Measurements of the variables budget participation, job performance, job satisfaction, and job relevant information were obtained at a manufacturing plant located in South East United States. The plant manager expected a report card of ‘Excellent’ but the results indicated that there was a lot of room for improvement at this plant. This study is a great reminder to managers that they must not become complacent. If they believe that management is about people, then they must remain vigilant in order to motivate their employees. It was found that the budget participation process was not working properly and that the job performance and job satisfaction was not as expected.
{"title":"Budget Participation, Job Performance, Job Satisfaction, and Yadda, Yadda, Yadda ...","authors":"Maria A. Leach-López","doi":"10.58809/jzrr5505","DOIUrl":"https://doi.org/10.58809/jzrr5505","url":null,"abstract":"Measurements of the variables budget participation, job performance, job satisfaction, and job relevant information were obtained at a manufacturing plant located in South East United States. The plant manager expected a report card of ‘Excellent’ but the results indicated that there was a lot of room for improvement at this plant. This study is a great reminder to managers that they must not become complacent. If they believe that management is about people, then they must remain vigilant in order to motivate their employees. It was found that the budget participation process was not working properly and that the job performance and job satisfaction was not as expected.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121394005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores events surrounding fundamental changes that took place in the American comic industry in the time period 1958-1962. Retrospectively it is argued that these changes set the direction of the industry for at least the next fifty years, where the industry has been dominated by two publishers, Marvel Comics and DC Comics, with a heavy reliance on the superhero genre. Of particular importance is the decline of Dell Comics, the dominant publisher of the 1950s. This transformation is briefly examined through the lens of strategic management, specifically SWOT analysis, as an illustration of potential future research.
{"title":"The Importance of Superheroes To The American Comic Book Industry, 1958-1962","authors":"D. Palmer","doi":"10.58809/ppay6555","DOIUrl":"https://doi.org/10.58809/ppay6555","url":null,"abstract":"This paper explores events surrounding fundamental changes that took place in the American comic industry in the time period 1958-1962. Retrospectively it is argued that these changes set the direction of the industry for at least the next fifty years, where the industry has been dominated by two publishers, Marvel Comics and DC Comics, with a heavy reliance on the superhero genre. Of particular importance is the decline of Dell Comics, the dominant publisher of the 1950s. This transformation is briefly examined through the lens of strategic management, specifically SWOT analysis, as an illustration of potential future research.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121413089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The planning process is central to the work of business management. Strategic planning involves a broad scope and long-term planning horizon that provides a guide 10 achieve the organization's goals. External users also need prospective financial information to assess credit or equity positions in a firm. The accounting professional in private industry plays a key role as a member of the planning team, processing management's plans and assumption to provide meaningful reports and analysis. Many small and mid-sized firms look to the public accounting professional for assistance in developing prospective financial information (Stillwell, 1986) Public accountants may also be engaged by a client 10 review prospective financial statements that are going to be publicly disseminated. Clearly, expertise in developing, reporting and analyzing forward looking accounting information is important, but there is relatively little instruction offered on this topic in the traditional accounting curriculum. This paper describes a project that is effective for teaching how to prepare comprehensive prospective financial statements. The articulated statements are created using Excel, and can instantly process an unlimited variety of "what if' considerations. The final product has the added advantage of having the same form as the historical financial statements. The benefit of comparability with historical statements is significant.
{"title":"Teaching Prospective Financial Statements: A Compilation Project","authors":"Stevan K. Olson","doi":"10.58809/ggmd4074","DOIUrl":"https://doi.org/10.58809/ggmd4074","url":null,"abstract":"The planning process is central to the work of business management. Strategic planning involves a broad scope and long-term planning horizon that provides a guide 10 achieve the organization's goals. External users also need prospective financial information to assess credit or equity positions in a firm. The accounting professional in private industry plays a key role as a member of the planning team, processing management's plans and assumption to provide meaningful reports and analysis. Many small and mid-sized firms look to the public accounting professional for assistance in developing prospective financial information (Stillwell, 1986) Public accountants may also be engaged by a client 10 review prospective financial statements that are going to be publicly disseminated. Clearly, expertise in developing, reporting and analyzing forward looking accounting information is important, but there is relatively little instruction offered on this topic in the traditional accounting curriculum. This paper describes a project that is effective for teaching how to prepare comprehensive prospective financial statements. The articulated statements are created using Excel, and can instantly process an unlimited variety of \"what if' considerations. The final product has the added advantage of having the same form as the historical financial statements. The benefit of comparability with historical statements is significant.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114303997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Brian H. Boyer, Keyu Jiang, R. Meier, Hongbiao Zeng
A dramatic shift has stated to take place in the last decade that is having a pronounced impact on how organizations view information security. Large datacenters and small sensor rooms alike are being impacted by the development and growth of virtualization and the many benefits it provides. This essay will examine how hardware virtualization has changed the landscape of datacenter risk management and how organizations must adapt their security posture to those changes. As mainstream hypenisors like VMware ESXi, Citrix XenServer, and Microsoft Hyper-V become more affordable and easier to implement, their use in providing low-cost, high-utilization solutions is steadily becoming an industry standard, even for smaller shops. Organizations must understand how to assess, manage, and mitigate new types of risk unique to virtualization. By examining the technology behind virtualization, the risks associated with it, and the methods organizations can mitigate and minimize those risks, we will see that virtualization, when implemented properly, can provide a secure, highly beneficial technology on which datacenters can be built.
{"title":"Real Risks In A Virtualized World: How Virtualization Is Changing The Way We Manage, Assess, and Mitigate Risk","authors":"Brian H. Boyer, Keyu Jiang, R. Meier, Hongbiao Zeng","doi":"10.58809/vwwy8551","DOIUrl":"https://doi.org/10.58809/vwwy8551","url":null,"abstract":"A dramatic shift has stated to take place in the last decade that is having a pronounced impact on how organizations view information security. Large datacenters and small sensor rooms alike are being impacted by the development and growth of virtualization and the many benefits it provides. This essay will examine how hardware virtualization has changed the landscape of datacenter risk management and how organizations must adapt their security posture to those changes. As mainstream hypenisors like VMware ESXi, Citrix XenServer, and Microsoft Hyper-V become more affordable and easier to implement, their use in providing low-cost, high-utilization solutions is steadily becoming an industry standard, even for smaller shops. Organizations must understand how to assess, manage, and mitigate new types of risk unique to virtualization. By examining the technology behind virtualization, the risks associated with it, and the methods organizations can mitigate and minimize those risks, we will see that virtualization, when implemented properly, can provide a secure, highly beneficial technology on which datacenters can be built.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132477329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper considers a monopoly firm with two possible R & D projects, one improving the product's reliability and the second reducing the customers' costs associated with product failure. The firm must choose one project or the other, and has a fixed budget for R & D expenditures. A condition on parameters is derived which indicates which project should be chosen. Monte Carlo analysis suggests that for the firm's decision-making the most important parameter is a measure of the ambient level of technology. From society's point of view, the most important parameter in determining the effect of the R & D choice on society is the size of the market being served by the firm.
{"title":"R & D: Allocation: Reliability Vs. Customer Cost","authors":"Richard T. Gretz, Jannett Highfill, R. Scott","doi":"10.58809/snoy6644","DOIUrl":"https://doi.org/10.58809/snoy6644","url":null,"abstract":"The paper considers a monopoly firm with two possible R & D projects, one improving the product's reliability and the second reducing the customers' costs associated with product failure. The firm must choose one project or the other, and has a fixed budget for R & D expenditures. A condition on parameters is derived which indicates which project should be chosen. Monte Carlo analysis suggests that for the firm's decision-making the most important parameter is a measure of the ambient level of technology. From society's point of view, the most important parameter in determining the effect of the R & D choice on society is the size of the market being served by the firm.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134060872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As global competition flattens hierarchies, management strives for productivity by delegating responsibility, notably including evaluation, to employees. Preparing generally apathetic students for this environment, teachers can manage classes in the same way. Traditional, hierarchical evaluation faces structural, managerial, and psychological difficulties. Peer evaluation, although reliable and valid, must additionally overcome peer group solidarity. Evaluators dread assigning low ranks because no one likes being below average. Peer evaluation challenges students and engages them in a work culture of distributed responsibility.
{"title":"Drawing On Peer Evaluation Studies To Manage The Classroom","authors":"Roger Putzel","doi":"10.58809/yptb2417","DOIUrl":"https://doi.org/10.58809/yptb2417","url":null,"abstract":"As global competition flattens hierarchies, management strives for productivity by delegating responsibility, notably including evaluation, to employees. Preparing generally apathetic students for this environment, teachers can manage classes in the same way. Traditional, hierarchical evaluation faces structural, managerial, and psychological difficulties. Peer evaluation, although reliable and valid, must additionally overcome peer group solidarity. Evaluators dread assigning low ranks because no one likes being below average. Peer evaluation challenges students and engages them in a work culture of distributed responsibility.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the possible existence of overconfidence by business students in their knowledge of different types of malware that may be present in current computer information systems. This article focuses on the students’ ability to understand and identify three main types: viruses, Trojans and spyware. The results are consistent with research suggesting that many students believe their computer knowledge is adequate (Weston and Barker, 2002), when the opposite may be true. Further, in an educational settings, students’ overconfidence in their computer knowledge exacerbates the problem of faculty falsely assuming that students have adequate computer knowledge (Messineo and DeOllas, 2005).
{"title":"Computer Security Threats: Student Confidence In Their Knowledge of Common Threats","authors":"George Schmidt, Margaret Tanner, Thomas Hayes","doi":"10.58809/dpcr2816","DOIUrl":"https://doi.org/10.58809/dpcr2816","url":null,"abstract":"This paper investigates the possible existence of overconfidence by business students in their knowledge of different types of malware that may be present in current computer information systems. This article focuses on the students’ ability to understand and identify three main types: viruses, Trojans and spyware. The results are consistent with research suggesting that many students believe their computer knowledge is adequate (Weston and Barker, 2002), when the opposite may be true. Further, in an educational settings, students’ overconfidence in their computer knowledge exacerbates the problem of faculty falsely assuming that students have adequate computer knowledge (Messineo and DeOllas, 2005).","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cover, Front Matter & Editorial Board","authors":"N. Null","doi":"10.58809/ndct1939","DOIUrl":"https://doi.org/10.58809/ndct1939","url":null,"abstract":"<jats:p xml:lang=\"en\">null</jats:p>","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131761972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
China's rapid economic growth has created a demand for professionals of international competence. Many Chinese go overseas studying and repatriate for this job market. However, expatriates with little job experience are often unemployed for an extended period unless they lower their expectations in coastal cities where economy is vibrant, while few go to inland regions of lesser developed. Thus, expatriates as "Sea Turtles" become "Sea Weeds." This paper addresses the issues determining this transformation by differential economic development. We discuss the current status of expatriate employability and emergent need in China, and also make policy and strategy suggestions.
{"title":"International Business Education and Practices: Chinese \"Sea Turtles\" and Economic Development","authors":"David W. Pan, J. Shapiro","doi":"10.58809/rnka8728","DOIUrl":"https://doi.org/10.58809/rnka8728","url":null,"abstract":"China's rapid economic growth has created a demand for professionals of international competence. Many Chinese go overseas studying and repatriate for this job market. However, expatriates with little job experience are often unemployed for an extended period unless they lower their expectations in coastal cities where economy is vibrant, while few go to inland regions of lesser developed. Thus, expatriates as \"Sea Turtles\" become \"Sea Weeds.\" This paper addresses the issues determining this transformation by differential economic development. We discuss the current status of expatriate employability and emergent need in China, and also make policy and strategy suggestions.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Researchers frequently recommend that organizations consider person-organization fit when making hiring decisions. The purpose of this paper is three fold. First, the paper provides a review of existing research on person-organization fit. This review concludes that several limitations hinder the usefulness of current approaches to person-organization fit. Second, this paper seeks to address these limitations through a conceptual analysis that integrates research on vocational choice with person-organization fit research. The result is an approach to person-organization fit that may be more readily applied by organizations. Finally, the paper suggests a process for empirically testing the proposed approach to person-organization fit.
{"title":"Personality Approach To Person-organization Fit: Applying Holland's Theory of Vocational Choice At The organizational Level","authors":"G. Alder","doi":"10.58809/dkyy2465","DOIUrl":"https://doi.org/10.58809/dkyy2465","url":null,"abstract":"Researchers frequently recommend that organizations consider person-organization fit when making hiring decisions. The purpose of this paper is three fold. First, the paper provides a review of existing research on person-organization fit. This review concludes that several limitations hinder the usefulness of current approaches to person-organization fit. Second, this paper seeks to address these limitations through a conceptual analysis that integrates research on vocational choice with person-organization fit research. The result is an approach to person-organization fit that may be more readily applied by organizations. Finally, the paper suggests a process for empirically testing the proposed approach to person-organization fit.","PeriodicalId":335449,"journal":{"name":"Journal of Business and Leadership","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114527541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}