Friday, December 27, 2019

Foster School of Business - University of Washington

The Michael G. Foster School of Business is part of the University of Washington, a Seattle-based university that hosts one of the most respected medical schools in the world. Foster School of Business is a public business school that is the second oldest institution of management education on the West Coast. It is well-known for being consistently ranking among the best undergraduate and graduate business schools in the world. The school, which includes a number of newly constructed facilities, is housed on the main University of Washington campus. Address:  PACCAR Hall, Seattle, WA 98195Phone: 206-685-3400Website: foster.uw.edu Foster School of Business Academics What puts Foster above competing business schools is its world-class faculty and robust student experiences. Students can expect a quality business education and excellent preparation in areas like accounting, entrepreneurship, international business, and management. Traditional classroom studies are supplemented by structured student experiences like case competitions, consulting projects, international experiences, independent study, and internships. The career placement rate is also exceptional (nearly 100%), especially among MBA students. Foster School of Business Culture Foster School of Business prides itself on diversity, and this dedication to inclusiveness can be seen in the schools academic programs, student experiences, and relationships with area businesses and the community. Undergraduate Programs The undergraduate program at Foster School of Business awards a Bachelor of Arts in Business Administration (BABA). Students take a combination of general education, non-business, and business courses throughout the 180-credit program. Formal areas of study include accounting, finance, entrepreneurship, marketing, information systems, and operations and supply chain management. Students can also customize their education by designing their own program. Undergraduate students can even earn certificates outside of the BABA program in areas like sales and international studies in business. MBA Programs Foster offers a range of MBA program options for students with every type of schedule and career goal: Full-time MBA - Two-year full-time programEvening MBA - Three-year part-time programExecutive MBA - 21-month program with two schedule optionsGlobal Executive MBA - 12-month full-time programTechnology Management MBA - 18-month work-compatible program Masters Programs For a student who would prefer a specialized masters to an MBA, Forster offers the following programs: Master of Professional Accounting - A three-quarter-long (September-June) professional program that prepares students to sit for the CPA exam  Master of Science in Information Systems - A one-year masters program with a focus on the role of information technology and IT solutionsMaster of Supply Chain Management - A one year masters program with a focus on global sourcing of goods and local distribution and fulfillment Other Programs Foster School of Business also offers executive education programs and a Ph.D. Program in Business Administration with specializations in accounting, finance, information systems, management, marketing, operations management, and technology entrepreneurship. Graduate-level students who dont want to earn a degree can complete certificate courses in entrepreneurship and global business. Foster School of Business Admissions Paths to admission to Foster vary depending on the program you are applying to. Applications are competitive at every level of education (undergraduate and graduate), but competition is especially fierce for the MBA program, which has a small entering class size (just over 100 students). Entering MBA students at Foster have an average of 5 years of work experience and an average GPA of 3.35. Read more about Foster admission requirements and application deadlines.

Thursday, December 19, 2019

Drug Testing Should Not Be Drug Tested - 1229 Words

In today’s world the government budget and where money is spent is very concerning to some people. I believe that anyone applying for and or receiving government aid should have to be drug tested. The use of drug testing to determine aid eligibility would help with the diagnoses and prevention of drug abuse, ensure government aid is reaching those with the greatest need and help strengthen the taxpayer’s confidence in the systems effectiveness. One of the more controversial topics recently being debated by the government is whether or not, anyone applying for or currently receiving government assistance should submit to drug testing prior to receiving their benefits or as a condition to continue to receive their government assistance. The government has a responsibility that the monies that are collected from every hard working tax paying citizen do not end up in the hands of drug abusers. That a far more effective policy would be to identify substance abuse problems from the very beginning of the process of becoming eligible for government assistance. Which would allow a far more effective way to manage the disposition of funds. Instead of allowing the current system to continually fail to recognize which individuals are being allowed to feed their addictions by supplying them with public benefits with little to no safeguards in place to prevent this abusive behavior. (Dazeley, 2013) There is little to no evidence that more people receiving state aid are substance abusersShow MoreRelatedDrug Testing Welfare Recipients Should Not Be Drug Tested911 Words   |  4 PagesDrug Testing Welfare Recipients To test or not to test has been has been the question at hand for many states that are dealing with whether or not to pass the law that welfare recipients should or should not be drug tested in order to receive assistance from the government. Florida was the first state to mandate the law in 2011 and thereafter twenty four other states in the last year have also passed this law with our own state of Oklahoma being one of them. Although alcohol is legal it is abusedRead MoreWelfare Recipients Should Be Periodically Tested for Drugs822 Words   |  3 Pagesfinancial necessities. The argument everyone is making nowadays, is whether or not they should be drug testing recipients of welfare. I agree with this strongly because I know that if I were paying taxes on this program I would not want someone going out and abusing this privilege on drugs. People collecting welfare, or other government assistance, should be drug tested because if they are just going to spend money on drugs, they do not need help. To be exact, 4.1% of the United States population is onRead MoreDrug Testing : A Controversial Issue Right Now1439 Words   |  6 PagesRUNNING HEAD: Mandatorily Drug Testing Welfare Recipients Does More Harm Than Good Mandatorily Drug Testing Welfare Recipients Does More Harm Than Good Clare M. Pitlik Marist High School Author Note First paragraph: Introduction to history of drug testing welfare recipients Second paragraph: Explains why drug testing welfare recipients is unconstitutional Third paragraph: Explains why drug testing welfare recipients is costly Fourth paragraph: Rebuttals Fifth paragraph:Read MoreShould Drug Testing Welfare Recipients?1679 Words   |  7 Pagesnot those who test positive for drugs should be able to receive welfare. It was an argument that flooded social media, arguments filling comments with opinions. It is a subject that continues to be discussed within our peer groups, our communities, and our states. This paper will discuss the opinions of individual’s within the country, the beneficial factors of drug testing welfare recipients as well as the unbeneficial factors, as well as who decides if drug testing welfare recipients goes into effectRead MoreDrug Testing For Workplaces And Government Help891 Words   |  4 PagesRunning head: DRUG TESTING Drug Testing: Drug Testing in all Work Places Cassandra C. Shaffer Dabney S. Lancaster Community College ADJ 211, Criminal Law, Evidence and Procedures I 04 September 2016 Abstract â€Æ' Drug Testing for Workplaces and Government Help 1. Definition of the Problem In today’s time and age, you have many work places that do have drug testing but in others you do not have any. The people that do drugs and have a job think that it is okay to do what they are doingRead MoreWelfare Recipients Drug Tested1311 Words   |  6 Pageshas been an ongoing controversy as to whether welfare recipients should have to have drug testing done. Drug testing will ensure that recipients will not abuse the money they’re given by the government. Having people on welfare take drug test is advantageous because it could save the system money, it would help social workers identify children who are around drug abuse, and it would deter people from purchasing and using illegal drugs; however, it does have a downside such as people who are on prescriptionRead MoreShould Drug Testing Welfare Recipients? Essay1707 Words   |  7 PagesThe use of drugs is an immense problem in today’s society. The big question is, is it a problem within the welfare syste m? Drug use isn’t just a problem of poverty; it’s found among all groups and classes. As said in Jamelle Bouies article, The Myth of Drug Use and Welfare, â€Å"The myth of welfare recipients spending their benefits on drugs is just that—a myth. And indeed, in Utah, only 12 people out of 466—or 2.5 percent—showed evidence of drug use after a mandatory screening.† Drug testing welfare recipientsRead MoreThe Olympics, The World Cup, Wimbledon, The World Series,1579 Words   |  7 Pagesare not always as unified as they appear. Two sides emerge when one concept is mentioned: should athletes be tested and punished for recreational drug use. Due to the fact that testing and punishment are two different areas of this debate, this paper will only be focusing on the former, punishment, in order to narrow the focus and to better specify the issues within the realm of sports and recreational drugs. Let us, discuss the varying opinions, and by the end , we might have enough information toRead MoreThe Scientific Understanding Of Animals Essay1696 Words   |  7 PagesGreek physician conducted animal experiments to advance the understanding of anatomy, physiology, pathology, and pharmacology. Ibn Zuhr a physician from the twelfth century tested surgical procedures on animals before performing them on human patients. An estimate of 60 million animals are used worldwide every year for testing, animals are used for three main reasons: to advance scientific understanding, to develop solutions for medical problems, and to protect the safety of the people, the animalsRead MoreWelfare Drug Testing Essay1383 Words   |  6 PagesWelfare Drug Testing Trevor Brooks, SOC 110 11/09/2011 In today’s America, government aid is highly depended on. The US government has spent $498 billion dollars this year on welfare alone. The state of Tennessee has an average of 250,000 residents on welfare and has $3 billion dollars this year alone. To help cut costs and help tax payers, 36 states, including Tennessee, have proposed a bill to drug test all welfare recipients. Since the beginning of the year, the welfare rate

Wednesday, December 11, 2019

Protocols For Secure Information Management- Myassignmenthelp.Com

Question: Discuss About The Protocols For Secure Information Management? Answer Introducation In the current business scenario, trading in the stock market is growing in a rapid pace. In addition, in the developed countries such as United States, this trend is much more and involves various large institutions having expertise in trading of different stocks. Stock trading has emerged as one of the most potential and profitable venture for enhancing the wealth for the individuals as well as for the business organizations (Chen, Choi and Hong 2013). However, with the increase in the trend of stock trading, various cases related to fraud are being originating. Fraud and scam in the stock trading involves huge amount of money and thus, the effect is more than any other form of fraud . Due to this reason, the government and the trading firm are introducing different regulations and legislations in order to reduce the chance of being mislead (Kim and Sohn 2012). Various stringent laws and legislations are being initiated by the government of different countries to initiate harsh pun ishment if being accused and proved. However, in the last few years, few cases regarding to the fraud in the stock trading are being emerged. One of the prominent cases is the case of Raju Rajaratnam of Galleon group. This case involved fraud of multimillion dollar with some of the leading organizations. The case was being proved and Raju Rajaratnam is being given 11 years of imprisonment (Raghavan 2013). However, though he was imprisoned for his fraud case, there are still insider trading is happening in the stock market. Thus, the risk of being tricked by the investors is still there. This report will discuss about aftermath of the case of Raju Rajaratnam in the stock trading market. In addition, this report will also discuss the steps to be followed by the investors in order to prevent the fraud. Moreover, the implications of sharing the confidential data will be evaluated in this report. Trend of information gathering techniques in stock trading The case of Rajaratnam came as a huge shock for the entire stock market industry and the amount being involved in the fraud is huge which negatively affected the stock market. However, it should also be considered that the fraud being committed by Rajaratnam is not new and it will not end with him. This is due to the reason that, the stock market specialists operates in this market based on certain criterions. However, these criterions can only be accessed from having some sort of confidential data. In addition, with the increase in the trading firm in the stock market, the rate of the competition among the competing players is much more than ever (Bauwens and Giot 2013). Thus, having the access of some sort of confidential data helps them in gaining competitive advantages in the market. Therefore, though it is unethical to have the access of the confidential data, but the market scenario is influencing the trading organizations in having the access of these data. Measures to prevent the implication of inside trading One of the key measures should be taken by the investors is effectively and ethically dealing the trading officials. This due to the reason that, creating impression of being interested in accessing confidential data will motivate the trading officials to get in to insider trading. Thus, from the very first stage it is recommended for the investors that they should refrain from any such activities (Coffee 2013). Crosschecking of the gathered information is required for the investors. They should make sure that the information being provided by the trading firm to them is being available in the public forum. This will help them to identify any fraud or insider trading in their transaction. It is the responsibility of the investors to adhere with the security and other rules and regulations regarding the stock trading. This is due to the reason that, there are various legislations being in the stock market, which should be known to all the related stakeholders. Moreover, adhering with the relevant legislations will help the investors in identifying any fraud in the activities of the trading firm (Cox, Hillman and Langevoort 2016). It will also prevent them from being prosecuted by the government officials due to the reason that, in case of proven fraud, investors will also be held liable for the misdeeds of their trading firm. Investors should always be careful about making public the confidential data that they have with regarding their past or present employer (Ogiela and Ogiela 2012). This is due to the reason that, publicizing the confidential data about the employer will also be treated as the breach in security policy. By the regulators The government and other regulatory bodies also have the responsibilities in preventing the inside trading in the stock market. One of the key measures that being taken by the government is monitoring the trading activity in the market. Regular surveillance and effective determination of the trend analysis of the stock valuation of various companies will help to identify any huge differences in the market (Kim 2012). There are numerous complaints being made to the regulatory bodies by the investors having incurred huge loss in the market. These complaints can act as potential leads for the regulatory bodies to concentrate their investigation process on a particular area. In addition, this will help them in determining the unusual trading practices being involved in the market. Whistleblowers are one of the key sources of gaining market fraud for the regulatory bodies. This is due to the reason that, whistleblowers are the past or present employees in any organizations and thus they may have the knowledge about the fraudulent activities being involved by their employers in the market (Miceli, Near and Dworkin 2013). To motivate the whistleblowers in coming forward to disclose the fraudulent activities, incentives of 10 to 30 percent are being provided to them. By the companies Companies also have the responsibility of preventing the fraudulent activities in the stock trading. Thus, they also initiate various policies in order to prevent these activities (Beneish, Press and Vargus 2012). Various organizations have the blackout period for their executives to refrain them from buying the share of the company due to their access with the confidential data of the particular organization. In some organizations, executives are being allowed to buy their shares of their own organization. However, they are barred from having transaction at the time of earnings announcements or any type of organizational activities, which may have impact on the trading of stock (Fisher 2015). Various organizations employ legal officials to look after the legal affairs regarding the stock trading. This is due to the reason that, company officials will not have the clear idea about the various regulations as well as they may indulge in conflicts of interest. Thus, employment of the legal officials will help to prevent these types of activities. Employees are being given training about the various rules and regulations in the trading of stocks. They are being trained about the access of the confidential data and the extent to which they are allowed to publicize the information regarding their organization (Jehanzeb and Bashir 2013). In addition, they are also being trained about the possible implications or consequences that they will face in case of any misrepresentation of the confidential data. Implications of sharing confidential data Sharing of confidential data will have implications or consequences for the employees as well for other associated stakeholders. However, for the different stakeholders, the effect of the implications will be different. The following sections will discuss about the potential implications of sharing confidential data on different stakeholders. For the employees The primary effect of sharing of confidential data will be on the employees. This is due to the reason that, employees ranging from the lower level to the upper level managers will have the access of various confidential data more effectively than any other outsiders (Hannah and Robertson 2015). Thus, the chance or probability of breaching the confidentiality will be more from the side of the employees. Thus, in that case, the key implication for them will be the termination. Majority of the employee contracts have the clause for breach of confidentiality. Thus, the employee will be terminated on an immediate basis upon proven. Employees may face legal notices from their employer and may have to incur huge penalties if proven guilty. This is due to the reason that, in case of the breach of confidential information, the employer will probably sue the accused with legal notices (Morrow 2012). Thus, if the lawsuit is being proven and if the justice goes against the employees, then he may have to incur a huge penalty. In the case of monetary damage being served by the employer due to the reason of the breach of confidential data by the employee, the employee has to pay the price of loss as penalty. Thus, he will also face monetary consequences. Other than the monetary implications, employees may have to face he criminal charges due to the reason that, breaching of confidential data is similar to the theft of the intellectual property of the organization (Acemoglu and Akcigit 2012). Thus, the employee can be accused in the charge of theft. The law regarding theft and breach of confidentiality of information is different in various countries. However, criminal proceedings will be there against the employee in the case of the charge of theft. It may lead to paying a good amount of penalty as well as having sentenced imprisonment for years. With having served the legal lawsuits, incurring a huge monetary loss and serving imprisonment. The social reputation and goodwill of the employee will get negatively affected. Moreover, the chance for him to get selected and appointed in other organizations is much lower. This is due to the reason that the tarnished social mage of the employee will be transmitted among the majority of the organization. Thus, no other organizations will show interest in hiring him due to his past background. Hence, the future of the employee will also get negatively affected. If the confidential data is being leaked by the employee in the organization and if it led to huge financial fraud in the market, like the one with the galleon in the stock market, then the consequences will be more stringent for the accused. This is due to the reason that, in the case of the occurrence of financial fraud in the market because of the leakage of the confidential data, then the accused will be prosecuted by the regulatory bodies also (Abbasi et al. 2012). In that case, he will be charged with more cases against him, which may lead him to having more term of imprisonment as well as penalty. For the investors Investors whether intentionally or unintentionally indulged in the fraudulent activities will have to face the consequences. This is due to the reason that, it is the responsibility of the investors also to check and adhere with all the relevant legislations before being operated in the stock market (Beatty, Liao and Yu 2013). It is also being assumed that, the fraudulent activities by the trading firm are known to the investors due to the reason that it is the responsibility of the investors to check and monitor the activities of their trading firm. Thus, they also have to face the legal and criminal consequences (Pillai, Kar and Shah 2014). Apart from the negative implications, investors will also some sort of positive and favorable impact in the initial stage due to the sharing of the confidential data. This is due to the reason that, sharing of the confidential information will help the investors in having the knowledge of the probable change in the business scenario prior to their investment (Bhattacharya 2014). Thus, they will invest their capital accordingly. Though it is of having undue advantage but still it will give profit for the investors. Social risk is also applicable for the investors also in the case of revelation of the confidential data. This is due to the reason that, in the case of sharing of the confidential data and if being accused, the social risk will also be implied for the investors (Johnson and Covello 2012). In the case of the accusation, the regulatory authorities will also prosecute the investors. Thus, the social goodwill and reputation of the investor will be at stake. In the case of the insider trading, the investors will also find it difficult in have their trading partner in the future. This is due to the reason that, if the name of the investors gets revealed in any fraudulent activities, then no other trading partner will show interest in trading with them in fear of loss of goodwill in the market. Thus, the investors will face economical loss also in the case of sharing of confidential data. The regulatory authorities in the case of the accusations will take back the profit made by investors with the help of the confidential data back (Bewaji 2012). In addition, the investors will have to pay a hefty amount as penalty. Thus, it will cause a huge economical loss for them. For the trading firms In the case of using any confidential data for insider trading, the trading will be adversely affected upon revealed. Their trading license may be taken back and may be made black listed and thus, the business potential of them will come to a hold. Similar case had been happened with the Galleon. In this case, with the arrest and accusation of Rajaratnam, the trading firm of him got dissolved. Thus, the trading firm indulged in sharing of confidential information will face survival issue in the case of revelation. If the business of the trading firm is not being closed even after the sharing of confidential data, then also they will face survival issues in operating in the existing market (Ahmad, Bosua and Scheepers 2014). This is due to the reason that, no investors will be interested in collaborating with a trading firm, which is having background of sharing confidential data. In the case of sharing of confidential data, the trading firm will gain huge profits in the short term. However, in the long run, they will lose their competitive advantages in the market (Wagner III and Hollenbeck 2014). This is due to the reason that, the information that they will share with their investors will be treated or assumed as confidential data, even though it is authentic. Thus, the competitiveness and trustworthiness of the trading organization will get affected. Influence in decision-making process Sharing of confidential data will obviously effect my decision making process in trading with a particular stock. This is due to the reason that, if it is being known to me that the access of information that i have with me is private and confidential, then it will negatively motivate me in trading with the particular stock. However, it is true that in most of the cases, investors having confidential data with them will most likely to trade with that stock for gaining advantages. However, for me, the long-term situation will be more influencing factor. Thus, I have to determine the implications of insider trading in future and accordingly indulge in trading. Aftermath of the case of Rajaratnam As discussed earlier, the investigation and conviction of Rajaratnam had given a huge blow to the existing scenario in the trading market. The rate at which the trading firms were garnered confidential data will be reduced due to this case. However, the growing competitiveness in the trading market will also reduce the influence of the rajaratnams case gradually. This is due to the reason that, trading firms will have to garner some sort of information that will be accessible to any other to have the competitive advantages over their competitors (Tavakoli, McMillan and McKnight 2012). In addition, the investors prior to their investment in a particular stock will obviously seek to have some sort of information, which will help them to have positive return from the market. Thus, on one hand, the trading firm will reduce their confidential data accumulation due to the secret investigation by the regulatory authorities. However, on the other hand, the expectation of the customers will a ct as driving force in generating and sharing confidential data. Thus, it will be difficult to conclude that with the conviction of rajaratnam, the trend of collecting confidential information will come to end. This is due to the reason that, the more confidential data will be provided by the trading firms to their customers, the more will be their market attractiveness and competitive advantages in the market. Thus, in view of the basic marketing principles, it can be said that the case of rajaratnam will have some impact on the exiting trend of collecting confidential data, but it will not completely deter the fund managers from sharing confidential data. In the case of investors also, there will be very less impact of the case of rajaratnam on them due to the reason that, they also tries to gain more profit from trading. Majority of the investors in the trade market invest huge amount for stock trading and thus they are more aggressive in enhancing their profit margin. This factor acts as driving force for them to indulge in insider trading. Thus, it is impossible to stoop the trend of collecting confidential data by investors in the stock market. Conclusion Thus, it can be concluded that, rajaratnam had indulged in huge fraudulent activities by having collected the access of various confidential information. This report discussed about the potential implications of sharing confidential data for the employees, investors and trading firms. In addition, the driving forces for all the stakeholders in indulging in the insider trading have also been discussed. This report concludes that the conviction of rajaratnam will not have huge impact on the trading practices being followed by the investors and trading firms. Thus, the existing trading practices in the trading market will continue to prevail, until another fraud case will come to light. Reference Abbasi, A., Albrecht, C., Vance, A. and Hansen, J., 2012. Metafraud: a meta-learning framework for detecting financial fraud.Mis Quarterly,36(4). Acemoglu, D. and Akcigit, U., 2012. Intellectual property rights policy, competition and innovation.Journal of the European Economic Association,10(1), pp.1-42. Ahmad, A., Bosua, R. and Scheepers, R., 2014. Protecting organizational competitive advantage: A knowledge leakage perspective.Computers Security,42, pp.27-39. Bauwens, L. and Giot, P., 2013.Econometric modelling of stock market intraday activity(Vol. 38). Springer Science Business Media. Beatty, A., Liao, S. and Yu, J.J., 2013. The spillover effect of fraudulent financial reporting on peer firms' investments.Journal of Accounting and Economics,55(2), pp.183-205. Beneish, M.D., Press, E. and Vargus, M.E., 2012. Insider trading and earnings management in distressed firms.Contemporary Accounting Research,29(1), pp.191-220. Bewaji, W., 2012.Insider Trading in Developing Jurisdictions: Achieving an Effective Regulatory Regime. Bhattacharya, U., 2014. Insider trading controversies: A literature review.Annu. Rev. Financ. Econ.,6(1), pp.385-403. Chen, H., Choi, P.M.S. and Hong, Y., 2013. How smooth is price discovery? Evidence from cross-listed stock trading.Journal of International Money and Finance,32, pp.668-699. Coffee, J.C., 2013. Mapping the Future of Insider Trading Law: Of Boundaries, Gaps, and Strategies. Cox, J.D., Hillman, R.W. and Langevoort, D.C., 2016.Securities regulation: cases and materials. Wolters Kluwer Law Business. Fisher, P.A., 2015.Common stocks and uncommon profits and other writings(Vol. 44). John Wiley Sons. Hannah, D.R. and Robertson, K., 2015. Why and how do employees break and bend confidential information protection rules?.Journal of Management Studies,52(3), pp.381-413. Jehanzeb, K. and Bashir, N.A., 2013. Training and development program and its benefits to employee and organization: A conceptual study.European Journal of business and management,5(2). Johnson, B.B. and Covello, V.T. eds., 2012.The social and cultural construction of risk: Essays on risk selection and perception(Vol. 3). Springer Science Business Media. Kim, S.H., 2012. The Last Temptation of Congress: Legislator Insider Trading and the Fiduciary Norm Against Corruption.Cornell L. Rev.,98, p.845. Kim, Y. and Sohn, S.Y., 2012. Stock fraud detection using peer group analysis.Expert Systems with Applications,39(10), pp.8986-8992. Miceli, M.P., Near, J.P. and Dworkin, T.M., 2013.Whistle-blowing in organizations. Psychology Press. Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), pp.5-8. Ogiela, M.R. and Ogiela, U., 2012. Linguistic protocols for secure information management and sharing.Computers Mathematics with Applications,63(2), pp.564-572. Pillai, D., Kar, S. and Shah, R., 2014. Impact of Insider Trading on Investment Decision by Investors.International Journal,2(4). Raghavan, A., 2013.The billionaires apprentice: The rise of the Indian-American elite and the fall of the Galleon hedge fund. Hachette UK. Tavakoli, M., McMillan, D. and McKnight, P.J., 2012. Insider trading and stock prices.International Review of Economics Finance,22(1), pp.254-266. Wagner III, J.A. and Hollenbeck, J.R., 2014.Organizational behavior: Securing competitive advantage.

Tuesday, December 3, 2019

Tailoring Your Strategy To Fit The Cult Essay Example

Tailoring Your Strategy To Fit The Cult Essay In this article, I will discuss three aspects of global strategy: the companys mission, villous and Identity, brand strategies, and ammunitions. Drawing upon Egger Hypotheses dimensions of national culture (see Five Cultural Dimensions) and my own extensive research and consultancy work, I will consider ten convergence Ana Leverage AT consumer behavior across countries, in order to help managers better understand the relationship between culture and strategy. Recognizing the differences will lead to increased efficiency in a companys global marketing effort and will ultimately condition the success of any multinational enterprise. Mission, Vision Corporate Identity A crucial element in the strategic planning of any organization starts with its mission statement, an explicit formulation of what a company stands for, and linked to this, a vision statement indicating where the company wants to be in the future, sometimes expressed as its strategic intent. Mission and vision should give focus to everyone who is involved with the company, be it directly (employees) or indirectly (shareholders). This document is authorized for use only by Nail Wises at until May 2014. Canons corporate philosophy of kisses. Apart from the collectivist values such statements express, they also indicate a high degree of power distance, as in the case of Toyota, whose mission is headed: Message from Top Management. Also, contrast Microsofts mission, To help people and business throughout the world to realize their full potential, with Philips to Improve the quality of peoples lives through timely introduction of meaningful innovations. The former reflects the Anglo-Saxon value of self-actualization, while the latter reflects the quality-of-life preferences ore in keeping with the Dutch character. In all these cases, it is vital that a company review its mission statement in light of its own cultural Dallas. A companys blew AT Itself ultimately rennets ten values AT Its leaders and if these values are not shared across cultures, then stakeholders elsewhere may have difficulties identifying with the company. We will write a custom essay sample on Tailoring Your Strategy To Fit The Cult specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Tailoring Your Strategy To Fit The Cult specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Tailoring Your Strategy To Fit The Cult specifically for you FOR ONLY $16.38 $13.9/page Hire Writer A truly global company would include values that are shared by more cultures than Just its own. Based on its mission and vision, a company then distills its corporate identity, which also reveals its core values. Usually the task of creating a corporate identity begins with the election of an appropriate corporate name. Other factors that contribute to corporate identity include the logo of the organization and marketing communications. All this, including language, lettering and associations, is logically a reflection of the home country of the organization. The British communications consultant Nicholas Mind has defined corporate identity as an organizations identity in its sense of self, much like our own individual sense of identity. Consequently, it is unique. If we consider this definition carefully, we see that it is, in fact, a culturally bound concept. First, the quality of uniqueness resonates primarily with individualistic cultures. Furthermore, the insistence by many organizations that there be worldwide consistency of all the elements of corporate ID, so that the company is perceived universally, again derives from Western notions. In reality, corporate identity translates differently in different parts of the world. Sticking to uniqueness and consistency in corporate identity can be counterproductive, YOU Although the concept of the mission and vision are Western inventions, the practice has been universally embraced by companies worldwide. Providing a statement that expresses a companys strategic intent, its philosophy, values, ethics or operational effectiveness has become standard global management practice. Yet closer analysis of such statements reveals telling differences in content and form across the world.

Wednesday, November 27, 2019

Avoiding Power Abuse When the Actions of the President Have to Be Restricted by the Congress

Avoiding Power Abuse When the Actions of the President Have to Be Restricted by the Congress There is no doubt that a state leader enjoys impressive power. With political, economical, financial and even social issues under control, a political leader can possibly turn into a dictator[1].Advertising We will write a custom research paper sample on Avoiding Power Abuse: When the Actions of the President Have to Be Restricted by the Congress specifically for you for only $16.05 $11/page Learn More Despite the fact that in the resent-day world, the leader of a state controls every single sphere of the life of the state, the restrictions imposed on the leader by qualified exceptionalism principle allows for making sure that no power abuse is taking place. In his article, David Rudenstine explains where the power abuse that can be currently observed in a number of states stems from. According to Rudenstine, the seeds of constitutional dictatorship were planted in a governmental system since Ancient Rome. As Rudenstine explains, the principle in accordance with which the leader of a stat might consider authoritarian regime as a means to lead the state out of a crisis â€Å"is rooted in the Roman Republic.†[2] In their turn, Owens and Loomes analyze the work of the U.S. Congress without the references to earlier political practices, as well as without analyzing a particular political situation. According to Owens and Loomes, as long as the policy of qualified expectations persists in the U.S. government and the Congress has its impact on the President’s actions, democracy is safe.[3] Despite the work of the Congress, however, power abuse can possibly take place unless strong moral principles are established, which will help coordinate the steps of the government[4]. The aforementioned Congress does not necessarily speak from the perspective of people. Rather, Congress considers what will be most favorable for the state. After all, the members of the Congress often dispute and rarely come to terms: â€Å"American voters c an become frustrated by the inability of their leaders to move forward.†[5] However, it cannot be denied that the Congress controls the actions of the President, thus, preventing him/her from making the steps that conflict with the interests of the U.S. population: â€Å"Even today, Congress limits the Presidents powers.†[6] In addition, the way in which the Congress limits presidential power also leaves much room for thoughts. Stacey Kaper gives a very graphic example of the failure of the Congress to voice the opinion of the nation by explaining that the Congress should â€Å"provide the president with explicit self-defense authorization to address specific emerging threats,†[7] yet it never does. Perhaps, one of the key reasons for this is that â€Å"we expect too much of government†; however, it is the duty of the state representatives to take care of people, and it is necessary to make sure that they attend to their duties.Advertising Looking for research paper on government? Let's see if we can help you! Get your first paper with 15% OFF Learn More On the other hand, it cannot be denied that for an average person, connecting with the Congress for the latter to translate their demands into reforms is extremely hard. As Independence Hall Associations explains, USA is â€Å"far too large a country to operate effectively as a direct democracy.†[8] With that being said, it can be assumed that the existence of Congress is justified, especially when such issues as waging war are at stake: â€Å"The implication often given is that these powers are somehow incompatible.†[9] Although there are a number of opportunities for abusing power for a man/woman in presidency, it seems that dictatorship is highly unlikely to occur in the states where restrictions are provided. While it is important to trust the person chosen democratically to rule the state, it is essential to show that gaining presidency mean s taking responsibilities. As long as the reminders of the responsibility of being a state leader exist, democracy is going to be the basic principle of governing the state. Bibliography Independence Hall Associations. â€Å"American Political Attitudes and Participation.† In  American Government. Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Independence Hall Associations. â€Å"How Do Citizens Connect with Their Government?† In American Government. Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Independence Hall Associations. â€Å"Congress: The People’s Branch?† In American  Government. Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Independence Hall Associations. â€Å"The Presidency: The Leadership Branch?† In  American Government. Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Kaper, Stacy. â€Å"How to Restrict the President’s Power to Wage War.† National  Journal 6, no. 15 (2013): 37.Advertising We will write a custom research paper sample on Avoiding Power Abuse: When the Actions of the President Have to Be Restricted by the Congress specifically for you for only $16.05 $11/page Learn More Machiavelli, Nicolo. The Prince [Excerpts]. 1513. fordham.edu/halsall/source/prince-excerp.asp Owens, John E. and Burdett A. Looms. â€Å"Qualified Exceptionalism: The US Congress in Comparative Perspective.† The Journal of Legislative Studies 12, no. 3–4 (2006): 258–290. Rogers, William. â€Å"Congress, the President, and the War Powers.† California Law  Review 59, no. 5 (1971): 1194–1214. Rudenstine, David. â€Å"Roman Roots for an Imperial Presidency: Revisiting Clinton Rossiter’s 1948 Constitutional Dictatorship: Crisis Government in the Modern Democracies.† Cardozo Law Review 34, no. 3 (2013): 1063–1078. Footnotes Nicolo Machiavelli, The Prince [Excerpts], 1513, fordham.edu/halsall/source/prince-excerp.asp David Rudenstine, â€Å"Roman Roots for an Imperial Presidency: Revisiting Clinton Rossiter’s 1948 Constitutional Dictatorship: Crisis Government in the Modern Democracies,† Cardozo Law Review 34, no. 3 (2013): 1063. John E. Owens and Burdett A. Looms, â€Å"Qualified Exceptionalism: The US Congress in Comparative Perspective,† The Journal of Legislative Studies 12, no. 3–4 (2006): 258–290 Independence Hall Associations, â€Å"American Political Attitudes and Participation,† in American  Government, Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Independence Hall Associations, â€Å"Congress: The People’s Branch?,† in AmericanGovernment, Philadelphia, PA: Independence Hall Association, 2008, ushistory.org/gov/index.asp. Independence Hall Associations,  "The Presidency: The Leadership Branch?,† In  American Government, Philadelphia, PA: Independence Hall Association, 2008. ushistory.org/gov/index.asp. Stacy Kaper, â€Å"How to Restrict the President’s Power to Wage War,† National  Journal 6, no. 15 (2013): 37. Independence Hall Associations, â€Å"How Do Citizens Connect with Their Government?,† in American Government. Philadelphia, PA: Independence Hall Association, 2008, ushistory.org/gov/index.asp. William Rogers, â€Å"Congress, the President, and the War Powers,† California Law Review 59, no. 5 (1971): 1194–1214.

Saturday, November 23, 2019

Rolling budgets Essays

Rolling budgets Essays Rolling budgets Essay Rolling budgets Essay Given the speed of change and general uncertainty in the external environment, shareholders seek quick results. Companies typically report to shareholders every three months, compared with the normal six months. Rolling budgets involve evaluating the previous twelve months performance on an ongoing basis, and forecasting the next three months performance. We see our budget as a forward looking plan that sees our direction and destination point, other documents such as the balance sheet and the profit loss account allows us to look back and reflect our progress telling us where we have been and how we got to this current position. The companies budget is a fixed type budget and is prepared annually by the contracts manager, finance manager and the 5 leisure centre managers (budgeting team), it is review every month throughout the year to reflect our progress. The budget allows our centre managers to co-ordinate and control the activities of the organisation effectively, it also allows them to implement the business plan as well. The budget is a key management tool for decision making and the steps below that we follow allows the managers to know where they are going. The budget consists of: Income/sales which is based on new members joining the fitness suite, activity levels, patronage users, secondary spends plus the management fee that is paid to us from the council. Expenditure which is based on wages, utilities, repairs and maintenance, admin, marketing etc. Capital expenditure works which include new health and fitness studios, DDA works, building improvements and information technology Once each centres budget is completed the contract manager who is responsible for the 5 leisure centres and the support team co-ordinates the individual budgets into a master budget. The centre manager also co-ordinates the budget down to there duty managers, this shows them what they can spend on certain items and what the income levels should be. When the agreed budget is in place we have several financial procedures to follow this allows us to control the budget daily and is quite easy to run. Each centre manager regularly monitors progress and checks for variances, they fill in a daily income and expenditure spreadsheet which allows them to compare the actual and budgeted results. The budgeting team meet up at the end of each month to view the budget, this allows managers to react on major variances in terms of the likely impact upon the organisations overall budget. The budgeting team can then discuss what revisions are needed to get the budget on its original course. A couple of criticises of a fixed budget is that it works less well when organisations face large or highly correlated risks, or when the financial year is too short to smooth out the natural variability due to repeated chance occurrences. When such uncertainties emerge, the timing of decisions within the financial year takes on added importance. Fixed budgets also provide obvious incentives for over-spending near the end of the financial year. These adverse incentives are then aggravated by the complicated signalling games that take place between central authorities and their subordinates. Ironically, under spending may be taken, as a sign of incompetence that needed work has not been done. While it is difficult to spend every last penny and some lapses are always going to occur, the magnitude of these lapses makes it extremely uncomfortable for three reasons * Significant under spending makes it difficult to justify any increases in these appropriations. * There are concerns that clients needing services are not getting them * Some astute budget analyst is going to notice a pattern and reduce the appropriations, figuring that if we dont spend it we must not need it. A fixed budget does control costs on expenditure levels in our organisation, i. e. if a duty manager is given a certain amount to spend, once that money has gone he can not spend anymore, this keeping a tight control on the budget, on the other hand If a manager needed more sports equipment for a activity to take place and his budget has been spent, this would effect the customer and may prevent them from taking part in the activity. This shows that the budget process can be a barrier to performance. At current the budgeting team have made certain assumptions in determining the original budget (mainly utilities, maintenance and repair costs). If we used a flexible budget adjustments can be made throughout the year to ensure that we operate the centre within the budget we have set, using the knowledge we gain through the operation of the business. I. e. Single loop feedback involves making corrections to current activities in order to get back on course and double loop feedback involves amending the original plans so that they more accurately reflect current business reality. The budget process that we put together is time consuming and costly to put together it is also based on guesswork and unsupported assumptions. Managers spend far to much time analysing their budgets, and other parts of the business seems to suffer. I. e. the front line staff and the customers, how can a manager know what the customers want when he is stuck in the office analysing his budget and not communicating with the customers. Unsupported assumptions and guesswork takes place because he does not communicate and involve his staff in the budgeting process. One of the ways we could improve the system and the control of income and expenditure would be to have site specific administration and expenditure controls to be updated and to be reviewed constantly. The introduction of a new till system will enable us better interrogation of income figures to be undertaken, enabling us to market facilities more effectively and to receive more accurate information regarding users.

Thursday, November 21, 2019

Analyzing the Statement of Cash Flows Assignment

Analyzing the Statement of Cash Flows - Assignment Example Therefore, Net Income is the position of a company’s business based on matching incomes versus expenditure but cash flow will only reflect actual movement of money without any considerations for the accruals (Epstein, 2014). A comparison of the Cash from operating activities to the Net Income for techno in 2008 stands at a ratio of 177,387/242,329= 0.73 and 2009 stands at 24,525/316,354= 0.08. Therefore, Techno had a 73% rate in 2008 and it dropped to 8% in 2009. This is a low quality income showing a great imbalance. The time taken to convert any credits or accruals to cash is stretching an indication of a pending problem that may lead to crippled operations. The first red flag is the declining number of receivable from $-49,704,000 in 2008 to $-288,174,000 in 2009. This deterioration is emphasized by a minimal decline in inventory over the two years. The Net Income figure is also overrated because the Accrued liabilities have almost doubled over the two years which puts the company at a delicate position if the creditors demand instant payment ((Epstein, 2014)). This position would not be the same in 2008 because the Cash from Operating Activities $177,387,000 was enough to cover the accrued liabiliti es of $41,079,000. Techno has also engaged in heavy borrowing both in short-term and Long-term in 2009 to probably support the business from the weak position confirmed by the declining ratio between a 73% rate in 2008 and it dropped to 8% in