...------------------------------------------------- Chapter 2—The External Environment: Opportunities, Threats, Industry Competition, and Competitor Analysis TRUE/FALSE 1. The health-related concerns in the general environment facing Philip Morris International are part of the physical segment. ANS: F PTS: 1 DIF: Medium REF: 36 OBJ: 02-01 TYPE: comprehension NOT: AACSB: Ethical & Legal understanding | Management: Ethical Responsibilities | Dierdorff & Rubin: Managing the task environment 2. The external environment facing business stays relatively constant over time. ANS: F PTS: 1 DIF: Easy REF: 34-35 OBJ: 02-01 TYPE: comprehension NOT: AACSB: Business Knowledge & Analytical Skills | Management: Environmental Influence | Dierdorff & Rubin: Managing the task environment 3. Demographic, economic, political/legal, sociocultural, technological, global, and physical are the seven elements comprising the industry environment. ANS: F PTS: 1 DIF: Hard REF: 38 (Table 2.1) OBJ: 02-02 TYPE: knowledge NOT: AACSB: Business Knowledge & Analytical Skills | Management: Environmental Influence | Dierdorff & Rubin: Managing the task environment 4. Firms can directly control the elements of the seven segments of the general environment. ANS: F PTS: 1 DIF: Easy REF: 37 OBJ: 02-01 TYPE: comprehension NOT: AACSB: Business Knowledge...
Words: 12939 - Pages: 52
...C H A P T E R Organizational Culture Learning Objectives After reading this chapter, you should be able to: • Describe the elements of organizational culture. • Discuss the importance of organizational subcultures. • List four categories of artifacts through which corporate culture is communicated. • Identify three functions of organizational culture. • Discuss the conditions under which cultural strength improves corporate performance. • Discuss the effect of organizational culture on business ethics. • Compare and contrast four strategies for merging organizational cultures. • Identify five strategies to strengthen an organization’s culture. 16 S I X T E E N 496 T o an outsider, PeopleSoft is one of the loopiest places on the planet. The Pleasanton, California, business management software company has nerf ball shootouts and minigolf tournaments in the hallways. Dress-down day is every day of the week. A white collar is usually a T-shirt. The bagels and gourmet coffee are free. Having fun is so ingrained that many employees—called PeoplePeople—say it’s the best place to have a bad day. PeopleSoft also values egalitarianism— treating everyone with respect and minimal status differences. Executives don’t have secretaries, special perks, or grandiose offices. “Don’t kiss up and slap down,” PeopleSoft cofounder Dave Duffield reminds everyone. In other words, give the bagel delivery guy the same respect as the company president. PeopleSoft is also extreme on...
Words: 12145 - Pages: 49
...McShane−Von Glinow: Organizational Behavior, Second Edition Part Four Organizational Processes Organizational Culture © The McGraw−Hill Companies, 2002 C H A P T E R 15 Organizational Culture AFTER READING THIS CHAPTER , YOU SHOULD BE ABLE TO : Learning Objectives I Describe the elements of organizational culture. I Discuss the importance of organizational subcultures. I List four categories of artifacts through which corporate culture is communicated. I Identify three functions of organizational culture. I Discuss the conditions under which cultural strength improves corporate performance. I Discuss the effect of organizational culture on business ethics. I Compare and contrast four strategies for merging organizational cultures. I Identify five strategies to strengthen an organization’s culture. McShane−Von Glinow: Organizational Behavior, Second Edition Part Four Organizational Processes Organizational Culture © The McGraw−Hill Companies, 2002 C arly Fiorina is taking Hewlett-Packard back to the future by reformulating the California-based technology company’s legendary culture, known as the H-P Way. “The H-P Way is about innovation; trust and respect and integrity; contribution to community; and performance,” says Fiorina, H-P’s first CEO hired from outside the company. The problem, she argues, is that employees have distorted these values over the years. “The H-P Way has been misinterpreted and twisted as a gentle bureaucracy...
Words: 12594 - Pages: 51
...AUDITING THEORY TESTBANKS / REVIEWERS 1. When an auditor believes that an understanding with the client has not been established, he or she should ordinarily a. Perform the audit with increase professional skepticism. b. Decline to accept or perform the audit. c. Assess control risk at the maximum level and perform a primarily substantive audit. d. Modify the scope of the audit to reflect an increased risk of material misstatement due to fraud. 2. An auditor should design the written audit program so that a. All material transactions will be selected for substantive testing. b. Substantive tests prior to the balance sheet date will be minimized. c. The audit procedures selected will achieve specific audit objectives. d. Each account balance will be tested under either tests of controls or tests of transactions. 3. Which of the following fraudulent activities most likely could be perpetrated due to the lack of effective internal controls in the revenue cycle? a. Fictitious transactions may be recorded that cause an understatement of revenues and overstatement of receivables. b. Claim received from customers for goods returned may be intentionally recorded in other customer’s accounts. c. Authorization of credit memos by personnel who receive cash may permit the misappropriation of cash. d. The failure to prepare shipping documents may cause an overstatement of inventory balances. 4. Accepting an engagement to examine an entity’s financial...
Words: 24671 - Pages: 99
...AUDITING THEORY TESTBANKS / REVIEWERS 1. When an auditor believes that an understanding with the client has not been established, he or she should ordinarily a. Perform the audit with increase professional skepticism. b. Decline to accept or perform the audit. c. Assess control risk at the maximum level and perform a primarily substantive audit. d. Modify the scope of the audit to reflect an increased risk of material misstatement due to fraud. 2. An auditor should design the written audit program so that a. All material transactions will be selected for substantive testing. b. Substantive tests prior to the balance sheet date will be minimized. c. The audit procedures selected will achieve specific audit objectives. d. Each account balance will be tested under either tests of controls or tests of transactions. 3. Which of the following fraudulent activities most likely could be perpetrated due to the lack of effective internal controls in the revenue cycle? a. Fictitious transactions may be recorded that cause an understatement of revenues and overstatement of receivables. b. Claim received from customers for goods returned may be intentionally recorded in other customer’s accounts. c. Authorization of credit memos by personnel who receive cash may permit the misappropriation of cash. d. The failure to prepare shipping documents may cause an overstatement of inventory balances. 4. Accepting an engagement to examine...
Words: 24670 - Pages: 99
...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...
Words: 204343 - Pages: 818
...Continuing Personal and Professional Development 2 CONTINUING PERSONAL AND PROFESSIONAL DEVELOPMENT AT UCL Contents: 1. Introduction 2. The CPD Context 3. UCL Support 4. Feedback and Appraisal 5. The CPD Cycle and Where to Start 6. Evaluation and Impact 7. Recording Your Learning and Development 8. A CPD Portfolio 9. Conclusion Appendix 1 Approaches to Learning and Development Appendix 2 Tools to Help With Portfolio Development Appendix 3 A Change of Career Appendix 4 Learning Styles Appendix 5 Definitions Appendix 6 Continuing Professional Development Record Appendix 7 Basic Principles of CVs And Applications Appendix 8 Resources 3 CONTINUING PERSONAL AND PROFESSIONAL DEVELOPMENT AT UCL 1. INTRODUCTION PURPOSE: This document is intended to provide staff at UCL with a clear understanding of continuing professional development (CPD), and its importance, within the context of UCL. It is also intended to encourage equality of opportunity by encouraging everyone to plan their development and record their skills. The guide will act as a transportable toolkit to help with the planning and recording of your personal and professional development. It should be used in conjunction with any continuing professional development (CPD) related specifically to your profession or professional registration. The guide also explains why you should record your learning and development, and how to do it. WHAT IS CPD? The Chartered Institute of Personnel and Development...
Words: 7702 - Pages: 31
...BooK 1 ETHICAL AND PROFESSIONAL STANDARD S, QuANTITATIVE METHODS, AND EcoNOMics - Readings and Learning Outcome Statements .......................................................... 6 Study Session 1 - Ethical and Professional Standards ............................................ 13 Study Session 2 - Ethical and Professional Standards: Application Self-Test - Ethical and Professional Standards ....................... 110 128 138 256 262 339 344 349 358 ..................................................... Study Session 3 - Quantitative Methods for Valuation Self-Test - Quantitative Methods for Valuation Study Session 4 - Economics for Valuation Self-Test - Economics for Valuation Formulas ........................................ ................................................... ......................................................... .................................................................... ............................................................................................................ Appendices Index ........................................................................................................ ................................................................................................................. SCHWESERNOTES™ 2013 CFA LEVEL II BOOK 1: ETHICAL AND PROFESSIONAL STANDARDS, QUANTITATIVE METHODS, AND ECONOMICS ©20 12 Kaplan, Inc. All rights reserved. Published in 20 12 by...
Words: 90434 - Pages: 362
...MICHAEL J. RABINS Texas A&M University Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Engineering Ethics: Concepts and Cases, Fourth Edition Charles E. Harris, Michael S. Pritchard, and Michael J. Rabins Acquisitions Editor: Worth Hawes Assistant Editor: Sarah Perkins Editorial Assistant: Daniel Vivacqua Technology Project Manager: Diane Akerman Marketing Manager: Christina Shea Marketing Assistant: Mary Anne Payumo Marketing Communications Manager: Tami Strang Project Manager, Editorial Production: Matt Ballantyne Creative Director: Rob Hugel Art Director: Cate Barr Print Buyer: Paula Vang Permissions Editor: Mardell Glinski-Schultz Production Service: Aaron Downey, Matrix Productions Inc. Copy Editor: Dan Hays Cover Designer: RHDG/Tim Heraldo Cover Image: SuperStock/Henry Beeker Compositor: International Typesetting and Composition c 2009, 2005 Wadsworth, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact...
Words: 48169 - Pages: 193
...CHAPTER 3 CO M P U TE R A N D I NT E R N E T C R IME QUOTE In view of all the deadly computer viruses that have been spreading lately, Weekend Update would like to remind you: when you link up to another computer, you’re linking up to every computer that that computer has ever linked up to. —Dennis Miller, Saturday Night Live, U.S. television show VIGNETTE Treatment of Sasser Worm Author Sends Wrong Message Unleashed in April 2004, the Sasser worm hit IT systems around the world hard and fast. Unlike most computer viruses before it, the Sasser worm didn’t spread through e-mail, but moved undetected across the Internet from computer to computer. It exploited a weakness in Microsoft Windows XP and Windows 2000 operating systems. By the first weekend in May, American Express, the Associated Press, the British Coast Guard, universities, and hospitals reported that the Sasser worm had swamped their systems. Computer troubles led Delta Airlines to cancel 40 flights and delay many others. Microsoft quickly posted a $250,000 reward, and by mid-May, authorities apprehended Sven Jaschen, a German teenager. Jaschen confessed and was convicted after a three-day trial. Jaschen could have received up to five years in prison, but because he was tried as a minor, the court suspended his 21-month sentence, leaving him with only 30 hours of community service. Copyright © 2007 by Thomson Course Technology. All rights reserved. This publication is protected by federal copyright...
Words: 18526 - Pages: 75
...Exam : 312-50 Title : Ethical Hacker Certified Ver : 02-23-2009 312-50 QUESTION 1: What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. QUESTION 2: What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. QUESTION 3: Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer:...
Words: 34575 - Pages: 139
...existing system. One of those businesses is the Dory’s Restaurant that until now is using a manual in their Sales and Inventory System. Inventory system is used to track information of a particular goods or product it monitors the product left and the product that need to restock. Sales is important in the business, because it involves the money that goes in for the company, sales is the business asset and the customer business deals. Dory’s Restaurant is located at Jordan Plains Sta. Monica Quezon City Dory’s restaurant is the most in demand restaurant in their place because they always assure the good quality of their service to their customer. Dory’s Restaurant has lots of branches Nationwide. The owner of the said restaurant is Mr. Acme Wong a Chinese businessman, the restaurant is selling different kind of menus every...
Words: 18918 - Pages: 76
...Commonwealth University JOHN WILEY & SONS, INC. VICE PRESIDENT & PUBLISHER SENIOR ACQUISITIONS EDITOR PROJECT EDITOR ASSOCIATE EDITOR SENIOR EDITORIAL ASSISTANT PRODUCTION MANAGER PRODUCTION EDITOR MARKETING MANAGER CREATIVE DIRECTOR SENIOR DESIGNER PRODUCTION MANAGEMENT SERVICES SENIOR ILLUSTRATION EDITOR PHOTO EDITOR MEDIA EDITOR COVER PHOTO George Hoffman Michael McDonald Brian Kamins Sarah Vernon Jacqueline Kepping Dorothy Sinclair Erin Bascom Karolina Zarychta Harry Nolan Wendy Lai Laserwords Maine Anna Melhorn Elle Wagner Greg Chaput Maciej Frolow/Brand X/Getty Images, Inc. This book was set in 10/12pt Garamond by Laserwords Private Limited, and printed and bound by RR Donnelley/Jefferson City. The cover was printed by RR Donnelley/Jefferson City. This book is printed on acid free paper. Founded in 1807, John Wiley & Sons, Inc. has been a valued source of knowledge and understanding for more than 200 years, helping people around the world meet their needs and fulfill their aspirations. Our company is built on a foundation of principles that include responsibility to the communities we serve and where we live and work. In 2008, we launched a Corporate Citizenship Initiative, a global effort to address the environmental, social, economic, and ethical challenges we face in our business. Among the issues we are addressing are carbon impact, paper specifications and procurement, ethical conduct within our business and among our vendors...
Words: 241803 - Pages: 968
...U.N. Commission on Life Saving Commodities for Women and Children: Country Case Studies May 2012 This is a working document. It has been prepared to facilitate the exchange of knowledge and to stimulate discussion. The findings, interpretations, and conclusions expressed in this paper are those of the authors and do not necessarily reflect the policies or views of the United Nations Commission on Life-Saving Commodities for Women and Children or the United Nations. The text has not been edited to official publication standards, and the Commission accepts no responsibility for errors. The designations in this publication do not imply an opinion on legal status of any country or territory, or of its authorities, or the delimitation of frontiers. Contributors and Acknowledgements Sarah Blake,1 Aubrey Cody,1 Anjali Kaur,1 Nejla Liias, 1 Christopher Lindahl,2 Emily Bell,1 Julie Kragh,1 Jessica Mack,1 and Kristin Cox Mehling1 served as researchers and authors of this working paper. The authors would like to thank the following individuals for their contributions to the development and conceptualization of these case studies: Oliver Sabot Hans Hogerzeil Patricia Mechael Catherine Taylor Kanika Bahl Julia White Kabir Ahmed Mark Young Renee van de Weerdt Deborah Armbruster Jennifer Lockwood-Bergeson Michael Mbizvo Clinton Health Access Initiative Groningen University mHealth Alliance PATH Results for Development Institute UN Secretariat UNFPA UNICEF UNICEF USAID USAID WHO ...
Words: 60793 - Pages: 244
...B2B Brand Management Philip Kotler ´ Waldemar Pfoertsch B2B Brand Management With the Cooperation of Ines Michi With 76 Figures and 7 Tables 12 Philip Kotler S. C. Johnson & Son Distinguished Professor of International Marketing Kellogg School of Business Northwestern University 2001 Sheridan Rd. Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Waldemar Pfoertsch Professor International Business Pforzheim University Tiefenbronnerstrasse 65 75175 Pforzheim, Germany waldemar.pfoertsch@pforzheim-university.de ISBN-10 3-540-25360-2 Springer Berlin Heidelberg New York ISBN-13 978-3-540-25360-0 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2006930595 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered...
Words: 104254 - Pages: 418