used only for projectiles with the same table corrections for fire conditions - - - changes; time period of validity for values, determined by fictional auxiliary target creation is up to 3 hours; switch of fire by simple method can be used in the case of high-pitched trajectory fire, if the difference between the fictional auxiliary target bearing and eliminated target bearing (switching angle) equals 300 dc or if it is smaller than 300 dc, and if the difference between fictional auxiliary target topographical distance and eliminated target topographical distance equals 1 km or if it is smaller than 1 km; switch of fire by coefficient of fire method can be used in the case of flat and rounded trajectory, if the switching angle equals 300 dc or if it is smaller than 300 dc, and if the difference between fictional auxiliary target topographical distance and eliminated target topographical distance equals 2 km or if it is smaller than 2 km. 4. The application of an adjustment gun A publication Pub-74-14-01 Pravidla střelby a řízení palby pozemního dělostřelectva establishment results in a statement that fire data for an effective fire can be determined by using 11 an adjustment gun, if the fictional auxiliary target is created by one of guns of the whole battery and if a discrepancy between platoons (batteries) master guns and a battery master gun, which created a fictional auxiliary target, is known. [3] Use of ASRPP-DEL suppose directing fire from distracted fire positions and therefore from the one fire position area. And so these tasks are not performed by fire batteries but by a specific number of guns, which can be considered as one compact unit. In this case it could be possible to determine firing data for FFE by switch of fire from a fictional auxiliary target. The determination of firing data by using an adjustment gun could be considered as a good idea, if the subordinate task force will have an assigned fire unit, which would take a different fire position than other battalion fire units. This situation may happen in a case when it is necessary to support a task force which is performing tasks on its own direction, this means in an area where the fire cannot be directed from the main fire position area because of too long a range of fire. Then it is excluded that units from the main fire position area and assigned fire units could conduct fire into the area, where they could use results of a fictional auxiliary target creation by the second fire unit. The distance between fire positions is also very important. However, the publication Pub-74-14-01 does not set results of fictional auxiliary targets’ validity by using an adjustment gun in terms of mutual distance between units, which created a fictional auxiliary target and which will use all the results for the determination of fire data for an effective fire. For a case where it could be possible to use an adjustment gun to determine fire data by a unit located in another area, the determined process is represented in a scheme - The way of setting fire data for an effective fire, an 12 adjustment gun. [1] ASRPP-DEL by this way, mentioned above, finds a value of a discrepancy between all of the guns and a master gun, which had created a fictional auxiliary target. Then this value is multiplied by a table distance correction for the 1% change of a beginning projectile speed for the specific projectile, filling, topographical distance and the final value is added to adjusted corrections for a fictional auxiliary target. By this action we can get calculated distance for a target to engage. Calculated direction (calculated side divergence) is obtained by a sum of topographical direction (topographical side divergence), adjusted direction correction and the difference between derivations on an eliminated target and derivations on a fictional auxiliary target. 5. Abridged preparation In the publication Pub-74-14-01 it is mentioned that fire data preparation is considered as an abridged preparation, if any of all conditions are not met, or if there is data gained from a fictional auxiliary target creation used for a setting fire data and if these data are from 3 to 8 hours old. [3] In these cases, fire data for effective fire have to be set by adjustment fire. A decision-making process for considering achieving conditions is represented in a scheme The way of setting fire data for an effective fire, using a complete preparation and according to results of a fictional auxiliary target creation. [2] The fire data for effective fire set by abridged preparation can be used for effective fire without any adjust fire, if that fire is led by a battalion on a multiple target with a purpose of “Scotch”, where conditions for complete preparation are not met within a maximum of two points and at the same time these borders are not overstepped: - fire positions coordinates are set topographically from the map of scale 1:50 000 and by using instruments; - orientation bearings are set magnetically including the calculation of a compass correction, set in a 10 km distance from fire positions; - target coordinates are set by some of the ways mentioned in table T-2.1 of publication Pub-74-14-01 with the level of accuracy 1,2 or 3; - fire meteorological conditions are set from the meteorological message METEO-STŘEDNÍ PŘIBLIŽNÁ, which is not older than 1 hour and which is used up to 1600 m height; - there is included only the change of initial shell speed, caused by wearing out of the barrel, where corrections for changes of all shell ballistic characteristics are calculated, which are mentioned in tables for fire. For ASRPP-DEL it is necessary for this case to exactly set the number of firing guns. From the table T-1.4 from publication Pub-74-14-01 it is clear that the battalion can have 2-3 batteries and the battery can have 6-8 guns. This means that the battalion can have 12-24 guns. For ASRPP-DEL, a principle can be formulated, that if the system sets 12 or more guns for fire on the multiple target with the purpose of “Scotch!” and if all conditions from the chapter 5 Abridged preparation will be met, it will not be necessary to do an adjust fire for the setting of fire data for effective fire. Conditions and variants for setting fire data for an effective fire by abridged preparation are mentioned in the scheme: The way of setting fire data for effective fire, The Abridged preparation. 6. Simplified preparation Fire data set by simplified preparation is set extraordinarily for a battery, which in the case of ASRPP-DEL means 6 to 8 guns only if it is not possible to set fire data in another way. In the case of simplified preparation it is necessary to set firing data for an FFE by adjustment fire. 7. Conclusions It is necessary to separate the rating of meeting the conditions for topographical-geodetically preparation. While mistakes of setting fire positions Cartesian coordinates are influencing the fire accuracy constantly with rising distance, mistakes of setting orientation bearings are reducing the fire accuracy proportionately with rising firing distance. That is why the requirement on accuracy of setting orientation bearings in relation to setting Cartesian coordinates is relatively stricter. Conditions for a survey of a target position cannot be rated separately, because these conditions influence each other. The accuracy of setting a position of an artillery reconnaissance instrument shows itself in the accuracy of setting target coordinates. The accuracy of artillery reconnaissance instruments and the accuracy of setting artillery TA instrument position is mutually determined. [1] This means that the accurate detection of an artillery reconnaissance instrument position and the accurate detection of orientation bearings provides a possibility of a higher tolerance on artillery TA instruments’ accuracy. Contrarily, a more accurate observation instrument provides less accurate positioning and orientation. By expression of meeting requirements of accuracy for setting fire data by complete preparation in the part of reconnaissance and target detection the information from the artillery observer about accuracy of setting the target position is “accurate”. Otherwise (the setting of a target position is “not accurate”) the adjustment of fire is necessary. Processing the data of meteorological preparation can be fully automated by 13 the ASRPP-DEL system. The system will have all necessary data and on its basis it is able to set the validity of the meteorological message for complete preparation and if it is necessary it can also point out a need for starting new probing. Using adjustment gun spatial standards of created fictional auxiliary target (FPC) validity, depending on distance of units both creating FPC and using FPC results, must be set. These units will also use these results for setting fire data. Fire data for FFE on an abridged preparation basis can be set by adjustment fire or without it. For ASRPP-DEL it is necessary to exactly set all conditions for each variant of setting fire data for effective fire. References [1] [2] [3] 14 BLAHA, M., SOBARŇA, M. Principles of the Army of the Czech Republic Reconnaissance and Fire Units Combat using. In The 15th International Conference „The Knowledge-Based Organization“. Sibiu (Romania): Nicolae Balcescu Land Forces Academy, 2009, pp. 17-25. BLAHA, M., BRABCOVÁ, K. Decision-Making by Effective C2I system. In The 7th International Conference on Information Warfare and Security. Seattle (USA): Academic Publishing Limited, 2012, pp. 44-51. ISBN 978-1-908272-29-4 Joint Forces Command, Training. Shooting Rules and ground artillery fire control (gun, platoon, battery compartment). Pub-74-14-1. Prague: 2007. 256 p. GENERAL PROCEDURE OF RISK MANAGEMENT František Božek, Lenka Ješonková, Jiří Dvořák and Alexandr Božek Abstract: The paper deals with a general procedure applied in integrated risk management. Risk management is a basis for an effective security of environment, which subsequently determines the requirements for the transformation of the armed forces, because the character of the security environment plays a significant role in the transformational process of the Army. Individual phases of integrated risk management are briefly described. The integrated risk management should be implemented not only at military formationsand facilities, but also in regions and by accepting the principle of subsidiarity it should contribute to global environmental security. Keywords: hazard, risk analysis, risk management 1. Introduction The development and build-up of society is determined by a number of factors, among which the factor of environmental security plays a key role because it is an essential prerequisite for ensuring sustainable development. The main principles of the national security policy are contained in the Security Strategy and Military Strategy of the CR, which respect and is based on the EU Security Strategy and NATO Strategic Concept [4]. The priorities are based on the evaluation of current state of environmental security and reflect its assumed development. The quality assessment of security requires the identification of critical hazards and subsequently also possible risk quantification and prioritization. This phase is the basis for proposing the implementation of effective security measures. The statement of the role and tasks of the society is an integral part of this process. The principle of subsidiarity is one of the primary principles providing adequate global security. It is assumed that responsibility for security is delegated to the lower levels of management. In practice, this means transferring responsibility to the Member States of the European Communities and subsequently up to the level of national regional offices, authorities with extended competence (power) and, ultimately, to the municipal authorities. Especially the government, Ministy of Interior, Ministry of Health, Ministry of Defence, Ministry of Environment, Ministry of Industry and Trade, Ministry of Agriculture, etc. play a significant role in fulfilling the task aimed at providing the required security of states, individual regions and particular sectors and elements of critical infrastructure. The fulfilment of this task is monitored by the EU and also by the NATO command. Security is achieved by implementing the environmental management systems (EMS) on the basic levels of individual sectors, particular regions, plants institutions and in the Army on the level of military garrisons and facilities. Risk management is an important proactive tool of EMS enabling the fulfilment of the above mentioned task; 15 however, it has been implemented only to a limited extent in the military practice so far. 2. Risk Management Risk management is the process during which the entity tries to analyze risks and decide which risks are acceptable and unacceptable. Effective countermeasures are proposed for the identified critical, i.e. non-acceptable risks. Such counter-measures reduce or eliminate existing and future factors, which initiate hazard sources, help to mitigate the impacts of undesirable events and make the reconstruction of damaged assets easier. The risk management procedure is schematically shown in Figure No 1 [1]. The generally valid procedure may be recommended not only for regions, economic entities, institutions, military formations and facilities, but also to the individual sectors and elements of critical infrastructure to provide security and stability. The setting of goals and scope of analysis is the primary prerequisite of successful risk management. It should result from management intentions and the needs of public administration. Collection of information in relation to the assessed entity starts in this phase as well. It may continue also in other phases, especially during the identification of hazards and assets. The scope and goals of analysis may be remodified on the basis of acquired data.Hazard identification may be carried out concurrently with the identification of threatened assets. It is based on the elaboration of a registry of hazards, which may cause a significant impact to the environment, property and health of inhabitants. Such a registry may be elaborated on the basis of hazards compiled according to literature, one´s own experience, the outcomes of previous analyses, flow charts and 16 discussions with selected stakeholders, etc. Special methods used for specific groups of sector risks may also be applied. The methods of „Check List Analysis“, “What if? [3, 6] eventually Security Audit [2] can be recommended as a suitable for this purpose. Consequently it is necessary to express the probability of hazard-source activation. As the incidence of undesirable events are stochastic phenomena the objective probabilitiy Pj of j-hazard-source activation may be expressed by relation (1): Pj = n j × n −1 …………………………...(1) γ j = n j × t −1 …………………………...(2) where nj represents the number of undesirable events made by the j-hazard species, n the number of all possible events during the existence of assets, t means the chosen time period (day, month, year, etc) and j ∈ N*, where N* is the symbol for the set of all natural numbers. In cases where there is no known probability or frequency of the hazardsource activation or or it si imposible to determine it, it has to work with the subjective probability, which is a base for semi-quantitative or qualitative risk assessment. Determination of subjective probability is usually based on a qualified specialist, expressing only according to his/her one´s ovwn experience. The result is either a mere verbal expression of probability in which correlates with a qualitative risk assessment or the likelihood evaluated at the predetermined point scale, e.g. indices from 1 to 5 , which corresponds to the semi-quantitative risk assessment as is presented in the Chart 1. Figure 1 General Phases of Risk Management and Their Sequence Chart 1 Verbal and index expressing the frequency (probability) of hazard-source activation Probability negligible small midle high very high Point value 1 2 3 4 5 Description of frequency (probability) activation of hazard-source is practically excluded activation of hazard-source is unlikely, but possible activation of hazard-source is possible activation of hazard-source arises quite often activation of hazard-source is very frequent, respectively is almost continuous The identification of assets is aimed at creating a registry of asets showing the vulnerabilities of an entity (deficiencies and weak points), which may be exploited by hazard-sources. The quantitative assessment of the impact (consequences) undesirable events most commonly used value of an asset usually unless the asset is totally destroyed or the sum of the cost needed to repair the damage ( restoration, reconstruction or rehabilitation of assets). The value of assets is mostly expressed in monetary units. However, the value of asssets can be expressed in other units, such as the number of people with disabilities, by number of injury or mortality, loss of ecosystem biodiversity, etc., although in these cases is often possible to transform the value of the loss or damage of assets in monetary units through the application of various specific methods. 17 The following aspects are mainly considered when assessing the value such assets. a) Acquisition costs, or reproductive acquisition price; b) Importance of asset for the existence and activities of an entity or a company; c) Costs of overcoming possible damage and the speed of asset reconstruction after the damage; d) Field characteristics and other aspects, e.g. the asset’s payoff. If the harm associated with damage or destruction of i-aset as a result of the occurrence of j-hazard source activation is marked Nj,i, the total sum of damages Nj for j-undiserable event can be expressed by relation (3), where m ∈ N* is the total number of assets that were given damaged or destroyed owning to arise of the j-adverse event. Nj = m ∑N i =1 j ,i (3) Usually it is difficult or almost impossible to quantitatively express the value of the asset. Usage of verbal or score assessment is common in these cases, similarly as in determining the frequency or probability of hazardsource activation. Example of verbal and index assessment of assets value in the range point scale from 1 to 4 is shown in Chart No 2. Chart 2 Defining the level of impact Range of Impact Point value negligible 1 marginal 2 critical 3 catastrofic 4 Qualitative Assessment of the Impact The asset is sufficiently resistant to hazard and simultaneously is almost insignificant for the analyzed body. The asset is relatively susceptible to the effects of hazard, but it has a low value or asset is sufficiently resistant to hazard, but it has higher value for the analyzed subject. The sensitivity of the asset is relatively high and its importance to the fulfillment of the body mission is relatively large. The asset is highly sensitive to the action of hazard and its importance for the fulfillment of the body mission is vital or irreplaceable. The asset is difficult to renewable (only with the expenditure of high costs, effort and possibly time) or completely non-renewable. Authorized managers may be recommended to create, maintain and update a database of previous damages and near hits, which might be readily available for the identification and determination of asset values. As there is usually a considerable number of significant assets they are grouped together according to various aspects to reduce their number, create groups of similar characteristics and simplify the whole process.The analysis of hazards and vulnerabilities should result in the register of hazard/vulnerability pairs with the assessed levels of hazards and vulnerabilities, which are expressed through the probability that a hazardsource will be activated and through the loss resulting from undesirable event. 18 The level of the risk is given by product of probability of hazard-source activation and impact range of undesirable event how it is evident from formula (1): R j ,i = Pj × N j ,i (4) where Rj,i represents a risk in relation to the j-type of undesirable event and the i asset, Pj means the probability of jhazard-source activation and finally Nj,i is the amount of losses due to the j-undesirable event for a particular asset i. It is often necessary to respect and consider time relation between the probability of source hazard activation and the range of impact of undesirable event. The summary risk in time interval t ∈ 〈to; tx〉 can be mathematically expressed by formula (5): R j ,i = tX ∫ P (t ) × j N j ,i (t ) × dt (5) t0 or alternatively for the time dependence of risk by formula (6): t R j ,i (t ) = ∫ P (τ ) × j N j ,i (τ ) × dτ (6) t0 where Pj (t), Pj (τ) is the probability of j-hazard-source activation in dependence on time, Nj,i (t), Nj,i (τ) is the time dependence of the amount of losses due to occurrence of the j-undesirable event for a particular asset i, Rj,i is a summary risk in relation to the j-type of undesirable event and the i-asset in the time interval t ∈ 〈to; tx〉, Rj,i (t) is the time function of risk in relation to the j-undesirable event and i-asset, and finally t, τ are time symbols with t ∈ 〈to; tx〉 in the formula (5) and t ∈ 〈to; t∞ ) in the formula (6). The relation of risk and time Rj.i (t) as in the formula (6) is shown in Figure No 2 [2]. The shaded area below the curve represents the summary risk in the assessed time interval t ∈ 〈to; tx〉. The picture also shows a significant increase in the risk round the current value ty. Figure 2 Relation between risk and time Let’s consider the j-undesirable event to be a terrorist action with the use of plastic explosives and the i-asset to be a person. The significant increase of risk in an assessed region around the time ty may be caused e.g. by the fact, that a large social event, where a high number of people are concentrated at one place, is held in the region at this time. Such circumstances are ideal for terrorists to attack so called soft targets. The goal of risk management is to minimize the summary risk, i.e. to reduce the volume of the shaded area, represent the summary risk R´j,i in the time interval t ∈ 〈to; t〉, or, if you like, find local extremes (maxima) of time function in such an interval. Management of any authority should focus its attention on reducing the risk during such critical time periods. If the risk assessment goes to the phase of detailed quantitative study called scooping there will be high requirements for a large amount of accurate input information, which makes the process financially and time demanding. However it is often enough to carry out only a qualitative risk assessment, called screening. Based on the results of the screening it may be decided, whether it is reasonable to carry out scooping for critical risks. Data acquired through risk assessment are compared with the referential levels of risks for individual types of undesirable events in the phase of determining the risk acceptability. Such a comparison is the basis for a final decision about risk acceptability and at 19 the same time is used for the setting of priorities in relation to the countermeasures implemented to increase the system security. When setting the referential level of risk it is necessary to consider the probability of source-hazard activation and range of impacts caused by undesirable events. On the other hand the absolute elimination of risk, i.e. to the “zero risk” is usually unrealistic and in practice inaccessible either for economic reasons or because of the current state of scientific-technical development. The outcome of integrated qualitative risk assessment is a risk matrix in which the risks are described either verbally or in points as it is shown in Chart No 3. The priorities of the countermeasures implementation rice from value 1 to value 20. The importance of assessment in points is presented in Chart No 4 [2]. The index risk assessment may be recommended for top risk manager of economic entities, institutions, regions, counting military unit commanders in decisionmaking processes when fulfilling their civil or combat missions. Chart 4 Matrix of undesirable event risk assessment in points Frequency/impact 1 - negligible 2 - small 3 - medium 4 - high 5 – very high 1 - negligible 1 2 3 4 5 2 - marginal 2 4 6 8 10 3 - critical 3 6 9 12 15 4 - catastrophic 4 8 12 16 20 Chart 5 Characteristics of risk value in points Value in points 1-3 4-7 8 – 11 12 – 20 Risk Negligible. Countermeasures need not be implemented. Acceptable. Countermeasures may be implemented with the agreement of management of assessed entity. Tolerable. It is necessary to take countermeasures by a certain deadline. Unacceptable. It is necessary to stop the activity or immediately implement countermeasures aimed at its minimization. The outcome of integrated risk assessment may also be a graph, in practice often called a map of risks. The map of risks is shown in Figure 3 [1]. Risk control is a systematic process run by the top management of an economic entity, a region, or a military unit eventually facility. If the risk is unacceptable, the risk control process includes implementation, review or improvement of countermeasures together with steps providing the feasibility of proposed countermeasures. The process of operational risk management follows and is based on the monitoring of significant threat-source triggers. The efficiency of countermeasures and their economic effectiveness expressed 20 by costs and benefits are principal parameters for assessing the suitability of options and the subsequent implementation of selected countermeasure, or operational management. The economic effectiveness has to be related to the assessment of financial, material and human resources, which fully reflects also in the management of companies, regions including military systems. Countermeasures costs, or operational management, include acquisition, implementation and operational costs, benefits include effects connected with increased security. This requirement is called “As Low As Reasonably Achievable” (ALARA) principle in the scientific literature. Figure 3 Graphic setting of priorities in risk minimization (map of risks) Pj,i - probability that i-asset will be damaged by j-threat; Nj,i - damage caused to i-asset by jthreat; R1-R12 - risk that threat will be exerted, where j∈ 〈1; 12〉 ∧ j ∈ N* (N* is a symbol for the set of all natural numbers); priorities for the implementation of countermeasures rise from threat j = 12 up to threat j =1. There are three basic options of risk reduction. Their principles are graphically shown in Figure 4 [1]: a) The reduction of impact of undesirable event (corrective or ex post measures); b) The reduction of probability an undesirable event occurs (preventive or ex ante measures); c) The reduction of probability of occurrence and impact of undesirable event. Risk may be reduced by many tools in practice. Therefore it is highly effective to develop and continuously update the plans of measures aimed at risk reduction. Solution usually differs depending on risk, particular situation, local conditions, and financial, material and staff potential of management. The tools may be generally classified into four basic categories. a) Risk transfer; b) Risk retention; c) Risk reduction or elimination; d) Risk avoidance. The choice of a particular tool should conform to the set goal and respect the summary effectiveness of the solution given by the costs of implemented countermeasures, their technical feasibility, risk reduction efficiency, secondary risks, social and political acceptability, etc. An optimal solution can hardly be generally recommended, as it always reflects a particular situation. Nevertheless, there are certain principles depending on the level of probability and impact of hazard, as it is evident from the Chart 6 [5]. The proposal of possible countermeasures consists of two basic phases, the development of countermeasures alternatives and subsequently their selection. The proposal of alternatives uses some of the invention methods, e.g. brainstorming, brainwriting pool, individual diary, and the Delphi method. 21 Figure 4 Ways of risk reduction Chart 6 Recommended tools for the solution of risks in dependence on the level of its occurrence and the impact of undesirable event High level of impact Low level of impact High probability Risk avoidance or risk reduction Risk reduction or risk retention Multicriterial assessment can be recommended for the selection of an alternative from the generated set of measures. Some of the invention methods proved good for the selection of evaluation criteria, for the assessment of weights it suitable apply either weighted average pairwise comparison method (Fuller triangle) or Saaty method. The following criteria may be used as an example for the assessment of alternatives: a) Achieved security level including the consideration of secondary risks; b) Technical feasibility with regard to compatibility with the existing system; c) Material effectiveness and energy demand; d) Capital demand; e) Rate of implementation; f) Compatibility with the current system; g) Labour input related mainly to the demand for further labour force; h) Level of information support, etc. The fall in risk related to the spent financial resources is considerable at the process beginning, because only 22 Low probability Risk transfer Risk retention organizational measures are usually implemented in the first phase. Further phases are more difficult and demand more financial resources. Therefore it is much more difficult and expensive to achieve higher risk reduction. Measures are taken after the final decision of company (facility) owners, managers of regional authorities and in military sector commanders of unit or facility. Therefore it is necessary for managers to have sufficient, clear and synoptic data to take the most effective decisions. It is necessary to develop a rigorous plan of implementing particular measures and enforce the fulfillment of accepted plans. It will cover the existing possibilities of risk reduction in a company, region or a military unit or facility. The plans should include the following points: a) Complex of countermeasures and deadlines for their implementation; b) Allocation of responsibility for the implementation of each countermeasure; c) Subjects and dates of seminars or training for individual stakeholders; d) Measurement programme for the documentation of effects of implemented measures. It is important to realize that even the most thorough and comprehensive risk assessment cannot identify all risks and accurately determine the probabilities of hazard sources activation and consequences of impact caused by an undesirable event. Therefore it is necessary to carry out an operational risk management, which can reveal other system vulnerabilitie and hazardsources, which have not yet been identified. With regard to newly discovered facts it can result in a substitution solution or the repetition of all risk management processes. Monitoring of selected risk factors and thorough evaluation of the surrounding and internal environment of entities and regions are the basis of operational risk management. The assessed factors may signal the occurrence of undesirable events and in case of need stimulate the implementation of correction measures. It is highly efficient to identify the set of such significant risk symptoms and monitor them, because their value is closely connected with the probability of the hazard-source activation. Even if it is sometimes not realistic to avert an undesirable event, due to e.g. shortterm symptoms or mutual and unexpected influence of hazards, it will be possible to better prepare for emergency situations and manage them. 3. Conslusion The quality fulfillment of goals of security and military strategy requires the implementation of effective integrated risk management starting from the level of basic entities. The procedure of risk management has been proposed, which is generally applicable for ensuring of sustainable development in civil practice and sustainable training and mission fulfillment of armed forces. It has to be emphasized that effective risk management is a systematic process, which has to be carried out continuously and mainly in case of changes in the environmnt affecting the existence of hazards and overall security. The following has to be done to have an integrated risk management practical and effective: a) To appoint an authorized expert or a team for integrated risk management, adequately involve all stakeholders into the process, provide regular assessment of effectiveness of individual subproject phases and finally all complex of risk management; b) To have top-management negotiating with this special team and dealing with the current state in the process of risk management, planned countermeasures, suggestions, etc.; c) Regularly evaluate the adequacy of critical risk assessment with focus on detail and consistency and assess the effectiveness of implemented measures and the achieved level of security; d) To make all stakeholders familiar with the results of assessment within the range of their posts and competence; e) To plan financial, material and staff resources for the requirements of environmental security, training of individual stakeholders and implementation of suitable training programmes; f) To provide an effective risk communication; g) To provide and keep documentation of administrative details and substantial findings; h) To carry out regular evaluation of individual phases of risk management. 23 References [1] [2] [3] [4] [5] [6] 24 BOZEK, F. - URBAN, R. Risk Management – General Part. (Monograph.). 1st Edition. Brno: University of Defence, 2008. 145 p. ISBN 978-80-7231-259-7. Czech Environmental Management Centre (CEMC). Safety Audit. 1st Ed. Prague: CEMC, 1993. DICKERT, T.G. Methods for Environmental Impact Assessment. 1st Edition. Berkeley: University of California, 1974. Ministry of Defence CR. Military Strategy of the Czech Republic. Prague: TISKAP, 2004. 16 p. ISBN 80-7278-235-5. SMEJKAL, V. - RAIS, K. Risk Management. 1st Edition. Prague: Grada Publishing, 2003. 270 p. ISBN 80-247-0198-7. ZAPLETALOVÁ - BARTLOVÁ, I. - BALOG, K. Hazard Analysis and Industrial Accident Prevention. 1st Edition. Ostrava: SPBI Spektrum, 1998. THE TRAINING COURSE OF THE INFORMATION SYSTEM OF LOGISTICS MANAGEMENT: THE STUDY OF THE UNITS’ SHOOTING TRAINING Miroslav Cabák, Jan Mrnuštík, Nataša Pomazalová and Stanislav Možný Abstract: The aim of this article is to introduce possibilities of implementation of new teaching methods for students with logistics specialization at the University of Defence in Brno. The new approach combines activities of teachers, Learning Management System and Military logistics information system, which provides effective students´ training for future practical life in the Army of the Czech Republic. Keywords: logistics, information system, e-learning, training course 1. Introduction Students of logistics specialization gain knowledge from the general subjects, but also knowledge in the logistics subjects during their education at the University of Defence in Brno. This education in the logistics subjects covers a wide range of all logistics processes, which students have to learn to better understand the issues. The logistics processes represent a set of related logistics activities/processes, which units of the defence sector carry out more or less during the training year. The project of the specific research titled as “Analysis of the relevant logistics processes at the tactical level” also solves the creation of the training educational software to support the theoretical and practical training of logistics specialists at the University of Defence in Brno. This is the effort to indirectly link the theoretical and practical training by using the appropriate e-learning tools. In this case, this is the support of the theoretical and practical training of selected practical activities, which is realized by using the functionalities of Information system of logistics (ISL). 2. The choice of the theme and provision the demand Our students of logistics specialization usually start their career at the function of the basic organisation level (battalion, troop, etc.) and therefore it is taken account of the choice subject of the training course. In most cases the organization units fulfil logisticseconomic function of the cost centre. The students of each department study separately, but of course cooperation is necessary in practice. The choice of the appropriate theme for learning software (LSW) was limited by the project content of the specific research – “Analysis of the relevant logistics processes at the tactical level” to support the training of military professionals. The learning software of the training course solves logistics support for training of shooting with firearms. In the first stage, it was necessary to analyse complex logistics processes included in the planning, 25 management and evaluation of the live shooting of the mechanized battalion. Analysis of the market of e-learning product was also executed. The form of the training course was defined as a full-time course with maintenance or animated character. The form of the synchronous learning with a lecturer was chosen in the training course. The course will be conducted according to the established schedule. Students will learn time-discipline, time pressure working, which the will meet in practise and which is important the stress must not have a negative impact on the quality of their work. Due to the requirements for training of the military professionals in the tactical level, suitability of the support of the teaching form is demonstrated by e-learning tools. The teaching form of elearning tool is necessary aimed at the processes, which are sufficiently informatively supported, but not used routinely. It means that the processes are carried out at regular times during the training year, but the period is longer between the two processes. The reason is the fact that users may lose the habits and skills for adequate speed and faultless execution of logistics processes during the time delay. As an example, there are the following processes: - Logistics planning of the training year; - Preparation of equipment and vehicles to use in seasonal conditions; - Preparation of equipment and vehicles to complex control/ certification according to NATO standards; - Preparation, execution and evaluation of logistics support in the tactical exercise of the unit; - Logistics support of the shooting; - Inventory of assets and liabilities, etc. 26 The full, effective, and timely support of the processes has an impact on accomplishment of tasks in the context of units’ operational capabilities. The results of the training course will be assessed according to the possibilities of the electronic teaching development of logistics specialists in the future. 3. The creation of the study package The training course consists of two parts: - theoretical and implementation part; - practical part. The theoretical and implementation part is carried out in a suitable e-learning product environment, which is available using the Internet. The product learning management system (LMS) Moodle was chosen for a training course according to the request of the purchaser. The main criterion for the selection of this instrument was the fact that some departments of the University of Defence in Brno have already implemented and used Moodle for preparation of certain courses. The practical part is linked to the theoretical and implementation part and is done at selected functionalities ISL, which is available through army data network. The system in the theoretical and implementation part (Moodle) meets the basic requirements for managinglearning system with a modular structure, enabling the creation of a set of basic courses. The choice of the basic functions, which LSW complies with: 1. Defining and managing parameters of individual courses. 2. Possibility to create different themed courses in selected areas of logistics. 3. Creating a course catalogue and update. 4. Maintaining a register and manage data about individual students. 5. Testing students. 6. 7. 8. Have a summary of the results and marks of students. Administration of access rights. Communication tools. 9. Saving data. The basic method of practicing activities of the process is shown in Figure 1. Figure 1: Basic method of practicing activities 4. The realization of the training course The realization of the training course is included in the following 5 steps: 1. The analysis of the selected logistics process; 2. Approval of the concept LSW; 3. Preliminary approval of the structure and the content of the course (theoretical and implementation part and practical part); 4. Drawing up and evaluation of acceptance tests; 5. Implementation. Accurate content of individual tasks of the training course is described: 1. Analysis of the selected logistics process (logistics support for training of shooting with firearms) and specification requirements for LSW is executed. The quality of the fulfilment of this task is ensured by studying military regulations, standards and consultations with units which conduct this process in practise. 2. The concept LSW (specify the functional requirement) based on the mentioned analysis is 27 approved. The requirements for configuration of the necessary infrastructure of the information technology for development, execution of the acceptance tests, and subsequently for routine use, are defined. The specification of the information technology is also executed. The coordination with the project management ISL and the authority of the Communication and information systems division of the Ministry of Defence Army of the Czech Republic is necessary in fulfilling this task. The issues of the subject, and aim of the course, are solved in the introductory part of the training project and there are also described the entry requirements for finishing the course and expected results after successful completion of the course. The structure and content of the course - including restrictions - are defined in the introductory part. The definition of the basic terms and used symbols and brands are also included to this part. The entry test checks basic knowledge of the following topics: - General overview; - Logistics support knowledge; - ISL knowledge. The student is enabled to go to the block of instructions to handle the course training after successful completion of the entrance test. The core of the course (theoretical and practical part) is followed after reading the input information to handle the course. The core of the training course is divided into four modules. These modules are categorized into the following structure: - introduction to the module 28 3. (what the student learns in a module, what they will be able to handle after studying the issue, basic terms and timeframe needed to study the chapter); - methodical procedure (introduction of the issue, course of action in dealing of the real situation); - tasks for each chapter; - summary of the chapter (summary, questions for reflection, the most common faults in reality); - the key question to the module. Modules are complemented by forms of the document and also by solutions of selected activities in ISL which are completed by example animations of activities in ISL. The animations are used to handle activities in the practical part of the ISL. Students work in ISL according to the assignment task in the module or instructions of the teacher. The practical part is added by tasks, which are related to the practical work in ISL. The output test is followed after completion of the practical part. The last part of the course contains attachments. Preliminary approval of the course structure (theoretical and implementation part and practical part of the various learning modules) contains the view of screens and the view and content of the education, examples of using forms, presentations and tests for checking the knowledge of students. The simulated organizational structure of the cost centres were approved in this part, where each student will carry out the particular 4. 5. activities selected process with using the functionality of ISL. Special attention is paid to the preparation of data which make a base for students’ work in their action - in ISL. Due to this fact the range and quality of data are one of the basic requirements. Drawing up and evaluation of the acceptance tests in the real condition of the purchaser. Implementation is the final part of the training course. The training part is involved in training and afterwards regular lessons where users (teachers, students and administrators) must learn how to operate in LMS Moodle and also in ISL. There is necessary knowledge of fulfilment of additional quality data; therefore the administrator position of the information technology is very important in the process of implementation and training software used. 5. The evaluation of the training course – changes in the course The evaluation of the e-learning course means monitoring, maintenance and modification of LSW. Provisions of valid standards for configuration management are used as a part of these activities. After implementation of LWS is assessed, to what extend the education with use the LSW effective compared with traditional forms of full-time study, or how are the traditional methods supplemented. The training course LSW is evaluated and monitored: 1. The evaluation of the human recourse – evaluation of the lectors, students and e-learning management work. 2. The evaluation of the educational content – assessment of the methodological process of 3. 4. 5. the educational materials, the text comprehensibility and clarity, the logical structure of materials, timeliness and applicability of study materials due to the practice. The evaluation of processes – constant verification and editing taught logistics processes and LSW in relation to the changing reality of the military practise. The evaluation of the educational technologies – constant verification and modification /maintenance/ upgrade of the information technology which is used (new modern version of LMS Moodle, new version/upgrade functionality ISL and new military regulations regarding taught issue). The evaluation of other factors – how the course responds to the logistics needs of the defence sector, how the course is sustainable, whether it will be fulfilled and how the course will impact (real/potential) future practice of students, students interests etc. The evaluation as a necessary part of every training course is not an end in itself. The evaluation results will be used for further course development. Comments and criticisms will be evaluated and prepared to the quality of e-learning and also constantly increased. One way of improving the teaching quality will be regular feedback: - The questionnaire of students at the end of semester to evaluate the LSW benefits; - The identification of student satisfaction with the lector and teaching; - In the case of the students’ dissatisfaction with any aspect of teaching - rectification is done immediately. 29 6. Indicators of LSW benefits The evaluation of LSW benefits necessarily started immediately at the beginning of the life cycle of LSW to enable definition of the characteristics of LSW benefits and be able to establish specific responsibility for results achieved. Indicators of LSW benefits will be classified from several points of view: - Financial and non-financial (physical units such as the number, time, etc.); - Quantitative (measurable by cardinal scale), quantifiable (measured by an ordinal scale or a logic value “pass” x “fail”); - Direct (for which is proved a clear causal relationship to benefits achieved) and indirect (for which is needed to set some alternative indicators expressing change); - Short-term (usually manifested about half a year after the implementation of LSW) and long-term (manifested as later as in next years); - Absolute (expressed any measurable value) and relative (expressed as a number). The variety of options using the different indicators and their combinations are very rich and it is impossible to define the system of indicators that would be applicable to any mechanical method on the process. Everything depends on the particular process, present state, development plans, priorities of owners, organizational culture, expectations, etc. All indicators must be overseen from the point of view usefulness, which is generally a measurable degree of achievement of objectives. 7. Conclusions The goal of this article is to introduce a new teaching method for present and future logistics managers of the defence resort (acquisition of new theoretical knowledge and practical skills with the modern manager’s approach – management of logistics processes using the functionality of ISL). The new teaching method using e-learning tools provides first and foremost valuable information for students who try to accomplish the engaged tasks. References [1] [2] [3] [4] [5] [6] [7] 30 KOPECKY K., E-learning (nejen) pro pedagogy, Hanex, 2005, ISBN 80/85783/50/9. PROCHÁZKA J., KLIMEŠ C., Provozujte IT jinak, Grada Publishing Praha, 2011978-80-247-4137-6 VAŠTÍKOVÁ, M. Marketing služeb efektivně a moderně. Praha, Grada Publishing, 2008, ISBN 978-80-247-2721-9. MOLNÁR, Efektivnost informačních systémů, Systémová integrace, Grada Publishing, Praha, 2001, ISBN 978-80-247-0087-8. ŠMÍDA F., Zavádění a rozvoj procesního řízení ve firmě. Grada, Praha, 2007, ISBN 978-80-247-1679-4. ŠMÍDA F., Zavádění a rozvoj procesního řízení ve firmě. Grada, Praha, 2007, ISBN 978-80-247-1679-4. HAMMER M., CHAMPY J . Reengineering - radikální proměna firmy, Management Press Praha,1995, ISBN 80-7261-028-7. [8] KORECKI, Zbyšek; POMAZALOVÁ, Nataša; DARKWAH, Samuel Antwi. The new Approaches in Logistics Services Accomplishment. In KAKOURIS, Alexandros. Proceedings of the 5th European Conference on Innovation and Entrepreneurship. United Kingdom: Academic Publishing Limited, 2010. s. 453460. ISBN 978-1-906638-73-3(CD). [9] POMAZALOVÁ, Nataša; KORECKI, Zbyšek. Leadership Success and Logistic Education: New Understanding due to Sustainable Strategies. In PANKA, Ewa; KWIATKOWSKA, Aleksandra. Proceedings of the 6th European Conference on Management Leadership and Governance: The College of Management Edukacja and the Professional Development Center Edukacja. 1. Wroclaw: College of Management Edukacja, 2010. s. 314-318. ISBN 978-1-906638-81-8(CD). [10] POMAZALOVÁ, Nataša; KORECKI, Zbyšek. Knowledge Innovation for Supporting of Logistics Performance. In PAWAR, Kulwant S., et al. 16th International Conference on Concurrent Enterprising Lugano - Switzerland, 2123 June 2010. Nottingham: Nottingham University Business School, 2010. ISBN 9780853582700. [11] LOPOUROVÁ, R., KORECKI, Z. The importance of Foreign languages Knowledge for the University of Defence lectures. In: 15th International conference The knowledge-based organization, behavioural and social science proceedings. Sibiu: Nicolae Balcescu Land Forces Academy, 2009, ISSN 1843 – 6722. 31 BASIC MEASURE OF CIVIL PROTECTION IN THE AREA OF BUILDINGS ESTABLISHED FOR THE GATHERING OF LARGE NUMBERS OF THE POPULATION Danuše Kratochvílová, ml., Danuše Kratochvílová and David Řehák Abstract: The article deals with the possibility of the early warning and information, as one of the basic measures of civil protection, about real threat or an already existing emergency or crisis situation in the areas of buildings established for gathering of large numbers of the population. It also presents the alternative solution of warning and information in these areas. In the end of the article there are described significant factors that can negatively impact the optimal warning and information. Keywords: Civil Protection; Warning; Information; Building established for gathering of the larger number of the population 1. Introduction The territory of Czech Republic and of course the population living there are threatened by emergencies [1] and crisis situations [2]. These emergencies and crisis situations can have serious impacts on the life, health and property of the population. The one measure of protection of population that can reduce or slash these impacts is early warning and information of the population about real threats or already existing emergency or crisis situations (hereinafter “emergency”). The article is oriented to the specific problem to the opportunities of early warning and information of the population about real threats or already arisen emergency in the areas of buildings established for the gathering of large numbers of the population (hereinafter “buildings”) [3]. The main reason for this choice is not only the probable high concentration of the population in the area but also behaviour of the population that can be influenced 32 by felicitous forms of warning and information. To this purpose adequate communication devices are used [4]. The aim of warning and information is primarily to create sufficient time and space for required behaviour. This means that the population will be able to react to recommended or accepted measures and to protect themselves and help other threatened persons, especially the elderly, children and the infirm. At the same time it is necessary to prevent the increase of panic, hysteria and other manifestations that can arise during the emergency such as apathy, anxiety, anger, depression [5]. 2. Problem Formulation The first part of the article deals with the present situation in warning and information both in general and also especially in the buildings. The article also discusses what is understood by the term “buildings”. The other part deals with both the means used of warning and information and alternative forms. These alternative forms of warning and information can be used during the emergency. 2.1 Warning and distress information – present situation The term warning is understood as the complex summary of the organization, technical and operational measures that ensure the early delivery of warning information about real threats or an already existing emergency that require realization of the measures of protection of the population [6]. Warning information has acoustic characteristics, or extraordinarily it can be verbal or optical. Informing the population of the distress information is the complex summary of the organization, technical and operational measures that ensure the delivery of the information about the source, nature and range of the emergency and necessary measure to protect life, health and property immediately after the warning [6]. Nowadays warning and information of the population is ensured by the terminal measures of warning and information (TMW) that are included in the united system of warning and information (USWI). USWI is technically, organizationally and operationally ensured by the notification centre, telecommunication nets and TMW [7]. These TMW are created by rotary (electric) horns (RH), electronic horns (EH) and other measures that comply with the given requirements of TMW (local informational systems with quality of EH – LIS) [7]. Each of the TMW has to be able to generate following signals: - General warning; - Tests of sirens; - Fire alarm. The character and the use of these signals are set in the Notice of the preparation and to performing the tasks of protection of the population [8]. All TMW except RH have to be able to broadcast the distress information too that follows immediately after dispatching the General warning signal. The number of pieces of information must be 16 or more. The length of one piece of information is 20 seconds (ensuring capacity of the memory of TMW) [7]. Another requirement of these TMW (EH and LIS) is to have an alternate source of energy. It must ensure 72 hours of running of TMW. During the emergency TMW must be able to dispatch 4 signals lasting 140 s in 24 hours, or in summary 200 s of verbal information defined by user or distress information lasting 5 minutes [7]. All measures that are integrated to the USWI comply with these standards. For warning the population there is one warning signal – General warning in the territory of Czech Republic. This signal has a varying course. It lasts 140 s and it can be repeated 3times in intervals of 3 minutes (see Figure 1). Rotary horns Electronic Horns and local informational systems Figure 1: General warning signal [9] 2.2. When do we speak about buildings established for gathering of large numbers of the population? By the term buildings established for gathering of large numbers of the population it is considered generally to be the object in which the attendance of large numbers of the population is 33 expected. These buildings are usually shopping centres, culture centres (e.g. theatres, cinemas), sport centres, school facilities, stations (train and bus) and airports. The majority of buildings have also adjacent car parks and underground car parks. This fact increases the number of the population in the place of interest. Specification of these buildings can be assessed from various points of view. E.g. EHI Retail Institute defines shopping centres as “centrally planning large-area retail units that serve to satisfy short-term, medium-term and long-term needs” [10]. In our conditions from the view of developer and real estate agencies the shopping centre is understood as property that serves for retail use that is kept as the unit with a total area larger then 5 000 m2 with a minimum of 10 separate units. A special type is a Retail Park that is defined as a development that has 3 or more department units in one object with a total area 5 000 m2 or larger. A part of it is always car park that is shared by all operators. A Retail Park is built by one developer in a single design [11]. Significant material for determination of the limit of people is the technical standard oriented to fire safety of buildings [12]. It determines the number of people it is necessary to consider for buildings established for the gathering of large numbers of the population. For the purpose of this standard it is a defined gathering place as area established for the gathering of persons in which number and density of persons exceed limit norm value. The standard also defines an internal gathering place as each area that is, besides other considerations, given for 200 and more persons and in which at the same time the ground area that is passed to 1 person is 5m2 and less. 34 2.3. Warning and information of the population in the areas of buildings established for gathering of large numbers of the population – present situation The set standards are valid for warning and information for the population. It is necessary to realize that the population perceive all information differently and behave differently during the emergency. If the population is affected by the emergency it is possible that the population don´t catch the warning signal and following information or don´t pay attention to them in the impact of stress (mental phenomenon of deafness or apathy). At the same time the situation can arise that delivery of the specific information can evoke the panic of the population. It is necessary to deliver information to the population in the stress situation in a simple and understandable form lasting max 30 s. It is important that they include all important information determined to the population. It is good to repeat this information a few times. The influencing of the behaviour of the population in the building is given by the summary of the organisation and technical measures with the use of relevant means of the owners, ultimately operators, of these buildings [13]. If any emergency happens where each person that is at that moment in the building its subterranean car park or adjacent car park, they should respect the direction and the instructions that can influence their behaviour toward the desirable form. For the needs of delivery of the desirable information (warning and information) usually there is an intercom or so-called emergency sound system. This system serves to amplify or distribute the sound. This system is usually connected to the electric fire signalization by which it is controlled. Together it is very often used for loud delivery of the information or extraordinary reports, invitations, commercials, music etc. To inform, suitably located light flare means and information panels can also be used, but they can serve only as complementary or supporting means. LCD panels can be an example. They are, because of their attributes, used for the dynamic dispatch of the information, nowadays specially for promotional or entertainment purposes. 2.4. Alternative solutions of warning and information in the Czech Republic Among alternative ways of the solution of warning and information during real threats or an already existing emergency or during the emergency mobile electronic sirens can be used (see Figure 2). Their use is firstly prepared in the areas where there is poor coverage by TMW included to USWI, or when they are not working. An advantage of these sirens is that their sound spreads evenly in all directions (horizontally and vertically). Sirens can reproduce these signals: - Tests of sirens, - Warning signal General warning, - Fire alarm. Sirens can enable reproduction of verbal information. This information can be prepared (recording, each lasting max 30 s) and also by use of microphone (direct entry). Audibility of the spoken word is circa 300 m, whilst audibility of the signal is approximately double that distance. It is necessary to allow for lower audibility in built-up areas depending on the type of the building density and level of surrounding noise. Figure 2: Electronic siren MOBELA [14] For warning and information mobile reporting means can be also used (so called WBM - warning broadcasting means) that are situated on the cars of fire brigades, Police of Czech Republic and local police. Also loudspeakers can be used, situated on the cars of corporate and undertaking persons. Warning and information can be perform by use of the republic’s mass media (Česká televize, Český rozhlas) or regional mass media, and by mobile operators, internet (social nets) and other possible accessible information means. 3. Solutions and results In the second part of the article the most important factors of the delivery of the information are chosen. It also proposes possible solutions of the warning and information in buildings. 3.1. Factors that influence the optimal warning and information For ensuring the optimal delivery of the warning and emergency information it is necessary take into consideration various factors that can influence the delivery of this information significantly. It is about technical, physical and personal factors to a large extent. Among physical factors there are; the age group of the population and persons with handicaps or mental diseases and the like. An important technical factor that influences warning and information of population is blackout. In the case of the blackout the means that are designated for warning and information of the 35 population will be working only if they have their own alternative source of energy. Stridency of the surroundings, audibility, and comprehensibility of the report are all closely connected. In noisy areas it is necessary for warning to increase the level of the dispatching signal but it can be increased too much because following information will not be comprehensible for the population. The informing of the population should fulfil the conditions for proper vocal communication (e.g. loudness of the speech, pitch of the tone, speed and fluency of the speech, correct pronunciation, phrasing of the speech, correctly chosen pauses, tone of the voice and emotions – in our case it is necessary to have a calm and balanced tone of the voice for calming of the population). The quality of the audibility, and comprehensibility of the warning and information, influence the building density and the intensity of the cover area. In the case of a large area the warning signal will be inaudible on its outskirts, with the huge problem that comprehensibility of the information will be minimal. Too small an area entails the mutual covering of the warning and information. This creates problems with comprehensibility. The important part of warning and information performance is the quality of the sound. The purity of the sound is important during its reproduction. It is undesirable for various noises that deteriorate its quality and significantly influence both comprehensibility and verbal information. The particular age group will treat receive information in various ways. Children might not understand the importance of the situation and may perceive that they don’t have to respect the warning and information. They can also change warning signal Generate warning instead of signal for control of 36 TMW Test of sirens. Seniors could underestimate the emergency and may not devote proper attention to it. Or, vice versa, they could overestimate it. This can cause stress and panic. Because the majority of seniors have problems with hearing they could miss warnings and information. The individual chapter deals with the deaf, who will not hear acoustical and verbal forms of warning and information. In this case there is a great advantage in reinforcing the warning system by visual means. Persons with mental disease can´t distinguish as well as children the seriousness of the situation and they can´t react in an adequate way. In their case it is probable that there would be a breaking out of panic at an unsuitable form of warning and information. The last factor that influences optimal warning and information it is the content of the information. The information has to be understood by the population so that they can react in the required way. During the creation of the information it is necessary to follow some rules. Firstly the information has to be structured and clearly formulated. It is suitable to restrict it to only three key pieces of information. They should have from 7 to 12 words. If it is possible, it is good to use positive formulation, and not to use the negative (no, never, nothing, nobody etc.). Since the population can miss part of the information, or they might not notice it in first moment, it is important to repeat the information. 3.2. Proposal of the improvement of warning and information of the population From the previous chapters it is evident that warning and information of the population can be done in various ways. It is important that the forms of warning and information are early, clear and comprehensible for the population. And it is also important that they will not create undesirable reactions. People should know where to go and how to behave after warning and information. For the right warning it is necessary to ensure early delivery of the warning information. This can be reached by connection of TWM to USWI. Visitors of the buildings and adjacent estates will be warned at the same time as the remaining population in the area of the emergency (this is ensured by united activation of the chosen terminal means of USWI). In the case of the need of warning of the building visitors and its surroundings, USWI will be able to use local activation of TWM (in this case Fire and Rescue Services of the region will be automatically informed about its activation). Understanding of the on-going warning of the population is another important part of the process of the warning of the population. Ensuring the appropriate warning can be done by connection of TWM to USWI. This ensures that people receive already known warning information (Generated warning). Generated warning is used in the whole territory of the Czech Republic and during all types of emergencies. People are used to reacting to it. The following distress information will be generated from previously recorded reports that Fire and Rescue Services of the region have at their disposal. The distress information includes data about the emergency (which the emergency increases) and about desirable behaviour of the population. The following other information can be information that operators of the building will have prepared or will be provided by the responsible employee of the building or person from the integrated rescue system. For the support of the warning and information by TWM and for warning and information of persons with hearing defects or lesser decision-making abilities (e.g. children and seniors) other supporting means should be used – e.g. light board, screens, running texts, colour marks in the ground, emergency lights. 4. Conclusions Warning and information of the population represent one of the basic measures of protection of the population. Their value increases depending on the degree, the intensity and the area of the origin of the emergency. From the point of view of these criteria it can be established that the buildings established for the gathering of large numbers of the population are the most problematic areas. This fact places great demands on ensuring quality and a reliable system of warning and informing the population. Nowadays the trend of the population is to go shopping or spend free time in shopping centres and entertainment centres. These centres are buildings established for the gathering of large numbers of the population including their car parks (subterranean or adjacent) and it is necessary to pay special attention to them, primarily at the threat or during the emergencies that can strike them. It is necessary to choose the optimal system of warning and information to prevent of the threat of the life and health of the population. The population have to react adequately to warning signals and distress information. In the range of desirable behaviour it is required to evoke in the population the requirement to protect not only themselves but also other fellow citizens. 37 Acknowledgements This article was prepared under the support of the research, development and innovation grant project “Improvised sheltering, warning, and information of population in the buildings for gathering great numbers of persons“, code number VG20122014061. A specific grants giver is the Ministry of Interior of the Czech Republic within the program of Security research for the needs of the state in the years 2010-2015. References Act No 239/2000 about Integrated Rescue System (Zákon č. 239 ze dne 28. června 2000 o integrovaném záchranném systému). [2] Act No 240/2000 about Crisis Management (Zákon č. 240 ze dne 28. června 2000 o krizovém řízení). [3] Conception of civil protection to 2013 with outlook to 2020 (Koncepce ochrany obyvatelstva do roku 2013 s výhledem do roku 2020). Praha: Ministerstvo vnitra – generální ředitelství Hasičského záchranného sboru ČR, 2008. 52 s. ISBN 978-8086640-91-4. [4] Mesmer, BL, Bloebaum, CL. 2012. Importance of incorporation of personal communication devices in evacuation simulators. Safety Science, 50(5):13131318. DOI: 10.1016/j.ssci.2011.04.020 [5] Ha, V, Lykotrafitis, G. 2012. Agent-based modeling of a multi-room multi-floor building emergency evacuation. Physica A-Statistical Mechanics And Its Applications, 391(8):2740-2751. DOI: 10.1016/j.physa.2011.12.034 [6] Martínek, B, Linhart, P. et al. 2006. Protection of population – Module E: Didactic requisite for the education in the field of the crisis management (Ochrana obyvatelstva – Modul E: Učební pomůcka pro vzdělávání v oblasti krizového řízení). Praha: MV-GŘ HZS ČR, 127 p. [7] Technical standards for terminal means of warning and information that are included to the united system of warning and notification (Technické požadavky na koncové prvky varování připojované do jednotného systému varování a vyrozumění). Sbírka interních aktů řízení generálního ředitele HZS ČR (částka 24/2008 ve znění částky 13/2009). Praha: MV-GŘ HZS ČR. [8] Public notice of Ministry of Interior No 380/2002 to preparation and performing of the task of protection of population (Vyhláška Ministerstva vnitra č. 380 ze dne 9. srpna 2002 k přípravě a provádění úkolů ochrany obyvatelstva). [9] Pokyn č. 15 generálního ředitele Hasičského záchranného sboru České republiky ze dne 15. dubna 2008 k realizaci technických požadavků na koncové prvky varování připojované do jednotného systému varování a vyrozumění (Čj. MV24666-1/PO-2008). [10] Hesková, M. 2005. Rozvoj obchodních center v zemích EU a České republice [online]. Marketing & komunikace, Praha, ISSN 1211-5622 [cit. 22-04-2012]. Available at: http://www.mandk.cz/view.php?cisloclanku=2006020003 [11] Velký boom zažívají retail parky [online]. Realit [cit. 22-04-2012]. Available at: http://realit.cz/clanek/velky-boom-zazivaji-retail-parky [12] ČSN 73 0831:2011. Fire safety of the buildings – Gathering places (Požární bezpečnost staveb – Shromažďovací prostory). Praha: Úřad pro technickou normalizaci, metrologii a státní zkušebnictví, 36 s. Třídící znak 730831. [1] 38 [13] Strawderman, L, Salehi, A, Babski-Reeves, K, Thornton-Neaves, T, Cosby, A. 2012. Reverse 911 as a Complementary Evacuation Warning System. Natural Hazards Review, 13(1):65-73. DOI: 10.1061/(ASCE)NH.1527-6996.0000059 [14] Hörmann MOBELA 150 digital [online]. Ascom [cit. 02-04-2012]. Available at: http://www.ascom.cz/cz/index-cz/mobela_150_cz.pdf 39 MULTICRITERIA EVALUATION OF TENDERS IN THE CZECH ARMED FORCES – CONTEMPORARY STATE OF THE ART Radka Lopourová Abstract: Public contracts awarding not only in the Czech armed forces (CAF) is often discussed by scientists and journalists because of the problems related to corruption and extremely high prices of goods and services being procured. The approach to tenders evaluation can significantly influence efficiency of the procurement process. Tenders are evaluated either according to suggested prices or according to economical convenience represented by multicriteria evaluation. Is multicriteria evaluation used more or less often than price evaluation in the CAF? Can multicriteria evaluation of tenders contribute to increase efficiency of the CAF procurement process? Is there any relationship between type of goods or services being procured and the way of tenders evaluation? These will be the main research questions the answers to which will be acquired via statistical analysis. Results of the research are required by the Armaments division, strategic contracting authority of the CAF. Keywords: public contract, tender, contracting authority, multicriteria evaluation, economic advantageousness of the tender 1. Introduction Procurement process either from private companies or from public administration organizations point of view can be described by the following scheme: Figure 1: Procurement process phases 40 The third phase of the process, offers evaluation, represents one ot the main and at the same time the most difficult steps of procurement activities spectrum. Two different approaches to potential suppliers’offers evaluation can be used: evaluation according to purchase price or multicriteria evaluation. This means application of criterias’ spectrum being prepared in advance based on the procured item qualitative and quantitative characteristics. Public procurement is the subject of public finance investment so it is necessary to regulate it by the system of acts, government resolutions and public administration organizations internal directives. The conducted research is focused on the multicriteria tenders evaluation within the central acquisition process in the CAF. The central procurement process is represented by the items the supposed financial value of which exceeds 1 million CZK without VAT in case of supplies and services and 3 million for public works. The exceptions are specified in the Government resolution [1]. The Act on Public Contracts [2] represents the crucial legislation according to which the contracting authorities of the Ministry of Defence (MoD) has to fulfil all the particular phases of the central procurement process. Wide spectrum of MoD internal directives stems from the Act where the most important is the Order of Minister of Defence no 39/2008 [3]. Public contracts awarding procedure within special military conditions is described in the order, mainly exclusions from the scope of the Act related to the Government resolution where military materiel is specified [1]. Tenders evaluation approach is analysed within paragraphs 78-80 of the Act [1]. There are examples of criteria possible to use in case of tenders’ evaluation 41 according to their economic advantageousness (multicriteria evaluation), recommendations concerning criteria’s importance establishment and information related to the necessity to inform tenderers about selected evaluation aproach in advance. 2. Problem Formulation Is multicriteria tenders’ evaluation used more frequently in the CAF than evaluation according to the lowest tender price? If so, in which percentage? Are there any recommendations or rules which evaluation approach to choose for which kind of item being procured? These are the most important questions that will be analysed within the research and have never been solved from the point of view of the CAF procurement system. That is why the results of the statistical analysis are required by the Armaments division of the MoD which is the most important contracting authority for central procurement in the CAF. Research problem is expressed by following hypothesis: H0: There is no relationship between type of goods, services or public works being procured and tenders evaluation approach. HA: Type of goods, services or public works and tenders evaluation approach are strongly connected. Two main and completely oposing points of view can be observed in practice if tenders evaluation approach is analysed. One part of specialists claims that it is useful to evaluate tenders only according to the suggested prices because it is the most transparent way of evaluation. On the contrary the second part of the experts’ spectrum declares that multicriteria evaluation of tenders is more appropriate because it can take the whole life cycle cost of the supply, service or public work into consideration. If used correctly, multicriteria evaluation can contribute to increase efficiency of the procurement process in not only the defence department but also within the whole public administration area. 3. Problem Solution Is it possible to prove that multicriteria evaluation of tenders is rarely used within the MoD subordinated acquisition entities? Yes, it is thanks to special databases accessible on the MoD and the Ministry for Regional Development web sites [4, 5]. Based on the data filtration analysis and chi-square goodness of fit test applied to the public contracts (central procurement in the CAF) being awarded within time period 2007-2011, following results have been obtained: Figure 2: Multicriteria evaluation of tenders and situation in the CAF Source: own As can be seen, evaluation according to the economic advantageousness of the tenders have been used in case of public supplies in 31% , within public works in 18% and in case of public services only in 6% of all the future public contracts. Table 1 Chi-square goodness of fit test applied to the public contracts within central procurement in the CAF within time period 2007-2011 Source: own PC cat. supplies services works ∑ Q PC 475 296 126 897 Oi 147 17 22 186 The above mentioned table being prepared via MS Excel involves following data: “PC cat.”, which means public contracts category, quantity of PC (Q PC) represents the total number of 42 Ei 98 61 26 186 Oi - E i 49 -44 -4 (Oi - Ei)2 2353 1969 17 χ2 24 32 1 57 below and above-the-treshold public contracts awarded by corresponding contracting authorities of the CAF in last five years. Oi is observed frequency of multicriteria evaluation being applied within the above mentioned time period and Ei expected frequency of evaluation according to economic advantageousness of tenders. The value in the last column means chi-square test statistic χ2 which is defined by the equation: (1) with the degrees of freedom: (2) where k is the number of levels of categorical variable [6]. 4. Conclusion Data filtration analysis has confirmed that evaluation of tenders according to their economic advantageousness is applied less frequently than evaluation according to the lowest tender price (see Fig 2). Alternative hypothesis HA: “Type of goods, services or public works and tenders evaluation approach are strongly connected” can be accepted because the calculated value of test criterion is significantly higher than critical value stated in the statistical table (5.991 for two degrees of freedom). This means that there is a strong correlation between category of public contracts and multicriteria evaluation of tenders application. If deeper analysis of the problem is conducted, it can be found out that in case of public supplies evaluation according to the economic advantageousness was used for following three groups of items: garment, shoes and cars. In the area of services only 17 public tenders out of 296 being awarded from 2007 till 2011 were evaluated according to the economic advantageousness criterion. The areas: information technology, research activities, audits. The field of public works: 22 contracts out of 126: reconstruction, repairs, demolitions. The lowest tender price was applied as a single evaluation criterion in case of supplies for items: software, cars, tracks, fuel, weapons, spare parts, electric energy, oils, tyres, computers, buses, printing machines. Services: protection of buildings, catering, service, transportation, cleaning, language courses, revisions of technical devices. Public works: repairs, reconstructions, demolitions. Why multicriteria evaluation of tenders was used for such a kind of items and why it was not applied to the others? According to Pavel and Jurčeková [7, 8] there is a rule that can be applied to the decision which main criterion of tenders’ evaluation would be the most appropriate to use. Three different situations can occure within the above mentioned decision situation: If product/service/public work can have only one form and its consumption does not cause any additional operational costs then it is required to use the criterion of the lowest tender price. If product/service/public work has only one form but additional operational costs can be observed during its consumption, it is recommended to use the criterion of economic advantageousness (multicriteria evaluation). The main aim of the client/contracting authority is then to find out information related to operational/life-cycle cost of a product from the tenderer and involve it into evaluation process. If product can have different forms and its consumption is connected to 43 additional operational costs, it is required to use multicriteria evaluation. It is obvious from the above mentioned paragraphs that some of the tenders being evaluated according to the lowest tender price in the CAF should have been evaluated according to the economic advantageousness because they can exist in different forms and their consumption causes additional costs. The following recommendation can be useful for all of the contracting entities: if it is possible to describe relatively easily and precisely the procured item’s qualitative and quantitative characteristics, let’s do it during the first phase of the process – procured product/service characteristics specification (see Fig 1). After that it is not necessary to use evaluation according to economic advantageousness because we should obtain tenders which all fulfil the required parameters and we can only compare suggested prices offered by the tenderers. This decisionmaking situation is valid only on condition that no additional costs are connected to the product/service consumption. If it is not possible to determine all the product/service characteristics precisely, multicriteria evaluation should have been applied. How we can be sure that the company which provides the CAF building protection is the best-one if we take only the lowest tender price into consideration? This situation is possible within all of the public administration organizations because contracting entities are not obliged to use evaluation according to economic advantageousness so they choose the easiest and fastest option. 44 If evaluation process is not managed correctly, it can endanger the economic efficiency of the whole procurement process. Particular criteria and its importance should be carefully precised by the committee of experts and verified from the point of view of financial limits given by the budget. Central procurement process in the CAF is based on political decision and so economical, technical and logistical criteria can loose their weight because of that. This can be the reason of contemporary situation when almost all public contract awarded by the contracting entities of the MoD has been critised. Future deeper research will be conducted in the field of criteria being used by contracting authorities of the MoD database creation and analysis of these criteria from the point of view of economic efficiency. Criteria’s importance determination is another problem which should also be solved because a certain weight of a particular criterion can significantly influence the result of the evaluation process. Analysis of the procurement process in the CAF during last five years related to this aspect will be conducted as well within the research. Similar statistical analysis will be applied to the accessible databases of the French armed forces. After that it should be possible to compare tenders evaluation processes in both countries via benchmarking method. The result of the research should be represented by establisment of possible criteria and their importance patterns for products/services/public works being procured for the CAF needs which is required by the Armaments division of the MoD. References [1] [2] [3] [4] [5] [6] [7] [8] Ministry of Defence, Government resolution no.274/2006 of Military materiel for the purpose of the Act no. 137/2006 Coll. on Public Contracts [online]. [cit. 201206-20]. Accessible on: http://www.portal-vz.cz/CMSPages/ GetFile.aspx?guid=faf72927-9b03-4281-b2ed2ef2f06b251e&versionhistoryid=1452. Ministry for Regional development, Act no.137/2006 Coll. on Public Contracts [online].[cit. 2012-06-15]. Accessible on: http://www.portalvz.cz/CMSPages/GetFile.aspx?guid=731da08c-4071-49c7-a882-f1503f63934a. Ministry of Defence, Order no. 39/2008” Public contracts awarding in MoD”. [online]. [cit. 2012-05-20]. Accessible on http://www.army.cz /scripts/detail.php?id=170. Ministry of Defence, Central procurement public contracts database [online]. [cit. 2012-05-13].Accessible on: http://www.army.cz/ scripts/detail.php?id=5935. Ministry for Regional Development, Official site of public contracts [online]. [cit. 2012-05-15]. Accessible on: http://www.isvzus.cz/ usisvz/. CHRÁSKA, M., Hypotézy a jejich ověřování v klasických pedagogických výzkumech. Olomouc : Pedagogická fakulta UP, Votobia, 2005. ISBN 80-7220253-7. PAVEL, J., Stanovení předmětu plnění dle zákona č.137/2006 ve vazbě na cíl výdajové intervence a s ohledem na 3E, Sborník autorských textů Jak zohledňovat principy 3E v postupech zadávání veřejných zakázek, MMR 2008, [online]. [cit. 2012-06-28]. Accessible on:http://www.portalvz.cz/ CMSPages/ GetFile.aspx?guid=6e8404c6-c3a4-4d4a-b684-5295469499de. JURČEKOVÁ, P., Ekonomická výhodnost nabídek – návrh vhodného modelu dílčích kritérií hodnocení veřejných zakázek, [Diploma thesis]. Brno: Mendel university, Faculty of economics, 2011. 45 SYSTEM DEVELOPMENT FOR SIMULATION AND EVALUATION EMERGENCIES Tomáš Ludík, Josef Navrátil and Karel Kisza Abstract: Managing the emergencies at the Emergency Staff requires a high co-operation between its members and their fast decision making. For these purpose it is necessary to prepare Emergency Staff members adequately. The aim of this paper is to describe the system development that focuses to emergency staff processes and simulation and evaluation emergencies. The system development is based on the principles of process management, and business process management. The suite called jBPM was used for during development. The output is the information system that allows users to simulate emergencies, including effective decision making. The system also evaluates the progress of the emergency processes solving by quantitative and qualitative indicators. Higher quality of specialists’ education can be achieved by using this simulator and negative impacts of emergencies can be reduced. Keywords: Simulation, Evaluation, Emergencies, Service Integration, jBPM 1. Introduction The objective of the paper is to describe the development of a process simulator in order to prepare and train emergency staff members at national and international level. Preparation is aimed at promotion of processes and effective decision-making during the security environment analysis and crisis management. It equally includes comprehensive training and evaluation of the human factor. This goal is based on detailed analysis of the current state [9, 10 and 15] and also reflects the requirements of experts in the field of emergency management [1, 5]. Paper is divided into three parts. The problem formulation describes largescale accident caused by selected hazardous chemical substances and chemical products, which is the area that has been selected to create the simulator creation. Later, the development of process simulator is described in terms of the process analysis [17] and 46 modelling in the business process modelling notation (BPMN) [16]. The final part of the paper presents the system development and outputs of the research and possibilities of system at process simulation and evaluation. A number of emergency situations are solved at the level of Emergency Staff. The aim is to develop a comprehensive information system that will cover these situations. For this reason, an iterative approach, that allows implementation of the system by parts, was selected. Design of the system is illustrated on chosen situation, which is the leak of chemical hazardous substances. 2. Problem Formulation Large-scale accident caused by selected hazardous chemical substances and chemical products is rare event demonstrated by uncontrolled flows of energy (fire, explosion), and leaks of toxic substances [6]. These are partially or totally uncontrollable, time and space bounded event which occurred or which is associated with the use of the building or facility where the hazardous substance is manufactured, processed, used, transported or stored. This situation can lead to immediate or delayed serious damage or threat to life and health of people, livestock, and environment or for damage to property [14]. To solve large-scale emergency, it is appropriate to use the corresponding model action plan called Large-scale accidents caused by selected hazardous chemical substances and chemical products processed by Ministry of Interior of the Czech Republic [14], which addresses issues across the boardwide Czech Republic. Another information source is Operational plans at regional level. These especially include individual emergency plans, which are subdivided into: Regional Emergency Response Plan which are processed by Fire fighters in cooperation with the region, all the possible places where accidents can occur mainly anthropogenic action [3, 4]; Internal Emergency Plan which are focused on particular facilities or subject, they are processed by the body meeting the requirement of the legislation [2]; External Emergency Plan which are focused on particular facilities or subject too, but they are processed by Fire fighters processes [3]. Desired state is the stabilization of activities in the chemical facility and decontamination of equipment in the immediate surroundings of the accident. The best solution is to focus to the stabilization of public service authorities. 3. System Analysis The aim of this part is to model the processes of selected emergencies and to specify them in detail. The result is a view on partial actions and user roles that are responsible for the actions [16, 17]. There is a simple process, describing a response to an emergency on the Emergency Staff level, on the highest process analysis level (Fig.1). It is the highest level of abstraction. The process starts with receiving a notification about an emergency. If an Emergency State is declared, it is necessary to gather the Emergency Staff. Subsequently, the whole range of emergency processes is carried out on the Emergency Staff level in order to deal with the emergency. Once these actions are carried out and the emergency is over, it is possible to disband the Emergency Staff. Figure1: Process of Solving of Emergencies The next step is to model the activities displayed in the Fig.1 in detail. The first of them is called Receiving Notification of Emergency. On a lower level, it is possible to consider this action as a subprocess. The process starts when the operation centre receives a notification of a leakage of hazardous substances by phone. The operator obtains details of concerning the location, the accident scope and the number of people injured. The operator must verify, whether the call is not only a false alarm. Subsequently, there is an evaluation of relevance of the emergency. The units of Integrated Rescue System (IRS) are dispatched to the place of the leak and if the situation is serious, an emergency state is declared. As the aim of the paper is to create information system for the Emergency Staff, the process continues just in the case of the Emergency and when the emergency state is declared. After the declaration of the emergency 47 state, the mayor of the competent municipality is informed. A standard formulated report describing the status of the emergency is created to provide the mayor with all the relevant information. Upon its receipt, the mayor of the competent township is obliged to verify the information and gets in contact with the Information Operation Centre. If the information is verified successfully, the Emergency Staff is gathered. In the other case, the process is cancelled. For more details see Fig. 2. Figure2: Receiving Notification of Emergency The next step is a process of Summoning of the Emergency Staff. It is a very simple process, in which the mayor meets the Emergency Staff members and commences its activity. In the first case, the mayor specifies a notification message, in which he or she informs the individual Emergency Staff Members about the emergency and the place and time of the first Emergency Staff meeting. Based on the character of the emergency, the mayor can adjust the Emergency Staff structure and invite other specialists into the Emergency Staff. All the Emergency Staff Members are then sent a notification with information about the situation. They can confirm or reject their participation. The mayor is notified about the confirmation of each member and if needed, he can send a fast reaction. Afterwards, it is possible to begin the activity of the Emergency Staff in a time which has been specified in advance and to start to deal with the emergency itself. All the actions are adequately documented and therefore a report on the Emergency Staff activity commencement can be created. The whole process of gathering of the Emergency Staff is in Fig. 3. Figure 3: Notify the Emergency Staff Various activities and tasks are performed on the Emergency Staff level. The mayor of the competent municipality (Emergency Staff Leader) is responsible for the response to the emergency and he or she gradually assigns the tasks that should lead bringing the Emergency under control. The individual activities that must be carried out are defined by law [2]. The 48 Mayor has a possibility to choose a task and a user role or person that is responsible for the task and he or she can also specify the task in more detail. The group performs chosen task and adequately documents its solution. Once the task is completed, the mayor checks whether this is really the case. If the task is not completed or completed just partially, the Mayor has an opportunity to re-assign or modify the task. When all the specified tasks have been completed, it is possible to end the emergency and to disband the Emergency Staff. The corresponding process map is depicted in Fig. 4. Figure 4: Emergency Processes of Emergency Staff Similarly, it is possible to continue in the decomposition and modelling of the processes into further detail. If a more complex information system for the Emergency Management were to be created, the processes would have to be more complex and modelled into a further level of detail. After modelling of the individual activities, the next step is system implementation, which is described in the next section. 4. System Implementation Interaction with a user is necessary when dealing with emergencies. This is solved within BPMN 2.0 by means of User Tasks [16]. User Task creation depends on the chosen architecture, the jBPM in this case. The architecture chosen supports the use of human tasks inside processes using a special user task. A user task node represents an atomic task that needs to be executed by a human actor [7]. Although jBPM has a special user task node for including human tasks inside a process, human tasks are considered the same as any other kind of external service that needs to be invoked and are therefore simply implemented as a domain-specific service. To have human actors participate in the processes, it is needed to [8]: - Include human task nodes inside the process to model the interaction with human actors; - Integrate a task management component; - Have end users interact with a human task client to request their task list and claim and complete the tasks assigned to them. As an example of a Service Automation in the form of a User Task, an activity called Commencing of the solution of the Emergency was chosen. This activity proceeds the Notification of Emergency and the Summoning of the Emergency Staff. The activity is described in BPMN 2.0. The element describing the task looks as follows: <userTask id="_5-7" name="Zahajeni reseni KS _ Starosta" > To ensure correct form display and task function, it is necessary to pass over the data entered by the user. This means that the required data is copied from the process variables to the task parameters. Once the task finishes, the results are then returned by means of mapping to the process variables. A script in Java programming language is used for this purpose. This script is launched upon the start or finish of the task. An example of the script for manipulation with the entered data is shown below. <extensionElements> <tns:onExit-script scriptFormat="http://www.java.com/java"> <script> ukolySeznam = new java.util.ArrayList(); ukolyPrirazeni = new java.util.HashMap(); if ("y".equals(u1resit)) { ukolySeznam.add("Vyrozumeni"); ukolyPrirazeni.put("Vyrozumeni", u1Actor); 49 } if ("y".equals(u2resit)) { ukolySeznam.add("Varovani obyvatel"); ukolyPrirazeni.put("Varovani obyvatel", u2Actor); } kcontext.setVariable("ukolySeznam", ukolySeznam); kcontext.setVariable("ukolyPrirazeni", ukolyPrirazeni); </script> </tns:onExit-script> </extensionElements> First of all, the assignment of individual tasks to users is evaluated and these results are assigned into the corresponding data structures, which are then assigned into the process variables. The input and output variables have to be mapped. At the end, it is possible to assign the User Task created to a concrete user, in this case to the Mayor. <potentialOwner> <resourceAssignmentExpression> <formalExpression>starosta</formalExpression> </resourceAssignmentExpression> </potentialOwner> Consequently, the human task service needs to be integrated with the jBPM engine just like any other external service. This is done by registering a work item handler that is responsible for translating the abstract work item (in this case a human task) to a specific invocation of a service [8]. It is done by registering WSHuman-TaskHandler as prsented in the following code: KnowledgeBase kbase = readKnowledgeBase(); StatefulKnowledgeSession ksession = base.newStatefulKnowledgeSession(); ksession.getWorkItemManager().registerWorkItemHa ndler("Human Task", new WSHumanTaskHandler()); By default, this handler will connect to a human task service on the local machine on port 9123. The address and port of the human task service can easily be changed. This service should be used by invoking the setConnection(ipAddress, port) method on the WS Human Task Handler. To ensure the interaction with the end users, jBPM Console is used. This is a tool for interaction of the running processes (User Tasks) with the user. Business processes and Human Tasks can be managed through this web console. There is an example of a form for starting the response to the emergency by the Mayor (Fig. 5). The names of the variables that can be seen in the individual fields will be replaced with their values in runtime. Figure5: User Interface for Human Task 4.1. Key Performance Indicators Business Activity Monitoring (BAM) tools are used for Implementation of the Key Performance Indicators (KPI). All 50 the aspects of introducing KPI – from definition of the data gathered by monitoring until the display of the KPI – are described in the next part. At first, the principles of the data storage that will be used for getting the KPI are described by means of History log. The BAM rules for jBPM are then used to manipulate and display the KPIs. In many cases, it is useful to store information about the execution of process instances, so that this information can be used afterwards. Storing history information in the runtime database is usually not a good idea, as this would result in evergrowing runtime data. Furthermore, monitoring and analysis queries might influence the performance of the runtime engine [8]. That is why historical information about the execution of the process instances is stored separately in History Log. The History Log of execution information is created based on the events generated by the process engine during execution. The jBPM runtime engine provides a generic mechanism to listen to different kinds of events. The necessary information can easily be extracted from these events and persisted, for example in a database. Filters can be used to store only the relevant information. The jBPM-BAM module contains an event listener that stores process-related information in a database using Java Persistence API (JPA) or Hibernate directly. The database contains two tables; one for Process Instance Information and one for Node Instance Information [8]: ProcessInstanceLog: This contains the process instance id, the process (definition) id, the start date and (if applicable) the end date of all process instances. NodeInstanceLog: This table contains more detailed information about which nodes were actually executed inside each process instance. Whenever a node instance is entered from one of its incoming connections or is exited through one of its outgoing connections, that information is stored in this table. To achieve this, it stores the process instance id and the process id of the process instance it is being executed in, and the node instance id and the corresponding node id (in the process definition) of the node instance in question. Finally, the type of event (0 = enter, 1 = exit) and the date of the event is stored as well. Business Activity Monitoring is related to the real-time monitoring of the processes and introduces a possibility to intervene directly (possibly even automatically), based on the analysis of these events. Drools Flow allows users to define reports based on the events generated by the process engine, and makes it possible to directly intervene in specific situations using event processing rules (Drools Fusion). Based on the Eclipse BIRT plug-in (Business Intelligence Reporting Tool), users can create reports that show the KPIs of their business. It is easy for the users to even define custom reports using the predefined data sets containing all process history information (based on history logger that logs all runtime events in a database). By adding a history logger to the process engine, all relevant events can be stored in a database. This history log can be used to monitor and analyze the execution of the processes. Drools Flow uses the Eclipse BIRT (Business Intelligence Reporting Tool) to create reports that show the KPIs. The Eclipse BIRT framework allows the user to define data sets, create reports, include charts, preview the reports, and export them on web pages. The following screen shot shows a sample on how to create such a chart (Fig. 6). 51 Figure 6: Drools Eventing Report [8] 4.2. Service Outsourcing It was found desirable to be able to use the existing systems or portals for automation of the modelled processes. As there is only a small amount of functioning services within the Emergency Management that could be integrated with the system, it was necessary to use the systems that do not have any interfaces exposed [11]. The following systems within the paper were primarily used: System for Modeling of the Leakage of the Dangerous Substances – a system, which makes it possible to predict a leakage of dangerous substance based on the supplied parameters. In the Czech Republic, the systems most commonly used are called TerEx or Aloha. Once the parameters are entered, a predicted model is created in the form of text output and map. This information can directly be used in the system developed. Integrated Warning Service System – a service provided by the Czech Hydrometeorological Institute that serves to inform the public and Emergency Management Bodies about warnings declared for the Czech Republic. Geographical Information System – a standard add-on to each of the Emergency Management information system, which makes it possible to illustrate emergencies being dealt with on a map. Contextual mapping service 52 was used within the Proof of Concept. It enables the user to display the situation in a given context. Transport Information System – system used when there is a leakage of hazardous substances related to transportation. The system is administered by the Ministry of Transport. It makes benefit of labels that are required by law to be present on the containers with the substances. These make for a quick identification of the transported substance, which helps to improve the efficiency of the response to the emergency. 5. Conclusion The main aim of this paper is to describe, design and implement process simulator for education of the Emergency Staff. Therefore it is necessary to identify, model, and then configure the processes involved in disaster management. Selected procedures are described from the methodological perspective but also from the perspective of software architecture, which allows processes automation. The paper emphasizes the use of standards and best practices in the field of process management. The result represents a comprehensive system for simulation and evaluation processes of the Emergency Staff. For an overall understanding of the described issue it is also appropriate to familiarize with the Process Framework for Emergency Management [12]. This contribution emphasizes the importance of the two perspectives in the deployment process of emergency management. It should be noted that the architecture itself is not sufficient for the automation of emergency management processes [11]. It should be supplemented by a methodology that defines how to proceed with process automation and deployment. Such methodology has been already published in the article entitled Process Methodology for Emergency Management [13]. This methodology has been used during the automation of selected emergency management scenarios described in this paper. Members of Emergency Staff understand emergency planning issues and emergency management more easily when illustrated on real examples. The resulting solution allows to model emergency scenarios using process maps. The maps can be configured and deployed on a process engine for the purpose of simulation emergency processes in training environment. Finally, it should be noted that the proposed solution is suitable not only for educational purposes, but also for the automation and deployment of real emergency scenarios in the Czech Republic. Thus the used business process management suite allows reflecting any changes in emergency scenarios more quickly. References [1] Barta, J, Srník, A. 2011. Infrastructure means for Adaptive Camouflage. In: World Academy of Science, Engineering and Technology. Volume. 3, Issue 59. [2] Czech Republic. 2006. Act No. 59/2006 Coll., concerning prevention of major accidents caused by selected dangerous chemical substances or chemical preparations. In: Czech Republic Statute Book. [3] Czech Republic. 2001. Legislation Decree 328/2001 Coll., on some details of the security of the integrated rescue system. In: Czech Republic Statute Book. [4] Czech Republic. 2000. Act No. 239/2000 Coll., on the Integrated Rescue System and on amendment of certain codes, in latter wording. In: Czech Republic Statute Book. [5] Diehl, S, Neuvel, J, Zlatanova, S, et al. 2006. Investigation of user requirements in the emergency response sector: the Dutch case. In: Proceedings of the Second Gi4DM. Goa, India. [6] European Commission, Council Directive. 1996. 96/82/EC of 9 December 1996 on the control of major-accident hazards involving dangerous substances (Seveso II Directive). [7] The jBPM team. 2012. jBPM Developers Guide, Version 4.0.0 Final. Accessed 2012 <http://docs.jboss.com/jbpm/v4/devguide/html_single/>. September 9. [8] The jBPM team. 2012. jBPM User Guide, Version 5.2.0 Final. <http://docs.jboss.org/jbpm/v5.2/userguide/>. Accessed 2012 October 6. [9] Klopfer, M, Kanellopoulos, I. 2008. The ORCHESTRA Consorcium: Orchestra, an open service architecture for risk management. [10] Kubíček, P, et al. 2010. Process Support and Adaptive Geovisualisation in Emergency Management. In: Geographic Information and Cartography for Risk and Crisis Management - Towards Better Solutions. Heidelberg: Springer-Verlag. 53 [11] Ludík, T, Barta, J. 2011. Architecture for Operational Processes Improvement in Emergency Management. In: Recent Researches in Computational Intelligence and Information Security. Jakarta: WSEAS Press. [12] Ludík, T, Ráček, J. 2011. Process Framework for Emergency Management Solving of Emergency Situations by Way of Business Processes. In: Proceedings of the 6th International Conference on Software and Database Technologies. Portugal: SciTePress. [13] Ludík, T, Ráček, J. 2011. Process Methodology for Emergency Management. In: IFIP Advances in Information and Communication Technology. Heidelberg: Springer. [14] Ministry of Interior. 2010. Large-scale accident caused by selected dangerous chemical substances. Model Action Plan of the Ministry of Interior. Prague: Ministry of Interior, Czech Republic. [15] Sell, Ch, Braun, I. 2009. Using a Workflow Management System to Manage Emergency Plans. In: Proceedings of the 6th International ISCRAM Conference. Gothenburg, Sweden. [16] Silver, B. 2009. BPMN Method and Style: A levels-based methodology for BPM process modeling and improvement using BPMN 2.0. Aptos: Cody-Cassidy Press. [17] Weske, M. 2007. Business Process Management, Concepts, Languages, Architectures, Heidelberg: Springer-Verlag. 54 TEST RESULTS OF THE ENVIROX ADDITIVE INFLUENCE ON COMBUSTION ENGINES OPERATION Jaromír Mareš, Nataša Pomazalová and Václav Zajíček … Abstract: Envirox is a chemical preparation based on cerium oxide (CeO2), which when added to fuel works as a catalyst. It affects the combustion processes by substantially reducing the amount of harmful combustion products, unburned fuel and solid matter in exhaust gases. Keywords: Additive, combustion engine, Envirox, fuel consuption 1. Introduction Naturally occurring element cerium (Ce) is used during the catalysis. The base of the catalysis is created by cesium oxide (CeO2), which allows almost complete combustion of hydrocarbons and soot. The determinative factor is the very low temperature at which catalytic reactions occur. During ignition, the first stage of combustion, the low temperature allows much better catalytic combustion of the fuel. Lower average combustion temperature, regardless of the temporarily higher maximum temperature of combustion, also prevents the production of NOx due to the high activation energy of nitrogen oxidation. The catalytic activity of CeO2 is strongly dependent on particle size and specific surface area. The so-called oxygen vacancies form more easily on the CeO2 surface, which explains that material with higher specific surface area (nanoparticles) has a higher catalytic activity. This is a key factor that, during the catalysis, makes the combustion with the use of nanotechnologies based on cerium a good competitor to catalytic systems based on metals such as platinum or palladium. High temperature stability of CeO2 results in a reoxidation ability of Ce2O3 nanoparticles, so that these are active even during the fuel combustion. Measurements were conducted in laboratory conditions on an engine break aimed to measure the influence of the ENVIROX additive on T 815 6×6 and LRD 90 diesel combustion engines operation. The influence of fuel with added Envirox preparation on state and operation of diesel combustion engines of 2 types. The test consisted of series of particular test on a brake station as well as of series of special laboratory tests. Engines fromTatra T3-930-31 and Land Rover 300TDi were used to test Envi 2011. The tests were made on a brake station with the use of a HORIBA DT900-1 hydraulic brake. 2. Influence of the additive on fuel consumption This test was aimed to check the supposed decrease of fuel consumption, emission reduction in exhaust gases, decrease of deposit amount in combustion chamber and in the exhaust system and inquest of the influence of the Envirox additive on the engine state. The subject of the test was a chemical preparation (Envirox additive) produced by ENERGENICS and distributed by exclusive supplier NanoTrade. This additive in accordance with to the 55 supplier recipe was mixed with NM-54 diesel oil at a rate of 1 liter Envirox to 4000 liters of diesel. Supplier of the additive declares, that the influence of switch to this additive is positively displayed by emission reduction immediately after switch to fuel with Envirox and then during the next operation – above all by the decrease of fuel consumption plus by removing and preventing of deposits formation in combustion chamber and in exhaust system. The tests were conducted on two types of engines from Tatra and Land Rover vehicles. During the test service fluids NM-54 were cyclically burnt followed by a group with EnviNM-54 fuel and lastly again by a group with NM-54 fuel. The consisted of: - Assessment of engines condition (before and after tests on brake station); - Tests on Tatra and Land Rover engines on brake station; - Laboratory analysis of oil samples taken from engine on brake during testing; - Measurement of exhaust emissions in exhaust gases on both engines on the brake at specified operating modes. 2.1. Oxidation of deposits (carbon) In diesel engines burning produces a significant amount of unwanted substances, which along with the mist from lubricant produces carbon that settles in combustion chamber and in the exhaust system. These deposits results in increased friction and cause undesirable changes in heat losses on inner surfaces. The temperature on piston head and combustion chamber walls ranges from 200 to 500 °C. But this is exactly the range of carbon activation temperatures under the influence of CeO2 nanoparticles. This results in a gradual oxidation of deposits and their removing from engine along with exhaust gases. 56 CeO2 nanoparticles added to the fuel allow better hydrocarbons combustion (which consequently reduces fuel consumption) and by supporting the combustion of deposits leads to their removal. The test of the Envirox additive influence on combustion engine operation is consisted of a series of subtests on the selected engine and in specialized centers. The aim of the test was to verify the expected decrease of fuel consumption and reduced exhaust emissions when using diesel fuel with the Envirox additive and any changes in engine operation. The tests were aimed to monitor the following parameters: - The main engine parameters (power, torque, specific fuel consumption, etc.); - Properties of the Envirox additive and of the fuel with added Envirox during its operation; - Emissions of the engine (gaseous pollutants and solid matter); - The state of oil filling; - Storability of EnviNM54 fuel and the Envirox additive supplied either in metal barrels, two-liter glass bottles or plastic bottles. The Envi 2011 test was divided into two groups of tests as follows: - Tests of the engine on a brake station; - Special tests. 4 Mh test was repeatedly conducted on the brake station, gradually on two engines - Tatra and Land Rover. The tests consisted of four-hour sequence of load cycles (4Mh Test). In addition to the above brake tests the necessary maintenance works, sampling of fuel and oil for laboratory tests and emission measurements have been included. Special tests included the following sub-tests: - Analysis of oil samples during engine tests; - Analysis and assessment of samples of the Envirox additive, NM54 fuel and NM54 doped fuel; - Evaluation of the emissions in the exhaust gases; - Storability evaluation of the EnviNM54 fuel and of the bought additive. 2.2. LR tests The LR tests were made on Land Rover LR 300TDi with 164 466 km driven. The used engine is an ordinary diesel engine, four-cylinder, four strokes and direct injection, with Garrett T 2.5 turbocharger, with charge-air cooler. The engine is liquid cooled. Cooling is pressurized, with thermostat with forced circulation. Radiator coolant forms one unit with the engine oil-cooler and charge-air cooler. Cubic capacity 2495 cm3, bore / stroke 90.47 / 97 mm, Overhead valve, compression ratio 1 : 19,5. Rated output 65 kW at 4000 min-1, maximum torque 210 Nm at 1800 min-1. In preparation for the engine test for the assessment of sediment (carbon) during the test, one surface of the cylinder and cylinder head were cleaned from the surface sediments from the previous operation. The test was conducted with second gear shifted at gear ratio 2.13 : 1 with the friction coefficient 1.116 and the corresponding mechanical efficiency of 0.895255 Envi 2011 test contained the following sub-tests: - engine test on brake station; - laboratory analysis of oil samples collected from the engine on brake during the test; - measurement of emissions in the exhaust gases on the engine and brake at the specified operating modes; - analyzes of fuel samples. The influence of the Envirox additive was assessed by comparing values of the parameters characterizing the engine activity (specific fuel consumption [mpe]), the state of its parts (carbon on the sides of the combustion chamber and exhaust system) and carbon emissions in the exhaust gases before and after application of the Envirox additive. The Envi LR test had a long-time character. The engine was in operation for 172 Mh. Engine operating modes were selected in order to suit the operation of vehicle engines, which is characterized by an activity in a wide range of speeds and loads. To assess the influence of used Envirox additive on the engine a "specific fuel consumption" variable was used, which is defined by following formula: m pe = Gh Pe [g.kW-1.h-1] Gh [kg.h-1] = fuel consumption per hour (amount of fuel), Pe [kW] = efficient engine output. In total 43 tests were performed, each test included a 4Mh Test. During the test No. 18 an anomaly occurred and a large increase in filling pressure was registered. Consequently during the test No. 22 damage on the TD membrane regulator was found. After replacing the controller, which includes the aforementioned membrane, during the test No. 23 filling pressure at 100% load declined substantially. When loaded on 60 and 40% there was even a slight increase. Relative stabilization of filling pressure values (at values, which occurred after switch to the Envi NM-54) occurred from test No. 25, on 100 and 40% load. From test No. 29 at lower loads, 80, 60 and 40%, boost pressure increased again. Filling pressure progress during the tests is shown in Fig. 1. 2.3. LR test results Monitored parameters were mainly specific fuel consumption (mpe) and emissions production in the exhaust gases before and after the application of Envirox additive. The graphs on the picture 2a, 2b, 2c show that at all these speeds and at full load (100%) mpe values fluctuated slightly up until test 57 No. 17. At lower loads (80, 60 and 40%) mpe was slightly higher. With the load decrease mpe increased rapidly at all speeds. The switch to Envi NM-54 fuel was conducted in the test No. 11, when mpe values break occurred. At 100%, 80% and 60% load slight declines and increases occurred. At 40% load a significant decline of the mpe values at all speeds became noticeable. This finding was made after test No. 21 from3 Nov 2011, after 84 Mh of engine operation. Initially, this decrease was clearly regarded as a positive Envirox additive effect. After test No. 11 a second group of tests started, the fuel was diesel oil NM-54 with added Envirox preparation. The measured mpe values were up to this moment relatively stable with little variability both before switch (before the test No. 11, after 40 Mh of testing) and after transition, after the test No. 11 (other 44 Mh of testing) with a fuel with Envirox added. Mpe grew along with speed increase at all loads. At the same time the range of mpe values increased: - 2000min-1 range from 220 to 260g.kW-1.h-1; - 3000min-1 range from 240 to 345g.kW-1.h-1; - 4000min-1 range from 300 to 580g.kW-1.h-1. 150 140 nM = 3000 130 120 Filling pressure PvzTD [kPa] 110 100 90 80 70 60 TD malfunction 50 NM-54 Envi NM-54 NM-54 40 30 20 10 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 LR test number 100 80 60 40 Figure 1: Filling pressure progress during the tests. 58 650 Envi 2011 LR, 2.ZCH 600 -1 2000 min 550 mpe 500 450 400 350 Envi NM-54 NM-54 NM-54 300 250 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 42 43 44 45 46 43 44 45 46 Test number 100 80 60 40 Figure 2a: LR Effect of the engine load on the values during LR test at 2000 min-1 650 Envi 2011 LR, 2. LC 600 550 mpe -1 3000 min 500 450 Envi NM-54 400 NM-54 NM-54 350 300 250 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 Test number 100 80 60 40 Figure 2b: LR Effect of the engine load on the values during LR test at 3000 min-1 650 4000 min 600 Envi 2011 LR, 2. ZCH -1 550 mpe 500 450 400 350 300 250 Envi NM-54 NM-54 NM-54 200 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Test number 100 80 60 40 Figure 2c: LR Effect of the engine load on the values during LR test at 4000 min-1. 59 2.4 Load characteristics The load characteristic is a graphic representation of monitored variable depending on engine load. Engine load is proportionally expressed in Figure 3. In Envi tests (2011 and 2011) a torque ratio is used because torque is a quantity measured directly on the brake. The load in this report is expressed by the torque ratio at fixed engine speed. Figure 3 shows noticeable changes in the specific fuel consumption in load characteristics measured just before switch to Envi NM-54 fuel (test No. 10) and after the switch to this fuel (test No. 11). In Fig. 3 it is clear that the influence of Envirox additive manifests itself at lower loads under 80 %. The same conclusion was found in Envi tests in 2010. 600 Comparison of 2nd LC during 10th. a 11th test at speed 2000 ( 102 and 112 in the legend), ENVI 2011 LR 500 nM = 4000 min 3000 (103 and 113 in the legend) and 4000 min-1 (104 and 114 in the legend) Test No.10 was conducted with the NM-54 fuel. Test No.11 was conducted with the doped Envi NM-54 fuel. -1 No.10 Specific fuel consumption m pe [g.kW1.h-1] 1 ] No.11 400 No.10 nM = 3000 min -1 300 No.11 nM = 2000 min -1 No.10 No.11 200 Conclusion During transition from test No. 10 (NM-54) to No.11 (Envi NM-54) at loads lower than 80% mpe always decreases. According to the results of smoke measurements (by CDV company at 60% mode at 3000 min-1 with Envi NM-54, the level of smoke always decreased indicating a perfect combustion. It can be assumed that these changes, mpe and smoke decrease are caused by the Envirox additive. 100 0 0 20 40 60 80 100 Engine load ZatM [%] 102 112 103 113 104 114 Figure 3: LR Comparison of load tests characteristics No. 10 and 11. In Fig. 3 it is clear that the influence of Envirox additive manifests itself at lower loads under 80%. The same conclusion was found in Envi tests in 2010. 3. LR statistical analysis Based on the above described tests and on the result of changes in values before and after the TD malfunction and after its repair, the entire Envi LR 2011 test was divided into four stages: - 1st stage tests No.1 to 10 LR NM-54 fuel, (10 tests, 40 Mh); 60 - 2nd stage tests No.11 to 21 LR Envi NM-54 fuel, (11 tests 4Mh, 44 Mh); - 3rd stage tests No.22 to 33 LR Envi NM-54 fuel, (12 tests 4Mh, 48 Mh); - 4th stage tests No.34 to 43 LR NM-54 fuel(10 tests, 40 Mh). At each stage an arithmetic mean of values was determined and corresponding standard deviation (Excel function STDEVP). 120 3.1. Evaluation of specific fuel consumption The relative difference in arithmetic means in each stage (dmpep) is shown in Table 1 is defined by following formula: dmpe p = (m pex − m pe1 ) m pe1 ⋅ 100 [%] Table 1 LR Decrease in specific mpe fuel consumption in 2nd, 3rd and 4th stage related to valuesin 1st stage [%]. 2/1 3/1 4/1 2000 40 100 3000 40 60 60 80 10.87 1.86 6.24 6.36 80 -1.02 -0.63 13.96 8.79 1.29 -0.18 0.18 3.54 2.33 1.69 1.69 5.51 This relative expression is marked symbolically 2/1, 3/1 and 4/1 in Tab. 1. Negative values indicate increased specific fuel consumption and are shown that the greatest reductions in specific mpe fuel consumption occur at low loads (40 and 60%). Specific fuel consumption increased with an increase in load. Differences between the mpe values with and without the Envirox additive are becoming increasingly smaller and approach the values of operating with NM-54 fuel. If the decrease at the speed of 2000 min-1 and 40% load mpe was 10.87%, then at same speed and 60% load was the decrease just 1.86%. Contrarily at loads above 60% even a slight increase of mpe occurred. Negative values in the TAB. 6 LR mean mpe increase. The first two stages can therefore presume a positive effect of the Envirox additive at low engine loads. 3.2. Measurement uncertainty Uncertainty consists mainly of statistical uncertainty of type A, which equals the above mentioned STDEVP%, standard deviation, which values were obtained by standard statistical analysis for normal distribution. Along with the uncertainty of type A uncertainty also includes the uncertainty of type B, which takes into account the non-statistical uncertainty. In this case, the uncertainty of type B was determined as a sum of the measuring uncertainty of the three 100 4000 40 60 80 100 0.5 -0.5 15.8 2.5 0.4 -3.1 2.09 -0.1 0.3 0.1 -1.9 -2.4 -0.5 3.89 2.8 3.1 20.1 8.1 5.9 4.2 measuring instruments used for determining the value of specific fuel consumption, ie. tachometer ±0.025 %, torque ±0.2 % and the fuel flow meter ± 0.01 %. Type B uncertainty was calculated as the so-called uB = 0.20180436 %. The combined standard uncertainty was calculated as the sum of the geometric uncertainties of type A and B. In our case the greatest uncertainty of type A from all stages was taken the 4th stage with average statistical uncertainty uA = ±1.89 %). The uncertainty of type B is shown above, uB = ±0.20 %. The highest combined standard uncertainty is defined by the sum uC = u A2 + u B2 = 1.89 2 + 0.2 2 = 1.90 % The uncertainty of measurements on an engine LR can be summarized that in the least favorable cases, the uncertainty uC = ±1.9 %. We can state that uncertainty of the measurements is acceptable. 4. Conclusion The specific fuel consumption measurement was carried out on 22 tests (4 Mh tests) and the engine operated for 88 Mh. Due to the relatively long test period we can declare that the results can be considered significant. Available literature suggests reasonable uncertainty in the values approaching the 61 interval ± 2 %. Combined uncertainty of measurements on a LR engine reached the value uC = ±1,9 % and is acceptable for the relevance of the measurements results. Based on the tribotechnic analyses of the used motor oil it can be stated, that the Envirox preparation did not affect the technical state and the serviceability of the engine in any direction. The inspection of the most stressed parts of the engine before and after the test did not show any noticeable changes in carbon deposit or in piston group wear. However, the Envirox additive did not affect the production of gaseous pollutants. Overall, it can be concluded that the effect of the Envirox additive was positive and led to a decrease in specific fuel consumption of 6 to 11 %, which occurred at lower loads and lower speeds. References FERENC, J., FERENCOVÁ, J., KOŠČÁK, P. Spôsoby a štýly riadenia logistiky letísk. 1 elektronický optický disk (CD-ROM).In: Aeronautika 2011. Medzinárodná vedecká konferencia.: 20.-21. októbra 2011, Herľany. - Košice : TU, 2011 S. 1-8. - ISBN 978-80-553-0758-9. [2] ZAJICEKV, V., KŘÍŽEK, P. Tribotehnical Diagnostics as an Effective Tool of Quality Management in the Army of the Czech Republic. In The 17th International Conference Knowledge-Based Organization. Sibiu, 2011. pp. 378382. ISSN. 1843-6722. [3] Ministerstvo obrany. Odborné nařízení k provedení zkoušky přísady do paliva – Envirox. Praha : Sekce logistiky. 2010. Č.j. 250/2010-3042. [4] Drozdov, N., Lukashina, V., Nazarova, T. I., Using the Achievements in Tribology for Teaching Technical Disciplines. Journal of machinery manufacture and Reliability. Vol. 40. No. 2 2011, pp. 3–8, ISSN 1052_6188. [5] Ministry of Defence. Instruction for Tribodiagnostics of Engines, Gear and Hydraulic Systems. No. 79-27/2007-3042. Prague , Logistics Division, 2007. [6] MAREŠ, J., ZAJÍČEK, V. Zkouška vlivu aditiva Envirox na provoz vozidel AČR v reálném provozu. Metodika. Brno: Univerzita obrany. 2010. [7] MARES, J., BOZEK, F., ZAJÍCEK, V., KRIZEK, P., MARESOVA, L. Economic, technical and environmental aspects of fuel additive EnviroxTM during trials with diesel engines. Proceedings of the IIIth WESSEX International Conference on Ravage of Planet 2011. Shah Alam, Malaysia. WIT Press, 2011, p. 340 - 352. ISBN 978-1-84564-528-1. [8] Ministerstvo obrany. Metodika pro činnost útvarů a zařízení, tribotechnická diagnostiky motorů a převodovek. Praha : Sekce logistiky, 2007. Č.j. 79-28/20073042. [9] SINGER, J. Protokol o zkoušce hodnocení technického stavu motorů vozidel LRD a T 815 v průběhu praktické zkoušky přísady ENVIROX v reálném provozu u VÚ 8660 Vyškov. Vyškov: VOP-026 Šternberk, s. p., divize VTÚPV Vyškov, 2010. Číslo protokolu 10/61/10/01,176. [10] KORECKI, Z., MAREŠ. J., CEMPÍREK, M. Fuel additive cuts the propellant consumption in car running. In The 18th International Conference The Knowledge-Based Organization. Sibiu, Romania, 2012, p. 85-91. ISSN 18438722. [11] KOMÁR, A., KŘÍŽEK, P., ZAJÍČEK V. and BOŽEK, F. Effect of Additive Envirox on the Emissions. In The 18th International Conference The KnowledgeBased Organization. Sibiu, Romania, 2012, p.78-84. ISSN 1843-8722. [1] 62 [12] KORECKI, Z., POMAZALOVÁ, N., MAREŠ, J. The aditive envirox test on an engine running condition, Brasov, 2011, ISSN: 1843-6722. [13] POMAZALOVÁ, N., KORECKI, Z., MAREŠ, J. Fuel Additive Experiment in the Area of Oil Stability and Quality. In MOSATT. Košice, 2011. ISBN1338-5232. [14] GAVENDOVÁ, H., MAREŠ, J., KORECKI, Z. Possibilities of Fuel Additives Usage for the military vehicle. In The 16th International Conference The Knowledge-Based Organization. Sibiu, Romania, 2010, ISSN 1843-682X. [15] POMAZALOVÁ, N., KORECKI, Z., MAREŠ, J. Fuel additiv as a tool to achieve saving expenditures. Revista academiei Fortelor terestre. Vol. XV, Nr4, Romania. ISSN 1582-6384 2010. 63 INFORMATION SUPPORT FOR THE COMMANDERS’ PLANNING AND DECISION-MAKING PROCESS AT COMMAND AND CONTROL TACTICAL LEVEL Jan Nohel Abstract: The objective of this article is to contribute to the discussion on the future development of the planning and decision-making process information support at the command and control tactical level. Information gathering, processing, analysis and distribution are parts of information support, through which the commander gains situational awareness on the battlefield. The understanding and complex situational awareness on the battlefield form a basis for effective manoeuvring. The article describes the requirements of manoeuvre unit commanders for the information about the situation in the area of task performance. It includes the analysis of possibilities for data acquisition, methods of processing and distribution of required information from the battalion commander and staff to unit commanders. Based on the analyses’ results the author devises methods of and approaches to the improvement and acceleration of the entire planning and decision-making process. Keywords: information support, planning and decision-making process 1. Introduction The asymmetric method for conducting combat operations, the ever-present civilian population and non-surveyable terrain in the area of military operations during the last few decades make effective employment of large tactical formations impossible. This concept has been replaced by the accurate employment of smaller units with increased mobility, increasing range and higher accuracy of their action. The importance of lower level commanders’ initiative at the tactical command and control level has been growing. The decisive factors of smaller units’ success are their accurate and well-timed employment, their sufficient and complex situational awareness in the area of operations, and their mobility and sustainability in the operation, including their own protection [1]. To understand the situation completely the unit 64 commander must consider significant environmental factors in the area of operation. Their understanding will help the commander to illustrate the entire situation display and will facilitate use of their strengths and weaknesses and to avoid gratuitous risks in performance of tasks. These factors are the following operational variables: Political situation - includes the distribution of power, government responsibility, structure and processes used for influencing the population by local authorities up to international organizations, the understanding of what motivates key groups to help the commander to achieve goals or the final state of an operation. Military situation – describes the effect of armed forces in the area of operation on friendly units’ performance of tasks and the relationship of these forces to the other situational factors. Economic situation – includes the behaviour of individuals as well as groups, with respect to production, distribution and consumption of resources (e.g. industry, trade development, finances, restrictions). Social situation – describes partnerships in the operational environment and their social structure which includes institutions, organizations, links and similar groups. Information environment – includes the complex of individuals, groups and systems which collect, process and disseminate information and act based on it. Infrastructure – includes the character of infrastructure, clarifies basic equipment and services necessary for the functioning of society. The environment – describes residences and built-up areas, climate and weather, topography, hydrology, natural resources, biological features and risks and other conditions. Temporal aspect – includes the analysis of methods for achieving a goal by the enemy (strategy of exhaustion, strategy of mass campaigns to achieve a goal in a short time). [2] Commanders obtain the information about operational variables in the phase of preparation for the performance of tasks in the operational area in the form of lectures, videos or publications. They study cultural and communication customs in the course of preparatory practical and complex exercises. 2. Battlefield Visualization In the course of preparation and planning for the performance of tasks every unit commander must also visualize situational factors which may affect the performance of tasks directly in a concrete restricted area and understand their cohesion. These are as follows: - Task: - Of his unit and his superior to clarify his role in the operation; - Restrictions for the independent performance of a task (e.g. rules for using a weapon or for achieving control points and coordination lines). - Enemy: - Strength, structure, position, technical data of armament and equipment, strengths and weaknesses, enemy’s combat action in the past, periodic and spatial attacks and expected concept of operations. - Terrain and weather: - Obstacles, defilades and possibilities of camouflaging, possibilities of observation and conduct of fire, key terrain and accesses to the area of operation, - Visibility, wind direction and wind force, temperature, rain precipitation, humidity, terrain trafficability, parameters of streams, - Terrain and weather effects and possibilities of their use by friendly as well as enemy forces. - Friendly forces and equipment: - Combat potential, morale, readiness and experience, strengths and weaknesses, technical data of weapons and vehicles, reinforcement assets, support manpower and equipment; - Tasks of adjacent units, their deployment, structure and equipment. - Available time: - For planning and preparation of a unit, for planning and preparation of subordinates and for preparedness check. 65 - Civil environment preconditions: - Demographic structure, organization, attitudes and opinions of civilian population, cultural and religious buildings and sights. [3] The commander should have at his disposal the information from all of these areas when starting preparation and planning. He should try to keep updating the information until the mission is accomplished. The decision-making and planning process and its information support are used for classification, processing and summarizing all of these information inputs, and subsequent creation and presentation of decisions. 3. Information Support Situational awareness and its real display help the commander to take qualified decisions when performing operational tasks. The available data applicable for creating these decisions are processed and take the form of information. The commander creates a situation display of the battlefield, based on which, and using his knowledge and experience, he takes a decision to accomplish a set goal through the information analysis. He uses communication and information support for the effective decision-making and planning process using the functions of communication and information systems. These include acquisition, collection, transfer, information processing, distribution, presentation and security of information.[4] 3.1 Information Support Process The information support process is a cyclical and continuing activity which can be divided into information about the terrain, weather, environment, task, situation of the enemy and friendly forces and equipment in the area of operations. The result of the entire process is the provision of timely, complex and updated data and information, the logical summarization 66 and presentation of which help to create a complex situation display on the battlefield. The faster and more clearly the commanders, staff and subordinate commanders have the updated situation display on the battlefield at their disposal, the faster they can understand the relationships of the whole situation. On this basis it is possible to plan further activities of friendly forces or deal with crisis situations more easily and quickly. 4. Planning and Decision-Making Process The planning and decision-making process can be described as a complex of logically arranged activities which facilitate the commander’s understanding of the situation on the battlefield, anticipate the future situation on the battlefield and apply the strategy to achieve objectives. It is a cyclic and continuous activity which does not end with the adoption of a decision. Achieving success or non-success in the operation depends on commander’s decisions which are affected by the information about many constantly changing factors of the situation on the battlefield. When planning a manoeuvre every commander has to acquire, process and analyze all available information from all areas of the battlefield with the aim of obtaining current and complex situational awareness in the area of task performance. When he understands all the relationships he is able to plan and conduct future activities. The result of the whole process is issuing a time- and space-synchronized operation plan or order which describes the performance of tasks by the subordinated manpower and equipment. In the course of preparation, the operation order is updated and modified continuously depending on the development of the situation on the battlefield. 4.1 Planning and Decision-Making Process of the Commander and Staff and its Information Support The planning and decision-making process of the staff is an interconnected methodology of commander’s, staff’s and subordinated units’ activities aimed at situation and task understanding and creating the best variant of the task accomplishment. The whole process consists of seven steps as follows: [5] 4.1.1 Step 1 – Receipt of a mission: The whole process starts with the receipt of OPLAN (Operation Plan) or OPORD (Operation Order), FRAGO (Fragmentary Order) or WARNO (Warning Order) from the superior. The aim of this step is to warn the participants in the planning process of the requirements for planning, to determine the time available for the preparation and planning, and to issue instructions for the method of planning. In conclusion, the staff will issue the Warning Order No.1, in which it makes subordinated commanders acquainted with the basic information about the task. 4.1.2 Step 2 – Mission analysis This includes the analysis of the superior’s plan and intents, intelligence preparation of the battlefield, determination of specific and significant tasks resulting from the superior’s plan, identification of insufficient information sources, determination of restrictions, identification of critical facts and criteria of predictions, risk management, creation of primary CCIR (Commander’s Critical Information Requirements) and EEFI (Essential Elements of Friendly Information), creation of the primary plan for information collection, creation of mission formulation, creation and issue of the initial commander’s intent, issue of instructions for planning, creation of the criteria for evaluating activity variants and issue of preliminary combat instruction. Intelligence Preparation of the Battlefield (IPB): The IPB is one of the most important parts of the mission analysis. It consists of four parts as follows: a) Defining the battlefield environment At the beginning of the IPB the information which the commander needs to know about the area of the future operation is determined. The environment characteristics which may affect the activities of the friendly forces and the enemy are defined. These may be e.g. the terrain, weather, infrastructure, political and economic-social factors, demographic structure of the population, groupings of the enemy and his capabilities. The following means are used for the basic analysis and description of the environment: SOUMOP, ARCGIS, the OperationTactical System of the Ground Forces, GLOBAL MAPPER, TERRA STUDIO, printed maps, photographs from the area, meteorological satellites, the Staff Information Network, CIA internet sites, CENTRIX, reports from the superior. b) Description of Battlefield Effects In this part of the IPB the effects of the battlefield which both parties of the operation will have to take into their consideration are analyzed. The staff intelligence groups identify restrictions or advantages, based on which the activity variants of friendly units will be created. It comprises the analysis of the battlefield environment which includes the following: - Terrain analysis - Includes the appraisal of obstacles, covers and defilades, observation possibilities and conduct of fire, key areas and feasible accesses to the area of interest. - SOUMOP, ARCGIS, the Operation-Tactical System of the 67 Ground Forces, GLOBAL MAPPER, TERRA STUDIO, printed maps and photographs from the area of operations are used for elaboration. - Weather analysis - Includes the evaluation of visibility, wind direction and wind force, precipitation, cloudiness, temperature, humidity and their effects on the terrain, personnel and equipment. - The OBLAK meteorological station, meteorological satellites and the Staff Information Network are used for elaboration. - Analysis of other characteristics - Includes the analyses of infrastructure, demographic, economic and political situations and the effect of other battlefield characteristics on military operations. - Personnel databases, CIA internet websites, CENTRIX, reports from the superior, ARCGIS, SOUMOP, the OperationTactical System of the Ground Forces, GLOBAL MAPPER, TERRA STUDIO and printed maps are used for elaboration. c) Threat assessment In this part the information from the superior, adjacent units or antecedent contingents concerning the organization and method of conducting combat action by the enemy’s manpower and equipment are analyzed. Based on the obtained information and records on the enemy’s activities in the past, the estimate of his activities in the future is created – the threat model. Creation of the threat model includes: - Creation of the plot of the enemy forces’ doctrine activities in the environment without any restriction; - Graphic presentation and description of expected manoeuvre of the enemy’s manpower and equipment; 68 - Determination of high-priority goal types. The identification of threat capabilities follows: - Based on the knowledge of the organizational structure, tactical doctrine and expected manoeuvre, the capabilities and possibilities of the enemy’s manpower and equipment in the area of operations are determined. d) Determination of threat activity variants At the end of the IPB the results of previous parts are integrated into meaningful conclusions. The tactical standard operation procedures of the enemy and the effects of the environment where he operates are summarized. Consequently, the models of the enemy’s expected activities in the operation area are created. The next output of this step is the plan of information gathering aimed at the identification of a concrete activity variant of the enemy. [6] The output products of the task analysis are: initial commander’s intent, initial Commander’s Critical Information Requirements (CCIR) and Essential Elements of Friendly Information (EEFI), initial commander’s instruction for planning, IPB product updating, running estimate and precondition updating, identification of IPB information gaps, updating of the operation time schedule and evaluation criteria of activity variants. The commander determines his CCIR only for particularly important information relating to basic decisions which he assumes he will take. Through them the commander retains his situational awareness on the battlefield. The CCIR provide the commander with support for the evaluation of effects and visions of the situation, modification of the command and control structure and timely and competent decision-making. The CCIR are constantly updated and reevaluated to reflect the changing situation on the battlefield and the commander’s intents. [7] All staff members participate in developing the task analysis according to the areas of their competences. The outputs are developed in the form of surveys, tables, overlays, the OperationTactical System of the Ground Forces levels or PowerPoint presentations. At the end of the task analysis, the staff distributes the Warning Order No.2 to unit commanders using radio, data transmission or courier. 4.1.3 Step 3 – Creation of activity variants: In this step tailor-made teams of staff members will create the activity variants of task accomplishment based on the determined task, initial commander’s instructions, and task analysis outputs. Each activity variant must comply with the following criteria; should be executable, acceptable, suitable, recognizable and complete. 4.1.4 Step 4 – Analysis of activity variants: In this step the simulation of proposed activity variants of friendly manpower and equipment with the expected reaction of the enemy will be carried out. It enables the commander and staff the identification of complications and coordination problems which may be the same for all activity variants. 4.1.5 Step 5 – Comparison of activity variants: In this step variants are evaluated independently of one another based on the determined criteria. The objective is to identify the strengths and weaknesses of activity variants and to find the one which will probably be successful in the task accomplishment. 4.1.6 Step 6 – Variant approval: Based on the comparison of results of evaluated activity variants, the most optimum variant for the accomplishment of the assigned task will be selected and completed and the commander will modify his intent. The staff will issue Preliminary Combat Instruction No.3 for units. 4.1.7 Step 7 – Issue of operation plan: The staff will work out a selected variant and create a brief concept of operation. Then, based on STANAG 2014, the operation order or plan is issued and sent to subordinate commanders. Thus, the subordinate commanders will obtain basic data about the situation, task, operational concept, commander’s intent, method of manoeuvring, main effort, determination of tasks for units, provision of support and protection, and command and communications. [8] 4.2 Planning and decision-making process of the company commander, subordinate commanders and information support. This is used for issuing orders of company commanders. It is formed by a set of preparatory and planning activities for the task accomplishment. It consists of eight steps: [9] 4.2.1 Step 1 – Receiving a task: The planning is initiated by receiving the Warning Order (WARNO), Operation Order (OPORD) or Fragmentary Order (FRAGO) from the superior for performing a task. A new task may also arise due to a sudden change of the situation on the battlefield during the performance of the original task. After receiving a new task the commander will carry out the primary estimate of the situation (task, enemy, friendly unit, terrain, available time, civil environment) on the basis of a received directive or order. Consequently, he will carry out the time calculation for the preparation and planning of the task up to its accomplishment. 4.2.2 Step 2 – Issue of Warning Order: The Warning Order is less detailed than the received WARNO or OPORD. In this case the commander makes his subordinates acquainted with the primary 69 estimate of the situation and time calculation. He allows his subordinates to initiate the preparation and the planning and decision-making process for the new task. 4.2.3 Step 3 – Creation of an initial plan: After the issue of the preliminary combat instruction the commander will develop a similar, but less detailed decisionmaking process than the battalion commander and staff. It is a continuous process which is repeated always after receiving new information from the superior or due to discovering new facts in performance of tasks. When creating an initial operation plan of a unit the commander takes advantage of the information acquired from WARNO, OPORD or OPLAN from the superior, from available geographic materials and photographs. He obtains additional updated information from the intelligence group/superior’s department. This includes the task analysis, creation, analysis and comparison of activity variants and the selection of an activity variant. Task analysis includes the analysis of the unit task, enemy, terrain and weather, friendly unit, available time and civil preconditions. Unit task analysis Based on the superior’s plan or order, the commander makes clear the share of his unit in the task performance. The unit task analysis includes the following: - The superior’s task and intent; - The superior’s concept of operation; - Specific and significant tasks; - Restrictions. Analysis of the enemy This part of the analysis contains the organizational structure, deployment, strength and capabilities, recent operations, reinforcement capabilities and the expected activity variant of the enemy forces depending on actual 70 situation. In the terrain and weather analysis the following items are assessed: - Obstacles for performing manoeuvre, movement, using weapons, equipment and personnel; - Defilades and covers for camouflaging the movement of friendly as well as enemy forces; - Possibilities for observation and conduct of fire of friendly as well as enemy weapons; - Key terrain (area), the occupation of which will affect the task accomplishment; - Accesses to the key terrain of objective area; - Weather effects on the activity of personnel, equipment and weapons: visibility, wind, precipitation, cloudiness, temperature and humidity. Analysis of a friendly unit and reinforcement assets includes: - Combat potential, morale, unit readiness, experience, strengths and weaknesses of subordinate commanders; - Determination of available sources; - Direct support units, their strength, equipment and condition of weapons. Analysis of available time includes: - Clarification of how much available time is at disposal for the preparation, movement, conduct of combat operations and sustainability in the operation area; - Assessment of events which may occur and how they will affect the time schedule. Analysis of civil preconditions: - Includes the area, infrastructure, capabilities, organization, people and their leaders, events; - Is carried out based on the information of the superior, his knowledge and estimates. Creation of unit activity variants The results of task analysis will provide the commander with general situational awareness in the area of task performance, on the basis of which he will create activity variants for the task accomplishment. Within this step the commander will carry out the analysis of combat power of friendly as well as enemy forces. Its reason is to determine whether the unit has enough combat power to defeat the enemy. Consequently, unit commanders will propose, in the form of brainstorming, variants for the task accomplishment. For each activity variant they will develop a tactical plot in the map and a written description of manoeuvre. Using the war-gaming method the commander will simulate planned actions of friendly forces, expected reactions of the enemy and possible counteractions. Consequently, the commander will compare each variant with the enemy’s most probable activity variant and evaluate its strengths and weaknesses, advantages and disadvantages. Based on this evaluation and his own judgement, he will select which activity variant will be carried out. 4.2.4 Step 4 – Initial unit movement: After the initial creation of the operation plan the commander and his unit will carry out the required movement which is necessary for the preparation and occupation of the starting position for the task performance. This may include the movement to the area of task performance, the occupation of the line of attack departure, the occupation of a defence position and the employment of reconnaissance elements. 4.2.5 Step 5 - Reconnoitring: If the conditions allow, the commander will reconnoitre the operation area through his own or his subordinates’ observation. The current information so acquired will complete his entire situational awareness in the area which he obtains from the products of the intelligence preparation of the battlefield. He will gain the additional information he needs to know for the task accomplishment through the task analysis and during war-gaming. He will also pass his requirements for information to his superior who will include them in his reconnaissance plan. 4.2.6 Step 6 – Plan completion: In this step the commander will include the results of his own reconnaissance in the selected activity variant and will complete the whole operation plan. If time allows, he will coordinate activities with adjacent units. 4.2.7 Step 7 – Issue of operation order: Commanders of smaller units issue the operation order orally and use graphics or other checking means. An ideal point for issuing an operation order is in the operation area with a view of task target and other terrain aspects. For security reasons or due to other restrictions it is also possible to issue the operation order using a terrain model, detailed scheme, map or other aids describing the operation area and situation. 4.2.8 Step 8 – Plan control and improvement: In the end of the planning process the commanders supervise, check and evaluate the unit preparation, improve the operation plan, coordinate the activities with adjacent units and check unit members and equipment. Drill of activities is also a part of the preparation for task performance. It identifies the areas which require more control and rehearsal. It is carried out through inquiry and testing the unit manoeuvre. 5. Common operational picture of the situation on the battlefield The basis for creating the plan and commander’s decision is his complex situational awareness in the operation area. For its creation he uses the whole process of information support. It may be 71 in the form of the tactical situation plot on a printed map or its display on the map photograph in a portable computer. The commander obtains the information for its creation in the form of reports, directives, orders or data from his superior or through his own observation and reconnaissance. The basis is formed by the outputs from the task analysis battlefield visualization. The situation display in the operation area includes the following: - Boundaries or zones of task performance in the operation area; - Character of the terrain, weather forecast and their effects on the activities of friendly and enemy forces; - Enemy situation, deployment of his manpower and equipment and expected concept of operations; - Friendly forces situation: - Tasks, condition and current deployment of friendly unit’s manpower and equipment; - Tasks, condition and current deployment of adjacent units’ manpower and equipment; - Tasks, condition and deployment of manpower and equipment of combat and logistic support; - Situation of civil preconditions: - Location of people’s residences, their situation plans and facilities; - Nationality composition of the population, their organization, leaders, events infrastructure, cultural buildings and sights. Every commander, combat means or individual must have access to newly acquired information from the superior as well as adjacent units and share it. In the same way they also must share the data about their location, weapon and ammunition stocks and combat readiness for which the BLUE FORCE TRACKER system is used. All commanders will acquire a unified view 72 of the deployment and stocks of friendly manpower and equipment on the battlefield through the mutual automated information flow concerning friendly manpower and equipment. Due to that they can cooperate and coordinate their activities more effectively and restrict the losses caused by the activities of friendly manpower and equipment. The key element of the commander’s planning and decision-making process is information exchange and interoperability of the entire command and control system. The data service is a means for supporting necessary information flow. It must enable effective time and space interconnection of data resulting from reconnaissance, observation, target acquisition and intelligence activities and provide flexible and effective information transfer to all command and control elements. [10] 6. Conclusion The collection of input data is carried out using many different sources. Their analysis and processing into the form of information is performed by the analysts who derive their conclusions and estimates based on their knowledge and experience. The commander distributes the processed and summarized information to his subordinates based on their tasks, operation area, possibilities and capabilities. The unit commander includes these facts in his decisionmaking process. In case of a changed and updated situation in the operation area he will modify his unit manoeuvre. Thus people are irreplaceable in providing information support in the decision-making process. The total time between the receipt of a task and its execution may be extended depending on the quantity, character and complexity of input data and information from different sources. Many analytical operations and estimates can be converted into program algorithms using up-to-date computer technology and programming. After entering the input data, task and criteria, set e.g. based on possibilities and capabilities of a certain unit, the computer program will generate the variants of task accomplishment automatically. At the end of the whole process the commander will select only the activity variant which is the most acceptable for him. The total time for performing the planning and decisionmaking process is reduced considerably, which can be used especially in coping with crisis situations. Through the use of the algorithms set appropriately, the errors caused by the human factor, as well as personnel requirements for developing the decision, are also minimized. References DOKTRÍNA ARMÁDY ČESKÉ REPUBLIKY, 2. vydání, Vyškov: Správa doktrín ŘeVD, 2010, 9 s [2] FM 3-0 OPERATIONS,Washington: Headquarters Department of the Army,2011, PIN:079091-000, 1-5, 5-3 s. [3] FM 5-0 THE OPERATIONS PROCESS, Washington: Headquarters Department of the Army, 2010, PIN: 082115-000, C-5-7 s. [4] AD – 6.1 KOMUNIKAČNÍ A INFORMAČNÍ SYSTÉMY, Praha: Sekce velení a řízení MO, 2003, Č.j.: 407/26/2003-4009, 4s. [5] FM 5-0 THE OPERATIONS PROCESS, Washington: Headquarters department of the army, 2010, distribuční číslo: 110412, B-2 – B-37 s. [6] FM 34-130 INTELLIGENCE PREPARATION ON THE BATTLEFIELD, Washington: Headquarters Department of the Army, 1994, 528-027/80138, 2-1 2-52 s. [7] DOKTRÍNA AČR V MNOHONÁRODNÍCH OPERACÍCH, 1. vydání, Vyškov: Správa doktrín ŘeVD, 2008, 93 s. [8] ŠTÁBNÍ PRÁCE V OPERACÍCH, 2. část, Pub-53-01-3, Vyškov: Správa doktrín Ředitelství výcviku a doktrín, 2008, 227 s. [9] FM 5-0 THE OPERATIONS PROCESS, Washington: Headquarters department of the army, 2010, distribuční číslo: 110412, C-1 - C-10 s. [10] VELENÍ A ŘÍZENÍ V OPERACÍCH, Pub-53-01-1, Vyškov: Správa doktrín Ředitelství výcviku a doktrín, 2006, 167 s. [1] 73 AN ANALYSIS OF THE IMPACT OF INSTITUTIONAL ENVIRONMENT ON TERRORISM RISK Jakub Odehnal, Marek Sedlačík and Jaroslav Michálek Abstract: The article presents the performance of a logit analysis to classify 141 countries on the basis of the relation between the institutional environment in the analysed countries and terrorism risk. By comparing the original classification made on the basis of terrorism risk measured by means of the Terrorism Risk Index with the results of an alternative classification created by means of data characterizing the institutional environment, deviations of both classifications will be calculated, analysed in the text and described with respect to terrorist attacks actually carried out in 2010, i.e. the year subject to the analysis. Keywords: risk of terrorism, terrorism risk index, governance matters, multivariate statistical techniques, logit analysis 1. Introduction The analysis of the impact of terrorism on the development of countries represents a significant area of theoretical and empirical research of the state’s defence economy. According to [14], the term “terrorism” is derived from Latin and can be translated and construed as “to threaten, to intimidate”. Under another definition, terrorism is a method of bringing terror through repeated acts of violence committed by secret or semi-secret individuals, groups or government bodies for idiosyncratic, criminal or political reasons where, in contrast to assassinations, the immediate victims are not the real target of the terror [15]. Similarly, according to [6] terrorism can be explained as the premediated use or threat to use violence by individuals or sub-national groups in order to attain a political or social objective through the intimidation of a large audience beyond that of the immediate victims. It is possible to choose from a diverse range of 74 definitions, and it is equally possible to apply alternative approaches to the classification of terrorism. According to [14], who primarily takes into consideration the geographical perspective, terrorism can be classified into domestic, cross-border, international or global. Similarly, according to [6], it is possible to reveal two basic differences in the perception of terrorism definitions, i.e. the difference between transnational terrorism and domestic terrorism. Terrorism is transnational when an incident happening in one country involves perpetrators, victims, institutions, governments or citizens of another country. Domestic terrorism is home-grown and has consequences for just the host country, its institutions, citizens, property and policies. In domestic incidents, the perpetrators, victims and audience are all from the host country. Also, terrorism can be classified according to motives, into politically or ideologically motivated terrorism, criminal terrorism and psychotic terrorism. The above definitions and possible classifications of terrorism clearly show that the objectives of all terrorist acts of various terrorist groups can differ based on their motives. According to [10] it is possible to distinguish three general objectives of terrorism: a) advertisement which attracts the attention of the public to the existence or programme of the given terrorist organization, b) one-time acts performed by having destroyed the selected building or killed the persons, or c) strategic aim when terrorism is perceived as an instrument for destabilizing the political regime. Many current economic and econometric studies focus on the actual impacts of terrorist attacks on the economies of affected countries and regions. E.g. [11] studied the interdependence between the number of hijacks and selected variables such as the probability of capture or conviction and the average term of imprisonment with the aim of identifying the behaviour pattern of terrorist groups in aircraft hijacking. Many articles examining the economic consequences of terrorist acts focus primarily on the impacts of terrorist acts on economic growth [4], [1], [17], investments [4], trade and tourist industry [13], [5]. In general, the economic impacts of terrorist attacks can be classified into macroeconomic and microeconomic impacts. The articles of [9] or [3], [12] examine hypotheses on the causes of terrorist attacks in countries differing in e.g. the economic position, system of government, form of government or predominant religion. The authors [9] attempt to prove the existence of a link between real economic and institutional variables characterizing the economies of selected countries and possible risk of CBRN attacks (risk of chemical, biological, radiological and nuclear terrorism). The empirical hypotheses constructed in the above manner should prove the existence of links between the risks of CBRN attacks and the economic standing, quality of democracy and law or corruption. The interconnectedness between the frequency of terrorist attacks and political stability in individual countries is analysed in papers by e.g. [3], [12]. The authors have proved that political instability in analysed countries (caused among other things by the risk of terrorist attacks) has an adverse effect on economic growth and the level of investment in individual countries. According to [1], it is possible to distinguish 4 main impacts of terrorist attacks on the economies of affected countries: a) capital reduction (real, human), b) increased insecurity c) increased counter-terrorism expenses that cannot be used in the civilian sector, d) reduction of the affected sectors of the economy. The purpose of the article is to create the classification of countries on the basis of variables characterizing the governance matters of selected countries and terrorism risks. The authors are to survey the theoretically defined links between terrorism risk and voice and accountability or control of corruption published in [9] by means of a logit analysis. Data describing the level of terrorism risk and the institutional quality in selected 141 countries characterize these countries for the needs of this article in the monitored year 2010. 2. Definitions, Datasets, and Variables To establish the link between the level of risk of terrorist attacks and selected institutional characteristics theoretically described in [3], [12], [9], the authors have obtained selected data from the Governance Matters and Terrorism Risk Index databases. To analyse institutional characteristics of selected countries, the World Bank project has been used for evaluating and comparing the quality of 75 administration (Governance Matters) by means of six variables. The first variable officially designated as Voice and Accountability (VA) assesses the quality of administration in compliance with the evaluation of the level of political, civil and human rights in individual countries. The second variable, Political Stability and Violence (PSNV), assesses the probability that violence takes place in the given country or the level of political instability in the country. Government Effectiveness (GE), i.e. the third variable, comprises the public service quality assessment, the level of bureaucracy and reliability of the government in the given country. The next variable Regulatory Quality (RQ) assesses the regulatory burden of the country, and Rule of Law (RL) or the legal order quality, and comprises the assessment of public trust in social norms and the level of conformity to them. The last variable monitored within the Governance Matters research project is Control of Corruption (CC) variable describing the level of corruption in individual countries. The above variables can range from −2.5 to 2.5 on the scale where the higher value of the variable is interpreted as lower occurrence of the negative aspect of the given variable. To assess the level of terrorism risk, the authors have examined data from the Terrorism Risk Index classifying countries into 4 groups (extreme risk − ER, high risk − HR, medium risk − MR, low risk− LR). Out of a total of 141 countries subjected to the analysis, 16 countries have been assessed, pursuant to the Terrorism Risk Index, as extreme terrorism risk countries, 10 as high terrorism risk countries, 24 as medium risk countries, and 91 as low terrorism risk countries. A detailed list of the countries, including their classification, is given in Table 1. The purpose of this article is to analyse the link between regulatory quality of selected economies and terrorism risk and to find out to what extent it is possible to classify terrorism risk according to the six variables. Hypotheses published in [9] predict higher terrorism risk in countries with a lower level of political stability, lower quantified quality of democracy and a higher level of corruption. The quantified characteristics of regulatory quality and their link with terrorism risk measured by means of the classification of countries into resulting groups are given together with their basic descriptive characteristics (local extremes, median, lower and upper quartiles) in Figure 1. A more detailed comparison of the values determined for countries differing in the level of terrorism risk shows that the highest median levels are characteristic for groups assessed as low risk countries (the median levels are as follows: Voice and Accountability (VA) 0.31, Political Stability and Violence (PSNV) 0.27, Government Effectiveness (GE) 0.14, Regulatory Quality (RQ) 0.30, Rule of Law (RL) 0.10 and Control of Corruption (CC) 0.05. Table 1 Classification of countries on the basis of the Terrorism Risk Index Source:[18] Extreme Risk: AFGHANISTAN, CENTRAL AFRICAN REPUBLIC, COLOMBIA, CONGO, INDIA, IRAQ, ISRAEL, LAOS, PAKISTAN, PHILIPPINES, RUSSIA, SOMALIA, SUDAN, THAILAND, UGANDA, YEMEN. High Risk: AFGHANISTAN, CENTRAL AFRICAN REPUBLIC, COLOMBIA, CONGO, INDIA, IRAQ, ISRAEL, LAOS, PAKISTAN, PHILIPPINES, RUSSIA, SOMALIA, SUDAN, THAILAND, UGANDA, YEMEN. Medium Risk: GREECE, IRAN, KENYA, MYANMAR, NEPAL, NIGERIA, SENEGAL, SPAIN, TANZANIA, TURKEY. 76 Low Risk: ALBANIA, ANDORRA, ARGENTINA, ARMENIA, AUSTRALIA, AUSTRIA, AZERBAIJAN, BAHAMAS, BAHRAIN, BELARUS, BELGIUM, BOLIVIA, BOSNIA-HERZEGOVINA, BOTSWANA, BRAZIL, BULGARIA, BURKINA FASO, CAMBODIA, CAMEROON, CANADA, CHINA, COSTA RICA, CROATIA, CUBA, CYPRUS, CZECH REPUBLIC, DENMARK, DOMINICAN REPUBLIC, ERITREA, ESTONIA, FINLAND, GERMANY, GHANA, GUINEA, GUYANA, HAITI, HUNGARY, ICELAND, IRELAND, ITALY, JAMAICA, JAPAN, JORDAN, KAZAKHSTAN, KOREA, NORTH, KOREA, SOUTH, KOSOVO, KUWAIT, KYRGYZSTAN, LATVIA, LIBERIA, LIBYA, LIECHTENSTEIN, LITHUANIA, LUXEMBOURG, MACEDONIA, MADAGASCAR, MALAYSIA, MALTA, MEXICO, MONGOLIA, MOROCCO, MOZAMBIQUE, NAMIBIA, NETHERLANDS, NEW ZEALAND, NICARAGUA, NORWAY, OMAN, PANAMA, POLAND, PORTUGAL, QATAR, ROMANIA, SIERRA LEONE, SLOVAKIA, SLOVENIA, SOUTH AFRICA, SURINAME, SWEDEN, SWITZERLAND, TAJIKISTAN, TUNISIA, TURKMENISTAN, UKRAINE, UNITED ARAB EMIRATES, URUGUAY, UZBEKISTAN, VIETNAM, ZAMBIA, ZIMBABWE. Figure 1: Box & Whisker Plots Source: The graphs were drawn by the authors The biggest differences between the low risk countries group and the extreme risk countries group are apparent for the variables Voice and Accountability (VA) (median LR 0.3 and median ER −0.83), Political Stability and Violence (PSNV) (0.27 vs. −1.52) and Control of Corruption (CC) (0.05 vs. −1.07). The results of descriptive statistics indicate that the median values of the variables Voice and Accountability (VA), Political Stability and Violence 77 (PSNV), and Control of Corruption (CC) are lowest for countries classified according to the Terrorism Risk Index into the high terrorist risk group. The results of descriptive statistics are further specified by adding the classification of individual countries into groups by means of a logit analysis. It is an advantage of this classification in comparison with the results of descriptive statistics that it is a multivariate statistical technique so that it is possible to take into consideration simultaneously all six variables when making the classification of a given country. The logit analysis also makes it possible to take into account the statistical links between individual institutional characteristics and last but not least the logit analysis allows us to determine the probability of classification of individual countries into each of the risk groups: extreme risk (ER), high risk (HR), medium risk (MR), and low risk (LR). In the event that the probabilities of classification into individual groups are very close, the probabilities determined in the above manner enable us to arrive at the conclusion that even though the classification into the given group is the most probable, the classification into another group can be highly probable too. It means that it will not be possible to classify some countries into a given risk group unequivocally on the basis of the institutional characteristics with regard to the probability of classification (even though the highest) for this group. This fact is an advantage of the classification because the actual classification of the selected country into a given risk category does not necessarily have to be unambiguous on the basis of six selected institutional characteristics only. The logit analysis principle lies in the fact that the probability p j that the given country with the values of institutional characteristics VA, PSNV, GE, RQ, RC belongs to the risk category j , j = LR, MR, HR and ER is modelled as a logistic function of linear combination of these institutional characteristics VA, PSNV, GE, RQ, RC, CC and unknown parameters. The model is described by the equation: p j = p j (VA, PSNV, GE, RQ, RC, CC ) = = exp{β j 0 + β j1 ⋅ VA + β j 2 ⋅ PSNV + β j 3 ⋅ GE + β j 4 ⋅ RQ + β j 5 ⋅ RC + β j 6 ⋅ CC} 4 ∑ exp{β i =1 i0 + β i1 ⋅ VA + β i 2 ⋅ PSNV + β i 3 ⋅ GE + β i 4 ⋅ RQ + β i 5 ⋅ RC + β i 6 ⋅ CC} The unknown parameters β jk are to be determined by means of the maximum likelihood method (see [6]). The outcomes of the logit analysis are discussed in the below paragraph. The comparison of the classification results performed on the basis of the Terrorism Risk Index with the classification results made by means of the logit analysis based on the six institutional variables make it possible to analyse the deviations between both original classifications, i.e. between the 78 . original classification and the classification by means of the logit analysis and to interpret the deviations with regard to individual variables observed. 3. Results Table 2 shows the logit analysis results demonstrating the brief comparison of classifications in the case when we restricted the classification of risk and low risk countries to the basic classification, i.e. we pooled the ER and HR categories and MR and LR categories. This comparison reveals that the classification of countries based on the Terrorism Risk Index and on the analysis of accompanying variables characterizing the institutional quality of the countries performed by means of the logit function shows 89.36 % of countries classified in the same way in contrast to the original classification. Different classification concerns 10 countries (Central African Republic, Congo, Kenya, Laos, Nepal, Russia, Senegal, Spain, Tanzania, Turkey) that have been classified into the MR or LR category in comparison with the original classification ER or HR, and similarly 5 countries (Bangladesh, Egypt, Ethiopia, Guinea, Syria) have been classified into the ER or HR category, where original classification was MR or LR. In contrast to the original classification of countries into four categories, the below countries have been classified with a high degree of probability (more than 0.75) into different terrorist risk groups on the basis of the logit analysis: Angola, Chile, Ecuador, France, Honduras, Rwanda, Singapore, Congo, Laos and Tanzania – see Table 3. Out of these countries the first seven (Angola, Chile, Ecuador, France, Honduras, Rwanda, and Singapore) have been classified into the low terrorist risk category (in the original classification pursuant to the Terrorism Risk Index they were in the medium risk category). Out of a total 4640 terrorist acts recorded under the Global Terrorism Database, 16 acts (0.34 %) which claimed 10 lives were committed in these differently classified countries. From the point of view of institutional characteristics which have indicated the largest differences between the low risk and extreme risk countries (Voice and Accountability (VA), Political Stability and Violence (PSNV) a Control of Corruption (CC)), we can see that Chile (1.04) and France (1.22) only achieve higher values of the Voice and Accountability (VA) variable than the median value. As to the Political Stability and Violence (PSNV) variable, we can see that all these countries demonstrate higher than median values. As regards the Control of Corruption (CC) variable, Chile (1.50), France (1.39), Rwanda (0.48) and Singapore (2.18) demonstrate higher values than the median. Table 2 Logit classification Source: The table was created by the authors ER or HR Predicted ER or HR 16 Predicted MR or LR 10 MR or LR 5 110 Observed 79 Table 3 Misclassification result of logit analysis Source: The table was created by the authors Classification under Terrorism Risk Index Logit Classification Prob 1 Prob 2 Prob 3 Prob 4 MR MR ER MR MR MR ER MR MR HR LR LR LR LR LR LR LR LR LR LR 0.005214 0.000045 0.003138 0.004805 0.000184 0.027777 0.007926 0.000022 0.000001 0.001359 0.014075 0.009658 0.027611 0.059118 0.029200 0.037408 0.019611 0.001263 0.000144 0.023945 0.068925 0.165087 0.096952 0.105118 0.172242 0.171113 0.149703 0.155498 0.073539 0.086153 0.911786 0.825210 0.872299 0.830959 0.798374 0.763701 0.822761 0.843218 0.926316 0.888543 ANGOLA CHILE CONGO ECUADOR FRANCE HONDURAS LAOS RWANDA SINGAPORE TANZANIA The logit analysis results classify the remaining countries (Congo, Laos, and Tanzania) into the low risk category, which is in sharp contrast to their original classification into the extreme risk group (Congo, Laos) and high risk group (Tanzania). The Global Terrorism Database shows that in total, 15 terrorist acts were committed in these three countries in 2010 which, however, claimed 99 lives. In comparison with the other falsely classified countries, the enormous death toll was due to 5 terrorist attacks only (for more details see Table 4 carried out in Congo in 2010. Table 4 Terrorist acts Source:[8] Incident Summary: 09/01/2010: On Wednesday morning at about 1000, in the village of Kilambo near an unspecified city in North Kivu, Congo (Kinshasa), unidentified armed militants attacked one plane at a runway by unknown means and took hostage one Ukrainian and one Congolese pilot. Two soldiers and one civilian were killed and the plane was damaged in the attack. Congolese government troops, responding to the attack, killed two militants. The hostages were released on 09/24/2010. No damage was reported and no group claimed responsibility, but the militant group Mai Mai was thought to be responsible for the attack. 08/18/2010: On Wednesday morning, in the village of Kirumba near Mabenga, Nord-Kivu, Congo (Kinshasa), around 50 unidentified assailants attacked a United Nations Mission in the Democratic Republic of Congo (MONUSCO) base, killing three Indian MONUSCO peacekeepers and injuring seven others with machetes and knives. No damage was reported and no group claimed responsibility for the attack, although two suspects, identified as Justin Kambare and Tembea Mumbere, have been arrested in connection with the attack. 06/28/2010: On Monday morning, in the village of Mutwanga, North Kivu, Congo (Kinshasa), unknown assailants attacked by unknown means and looted the entire town, killing 16 civilians, kidnapping a security guard, burning and damaging a house and the vehicle of a local chief. The assailants were targeting Edwardo Nyamwisi, the brother of Congo minister Mbusa Nyamwisi. Nyamwisi was able to escape unhurt. No group claimed responsibility, but the militant group Allied Democratic Forces (ADF) were thought to be responsible for the attack. The status of the hostage is unknown. 80 Fatalities 5 3 16 03/27/2010: On Saturday, in Kiruhura near Rutshuru, Nord-Kivu, Congo (Kinshasa), unidentified militants attacked and looted the village by unknown means. This incident was one of two linked attacks that also targeted the village of Burahi. It is unknown if the attack caused any property damage. The casualties for the attacks were listed cumulatively as one civilian killed; two soldiers and one person wounded. No group claimed responsibility for the attack but the Democratic Forces for the Liberation of Rwanda (FDLR) are suspected. 02/02/2010: On Tuesday, in the village of Kpanga near the Niangara, Orientale, Congo (Kinshasa), assailants burned homes, attacked and killed at least 74 civilians by unknown means and kidnapped an unknown amount of civilians. No group has claimed responsibility for the attack, but the group Lord's Resistance Army (LRA) is thought to be responsible for the attack. The status of the hostages is unknown. The reasons for classifying Congo, Laos and Tanzania into the low terrorist risk group on the basis of the logit analysis are apparent from Figure 2 showing median values of low and extreme risk countries. This figure shows high values of the Political Stability and Violence (PSNV) variable for all these differently classified countries Congo (−0.24), Laos (−0.22), Tanzania (−0.008). The high value of this indicator in comparison with the remaining countries classified pursuant to the Terrorism Risk Index indicates a higher level of political stability of these countries. A more detailed analysis of this variable reveals that according to [7], Political Stability and Violence (PSNV) indicates the probability of the government 1 75 destabilization or overthrow including terrorist threat which is the main focus of the classification pursuant to the Terrorism Risk Index. Institutional characteristics as an indicator of terrorism risk cannot be perceived as their general prerequisite and it is possible that the quantified variables of selected institutional characteristics and their structures concerning selected countries can lead to different classifications in comparison with the original classification reflecting terrorism risk without the influence of the institutional environment of the given countries. All calculations were processed by Statistica software and application STAT1 (see [16]). Figure 2: Scatterplot Source: The graph was created by the authors 81 4. Conclusions Terrorism can be considered one of the greatest security threats at the beginning of the 21st century. It is therefore not surprising that the majority of developed countries invest considerable sums of money in counter-terrorism efforts which accelerated especially after the attacks in 2001. The term terrorism can be explained as the premediated use or threat to use violence by individuals or subnational groups in order to attain a political or social objective through the intimidation of a large audience beyond that of the immediate victims. Terrorism risk is different in different countries and its probability can be affected by various motives of terrorist attacks, such as political, religious or ideological motives. This article analyses the influence of institutional variables on terrorism risk in selected 141 countries. To assess the level of terrorism risk in the countries subject to the analysis in 2010, we have used the Terrorism Risk Index data classifying the 141 countries into 4 groups (extreme risk, high risk, medium risk, low risk). Out of the total 141 analysed countries 16 countries have been assessed as extreme terrorism risk countries, 10 as high terrorism risk countries, 24 as medium risk countries, and 91 as low terrorism risk countries on the basis of the Terrorism Risk Index. To assess the institutional characteristics of the selected countries, we have used data from the Governance Matters characterizing the institutional environment by means of 6 variables (Voice and Accountability (VA), Political Stability and Violence (PSNV), Government Effectiveness (GE), Regulatory Quality (RQ), Rule of Law (RL) and Control of Corruption (CC). The analysis of links among these variables and the classification of countries pursuant to the Terrorism Risk 82 Index indicates that the highest median values (higher values of variables from the Governance Matters database are considered to be a better result) concern groups assessed as the lowest terrorism risk countries (the median values are as follows: Voice and Accountability (VA) 0.31, Political Stability and Violence (PSNV) 0.27, Government Effectiveness (GE) 0.14, Regulatory Quality (RQ) 0.30, Rule of Law (RL) 0.10 and Control of Corruption (CC) 0.05. The level of voice and accountability, political stability, the rule of law or control of corruption as variables assessing the institutional environment is therefore different in countries differing in terrorism risk. The purpose of this article was to make an alternative classification of countries by means of a logit analysis and compare the results with those of the original classification. Pursuant to this analysis, 141 countries have been classified into the above 4 risk groups where differences with the original classification are apparent in 10 countries, the probability of the classification of which into the given group is higher than 0.75 (Angola, Chile, Ecuador, France, Honduras, Rwanda, Singapore, Congo, Laos and Tanzania). Similarly Angola, Chile, Ecuador, France, Honduras, Rwanda, and Singapore have been classified into the low terrorism risk group pursuant to the logit analysis (according to the Terrorism Risk Index they were classified into the medium risk group). Out of the total recorded terrorist attacks carried out in 2010, 0.34 % occurred in these countries, which does not exceed the values typical for countries classified according to the original classification into the low terrorism risk group. The reasons for classifying Congo, Laos and Tanzania into the low terrorism risk group in compliance with the logit analysis results are apparent from the highest values of Political Stability and Violence (PSNV) for these countries (low risk of the government destabilization or overthrow and low terrorism risk). However, according to the information about recorded terrorist acts committed in these three countries in 2010, their death toll reached 99. The institutional environment quality therefore does not necessarily have to be a prerequisite for terrorism risk and expert estimates of this data do not reflect the real danger of terrorist acts in all countries, which is especially apparent as concerns the groups of countries characterized by a long-term instability which can have an adverse effect on the security environment of the given country throughout the year and cannot be reliably reflected in a single figure per the whole calendar year. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] Abadie, A., Gardeazabal, J. 2003. The Economic Costs of Conflict: A CaseControl Study for the Basque Country, American Economic Review 93,p.113-132. Agresti, A. Categorical Data Analysis. John Wiley, New York, 1990. Alesina, A., Perotti, R. 1996. Income Distribution, Political Instability and Investment, European Economic Review 40, pp. 1203-1228. Blomberg, S. B., Hess, G. D., Orphanides, A. 2004. The Macroeconomic Consequences of Terrorism, Journal of Monetary Economics 51(5), pp. 10071032. Enders, W., Sandler, T. 1991. Causality Between Transnational Terrorism and Tourism: The Case of Spain, Terrorism 14:1, pp. 49-58. Enders, W., Sandler, T. 2009. The Political Economy of Terrorism, Cambridge University Press, in paperback. Governance Matters [online]. 2010, updated [cit. 2012-09-09] Available on WWW: <http://info.worldbank.org/governance/wgi/resources.htm>. Global Terrorism Database [online]. 2010, updated [cit. 2012-09-09] Available on WWW:<http://www.start.umd.edu/gtd/search/Results.aspx?start_month=0&end_ month=12&start_year=2010&end_year=2010&start_day=0&end_day=31 >. Ivanova, K., Sandler, T. 2006. CBRN Incidents: Political Regimes, Perpetrators, and Targets, Terrorism and Political Violence 18(3), 423- 448. Landes,W. M. 1978. An Economic Study of US Aircraft Hijackings 1961-1976, Journal of Law and Economics 21.1-31. Mauro, P. 1995. Corruption and Growth, The Quarterly Journal of Economics 110(3), pp. 681- 712. Nitsch, V., Schumacher, D. 2004. Terrorism and International Trade: An Empirical Investigation, European Journal of Political Economy 20, pp. 423-433. Pikna, B. 2006. Mezinárodní terorismus a bezpečnost Evropské unie: (právní náhled). Praha: Linde, 407 s. ISBN 80-7201-615-6. Rehak, D., Foltin, P., Stojar, P. 2008. Selected aspects of contemporary terrorism, MO CR, (in Czech). Statistical application STAT1. 2012. Available on WWW: <http://k101.unob.cz/stat1/ >. Tavares, J. 2003. The Open Society Assesses Its Enemies: Shocks, Disasters, and Terrorist Attacks, Canegie-Rochester Conference on Public Policy. Terrorism Risk Index [online]. 2010, updated [cit. 2012-09-09] Available on WWW: < http://maplecroft.com/about/news/terrorism.html> 83 WORK BREAKDOWN STRUCTURE A TOOL FOR SOLVING DECISION MAKING PROBLEM IN PROJECT MANAGEMENT Jaromír Pitaš Abstract: One of the decision making tools of a project manager since the 1960s has been Work Breakdown Structure. It was standardized for the first time by the US Department of Defense for the environment of military projects. The basis of this method is a hierarchical decomposition of deliverables (products), which creates first view of the project scope. WBS is built at the start of the planning process (a phase of a life cycle of the project management planning) and further helps the project manager with decision-taking in planning processes and project monitoring. A lack of knowledge of building and using WBS while managing the project by the project manager plays often a crucial role in not attaining the project success. Keywords: Work Breakdown Structure, Project Management, Project, decision-making 1. Introduction Important milestones of the project management are represented by a creation and first usage of Critical Path Method – CPM) and PERT (Performance Evaluation and Review Technique) in the 1950s. A concept of Work Breakdown Structure – WBS was developed together with the method PERT in the United States Department of Defense (DoD). Both methods were developed as a decision making tool for planning processes and project monitoring. In spite of the fact that the method PERT was first used as early as 1957 by US Navy in the project of Polaris missiles, WBS was not put in usage at this first implementation. Only in 1962 DoD, in cooperation with NASA, released a document for implementation of the system PERT / COST where WBS was described [1]. Subsequently in 1968 DoD published a standard "Work Breakdown Structures for Defense materiel items" (MIL-STD-881), describing how to build WBS, its significance and application at US Army projects and programs [2]. The standard has been revised for several times 84 by DoD while the latest one was carried out last year (MIL-STD-881C) [2]. Another milestone for WBS was established in 1987 when the Project Management Institute (PMI) in cooperation with DoD further processed and spread WBS in order to be applied in organizations out of the defense industry. First of all, PMI standardized WBS in a document Project Management Body of Knowledge (PMBOK). The document explains WBS as a term and integrates it into the project management processes. After that PMI standardized WBS in the standard itself “Practice Standard for Work Breakdown Structures”. Both documents were subjects to many revisions in the past years (PMBOK 4th edition, Standard for WBS 2th edition) [4;5]. 2. Contents of the term Work Breakdown Structure The interpretation of the term WBS in the Czech Republic is closely related to a quality of translations of English texts, therefore it is very difficult within Czech literature to find properly explained contents of this term. The most accurate definition of the term in the Czech Republic is offered by Společnost pro projektové řízení, o. s. (Association for Project Management) (SPŘ) in National Standard Competences of Project Management version 3.2 that defines WBS as follows: “...a hierarchical breakdown of the project goal into individual deliverables and further into individual products and subproducts to the level of individual work packages to be delivered in the course of project implementation.” [3] The authors of WBS (DoD) describe WBS in the standard Work Breakdown Structures for Defense Materiel Items: “A product-oriented family tree composed of hardware, software, services, data, and facilities. The family tree results from systems engineering efforts during the acquisition of a defense materiel item.” [2] Practice standard for Work Breakdown Structure defines WBS as follows: “A Deliverable-oriented hierarchical decomposition of the work to be executed by the project team to accomplish the project objective and create the required deliverables.” [4] At the same time under the term outcome it is understood a verifiable product, output or service, which have to be produced to complete a process, phase or project. The authors of the definitions are in agreement when claiming that WBS is not an action-oriented decomposition, it does not even include any activities since activities are totally included in work packages at the lowest level of WBS. On the other hand they agree on the fact that it involves product decomposition into subproducts and further into the lowest level of detail required. It is possible to state that the definition given by SPŘ in the Czech Republic is not in disagreement with the quoted definitions by DOD and PMI, therefore it can be used in the field of the project management of the Czech Republic. 3. Creating Work Breakdown Structure The project life cycle involves the phases of initialization, planning, implementation and terminating of the project. The planning phase is opened by creating WBS that is the foundation for: - managing the costs of the project implementation; - identification of activities and creating an implementation schedule; - determination of the resource requirements necessary for the project implementation; - defining responsibility and involvement in the project implementation; - quality management of the final deliverable for a customer; - managing changes in the course of project planning and project implementation. The basic foundation for creating WBS is a clearly formulated objective of the project (WHAT is to be delivered to a customer, UNTIL WHEN and FOR HOW MUCH). The top (1 level) of WBS is composed of a definition of delivery item for a customer (WHAT is to be delivered to a customer – see example in Figure 1). 1 (1 level) Weapon system Figure 1: Project deliverable – top level of WBS Source: own processing The second level of WBS usually contains more precise definition of a delivery item for a customer in a way that a customer defined the item (for the example see 85 Figure 2). 1 Weapon system 1.1 Automatic rifle 1.2 Sight 1.3 Ammunition 1.4 Handbook Figure 2: Project deliverable decomposition to the products – 2 level of WBS Source: own processing The following hierarchical breakdown is a definition of subproducts, which will be necessary to create (produce) so that a product at the second level is created. When creating the second level the implementation team with a project manager in charge has to observe the so called 100 % rule. This obligatory rule binds WBS creators to define everything that is to be completed (delivered) so that a product at a higher level is produced (delivered). It represents a return check whether the project team identified everything that is to be completed in order to attain a higher level of WBS. Figure 2 illustrates a primary violation of the 100 % rule because the main product of the second level, which is “project management”, is missing here. Figure 3 shows the right observance of the 100 % rule [4]. 1 Weapon system 1.1 Automatic rifle 1.2 Sight 1.3 Ammunition 1.4 Handbook 1.5 PM Figure 3: Right project deliverable decomposition to the products – 1-2 level of WBS Source: own processing Presenting the project management as a deliverable (product) plays a certain role in WBS, since the project management is delivered to a project customer, and there are costs required to build it. The project management includes work of a project manager and project team, which is not directly related to creation of further deliverables (products), however, it is necessary to be executed in order to produce a final deliverable (achieve the project objective). When accomplishing the identification of the products at a certain level, the project team together with the project manager decides whether the performed breakdown is sufficient for the description of the products (subproducts). The level of details of the decomposition is related to experience and capabilities of the project 86 team and project manager to control their production from the perspective of restrictive project criteria (time, costs, resources, risks), customer defined criteria (acceptance criteria), together with achieving the required quality of the final deliverable, the project as a whole and the project management (for the example see Figure 4). Providing that the project manager decides that the product decomposition is detailed enough for managing the implementation and producing further documents in the course of planning, it is possible to terminate the product decomposition in terms of subproducts decomposition into work packages. Work packages represent a set of activities to be accomplished in order to create the products (to observe the 100 point rule). 1 Weapon system 1.1 Automatic rifle 1.2 Sight 1.3 Ammunition 1.1.1 Barrel 1.2.1 Night sight 1.1.2 Magazine 1.2.2 Day sight 1.1.3 Bolt assist mechanism 1.2.3 …………. 1.1.4 ………… 1.4 Handbook 1.5 PM 1.3.1 Shall with tracer 1.4.1 ……………….. 1.3.2 ……………….. Figure 4: Project deliverable decomposition into the products – 1-3 level of WBS Source: own processing 4. How does Work Breakdown Structure support decision making in project? Together with Logical Frame Matrix WBS is the initial decision making tool of the project manager for setting up the project plan, managing the changes in the project and its monitoring. Completed WBS enables, after it has been created, clarifying the requirements of financial resources for activity achievement summarized in the work packages (the costs of necessary project resources, material used in order to create the required subproducts, products and the final outcome). The project manager and implementing team express in percentage the share of financial means spent on creating the individual subproducts and products at individual levels (for the example see Figure 5). Each level must add up to 100 points. The total points of subproducts must equal the final value of the product (100 points). Owing to the fact that WBS is not an action-oriented decomposition, it is not possible to create, out of WBS, a project schedule with defined links. However, if the 100 % rule is observed, then the project team can decompose the work packages into activities that are to be carried out and into milestones that are to be attained. Individual activities with the usage of the method CPM or PERT are evaluated in terms of time, a network chart is composed and a network chart analysis is executed (concord in attained milestones, initialization and termination of the project according to the assignment). Consequently, WBS with already created Organizational Breakdown Structure (OBS) helps the project manager to build Responsibilities Matrix (RM). The goal of RM is to assign responsibility to the members of the project team for the lowest level products creation, and verification whether there is a sufficient number of human resources in the project team or it is necessary to increase it. WBS is the foundation for creating WBS Dictionary, which is composed by the project manager together with the team. The document describes the products of the lowest level in such a way that the project team members responsible for their production know what to produce and what they are responsible for. It is also necessary to mention the effect of WBS on creating the project communication plan. While making decisions as to a kind and contents of the communication, WBS helps the project manager by indicating WHAT must be communicated, and together with RM shows who shall accomplish this communication. 87 1 100 Weapon system 1.1 45 Automatic rifle 1.2 38 Sight 1.3 10 Ammunition 1.1.1 Barrel 9 % 1.2.1 Night sight 22 % 1.1.2 Magazine 2 % 1.2.2 Day sight 10 % 1.1.3 Bolt assist mechanism 11% 1.2.3 ………….6 % 1.1.4 …………23 % 1.4 2 Handbook 1.5 5 PM 1.3.1 Shall with tracer 6 % 1.3.2 ………………..4 % Figure 5: Breakdown of products and subproducts evaluation Source: own processing WBS has also a significant effect on the identification of the project risks (within the process of the project risk management) that may threaten the creation of the individual products and so the achievement of the project goal. Since WBS defines the basic scope of the project it helps the project team to identify the technological project risks in particular. Last but not least WBS is a supporting platform when managing the changes in the project. When a change rises in relation to some product defined in WBS, the impacts of this change are usually directly reflected in WBS (e.g. a new product, work package). The impact of such a change will most probably cause a requirement for identification of additional activities, costs rise, increase of resources or their work and increase of implementation time. 5. Impacts of mistakes in WBS on decision making within the project A primary and cardinal mistake that is obvious is a situation when the decomposition of the project goal is performed in terms of activities instead of products. Then the designers focus on the task how to create the resulting product instead of identifying the individual products and subproducts that they should create. The basic project scope may be inaccurate, incomplete or totally wrong. As a result, the WBS project manager and the team are not provided with a required view of the project (basic project scope). The 88 decisions made from that point on are not correct in most of the cases. The mistake of this kind stems from the lack of knowledge of building WBS. The impact of this decomposition is a high probability of not identifying all the products and subproducts that are to be produced and so the project goal is not achieved. This approach results in an excessive exceeding of the project implementation costs, and in not keeping the project implementation schedule, and that is because the team attempts to accomplish the established goal of the project through increasing the costs and extending the schedule. The following decisions based on this decomposition may be wrong and do not direct the project to its achievement. Another mistake is an incomplete WBS when the products are not identified already at the second level or at lower levels of WBS. Thus created WBS is incomplete and the following decisiontaking in the course of planning is not accurate. This mistake stems from insufficient information from the customer of the project or from an incomplete / incorrect analysis of the documents or the environment. If such a mistake is discovered when the project planning is still in progress, its impacts can be eliminated. This mistake is in most cases identified as late as the project implementation takes place. In this case it can be inferred that the impacts on the successful project implementation are similar to the former case above. 6. Conclusion Although WBS was developed in the 1950s this method is among the fundamental methods of the project management and the knowledge and application of it have not lost importance. The truth is that the time has proved its benefit at decision making in the process of project planning and monitoring. Standardization of WBS is a priority for many organizations dealing with project management. Unfortunately there is not such a standard in the Czech Republic. On the other hand the positive point is that the standards of Project management Institute (USA) and Association Project Management Group (GB) are adopted or applied in the Czech Republic. At projects with low complexity of the project management there is a great number of experienced project managers who do not create WBS physically (on paper), however, they have the ability to create it mentally. Undoubtedly this helps them in decision making on project planning and its monitoring. Unfortunately there are frequent cases nowadays of a big number of project managers who are not familiar with this method or not able to use it properly. References [1] [2] [3] [4] [5] MIL-STD-881A. DoD and NASA Guide PERT COST - System, Designe. 1962, 146 p. <http://www.everyspec.com/MIL-STD/MIL-STD-0800-0899/MIL_STD_881A_886/>. Accessed 2012 September 3. MIL-STD-881C. Department Of Defense Standard Practice – Work Breakdown Structures For Defense Materiel Items. 2011, 249 p. <http://www.everyspec.com/MILSTD/MIL-STD-0800-0899/MIL-STD-881C_32553> Accessed 2012 September 3. Pitaš, Jaromír at all. Národní standard komeptencí projektového řízení. 3. vyd. aktaulizované a doplněné. Brno: Společnost pro projektové řízení, o.s., 2012, 335 s. ISBN 978-80-260-2325-8. Project Management Institute. Practice standard for Work Breakdown Structures. 2th edition. Pennsylvania: Project management Institute, Inc., 2006, 111 p. ISNB 978-1933890-13-5. Project management Institute. A Guide To The Project Management Body Of Knowledge. 4th edition. Pennsylvania: Project management Institute, Inc., 2008, 467 p. ISNB 978-1-933890-51-7. 89 THE SELECTION OF METHODS OF LAND MILITARY EQUIPMENT DIRECT LASHING ON RAILWAY GOODS WAGONS AND THEIR VERIFICATION BY MEANS OF CALCULATION Martin Rejzek, Martin Vlkovský and Tomáš Binar Abstract: The introduction to the sphere in question deals with selected provisions of documents and standards, meeting of which is required when securing land military equipment. The goal of the paper is to determine, based on the comparison of inertial forces in a model case, which direct lashing method is more convenient, and to work out an application calculation algorithm in Microsoft Excel spread sheet for practical use. Keywords: Lashing Capacity, Longitudinal and Transverse Securing, Land Military Equipment, Railway Wagon, Web Lashing. 1. Introduction While transported on railway goods wagons, land military equipment is exposed to inertial forces acting in particular in the longitudinal direction (x axis) and transverse direction (y axis). If not secured properly, the land military equipment may slide, which may lead to negative consequences, such as the delay, increase in the costs expended to remedy faulty loading or material damage, impairment of operation safety on railway lines and jeopardising the health of persons concerned. At present, land military equipment is secured analogically in compliance with applicable documents. The procedures are not exactly verified and adapted to land military equipment in use in the Czech Armed Forces (CAF). No appropriate application software is introduced and utilised for this purpose. 2. The description of status quo 2.1. Documents and fundamental provisions governing land military equipment securing 90 According to Czech Technical Standard [1], a load may be, in general, secured by completely passive connection – locking, blocking or lashing. As a rule, the first method is applied in container transportation. When blocked, the load lies against a solid structure or an attachment (blocking equipment) on a load carrier. It is often combined with lashing equipment. There are two methods of lashing – frictional and direct lashing. The frictional lashing method makes use of frictional force, originating between the load and the deck, in order to secure a load against sliding. The direct lashing method does not make use of the force the lashing assembly is capable of exerting, but the force it is capable of being safely tensioned to. The load is secured elastically up to the elasticity limit of the lashing assemblies. The direct lashing method types include slope lashing in longitudinal or transverse direction, diagonal lashing, direct lashing preventing tipping over (in combination with blocking) and spring lashing (over the edge). In NATO, land military equipment is secured on railway goods wagons in compliance with rules stipulated in allied movement publication AMov-P-4 (A) [5], Chapter 4, Annex no. 2, or the provisions of International Union of Railways (UIC) Loading Guidelines [3], or ČD CARGO, a. s. implementing guideline [3]. AMov-P-4 (A) constitutes an integral part of NATO standardization agreement (STANAG) 2468, 2nd edition. The document is ratified by 28 countries, and applies to the transportation speed of 90 km∙h-1. It has been implemented in the Ministry of Defence of the Czech Republic in its original version. For the purpose of land military equipment securing in longitudinal and transverse directions, following items are permitted: chocks with steel spikes, wooden chocks, scotches and wood hedges, lashing wires, lashing straps and wheel chocks (according to UIC Loading Guidelines, Section 7.3). The AMov-P-4 (A) publication specifies lashing capacity (LC) limit values for individual categories of transport operations (individual wagons, wagon groups and a military train). The data is processed in the form of a table for wheeled and tracked vehicles divided into weight categories. Out of the total number of 197 members of the UIC, there are 82 active members on five continents. UIC Loading Guidelines apply to the transport speed of 120 km∙h-1. Section 7.1 deals with wheeled and tracked vehicles and machinery secured by chocks. Section 7.2 deals with wheeled and tracked vehicles and machinery secured by lashing. Section 7.3 deals with wheeled vehicles with tyres secured by wheel chocks. Requirements of individual documents partly differ. Above all, it is a matter of lashing assembly LC values and the bearing capacity of chocks for securing in longitudinal direction, including utilised chock types. It may be said, that UIC Loading Guidelines are more stringent in terms of required values. Differences can also be seen in the methods of securing selected equipment (trailers). Provided that more pieces of the land military equipment are transported on one railway wagon, a different securing method may be applied to each type of the equipment, depending on the wagon design. The selection of a suitable securing assembly depends on transported land military equipment dimensional and weight parameters, (available) railway goods wagon loading area, capability of adhering to safe securing procedures and the category of transport operations. 2.2. Securing military equipment by means of lashing (lashing straps) In compliance with sAMov-P-4 (A), the lashing means are classified as disposable and reusable lashing means, wire ropes, chains, and polyester fabric straps. The disposable means are not utilised in the CAF. The reusable lashing means are produced in a variety of types, colours, lengths, widths and strengths. The combination of lashing means is applied, where it is impossible to use a hand brake, or a lower gear cannot be engaged, or to tracked vehicles that may, due to their design, slide over chocks in longitudinal direction during haulage. Lashing straps are securing means often utilised by dispatchers on railway wagons. Safety requirements for reusable lashing straps are defined by European Standard – Czech Technical Standard [2]. Each complete lashing strap must have a label providing information including the lashing capacity – LC (daN), length (in meters), standard hand force – SHF (daN), standard tension force – STF (daN), a warning “Not Designed for Lifting”, the textile strap material, a producer’s name or logo, a producer traceability code, the number and section of an (applicable) European Standard, the year of production, and the textile strap elongation in % at LC. The label must be legible; otherwise, the strap use is prohibited. The label colour refers to the lashing strap material. Polyester is most 91 often used; polyamide and polypropylene are less common materials. Lashing straps may be fitted with a tensioning device and connecting components (hooks, triangles) for the attachment to lashing and attachment points. The standard specifies in detail how to use and maintain the lashing straps made of synthetic fibres. Lashing straps of synthetic fibres are attached to particularly designed points, i.e. lashing points – lashing rings in the railway wagon deck, and attachment points on transported land military equipment. These points must be properly selected in order to prevent impairing the lashing ring/lashing strap strength or functionality. In a load is only secured by lashing, the lashing means must act both in the longitudinal and transverse direction. For land military equipment securing, 2 pairs of lashing straps symmetrically attached to the front and rear parts, are utilised. They must have proper length and must run diagonally at the angle of approx. 30°. It is the angle between the vehicle front (rear) part plane which is perpendicular to the railway wagon (its deck) and the lashing strap; refer to figure 1. Figure 1: Diagram of land military equipment optimum securing on a railway goods wagon Source: AMov-P-4(A) In compliance with AMovP-4(A) and UIC Loading Guideline 7.2, the lashing lines shall run from the land military equipment front part diagonally in the shape of letter “V”. When attached to the rear part, the straps are diagonally crossed. In the previous edition of AMovP-4, the lashing lines were diagonally crossed on both sides. For the sake of surface damage prevention (safety seams, synthetic fibre rupturing) the lashing straps must not be twisted. Should a lashing strap run over a sharp edge, e.g. on the railway wagon headboard or at points of strap crossing, it shall be protected by abrasion-resistant mats. Free strap ends must be coiled along the fibres, and tied to the tensioning device. Rolling free strap ends into balls or twisting them around a tensioned strap is unacceptable. Proper closing of ratchet buckles shall 92 always be checked. During transport, straps must be additionally tensioned. Provided that certain types of land military equipment are not fitted with attachment points, the equipment is secured using appropriate chocks. It must be noted that there are lashing points on the sole bar or in the deck of some low-sided railway wagons – these are lashing eyes made of rod steel (approx. 12 mm in diameter), designed for tarpaulin and web lashing, not for securing the equipment by lashing straps with carbine snap hooks. 3. Discussion 3.1 Comparison of loading area utilization efficiency The efficiency of railway goods wagon loading area utilization depends mainly on the kind of selected securing means, varying land military equipment length and the loading area design. The statement may be confirmed by the calculation of available loading length (length utilization) in a four-axle low-sided wagon of Res line, design group 67 (hereinafter referred to as “wagon Res 67“) with tipping sides and stakes, provided the land military equipment is secured by chocks: 𝐷𝑘 = 𝐿𝑑 − 2𝑙𝑘 [𝑚𝑚] (1) 𝐷𝑘 = 18,500 − 2 ∙ 100 (200) = 18,300 (18,100) mm Legend: Dk – available loading length of wagon Res 67, when chocks are used; Ld – loading length of wagon Res 67; lk – minimum distance between the front wall and secured land military equipment (100 mm or 200 mm depending on the category of transport operations). The calculation of available loading length in wagon Res 67, when land military equipment is secured by lashing straps: 𝐷𝑝 = 𝐿𝑑 − 2𝑙𝑎 − 2𝑙𝑏 [𝑚𝑚] (2) 𝐷𝑝 = 18,500 − 2 ∙ 1,250 − 2 ∙ 762 = 14,476 mm Dp – available loading length of wagon Res 67 when lashing straps are utilised; Ld – loading length of wagon Res 67; la – the distance between the front wall and a side attachment point (ring) – 1,250 mm; lb – the distance between a side attachment point and a lashing point on a wagon Res 67, while the angle of 30° is maintained, is 762 mm for a typical land military equipment. Refer to the following calculation: tan 30° = 𝑧𝑚𝑖𝑛 𝑤𝑟𝑒𝑠 2 = 𝑧𝑚𝑖𝑛 => 𝑧𝑚𝑖𝑛 = 762 𝑚𝑚 1,320 zmin – minimum distance between the front wall and a plane perpendicular to the first lashing point in the side sole bar of wagon Res 67, i.e. 1,250 mm from the wagon headboard; wres – the width of wagon Res 67, i.e. 2,640 mm. Based on the equation, minimum distance of the land military equipment front part from the front wall of wagon Res 67 is determined, on the condition of V-shaped diagonal lashing of the equipment; refer to AMov-P-4 (A). The minimum distance calculated between the vehicle front and the plane (762 mm) is at the same time a decisive safe distance for the equipment securing on a railway wagon. When securing the rear part, the same rule applies, while the distance may increase depending on the position of the nearest lashing points. The calculation implies that a shorter (theoretical) available loading length is reached on a railway wagon when securing land military equipment by lashing straps, if compared to the chock variant. The direct lashing method results in lower efficiency of loading area utilization, which, in consequence, may lead to the increase in the wagon demand and relating haulage charges for wagon loads. 93 3.2 Diagonal lashing of land-based weapons and equipment – calculation and interpretation The calculation of securing forces is timeconsuming, unless an automated algorithm is applied. The calculation shall include vertical lashing angle α, longitudinal lashing angle βx and transverse lashing angle βy. Lashing angles have crucial impact on the lashing means restraining force FR [7]. Their values can be measured practically, or calculated using appropriate mathematical tools. The method of calculation can be confirmed in an example based on a model application. The task is to secure, e.g. a light amphibious tracked combat vehicle with high mobility and armour protection of BVP-2 type. For the haulage of heavy wheeled and tracked vehicles without limitation, a modernised version of a four-axle flat wagon of Smmps line, design group 54, technical interval 4728, without side stakes (hereinafter referred to as “wagon Smmps 54”), is utilised. Basic technical parameters of wagon Smmps 54 are as follows: - loading length – 14,000 mm; - loading width – 3,100 mm [6]; 𝐹𝑅 = 𝑚 ∙ 𝑔 ∙ wagon width (w) – 3,100 mm; distance of lashing points from side edges of the railway wagon (bo) – 200 mm. Basic technical parameters of BVP-2 are as follows: - weight – 14,300 kg; - width – 2,700 mm (distance from wagon edges 200 mm from each side); - height – 1,600 mm; - length – 6,720 mm (distance of points from the end of the railway wagon – 3,000 mm); - height of attachment points on the vehicle (v) – 1,600 mm; - distance between lashing points on a vehicle and a side edge of the railway wagon (bv) – 350 mm; - distance between attachment points on a vehicle and the plane of lashing points on the railway wagon (z) – 3,000 mm. The task is to calculate FR, in order to prevent sliding of land military equipment on a wagon during transport, using formula (3), and to determine the minimum lashing capacity (LC) of each of the four straps. (𝑐𝑥,𝑦 − 𝜇 ∙ 𝑓𝜇 ∙ 𝑐𝑧 ) [𝑁] 2 ∙ (cos 𝛼 ∙ cosβ𝑥,𝑦 + 𝜇 ∙ 𝑓𝜇 ∙ sin 𝛼) For this purpose, parameters from standard [1] must be applied: - gravitational acceleration – g = 9.81 m∙s-2; - the coefficient of acceleration in longitudinal direction in case of railway transportation – cx = 1.0; - the coefficient of acceleration in vertical direction in case of railway transportation – cz = 1.0; - conversion factor for friction – fµ= 0,75; - friction factor (combination of materials on the contact surface 94 - (3) – planed wooden loading area of the railway wagon, rubber or a steel belt) – µ = 0.30 for tracked vehicles; µ = 0.60 for wheeled vehicles. The friction factor μ depends on the type and texture of the surfaces. The equation (3) implies that the higher the value of μ (friction force between land military equipment and the wagon deck) is, the lower the requirements for further securing of load against sliding are. A table stating friction factor values for certain couples of materials is provided in standard [1]. In order to determine vertical lashing angles α1, α2, α3, longitudinal lashing angles βx1, βx2, βx3 and transverse lashing angles βy1, βy2, βy3, goniometric functions and Pythagoras’s theorem should be applied. The calculation of lashing angles for crossed diagonal lashing – index 1: 𝑥1 = �𝑣 2 + (𝑤 − 𝑏𝑜 − 𝑏𝑣 )2 [𝑚𝑚] (4) where x1 is a (diagonal) distance between an attachment point on a vehicle and the point of intersection of the planes of the railway wagon deck, vehicle front and an opposite lashing point on the railway wagon. 𝑦1 = �𝑣 2 + 𝑧 2 + (𝑤 − 𝑏𝑜 − 𝑏𝑣 )2 [𝑚𝑚] (5) where y1 is a (diagonal) distance between an attachment point on a vehicle and an opposite lashing point on the railway wagon (corresponds to the length of the lashing strap). tan 𝛼1 = 𝑣 �𝑧 2 + (𝑤 − 𝑏𝑜 − 𝑏𝑣 )2 tan 𝛽𝑥1 = cos 𝛽𝑦1 = = 1,600 �9,000,000 + 2,5502 => 𝛼1 = 22,11° 𝑥1 �1,6002 + 2,5502 = => 𝛽𝑥1 = 45,10° 𝑧 3,000 𝑤 − 𝑏𝑜 − 𝑏𝑣 2,550 = => 𝛽𝑦1 = 53,13° 𝑦1 �1,6002 + 3,0002 + 2,5502 The calculation of lashing angles for slope lashing (in longitudinal direction) – index 2: 𝑥2 = �𝑧 2 + (𝑏𝑣 − 𝑏𝑜 )2 [𝑚𝑚] (6) 𝑦2 = �𝑣 2 + 𝑧 2 + (𝑏𝑣 − 𝑏𝑜 )2 [𝑚𝑚] (7) where x2 is a (direct) distance between an attachment point on land military equipment and the point of intersection of planes of the railway wagon loading area, land military equipment front and an adjacent lashing point on the railway wagon. where y2 is a (direct) distance between an attachment point on land military equipment and an adjacent lashing point on the railway wagon (corresponds to the length of the lashing strap). tan 𝛼2 = 𝑣 𝑣 1,600 = = => 𝛼2 = 28,04° 𝑥2 �𝑧 2 + (𝑏𝑣 − 𝑏𝑜 )2 �9,000,000 + 22,500 cos 𝛽𝑥2 = 𝑧 𝑧 3,000 = = => 𝛽𝑥2 = 28,18° 𝑦2 �𝑣 2 + 𝑧 2 + (𝑏𝑣 − 𝑏𝑜 )2 �11,582,500 95 cos 𝛽𝑦2 = 𝑏𝑣 − 𝑏𝑜 150 = => 𝛽𝑦2 = 87,47° 𝑦2 �11,582,500 The calculation of lashing angles for V-shaped diagonal lashing – index 3: 𝑤 𝑥3 = �𝑣 2 + ( − 𝑏𝑜 )2 [𝑚𝑚] 2 (8) where x3 is defined analogically to x2. 𝑤 𝑦3 = �𝑣 2 + 𝑧 2 + ( − 𝑏𝑜 )2 [𝑚𝑚] 2 (9) where y3 is defined analogically to y2. sin 𝛼3 = tan 𝛽𝑥3 𝑣 = 𝑦3 �𝑣 2 + 𝑥3 �𝑣 = = 𝑧 tan 𝛽𝑦3 = 𝑧2 2 𝑣 + ( 2 − 𝑏𝑜 𝑤 + ( 2 − 𝑏𝑜 )2 𝑧 √𝑣 2 + 𝑧 2 𝑤 2 𝑤 − 𝑏𝑜 = = 1,600 �13,382,500 => 𝛼3 = 25,94° �4,382,500 => 𝛽𝑥3 = 34,91° 3,000 �11,560,000 => 𝛽𝑦3 = 68,34° 1,350 The restraining forces are calculated by supplying the variables into equation (3). The forces are then equal to inertial forces acting during transportation. The slope (direct) lashing cannot be applied to land military equipment on railway wagons, even though it is the most convenient method in the longitudinal direction (LC value is the lowest), as it would be impossible to secure land military equipment in transverse direction, due to assumed equipment width (refer to the high value of FR2y= 13,586 daN). The diagonal lashing method – crossing prevents both sliding and tipping over. It is important that the crossing is located above the land military equipment centre of gravity and in the middle of the lashing line length. If the crossing is closer to the equipment, the securing stability decreases, and the possibility of swaying increases. This 96 )2 = method is permitted and can be applied; it is, however, less convenient than V-shaped diagonal lashing. Crossed diagonal lashing is more convenient for transverse securing. In railway transportation, the inertial forces are relatively small in transverse direction in comparison with longitudinal direction. The value of longitudinal inertial force is primarily affected by shocks during shunting. As the most convenient, the securing method least straining lashing straps can be selected, i.e. the V-shaped diagonal lashing method, where maximum inertial force acting on lashing straps corresponds to the value of FR3x = 6,629 daN. 3.3 Producing an interactive aid The goal of the paper was to produce a calculation aid not requiring any additional financial means. The aid (algorithm) was designed using Microsoft Excel spread sheet; refer to figure 2. Upon input data supplying, it allows calculating FR in longitudinal and transverse directions in compliance with standard [1]. The interactive aid helps verify whether lashing straps are not under designed or, on the contrary, lashing straps with unnecessarily high LC are not utilised uselessly. Figure 2: Outcome of the aid for the verification of land military equipment securing on a railway wagon Source: own 4. Conclusion The observation of applicable provisions governing land military equipment securing on railway goods wagons in individual categories of transport operations is the precondition of successful loading and safe transportation. It can be confirmed that the combination of crossed diagonal lashing and V-shaped diagonal lashing is an alternative solution to safe land military equipment securing on railway wagons. The benefits of both the methods may be applied in synergy. In consequence, the securing prevents land military equipment from sliding and tipping over. In general, it may still be recommended to produce the equipment with attachment points in the middle of the frame, and to include the condition in the specifications of public contracts. On the other hand, despite the many benefits of land military equipment 97 securing by lashing, the dispatcher must also take into consideration the negatives relating to the use of lashing straps that may result in possible increase in the wagon demand. One of the reasons is the limited number and varying location of lashing points and tensile strength of lashing rings. Another reason is the requirement for diagonal positioning of lashing lines at the angle of approx. 30°, which follows from the necessity to secure land military equipment in longitudinal and transverse direction. This angle also affects the values of lashing angles serving as input data for the calculations (α, βx, βy). Reducing the diagonally led lashing line angle considerably below 30° increases straining of lashing straps, and, in consequence, the requirement for FR, through angles α, βx, βy. Meeting the minimum value of the respective angle results in higher safety during transport, and extends the service life of lashing straps. In consequence, the financial means allocated for this purpose may be saved. References [1] [2] [3] [4] [5] [6] [7] 98 ČSN EN 12195-1. Prostředky pro zajišťování břemen na silničních vozidlech – Bezpečnost – Část 1: Výpočet zajišťovacích sil. (Load Restraining on Road Vehicles – Safety – Part 1: Calculation of Securing Forces). Praha: Úřad pro technickou normalizaci, metrologii a státní zkušebnictví, 2011. 48 p. ČSN EN 12195-2. Prostředky pro zajišťování břemen na silničních vozidlech – Bezpečnost – Část 2: Přivazovací popruhy ze syntetických vláken. (Load Restraining on Road Vehicles – Safety – Part 2: Web-lashing made from man-made fibres). Praha: Český normalizační institut, 2003. 28 p. Nakládací směrnice UIC, Svazek 2 – Zboží. (UIC Loading Guidelines, Volume 2 – Goods.) [Czech version of amendment no. 13]. Praha: Generální ředitelství ČD Cargo, a. s., 2009. 125 p. Směrnice ČDC pro zajišťování vojenských železničních přeprav. (ČDC Guideline on Securing Military Rail Transports.) [Draft of ČDC implementing guideline to D33 regulation]. Praha: Generální ředitelství ČD Cargo, a. s., 2012. 74 p. STANAG 2468 CSS (Edition 2). Technical Aspects of the Transport of Military Materials by Railroad – AMov-P-4 (A). Brussels: NATO Standardization Agency, Military Committee Land Standardization Board. 2011.216 p. REJZEK, Martin, NEDBAL, Josef. Vojenská přeprava po železnici III – železniční nákladní a osobní vozy využívané v Armádě České republiky (Military Rail Transportation III – Railway Goods and Passenger Wagons in Use in the Czech Armed Forces) [Educational aid on DVD-ROM for department use]. Brno: Univerzita obrany, 2011. 58 p. ISBN 978-80-7231-795-0. VLKOVSKÝ, Martin. Možnosti rozvoje zásobovacího systému vyčleňovaných jednotek Armády České republiky do mnohonárodních operací s důrazem na uplatnění přímé distribuce. (The Development Possibilities of the Supply System in Earmarked Forces of the Czech Armed Forces for Multinational Operations with the Emphasis on Direct Distribution Application [Dissertation]. Brno: Univerzita obrany, 2009. 190 p. Supervisor: Lieutenant-colonel Martin REJZEK, Ph. D. ALLIED JOINT PUBLICATION FOR OPERATIONS PLANNING (AJP – 5) AS NEW CHALLENGES FOR MILITARY PLANNERS Ján Spišák Abstract: The successful planning of military operations requires clearly understood and widely accepted doctrine. It is particularly important for joint operations that are be conducted by multinational forces. With these ideas in mind the alliance doctrine’s writers brought the new Allied Joint Publication (AJP) - 5 ratification draft “Allied Joint Doctrine For Operational-Level Planning” to be adopted, implemented and widely used by commanders and staff for planning of future military operations. The article deals with AJP-5 contribution to the theory of Operational art in terms of broader content of operations planning processes compared to the last version of AJP - 5 dated from 2006. Information mentioned in the article may serve as a source of knowledge and may be helpful for military professionals in the Armed Forces of the Czech Republic. Keywords: Doctrine, operations planning, operational art, operational design concepts, 1. Introduction Allied Joint Doctrine for Operational-Level Planning is intended primarily for use by North Atlantic Treaty Organization (NATO) military forces, and for NATO-led operations it may be used for operations conducted by a coalition of NATO members and/or partner nations. AJP - 5 is aimed mainly at commanders and staff members engaged in operational-level planning, employed in Joint Force Command Headquarters (JFC HQ) and Component Command Headquarters (CC HQ), yet is a valuable source of military thoughts and ideas exploitable for military professionals working at lower levels of command. At its core it describes the fundamental aspects of planning joint operations at the operational level. Doctrine AJP - 5 is going to be a part of NATO’s operations planning architecture. It stipulates an overarching framework of the key planning principles, considerations and process steps that are followed in operational-level planning. Identically to its predecessor, Allied Joint Doctrine For Operational Planning AJP - 5 (2006), this doctrinal publication reflects a linkage to the capstone Allied Joint Doctrine publication Allied Joint Doctrine (AJP - 01) and the NATO keystone doctrinal publications Allied Joint Doctrine for the Conduct of Operations (AJP-3), the Allied Joint Doctrine for Logistics (AJP - 4), and a few others on this hierarchy level. [1] 2. Doctrinal contribution Doctrine is much more comprehensive in terms of explaining key functions of the Operational-Level Framework at the operational level, which assist the Joint Force Commander (JFC) in planning and execution of military operations. These functions – Shape, Engage, Exploit, Protect and Sustain help the commander visualise how major operations, battles and engagements relate to one another within the overall campaign. There are added “planning principles” which this AJP - 5 introduced as an aspect of solid operational thinking of military planners that they must adopt. There is also 99 deeper and more logical explanation of particular planning Phases the planners apply to develop key operational documents such Operational design [2], Concept of Operation (CONOPS) [3] and Operation Plan (OPLAN) [4]. Enough space has been dedicated to analytical approaches within operational art in terms of traditional, systemic or design approach, expanding foundations for planning, command involvement, campaign process assessment and finally the nature of mission analysis at the operational level. All the operational design concepts (e.g. Centre of Gravity, End State, Decisive Conditions, Lines of Operations, Objective etc.) [5], that play decisive roles during Operational design development process are expanded in their theory and practical application for operations planning. The noticeable change is implied in the whole planning process at the JFC level in terms of its depiction. While the planning “phases” are still used at the strategic level, the planning “steps” of Operational-Level Planning Process are established for this level. This seems to be a “verbal challenge” the military planners on specific levels of command will have to accustom themselves. The purpose of the article is not to describe all the changes and contribution of the new AJP - 5, rather to draw reader´s attention to the principles that may be utilized at all military levels, basic definitions that are to be incorporated in NATO terminology publications, and the steps of the planning process in its logical flow. 3. Doctrinal Principles in Military Operations When planning for allied combined joint operations, planners must consider two groups of key principles. The first group relates to conduct of military operations as such and the second group are “planning principles”. Both of them may require different emphasis according to the operational situation they are applied to. 100 Principles (of the first group) of allied joint and multinational operations e.g. Definition of Objectives, Unity of Purpose, Concentration of force, Economy of effort, Initiative, Security and others, are quoted in almost all publications of doctrinal hierarchy. Most of them are fundamental to planning; others comprise or describe principal conditions or constraints which the planning is subject to. Planning at all levels has to be conducted following these principles in order to successfully support the conduct of military operations. The second group of principles must be considered from the early beginning of operations planning effort. Key factors such operational environment, problem, end state, strategic and operational objectives are assessed. All of them affect Operational Design development and generate particular challenges for both military planners and civilian actors. Planning of operations should take into account the different aims and conditions of both Article 5 operations and non-Article 5 crisis response operations (NA5CRO). NATO’s operations planning should conform to the planning principles as following: a) Coherence. Every operational plan must positively contribute towards the accomplishment of an approved higher level set objectives for addressing the crisis. The planning process is also coherent internally, as well as externally with other actors. b) Comprehensive Understanding of the Operational Environment. Achieving the desired strategic and operational outcomes must be understood at all levels during the planning and conduct of operations. The commanders must build and foster a shared comprehensive understanding of the operational environment. c) Mutual Respect, Trust, Transparency and Understanding. Planning of operations in support of NATO’s contribution to comprehensive approach is underpinned by a culture of mutual respect, trust, transparency and understanding. Trust is built through information sharing and practical cooperation and must be encouraged to allow collaboration and cooperation across NATO bodies and with relevant non-NATO actors and local authorities. d) Consultation and Compatible Planning. Mutually supportive, compatible, and wherever possible, concerted and harmonised planning is fundamental for the success of a comprehensive approach. OPLANs must meet the politically agreed level of interaction with external civil and military actors. Planners should establish mechanisms and procedures to support early shared situational awareness which will contribute to compatible planning. e) Efficient Use of Resources. Planners should achieve a balance between tasks and resources. Decision makers should be aware of the risk if an operation is not adequately resourced prior to approval of a strategic OPLAN. Planners must allow both military and non-military contributions to focus on and leverage their fundamental competencies within the international response to the crisis. f) Flexibility and Adaptability. The operations planning process should be flexible enough to adjust to evolving political guidance, civil and military advice needed to facilitate collaborative planning and adapt to political requirements, and also agile enough to allow the plan to evolve. The planning process should, on a regular basis, allow reviewing and assessing the mission and to modify or tailor plans when necessary to reach the desired end state. [6] 4. Definitions are established Contrary to US Armed forces doctrinal publications that widely use this “new term” for years, AJP - 5 is the first Allied doctrine that has stipulated and defined the term “Operations Planning” as follows: “The planning of military operations at the strategic, operational and/or tactical levels”. The preferred English term to designate the planning of military operations at all levels for military planners is “operations planning”. It is necessary to mention the previous term “operational planning” is not to be used anymore to prevent confusion with operational-level planning. [7] Operational-Level Planning is defined by AJP - 5 as “military planning at the operational level to design, conduct and sustain campaigns and major operations” in order to accomplish strategic objectives within given theatres or areas of operation. [8] Operational-level planning translates strategic objectives into tactical actions. It is obviously conducted for the employment of more than one service (within NATO more than one nation) and must incorporate perspectives from the strategic and tactical levels, as well as considerations of civilian actors when these are considered necessary for comprehensive planning activities. 4.1. Operations planning Operations planning serves for several purposes. This is an integral part of preparing the Alliance to meet any future operational challenges. Operations planning can also prepare the Alliance for a possible future requirement to conduct crisis response operations. Planning is also a learning activity that promotes the shared situational awareness and understanding of the commander and staff. The terms operations planning and operational-level planning are used extensively throughout AJP - 5. To avoid ambiguity in understanding related expressions there are important NATO agreed definitions that guide and give the right direction for planners. Commanders and staff members at the strategic, operational and tactical level should adopt and grasp them for use in the planning effort. 4.2. Operation Operation is defined as a “military action or the carrying out of a strategic, tactical, service, training, or administrative military 101 mission; the process of carrying on combat, including movement, supply, attack, defence and manoeuvres needed to gain the objectives of any battle or campaign.” [9] (This term, therefore, must be understood as neutral regarding the level of planning). 4.3. Operational Level Operational level is defined as “the level at which campaigns and major operations are planned, conducted and sustained to accomplish strategic objectives within theatres or areas of operations.” [10] (This term affords appropriate differentiation). 4.4. Operational Art It is necessary to accent the role of Operational art. Doctrinal publication “NATO Glossary of Terms and Definitions” (AAP – 6) defines Operational art as “The employment of forces to attain strategic and/or operational objectives through the design, organization, integration and conduct of strategies, campaigns, major operations and battles. [11] (Within the planning process at the operational level, operational art can be described as the component of military art concerned with the theory and practice of planning, preparing, conducting, and sustaining campaigns and major operations aimed at accomplishing strategic or operational objectives in a given theatre.) [12] Simply told through Operational art, strategic objectives are converted into tactical activity in order to achieve a desired outcome. While the AJP - 5 (2006) states that “no specific level of command is solely concerned with operational art“, [13] the new version is not so unequivocal or 102 persuasive: “Operational art bears various meanings during the operational-level planning process, particularly in developing the operational design.” [14] From this point is not easy to ascertain whether doctrinal writers have stayed on the same platform as the previous one. If not, it could bring some doubts about the traditional role and place of Operational art. Operational art is the critical link between strategy and tactics. Strategy guides operational art by determining the ultimate objectives to be accomplished and by allocating the necessary resources. Strategy defines and imposes limitations on the use of combat forces to be successful, campaigns or major operations must be conducted within a framework of what is operationally and strategically possible. Due to this critical link between strategy and tactics, if operational art is poorly applied, no acceptable strategic ends can be achieved successfully. 5. Planning at different levels The NATO Crisis Management Process (NCMP) generally comprises six phases that are reflected and described in Allied Command Operations (ACO) Comprehensive Operations Planning Directive (COPD). Due to the requirements for the separate approval of CONOPS and OPLAN, Phase 4 (at the strategic, operational and tactical level) is further divided into Phase 4a and Phase 4b as depicted in Figure 1. Figure 1 Strategic and Operational level Crisis Response Planning in COPD [15] In terms of planning activities on strategic and operation levels there are the following successive phases in COPD: Phase 1 – Situational awareness Phase 2 – Operational Appreciation of Saceur’s Strategic Assessment and Assessment of Military Response Options Phase 3 – Operational Orientation Phase 4a – Operational CONOPS Development Phase 4b – Operation Plan Development Phase 5 – Execution/Campaign Assessment/OPLAN Review Phase 6 – Transition 6. Operational-Level Planning Process Description (OLPP). The OLPP is developed to support JFC and his staff in conducting operational-level planning. The steps presented can be rearranged and/or phased by the strategic commander (SC) to fit the planning circumstances, such as complexity or time constraints. While the Phases on the Strategic level are fully identical in its content in both publications (COPD and AJP – 5), there is a difference on the Operational level from the new AJP - 5 perspectives. Figure 2 Steps in OLPP in AJP – 5 [16] 103 The OLPP consists of the 8 steps to support a JFC and his staff in order to develop the operational level OPLAN including the conduct of the operational estimate process. The steps also comprise the campaign and operational assessment during execution in order to review or revise the plan, when required. These OLPP steps are: Step 1 - Initiation of the OLPP Step 2 - Problem and Mission Analysis Step 3 - Course of action (COA) development Step 4 - COA analysis Step 5 - COA validation and comparison Step 6 - Commander’s COA decision Step 7 - Operational-level CONOPS and OPLAN development Step 8 - Campaign assessment and plan review/revision 7. Comparison and Explanation Phases and Steps According to COPD, the Situational Awareness (SA) functions a separate Phase contrary to the new AJP-5 where it is in position of an ongoing process of gathering information throughout the operation, which is logical. This means, it is not listed as a separate phase or the so-called “STEP”. It is worth mentioning that SA process has remained on SACEUR´s level as a separate phase. Otherwise, the content of other steps in AJP - 5 is essentially identical to the activities in particular phases of COPD: Step 1 - Operational Orientation = Phase 2 Operational Appreciation of SACEUR's Strategic Assessment and Assessment of Military Response Options. Step 2 - Problem and Mission Analysis = Phase 3 Operational Orientation Steps: Step 3 - Courses of Action Development, Step 4 - Courses of Action Analysis, Step 5 - Courses of Action Comparison and Validation and Step 6 Commander's Courses of Action Decision, according to AJP - 5, are associated only with Course of Action (COA) elaboration until the Commander's approval of selected 104 COA has been made, without already "working" on the CONOPS, which is typical activity in COPD. Previously, including the development of CONOPS, it was characteristic within the content of Phase 4 - Operational CONOPS development. Step 7 - Operational-Level CONOPS and Plan development, however, incorporates this Phase 4a and thus contains also Phase 4b - Operational Plan Development. Step 8 - Campaign Assessment and Plan Review / Revision is not already addressed to conduct of the operation contrary to COPD, nevertheless this step is identical to Phase 5 - (Execution), Campaign Assessment / OPLAN Review. What is a remarkable in AJP-5 is that the Transition Phase is not depicted as a separate activity. Transition activities are included in Step 8, while in COPD are covered through a separate Phase 6 Transition. Generally, planning activities in AJP - 5 on the operational level are identical to COPD in its content although they are not depicted in the same way externally. 8. Conclusion Even though not adopted yet, the new AJP 5 ratification draft is on the road to being ratified and implemented. It may happen that the meaning of “operational planning” will not soon become obsolete in several months or even a few weeks. There are enough military planners still accustomed to understanding “operational planning” in its former sense. In order to prepare for and conduct military operations it is necessary to read and study all relevant publications applicable to the efficient and successful planning and conduct of operations. Although content of the article doesn’t cover all relevant issues and aspects of operations planning theory it warns about differences between basic planning doctrines and documents that are important for military planners. The new AJP - 5 doctrine is a valuable source of information not only for commanders and planners, but also for students in career courses, academics and all others interested in military issues. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] AJP-5, Allied Joint Doctrine for Operational-Level Planning (ratification draft 2). NATO Standardization Agency, 2012, p. x. Operational Design develops and refines a commander’s operational ideas to provide detailed, executable plans. It is underpinned by a clear understanding of the political and strategic context together with an effective framing of the problem. Structured processes, like the operational design concepts and related tools enable the operational design development. See AJP-5 p. 2-26. CONOPS - a clear and concise statement of the line of action chosen by a commander in order to accomplish his given mission. See AAP-6, p. 66. Operation plan (OPLAN) - a plan for a single or series of connected operations to be carried out simultaneously or in succession. It is usually based upon stated assumptions and is the form of directive employed by higher authority to permit subordinate commanders to prepare supporting plans and orders. See AAP-6, p. 156. For better understanding of operational design concepts see e.g. AJP-5, p. 2-26 – 2-40. AJP-5, p. 1-4 – 1-6. AJP-5, p. 1-13. AJP-5 p. 1-13. AAP-6, NATO Glossary of Terms and Definitions (English and French). NATO Standardization Agency. NATO Headquarters B - 1110 Brussels, Belgium. 2012, p. 154. AAP-6, p. 155. AAP-6, p. 155. AJP-5, p. 2-3. AJP-5, Allied Joint Doctrine for Operational Planning. NATO Standardization Agency, 2006, p. 3-3. AJP-5, Allied Joint Doctrine for Operational-Level Planning (ratification draft 2). NATO Standardization Agency, 2012, p. 2-4. ALLIED COMMAND OPERATIONS. Comprehensive Operations Planning Directive. Trial version, Supreme Headquarters Allied Power Europe, Belgium, 2010, p. 4-2. AJP-5, p. 3-63. 105 ARABIC AS THE SECOND FOREIGN LANGUAGE AT THE FACULTY OF ECONOMICS AND MANAGEMENT Mária Šikolová, Nataša Mocková Abstract: The paper deals with a newly designed Arabic course at the Faculty of Economics and Management of the University of Defence in Brno. After the events of the Arabic Spring, the importance of teaching this language to military professionals potentially deployed in the region has significantly grown. The authors analyse their results from the implementation of the innovative Arabic course based on their systematic observations, data gathering and processing. The authors have decided for this solution because Arabic language belongs to the most difficult world languages and the original teaching approach did not fully correspond to this fact. Moreover, the number of lessons is not sufficient and cannot be inflated. For these reasons, the authors have decided to address these issues as a whole by designing a brand-new course. This article presents the initial results gathered in the course and after the first semester. Keywords: Arabic, teaching approach, learning, military. 1. Introduction The Faculty of Economics and Management of the University of Defence puts an emphasis on teaching foreign languages. Apart from English, the Language Training Centre, which is a part of the University, offers several other languages as the second foreign language. Since the Academic Year 2011/2012, a new language has been introduced for the students of the 1st year of Bachelors’ study. This language is Arabic and although it is rarely taught in the Czech Republic, it is increasingly used in different military missions abroad. As the situation in the Middle East has been rather turbulent in recent decades, it is highly probable that military presence will be needed there in the future, too. Nevertheless, international troops including Czech units have already been deployed in the region for some time. The prevalent language spoken here is Arabic. 106 The University of Defence, as the only tertiary military educational institution in the Czech Republic, prepares its graduates for various purposes. One of the main tasks is to prepare the graduates for real military life, including military missions abroad. Apart from excellent physical condition and professional skills, the students have to acquire also language skills. While fluent communication in English is taken for granted, acquiring a basic level of Arabic can be helpful in establishing contacts between our soldiers and the local population, as it has been proved in other NATO units in the area. Therefore, the university management decided to introduce a course on basic Arabic for a group of selected 1st year Bachelors’ students at the Faculty of Economics and Management in the academic year 2011/2012. 2. Tradition in teaching Arabic in the Czech military environment As a matter of fact, teaching Arabic in the Czech military has had a long tradition. Arabic courses started to be run in the late seventies at the former Military Academy. They were designed for Czech officers who were supposed to work in Arab countries and at that time they were three-year courses organized in intensive three-week sessions, three times per academic year, altogether 513 ninety-minute lessons. The expected educational outputs were to master orthographic and phonetic systems of Modern Standard Arabic, and to be able to read, write and produce basic communication in Arabic. The 1989 Revolution in the Czech Republic resulted in temporarily diminishing interest in teaching Arabic for military purposes. However, the consequent geopolitical development in the world brought about the comeback of Arabic to the Czech military. After the year 2000, some Arabic courses were re-introduced, albeit on an irregular basis and for selected officers only. Since the University of Defence does not provide intensive language courses for officers, the Language Training Centre (part of the University) first offered Arabic as an optional nonintensive course for students of the Faculty of Economic and Management, which became very popular. As mentioned above, Arabic obtained a new, higher status at the University of Defence in the Academic Year 2011/2012 when it started to be taught as the second foreign language for a group of selected students (with the specialization in reconnaissance). It has been run as a non-intensive course with 13 ninety-minute lessons per semester, taught for 5 semesters, which gives altogether 65 lessons. 3. Teaching methods in Arabic course 3. 1. Difficulty Level of Arabic Language Arabic language is not an easy one, if compared with foreign languages commonly taught at the non-linguistic universities in the Czech Republic. It is unquestionably very complicated to assess the difficulty of a language, since its difficulty depends on many factors; to give an example, let us mention only the person’s mother tongue and their language aptitude. Nevertheless, the Foreign Service Institute (further FSI), which is the American Federal Government’s training institution for officers, diplomats and other personnel to serve abroad, has looked into this problem and its experts categorized the languages according to the number of lessons needed to learn a language if you are a native English speaker. They claim that after the specified time of study, learners will reach “Speaking 3: General Professional Proficiency in Speaking (S3)” and “Reading 3: General Professional Proficiency in Reading (R3)”. However, the internet source emphasizes that this ranking presents only the view of FSI. According to this classification, Arabic is in the highest class (5), together with Mandarin and Cantonese Chinese, Japanese and Korean. According to the FSI, to learn these languages to the above-mentioned level, it is necessary to learn 88 weeks (2200 hours). Czech language is in class 4 with 44 weeks and 1100 hours of instruction needed. However, the information available on various web pages presents the difficulty of Arabic more/less consistently in the highest ranks of difficulty. If we compare the number of hours recommended by the FSI with the length of Arabic courses in the military, we should realize that the number of lessons in the military is significantly lower – in courses in the seventies and 107 eighties it was more than 500 ninetyminute lessons, while at the moment in the university environment it is only 65 ninety-minute lessons per the whole Bachelors’ course. Nonetheless, it should be taken into account that the required outcome of teaching Arabic in the Czech military was and is significantly lower than Professional Working Proficiency; in terms of the Interagency Language Roundtable, the required level is closer to either Limited Working Proficiency (L2) or even Elementary Proficiency (L1). Thus, the number of lessons needed to achieve this level is also lower. 3.2. Modern Standard Arabic Generally speaking, there are three basic variants of Arabic language – Modern Standard Arabic, Classical (also known as Literary) and Colloquial Arabic. Modern Standard Arabic (MSA) is the language that is understood by all Arabic speakers. It is the language of written materials, as well as pan-Arab TV programmes, talks, films, etc. Classical Arabic is the language of Al-Qur’án and other classical literature. Modern Standard Arabic is based on Classical Arabic, but it is under constant development, as with other modern languages. Colloquial Arabic is represented by spoken language in various regions of the Arab World (regional dialects). They all are to certain extent similar to modern Standard Arabic, but they vary in both vocabulary and structure (Wightwick, Gaafar, 2007, xi). In the Czech military context, it is Modern Standard Arabic which is taught because it is considered to be the universal one. 3.3. Course design and teaching methods Both Arabic course design and the target population were different in the eighties from the present ones. Moreover, the teaching methods have changed substantially. While in the 108 eighties the grammar-translation method was prevalent also in the military environment in Czechoslovakia, the situation started to change in the nineties, which was most apparent in teaching English. However, teaching Arabic was not significantly affected by communicative approaches in the Czech military even after 2000 when Arabic was introduced as one of the optional subjects at the University of Defence. This was caused to a considerable extent by the textbook used which is based on a very traditional grammar pattern of teaching. We have realized that Arabic as a highly demanding language for Czech speakers might require a change in teaching methods. Although the motivation of students was quite high at the beginning of the course, it often diminished as soon as they realized how difficult the language is and how slow the progress in acquiring it is. Consequently, we have decided to change the essential approach to teaching Arabic. While in the past, students had to first learn all the letters of the Arabic alphabet (two 13-lesson semesters) to start learning basic words and phrases, in the new teaching model they started to learn some basic words and phrases from the very beginning of the course. This approach was partially inspired by a colleague of the authors, a linguist who started to learn Arabic and, later on, also Hebrew. And it was the Hebrew course where this method was commonly used. Even though this approach seems to be working in terms of intensifying students’ motivation, it is at the same time rather timeconsuming and demanding for us. It means in practice to design a brand new course and to develop most of the teaching materials. We also have to tackle the problem that the teaching materials bought by the university cannot be fully used because of the newly-introduced method. Another challenge to be addressed is providing the teaching materials since using photocopiers has been dramatically restricted. 4. New methodological approach and initial results 4.1. Theoretical background of the new approach The innovative approach is based on the fact that, in our opinion, language acquisition does not necessarily happen in a linear way. For instance, the linguistic specialists at the Hebrew Language Academy Charter School found that their “students can often listen to and recognize Hebrew words long before they are comfortable using them in their own writing or speaking”. Since Hebrew is typologically close to Arabic, we believe that the same pattern can be applied for teaching Arabic. Different linguistic theories perceive language acquisition in different way. On the one hand, Krashen claims that when learners are provided with comprehensible input, grammatical structures emerge in a predictable order. He claims that “structure emerges in second language performers in a more or less predictable order for adults” (Krashen, 1982, p 128). On the other hand, Menezes argues that “language learning is not a linear process, and therefore cannot be deemed as predictable as many models of SLA have hypothesized it to be”. 4.2. Implementation of new approach The rationale of the new approach was mentioned above. Now we would like to describe its novelty and to present the effects of this new approach on teaching as they were systematically observed and recorded by the teachers. All these results refer to the first semester in which the new approach was implemented. The new approach lies in the idea that basic words and phrases can be taught from the beginning of the course with a minimum knowledge of simplified grammar rules which is in accordance with Menez’s opinion, as stated above. Thus, the only limitation for teaching words and phrases is whether the students know the letters of the words. What this means in practice for us is to choose only the words formed by the letters that students have already learnt. After choosing the words we have to decide which of the words to use only for practising reading and writing and which of them to include into target vocabulary and phrases. It is also worth mentioning that all new teaching materials were provided in e-form only. The students downloaded them from the Arabic course in Learning Management System Moodle. Although this is not an ideal solution, it did not cause any serious problems. On the other hand, using the Internet for teaching purposes has also some advantages in comparison with a conventional teaching approach. We have particularly in mind using short videos which reinforce pronunciation, vocabulary and cultural awareness, even if they have not been used up to now. Nevertheless, they are intended to be systematically used in the next parts of the course. 4.3. Results At the very beginning of developing the new approach the authors wanted to find the answers to the following questions: 1. Is it possible to teach not only letters, but also and at the same time vocabulary with very limited grammar rules? 2. Can the learners learn both things at the same time? 3. Is this way of learning/teaching motivating for students/teachers? 4. Does this method have any limitations? If so, what? 5. Does this method induce any unexpected outcomes? To find the answers to these questions, we were systematically gathering and 109 recording the relevant data acquired during teaching, in observations and from the end-of-course questionnaire. One of the authors taught the course and she recorded all interesting findings after each lesson. The other one observed several lessons to add a fresh view. Moreover, the authors designed a brief questionnaire to find out the students’ opinions on the course content, teaching methods and most difficult areas of Arabic. The results they have gathered are as follows: As to the first question, we have come to a conclusion that teaching letters, vocabulary and only limited grammar rules is undoubtedly possible. Similarly, the learners have proved to be able to learn all things at the same time, although not without difficulties and not all of them at the same level. If compared with the previous teaching approach, we have appreciated the new approach since they found it highly motivating from the teaching point of view. Based on the results of the end-ofsemester questionnaire, the new approach has met the students’ expectations and they have all found the course interesting and motivating. Considering the fourth question, we have come to a conclusion that the most significant limitation is the number of lessons which is too low. Nevertheless, this is the limitation which can be addressed by neither the authors nor the students. To answer the fifth question, there definitely were some unexpected outcomes obviously induced by the new teaching method. The fact that the students were taught only a minimum amount of grammar has apparently led them to discover the grammar rules by themselves based on the given vocabulary and using it. On the other hand, the students have tried to apply the rules also where it was not possible. Another rather frequent mistake was missing out prepositions. There was also a problem of interference in two 110 different language phenomena – the first one with the verb “to have” and the second one with gender. The questionnaire was intended to find out students’ opinions on the course and its difficulty. 15 students started the course. However, only nine of them finished the first semester. Most of them expected to learn how to write and read, as well as to communicate in most common situations. The course met the expectations of all students. The students were also asked to specify the most difficult part of the course (writing, reading, vocabulary and grammar) on a scale from 1 (the easiest) to 5 (the most difficult). On average, the most difficult skill was vocabulary (3.33), followed by grammar (3.11) and reading (3.00). The easiest one was, surprisingly, writing (2.22). In the part of the questionnaire where the students were asked for any comments, they mentioned the following: “lessons were very intensive”, “I was very satisfied with the content, practical exercises and the teacher”, “more lessons would be needed”, “lessons were demanding, funny and interesting”. On practical grounds, we tried to include as many words needed in the military context as possible from the very beginning of the course. The vocabulary during the first semester with only 13 consonants and three vowels (all in Arabic) is very limited; however, we have included at least one military word (tank), and the names of some Arab countries and nationalities (Jordan, Libya, Libyan, Lebanon, Lebanese). Although the students were highly motivated, they admitted that the language was extremely difficult for them, especially learning vocabulary. They asked the teacher for advice on how to learn the vocabulary more easily and effectively. Since the learning strategies are highly individual, we tried to experiment with a generally likeable and acceptable method. The concrete idea came from an Arabic self-teaching academic worker, the former Faculty of Economics and Management student. The idea was to produce a Pexeso game with pairs of cards (one card – a picture, one card – the word in Arabic). The purpose was to help reinforce the vocabulary and to intensify the motivation. The result was highly positive – the students were very excited and obviously enjoyed the activity. To make the process a bit more structured and controlled, the learners were asked to create a sentence or a phrase for each word in the game and to submit it to the teacher at the end of the lesson in writing. Here are some examples of the sentences/phrases they have created: Where is Lebanon? This is a tank. I want cold beer. Where is my wine? I am a minister. Who is he? Where is he from? I visited my colleague. She has got a son. I saw a cold river. I want a flat. I have an excellent tank. I visited Libya. I want water. We had to make one more important decision while designing the course materials – it was whether to use nonvowelled texts in the teaching materials. To explain this, words in Arabic are written by consonants, and vowels are then added above or under the consonants. However, common texts are written with consonants only. So, a nonnative speaker is generally not able to read a word which they do not know. Contrary to the commonly accepted approach, as well as our own learning experience, non-vowelled texts are parts of each lesson from the very beginning of the course. The reason for this decision was the fact that the students might be exposed to these kinds of texts shortly after finishing their course. Moreover, the course itself consists of only a very low number of lessons, so including non-vowelled texts should be introduced as soon as possible. 5. Conclusion The purpose of the paper was to familiarize the readers, experts in the area of economics and management, with one of the building blocks in the training and education of military managers. The priority of professional military and academic skills at the University of Defence is obvious; nevertheless in practical life, supporting skills are also of high importance. We believe that our enthusiastic struggle in the area of teaching Arabic is fully in line with the University global concept of preparing professional soldiers for real life. References [1] [2] [3] [4] [5] Krashen, Stephen D. 1981. Second Language Acquisition and Second Language Learning. Pergamon Press. Wightwick, Jane, Gaafar, Mahmoud. 2007. Mastering Arabic. Palgrave Macmillan. P 3 – 4. <http://www.effectivelanguagelearning.com/language-guide/language-difficulty>. Accessed 2012 May 27. <http://www.hlacharterschool.org/Academics/hebrew.php>. Accessed June 4. Vera Lúcia Menezes de Oliveira e Paiva: <https://docs.google.com/viewer?a=v&q=cache:ERHrPKrA5zsJ:www.veramenez es.com/ailavera.pdf>. Accessed June 2. 111 COMPARISONS OF MILITARY POWER Vladimír Šilhan Abstract: The aim of the article is to provide comparison of the main indicators of military power among the individual countries, as well as between the EU in total and the USA and the global comparisons of the world’s biggest military powers. It also includes estimation of future trends. Due to the differences of various input data multiple information sources were used for comparison. Current evolvement of changes in military power indicates the shift of the centre of gravity aiming prevailingly eastward towards emergent and growing economical powers. Keywords: Military power, defence expenditures, number of forces, complex defence potential 1. Introduction Military power of the countries is determined by the conceptual, physical and moral factors. Focus of this analysis is, however, only on the physical factors, composed of the military systems and materiel, and of the personnel which are both the most costly parts of the military power. Changes in the military power of individual countries, whether progressive or not are successive and have significant level of persistence. Reviewing of the individual nation’s military strength is done by different subjects whose results are provided with a delay and it is important to note that they significantly differ. In addition, it is difficult to get them for some isolated countries where they are sometimes only estimated. Data of the European Defence Agency, SIPRI (Stockholm International Peace Institute), CIA World Factbook (further referred as CIA), IISS (International Institute for Security Studies) and from the portal GlobalFirepower (GFP) were considered as the main information sources for the analysis. 112 2. Comparison of the EU countries Characteristics of individual EU countries with regard to their armed forces developments illustrate a great diversity. As depicted in Chart 1, five biggest EU countries spend more than three fourths of the overall EU defence spending that amounted to 193,54 b€ in 2010. For the ten nations spending each more than 2% of the overall amount (sequenced as follows: United Kingdom, France, Germany, Italy, Spain, The Netherlands, Poland, Greece, Sweden and Belgium) is it even more than 91%. Great differences are underlined by the fact that on the other hand 12 countries with the lowest defence spending contribute to the total only with 3,55%. An interesting indicator is also the defence expenditure values after their conversion to those per capita. It can better reflect the importance put on defence regardless the size of countries, as shown in Chart 2. While the Czech Republic holds the 14th place in absolute values, it goes with the amount of 191€ down to the 17th place after the conversion per capita. It represents slightly less than half of the average EU value being 390 €. As well as for the absolute values and values per capita, United Kingdom and France are leading in both respects. It underlines domination of their armed forces in the region. Though Germany is placed just behind them in the absolute values it is preceded by the Netherlands, Finland, Sweden, Cyprus and Greece as regards values per capita. Last places when using this indicator pertain then to Romania, Latvia, Bulgaria and Lithuania. Chart 1: Relative national contributions to overall EU [1] defence spending [1] Chart 2: Amount of defence expenditures per capita Further very important indicator, related to capability developments, is level of investment (acquisitions and Research and Development - R&D) in particular when conversed to the number of soldiers as depicted in Chart 3. It demonstrates the biggest spending to one soldier in Luxembourg, Sweden, Great Britain, France, Netherlands and Germany. The lowest on the other hand in Malta, Romania, Bulgaria and Latvia. Chart 3: Investments per soldier [1] Another requisite measure of military power is the number of soldiers, and to some extent also civilians employed in ministries of defence. Their overall numbers Chart 4: Sustainable, deployable and deployed forces [1] (in thousands), numbers of soldiers equivalent to the amount population and proportion of civilian and military employees can be deduced from Chart 5. Chart 5 (composite): Numbers of military and civilian personnel [1] 113 While it is logical and well known that the most of personnel is employed in the armed forces of the biggest EU countries, i.e. in France, Germany, United Kingdom and Italy, it can be seen that by far the biggest relative numbers are due to the known political situation evident for Cyprus and Greece. They have after the four above mentioned countries and Spain the biggest armed forces also in the absolute values. Significantly above-average is in the relative values also Finland and Malta. The lowest numbers have on the other hand Luxembourg and Sweden that has, however, traditionally big mobilisation potential (held up by the fact that conscript service was abandoned only since July 2010 and experience of former conscripts is still largely preserved). Low numbers have also Latvia, Hungary, Ireland and the Czech Republic (2,21 while average number in the EU is 3,86). In the case of the Czech Republic, as well as of Sweden, low relative numbers of soldiers to the population are partly compensated by the conversely aboveaverage rate of civilian employees to the overall defence personnel, namely 27,4% in the case of the Czech Republic to compare with 18,39% being an EU average rate. The higher rate is only in Slovakia, Sweden, United Kingdom and Poland. Evidently lowest proportion has conversely Malta, Belgium, Cyprus, Ireland and Greece. The last but not least important characteristics of the military power that should give evidence on the preparedness of troops for operations and on their real employment is also amount of the sustainable, deployable and deployed armed forces, all related to the force strengths as displayed in the Chart 4. Data on Germany, Estonia and Latvia are unfortunately missing as they were not provided. It can be seen from the chart that the Czech Republic is in the total of all those three operational characteristics just next to the United Kingdom, France, the Netherlands and Spain. As for the real operational employment, the highest amount belonged in 2010 to the Netherlands, United Kingdom and Sweden reaching 7-8%, while for employable forces to United Kingdom, Spain, Netherlands, France and the Czech Republic being in the extent 36,5-40%. Highest level of long-term sustainability declares Sweden, France and United Kingdom amounting to 10-14% followed by Ireland and Germany with 7,5-9% of their armed forces. 3. Comparison of the EU and US military potentials While the EU countries have in total higher GDP and state budget, the USA spends much more on their defence [2]. It was 2,7 times more in 2010, see Charts 6 and 7 showing also evolution of all three indicators, i.e. GDP, state budget (SB) and defence expenditures (DE) within last five years. For the EU, percentage of the defence expenditures to the GDP amounted to 1,6% whereas for the USA up to 4,8%. For defence expenditures related to the state budget, proportion is then 3,2% at the EU side and 11.2% for the USA. Chart 6: GDP, SB and DE in EU and USA in 2006-2010 [2] Chart 7: GDP, SB and DE per capita in EU and USA in 2006-2010 [2] 114 When comparing defence expenditures per capita, US numbers, as shown in Chart 7, overwhelmed those of the EU more than four times in 2010. Similarly higher in favour of the USA were the ratios for the state budget and for GDP. Another chart, number 8, provides information on an amount and structure of defence expenditures on the EU and US sides that also shows the US supremacy. While estimated that the overall amount of investment is about 3,5 times higher in favour of the USA then as for Research and Development (R&D) expenditures, which include acquisitions, US dominance raised within last five years from about 5,5 to 6,8 multiple. Furthermore, as for the Research and Technology (R&T) moves within the extent of 2,8 and 4,8 multiple. It is, however, important to note that based on the national experience, which may not be unique within the EU, many of subsidised R&T projects and activities have not real practical effects due to, inter alia, low level of coordination and competition among the EU countries. Using the chart, one can also compare proportions between personnel expenditures, investments and common expenses. At the EU side information on expenditures focused on infrastructure and buildings are also provided. It is evident from the comparison that in the EU countries higher spending goes in favour of personnel expenditures at the expense of investments and common expenses whereas at the US side all items are almost equal since 2007 when personnel expenditures were reduced. It can be also seen from the chart that while in the EU countries the sum of all three items was slightly descending, the trend in the USA was inverse, in particular in 2009 and 2010. Chart 8: Structure of EU and US def. expenditures [2] Chart 9: Numbers of soldiers, deployed soldiers and civilian employees in EU and USA [2] The last compared indicators of military power provided in this part let be the relations between the amounts of personnel. It is apparent from Chart 9 that overall numbers were very similar in 2008, i.e. in the middle of comparing period. They are, however, steadily significantly descending as for the EU while going slightly up at the US side. The same tendency is evident for the military and civilian personnel. The second substantial difference is that despite of significant reductions of numbers there are still about 200 thousand more soldiers at the EU side but almost about 400 hundred thousand less civilian employees. The last considerably noticeable difference concerns deployed forces. Their numbers steadily slowly decrease from more than 80 thousand to some 66 thousand at the EU side whereas their numbers oscillate along 200 thousand with a positive deflection amounting 230 thousand in 2009 as for the USA. In average, number of operationally deployed personnel has been about three times higher in the USA than in the EU that is another great difference regarding military power indicators. 4. Global comparisons CIA, SIPRI, IISS and GFP data have been used as the main information sources for comparisons in global extent. Evaluation of all world countries is very difficult and often ambiguous because for 115 some of them credible information is lacking. Therefore data from various information sources significantly differ. An important factor for evaluation results is also comparison methodology. Although the main baseline to which indicators are referenced is chiefly Gross Domestic Product (GDP) it is difficultly comparable among various categories of countries. Therefore for instance CIA conveys it using Purchasing Power Parity (PPP) [3] and their data are then distinct from those already demonstrated for comparisons between the EU and USA, see Chart 6. For illustration, 28 nations having the highest values of GDP/DPP are given in table 1 with the addition of the Czech Republic for illustration of distinction [4]. State 15 390 15 040 11 300 4 463 4 389 3 085 2 373 2 284 2 250 11 12 13 14 15 16 17 18 19 Italia Mexico South Korea Spain Canada Indonesia Turkey Iran Australia 1 826 1 657 1 554 1 411 1 389 1 121 1 053 928,9 917,7 21 22 23 24 25 26 27 28 …. Poland Argentina Netherlands Saudi Arabia Thailand SAR Egypt Pakistan …………… 765,6 709,7 705,7 676,7 609,8 554,6 515,4 488,0 ……. 2 214 20 Taiwan 885,3 46 Czech republic 227,2 Both from Table 1 and subsequent charts growing economical and military importance of the BRIC [5] countries, that belong to leading powers, is evident as well as the changing balance of power in the world in favour of the biggest Asians economics, in particular China, India and Japan. Other two charts, i.e. number 10 and 11 provide information on defence expenditures for twenty biggest spenders, GDP /PPP [b$] Rank France State GDP /PPP [b$] 10 Rank 1 2 3 4 5 6 7 8 9 State (+ EU as a whole) EU USA China India Japan Germany Russia Brazil United Kingdom GDP /PPP [b$] Rank Table 1: Ranking of countries according to the GDP converted to PPP based on CIA data [4] based on the CIA and SIPRI data, respectively, while the next one (No. 12) for only ten biggest available from IISS. All three charts exhibit also the extent of differences among the main information sources. For basic comparison let be also mentioned that overall spending estimate for all world’s countries is not so diverse, namely 2157,2 b$ and 1584,2 b€ according to the CIA and SIPRI data, respectively. Chart 10: Distribution of defence expenditures, CIA data [6] Chart 11: Distribution of defence expenditures, SIPRI data [7,10] 116 Chart 12: Distribution of defence expenditures IISS data [8] Comparison of all three charts illustrates very considerable differences in proportions, pertinence to and ranking of the countries with biggest defence spending. Expenditures of all world countries might be according to the IISS data (for 2011) distributed among the main regions and strongest countries in the following way: - North America 47,0% - out of that USA 45,7%; - Europe 18,3% - out of that United Kingdom 3,9%, France 3,6%, Germany 2,7%, remaining NATO nations 7.8% and other nations 1,6%; - Russia 3,3%; - Asia together with Australia and Oceania 18,5% - out of that China 5,5%, Japan 3.6% and India 2,3%; - Middle East and Northern Africa 7,9% - out of that Saudi Arabia 2,9%; - Latin America and Caribbean 4,1% out of that Brazil 2,3% and - Sub-Saharan Africa 1.0%. In this respect order of countries with biggest spending related to GDP is given according to the CIA [6], SIPRI [7] and for the first ten countries according to ISSS [8] available data, in Chart 13, explicitly for the countries exceeding 5% level. Chart 13: Countries with highest percentage of defence expenditures to GDP according to SIPRI, CIA a IISS [6,7,8] It is worth mentioning that data on Eritrea are outdated in SIPRI database. The last very high amount relates to 2003 while in 1999 reached even 34,4%. Though current situation will probably be more close to the second given amount provided by CIA, SIPRI information is kept as well, at least in order to demonstrate extent of possible disproportions among individual sources for some nations. Furthermore, reliable information on North Korea is not provided by any of the sources. They are only briefly described in newest ISSS information declaring that official defence budget of North Korea is around 1,5 billion USD but that it may reach up to the 5 billion. It would represent with estimated GDP of 20 billion USD military portion reaching up to 25% [10], whereas according to [11] real expenses touched even amount of 9 billion USD in 2009. 5. Number of forces Another very important indicator of the military power is number of soldiers while their most important part is active soldiers. Those should have, according to the SIPRI data, by far the most China, followed by the USA, India, North Korea and Russia with numbers overreaching 1 million, as displayed in Chart 14. By comparing it with data in Chart 5 it can be noticed that information differ most significantly in case of France and Italy which might be caused by counting considerable numbers of „Gendarmerie Nationale“ and „Carabinieri“ in case of France and Italy, respectively, both falling into the competence of their respective MoDs. 117 Chart 14: Ranking of countries according to numbers of active soldiers (in thousands) [9] Among relevant factors of military power, total forces, composed besides the active also by reserve and paramilitary forces, should neither be omitted. It is, however, particularly complicated to compare strength of active reserves of individual nations due to varied national rules and laws declaring which reserve soldiers and how can be employed. Despite, respective data are regularly published for instance by SIPRI. Based on such data overview of total forces for nations holding more than 400 thousand of them is displayed in Chart 15. Numbers of reserves and paramilitary forces are there offered in descriptive labels to the bars of the chart. Chart 15: Countries with highest numbers of total forces (in thousands) [9] 6. Complex defence potential of the strongest countries Attempt for complex comparison of defence potential is represented by the portal GFP [12] by assessing 55 militarily strongest countries using 42 different parameters which include manpower, amount and quality of ground, air and naval systems, geography, infrastructure, natural and financial resources. Ranking of all 55 countries, displayed by a straight line, is provided in Chart 16 composed of two concurred parts. For comparison, rankings of the same nations according to defence expenditures, based on CIA and SIPRI data, are put to the chart as well. It can be deduced from the chart that the highest disproportions of the evaluated 118 positions between the GFP and other two information sources are evident for Ukraine, Philippines and Switzerland, as well as to a great extent also for Argentine, Finland, Libya and Denmark. Relatively very high GFP evaluation of the Swiss military power could result from the high mobilisation potential (within the concept of total forces) and the advanced infrastructure. On the other hand, ranking of Greece and Spain seems be significantly lower than should correspond to their defence expenditures. Between values of defence expenditures counted by CIA and SIPRI, the most striking differences are apparent for Egypt, Sweden, Switzerland, Ethiopia, Portugal, Georgia, Afghanistan, Nepal and Qatar. Chart 16: CIA and SIPRI ranking of countries with highest defence expenditures compared to GFP evaluation of the complex military power – part 1 a 2 [6,7,11] 7. Trends of future development After publishing the newest ISSS data and other topical information from the area of military advances the highest attention of defence analysts was attracted by two important facts. First, that China escalates its defence expenditures, specifically probably by more than 11% [13] and second, by the estimation that for the first time in history Asia would overtake Europe in regard of defence spending [14]. While the USA is maintaining its clear dominancy, the most important tendency appears to be especially the change of balance between Europe and Asia. In particular China and India, as emerging and quickly developing economies, strengthen also their military potentials. Concurrently potential of Russia is also quickly growing and consequently that of the BRIC as well. Such trends may be also exemplified by the respective data on the main defence spenders as provided in Chart 17 showing spending changes within last ten years [15]. Based on that data, noticeable growth of the three main BRIC countries, USA and Saudi Arabia is apparent on one side while on the other, except for the UK, perceivable decrease or stagnation in the biggest EU countries and Japan. Chart 17: Percentage change of defence expenditures (2001 to 2010) in ten biggest spenders [14] There are also some noticeable changes as concerns the arms trade. One of them is that overall amount of imports raised according to the SIPRI data by 24% within five years. [16] Regarding individual nations, China starts to be an important exporter of its own weapon systems and consequently dropped in the amount of imports from the second to the fourth place, behind South Korea and Pakistan. Singapore shifted from the seventh to the fifth place while Greece from the fourth to the tens though it still remains the biggest EU importer and remained together with the UK and Norway among the only EU importers placed among the first twenty. Conversely, ranking of the five biggest exporters did not change and those countries, namely the USA, Russia, Germany, France and UK control about 75% of the whole export volume. 119 8. Conclusions Elaborated analysis revealed complexity of an attempt to determine and compare military power of selected nations. It is underlined by significantly distinct data from different sources in particular as for the countries that are not transparent enough in terms of their defence expenditures and arms trade. Some more sources of information could be evidently used which was not, however, an aim of the analysis. On the contrary, only the sources recognised by the international community as the most relevant were utilised. Rendered comparisons are revealing a disquieting fact that many European countries, in particular, are trying to solve impacts of the world economical crisis to a large extent by weakening their military power. With the aim to keep standards of living of the population and influenced by the public opinion, security and in particular external security topics tend to be curtailed. Accentuated effect of continuing changes in the global strategic balance is shifting eastwards. Due to the growing strength and power of China, Russia and India, attention of the USA is more focusing on Asia. When multiplied by the influence of the deepening economical crisis it should inevitably lead to the US extenuated presence and attention to Europe and thus to NATO as well. Current trends should give an impetus to the EU countries for taking internal security issues more seriously than thus far and invest more in support of military and defence capability developments. Article was elaborated in support of the research project „Trends, Risks and Scenarios of Security Development in the World, Europe and the Czech Republic: Impacts on Security Policy and System of Security in the Czech Republic“, VG2012013009. References [1] [2] [3] [4] [5] [6] [7] [8] 120 Pires, M.-L. Europe and United States Defence Expenditure in 2010, EDA 2012. Available at: <http://www.eda.europa.eu/Libraries/Documents/EUUS_Defence_Data_2010.sflb.ashx >. Pires, M.-L. Europe and United States Defence Expenditure in 2010, EDA 2012. Available at: <http://www.eda.europa.eu/Libraries/Documents/EUUS_Defence_Data_2010.sflb.ashx >. GDP in exchange rates related to the PPP (Purchasing Power Parity) represents the overall amount of all goods and services originated from a country and related to prices prevailing in the USA. Country Comparison :: GDP (purchasing power parity). Available at: <https://www.cia.gov/ library/publications/the-world-factbook/rankorder/ 2001rank. html>. BRIC = Brazil, Russia, India and China and sometimes also South Africa though opinions on its pertinence to the group are not unique, see for instance: <http://mg.co.za/article/2012-03-23-sa-presence-drags-down-brics>. Country Comparison:: Military expenditures. Available at: <https://www.cia.gov/library/ publications/the-world-factbook/rankorder/ 2034rank.html>. The SIPRI Military Expenditure Database. Dostupný na: <http://milexdata.sipri.org>. Military Balance, Figure: Comparative Defence Statistics - Defence Budgets and Expenditures. Available at: <http://www.iiss.org/publications/military-balance/themilitary-balance-2012/press-statement/figure-comparative-defence-statistics>. [9] SIPRI Publications. Available at : <http://www.sipri.org/publications> [10] The Conventional Military Balance on the Korean Peninsula, IISS. Available at: <http://www. iiss.org/publications/strategic-dossiers/north-korean-dossier/north-koreasweapons-programmes-a-net-asses/the-conventional-military-balance-on-the-kore/>. [11] Grevatt, J. Analysts reveal 'real' North Korea 2009 defence budget. Available at: <http://www. janes.com/ products/janes/defence-security-report.aspx?id=1065928818>. [12] GFP, GlobalFirepower.COM, Strength in Numbers. Available at: http://www.globalfirepower. com>. [13] China’s Defense Budget. Available at: //www.globalsecurity.org/military/world/ china/budget. htm>. [14] Charting the shift in defence spending, New thinking from the International Institute for Strategic Studies, IISS Voices. Available at: <http://iissvoicesblog.wordpress.com/2012/03/08/ charting-the-shift-in-defencespending>. [15] The top 10 military spenders: increase from 2001 to 2010. Available at: <http://www.sipri.org/ research/ armaments/milex/resultoutput/trendCharts/Top10bubble/top10bubble2010/image_view _ fullscreen>. [16] Holtom, P., Bromley, M., Wezeman, P., Wezeman, S. Trends in International Arms Transfers, 2011, SIPRI Fact Sheet, March 2012. Available at: <http://books.sipri.org/product_info?c_product_ id=443 >. 121 RISK MANAGEMENT IN SYSTEMS OF “SECURITY” AND “SAFETY” Marek Šolc Abstract: The article deals with the issue of “security” and “safety” in the system of risk management. Specifically, it discusses the importance of security in today's society, briefly describes the difference between the terms “security” and “safety”, and describes the safety analysis in “safety” and “security” systems. Subsequently, the article describes the management of security within the security and safety systems in the Czech Republic and Slovak Republic. Keywords: Security, Safety, Legislation, Risk Management 1. Introduction At the beginning of the industrial revolution there was the technical equipment for security, at a very low level. Over time, technology has grown in connection with the increased degree of complexity of systems and devices, and constantly increasing demands for safety, and therefore must be systematically assessed with respect to a person who works there, and the person who moves after work only as a third party. Therefore, it must be the goal of all the activities, that a person is not in danger. The European Agency collects statistics on OSH and surveys from around the world. One way of comparing the health and safety systems in the EU Member States is the annually announced “week of safety and health”. Some statistics in recent years in the area of OSH: - every three and a half minutes somebody in the EU dies from workrelated causes; - each year in the EU, 142,400 people die as a result of illness and 8900 122 people as a result of an accident at work; - up to one third of the total 150,000 deaths each year can be attributed to hazardous substances in the workplace in the EU, including 21,000 deaths caused by exposure to asbestos (Šolc, 2010). The Slovak Republic, like the Czech Republic, became part of the European Community in 2004. Through the stage of accession negotiations, the Slovak Republic (SR) gradually assumed different regulations, and full implementation was completed at the time of its admission to the European Community. This process involves the OSH-Safety, as well as the area of civil security - Security, and experts from the areas of health and safety worked in accordance with European legislation in advance. The Slovak Republic belongs to the countries, which pay in the past prevention of accidents systematic attention to modern legislation. As a result of these activities the conditions were created for acceptance of a safety culture in all groups, social partners, employees, employers and government. SR is its geographic location in terms of aspects of civil security - security gateway to the EU in its eastern border with Ukraine. Due to this fact, in this territory all safety standards followed, providing tightly controlled movement along the border. SR is also the gateway of energy carriers, oil and gas, which are a precondition for maintaining energy security not only for Slovak Republic, but also in other EU countries. It is this fact which classifies SR into a group of strategically important countries in terms of citizens' security. 2. The importance of security in today's society One of the key issues in terms of the risks is security that characterizes the state with minimal risk. It represents the final state to which the company aspires to achieve, to be able to develop optimally. Term safety is a paired term with the concept of danger. It is therefore one of the two opposing states of existence of natural, social, but also man-made technical or technological systems, which may be present during its existence. The level of safety of the company and each individual is generated by a wide variety of different factors. These factors affect the processes and activities necessary to achieve the objectives. Safety may be affected, for example: - Policy makers - based on the nature and form of political power, the system of government, the position of law in international affairs and its acceptance of international organizations; - Legal factors - the creation of effective tools for the smooth running of social processes; - Military officials - under the state's ability to ensure the inviolability of its borders and defend itself, or on the basis of their membership in various international communities and military defense pacts; - Internal-security factors - related to ensuring the protection of people, property, cultural and social values, but also the environment in any situation, including emergencies; - Economic factors - are based on a well-functioning economy, the state, its structure and ability to respond to crisis events affecting the stability and economic development due to changes in the external environment, such as the state's ability to generate an acceptable standard of living of citizens; - Social factors - related to the provision of the laws guaranteeing the level of social conditions for human life at every stage; - Ecological factors - creating the conditions for life on our planet, in all its regional and territorial units and maintaining these prescribed standards, also for future generations; - Technical and technological factors to carry on activities related to the production and provision of services for the benefit of society and without compromising humans, nature, but also the economy; - Energy officials - are based on coverage of all the energy needs of society, from the security of production and service, to ensuring the security of households; - Information factors - creating the conditions necessary for the level of awareness of the facts necessary for the life of every individual, various simplifying administrative processes and ensuring the privacy of individuals and the protection of classified information defined by the State. Security has its internal and external dimensions. Internal security is based on the interpretation of its own state of the 123 subject and ability to reduce the risks that may threaten it. It is always ready to run in order to preserve it. External security is based on the level and nature of external threats and, on the other hand, the effect of different security features of social life (military, political, economic). It is ready and able to cause toward with other objects that affect the security and quality of the object are able to participate in a safety. Safety, however, must be seen, assessed and externally presented together as a complex and multi-dimensional structured wide phenomenon, which relates to the protection of life, liberty and property of citizens, society and its spiritual values, and the state as a whole. The principal means of achieving the required level of safety of the individual and society as a whole is: - Defense law, aimed at preventing a disruption of the integrity and sovereignty of the country from the outside, but also specific internal threats, - Protecting people, property and the environment, which aims at eliminating the consequences of the negative impact of the crisis situations (incidents) due to anthropogenic activities, and action of a negative natural factors, - System of internal safety and security order in the country, aims to eliminate the consequences of disruption law and order of the country and eliminate the negative impacts of crime, terrorism and the 124 various manifestations of antisocial behavior (Šimák, 2006). 3. The terminology of concepts of “security” and “safety” Security (Protecting citizen-civil security) – within the framework security means the system of measures, forms and methods of protection against the destructive effects of action into human and material values in order to cause damage. The prime mover is mostly human. Part of the civil safety is minimizing the consequences of the risks that arise as a result of major industrial accidents, as well as adverse events that may endanger strangers in substantial quantities (powerline, pipeline). Safety (Health and safety at work and safety of technical systems) – safety characterized by a set, form and interconnections, minimizing measures of physical, social, financial, mechanical, chemical, psychological and other types of risks, and the creation of a system of activities to prevent and protect the human and material values in society. Damage occurs as a result of unintended negative interactions in the system. 4. Safety analysis in the systems of “security” and “safety” Currently, there are high demands on technical and technological equipment (complex mechanical systems, various machinery, tools). The properties of these entities are now perceived in a broad sense and include the requirement. (Table 1) Table 1 Facilities technical and technological equipment (Sinay, 2011) Feature Functional Compliance with delivery date Economy Long life Characteristic Compliance with defined roles the The ability to deliver product quickly and within the agreed time Economical manufacture and subsequent operation of the equipment Long enough and safe operation Protecting the environment No unauthorized loading of the environment during production, operation, and reassessment Health and Safety at Work- Safe created working environment or technology Safety The safety of technical Safely construction machinery, machine systems and equipment-Safety complex technical and technological equipment. Civil Security-Security Safe conditions for living for citizens Transport With limited costs and safe transport to its destination Qualification The ability of managers to use management tools Maintenance Safety during maintenance, ensure safe materials and spare parts To avoid the creation a risk of failure/accident, it is necessary to identify appropriate countermeasures timely. In connection with the implementation of effective actions to minimize the risks (OSH and safety of technical equipment, the civil security) there is a need to know the real state of the art equipment, as part of the system man - machine - environment. It is necessary to record information characterizing operation conditions and time of operation of technical equipment, in order to determine the value of its real technical condition. In the system, manmachine-environment, the human factor in terms of security as well as in terms of safety plays a crucial role. Within the safety, it is the consequences resulting from unplanned activities which occur in most cases as an end product of failure of man. Within the security it can use the concept dangerous man. Its aim is to establish a causal dependency with a negative phenomenon, so at that stage the damage was the fullest. With regard to the overlap of activities within the safety and security management, it is important to focus and integral assessment of exposure of the human factor, and in terms of the achievement of the final objective, protection of all components of the human-machineenvironment. Creating effective options to minimize harm within the safety, so too security, has a common basis. In both cases, we try to find ways, means and methods for interruption of causal dependence of negative phenomenon. These procedures must be included in the scientific and research activities in different countries, but especially in the field of security, and also international research consortia. Safety and reliability of the machine must be systematically monitored, controlled, and conditions must be created to minimize the negative effects through disruption of causal dependence disorders, accident, injury, thus minimizing the risks. Operators of technical equipment must know usage 125 methodologies and tools for performing these activities and must have created the appropriate organization of management to enable the machines and equipment to be operated safely. One of the effective methods for implementation of these activities is a summary of the activities of the maintenance technologies, and in particular its part – Technical diagnostics (Sinay, 2011) 5. Management of safety and security in the Czech Republic and Slovak Republic In the Czech Republic, as part of the European structures, it is possible to define legislative support within the frame of security, mainly of the following laws: - Law no. 1/1993 Coll. - Constitution of the Czech Republic; - Law no. 239/2000 Coll. – on Integrated rescue system; - Law no. 374/201 Coll. – on Emergency medical service. In the Slovak Republic, as part of the European structures, it is possible to define legislative support within the frame of security, mainly of the following laws: - Law no. 460/1992 - Constitution of the Slovak Republic; - Law no. 129/2002 - on Integrated rescue system; - Law no. 579/2004 on Emergency medical service. The central system of management activities within the civil security is concentrated within the Ministry of Interior of the Slovak Republic. On this level will be provided training in all areas of civil security, which includes also the publication of documents. The implementation of activities under the protection of civil safety is mainly undertaken by the Ministry of Interior and Ministry of Defense, which guarantee the preparation of conception, analysis and proposal of legislative laws. 126 In some areas of life are also: - Ministry of Environment - floods, industrial accidents; - Nuclear Regulatory Authority - the area of nuclear energy; - Ministry of Economy - economic mobilization; - Ministry of Health - protection of health. In the Czech Republic, it is possible to define a strategic legislative support within the frame of safety, mainly of the following laws: - Law no. 1/1993 Coll. - Constitution of the Czech Republic; - Law no. 262/2006 Coll. – on Labour code; - Law no. 309/2006 Coll. - Act on further securing the conditions of health and safety at work; - Law no. 251/2005 Coll. – on Labour Inspection; - Law no. 258/2000 Coll. - on the Protection of public health; - Law no. 59/2006 Coll. - on the Prevention of accidents. In the Slovak Republic, it is possible to define a strategic legislative support within the frame of safety, mainly of the following laws: - Law no. 460/1992 - Constitution of the Slovak Republic; - Law no. 311/2001 - on Labour code, - Law no. 124/2006 Coll. - on Safety and Health at Work; - Law no. 125/2006 Coll. - on Labour Inspection; - Law no. 355/2007 Coll. - on the Protection, Promotion and Development of Public Health; - Law no. 261/2002 Coll. - on the Prevention of Major Industrial Accidents. The diversification of business creates a complex relationship of a comprehensive safety management within the SR. Then, the system creates the effective power in the international network of activities, and legislative instruments which are compatible with these are used in international communities. Field safety is primarily the responsibility of the Ministry of Labour, Social Affairs and Family of the Slovak Republic - in some areas also of the Ministry of Interior and the Ministry of Defence and for mining technology it is the Ministry of Economy, and in accordance with international agreements this is the highest authority in the field of health and safety at work of the National Labour Inspectorate NLI. With respect to management activities within safety (OSH), is characterized in SR by compared to most economically developed countries in that area of occupational medicine (risks arising from the direct hazards of health at work) is the responsibility of the Ministry of Health of the Slovak Republic. What may be regarded as a shortcoming in the current conditions in the security activity is that no interagency system was formed for security management and security system, especially for carrying out research activities to link up to the global projects of research teams within the EU and outside Europe in world structures. Only the integration of research activities will create conditions for defining projects by state agencies such as the internal policy of the State, therefore SR will create conditions to ensure that our research subjects will participate effectively in teams within the European Research Area. It is quite obvious that the limited research capacities will not allow participation of Slovak organizations in all activities with the same frequency. Therefore, it is necessary to define the strategic areas in which the Slovak Research Area has potential to cooperate (humane area, material security research base SR). For lack of strategy of security can be considered the fact that there is no discussion on the need for carrying out research in the field of security, whether in the Slovak or European Research Area. This is not highlighted in the fact of globalization, which has resulted in the natural implantation of such types of risks, that are not till now known or important within the SR. As a result of their existence there is a changing relationship between internal and external security. Groupings and individual countries have become interdependent on vital resources, including food, which drives the common implementation of all policies and measures within the civil security. For the Slovak Republic there is significant care for Energy media, primarily oil and gas, which must provide transportation for SR and its allies in Europe. 6. Conclusion Areas of safety and security in many respects overlap, influence, and we can say that together form a comprehensive system of protection of life, health and property of citizens. Among grouped components of areas safety and security belong (Sinay, 2011): - Subject of that act must be safe, and are mainly people (employees - such as safety or others outside of the technical subject-security); - The space in which areas acting (every business is physically part of the State - environments in system of man-machine-environment and is subject to the government regulations); - Prevention, a way of protecting a subject over time and space, must be performed so as to minimize the risks already in phases of danger or threat. Since the current understanding of the concept of security in the broad sense is based on the precautionary or preventive area of health and safety at work, as well as the safety of technical systems 127 safety, as well as, area of civil securitysecurity, often uses the same means of diagnosis for early identification of the possibility of failure, accidents and injuries. Accident or injury of people outside technical equipment may arise as a result of a technical failure of the system. References [1] [2] [3] [4] [5] [6] 128 Niektoré poznámky k vzájomnému vzťahu Safety a Security, Konferencia Bezpečnosť a ochrana zdraví pri práci 2010, VŠB- TU Ostrava, MPaSV ČR, máj 2010, str. 244-250, ISBN: 978-80-248-2207-5. Sinay, J., Bezpečná technika, bezpečné pracovisko- atribúty prosperujúcej spoločnosti, Technická univerzita v Košiciach, SjF, 2011, ISBN 978-80-5530750-3. Sinay, J.: Údržba a riziká- ich vzájomná interakcia v podmienkach Safety a Security, Setkáni vrcholových manažéru k problematice postavení údržby v managementu rizík, Česká společnosť pro údržbu, Praha 2011, p. 27-36, ISBN 978-80-213-2172-4. Šimák, L., 2006. Manažment rizík. Žilinská univerzita v Žiline, FŠI, 2006. Šolc, M., 2010. OHS management systems as a tool for effective management of business, Manažment v teórii a praxi 4, p. 48-56. Thoma, K., Security research and safety aspects in Slovakia, European perspectives on security research, Berlin Heidelberg, Springer 2011, p. 81-89., ISBN 978-3-645-18218-1, ISSN 1861-9924. ORGANIZATION CONTINUITY PLANNING & MANAGEMENT AND SOCIETAL SECURITY SCENARIOS Jiří F. Urbánek, Jitka Raclavská, Albert Srník, Olga Šifferová and Jaroslav Vonlehmden Abstract: This article brings quite new knowledge from societal security scenarios of civil, property and infrastructure protection. It includes description, analysis, clear technical and technological schemata of pertinent standard implementation of organizaton´s Continuity Planning and Management, especially ISO 22301 and ISO/DIS 22313. These and consequent standards are expected for human and social sciences and practice for a long period of time. They will be very helpful for state and municipal authorities and their organizations, as well as for the common population. They will provide a great contribution to common people’s lives, similar to the ISO 9001-4:2000/2008, which was very important for production organization total quality management. In this paper also, fundamental knowledge is published from special scenario methodology design. It also takes into account the possibilities of maximum use of computerised aid and assistance for modelling, using the method DYVELOP in future. It is an insight into problem clarification and implementation of process and logistic access and it corresponds with the most common contemporary trends, increasing implementing process effectiveness. This contributed paper is a result of the Faculty of Economics and Management, University of Defence, Development Project titled Security Laboratory supported by Czech Ministry of Defence. Keywords: Continuity plan and management standards & scenarios 1. Introduction The systems and processes of prosperous organizations at the beginning of 21st century embody the characters, property and behaviour resulting from their cooperative or competitive globalization. The globalization takes place on many levels, however standardization and security levels are especially treated in this paper. Efficient global organizational systems are distinguished by high connectivity, complexity and radical demand on interoperability. The result of their mutual bindings is evocatory pertinent relations among participating players' entities of these systems. These entities are never only in cooperative relations! But there have always been numerous portfolios of participating "enemies", which are in apparent or hidden opposing roles within a prosperous organization system. They can overgrow to antagonistic dramatically irreconcilable relations, resulting in a crisis scene [5] or even to a battle theatre. The scenarios [2, 9] of such “the plays” are then always enacted on net integrated structure on many process environments [8]. They operate on a scene which is more or less competitive, however, always complex and influencing special interests: on commodity, informative, financial, productional, organizational, personal and other important relations for this play [8]. Together with growing complexity [9] of global organization systems there is developing & growing the system´s hazard of antagonistic relations, which doesn't create greater 129 organizational profit, but to the contrary eliminates its effects. However, it is necessary to note old knowledge, namely that the process structure of any organization system isn't static, but it changes dynamically, innovates [3] and forms in real-time. System´s dynamics is characterized by interdependence, mutual interactions, information feedbacks and circular causalities [7]. It is then possible to describe the System and its process dynamics as mutual dependence and incidence of system entities. In every system, there runs an incidence of mutual bindings and response in cyclic feedback loops. Their existence is conditioned by information diffusion, relevant definite activities which if, within pertinent system after certain time, they return back to starting point, influence the next system activities. The feedback underlies the system’s structure and at the same time is determinant of its behaviour. The interconnection and influence of entity´s and system´s component bindings and feedbacks in the cycle, can be titled as a relation (-ship) [8]. The relation then, in real time and owing to environment, can change an entity´s intensity and systemic importance. Feedback existence is natural in every system. Nevertheless during system crisis development, the feedbacks can operate in mode and impact that are not common in “peace time”. Such feedback is possibly titled negative, regarding its necessity of changes enforcing of system behaviour. For example in the banking sector [1]: Negative feedback of banks debts balance and subsequently pertinent decreasing of its rating causes financing costs increasing, which reduce its future ceteris paribus and this bank is more vulnerable, because its resulting rating decreasing would be able to bring "a waste of the possibilities of other financial resources obtaining" on interbanking market. However, negative 130 feedback has the system´s self-regulation character and they operate like a specific automatic stabilizer, contributing to an elimination of system´s crisis. That is why the changes [3] are compensated by feedback here, inducing: for example, values growth of system´s entity A lead to lower value of B entity than it would be without the changes. However, positive feedback (a growth in A leading to higher B than it would be without the changes), needn’t operate just in a “positive words sense”, but they can evoke negative feedback even [10]: for example, price falls in a reality market evoke declining consumer's expense, that more and more weaken the reality market and spread further to the other economy sectors. Withal for example, state and influence of financial organizational system on the real economy is an excellent detector of procyclicality mechanisms, amplified natural amplitude of economic cycle. For example: excessive procyclicality [3] embodies such a fluctuation that has induced excessive expense reinforcement of real economies and it is resulting in the health damage of financial sector. A question asserts to the foreground of system´s vulnerability and security during economic cycle: What is a resilience to resistance against relevant threats and hazards of relating particular entities, even of a whole complex organizational system? The answer, not only for economic, but also for other sectors of human society, is possible obtain from the planning, testing and auditing according to international standards for Business Continuity Management System BCMS. [12] The BCSM acts as part of an organizational total management system. It sets and innovates a continuity of total management system activities and processes in business life cycles. 2. BCMS The BCMS is founded on Business continuity planning life cycles. Next, Figure 1 shows PDCA cycle (‘Plan-DoCheck-Act’) [14] for the planning, establishing, implementing, operating, monitoring, reviewing, maintaining and continual improvement of the effectiveness of an organization’s business continuity processes. Business continuity planning (BCP) [12] "identifies an organization's exposure to internal and external threats and synthesizes hard and soft assets to provide effective prevention and recovery for the organization, while maintaining competitive advantage and value system integrity”. It is also called business continuity and resiliency planning (BCRP). integrity”. It is also called business continuity and resiliency planning (BCRP). Figure 1: PDCA cycle applied to BCMS processes [14] Business continuity plan is a roadmap for continuing operations under adverse conditions (i. e. interruption from natural or man-made hazards). BCP is an ongoing state or methodology governing how business is conducted. In the US, governmental entities refer to the process as continuity of operations planning (COOP). BCP is working out how to continue operations under adverse conditions that include local events like arson, theft, and vandalism, regional incidents like earthquakes and floods, and national incidents like pandemic illnesses. In fact, any event that could impact operations should be considered, such as supply chain interruption, loss of or damage to critical infrastructure (major machinery or computing/network resource). As such, risk management must be incorporated as part of BCP. BCP may be a part of an organizational learning effort that helps reduce 131 operational risk. A backup plan to run any business event uninterrupted is a part of business continuity plan. BCP for specified organization is to be implemented for the organizational level in large scale, however the backup plan at individual level is to be implemented at small unit scale. The organizational management team is accountable for large scale BCP for any particular firm, while the respective individual management team is accountable for their BCP at small unit scale. This process may be integrated with improving security and corporate risk management practices. In 2004, the United Kingdom enacted the Civil Contingencies Act 2004, a statute that instructs all emergency services and local authorities to actively prepare and plan for emergencies. Local authorities also have the legal obligation under this act to actively lead promotion of business continuity practices in their respective geographical areas. In December 2006, the British Standards Institution (BSI) released a new independent standard for BCP — BS 25999-1. Prior to the introduction of BS 25999, BCP professionals relied on BSI information security standard BS 7799, which only peripherally addressed BCP to improve an organization's information security compliance. BS 25999's applicability extends to organizations of all types, sizes, and missions whether governmental or private, profit or nonprofit, large or small, or industry sector. In 2007, the BSI published the second part, BS 25999-2 "Specification for Business Continuity Management" [12] that specifies requirements for implementing, operating and improving a documented BCMS.Now, whilst BS25999-2 and BS ISO 22301 [13] are the new standards, the subject matter is anything but new. Since time immemorial people have practiced BCM - from the wise virgins (probably earlier, but we could not find a reference for it) 132 to the present day - the art of BCM has been practiced. BS25999-1 describes the activities and 'outcomes' of establishing a BCM process. It also provides a series of recommendations for good practice. ISO 22301 defines the requirements for a management systems approach to business continuity management. It provides assistance to the person responsible for implementing BCM within an organization. It describes a framework and process for the Business Continuity Manager to use and offers a range of good practice recommendations. ISO22301 offers the basis for certification. It defines management systems’ requirements within a specification. These, however, can be used by internal or external bodies. BS25999 was produced through the British Standard Institution. The sponsors of the original document, which was called PAS 56, were the BCI and Insight Consulting, although a number of other organizations were consulted during the development, including EDS, Sainsbury's and the Post Office. ISO 22301 was produced by International Standard Organization, using BS25999-2 as a primary input. This standard will be implemented in various environments. Special targeted environment – societal has derivative ISO/DIS 22313. 3. ISO 22313 The ISO 22313 is the Standard for Societal security — BCMS [14]. This international standard issues from British BS25999 plus ISO 22301 and provides guidance for setting up and managing an effective BCMS in societal security environment, which is the most universal and for this reason recomendations from this standard will mostly be cited. A BCMS emphasizes the importance of: - Understanding the organization’s needs and the necessity for establishing business continuity management policy and objectives; - Implementing and operating controls and measures for managing an organization’s overall business continuity risks; - Monitoring and reviewing the performance and effectiveness of the BCMS and - Continual improvement based on objective measurement. BCMS, like any other management system, includes the following key components: a) A policy; b) People with defined responsibilities; c) Management processes relating to: policy, planning; implementation and operation, performance assessment, management review and improvement; d) A set of documentation providing auditable evidence and e) Any business continuity management processes relevant to the organization. Business continuity contributes to a more resilient society. The wider community and the organization’s environmental impact on any organization and therefore other organizations may need to be involved in the recovery processes. BCM is about preparing an organization to deal with disruptive incidents that might otherwise prevent it from achieving its objectives. Any incident, large or small, natural, accidental or deliberate has the potential to cause major disruption to the organization’s operations and its ability to deliver products and services. However, implementing BCM now, rather than waiting for this to happen, will enable the organization to resume operations before unacceptable levels of impact arise. BCM is not complicated. It involves: a) Identifying the organization´s key products and services; b) Identifying the prioritized activities and resources required to deliver them; c) Evaluating the threats to these activities and their dependencies; d) Putting arrangements in place to resume these activities following an incident; and e) Making sure that these arrangements will be effective in all circumstances. Figure 2: Mitigating impacts in certain solutions [14] 133 Activities may be disrupted by a wide variety of incidents, many of which are difficult to predict or analyze. By focusing on the impact of disruption, BCM identifies those activities on which the organization depends for its survival, and enables the organization to determine what is required to continue to meet its obligations. Through BCM, an organization may recognize what needs to be done to protect its people, premises, technology, information, supply chain, interested parties and reputation, before an incident occurs. With that, it can take a realistic view on the responses that are likely to be needed as and when a disruption occurs, so that it may be confident of managing the consequences and avoid unacceptable levels of impacts. An organization with appropriate business continuity management measures in place may also be able to take advantage of opportunities that might otherwise be judged to be too high risk. The diagrams on Figure 2 [14] are intended to illustrate conceptually how BCM may be effective in mitigating impacts in certain solutions. No particular timescales are implied by the relative distance between the stages depicted in either diagram. International standard ISO 22313 for business continuity provides guidance based on best international practice for planning, establishing, implementing, operating, monitoring, reviewing, maintaining and continually improving a documented management system that enables organizations to prepare for, respond to, and recover from disruption. It is not the intent of this International Standard to imply uniformity in the structure of a BCMS but for an organization to design a BCMS that is appropriate to its needs and that meets the requirements of its interested parties. These needs are shaped by legal, regulatory, organizational and industry 134 requirements, the products and services, the processes employed, the size and structure of the organization and the requirements of its interested parties. This international standard is generic and applicable to all sizes and types of organizations, including large, medium and small organizations operating in industrial, commercial, public and notfor-profit sectors that wish to: establish, implement, maintain and improve a BCMS; assure conformance with the organization’s business continuity policy; or iii/ make a self-determination and self-declaration of compliance with this ISO. This standard should not be used to assess an organization’s ability to meet its own business continuity needs, nor any customer, legal or regulatory needs. Organizations wishing to do so should use the ISO 22301 to demonstrate conformance to others or seek certification/registration of its BCMS by an accredited third party certification body. 4. BCM providing phase Life cycles of BCM Implementation contains the next phases: - Analysis; - Solution design; - Implementation; - Testing and organizational acceptance; - Maintenance. The Analysis phase, in the development of a BCP manual, consists of an impact analysis, threat analysis and impact scenarios with the resulting BCP plan requirement documentation. Impact analysis (business impact analysis, BIA) results in the differentiation between critical (urgent or crisis) and non-critical (non-urgent) organization functions/ activities. A function may be considered critical if the implications for stakeholders of resulting damage to the organization are regarded as unacceptable. Perceptions of the acceptability of disruption may be modified by the cost of establishing and maintaining appropriate business or technical recovery solutions. A function may also be considered critical if dictated by law. For each critical (in scope) function, two values are then assigned: Recovery Point Objective (RPO) – the acceptable latency of data that will not be recovered; Recovery Time Objective (RTO) – the acceptable amount of time to restore the fiction. The RPO must ensure that the maximum tolerable data loss for each activity is not exceeded. The RTO must ensure that the Maximum Tolerable Period of Disruption (MTPD) for each activity is not exceeded. Next, the impact analysis results in the recovery requirements for each critical function. Recovery requirements consist of the following information: The business requirements for recovery of the critical function, and/or The technical requirements for recovery of the critical fiction. Threat analysis comes after defining recovery requirements, documenting potential threats is recommended to detail a specific disaster’s unique recovery steps. Some common threats include the following: Disease; Earthquake; Fire; Flood; Cyber attack; Sabotage (insider or external threat); Hurricane or other major storm; Utility outage; Terrorism; Theft (insider/ external theft, vital information or material); Random failure of mission-critical systems. All threats share a common impact: the potential of damage to organizational infrastructure – except one (disease). The impact of diseases can be regarded as purely human, and may be alleviated with technical and business solutions. However, if the humans behind these recovery plans are also affected by the disease, then the process can fall down. The organizations also banned face-toface contact between opposing team members during business and nonbusiness hours. With such a split, organizations increased their resiliency against the threat of government-ordered quarantine measures if one person in a team contracted or was exposed to the disease. Damage from flooding also has a unique characteristic; if an office environment is flooded with nonsalinated and contamination-free water. Definition of impact scenarios comes after defining potential threats, documenting the impact scenarios that form the basis of the business recovery plan is recommended. In general, planning for the most wide-reaching disaster or disturbance is preferable to planning for a smaller scale problem, as almost all smaller scale problems are partial elements of larger disasters. A typical impact scenario like 'building loss' will most likely encompass all critical business functions, and the worst potential outcome from any potential threat. A business continuity plan may also document additional impact scenarios if an organization has more than one building. Other more specific impact scenarios – for example a scenario for the temporary or permanent loss of a specific floor in a building – may also be documented. Organizations sometimes underestimate the space necessary to make a move from one venue to another. Recovery requirement documentation comes after the completion of the analysis phase, the business and technical plan requirements are documented in order to commence the Solutions design phase. A good asset management program can be of great assistance here and allow for quick identification of available and reallocatable resources. For an officebased, IT intensive business, the plan’s 135 requirements may cover the following elements which may be classed as ICE (In Case of Emergency) Data: The numbers and types of desks, whether dedicated or shared, required outside of the primary business location in the secondary location; The individuals involved in the recovery effort along with their contact and technical details; The applications and application data required from the secondary location desks for critical business functions; The manual workaround solutions; The maximum outage allowed for the applications; The peripheral requirements like printers, copiers, fax machines, calculators, paper, pens etc. Other business environments, such as production, distribution, warehousing etc. will need to cover these elements, but are likely to have additional issues to manage following a disruptive event. Solution design goal is to identify the most cost effective disaster recovery solution that meets two main requirements from the impact analysis stage. For IT applications, this is commonly expressed as: The minimum application and application data requirements; the time frame in which the minimum application and application data must be available. Disaster recovery plans may also be required outside the IT applications domain, for example in preservation of information in hard copy format, loss of skill staff management, or restoration of embedded technology in process plant. This BCP phase overlaps with disaster recovery planning methodology. The solution phase determines: the crisis management command structure; the location of a secondary work site (where necessary); telecommunication architecture between primary and secondary work sites; data replication methodology between primary and secondary work sites; the application and 136 software required at the secondary work site, and the type of physical data requirements at the secondary work site. Implementation phase, quite simply, is the execution of the design elements identified in the solution design phase. Work package testing may take place during the implementation of the solution, however; work package testing does not take the place of organizational testing. Testing and organizational acceptance purpose is to achieve organizational acceptance that the business continuity solution satisfies the organization's recovery requirements. Plans may fail to meet expectations due to insufficient or inaccurate recovery requirements, solution design flaws, or solution implementation errors. Testing may include: Crisis command team call-out testing; Technical swing test from primary to secondary work locations; Technical swing test from secondary to primary work locations; Application test; and Business process test. At minimum, testing is generally conducted on a biannual or annual schedule. Problems identified in the initial testing phase may be rolled up into the maintenance phase and retested during the next test cycle. The Maintenance of a BCP manual is broken down into three periodic activities. The first activity is the confirmation of information in the manual; roll out to ALL staff for awareness and specific training for individuals whose roles are identified as critical in response and recovery. The second activity is the testing and verification of technical solutions established for recovery operations. The third activity is the testing and verification of documented organization recovery procedures. A biannual or annual maintenance cycle is typical. 5. Conclusion to scenario design Three types of exercise scenarios can be employed when testing business continuity plans. Simple exercises are often called a ‘desktop’ or ‘workshop’. Medium exercises will invariably be conducted within a Virtual World and will usually bring together several departments, teams or disciplines. Complex exercises are perhaps the hardest to define as they aim to have as many boundaries as possible. Rules for Exercise Scenarios design will be the object of our next research activities. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] AIKMAN, D. et al. 2009. Funding liquidity risk in a quantitative model of systemic stability, Bank of England working paper No. 372. ARLOW, J. NEUSTADT, I. Enterprise Patterns and MDA, Addison-Wesley, 2006, ISBN 0-321—11230-X. DRUCKER, P. Innovation and entrepreneurial spirit, Management press, Prague, 1991. GERLACH, S. GRUNEWALD,P. Procyclicality of Financial Systems in Asia, Hong Kong Institute of Monetary research: 2006. HAMMER, M. CHAMPY, J. Reengineering, Management press, 1993. MACH, O. Příprava, provedení a vyhodnocení cvičení k ověření připravenosti na jaderné, nebo na radiologické mimořádné události, (Czech) International Atomic Energy Agency: 2005. RICHARDSON,G.P. System dynamics, In Encyclopedia of Operations Research and Information Science, Saul Gass and Carl Harris, eds., Kluwer Academic Publishers, 2011. URBÁNEK, J. F.: Teorie procesů – management environmentů, CERM Brno, 2003, ISBN 80-7204-232-7. URBÁNEK, J. F. a kol. Scénáře adaptivní kamufláže. Brno: Tribun EU s.r.o., 2012, ISBN 978-80-263-0211-7. KUBICOVÁ, I. Et al. Analýza mikrofinančních rizik a jejich přenosů v kontextu zranitelnosti české ekonomiky, Hlávkovo nadání, Praha, 2012, ISBN978-8086729-76-3. EPR–EXERCISE. Preparation, Conduct and Evaluation of Exercises to Test Preparedness for a Nuclear or Radiological Emergency, International Atomic Energy Agency: 2005. BS25999-2. ISO 22301:2011. ISO/DIS 22313:2012. 137 FINANCIAL STATEMENTS OF THE PUBLIC SECTOR ENTITIES AND THEIR UTILISATION FOR ECONOMIC MANAGEMENT Jana Vodáková Abstract: This paper concentrates on financial statements of the public sector entities and their possible utilization for the purposes of economic management. Firstly the paper analyses structure and content of financial statements in relation to accounting reform, as proceeding nowadays in the Czech public sector. This reform, characterized by shifting from cash to accrual basis of accounting, has influenced structure and content of financial statements significantly. Further, the paper deals with economic management in the public sector, explains some principal terms and introduces the main findings of a survey undertaken among economic managers in the Ministry of Defence of the Czech Republic. Keywords: Cash Basis, Accrual Basis, Financial Statements, Statement of Financial Position, Statement of Financial Performance 1. Introduction Financial accounting of public sector entities is characterized by shifting from cash to accrual basis within the last decades. This trend is mainly typical for developed countries including the Czech Republic. Traditional (cash) basis of accounting is defined as [1] a basis under which transactions and other events are recognized when they are directly connected with cash inflows and outflows. Consequently transactions that are not instantly connected with money increases and decreases cannot be recorded entirely under cash basis and subsequently released in time for related financial statements. But, in fact, these transactions including depreciation, provisions, contingent liabilities or contingent assets can be material and they can influence the financial position of the public sector entity significantly. So financial statements prepared under cash basis can be insufficient for the purposes of 138 economic management. For that reason many developed countries have decided to improve accounting data information and substitute the traditional cash system of accounting for an accrual one. Actually, under the accrual basis [1] transactions and events are only recognized when they really occur and not just when they are instantly connected with money inflows and outflows. Then, transactions and events are released in financial statements of the period to which they relate. As a consequence, assets, liabilities, net assets/equity, revenue, and expenses are recognized in financial statements of the public sector entities. For that reason financial statements prepared under the accrual basis of accounting can serve various purposes of accounting data users better than statements prepared under cash basis. Besides, financial statements prepared under accrual basis enable mutual comparison not only among entities within the public sector but also across different economic sectors. So we can compare, for instance, accounting data of the public sector entity and business entity which may enable more effective allocation of the public finance or transparent evaluation of the public sector performance. The vast majority of business entities prepare financial statements under accrual basis routinely. Unfortunately, cash and accrual basis of accounting represent only two limited attitudes to organization of the accounting system. For example, Organization for Economic Cooperation and Development (OECD) in that context, refers to four ways [2] to organize financial accounting, or Chan [3] describes three degrees of accrual accounting. In reality a specific form of accrual elements implementation can differ significantly within developed countries, which can make mutual international comparison rather complicated. On the other hand full implementation is often recommended by accounting experts. Likewise, other developed countries, also the Czech Republic, decided to modernize and harmonize accounting methodology of the public sector at the beginning of the 21st century. In 2007 the Government of the Czech Republic in Resolution No. 561 announced for the first time an intention to implement accrual basis broadly to the public sector. The resolution defined the main principles and tasks in order to launch financial accounting and reporting under the accrual basis till 2010. Though implementation of some demanding accrual elements was postponed, it can be stated now that a basic goal of the accounting reform was fulfilled and the Czech public sector entities have released financial statements prepared under accrual basis regularly since 2011. At its first part this paper concentrates on financial statements as the most important output from the system of financial accounting. It analyses structure of statements and their content in the context of proceeding public sector accounting reform. Further, the paper introduces the main findings concerning possibilities of accounting data utilization for the purposes of economic management. These findings were obtained partly as an output from the survey undertaken among financial managers of the Ministry of Defence of the Czech Republic in 2012. As basic scientific methods, description, analysis and synthesis were mainly used. Findings presented in the paper were supported by the Czech Science Foundation and the Ministry of Defence of the Czech Republic (Grant Project GACR No. P403/10/0609). 2. Reformed financial statements Analysis and comparison of financial statements before the public sector accounting reform, and now carried out in the terms of above-mentioned research, suggest that both structure and content of statements have changed significantly. Primarily it can be stated that structure of statements released compulsorily for external users enlarges. Also the content of current statements is changed or supplemented. On the other hand structure and content of financial statements harmonize and standardize across various entities of the public sector which evidently contributes to their mutual comparison and transparency. Thus financial statements can better serve various purposes of internal and external users. 2.1 Structure of financial statements Compulsory structure of financial statements is specified in Act No. 563/1992 Coll., on Accounting. 139 According to the act financial statements of the public sector entities represent an integral complex including: - Statement of Financial Position; - Statement of Financial Performance; - Notes. As long as a public sector entity fulfils two criteria, i.e. total assets more than 40 million Czech crowns and annual net turnover more than 80 million Czech crowns, it is obliged to prepare: - Cash Flow Statement; - Statement of Changes in Net Assets/Equity. Statement of Financial Position informs potential users about assets, net assets/equity and liabilities of a specific public sector entity. Statement of Financial Performance contains information about revenue, expenses, and net profit or loss for the period. Cash Flow Statement introduces annual changes in cash inflows and outflows from operating, investing and financing activities. Statement of Changes in Net Assets/Equity shows annual changes in specific items of net assets/equity. Taking into account the limited extent of the paper, the next text is concentrated mainly on Statement of Financial Position and Statement of Financial Performance as the most frequently used statements. 2.2 Statement of Financial Position In table 1 a simplified form of Statement of Financial Position is introduced. As follows from the table, total assets (left side of balance) encompass non-current and current assets [4]. The right side of balance is created by net assets/equity and liabilities. Especially, reporting of non-current assets and net assets/equity has gone through significant changes in the course of accounting reform. Many public sector entities did not recorded depreciations before the reform. From 2012 non-current assets are presented in financial statements in “brutto” (gross) value, i.e. before depreciation and “netto” (net) value (after depreciation). Also the total amount of depreciation is presented separately in Statement of Financial Position. For example in the Ministry of Defence, net value of noncurrent assets has decreased approximately by 50 % in comparison with their value before the reform due to depreciation. It is assumed that a similar situation may exist in other ministries too. As to net assets/equity, there are some changes in terminology of specific items and their content, especially relating to obligatory budget structure. The same situation concerns specific items of current financial assets. Classification of assets and liabilities as non-current and current is strictly claimed by accounting legislature while the crucial limit from this point of view represents a one year period. Table 1 Statement of Financial Position Total net assets/equity & liabilities Net assets/equity - Capital of entity Total assets Non-current assets - Intangible assets - Land and buildings, infrastructure, plant - Funds of entity and equipment - Financial assets - Net profit (net loss) - Receivables - Accumulated profits (losses) Current assets Liabilities - Inventories - Provisions - Receivables - Non-current liabilities - Financial assets (cash and cash - Current liabilities equivalents included) Source: Annex 1 to Decree No. 410/2009 Coll. 140 2.3 Statement of Financial Performance Probably the most important changes can be distinguished in Statement of Financial Performance. While before the reform, public sector entities prepared this statement in restricted form and this form varied significantly from the statement prepared by businesses, nowadays the statement is harmonized across various entities and its content is enlarged. As implied from table 2 the statement informs about expenses, revenue and their difference, i.e. net profit or net loss for calendar year period [4]. Total expenses encompass expenses from activity, financial expenses, cost of transfers, cost from shared taxes and charges, and income tax. Expenses from activity represent for example material and other supplies consumption, utilities, purchased services, wages, salaries and employee benefits, depreciation and amortization or direct taxes. Especially, wages, salaries and employee benefits constitute a significant part of total expenses of the public sector entities. Also, depreciation and amortization expenses can be material. Total revenue includes revenue from activity, financial revenue, revenue from transfers, and revenue from taxes and charges (shared included). Revenue from activity can include for example revenue from sale of products, goods or services, rent revenue, taxes, fees or penalties. In the case of the public sector entities (especially if they are fully financed from the public budget) revenue may not be material. In that event net loss is identified. According to Decree No. 410/2009 Coll. all expenses and revenue must be classified as expenses and revenue from main activity and expenses and revenue from commercial activities. Main activity is defined as an activity for which an entity was established. Other activities can be indicated as commercial. Complex and realistic information on expenses of the public sector entities can be very beneficial in a process of economic management or budget planning. Unfortunately problems with recognition of some kinds of expenses still remain in financial statements. For example energy consumption or utilities can be technically complicated to divide into adequate portions among specific entities. Table 2 Statement of Financial performance Total expenses Total revenue Expenses from activity Revenue from activity - Material and other supplies consumption - Revenue from sale of products - Energy consumption - Revenue from sale of services - Other utilities and services - Revenue from sale of goods - Wages, salaries and employee benefits - Rent revenue - Depreciation and amortization expense - Taxes, fees, penalties - Other expenses - Other revenue Financial expenses Financial revenue Cost of transfers Revenue from transfers Cost from shared taxes and charges Revenue from taxes and charges Income tax Revenue from shared taxes and charges Net profit for period Net loss for period Source: Annex 2 to Decree No. 410/2009 Coll. 141 3. Financial statements utilization Both above mentioned statements are further supplemented by Notes. In Notes external users can find information about accounting methods used, evaluation patterns, detailed data concerning infrastructure actives and so on. It seems that thanks to the reform information capability of financial statements increases positively. On the other hand, changes in accounting systems make considerable demands for costly software upgrades, organizational changes, time-consuming asset database upgrades, personal training or issuing internal directives. Implementation of some accrual elements such as depreciation or accruals and deferrals is also inevitably connected with utilisation of assessments which can limit or even decrease information capability of financial statements. It is also questionable whether both external and internal users sufficiently understand the content of financial statements and in what way they can use them. In the case of internal users it is questionable too whether they have sufficient authority and adequate management system. For that reason a survey via questionnaire was undertaken among economic managers of the Ministry of Defence of the Czech Republic in 2012. The survey was concentrated among others on accessibility, content and utilization of financial statements. 75 % of questionnaires were filled and returned by managers. The survey has showed the following results: 3.1 Accessibility and utilization of financial statements 67 % of respondents stated that they always have financial statements at their disposal. (In fact these statements are available to all economic managers anytime). The same percentage of respondents further announced that these data are utilized only occasionally. In an 142 open-ended question respondents added that most frequently they use a statement of budgetary resources exploitation. Once a year a brief financial analysis is prepared out of financial statements by Regional Financial Department as “Rating” and provided to commanders (and economic managers). It was sounded out that 58 % of commanders never use this analysis and 25 % use it rarely. These findings correspond with former assumptions and they are probably typical for the whole public sector or at least state administration. Though financial statements are commonly available to economic managers or commanders, they do not use them very often and instead they only control budget expenditures. There can probably be found more reasons for this situation. From absence of strategy and management concept, through lack of demand for real economic management, inconvenient legislature, confused or complicated organization structure to insufficient system of internal training. Also excessively centralized management system does not generate adequate space for economic decision-making. Then it is necessary to define an appropriate level of management and set up convenient conditions for effective decision-making process. 3.2 Concept of economic management The basic principles of economic management in the Czech public sector are implied from legislature, concretely from Act No. 320/2001 Coll. on Financial Control in the Public Administration [5]. This act defines 3E Concept, i.e. Economy, Effectiveness, Efficiency that should be obeyed within the process of economic management. Various authors also come out from 3E Concept while defining effective management in the public sector or public administration. For example Ochrana and Půčik [6] specify effective management in public administration as the gradual fulfilment of goals in relation to reaching adequate outcomes and exploitation of public resources in accordance with the 3E Concept. Abovementioned authors further introduce basic assumptions of effective economic management in the public administration [6]. Among these assumptions, they include external and internal framework conditions settingup, availability of managers, adequate goals setting-up, gradual goal fulfilment, feedback and control of main indicator fulfilment. The abovementioned authors indicate as the most urgent problems of the public sector management gradual feedback and control of goal fulfilment. The main reason for this situation is, according to them, obsolete information about the state of public sector activities and successive delay in corrective remedies. 75 % of survey respondents (economic managers) mentioned they are familiarized sufficiently with 3E Concept. A further 67 % of them think they dispose of adequate authority to realize 3E Concept. On the other hand, surprisingly 42 % of respondents introduce the idea that commanders only rarely take their economic opinions and recommendations into consideration. Only 42 % of respondents further think they are familiarized sufficiently with instruments of economic management, 33 % of respondents are not sure whether they are familiarized with appropriate instruments. Interesting results concern also internal conditions for economic management. 42 % of all respondents think that necessary conditions for economic management do not exist in the Ministry of Defence. 33 % of respondents are sure that necessary conditions do not exist there. In an open-ended question respondents specified that the main obstacle of economic management represents a high level of centralization and relatively poor space for independent decision-making. In consequence of this obstacle 58 % of respondents quoted that they only seldom utilize economic management instruments. Relatively perturbing results are connected with the question concerning the system of internal training. Roughly 84 % of respondents stated that system of internal training is either rather or fully inconvenient. It is evident that the system of internal training should be improved as to economic management principles and adequate instruments of their realization. 4. Conclusions Analysis and comparison of financial statements carried out in terms of GACR project solution showed that structure and content of financial statements have changed significantly. Though some problems still exist, information capability of financial statements for various purposes of external and internal users increases. Also transparency of accounting data and possibility of their mutual comparison improve. On the other hand the survey undertaken in the Ministry of Defence of the Czech Republic suggests that accounting data are still not adequately used for the purposes of economic management. The same situation probably prevails in the whole Czech public sector. Reasons for this situation can be various, for example absent demand for such data utilization, absent internal economic management concept, high level of centralization and poor space for economic decisionmaking, insufficient system of internal training and so on. In fact only accounting system can provide external and internal users with such a complex system of economic data. 143 References [1] [2] [3] [4] [5] [6] 144 IPSASB. 2011. 2011 Handbook of International Public Sector Accounting Pronouncements. 1914 p. ISBN 978-1-60815-582-8. Available from: <http://www.ifac.org/publications-resources/2011-handbook-international-publicsector-accounting-pronouncements>. Accessed 2012 September 1. OECD. 2001. Managing Public Expenditure. A Reference Book for transition countries 504 p. ISBN 9789264186538. Available from: <http://www.oecdbookshop.org/oecd/display.asp?lang=EN&sf1=identifiers&st1= 422001051p1>. Accessed 2011 September 25. Chan, J. L. 2006. IPSAS and Government Accounting Reform in Developing Countries. Available from: <http://blog-pfm.imf.org/files/ chan2006ipsasgafdc.pdf>. Accessed 2012 September 1. Decree no. 410/2009 Coll. To Act no. 563/1992 Coll. on Accounting. Act no. 320/2001 Coll. on Financial Control in the Public Administration. Ochrana, F, Půček, M. 2011. Efektivní zavádění a řízení změn ve veřejné správě: Smart Administration. 1st ed. Praha: Wolters Kluwer ČR. 2011. 248 p. ISBN 97880-7375-667-7 APPLYING LEARNING MANAGEMENT SYSTEM AS EFFECTIVE DISTANCE LEARNING TOOL: EXPERIENCE FROM THE FACULTY OF ECONOMICS AND MANAGEMENT Dana Zerzánová, Marek Sedlačík, Ivana Čechová, Martin Pop and Jana Beránková Abstract: During the last decades, views of learning have changed. These changes are having a profound effect on formal learning, particularly in institutions of tertiary education. Online education is perceived by many teachers as an innovation that has considerable potential for enhancing teaching and learning and can be beneficial for learning in ways not available in traditional systems, because of the active role the learner plays in knowledge acquisition. Learning management systems are becoming ubiquitous technology adopted by universities, and can be defined as web-based systems that allow instructors and/or students to share materials, submit and return assignments, and communicate online. In this paper, we report on how three different subjects, Economics, Econometrics and English Language, deal with distance courses and study supports for distance learners. Initial sections of the paper focus on definitions of Learning Management Systems and pedagogical principles of e-learning. The next section states the findings of a qualitative research which was carried out as a part of the Faculty of Economics and Management research project. In the last part we present experience from three different subjects and give some practical examples. Keywords: tertiary education, distance learning, combined form of study, Learning Management System Barborka, study supports 1. Learning Management Systems The movement from classical education towards e-learning is a natural process for educational institutions of the 21st century. E-learning is perceived by many educators as an innovation that has a significant chance to enhance teaching and learning, promote lifelong learning and reach out to distance learners. Elearning includes instructions delivered via all electronic media including the Internet, intranets, broadcasts, audio/video means, and CD-ROMs. All efforts to implement e-learning will eventually move towards total automation of administrating the teaching and learning processes by means of software known as Learning Management System (LMS). LMS comprises the core in a modern virtual learning environment and can range from a system for managing training and educational records, to software for distributing courses over the Internet with features for online collaboration [8]. It takes over the role of integrating the different technologies into a common learning environment. LMS primarily focuses on the management of learning and training processes, distributing the learning content, supporting the learning process, and serving as a general communication point and interface between a learner and a teacher [6]. Today’s LMSs offer content management and learning process technologies. Content management functionalities enable an 145 organisation to administer a large scale of different learning objects, to group them into different courses or learning settings. Process management functionalities allow the organisation to manage the workflows and business processes, to inform learners and teachers about events or learning activities, to set up a syllabus, and to run training programmes. Hall defines LMS as: “……software that automates the administration of training events. All Learning Management Systems manage the log-in of registered users, manage course catalogues, record data from learners, and provide reports to management.” [5]. LMS is often considered a substantial element of both e-learning and distance study programmes. This point of view is reasonable from a perspective of control and management, but from the perspective of education itself is at least disputable. The imperative today is not a mere access to knowledge, but the prompt access to relevant and useful knowledge. The real value of e-learning lies not in its ability to train just anyone, anytime, anywhere, but especially in the ability to deploy this attribute to train the right people to gain the right skills or knowledge at the right time. Only then can e-learning yield a justifiable return on investment considering the costs incurred in implementing e-learning [3]. The organisational LMS, however, has to be compatible with a variety of social network platforms, search engines, open web services, blogs or wikis, open content repositories and a high number of other applications. Thus, the challenge for organisations today is: “How can they manage the variety of technologies and simultaneously foster the creativity and motivation of their users?” [4]. One of significant future challenges with LMS usage is the development of technologies supporting collaborative learning environments. But LMS is a 146 mere tool, not a strategy. Being proficient in the use of any technology does not guarantee that the student will be successful and reach his/her educational goals. Likewise, LMS itself cannot improve the quality of learning you implement in it. 1.1 Pedagogical principles of e-learning The OECD report "E-learning in Tertiary Education: Where do we stand?" (2005) indicates that universities primarily use LMS for administrative purposes, and that LMS so far have had a limited impact on pedagogy: "ICT has penetrated tertiary education, but has had more impact on administrative services (e.g. admissions, registration, fee payment, purchasing) than on the pedagogic fundamentals of the classroom." [9]. Both administration and technology support are important for any form of elearning but pedagogical principles also play a crucial role in any form of learning. It is obvious that different LMSs can affect the educational changes needed. The objective is achievable only if the technology designers address the underlying gaps in pedagogical coherence. The proper pedagogic use of LMS constitutes by itself an innovative pedagogic methodology that transforms the traditional communication structures and favours the application of many other pedagogic principles that were difficult to be applied up to now in the context of the traditional educational system. It is possible to confirm that most of the pedagogical principles that apply to the traditional classroom delivery method also apply to e-learning, but these principles need to be extended to accommodate and provide for the rapid changes in technology. Pedagogical principles must form the very basis for inclusion of features in LMS. These principles should be integrated into the LMS where every feature included is accompanied by explicit guidelines on the best method of their use to effect pedagogically sound instruction. [3]. Kopecky [8], White [13]) and Rosenberg [11] have identified the following dimensions of successful distance learning: - connectivity (access to information is available on a global scale); - flexibility (learning can take place any time, any place); - interactivity (assessment of learning can be immediate and autonomous); - collaboration (use of discussion tools can support collaborative learning beyond the classroom; - extension of opportunities (econtent can reinforce and extend classroom-based learning); - motivation (multimedia resources can make learning fun). E-learning can have a broadly positive pedagogical impact. This fact has been proved by detailed research (e.g. OECD/CERI, 2005), but there is also indirect evidence such as students’ satisfaction surveys, students’ needs analysis, etc. Rosenberg claims that “….. introducing new technology for learning - we are introducing a new way to think about learning” [11]. 2. LMS Barborka Students of the present form of study are in a regular face-to-face contact with their language teachers but students of the combined form of study cannot use such possibilities because their face-toface teaching is reduced to a minimum. Nowadays, there are 216 students of combined form of study at the Faculty of Economics and Management, 145 military students and 65 civilian ones. For them, the computer is not only a welcomed, but an absolutely essential device for self-study as well as for their contact with teachers and schoolmates. That was one of the main reasons why the purchase of LMS Barborka from Ostrava Technical University in 2006 was accepted with enthusiasm. LMS Barborka seems to be a very appropriate tool for controlling both distance and combined forms of study as it allows the students to access it at any time and place, in accordance with the principles of ubiquitous learning. It offers complex interactive study materials. LMS Barborka allows the creation (system Author), administration (system Administrator), and use (system Student) of the included study supports which are distributed by the Internet or on the intranet of the University of Defence (UoD). In addition to tools for the creation, administration and distribution of courses, this LMS provides possibilities for communication both among students and between students and the teacher. The fourth system – Tutor – is designed for controlling individual courses. In the academic year 2010-2011 the teachers of English designed a research study, the task of which was to find out if and how ICT helps distance students in their study, and how distance students assess LMS Barborka. As the research method, the teachers used semistructured interviews carried out via Skype, using an ‘interview plus’ approach to enhance discussion [2]. First of all we wanted to know why our students want to study English. Among the most frequent answers, we have identified the following reasons: - access to knowledge (most pages on the Web, books, the press, science, international libraries, news reports, etc.); - communication (contacts with teachers, peers as well as with people from all over the world through email, Skype, Twitter, Google, easier travelling); - career development (libraries, professional magazines, LinkedIn); 147 - satisfaction (making progress, understanding English communication); - entertainment (Internet, watching films in the original dialogue, reading books, listening to songs). Then we concentrated in particular on LMS Barborka as a tool for language training. The significance of educational environment certainly plays an important part. If students feel relaxed in a given environment, if they don’t fear getting disgraced in front of their teacher or classmates, then lessons where ICT is used are preferred to the classical ones. It is not only the time and place students can choose, but also their own pace which makes the students feel comfortable. From the most repeated answers in this part of interviews we have elicited the following facts: - place and time (possible courses can be taken where and when they are necessary); - pace (students can skip material they already know, they can study as long as they want and repeat some complex matters); - consistent content (online materials must be relevant, sequential, logical, topical and interesting for the target learners). According to the analysis of the students’ interviews it is possible to state that distance students can see LMS Barborka as a tool which facilitates their study, and at the same time as an accessible form of teaching. They especially like the chance to study any time/anywhere and the offer of unique materials, which are provided only via this application. On the other hand they are fully aware of some limitations, e.g. the lack of communication. These findings are supported by some previous studies on online tertiary education. 148 3. LMS Barborka at the Department of Economics As mentioned above, e-learning is one of the most dynamically developing education fields and we can meet it at all levels of an educational process. The same situation is at the Department of Economics where LMS Barborka is used mainly for teaching students of combined form of study in subjects Economics I - Microeconomics and Economics I – Macroeconomics. The teachers prefer this teaching tool for several reasons. The most important is the rising number of students and specific arrangement of lessons for combined study programme at the Faculty of Economics and Management. The students attend three times per term intensive five-day workshops, which is effective mainly for military students who are sent to study at the UoD by a Personal Order and their absence from their army unit is minimized in this way. On the other hand, for civilian students who decide about their studies on their own, such lesson arrangement is hardly acceptable. The only exception is people who work in public administration because their employers are very receptive to their studies within lifelong learning. There is an ideal chance to use e-learning in a teaching process the necessary preconditions of which, except a certain LMS, are study supports for individual subjects. At the Department of Economics each teacher should work out one study support per term to be able to provide especially students of combined form of study with fully electronic support. After finishing this process the attractiveness of studies at the Faculty of Economics and Management, above all for civilian students, will rise. It is necessary to point out that teaching via e-learning doesn´t mean being fully out of touch with students. At the beginning of a term, during the first session, students are informed about conditions for getting a credit, about the way of teaching, and how to use LMS Barborka. Teachers try to attract students´ attention to economic studies. The appropriate motivation and ability to capture students´ attention are the prerequisites for successful studies and their facilitation. The role of a teacher and his/her personal influence on students are unique. Within the second session students take part in lectures where they are given basic information about individual study modules and their chapters, the teachers explain basic concepts and links to them, and at the same time they provide students both with essential references and recommended literature. During a term students work on a credit task and in the following session their gained knowledge and experience are checked in a written credit test. LMS Barborka, similarly to other e-learning management systems, enables “remote” testing which hasn´t been used yet because it´s necessary to apply an individual approach to students and give them tutorials dealing with the results of tests. LMS Barborka is a very friendly elearning platform which offers the whole range of tools in a simple graphic version. Having logged into LMS Barborka, a user as a student can see the basic tool bar which facilitates the orientation within the system and offers the user these tools: Study, Textbooks, Tests, Tasks, Calendar, Discussion, Correspondence/emails, Tutorials, Results, System adjustment (setting). For subjects Economics 1 Microeconomics and Economics 1Macroeconomics textbooks are the most important tool. Students can find there, for a chosen subject and for a current term, nine well-arranged areas which include individual modules and complementary literature. It is possible to download all the data, credit tasks, exams and their results. Here is a layout of one of the subjects: 1. Module 1 – Human Being, Market and Market System. 2. Module 2 – Consumer Theory and Demand Formation. 3. Module 3 – Firm Theory and Supply Formation. 4. Module 4 – Factors of Production Market. 5. Module 5 – Social Equilibrium and Prosperity. 6. Module 6 – Complementary Literature for Downloading. 7. Module 7 Credit Tasks. 8. Exams. 9. Exam Results. 4. LMS Barborka at the Department of Econometrics Similarly to the previous part, this chapter concentrates on the experience of the Department of Econometrics teachers with LMS Barborka implication while teaching certain curriculum subjects in the combined form of study. There will also be mentioned some user-technical features of this system because within the UoD LMS Barborka is maintained with the technical support of the Department of Econometrics. Excepting abovementioned qualities, the main contribution of LMS Barborka for the teaching process, as seen by the teachers of the Department of Econometrics, is the possibility of setting, checking and evaluating partial tasks, credit projects, tests etc. Providing study materials, organizing tutorials (setting place, time and list of participating students), publishing recent events for students, task calendar and internal post client are all obvious. The environment and setting of LMS Barborka can be graphically modified and offers similar functions to any other LMS, nevertheless without annual fees. LMS Barborka is currently used at the Department of Econometrics in parallel 149 with LMS Moodle, particularly as a support of following subjects: - Informatics I and II; - Information Systems of Public Administration; - Mathematics I and II; - Statistics. For these subjects there are supporting presentations, study materials and tests. For students´ self-study there are provided internet links to appropriate topics. Technically, LMS Barborka is run on the server which was obtained within the Faculty of Economics and Management research project. All UoD employees are provided with the support while inserting users and groups of new students. The Department of Econometrics guarantees the co-ordination between OKIS and the Studies Office when entering new students, subjects and groups into the database. The inserting itself is enabled with the help of LMS tools and so-called csv sets. The Department of Econometrics is in touch with the authors for possible system updating, and moreover offers service and administration of the system, including upgrading, helping with forgotten passwords, creating groups, assigning students and modules to a certain group, granting authority, instructions for simple administration etc. 5. LMS Barborka at the Language Training Centre Electronic supports for language training cover general, economic, and military topics and they have been elaborated in accordance with the requirements both for the final tertiary exams as well as for the STANAG 6001 (SLP 2-3) NATO standardized exams. Students of combined form of study appreciate the fact they can use such electronic study supports. The reason is that their study results above all depend on self-study due to the different organization of the 150 study program. At the same time LMS facilitates their orientation in the curriculum and helps them to prepare for exams. As the electronic support is supplemented with exercises both for reflection as well as those which enable feedback, it allows the students to monitor comprehension of the studied material, either in communication with the tutor, or during their independent work. Instantaneous feedback is ensured in addition by interactive exercises created in the Hot Potatoes program. The tutor partly substitutes the role of the teacher and decreases the lack of face-toface contact with students. Electronic supports in LMS Barborka are used for practising understanding of the main ideas of the texts, making notes on the main ideas, distinguishing the main ideas and supporting details or finding specific information. At the same time these materials lead them to improve their abilities, e. g. to communicate fluently in the target language at a higher abstract level, to form arguments and express their attitudes and opinions on different topics, such as armed conflicts, foreign missions, political situation in our country and abroad, current social problems, topics related to their profession etc. Nowadays, distance students can use a module of general English, three military terminology modules, two modules of economic terminology, one module of management terminology and a module of special terminology: 1. General English Module - Family and Relations; Housing and Accommodation; Food, Cooking, Restaurant; Health and Diseases; Education and Jobs; Environment, Crime, Gun Possession; Discrimination, Xenophobia, Racism. 2. Military Modules - Military Ranks, Daily Routines and Responsibilities, Uniform and Equipment, Branches of the Army, Combat Vehicles, Terrain; - Armed Forces, Military Service, Army of the Czech Republic, Land Forces, Air Force, Current Deployments, Peace Support Operations; - International Organizations, European Union, NATO, United Nations, Humanitarian Assistance, Problems of Today and Security Risks and Threats. 3. Economic Modules - Introduction to the Economic System, Production, Types of Business Organizations, Marketing the Product, Starting a Business, International Trade, Transport and Communication, People and Work. 4. Management Module - What is Management, Planning, Organizing and Staffing, Operations Management, Controlling Process, Leadership. 5. Special Terminology Module - Combat Engineers, EOD and IEDs, Intelligence, Urban Operations, Artillery, Terrorism, Cordon and Search Missions; - Ecological Problems, Logistics, Human Resources, Generation Next, Road Accidents, Epidemics, Gas Detection, Floods, Earthquakes. 6. Conclusion The Faculty of Economics and Management teachers´ common idea is not only to provide students with a variety of tools for their self-governed and problem-based activities, but also to empower them by offering a tool for effective learning. Therefore an important step that must be taken prior to implementing e-learning tools into pedagogical processes is selecting a suitable LMS. We can state that LMS Barborka is a suitable tool for distance students of the Faculty of Economics and Management according to both tutors/teachers and students. Our endeavour is supported by K. Vierack, a NATO representative, who says: “...If we do not go online, we will lose the possibility for a comprehensive approach. We need to get all the experts together. We have to balance security and liberty.” [13]. References [1] [2] [3] [4] Bixler, B., Spotts, J. 2000. Screen design and levels of interactivity in web-based training. (Online) Available at: http://www.clat.psu.edu/homes/jds/john/research/ivla1998/ivla98.htm. Bloom, B.S. 1953. Thought processes in lectures and discussions. Journal of General Education, vol. 7, pp. 55-71. Govindasamy, T. 2001. Successful implementation of e-Learning Pedagogical considerations. Internet and Higher Education, Volume 4, Issues 3–4, pp. 287– 299 (Online) Available at: http://www.qou.edu/arabic/researchProgram/eLearningResearchs/successfulImple mentation.pdf Grohmann, G.; Kraemer, W.; Milius, F.; Zimmermann, V. 2007: Modellbasiertes Curriculum Design für Learning Management Systeme: Ein Integrationsansatz auf Basis von ARIS und IMS Learning Design. In Oberweis, A. et. al. (Eds.): Tagungsband 8. Internationale Konferenz Wirtschaftsinformatik “eOrganisation: Service, Process, Market Engineering”. Karlsruhe, pp. 795812. 151 [5] [6] [7] [8] [9] [10] [11] [12] [13] 152 Hall, B. 2003. New Technology Definitions, (Online) Available at: http://www.brandonhall.com/public/glossary/index.htm Helic, D. 2006. A Didactics‐Aware Approach to Management of Learning Scenarios in E-Learning Systems. Available from Graz University of Technology. Jonassen, D. H. 1995. Supporting communities of learners with technology: A vision forintegrating technology with learning in schools, Educational Technology, 35(4), 60-63. Kopecky, K. 2006. E-Learning (nejen) pro pedagogy,” Olomouc: HANEX. OECD 2005. E-learning in Tertiary Education: Where do we stand? Paulsen, Morten Flate 2003. Online education and learning management systems: global e-learning in a Scandinavian perspective. Oslo: NKI Gorlaget. ISBN 82 562 5894 Rosenberg, M. 2001. J. E-learning, Strategie for Delivering Knowledge in the Digital Age. Columbus: McGraw-Hill, ISBN 0-07-136268-1. Vierack, K. (2011). New Security Environment. (Online) Available at: http://www.newsecuritylearning.com/index.php/interview/102-nato-general-saysmore-training-will-be-on-unclassified-web White, C. (2003) Language Learning in Distance Education. Cambridge: Cambridge University Press, 249 pp. ISBN 0-52181541 Economics and Management Ekonomika a Management Published by/Vydává: University of Defence Univerzita obrany Address/Adresa: Kounicova 65, 662 10 Brno Czech Republic + 420 973 442 660 http://www.unob.cz Number/Číslo: 3/2012 Date of publication: 31th December 2012 Datum vydání: 31.12.2012 Executive Editor/ Výkonný redaktor: Eng. Vítězslav JAROŠ, Ph.D. Printed by/Tisk: University Press of University of Defence Vydavatelství Univerzity obrany Registration number/ Evidenční číslo: MK ČR E 17538 ISSN 1802-3975 © University of Defence Univerzita obrany