Free Essay

Rbm Monitoring

In:

Submitted By kuwodza
Words 1505
Pages 7
RESULT BASED MANAGEMENT IN MONITORING

DEFINATION OF TERMS
Result Based Management (RBM) is a broad management strategy aimed at changing the way institutions operate, by improving performance, programmatic focus and delivery. It reflects the way an organization applies processes and resources to undertake interventions to achieve desired results. UNESCO (1997)
Result Based Management (RBM) is an approach to project/programme management based on clearly defined results, and the methodologies and tools to measure and achieve them (International Federation of Red Cross and Red Crescent Societies, Geneva, 2011).
Result Based Management (RBM) supports better performance and greater accountability by applying a clear, logical framework to plan, manage and measure an intervention with a focus on the result you want to achieve. By identifying in Advance the intended result of a project/programme and how we can measure their progress,

Monitoring is the routine collection and analysis of information to track progress against set plans and check Compliance to established standards (International Federation of Red Cross and Red Crescent Societies, Geneva, 2011).

The Organisation for Economic Cooperation and Development (OECD) (2002a:27) defines monitoring as a continuous function that uses the systematic collection of data on specified indicators to provide management and the main stakeholders of an ongoing development intervention with indications of the extent of progress and achievement of objectives and progress in the use of allocated funds.

Monitoring is an important task in the life of a programme or project. It involves regular and systematic assessment based on participation, reflection, feedback, data collection, analysis of actual performance (using indicators) and regular reporting. Monitoring makes it possible to gauge where programmes stand in terms of international norms and standards.

The purpose of monitoring is to assess the actual situation compared to the programmed information originally defined in order to keep track of implementation and progress towards the expected results and take remedial actions when needed. It furthermore includes self-evaluation by the responsible officer (teacher) who interprets the information and defines possible explanations to eventual discrepancies between the “expected” and the “achieved” leading to lessons learnt.

As soon as the implementation phase begins, monitoring phases in, based on periodical assessments both by teachers and by supervisors. School management is conceived to support such a monitoring process, by requiring each responsible supervisor to crisply report, on a quarterly basis, upon the progress of the element he/she is in charge of, and assess how the result progressively takes shape. This requirement calls for some form of indicators and milestones to be designed, so as to anchor the assessments to verifiable evidence. The delivery-orientation of the monitoring process can foster continuous improvement of implementation and raise quality control.

Monitoring * Clarifies program objectives * Links activities and their resources to objectives * Translates objectives into performance indicators and sets targets * Routinely collects data on these indicators, compares actual results with targets * Reports progress to managers and alerts them to problems

What is Monitoring
Systematic Monitoring has to do with * Determining the progress of project execution/implementation * Giving feedback on the project to stakeholders * Recommending corrective action to address problems that affect the project, improving performance and enhancing the probability that it will achieve its Planned Outcome(s).
Diagram below summarizes key monitoring questions as they relate to the logframe’s objectives. Note that they focus more on the lower-level objectives– inputs, activities and (to a certain extent) outcomes. This is because the outcomes and goal are usually more challenging changes (typically in knowledge, attitudes and practice/behaviours) to measure, and require a longer time frame and a more focused assessment provided by evaluations.

Sources: International Federation of Red Cross and Red Crescent Societies
Monitoring also has to do with analysing project performance in terms of Efficiency and Effectiveness.
Efficiency: the extent to which project inputs were supplied and managed and the activities organized in the most appropriate manner at the least cost to produce the necessary outputs. Effectiveness: the extent to which the project produced its expected outputs and is therefore achieving its Planned Outcome(s). Monitoring allows the implementing agency to identify strengths and shortcomings on a timely basis in order to implement recommended corrective action. Monitoring takes place during implementation but does not occur during other phases of the project cycle. Under a results-based approach, good monitoring‖ implies continuous and systematic monitoring, the participation of key stakeholders and a focus on progress toward achieving results.
Steps for Monitoring:

1. Clarify tasks and responsibilities of those involved in monitoring. 2. Compare the planned time with the actual time required to carry out individual activities. 3. Monitor the use of resources in a spreadsheet based on the resource and cost schedule. 4. Use Monitoring tools to monitor progress towards the accomplishment of activities and resources, outputs, outcomes and impacts over a period of time. 5. Compare planned and actual achievements. 6. Use indicators in the log frame to assess the effects of the intervention at different levels of the intervention logic. 7. Monitor the external environment to determine whether assumptions are still accurate and risks are being managed or mitigated. 8. If minor deviations from the work plan are identified, adjust the timing of activities and resources according to monitoring information.
Common types of monitoring 1. Results monitoring tracks effects and impacts. This is where monitoring merges with evaluation to determine if the project/programme is on target towards its intended results (outputs, outcomes, impact) and whether there may be any unintended impact (positive or negative).

2. Process (activity) monitoring tracks the use of inputs and resources, the progress of activities and the delivery of outputs. It examines how activities are delivered – the efficiency in time and resources. It is often conducted in conjunction with compliance monitoring and feeds into the evaluation of impact. 3. Compliance monitoring ensures compliance with donor regulations and expected results, grant and contract requirements, local governmental regulations and laws, and ethical standards.

4. Context (situation) monitoring tracks the setting in which the project/programme operates, especially as it affects identified risks and assumptions, but also any unexpected considerations that may arise. It includes the field as well as the larger political, institutional, funding, and policy context that affect the project/programme.

5. Beneficiary monitoring tracks beneficiary perceptions of a project/programme. It includes beneficiary satisfaction or complaints with the project/programme, including their participation, treatment, access to resources and their overall experience of change. Sometimes referred to as beneficiary contact monitoring (BCM), it often includes a stakeholder complaints and feedback mechanism.

6. Financial monitoring accounts for costs by input and activity within predefined categories of expenditure. It is often conducted in conjunction with compliance and process monitoring.

7. organizational monitoring tracks the sustainability, institutional development and capacity building in the project/programme and with its partners. It is often done in conjunction with the monitoring processes of the larger, implementing organization.

Monitoring best practices * Monitoring data should be well-focused to specific audiences and uses (only what is necessary and sufficient).

* Monitoring should be systematic, based upon predetermined indicators and assumptions.

* Monitoring should also look for unanticipated changes with the project/programme and its context, including any changes in project/programme assumptions/risks; this information should be used to adjust project/programme implementation plans.

* Monitoring needs to be timely, so information can be readily used to inform project/programme implementation.

* Whenever possible, monitoring should be participatory, involving key stakeholders – this can not only reduce costs but can build understanding and ownership.

* Monitoring information is not only for project/programme management but should be shared when possible with beneficiaries, donors and any other relevant stakeholders.

References

International Federation of Red Cross and Red Crescent Societies, Geneva, 2011. Project/programme monitoring and evaluation (M&E) guide. www.ifrc.org

United Nations Development Fund for Women (UNIFEM), “Monitoring, Evaluation and Knowledge Management Framework, 2008-2011”, August 2008

“Results-based Management in UNDAFs”, Issues Note 1, Working Group on Programming Issues, October 2007.
United Nations Development Programme (UNDP), “Handbook on Planning, Monitoring and Evaluating for Development Results”, 2009.

Bester, A. (2007). Results based management in the United Nations Development System: Progress and challenges. Retrieved from www.un.org/esa/coordination/pdf/rbm_report_10_july.pdf Common, R. (2011). International trends in HRM in public sector: Reform attempts in the Republic of Georgia. International Journal of Public Sector Management, 24(5), 421-434.

Desautels, D. (1996). Implementing results based management: Lessons from literature, Office of Auditor General of Canada. Retrieved from www.oagbvg.gc.ca/internet/English/parl_oag_199611_29_e_5060.htm

Fryer, K., Antony, J., & Ogden, S. (2009). Performance management in the public sector. International Journal of Public Sector Management, 22(6), 478-498.

Hatton, M., & Schroeder, K. (2007). RBM: Friend or foe. Development in Practice, 17(3), 426-432.

Madhekeni, A. (2012). Implementing results based management in Zimbabwe: Context and implications for public sector. International Journal of Humanities and Social Science, 2(8), 122-128.

Marie, J., Holzer, M., Posner, P., & Rubin, M. (2006). Results based management in Thailand: Evaluation report. Retrieved from www.opdc.go.th/uploads/.../GET_Results_Based_Management_Report.pdf

Similar Documents

Free Essay

Raymond James Financial Bcd Travel, Houston Texans and Others

...case are simple little issues such as emailing customer credit card numbers and such but I would have definitely have seen these issues but the lapse of these company have cost them security wise. The best way for organizations to strike the right balance between monitoring and invading their employees' privacy would be to evaluate each employees based on their activities. Have each employee make a report of their activities while the company is monitoring them as well the companies should put trust in their employees to report everything they're doing and when it is time to evaluate them cross compare what has been monitored and what the employees have reported. The consequence biased to one side would be if the company were to engage in just invading employee privacy there could be massive repercussions such as the company being sued etc. The other components are people security, establishing ethical behavior in the company, and managers taking the initiative to stop any leakage in the company. The human factor in is the stronger point in this situation its not the technology that's leaking information but the people the technology is just a tool to do so. The same goes for when it comes to monitoring and making sure that information is not leaked from the its the people who have to monitor to make sure that...

Words: 300 - Pages: 2

Free Essay

Call Center

...service level, number of calls per employee, first call resolution, and transfer rate.  By using the statistical report, it will help show the relationship between their performance and the organization standards or goals and it is easier to visualize.  It can also be utilized by the managers to take necessary corrective actions if needed. The response time and service level can be measured by the monitoring how many calls are answered within how many seconds and total number of calls in a day is being answered.  It is important to monitor the total amount of calls but we must consider the number of calls an employee is answering and should be reported to ensure that individual employee is properly assessed. This will also show if the employees are answering them promptly and not just a handful is answering the calls.    The first call resolution (FCR) measures the individuals’ ability to accomplish the task in one transaction and not transfer the call.  Transfer rate indicates how many calls have been transferred to another party to be handled. Monitoring the number of calls being transferred can identify if there are any performance gaps and training if needed (Reynolds 2012).   Reynolds, Penny (January 2012) The Top 20 Contact Center Metrics for 2012. Multichannel Merchant, Retrieved from...

Words: 252 - Pages: 2

Free Essay

Riordan Manufacturing

...Currently Riordan Manufacturing has several different offices and each office is using a different type of system, but there is not a central system that monitors each of the satellite offices and their production. To assist Riordan become more efficient, they will need to implement a central system to monitor both individual and overlapping system usage. They should create a Data Center in the corporate office that monitors all of the current systems in place. This will allow Riordan Manufacturing to understand how their business is functioning and how application are used more often and which are not utilized enough, helping to determine if they should upgrade or discontinue the use of a system. Each department uses different applications; some of the applications interface with one another and other are stand alone. Riordan also currently has a lot of manual processes, for example how they submit daily inventory records. With the overall updates that our team has posed have more automation will assist Riordan to increase their production and accuracy. We can implement an application that can be used by all of the centers in order to maintain the inventory across the board so the managers are able to see what is in high demand in specific locations. Having an overall view of the inventory will be beneficial to the entire company. If the marketing department has he ability to see the inventory usage then they will know where they need to market certain products better. We...

Words: 420 - Pages: 2

Premium Essay

Product Bullet Points

...Product Bullet Points: Reliable remote monitoring Program up to 10 wireless devices Adjustable notification settings Large silence button Lightweight with belt clip and lanyard 60 day guarantee Product Features: SIMPLE REMOTE MONITORING Easily integrates with the Vive fall management system for caregiver peace of mind and to promote greater independence REAL-TIME ALERTS With a range of up to 150 feet, the pager provides instant alerts enabling prompt assistance to minimize falls and hazardous wandering CONNECT UP TO 10 DEVICES Program up to ten wireless devices to receive real-time alerts THREE NOTIFICATION SETTINGS Be alerted with an adjustable volume chime, a silent vibration mode or a combination of the two QUICKLY SILENCE ALARMS...

Words: 585 - Pages: 3

Premium Essay

How Ish Play Their Role

...How ISH can play their monitoring role (by using ISC’s code of activism) * ISH need to set out their policy on how to monitor the investee companies, for example :- (i) Meeting policy with investee company’s board and senior management (dialogue). (ii) How to minimize or dealt with the conflict of interest situation by the ISH. (iii) Strategy on intervene in investee company. (iv) Indicate the type of circumstances where and how further actions need to be taken by ISH. (v) Voting policy and voting disclosure. * Monitoring and communicating:- (i) Monitor the performance of investee company on regular basis. * Review the Annual reports and accounts / general meeting resolution. * Review whether the board of investee company is effective or not. (ii) Regular dialogue with investee company’s board / senior management. (clear information) * Attend investee company meeting and raise question where necessary. * Enter into active dialogue with Company’s board / senior management. ^ enable the ISH to identify the problem at earlier stage and reduce the SH’s value. ^ But ISH may not want to involve in the investee operation. * Intervene where necessary (i) ISH will only intervene when the investee company :- * Engages in risky strategy which will reduce SHs/ value. * Performance is less than satisfactory. * Acquisition / disposal that involve related party transaction (not in arm-length basis). (sell company’s...

Words: 428 - Pages: 2

Free Essay

Mister

...Elias N. Khan Prof. Session CRJ 115 7 December 2015 Packet Sniffers: A Bittersweet Software Packet sniffing software is a controversial subject and a double-edged sword. It can be used to analyze network problems and detect Internet misuse. But at the same time, it allows hackers and people with malicious intention to "sniff" out your password, get your personal information, and invade your privacy. That is also why securing and encrypting data is so important. In this paper, the definition of packet sniffing will be introduced and several functionality and possible uses of packet sniffers will be explained. Also, information on how to protect against sniffers and man-in-the-middle attacks will be provided. An example of a packet sniffer program, Wireshark, will be given, followed by a case study involving the restaurant chain Dave & Buster's, which will show the negative consequences that can occur when organizations are not aware of the threat of packet sniffing by hackers. A packet sniffer is "a computer program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network" (Connolly, 2003). Packet sniffers are known by alternate names including network analyzer, protocol analyzer or sniffer, or for particular types of networks, an Ethernet sniffer or wireless sniffer (Connolly, 2003). As binary data travels through a network, the packet sniffer captures the data and provides the user an idea of what is happening...

Words: 2443 - Pages: 10

Free Essay

Organizational Policy Statement

...For the three-policy statements below please reference the two REFS below A. ISO/IEC: 27002 B. ISO/IEC: 27001 Organizational policy statement 1. System breach prevention When an employee leaves the company, the company will update their CRL and ACL (certificate revocation list and access control list). This way a previous employee will not have access to company systems. Previous employees having account access to the company’s virtual private networks (VPN) from home or remote locations will be terminated immediately upon employee termination. See ref A, Annex A.8.3.3, pg. 16 a. Any employee going on company approved travel that will require him/her to access company networks remotely, will request access tens days prior to travel. b. Any employee requesting access to the company’s VPN will request access via the proper channels. See ref A, Annex, A.8.1.1, pg 15, A.11.2, pg 22 c. All access requests will be logged and finalized by human resources after employee have reviewed a confidentiality and non-disclosure agreement of company sensitive information IAW ref A, section 8, Annex A.11.4.1, pg 23 A.11.2 pg 22 d. Employee account will expire ten days before employee leaves the company or termination to ensure that all accounts have been closed and access revoked. The network management team will run account active program to see all account active for the employee that is to be released on the 10th day to ensure that the employee is not...

Words: 600 - Pages: 3

Free Essay

Is4670

...IS4670 Unit 7 Assignment 1: Overcome Difficulties of Network Monitoring One of the initial ideologies behind most organizations' network security practices is still "defense in depth," which is performed using a variety of security controls and monitoring at different locations in an organization's networks and systems. As part of a defense-in-depth scheme, it has become commonplace for organizations to build enterprise security operations centers that bank on in part on monitoring the tremendously large volumes of network traffic at the perimeter of their. There has been a recent style toward increased investment in and reliance on network monitoring in order to streamline sensor deployments, decrease cost, and more easily centralize operations. At the same time, the idea of a well-defined defensible perimeter is being challenged by cloud computing, the insider threat, the so-called advanced persistent threat problem, and the popularity of socially-engineered application-level attacks over network-based attacks. Commonly, network and security practitioners hear that the start of any network-centric project is to baseline the network. What exactly is this supposed to mean? Simplistic approaches concentrate on bandwidth utilization over time, typically focusing on spikes and troughs. Some try to describe traffic in terms of protocols and port numbers. More advanced approaches try to classify traffic according to flows or even content. Regardless, there is no single accepted...

Words: 621 - Pages: 3

Premium Essay

Nt1330 Unit 8 Exercise 1

...Administrative Control versus Trust Unit 8 Exercise 1 ITT Technical Institute Floyd Washington Jr. May 21, 2015 As an administrator you must set up guidelines over a network to prevent the malicious intent of bad users. This is why the administrator must implement Administrative Control. Administrative Controls are the policies, guidelines, procedures and standards that protect the overall integrity of the company’s computer network. This is when the company’s IT Professionals take every precaution possible to ensure that their computer network is secure and free of viruses that can cause the network to crash. Administrative control is one thing, but too much control can hurt a business in many ways. Too much control over a company’s network can restrict user from attaining much needed information. Therefore, an administrator must allow some users in the company full use of the company’s network without any restrictions. As a network administrator you must choose the people carefully that you allow full access to your company’s network. They must have solid instructions for the sites they are to visit. Administrative controls can have a great influence on the decision making of the entire company workforce. Without Administrative controls there can and probably will be serious liabilities formed against the company you work for. Most computer networks today will require that users use an authentication process, which means that the network is password and PIN protected...

Words: 336 - Pages: 2

Premium Essay

Comprehensive Aap

...WWTC Comprehensive AAP Executive Summary The comprehensive visions for the World-Wide Trading Company (WWTC), an aggressively growing online broker firm, is to increase revenue from 10 billion to 40 billion and reduce operating costs from 30 to 15 percent by the year 2018. The key to gains in exponential growth and revenue was addressed by the leased office location in the notoriously known broker/financial capital of the United States, Wall Street, New York City, New York. WWTC encompasses a staff of 9,000 trained employees scattered across the globe. The World-Wide Trading Company’s corporate headquarters will remain in Hong Kong, while The New York office will be used as an international extension. This office will house approximately 200 staff members. The newly hired IT team will provide the New York office with a state of the art network design. The initiative will focus on the reinforcement of reported security vulnerabilities at other WWTC locations. This design will exceed all other previous standards and set the mold for other businesses to emulate. Project Goal The goal of this project is to increase WWTC revenue from 10 billion to 40 billion dollars by the within the next three to four years. The focus lies within reducing operating costs from 30 to 15 percent by using an automated system for the buying and selling of goods, or, e-commerce. With the implementation of a new, highly scalable, fast and efficient Local/Wide Area Network (LAN/WAN), WWTC will...

Words: 7472 - Pages: 30

Premium Essay

Network Solutions

...IT 331-CNS Capstone Network Solutions LLC 6/22/2012 Network Solutions IT Staff * Victor Santiago - Network, Systems Manager Job Description: Managers of information technology provide leadership, team management and stewardship for an organization's IT-enabled business systems, solutions and processes. They manage the technology portfolio, which typically includes personal computers, mainframes, servers, data storage, networks, middleware, Internet services and other IT systems that comprise the core infrastructure. Managers of information technology are dynamic, engaging and personable technologists, and provide leadership during projects ranging from large, strategic initiatives to small systems upgrades. * Jason Rush - Project Manager, Network Analyst Job Description: IT managers these types of managers are accountable for making certain an application, computer hardware product or service remains on target throughout the development process and delivery stages. They may have oversight of computer programmers, IT professionals, and system administrators. They have to also provide effective leadership and marketing communications expertise. A project manager job description can be defined as anyone that is given the responsibility of taking a project from start to finish and completing all the objectives along the way. At the same time maintaining control over what is said to be the three most important components of any job, Time, Cost, and Quality. More than...

Words: 800 - Pages: 4

Premium Essay

Case Studies

...Monitoring Optimization Case Study Food Manufacturer Eliminates SPAN Shortages Fortune 2000 food product manufacturer rapidly increases network visibility, extends useful life for existing tools, and accelerates MTTR for troubleshooting problems “We selected the Anue Net Tool Optimizer to eliminate our SPAN shortage problem. Since it has been deployed, we have also seen a significant improvement in network visibility, cost savings on tools, and faster MTTR for diagnostic troubleshooting.” – Lead Network Administrator “The Anue Net Tool Optimizer allows us to share traffic from our limited number of SPANs with eight tools, without dropping packets or overloading the tools with data.” – Lead Network Administrator Company Profile The Customer is a $4B food product manufacturer in North America (FY 2010). With products that distribute across the continent, in the United States, Canada, and Mexico, the Customer is one of the leaders in packaged coffee, health/natural foods, and a variety of other packaged edibles. Problem The Customer runs a complex network with approximately 7,500 networking devices deployed at their headquarters, as well as 33 remotely located sites, 75% of which are primarily manufacturing facilities. They use a variety of tool types, including Application Performance Management (APM), Intrusion Detection Systems (IDS), URL Filtering, Packet Capture, and Data Loss Prevention (DLP). With such a variety of tools, the Customer’s networking team found...

Words: 1327 - Pages: 6

Free Essay

Vgvggg

...* Information Technology * Team Building & Leadership * Troubleshooting * Network Administration * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management * Information Technology * Team Building & Leadership * Troubleshooting * Network Administration * Computer Repair & Updating * Account Management * LAN/WAN * Security Systems Management * Servers * Windows * Software Imaging * Architecture / IT Strategy * Project Management Derrick Lamont Grays Network Administrator & Information Technology Professional 7206 Jamacha Road, San Diego, Ca 92114 Ph: (619) 549-1914 email: dgrays07@gmail.com CORE STRENGTHS & QUALIFICATIONS * 8+ years of extensive IT strategy experience as a Network Administrator with a proven track record of success. * Network administration skills include backup, security management, user account management, e-mail systems including e-mail web server, internet access, printers, office systems and applications support. * Exceptionally advanced computer knowledge with an ability to manage complex disciplines and circumstances; provides competence under pressure in highly complicated situations. * As a Network Administrator for the United States Navy...

Words: 422 - Pages: 2

Free Essay

Fiction Corp Network Upgrade

...Fiction Corp Network Upgrade Garima Shah Strayer University 6.17.2014 Fiction Corp Network Upgrade Wide-IP Corp June 2014 Table of contents Executive summary Project goal Project scope Design requirements:  a. Business goals b. Technical goals c. User communities and data stores d. Network applications 7. Current state of the network Logical design Physical design Results of network design testing Implementation plan with a project schedule Project budget with a return on investment calculation Design document appendix Executive summary * Move Fiction Corporation’s data center to a new, state-of-the-art data center with improved networking capabilities to provide support and service to the existing organization, retail centers and any future expansion * Ensure Network security is reviewed and improved upon * Ensure minimal or zero network downtime for existing business operations during the move Project goal * Seamless migration of the data center to the new location with minimal or zero disruption to the current business operations * Assess current security flaws and provide solutions to eliminate flaws * Quality assurance-monitor the status of remote systems and determine feasible success /failure toward seamless migration and updated network system Project scope * The scope of the project is to migrate the existing data center to a new location; to assess and eliminate current security flaws in the network ...

Words: 1353 - Pages: 6

Free Essay

Strategies for the Technical Profeesionial

...that make up a computer network including the maintenance and monitoring of active data network or converged infrastructure and related network equipment. Network administrators are generally mid-level support staff within an organization and do not typically get involved directly with users. Network administrators focus on network components within a company's LAN/WAN infrastructure ensuring integrity. Depending on the company and its size, the network administrator may also design and deploy networks. Network Administrators are often involved in proactive work. This type of work will often include: * Network monitoring * Testing the network for weakness * Keeping an eye out for needed updates * Installing and implementing security programs * In many cases, E-mail and Internet filters * Evaluating implementing network management software * Monitoring network traffic and bottleneck Network administrators are responsible for making sure that computer hardware and network infrastructure related to an organization's data network are effectively maintained. In smaller organizations, they are typically involved in the procurement of new hardware, the roll out of new software, maintaining disk images for new computer installs, making sure that licenses are paid for and up to date for software that need it, maintaining the standards for server installations and applications, monitoring the performance of the network, checking for security breaches...

Words: 343 - Pages: 2