Premium Essay

Case Study Irm - Copy

In:

Submitted By SiKuanOh
Words 1243
Pages 5
Case Study
Using Information Technologies at Federal Express
Federal Express, founded in 1971, handles an average of 3 million package-tracking requests every day (http://about.fedex.designcdt.com). To stay ahead in a highly competitive industry, Federal Express focuses on customer service by maintaining a comprehensive Web site, FedEx.com, to assist customers and reduce costs. For example, every request for information is handled at the Web site instead of going to the call center saves roughly $1.87. Federal Express has reported that customer calls have decreased by 83, 000 per day since 2000, which saves the company $57.56 million per year. In addition, each package-tracking costs Federal Express three cents; by using Web site instead of the call center to handle these requests, costs have been reduced from more than $1.36 billion per year to $21.6 million per year. Another technology for improving customer service is Ship Manager, an application installed on customers’ sites so that users can weigh packages, determine shipping charges, and print shipping labels. Customers can also link their invoicing, billing, accounting, and inventory systems to Ship Manager. However, Federal, Express still spends almost $326 million per year on its call center to reduce customers’ frustration when the Web site is down or when customers have difficulty in using it. Federal Express uses customer relationship management software called Clarify in its call centers to make customer service representatives’ jobs easier and more efficient and speed up response time.
Answer the following questions: 1. Is technology alone enough to ensure high-quality customer service? * No. Without properly trained staff technology is worthless. 2. What are Federal Express’s estimated annual savings from using information technology? * $79.16

The love bug virus The Love Bug

Similar Documents

Premium Essay

Tax Paper

...1979 EO CPE Text F. CHURCHES AND OTHER RELIGIOUS ORGANIZATIONS Introduction IRC 501(c)(3) exemption for "religious purposes" has always been a sensitive matter, because the First Amendment sets strict limits on government regulation of religion in any form -- church, sect, denomination, ministry, etc. Some self-proclaimed churches may use the administrative and judicial limitations on Service regulation to hinder our review of their activities. We have always been aware of the possibility of abuse, i.e. hiding non-charitable, non-religious activities under privileged church status. See the 1978 EOATRI textbook topic on Churches, pp. 1-29. Public interest in religious groups (exempt or not) is very keen. There is an increase in the number of "religious" tax-avoidance schemes, e.g., mail order ministries, family churches, vows of poverty, etc. Congress has been investigating Reverend Moon's Unification Church and related organizations for illegal activities. The recent mass suicide at the People's Temple in Jonestown, Guyana, drew international comment and much Congressional interest. And, the press is filled with reports of "brainwashed" disciples and parents "re-kidnapping" their children. The 1978 EOATRI textbook topic on Churches is a good summary of the major problems we encounter in administering the IRC 501(c)(3) "religious purposes" exemption. This discussion is meant to supplement that topic. We intend only to highlight new developments and the increased interest...

Words: 8716 - Pages: 35

Premium Essay

Star Gazer

...Assignment: Improving Security through Layered Security Control Learning Objectives and Outcomes * Analyze the given case study to evaluate how information technology (IT) security can be improved through layered security control. Assignment Requirements Read the text sheet named “Global Access Control Case Study” and prepare a report capturing the following points: * Synopsis of the given case problem * Analysis of the strengths and weaknesses of the steps taken by the organization * Assessment of access control/IT domains given in the business problem for data confidentiality, integrity, and availability * Evaluation of how layered security proved to be a positive solution in the given problem, including the impacts of layered security In addition, your report must also include answers to the following questions: * What is the significance of compliance and financial reporting from an insecure system? * What influence did the risk management process have in Global fulfilling its goals? * What is the significance of remote external access into the Global network? * What are the other tools comparable to the ones used by Global to solve their internal problems? Required Resources * Text sheet: Global Access Control Case Study (ts_globalcasestudy) Submission Requirements * Format: Microsoft Word * Font: Arial, Size 12, Double-Space * Citation Style: APA * Length: 1–2 pages Self-Assessment Checklist ...

Words: 1445 - Pages: 6

Premium Essay

Lenovo

...seriously compromise student learning, as well as the University’s assessment of the effectiveness of that learning and the academic quality of the University’s awards. All breaches of academic integrity are taken seriously and could result in penalties including failure in the course and exclusion from the University. Students should be aware that the University uses text-matching software to safeguard the quality of student learning and that your assignment will be checked using this software. I acknowledge and agree that the examiner of this assessment item may, for the purpose of marking this assessment item: reproduce this assessment item and provide a copy to another Griffith staff member; and/ submit this assessment item to a text-matching service. This web-based service will retain a copy of this assessment item for checking the work of other students, but will not reproduce it in any form. Examiners will only award marks for work within this assignment that is your own original work. I, hereby certify that: except where I have indicated, this assignment is my own work, based on my...

Words: 1836 - Pages: 8

Premium Essay

Hi World

...suggestions by Malcolm Baker, Andor Gy¨rgy, Owen Lamont, o Masahiro Watanabe, Jeff Wurgler and seminar participants at the NBER Behavioral Finance Spring Meeting, the University of Mannheim, the 2011 European Financial Management Association meetings, the 2011 European Finance Association meetings, the CEPR European Summer Symposium on Financial Markets and HEC Lausanne. Boris Vall´e provided excellent research assistance. Thesmar e thanks the HEC Foundation for financial support. Corresponding Author: Philipp Kr¨ger. Email: u philipp.krueger@unige.ch, Telephone: +41 (0)22 379 85 69. Augustin Landier, augustin.landier@tsefr.eu, Telephone: +33 (0)5 61 12 86 88. David Thesmar, thesmar@hec.fr, Telephone: +33 (0)1 39 67 94 12. 1 Electronic copy available at: http://ssrn.com/abstract=1764024 The WACC Fallacy: The Real Effects of Using a Unique Discount Rate Abstract We document investment distortions induced by the use of a single discount rate within firms. According to textbook capital budgeting, firms should value any project using a discount rate determined by the risk characteristics of the project. If they use a unique company-wide discount rate, they overinvest (resp. underinvest) in divisions with a market beta higher (resp. lower) than the firm’s core industry beta. We directly test this consequence of the “WACC fallacy” and establish a robust and significant positive relationship between division-level investment and the spread between the division’s market beta and the...

Words: 18677 - Pages: 75

Free Essay

Brand Guidelines

...London 3 Welcome to VisitEngland’s brand guidelines Introduction 05_ VisitEngland’s mission 06_ Guidelines and their use 07_ About VisitEngland 4 Elements 09_ The VisitEngland logo 10_ Logo size 11_ Logo don’ts 12_ Logo colourways 13_ Logo exclusion zone 14_ Logo usage 15_ Graphic device 16_ Transparent rose 17_Working with other logos 18_ VisitEngland colours 19_ Subject area colours 20_ Everyday typeface 21_ Printed typeface 22_ Photography 24_ Photography do’s 25_ Photography don’ts 26_ Supporting devices 27_ House style 28_ Corporate responsibility Templates 31_ PowerPoint 35_ Generic cover design 37_ Briefing documents 39_ Letterhead & compliments slip 41_ Certificate 43_ E–Communications 46_ Business cards 48_ Case study/Best Practice Guide 51_ A5 flyer 53_ A4 booklet 55_ Business documents 57_ Layout grid 59_ Banner stands Appendix 61_ VisitEngland brand hierarchy Anthony Gormley sculptures at Crosby beach, Merseyside Contact Details VisitEngland’s mission | Brand guidelines | 05 5 VisitEngland will lead and drive forward the quality, competiveness and sustainable growth of England’s visitor economy by providing strategic direction, intelligence and coordinated marketing for the sector. Through partnership and collaborative activities we will support our partners at national and local levels to deliver excellent visitor experiences, achieve economic growth and increase investment and employment. Guidelines and their use | Brand guidelines...

Words: 6293 - Pages: 26

Premium Essay

Accounting in Business

...Chapter 1 Accounting in Business QUESTIONS 1. The purpose of accounting is to provide decision makers with relevant and reliable information to help them make better decisions. Examples include information for people making investments, loans, and business plans. 2. Technology reduces the time, effort, and cost of recordkeeping. There is still a demand for people who can design accounting systems, supervise their operation, analyze complex transactions, and interpret reports. Demand also exists for people who can effectively use computers to prepare and analyze accounting reports. Technology will never substitute for qualified people with abilities to prepare, use, analyze, and interpret accounting information. 3. External users and their uses of accounting information include: (a) lenders, to measure the risk and return of loans; (b) shareholders, to assess whether to buy, sell, or hold their shares; (c) directors, to oversee their interests in the organization; (d) employees and labor unions, to judge the fairness of wages and assess future employment opportunities; and (e) regulators, to determine whether the organization is complying with regulations. Other users are voters, legislators, government officials, contributors to nonprofits, suppliers and customers. 4. Business owners and managers use accounting information to help answer questions such as: What resources does an organization own? What debts are owed? How much income is earned? Are expenses reasonable...

Words: 6181 - Pages: 25

Premium Essay

Accounting

...Chapter 1 Introducing Financial Accounting QUESTIONS 1. The purpose of accounting is to provide decision makers with relevant and reliable information to help them make better decisions. Examples include information for people making investments, loans, and business plans. 2. Technology reduces the time, effort, and cost of recordkeeping. There is still a demand for people who can design accounting systems, supervise their operation, analyze complex transactions, and interpret reports. Demand also exists for people who can effectively use computers to prepare and analyze accounting reports. Technology will never substitute for qualified people with abilities to prepare, use, analyze, and interpret accounting information. 3. External users and their uses of accounting information include: (a) lenders, to measure the risk and return of loans; (b) shareholders, to assess whether to buy, sell, or hold their shares; (c) directors, to oversee their interests in the organization; (d) employees and labor unions, to judge the fairness of wages and assess future employment opportunities; and (e) regulators, to determine whether the organization is complying with regulations. Other users are voters, legislators, government officials, contributors to nonprofits, suppliers and customers. 4. Business owners and managers use accounting information to help answer questions such as: What resources does an organization own? What debts are owed? How much income is earned? Are...

Words: 6481 - Pages: 26

Premium Essay

Professor

...Control Conte nts Pref ace to the New Edition The Cost Manager’s Toolkit – PDA-size Summary 1 GOOD COST MANAGEMENT The Unsung Hero Cheaper and Better Managing and Cutting Costs – Intelligently 2 COST LEADERSHIP A Challenging Base Case Indiv idual Accountability Persistence A Continuous Improv ement Culture Short Timef rames Feedback Loops Strategic Skepticism Top Team: Finance Top Team: Human Resources Role Models Toolkit – Cost Leadership 3 TECHNIQUES AND TACTICS Understanding Cost Dy namics Management Accounts and Metrics Bang f or Buck Slice and Dice Understanding Natural Cost Trends Cash Cost Not P&L Cost Best Practice (and Lev el Play ing Fields) Competitiv e Analy sis Toolkit – Techniques and Tactics 4 PEOPLE Why Is People Cost So Problematic? Hiring Pay ing Technology and Productiv ity Firing Managing the Av erage Perf ormer Minimizing the Core Organization Toolkit – People 5 SUPPLIERS Who Manages Supplier Costs? Understand the Balance of Power Consolidate to Fewer Better Suppliers Negotiate Intelligently Don’t Get Locked In Manage Total Cost of Ownership Get Tough on the Costs of Serv ices Toolkit – Suppliers 6 COST CUTTING CASE STUDY Month 1 Month 2 Month 3 Month 4 7 WIRED AND GLOBAL The Internet Globalization Toolkit – Wired and Global 8 LATERAL THINKING Indirect Cost Generators Let the Customers Do the Work Cost into Rev enue Toolkit – Lateral Thinking ...

Words: 63341 - Pages: 254

Premium Essay

Swatch

...Harvard Business School 9-400-087 June 12, 2000 Rebirth of the Swiss Watch Industry, 1980–1992 (A) “Time is fast running out for the ailing Swiss watch industry.”1 —The Globe and Mail By the end of 1983, Hayek Engineering, a Swiss consulting firm founded by chairman and CEO Nicolas Hayek, was becoming increasingly involved in solving the mounting problems facing the Swiss watch industry, which was on the brink of disaster. Hayek Engineering had initially been recruited by the creditors of the two largest Swiss watchmakers, ASUAG (Allgemeine Schweizerische Uhrenindustrie AG) and SSIH (Societe Suisse pour L’Industrie Horlogere), to formulate a strategy to deal with changing market conditions in 1981. Since then the firm’s involvement with the industry had grown steadily. The firm’s influence had also been increasing since earlier that year, when the banks had agreed with its recommendation that SSIH and ASUAG merge. Although Hayek Engineering was acting as a consultant, Nicolas Hayek, its CEO, would come to have a significant role in supervising the merger and in helping to lead the newly-formed company forward. With the formalities of the merger completed, in December 1983, the new company and its consultants were confronted with a number of new issues. The company faced restructuring challenges and management shifts. But more importantly, it still faced the foreign competition that had decimated the Swiss presence in the inexpensive and middle-range watch...

Words: 6369 - Pages: 26

Premium Essay

Human Resource

...International Human Resource Management | Module Tutor – Chris Collins | | | The Human Resource Management in three countries, with distinctive cultural context activities (India, Pakistan and China). Approx – 5ooo words | Deepen Gurung : u0976207 | 12/16/2010 | | IHRM 2010/11 CONTENT INTROODUCTION .............................................................................................................. 3 .*Figure 1. Typical structure of HR function in a Med-size Org ..................................... 4 .*Figure 2. Typical structure of HR department in Large-size firm ................................ 5 .* Objectives of HRM .......................................................................................................... 5 .*Table 3. Div. Of Responsibility for HR activities ........................................................... 7 .*Indian Implementation of HRM Practices ...................................................................... 8 .*Selection ........................................................................................................................... 8 .*Selection Process..................................................

Words: 5581 - Pages: 23

Premium Essay

Management of Risk

...RISK MANAGEMENT – AN AREA OF KNOWLEDGE FOR ALL ENGINEERS A Discussion Paper By: Paul R. Amyotte, P.Eng.1 & Douglas J. McCutcheon, P.Eng.2 Chemical Engineering Program Department of Process Engineering & Applied Science Dalhousie University Halifax, Nova Scotia, Canada B3J 2X4 2 1 Industrial Safety & Loss Management Program Faculty of Engineering University of Alberta Edmonton, Alberta, Canada T6G 2G6 Prepared For: The Research Committee of the Canadian Council of Professional Engineers October 2006 SUMMARY The purpose of this paper is to “seed” the discussion by the Research Committee of the Canadian Council of Professional Engineers (CCPE) on the topic of risk management. The paper is in part a research paper and in its entirety a position paper. As can be inferred from the title, the authors hold the firm opinion that risk management is an area of knowledge with which all engineers should have familiarity and a level of competence according to their scope of practice. The paper first makes the distinction between hazard and risk. The two terms are often used interchangeably when in fact they are quite different. A hazard is a chemical or physical condition that has the potential to cause harm or damage to people, environment, assets or production. Risk, on the other hand, is the possibility or chance of harm arising from a hazard; risk is a function of probability and severity of consequences. A description of the process of risk management is then given....

Words: 14427 - Pages: 58

Premium Essay

Risk Management

...Butterworth-Heinemann is an imprint of Elsevier Linacre House, Jordan Hill, Oxford OX2 8DP, UK 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA First edition 2009 Copyright © 2009 Elsevier Ltd. All rights reserved No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means electronic, mechanical, photocopying, recording or otherwise without the prior written permission of the publisher Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone (144) (0) 1865 843830; fax (144) (0) 1865 853333; email: permissions@elsevier.com. Alternatively you can submit your request online by visiting the Elsevier web site at http://elsevier.com/locate/permissions, and selecting Obtaining permission to use Elsevier material Notice No responsibility is assumed by the publisher for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions or ideas contained in the material herein. Because of rapid advances in the medical sciences, in particular, independent verification of diagnoses and drug dosages should be made. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloguing in Publication Data A catalog record for this book is available from the Library of Congress ISBN–13:...

Words: 89973 - Pages: 360

Premium Essay

Csr - Literature Review

...satisfy various stakeholders, corporate social responsibility has increased its importance and often constitutes a substantial part of the firms´ financial reports, in spite of the fact that there are no legal requirements. However, to perform strategic CSR-reporting has become more or less compulsory for firms. The research question is: What research has been performed in the area of corporate social responsibility and accounting? Aim: The aim is to provide a structured overview of the literature in the area of corporate social responsibility and accounting regarding the years 2002-2012. The overview will provide a basis for future research and constitute a framework for focused research question. Delimitation: The focus of this study is on research published in scientific journals from 2002 until 2012. Method: A literature review was performed including peer-reviewed papers published in scientific journals. Database search were performed in Business Source Premier (BSP) with the keywords “Corporate social responsibility” and “accounting”, and the time limit was set to 2002-2012. Results and conclusions: The main result is shown in Table A1, which presents the structured overview and the categorization. All papers treated stakeholder theory showing that...

Words: 13899 - Pages: 56

Premium Essay

Security

...www.GetPedia.com National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...

Words: 93588 - Pages: 375

Premium Essay

The Handbook

...National Institute of Standards and Technology Technology Administration U.S. Department of Commerce An Introduction to Computer Security: The NIST Handbook Special Publication 800-12 User Issues Assurance Contingency Planning I&A Training Personnel Access Controls Audit Planning Risk Management Crypto Physical Security Policy Support & Operations Program Management Threats Table of Contents I. INTRODUCTION AND OVERVIEW Chapter 1 INTRODUCTION 1.1 1.2 1.3 1.4 1.5 Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Important Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made...

Words: 93564 - Pages: 375