Wednesday, August 26, 2020
Salem Telephone Company Case Solution Essay Example for Free
Salem Telephone Company Case Solution Essay So as to improve their net gain, Flores has proposed three alternatives as follows. Choice 1 is to build the cost to $1,000 every hour while diminish request by 30%; choice 2 is to decrease the cost to $600 every hour while increment request by 30%; alternative 3 is to expand income hours by up to 30% through expanding their advancement cost. Every choice will influence net gain in the accompanying manners: For alternative 1: Benefit 1 = 205 hours * $400 every hour + $1,000 every hour * (138 * 70%) hours â⬠absolute hours (205 + 138 * 70%) * variable expense $28.7 every hour â⬠all out fixed cost 2,939= - ,994. 92 For choice 2: Benefit 2 = 205(400) +600(138 * 130%)- (179.4 +205)*(28.7) - 212,939= - $34,331.28 For choice 3: Benefit 3 =205(400) +800(179.4)- (205 + 179.4)*(28.7) - 212,939 = $1,548.72 All in all, for option1 and 2, both will diminish in total compensation. Alternative 1 will diminish total compensation by (- 30,383) (- 42,994.92) = $12,611.82, and choice 2 will diminish total compensation by (- 30,383) (- 34,331.28) = $3,948.18. For option3, net gain will increment to an advantage sum. In the event that the advancement cost is equivalent to or under 1548.72, this choice ought to be taken thought. Then again, if the advancement cost surpasses 1,548.72, the total compensation will transform into negative. Nonetheless, as long as it is more gainful than - $30,383, alternative 3 is the ideal decision. Since choice 1 and 2 aggravate their overall gain even and choice 3 expects them to spend almost no on advancement, there is a recommendation to close SDS as opposed to keeping it. In any case, in the event that they close SDS, the adjustment in their total compensation will be: Display 5 They will spare expenses in upkeep, power, etc, yet they will lose the lease benefit $8,000 if there is no other organization leases that floor. In addition, they have to redistribute and the re-appropriating cost will be 205 hours * $800 every hour = $164,000. Along these lines, as it is appeared in Exhibit 5, their additional expense of shutting SDS will be $94,356. On the off chance that they donââ¬â¢t lease the spot to different organizations, they will endure more misfortune than keep SDS. Accordingly, they should keep SDS as opposed to shutting it. What they can improve is to utilize choice 3, which is to expand business income hours by up to 30% through putting more cash on advancement. This might be ridiculous supposing that we investigate their advancement cost in March, we discover that they burned through $8,083 (expanded 15% contrasted with February) on advancement and they expanded business income hours by truth be told, not very many rates (just generally 2%). So as to control their expansion in advancement cost less than 1548.72, they have to increment just generally 20% of advancement expenses to arrive at a 30% expansion in business income hours. Accept the connection between advancement costs with business income hours is the thing that we saw in February and March (15% expansion in advancement cost gets a 2% increment business income hours), they have to increment (30%/2%) * 15% = 225% in advancement costs, which would be 8083 * (1 + 225%) = 26,270. Under this presumption, overall gain of picking alternative 3 will end up being 1548.72 â⬠26,270 = - 24,721.28. In any case, choice 3 would bring them least misfortune and it is the ideal decision.
Saturday, August 22, 2020
Business Ethics Dilemma
The Internet today is a significant asset and instrument for some individuals. PCs have been around since the 1950sââ¬â¢. Be that as it may, the prevalence of PCs didnââ¬â¢t take off until the 1990sââ¬â¢. Numerous organizations today advertise, advance, and have their own site. This is significant as it fills in as road of business to advance their items, offer their administrations to their clients, and constantly educate people in general on their exhibition. The Internet additionally furnishes different web indexes in 2011 with well known web crawlers, for example, Yahoo, MSN, Google, and more current web crawlers, for example, (Microsoft) Bing.This paper will ssummarize and break down the moral situation among Google and (Microsoft) Bing web search tools. What's more, talk about why the conduct is exploitative and the effect it has on the association. It will likewise incorporate the hypothesis of morals that clarifies the untrustworthy conduct and recommend approaches t o improve the conduct to maintain a strategic distance from the issues later on. Web When did the Internet start? Back in the mid 1960sââ¬â¢, ARPANET was made by many complex architects, PC researchers, and mathematicians.The ARPANET configuration permitted PCs to associate, run on various working frameworks, and without ARPANET, the Internet wouldn't look or act the manner in which it does today, it may not exist. As innovation propelled professionals started making headways with brushing the ARPANET system to the Satellite Network (SATNET). The specialized term for the association between the systems is between systems administration or better referred to today for some as the Internet. In 1990, Tim Berners-Lee built up a framework intended to improve route on the Internet which got known as the World Wide Web.As the years passed by, and as the innovation progressed so did the web crawlers. Microsoft's full scale passage into the program, server, and Internet Service Provider a dvertise finished the significant move over to a monetarily based Internet. Google versus (Microsoft) Bing On February third, 2011 the Harvard Business Review has announced that, ââ¬Å"Google has started a media mayhem by asserting that Bing ââ¬Å"copiesâ⬠Google results and Bing unequivocally has denied it. As per the article, when userââ¬â¢s search data through the Bing toolbar the userââ¬â¢s program sends data to Microsoft to gather information, track data and watch to dissect standards of conduct. The Harvard Business Review article additionally has detailed the accompanying, ââ¬Å"Google organized an arrangement for drivel search terms Google made up which made the web crawler present irregular pages Google chose subjectively. At that point Google advised its workers to run Google looks for these drivel terms, and to tap the counterfeit outcomes Google had inserted.The representatives did this on PCs running the Bing Toolbar and IE Related Sites, so their snap des igns were sent to Microsoft similarly as Microsoft's security strategy and different exposures said they would be. Microsoft utilized this information to improve its list items to introduce in Bing results the connections these clients appeared to support, again similarly as Microsoft said it would. â⬠Google is making a charge that (Microsoft) Bing has duplicated their list items process using the toolbar functionality.According to the Harvard Business Review article, ââ¬Å"Microsoft got client authorization for these perceptions and data about clients' snap designs is clients' data not Google's. â⬠In a post at WebmasterWorld, Google's Matt Cutts, composed as follows, ââ¬Å"It's my own, informal conviction that utilizing toolbar information later on to increase our slither isn't just a smart thought, yet explicitly permitted by the first strategies we posted. â⬠Ethical DilemmaThe difficulty here is that Google isn't rehearsing in a moral way as their association is making a claim that Bing is encroaching on their toolbar procedure and following client designs isn't suitable. In view of the Harvard Business audit Matt Cutts further stated: ââ¬Å"A great idea,â⬠when utilizing this strategy however now that Microsoft utilizes this very methodology, unexpectedly Google contends it's inappropriate. Microsoft â⬠Bing has a similar option to utilize this strategy to follow data and dependent on the Google Toolbar Privacy Policy it is revealed that Google maintains all authority to track and use design data to upgrade their inquiry engine.Conclusion Based on the data in the Harvard Business Review article, Google has abused the moral code of client certainty. This is expected the way that Google is working in a similar manner as Bing by checking movement look through its toolbar entry to upgrade the data that it is shown through their site. This influences the workers of Google on the grounds that the company is making a bogus case, and t his may leave a negative inclination with representatives in light of the fact that the association may not be totally clear with it s complete honesty policies.Google could have been forestalled these bogus cases by having an inside consistence group lead look into and with their discoveries could have prompted Google on a superior way to deal with address rivalry endeavors from (Microsoft) Bing. This fortifies the reason for having a code of morals inside an association and that each worker of all levels submits to it.ReferencesInternet. (2011). When did it start. (2011). Recovered on February the sixth, 2011 from: http://PC. howstuffworks. om/web/nuts and bolts/web start. htm Harvard Business Review. (2011). Google Policy. (2011). Recovered on February sixth, 2011, from: http://www. webmasterworld. com/forum80/21-1-30. htm Internet. (2011). Web History. (2011). Recovered on February sixth, 2011, from: http://www. walthowe. com/navnet/history. html Ethical Dilemma. (2011). Google versus Bing. (2011). Recovered on February sixth, 2011 from: http://www. businessweek. com/overseeing/content/feb2011/ca2011024_853469. htm
Wednesday, August 12, 2020
Search Report Example
Search Report Example Search Report â" Assignment Example > Abstract Information security is a very sensitive issue because of the ethical issues that are raised as areas of concern. The expansion of global networks has facilitated the smooth operations of trade and commerce because of increased use and dependence on computing systems and communication. Attacks that have been directed at information assets have heightened the need for information security. Securing these systems has had organizations develop their own pool of information security to ensure that they have secure computing environments. The law mandates organizations to protect the personal employee information such as phone numbers and their medical conditions for security reasons (Quigley, 2004). While this information falls into the category of personnel data information security is expected to ensure that this data receives the same level of protection accorded to the important data in the organization. Information security problems that arise most of the time are not te chnical problems but a people problem. This is because ethical issues do not arise because of technical problems but because of people either intentionally or by accident (Buchanan Huczynski, 2004). This report looks at the ethical issues of information security as well as the various legislations that have been made to guarantee information security to individuals as well as to organizations and the empirical theories that explain behavior. IntroductionSecurity is a major concern in every facet of todayâs life and technology is no exception. Technology exposes its users to various threats and so the need for legal systems to guarantee the safety of its users (Whitman Mattord, 2009). The internet which is the base of information technology has no geographical boundaries and this makes it a security concern in every country of the world. While it is impossible to formulate laws that generate acceptable behavior, ethics produce socially acceptable behavior in society and it is t herefore the responsibility of organizations to establish their codes of ethical behavior that their users should adhere to and live by (Whitman Mattord, 2009). This is because ethics provide society with the morals standards that enable it function easily. Based on this organizations have formulated their own codes of ethics that its members should abide by which is a collaborative effort that aims to raise awareness of computer responsibility (Whitman Mattord, 2009). Research methods and approachA random assessment of information security variables was used and a model constructed with all these variables: the law, policy and behavior. The data was collected using questionnaires and interviews to provide information about the underlying factors that affect the ethical behaviors of individuals. The inter-relationships between these variables and the overall effect they have on the ethical judgments of individuals. Application of the law and ethics in information securityInformat ion security is governed by laws and ethics which are determined to maintain balance in the society. Laws prohibit certain behavior while ethics are socially acceptable behaviors (Whitman Mattord, 2009). Organizational ethics are drawn from the moral attitudes and the customs of the organization. Actions that move away from what is viewed as acceptable behavior may be punished by the law as a crime. An organizationâs legal environment influences the scale in which the information security professionals are able to guarantee the safety of the organizationâs information (Whitman Mattord, 2010). The law enforcement is contacted first due their capacity to handle physical security threats but they are ill equipped to handle electronic crime.
Subscribe to:
Posts (Atom)