Premium Essay

Company Information

In:

Submitted By cuong112354
Words 939
Pages 4
Individual Assignment
Lê Việt Cường HAN15090011
“Describe what managers do” 1. Introduction
The ultimate goal of an organization is achieving its distinct purposes. Robbins, S., DeCenzo, D.& Coulter, M (2015, p41) suggested that: “Management is the process of getting things done effectively and efficiently, with and through other people”. “Today those management functions have been condensed to four: planning, organizing, leading and controlling.” (Robbins, S. et al 2015, p31). Knowing these four elements can be very useful for all levels of managers to reach their goals.

2. Planning
The manager sets goals for the group, and decides what work needs to be done to meet those goals (Drucker, P., cited in The Wall Street Journal n.d.). According to Koontz, H. and O’Donnell, C. (cited in Steiner, 2010, p 346); “Planning is deciding in advance what to do, how to do, when to do it and who is to do it. Planning bridges the gap from where we are to where we want go”. Besides, Lipman, P. (2013) wrote: “The best managers keep the big picture in mind. They have a sound strategic mindset”. “They know their company’s business well, and ensure that the activities of their unit or department or division are always firmly aligned with broader initiatives and strategies”(ibid) . Therefore, planning is often called the primary managent function because it establishes the basis for all the other things managers do as they organize, lead and control (Robbins,S. et al 2015, p145).

3. Organizing
Organizing is the function of management that creates the organizations’ structure (Robbins. et al 2015). The manager divides the work into manageable activities, and selects people to accomplish the tasks that need to be done (Drucker, P., cited in The Wall Street Journal n.d.). Karmarker, A. and Datta, B. (2012, p11) defined: “Organizing is the process of

Similar Documents

Premium Essay

Information on Company Policies

...Subject: Company Policies Security Information Policy By being given access to Electrolux's IT systems you have become part of the team, helping to safeguard our systems and the information they contain. This document is intended to give you an overview of your role, the Group's rules and hopefully a security-minded attitude. All Electrolux employees and contractors are expected to follow the guidelines set out in the Group's Information Security Framework (ISF). Violation of these rules, or failure to perform responsibilities as defined in the ISF (and summarized here), will be sufficient cause for disciplinary action up to and including termination. In addition to following the ISF, users are expected to be proactive with line management in raising any issue that they feel could compromise the confidentiality, integrity or availability of IT systems or where they suspect a breach of procedure. If, after reading this, you have any questions please talk to your Line Manager, HR, I.T. Security or your Sector IT Manager. The full text of the ISF can be accessed via E-gate. ACCESS Electrolux only authorizes the user to access information, which is needed to perform their job. It is a criminal offense to attempt to gain access to any information system/database for which authority has not been given. Any such attempt will be deemed as an act of gross misconduct, resulting in disciplinary action, up to and including termination. CONFIDENTIALITY Information obtained in...

Words: 855 - Pages: 4

Free Essay

Company Management Information Systems

...Company Management Information Systems Karmekia Wilson American Intercontinental University MGMT-305 May 31, 2015 Abstract In this paper I will discuss what MIS means and how they affect different companies and organizations. I’ll also access the organizations and give a brief description on how information technology brings a competitive edge and advantage to the organizations. Company Management Information Systems Companies develop management information systems to help and to give decision makers the information and data to fulfill and complete their job responsibilities. MIS are very useful in companies. They provide background, current data and trend analysis so the manager has data available on all aspects of the business (Markgraf). Managers who use MIS can increase their business performances with the detailed information on their business. They can make better decisions concerning the company and help move the company into the right direction. Management information systems are different from ordinary information systems in that they are utilized to study other information systems used in functional tasks in the company. Academically, MIS is normally utilized to pertain to the cluster of information management processes connected to the automation or assistance of individual decision making (Clarke, 2007). Toyota has utilized there MIS to the fullest potential. The company has established new areas for development through innovations (Ukessay). Toyota...

Words: 618 - Pages: 3

Premium Essay

Netflix, Inc. - Company Profile, Information, Business Description, History, Background Information on Netflix, Inc

...University Netflix Netflix, Inc. is the world's leading DVD (Digital Video Disc) rent-by-mail company. The company has over 1 million subscribers who pay a monthly fee of $19.95 for unlimited rentals, considering they have no more than 3 discs out at one time. The company offers more than 15,000 titles and maintains an inventory of more than 5 million movies. For faster delivery, Netflix has opened more than 20 shipping centers around the United States, and most movies arrive a day or two after ordering them online from the company’s website. More than a third of the publicly traded company is owned by Jay Hoag's Technology Crossover Ventures (Netflix, Inc. - Company Profile, Information, Business Description, History, Background Information on Netflix, Inc., 2012). Netflix was founded in Scotts Valley, California, in August of 1997 by Reed Hastings and Marc Randolph, both veteran "new technology" entrepreneurs, to rent and sell DVDs all over the Internet. Reed and Marc were and are very successful business men who have started from the bottom and have built a business that has climbed the charts. When these two first started the company, they had to experiment with the DVD shipment until they found an easy but yet cheap way of sending out the movies to customers. The firm had to experiment with over 200 packages until they finally found one that was suitable for the company and customers. The package is a clear case with a label and the DVD. This package is shipped out for...

Words: 1279 - Pages: 6

Free Essay

Using Information Technology in a Company

...Objectives behind using Information Technology Like all other institution Rebutel Communication Pvt Ltd. exists only for the revolution of the modern Information Technology. And we also have much honor for our existence. And for that we use a large portion of modern information technology. (Contd.) Rebutel Communication Pvt Ltd. want to ensure, 1 Highest product quality 2 Recruiting highest deserving employees 3 Best quality service to their customers And many more minor plans By using Information Technology Strategies to Implement the Objective As a company of private communication we fully related to the Information Technology. We use various Software and Hardware, which make our work easy and comfortable. Besides this we also have various strategy to reach in dominant position in private communication sector and helps to play a monopoly role in private communication sector. (Contd.) Among all strategies significant strategies are, 1 Rebutel Communication Pvt Ltd. has a well recruited and equipped IT sector. 2 we have total ten Software and six Hardware engineer through its all offices, which are serving their best in their own sector. (Contd.) 3 We take training weak in every three month from the Institute of Information Technology (IIT) from University of Dhaka. 4 A few months ago Rebutel Communication Pvt Ltd. take an Industrial come Business tour to Hong-Kong, Which helps employees to be more efficient on our own sectors...

Words: 503 - Pages: 3

Premium Essay

Procedures on the Administration of Information Disclosure of Listed Companies

...Procedures on the Administration of Information Disclosure of Listed Companies China Securities Regulatory Commission 01-30-2007 Order of the China Securities Regulatory Commission [2007] No. 40 The Procedures on the Administration of Information Disclosure of Listed Companies deliberated and adopted at the 196th Chairman Working Meeting of the China Securities Regulatory Commission are hereby promulgated and shall be effective as of the date of promulgation. Appendix: Procedures on the Administration of Information Disclosure of Listed Companies Chapter 1: General Provisions Article 1: These Procedures are formulated in accordance with the Company Law, the Securities Law and other laws and administrative regulations in order to regulate information disclosure of issuers, listed companies and other persons with information disclosure obligations, to strengthen the administration of information disclosure affairs and to protect the lawful rights and interests of investors. Article 2: Persons with information disclosure obligations shall disclose information truthfully, accurately, completely and timely and there shall be no falsehood, misleading representation or major omission. Persons with information disclosure obligations shall make public information disclosure to all investors at the same time. Where companies that issue and list securities and...

Words: 6439 - Pages: 26

Premium Essay

Bsa310 Week2 Paper

...provide a more detailed analysis of shopper’s spending habits at an individual level, which brings in a number of ethical, legal, and information security concerns. This paper is to discuss these concerns, what the company can do to protect such sensitive information, and what potential legal issues that may be faced implementing this system. Ethical Concerns This, above all else, should be the first consideration when implementing a system like this. For a system like this to work, customers will have many attributes of their lives revealed through deep analysis of their spending habits. Most people will be uncomfortable with such a notion, so the program cannot be mandatory. This must be left to the customer to choose to participate or not. If customers do opt in to the program, everything the company plans to do with their info should be laid out for them to know right up front. Especially when it comes to sharing sensitive information with other companies, customers may trust Kudler, more than likely they will not trust other companies that do business with Kudler. A good way to handle this might be to give the customer a choice if their info can be shared with “third-parties” or not. This way Kudler can still get a good benefit from the customer participating in the program, and gives the customer a better sense of well-being knowing the information gathered will all be “in-house.” Another ethical concern here is what exactly the customer gets for being part of the...

Words: 968 - Pages: 4

Premium Essay

Check Point Information System Business Problem Dimensions

...technological change are some of the descriptions to look at for this dimension. The final dimension of the three is the people dimension. The problems in this area that are described are lack of training, difficulties of evaluating performance, compliance, work environment, lack of overall company support, indecisive and poor management. In order to have a successful business, I believe that finding solutions to these problems will improve the practice is important. What I have seen in the company I work for now is not everyone is vested in the tasks at hand so the attitudes of some people are poor. If the company can get involvement and interest in the Information System by all members of the company that will eliminate some of the problems and possible create ideas on how to financial fund a good system. 2. What is the difference between IT and information systems? Describe some functions of the information system. Information Technology or IT is the actually hardware and the software that is used for the information system that is utilized by a company. This includes everything from the computer to MS Office applications that will increase the productivity of staff. Information systems can be described as a link that brings people, business data, and computers together. Some of the functions that are noted in the text are the...

Words: 387 - Pages: 2

Premium Essay

Maneger

...Case Review Questions * What is information technology, and why is it important to a business? Ans: Information technology (IT) is a combination of hardware and software products and services that companies use to manage, access, communicate, and share information. More than ever, business success depends on information technology. According to a Department of Commerce report, the IT industry has created a new economy, where advances in hardware, software, and connectivity provide unprecedented benefits to businesses and individuals around the world. * Identify the main components of information systems, and describe the system’s stakeholders? Ans: An information system has five key components: hardware, software, data, processes, and people. People who have an interest in an information system are called stakeholders. Stakeholder groups include the management group responsible for the system; the users, sometimes called end users, inside and outside the company who will interact with the system; and IT staff members, such as systems analysts, programmers, and network administrators who develop and support the system * Describes five types of information systems, and give an example of each. Ans: Information systems include enterprise computing systems, transaction processing systems, business support systems, knowledge management systems, and user productivity systems. Enterprise computing systems support company-wide data management requirements. Airline...

Words: 905 - Pages: 4

Free Essay

Im Profolio

...computer or the Internet was hardly accessed, communication within distant people mainly relied on massive posts. You may not realize, information management was done in both cases as a personal was trying to organize information in a deliverable manner to others or his/herself. The term “information management” may be quite unfamiliar to general public. People would think that it might be related to computer science and information technology, which are newly brought out in this century. By the Dr. T.D. Wilson (University of Sheffield), information management refers to how information is acquired, organized, controlled and disseminated (Wilson). Indeed, information management has long been existed and “living” with us. Experts have different comments on Information management models. Some said models are typically wrong in nature but somehow useful (Box & Draper 1987). To summarise the features of IM model, it could be the representation of structure or diagnostic tool (HKU). This essay introduces four information management models and how they are involved in daily life. Each model would be illustrated with certain examples to let readers have a better understanding. In this essay, four information management models are discussed, namely Shannon Weaver Communication Model, 5 Rings Information Model, Kuhlthau’s Research Model and Information Transfer Cycle. A. Shannon Weaver Communication Model Shannon Weaver Communication Model is a cycle with several stages and...

Words: 2804 - Pages: 12

Premium Essay

New System Proposal

...requires an innovative information system proficient in the organization of product sales, which allows management of data by employees from computers and mobile devices. This new system would contain customer records and be password protected for sales agent’s individual accounts and further promote confidentiality of client and corporate data. Information security and carbon footprints will need to be addressed with creation of a new data warehouse. The cloud computing system would be an idyllic system for addressing the needs of Riordan Manufacturing and would be an inexpensive conversion from the old systems. Cloud computing initially evolved from visualization. The use of visualization would allow Riordan to separate its software, business applications, and data from hardware sources that may experience an issue. The cloud offers storage, network, and hardware virtualization. Businesses can set up private clouds as storage warehouses for company information. Information technology virtualization enhances the business’s assets and offers lower administration fees, reduced maintenance, and consolidation of company information for strategic marketing initiatives in one location. With this in place, there would be less risk of possible loss of important and pertinent information. The entire marketing division would be combined into one superior database for easier comparison of information. Switching to a cloud system would allow a speedier return on information requests from different...

Words: 1178 - Pages: 5

Premium Essay

Data Collection

...Data is collected, stored and recorded for the reasons outlined below; This is so that it can be used as a point of reference or to retrieve information whenever there may be a need for it. Accurate records are kept in order to help the company make decisions when issues or queries arise in relation to each employee. The keeping records is to ensure that a complete and comprehensive employment history of each employee is readily available for as long as it is needed, and that the information contained in personnel records supports the management, payment and development of staff. Other key objectives of personnel records management are to enable accurate information by creating and protecting human resource records as reliable evidence. Certain information is needed as a legal requirement. Personal details of employees are kept for payroll and HMRC purposes and to show that the minimum wage is being paid. Data is also kept in the form of time sheets to show the amount of hours employees are working in reference to The Working Time Regulations 1998 to show they are not doing more than 48 hours per week and in receipt of holiday pay. There are also opt out forms for staff to complete if they wish to work more than 48 hours per week. Records of employee sickness are kept and this helps HR manage attendance and identify patterns of staff absence Contact detail forms are given to all employees so that they can inform us not only their address but their...

Words: 912 - Pages: 4

Premium Essay

Meaningful Data

...MEANINGFULL DATA AND INFORMATION. Data consist of raw facts, such as customer names and addresses. For data to be meaning full, it must be collected to constitute information. Information is a collection of data or facts organized in such a way that it has more value beyond the individual pieces of data themselves. For example, a set of data of customer names and purchases might provide information on a company's market demographics, sales trends, and customer loyalty or turnover. Every purpose data or collecting data is to transform them to information. Turning data into information is a process or a set of logically related tasks performed to achieve a defined outcome. This process of defining relationships between various data requires knowledge. Knowledge is the body or rules, guidelines, and procedures used to select, organize, and manipulate data to make it suitable for specific tasks for a specific period of time. Consequently, information can be considered data made more useful through the application of knowledge. The collection of data, rules, procedures, and relationships that must be followed are contained in the knowledge base. Companies face increased pressure to provide higher quality information faster and more efficiently. They want more transparent information in less time. There are demands that information must be faster with more transparency and come from every angle meaning they shouldnt be just providing information from one perspective . Many people...

Words: 468 - Pages: 2

Premium Essay

Ups Information System

...Case summary: UPS has created its own information system with Delivery Information Acquisition Device (DIAD) and Web-based Post-Sales Order Management System (OMS) globally by using developed information technology. These special systems help the company to reduce the cost of transaction greatly. By building its efficient order information management system, UPS can make optimal routing strategy, place orders online, and track shipments to meet customer needs. These information systems guarantee the possibility of two-day delivery nationwide as well as lower warehousing and inventory costs for the company. Questions: 1. What are the inputs, processing and outputs of UPS’s package tracking system? Inputs: the inputs include package information, customer signatures, pickups, delivery and timecard information, and locations on each route. Processing: in the process of transactions, the data is transmitted to the information center and stored for retrieval. During the whole process, the data of shipped packages is available to be checked by drivers and tracked by customers. Outputs: mostly the same data as the inputs, including pickups, delivery times, locations of routes and package recipients. In addition, the outputs also include calculations of shipping rates to enable UPS customers to embed UPS functions, such as cost calculations, to their own websites. 2. What technologies are used by UPS? How are these technologies related to UPS’s business strategy? Technologies include...

Words: 494 - Pages: 2

Premium Essay

Meredith Knows Women - Case Study

...Chapter 4 Case Study Meredith: Thanks to Good Marketing Information, Meredith Knows Women 1. Meredith’s marketing information system really focuses on women. Their target market is women and it is obvious in the way they cater towards women. Some of their strengths include they cater to a woman’s progression throughout life, they have studied their customers so greatly that they have over 700 data points on each one, and they have even segmented each individuals interests in order to better serve them. Not only that, but they have so much data on their customers that they can now sell their information to other businesses. As print is a declining business, Meredith has also ventured into the online and television world and is making their presence known. They are not simply looking at the present but are also setting themselves up for the future. A weakness of Meredith is that preferences can change over time. They need to keep up with the changing interests of their customers and make sure their data points are not just a storage bin full of outdated information. Another weakness is that it is only providing to women through magazines and television shows. With all of the information they have gathered, they should be able to reach out to women in other forms such as clothing, exercise equipment, gardening tools, or even cookware. The information that they have accumulated could be used for another business venture. 2.Through impersonal...

Words: 330 - Pages: 2

Free Essay

Individual Ass

...1. What is your opinion about the information safety problem in outsourcing? It's definitely not easy giving up control or handing over sensitive information to complete strangers. On one hand, it's nice to be able to do everything IT related in-house. You control access and you control how and when things get done. On the other hand, any smart businessperson knows it's practically impossible for one department or person to do everything and do it well. Think Like A Thief IT-related issues should be viewed from a hacker's perspective. This means considering what can happen if your confidential information gets into the wrong hands. Do you have digital assets worthy of abuse? What negative consequences would occur if they were abused? Is your job going to be on the line if your company makes the headlines? Who has access? Most outsourced IT services require someone somewhere to have full access to a portion, if not all, of your digital goods. For instance, desktop support professionals will likely need administrative rights to your workstations. This likely translates into full access to corporate data stored on local drives and, potentially, network shares. Consider what an IT auditor or security consultant may gather during the days, weeks or months onsite perusing your systems. It's limitless and it only takes one miscreant to cause a lot of damage. Data control It's one thing to understand that outsourced IT service providers have access to corporate data, but it's quite...

Words: 593 - Pages: 3