Wednesday, July 31, 2019

Behavioral trend- Adolescent rebellion

Throughout generations, adolescent behavioral trend has been a matter of concern for families and schools. Their rebellious attitude has drawn attention of many psychologists. Usual defiance includes mood swings, disobedience, anger, criticism, disagreement, and harmful habits like smoking, drugs.Socioeconomic status of the youth is a major factor. The urge to be accepted by their peers, leads to comparison for equality. Peer pressure is perhaps the most vital and unavoidable element in adolescence. Columbia University Teachers Suniya S. Luthar and Nadia S.Ansary wrote following: In a comparative study of middle school students at the two socioeconomic extremes, Becker and Luther (2004) found that â€Å"good students† enjoyed high peer status in both suburban and urban settings; by contrast, it was only the high income youth who admired peers seen as â€Å"bad students†. Society which does not view teenagers as adults restricts their freedom, believing it to be in their best interest. Parents often believe that adolescents cannot make good decisions. This restriction of freedom leads to rebellious behavior.However, â€Å"a Cornwell study from 2006 determined that teens are more likely to consider risk while making a decision, and for a longer period of time, than adults† (Cornell University, 2006, December 12). Psychologist Laurence Steinberg says that a large factor in teenage rebellion is the natural early development of the socioemotional network. (Cited in Temple University, 2007) References Luthar,S. S. & Ansary,N. S. (2005).Dimensions of adolescent rebellion. Development and Psychopathology, 10, 231-243. Steinberg,S (2007). Teenage rebellion and the socioemotional network. Science Daily. Retreived April 6, 2010 from www. sciencedaily. com

Tuesday, July 30, 2019

Uefa & Football Governance

Jaime Andreu-Romeo – Head of European Sport Unit, European Commission Leonardo Nascimento de Araujo – AC Milan and FIFA World Cup Champion ‘94 John Barton – T. E. A. M. Marketing Genevieve Berti – Communications Manager of G-14 Marco Brunelli – Lega Calcio and our tutor Richard Bunn – TV and Media consultant Michele Centenaro – Senior Product Manager, Club Competitions, UEFA Jerome Champagne – Deputy Secretary General, FIFA Jean-Paul de la Fuente – Founding Director, Deureka Peter Gillieron – General Secretary, Association Suisse de Football Michel Guenaire – Head of Sport-Law Division, Gide, Loyrette et Nouel, Paris Rodolfo Hecht – President, Media Partners Group Jonathan Hill – Communications and Public Affairs Liaison to the European Union, UEFA GianniInfantino – General Counsel Commercial Legal Services, UEFA Thomas Kurth – General Manager of G-14 Antonio Marchesi â€⠀œ Senior Partner, Deloitte and Touche Sports, Italy Lars-Christer Olsson – Director of Professional Football and Marketing, UEFA Denis Oswald – IOC member and President of FISA (International Rowing Federation) Alex Phillips- Senior Product Manager, Professional Football, UEFA Arnaud Rouger-Conseil Juridique, LFP (Professional Football League – France) Freddy Rumo- President of Executive Board of Neuchatel Xamax FC and former UEFA Vice President Jefferson Slack- Director, Inter Active, FC Internazionale Milano Stefan Szymanski – Professor of Economics, The Business School, Imperial College London Alain Rumpf – Coordinator of the Professional Cycling Council, International Cycling Union (UCI) Additionally we would like to thank UEFA -Division of Services, especially Barbara Rodel, Division of Professional Football and Marketing, especially Marion Haap, Lucia Castelli at Atalanta Bergamasca Calcio, Ruth Beck-Perrenoud from the Olympic Museum for her help in research, our professors at DeMontfort University (Leicester, UK), SDA Bocconi (Milan, IT) Universite de Neuchatel, (Neuchatel, CH), the CIES and FIFA, sponsor of the International Master, especially Vincent Monnier. Finally we thank our families and friends for their patience, support and inspiration, especially during the last phase of this project. 5 PROLOGUEThe headlines of sport news sections have been filled with tension-riddled declarations from football club managers toward football’s organisers about too many matches, national team call-ups at key points in the season and concern over players victim of injuries during â€Å"useless international friendlies. † The response is sometimes swift, sometimes harsh, but always illustrative of the conflicts between the members of the so-called football family. We recognise that all families have conflicts, some tragic, others trivial, but we were struck by the intensity of this banter internally sewing a frown to football’s countenance while still outwardly presenting a naive smile. We began to analyse the relationships and gradually realised that there were some family members with serious concerns who were not addressing each other.We heard the uproar from major club figureheads when UEFA took the nth decision to change its prize event, the Champions League. We also felt the inescapable force of commercialised-globalisation when Brazilian international players flew half-way across the world to China for 90 minutes of football worth US$ 1 million. We shed a tear when Italian legend AC Fiorentina were dissolved and Angelo DiLivio, a FIFA World Cup finalist, voluntarily descended to the fourth and final professional division and set out to paint the second Florentine renaissance, this time named Florentia Viola. We love football and we have a great interest to see the beautiful game continue to flourish to the ends of the Earth.Thus when we saw these unresolved dissonances spreadin g through the game, we made the decision to throw ourselves into the melee and clarify who the actors were, what their interests were and how they were relating to each other. After surveying the field we chose to focus on the clubs and UEFA, and then more specifically on the group of clubs creating the most commotion, the G-14. Their name seemed to pop up everywhere from the headlines, to the European Commission but never from UEFA. We found the door, brushed aside the coats and stepped into the magic wardrobe of UEFA, G-14 and European Football. . . 6 INTRODUCTION I. Aim The final aim of this project is to propose some adjustments to the current governance model of European football in order to address the conflicts arising from the pressures of the modern sport.In order to do that we structured our research to answer the overriding question of â€Å"How do international sport governing bodies adapt and respond to the pressures of lobby groups? †, looking specifically to th e case of UEFA and G-14. With the overriding question in mind, we structured our project to answer the following questions: 1. What are the conflicting circumstances within the governance of European football that are bearing the rise of such lobby groups? 2. How efficiently are those conflicting circumstances being addressed by the pertinent actors? 3. What are the main risks to the sport that can arise from the process in which the conflicts are being managed, and how can those risks be mitigated? II. Paper Structure and Scope The tructure of this paper is sub-divided in five chapters: In the first chapter we present the field of play and provide some background information on the stage and scenario in which the main actions take place. We will demonstrate the current governance structure of European football, briefly touch on the peculiar dynamics of the football industry, present the major relevant stakeholders, their interests and inter-relationships and illustrate the complexi ty of the competition calendar of professional football in Europe. This information will be relevant for the complete understanding of the issues treated in the paper. The second chapter presents the major actors involved in the production of the spectacle of European football.Although we recognize that the media and the major sponsors are important enablers in the distribution and popularisation of European football and its influence over the shaping of the game has been growing along the years, we have chosen to focus the scope of our analysis on the clubs (and with them, the G-14), the national associations, the leagues and UEFA, as we believe those are still the most influential actors in the design of football as a product. After presenting the major actors, in the third chapter we analyse the convergences and divergences of interests among them, the main areas of conflict and the potential risks that such conflicts can impose to the future of European football. We then take a break at chapter four and look outside European football in the search for examples of conflict management at similar sporting contexts. Our objective with chapter four is to learn some lessons that could be applied in the process of defining our final recommendations for the present case.Finally, in chapter five we present a model with recommendations for adjustments to the current governance of European football, with the aim of minimizing the conflicts and tensions among the members of the Football Family. 7 Although UEFA has a broad range of activities touching on every discipline of association football in Europe, the scope of this paper is limited to elite professional men’s football, as this is currently the only form of the game that has achieved significant commercial potential. And it is not until significant flows of money begin to pour over a sport that the major conflicts among different stakeholders start to surface. III. Research Methods and constraints Our res earch was carried out during May and June 2003. It has been structured around a hypothesisdriven approach, a methodology commonly used by management consulting firms.The approach consists in five major steps as shown in Figure I: Figure I – The hypothesis-driven approach 1 2 3 4 5 Overriding question Issue tree Hypotheses Research Analyses & Conclusions 1. Overriding question The Overriding question is the ultimate question the project aims to answer. As mentioned before, we have defined it as: â€Å"How do international sports governing bodies adapt and respond to the pressures of lobby groups? † 2. Issue tree The second step consists in identifying the relevant issues that need to be addressed in order to answer the overriding question. The issue tree is a hierarchical structure of questions that will be answered during the project leading to the final answer to the overriding question.For this paper we have defined three main issues and a set of 24 sub-issues in two different levels as shown in Figure II. 3. Hypotheses Once the issue tree has been defined we have generated the hypotheses for the project. The hypotheses are tentative answers to the issues based on the authors’ intuition and background knowledge on the subject. They may be proved right or they may be discharged after the research and the analyses are conducted. The importance of generating a sound set of hypotheses is that it provides the group with a comprehensive overview of the project’s main messages at its very beginning. 4. Research In this step we have designed the analyses that needed to be conducted to prove or discharge our hypotheses.Based on that set of analyses, we defined the input data to be gathered and determined their potential sources. 8 Input data was collected through the following methods: †¢ Preliminary interviews with representatives of UEFA and G-14 to validate the soundness of the initial list of hypotheses. †¢ Interviews with re presentatives of sport governing bodies, football clubs, national associations, national leagues, governmental bodies, sports marketing companies, media companies, lawyers, economists, players and industry analysts to capture the different views on the subject and its potential developments. †¢ Review of official documents provided by G-14 and UEFA, besides books and papers from academics on matters concerning the scope of our project. Search and review of websites of official governing bodies, clubs, and specialized sport press for relevant news and archive materials. †¢ Final interviews with UEFA and G-14 to discuss and validate our preliminary findings. 5. Analyses and conclusions After finishing the process of data gathering we have conducted the analyses necessary to prove or discharge the hypotheses and have drawn our final conclusions. Research Constraints Although the hypothesis-driven approach adds focus and drive to the project, speeding up the problem solving pr ocess, this project was conducted along six weeks of full-time work and there is some limitation to what can be achieved in such a reduced time frame.Notwithstanding, we have been fortunate by the fact that some of the major exponents in the European football industry were extremely collaborative and candid about the subject, allowing us to conduct twenty three high-level interviews across four different countries covering representatives of and experts on all main stakeholders involved in the subject. Precisely because of time constraints, we have not been able to directly interview executives from TV companies or sponsors, nor have we been able to conduct quantitative analyses on the opinion of fans as far as the issues touched by this paper are concerned. Our conclusions with regards to those groups of stakeholders are based on interviews with industry analysts and any available research material published on the subject.With respect to research materials we have been able to obt ain the majority of information needed to prove or discharge our set of hypotheses, perhaps with the exception of conclusive empirical data about the determinants of demand for sport. This would be particularly useful in allowing the design of more precise scenarios for the future of the game, and further research in this area might prove valuable. 9 Figure II – The original project issue tree (as designed in the first group meeting) Overriding question How do international sport governing bodies adapt and respond to the pressures of lobby groups? The case of UEFA and G14 Issue A What are the conflicts within the internal structure of European Football and why are they arising? A1 What are the interests of UEFA? A2 What are the general interests of the clubs? A3How do those interests interplay? A4 What additional factors could be creating / amplifying conflicts? A1. 1 How does UEFA pursue those interests? A2. 1 How do top clubs pursue those interests? A3. 1 What are the areas of convergence? A1. 2 How do those interests represent the views of the member associations? A2. 2 How do other professional clubs pursue those interests? How do amateur clubs pursue those interests? A3. 2 What are the areas of divergence? A2. 3 Issue B How efficiently are those conflicts being managed? B1 How have past conflicts been managed? B2 What are other examples of conflict management in sports? B3 What lessons can we learn from those examples? Issue CWhat risks can arise for the sport from the management of such conflicts and how can those risks be mitigated? C1 What if UEFA rigidly fixes its position against the Lobbying group? C2 What if UEFA adopts a reactive role towards the conflict? C3 How can UEFA adopt a proactive model to solve conflicts? C1. 1 What are the threats for UEFA coming from G-14? C3. 1 What are the most sensitive areas to be considered by this model? What are the key success factors for the model? C1. 2 What are the threats for G-14? C3. 2 C1. 3 What w ould be the consequences of those threats if carried out? C3. 3 How should the model be designed? 10 CHAPTER ONE: BACKGROUND 1. 1. 1. 1. 1. STRUCTURE OF EUROPEAN FOOTBALL GOVERNANCE AND FOOTBALL – THE PYRAMID STRUCTUREThe governance of association football resembles a pyramid where each layer takes on different responsibilities in different geographical scope. The formation of this pyramid has historical roots in the early stages of organized football in Britain and it has not been a uniform process. As Britain changed from an agrarian to an industrial society in the late 18 century, the games played in the open fields of the countryside were adapted to suit the narrow streets and hard surfaces of the new urban communities. The leisure time determined by sun, seasons, and feudal obligation was replaced by the much more restricted leisure hours decreed by the artificial light of the factories and the needs of the owners.Improvements in roads and transportation allowed games to be played outside the local village, and as steam trains started to link the ever growing towns of Britain, it became possible to play on a national basis the games that the middle class favoured and promoted. This expanding scope involved agreement on rules and the formation of a national governing body. 1 th And that is where the pyramid begins to be formed. With the spread of the sport around the world, the pyramid started evolving from a local and national to an international scope and finally reached its current form as shown in Figure 1. 1: Figure 1. 1: The pyramidal structure of European football FIFA UEFA National Leagues National Associations REGIONAL ASSOCIATIONS CLUBSThe clubs The clubs are the basic cell and the foundation of the pyramid. Originally founded as local associations their initial objective was to offer the local community the possibility of engaging in the sport, thereby promoting the idea of â€Å"sport for all†. With the introduction of a regular c ompetition, The FA Challenge 1 MURRAY Bill, The world’s game – a history of soccer, University of Illinois Press, 1998, p. 2 11 Cup in 1871, spectator crowds in England began to increase dramatically and in 1901 a crowd of 110,820 turned up to see Tottenham Hotspur and Sheffield United contest the final of the trophy . These crowds were increasingly giving birth to the popularisation of football as a spectator sport.Today, the main objective of top professional football clubs has shifted from the offer of opportunities to engage in the practice of the sport, to the offer of the spectacle of the game and all the attached psychological, emotional and social benefits for the fan. But the clubs still remain the basis and the primary link of contact with the communities. Regional associations Regional associations form the next level; although this form of association is not present in all countries. Clubs are usually affiliated to these organisations. Their scope of action is limited to a region within a country in which they are responsible for organising regional championships or coordinating the sport.National associations The first national association to come into scene was the English Football Association, or simply the FA as it is known today. It emerged from the London FA that became virtually the sole authority for the game in England after different regional associations in England came to a compromise agreement in 1877. By 1905 it had achieved the mark of 10. 000 local clubs affiliated to it. The success of the London FA in establishing its control over other regional associations came with the popularity of the Challenge Cup, instituted in 1871, a competition that is still played today. Also helping to secure the success of the dribbling game was the regular match with Scotland which began officially in 1872. 4 3 2Today, national associations besides organizing club competitions and being responsible for the coordination of a national tea m to represent the country in international competitions are also the supreme regulatory and disciplinary body of the sport within the national boundaries, although, as we will see later, they have limited autonomy and have to abide by the rules of UEFA and FIFA. By doing this they are granted a monopolistic position in the national organization of the game, as FIFA as the ultimate body in the pyramid will only recognize one association per country. National Leagues Some countries such as France, Italy or England know another form of organisation with the introduction in the structure of national leagues. The origin of leagues dates back to the England of the end of the 19 century.In 1885, after a series of complaints about athletes accepting money and the creation of committees to deal with them, followed by threats of serious punishments, the FA legalized professionalism. This meant that players had to be given a regular income. The Challenge Cup was still the main competition. Be ing a knock-out competition, even the best teams could be eliminated in an early round being left with nothing to do. The answer was the Football League. The league was 2 3 4 5 5 th : Ibid, p. 9 Ibid, p. 6 Ibid, p. 7 The elite club competitions are respectively organised in these countries by the ‘Ligue Nationale’, ‘Lega Calcio’ and the ‘Premier League’. 12 ade up of selected teams that agreed to play one another on set dates, on a home and away basis, and promised to field their strongest teams and to give league matches preference over all others. The individuals engaged in the discussions about the new league were essentially self-made men, small business owners and industrialists who came from a social category different from that of the men of the FA. With the FA watching anxiously, discussions were held by those in favour of the league. On 8 September 1888 the new football league kicked off competition with twelve teams. A constitution wo uld be drawn up determining issues such as points scoring system, how to share the gate money, and later, a system of promotion from and relegation to a second division.According to its founder and guiding spirit, the Scottish-born Birmingham businessman William McGregor, the aim of the league was to protect the interests of the clubs taking part in its competition. He openly declared that â€Å"the league should never aspire to be a legislating body†¦ by the very nature of things the League must be a selfish body. † The English Football League conceded the right of the FA to control football in all areas but the organisation of league competition. This meant that the FA was left to control the Challenge Cup, internationals, amateur football and certain matters concerning the rewards and disciplining of the professionals. 6Today, the relationship between national leagues and national associations throughout Europe is very similar to the one verified in England in the lat e 19 th century. While the national association is responsible for the control and development of all aspects and disciplines of football within the national boundaries, the league’s main interest is the commercial development of its major product, a league competition. Although there are tensions from time to time, the two bodies co-habit in relative peace given their share of common interests on the game. UEFA The next level of the pyramid is formed by the continental confederations, or more specifically in the case of Europe, UEFA – The Union of European Football Associations. As the name suggests, UEFA is formed by 52 national associations .It is the governing body of football on the continent of Europe and has as its core mission to safeguard the development of European football at every level of the game and to promote the principles of unity and solidarity, as we will detail later. Along the same lines of the national associations UEFA enjoys a monopolistic posi tion on the organisation of the game in Europe, guaranteed by the pyramid structure. It is relevant to notice that unlike the reality at the national level, where a league takes from the national association the responsibility of organizing and commercially developing an elite competition among clubs, the figure of the league does not exist at the continental level. The task of organizing and commercialising European club competition falls into UEFA’s direct jurisdiction.FIFA FIFA, is the supreme authority of football in the world. Its creation, in 1904, precedes that of the continental confederations, and thus, its membership structure is also formed by national associations. 7 6 7 MURRAY Bill, The world’s game – a history of soccer, University of Illinois Press, 1998, p. 11 See a complete list of UEFA’s member associations at appendix a. 13 Technically, the continental confederations, like UEFA, are not members of FIFA, but are recognized bodies and hav e the right to elect the vice presidents and members of FIFA’s Executive Committee. FIFA’s purpose is to promote and develop the game of football throughout the world, and to be the uardian of the regulations of the game. Unlike national associations, national leagues and continental confederations, FIFA currently does not organise club football competitions, although it regulates over matters that impact club football reality, such as transfer systems, and the coordinated international calendar. FIFA’s activities as far as competition organisation is concerned are currently limited to international competitions among national teams. FIFA is responsible for holding the whole pyramid together. The ownership of the FIFA World Cup, the most important single sporting event in the world, and a large and universal membership base are its main sources of power.By making use of regulations such as the need for a national association to be a member of a continental feder ation for two years before being granted membership to FIFA , and by obliging continental confederations to comply with and enforce compliance with the FIFA statutes, regulations and decisions, and to ensure that international leagues or any other such combination of clubs or leagues shall not be formed without its consent and approval of FIFA , or by prohibiting affiliated national associations and their clubs to play matches or entertain other sports contacts with associations which are not affiliated to FIFA or with clubs belonging to them without FIFA’s consent , it guarantees that the layers and the monopoly of the pyramid in the organisation of football are respected. 1. 1. 2. THE EUROPEAN FOOTBALL INDUSTRY 11 10 9 8Definition of the Football Industry Many people resent the use of the term ‘business’ to describe the activities performed by the main actors in the European football scenario. However, it is undeniable that European football has undergone an ac centuated process of commercialisation, especially in the last fifteen years, which has brought significant amounts of money into the game. Instead of engaging in an emotional and semantic discussion to determine if football is a game, if it is a business or if it is as much a business as it is a game, we will define as football business the group of commercial activities performed by the actors in the football industry, and we will define as football industry the group of legal entities whose commercial activities are rooted in the game of football.However, such a definition of the football industry is a very broad one and for the purpose of this paper it needs to be narrowed down as proposed in Figure 1. 2. 8 9 10 11 FIFA has currently 204 member associations (one per country), which represents a larger membership base than the UN. FIFA Statutes, art 4, par. 1 FIFA Statutes, art. 9, par. 3 FIFA Statutes, art. 57, par. 1 14 Figure 1. 2 – The structure of the football industr y12 Sports Industry Football Other Sports Sporting goods Facility dependent sports services Sport consultation services Spectacle sport Hybrid Sport Participant Sport Club Football National team Football Participant services Spectator services Sponsorship services Media servicesLicence services Scope of this paper Outside the scope of this paper The product-based typology proposed in Figure 1. 2 divides the sport industry into three main segments: Sporting goods, Facility dependent sports services and Sport consultation services. †¢ Sporting goods: companies producing apparel, shoes, equipment, team and/or league merchandise, ‘sport’ licensed products. Examples of companies in this segment include Nike, Adidas and Reebok. †¢ Sport consultation services: companies supplying advice in areas such as management, medical, design, building and maintenance, programming, among others. Examples include IMG, Octagon, and InFront. Facility dependent sports services: orga nisations offering sport as their end product be it as spectacle (matches, competitions) or as access to participation. This segment, like the others, can be further subdivided in three categories: spectacle, participant and hybrid sport. – Spectacle sport: the most prominent feature of organisations in this category is the ability to generate substantial revenues directly or indirectly from spectators. Here, athletes are usually professionals. Examples of organisations in this category are Manchester United, Juventus and the English Premier League. 12 Adapted from WESTERBEEK & SMITH, Sport Business in the Global Marketplace, Palgrave, 2003, p. 87 15 Participant sport: this is the category of entities providing opportunities for people to engage in sporting activities, usually on a non-professional basis, like gyms, community sports centres and amateur sport clubs. – Hybrid sport: in this category, sports organisations offer a mix of spectacle and participant sport. As Westerbeek and Smith 13 point out, governing bodies are likely to be hybrid sport organisations as they are charged with developing a mass participation base for the sport with the ambition of securing its longevity, while encouraging and promoting the few outstanding athletes that can perform in elite spectacle sport, providing the sport with the exposure so essential to its popularity, while developing the basis for spectacle sports’ revenue streams.Once the segmentation is understood, we can then define the European Football Industry in this paper as the group of legal entities acting in the facility dependent sports services, specifically within the boundaries of the spectacle and hybrid sport category in the territory covered by the fifty two member associations of UEFA. It is important to remark that this industry is built on two main pillars, club football and national team football, that ultimately have to â€Å"share† part of the same resources: top-level pla yers, spectatorship, calendar time, among others. Dimension and Growth of the European Football Industry There is no reliable data about the size of the European Football Industry as defined above.Deloitte & Touche estimates that, in the season 2000/2001, it should be close to national team football in Europe is in the range of 90-10% respectively. 15 10 billion. 14 A possible breakdown of this number is shown in Figure 1. 3. We reckon that the split between club football and Another important consideration is the fact that domestic football (in top and lower divisions) is by far the most important segment of the industry. As we can see from Figure 1. 3, the lion’s share of the industry is represented by top-division club football in the domestic leagues, amounting to 6. 6bn, thereof the so-called ‘big-five’ leagues (England, Italy, Spain, Germany and France) dominate 78%.Put in perspective, those numbers are not very impressive, as the entire European Football I ndustry would not even feature in the ranking Fortune Global 500 16 in 2002. What is impressive though, is the consistent fast pace with which this industry has been growing over the past 10 years. The top-division clubs at the ‘big-five’ leagues all grew at similar rates from the mid-1990s to 2001 – between 18% to 24% per annum, 17 while UEFA’s consolidated revenues grew at an impressive rate of 29% per annum 18 during the nine-year period comprised between the seasons 1992/1993 and 2001/2002 mainly 13 14 15 WESTERBEEK & SMITH, Sport Business in the Global Marketplace, Palgrave, 2003 Deloitte & Touche Annual Review of Football Finance – June 2002 – p. 16 A priori, by looking at Figure 1. , this proportion might sound counter-intuitive but we must not forget that a share of UEFA’s and the European federations’ revenues is based on club football. The Fortune Global 500 ranks the 500 largest companies in the world based on their g lobal revenues. In the 2002 ranking, Wal Mart appears as number 1 with global revenues around US$220 billion, while Takenaka, a Japanese company in the construction business ranks 500 with global revenues slightly above US$10bn. DELOITTE & TOUCHE Annual Review of Football Finance 2001/2000 – p. 4 UEFA’s consolidated revenues including amounts paid beforehand – UEFA CEO Annual Report 2002 p. 33 16 17 18 16 riven by the growth of the UEFA Champions League as we will show later. And although these growth rates are recently giving sign of slowing the pace, we believe it is more a matter of an internal adjustment of the industry than the apocalyptical actualisation of the burst of a bubble as many analysts like to put it. Most of the economic fundaments supporting the growth of the European Football Industry are solid, as notwithstanding the latest downsizing in the value of broadcast rights paid for some properties and the breakdown of companies like ISL and KirchMe dia, we do not see signs of an actual decrease in the demand for European Football.Much on the contrary, as we have seen that the TV audience for the 2002/03 UEFA Champions League grew by 9% in relation to the previous year, meaning that the competition produced an average live audience of 46 million viewers per match-week in the larger markets. 19 Figure 1. 3 – Estimated market size of the European Football Industry 2000/2001 billion 1. 3 1. 2 6. 6 ‘Big-5’ Leagues 10. 0 0. 7 0. 2 10 year average 24% 17% 14% 13% 10% 78% England Italy Spain Germany France growth > 20% p. a. Top division domestic club football1 Lower division domestic club football3 UEFA Club Competitions2 Annualized EURO Cup2 Sources: 1) Deloitte & Touche, 2) UEFA , 3) Authors’ estimatesRevenues of National Associations, Leagues, UEFA, others3 Total1 It is important to notice though, that if the industry has experienced significant growth in revenues in the last decade, profitability has not kept pace. This is mainly because of the rise in the spending on players in a phenomenon known as the ‘prune juice’ effect, which refers to the tendency for revenues generated by football clubs to simply pass through the clubs’ accounts on the way to players’ pockets. Just to illustrate that point, as already mentioned, the consolidated revenues of the top-division clubs in the ‘big-five’ leagues grew at an annual rate between 18% and 24% between the seasons 1995/96 and 2000/01.In the same period the ratio wages/revenues went from 47% to 60% in England, and from 57% to 75% in Italy, just to mention two of the major markets. profitability 21 20 The result is a plunge in the 23 of the industry in the major markets 22 with the most accentuated cases being Italy going from –1% to –19% in six seasons and Spain going from –7% to –28% in four seasons. 19 20 21 22 23 UEFA’s champion audience, Sportbusiness. com, June 3 2003 Analysis of the authors based on the Deloitte and Touche Review of Football Finances – 2002 Measured as Operating Profits / Revenues The exception is Germany that managed to keep its profitability between 8% and 10% during the period There are no available date for Spanish top-division clubs in the seasons 1999/00 and 2000/01 17Business Model of the Football Industry The current business model of the European Football Industry relies on four main revenue streams: 1. Match day revenues – Expenditure of fans on-site, mainly derived from gate receipts (including season tickets). 2. Media rights – Value paid by media companies to acquire the rights of broadcasting a specific sport property. 3. Sponsorship – Mainly derived from brand/name placing on team shirts and around stadia. 4. Other commercial revenues – Mainly revenues from licensed merchandise, but also includes conference and catering services. Figure 1. 4 gives an overview on the proportions of these revenue streams for a sample of domestic leagues. Figure 1. – Breakdown of top-division clubs revenue streams – 2000/01 16% 31% 18% 16% 42% 34% 40% 25% 54% 39% 51% 45% 51% 20% 18% 20% 12% 4% 41% 43% 13% 30% 17% 9% 15% 22% 14% 18% 15% 12% 13% England Italy Spain (97/98) Key: Germany France Portugal Netherlands Norway Matchday Broadcast Sponsorship (includes all commercial revenues for England) Other commercial Source: Deloitte & Touche As we can see from the graph above, TV is in general the single largest contributor to clubs’ revenues in the ‘big-five’ leagues. According to Deloitte & Touche in the season 2000/01, TV responded for 2. 4 billion, or 46% of the 5. 2 billion total revenues of the top-division clubs in the ‘big-five’ leagues.However, this proportion will vary significantly according to the size of the TV market in which the club is located. There is a clear difference between the relevance of TV monies for the top-division clubs in the ‘big-five’ leagues and the top-division clubs in other mid-size or small leagues like Portugal, Netherlands and Norway, as shown in the graph. The Fan: The Heart of the Football Industry Although the importance of television and sponsors is clear in the current business model of the European Football Industry, which might lead us to conclude that those are the most important actors in this industry, the dynamics of the industry rely ultimately on the interest of spectators. Figure 1. shows a simplified map of value relationships between actors in this industry. 18 Figure 1. 5 – Summarized Value Chain of the Football Industry Simplified Simplified 2 Leagues Sponsors ? Clubs B C 1 3 ? Television A Football Fans Population Note: For the sake of simplification this map does not consider some important stakeholders in the Football Industry such as governing bodies and federations, players, clubs’ shareholders, national teams, a mong others The cornerstone of value for the Football Industry is relationship – between fans and the clubs. In this relationship the clubs supply the fans with the game and all the emotional, social and psychological benefits attached to it.The fans, in turn, provide the club with financial resources in the form of gate receipts, season tickets or membership fees and purchase of licensed merchandise besides the emotional association, support, loyalty, exposure, among other non-tangible benefits. Relationship illustrates the fact that clubs need the league structure to create the on-field competition environment required by fans. And the quality of the competition, measured in the quality of teams taking part in that competition and in the level of competitive balance, is one of the most important drivers of demand for football. This relationship between clubs and leagues 24 is one of the ell-known peculiarities of the Football Industry. In any other industry the ideal object ive of the players would be to achieve a monopolistic position driving competitors out of business, whereas in the Football Industry this is not only impossible, but also not desirable, since clubs need to cooperate for the joint-production of the game. However, there are inherent conflicts between teams since the league structure also determines a team’s individual share of industry profits. Relationship reflects the fact that part of the football fans are not necessarily attached to one specific club but have overall interest in a particular competition.The marketing strategy of the UEFA Champions League has the benefit of strengthening this link eventually intending to increase the share of the population interested for European football regardless of a particular team allegiance. In the left side of the map we have television companies. Traditionally, revenues of free-to-air television companies are based on advertisement from sponsors. In order to attract sponsors, 24 Le agues or whatever entity responsible for organising a football competition 19 television companies must be able to attract audience, and this is done by offering content. That is represented by relationship A. Television companies offer content to the public in the quest for an audience.By getting an audience, television companies become attractive to sponsors. That is shown in relationship C. Sponsors will pay to use television as a channel to advertise their products and services to their target markets among the audience. Pay-TV companies have an incremental revenue stream. In addition to advertisement from sponsors they rely on subscription fees from consumers interested in having access to exclusive content. In both cases though, it is clear that audience is key. In markets where the interest for a particular sport captures a large share of the population, which is the case of football in the ‘big-five’ leagues, the link represented in relationships 25TV companies and sponsors realise the importance of and wish to exploit it. That is represented by and relationships ? and ?. In relationship ? , TV companies pay to acquire the right (if possible exclusive) to broadcast individual matches or competitions in the hope to attract an audience. In relationship ? sponsors pay to associate themselves with teams or leagues both as a way to get visibility to sports fans and as a way to associate their brand with the sporting brand they are sponsoring, thus exploring the goodwill present in the link between the fan and the sport. Their ultimate goal is to get the population to consume their products and services.In all cases it is simple to understand that the ultimate source of value for the Football Industry is the interest of the fan for the sport. The fan is the TV viewer, the pay-TV subscriber, the stadium spectator, and potentially the end consumer of the sponsors’ products and services. The larger the fan base and the larger its identificat ion with the sport, the higher the probability that this sport will attract the interest of TV and sponsors. Of course, the potential value of the Football Industry in a particular region will depend also on the size of the TV and the advertisement markets in that region, which in the end bear relation with the demographics of the region. Thus the focal point of he Football Industry is the football fan, 26 and that is the reason why it is crucial for clubs, leagues and governing bodies to understand what drives spectator interest for European football, in other words, what are the drivers of demand for football. Demand for Football Spectatorship Stefan Szymanski summarizes the most important factors driving fan interest for football in three classic elements: 27 Quality of the game Uncertainty of outcome (of the match and of the competition) Success of the fan’s own team 25 26 England, Italy, Spain, Germany and France There are several studies intending to qualify the footbal l fan according to different levels of commitment and interest.For the sake of this paper we qualify as football fan any person interested in the game regardless of the level of commitment. Interview with Stefan SZYMANSKI, Professor of Economics, Imperial College London 27 20 The quality of the game would touch on aspects such as the entertainment and spectacle, the aesthetic pleasure of watching the game, the quality of the visiting team. The uncertainty of outcome has two major aspects: uncertainty of outcome of the match and the uncertainty of outcome of a competition. About the uncertainty of match outcome, the review of the literature shows that generally, the closer the result of the match is expected to be, the more attractive the game will be to fans.Along the same lines fans would be less enthusiastic about a game in which the result is seen as a foregone conclusion. Furthermore this uncertainty must be preserved at all costs, as the integrity of the game is completely conn ected to the integrity of the result. 28 The uncertainty of outcome of the competition is measured in terms of competitive balance. There is general agreement that match attendance will be influenced by the closeness of the championship race. As more teams have a chance of reaching the finals or play-offs, fans will expect a close contest and anticipate high quality play. This anticipation will be reflected in a higher level of fan enjoyment and consumer utility and a boost to crowd size. 29Success of the fan’s own team implies that supporters achieve satisfaction from identifying with a winning team. Arguably, a team that consistently loses will have difficulty attracting large crowds. active supporter bases than their domestic peers. But if a winning season contributes to the increase of the commitment of the supporter base of a specific club and if the fan base, as argued before, is the principal source of goodwill for a club, it seems obvious to state that clubs, as indiv idual entities, will seek to maximize their winning ratios as a way to increase the supporter base. This practice, if successful, will eventually conflict with the element of uncertainty of outcome.The challenge for clubs and organisers of competitions is to understand the optimal combination between those three elements (quality of the game, uncertainty of outcome and success of own team) in the determination of demand for football as they frequently can conflict among themselves. Conclusion In summary, as much as we want to avoid the discussion of football being a business or a game, we must recognise that the dynamics of the football industry present some specific characteristics that make us conclude that football cannot be taken as just a regular business. These special characteristics fall mainly in three inter-related areas: 1. Football clubs are cultural and community assets with associated sporting and community objectives.There is a long and unfinished academic debate argu ing that football clubs are utility 30 That could help to explain why clubs like Manchester United or Real Madrid have larger and more 28 In that sense potential contractual clauses like the one suggested by the press in the Beckham transfer from Manchester United to Real Madrid, in which the acquiring club will pay a bonus to the ceding club based on the former’s future performances at championships at which both teams compete could allow for the public’s perception of match fixing between the two clubs in a specific scenario, which could eventually hurt long-term demand for the game. WESTERBEEK & SMITH, Sport Business in the Global Marketplace, Palgrave, 2003, p. 64 29 30Although formation of fan basis is a more complex phenomenon and depends on many other factors apart from a team’s winning record at a given time. 21 maximisers pursuing non-pecuniary objectives rather than maximisation of economic value as any other business. Sloan 31 argues that while in US professional team sports, many teams have an established track record of profitability, in the case of European football teams, profit making clubs have been very much the exception and not the rule. He goes further explaining that chairmen and directors with a controlling interest in football clubs are usually individuals who have achieved success in business in other fields.Their motives for investing may include a desire for power or prestige, or simple sporting enthusiasm: a wish to see the local club succeed on the field of play. In many cases profit of the club seems unlikely to be the major motivating factor. As one of our experts interviewed puts it: ‘Clubs are too much under the control of local business owners or major individuals in the community looking for personal gain. When these people take the reigns of a club usually they end up satisfying themselves. Many of them have come to my office and said: – For me, investing in a club is just like having a PR c ampaign. Rather than giving money to an advertising agency, I buy a club and since the press talks a lot about me, it has an equivalent effect. ’ . The relationship between the supporter and the club can be very different to a standard customercompany relationship. Lomax 32 explains that most supporters choose their clubs at a young age and then stick to this choice however irrational it may seem at face value. Football supporters are key stakeholders contributing to the club not just by being loyal customers but also by actively adding to the match day spectacle, and often committing financially to keep their club afloat as it was the case with the English supporters of Northampton FC that contributed with money in a fundraising campaign to alleviate the club’s financial distress. 3.As already mentioned, the Football Industry depends on both competition and co-operation among clubs. Football then redistributes income from leading to lagging clubs (and leagues) in orde r to promote competitive balance. This redistribution of income would not be allowed in most traditional industries. The combination of those three factors makes the dynamics of the football industry special in relation to most of the other regular forms of businesses. 1. 1. 3. STAKEHOLDERS’ M AP After analysing the governance structure and the dynamics of the European Football Industry, it makes sense to map its stakeholders in a more comprehensive way. Figure 1. 6 depicts those stakeholders: 31SLOANE Peter, The economics of professional football: The football club as a utility maximiser, Scottish Journal of Political Economy pp. 121-145, June 1971 32 LOMAX Brian, Democracy and Fandom: Developing a supporters’ trust at Northampton Town FC, in: GARLAND John, MALCOLM Dominic and ROWE Michael (Ed),The Future of Football – Challenges for the 21st century, Frank Cass, 2000 22 Figure 1. 6 – Stakeholders Map of the European Football Industry Non Non Exhaustive Exhaustive Fans / Spectators Club Patrons Clubs UEFA Stock Market G-14 European Union Players National Leagues National Associations FIFA European Football Industry Media Sponsors Press Once the stakeholders are identified we will make use of table 1. to map their interests, analyse their bargaining power, identify the main groups over which they exercise their power and qualify the types of pressures suffered by each group. Some of the points covered in this section are introductory and will be explained in more details later, but we think it is important to bear in mind the relationships described below, as they will be helpful to understand the nature of the conflicts treated in this paper. Table 1. 1 – General overview of stakeholders interests, power and pressures Stakeholder Main Interests †¢ Identification †¢ Entertainment Power Focal point of the industry but not sufficiently organised (H/M)* Vulnerability Not sufficiently organised †¢ Too emotionally a ttached to the game, will accept poor treatment †¢ Internal conflict between individual and cooperative objectives Pressure exerted Pressure received Fans / Spectators †¢ Spectacle †¢ Psychological satisfaction †¢ Social Integration Immediate pressure for sport performance over clubs Community Fans (H/M) Press (H) Players (H) Pressure on Governing Bodies and leagues over a number of issues related to the regulation of the game (Revenue sharing, competition format, supply of players to national teams, calendar) Patrons (H) UEFA (H) G-14 (H/M) Media (H/M) FIFA (H) Sponsors (H) Leagues (H) Stock Market (H) Nat. Assoc. (H) Increase demand for football Clubs †¢ On pitch performance limited by budget constraints Basic cell of the industry, controls the most valuable assets for the production of the game (H)* †¢ Short-term view †¢ Little control over main cost items †¢ Not a homogeneous and organized group †¢ Lacks direct representation at highe r decision making level *High (H), Medium (M), Low (L) 23 Table 1. 1 – General overview of stakeholders interests, power and pressures – continued Stakeholder Main Interests †¢ Develop the following of the game in Europe Power* Vulnerability Pressure exerted Pressure received* G-14 (H) Other clubs (M) FIFA (H) UEFA †¢ Keep tight control of the game in Europe †¢ Promote solidarity †¢ Promote port for all †¢ Develop other disciplines of the game †¢ Develop the following of the game universally Detains the natural monopoly in the organisation of the game in Europe, holds the key for eligibility of players and clubs at competitions (H) †¢ Relies too much on elite club competition to fund its activities Pressure on clubs and players to comply with the regulations and principles EU (H) Press (H) Fans (L) Media (M) Sponsors (L) Players (M) Leagues (L) FIFA †¢ Keep a strong control of the game †¢ Promote solidarity †¢ Develop o ther disciplines of the game †¢ Content – to get audience from the fans Is the supreme body of world football (H) †¢ Relies too much on one single national team event to fund its activitiesPressure on national associations, confederations, clubs to comply with the rules and regulations of the game EU (H) Media (M) Sponsors (L) Confederations (M) Media †¢ Has an interest in the game as long as it generates audience. Will switch to other content options as soon as it does not †¢ Content – to get readership from the fans Is the single major investor in the game. Without TV money Football collapses (H) †¢ Limited bargaining power over the price of top events †¢ Limited concern about the long term issues of the game †¢ Subject to competition law Pressure on leagues and UEFA for changes in the format in the quest for immediate rise in audienceFans (H) EU (H) Internal competition (H) Sponsors (H) Press Extremely influential over fans (H) Has the control over the national game, is represented with decision power at UEFA and FIFA, owns the national teams – a major source of passion (H/M) Usually controls the central marketing of domestic competitions (M) In the top level, due to the limited supply of talent and due to identification of fans (H). In the lower level due to the high replaceability (L) †¢ Credibility It is the ‘Big Brother’ watching the steps of Clubs, National Associations, Leagues and Players Fans (H) Other types of media (H) National Leagues (H) Players (H) National Associations Aligned with FIFA and UEFA at the domestic level Being confined to national borders may suffer from globalisation tendencies Pressure on the clubs, and on the leagues G-14 (H) Clubs (M) Fans (M) Media (H) Press (H) National leagues †¢ Organise club competition at the domestic level †¢ Commercial optimisation of domestic competition Being confined to national borders may suffer from globalisation tendencies Pressure on the clubs for cooperation over the quest for individual objectives, pressure on national associations Clubs (H) Media (H) Fans (L) †¢ Self realisation Players †¢ Financial security †¢ Status †¢ In general not too organised †¢ Incredibly risky and specific career – shortClubs (H/M) Pressure on the clubs for better labour conditions Fans (H) Press (H) Nat. Assoc. (H/M) Leagues (M) *High (H), Medium (M), Low (L) 24 Table 1. 1 – General overview of stakeholders interests, power and pressures – continued Stakeholder Main Interests †¢ Guarantee fair trade in the industry †¢ Help Federations to implement professional management †¢ Keep the balance among football and other industries †¢ Increase representation of top clubs in the decision making process of professional club football at international level †¢ Advise clubs on current financial challenges Power Vulnerability Pressure exerted Pressure received EU Can change the structure in which the professional level of the game is managed (H)Most of the time acts like an observer, not taking action until an actor complains †¢ Do not represent all top clubs †¢ Not officially recognised by UEFA †¢ Cannot impede UEFA or FIFA to directly deal with individual member clubs †¢ Threatening behaviour †¢ Relegation / Promotion system †¢ Eligibility for international competitions Pressure on the governing bodies on anti-competitive practices Industry sectors (H) Member states (H) G-14 (The Lobby Group) Represents the major top clubs in Europe (H) Pressure on UEFA, FIFA, national associations, other clubs and the EU Fans (L), UEFA (H), Member clubs (L) Stock Market †¢ Maximisation of shareholder valueImportant source of funds for some clubs, but not very representative in the industry as a whole (M/L) †¢ Too dependant on the highs and lows of sporting performance †¢ Subject to regulations made by people who may not be profit seekers †¢ Limited sensitivity to the long term peculiarities of the game †¢ Limited control over the sponsorship agreement Pressure on the listed clubs for diversification of revenues and for financial returns Regulatory bodies (H) Fans (L) †¢ Visibility to fans Sponsors †¢ Association with the goodwill of clubs and competitions One of the major sources of revenue in the Industry(H) †¢ Reduced bargaining power over the price of top events †¢ Internal competition in the sponsorship industryPressure on competition organisers, clubs and players Shareholders (H) Other sponsors (H) Club Patrons †¢ Prestige †¢ Value transfer to other businesses Owner and benefactor of the club (H) Too much emotionally involved with the club Over players for pitch performance Fans (M), Players (H), Community (H) *High (H), Medium (M), Low (L) 25 1. 1. 4. PROFESSIONAL FOOTBALL COMPETITION CALENDAR The pyramid structure of football gove rnance, along with the international nature of the game impose additional challenges to the organisation of competition in Europe. All layers of the pyramid rely mainly on the organisation and participation at competitions to generate the funds for their activities.Be it FIFA with its quadrennial World Cup or biennial Confederations’ Cup , UEFA with the Euro or the UEFA Champions League, the National Associations with the participation in the international competitions for national teams organised by FIFA and UEFA or with the organisation of the domestic cups, the national leagues with the organisation of the domestic league, or the clubs participating in domestic and international competitions, all actors depend ultimately on competition to subsist. The complexity in the organisation of the competition calendar comes from the fact that the actors have to share the same restricted resources: players and time.National team competitions, to be able to exploit their full commerc ial potential, have to count on the presence of top players, often the same players that are fighting for top teams in club competitions. International club competitions, along the same lines, hope to count with the participation of the most popular clubs, the same ones participating in domestic competitions. All of this constrained by the fact that there are only 52 weeks in the year, and there is a physical limitation to the number of matches a player can play in a given period of time. Thus it is not an easy task to find the right combination of supply among the different types of competitions: the one that will maximise the utility for the football fan. Figure 1. shows the configuration of the football calendar for the season 2002/2003, displaying the major competitions currently being played at the elite level of football in Europe. Figure 1. 7 – European Competition Calendar – Elite Professional Football – Season 2002/2003 2002 June July August September O ctober November December 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 Week Domestic League1) Domestic Cup6) UEFA Champions League2) UEFA Cup2) UEFA Intertoto Cup Super Cup / Intercontinental FIFA World Cup7) Euro (qualification) International Friendlies3) 4) Na tio n Te al am Cl u b Week 4) Domestic League1) Domestic Cup6) UEFA Champions League2) UEFA Cup2) UEFA Intertoto Cup Super Cup / Intercontinental FIFA World Cup7) Euro (qualification) International Friendlies3) 003 Season 02/03 January February March April May J Total 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 Matchdates 38 10 23 15 10 2 9 8 4 Na tio n Te al am Notes: Cl ub 1) Based on the English Premier League 2) Including qualifying rounds 3) According to FIFA Coordinated International Calendar 4) Week 22 starts on Monday May 26th and finishes on Sunday June 1st 5) Weekend matches include Monday and Friday for the Domestic League 6) Based on the FA Cup – Starting at the 3rd round when Premier League clubs join the cup 7) Maximum of 7 matches per national team Key: Weekend matches5) Mid-week matches Source: Analysis of the authors based on data from Rec. Sport.Soccer Statistics Foundation (RSSSF), UEFA and FIFA 26 Figure 1. 7 shows that the majority of the annual football activity is based on domestic club football, including a domestic league and a domestic cup. Although the graph is based on the Premier League and the FA Cup, the activity in other countries follow a similar pattern. There is usually a domestic league being played from August to May mainly during the weekends with a number of match dates varying slightly depending on the number of participants at the top division of the league (usually between 18 and 20 in the major markets), and there is a domestic cup usually being played during the mid weeks over around 10 rounds. he UEFA Intertoto Cup. UEFA Champions League Eligibility for the UEFA Champions League depends on th e technical performance of clubs at their domestic leagues, and on the ranking of national associations prepared by UEFA. As an example, the champions and the runners-up at the English Premier League automatically secure a berth among the 32 participants at the UEFA Champions League, while the third and fourth places will play at a qualifying stage. The same is valid for Spain and Italy. But countries ranked lower by UEFA receive a reduced number of berths for the competitions with some countries receiving only a place at the qualifying phases.The competition is preceded by three qualifying phases played by 56 clubs entering in different stages. From the qualifying phases 16 clubs eventually gain access to the competition. Those clubs join the other 16 that secured an automatic berth, totalling 32 clubs. Currently, the 32 clubs play a first group stage (eight groups of four teams) with the two top teams in each group qualifying for a second group stage (four groups of four teams). T he group stages are followed by a knock out stage (quarter finals and semi finals) with home and away matches followed by a one leg final match at a predetermined venue. For the season 2003/04 UEFA has decided to eliminate the second group stage, meaning that the sixteen clubs ualifying from the first group stage (eight groups of four teams) will enter directly into the knock out stage (eighth finals, quarter finals, semi finals, and the final). This will reduce the maximum number of matches per club from 17 to 13. UEFA Cup Eligibility for the UEFA Cup is open to teams finishing in leading positions behind the champions in the domestic top divisions, besides the winners of the national cup competition, the winners of the league cup competition in certain countries, the three winners of the final matches at the UEFA Intertoto Cup and three clubs from UEFA’s annual fair play assessment. The UEFA Cup is a knock-out competition played home and away (except for the final match whi ch is played in a one leg match) and is preceded by a qualifying stage.At the third round, the eight teams falling in third place at the first group stage of the UEFA Champions League, also join the UEFA Cup. Figure 1. 8 Illustrates the format of the UEFA Cup, which is currently being revised by UEFA. 34 33 In the international scenario, there are three main club competitions currently being organised by UEFA, The UEFA Champions League, The UEFA Cup and 33 The domestic cup usually counts on the participation of clubs from many professional divisions, but the top clubs will join the cup at an advanced stage. Not considering the qualifying rounds 34 27 Figure 1. 8 – Format of the UEFA Cup # of Clubs 82 41 + 52 96 48 24 + 3 From Intertoto Qualifying Stage First Round Second Round + 8 From UCL 32 16 8 4 2 Champion Third Round Eighth Finals

Monday, July 29, 2019

British castles

British castles Essay BRITISH CASTLESGreat Britain’s castles exemplify artistic characteristics and were essential elements in the lives of kings, lords, nobles, and chieftains. The word castle means a building or group of buildings usually intended as a residence of a king, lord, noble, or chieftain. There are many different types of castles, and the features about them are simply amazing. Warfare was also an important issue involving castles. They had to have some means of protection. The castles reached their fullest development in the medieval period, even though fortified building had been around much earlier. The castles created a feudal system, which gave them their greatest importance. The feudal system was divided into three classes: the knights and nobles, clergy, and peasants. The knights and nobles’ job was to defend society, the clergy was to pray, while the peasants had the duty to till the soil and support other classes (Collier’s Encyclopedia 532). The origin of has be en traced back to the late Roman times when men placed themselves under a man stronger and wealthier than themselves (Rowling 31). The knights lived in castles built upon hilltops or in the bend of rivers. There they received vessels, held meeting: and upon occasion, defended themselves from rivals. There are many different general styles of castles in Britain. One of the styles is a motte and bailey, which was one of the first types of castles built. The castle was made of a motte, which was a large man-made mound of earth. The top of the mound was surrounded by wooden palisades, which were like logs. Within those logs was a wooden keep. This was used as a lookout tower and a last refuge or keep (Farndon 7). The only way to get into the motte was across a sloping bridge, placed on high pillars. The bailey was next to the motte, and wooden palisades also surrounded it. A ditch of water protected the bailey. The motte and bailey were connected by a flying bridge that could be torn down if the bailey was not needed anymore. Since the motte and bailey were made of wood and earth none of the castles have survived completely today (Remfry 1). Norman’s were few so they must have had to force people to help build it (Farndon 6). By the eleventh century the motte and bailey form of castle was widely spread (Alistair 3). Another type of castle is a shell keep. This was one of the first stone castles built. The keep was a circular wall that had buildings surrounding it. The keep was surrounded by an open-courtyard. This had the advantage of clustering the major components of the castle into a single strong, easily defensible keep (Remfry, Types of castles 1). Due to the fact that the shell keep was light enough to be supported by a man-made mound, many of the keeps were added to the existing motte and bailey castles. This keep was so much stronger and larger that it took longer to build than a motte or bailey. A Masonry Tower was a square that was 30 or 40 feet high. This tower was made of paste and stones, but brick and rubble were often used to fill walls at times. These towers were freestanding and the stone led to a better defense if needed. A later development of the design was a Welsh D-Tower which is a combined square keep with a round tower that made the masonry tower even stronger. The Tower of London is the most famous of these Towers (Remfry, Types of castle 2). A donjon was quite common and found in many shapes. The donjonWas considered to be a last line of defense. They were surrounded by a stone curtain wall, which was defended by several towers. The wall was very thick, as, much as nine or ten feet thick and maybe 40 foot in height. The wall has an apron like based on it to thicken the wall base, and causing solid or liquid material (Simpson 14). A later design to these towers was a gatehouse. The gate caused a weak defense so they later surrounded it by a pair of Towers. These other towers would allow attackers to be defeated from above or on the side of the gatehouse. A portcullis was also used to protect the gate with a metal grate (Remfry 2). Finally, a concentric castle was an unusual type of castle. It represented the highest form of a castle. It usually consisted of a donjon and curtain wall, even two or more walls. The second wall was lower than the first, allowing archers to drop from both walls and fire upon attackers. The tower also consisted of round towers, large moats, and gatekeeps. If the first tower was destroyed, the attacker was still faced with a whole other complete castle. If the castle were constructed properly, it would be invincible. Edward I built a majority of the castles to put down the Welsh rebellions (Remfry 2). READ: From Village to City EssayWarfare was very important with the lords of the castles. A good built castle could rarely be taken down by a direct attack. During a siege, the attacking army would surround the entrance of the castle and prevent supplies from entering (Mfeinberg 1). The army would literally starve everybody to make him or her surrender. This would take months or even years, and in this time they would demolish the castles appearance with weapons. The most common of these weapons was a catapult, which would hurl stones at the castle wall and at the defenders. A catapult could also be used to hurl other things at the castles such as heads or bodies. That would get very messy! It could also be used to hurl things at one point of the wall because they were so accurate. This could cause the castle to crumble. Another weapon of the middle ages was a ballista. This was a huge crossbow that hurled arrows the size of trees. It could also be used to hurl large stones (Brown 64). This would really start to destroy the castles in little to no time at all. A different siege weapon was a battering ram brought close to the gate and rammed until broken (Mfeinberg, Siege warfare 1). Other methods were used to get around the wall. A rolling tower, the height of the wall, was used to get close to the wall and drop soldiers at the top of the wall. Castles on cliffs were common and made it hard for the enemy to attack. There was good visibility to see attackers and made an excellent source of water and supplies. A castle with access to supplies could withstand a siege longer than one that did not. A moat was added to castles to make them stronger. A moat is a large ditch that went around the castle, filled with water. It also contained a drawbridge that limited access to the castle. Another addition to a castle were arrow loops, which were small slits in the wall that allowed archers a long field of fire and made him hard to hit. On the top of the wall crenellations served a purpose of arrow loops. A crenellation is an alternating pattern of high a low spots that affords an archer a place to hide (Mfeinberg, siege warfare 1). Instead of an archer, a crossbowman was used but a second assistant was needed to reload a second crossbow. Since windows were the only source of natural light, secesses behind them were the size of small rooms. They had built in seats behind them. For security windows near the bottom of the castle were very narrow, whereas the top ones were wide (Macaulay 31). Later advancements were even better for the castles. A round tower stronger than the square had a better platform for fire and was harder to undermine. A glacis or sloping wall was placed at the bottom of the tower to prevent ram attackers. A murder hole was used to drop cold water to put out fires. Rocks and hot water were also dropped upon attackers to annoy them. The combination of these things resulted in the gatehouse. These consisted of a pair of towers that if attackers managed to enter the gate murder holes and arrow would attack them loops from close range. A final characteristic added to castles was a posten gate. That was a small gate that allowed escape incasing the castle started to fall. During a siege it was also used to send out a huge number of troops to harass the attackers. Many of these methods made a castl e almost defeatless. But in the 16th century these methods all changed when gunpowder was invented. Then everyone started using canons to defeat the castle. The canon had more power than a catapult or ballista. The canons could level walls sometimes within a couple tries. Gunpowder revolutionized warfare and the use of castles and sieges became part of history (Mcfeinberg, siege warfare 2). The lord and lady of a castle wore beautiful garments. They would sleep naked and put on linen under garments when rising for the day. After they bathed in cold water, which was only once a week, they would put on their outer garments. Their garments were basically the same. A long sleeved tunic slipped over the head and fastened at the neck with a burch. The second tunic went over the first. It was shorter with either sleeveless or with wide, loose sleeves and often lined with fur. Finally a mantle made with a circular piece of material, lined with fur and fastened at the neck with a chain. The lords garments were shorter that the ladies and had looser sleeves. Both wore belts tied at the waist or fastened with a metal buckle. The man’s costume was completed with a long hose attached to the belt that held up his pants. The women’s hose were shorter and suspended from garters below the knees. The lord and lady both wore shoes: sandals for around the castle and boots for the outdoors (Gies 110). READ: World History - Power Comes From The Barrel Of A Gun EssayThe colors of there tunics, mantles, hose, and shoes were bright blues, yellows, crimsons, purples, and greens. Their garments were usually made out of wool, though fine silks were often worn. Camlet was sometimes used for winter robes, which was woven from camel or goat hair. The fur trimmings were of squirrel, lambskin, rabbit, otter, marten, beavers, fox, ermine, and sable. For festive occasions belts might be silk with gold or silver threads with jewels attached to them. Both men and women wore head coverings indoors an outdoors. The lord usually wore a linen coif tied by string to his chin. Feathers and buttons decorated this. The lady wore a linen wimple either white or colored that covered her hair and neck. Outside, hood and caps were worn over the coifs and wimples. Elegant gloves, jewelry, necklaces, gold rings with stones, pins, hairbands, shoebuckles and bracelets completed the costume (Gies, 111). The morning was spent in routine task depending on whether the castle had quest. The lord had conferences with members of his counsel. The lady conversed with her quest or stayed busy with embroidery and other projects. The knights practiced fencing and tilting, while children did their lessons with a tutor. The tutor was usually one of the lord’s clerks. When the lesson was over the children would play. The girls played with dolls and the boys with tops and balls, horseshoes, and bows and arrows. In the courtyard, the grooms swept out the stables and fed the horses. Smith’s worked on horseshoes, nails, and wagon fittings (Gies, 112). In the kitchen the cook and his staff turned the meat on a spit and prepared stews and soups in iron pots hung over the fire on a hook and chain that could be raised and lowered for different temperatures. Some of there meat was pork, beef, mutton, poultry, and game. When the boiling meat was ready it was lifted out of the pot with an iron meat hook, a long fork with a wooden handle and prongs attached to the side. The soup was stirred with a long-handled slotted spoon. Salting or smoking preserved the meat. Most common was to keep the meat alive int’l ready for use. On fast days they served fish (Gies, 113). The lords had to use hunting as a way of life. At dawn on summer days the lords, his household, and quest would go into the forest while the huntsman, a professional and regular member of the lord’s staff would hunt the deer down with their dogs. There were three kinds of dogs: the lymer, a bloodhound, bachet, and a gray hound. The bloodhound was kept on a leash an d used to finish off the prey at bay. The bachet was a smaller hound and a gray hound was larger than the modern breed and capable of killing a deer on its own. When the animal was brought to the bay it was usually beheaded. Sometimes they would use bow and arrow to kill. Skinning and dividing up the meat, including the hound’s share (Gies 125) followed the kill. A meal would also include beer. The lords and there acquaintances love to drink beer (Quenells 43). Dinner would be served between 10:00 a.m. and noon. The dinner consisted of two or three courses each served in separate dishes. All of the courses consisted of the same kinds of food except for the last course, which consisted of fruits, nuts, cheese, wafers, and spiced wine. On holidays and weddings a large quantity of food would be served. When HenryIII daughter married there was more than sixty pasture cattle eaten at the first and principal course at the table (Gies, 117). During dinner the quest might be entertai ned with music or jokes, and stories. When dinner was over one of the quest would entertain the company with a song of their own. The way of life lived in these times were very different from how we live things now. Their way of attack then was very brutal and took strong men to pull the job off. Now gun-power is invented so it is easier to defend us from attackers. The lords and ladies were very creative in their ways of doing things. It would have been amazing to live in those times.

Sunday, July 28, 2019

Unwritten Laws of Engineering and Laws of Personality Assignment - 5

Unwritten Laws of Engineering and Laws of Personality - Assignment Example Skakoon asserts that these laws are like the norms of a society, which cannot be violated through impunity on a frequent basis.There are three major dimensions of unwritten laws of engineering that need to be taken into consideration. The first essence of unwritten engineering law that needs to be given consideration by engineers is: Lessons that need to be learned by beginners in the engineering field; these lessons cover three major issues, which are:   - Issues related to their work: Beginners in the engineering field are required to give their first duty, no matter how minor they may appear, a high sense of commitments and professionalism.   - Issues ascribed to their supervisors: According to Skakoon 2001, engineering supervisors have the right to know the level of progress of activities in their departments. In this regard, beginners in the engineering field are required to ensure that their supervisors are kept up-to-date on issues affecting their duties (10).   - An interpersonal relationship between them and their colleagues as well as their supervisors: In addition, Skakoon asserts that beginners in the engineering field should endure that they maintain a good inter-personal relationship between their colleagues and other stakeholders. This can be achieved through proper communication techniques and keeping an information update.Another dimension of unwritten laws of engineering is the chiefly relationship with engineering managers. The article explicates three techniques that can be applied to achieve this, they include:  Ã‚   - Technique and Individual Behavior: According to Skakoon 2001, the need to know about what is going on by a manager in an engineering department is another unwritten law of engineering. This can be achieved through collaborations and facilitating a positive relationship between the manager and their subordinate staff (23).   - What managers owe their employees: Skakoon notes that engineering managers are the face of their organizations. In this regard, they are required to facilitate a positive representation of their subordinate staff.

The possible effects of splinting natural teeth to dental implant Essay

The possible effects of splinting natural teeth to dental implant restorations - Essay Example Modern dental implants help these dentally challenged people who have lost their teeth in some unfortunate way. Dental implants are so realistic that they are virtually identical to real teeth in form, sense and purpose. Dental implants allow these persons to eat normally again and are rest assured that their facial structures are back in line. The implants are actually miniature titanium posts, planted in the gaps where a tooth or a set of teeth should be. Once these are in place, these posts act as anchors and as tooth root replacements. The jawbone then bonds with the titanium, providing a base for the new tooth ("What are Dental Implants"). According to surveys, there are a lot of Americans suffering from oral deficiencies (Meskin & Brown; Harvey & Kelly). Implants are seen as appropriate alternatives to other oral correction aids, with about 300,000 to 428,000 implants performed each year (Seckinger et al). Osseo integration (Branemark) or functional ankylosis (Schroeder et al) are the formal terms for bone anchorage attributing to the sound success of dental implants. Osseointegration works at the microscopic level and it involves the bond between the bone and implant (Branemark). There are no unstable soft tissue connection between the bone and implant, and this implant bonds at an amazing level of efficiency. Electron microscope photographs show that the bone and implant are only about 20 nanometres apart (Listgarten et al). On metal implant surfaces, the oxidation reaction between titanium forms an oxide layer (3 to 5A) on the surface of the implant (Albrektsson). This oxide layer is highly desirable as it has a c eramic -like feel to it and is resistant to water and most forms of corrosion and is entirely organically attuned (Hansson et al; "Dental Implants in Periodontal Therapy"). History shows that implants were performed ever since people learned how to replace teeth in some way. The ancient Mayans have performed dental implants as evidenced in their obsidian carvings. In the recent eras, gold and other precious metals , ceramics , rubber, stainless steel were used at some point and has proved to be effective ("Implant history"). In 1952, Per-Ing-var Branemark, based in Sweden made a breakthrough discovery resulting in dental implants using various techniques and tools in dental technology. It turns that the metal titanium can bond with organic material well and when placed surgically in a jawbone, it facilitates anchorage and also the full recovery of gums. Thus the term "Osseo integration" was born ("Implant history"). Osseo integration was actually discovered accidentally by Dr. Brnemark. Dr. Brnemark observed that titanium can combine with bone tissue, a fact that is in contrast with modern scientific facts. He showed that under certain conditions, titanium can be incorporated into living tissue with much success and with out the hassles of tissue swelling or tissue rejection Dr. Brnemark as the discoverer of this occurrence' was also the one who first coined the term "Osseo integration" ("History of dental implants"). 1965 saw the birth of the new screw-shaped implants, but these types of implants wer subsequently improved until 1985. after this time that dentists were confident of this process and it has been used ever since. Throughout those 20

Saturday, July 27, 2019

The Importance of Translation Experience for Applying to the Position Essay

The Importance of Translation Experience for Applying to the Position of Staff Translator - Essay Example To make such texts I am creative, it means that I can recreate the text to make it understandable for TA. I have an eye for details, so all even small details will be preserved during the translation. I do not mean every language units, some of them translator can omit; because, the sense presents the greatest importance. I am adaptable, therefore I can easily switch the language from one to another. It means that consequent or even simultaneous translation would not be the problem for me. All skills which I have now, I acquired during my education and practice. It means that I aware of the main skills relevant to the position of translator. Though I have no much experience of actually working with languages, I can say that during our practical assignments, translations were carried out clearly and understandable. Moreover, theoretical knowledge means much considering working with languages. Speaking about my personal skills I can underline management skills which allow me to lead a team of translators to bring more effective results and produce translated texts even quicker. Even in the position which supposes independent work, good management skills will be very useful to direct the team to good execution of projects. Management skills also refer to my ability to drive myself to the set aim. One more effective skill that belongs to the personal skills is an ability to maintain good communication. It is useful considering communication with a customer, communication with teammates and at last with an audience, to whom the translation is made. Such skills are inevitable, due to the nature of the profession. All translation is based on the maintaining of communication between two or more people. Therefore, it is good to have such skills considering translation. There are many issues need to be solved during the translation activity and translator should be able to deal with them. Therefore one more effective skill is good problem-solving.  Ã‚  

Friday, July 26, 2019

Defending beauty as in Whats wrong with beauty and being beautiful Essay

Defending beauty as in Whats wrong with beauty and being beautiful - Essay Example al – referring to the professional environment; a careful review of the conditions of a specific workplace can lead to the assumption that beauty can be a powerful tool supporting the communication but it is not a criterion for the professional development – neither of the males nor of the females. The issue of beauty and its influence on the various aspects of personal, social and professional life has been examined in the literature and the empirical research. Indicatively, we could refer to the study of Derenne et al. (2006, 257) who noticed that ‘throughout history, the ideal of beauty has been difficult to achieve and has been shaped by social context; current mass media is ubiquitous and powerful, leading to increased body dissatisfaction among both men and women; parents need to limit children’s exposure to media, promote healthy eating and moderate physical activity, and encourage participation in activities that increase mastery and self-esteemâ₠¬â„¢. In other words, personal perceptions on beauty are likely to be developed – at their primary stage – during the early years of the human life; the images of the media and the press can influence the perceptions of children on beauty and lead them to the development of specific assumptions regarding the power of beauty and its role in the various aspects of personal and social life. Current paper focuses on the examination of the various aspects of beauty as a tool for the achievement of specific personal targets; beauty is related with a series of achievements in the professional and the social life but not for the reason that could be primarily thought of. Beauty – in opposition with the views of Wolf in her book Beauty Myth – is not the final target of males and females in countries across the international community; it is rather the tool of the achievement of such targets (either in the short or the long term). The influence of beauty on a person’s psychology cannot be doubted. In a

Thursday, July 25, 2019

Marketing online forum Assignment Example | Topics and Well Written Essays - 250 words

Marketing online forum - Assignment Example Student’s reply: E-marketing will truly affect consumer perceptions of privacy and security. As technology continues to improve over the years, methods of advertising will advance as well. Companies will always match up with other companies, trying to attract as many consumers as they can. All the popular websites feature internet marketing; search engines, online forums and communities such as My Space and Facebook, and company websites. On online communities such as Facebook, ads pop up that match up with ones interests that may be displayed in their profile. This is another advancement companies have made to promote themselves. It is controversial because information in someones account has been made available to online companies in promoting themselves. This happens all over the internet, yet people still continue to use the internet because it is quick and easy, and often times, requires little work. E-marketing has kept up with the consumer. Marketing has gone from paper , to graphic, to electronic, and with the help of the internet, international. Marketers used pop-up ads to get a users attention which the consumers disliked. Now they fill the sides of pages while users surf the internet. Marketers have offered online newsletters to users on many sites. This is one method I believe has worked. Companies ask a user if they would like to join a news letter, and they receive these letters only if they agree. This way, if they are not interested in the company, they will not be bothered. This was one approach marketers used that I felt worked and respected peoples privacy. Response: I agree with the above statement. E-marketing has come to stay and unless a major obstacle or glitch like the Y2K scare interrupts the internet connectivity, which is most unlikely, companies will continue to develop new strategies to sell their products on the internet. However, this will happen only in the tech savvy developed world. Other

Wednesday, July 24, 2019

Leisure the basis of culture by Josef Pieper Essay

Leisure the basis of culture by Josef Pieper - Essay Example According to the new scale of values, to have leisure means to have break from work or to go in a state of idleness. Although breaking from work is considered as leisure in the modern world, yet it actually is not. Values of the modern age compel people to live for working. Materialism and consumption are two of the main values of the modern society unlike the past, when spirituality was the main value. In the new scale of human values, a person is considered good, better, or best depending upon the extent to which he/she has contributed to the society. This can even mean consumption because the more an individual consumes, the more businesses flourish and the more the society benefits from consumption. For the modern mind, work means to be able to serve the society as a whole. This conception of work tends to deny the consideration of any such activities as work that do not benefit the whole society. For the modern mind, work is not necessarily that which requires physical input or labor. Mental exertion and use of intelligence is also considered work because mind is used to make plans that benefit the whole society. The modern mind has lost the fundamentals of the notion of leisure. The worker who thinks that the only way to serve the society is doing work tends to think of leisure as inactivity and idleness. The concept of obtaining something in a passive receptivity is in contrast with the concept of good that is imposed upon man by the modern mind. According to the modern mind, nothing good can be achieved unless some effort has been made for it. Work for the modern mind means a way to get compensated so that the money earned can be spent that is what modern mind thinks of as leisure. Leisure for the classical mind is engaging in activities that cause spiritual rejuvenation. These activities include pondering over the reason of fundamental existence of man on Earth, the purpose of life, and thinking about where man came from and where he has to go after de ath. Leisure for the classical mind means engaging in festivals to praise the Creator. This means using mind to develop one’s connection with God. This might even take physical labor, but the spiritual rejuvenation does help man better prepare even for such worldly activities as doing work. According to the classical mind, the heart of leisure exists in the world’s affirmation. This affirmation exists in festival and is essentially the praise of God because the entire meaning of the festival exists in the aspect of worship that it encapsulates. In the classical perspective, leisure means worship. When the definition of leisure of the classical mind is interpreted in light of the modern conception of work, leisure then also work because to find out the answers of these questions of spirituality, one needs to think and use the brain. This is the fundamental reason why thinking has become passive in the modern world because leisure in the modern world is translated is pur e idleness and break from work, meaning no thinking is involved in the modern interpretation of the term â€Å"leisure†. The emphasis placed by the classical mind on the practice of religion and developing a strong connection with God is one of the main reasons why practicing religion and opposing such notions that are condemned by religion as homosexuality are considered as passive and regressive in the modern age. The major issue in the transformation of values from the classical mind to the modern mind is that man has become increasingly materialistic, and has become so involved in the worldly activities that his relationship and connection with nature in general and God in particular is distorted. This is one

Tuesday, July 23, 2019

Develop the film Hot Fuzz (Edgar Wright, 2007) Essay - 1

Develop the film Hot Fuzz (Edgar Wright, 2007) - Essay Example While it contains indistinguishable comedic topics, specialized style and funny savagery to its forerunner, Hot Fuzz turns into a more genuine, unique postliminary. Therefore, it is a much more grounded portion that has now turn into a current benchmark in British comic drama. Directed by Edgar Wright, the film expressed the director’s love for the genre of thriller, regretting that in Britain over the last 30 years, they were not there at all. While mocking numerous films inserting allusions to more than fifty film tapes, creators skillfully blended a variety of genres - police thriller, detective, romance, action and comedy. The film is replete with derision of various clichà ©s. This is probably its most important advantage that certainly does not mean that it is the only one, but that is what keeps on all the action and all the dialogue, in addition to the chic of acting without exception. The main characters of Pegg and Frost, the main villain, Timothy Dalton, bad and ironic rural police, the sheriff, the father of the hero Frost, and even the saleswoman colors - all played exactly what was required of them the absurdity of the film. Hot Fuzz rejoined Simon Pegg and the director Edgar Wright in a satire film. Pegg plays straight-bound police officer Nicholas Angel, who is elevated to sergeant and sent from London to the lethargic Gloucestershire town of Sandford in light of the fact that his hard working attitude was showing up whatever is left of the police. The plot is not intended to be bode well. A spate of horrible murders in Sandford is disregarded with the perception that somehow accidents happen. Pegg stars as the protagonist, Nicholas Angel, a London police officer who lives for his employment. He is a thorough and prompt cop, who is great at doing his job - so great indeed that he is making whatever is left of his associates look crude. His bosses who are played by

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Abstract The complexity and criticality of information security and its governance demand that it be elevated to the highest organizational levels. Within a university setup, information assets include student and personnel records, health and financial information, research data, teaching and learning materials and all restricted and unrestricted electronic library materials. Security of these information assets is among the highest priorities in terms of risk and liabilities, business continuity, and protection of university reputations. As a critical resource, information must be treated like any other asset essential to the survival and success of the organization. In this paper the writer is going to discuss the need for implementing Information Security Governance within institutions of higher education. Further than that, a discussion on how to best practice Information Security governance within the universities in Zimbabwe followed by an assessment on how far the Zimbabwean universities have implemented Information Security Governance. A combination of questionnaires and interviews is going to be used as a tool to gather data and some recommendations are stated towards the end of the paper. Introduction Governance, as defined by the IT Governance Institute (2003), is the â€Å"set of responsibilities and practices exercised by the board and executive management with the goal of providing strategic direction, ensuring that objectives are achieved, ascertaining that risks are managed appropriately and verifying that the enterprise’s resources are used responsibly.† Information security governance is the system by which an organization directs and controls information security (adapted from ISO 38500). It specifies the accountability framework and provides oversight to ensure that risks are adequately mitigated as well as ensuring that security strategies are aligned with business and consistent with regulations. To exercise effective enterprise and information security governance, boards and senior executives must have a clear understanding of what to expect from their enterprise’s information security programme. They need to know how to direct  the implementation of an information security programme, how to evaluate their own status with regard to an existing security programme and how to decide the strategy and objectives of an effective security programme (IT Governance Institute, 2006). Stakeholders are becoming more and more concerned about the information security as news of hacking, data theft and other attacks happen more frequently than ever dreamt of. Executive management has been showered with the responsibility of ensuring an organization provides users with secure information systems environment. Information security is not only a technical issue, but a business and governance challenge that involves adequate risk management, reporting and accountability. Effective security requires the active involvement of executives to assess emerging threats and the organization’s response to them (Corporate Governance Task Force, 2004). Furthermore the organizations need to protect themselves against the risks inherent in the use of information systems while simultaneously recognizing the benefits that can accrue from having secure information systems. Peter Drucker (1993) stated: â€Å"The diffusion of technology and the commodification of information transforms the role of information into a resource equal in importance to the traditionally important resources of land, labor and capital.† Thus as dependence on information system increases, the criticality of information security brings with it the need for effective information security governance. Need for Information Security Governance within universities. A key goal of information security is to reduce adverse impacts on the organization to an acceptable level of risk. Information security protects information assets against the risk of loss, operational discontinuity, misuse, unauthorized disclosure, inaccessibility and damage. It also protects against the ever-increasing potential for civil or legal liability that organizations face as a result of information inaccuracy and loss, or the absence of due care in its protection. Information security covers all information processes, physical and electronic, regardless whether they involve people and technology or relationships with trading partners, customers and third parties. Information security addresses information protection, confidentiality, availability and integrity throughout the life cycle of the information and its use within the organization. John P. Pironti (2006) suggested that among many reasons for information security  governance, the most important one is the one concerned with the legal liability, protection of the organization’s reputation and regulatory compliance. With the university setup, all members of the university community are obligated to respect and, in many cases, to protect confidential data. Medical records, student records, certain employment-related records, library use records, attorney-client communications, and certain research and other intellectual property-related records are, subject to limited exceptions, confidential as a matter of law. Many other categories of records, including faculty and other personnel records, and records relating to the universitys business and finances are, as a matter of university policy, treated as confidential. Systems (hardware and software) designed primarily to store confidential records (such as the Financial Information System and Student Information System and all medical records systems) require enhanced security protections and are controlled (strategic) systems to which access is closely monitored. Networks provide connection to records, information, and other networks and also require security protections. The use of university information technology assets in other than a manner and for the purpose of which they were intended represents a misallocation of resources and, possibly, a violation of law. To achieve all this in today’s complex, interconnected world, information security must be addressed at the highest levels of the organization, not regarded as a technical specialty relegated to the IT department. Information security is a top-down process requiring a comprehensive security strategy that is explicitly linked to the organization’s business processes and strategy. Security must address entire organization’s processes, both physical and technical, from end to end. Hence, Information security governance requires senior management commitment, a security-aware culture, promotion of good security practices and compliance with policy. It is easier to buy a solution than to change a culture, but even the most secure system will not achieve a significant degree of security if used by ill-informed, untrained, careless or indifferent personnel (IT Governance Institute, 2006). In an interview the executive director and information security expert on IT Governance and cyber security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to say â€Å"†¦remember in  Zimbabwe security is regarded as an expense not an investment† (Rutsito, 2012). Benefits of Information Security Governance Good information security governance generates significant benefits, including: The Board of directors taking full responsibility for Information security initiatives Increased predictability and reduced uncertainty of business operations by lowering information security-related risks to definable and acceptable levels Protection from the increasing potential for civil or legal liability as a result of information inaccuracy or the absence of due care. The structure and framework to optimize allocation of limited security resources Assurance of effective information security policy and policy compliance A firm foundation for efficient and effective risk management, process improvement, and rapid incident response related to securing information A level of assurance that critical decisions are not based on faulty information Accountability for safeguarding information during critical business activities. Compliances with local and international regulations will be easier Improved resource management, optimizing knowledge, information security and information technology infrastructure The benefits add significant value to the organization by: Improving trust in customer/client relationships Protecting the organization’s reputation Decreasing likelihood of violations of privacy Providing greater confidence when interacting with trading partners Enabling new and better ways to process electronic transactions like publishing results online and online registration. Reducing operational costs by providing predictable outcomes—mitigating risk factors that may interrupt the process The benefits of good information security are not just a reduction in risk or a reduction in the impact should something go wrong. Good security can improve reputation, confidence and trust from others with whom business is conducted, and can even improve efficiency by avoiding wasted time and effort recovering from a security incident (IT Governance Institute, 2004). Information Security Governance Outcomes Five basic outcomes can be expected to result from developing an effective governance approach to information security: Strategic alignment of information security with institutional objectives Reduction of risk and potential business impacts to an acceptable level Value delivery through the optimization of security investments with institutional objectives Efficient utilization of security investments supporting organization objectives Performance measurement and monitoring to ensure that objectives are met Best practices The National Association of Corporate Directors (2001), recognizes the importance of information security and recommends four essential practices for boards of directors. The four practices, which are based on the practicalities of how boards operate, are: Place information security on the board’s agenda. Identify information security leaders, hold them accountable and ensure support for them. Ensure the effectiveness of the corporation’s information security policy through review and approval. Assign information security to a key committee and ensure adequate support for that committee. It is critical that management ensure that adequate resources are allocated to support the overall enterprise information security strategy (IT Governance Institute, 2006). To achieve effective information security governance, management must establish and maintain a framework to guide the development and maintenance of a comprehensive information security programme. According to Horton, et al (2000), an information security governance framework generally consists of: An information security risk management methodology; A comprehensive security strategy explicitly linked with business and IT objectives; An effective security organizational structure; A security strategy that talks about the value of information both protected and delivered; Security policies that address each aspect of strategy, control and regulation; A complete set of security standards for each policy to ensure that procedures and guidelines comply with policy; Institutionalized monitoring processes to ensure compliance and provide feedback on effectiveness and mitigation of risk; A process to ensure  continued evaluation and update of security policies, standards, procedures and risks. This kind of framework, in turn, provides the basis for the development of a cost-effective information security program me that supports an organization’s goals and provides an acceptable level of predictability for operations by limiting the impacts of adverse events. In his article Kaitano (2010), pointed some characteristics of good corporate governance coupled with good security governance. These include and not limited to: Information security being treated as and organization wide issue and leaders are accountable. Leads to viable Governance, Risk and Compliance(GRC) Milestones It is risk-based and focuses on all aspects of security Proper frameworks and programs have been implemented It is not treated as a cost but a way of doing business Roles, responsibilities and segregation of duties are defined It is addressed and enforced by policy Adequate resources are committed and Staff are aware and trained It is planned, managed, measurable and measured It is reviewed and audited The overall objective of the programme is to provide assurance that information assets are protected in accordance with their value or the risk their compromise poses to an organization. The framework generates a set of activities that supports fulfillment of this objective. Principles for information security within the University In their article titled Information Security Policy: Best Practice Document, Hostland et al (2010) pointed out some guiding principles for information security within a university setup. The following are some of the principles they mentioned: 1. Risk assessment and management The universitys approach to security should be based on risk assessments and should be continuously done and the need for protective measures evaluated. Measures must be evaluated based on the universitys role as an establishment for education and research and with regards to efficiency, cost and practical feasibility. An overall risk assessment of the  information systems should be performed annually. Risk assessments must identify, quantify and prioritize the risks according to relevant criteria for acceptable risks. Risk assessments should be carried out when implementing changes impacting information security. Some recognized methods of assessing risks like ISO/IEC 27005 should be employed. Risk management is to be carried out according to criteria approved by the management at University. Risk assessments must be approved by the management and if a risk assessment reveals unacceptable risks, measures must be implemented to reduce the risk to an acceptable level. 2. Information security policy The Vice Chancellor should ensure that the information security policy, as well as guidelines and standards, are utilized and acted upon. He must also ensure the availability of sufficient training and information material for all users, in order to enable the users to protect the universitys data and information systems. The security policy should be reviewed and updated annually or when necessary, in accordance with principles described in ISO/IEC 27001. However, all important changes to universitys activities, and other external changes related to the threat level, should result in a revision of the policy and the guidelines relevant to the information security. 3. Security organization The Vice Chancellor is responsible for all government contact. The university should appoint CSO (Chief Security Officer). Each department and section should also be responsible for implementing the units information security. The managers of each unit must appoint separate security administrators. The Registrar Academics has the primary responsibility for the information security in connection with the student registry and other student related information. The IT Director has executive responsibility for information security in connection with IT systems and infrastructure. The Operations manager has executive responsibility for information security in connection with structural infrastructure. He also has overall responsibility for quality work, while the operational responsibility is delegated according to the management structure. The Registrar Human Resources also has executive responsibility for information security according to the Personal Data Act and is the controller on a daily basis of the personal information of the  employees. The Registrar Academics and Research Administration have also executive responsibility for research related personal information. Universitys information security should be revised on a regular basis, through internal control and at need, with assistance from an external IT auditor. 4. Information security in connection with users of Universitys services Prior to employment security responsibility and roles for employees and contractors should be described. A background check is should also be carried out of all appointees to positions at the university according to relevant laws and regulations. A confidentiality agreement should be signed by employees, contractors or others who may gain access to sensitive and/or internal information. IT regulations should be accepted for all employment contracts and for system access for third parties. During employment, the IT regulations for the universitys information security requirements should be in place and the users responsibility for complying with these regulations is to be emphasized. The IT regulations should be reviewed regularly with all users and with all new hires. All employees and third party users should receive adequate training and updating regarding the Information security policy and procedures. Breaches of the Information security policy and accompanying guidelines will normally result in sanctions. Universitys information, information systems and other assets should only be utilized for their intended purpose. Necessary private usage is permitted. Private IT equipment in the universitys infrastructure may only be connected where explicitly permitted. All other use must be approved in advance by the IT department. On termination or change of employment, the responsibility for termination or change of employment should be clearly defined in a separate routine with relevant circulation forms. The universitys assets should be handed in at the conclusion of the need for the use of these assets. University should change or terminate access rights at termination or change of employment. A routine should be present for handling alumni relationships. Notification on employment termination or change should be carried out through the procedures defined in the personnel system. 5. Information security regarding physical conditions IT equipment and information that require protection should be placed in secure physical areas. Secure areas should have suitable access control to  ensure that only authorized personnel have access. All of the Universitys buildings should be secured according to their classification by using adequate security systems, including suitable tracking/logging. Security managers for the various areas of responsibility should ensure that work performed by third parties in secure zones is suitably monitored and documented. All external doors and windows must be closed and locked at the end of the work day. On securing equipment, IT equipment which is very essential for daily activities must be protected against environmental threats (fires, flooding, temperature variations). Information classified as sensitive must not be stored on portable computer equipment (e.g. laptops, cell phones, memory sticks). If it is necessary to store this information on portable equipment, the information must be password protected and encrypted in compliance with guidelines from the IT department. During travel, portable computer equipment should be treated as carry-on luggage. Fire drills should also be carried out on a regular basis. 6. IT communications and operations management Purchase and installation of IT equipment and software for IT equipment must be approved by the IT department. The IT department should ensure documentation of the IT systems according to universitys standards. Changes in IT systems should only be implemented if well-founded from a business and security standpoint. The IT department should have emergency procedures in order to minimize the effect of unsuccessful changes to the IT systems. Operational procedures should be documented and the documentation must be updated following all substantial changes. Before a new IT system is put in production, plans and risk assessments should be in place to avoid errors. Additionally, routines for monitoring and managing unforeseen problems should be in place. Duties and responsibilities should be separated in a manner reducing the possibility of unauthorized or unforeseen abuse of the universitys assets. Development, testing and maintenance should be separated from operations in order to reduce the risk of unauthorized access or changes, and in order to reduce the risk of error conditions. On system planning and acceptance, the requirements for information security must be taken into consideration when designing, testing, implementing and upgrading IT systems, as well as during system changes. Routines must be developed for  change management and system development/maintenance. IT systems must be dimensioned according to capacity requirements and the load should be monitored in order to apply upgrades and adjustments in a timely manner as it is especially important for business-critical systems. Written guidelines for access control and passwords based on business and security requirements should be in place. Guidelines should be re-evaluated on a regular basis and should contain password requirements (frequency of change, minimum length, character types which may/must be utilized) and regulate password storage. All users accessing systems must be authenticated according to guidelines and should have unique combinations of usernames and passwords. Users are responsible for any usage of their usernames and passwords. Data Gathering A structured questionnaire adapted and modified from previous questionnaires used by Corporate Governance Task Force, (2004) was used as the main instrument to gather data. Of the total 13 universities in Zimbabwe, 9 managed to participate in this research. The questionnaires were completed by the Executive Dean, IT Director, Operations Manager or Chairperson for the department. Section I: Organizational Reliance on IT The first section was designed to help in determining the institution’s reliance on information technology for business continuity. Table 1: Characteristics of Organization Questions Scores/Frequency 0 1 2 3 4 Dependence on information technology systems and the Internet to conduct academic, research, and outreach programs and offer support services 9 Value of organization’s intellectual property stored or transmitted in electronic form 2 7 The sensitivity of stakeholders (including but not limited to students, faculty, staff, alumni, governing boards, legislators, donors, and funding agencies) to privacy 2 3 4 Level of regulation regarding security (international, federal, state, or local regulations) 1 4 3 1 Does your organization have academic or research programs in a sensitive area that may make you a target of violent physical or cyber attack from any groups? 5 1 2 1 Total score 1 9 6 7 22 Scoring: Very Low = 0; Low = 1; Medium = 2; High = 3; Very High = 4 Section II: Risk Management: This section assesses the risk management process as it relates to creating an information security strategy and program. Table 2: Information Security Risk Assessment Questions Scores/Frequency 0 1 2 3 4 Does your organization have a documented information security program? 2 5 2 Has your organization conducted a risk assessment to identify the key objectives that need to be supported by your information security program? 2 4 3 Has your organization identified critical assets and the functions that rely on them? 2 2 5 Have the information security threats and vulnerabilities associated with each of the critical assets and functions been identified? 2 4 2 1 Has a cost been assigned to the loss of each critical asset or function? 1 3 3 2 Do you have a written information security strategy? 2 4 2 1 Does your written information security strategy include plans that seek to cost-effectively reduce the risks to an acceptable level, with minimal disruptions to operations? 4 2 2 1 Is the strategy reviewed and updated at least annually or more frequently when significant changes require it? 2 3 3 1 Do you have a process in place to monitor federal, state, or international legislation or regulations and determine their applicability to your organization? 2 2 3 2 1 Total 10 16 26 14 16 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section III: People This section assesses the organizational aspects of the information security program. Table 3: Information Security Function/Organization Questions Scores/Frequency 0 1 2 3 4 Do you have a person that has information security as his primary duty, with responsibility for maintaining the security program and ensuring compliance? 4 3 1 1 Do the leaders and staff of your information security organization have the necessary experience and qualifications? 5 2 2 Is responsibility clearly assigned for all areas of the information security architecture, compliance, processes and audits? 3 4 1 1 Do you have an ongoing training program in place to build skills and competencies for information security for members of the information security function? 2 2 3 2 Does the information security function report regularly to institutional leaders and the governing board on the compliance of the institution to and the effectiveness of the information security program and policies? 2 3 3 1 Are the senior officers of the institution ultimately responsible and accountable for the information security program, including approval of information security policies? 3 4 2 Total 16 17 14 7 0 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Section IV: Processes This section assesses the processes that should be part of an information security program. Table IV: Security Technology Strategy Questions Scores/Frequency 0 1 2 3 4 Have you instituted processes and procedures for involving the security personnel in evaluating and addressing any security impacts before the purchase or introduction of new systems? 2 3 3 1 Do you have a process to appropriately evaluate and classify the information and information assets that support the operations and assets under your control, to indicate the appropriate levels of information security? 1 2 3 2 1 Are written information security policies consistent, easy to understand, and readily available to administrators, faculty, employees, students, contractors, and partners? 2 3 3 1 Are consequences for noncompliance with corporate policies clearly communicated and enforced? 1 3 2 3 1 Do your security policies effectively address the risks identified in your risk analysis/risk assessments? 2 3 4 Are information security issues considered in all important decisions within the organization? 3 2 3 1 Do you constantly monitor in real time your networks, systems and applications for unauthorized access and anomalous behavior such as viruses, malicious code insertion, or break-in attempts? 1 3 3 1 1 Is sensitive data encrypted and associated encryption keys properly protected? 2 3 2 1 1 Do you have an authorization system that enforces time limits and defaults to minimum privileges? 2 2 2 3 Do your systems and applications enforce session/user management practices including automatic timeouts, lock out on login failure, and revocation? 2 3 2 2 Based on your information security risk management strategy, do you have official written information security policies or procedures that address each of the following areas? Individual employee responsibilities for information security practices 4 3 1 1 Acceptable use of computers, e-mail, Internet, and intranet 2 3 2 2 Protection of organizational assets, including intellectual property 2 2 3 2 Access control, authentication, and authorization practices and requirements 1 2 3 1 2 Information sharing, including storing and transmitting institutional data on outside resources (ISPs, external networks, contractors’ systems) 2 1 3 2 1 Disaster recovery contingency planning (business continuity planning) 1 1 3 4 Change management processes 2 3 2 2 Physical security and personnel clearances or background checks 1 3 3 2 Data backups and secure off-site storage 1 1 3 4 Secure disposal of data, old media, or printed materials that contains sensitive information 2 3 4 For your critical data centers, programming rooms, network operations centers, and other sensitive facilities or locations: 2 3 4 Are multiple physical security measures in place to restrict forced or unauthorized entry? 1 2 3 3 Is there a process for issuing keys, codes, and/or cards that require proper authorization and background checks for access to these sensitive facilities? 2 1 3 3 Is your critical hardware and wiring protected from power loss, tampering, failure, and environmental threats? 1 4 4 Total 17 45 58 50 47 Scoring: Not Implemented = 0; Planning Stages = 1; Partially Implemented = 2; Close to Completion = 3; Fully Implemented = 4 Discussion As shown by the total scores on Table 1, a majority of the university has a very high reliance on the IT in their services. This is depicted by the structure and characteristics of the university. Information risk assessment and management leaves a lot to be desired by the universities. Most the universities have partially implemented such programs. A large number of employees in the IT departments of most universities do no have sufficient skills to implement good information security governance. Most universities lack the leaders who have the rightful know how on the subject. In addition  to that, there is no a representative in the council who will be an IT expert, hence most leaders lack interest and initiatives on information security. Due to lack of full responsibility of information security by the leaders, to implement processes for information security might also be a challenge especially to the IT department as normally is the department given the responsibility. Conclusion There is a need for institutions to start focusing on proper information security governance. For a start organization such as the Government, the Computer Society of Zimbabwe, Zim Law Society, POTRAZ, ICAZ, IIAZ, Zimbabwe Institute of Management and other industry governing bodies should put their heads together and define the appropriate legislations that mandates information security governance either by referring to existing international frameworks (PCI-DSS, SOX, COSO, ITIL, SABSA, Cobit FIPS, NIST, ISO 27002/5, CMM, ITG Governance Framework) or by consulting local information security and business professionals to come up with an information security governance framework. As the Zimbabwean economy is slowly sprouting, the art of information security governance in the universities should also take a leap. The adoption information security governance will ensure that security will become a part of any university and thus customers confidence will be boosted. References Drucker, P. ‘Management Challenges for the 21st Century’, Harpers Business , 1993. Corporate Governance Task Force, Information Security Governance: Call to Action, USA, 2004. IT Governance Institute, Board Briefing on IT Governance, 2nd Edition, USA, 2003, www.itgi.org. IT Governance Institute, Information Security Governance: Guidance for Boards of Directors and Executive Management, 2nd Edition, USA, 2006. ISO/IEC 38500: Corporate Governance of Information Technology, 2008. IT Governance Institute, COBIT 4.0, USA, 2005, www.itgi.org IT Governance Institute, COBIT ® Security Baseline, USA, 2004, www.itgi.org National Association of Corporate Directors, ‘Information Security Oversight: Essential Board Practices’, USA, 2001 John P. Pironti,  Ã¢â‚¬Å"Information Security Governance: Motivations, Benefits and Outcomes,† Information Systems Control Journal, vol. 4 (2006): 45–8. 21. Rutsito, T. (2005) ‘IT governance, security define new era’ The Herald, 07 November. Kaitano, F. (2010) ‘Information Security Governance: Missing Link In Corporate Governance’ TechZim. http://www.techzim.co.zw/2010/05/information-security-governance-missing-link-in-corporate-governance [accessed 02 May 2013]. Horton, T.R., Le Grand, C.H., Murray, W.H., Ozier, W.J. Parker, D.B. (2000). Information Security Management and Assurance: A Call to Action for Corporate Governance. United States of America: The Institute of Internal Auditors. Hostland, K, Enstad, A. P, Eilertsen, O, Boe, G. (2010). Information Security Policy: Best Practice Document. Corporate Governance Task Force, (2004). Information Security Governance: Call to Action, USA