Comparison between Social Entrepreneurial Activity (SEA) and Total Entrepreneurial Activity (SEA), by Type of economy and by Gender (Percentages).
\\n\\n
Released this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\\n\\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'IntechOpen is proud to announce that 179 of our authors have made the Clarivate™ Highly Cited Researchers List for 2020, ranking them among the top 1% most-cited.
\n\nThroughout the years, the list has named a total of 252 IntechOpen authors as Highly Cited. Of those researchers, 69 have been featured on the list multiple times.
\n\n\n\nReleased this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\n\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
\n'}],latestNews:[{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"},{slug:"oiv-awards-recognizes-intechopen-s-editors-20201127",title:"OIV Awards Recognizes IntechOpen's Editors"},{slug:"intechopen-joins-crossref-s-initiative-for-open-abstracts-i4oa-to-boost-the-discovery-of-research-20201005",title:"IntechOpen joins Crossref's Initiative for Open Abstracts (I4OA) to Boost the Discovery of Research"},{slug:"intechopen-hits-milestone-5-000-open-access-books-published-20200908",title:"IntechOpen hits milestone: 5,000 Open Access books published!"},{slug:"intechopen-books-hosted-on-the-mathworks-book-program-20200819",title:"IntechOpen Books Hosted on the MathWorks Book Program"}]},book:{item:{type:"book",id:"9698",leadTitle:null,fullTitle:"Invasive Species - Introduction Pathways, Economic Impact, and Possible Management Options",title:"Invasive Species",subtitle:"Introduction Pathways, Economic Impact, and Possible Management Options",reviewType:"peer-reviewed",abstract:"Invasive alien species (IAS) are a menace to agricultural crops and ornamental plants worldwide due to climate change and global warming. They vector serious human and animal diseases and endanger biological diversity through competition and niche displacement. This book addresses issues pertaining to introduction pathways of invasive species, their bionomics, dispersal, risk assessment, economic impact, and possible management and control options. It provides comprehensive information on global invasion, economic impact, and management options for the red palm weevil, spotted wing Drosophila, and the South American tomato pinworm. Additionally, it examines the economic utilization of invasive plant species from the families Asteraceae and Cactaceae as means of management. University teachers and researchers in the fields of entomology, ecology, and environment, as well as students, will find this book useful.",isbn:"978-1-78985-850-1",printIsbn:"978-1-78985-849-5",pdfIsbn:"978-1-83880-431-2",doi:"10.5772/intechopen.87502",price:119,priceEur:129,priceUsd:155,slug:"invasive-species-introduction-pathways-economic-impact-and-possible-management-options",numberOfPages:170,isOpenForSubmission:!1,isInWos:null,hash:"132b23bdec7eff6ba300d67cc44d2d91",bookSignature:"Hamadttu El-Shafie",publishedDate:"September 23rd 2020",coverURL:"https://cdn.intechopen.com/books/images_new/9698.jpg",numberOfDownloads:1940,numberOfWosCitations:0,numberOfCrossrefCitations:1,numberOfDimensionsCitations:5,hasAltmetrics:1,numberOfTotalCitations:6,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"October 29th 2019",dateEndSecondStepPublish:"March 18th 2020",dateEndThirdStepPublish:"May 17th 2020",dateEndFourthStepPublish:"August 5th 2020",dateEndFifthStepPublish:"October 4th 2020",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6",editedByType:"Edited by",kuFlag:!1,editors:[{id:"192142",title:"Dr.",name:"Hamadttu",middleName:null,surname:"El-Shafie",slug:"hamadttu-el-shafie",fullName:"Hamadttu El-Shafie",profilePictureURL:"https://mts.intechopen.com/storage/users/192142/images/system/192142.jpg",biography:"Hamadttu Abdel Farag El-Shafie is an associate professor of entomology and senior research entomologist at the Date Palm Research Center of Excellence, King Faisal University, Saudi Arabia. He is the head of IPM research program in date palm. El-Shafie obtained his B.Sc. and M.Sc. degrees from the University of Khartoum, Sudan in 1988 and 1993, respectively. He received his Ph.D. degree from University of Giessen, Germany in 2001. He was appointed head of Crop Protection Department at University of Khartoum in 2008, and then deputy dean for academic affairs at Faculty of Agriculture, University of Khartoum. He supervised 25 M.Sc. students and 5 Ph.D. students at University of Khartoum. His research interest focuses on management of field crop pests using neem biopesticides, and biology and ecology of date palm pests including mites. He also has interest in control of red palm weevil using semiochemicals. He published 60 research papers in international peer-reviewed journals and 10 book chapters with international publishers such as Springer, John Wiley and IntechOpen, in addition to more than 25 international conferences in the field of entomology. During the last ten years, he has been reviewing manuscripts for 30 renowned international journals.",institutionString:"King Faisal University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"6",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"King Faisal University",institutionURL:null,country:{name:"Saudi Arabia"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"330",title:"Biogeography",slug:"agricultural-and-biological-sciences-ecology-biogeography"}],chapters:[{id:"73021",title:"Red Palm Weevil Rhynchophorus ferrugineus (Coleoptera: Curculionidae): Global Invasion, Current Management Options, Challenges and Future Prospects",doi:"10.5772/intechopen.93391",slug:"red-palm-weevil-em-rhynchophorus-ferrugineus-em-coleoptera-curculionidae-global-invasion-current-man",totalDownloads:249,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Hamadttu Abdel Farag El-Shafie and Jose Romeno Faleiro",downloadPdfUrl:"/chapter/pdf-download/73021",previewPdfUrl:"/chapter/pdf-preview/73021",authors:[{id:"192142",title:"Dr.",name:"Hamadttu",surname:"El-Shafie",slug:"hamadttu-el-shafie",fullName:"Hamadttu El-Shafie"},{id:"320867",title:"Dr.",name:"Jose",surname:"Romeno Faleiro",slug:"jose-romeno-faleiro",fullName:"Jose Romeno Faleiro"}],corrections:null},{id:"73007",title:"Recent Trends in the Early Detection of the Invasive Red Palm Weevil, Rhynchophorus ferrugineus (Olivier)",doi:"10.5772/intechopen.93393",slug:"recent-trends-in-the-early-detection-of-the-invasive-red-palm-weevil-em-rhynchophorus-ferrugineus-em",totalDownloads:183,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Maged E.A. Mohammed, Hamadttu A.F. El-Shafie and Mohammed R. Alhajhoj",downloadPdfUrl:"/chapter/pdf-download/73007",previewPdfUrl:"/chapter/pdf-preview/73007",authors:[{id:"192142",title:"Dr.",name:"Hamadttu",surname:"El-Shafie",slug:"hamadttu-el-shafie",fullName:"Hamadttu El-Shafie"},{id:"147638",title:"Dr.",name:"Maged",surname:"Mohammed",slug:"maged-mohammed",fullName:"Maged Mohammed"},{id:"309353",title:"Prof.",name:"Mohammed",surname:"Alhajhoj",slug:"mohammed-alhajhoj",fullName:"Mohammed Alhajhoj"}],corrections:null},{id:"72034",title:"Invasive Insects in India",doi:"10.5772/intechopen.91986",slug:"invasive-insects-in-india",totalDownloads:320,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Swoyam Singh, Jai Hind Sharma, Avinash Udikeri and Hashib Ansari",downloadPdfUrl:"/chapter/pdf-download/72034",previewPdfUrl:"/chapter/pdf-preview/72034",authors:[{id:"315507",title:"Dr.",name:"Swoyam",surname:"Singh",slug:"swoyam-singh",fullName:"Swoyam Singh"},{id:"317139",title:"MSc.",name:"Hashib",surname:"Ansari",slug:"hashib-ansari",fullName:"Hashib Ansari"},{id:"318716",title:"Mr.",name:"Jai Hind",surname:"Sharma",slug:"jai-hind-sharma",fullName:"Jai Hind Sharma"},{id:"318717",title:"Mr.",name:"Avinash",surname:"Udiker",slug:"avinash-udiker",fullName:"Avinash Udiker"}],corrections:null},{id:"71435",title:"The Spotted Wing Drosophila in the South of the World: Chilean Case and Its First Productive Impacts",doi:"10.5772/intechopen.91668",slug:"the-spotted-wing-drosophila-in-the-south-of-the-world-chilean-case-and-its-first-productive-impacts",totalDownloads:348,totalCrossrefCites:0,totalDimensionsCites:2,signatures:"Karina Buzzetti Morales",downloadPdfUrl:"/chapter/pdf-download/71435",previewPdfUrl:"/chapter/pdf-preview/71435",authors:[{id:"214596",title:"Dr.",name:"Karina",surname:"Buzzetti",slug:"karina-buzzetti",fullName:"Karina Buzzetti"}],corrections:null},{id:"72961",title:"Tuta absoluta (Meyrick) (Lepidoptera: Gelechiidae): An Invasive Insect Pest Threatening the World Tomato Production",doi:"10.5772/intechopen.93390",slug:"-em-tuta-absoluta-em-meyrick-lepidoptera-gelechiidae-an-invasive-insect-pest-threatening-the-world-t",totalDownloads:155,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Hamadttu Abdel Farag El-Shafie",downloadPdfUrl:"/chapter/pdf-download/72961",previewPdfUrl:"/chapter/pdf-preview/72961",authors:[{id:"192142",title:"Dr.",name:"Hamadttu",surname:"El-Shafie",slug:"hamadttu-el-shafie",fullName:"Hamadttu El-Shafie"}],corrections:null},{id:"71758",title:"Hybridogenic Activity of Invasive Species of Asteraceae",doi:"10.5772/intechopen.91370",slug:"hybridogenic-activity-of-invasive-species-of-asteraceae",totalDownloads:169,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Maria A. Galkina and Yulia K. Vinogradova",downloadPdfUrl:"/chapter/pdf-download/71758",previewPdfUrl:"/chapter/pdf-preview/71758",authors:[{id:"315274",title:"Ph.D.",name:"Maria",surname:"Galkina",slug:"maria-galkina",fullName:"Maria Galkina"},{id:"315673",title:"Dr.",name:"Yulia",surname:"Vinogradova",slug:"yulia-vinogradova",fullName:"Yulia Vinogradova"}],corrections:null},{id:"71231",title:"Changing Climate and Advances on Weeds Utilization as Forage: Provisions, Nutritional Quality and Implications",doi:"10.5772/intechopen.91386",slug:"changing-climate-and-advances-on-weeds-utilization-as-forage-provisions-nutritional-quality-and-impl",totalDownloads:131,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Muhammad Aamir Iqbal, Sajid Ali, Ayman El Sabagh, Zahoor Ahmad and Muzammil H. Siddiqui",downloadPdfUrl:"/chapter/pdf-download/71231",previewPdfUrl:"/chapter/pdf-preview/71231",authors:[{id:"317736",title:"Prof.",name:"Prof. Dr. Muzammil H.",surname:"Siddiqui",slug:"prof.-dr.-muzammil-h.-siddiqui",fullName:"Prof. Dr. Muzammil H. Siddiqui"}],corrections:null},{id:"71610",title:"Valorization of Prickly Pear [Opuntia ficus-indica (L.) Mill]: Nutritional Composition, Functional Properties and Economic Aspects",doi:"10.5772/intechopen.92009",slug:"valorization-of-prickly-pear-em-opuntia-ficus-indica-em-l-mill-nutritional-composition-functional-pr",totalDownloads:238,totalCrossrefCites:1,totalDimensionsCites:3,signatures:"Francisca Hernández García, Lucia Andreu Coll, Marina Cano-Lamadrid, David López Lluch, Ángel A. Carbonell Barrachina and Pilar Legua Murcia",downloadPdfUrl:"/chapter/pdf-download/71610",previewPdfUrl:"/chapter/pdf-preview/71610",authors:[{id:"178432",title:"Dr.",name:"David",surname:"Lopez Lluch",slug:"david-lopez-lluch",fullName:"David Lopez Lluch"},{id:"317122",title:"Dr.",name:"Francisca",surname:"Hernández",slug:"francisca-hernandez",fullName:"Francisca Hernández"},{id:"317205",title:"Ms.",name:"Lucia",surname:"Andreu Coll",slug:"lucia-andreu-coll",fullName:"Lucia Andreu Coll"},{id:"317206",title:"Ms.",name:"Marina",surname:"Cano-Lamadrid",slug:"marina-cano-lamadrid",fullName:"Marina Cano-Lamadrid"},{id:"317207",title:"Dr.",name:"Ángel",surname:"Carbonell Barrachina",slug:"angel-carbonell-barrachina",fullName:"Ángel Carbonell Barrachina"},{id:"317208",title:"Dr.",name:"Pilar",surname:"Legua Murcia",slug:"pilar-legua-murcia",fullName:"Pilar Legua Murcia"}],corrections:null},{id:"71809",title:"Novel Trend in the Use of Opuntia (Cactaceae) Fibers as Potential Feedstock for Material Science Applications",doi:"10.5772/intechopen.92112",slug:"novel-trend-in-the-use-of-em-opuntia-em-cactaceae-fibers-as-potential-feedstock-for-material-science",totalDownloads:148,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Faten Mannai, Ramzi Khiari and Younes Moussaoui",downloadPdfUrl:"/chapter/pdf-download/71809",previewPdfUrl:"/chapter/pdf-preview/71809",authors:[{id:"301077",title:"Prof.",name:"Younes",surname:"Moussaoui",slug:"younes-moussaoui",fullName:"Younes Moussaoui"},{id:"308566",title:"Dr.",name:"Faten",surname:"Mannai",slug:"faten-mannai",fullName:"Faten Mannai"},{id:"308568",title:"Dr.",name:"Ramzi",surname:"Khiari",slug:"ramzi-khiari",fullName:"Ramzi Khiari"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"1051",title:"Anoxia",subtitle:null,isOpenForSubmission:!1,hash:"28412ca9838b8328a35b1ab2423af104",slug:"anoxia",bookSignature:"Pamela Padilla",coverURL:"https://cdn.intechopen.com/books/images_new/1051.jpg",editedByType:"Edited by",editors:[{id:"67152",title:"Dr.",name:"Pamela",surname:"Padilla",slug:"pamela-padilla",fullName:"Pamela Padilla"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8833",title:"Habitats of the World",subtitle:"Biodiversity and Threats",isOpenForSubmission:!1,hash:"4b7673e0edb8a67093ee8f925f1c1614",slug:"habitats-of-the-world-biodiversity-and-threats",bookSignature:"Carmelo Maria Musarella, Ana Cano Ortiz and Ricardo Quinto Canas",coverURL:"https://cdn.intechopen.com/books/images_new/8833.jpg",editedByType:"Edited by",editors:[{id:"276295",title:"Dr.",name:"Carmelo Maria",surname:"Musarella",slug:"carmelo-maria-musarella",fullName:"Carmelo Maria Musarella"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"878",title:"Phytochemicals",subtitle:"A Global Perspective of Their Role in Nutrition and Health",isOpenForSubmission:!1,hash:"ec77671f63975ef2d16192897deb6835",slug:"phytochemicals-a-global-perspective-of-their-role-in-nutrition-and-health",bookSignature:"Venketeshwer Rao",coverURL:"https://cdn.intechopen.com/books/images_new/878.jpg",editedByType:"Edited by",editors:[{id:"82663",title:"Dr.",name:"Venketeshwer",surname:"Rao",slug:"venketeshwer-rao",fullName:"Venketeshwer Rao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"69566",slug:"corrigendum-to-a-brief-overview-of-ophthalmic-ultrasound-imaging",title:"Corrigendum to: A Brief Overview of Ophthalmic Ultrasound Imaging",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/69566.pdf",downloadPdfUrl:"/chapter/pdf-download/69566",previewPdfUrl:"/chapter/pdf-preview/69566",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/69566",risUrl:"/chapter/ris/69566",chapter:{id:"65491",slug:"a-brief-overview-of-ophthalmic-ultrasound-imaging",signatures:"David B. Rosen, Mandi D. Conway, Charles P. Ingram, Robin D. Ross and Leonardo G. Montilla",dateSubmitted:"November 6th 2018",dateReviewed:"December 12th 2018",datePrePublished:"February 5th 2019",datePublished:"September 4th 2019",book:{id:"8633",title:"Novel Diagnostic Methods in Ophthalmology",subtitle:null,fullTitle:"Novel Diagnostic Methods in Ophthalmology",slug:"novel-diagnostic-methods-in-ophthalmology",publishedDate:"September 4th 2019",bookSignature:"Anna Nowinska",coverURL:"https://cdn.intechopen.com/books/images_new/8633.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"261466",title:"Dr.",name:"Anna",middleName:"Karolina",surname:"Nowinska",slug:"anna-nowinska",fullName:"Anna Nowinska"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null}},chapter:{id:"65491",slug:"a-brief-overview-of-ophthalmic-ultrasound-imaging",signatures:"David B. Rosen, Mandi D. Conway, Charles P. Ingram, Robin D. Ross and Leonardo G. Montilla",dateSubmitted:"November 6th 2018",dateReviewed:"December 12th 2018",datePrePublished:"February 5th 2019",datePublished:"September 4th 2019",book:{id:"8633",title:"Novel Diagnostic Methods in Ophthalmology",subtitle:null,fullTitle:"Novel Diagnostic Methods in Ophthalmology",slug:"novel-diagnostic-methods-in-ophthalmology",publishedDate:"September 4th 2019",bookSignature:"Anna Nowinska",coverURL:"https://cdn.intechopen.com/books/images_new/8633.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"261466",title:"Dr.",name:"Anna",middleName:"Karolina",surname:"Nowinska",slug:"anna-nowinska",fullName:"Anna Nowinska"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null},book:{id:"8633",title:"Novel Diagnostic Methods in Ophthalmology",subtitle:null,fullTitle:"Novel Diagnostic Methods in Ophthalmology",slug:"novel-diagnostic-methods-in-ophthalmology",publishedDate:"September 4th 2019",bookSignature:"Anna Nowinska",coverURL:"https://cdn.intechopen.com/books/images_new/8633.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"261466",title:"Dr.",name:"Anna",middleName:"Karolina",surname:"Nowinska",slug:"anna-nowinska",fullName:"Anna Nowinska"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"7870",leadTitle:null,title:"Muscle Cells",subtitle:"Recent Advances and Future Perspectives",reviewType:"peer-reviewed",abstract:"The three different types of muscle tissue found in the animal kingdom are cardiac, skeletal, and smooth. The muscle cells are not only complex but also fascinating. In recent years there has been substantial advances in our understanding of muscle cell biology, especially in areas of molecular anatomy, basic physiology, understanding disease mechanisms, and therapeutic targets. Consequently, this book mainly focuses not only on the biology of myocytes, but also on all-encompassing disciplines pertaining to muscle tissue, such as fundamental physiology, molecular mechanisms of diseases, muscle regeneration, etc. for all three types of muscle, namely, skeletal, cardiac, and smooth muscle. As a result, the goal of this book is to consolidate the recent advances in the area of muscle biology/diseases/regeneration covering a broad range of interrelated topics in a timely fashion and to disseminate that knowledge in a lucid way to a greater scientific audience. This book will prove highly useful for students, researchers, and clinicians in muscle cell biology, exercise physiology/science, stem cell biology, developmental biology, cancer biology, pathology, oncology, as well as tissue engineering and regenerative medicine. This quick reference will benefit anyone desiring a thorough knowledge pertaining to recent advances in muscle biology in the context of health and disease.",isbn:"978-1-78923-968-3",printIsbn:"978-1-78923-967-6",pdfIsbn:"978-1-83968-010-6",doi:"10.5772/intechopen.77689",price:119,priceEur:129,priceUsd:155,slug:"muscle-cells-recent-advances-and-future-perspectives",numberOfPages:180,isOpenForSubmission:!1,hash:"64634d90d737661d1e606cac28b79969",bookSignature:"Mani T. Valarmathi",publishedDate:"January 22nd 2020",coverURL:"https://cdn.intechopen.com/books/images_new/7870.jpg",keywords:null,numberOfDownloads:2925,numberOfWosCitations:0,numberOfCrossrefCitations:3,numberOfDimensionsCitations:4,numberOfTotalCitations:7,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"September 6th 2018",dateEndSecondStepPublish:"November 6th 2018",dateEndThirdStepPublish:"January 5th 2019",dateEndFourthStepPublish:"March 26th 2019",dateEndFifthStepPublish:"May 25th 2019",remainingDaysToSecondStep:"2 years",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:"Edited by",kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"69697",title:"Dr.",name:"Mani T.",middleName:null,surname:"Valarmathi",slug:"mani-t.-valarmathi",fullName:"Mani T. Valarmathi",profilePictureURL:"https://mts.intechopen.com/storage/users/69697/images/system/69697.jpg",biography:"Mani T. Valarmathi is presently an assistant professor at the University of Alabama at Birmingham, USA. He began his scientific career as a cancer geneticist, but soon became captivated with the emerging and translational fields of stem cell biology, tissue engineering, and regenerative medicine. After completing his Bachelor’s degree in Chemistry at the University of Madras, he received his MBBS in Medicine and Surgery and MD in Pathology from the University of Madras, as well as his PhD in Medical Biotechnology from All-India Institute of Medical Sciences, New Delhi, India. For over 15 years, he has had extensive experience in research on various types of stem cells, including adult, embryonic (pluripotent), and induced pluripotent stem cells. Currently, his research work focuses on generating three-dimensional vascularized tissues and/or organs for implantation purposes. He is a member of many prestigious national and international professional societies and scientific organizations, such as ISSCR, TERMIS, AACR, ASIP, ACS, ESC, ISHR, ASGCT, and AHA.",institutionString:"The University of Alabama at Birmingham",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"University of Alabama at Birmingham",institutionURL:null,country:{name:"United States of America"}}}],coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"1064",title:"Human Anatomy",slug:"human-anatomy"}],chapters:[{id:"66964",title:"Vascularisation of Skeletal Muscle",slug:"vascularisation-of-skeletal-muscle",totalDownloads:343,totalCrossrefCites:0,authors:[{id:"143655",title:"Ph.D. Student",name:"Kamal",surname:"Ranjbar",slug:"kamal-ranjbar",fullName:"Kamal Ranjbar"},{id:"299168",title:"Dr.",name:"Bayan",surname:"Fayazi",slug:"bayan-fayazi",fullName:"Bayan Fayazi"}]},{id:"66080",title:"Excitability of Vascular Smooth Muscle",slug:"excitability-of-vascular-smooth-muscle",totalDownloads:375,totalCrossrefCites:0,authors:[{id:"273990",title:"Dr.",name:"Alexandra V.",surname:"Ulyanova",slug:"alexandra-v.-ulyanova",fullName:"Alexandra V. Ulyanova"}]},{id:"66388",title:"Orexin System and Avian Muscle Mitochondria",slug:"orexin-system-and-avian-muscle-mitochondria",totalDownloads:315,totalCrossrefCites:2,authors:[{id:"274577",title:"Ph.D. Student",name:"Kentu",surname:"Lassiter",slug:"kentu-lassiter",fullName:"Kentu Lassiter"},{id:"274579",title:"Dr.",name:"Sami",surname:"Dridi",slug:"sami-dridi",fullName:"Sami Dridi"}]},{id:"68901",title:"Noncoding RNAs in the Cardiovascular System: Exercise Training Effects",slug:"noncoding-rnas-in-the-cardiovascular-system-exercise-training-effects",totalDownloads:238,totalCrossrefCites:0,authors:[{id:"60681",title:"Dr.",name:"Edilamar Menezes",surname:"de Oliveira",slug:"edilamar-menezes-de-oliveira",fullName:"Edilamar Menezes de Oliveira"},{id:"144084",title:"Ph.D.",name:"Tiago",surname:"Fernandes",slug:"tiago-fernandes",fullName:"Tiago Fernandes"},{id:"277999",title:"MSc.",name:"Noemy",surname:"Pereira",slug:"noemy-pereira",fullName:"Noemy Pereira"},{id:"278002",title:"MSc.",name:"Camila",surname:"Gatto",slug:"camila-gatto",fullName:"Camila Gatto"}]},{id:"67281",title:"Inflammatory Muscle Diseases",slug:"inflammatory-muscle-diseases",totalDownloads:370,totalCrossrefCites:0,authors:[{id:"283757",title:"Prof.",name:"Doris Hissako",surname:"Sumida",slug:"doris-hissako-sumida",fullName:"Doris Hissako Sumida"},{id:"294070",title:"Dr.",name:"Fernando Yamamoto",surname:"Chiba",slug:"fernando-yamamoto-chiba",fullName:"Fernando Yamamoto Chiba"},{id:"294072",title:"MSc.",name:"Maria Sara De Lima Coutinho",surname:"Mattera",slug:"maria-sara-de-lima-coutinho-mattera",fullName:"Maria Sara De Lima Coutinho Mattera"}]},{id:"62090",title:"Leucine and Its Importance for Cell Signalling Pathways in Cancer Cachexia-Induced Muscle Wasting",slug:"leucine-and-its-importance-for-cell-signalling-pathways-in-cancer-cachexia-induced-muscle-wasting",totalDownloads:498,totalCrossrefCites:0,authors:[{id:"242462",title:"Prof.",name:"Maria Cristina Cintra",surname:"Gomes-Marcondes",slug:"maria-cristina-cintra-gomes-marcondes",fullName:"Maria Cristina Cintra Gomes-Marcondes"},{id:"243467",title:"Dr.",name:"Lais Rosa",surname:"Viana",slug:"lais-rosa-viana",fullName:"Lais Rosa Viana"},{id:"243468",title:"Dr.",name:"Andre Gustavo",surname:"Oliveira",slug:"andre-gustavo-oliveira",fullName:"Andre Gustavo Oliveira"},{id:"243470",title:"Dr.",name:"Bread",surname:"Cruz",slug:"bread-cruz",fullName:"Bread Cruz"},{id:"243471",title:"Dr.",name:"Rafael",surname:"Rossi Valentim",slug:"rafael-rossi-valentim",fullName:"Rafael Rossi Valentim"},{id:"243472",title:"Dr.",name:"Luiz Alberto",surname:"Ferreira Ramos",slug:"luiz-alberto-ferreira-ramos",fullName:"Luiz Alberto Ferreira Ramos"},{id:"243767",title:"MSc.",name:"Natalia Angelo Da Silva",surname:"Miyaguti",slug:"natalia-angelo-da-silva-miyaguti",fullName:"Natalia Angelo Da Silva Miyaguti"},{id:"243768",title:"B.Sc.",name:"Sarah Christine",surname:"Pereira De Oliveira",slug:"sarah-christine-pereira-de-oliveira",fullName:"Sarah Christine Pereira De Oliveira"}]},{id:"62824",title:"Adipose Tissue Remodeling during Cancer Cachexia",slug:"adipose-tissue-remodeling-during-cancer-cachexia",totalDownloads:538,totalCrossrefCites:1,authors:[{id:"242418",title:"Dr.",name:"Miguel Luiz",surname:"Batista Júnior",slug:"miguel-luiz-batista-junior",fullName:"Miguel Luiz Batista Júnior"},{id:"297029",title:"Dr.",name:"Felipe",surname:"Henriques",slug:"felipe-henriques",fullName:"Felipe Henriques"}]},{id:"70415",title:"Current Approaches in Immunoassay Methods Focus on Skeletal Muscle Proteins",slug:"current-approaches-in-immunoassay-methods-focus-on-skeletal-muscle-proteins",totalDownloads:248,totalCrossrefCites:0,authors:[{id:"242747",title:"Dr.",name:"Gisela",surname:"Gaina",slug:"gisela-gaina",fullName:"Gisela Gaina"}]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"270941",firstName:"Sandra",lastName:"Maljavac",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/270941/images/7824_n.jpg",email:"sandra.m@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"6658",title:"Stromal Cells",subtitle:"Structure, Function, and Therapeutic Implications",isOpenForSubmission:!1,hash:"c215f02d4268e4b7cccdaea141ec8647",slug:"stromal-cells-structure-function-and-therapeutic-implications",bookSignature:"Mani T. Valarmathi",coverURL:"https://cdn.intechopen.com/books/images_new/6658.jpg",editedByType:"Edited by",editors:[{id:"69697",title:"Dr.",name:"Mani T.",surname:"Valarmathi",slug:"mani-t.-valarmathi",fullName:"Mani T. Valarmathi"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7329",title:"Histology",subtitle:null,isOpenForSubmission:!1,hash:"9af2e2fd8f28c4d1b8b9510c3d73e1ec",slug:"histology",bookSignature:"Thomas Heinbockel and Vonnie D.C. Shields",coverURL:"https://cdn.intechopen.com/books/images_new/7329.jpg",editedByType:"Edited by",editors:[{id:"70569",title:"Dr.",name:"Thomas",surname:"Heinbockel",slug:"thomas-heinbockel",fullName:"Thomas Heinbockel"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9413",title:"Essentials in Hip and Ankle",subtitle:null,isOpenForSubmission:!1,hash:"1c44b3dd87ad50bb95ac035e5bf5ea54",slug:"essentials-in-hip-and-ankle",bookSignature:"Carlos Suarez-Ahedo, Anell Olivos-Meza and Arie M. Rijke",coverURL:"https://cdn.intechopen.com/books/images_new/9413.jpg",editedByType:"Edited by",editors:[{id:"235976",title:"M.D.",name:"Carlos",surname:"Suarez-Ahedo",slug:"carlos-suarez-ahedo",fullName:"Carlos Suarez-Ahedo"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5933",title:"Human Anatomy",subtitle:"Reviews and Medical Advances",isOpenForSubmission:!1,hash:"30fc0e64308e5905986edf17b56080d5",slug:"human-anatomy-reviews-and-medical-advances",bookSignature:"Alina Maria Sisu",coverURL:"https://cdn.intechopen.com/books/images_new/5933.jpg",editedByType:"Edited by",editors:[{id:"138775",title:"Associate Prof.",name:"Alina Maria",surname:"Sisu",slug:"alina-maria-sisu",fullName:"Alina Maria Sisu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"31886",title:"Gender Differences Among Social vs. Business Entrepreneurs",doi:"10.5772/38179",slug:"gender-differences-among-social-vs-business-entrepreneurs",body:'\n\t\tA rapidly growing body of research attests to the interest in women\'s entrepreneurship (e.g. Boyd, 2005; Bruni, Gheradi, & Poggio, 2004;Brush, Carter, Gatewood, Greene & Hart, 2006; Lerner & Pines, 2011; Mulholland, 1996; Pines, 2002; Pines & Schwartz, 2008). This interest is relatively recent (Humbert, Drew&Kelan, 2009). As Carter and Shaw (2006) have noted, research on entrepreneurship has been moving from looking at whether gender makes a difference to how it makes a difference. This chapter is a case in point.
\n\t\t\tDespite the growing interest and despite the fact that the number of women entrepreneurs has accelerated radically in recent years (Weiler & Bernasek, 2001) the gender gap in entrepreneurship is still very big. This is clearly evident in the Global Entrepreneurship Monitor (GEM)Reports on Women and Entrepreneurship (Allen, Elam, Langowitz & Dean, 2007; Allen, Langowotz & Minniti, 2006; Minniti, Allen & Langowotz, 2005) that examined the rates of entrepreneurship in over 40 countries and showed that in all these countries the rates of women\'s entrepreneurship were lower than men\'s. The 2009 data are based on 55 countries, but the picture remained very similar, as can be seen in the data presented in GEM Figure 1 which show early stage entrepreneurial activity rates by gender (Bosma&Levie, 2009 p. 25).
\n\t\t\tEven a cursory examination of GEM Figure 1 reveals several interesting findings, such as the very different rates of entrepreneurship in the different countries, ranging from as low as five percent to as high as over 35%. Part of the explanation for these differences, suggested by GEM, are the different types of economies, ranging from the poorest factor driven economies, through efficiency driven economies, all the way to the most advanced innovation driven economies.
\n\t\t\tAnother interesting finding is the different percent of women as compared to men entrepreneurs in the different countries, ranging from a relatively small difference in countries such as Ecuador, Brazil and Tonga to a relatively large difference in countries such as Korea, Norway and France. In only two countries, Guatemala and Brazil, the percent of women entrepreneurs was higher than that of men. In all other 53 GEM countries, the percent of men entrepreneurs was higher than that of women.
\n\t\t\tThe surprisingfinding that the percent of women entrepreneurs is higher in countries where the general income per capita is small and where women have no other option for
\n\t\t\tEarly-Stage Entrepreneurial Activity Rates by Gender, 2009.
making a living (such as Ecuador) and lower in countries where the general income per capita is high (such as Norway) has been explained as a result of the difference between "necessity" and "opportunity" entrepreneurship, with necessity entrepreneurship found to be more prevalent among women (Allen, et al., 2006; Allen, et al., 2007; Bosma et al., 2009; Reynolds, Bygrave, Autio, Cox, & Hay, 2003). Related terms used in the entrepreneurial literature are "push" vs. "pull" factors, where "push" factors force people to become entrepreneurs, while "pull" factors attract them to entrepreneurship (Orhan & Scott, 2001). Women in poor countries, it seems, are more influenced by "push" than by "pull" factors. In other words, when women are forced to by economic conditions they can be much more entrepreneurial; which is to say, women’s entrepreneurship is as much a result of circumstances as it is a result of innate tendencies.
\n\t\t\tThis conclusion times the question of gender differences in entrepreneurship to the larger question of the origins of gender differences in human behavior. As noted by Eagly and Wood (1999), the origins of sex differences in human behavior may lie mainly in evolved dispositions that differ by sex or mainly in the differing placement of women and men in the social structure. Thedifference between these two options is critical because if gender differences are the result of social forces such as socialization, cultural norms and gender roles and stereotypes, they can be assumed to be changeable (e.g., Deaux &LaFrance, 1998; Ruble & Martin, 1998; Spence & Buckner, 2000). But if they result from evolutionary forces (e.g., Buss, 2000; Fisher, 1999) then they are innate and fundamentally unchangeable.
\n\t\t\tThe discovery of cross-cultural variation in gender differences in entrepreneurship can be viewed as supporting the social structural (rather than evolutionary or biological) explanation for gender differences in entrepreneurship. Another finding that can support the social perspective, is similarity in entrepreneurship between men and women. Such similarity can be explained by Schneider\'s (1987) Attraction Selection Attrition (ASA) model. Schneider’s basic proposition as that the processes of attraction to organizations, selection into organizations, and attrition from organizations produce over time a restriction of range on individual differences. Consequently, people who remain in an organization over time come to be rather similar. This has been referred to as the homogeneity hypothesis (e.g., Denton, 1999; Schneider, Smith, Taylor, & Fleenor, 1998). Based on Schneider\'s model, it can be expected that men and women who are attracted to an entrepreneurial career, who go through the selection process that screens out those who don\'t have the needed attitudes and personality, and who acquire the skills and experience needed for running a business, end up being rather similar, whether they are male or female.
\n\t\t\tThis proposition was examined by Pines and Schwartz (2008) in three studies that addressed gender differences in entrepreneurship. Each study focused on a different subject population and different entrepreneurial activity. The first was a national telephone survey of adults. Its results showed few gender differences in entrepreneurial values. However, women described themselves as valuing job security more than men and men described themselves as more confident and as loving challenges more than women.
\n\t\t\tThe second study involved management students who responded to a self-report questionnaire. Its results showed large gender differences in the willingness to start a business. About twice as many male than female students either had a business or intended to start one. Male students viewed themselves as more suitable to be a business owner, expressed greater preference for being one, and described themselves as being more entrepreneurial.
\n\t\t\tThese findings can be explained by women’s tendency to perceive themselves in a less favorable light as entrepreneurs than men (Langowitz & Minniti\'s, 2007). However, all these gender differences almost disappeared in the group of the management students who either owned a business or intended to start a business.
\n\t\t\tThe third study involved interviews with small business owners. Its results showed far more similarities than differences between male and female business owners, including similarities in demographic characteristics, work and businesses characteristics and reasons for starting a business.
\n\t\t\tCombined, the three studies can be interpreted as supporting Schneider\'s (1987) ASA model and the social perspective on the origin of gender differences in the case of men and women entrepreneurs. The current chapter extends the discussion of the gender gapinentrepreneurship to a comparison between business and social entrepreneurs.
\n\t\t\tSocial entrepreneurship has been growing fast in recent decades with the growing number of third-sector organizations, the segment of the economy that is neither public nor business. The trend in many countries of adopting the ideology of diminishing government involvement in the economy and in society has made it increasingly more difficult for welfare states to answer social needs and claims, and has broadened their reliance on the activities of the third-sector nonprofit organizations (NPOs) (Sharir & Lerner, 2006). As a result there is growing interest in the activities of social entrepreneurs in different countries and contexts.Social entrepreneurs have been described as “People who realize where there is an opportunity to satisfy some unmet need that the state welfare system will not or cannot meet and who gather the necessary resources and use these to ‘make a difference ’” (Thompson, Alvy & Lees 2000). As such, social entrepreneurs are perceived as change agents who create and sustain social value without being limited by the resources at hand (Stevenson &Jarrilo, 1991).Like business entrepreneurs, social entrepreneurs establish new organizations, develop and implement innovative programs, and organize or distribute new services. Even though they are differently motivated, the challenges and problems facing social entrepreneurs during the initiation, establishment and institutionalization of their ventures resemble those faced by business entrepreneurs (Yitzhaki, Lerner & Sharir, 2008). However, their activity is valued by their ability to maximize social rather than economic returns (Sullivan Mort, Weerawardena & Carnegie, 2003).
\n\t\t\tIt appears that the main difference between entrepreneurs operating in the business sector and those operating in the not-for profit sector is in the latter\'s sense of mission and service as opposed to the goal of profitability and financial gains that characterizes the former. A sense of mission and a commitment to service, as opposed to profit,also characterize women (e.g., Fisher, 1999; Helgesen, 1990; Henning &Jardim, 1978).Thus the gender gap in entrepreneurship can be expected to be smaller in social entrepreneurship as compared to business entrepreneurship. In other words, the rate of women in social entrepreneurship can be expected to be similar or even higher of themen.
\n\t\tThe results of a GEM 2009 study of gender differences in Social Entrepreneurial Activity (SEA) (Bosma&Levie, 2009) offer partial support for this proposition. These findings revealed that social enterprises were more likely to be started by men than by women, but the gender gap was not as big as the Total Entrepreneurial Activity (TEA) in business enterprises. These results are evident in Figure 2 below. Figure 2 presents men’s and women’s mean SEA and TEA entrepreneurial activity by type of economy based on GEM 2009 data.
\n\t\t\tMen’s and women’s mean entrepreneurial activity by type of entrepreneurship and type of economy.
It is clear from Figure 2 that the rate of Social Entrepreneurial Activity (SEA) of women was very similar across the three different categories of economic development, while the rates of men\'s SEA increased with economic development (lowest in Factor driven economies and highest in Innovation driven economies).
\n\t\t\tA further examination of the gender gap in entrepreneurial activity is suggested in Table 1, which compares men and women’s early stage SEA and TEA in the three types of economies, based on GEM 2009 data.
\n\t\t\t\n\t\t\t\t\t\t | SEA | \n\t\t\t\t\t\tTEA | \n\t\t\t\t\t||||||
Factor Driven Economies | \n\t\t\t\t\t||||||||
\n\t\t\t\t\t\t | 1 | \n\t\t\t\t\t\t2 | \n\t\t\t\t\t\t3 | \n\t\t\t\t\t\t4 | \n\t\t\t\t\t\t5 | \n\t\t\t\t\t\t6 | \n\t\t\t\t\t\t7 | \n\t\t\t\t\t\t8 | \n\t\t\t\t\t
Female | \n\t\t\t\t\t\tMale | \n\t\t\t\t\t\tDifference= Male-Female | \n\t\t\t\t\t\tRelative Difference= Difference/ Male | \n\t\t\t\t\t\tFemale | \n\t\t\t\t\t\tMale | \n\t\t\t\t\t\tDifference= Male-Female | \n\t\t\t\t\t\tRelative Difference= Difference/ Male | \n\t\t\t\t\t|
Average | \n\t\t\t\t\t\t0.6 | \n\t\t\t\t\t\t0.8 | \n\t\t\t\t\t\t0.2 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t14.4 | \n\t\t\t\t\t\t20.9 | \n\t\t\t\t\t\t6.6 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t
Std. | \n\t\t\t\t\t\t0.6 | \n\t\t\t\t\t\t0.7 | \n\t\t\t\t\t\t0.2 | \n\t\t\t\t\t\t0.5 | \n\t\t\t\t\t\t9.2 | \n\t\t\t\t\t\t8.4 | \n\t\t\t\t\t\t4.1 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Efficiency Driven Economies | \n\t\t\t\t\t||||||||
Average | \n\t\t\t\t\t\t0.7 | \n\t\t\t\t\t\t1.1 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t8.9 | \n\t\t\t\t\t\t13.5 | \n\t\t\t\t\t\t4.6 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t
Std. | \n\t\t\t\t\t\t0.6 | \n\t\t\t\t\t\t0.6 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t5.7 | \n\t\t\t\t\t\t6.2 | \n\t\t\t\t\t\t3.5 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Innovation Driven Economies | \n\t\t\t\t\t||||||||
Average | \n\t\t\t\t\t\t0.7 | \n\t\t\t\t\t\t1.2 | \n\t\t\t\t\t\t0.5 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t4.2 | \n\t\t\t\t\t\t8.1 | \n\t\t\t\t\t\t4.0 | \n\t\t\t\t\t\t0.5 | \n\t\t\t\t\t
Std. | \n\t\t\t\t\t\t0.6 | \n\t\t\t\t\t\t0.9 | \n\t\t\t\t\t\t0.8 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t1.9 | \n\t\t\t\t\t\t3.5 | \n\t\t\t\t\t\t2.6 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Comparison between Social Entrepreneurial Activity (SEA) and Total Entrepreneurial Activity (SEA), by Type of economy and by Gender (Percentages).
\n\t\t\t\tTable 1 presents the percent of women’s SEA (column 1) and TEA (column 5), the percent of men’s SEA (column 2) and TEA (column 6) the difference between women’s and men’s SEA (column 3) and between women’s and men’s TEA (column 7), and the relative difference in men’s entrepreneurial activity (the percent difference divided by the percent of employed men) for SEA (column 4) and TEA (column 8).
\n\t\t\t\n\t\t\t\tTable 1 and Figure 2 show very clearly the differences between SEA and TEA, between men and women and among the three types of economy. They demonstrate the following:
\n\t\t\tBusiness related entrepreneurship is much more prevalent than social entrepreneurship
Men are more entrepreneurial than women
There are different entrepreneurial rates in Factor, Efficiency and Innovation driven economies
The gender differences in entrepreneurial activity are smaller in SEA than in TEA.
Women’s SEA in the three types of economy is much more similar than women\'s TEA.
\n\t\t\t\tTable 2 and Figure 3 present the relative difference (i.e., Male-Female/Male) between men’s and women’s Early-Stage SEA and TEA, in Factor, Efficiency and Innovation Driven economies.
\n\t\t\t\n\t\t\t\t\t\t | SEA | \n\t\t\t\t\t\tTEA | \n\t\t\t\t\t||
1 | \n\t\t\t\t\t\t2 | \n\t\t\t\t\t\t3 | \n\t\t\t\t\t\t4 | \n\t\t\t\t\t|
Average | \n\t\t\t\t\t\tSD | \n\t\t\t\t\t\tAverage | \n\t\t\t\t\t\tSD | \n\t\t\t\t\t|
Factor Driven Economies | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t0.5 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Efficiency Driven Economies | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Innovation Driven Economies | \n\t\t\t\t\t\t0.4 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t\t0.5 | \n\t\t\t\t\t\t0.3 | \n\t\t\t\t\t
Comparison of the Relative Gender Difference*in SEA and TEAby Type of Economy: Averages and Standard Deviations.
*Relative Difference= (Male-Female)/Male
Only the relative rates (means and SDs) in the entrepreneurial activity of the three types of economies are presented in Table 2: in column 1 the mean for SEA and in column 3 for TEA, in column 2 the SD for SEA and in column 4 for TEA.
\n\t\t\tComparison of the Relative Gender Difference*in SEA and TEAby Type of Economy.
Once again Table 2 and figure 3 make the relative differences between SEA and TEA, between men and women and among the three types of economy abundantly clear:
\n\t\t\tWhen the comparison made in relative, rather than in absolute terms, the gender differences in SEA and in TEA become smaller.
Nevertheless, there are still relative differences between SEA and TEA, with smaller gender differences found in SEA in all three types of economy.
The relative gender difference is somewhat smaller in the less developed Factor and Efficiency driven economies and higher in more developed Innovation driven economies, but still, the relative difference is smaller in SEA than in TEA.
Looking at the Standard Deviations of the relative gender differences, it seems that the variability among the countries in each of the types of economy is higher in SEA than in TEA. This variability may be a reflection of the fact that this type of entrepreneurial activity is often the result of specific social and economic conditions. The higher the level of the economy, the more SEA becomes established, and probably becomes an integral part of the economic life, which causes the cross-cultural variability to diminish. Thus, the greatest variability in SEA is found in the Factor driven economies, and the lowest, in Innovation driven economies.
However, the variability of relative gender differences in TEA is very similar in the three types of economy, with no relationship to their economic level. It seems that TEA, which represents all different types of business activities, is part of the general economic fabric of countries.
The overall lower level of SEA, when compared to TEA, may be related to several reasons, paramount among them is the fact that social ventures tend to have lower levels of turnover than business related ventures, where as turnover is part and parcel of a competitive market.
\n\t\t\t\tOne possible explanation for thefinding that SEA is highest in more developed (Innovation Driven) economies and lowest in the least developed (Factor driven) economies, is that individuals in wealthier countries, having satisfied their own basic needs, may be more likely to turn to the needs of others. In other words, the opportunity cost of social entrepreneurship may be higher in developing countries(Bosma & Levie, 2009). This is unfortunate, because social and environmental problems are often more prevalent in developing countries.
\n\t\t\t\tExamined through the lenses of opportunity vs. necessity entrepreneurship, it seems that necessity social entrepreneurship is comprised of people who were expelled from the job market and are looking for ways to get back to it. Raising awareness to social issues around them, they are able to raise financial as well as other resources. Opportunity social entrepreneurship, on the other hand, originates in worldwide trends including the shrinking role of governments in the provision of social services, the privatization of public services, and the rise in standard of living which increases awareness of the need for further services. In opportunity entrepreneurship there is a fundamental difference between less developed countries where the focus is on survival and more developed countries where ventures may be related to the standard and quality of life, such as environmental and conservation issues.
\n\t\t\t\tAnother explanation for thefinding that SEA is higher in more developed economies and lower in the less developed economies(suggested by Bosma & Levie, 2009)is that the definitions of a traditional business enterprise and a social enterprise may overlap in developing countries, whereas they may be more distinct in developed countries. William Baumol has suggested that the level of entrepreneurship is the same across countries, but that entrepreneurship is manifested in different ways depending on the institutional context (Baumol, 1990, 1993). In wealthier countries, social entrepreneurship may replace business entrepreneurship, at least to some extent. SEA rates are much lower than TEA rates in almost all countries. SEA as a proportion of SEA plus TEA, but not SEA itself, tends to increase with GDP per capita, providing partial support for Baumol’s hypothesis of substitution of one form of entrepreneurship for another.
\n\t\t\t\tIn some countries, the level of overlap of social and business entrepreneurship is quite significant, such as Peru (2.5%), Colombia (2.8%), Venezuela (1.7%) and Jamaica (2.0%).This finding is important, as it indicates that “social” and “business” entrepreneurship categories may be blurred. Earlier reported TEA levels in these countries may have included a small but still considerable level of social entrepreneurs who were running “social businesses” (Allen et al., 2007, p. 11).
\n\t\t\tExamination of entrepreneurial behavior around the globe yields a clear picture of a gender gap. Overall, men are more likely to be involved in entrepreneurial activity than women. This gender gap is evident in both early stage entrepreneurial participation and established business ownership, and it exists irrespective of the economic level of the country, from the lowest Factor driven economies to the highest Innovation driven economies.
\n\t\t\t\tThe gender gap is more pronounced in high-income economies than in either low on middle-income economies. As noted in the introduction, these differences can be explained as reflecting the difference between "necessity" and "opportunity" entrepreneurship, (Allen et al., 2006; Allen, et al., 2007; Bosma & Levie., 2009; Reynolds et al., 2003;) or "push" vs. "pull" factors (Orhan & Scott, 2001).
\n\t\t\t\tWhile men are more likely to be involved in entrepreneurial activity than women overall, there are several interesting exceptions. In Japan, Brazil, Peru, and Thailand, for example, the entrepreneurial activities of women equal or exceed those of men (Allen et al., 2007, p.13). The gender differences arealso small inLatin Americaand Caribbean countries. These findings may be explained in part by the differences in choices for women across these country groups in which labor markets, institutional structures, and cultural norms provide a varying array of incentives to women’s entrepreneurial activity.
\n\t\t\t\tWhen examining the gender gap in social entrepreneurship, it seems that while the gender gap still exists (there are more men than women social entrepreneurs), the difference is smaller. Furthermore, there is no difference in the rate of women social entrepreneurs in the different types of economies. The consistent gender difference can be related to the findings reported by Pines and Schwartz (2008) of women’s greater reluctance to start a business, self-perception as being less suitable to be a business owner and less entrepreneurial than men; to Langowitz and Minniti\'s, 2007 finding of women’s tendency to perceive themselves as less entrepreneurial, and to GEM data showing that men are more likely than women to say that they have the knowledge, skill and experience required to start a new business, while women are more likely to say that fear of failure would prevent them from starting a venture (Allen et Al., 2007).
\n\t\t\t\tThe fact that a gender gap, albeit smaller than the gender gap in TEA, still exists in SEA is significant and worrisome, because as noted earlier, social entrepreneurship seems to be an area to which women are expected to be attracted and in which they are expected to have a relative advantage.
\n\t\t\t\tIn our global village, public companies that are traded in the stock market in developed countries (especially in those that are characterized as Innovation driven, but gradually also in those defined as Efficiency driven) have to publicize in their balance sheets their contribution to the community. This fact, combined with the fact that a contribution to the community has become a trade mark assent, increases the prevalence of social ventures and encourages business leaders and public service leaders to initiate various social ventures. This type of social entrepreneurship is lead by high ranking public and private officials, who tend to be male, especially in the economic areas that tend to have money for ventures.
\n\t\t\t\tWomen in high ranking positions, however, tend to have greater difficulty taking on additional roles, since many of them still carry the main responsibility for household and child care. In addition, the economic crisis in recent years has challenges social ventures, that have to deal with budget cuts and function like traditional businesses that have to operate withinstrict budgetary limitations and at times even create revenues. The result of this trend is that the skills needed for managing social ventures are similar to those needed for managing regular ventures, and as noted earlier there is a big gender gapin those skills.
\n\t\t\t\tThis is critical because as social entrepreneurship is growing (especially in Innovation driven economies), there is a growing danger that women entrepreneurs will again find themselves lagging behind, and given the lower turnover rates in SEA, the danger is that this lag will remain.
\n\t\t\tThe findings related to the gender gap have theoretical implications for gender theory and research and for entrepreneurship theory and research. They also have important practical implications. A study by Wilson, Kickul and Marlin (2007) demonstrated a relationship between self-efficacy and career intentions and showed that the effects of entrepreneurship education in MBA programs on entrepreneurial self-efficacy was stronger for women than for men. The implications for the importance of entrepreneurial education and training for women are obvious.
\n\t\t\tOther implications involve the development of social networks for women entrepreneurs that will support and empower them through all the stages of establishing their venture – be it a business or a social venture.
\n\t\t\tThe findings related to the difference between SEA and TEA have important implications for business owners and managers and for policy makers as contribution to the community and social responsibility is fast becoming an important strategic asset of companies and part of the creation of value for business owners.
\n\t\tRisk is defined in terms of uncertain events which may have positive or negative effect on the project objectives. Risks include circumstances or situations, the existence or occurrence of which, in all reasonable foresight, results in an adverse impact on any aspect of the implementation of the project. Various definitions of risks are presented in Table 1.
Sl. no | Source | Definition |
---|---|---|
1 | Project Management Institute [10] | An uncertain event or a condition that if it occurs has a positive or negative effect on project objectives |
2 | Institute of Risk Management [7] | The combination of a probability of an event and its consequences |
3 | Association of Project Management Body of Knowledge [1] | Project Risk is an uncertain event or condition, that, if it occurs, has a positive/negative effect on project objectives. A risk has a cause and if it occurs, a consequence. |
4 | British Standard BS IEC 62198:2001 | Combination of probability of an event occurring and its consequences on project objectives |
5 | A probability or threat of damage, injury, liability, loss, or any other negative occurrence that is caused by external or internal vulnerabilities and that may be avoided through preemptive action. | |
6 | Fundamentals of Risk Management [9] | “A chance or possibility of danger, loss, injury or other adverse consequences” and the definition of risk is “exposed to danger.” However, taking risk can also result in positive outcome. A third possibility is risk related to uncertainty of outcome. |
7 | Adams [8] | Risk is the probability “that a particular adverse event occurs during a stated period of time, or results from a particular challenge.” |
8 | Philosophy of Risk [3] | Risk has been interpreted as Risk = hazard × exposure where Hazard is defined as the way in which a thing or situation can cause harm and exposure as the extent to which the likely recipient of the harm can be influenced by the hazard |
Definitions of risk.
Classification and definition of risks is furnished in Table 2.
Risk | Definitions |
---|---|
Pure risk | A risk which has chance of loss or no loss. Example. A building may get affected by fire or not. These are best covered by insurance |
Speculative risk | Involves chance of gain/loss. Example. A builder may take a risk by promoting a new venture depending upon the prevailing conditions in the vicinity of proposed project, but it may bring him gain/loss. |
Fundamental risk | These are external to a project and which, if they materialise, would be on a large scale and cannot be prevented. These risks are associated with major natural, economic, political or social changes and generate large scale losses. Examples are: Floods, earthquakes, fluctuation of exchange rates, etc. This risk may or may not be insurable. |
Particular risk | These are project specific risks and are identified within the parameters of a project and can be controlled during the implementation of a project, e.g. quality risks, safety risks, legal risks, etc. |
Classification of risks and their definitions.
Source: Project Risk Management, D Van Well-Stam et al., Kogan Page Publications, 2003.
Risk management is a planned and a structured process aimed at helping the project team make the right decision at the right time to identify, classify, quantify the risks and then to manage and control them. The aim is to ensure the best value for the project in terms of cost, time and quality by balancing the input to manage the risks with the benefits from such act. It is just a cost benefit analysis.
Risk management is a continuous process which is to be implemented in any project from inception to completion. However, in order to realise its full potential, risk management should be implemented at the earliest stage of a project, i.e. feasibility design and construction. Risk is an uncertain event or condition that, if occurs, has a positive or negative effect on a project’s objectives. Components of risk are the probability of the occurrence of an event and the impact of the occurrence of that event. There are many sources of uncertainty in construction projects, which include the performance of construction parties, resources availability, contractual relations, etc. because of which, construction projects face problems that cause delay in the project completion time. Success of a project is measured by its ability to get completed within the budgeted cost and time. These goals are interrelated where each parameter has an impact when other parameters get affected. An accurate cost estimating and scheduling should be performed in order to meet the overall budget and time deadline of a project. As such, risk management becomes an integral part of construction management which intends to identify and manage potential and unforeseen risks during the period of implementation of the project; hence, the necessity of risk management [5].
Definitions of risk management are presented in Table 3.
Sl. no | Definition of risk management |
---|---|
1 | https://en.wikipedia.org/wiki/Risk_management Risk Management is the identification, evaluation, and prioritization of risks followed by coordinated and an economical application of resources to minimise, monitor, and control the probability or impact of unfortunate events [6] or to maximize the realization of opportunities. |
2 | Nadeem Ehsan et al., 2012 Risk Management in a project involves the identification of influencing factors which could have negative impact on the the cost, schedule and quality objectives of the project and quantification of impact of potential risk and implementation of mitigation measures to minimise the potential impact of risk |
3 | Bahamid et al., 2017 Risk Management is defined as organized and comprehensive method tailored towards “ organizing”, “identifying” and “responding” to risk factors in order to achieve project goals. |
4 | www.stakeholdermap.com/risk/risk-management-construction Risk Management in construction consists of planning, monitoring and implemeting the measures needed to prevent exposure to risk. To do this, it is necessary to identify the hazards, assess the extent of risks, provision of measures to control the risks and to manage residual risk |
5 | www.vp-projects.kau.edu.sa Risk management is a systematic method of identifying, analysing, treating and monitoring the risks that are all involved in any activity/ process and is a systematic method that minimises the risks which may be an impediment to attainment of objectives |
6 | Cleden [4] Risk is exposure to the consequences of uncertainty. In a project context, it is the chance of something happening that will have an impact upon objectives. It includes the possibility of loss or gain, or variation from a desired or planned outcome, as a consequence of the uncertainty associated with following a particular course of action. Risk thus has two elements: the likelihood or probability of something happening, and the consequences or impacts if it does. |
7 | Project Risk Management, D Vanwell-Stam, Kogan Page India publications, 2004 The entire set of activities and measures that are aimed at dealing with risks in order to maintain control over a project |
8 | www.gpmfirst.com/risk.management-construction Risk Management is a means of dealing with uncertainty – identifying sources of uncertainty and the risks associated with them, and then managing those risks such that negative outcomes are minimized (or avoided altogether), and any positive outcomes are capitalised upon. |
9 | Risk Management in Construction Projects by NICMAR [2] Risk Management is the planned and structured process of bringing the project team make the right decisions at the right time by identifying, classifying and quantifying the risks and then for managing and controlling them, |
10 | Dr Patrick et al., 2006 retrieved from feaweb.aub.edu.lb Risk Management is “a systematic way of looking at areas of risk and consciously determining how each should be treated. It is a management tool that aims at identifying sources of risk and uncertainty, determining their impact, and developing appropriate management responses” |
11 | http://economictimes.indiatimes.com/definition/risk-management Risk Management refers to the practice of identifying potential risks in advance, analysing them and taking precautionary steps to reduce/curb the risk. |
Definitions of risk management.
Construction projects are extremely complex and fraught with uncertainty. Risk and uncertainty can potentially have damaging consequences for the construction projects. Hence, risk analysis and risk management has come to be a major feature of the project management in construction projects. Construction projects are unique, inherently complex, dynamic and risks emanate from multiple sources. The interests of individuals and organisations who are actively involved in a construction project may be positively or negatively affected depending upon the course which a project takes from concept to completion. Multiple stakeholders with varied experience and skills have different expectations and interests in the project which creates problems for smooth execution of the project. Risk management is a concept which many construction companies have never thought of, despite the fact that, the risks can be better controlled if they are identified in the first instance and a well-structured mitigation mechanism is in place. Risk management helps the key project participants namely the client, contractor/developer, consultant and supplier to meet their commitments and to minimise negative impacts on construction project performance in relation to cost, time and quality objectives. Success of a construction project is associated with three aspects of time, cost and quality outcomes.
Successful commissioning of any project, necessarily calls for sound planning on various fronts and getting the project executed in a competent manner. An organisation executing a project would have to reckon with the various risks to which the project may be exposed to and these have to be managed effectively. The construction industry, being vulnerable is potentially more prone to risks and uncertainties than any other industry. The process of taking a project from the conceptual stage to its final completion and putting into operation is quite complex and entails painstaking process at every stage. Construction industry is highly fragmented in that each of its participants—designers, constructors, planners, suppliers, etc. can be highly skilled in their own area and yet there is no clear perspective as to how all the players can come on the same platform for achieving the objectives.
Construction industry is also dependent on quality of its people rather than technology. The increasing technological complexity and more complex interdependencies and perpetual shortage of resources namely materials, equipment, technical/supervisory staff, finance, etc. calls for a comprehensive risk management framework which will insulate the risks of the participants to a great extent.
Given the nature of the construction sector, risk management is an extremely important process. It is most widely used in such of those projects where susceptibility to risks is very high and is characterised by planning, monitoring and controlling the risks in a more structured and formal manner. The most efficient method of identifying the risks is to study a project of similar size which was executed in the recent past which gives an insight into the failure/success of the project. In order to be sure that the project objectives are met, the portfolio of risks associated with all stakeholders should be considered across the project life cycle (PLC). In later stages, risk management when applied systemically helps to control those critical elements which can negatively impact project performance. Keeping track of identified threats will result in early warnings to the project manager if any of the objectives, time, cost or quality, are not being met. There are a plethora of risks which are to be identified in the construction industry and which can be faced in each construction project at any point of time regardless of its size and scope. Frequent change in scope is one of the major risks in any construction project. If revised scope or design is implemented, it can have effect in the form of additional resources of time and cost. Early project completion may be as troublesome as delays in a schedule. Completing too early which may be a result of insufficient planning or design problems can lead to a low quality of final product and increased overall cost. Thus it is important to keep a balance in the concept of time–cost-quality trade-off, which more widely is becoming an important issue for the construction sector. Risks may vary depending on the project scope, types and are to be treated accordingly.
Risk management process is shown in Figure 1.
Risk management process.
Risk identification, the first step in the risk management process is usually informal and is performed in various ways, depending on the organisation and the project team. Identification of risks relies mostly on past experience and study of similar executed projects. This being a preliminary stage, a combination of tools and techniques may be used to identify the risks in any project. Here are many methods that fit specific types of challenges and projects especially at identification stage. Risks and threats may be difficult to eliminate, but when they have been identified, it becomes easy to take actions and have control over them. Risk management will be more effective if the source of the risks have been identified and allocated before any problems occur. The main purpose of risk management is that the stakeholders should prepare for potential problems that can occur unexpectedly during the course of a project. Risk management will not only facilitate anticipating problems in advance, but also preparing oneself for the potential problems that may occur unexpectedly. Handling potential threats is not only a way to minimise the losses within a project, but also a way to transform risks into opportunities which can lead to economic and financial profitability. The purpose of identifying risks is to obtain a list of risks which has got the potential to have a cascading effect on the progress of project and different techniques are applied for managing/mitigating the same. In order to find all potential risks which might impact a specific project, different techniques are applied. The project team should use a method they are familiar with so that the exercise will be effective. Effective identification of risks is the first step to a successful risk management.
Parameter | Methodology |
---|---|
Documentation reviews | A structured review of project documentation, study of history of execution of similar projects and quality of plans as well as the consistency between those plans and project requirements/ assumptions would be an indicator of risks in the project |
Information gathering techniques |
|
Identification of risks: tools and techniques.
Tools and techniques for risk identification are presented in Table 4.
Various risks that confront a construction industry are not limited to and include financial, economical, political, legal environmental, technical, contractual, planning/scheduling, design, quality operational labour, stakeholder safety and security, logistics and construction.
Risk assessment is the second stage in the risk management process where collated data is analysed for potential risks. Risk assessment is described as short listing of risks starting from low impact highest impact on the project, out of all threats mentioned in the identification phase. Risk assessment consists of qualitative risk assessment and qualitative risk assessment.
This involves registration of identified risks in a formal manner. A risk register is used for formalising this process which is not limited to the following
Classification and reference
Description of the risk
Relationship of the risk to other risks
Potential impact
Likelihood of occurrence
Risk response/mitigation strategy
Allocation of risks to stakeholders.
Classification is an aid to identifying the source of risk. Examples are furnished below (Table 5).
Risk | Classification |
---|---|
Environmental | Site conditions, health and safety issues at site |
Contractual | Client, contractor, sub-contractor, etc. |
Design | Planning permission, preliminary and detailed design, etc. |
Classification of risk and its reference.
Referencing refers to unique reference number given for each of the identified risks.
This involves giving a brief description of the risk. The description must be unique in order to avoid confusion with similar risks in the risk management process.
In any project, it is extremely rare that any activity is independent of activities which occurs concurrently or consequentially and this will always be the case for risks also for successful implementation of risk management,
Impact of risk on a project is measured in terms of cost and quality. Since this assessment is done at an early stage of the project, information may not be available to accurately predict the impact of risk on the project. At this stage, the risk is classified suitably and accordingly high impact risks are to be given more fundamental consideration than that of medium/low/negligible risks by ranking the impact of risks on a scale of 1 (low) to 10 (high).
Based on intuition and experience, the likelihood of occurrence (P) of risks and its impact (I) is to be given on a suitable scale ex. 1–10 (1 refers to low probability and 10 refers to high probability). The risk factor for each of the identified risks is calculated by the formula RF = P + I – (P*I) (where the values of P and I are brought on a scale of 0–1 by dividing the values with 10).
This action is taken to reduce, eradicate or to avoid the identified risks. The most common among the risk mitigation methods are risk avoidance, risk transfer, risk reduction and risk sharing. Based on the competency in handling the risks, the identified risks are allocated to respective stakeholders who will be responsible for addressing those risks.
This risk assessment is normally taken for such of those risks which are classified are high/critical/unmanageable as per the qualitative risk assessment. The purpose of this assessment is to find the amount of contingency to be inserted in the estimate for the risks undergoing this assessment so that in case the risks occur, there would be sufficient budgeted amount to overcome the extra expenditure.
Quantitative methods need a lot of analysis to be performed. This analysis should be weighed against the effort and outcomes from the chosen method. Complex and larger projects require more in depth analysis as compared to projects which are small in size. The purpose of carrying out quantitative analysis is to estimate the impact of a risk in a project in terms of scope, time, cost and quality. The suitability of this analysis is more for medium and large projects as these projects have more complex risks as compared to smaller projects.
The detailed quantitative assessment of risk is the one which is identified as risk analysis. In undertaking quantitative assessment, the potential impact of risks in terms of time, cost and quality is quantified. While preparing the estimate, it is generally split into two distinct elements, namely (1) base estimate of those items which are known and a degree of certainty exists and (2) contingency allowance for all uncertain elements of a project. Historically, contingencies have been calculated on a rule of thumb basis varying from 5 to 10% on risk-free base estimate. By adopting risk management approach, contingencies are set up to reflect realistically the risks that are inherent in the project. When used correctly, contingency allowances ensure that expenditure against risks is controlled. The methods for quantitative risk assessment are described below.
The Monte Carlo method is based on statistics which are used in a simulation to assess the risks. This is a statistical technique whereby randomly generated data is used within predetermined parameters and produce realistic project outcomes. The overall project outcome is predicted by randomly simulating a combination of values for each risk and repeating the calculation a number of times and all outcomes are recorded. After completing the simulations required, the average is drawn from all of the outcomes, which will constitute the forecast for the risk. It is important to realise that parameters and appropriate distribution within which the random data is simulated is itself a series of subjective inputs. Accurate and realistic project outcomes will not be generated if inaccurate parameters are set. Different scenarios are generated by simulation are used for forecasting, estimations and risk analysis. Data from already executed projects is normally collected for simulation purpose. The data for variables is presented in terms of pessimistic, most likely and optimistic scenarios depending upon the risks encountered, i.e. pessimistic value means lot of risks and optimistic value means least risks. The result from this method is a probability of a risk to occur is often expressed as percentage. The most common way of performing the Monte Carlo simulation is to use the program Risk Simulator Palisade Software, where more efficient simulations can be performed.
This is a method used to demonstrate the variable impact on the whole caused by a change in one or more element or risk. It is used to test the robustness of choices made where rankings have been established, particularly when those rankings are considered to be marginal. It can identify the point where variation in one parameter will affect decision making. A typical method for carrying out sensitivity analysis is by use of a spider diagram which shows the areas in the project which are the most critical and sensitive The higher the level of uncertainty a specific risk has, the more sensitive it is concerning the objectives. In other words, the risk events which are the most critical to the project are the most sensitive and appropriate action needs to be taken (Heldman, 2005). Disadvantage with this analysis is that the variables are considered separately, which means that there is no connection between them (Perry, 1986 and Smith et al.. 2006). The method requires a project model in order to be analysed with computer software. According to Smith et al. (2006), the project stands to be benefited if the analysis is carried out in the initial phases of a project in order to focus on critical areas during the execution of the project.
Decision tree analysis is commonly used when there is sequence of interrelated possible courses of action and future outcomes in terms of time and cost. This method of analysis is commonly used when certain risks have an exceptionally high impact on the two main project objectives, i.e. time and cost. Where probabilities and values of potential outcomes are known or can be estimated, they are used for quantification to provide a more informed basis for decision making. Each decision process expected value (EV) which forms the basis for decision making process. A sample problem on decision tree is given in Table 6.
Method | Design time (months) | Construction period in months and probabilities | Total time (construction period + design time) (months) |
---|---|---|---|
Construction management | 2 | 15 (0.6) = 9 18(0.4) = 7.2 Total 16.2 months | 18.2 |
Design and construct | 3 | 12(0.3) = 3.6 Total = 13.8 months 14(0.5) = 7 16(0.2) = 3.2 | 16.8 |
Traditional method | 8 | 10(0.3) = 3 12(0.7) = 8.4 Total 11.4 months | 19.4 |
Problem on decision tree.
This can be depicted in the form of decision trees and the expected value (EV) in terms of time for each of the three scenarios is furnished. The least of this i.e. construction management will be preferred since it consumes less time.
Multiple estimating using risk analysis (MERA) attempts to provide a range of estimates. These are presented as risk free base estimate, average risk estimate (ARE) and maximum likely risk estimate (MLRE). ARE is the sum of risk free base estimate and average risk allowance and MLRE is the sum of ARE and maximum risk allowance.
MERA attempts to finds a level i.e. the estimate that has a 50% chance of being successful. This is known as average risk estimate (ARE) which is found out by multiplying the average allowance with average probability of occurrence. Maximum risk allowance is found out by multiplying the maximum allowance with maximum probability of occurrence of that risk. This is added to ARE to get MLRE which is the estimate that has 90% chance of not being exceeded.
The output of quantitative risk assessment is presented in Table 7.
Parameter | Outputs |
---|---|
Probabilistic Analysis of project | Estimates are made of potential project schedule and cost outcomes listing the possible completion dates and costs with their confidence levels. This output is described as cumulative distribution and also risk tolerances for permitting quantification of cost and time contingency reserves. Contingency reserves bring the risk of overshooting stated project objectives to acceptable levels to the organisation |
Prioritised list of quantified risks | This list includes risks that pose the greatest threat or present the greatest opportunity in a project. These risks also have the greatest impact on cost contingency |
Trends in quantitative risk analysis results | As the risk analysis is repeated, a trend becomes apparent that leads to conclusions affecting risk responses, Historical information on project’s schedule, cost, quality and performance reflects new insights gained through quantitative process. This takes the form of quantitative risk analysis report. |
Quantitative risk assessment: outputs.
The risk response will be in the form of mitigation by adopting necessary strategies in respect of positive and negative risks which is furnished below (Tables 8–10).
Risk mitigation strategy | Description |
---|---|
Risk avoidance | Risk avoidance involves changing the project management plan to eliminate the threat entirely. The project manager may isolate the project objectives that are in jeopardy. Examples: (a) Extending the schedule of an activity; (b) Changing the strategy or reducing the scope of work; (c) Changes in clauses of contract regarding abnormal price rise of any material or dealing with extra quantum of work. |
Risk transfer | Risk transfer requires shifting some or all of the negative impact of a threat along with ownership of the response to a third party. Examples are
|
Risk reduction | Risk reduction implies reduction in the probability and consequence of an adverse risk event to be within acceptable threshold limits. Conducting detailed tests or choosing a more stable supplier are some examples. Risk reduction is adopted where the resultant increase in costs is less than the potential loss that could be caused by the risk being mitigated. Examples are:
|
Risk acceptance | This strategy is adopted when it is not possible to eliminate all risks from a project. This strategy indicated that the project team had decided not to change the project management plan or is unable to identify any other suitable response strategy. This requires no action except to document the strategy leaving the project team to deal with risks as they occur |
Strategies for mitigating negative risks.
Risk mitigation strategy | Description |
---|---|
Exploit | This strategy is selected for risks with positive impacts where the organisation wishes to ensure that the opportunity is realised. This strategy seeks to eliminate the uncertainty associated with a particular risk by ensuring that the opportunity is exploited. Examples are assigning the most talented resources of the organisation to the project to reduce the time for completion or providing at a lower cost than originally planned |
Share | Sharing a positive risk involves allocating some or all of the ownership of the opportunity to a third party capable of capturing the opportunity for the benefit of the project. Risk sharing, joint ventures, etc. are examples of this strategy |
Enhance | This strategy is used to enhance the positive impact of an opportunity. Identifying and maximising key drivers of risks may increase their probability of occurrence. Examples are adding more resources to an activity for completing it before scheduled time |
Accept | Accepting an opportunity means willing to take advantage if it comes along, but not pursuing it actively. |
Contingent response strategies | Some responses are designed for implementation only if certain events occur. It is appropriate for the project team to prepare a contingency response plan that will be executed under certain predefined conditions if there will be sufficient warning to implement the plan |
Expert judgement | Expert judgement is from knowledgeable individuals pertaining to the actions to be taken on a specific and a defined risk. |
Risk mitigation strategies for positive risks/opportunities.
Source: Project Risk Management, Van Well Stam et al. 2008.
Sl. No | Contents |
---|---|
1 | Identified risk. Their descriptions, areas of project affected, their causes and how they affect project objectives |
2 | Risk owners and assigned responsibilities |
3 | Prioritised list of project risks based on the outputs from quantitative analysis reports |
4 | Agreed upon response strategies and specific actions taken to implement the strategy |
5 | Triggers, symptoms and warning signs of risks occurrence |
6 | Fallback plans as a reaction to a risk that has occurred and primary response proved to be inadequate |
7 | Contingency reserves to be calculated based on quantitative risk analysis of the project and the threshold risk of the organisation. |
Contents of risk response: outputs.
Inputs to monitoring and controlling of risks are presented in Table 11.
Tools and Techniques for monitoring and controlling risks are furnished in Table 12.
Parameter | Inputs |
---|---|
Risk register | The key inputs to risk register includes identified risks and owners of risk, agreed upon risk responses, specific actions to be implemented, symptoms/warning signs of any risk, residual/secondary risks, list of low priority risks and contingency measures in terms of time/cost |
Risk management plan | The risk management plan should contain risk tolerances, assignment of manpower including bearer of risk, time and other resources to project risk management |
Work performance information | Work performance information related to various performance results is to be quantified in terms of deliverable status, schedule progress and costs incurred. |
Performance reports | Performance reports will be analysed for variance analysis, earned value data and forecasting the likely date of completion of project |
Parameter | Explanation |
---|---|
Risk reassessment | Monitoring and controlling of risks will result in identification of new risks, reassessment of current risks and closing of risks that are not a threat to project. Project risk assessment is to be performed regularly. The frequency and depth of assessment depends on how the project progresses relative to the objectives. |
Risk audits | The purpose of risk audits is to examine and document the effectiveness of risk responses in dealing with identified risks and their root causes as well as effectiveness of the risk management process meetings. A separate risk audit meeting may be held or it may be included in routine project review meetings. |
Earned value analysis | Variance analysis is done by comparing the planned results with actual. Trends in execution of a project are reviewed using performance information and based on earned value analysis, deviation from cost and schedule targets is determined which may indicate potential impact of threat/opportunities. |
Technical performance measurement | This measures technical accomplishments during project execution and will help in forecasting degree of success in achieving the project scope and it may expose the degree of technical risk faced by the project |
Reserve analysis | This compares the amount of contingency reserves available at any time to the amount of risk remaining in the project to determine whether the reserves are adequate |
Status meetings | Project risk management should be an agenda item at all status review meetings. The amount of time for any item will depend on risks that have been identified, their priority and difficulty of response. Frequent discussions about risk make it more likely that concerned stakeholders will identify risks and opportunities. |
To maximise the efficiency of risk management, the risk management process should be continuously developed during the entire project.
The benefits from risk management finally go to the stakeholders involved. A clear understanding and awareness of potential risks in the project contributes to better management of risks by suitable mitigation techniques. Another benefit of working with risk management is increased level of control over the whole project and more efficient problem solving processes which can be supported on a more genuine basis
Risk management when conducted effectively, reduce sudden surprises. The advantage with risk management is that the stakeholders are aware as to the risk that they have to bear among all the risks that have been identified in a project and can prepare themselves accordingly, should any eventuality occur. No doubt, this formal exercise may translate into extra cost for an activity, but if taken in holistic manner, the benefits will far outweigh the costs. This has another advantage in that there is no passing of buck as risks are either shared/retained or transferred depending upon the ability of the stakeholder to handle the risk. The three approaches to risk management are normally risk natural firm which does not invest much in risk management but is still aware of important risk, risk averse firm where no investments are made and the last one is risk seeker wherein the organisation is prepared to face all risks and is often called gambler. The outcome of the objectives of project naturally depends upon the path adopted by the firms in their approach to risk management.
The fact that there are manifold risks which can be identified in any construction project is explained by their size and complexity. Bigger the project is, the larger the number of potential risks that may be faced.
Occurrence of risk is stimulated by several factors. Most often the risks faced in any project are financial, environmental (surrounding location of project and overall regulations), time, design and quality. The technology used for construction and the internal environment also contributes to risk which can have substantial bearing on the outcome of a project.
Risks are directly proportional to complexity of a project. Bigger and more complex a project is, the more resources are required to complete it. In spite of identifying all potential risks, there might be more potential threats. Therefore, the project team should not solely focus on management of those identified risks but also be alert for any new potential risks which may arise during execution.
Risk management is a tool for managing risks in a project and a project manager should be prepared for managing uncertainties not included in a risk management plan.
Effective management of risky project demands rapid and realistic predictions of alternative courses of action and positive decision making and requires flexible attitudes and procedures.
Perception of severity and frequency of occurrence of risk is to be done in tandem between the stakeholders. This will eliminate lot of unnecessary correspondence as well as misunderstanding and friction between the stakeholders
Insurance is just one aspect of risk mitigation and it cannot absorb all the risks. Insurance is project specific and it should be taken as per the needs of client/contractor. Other ways of risk mitigation needs to be explored.
Adoption of good project management practices like proper planning and implementation, willingness of stake holders to share the risks in the project is essential for success of a project
Executing a complex project requires meticulous planning, i.e. planning to the smallest details, and this can be achieved through concerted dedication from the concerned stakeholders.
Risks are to be thoroughly studied and understood before bidding for the project.
Special care should be taken regarding the seasonal variation of labourers, so that the construction activities does not get delayed due to shortfall in manpower resources during execution, which can have adverse effects on cost and time
Proper risk allocation techniques should be framed between the stakeholders so that in the event of occurrence of a risk, this will eliminate doubts as to which stakeholder should address the risk
Given its complexity, risk management is a very important process in construction projects. It is most widely used in those projects which exhibits high level of uncertainty. Formal planning, assessment and monitoring/control process characterises risk management in such projects.
Risk management procedures should be initiated in the early stages of the project where planning and contracting of work, together with the preliminary capital budget are being chalked out. In later stages, Risk management applied systemically, helps to control those critical elements which can have negative impact on project performance.
Keeping track of identified threats, will result in early warnings to the project manager if any of the objectives, time, cost or quality, is being met or not.
Risks in complex construction projects can be mitigated by entering into various agreements like execution, operation/maintenance, etc.
Proper risk strategy formulation and research is necessary based on real life experiences so that identification of potential risks and providing solutions can produce effective and efficient risk strategies to overcome impacts of risk events.
Risk identification is the first step in the risk management process. It means that the identification of risks which is informal relies mostly on past experience of similar executed projects and that of advice from experts. There are a good number of methods for identifying the risks in a project and a combination of methods may be used for identification of risks in a project.
Handling potential threats is not only a way to minimise losses within the project, but also a way to transform risks into opportunities, which can lead to economical profitability and finally, .it is suggested that if risks are given due care at all stages of the project, stakeholders will be showered with manifold benefits subsequent to commissioning of project
Open Access publishing helps remove barriers and allows everyone to access valuable information, but article and book processing charges also exclude talented authors and editors who can’t afford to pay. The goal of our Women in Science program is to charge zero APCs, so none of our authors or editors have to pay for publication.
",metaTitle:"What Does It Cost?",metaDescription:"Open Access publishing helps remove barriers and allows everyone to access valuable information, but article and book processing charges also exclude talented authors and editors who can’t afford to pay. The goal of our Women in Science program is to charge zero APCs, so none of our authors or editors have to pay for publication.",metaKeywords:null,canonicalURL:null,contentRaw:'[{"type":"htmlEditorComponent","content":"We are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor this ambitious program, we’d love to hear from you. Contact us at info@intechopen.com.
\\n\\nAll of our IntechOpen sponsors are in good company! The research in past IntechOpen books and chapters have been funded by:
\\n\\nWe are currently in the process of collecting sponsorship. If you have any ideas or would like to help sponsor this ambitious program, we’d love to hear from you. Contact us at info@intechopen.com.
\n\nAll of our IntechOpen sponsors are in good company! The research in past IntechOpen books and chapters have been funded by:
\n\n