Free Essay

Business Management Application

In: Business and Management

Submitted By medudley80
Words 2361
Pages 10
Please notice the running head.

Technology Plan and Effective Online Communication Skills
Michael E. Dudley
Walden University
September 11, 2013

Assignment Template Summary
This template includes spaces for you to respond to each required part of the Week 2 Application. It also includes excerpts from the Discussion and Response Rubric and the Application 2 rubric that your instructor will use to grade your work. Specifically, you will complete: 1) Part 1: Personal Technology Contingency Plan a) Technology Back-up Plan b) Communication Plan c) Back-up Computers and Contacts Information 2) Part 2: Effective Online Communication d) Your Sample Post: Definition of email etiquette e) Evaluation of Your Sample Post
This template also contains other important information: * Excerpt from the Discussion and Response Rubric – the complete rubric can be found in your classroom. Your instructor will use this rubric to assess your discussion posts each week. You will use the rubric elements and criteria to evaluate your work in Part 2 of this assignment. * Excerpt from the Week 2 Application Rubric – the complete rubric can be found in your classroom. Your instructor will use the Week 2 Application Rubric to assess your work for this assignment, completed in the following pages. * Information about how to save a file to your computer is found at the end of this template.

Proceed to the next page to begin your work.

Part 1: Personal Technology Contingency Plan
Complete a Personal Technology Contingency Plan for each of your courses. You should strongly consider printing this document once you complete it and keep it someplace you will be able to access if you need it. Use as much space as you need in each section below to thoroughly plan for what you will do under potential scenarios that may impact your ability to engage in your course work.

Technology Plan:

1. Evaluate various types of potential situations that you could encounter (from loss of computer, hardware, and software failures, loss of files, loss of connectivity to the Internet, power outages or other natural and manmade incidents and your plan to address those possible disruptions to your ability to complete class work). Assess the likelihood of the risk and define a proactive plan to address these should they occur.

Being enrolled into an online class can appose many obstacles, computer problems being one of them. Although, one may think that they are totally prepared for the unthinkable, things still happen. So having said that, my motto is never fear, help is always near. To prepare for any type of situation, you always need some sort of backup plan. For instance, if you have a power outage, always make sure your work is saved and make sure that your laptop, tablet, or computer has enough power so that you can complete your assignments. Now in regards to a computer, it can only work off of electricity from a nearby wall socket. So it is extremely import to save your work periodically until power is restored. In fact, it’s best to set up for an automatic save every minute or two, because of the fact that you can type a lot of information in a short period of time (Fleming, 2013).

2. Next, define a communication plan to advise Walden University if such a scenario occurs including a plan to contact the instructor and academic advising.

The meaning of communication is to reach out or act upon communicating with someone. In the event that you have an issue with your computer due to a power outage, it is very important to have multiple ways to communicate with you instructor and/or academic advisor whether it is by email, phone, or online chat. For preparation, you should collect all data needed such as phone numbers, and email addresses so that you can be prepare for this situation. Also, in addition to having your instructor and academic advisor information, you should reach to classmates as a final result.

3. Complete your contingency plan by filling in the following information:

* Two Alternative Computers—Identify a minimum of two alternative computers that you could use at any time throughout the semester (other than the primary computer you plan to use under normal circumstances).
Primary Computer
Location: Home
Available Hours: unlimited

Alternative Computer 1
Location: Work
Available Hours: During the day
Alternative Computer 2
Location: Sister House
Available Hours: During the evening * Technology Support Services—In addition to including the information here, be sure to write down the contact information for technology support services in case you are unable to access your computer or the web during a technology failure.
Student Support Team
Phone: 800.925.3368
Hours: 24/7 * Weekly Backup Schedule—Back up or save your course files weekly to an external drive (recommended), recordable CD or DVD, floppy disk, or other data storage device. As a result, even in the event that you cannot access your computer, you will still continue to have access to important material. Directions for how to save a file are at the end of this document. Contact the Student Support and Customer Service Teams if you need assistance with this process.
Day of the Week I Will Back Up Files: Monday, Wednesday, and Friday (if necessary)

* Faculty Contact—Write down the contact information for your Faculty Member (including office numbers) in case you are unable to access your computer or the web during a technology failure.
Name: Carol Magendie
Phone: 713.449.5374
Time Zone: Central * Two Classmate Contacts—Write down the contact information for two classmates in case you are unable to access your computer or the web during a technology failure. Your classmates can provide you with updated information on assignments.
Classmate 1
Name: Dewayne Williams
Phone: n/a
Time Zone: n/a
Classmate 2

Name: Jennifer Snider
Phone: n/a
Time Zone: n/a * Academic Advising:
Phone: 1.800.WALDENU

Fleming, G. (2013). Preventing and Recovering Lost Documents “What to Do If the

Computer Eats Your Homework”. Homework/Study Tips: Retrieved from

Continue to the Next Page to Begin Work on Part 2 of this assignment.
Part 2: Effective Online Communication
In the space below, write your definition of email etiquette. You may expand the space as needed to provide a thorough, complete, and well researched response. Compose it in the same way you would for one that would be submitted to the Discussion Forum as an original post. Note – Your definition needs to pertain specifically to email, not to general writing. Be sure to use information in the weekly Resources and additional research in the Walden library or online in formulating your definition.
Email etiquette is very important and something that should be mastered in a professional environment. When responding to an email, always send a reply no matter, because it acknowledges that you received the email. If you were copied on the message it is not necessary for you to reply back unless a specific question was address to you. If there is an attachment associated with the email, remember to attach it to the email prior to sending it. Also make sure you address every question in the email, so it would be a great idea to read over the entire email as a precaution. Lastly, do not change the subject line and never use any symbols such as smileys at the end of a sentence, because it could be considered unprofessional. According to “25 Tips for Perfecting Your E-mail Etiquette”, experts would agree that bad email etiquette has the potential to sabotage your reputation both personally and professionally.

Burkholder, G.J. (2010). Tips for Effective Online Composition and Communication. Retrieved from Walden University Online Classroom:
Watkins, R., & Corry, M. (2011). E-learning companion: A student’s guide to online success (Laureate Education, Inc., custom 3rd ed.). Mason, OH: Cengage Learning.
Silberman, L. (2010). 25 Tips for Perfecting Your E-mail Etiquette. Retrieved from

Please notice the formatting of the References list. The word References is centered and not in bold. Everything is consistently double spaced. Sources are alphabetized and listed in hanging indents. That means that the first line is flush left while successive lines are indented one tab.

Discussion Posting Response Evaluation
In the last part of this assignment you will grade yourself using the information in the Discussion Posting and Response Rubric (Excel spreadsheet found in the classroom, excerpt found below) and provide a brief evaluation of how you met the criteria for composing an effective response.
Use the space that follows to complete your evaluation of your work and base your evaluation on the rubric criteria and what you learned from the weekly resources. Note – you should use as much space as you need to complete your evaluation, you are not limited to the space that appears below.

Excerpt of Discussion Grading Rubric | Criteria | Element (1): Graduate Level Posts Comprehensive and Thoughtful | Post(s) is/are of appropriate length to meet requirements and communicate central arguments in an in-depth and comprehensive manner. Post(s) incorporate the week’s required readings and additional research from the Walden Library. | | | | | Element (2) Standards of Scholarship: | Post(s) is/are clear, logical, well-organized and appropriate to the intended audience. Postings and responses are spell-checked and proofread. Sentences are complete and grammatically correct. Words are chosen for their precise meaning. Tone is professional and free from bias (i.e., sexism, racism). Original posts include at least 2 reputable and professional sources, or as directed in classroom instructions. Each citation is referenced, and only cited sources are referenced, aligned with APA format. When students reference/reuse their own work, they provide self-reference per APA rules and Walden policy. | | | | | Element (3): Relevance of Topic | Post(s) include clear and direct ties to authentic examples or experiences drawn from personal experience or additional research or current events including relevant issues in the news, information obtained from other credible sources, or ideas expressed in the postings of other colleagues. | | | | | Argument Quality and Flow of Posts | Post(s) contribute appropriate and useful ideas by applying critical thinking and maintain the logical thread of the Discussion. Student justifies position based on rational, well-reasoned argument with evidence drawn from relevant and credible sources or based on documented theories. Assumptions are clearly stated and justified. Opinions or reflections are based on facts or documented experiences and linked to relevant theory or content. Student demonstrates significant ability to generalize and extend thinking and evaluate theories or concepts within the topic or context of the discussion. | | | | | Below is the rubric that your instructor will use to score your Application. Element (1) - Technology Plan (33 pts. Maximum) | The author delineated a serious and comprehensive technology contingency plan that includes an evaluation of the types of potential situations that may be encountered from loss of computer, hardware and software failure, loss of files, loss of connectivity to the internet, power outages or other natural and manmade incidents and the plan to address those possible disruptions to one's ability to complete class work. The author demonstrates thoughtful planning for a wide range of possible scenarios; plans include alternative strategies and contingencies and considers scenarios where outages might be widespread. The author also presents a communication plan to advise Walden University if such a scenario occurs including a plan to contact the instructor and academic advising. It is clear the author has evaluated a wide range of possible situations and assessed the likelihood of needing a proactive plan to address them. | Exemplary (100%) | x | | | Proficient (85%) | | | | Marginally Acceptable (70%) | | | | Unacceptable (0) | | Element (2) - Response to Question (22 pts. Maximum) | The author composed a sincere, thoughtful, and cogent response to the question, "What does email etiquette mean and why is it important?". The author draws from relevant examples and evidence, building an argument that is based on both experience and supported by materials from the weekly resources and additional research in the Walden library or online. The response directly addresses the question. | Exemplary (100%) | x | | | Proficient (85%) | | | | Marginally Acceptable (70%) | | | | Unacceptable (0) | | Element (3) - Evaluation of Response to Question (16 pts. Maximum) | The author made a sincere and honest evaluation of his or her own response clearly based on the elements and criteria specified in the discussion rubric. The author draws connections between the criteria and work he or she did to respond to the questions, pulling in examples from the work. The author identifies concrete and actionable ideas for improving his or her work and a plan to implement those improvements in future online communications. | Exemplary (100%) | | | | Proficient (85%) | | | | Marginally Acceptable (70%) | x | | | Unacceptable (0) | | Element (4) Standards of Scholarship: (14 pts maximum) Note: Sub-standard writing will result in lower scores in other categories as without these elements, the content areas above are inherently weaker. | Writing is clear, logical, well-organized and appropriate. Work is spell-checked and proofread. Sentences are complete and grammatically correct. Words are chosen for their precise meaning. Tone is professional and free from bias (i.e., sexism, racism). Resources are cited and referenced. | Exemplary (100%) | x | | | Proficient (85%) | | | | Marginally Acceptable (70%) | | | | Unacceptable (0) | |

How to Save a File
From the navigation menu, select File and then Save As. A window will appear.
Click on the arrow to the right of the Save In box at the top of the window to access a drop-down menu. Select where you want to save the document: Desktop, My Documents, your computer’s hard drive (C:), external drive (letter will vary), a floppy disk (A:), or a CD (D:).
Enter a name for the file in the File Name box at the bottom of the window.
Click Save.

Be sure to name the file according to the directions given in the classroom for this particular application, and follow the instructions for submitting your file to your instructor through the Turnitin link.

Similar Documents

Premium Essay

Business Understanding and Application of Management

...Business: Understanding and Application of Management Principles of Management BUS 201 Toni Smith November 22, 2010 This research will focus on the understanding and application of management by addressing: Describing the role of a manager in a typical organization, the three traits an individual should possess in being an effective manager, and finally how the three traits fit the four functions of management. In order to describe the role of a manager in an organization, one must first know what a manger is, and what an organization is. A manager is a person who plans, controls, manages and directs a team of individuals. ([->0]) Today we talk of "managing one's boss," and of having "relationships with strategic partners, suppliers and customers." But, if partners can manage their relationships with each other, then management cannot be a one-sided, controlling activity. And, if you can manage your boss, management isn't restricted to the use of authority to control the people who report to you. Management is much more than what managers simply do to get work done through employees. Today, we can manage ourselves, our time and many other activities that don't require one to have a formal managerial role or even to manage people. This is why today, the function of management, as distinct from the role of the manager, has become everyone's business. The truth is that the role of the "manager" is only a......

Words: 1842 - Pages: 8

Premium Essay

Applications of the Five Functions of Management

...Applications of the Five Functions of Management Applications of the Five Functions of Management The five functions of management, planning, organizing, staffing, leading and controlling are all necessary actions to ensure a successful path of operations in the depot. Each of these functions will be detailed in the coming text to show the relationship each has to the other and as they apply to the day to day challenges that the depot faces. Repair activities in the depot must begin with a plan. As the depot operations manager planning begins with a complete understanding of the action that must be undertaken. Strategic plans are designed to integrate all company activities into one coherent course of action (Bedeian, 1986, p. 100). Planning a repair activity in the depot consists of choosing strategies, resource planning and goals. These steps consist of different levels of detail. The strategy employed for a repair is determined first by assessing the failed carcass. The example we will use will be a Unit 3 Control Power Supply, Multifunction Chassis. This is one of the major units that the depot services. We begin the strategy aspect of the planning function by researching our data base to find valuable failure data that we collected during previous repairs. This data is then reviewed so a strategic approach can be developed. During this data collection and strategic planning commonality of failures, failure trends and corrective actions are......

Words: 2243 - Pages: 9

Premium Essay

Business Applications

... The Exobiz Hub Agency Question 2. Describe two main E-Business applications required for your business and website to achieve your business objectives and why each system is necessary. Also explain website features that make it effective. 1) Customer Relationship Management | | | | a)Information Drives Channel Revenue Management Success The EXOBIZ Hub Agency E-Business Suite family of channel revenue management applications enables information-driven channel revenue management by using consistent, accurate enterprise information and advanced tools for managing all aspects of both the direct and in direct channels namely; * From partner lifecycle management * discount and rebate program management * channel sales collaboration * claims settlement * marketing and measuring performance * Exobiz channel revenue management applications increase channel effectiveness by using consistent enterprise information in every phase of the process. | | b) Service Management | | | | Information Drives Customer Service Success Exobiz E-Business Suite family of Service Applications provides true information-driven customer service—service that enables your agents and technicians to meet and exceed customer expectations by empowering them with information that is consistent, accurate, and actionable. Through comprehensive integration of service delivery channels including web-self service, agent-assisted service via the contact center, and field service,......

Words: 701 - Pages: 3

Premium Essay

Application of Management Theories

...1.Scientific Management Theory: Frederick Winslow Taylor (1856-1915), the Father of Scientific Management, assumed that labor is not the cause of most problems in business and it is only the management which can provide solutions to the problems of the business. His principles were: 1. Develop a science for each element of an individual’s work to replace the old rule-of-thumb method. 2. Scientifically select and then,teach and develop the worker. 3. Heartily co-operate with the workers so as to ensure that all work is done in accordance with the principles of the science that has been developed. 4. Divide work and responsibility almost equally between management and workers. Management does all work for which it is better suited than the workers. EXAMPLE: In many ways McDonalds, Kentucky Fried Chicken(KFC) are the archetypical examples of organizations employing Scientific Management in production. Within this restaurant chain, uniformity is complete; no matter what country we are in every branch of McDonalds is the same, as the methods they use to prepare food, clean floors, promote staff and lock up on closing. It is this ability to efficiently supply standard food and service throughout the world that has allowed McDonalds to become the biggest restaurant chain on the planet. Frank and Lilian Gilbreth, this couple invented a device called microchronometer and has contributed to eliminate unnecessary body movements of labors and thus save time. Using Gilbreth’s......

Words: 1823 - Pages: 8

Premium Essay

Management Information System and How It Help in Business Application

...Project Management Information System Table of Contents Project Management Information System 2 Introduction 2 Types of project Management Software 3 Desktop software’s: 3 Web Based software: 4 Characteristics of Project Management Software: 5 Benefits of Using a Project Management Software 7 Things to Look for When Implementing Project Management Software 7 Application of PMIS in project management stages 11 Typical Reports in a PMIS Includes: 13 Project management information systems data security 13 Conclusion: 15 Refferences: 15 Project Management Information System Introduction Since the project management is one of the core functions of a business organization, the project management function should be supported by software. Before software was born, project management was fully done through papers. This eventually produced a lot of paper documents and searching through them for information was not a pleasant experience. Once software came available for an affordable cost for the business organizations, software development companies started developing project management software. This became quite popular among all the industries and these software were quickly adopted by the project management community. Project Management Information System (PMIS) is used by upper and lower management to communicate with each other. Project Management Information System (PMIS) help plan, execute and close project management goals.......

Words: 281 - Pages: 2

Premium Essay

Business Application

...Business Applications typically found in RIT’sAlgebra for Mgmt. Science (1016-225) and Calculus for Mgmt. Science (1016-226) I. Total Revenue, Total Cost, Total Profit a. Total Revenue (R) from the sale of x units = R(x): R(x) = (price per unit)(# of units) R(x) = (price per unit)(x) b. Total Cost (C) of production and sale of x units = C(x): C(x) = (cost per unit)(x) + fixed costs Total cost is made up of 2 parts: 1. fixed costs (e.g. rent, utilities, etc) 2. variable costs (costs directly related to the number of units produced) c. Total Profit (P) from the production and sale of x units = P(x): P(x) = R(x) – C(x) Total profit is the difference between the amount received from sales (revenue) and cost of production. II. Marginal Revenue, Marginal Cost, and Marginal Profit a. Marginal Revenue MR ( ) 1. If R(x) is linear, then MR is the slope of the revenue function. 2. Calculus for Management Science: MR is the derivative of the revenue function b. Marginal Cost MC ( ) ( ) 1. If C(x) is linear, then MC is the slope of the cost function. 2. Calculus for Management Science: MC is the derivative of the cost function III. a. Marginal Profit MP 1. If P(x) is linear, then MP is the slope of the profit function. 2. Calculus for Management Science: MP is the derivative of the profit function IV. Break Even Point a. The point at which the revenue equals the cost: which is another way of saying… Find x such that R(x) = C(x) Find x such that P(x) =......

Words: 732 - Pages: 3

Premium Essay

Hr Management Application

...Licensed to: iChapters User Licensed to: iChapters User Human Resource Management Applications, 7th Edition Stella M. Nkomo, Myron D. Fottler, and R. Bruce McAfee VP/Editorial Director: Jack W. Calhoun Senior Acquisition Editor: Michele Rhoades Developmental Editor: Jennifer King Editorial Assistant: Ruth Belanger Marketing Manager: Clint Kernen Content Project Management: PreMediaGlobal Production Technology Analyst: Emily Gross Senior Manufacturing Buyer: Kevin Kluck Production House/Compositor: PreMediaGlobal Senior Art Director: Tippy Mcintosh Permissions Acquisition Manager/Photo: Deanna Ettinger Permissions Acquisition Manager/Text: Mardell Glinski Schultz Cover Designer: Stuart Kunkler, triartis communications Cover Image: Jacob Wackerhausen/iStock 2011, 2008, 2005 South-Western, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or......

Words: 10507 - Pages: 43

Premium Essay

Application of Risk Management

...As an IT manager of YieldMore Company, it is our responsibility to analyze all of the risks as well as the threat/vulnerability pairs, and decide what kinds of risk management techniques will reduce the chances of vulnerabilities being exploited. We want to ensure that the risk management techniques that we choose to use will bring the greatest amount of security for the seven domains. The user domain has risks related to lack of training employees in areas of general security knowledge. Visiting risky websites, opening infected emails or bringing infected files carelessly on their usb can result in a nightmare of security issues. To counteract this sort of risk, we will use mitigation in order to control certain restrictions for employees such as not being able to access USBs on their computers, having email go through a filtering process, and blacklisting certain risky websites. The user domain has a close relationship with the workstation domain. For example, keeping workstations up to date with the most recent patches, as well as configuring and increasing security using firewalls are important risk management techniques. In addition, users have limited privileges when it comes to installing software. Only administrators can install software. The LAN domain is the area inside the firewall. Each individual device must be protected. Data transferred within the LAN isn’t protected as thoroughly as if it were sent outside the LAN. This leads to a vulnerability of packet......

Words: 505 - Pages: 3

Premium Essay

Application of Management Science in Business

...Department of Management Information Systems Assignment on: Application of Management Science in Business [Type the document subtitle] Course Title: Management Science Course Code: EMIS 517 Submitted to: Professor Dr. Abdul Hannan Mia Honorable Course Teacher, Dept. of MIS Submitted by: Name | ID | Batch | Md. Al-Mamun Riyadh | 61427-20-079 | 20th | Abdullah-Al-Kashem | 61427-20-006 | 20th | Submission date: 31st August, 2014 Management Science Management Science is concerned with developing and applying models and concepts that help to clarify management issues and solve managerial problems. The models used can often be represented mathematically, but sometimes computer-based, visual or verbal representations are used. The range of problems and issues to which management science has contributed insights and solutions is vast. It includes scheduling airlines, both planes and crew, deciding the appropriate place to site new facilities such as a warehouse or factory, managing the flow of water from reservoirs, identifying possible future development paths for parts of the telecommunications industry, establishing the information needs and appropriate systems to supply them within the health service, and identifying and understanding the strategies adopted by companies for their information systems. Scientific Planning Successful management relies on careful coordination, often using scientific methods in project......

Words: 3150 - Pages: 13

Premium Essay

Business and Management Business and Management Business and Management Business and Management Business and Management

...Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and management Business and......

Words: 321 - Pages: 2

Premium Essay

Business Intelligence Applications

...Business Intelligence Applications Paul Villela CSCI 4304:Database Systems Dr. Carolyn W. Green 2 December 2014 Business Intelligence Applications On the May 4th, 2014 episode of Mad Men (appropriately entitled “The Monolith”, a clever nod to the iconic black monolith which provides the impetus for the evolutionary leap from beast to man in Arthur C Clarke’s novel “2001: A Space Odyssey”) Sterling Cooper & Partners, the fictional ad agency around which the show revolves, purchases and installs a brand new IBM 360 computer. While the vast majority of the office greets the massive, expensive machine with much apprehension (“What man lay on his back counting stars and thought about a number?” asks Don Draper, head of the Creative Department (played by John Hamm)) (Stevenson, 2014), Senior Partner and visionary Jim Cutler (played by Harry Hamlin) understands the power and potential of just such a machine, particularly in the field of advertising. Sterling Cooper & Partners gain an edge that their competition would not have for several more years, as well as a service they can offer their customers, one many of whom would not provide for themselves for even longer. What Jim Cutler was envisioning was a strategic idea currently referred to as Business Intelligence. A Brief History of Business Intelligence The concept of Business Intelligence (BI) began as a direct descendent of an information system called the Decision Support System (DSS), a system used for......

Words: 2993 - Pages: 12

Free Essay

Business Application

...told myself at the beginning of this semester that I would have to give up my beloved dance club temporarily. I made a strict plan: get up at six o’clock every morning and go to sleep at two o’clock. I need to have enough time and high efficiency to study while keeping plenty of energy. I divided everyday into different parts and make sure that I set aside enough time for each part. Even though I was worn out for the intense study, everything was on the right track. However, nothing is perfect. Sometimes I got stuck with my study and I had to stay up all night to finish the assignments. Thanks to the optimism and exercise, I managed to adjust myself in time. With the consist efforts, my GMAT got a satisfactory point, the preparation for application works well and I have smoothly accomplished the internship projects. This experience teaches me how to manage my time and hold my life. I finally realize that life and future are in my own hands is not just empty talk. I believe this highlights my further direction if I have the chance to access to the Northeastern University. No matter what kinds of difficulties will appear in the future study process, I have the confidence to handle it and make it under my knees. Still the old sayings in China, nothing is impossible to a willing mind. With ability, confidence, experience and a proactive heart in my personality, taking a risk and giving me an opportunity to take an advantage tour in mysterious world in Northeastern University......

Words: 792 - Pages: 4

Premium Essay

Business Application APRIL 2013 INTERDISCIPLINARY JOURNAL OF CONTEMPORARY RESEARCH IN BUSINESS VOL 4, NO 12 EXAMINING FACTORS AFFECTING DIVERSITY IN THE WORKPLACE Arslan Ayub1, Muhammad Salman Aslam2, Adeel Razzaq3, Hanan Iftekhar4, Sabiha Hafeez5 1234 MS Scholar, Iqra University Islamabad, Pakistan National College of Business Administration & Economics Bahawalpur, Pakistan 5 Abstract The purpose of the study is to examine various organizational factors that influence diversity in the workplace. The factors incorporate organizational policies, management practices, and perceived inequity. The current paper is a conceptual paper solely based on literature review. The findings are reliable with consideration view of these organizational variables to be the factual obstacles in employing and heading workplace diversity issue on. The current study throws light on the significance of managing workplace diversity. Keywords: Organizational Policies, Workforce Diversity, Management, Management Practices, Staffing INTRODUCTION The "business case for diversity" curtails from the development of the replica of diversity within the workplace since 1960's. The inventive model for diversity was positioned around affirmative action drawing strength from the law and a need to act in accordance with equal employment opportunity objectives. This observance based model conferred to the thought that tokenism was the reason; an individual was hired into a company......

Words: 2280 - Pages: 10

Premium Essay

Sinosteel Strengthens Business Management with Erp Applications

...Q1. What is the business of Sinosteel, what are its major challenges, and how would an ERP system address the challenges they face? Sinosteel is a company that is in charge of producing and processing metallurgical mineral resources, trading and logistics raw materials and products, and it is also related engineering technical service and equipment manufacture. The company is decentralized (it has many subsidiaries), while its business is expanding all around the world. It has core business in resources development, trade & logistics, engineering project and science & technology, equipment manufacturing and specialized service, providing comprehensive auxiliary service for steel industry, especially steel mills. Maintenance of economic and technological cooperation with other nations and global companies and strengthen its global reach. As well as, along with other state enterprises, continue efforts to expand the global control over commodities-key, thus exclusivity to get stream in the provision that will ensure a steady stream of resources to the booming economy of China. Sinosteel has grown through the acquisition of hundreds of small companies, and many medium to large size companies. In the process, the company has inherited the information systems, accounting, customer, supplier, and human resource systems and policies of its many subsidiaries. ( There will be data inconsistency problems, the system can not integrate, cause the system to chaos) They......

Words: 925 - Pages: 4

Premium Essay

Business Intelligence Applications

...What Is Business Intelligence? Business intelligence has become a critical element of information technology. It’s an old term with general or even ambiguous meaning. It has been used synonymously with decision support, analysis, and data warehousing, but today business intelligence has a more specific definition and a better understood application. Taken literally, business intelligence is just that—intelligence or understanding of your business. You get that understanding by analyzing your business operations. That analysis is accomplished by collecting the information that represents your marketing, sales, and service activities, the behavior of your customers in responding to these activities, and the behavior of your internal systems and your suppliers’ systems in responding to your customers’ behavior. Once you have collected this information, and its collection is a continuous process, not a one-time event, you organize and store it in a manner to facilitate its access, processing, and presentation through a broad range of techniques including, reporting, query and analysis, OLAP, and data mining. Finally, you use the results of applying these techniques to improve your business operations and start the analysis cycle all over again. This business intelligence process can deliver significant, bottom-line results. Implementing its technologies and applying its process can help make your business more effective and more efficient, increasing revenue, decreasing......

Words: 2189 - Pages: 9