...Alonzi Dominican University Robert Irons Dominican University Abstract The recent financial crisis offers instructors rich material for business programs regarding the relations between accounting, business law, economics, and finance, as well as ethical issues. This paper offers a concrete approach to developing a business capstone course built around the financial crisis and the lessons it offers business students. Complete pedagogical modules are offered for each discipline, including suggestions for specific assignments in each discipline. Key Words: Capstone Course, Banking Crisis, Pedagogy Centering the Business Capstone Course, Pate 1 Research in Higher Education Journal INTRODUCTION A capstone course is essential in the business school curriculum. It provides each student the time to refresh their grasp of and to hone their ability to apply the principles, tools, and methods of the fields comprising the business curriculum. Further, it gives students the opportunity to integrate the insights of the various fields. The effectiveness of the capstone course can be enhanced by centering the capstone course on the 2008 financial crisis. All students share the common experience of the 2008 crisis’s violent shaking of the economy. It immediately affected each of their pocketbooks and continues to do so today, as well as their expectations for their futures. This common experience with the financial crisis provides a rich context for framing the illustrations of the principles...
Words: 10514 - Pages: 43
...CHAPTER 8 IMPORTING, EXPORTING, AND SOURCING SUMMARY A company’s first business dealings outside the home country often take the form of exporting or importing. Companies should recognize the difference between export marketing and export selling. By attending trade shows and participating in trade missions, company personnel can learn a great deal about new markets. Governments use a variety of programs to support exports, including tax incentives, subsidies, and export assistance. Governments also discourage imports with a combination of tariffs and nontariff barriers. A quota is one example of a nontariff barrier. Export-related policy issues include the status of foreign sales corporations (FSCs) in the United States, Europe’s Common Agricultural Policy (CAP), and subsidies. Governments establish free trade zones and special economic zones to encourage investment. The Harmonized Tariff System (HTS) has been adopted by most countries that are actively involved in export-import trade. Single-column tariffs are the simplest; two-column tariffs include special rates such as those available to countries with normal trade relations (NTR) status. Governments can also impose special types of duties. These include antidumping duties imposed on products whose prices government officials deem too low and countervailing duties to offset government subsidies. Key participants in the export-import process include foreign purchasing agents, export brokers, export merchants...
Words: 8210 - Pages: 33
...White Collar Crimes: How Does It Affect Businesses? Shari M. Lewis Strayer University (Online) Table of Contents ABSTRACT 3 INTRODUCTION 4 Introduction to the Problem 4 Background of the Study 4 Statement of the Problem 4 Purpose of the Research 5 Research Questions 5 Significance of the Research 5 LITERATURE REVIEW 7 CONCLUSION AND RECOMMENDATIONS 19 ABSTRACT This paper investigates White Collar Crime (“WCC) in society and the affects it has on businesses in today’s society, the cost and statistics involved with white collar crime and the difference in how white collar crime and street crimes are dealt with. While white collar crime has existed for many decades, I have conducted research regarding the definition of white collar crime, the history of white collar crime, the different types of white collar crime that affect businesses directly and indirectly, goals of white collar crime, fraud statistics and the cost factors related to white collar crime. White collar crimes and business ethics play hand in hand with one another and often cross the line with one another into criminal behavior. White collar crimes have played a very instrumental part in our downward economy over the past five years, and the level of trust given by society to corporations and employers entrusted with their life earnings has changed dramatically. My research will include factors that contribute to this problem and how white collar crime affects...
Words: 6980 - Pages: 28
...., Health, Psychological & Sociological , Cellular Technology & History , Moral & Sociological DeVry University LAS432 Society, Ethics, and Technology Abstract The following paper will discuss the psychological and sociological impact of cellular technology. Cellular technology has seen rapid growth in technology and in personal use. Texting has now become the dominant means of communication and actual conversation skills are diminishing. Exposure to electromagnetic radiation emitted from cellular devices has become a concern and is being studied from many various angles to determine actual health risks from cell phone use. Whether it is for personal or business use, the cell phone has become a permanent fixture in our lives, could have potential health risks, and can become an addiction if necessary steps are not taken to control use and dependency. Cellular Technology and Society Today At any store they are visible. They have their hand plastered to their ear or they are seemingly talking to no one. These are the cellphone users. Hayley Tsukayama, a writer for the Washington post asserts that according to the Pew Internet and Life Project only seventeen percent of Americans still have a land line and ninety percent own a cellphone. (Tsukayama, 2014) The largest contributor to this trend is convenience. Most cellular devices are small and easily portable, allowing the user to move around freely. The ability to be in contact on the road, at work, or out having...
Words: 19048 - Pages: 77
...[pic] Table of Contents Executive Summary 2-6 External Analysis 7-13 Internal A ,mnalysis 14-17 Functional Analysis 18-21 Business-Level Strategy 22-24 Corporate Level Strategy 25-27 Strategy Implementation 28-30 References 31 Executive Summary A Customer’s Hope Eli Lilly and Company is on a mission that benefits millions of people every day by helping them live longer and fuller lives. They provide their customers with answers that matter—life saving and enhancing medicines. They carry out this mission by discovering, developing, and marketing pharmaceutical therapies. Many of the pharmaceutical products Lilly brings to market are first-in-class, providing customers a therapeutic relief that did not exist. An example of this is their newly FDA-cleared drug, Xigris™, which helps thousands of people every day by treating the potentially fatal condition of sepsis. The Lilly research team persevered over two decades to bring Xigris™ to fruition, even when over ten other companies failed to produce a viable drug remedy for sepsis (Eli Lilly Annual Report 2001). This dedication truly exemplifies Lilly’s commitment to their customers and transcends into all their efforts. Eli Lilly continues to be a successful pharmaceutical company, while other pharmaceutical companies have seen their success erode, because of the strategies they employ. Lilly has focused on building partnerships rather than acquisitions...
Words: 11111 - Pages: 45
...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Case Study: Critical Controls that Could Have Prevented Target Breach In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. AD Copyright SANS Institute Author Retains Full Rights Case Study: Critical Controls that Could Have Prevented Target Breach GIAC (GSEC) Gold Certification Author: Teri Radichel, teri@radicalsoftware.com Advisor: Stephen Northcutt Accepted: August 5th 2014 Abstract In December 2013 over 40 million credit cards were stolen from nearly 2000 Target stores by accessing data on point of sale (POS) systems. This paper will explore known issues in the Target breach and consider some of the Critical Controls that could have been used to both prevent this breach and mitigate losses. From what is known about the Target breach, there were multiple factors that led to data loss: vendors were subject to phishing attacks, network segregation was lacking, point of sale systems were vulnerable to memory scraping malware and detection strategies employed by Target failed. A possible...
Words: 8983 - Pages: 36
...(Chapters 7–17) Part 4: Extending Marketing (Chapters 18–20) 4 Marketing Information to Gain Managing Customer Insights Chapter Preview In this chapter, we continue our exploration of how marketers gain insights into consumers and the marketplace. We look at how companies develop and manage information about important marketplace elements: customers, competitors, products, and marketing programs. To succeed in today’s marketplace, companies must know how to turn mountains of marketing information into fresh customer insights that will help them deliver greater value to customers. Let’s start with a good story about marketing research and customer insights in action at P&G, one of the world’s largest and most re- spected marketing companies. P&G makes and markets a who’s who list of consumer megabrands, including the likes of Tide, Crest, Bounty, Charmin, Puffs, Pampers, Pringles, Gillette, Dawn, Ivory, Febreze, Swiffer, Olay, Cover Girl, Pantene, Scope, NyQuil, Duracell, and dozens more. The company’s stated purpose is to provide products that “improve the lives of the world’s consumers.” P&G’s brands really do create value for consumers by solving their problems. But to build meaningful relationships with customers, you first have to understand them and how they connect with your brand. That’s where marketing research comes in. P&G: Deep Customer Insights Yield Meaningful Customer Relationships C reating customer value. Building meaningful customer...
Words: 26161 - Pages: 105
...1 Table of Contents Executive Summary ............................................................................................... 3 Intro ...................................................................................................................... 4 Issues & Outlook Profile ......................................................................................... 6 Mission and Strategy ........................................................................................................................................ 6 Key Issues .............................................................................................................. 8 Slow to Innovate ................................................................................................................................................. 8 PC Market in Decline ........................................................................................................................................ 8 Mobile Device’s Poor Performance ............................................................................................................ 9 The External Environment .................................................................................... 10 PESTEL Analysis ............................................................................
Words: 8505 - Pages: 35
...Association for Public Policy Analysis and Management With Consent of the Governed: SEC's Formative Years Author(s): Thomas K. McCraw Source: Journal of Policy Analysis and Management, Vol. 1, No. 3 (Spring, 1982), pp. 346-370 Published by: Wiley on behalf of Association for Public Policy Analysis and Management Stable URL: http://www.jstor.org/stable/3324354 . Accessed: 02/10/2013 10:25 Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at . http://www.jstor.org/page/info/about/policies/terms.jsp . JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org. . Wiley, Association for Public Policy Analysis and Management, John Wiley & Sons are collaborating with JSTOR to digitize, preserve and extend access to Journal of Policy Analysis and Management. http://www.jstor.org This content downloaded from 129.22.124.137 on Wed, 2 Oct 2013 10:25:50 AM All use subject to JSTOR Terms and Conditions WithConsent the of Governed: SEC'sFORMATIVE YEARS Thomas K. McCraw The Securities and Exchange Commission, established in 1934, has achieved a uniquely high reputationfor effectiveregulation. TheSEC succeededin largemeasurebecause of the...
Words: 12685 - Pages: 51
...SOCIO‐ECONOMIC PROFILE OF STATES AND INTER‐STATE COMPARISONS 21 ASER 2013: Main Findings 23 SKILL DEVELOPMENT 24 HOW INDIA NEEDS TO FACE CLIMATE CHANGE 24 AGENDA FOR ECONOMIC REFORMS 28 INFRASTRUCTURE 30 WHY LONG‐RUN MATTERS 30 FIVE PRONGED STRATEGY TO CONTROL INFLATION 31 URJIT PATEL COMMITTEE 32 Some Major Issues in India's Merchandise Trade Sector 32 MAKE IN INDIA OPPORTUNITY 34 Make for India or Make in India – The debate begins! 37 VULNERABILITY COMPARISON OF INDIAN ECONOMY 38 PM JAN DHAN YOJANA 39 COOPERATIVE FEDERALISM 40 ZERO DEFECT, ZERO EFFECT 41 DIGITAL INDIA 42 TWO FACTOR IDENTIFICATION ISSUE 43 MINSK AGREEMENT 44 WILFUL DEFAULT 44 © EssaysforIIM.com 2014‐15 Page 1 Issues for IIM PI Process http://www.essaysforIIM.com ‘MAKE IN INDIA’ 45 Features of the ‘Make In India’ campaign .............................................................................................. 46 PM MODI’S ADDRESS TO UN GA 46 ‘CHALEIN SAATH SAATH’ 47 DEEPAK PAREKH COMMITTEE ON INFRASTRUCTURE 48 ‘JAPAN PLUS’ 48 WHY CRONY CAPITALISM PERSISTS 49 ISSUES IN THE SHG BLP 51 INCLUSIVE RURAL FINANCIAL...
Words: 128478 - Pages: 514
...GENERAL GROWTH PROPERTIES: TO THE BRINK AND BACK December 6, 2011 Students: Yu (Cherry) Chen, Kevin Connolly, Bill Davis, Stephen Duncan, James Faello, Michael Hazinski, Noah Johnson Faculty Supervisor: Joseph L. Pagliari, Jr. Copyright © 2011 The Real Estate Group at The University of Chicago Booth School of Business All Rights Reserved This case study has been prepared solely for academic purposes. It should not be construed as a judgment about or an endorsement of any particular business matter. Moreover, the information contained herein has been obtained from sources we believe to be reliable; however, we make no representation or warranty as to its accuracy. TABLE OF CONTENTS EXECUTIVE SUMMARY ...................................................................................................... - 1 GENERAL GROWTH BACKGROUND ............................................................................ - 7 2004: A Historic Year for General Growth........................................................................ - 9 2005-2006: Secured Mortgages and Increasing Debt ..................................................... - 16 Simon vs. GGP - Capital Markets Strategy ..................................................................... - 24 IMPACT OF THE CREDIT CRISIS .................................................................................. - 31 GGP Faces Liquidity Challenge .................................................................................
Words: 37589 - Pages: 151
...EUROPE Mobile marketing Dawn of a new medium Mobile usage is exploding and ad revenues should follow We think 2010 marked the crux of the hockey stick for mobile marketing. Smartphones are already 35% of the handset market in the US, Europe and Japan, and tablet computers are now taking off. Apple and Android apps set a new standard, and mobile is now at the forefront of marketers‟ conscience. A $14 billion market – at least – by 2015 This report focuses on marketing, not tech or telecoms, though we incorporate views from Macquarie‟s internet, telecoms and software analysts. We estimate the global mobile ad market could grow from about $3.5bn in 2010 to $14bn in 2015. Mobile only comprises 1% of total ad spending today, but we think this could rise to 3-4% in the next 5 years, and 5-8% over time. We believe mobile marketing and services represent an incremental growth opportunity for ad agencies of anywhere from 0.2-1.3%, and can help elevate agency organic growth to long-term GDP-plus rates. Inside Mobile media usage is exploding; ad spending is following The mobile device landscape Cues from Japan and emerging markets Mobile marketing channels The opportunity for ad agencies Data and privacy issues Appendix: Mobile marketing players 3 6 9 11 21 25 26 The ultimate targeted advertising medium This is a different type of media, incorporating display ads through both apps and browsers, search, messaging (sms and mms), location-based services such as in-store couponing...
Words: 18937 - Pages: 76
...CONTENTS Introduction Part One: Foundations Chapter One: Introduction to Advertising 1 Chapter Two: Advertising’s Role in Marketing 34 Chapter Three: Advertising and Society 68 Part Two: Planning and Strategy Chapter Four: How Advertising Works 103 Chapter Five: The Consumer Audience 135 Chapter Six: Strategic Research 169 Chapter Seven: Strategic Planning 205 Part Three: Effective Advertising Media Chapter Eight: Print and Out-of-Home Media 239 Chapter Nine: Broadcast Media 274 Chapter Ten: Interactive and Alternative Media 310 Chapter Eleven: Media Planning and Buying 345 Part Four: Effective Advertising Messages Chapter Twelve: The Creative Side and Message Strategy 378 Chapter Thirteen: Copywriting 411 Chapter Fourteen: Design and Production 443 Part Five: Integration and Evaluation Chapter Fifteen: Direct Response 476 Chapter Sixteen: Sales Promotion, Events, and Sponsorships 508 Chapter Seventeen: Public Relations 542 Chapter Eighteen: Special Advertising Situations 576 Chapter Nineteen: Evaluation of Effectiveness 610 INTRODUCTION Welcome to the Test Item File for the Wells/Moriarty/Burnett Advertising: Principles and Practice, 7th edition text. This test bank was designed with the student and instructor in mind. All questions in this manual are drawn directly from the master text. APPLICATION QUESTIONS: New to the seventh edition of the Test Item File is a section...
Words: 179407 - Pages: 718
...issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland Security Department during fiscal year 2008, triple the number from two...
Words: 25389 - Pages: 102
...eBAY.COM A Case Report for Getting Tools Used NOTE: THIS IS ONLY A PORTION OF THE GETTING TOOLS USED RESEARCH REPORT. FOR THE FULL DOCUMENT AND OTHER INFORMATION VISIT WWW.CFAH.ORG. Getting Tools Used Table of Contents Foreword by Jessie Gruman ......................................................................................................................................... 1 Executive Summary ........................................................................................................................................................ 3 About CFAH ...................................................................................................................................................................... 7 Table of Contents ........................................................................................................................................................... 8 Introduction: 21st Century Marketplace .................................................................................................................. 9 Research Framework ................................................................................................................................................... 17 Case Studies.................................................................................................................................................................... 25 Consumer Reports: Car Buying Guide ....................................
Words: 18219 - Pages: 73