...UTA-TJ EMBA2012 MANA 5340 – Strategic Human Resources Management PhD George S. Benson Group #5: Justin Hu, Jacky Wang, Albert Zhou, Lily Wang, Sharry Du, Yvonne Zhang, Jichang Sheng Dec 23rd, 2012 HUMAN RESOURCES AT THE AES CORPORATION UTA-TJ EMBA 2012 HUMAN RESOURCES AT THE AES CORPORATION Contents Introduction .................................................................................................................................................. 2 Organization Planning ................................................................................................................................... 6 Job Design ................................................................................................................................................... 10 Recruiting and Selection ............................................................................................................................. 11 Training and Development ......................................................................................................................... 12 Performance ............................................................................................................................................... 14 Compensation and Benefits ........................................................................................................................ 17 Employee Relationship ........................................................................
Words: 5518 - Pages: 23
...Methods Design and setting We performed a longitudinal retrospective patient record review study in 21 randomly sampled hospitals in 2004, and 20 in 2008 out of the total of 93 Dutch hospitals. Eight hospitals were studied in both years. Both samples were stratified for hospital type, university, tertiary teaching and general hospitals, and a proper representation of both urban and rural settings in the samples were verified. Tertiary teaching hospitals in The Netherlands provide specialised care and train doctors. The level of care given is between that given in a university hospital and in a general hospital. Generally speaking, university hospitals and, to some extent, tertiary teaching hospitals tend to treat more complex patients with more complex care. To be eligible, hospitals had to have at least 200 beds and an intensive care unit. In each hospital, 400 patient admissions were randomly selected in 2004, and 200 in 2008. Fifty percent of the records were of patients who were discharged from the hospital after a stay of at least 24 h. The other 50% were of patients who died in hospital. These patients were sampled from all inpatient deaths, regardless of their length of stay. We did not exclude patients admitted with an explicitly palliative care plan; this information was noted down and taken into account during the review process. During analysis, overall AE rates were corrected for the oversampling of deceased patients, because in our sample, 50% of the patients were...
Words: 5937 - Pages: 24
...operations, a parallel world of finance has been opened within every multinational firm and this world has, heretofore, been overlooked. The course materials are designed to address the many aspects of financial decision making within global firms prompted by these changes that are not addressed in traditional materials. The paper provides an overview of the structure of the course and its seven modules with particular emphasis on the three modules that constitute the core of the course. The paper also describes an analytical framework that has been developed through the creation of the course materials to guide critical financial decisions on financing, investment, risk management and incentive management within a multinational firm. This framework emphasizes the need to reconcile conflicting forces in order for multinational firms to gain competitive advantage from their internal capital markets. The paper concludes with a discussion of the course's pedagogical approach and detailed descriptions of all the course materials, including 19 case studies, corresponding teaching notes, several module notes and supplementary materials. Mark Veblen, Kathleen Luchs and Claire Gilbert provided excellent research assistance in the process of writing these cases and the course overview note. Seminar participants at the HBS CORE seminar provided particularly helpful comments and...
Words: 25419 - Pages: 102
...Why Are There So Many Deaths Caused By Medical Errors and What Solutions Can Decrease Them? Health Service Systems – HSM541 June 20 2015 Background Medical errors kill at least 44,000 people and perhaps as many as 98,000 people per year. Or do they kill over 180,000 per year? Maybe even 440,000 people killed by medical errors? Allen (2013) In 1999 the Institute of Medicine (IOM) published a report titled “To Err Is Human: Building A Safer Health System” that leveled the healthcare community. They reported that according to two studies “perhaps as many as 98,000 people die in hospitals each year as a result of medical errors that could have been prevented”. IOM (1999) Then the Office of Inspector General for Health and Human Services followed up with a report in 2010 that stated “bad hospital care contributed to the deaths of 180,000 patients in Medicare alone in a given year”. Allen (2013) And finally in 2013, the numbers were once again raised. Per a report from the Journal of Patient Safety that approximately “440,000 PAEs (preventable/potential adverse events) that contribute to the death of patients each year from care in hospitals. This is roughly one-sixth of all deaths that occur in the United States each year”. They are now the U.S.’s third leading cause of death, behind only heart disease and cancer. All of the numbers mentioned in the first paragraph are medical errors that were “preventable”. Mistakes by the people you put your trust in killed you...
Words: 5284 - Pages: 22
...Milkovich−Newman: Compensation, Eighth Edition Front Matter 1. The Pay Model © The McGraw−Hill Companies, 2004 Chapter One The Pay Model Chapter Outline Compensation: Definition, Please? Society Stockholders Managers Employees Global Views—Vive la différence Forms of Pay Cash Compensation: Base Cash Compensation: Merit Pay/ Cost-of-Living Adjustments Cash Compensation: Incentives Long-Term Incentives Benefits: Income Protection Benefits: Work/Life Focus Benefits: Allowances Total Earnings Opportunities: Present Value of a Stream of Earnings Relational Returns from Work The Employment Relationship Combines Transactional and Relational Returns Variations in Transactional and Relational Expectations A Pay Model Compensation Objectives Four Policies Pay Techniques Book Plan Caveat Emptor—Be an Informed Consumer 1. Does the Research Measure Anything Useful? 2. Does the Study Separate Correlation from Causation? 3. Are There Alternative Explanations? Your Turn: Glamorous Internships? or House Elves? A friend of ours writes that she is in one of the touring companies of the musical Cats. In the company are two performers called “swings” who sit backstage during each performance. Each swing must learn five different lead roles in the show. During the performance, the swing sits next to a rack with five different costumes and makeup for each of the five roles. Our friend, who has a lead in the show, once hurt her shoulder during a dance number. She signaled to someone...
Words: 12471 - Pages: 50
...FULFILMENT OF MASTER DEGREE TO DEPARTMENT OF COMPUTER SCIENCES, FACULTY OF SCIENCES, UNIVERSITY OF LAGOS, AKOKA, YABA, LAGOS. SESSION 2012/2013 SUPERVISED BY Prof H.O.D LONGE Abstract Radio Frequency Identification (RFID) technology has been available for more than fifty years. However it has only been recently that the prices of RFID devices have fallen to the point where these devices can be used as a "throwaway" inventory. This presents numerous opportunities along with innumerable risks. A lot of research is being done to suggest methods which will ensure secure communications in RFID systems. The objective of this paper is to present RFID technology, its current, future applications, study various potential threats to security, and Critics of RFID. 1 Introduction RFID 1.0 BACKGROUND STUDY Radio Frequency Identification (RFID) is an automatic identification system. It make use of Radio Frequency (RF) to identify “tagged” items .Data collected were transmitted to a host system using a Radio Frequency Reader. RFID is one of the numerous technologies grouped under the term Automatic Identification (Auto ID), such as bar code, magnetic inks, optical character recognition (OCR), voice recognition, touch memory, smart cards, biometrics etc. Auto ID technologies are the new ways of getting data and controlling information flow of a material, especially suitable for large production networks. RFID is a means of gathering data about a certain item without the need of touching or seeing...
Words: 5867 - Pages: 24
...MANAGING PEOPLE When Salaries Aren’t Secret by John Case FROM THE MAY 2001 ISSUE I t had all happened so fast. Hunched forward, elbows on the desk, Hank let his chin sink deeper into his hands as he gazed out into the night. Outside, the flowers in the officepark garden looked garish under the orange sodium-vapor lights. Hank didn’t notice. He was thinking hard about tomorrow’s staff meeting, which had so suddenly been transformed from a celebration into a—well, he wasn’t quite sure what. He just knew it wouldn’t be pleasant. Hank Adamson, 48, was chief executive officer of RightNow!, a retail chain specializing in offprice clothing for young, fashion-minded women. Frankly, he had been looking forward to a little celebration. Five years ago, his company had bought out a stodgy, 20-year-old retailer of women’s apparel, and Hank had come in to run the place. He renamed it and repositioned it, giving it a hip, edgy style. (Get Your Clothes Half Off was the latest slogan, with a racy ad campaign to match). He invested in rapid growth: RightNow! today had stores in 28 states, with more on the way. Last year, Hank had hired a dozen or so tech-savvy 20-somethings and charged them with creating a killer Web site. Launched just last month, the site was already winning awards and generating substantial business. He’d heard that even the folks in corporate were impressed. But oh, those 20-somethings. One in particular: Treece McDavitt. Hank had noticed her—you ...
Words: 6093 - Pages: 25
...Marks 3 100 25 -25 150 Pract/ Week 2 Tut/ Week -- 2 4 2 -- 3 100 25 -- 25 150 3 4 5 4 4 4 2 2 2 ---- 3 3 3 100 100 100 25 25 25 --25 25 25 -- 150 150 150 6 4 24 10 1 1 3 -- 100 600 25 150 -25 25 125 150 900 INFORMATION AND NETWORK SECURITY CLASS T.E. ( INFORMATION TECHNOLOGY) HOURS PER LECTURES : WEEK TUTORIALS : PRACTICALS EVALUATION SYSTEM: THEORY PRACTICAL ORAL TERM WORK : SEMESTER VI 04 -02 HOURS 3 ---- MARKS 100 25 25 1. Introduction What is Information Security? Security Goals. 2. Cryptography Crypto Basic, Classic Cryptography, Symmetric Key Cryptography: Stream Ciphers, A5/1, RC4, Block Ciphers, Feistel Cipher, DES, Triple DES, AES, Public Key Cryptography: Kanpsack, RSA, Defiie-Hellman, use of public key crypto- Signature and Non-repudiation, Confidentiality and Non-repudiation, Public Key Infrastructure, Hash Function: The Birthday Problem, MD5, SHA-1, Tiger Hash, Use of Hash Function. 3. Access control - Authentication and Authorization Authentication Methods, Passwords, Biometric, Single – sign on, Authentication Protocol, Kerberos, Access control Matrix, ACLs, Multiple level security model, Multilateral security, Covert channel, CAPTCHA. 4. Software Security Software Flaws, Buffer Overflow, Incomplete Mediation, Race conditions, Malware, Salami attack, Linearization Attacks,...
Words: 3868 - Pages: 16
...Market Beta (β) and Stock Returns - An Analysis of Select Companies I INTRODUCTION During the past three decades, CAPM (Capital Asset Pricing Model) has been studied in great depth and is used as the standard risk-return model by various researchers and academicians. The basic premise of CAPM is that the stocks with a higher beta yield higher returns for the investors. One of the conditions stipulated in the model is that the said return should be higher than the return of the risk-free asset. But, if the market return falls short of the riskless rate, then stocks with higher betas yield lower returns for the investors. Pettengill, Sundaram, Mathur (1995) call this the conditional (ex-post) relations between beta and return. Their research output concludes that there is a positive and statistically significant relationship between beta and returns. The present paper is a similar attempt based on the work of Pettengill/Sundaram/Mathur (1995). The objective of this research initiative is threefold. First, we compute ‘beta’ (β) for each security with a view to examine the ‘systematic risk’ present in the market with the help of selected sample companies. Secondly, we classify the companies based on the beta coefficient as ‘high-risk’ and ‘low-risk’ based on both daily and monthly returns basis. Finally, we examine whether the risk category of companies undergoes significant changes between monthly and daily returns basis or not. Financial economists have applied...
Words: 4615 - Pages: 19
...“Future where money is only electronic” Son Chunsuparerk Part A : Technological Infrastructure The following key enablers make the future possible Computing form factor: As all financial activities, including day-to-day merchandise will become electronic, the computer form factor will evolve in the way that allows people to carry it anywhere and everywhere. Computers will be smaller, faster, and embedded into human body to facilitate real time communication for financial activities. From history, computer forms have evolved from time to time. From a poor performance computer that filled the entire room to a bulky computer that sat on the entire table, to now being small compact laptop, tablet, and mobile that fit in a tiny pocket. In today’s environment, credit card is a great example how money went partially electronically. The drawback of using a credit card is that of the credit card receiver (eg. credit card is unusable if there is no device to accept). The future will need computers to miniaturize into a small fingertip size, which enables money to seamlessly transfer from one party to another. Credit card receivers will be small enough to fit into a wallet, just like a credit card, and have the functionalities to control over all financial needs just like using cash/check today. Power: In order to keep mobility and minimal form factor, one needs to consider its on power. In the future, power consumption on certain devices will be low, while power...
Words: 2124 - Pages: 9
...Many managers have bought into expensive fictions about compensation, Haveyoul SIX DANGEROUS MYTHS ABOUT PAY BY JEFFREY PFEFFER pays an average C average of $21.^2hourly wage of $18.07. ^^^^ second pays an an hour. Assuming that other directemployment costs, such as benefits, are the same for the two groups, which group has the higher labor eosts^ • • • • An airline is seeking to compete in the low-cost, low-frills segment of the U.S. market where, for obvious reasons, labor productivity and efficiency are crucial for competitive success. The company pays virtually no one on the basis of individual merit or performance. Does it stand a chance of successl • • • • A company that operates in an intensely competitive segment of the software industry does not pay its sales force on commission. Nor does it pay individual bonuses or offer stock options or phantom stock, common incentives in an industry heavily dependent on attracting and retaining scarce programming talent. Would you invest in this company} • • • • ONSIDER TWO GROUPS of Steel miiiimills. One group Every day, organizational leaders confront decisions about pay. Should they adjust the company's compensation system to encourage some set of behaviors? Should they retain consultants to help them implement a performance-based pay system? How large a raise should they authorize? ARTWORK BY CRAIG FRAZIER SIX DANGEROUS MYTHS ABOUT PAY In general terms, these kinds of questions come down to four decisions...
Words: 7368 - Pages: 30
...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem of...
Words: 3125 - Pages: 13
...CHAPTER - XIII POWER SECTOR REFORM IN ORISSA: A CASE STUDY IN RESTRUCTURING As per our Constitution, power industry is the combined responsibility of the Central Government and the State Governments. The ESA (Electricity Supply Act) envisaged three kinds of entities in the power-sector: State Electricity Boards (SEBs), generating companies, and licensees. SEBs are allowed to generate, transmit, and distribute electricity within a state; they enjoy all the powers of a licensee. They account for 65 per cent of the power generated in the country. Generating companies are responsible for supplying power to the grid without the specific responsibility of retail distribution. Major players in this category are NTPC (National Thermal Power Corporation), NHPC (the Hydro-electric analogue of NTPC), and NPCIL (Nuclear Power Corporation of India Limited). Though ESA allowed only the governments to set up generating companies till 1991, thereafter it was de-reserved. Independent Power Producers (IPPs) now fall under this category. Existing licensees are private-sector utilities licensed by a State Government for power generation, distribution, or both within a specified area. For example, Gujarat Industrial Power Corporation is only into generation and Central Electricity Supply Corporation (in Orissa) is confined to distribution, whereas Bombay Suburban Electric Supply Limited (BSES) and Tata Electric Company (TEC) are involved both in generation and distribution. The...
Words: 10051 - Pages: 41
...CompTIA Security+: Get Certified Get Ahead SY0-401 Study Guide Darril Gibson Dedication To my wife, who even after 22 years of marriage continues to remind me how wonderful life can be if you’re in a loving relationship. Thanks for sharing your life with me. Acknowledgments Books of this size and depth can’t be done by a single person, and I’m grateful for the many people who helped me put this book together. First, thanks to my wife. She has provided me immeasurable support throughout this project. The technical editor, Steve Johnson, provided some good feedback throughout the project. If you have the paperback copy of the book in your hand, you’re enjoying some excellent composite editing work done by Susan Veach. I’m extremely grateful for all the effort Karen Annett put into this project. She’s an awesome copy editor and proofer and the book is tremendously better due to all the work she’s put into it. While I certainly appreciate all the feedback everyone gave me, I want to stress that any technical errors that may have snuck into this book are entirely my fault and no reflection on anyone who helped. I always strive to identify and remove every error, but they still seem to sneak in. About the Author Darril Gibson is the CEO of YCDA, LLC (short for You Can Do Anything). He has contributed to more than 35 books as the sole author, a coauthor, or a technical editor. Darril regularly writes, consults, and teaches on a wide variety of technical...
Words: 125224 - Pages: 501
...Case Studies Solutions Case Studies Solutions,Article Writing,Assignments,Research Work,Home Work MenuSkip to content Home How We Work ? Refund Policy How to Order ? Disclaimer Contact Us Finance Cases List POSTED ON MARCH 8, 2013 Hello, If u want us to solve any case study from below list, do contact us anytime, We are here to provide the experience, expertise, and professionalism that you are looking for , Our tutors are available 24/7 to assist you what you need, Click Here to submit your Order. ======================================================================================= Acquisition of Consolidated Rail Corp. by Benjamin C. Esty Airbus A3XX: Developing the World’s Largest Commercial Jet by Benjamin C. Esty American Chemical Corp.by William E. Fruhan, John P. Goldsberry American Home Products Corp.by David W. Mullins AQR’s Momentum Funds by Daniel B. Bergstresser, Lauren H. Cohen, Randolph B. Cohen, Christopher Malloy Arundel Partners: The Sequel Project by Timothy A. Luehrman AXA MONY by Andre F. Perold, Lucy White Beta Management Co. by Michael E. Edleson Butler Lumber Co. by Thomas R. Piper Cartwright Lumber Co.by Thomas R. Piper Citigroup 2007: Financial Reporting and Regulatory Capital by Edward J. Riedl, Suraj Srinivasan Clarkson Lumber Co. by Thomas R. Piper Cooper Industries, Inc. by Thomas R. Piper Cost of Capital at Ameritrade by Erik Stafford, Mark L. Mitchell Debt Policy at UST, Inc. by Mark L. Mitchell Dell’s Working Capital...
Words: 3635 - Pages: 15