582 research outputs found

    A Proposed Learning Resources Center for Illiterate Adults of Lagos, Nigeria

    Get PDF
    No abstract provided by author

    Corporate Governance and Managerial Incompetence: Lessons from Kmart

    Get PDF

    Corporate Governance and Managerial Incompetence: Lessons from Kmart

    Get PDF
    Modern corporate governance scholars often extol an activist role by institutional investors in directing corporate activity. Widely viewed as a solution to the collective action problems that inhibit such activism by individual investors, institutional investors are praised for adding value to corporations through their participation in the decision making process. The ouster of Joseph Antonini as Chief Executive Officer of Kmart Corporation in 1995 might be taken as a vindication of this view, because substantial evidence indicates that institutional investors played a crucial role in influencing Kmart\u27s board of directors to remove him. In this Article, Professor Smith challenges this potential reading of the events at Kmart and poses the fundamental question of whether institutional investor activism designed to address perceived incompetence among corporate managers consistently adds value to corporations in which such activism is present. Professor Smith analyzes the effect of internal and external forces on managers, particularly on Antonini and Kmart\u27s directors, and derives two fundamental lessons: (1) External constraints are ineffective in solving managerial incompetence; and (2) Investor activism will often be counterproductive because it destroys the value of centralized decision making

    Electronic business and electronic commerce (supporting lecture notes for students of dirеction "Management" of all forms of education)

    Get PDF
    E-Business systems naturally have greater security risks than traditional business systems, therefore it is important for e-business systems to be fully protected against these risks. Customers, suppliers, employees, and numerous other people use any particular e-business system daily and expect their confidential information to stay secure. Hackers are one of the great threats to the security of e-businesses. Some common security concerns for e-Businesses include keeping business and customer information private and confidential, authenticity of data, and data integrity. Some of the methods of protecting e-business security and keeping information secure include physical security measures as well as data storage, data transmission, anti-virus software, firewalls, and encryption to list a few.Розглянуто та рекомендовано до друку на засіданні кафедри інноваційного менеджменту та підприємництва, протокол No1 від 27 серпня 2015 року. Схвалено та рекомендовано до друку на засіданні методичної комісії факультету управління та бізнесу у виробництві Тернопільського національного технічного університету імені Івана Пулюя, протокол No6 від 26 лютого 2016 року.The purpose of thе document is to present the different underlying "technologies" (in reality, organizational modes based on information and communication technologies) and their associated acronyms. The term "e-Business" therefore refers to the integration, within the company, of tools based on information and communication technologies (generally referred to as business software) to improve their functioning in order to create value for the enterprise, its clients, and its partners.Topic 1. Basic concepts of electronic business and electronic commerce 1.1. Basic concepts and principles of e-business. 1.2. Origins and growth of e-commerce. Topic 2. Ecommerce as a part of electronic business 2.1. E-business infrastructure, e-environment and e-business strategy 2.2. Ways of e-business conducting. Online trading. Topic 3. Basis of global computer network internet functioning. 3.1. Basic principles of internet. 3.2. The most common services of Іnternet. 3.3. The concept and structure of Internet marketing. Topic 4. E-commerce systems in corporate sector 4.1. The basic processes of implementation of electronic commerce in the B2B sector. Virtual enterprise, internet incubator, mobile commerce. 4.2. The role of supply-chain management (SCM) and customer relationship management (CRM) in e-commerce. Topic 5. Information management for effective e-commerce building through intranet and extranet 5.1. Basic principles of Intranet functioning. 5.2. Extranet and its security issues. Topic 6. Electronic payment systems 6.1. Electronic payment systems. 6.2. Primary classification of payment systems

    Biodiversity Conservation and the Ever-Expanding Web of Federal Laws Regulating Nonfederal Lands: Time for Something Completely Different

    Get PDF
    This article offers an early examination of the law and governance of biodiversity (circa 1995) through the lenses of the Endangered Species Act, Clean Water Act, and Coastal Zone Management. It suggests that true multi-scalar, cooperative federalism will be needed to manage complex ecological resources for biodiversity conservation. A suggested model employing regional biodiversity management approaches is outlined

    Coin-Operated Capitalism

    Get PDF
    This Article presents the legal literature’s first detailed analysis of the inner workings of Initial Coin Offerings. We characterize the ICO as an example of financial innovation, placing it in kinship with venture capital contracting, asset securitization, and (obviously) the IPO. We also take the form seriously as an example of technological innovation, where promoters are beginning to effectuate their promises to investors through computer code, rather than traditional contract. To understand the dynamics of this shift, we first collect contracts, “white papers,” and other contract-like documents for the fifty top-grossing ICOs of 2017. We then analyze how such projects’ software code reflected (or failed to reflect) their contractual promises. Our inquiry reveals that many ICOs failed even to promise that they would protect investors against insider self-dealing. Fewer still manifested such contracts in code. Surprisingly, in a community known for espousing a technolibertarian belief in the power of “trustless trust” built with carefully designed code, a significant fraction of issuers retained centralized control through previously undisclosed code permitting modification of the entities’ governing structures. These findings offer valuable lessons to legal scholars, economists, and policymakers about the roles played by gatekeepers; about the value of regulation; and the possibilities for socially valuable private ordering in a relatively anonymous, decentralized environment
    corecore