problem definition in research has the basic role in research, hence, this presentation pertaining to identification of problem by the use of different method
problem definition in research has the basic role in research, hence, this presentation pertaining to identification of problem by the use of different method
A Strategic Approach to Open Innovation - Jeffrey Phillips★ Tony Karrer
In this session, Jeffrey Phillips examines the critical questions you should ask as you establish an open innovation framework: which technologies or ideas? Which partners and how many? Which methods? By taking a strategic approach to open innovation, you’ll find the right ideas or partners more effectively, and you’ll accelerate new products to market more quickly.
Assignment Expectation
Introduction: 10 points possible.
Description: Visual Elements:75 points possible. There are 15 terms; each term is worth 5 points for a total of 75 points. Clearly identify all terms you are addressing. Any term not addressed will receive 0 points. Provide specific examples. For example, don’t just say “there are lines,” give specific examples of how line is used in the piece you selected. You will receive 1-5 points for each term based on the depth of your response to each term.
Conclusion:15 points possible.
Visual Elements Term Description Grading
“A” term Descriptions, 5 points
1. Concrete and relevant terms used
2. Meaningful determinations based on insightful and personal observations
3. Superior analysis of theme / artwork
4. Clearly outstanding use of terminology
“B” term Descriptions, 4 points
1. Fluency, clarity, and accuracy of special vocabulary and use of terminology
2. Effective structure of theme and analysis of artwork
3. Full understanding of approach undertaken
4. Exposition of analysis in analytical manner
“C” term Descriptions, 3 points
1. Clarity and appropriate grammar usage and use of terminology
2. Reasonable organization of thesis
3. Logical assumptions
“D or F” term Descriptions, 2-0 points
1. Response is not clear, poor to no use of terminology, very brief
2. Poor organization
3. Incorrect assumptions
Midterm Paper Rubric
Criteria
Level 4
Level 3
Level 2
Level 1
Introduction
10-9 points
Introduces piece with required components, and a precise, knowledgeable overview of description and interpretation with thesis statement
8-7 points
Introduces piece with required components and an overview of description and interpretation with thesis statement.
6-1 points
Introduces piece with partial and/or inaccurate components and includes only a brief or vague overview and thesis statement.
0 points
Introduction is incomplete or not present and does not correctly introduce piece or present an overview and thesis statement.
bgloss.indd 312 11/26/2015 7:40:39 PM
Managing and Using
Information Systems
A STRATEGIC APPROACH
Sixth Edition
Keri E. Pearlson
KP Partners
Carol S. Saunders
W.A. Franke College of Business
Northern Arizona University
Dr. Theo and Friedl Schoeller Research Center for Business and Society
Dennis F. Galletta
Katz Graduate School of Business
University of Pittsburgh, Pittsburgh, PA
ffirs.indd 1 12/1/2015 12:34:39 PM
VICE PRESIDENT & DIRECTOR George Hoffman
EXECUTIVE EDITOR Lise Johnson
DEVELOPMENT EDITOR Jennifer Manias
ASSOCIATE DEVELOPMENT EDITOR Kyla Buckingham
SENIOR PRODUCT DESIGNER Allison Morris
MARKET SOLUTIONS ASSISTANT Amanda Dallas
SENIOR DIRECTOR Don Fowley
PROJECT MANAGER Gladys Soto
PROJECT SPECIALIST Nichole Urban
PROJECT ASSISTANT Anna Melhorn
EXECUTIVE MARKETING MANAGER Christopher DeJohn
ASSISTANT MARKETING MANAGER Puja Katariwala
ASSOCIATE DIRECTOR Kevin Holm
SENIOR CONTENT SPECIALIST Nicole Repasky
PRO ...
Exploring the World of Research Papers for Sale in Philadelphia: A Comprehens...Words Doctorate
In today's academic environment, students frequently have to balance a variety of obligations, including attending classes, working part-time jobs, and attending to personal obligations.
Delivered at Librarians as Researcher event at York St John University 25th January 2013, hosted by Academic and Research Libraries Group Yorkshire & humberside division.
DAF group exercise: scoping data and curation requirements, by Sarah JonesJISC KeepIt project
Learn how to use the Data Asset Framework (DAF) in a directed group exercise. This was presented as part of module 1 of a 5-module course on digital preservation tools for repository managers, presented by the JISC KeepIt project. For more on this and other presentations in this course look for the tag 'KeepIt course' in the project blog http://blogs.ecs.soton.ac.uk/keepit/
Curlew Research Brussels 2014 Electronic Data & Knowledge ManagementNick Lynch
Life Science externalisation and collaboration overview and the challenges that Life Science companies face in delivering successful data sharing with their partners in either Open Innovation or pre-competitive workflows
OBJECTIVES:
To understand the importance of publication and its challenges.
To increase the visibility and accessibility of published papers.
To increase the chance of getting publications cited.
To disseminate the publication by using “Research Tools” effectively.
To increase the chance of research collaboration.
(APA 6th Edition Formatting and Style Guide)
Office of Graduate Studies
Alcorn State University
Engaging Possibilities, Pursuing Excellence
REVISED May 23, 2018
THESIS MANUAL
Graduates
2
COPYRIGHT PRIVILEGES
BELONG TO
OFFICE OF GRADUATE STUDIES
ALCORN STATE UNIVERSITY, LORMAN, MS
Reproduction for distribution of this THESIS MANUAL requires the written permission of the
Provost and Executive Vice President for Academic Affairs or Graduate Studies Administrator.
FOREWORD
Alcorn State University Office of Graduate Studies requires that all students comply with the
specifications given in this document in the publication of a thesis or non-thesis research project.
Graduate students, under faculty guidance, are expected to produce scholarly work either in the
form of a thesis or a scholarly research project.
The thesis (master or specialist) should document the student's research study and maintain a
degree of intensity.
The purpose of this manual is to assist the graduate student and the graduate thesis advisory
committee in each department with the instructions contained herein. This is the official
approved manual by the Graduate Division.
Formatting questions not addressed in these guidelines should be directed to the Graduate School
staff in the Walter Washington Administration Building, Suite 519 or by phone at
601.877.6122 or via email: [email protected] or in person.
The Graduate Studies
Thesis Advisory Committee
(Revised Spring 2018)
mailto:[email protected]
TABLE OF CONTENTS
Page
INTRODUCTION ............................................................................................................................ 3
SELECTION AND APPOINTMENT OF THESIS ADVISORY COMMITTEE ......................... 4
1. Early Topic Selection ......................................................................................................... 4
2. Selection of Thesis Chair ......................................................................................................... 4
3. Selection of Thesis Committee Members .......................................................................... 4
4. Appointment of Thesis Advisory Committee Form .......................................................... 4
5. Invitation to Prospective Committee Members ................................................................. 5
6. TAC Committee Selection ................................................................................................. 5
CHOICE OF SUBJECT .................................................................................................................... 5
PROPOSAL DEFENSE AND SUBMISSION OF PROPOSAL TO IRB ..................................... 5
PARTS OF THE MANUSCRIPT: PRELIMINARY PAGES ..................................................... 8
1. Title Page .
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right o.docxAASTHA76
(a) Thrasymachus’ (the sophist’s) definition of Justice or Right or Right Doing/Living is “The Interest of the Stronger (Might makes Right).” How does Socrates refute this definition? (cite just
one
of his arguments) [cf:
The Republic
, 30-40, Unit 1 Lecture Video]
(b) According to Socrates, what is the true definition of Justice or Right? [cf:
The Republic
, 141-42, Unit 2 Lecture Video]
(c) And why therefore is the Just life far preferable to the Unjust life (142-43)?
(a) The Allegory of the CAVE (the main metaphor of western philosophy) is an illustration of the Divided LINE.
Characterize
the Two Worlds, and the move/ascent from one to the other (exiting the CAVE, crossing the Divided LINE)—which is alone the true meaning of Education and the only way to become Just, Right, and Immortal. [cf:
The Republic
, 227-232, Unit 3 Lecture Video]
(b) How do the philosophical Studies of
Arithmetic
(number) and
Dialectic
take you above the Divided Line and out of the changing sense-world of illusion (the CAVE) into Reality and make you use your Reason (pure thought) instead of your senses? [cf:
The Republic
, 235-37, 240-42, 250-55. Unit 4 Lecture Video (transcript)]
Give a summary of the
Proof of the Force
(Why there is the “Universe,” “Man,” “God,” “History,” etc)? Start with, “Can there be
nothing
?” [cf: TJH 78-95, Unit 2 Lecture Video]
NIETZSCHE is the crucial Jedi philosopher who provides the “bridge” between negative and positive Postmodernity by focusing on a certain “Problem” and the “
Solution
” to it.
(a) Discuss
2
of the following items (
1
pertaining to the Problem,
1
pertaining to the
.
(Glossary of Telemedicine and eHealth)· Teleconsultation Cons.docxAASTHA76
(Glossary of Telemedicine and eHealth)
· Teleconsultation: Consultation between a provider and specialist at distance using either store and forward telemedicine or real time videoconferencing.
· Telehealth and Telemedicine: Telemedicine is the use of medical information exchanged from one site to another via electronic communications to improve patients' health status. Closely associated with telemedicine is the term "telehealth," which is often used to encompass a broader definition of remote healthcare that does not always involve clinical services. Videoconferencing, transmission of still images, e-health including patient portals, remote monitoring of vital signs, continuing medical education and nursing call centers are all considered part of telemedicine and telehealth. Telemedicine is not a separate medical specialty. Products and services related to telemedicine are often part of a larger investment by health care institutions in either information technology or the delivery of clinical care. Even in the reimbursement fee structure, there is usually no distinction made between services provided on site and those provided through telemedicine and often no separate coding required for billing of remote services. Telemedicine encompasses different types of programs and services provided for the patient. Each component involves different providers and consumers.
· TeleICU: TeleICU is a collaborative, interprofessional model focusing on the care of critically ill patients using telehealth technologies.
· Telemonitoring: The process of using audio, video, and other telecommunications and electronic information processing technologies to monitor the health status of a patient from a distance.
· Telemonitoring: The process of using audio, video, and other telecommunications and electronic information processing technologies to monitor the health status of a patient from a distance.
· Clinical Decision Support System (CCDS): Systems (usually electronically based and interactive) that provide clinicians, staff, patients, and other individuals with knowledge and person-specific information, intelligently filtered and presented at appropriate times, to enhance health and health care. (http://healthit.ahrq.gov/images/jun09cdsreview/09_0069_ef.html)
· e-Prescribing: The electronic generation, transmission and filling of a medical prescription, as opposed to traditional paper and faxed prescriptions. E-prescribing allows for qualified healthcare personnel to transmit a new prescription or renewal authorization to a community or mail-order pharmacy.
· Home Health Care and Remote Monitoring Systems: Care provided to individuals and families in their place of residence for promoting, maintaining, or restoring health or for minimizing the effects of disability and illness, including terminal illness. In the Medicare Current Beneficiary Survey and Medicare claims and enrollment data, home health care refers to home visits by professionals including nu.
(Assmt 1; Week 3 paper) Using ecree Doing the paper and s.docxAASTHA76
(Assmt 1; Week 3 paper): Using ecree Doing the paper and submitting it (two pages here)
Have this sheet handy as well as the sheet called FORMAT SAMPLE PAPER for Assignment 1.
1. Go to the Week 3 unit and find the blue link ASSIGNMENT 1: DEALING WITH DIVERSITY…. Click on it.
2. You will see instructions on the screen and at the top “Assignment 1: ecree”. Click on that to enter ecree.
3. You will see some summary of the assignment instructions at the top of the screen—scroll down to see the three long, blank, rectangular boxes. You will be typing into those. Remember—do not worry about a title page or double spacing. Start composing your paragraphs. It will start as a rough draft.
4. As you start typing your introduction—notice on the right that comments start developing and also video links. Also on the right you will it say “Saved a Few seconds ago”. It is saving as you go. At first the comments are red (unfavorable). The more you do, usually the more green (favorable) comments start to appear. You can also keep revising.
5. When you hit the enter key it takes you to the next paragraph box—and sometimes it creates a new paragraph box for you.
6. Doing your Sources list in ecree—Your sources do have to be listed at the end. The FORMAT SAMPLE paper illustrates what they might look like. But, putting them in ecree gracefully can be a challenge.
a. Perhaps the best way is this: Have the last regular paragraph of your essay (Part 4) be in the box labeled “Conclusion”. Once that paragraph is written—in whole or in part, do this: Click on the word “Conclusion” to form a following paragraph box marked by three dots. Keep doing that and put each source in its own “three-dot” box. In other words, after your Conclusion paragraph—the heading “Sources” gets its own paragraph box at the end, followed by separate paragraph boxes for each source entry.
b. If the approach labeled “a” above is not working out, don’t worry about the external labels of those last paragraph boxes---just be sure to have a concluding paragraph (your Part 4) followed by paragraphs for the Sources header and each source entry. In grading, I will be able to figure it out. I will be lenient on how you organize that last part, as long as you have that last paragraph and a clear Sources list.
------------------------------------
UPLOAD OPTION: You can type your paper or a good rough draft of it into MS-Word as a file. Have it organized and laid out like the FORMAT SAMPLE paper. Then Upload it to ecree. Once you upload, take a little time and edit what uploaded so that it looks like what you intended and fits the 4-part organization of the assignment.
-----------------------
7. Click “Submit” on lower right only when absolutely ready. Once you submit, it will get graded.
Have fun! (see next page for a few notes and comments on ecree)
---------.
(Image retrieved at httpswww.google.comsearchhl=en&biw=122.docxAASTHA76
(Image retrieved at https://www.google.com/search?hl=en&biw=1229&bih=568&tbm=isch&sa=1&ei=fmYIW9W3G6jH5gLn7IHYAQ&q=analysis&oq=analysis&gs_l=img.3..0i67k1l2j0l5j0i67k1l2j0.967865.968569.0.969181.7.4.0.0.0.0.457.682.1j1j4-1.3.0....0...1c.1.64.img..5.2.622...0i7i30k1.0.rL9KcsvXM1U#imgrc=LU1vXlB6e2doDM: / )
ESOL 052 (Essay #__)
Steps:
1. Discuss the readings, videos, and photographs in the Truth and Lies module on Bb.
2. Select a significant/controversial photograph to analyze. (The photograph does not have to be from Bb.)
3. Choose one of the following essay questions:
a. What truth does this photograph reveal?
b. What lie does this photograph promote?
c. Why/How did people deliberately misuse this photograph and distort its true meaning?
d. Why was this photograph misinterpreted by so many people?
e. Why do so many people have different reactions to this photograph?
f. ___________________________________________________________________________?
(Students may create their own visual analysis essay question as long as it is pre-approved by the instructor.)
4. Use the OPTIC chart to brainstorm and take notes on your photograph.
5. Use a pre-writing strategy (outline, graphic organizer, etc.) to organize your ideas.
6. Using correct MLA format, write a 3-5 page essay.
7. Type a Works Cited page. (Use citationmachine.net, easybib.com, etc. to format your info.)
8. Peer and self-edit during the writing process (Bb Wiki, in/outside class).
9. Get feedback from your peers and an instructor during the writing process.
(Note: Students who visit the Writing Center and show me proof get 2 additional days to work on the assignment.)
10. Proofread/edit/revise during the writing process.
11. Put your pre-writing, essay, and Works Cited page in 1 Word document and upload it on Bb by midnight on ______. (If a student submits an essay without pre-writing or without a Works Cited page, he/she will receive a zero. If a student submits an assignment late, he/she will receive a zero. If a student plagiarizes, he/she will receive a zero.)
Purpose: Students will be able to use their reading, writing, critical thinking, and research skills to conduct a visual analysis that explores the theme of Truth and Lies.
Tone: The tone of this assignment should be formal and academic.
Language: The diction and syntax of this assignment should be formal and academic. Students should not use second person pronouns (you/your), contractions, abbreviations, slang, or any type of casual language. Students should refer to the diction and syntax guidelines in the writing packet.
Audience: The audience of this assignment is the student’s peers and instructor.
Format: MLA style (double spaced, 1 in. margins, Times New Roman 12 font, pagination, heading, title, tab for each paragraph, in-text citations, Works Cited page, hanging indents, etc.)
Requirements:
In order for a student to earn a minimum passing grade of 70% on this assignment, h.
(Dis) Placing Culture and Cultural Space Chapter 4.docxAASTHA76
(Dis) Placing Culture and Cultural Space
Chapter 4
+
Chapter Objectives
Describe the relationships among culture, place, cultural space, and identity in the context of globalization.
Explain how people use communicative practices to construct, maintain, negotiate, and hybridize cultural spaces.
Explain how cultures are simultaneously placed and displaced in the global context leading to segregated, contested and hybrid cultural spaces.
Describe the practice of bifocal vision to highlight the linkages between “here” and “there” as well as the connections between present and past.
+
Introduction
Explore the cultural and intercultural communication dimensions of place, space and location. We will examine:
The dynamic process of placing and displacing cultural space in the context of globalization.
How people use communicative practices to construct, maintain, negotiate, and hybridize cultural spaces
How segregated, contested, and hybrid cultural spaces are both shaped by the legacy of colonialism and the context of globalization.
How Hip hop culture illustrates the cultural and intercultural dimensions of place, space, and location in the context of globalization
+
Placing Culture and Cultural Space
Culture, by definition, is rooted in place with a reciprocal relationship between people and place
Culture:
“Place tilled” in Middle English
Colere : “to inhabit, care for, till, worship” in Latin
In the context of globalization, what is the relationship between culture and place?
Culture is both placed and displaced
+
Cultural Space
The communicative practices that construct meanings in, through and about particular places
Cultural space shapes verbal and nonverbal communicative practices
i.e. Classrooms, dance club, library.
Cultural spaces are constructed through the communicative practices developed and lived by people in particular places
Communicative practices include:
The languages, accents, slang, dress, artifacts, architectural design, the behaviors and patterns of interaction, the stories, the discourses and histories
How is the cultural space of your home, neighborhood, city, and state constructed through communicative practices?
+
Place, Cultural Space and Identity
Place, Culture, Identity and Difference
What’s the relationship between place and identity?
Avowed identity:
The way we see, label and make meaning about ourselves and
Ascribed identity:
The way others view, name and describe us and our group
Examples of how avowed and ascribed identities may conflict?
How is place related to standpoint and power?
Locations of enunciation:
Sites or positions from which to speak.
A platform from which to voice a perspective and be heard and/or silenced.
+
Displacing Culture and Cultural Space
(Dis) placed culture and cultural space:
A notion that captures the complex, contradictory and contested nature of cultural space and the relationship between culture and place that has emerged in the context o.
(1) Define the time value of money. Do you believe that the ave.docxAASTHA76
(1) Define the time value of money. Do you believe that the average person considers the time value of money when they make investment decisions? Please explain.
(2) Distinguish between ordinary annuities and annuities due. Also, distinguish between the future value of an annuity and the present value of an annuity.
.
(chapter taken from Learning Power)From Social Class and t.docxAASTHA76
(chapter taken from Learning Power)
From Social Class and the Hidden Curriculum of Work
JEAN ANYON
It's no surprise that schools in wealthy communities are better than those in poor communities, or that they better prepare their students for
desirable jobs. It may be shocking, however, to learn how vast the differences in schools are - not so much in resources as in teaching methods
and philosophies of education. Jean Anyon observed five elementary schools over the course of a full school year and concluded that fifth-
graders of different economic backgrounds are already being prepared to occupy particular rungs on the social ladder. In a sense, some whole
schools are on the vocational education track, while others are geared to produce future doctors, lawyers, and business leaders. Anyon's main
audience is professional educators, so you may find her style and vocabulary challenging, but, once you've read her descriptions of specific
classroom activities, the more analytic parts of the essay should prove easier to understand. Anyon is chairperson of the Department of
Education at Rutgers University, Newark; This essay first appeared in Journal of Education in 1980.
Scholars in political economy and the sociology of knowledge have recently argued that public schools in complex industrial societies like our
own make available different types of educational experience and curriculum knowledge to students in different social classes. Bowles and
Gintis1 for example, have argued that students in different social-class backgrounds are rewarded for classroom behaviors that correspond to
personality traits allegedly rewarded in the different occupational strata--the working classes for docility and obedience, the managerial classes
for initiative and personal assertiveness. Basil Bernstein, Pierre Bourdieu, and Michael W. Apple focusing on school knowledge, have argued
that knowledge and skills leading to social power and regard (medical, legal, managerial) are made available to the advantaged social groups but
are withheld from the working classes to whom a more "practical" curriculum is offered (manual skills, clerical knowledge). While there has
been considerable argumentation of these points regarding education in England, France, and North America, there has been little or no attempt
to investigate these ideas empirically in elementary or secondary schools and classrooms in this country.3
This article offers tentative empirical support (and qualification) of the above arguments by providing illustrative examples of differences in
student work in classrooms in contrasting social class communities. The examples were gathered as part of an ethnographical4 study of
curricular, pedagogical, and pupil evaluation practices in five elementary schools. The article attempts a theoretical contribution as well and
assesses student work in the light of a theoretical approach to social-class analysis.. . It will be suggested that there is a "hidden.
(Accessible at httpswww.hatchforgood.orgexplore102nonpro.docxAASTHA76
(Accessible at https://www.hatchforgood.org/explore/102/nonprofit-photography-ethics-and-approaches)
Nonprofit Photography: Ethics
and Approaches
Best practices and tips on ethics and approaches in
humanitarian photography for social impact.
The first moon landing. The Vietnamese ‘napalm girl’, running naked and in agony. The World
Trade Centers falling.
As we know, photography carries the power to inspire, educate, horrify and compel its viewers to
take action. Images evoke strong and often public emotions, as people frequently formulate their
opinions, judgments and behaviors in response to visual stimuli. Because of this, photography
can wield substantial control over public perception and discourse.
Moreover, photography in our digital age permits us to deliver complex information about
remote conditions which can be rapidly distributed and effortlessly processed by the viewer.
Recently, we’ve witnessed the profound impact of photography coupled with social media:
together, they have fueled political movements and brought down a corrupt government.
Photography can - and has - changed the course of history.
Ethical Considerations
Those who commission and create photography of marginalized populations to further an
organizations’ mission possess a tremendous responsibility. Careful ethical consideration should
be given to all aspects of the photography supply chain: its planning, creation, and distribution.
When planning a photography campaign, it is important to examine the motives for creating
particular images and their potential impact. Not only must a faithful, comprehensive visual
depiction of the subjects be created to avoid causing misconception, but more importantly, the
subjects’ dignity must be preserved. Words and images that elicit an emotional response by their
sheer shock value (e.g. starving, skeletal children covered in flies) are harmful because they
exploit the subjects’ condition in order to generate sympathy for increasing charitable donations
or support for a given cause. In addition to violating privacy and human rights, this so-called
'poverty porn’ is harmful to those it is trying to aid because it evokes the idea that the
marginalized are helpless and incapable of helping themselves, thereby cultivating a culture of
paternalism. Poverty porn is also detrimental because it is degrading, dishonoring and robs
people of their dignity. While it is important to illustrate the challenges of a population, one must
always strive to tell stories in a way that honors the subjects’ circumstances, and (ideally)
illustrates hope for their plight.
Legal issues
Legal issues are more clear cut when images are created or used in stable countries where legal
precedent for photography use has been established. Image use and creation becomes far more
murky and problematic in countries in which law and order is vague or even nonexistent.
Even though images created for no.
(a) The current ratio of a company is 61 and its acid-test ratio .docxAASTHA76
(a) The current ratio of a company is 6:1 and its acid-test ratio is 1:1. If the inventories and prepaid items amount to $445,500, what is the amount of current liabilities?
Current Liabilities
$
89100
(b) A company had an average inventory last year of $113,000 and its inventory turnover was 6. If sales volume and unit cost remain the same this year as last and inventory turnover is 7 this year, what will average inventory have to be during the current year? (Round answer to 0 decimal places, e.g. 125.)
Average Inventory
$
96857
(c) A company has current assets of $88,800 (of which $35,960 is inventory and prepaid items) and current liabilities of $35,960. What is the current ratio? What is the acid-test ratio? If the company borrows $12,970 cash from a bank on a 120-day loan, what will its current ratio be? What will the acid-test ratio be? (Round answers to 2 decimal places, e.g. 2.50.)
Current Ratio
2.47
:1
Acid Test Ratio
:1
New Current Ratio
:1
New Acid Test Ratio
:1
(d) A company has current assets of $586,700 and current liabilities of $200,100. The board of directors declares a cash dividend of $173,700. What is the current ratio after the declaration but before payment? What is the current ratio after the payment of the dividend? (Round answers to 2 decimal places, e.g. 2.50.)
Current ratio after the declaration but before payment
:1
Current ratio after the payment of the dividend
:1
The following data is given:
December 31,
2015
2014
Cash
$66,000
$52,000
Accounts receivable (net)
90,000
60,000
Inventories
90,000
105,000
Plant assets (net)
380,500
320,000
Accounts payable
54,500
41,500
Salaries and wages payable
11,500
5,000
Bonds payable
70,500
70,000
8% Preferred stock, $40 par
100,000
100,000
Common stock, $10 par
120,000
90,000
Paid-in capital in excess of par
80,000
70,000
Retained earnings
190,000
160,500
Net credit sales
930,000
Cost of goods sold
735,000
Net income
81,000
Compute the following ratios: (Round answers to 2 decimal places e.g. 15.25.)
(a)
Acid-test ratio at 12/31/15
: 1
(b)
Accounts receivable turnover in 2015
times
(c)
Inventory turnover in 2015
times
(d)
Profit margin on sales in 2015
%
(e)
Return on common stock equity in 2015
%
(f)
Book value per share of common stock at 12/31/15
$
Exercise 24-4
As loan analyst for Utrillo Bank, you have been presented the following information.
Toulouse Co.
Lautrec Co.
Assets
Cash
$113,900
$311,200
Receivables
227,200
302,700
Inventories
571,200
510,700
Total current assets
912,300
1,124,600
Other assets
506,000
619,800
Total assets
$1,418,300
$1,744,400
Liabilities and Stockholders’ Equity
Current liabilities
$291,300
$350,400
Long-term liabilities
390,800
506,000
Capital stock and retained earnings
736,200
888,000
Total liabilities and stockholders’ equity
$1.
(1) How does quantum cryptography eliminate the problem of eaves.docxAASTHA76
(1) How does quantum cryptography eliminate the problem of eavesdropping in traditional cryptography?
(2) What are the limitations or problems associated with quantum cryptography?
(3) What features or activities will affect both the current and future developments of cryptography?
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
References
.
#transformation
10
Event
Trends
for 2019
10 Event Trends for 2019
C O P Y R I G H T
All rights reserved. No part of this report may be
reproduced or transmitted in any form or by any
means whatsoever (including presentations, short
summaries, blog posts, printed magazines, use
of images in social media posts) without express
written permission from the author, except in the
case of brief quotations (50 words maximum and
for a maximum of 2 quotations) embodied in critical
articles and reviews, and with clear reference to
the original source, including a link to the original
source at https://www.eventmanagerblog.com/10-
event-trends/. Please refer all pertinent questions
to the publisher.
page 2
https://www.eventmanagerblog.com/10-event-trends/
https://www.eventmanagerblog.com/10-event-trends/
10 Event Trends for 2019
CONTENTS
INTRODUCTION page 5
TRANSFORMATION 8
10. PASSIVE ENGAGEMENT 10
9. CONTENT DESIGN 13
8. SEATING MATTERS 16
7. JOMO - THE JOY OF MISSING OUT 19
6. BETTER SAFE THAN SORRY 21
5. CAT SPONSORSHIP 23
4. SLOW TICKETING 25
3. READY TO BLOCKCHAIN 27
2. MARKETING BUDGETS SHIFTING MORE TO EVENTS 28
1. MORE THAN PLANNERS 30
ABOUT THE AUTHOR 31
CMP CREDITS 32
CREDITS AND THANKS 32
DISCLAIMER 32
page 3
INTERACTIVITY
AT THE HEART OF YOUR MEETINGS
Liven up your presentations!
EVENIUM
ConnexMe
San Francisco/Paris [email protected]
AD
https://eventmb.com/2PvIw1f
10 Event Trends for 2019
I am very glad to welcome you to the 8th edition of our annual
event trends. This is going to be a different one.
One element that made our event trends stand out from
the thousands of reports and articles on the topic is that we
don’t care about pleasing companies, pundits, suppliers, star
planners and the likes. Our only focus is you, the reader, to
help you navigate through very uncertain times.
This is why I decided to bring back this report, by far the most
popular in the industry, to its roots. 10 trends that will actually
materialize between now and November 2019, when we will
publish edition number nine.
I feel you have a lot going on, with your events I mean.
F&B, room blocks, sponsorship, marketing security, technology.
I think I failed you in previous editions. I think I gave you too
much. This report will be the most concise and strategic piece
of content you will need for next year.
If you don’t read anything else this year, it’s fine. As long as you
read the next few words.
INTRODUCTION
INTRODUCTION -
Julius Solaris
EventMB Editor
page 5
https://www.eventmanagerblog.com
10 Event Trends for 2019
How did I come up with these trends?
~ As part of this report, we reviewed 350 events. Some of the most successful
worldwide.
~ Last year we started a community with a year-long trend watch. That helped
us to constantly research new things happening in the industry.
~ We have reviewed north of 300 event technology solutions for our repor.
$10 now and $10 when complete Use resources from the required .docxAASTHA76
$10 now and $10 when complete
Use resources from the required readings or the GCU Library to create a 10‐15 slide digital presentation to be shown to your colleagues informing them of specific cultural norms and sociocultural influences affecting student learning at your school.
Choose a culture to research. State the country or countries of origin of your chosen culture and your reason for selecting it.
Include sociocultural influences on learning such as:
Religion
Dress
Cultural Norms
Food
Socialization
Gender Differences
Home Discipline
Education
Native Language
Include presenter’s notes, a title slide, in‐text citations, and a reference slide that contains three to five sources from the required readings or the GCU Library.
.
#include <string.h>
#include <stdlib.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <stdio.h>
#include <unistd.h>
#include <string.h>
// Function: void parse(char *line, char **argv)
// Purpose : This function takes in a null terminated string pointed to by
// <line>. It also takes in an array of pointers to char <argv>.
// When the function returns, the string pointed to by the
// pointer <line> has ALL of its whitespace characters (space,
// tab, and newline) turned into null characters ('\0'). The
// array of pointers to chars will be modified so that the zeroth
// slot will point to the first non-null character in the string
// pointed to by <line>, the oneth slot will point to the second
// non-null character in the string pointed to by <line>, and so
// on. In other words, each subsequent pointer in argv will point
// to each subsequent "token" (characters separated by white space)
// IN the block of memory stored at the pointer <line>. Since all
// the white space is replaced by '\0', every one of these "tokens"
// pointed to by subsequent entires of argv will be a valid string
// The "last" entry in the argv array will be set to NULL. This
// will mark the end of the tokens in the string.
//
void parse(char *line, char **argv)
{
// We will assume that the input string is NULL terminated. If it
// is not, this code WILL break. The rewriting of whitespace characters
// and the updating of pointers in argv are interleaved. Basically
// we do a while loop that will go until we run out of characters in
// the string (the outer while loop that goes until '\0'). Inside
// that loop, we interleave between rewriting white space (space, tab,
// and newline) with nulls ('\0') AND just skipping over non-whitespace.
// Note that whenever we encounter a non-whitespace character, we record
// that address in the array of address at argv and increment it. When
// we run out of tokens in the string, we make the last entry in the array
// at argv NULL. This marks the end of pointers to tokens. Easy, right?
while (*line != '\0') // outer loop. keep going until the whole string is read
{ // keep moving forward the pointer into the input string until
// we encounter a non-whitespace character. While we're at it,
// turn all those whitespace characters we're seeing into null chars.
while (*line == ' ' || *line == '\t' || *line == '\n' || *line == '\r')
{ *line = '\0';
line++;
}
// If I got this far, I MUST be looking at a non-whitespace character,
// or, the beginning of a token. So, let's record the address of this
// beginning of token to the address I'm pointing at now. (Put it in *argv)
.
$ stated in thousands)Net Assets, Controlling Interest.docxAASTHA76
$ stated in thousands)
Net Assets, Controlling Interest
–
–
Net Assets, Noncontrolling Interest
AUDIT COMMITTEE
of the
Executive Board of the Boy Scouts of America
Francis R. McAllister, Chairman
David Biegler Ronald K. Migita
Dennis H. Chookaszian David Moody
Report of Independent Auditors
To the Executive Board of the National Council of the Boy Scouts of America
We have audited the accompanying consolidated financial statements of the National Council of the Boy Scouts
of America and its affiliates (the National Council), which comprise the consolidated statement of financial position
as of December 31, 2016, and the related consolidated statements of revenues, expenses, and other changes in net
assets, of functional expenses and of cash flows for the year then ended.
Management’s Responsibility for the Consolidated Financial Statements
Management is responsible for the preparation and fair presentation of the consolidated financial statements
in accordance with accounting principles generally accepted in the United States of America; this includes the
design, implementation and maintenance of internal control relevant to the preparation and fair presentation of
consolidated financial statements that are free from material misstatement, whether due to fraud or error.
Auditors’ Responsibility
Our responsibility is to express an opinion on the consolidated financial statements based on our audit. We
conducted our audit in accordance with auditing standards generally accepted in the United States of America.
Those standards require that we plan and perform the audit to obtain reasonable assurance about whether the
consolidated financial statements are free from material misstatement.
An audit involves performing procedures to obtain audit evidence about the amounts and disclosures in the
consolidated financial statements. The procedures selected depend on our judgment, including the assessment of
the risks of material misstatement of the consolidated financial statements, whether due to fraud or error. In making
those risk assessments, we consider internal control relevant to the National Council’s preparation and fair
presentation of the consolidated financial statements in order to design audit procedures that are appropriate in the
circumstances, but not for the purpose of expressing an opinion on the effectiveness of the National Council’s
internal control. Accordingly, we express no such opinion. An audit also includes evaluating the appropriateness of
accounting policies used and the reasonableness of significant accounting estimates made by management, as well as
evaluating the overall presentation of the consolidated financial sta.
#include <stdio.h>
#include <stdlib.h>
#include <pthread.h>
#include <time.h>
#include <unistd.h>
// Change the constant below to change the number of philosophers
// coming to lunch...
// This is a known GOOD solution based on the Arbitrator
// solution
#define PHILOSOPHER_COUNT 20
// Each philosopher is represented by one thread. Each thread independenly
// runs the same "think/start eating/finish eating" program.
pthread_t philosopher[PHILOSOPHER_COUNT];
// Each chopstick gets one mutex. If there are N philosophers, there are
// N chopsticks. That's the whole problem. There's not enough chopsticks
// for all of them to be eating at the same time. If they all cooperate,
// everyone can eat. If they don't... or don't know how.... well....
// philosophers are going to starve.
pthread_mutex_t chopstick[PHILOSOPHER_COUNT];
// The arbitrator solution adds a "waiter" that ensures that only pairs of
// chopsticks are grabbed. Here is the mutex for the waiter ;)
pthread_mutex_t waiter;
void *philosopher_program(int philosopher_number)
{ // In this version of the "philosopher program", the philosopher
// will think and eat forever.
while (1)
{ // Philosophers always think before they eat. They need to
// build up a bit of hunger....
//printf ("Philosopher %d is thinking\n", philosopher_number);
usleep(1);
// That was a lot of thinking.... now hungry... this
// philosopher (who knows his own number) grabs the chopsticks
// to her/his right and left. The chopstick to the left of
// philosopher N is chopstick N. The chopstick to the right
// of philosopher N is chopstick N+1
//printf ("Philosopher %d wants chopsticks\n",philosopher_number);
pthread_mutex_lock(&waiter);
pthread_mutex_lock(&chopstick[philosopher_number]);
pthread_mutex_lock(&chopstick[(philosopher_number+1)%PHILOSOPHER_COUNT]);
pthread_mutex_unlock(&waiter);
// Hurray, if I got this far I'm eating
printf ("Philosopher %d is eating\n",philosopher_number);
//usleep(1); // I spend twice as much time eating as thinking...
// typical....
// I'm done eating. Now put the chopsticks back on the table
//printf ("Philosopher %d finished eating\n",philosopher_number);
pthread_mutex_unlock(&chopstick[philosopher_number]);
pthread_mutex_unlock(&chopstick[(philosopher_number+1)%PHILOSOPHER_COUNT]);
//printf("Philosopher %d has placed chopsticks on the table\n", philosopher_number);
}
return(NULL);
}
int main()
{ int i;
srand(time(NULL));
for(i=0;i<PHILOSOPHER_COUNT;i++)
pthread_mutex_init(&chopstick[i],NULL);
pthread_mutex_init(&waiter,NULL);
for(i=0;i<PH.
#Assessment BriefDiploma of Business Eco.docxAASTHA76
#
Assessment BriefDiploma of Business Economics for Business
Credit points : 6 Prerequisites : None Co-requisites :
Subject Coordinator : Harriet Scott
Deadline : Sunday at the end of week 10 (Turnitin via CANVAS submission). Reflection due week 11 in tutorials.
ASSESSMENT TASK #3: FINAL CASE STUDY REPORT 25%
TASK DESCRIPTION
This assessment is a formal business report on a case study. Case studies will be assigned to students in the Academic and Business Communication subject. Readings on the case study are available on Canvas, in the Economics for Business subject. Students will also write a reflection on learning in tutorial classes in week 11.
LEARNING OUTCOMES
· Demonstrates understanding of microeconomic and macroeconomic concepts
· Applies economic concepts to contemporary issues and events
· Evaluates possible solutions for contemporary economic and business problems
· Communicates economic information in a business report format
INSEARCH CRICOS provider code: 00859D I UTS CRICOS provider code: 00099F INSEARCH Limited is a controlled entity of the University of Technology, Sydney (UTS), a registered non-self accrediting higher education institution and a pathway provider to UTS.
1. Refer to the case study you are working on for your presentation in Academic and Business Communication. Read the news stories for your case study, found on Canvas.
2. Individually, write a business report that includes the following information:
· Description of the main issue/problem and causes
· Description of the impact on stakeholders
· Analysis of economic concepts relevant to the case study (3-5 concepts)
· Recommendations for alternate solutions to the issue/problem
3. In your week 11 tutorial, write your responses to the reflection questions provided by your tutor, describing your learning experience in this assessment.
Other Requirements Format: Business Report
· Use the Business Report format as taught in BABC001 (refer to CANVAS Help for more information)
· Write TEEL paragraphs (refer to CANVAS Help for more information)
· All work submitted must be written in your own words, using paraphrasing techniques taught in BABC001
· Check Canvas — BECO — Assessments — Final Report page and ‘Writing a report' flyer for more information
Report Presentation: You need to include:
· Cover page as taught in BABC001
· Table of contents - list headings, subheadings and page numbers
· Reference list - all paraphrased/summarised/quoted evidence should include citations; all citations should be detailed in the Reference List
Please ensure your assignment is presented professionally. Suggested structure:
· Cover page
· Table of contents (bold, font size 18)
· Executive summary (bold, font size 18)
· 1.0 Introduction (bold, font size 16)
· 2.0 Main issue (bold, font size 16)
o 2.1 Causes (italics, font size 14)
· 3.0 Stakeholders (bold, font size 16)
o 3.1 Stakeholder 1 (italics, font size 14) o 3.2 Stakeholder 2 (italics, font size 14) o 3.3 Stakeholde.
#include <stdio.h>
#include <stdint.h>
#include <stdbool.h>
// Prototype of FOUR functions, each for a STATE.
// The func in State 1 performs addition of "unsigned numbers" x0 and x1.
int s1_add_uintN(int x0, int x1, bool *c_flg);
// The func in State 2 performs addition of "signed numbers" x0 and x1.
int s2_add_intN(int x0, int x1, bool *v_flg);
// The func in State 3 performs subtraction of "unsigned numbers" x0 and x1.
int s3_sub_uintN(int x0, int x1, bool *c_flg);
// The func in State 3 performs subtraction of "signed numbers" x0 and x1.
int s4_sub_intN(int x0, int x1, bool *v_flg);
// We define the number of bits and the related limits of unsigned and
// and signed numbers.
#define N 5 // number of bits
#define MIN_U 0 // minimum value of unsigned N-bit number
#define MAX_U ((1 << N) - 1) // maximum value of unsigned N-bit number
#define MIN_I (-(1 << (N-1)) ) // minimum value of signed N-bit number
#define MAX_I ((1 << (N-1)) - 1) // maximum value of signed N-bit number
// We use the following three pointers to access data, which can be changed
// when the program pauses. We need to make sure to have the RAM set up
// for these addresses.
int *pIn = (int *)0x20010000U; // the value of In should be -1, 0, or 1.
int *pX0 = (int *)0x20010004U; // X0 and X1 should be N-bit integers.
int *pX1 = (int *)0x20010008U;
int main(void) {
enum progState{State1 = 1, State2, State3, State4};
enum progState cState = State1; // Current State
bool dataReady = false;
bool cFlg, vFlg;
int result;
while (1) {
dataReady = false;
// Check if the data are legitimate
while (!dataReady) {
printf("Halt program here to provide correct update of data\n");
printf("In should be -1, 0, and 1 and ");
printf("X0 and X1 should be N-bit SIGNED integers\n");
if (((-1 <= *pIn) && (*pIn <= 1)) &&
((MIN_I <= *pX0) && (*pX0 <= MAX_I)) &&
((MIN_I <= *pX1) && (*pX1 <= MAX_I))) {
dataReady = true;
}
}
printf("Your input: In = %d, X0 = %d, X1 = %d \n", *pIn, *pX0, *pX1);
switch (cState) {
case State1:
result = s1_add_uintN(*pX0, *pX1, &cFlg);
printf("State = %d, rslt = %d, Cflg = %d\n", cState, result, cFlg);
cState += *pIn;
if (cState < State1) cState += State4;
break;
case State2:
result = s2_add_intN(*pX0, *pX1, &vFlg);
printf("State = %d, rslt = %d, Vflg = %d\n", cState, result, vFlg);
cState += *pIn;
break;
case State3:
case State4:
default:
printf("Error with the program state\n");
}
}
}
int s1_add_uintN(int x0, int x1, bool *c_flg) {
if (x0 < 0) x0 = x0 + MAX_U + 1;
if.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Overview on Edible Vaccine: Pros & Cons with Mechanism
An easy way to help students learn, collaborate,
1. An easy way to
help students learn,
collaborate, and grow.
Designed to engage today’s student,
WileyPLUS Learning Space will
transform any course into a vibrant,
collaborative learning community.
www.wileypluslearningspace.com
Identify which students
are struggling early in the
semester.
Educators assess the real-time
engagement and performance of
each student to inform teaching
decisions. Students always know
what they need to work on.
Facilitate student
engagement both in and
outside of class.
Educators can quickly organize
learning activities, manage student
collaboration, and customize
their course.
Measure outcomes
4. For more information about Wiley products, visit
www.wiley.com.
Designations used by companies to distinguish their products
are often claimed as trademarks. All brand names and product
names used in this book are trade names, service marks,
trademarks or registered trademarks of their respective owners.
The
publisher is not associated with any product or vendor
mentioned in this book. This publication is designed to provide
accurate
and authoritative information in regard to the subject matter
covered. It is sold on the understanding that the publisher is
not engaged in rendering professional services. If professional
advice or other expert assistance is required, the services of a
competent professional should be sought.
Library of Congress Cataloging‐ in‐ Publication Data
Names: Sekaran, Uma, author. | Bougie, Roger, author.
Title: Research methods for business : a skill-building approach
/ Uma
Sekaran and Roger Bougie.
Description: Seventh edition. | Chichester, West Sussex, United
Kingdom :
John Wiley & Sons, [2016] | Includes bibliographical
references and index.
Identifiers: LCCN 2015051045 | ISBN 9781119165552 (pbk.)
Subjects: LCSH: Business—Research—Methodology.
Classification: LCC HD30.4 .S435 2016 | DDC 650.072—dc23
LC record available at http://lccn.loc.gov/2015051045
ISBN: 9781119165552 (pbk)
ISBN: 9781119266846 (ebk)
A catalogue record for this book is available from the British
5. Library.
Set in 10/12 Minion Pro by SPi Global
Printed and bound in Italy by Printer Trento Srl.
vii
CONTENTS
About the Authors xix
Preface xxi
Acknowledgments xxiii
1 Introduction to research 1
Introduction 1
Business research 2
The role of theory and information in research 3
Research and the manager 3
Types of business research: applied and basic 5
Applied research 6
Basic or fundamental research 7
Managers and research 8
Why managers need to know about research 8
The manager and the consultant–researcher 9
Internal versus external consultants/researchers 10
Internal consultants/researchers 10
Advantages of internal consultants/researchers 10
Disadvantages of internal consultants/researchers 11
6. External consultants/researchers 11
Advantages of external consultants/researchers 11
Disadvantages of external consultants/researchers 12
Knowledge about research and managerial effectiveness 12
Ethics and business research 13
Summary 13
Discussion questions 14
Case: The Laroche Candy Company 15
2 The scientific approach and alternative approaches to
investigation 18
Introduction 18
The hallmarks of scientific research 19
Purposiveness 19
Rigor 19
Testability 20
Replicability 20
Precision and confidence 21
viii contents
Objectivity 21
Generalizability 22
Parsimony 22
The hypothetico-deductive method 23
The seven-step process in the hypothetico-deductive method 23
Identify a broad problem area 23
Define the problem statement 23
Develop hypotheses 23
7. Determine measures 24
Data collection 24
Data analysis 24
Interpretation of data 24
Review of the hypothetico-deductive method 26
Some obstacles to conducting scientific research in the
management area 27
Alternative approaches to research 28
Positivism 28
Constructionism 28
Critical realism 29
Pragmatism 29
Conclusion 29
Summary 30
Discussion questions 31
3 Defining and refining the problem 33
Introduction 33
The broad problem area 33
Preliminary research 37
Nature of information to be gathered 37
Background information on the organization 37
Information on the topic or subject area 38
Defining the problem statement 39
What makes a good problem statement? 39
Basic types of questions: exploratory and descriptive 43
Exploratory research questions 43
Descriptive research questions 43
Causal research questions 44
8. The research proposal 45
Managerial implications 47
Ethical issues in the preliminary stages of investigation 47
Summary 48
Discussion questions 49
contents ix
4 The critical literature review 51
Introduction 51
How to approach the literature review 54
Data sources 54
Textbooks 54
Journals 54
Theses 55
Conference proceedings 55
Unpublished manuscripts 55
Reports 55
Newspapers 55
The Internet 55
Searching for literature 56
Evaluating the literature 56
Documenting the literature review 57
Ethical issues 59
Summary 60
Discussion questions 61
Practice project 62
Appendix 63
Some online resources useful for business research 63
Bibliographical databases 66
Apa format for referencing relevant articles 66
9. Referencing and quotation in the literature review section 69
5 Theoretical framework and hypothesis development 71
Introduction 71
The need for a theoretical framework 72
Variables 72
Dependent variable 73
Independent variable 74
Moderating variable 75
The distinction between an independent variable
and a moderating variable 77
Mediating variable 79
How theory is generated 81
The components of the theoretical framework 82
Hypothesis development 83
Definition of a hypothesis 84
Statement of hypotheses: formats 84
If–then statements 84
x contents
Directional and nondirectional hypotheses 84
Null and alternate hypotheses 85
Managerial implications 90
Summary 91
Discussion questions 92
Practice project 94
10. 6 Elements of research design 95
Introduction 95
The research design 95
Elements of research design 96
Research strategies 96
Experiments 97
Survey research 97
Ethnography 97
Case studies 98
Grounded theory 98
Action research 98
Extent of researcher interference with the study 99
Study setting: contrived and noncontrived 100
Unit of analysis: individuals, dyads, groups, organizations,
cultures 102
Time horizon: cross-sectional versus longitudinal studies 104
Cross-sectional studies 104
Longitudinal studies 105
Mixed methods 106
Trade-offs and compromises 107
Managerial implications 108
Summary 108
Discussion questions 109
7 Interviews 111
Introduction 111
Primary data collection methods 111
Interviews 113
Unstructured and structured interviews 113
Unstructured interviews 113
11. Structured interviews 115
Review of unstructured and structured interviews 116
Training interviewers 116
Some tips to follow when interviewing 117
Establishing credibility and rapport, and motivating individuals
to respond 117
The questioning technique 118
Review of tips to follow when interviewing 119
contents xi
Face-to-face and telephone interviews 119
Face-to-face interviews: advantages and disadvantages 120
Telephone interviews: advantages and disadvantages 120
Additional sources of bias in interview data 120
Computer-assisted interviewing 120
CATI and CAPI 121
Software packages 121
Group interviews 121
Focus groups 121
Expert panels 122
Advantages and disadvantages of interviews 123
Summary 123
Discussion questions 124
8 Data collection methods: Observation 126
Introduction 126
Definition and purpose of observation 127
12. Four key dimensions that characterize the
type of observation 127
Controlled versus uncontrolled observational studies 127
Participant versus nonparticipant observation 128
Structured versus unstructured observational studies 128
Concealed versus unconcealed observation 129
Two important approaches to observation 130
Participant observation: introduction 130
The participatory aspect of participant observation 130
The observation aspect of participant observation 131
What to observe 133
Structured observation: introduction 134
The use of coding schemes in structured observation 136
Advantages and disadvantages of observation 137
Summary 139
Discussion questions 140
9 Administering questionnaires 142
Introduction 142
Types of questionnaires 142
Personally administered questionnaires 143
Mail questionnaires 143
Electronic and online questionnaires 143
Guidelines for questionnaire design 145
Principles of wording 146
Content and purpose of the questions 146
xii contents
13. Language and wording of the questionnaire 146
Type and form of questions 146
Sequencing of questions 149
Classification data or personal information 149
Principles of measurement 150
General appearance or “getup” of the questionnaire 150
Review of questionnaire design 154
Pretesting of structured questions 155
Electronic questionnaire and survey design 155
International dimensions of surveys 155
Special issues in instrumentation for cross-cultural research 156
Issues in cross-cultural data collection 156
Review of the advantages and disadvantages of different
data collection methods and when to use each 157
Multimethods of data collection 158
Managerial implications 159
Ethics in data collection 159
Ethics and the researcher 159
Ethical behavior of respondents 160
Summary 160
Discussion questions 161
10 Experimental designs 165
Introduction 165
The lab experiment 167
Control 168
Manipulation 168
14. Controlling the contaminating exogenous or “nuisance”
variables 170
Matching groups 170
Randomization 170
Internal validity of lab experiments 171
External validity or generalizability of lab experiments 171
The field experiment 172
External and internal validity in experiments 172
Trade-off between internal and external validity 172
Factors affecting the validity of experiments 173
History effects 173
Maturation effects 174
Testing effects 174
Selection bias effects 175
Mortality effects 175
Statistical regression effects 176
Instrumentation effects 176
Identifying threats to validity 177
contents xiii
Review of factors affecting internal and external validity 178
Types of experimental design and validity 179
Quasi-experimental designs 179
Pretest and posttest experimental group design 179
Posttests only with experimental and control groups 179
Time series design 180
15. True experimental designs 181
Pretest and posttest experimental and control group design 181
Solomon four-group design 181
Double-blind studies 183
Ex post facto designs 184
Simulation 184
Ethical issues in experimental design research 185
Managerial implications 186
Summary 187
Discussion questions 189
Appendix: Further experimental designs 190
The completely randomized design 190
Randomized block design 191
Latin square design 191
Factorial design 192
11 Measurement of variables: Operational definition 193
Introduction 193
How variables are measured 193
Operational definition (operationalization) 195
Operationalization: dimensions and elements 196
Operationalizing the (multidimensional) concept of achievement
motivation 197
Dimensions and elements of achievement motivation 198
What operationalization is not 202
Review of operationalization 203
International dimensions of operationalization 204
Summary 204
Discussion questions 205
16. 12 Measurement: Scaling, reliability and validity 206
Introduction 206
Four types of scales 207
Nominal scale 207
Ordinal scale 208
Interval scale 209
Ratio scale 209
xiv contents
Ordinal or interval? 210
Review of scales 212
Rating scales 213
Dichotomous scale 213
Category scale 214
Semantic differential scale 214
Numerical scale 214
Itemized rating scale 215
Likert scale 215
Fixed or constant sum scale 216
Stapel scale 216
Graphic rating scale 217
Consensus scale 218
Other scales 218
Ranking scales 218
Paired comparison 218
Forced choice 218
Comparative scale 219
International dimensions of scaling 219
Goodness of measures 220
17. Item analysis 220
Validity 220
Content validity 221
Criterion-related validity 221
Construct validity 222
Reliability 223
Stability of measures 224
Internal consistency of measures 224
Reflective versus formative measurement scales 225
What is a reflective scale? 225
What is a formative scale and why do the items of a formative
scale not necessarily hang together? 225
Summary 226
Discussion questions 227
Appendix: Examples of some measures 229
Measures from behavioral finance research 229
Measures from management accounting research 230
Measures from management research 230
Measures from marketing research 232
13 Sampling 235
Introduction 235
Population, element, sample, sampling unit, and subject 236
Population 236
contents xv
18. Element 237
Sample 237
Sampling unit 237
Subject 237
Sample data and population values 237
Parameters 238
Representativeness of Samples 238
Normality of Distributions 238
The sampling process 239
Defining the population 240
Determining the sample frame 240
Determining the sampling design 240
Determining the sample size 241
Executing the sampling process 241
Probability sampling 242
Unrestricted or simple random sampling 242
Restricted or complex probability sampling 243
Systematic sampling 243
Stratified random sampling 244
Cluster sampling 246
Double sampling 247
Review of probability sampling designs 247
Nonprobability sampling 247
Convenience sampling 247
Purposive sampling 248
Judgment sampling 248
Quota sampling 248
Review of nonprobability sampling designs 249
19. Intermezzo: examples of when certain sampling designs would
be appropriate 252
Simple random sampling 252
Stratified random sampling 252
Systematic sampling 253
Cluster sampling 254
Area sampling 254
Double sampling 255
Convenience sampling 255
Judgment sampling: one type of purposive sampling 255
Quota sampling: a second type of purposive sampling 256
Issues of precision and confidence in determining sample size
257
Precision 257
Confidence 258
Sample data, precision, and confidence in estimation 258
Trade-off between confidence and precision 259
Sample data and hypothesis testing 260
xvi contents
The sample size 261
Determining the sample size 262
Sample size and type II errors 264
Statistical and practical significance 264
Rules of thumb 264
Efficiency In Sampling 265
Sampling as related to qualitative studies 265
Managerial implications 266
Summary 266
20. Discussion questions 268
14 Quantitative data analysis 271
Introduction 271
Getting the data ready for analysis 273
Coding and data entry 273
Coding the responses 273
Data entry 275
Editing data 276
Data transformation 277
Getting a feel for the data 278
Frequencies 279
Bar charts and pie charts 280
Measures of central tendency and dispersion 282
Measures of central tendency 282
Measures of dispersion 283
Relationships between variables 285
Relationship between two nominal variables: χ2 test 285
Correlations 286
Excelsior enterprises: descriptive statistics part 1 287
Testing the goodness of measures 289
Reliability 289
Excelsior Enterprises: checking the reliability of the multi -item
measures 290
Validity 292
Excelsior enterprises: descriptive statistics part 2 293
Summary 296
21. Discussion questions 297
15 Quantitative data analysis: Hypothesis testing 300
Introduction 300
Type I errors, type II errors, and statistical power 301
Choosing the appropriate statistical technique 302
Testing a hypothesis about a single mean 302
contents xvii
Testing hypotheses about two related means 305
Testing hypotheses about two unrelated means 309
Testing hypotheses about several means 311
Regression analysis 312
Standardized regression coefficients 315
Regression with dummy variables 315
Multicollinearity 316
Testing moderation using regression analysis: interaction
effects 316
Other multivariate tests and analyses 319
Discriminant analysis 319
Logistic regression 319
Conjoint analysis 320
Two-way ANOVA 322
MANOVA 322
Canonical correlation 322
Excelsior enterprises: hypothesis testing 323
Overall interpretation and recommendations to the president 325
Data warehousing, data mining, and operations research 326
22. Some software packages useful for data analysis 327
Summary 328
Discussion questions 329
16 Qualitative data analysis 332
Introduction 332
Three important steps in qualitative data analysis 332
Data reduction 334
Data display 347
Drawing conclusions 347
Reliability and validity in qualitative research 348
Some other methods of gathering and analyzing qualitative data
350
Content analysis 350
Narrative analysis 350
Analytic induction 350
Big data 351
Summary 351
Discussion questions 352
17 The research report 353
Introduction 353
The written report 354
The purpose of the written report 354
The audience for the written report 356
xviii contents
Characteristics of a well-written report 356
23. Contents of the research report 357
The title and the title page 357
The executive summary or abstract 357
Table of contents 358
List of tables, figures, and other materials 359
Preface 359
The authorization letter 360
The introductory section 360
The body of the report 360
The final part of the report 361
References 361
Appendix 363
Oral presentation 363
Deciding on the content 364
Visual aids 364
The presenter 365
The presentation 365
Handling questions 365
Summary 366
Discussion questions 367
Appendix: Examples 368
Report 1: sample of a report involving a descriptive study 368
Report 2: sample of a report offering alternative solutions and
explaining
the pros and cons of each alternative 371
Report 3: example of an abridged basic research report 373
A Final Note to Students 377
Statistical Tables 379
Glossary 389
Bibliography 399
Index 407
24. xix
ABOUT THE AUTHORS
Uma Sekaran was Professor Emerita of Management, Southern
Illinois University at Carbondale (SIUC), Illinois.
She obtained her MBA degree from the University of
Connecticut at Storrs, and her PhD from UCLA. She was
the Chair of the Department of Management and also the
Director of University Women’s Professional
Advancement at SIUC when she retired from the University and
moved to California to be closer to her family.
Professor Sekaran authored or co‐ authored eight books, 12
book chapters, and more than 55 refereed journal
articles in the management area, and presented more than 70
papers at regional, national, and international
management conferences. She also won recognition for
significant research contributions to cross‐ cultural
research from US and international professional organizations.
She received Meritorious Research Awards both
from the Academy of Management and SIUC, and was conferred
the Best Teacher Award by the University.
Roger Bougie is Associate Professor at the TIAS School for
Business and Society (Tilburg University, The
Netherlands), where he teaches executive courses in Business
Research Methods. He has received a number of
teaching awards, including the Best Course Award for his
course on Business Research Methods. Dr Bougie’s
main research interest is in emotions and their impact on
consumer behavior, service quality, and satisfaction.
Dr Bougie authored or co‐ authored numerous papers, books,
book chapters, and cases in the area of Marketing
25. and Business Research Methods. Dr Bougie is ad hoc reviewer
for the Journal of the Academy of Marketing
Science, the Journal of Business Research, the Journal of
Marketing Research, and Marketing Letters.
xxi
PREFACE
I have used previous editions of this book in various research
methods courses with great success. For many years
the book has helped thousands of my own students
(undergraduate students, graduate students, and executive
students), as well as many more around the world, to carry out
their research projects. The great strength of
Research Methods for Business is that students find it clear,
informal, easy to use and unintimidating. I have tried
to maintain these strengths in this seventh edition.
CHANGES IN THE SEVENTH EDITION
The seventh edition of Research Methods for Business has been
thoroughly revised.
● Chapter 3 (Defining and Refining the Problem), Chapter 4
(The Critical Literature Review), Chapter 6
(Elements of Research Design), Chapter 7 (Interviews),
Chapter 9 (Administering Questionnaires), Chapters 14
and 15 (Quantitative Data Analysis), and Chapter 17 (The
Research Report) have been substantially modified
and updated in this edition.
26. ● Examples, exercises, and other pedagogical features have
been revised and updated in all the chapters.
● The structure of the book has not changed, but the storyline
has been greatly improved. As in previous editions,
the accessible and informal style of presenting information has
been maintained and the focus on practical
skill building preserved.
● Chapter 2 introduces and discusses alternative approaches to
research. In the new edition, subsequent chapters
follow up on this by reviewing a range of topics (such as
research questions, research design, and measurement)
from various perspectives. This allows users of this book to
recognize and develop their personal ideas on
research and how it should be done, to determine which kinds of
research questions are important to them, and
what methods for collecting and analyzing data will give them
the best answers to their research questions.
The book provides numerous examples to illustrate the concepts
and points presented. Users will also note
the variety of examples from different areas of the world as well
as different areas of business – human resources
management, strategic management, operations management,
management control, marketing, finance, accounting,
and information management.
Most chapters in the book include managerial implications of
the contents discussed, emphasizing the need
for managers to understand research. The ethical considerations
involved in conducting research are also clearly
brought out. The dynamics of cross‐ cultural research in terms
of instrument development, surveys, and sam-
pling are discussed, which, in the context of today’s global
economy, will be useful to students.
27. We expect that students and instructors alike will enjoy this
edition. Students should become effective
researchers, helped by the requisite knowledge and skills
acquired by the study of this book. Finally, it is hoped
that students will find research interesting, unintimidating, and
of practical use.
HOW TO USE THIS SEVENTH EDITION
You can read this book in a variety of ways, depending on your
reasons for using this book.
If the book is part of a Business Research Methods course, the
order in which you read the chapters will be
prescribed by your instructor.
If you are reading the book because you are engaged in a
project (a consultancy project, a research project,
or a dissertation) then the order in which your read the chapters
is your own choice. However, we recommend
that you follow the structure of the book rather closely. This
means that we advise you to start with reading the
first three chapters that introduce research, various approaches
to what makes good research, and the develop-
ment of a problem statement and a research proposal. Based on
the type of research questions and whether, as a
result of your research questions, your study is either
qualitative or quantitative in nature you may decide to read
the book in the following way.
In the case of qualitative research:
4 The critical literature review
6 Research design
28. 7, 8, and/or 9 Data collection methods
13 Sampling
16 Qualitative data analysis
17 The research report
In the case of quantitative research:
4 The critical literature review
5 Theoretical framework
6 Research design
9 Questionnaires
10 Experimental designs
11 and 12 Measurement and Scaling
13 Sampling
14 and 15 Quantitative data analysis
17 The research report
COMPANION WEBSITES
Lecturers and students have a dedicated companion website
available at www.wiley.com/college/sekaran.
Lecturers will find a range of bespoke video material,
developed by the author to provide extra explanation
on difficult topics; videos are signposted in the text. The
lecturer website also houses additional case studies
related to each chapter, including accompanying cases for the
three new chapters. There is also an extensive test
bank for lecturers, a comprehensive set of PowerPoint slides to
accompany the new edition, and an instructor’s
manual, which offers an up‐ to‐ date and valuable additional
teaching aid.
Students will find an online glossary and flashcards, which are
useful for self‐ study and revision. In addition,
the student website provides self‐ test quizzes with over 250
29. questions for students to use while studying outside
the classroom.
xxii PREFACE
ACKNOWLEDGMENTS
Working on the seventh edition of Research Methods for
Business has been a positive and rewarding experience.
Many people have contributed to this in many different ways.
Thank you colleagues at Tilburg University and
the TIAS School for Business and Society for your feedback on
earlier versions of this book. Thank you for
providing me with a pleasant, professional and inspiring work
environment. Thank you dear students for the
lively and inspiring discussions we have had during the past
twenty years; I have learned a lot from these discus-
sions. Thanks everybody at John Wiley & Sons, in particular
Steve Hardman, for your support, your patience,
and your confidence. Thank you reviewers for your constructive
and insightful comments on earlier drafts of
this book.
Roger Bougie
PREFACE xxiii
1
30. INTRODUCTION
Just close your eyes for a minute and utter the word research to
yourself. What kinds of images does this word
conjure up for you? Do you visualize a lab with scientists at
work with Bunsen burners and test tubes, or an
Einstein‐ like character writing a dissertation on some complex
subject such as ‘behavioral heterogeneity in eco-
nomic institutions’, or someone analyzing large amounts of
scanner data to assess the impact of a price reduction
on sales? Most certainly, all these images do represent different
aspects of research. However, research is not
necessarily characterized by Bunsen burners, Einstein‐ like
characters or Big Data. Research, a somewhat intimi-
dating term for some, is simply the process of finding solutions
to a problem after a thorough study and analysis
of the situational factors. Along these lines, people (consumers,
investors, managers) constantly engage them-
selves in exploring and examining issues – and hence are
involved in some form of research activity‐ as they want
to change mobile phone providers, buy a new car, go to the
movies, invest in a business startup, or increase
advertising expenditures in their role as a manager.
Introduction to research
C H A P T E R 1
LEARNING OBJECTIVES
After completing Chapter 1 you should be able to:
1. Describe and define business research.
2. Distinguish between applied and basic research, giving
examples, and discussing why they fall
into one or the other of the two categories.
3. Explain why managers should know about research and
discuss what managers should and
31. should not do in order to interact effectively with researchers.
4. Identify and fully discuss specific situations in which a
manager would be better off using an
internal research team, and when an external research team
would be more advisable, giving
reasons for the decisions.
5. Discuss what research means to you and describe how you, as
a manager, might apply the
knowledge gained about research.
6. Demonstrate awareness of the role of ethics in business
research.
2 research methods for business
Research, in some form or another, may help managers in
organizations to make decisions …