...Machteld van den Heuvel a,⁎, Evangelia Demerouti b, Arnold B. Bakker c, Wilmar B. Schaufeli a a Dept. of Work & Organizational Psychology, Utrecht University, PO Box 80140, 3508 TC Utrecht, The Netherlands Dept. Industrial Engineering and Innovation Sciences, Human Performance Management Group, Eindhoven University of Technology, PO Box 513, 5600 MB Eindhoven, The Netherlands c Dept. of Work & Organizational Psychology, Erasmus University Rotterdam, P.O. Box 1738, 3000 DR Rotterdam, The Netherlands b a r t i c l e i n f o Article history: Received 10 January 2013 Available online 19 February 2013 Keywords: Adaptability Adaptive attitudes Adaptive behavior Change information Meaning-making Organisational change a b s t r a c t The purpose of this 3-wave study is to examine the micro process of how employees adapt to change over time. We combined Conservation of Resources theory with insights from the organizational change literature to study employees in a Dutch police district undergoing reorganization. A model was tested where employee adaptability, operationalized by the presence of resources, predicts individual adaptive attitudes as well as adaptive behavior over time. Change information was included as a contextual change resource and meaning-making as a personal change resource. The research design allowed for examining longitudinal relationships by capturing data (1) before (Time 1), (2) during (Time 2), and (3) after change implementation...
Words: 9768 - Pages: 40
...BE RETAINED BY THE CANDIDATE. CANDIDATES NEED TO BRING A PENCIL AND ERASER TO THE EXAMINATION. CANDIDATES NEED TO BRING A UNIVERSITY APPROVED CALCULATOR TO THE EXAM. MATHEMATICAL TABLES ARE PRINTED AT THE BACK OF THIS EXAM PAPER. PRINT YOUR STUDENT NUMBER ON THE TOP RIGHT HAND CORNER OF THIS PAGE. ANSWER ALL QUESTIONS ON THE ANSWER SHEET PROVIDED. ALL ANSWERS MUST BE IN PENCIL. FINS 1613 Final Exam 1 T2 2009 Multiple Choice - 50 Questions: 1 mark each. 1) If a firm follows a residual dividend policy, they will give precedence to: a) b) c) d) e) maintaining their desired debt-equity ratio over paying dividends paying a constant dividend over increasing retained earnings paying dividends over accepting positive investments maintaining a constant level of debt before paying dividends avoiding dividend cuts over changing the debt-equity ratio 2) An investment project is most likely to be accepted by the payback period rule and not accepted by the NPV rule if the project has a) b) c) d) e) a large initial investment with moderate positive cash flows over a very long period of time. a very large negative cash flow at the termination of the project. most of the cash flows at the beginning of the project. all projects approved by the payback period rule will be accepted by the NPV rule. The payback period rule and the NPV rule cannot be used to evaluate the same type of projects. 3) Cross International is an all equity company. You are given the following information...
Words: 5473 - Pages: 22
...Financial Economics (FE)Bachelor of Finance (Hons) (FN)Bachelor of Marketing (Hons) (MK)Bachelor of Social Science (Hons) Psychology (PY)Bachelor of Arts (Hons) English Education (EL)Bachelor of Arts (Hons) English Education (ED)Bachelor of Science (Hons) Chemistry (CE)Bachelor of Science (Hons) Statistical Computing and Operations Research (SC)Bachelor of Science (Hons) Biotechnology (BT)Bachelor of Science (Hons) Microbiology (MB)Bachelor of Science (Hons) Construction Management (CM)Bachelor of Engineering (Hons) Electronic Engineering (EE)Bachelor of Information Tchnology (Hons) Communications And Networking (CN)Bachelor of Computer Science & Information Systems (Hons) (CS) | 3. | Year of Study: | Y2T1/T2 (BAC) Y1T2/T3 (BBA) Y2T1/T2 (BBF) Y2T1/T2 (BEN)Y2T1/T2 (BFE) Y1T3 (BFN) Y2T1/T2 (BMK) Y3T2 (PY)Y3T1/T2 (EL) Y1T1/T2/T3 (ED) Y1T1/T2/T3 (CE) Y2T1/T2 (SC) Y1T1/T2 (BT) Y1T1/T2 (MB) Y1T1/T2 (CM) Y1T1/T2/T3 (EE)Y1T2/T3 (CN) Y1T1 (CS) | 4. | Year and Semester: | 201205 | 5. | Credit Hour | 1 credit hour | 6. | Lecturing hours | 2 hours lecture per week for the duration of 7 weeks | 7. | Lecturers: | Ms. Cheah Ching Mun, MBAEmail: cheahcm@utar.edu.myMr. Lee Eng Keong, ACISEmail: leeek@utar.edu.my | 8. | Tutors: | N/A | 9. | Moderator |...
Words: 2233 - Pages: 9
...CANDIDATE. CANDIDATES NEED TO BRING A PENCIL AND ERASER TO THE EXAMINATION. CANDIDATES NEED TO BRING A UNIVERSITY APPROVED CALCULATOR TO THE EXAM. MATHEMATICAL TABLES ARE PRINTED AT THE BACK OF THIS EXAM PAPER. (5) (6) (7) (8) PRINT YOUR STUDENT NUMBER ON THE TOP RIGHT HAND CORNER OF THIS PAGE. ANSWER ALL QUESTIONS ON THE ANSWER SHEET PROVIDED. ALL ANSWERS MUST BE IN PENCIL. FINS 1613 Final Exam 1 T2 2009 Multiple Choice - 50 Questions: 1 mark each. 1) If a firm follows a residual dividend policy, they will give precedence to: a) b) c) d) e) maintaining their desired debt-equity ratio over paying dividends paying a constant dividend over increasing retained earnings paying dividends over accepting positive investments maintaining a constant level of debt before paying dividends avoiding dividend cuts over changing the debt-equity ratio 2) An investment project is most likely to be accepted by the payback period rule and not accepted by the NPV rule if the project has a) b) c) d) e) a large initial investment with moderate positive cash flows over a very long period of time. a very large negative cash flow at the termination of the project. most of the cash flows at the beginning of the project. all projects approved by the payback period rule will be accepted by the NPV rule. The payback period rule and the NPV rule cannot be used to evaluate the same type of projects. 3) Cross International is an all equity company. You are given the following information...
Words: 5473 - Pages: 22
...Academic Roots: The Past and Present of Entrepreneurial Marketing Dr. Gerald E. Hills Turner Chair and Professor of Entrepreneurship Bradley University 1501 West Bradley Avenue, Peoria, IL 61625 E-mail: hills.gerald@gmail.com Claes M. Hultman, PhD Professor of Business Administration Swedish Business School Orebro University SE-701 82 OREBRO, Sweden Phone: +46-19303522 Fax: +46-19332546 E-mail: claes.hultman@oru.se Dr. Hills holds the Turner Endowed Chair in Entrepreneurship at Bradley University and he chairs the annual Research Symposium on Marketing and Entrepreneurship. His current research interests include entrepreneurial marketing and opportunity recognition. Claes M. Hultman holds a chair in Marketing at Swedish Business School at Örebro University and he is the author of many books and articles in marketing & entrepreneurship. His current research interests include entrepreneurial marketing and commercialisation processes in innovation based firms. Abstract Research in Entrepreneurial marketing is about 30 years old. During this period research has followed many trajectories. Two important but divergent routes are small business marketing versus entrepreneurial marketing mirroring the discourse of small businesses versus entrepreneurial firms. Today small business marketing and entrepreneurial marketing are regarded as separate research fields, however related. EM-researches have been very openminded towards different approaches in methodology, especially...
Words: 4924 - Pages: 20
...Do Bank Mergers Create Shareholder Value? An Event Study Analysis Varini Sharma Introduction to Econometrics December 17, 2009 Professor Gary Krueger Macalester College I. Introduction Since the 1980s, the U.S. banking industry has experienced a large increase in the level of mergers and acquisitions. Between 1980 and 1998, approximately 8,000 bank mergers occurred, involving about $2.4 trillion in acquired assets that can be attributed to deregulation in the1980s and the removal of legal restrictions on intrastate and interstate banking (Rhoades, 2000). One basis for these mergers is the assumption that such consolidations lead to improvements in efficiency and profits amassed through increased market power, economies of scale, reduced earnings volatility, diversification, and other financial and operational synergies. While proponents of bank mergers argue that these gains are substantial, Coase (1937) tells us that tradeoffs exist between economies of scale (size) and ability to manage. In addition to the significant increase in mergers we have witnessed the collapse of countless financial institutions in the past 3 years due to bad lending practices. While the Coase theory applies to firms in general, how well does it apply to financial institutions? Additionally, has the increased size of financial institutions contributed to the financial crisis of 2008? This paper investigates the economic role of bank mergers in creating shareholder...
Words: 4370 - Pages: 18
...J A Collaborative Approach to Fall Prevention By ANGELA MERRETT, PATRICIA THOMAS, ANNE STEPHENS, ROLA MOGHABGHAB and MARILYN GRUNEIR The four partner organizations formally recognized their commitment and shared vision through a letter of agreement, which specified a framework, definitions and terms for their respective roles and responsibilities. The letter of agreement was intended to foster a sense of belonging among the group and identify leadership and governance for the project. The two site coordinators were responsible for preparing and coordinating the ethical review applications and letters of support. The team decided to use the existing practices of community service providers. To facilitate referrals of participating patients, the team first identified the existing service pathways. The hospital medical director distributed an overview document to inform emergency department physicians of the project, and the clinical nurse specialist reviewed the referral process, protocols and documentation with nursing staff. ore than ever, health-care providers need to communicate with each other to stay informed about the services clients receive. Working in collaboration is essential to the delivery of effective, efficient and timely care (D'Amour, Ferrada-Videla, San Martin Rodriguez, & Beaulieu, 2005; Interprofessional Care Steering Committee, 2007). We all had roles on the Geriatric Emergency ManagementFalls Intervention Team (GEM-FIT) project, which was aimed...
Words: 3372 - Pages: 14
...Economics 133 (2011) 25–34 Contents lists available at ScienceDirect Int. J. Production Economics journal homepage: www.elsevier.com/locate/ijpe Identifying risk issues and research advancements in supply chain risk management Ou Tang a,c, S. Nurmaya Musa a,b,n a Department of Management and Engineering, Link¨ping University, SE-581 83 Link¨ping, Sweden o o Department of Engineering Design and Manufacture, University of Malaya, 50603 Kuala Lumpur, Malaysia c School of Economics & Management, Tongji University, Shanghai 200092, PR China b a r t i c l e in fo Available online 3 July 2010 Keywords: Supply chain Risk management Citation/co-citation analysis abstract The purpose of this paper is to investigate the research development in supply chain risk management (SCRM), which has shown an increasing global attention in recent years. Literature survey and citation/ co-citation analysis are used to fulfil the research task. Literature survey has undertaken a thorough search of articles on selected journals relevant to supply chain operations management. Meanwhile, citation/co-citation analysis uses Web of Sciences database to disclose SCRM development between 1995 and 2009. Both the approaches show similar trends of rising publications over the past 15 years. This review has piloted us to identify and classify the potential risk associated with different flows, namely material, cash and information flows. Consequently, we identify some research gaps. Even though...
Words: 8250 - Pages: 33
...1. What is a transaction? What are its properties? Why are transactions important units of operation in a DBMS? As defines by the Elmasri and Navathe, Transaction is a sequence of operations that performs logical unit of operations on a database which include one or more operations as insert, delete, update and modification, Transaction is a executing program, the boundaries of a transaction is define as the explicit begin of transaction and end of transaction. Read-only transaction performs only retrieve data from the database and the Read- write operation includes both retrieving and updating transactions. (Elmasri and Navathe 2010 p.745) The properties of a transaction is define as ACID properties as below, Atomicity, Consistency, Isolation and Durability Transaction is the executing program that executes the operations on the database as read(x), write (x) ,so the transactions plays a vital role among database operations. 2. Draw a state diagram and discuss the typical states that a transaction goes through during execution. Figure1. State Diagram of a Transaction Source: Author Begin transaction: This indicates the beginning of a transaction Active phase: in this phase the running of the database operations or write sql queries for perform the tasks is done Partially committed: After performs the needed operations the transaction indicates end state and come to the phase partially committed and store in the buffer but not permanently. Committed: If the transaction was...
Words: 5571 - Pages: 23
...designed (or managed) appropriately. The standard doesn’t actually have many fixed rules that vary between location classes. The most important set of rules are in Section 4.7, Special Provisions for High Consequence Areas. Apart from that it has some fairly common-sense requirements for things like depth of cover and sign spacing, although even those often make little distinction between R1 and R2, or between T1 and T2. My view is that the most important function of location classification is to help focus the safety management study on the areas where the likelihood and/or consequences of a failure may be greatest. For that reason I don’t care much about getting the location classification exactly right. As long as the chosen classification will guide you to an appropriate design (or risk management measures) then it doesn’t matter whether you’ve adopted, say, R2/I or T1 for an industrial area. Over the next few posts I hope to work my way through each of the primary and secondary location classes with some guidance material and observations on pitfalls. T1 and T2 location classes...
Words: 3870 - Pages: 16
...Information Security Journal: A Global Perspective, 19:61–73, 2010 Copyright © Taylor & Francis Group, LLC ISSN: 1939-3555 print / 1939-3547 online DOI: 10.1080/19393550903404902 Information 1939-3547 1939-3555 Security Journal: A Global Perspective, Vol. 19, No. 2, Mar 2010: pp. 0–0 UISS Perspective An Ontological Approach to Computer System Security ABSTRACT Computer system security relies on different aspects of a computer system such as security policies, security mechanisms, threat analysis, and countermeasures. This paper provides an ontological approach to capturing and utilizing the fundamental attributes of those key components to determine the effects of vulnerabilities on a system’s security. Our ontology for vulnerability management (OVM) has been populated with all vulnerabilities in NVD (see http://nvd.nist.gov/scap.cfm) with additional inference rules and knowledge discovery mechanisms so that it may provide a promising pathway to make security automation program (NIST Version 1.0, 2007) more effective and reliable. KEYWORDS analysis system security, common vulnerability exposures, ontology, vulnerability Ju An Wang, Michael M. Guo, and Jairo Camargo School of Computing and Software Engineering, Southern Polytechnic State University, Marietta, Georgia, USA J. A. Wang, M. Approach to Computer An Ontological M. Guo, and J. Camargo System Security 1. INTRODUCTION Secure computer systems ensure that confidentiality, integrity, and availability are guaranteed...
Words: 6084 - Pages: 25
...Gujarat Technological University MBA Semester - IV Syllabus for MBA Programme effective from the Academic Year 2009-10 onwards The course curriculum and syllabus for MBA of Gujarat Technological University are devised considering the norms of AICTE/UGC. While preparing the syllabus, the syllabi of different national level universities/institutions have been taken into account. This syllabus has endeavoured to strike a balance between theory and practice and classic and contemporary concepts. The MBA programme of Gujarat Technological University (GTU) will be conducted on a semester basis with four semesters spread over two academic years. The duration of each semester will be around 15 weeks. In each semester there will be seven courses/subjects. In the first year all the 14 courses are compulsory. In the second year there will be three types of courses, namely, compulsory, electives and sectorial specialisation. The MBA programme will have four electives, namely, Marketing, Finance, Human Resource and Information Systems. A student can choose any one of the four electives. There will be five sectorial specialization areas, namely, Retail, Pharmaceutical and Healthcare, Rural and Cooperatives, Public Systems and Policy, and Banking and Insurance. A candidate has to opt for one of the sectorial areas. In each semester of the second year there will be three compulsory courses, three electives and one sectorial course, thus making a total of six compulsory courses, six elective...
Words: 17188 - Pages: 69
...Assignment 2: LASA 1- The Time of Money Rodney Schilling Financial Management February 26, 2014 Professor Charlie Merritt Argosy University Online LASA 1- The Time of Money In this scenario, I will be giving a detailed report on four different financial issues that Mary has asked me to help her resolve before her retirement. Mary has worked for Argosy University for almost 25 years and is looking to retire in the near future and wants to address several financial issues. Mary has been depositing $500.00 dollars into her savings account every year for the past 19 years and has compounded 5% interest annually and she expected to make one last payment, this time next year. Mary will then close out her account right after that payment and wants to know how much money she will have accrued. For the past 19 years Mary as placed $500.00 dollars into an account making 5% interest compounded annually. Mary will make one last payment into her account; the account will be closed after the last payment has been made. Therefore, I will be looking at how much as $500.00 dollars a year for the past 20 years at 5% interest Mary’s savings has accumulated. I will use future value, because it measures the value of that amount which is allowed to grow at the 5% interest rate over the specified period of time (Block, p.256). This is the formula I will be using: |FV = Future value ...
Words: 1185 - Pages: 5
...AC14/AT11 Database Management Systems TYPICAL QUESTIONS & ANSWERS PART -I OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choosethe correct or the best alternative in the following: Q.1 Which of the following relational algebra operations do not require the participating tables to be union-compatible? (A) Union (B) Intersection (C) Difference (D) Join Ans: (D) Q.2 Which of the following is not a property of transactions? (A) Atomicity (B) Concurrency (C) Isolation (D) Durability Ans: (B) Q.3 Relational Algebra does not have (A) Selection operator. (C) Aggregation operators. (B) Projection operator. (D) Division operator. Ans: (C ) Q.4 Checkpoints are a part of (A) Recovery measures. (C ) Concurrency measures. (B) Security measures. (D) Authorization measures. Ans: (A) Q.5 Tree structures are used to store data in (A) Network model. (B) Relational model. (C) Hierarchical model. (D) File based system. Ans: (C ) Q.6 The language that requires a user to specify the data to be retrieved without specifying exactly how to get it is (A) Procedural DML. (B) Non-Procedural DML. (C) Procedural DDL. (D) Non-Procedural DDL. Ans: (B) Q.7 Precedence graphs help to find a 1 AC14/AT11 Database Management Systems (A) Serializable schedule. (C) Deadlock free schedule. (B) Recoverable schedule. (D) Cascadeless schedule. Ans: (A) Q.8 The rule that a value of a foreign key must appear...
Words: 20217 - Pages: 81
...The Approach to Care of Cancer Grand Canyon University Pathophysiology and Nursing Management of Client's Health June 13, 2013 The Approach to Care of Cancer In medical understanding, cancer is a malignant tumor that develops from epithelial cells, i.e. cells that cover almost all of human organs and tissues. The name of the disease is associated with the image of a crab or cancer, since tumor often produces arms in the surrounding tissue looking like the limbs of cancer. Cancer is the most frequent cause of death in economically developed countries. Approximately 12.7 million diagnoses of various cancer types are set every year, and over a half (7.6 million – 64 %) of oncology patients die (Jemal et al., 2011). Diagnosis and Staging Cancer may be of any disease group being characterized with uncontrolled, abnormal growth of cells that may have spread throughout the body. It is believed that cancer develops from a single cell or a small group of cells after the changes that have occurred in their DNA - the genetic material that instructs cell behavior. Some cancers occur due to genetic abnormalities, and others are due to the action of carcinogens, environmental agents that can cause genetic mutations. Sometimes viruses interact with the cells genes and increase their chances of becoming malignant. Cells become cancerous when they are not able to perform their usual functions and interact with other cells, particularly respond to their signals. Cancer cells start...
Words: 1716 - Pages: 7