Sunday, December 29, 2019
Tiananmen Square Incident(1989) - compare to 1984.
The monstrous event that happened on June 4th, 1989 will be forever remembered as one of the most tragic days in human history. However, many decades ago, this event was foreseen and was foretold in the book, 1984, by George Orwell. Orwell saw the rise of totalitarianism, and he was deeply disturbed by what he saw. He believes totalitarianism will be the method that communist party adopts to fight freedom. The book foreshadows many of the events that will happen in a communist society. In many ways, the incident of Tiananmen Square in 1989 echoes 1984, which is a warning that totalitarian government is a power abuser, propaganda manipulator, and democracy suppressor. Power AbusivenessThe party seeks power entirely for its own sake. Weâ⬠¦show more contentâ⬠¦(Liu 16) Their truth campaign insists that only 300 people, many of whom were troops and police, were killed instead of students. However, the USA estimates somewhere between 700-2600. Chinese controlled television was selecting many edited video of angry protesters holding torches, weapons and guns beating on hapless soldiers, to describe to public that soldiers were the victims. These aired shows along with massive fear campaign and life-sized posters all make the government and the soldiers seemed like the victim of revolutionary thugsAs Oceania does, Chinese authority used propaganda to isolate all truth in the report by eliminating foreigners and their journalist. In Oceania, the majority of the people never saw much of the outsiders. The only outsiders they see are the prisoner of wars or those that was hanged publicly. Chinese government saw foreign correspondents as a treat by e xposing the truth. Foreign correspondents cameras were smashed and seized. They received threats from Chinese authority that the army was been given the right to shoot on sight anyone carrying a camera. (Liu 16) They were detained on Tiananmen Square for 20 hours, and their telephone lines were cut off. The government took over China Central Television, CCTV, Chinas largest national TV network, during the times of protest. No CCTV camera crew or stuff was allowed to cover the stories andShow MoreRelatedDeveloping Management Skills404131 Words à |à 1617 Pages509 International Caveats 511 Team Membership 512 Advantageous Roles 512 Providing Feedback 516 International Caveats 517 SKILL ANALYSIS 519 Cases Involving Building Effective Teams 519 The Tallahassee Democratââ¬â¢s ELITE Team 519 The Cash Register Incident 521 SKILL PRACTICE 523 Exercises in Building Effective Teams 523 Team Diagnosis and Team Development Exercise 523 Winning the War on Talent 524 Team Performance Exerci se 527 SKILL APPLICATION 529 Activities for Building Effective Teams 529 SuggestedRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words à |à 656 Pagestransformations in where humans lived, how they earned their livings, and their unprecedented ability to move about the globe. Moya and McKeown set the patterns of migration in the twentieth century against those extending back millennia, and they compare in imaginative ways the similarities and differences among diverse flows in different geographical areas and across ethnic communities and social strata. They consider not only the nature, volume, and direction of migrant movements motivated primarilyRead MoreManagement Course: MbaâËâ10 General Management215330 Words à |à 862 Pagesgrowth in PCs and new markets, few analysts doubt that Dell can generate the 15 percent annual growth needed to reach the mark. Questions 1. What are the main principles behind Michael Dellââ¬â¢s approach to managing? 2. List these principles then compare them to those developed by Henry Fayol. In what ways are they similar or different? Source: Andrew Park and Peter Burrows, ââ¬Å"What You Donââ¬â¢t Know About Dell.â⬠Reprinted from the November 3, 2003, issue of BusinessWeek Online by special permissionRead MoreInternational Management67196 Words à |à 269 Pagesbringing current membership to 27 countries. Not only have most trade barriers between the members been removed, but a subset of European countries have adopted a unified currency called the euro. As a result, it is now possible for customers to compare prices between most countries and for business firms to lower their costs by conducting business in one, uniform currency. With access to the entire pan-European market, large MNCs can now achieve the operational scale and scope necessary to reduce
Saturday, December 21, 2019
Literature Review on Internal Audit - 1789 Words
Survey finds internal audit risk assessments inconsistent Year: August, 2007 The report suggests that internal auditing needs to identify areas of high and moderate risk that are part of the internal audit plan but have been deferred or cancelled because of the organizations focus on Sarbanes-Oxley Section 404. It recommends that chief audit executives (CAEs) revisit the budgets, skills, and capabilities needed to achieve a comprehensive, balanced, and risk-based approach to auditing, as well as develop a process to advise the audit committee and senior management about emerging risks. In other findings, internal audit leaders say their greatest challenge is finding enough qualified talent to address the growing and increasinglyâ⬠¦show more contentâ⬠¦The 2007 study also found that internal audit groups reporting to the CFO organization devote more time to Sarbanes-Oxley compliance than groups that report directly to the audit committee or the CEO. According to the study, only 31 percent of internal audit functions reporting directly to the audit committee or the CEO devote more than 50 percent of their time to Sarbanes-Oxley compliance. By contrast, 46 percent of those who report directly to the CFO indicated that they dedicated more than 50 percent of their time to the Act during 2006. The study found that when internal audit reports to a level below the CFO in the finance organization, such as to the controller or treasurer, the time commitment to Sarbanes-Oxley compliance increases dramatically, with 69 percent of these internal audit functions reporting spending more than 50 percent of their time addressing compliance with the Act. Given the disparity of time dedicated to compliance with Sarbanes-Oxley depending on reporting relationships, these survey results naturally beg the question as to who is actually directing the focus and deployment of corporate audit resources, added Anderson. Reference: http://www.accountingnet.com/x57724.xml Study: Impact of Economy on Internal Audit Profession *By: (SmartPros*) Year: June 15, 2009 The results of a new IIA survey have revealed perspectives on the cause and effects of the financial meltdown, as well as the views of internal auditorsShow MoreRelatedThe Effect Of Internal Controls On Corporate Governance Associated With The Revelations Of Internal Control Material Weaknesses And Their Subsequent Remediation812 Words à |à 4 PagesChanges in Corporate Governance Associated with the Revelation of Internal Control Material Weaknesses and Their Subsequent Remediation. The abstract discusses the problems associated with the lack of internal controls within a company. Additionally, the abstract discusses how fraud and material weaknesses can occur without the implementation of the proper internal controls. Johnstone, Li, and Rupley (2011) disclose that internal controls have long been viewed as an important policy to have inRead MoreHow Does Cloud Computing Affect Company s Business Activities?868 Words à |à 4 Pagescomplete the questionnaire. In addition, the study was conducted within the Republic of Croatia, during a deep recession. The referenced journal article applies to the research topic because it is important to know how Cloud Computing affects companyââ¬â¢s internal controls. In addition, it is important to understand what Cloud Computing is and the benefits it offers businesses. This study will help provide valuable information to the reader when researching Cloud Computing. Davidovic, V., Ilijevic, D.,Read MoreEffects Of Internal Audit Practices On Financial Performance Of Commercial Banks1689 Words à |à 7 Pages EFFECTS OF INTERNAL AUDIT PRACTICES ON FINANCIAL PERFORMANCE OF COMMERCIAL BANKS IN KENYA (A CASE STUDY OF KENYA COMMERCIAL BANK) GIDALI MUHINDI FRANKLINE A Research Proposal in Partial Fulfillment for the Bachelor of Business Administration of the Technical University of Mombasa 2016 DECLARATION I declare that this research proposal is my original work and has not been presented for a degree award in any other university. Signatureâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦ Dateâ⬠¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Ã¢â¬ ¦Read MoreInternal Auditor s Role For Combat Fraud809 Words à |à 4 PagesInternal Auditorââ¬â¢s Role to Combat Fraud Background Internal auditor, should be the eyes and ears of the company to combat fraud. As fraud becomes a growing problem to every company nowadays no matter what size the organization is, the risk of fraud is like a storm that could wipe the company out dry at any given time. Most companies have strategically strengthen its internal control and corporate governance to effectively mitigate fraud as it is becoming a necessity to protect the company from theRead MoreAudit Activity, Audit, And Agency Theory1249 Words à |à 5 Pagespapers about audit activity, audit price and agency theory. This short paper will provide a brief review focus on whether agency theory provides a general framework for audit pricing majorly refer to the study by Nikkinen and Sahlstron (2004). Furthermore, this is short paper also try to make further discussion from personal perspective. Literature review The purpose of Nikkinen and Sahlstron (2004) study is to ââ¬Ëinvestigate whether agency theory provides a general framework for audit pricing.ââ¬â¢ ThroughRead MoreEthical Financial Reporting And Disclosure Quality893 Words à |à 4 Pagesto emphasize the positive influence of independent audit committee on the ethical financial reporting, corporate disclosure, and company ethical environment overall (p. 183). Introduction. The author studies the relationships between the director overlap and financial reporting quality, and for that purpose, analyzes the compensation measurement system and how it tights to performance (p. 183). The researcher also focuses on the impact of audit committee on the reporting and disclosure. The mainRead MoreEssay on case 12-071370 Words à |à 6 Pagesand defensed costs relating to currently pending claims and future claims for losses incurred to date. Liabilities recorded per/as at Dec 31. 2009 2008 2007 Rossi Inc. $962m $1,055m $469m Thompson (External Specialist) $1124m $1,055m Internal Actuarial Specialist $907m, $1,184m, and $1,514m The 2007 claim estimate is projected through 2011. The 2008 and 2009 estimate are projected through 2017. During 2009: The reserve is reduced by payment, but no addition; Higher mesotheliomaRead MoreResponsibilities Of Meghan Kenney Auditing1516 Words à |à 7 PagesResponsibilities of Meghan Kenney Auditing We will conduct our audits in accordance with auditing standards generally accepted in the United States of America (ââ¬Å"GAASâ⬠). Those standards require that we plan and perform the audits to obtain reasonable assurance about whether the financial statements are free from material misstatement, whether caused by error or fraud. An audit includes examining, on a test basis, evidence supporting the amounts and disclosures in the financial statements, assessingRead More14 Best Reading Practices956 Words à |à 4 PagesFamilies, communities, and schools collaborate to support literacy development of students at home and school. à School Audit of Reading Best Practices à Purpose of the Audit: Through the Illinois Right to Read Initiative, the Best Practices and Resources Committee identified 14 best practices in reading (as listed in the first column below.) School staff may use this audit sheet to examine current best practices in reading as another method of gathering information for the school improvementRead MoreUse Of Internal Audit By Australian Companies1117 Words à |à 5 PagesThe use of internal audit by Australian companies Abstract: The main purpose of this study is to identify the reason behind the voluntary use of internal audit by public listed companies and to determine the factors that lead listed companies to have an IA function. There are number of reasons behind the implementation of IA function and it is strongly related with risk management, indication of effective internal controls and efficient corporate governance. This study is based on the work done
Friday, December 13, 2019
Legal Implications of Social Media and the Hiring Process Free Essays
MBA 610 Final Paper Legal Implications of Social Media and the Hiring Process Tammy Rider October 17, 2012 Social media has become one of the most important tools in business practices. Companies can advertise their services and products for nothing or next to nothing, network with other businesses, generate new business, connect with their customers, and provide a valuable research tool. It has changed the face of business as we know it. We will write a custom essay sample on Legal Implications of Social Media and the Hiring Process or any similar topic only for you Order Now With this wonderful innovation comes responsibility. Employers and employees alike must face new rules and laws associated with their social media practices. One such practice that has become important in the business world is the use of social media during the hiring process. Some companies even go so far as to request job applicants for their username and passwords for such sites such as Facebook, MySpace, and Twitter. Where do the rights of employers and the rights of employees fit into this new high tech world? The legal system faces new challenges every day regarding this relatively young business quandary. Where should the lines of privacy be drawn? How much social media information should an employer be permitted to use during the screening process for hiring a new employee? It has just recently come to the mediaââ¬â¢s attention that some employers ask their job applicants for their Facebook login information and password. However, the reality is that employers have been using social media to investigate these applicants for years. In 2011, Reppler, a social media monitoring service, conducted a survey of 300 hiring professionals to learn if, when, and how they are using social media to screen job applicants. The study found that 91% of recruiters or hiring managers use social networking sites to screen prospective employees. Out of these recruiters and hiring managers, 69% revealed that they have denied employment to a job applicant due to something they found on an applicantââ¬â¢s social networking site (1). Employers, however, should take caution when using the information they find to make a decision whether to hire an applicant or throw their application in the trash. It would seem that technology is outpacing the law in this area; however, employers should very seriously review the information they find and be sure that it does not lead to a liability under the Fair Credit Reporting Act, or some other state or federal employment discrimination laws. The Fair Credit Reporting Act (FCRA) states that an employer must provide a disclosure that a consumer report or background check will be performed to their job applicants, and should obtain signed authorization by the applicant to proceed with this research. It is also the duty of the company to provide notice to the job applicant that they will take adverse action to not hire them before the company actually takes that action, and provide a post-adverse action notice (2). It is interesting to note that these FCRA requirements do not apply to employers who perform their own background checks without using a consumer-reporting agency to obtain the information. Human resources hiring managers that perform a social media search on a job applicant are not bound to these FCRA regulations to provide disclosure and gain consent from the applicant. This is where it gets tricky! Although a hiring manager may not have to adhere to the FCRA regulations, they may still be confronted with other state and federal laws regarding employment discrimination and privacy. In the past, employers have been very careful to not invade employee privacy, base any employment decisions on protected characteristics, or ask unlawful questions during the interview process. In the past few years though, employers have been using social media to screen applicants on a regular basis, whether formally or informally. By performing these pre-employment research screenings on job applicants using social media profiles, employers are setting themselves up to discrimination claims under federal, state, and local laws. Since this area is still fuzzy and grey as far as the law is concerned, employers need to stay informed and educated to protect themselves from potential lawsuits. Consulting with an attorney who specializes in this field would be a wise decision. As the laws evolve, so must the employerââ¬â¢s behaviors. By reviewing social networking profiles and information, employers are learning about job applicantsââ¬â¢ religious beliefs, marital status, family relationships, race, ethnicity, medical conditions, and other information that cannot be used to make an employment-based decision. This is information that is considered as protected characteristics even though an applicant or employee has made it public on a social media profile. As a result, employers must take care when performing such research. Ultimately, should a discrimination claim arise, the employer will have the burden of proof to demonstrate that the decision to reject a job applicant was based on a legitimate non-discriminatory reason, rather than the fact that the employer learned of the job applicantââ¬â¢s sexual orientation, the projected due date of the job applicantââ¬â¢s baby, or any other protected characteristic. So the question that persists is how can we make use of social media without disrupting any discrimination laws? Some of the job-related information found in a profile may be highly valuable in determining an applicantââ¬â¢s qualifications for the job. One practical method is to only allow someone who is not involved in the hiring of the specific position to be the person who conducts the social media background check. Then, when the social media background check is completed, that person can summarize the job-related information that may be helpful in considering the applicant, and can make no mention of the ââ¬Å"protectedâ⬠information (race, religion, medical condition, etc. that would otherwise get the employer into trouble. This way, the hiring manager, or ultimate decision-maker, receives only the job-related information, and can demonstrate that the information unknown to him or her had nothing to do with the decision to hire another candidate. Furthermore, before the job opening is even posted, employers should be clear about what they are really looking for in a social media background check, and whether it is necessary for the particular position. For example, the importance and extent of a social media background may depend on the position the company needs to fill (for example, a CFO position versus a seasonal stockroom employee). Certainly, employers should be doing enough pre-hiring due diligence to avoid potential claims of negligent hiring, but they must balance those concerns with finding out information that exposes them to liability for discrimination. There exists yet another level of privacy invasion that some businesses have been practicing. Asking for a job applicantââ¬â¢s login and password information goes beyond simply surfing the web for research purposes. Some hiring managers get around this request by having the job candidate log into their Facebook account, for instance, during an in-person interview. These potential candidates are put into a compromising position. Should they refuse this request or just do it to keep them in the running for the job? Do these employer requests violate the federal Stored Communications Act or the Computer Fraud and Abuse Act? The laws surrounding the Stored Communications Act prohibit intentional access to electronic information without authorization or intentionally exceeding that authorization, 18 U. S. C. à § 2701. The Computer Fraud and Abuse Act prohibits intentional access to a computer to obtain information without authorization, 18 U. S. C. à § 1030(a) (2) (C). Are these laws being violated when companies request login information from job applicants? It would certainly be a violation if the company broke into an account to access the information without authorization. The Equal Employment Opportunity Commission will have to determine whether employers who request this login information are violating anti-discrimination statutes. State legislators are beginning to introduce legislation that aims to prohibit this practice. In April 2012, Maryland was first to introduce a bill to ban employers from demanding Facebook or other social networking login information and passwords. Other states have followed or are currently following suit with bills of their own. For instance, California introduced the ââ¬Å"Social Media Privacy Actâ⬠to legislature which would protect the social media privacy rights of students and employees (3). The law is attempting to catch up with technology, beginning with the states and expanding federally in the future. It is in this writerââ¬â¢s opinion that employers should consider the non-legal ramifications of this social media dilemma in addition to the legal implications. By demanding this private information they are setting themselves up to lose some of their best employees or potential employees simply because they believe in their rights to privacy and refuse to give access to their social media credentials. Employers should weigh what is most important to them and evaluate what they stand to lose. Employee morale may suffer and an environment of distrust may take precedence. These conditions are not conducive to a healthy workplace resulting in poor performance and poor productivity. Is this really worth the tiny bit of extra information that may be revealed by invading a personââ¬â¢s social media profile? Businesses must stay on top of developing legislation to protect themselves. Job seekers should also remain educated on their rights. It is sad to think that a person may find themselves wanted a job so badly they would be willing to hand over any information that is requested of them. We will probably see the emergence of a new department in most companies. This department will be responsible for technology privacy education and enforcement which could save the business millions of dollars in lawsuits. The future of technology isnââ¬â¢t slowing down one bit. The law may never catch up, but it will keep pushing forward to protect the rights of employers and employees. Social media is just that: social. What a person does outside of the workplace is, in most cases, of no concern to the business. As they say, donââ¬â¢t mix business with your personal life and vice versa. If we allow that to happen, where will the line be drawn? The line must be drawn now. Works Cited (1) Swallow, Erica, ââ¬Å"How Recruiters Use Social Networks to Screen Candidatesâ⬠, October 23, 2011, http://mashable. com/2011/10/23/how-recruiters-use-social-networks-to-screen-candidates-infographic. (2) http://www. ftc. gov/os/statutes/031224fcra. pdf (3) http://epic. org/privacy/workplace/ How to cite Legal Implications of Social Media and the Hiring Process, Essays
Thursday, December 5, 2019
Management Information Technology Project -Myassignmenthelp.Com
Question: Discuss About The Management Information Technology Project? Answer: Introduction The purpose of this report is to critically analyze communication in business. Business communication is important in delivering quality products and services in any business setup. Therefore, this paper aims at determining what need to be identified in business communication within a company so as to deliver quality products and services. Business communication need to be effective and efficient so as to propel progress within business setup. This information is based on principles of effective communication. These principles will be analyzed from three perspectives That is, communication examples, communication research and communication methodologies (Ballantyne, 2007). A business message need to be effective and efficient so as to encode and decode the most appropriate feedbacks required in a particular communication channel. The type of business message depend highly on sources of business communication. In this report, we consider two sources of business communication so as to demonstrate appropriate way of delivering business message. We also consider inappropriate or poor ways of delivering business message. Report overview There are two sources of business communication that will be considered in this report. These sources are applied to determine whether the business message under consideration was well presented or poorly presented. Properly presented business message affect business positively while poorly presented business message affect the business negatively. In this case, we can select a certain business that require business communication in order to effectively undertake duties and responsibilities. Let us consider a business that import and export industrial products at global level. This kind of business require appropriate business communication strategies so as to enhance effective business messaging. For instance, if the business deals with importation and exportation of highly delicate and perishable products, then a distinct business communication platform must be applied. It is important to understand business communication and sources of business communication. Typically, business communication is defined as the network or connection of data and information that incorporate both insiders and outsiders in order to solve and mitigate challenges of business organization (Ballantyne, 2007). There are certain rules and norms that regulate business communication. Initially, business communication was limited to paperwork and telephone calls. However, through advancement in technology, there are various innovations such as satellite communication, video conferencing, emails and cell phones used to support business communication. Business communication is an interpersonal goal oriented process that can be defined typically as problem-solving activity. In this report, the two main sources of business communication to be considered are internal information and external information. Internal information is a source of business communication created by the opera tion of an organization. This information include purchases, sales, orders and business transactions in inventory system. Again, accounting records are the prime source of internal information (Ballantyne, 2007). On the other hand, external information as a source of business communication is obtained from outside the business operations. These sources include print information, online information and television along with radio media information. For this report, we consider accounting records as a source of business communication from internal information and email as a source of business communication from external information. Discussion and analysis of findings Business communication that can be applied in this particular scenario include internal information and external information. In this case, there are areas where communication applied lead to appropriate progress while other communication lead to inappropriate progress. In simple terms, we can assert a good communication process and a poor communication process. If we consider accounting records as part of internal information, we realize that proper recording of accounting records provide accuracy in data. This is a good communication process. This communication message is of great importance since stakeholders in the organization can assess credibility of information under consideration. Thus, business communication process selected for business operation is excellent so as to keep track of what take place in the scope of business operations within and outside the company (Baily, Farmer Crocker, 2015). On the other hand, there is a business communication source from external infor mation that can be considered as poor in this report. Email is part of business communication from external information. Due to technological advancement, emails are used as a source of business communication so as to communicate a message to clients. As far as this report is concerned, this is a poor business communication process due to some factors. First, emailing depend on network connectivity. Without sustainable network, individuals in a business will not be in a position to decode and encode messages. Again, emails may result to delays in business communication. As mentioned earlier, emailing was initiated via technological innovation, thus, cases of cybercrimes are highly rampant where business information is diverted by criminals (Schwalbe, 2015). This brings huge losses to companies undertaking business activities. Spam messages are also associated to emailing as a source of business communication. Communication research The main forms of communication applied in this report are drawn from internal information and external information. From internal information, the type of communication applied was accounting records. These records communicate to all stakeholders on matters concerning sales, purchases, orders and inventories of data in the business. This type of communication assist stakeholders to assess credibility of data revolving a business. The company can forecast future trends of a business. It is classified as one of effective type of communication applied in a business (Kotler, 2011). The other type of communication applied in this report was email. This type of communication is drawn from external information as a source of business communication. This communication requires creation of accounts by both the sender and receiver of a massage. This communication process require use of network connectivity so as to decode and encode messages sent via email. Email addresses are created by indi viduals who will later communicate. Business operations are currently run via passing messages via email. However, this process is affected by several factors such as lack of reliable network connectivity and hacking by cyber criminals. In this report, we consider email as a poor communication process as compared to accounting records that tend to be efficient. Communication methodologies It is very important to identify and determine the nature of information and communication being delivered. For the case of accounting records obtained from internal information source of business communication, the company make a lot of positive changes based on this information. There are several details that can be drawn from accounting records. These include sales made in a given point in time as well as forecast of sales anticipated to be sold in the future (Hubbard, 2016). This assist the business in planning future progress. Again, purchases made are also indicated in accounting records. Orders made are also part of accounting information. Lists of inventories concerning business activities are also indicated in this communication process. It is therefore clear that this communication process is effective and reliable. Using this communication process results to a wider range of benefits. On the other hand, email as a communication process deliver variety of messages based on the motive of the sender and receiver. These messages can be business oriented or otherwise. The only undesirable limitation of this process is lack of data accuracy and credibility. Data is prone to manipulation by third party without authorization (Franco, 2015). Communication performed better in accounting records because the information required is recorded accurately. Communication did not work in email due to lack of network connectivity and cyber-attacks by criminals who manipulated messages. Diversion of communication messages compromised business communication process. Report analysis Accounting records facilitated business operations by providing details on sales, purchases, orders and data on inventory. Factors that facilitated effectiveness of this process included simplicity of data, completeness of data, clarity of communication messages, correctness of information as well as attractiveness (Dow Taylor, 2015). On the other hand, email did not deliver quality services in business communication due to factors such as lack of adequate network connectivity, manipulation of data through unauthorized access as well as diversion of messages which compromised the position of the company. References Baily, P., Farmer, D., Crocker, B. (2015). Procurement, Principle Management. Pearson publishers. Ballantyne, T. (2007). Capacity. Spectra. Dow, W., Taylor, B. (2015). Project Management Communication Tool. William Dow. Franco, S.A. (2015). Fundamentals of Corporate Finance. McGraw-Hill Education. Hubbard, G.R. (2016). Microeconomics. Pearson. Jonasson, H. (2012). Determining Project Requirement. Averbach publication. Kotler, P. (2011). Framework for Marketing Management. Pearson. Schwalbe, k. (2015). Information Technology Project Management. Course Technology.
Subscribe to:
Posts (Atom)