The in‐flow of cash is vital to any business. If companies are to survive and grow, cash must flow into the business at a rate adequate to meet commitments. Cashflow must be…
Abstract
The in‐flow of cash is vital to any business. If companies are to survive and grow, cash must flow into the business at a rate adequate to meet commitments. Cashflow must be budgeted and carefully controlled at all times and, during times of recession, cashflow control takes on even greater importance. If the in‐flow of cash is to be adequate, and profits are to be maximised, proceeds from sales must be received as close as possible to the due date. Any delay in the receipt of sums due will reduce profits and, in extreme cases, could bring about the insolvency of the business.
Countertrading for many countries acts as a viable alternative when overseas purchasing requirements stretch foreign currency too far, though it is also used as a means of…
Abstract
Countertrading for many countries acts as a viable alternative when overseas purchasing requirements stretch foreign currency too far, though it is also used as a means of employment protection. The principle can be further divided into the process of barter, switch trading, buy‐back, evidence accounts and counterpurchase, the latter being the most widely utilised form. The communist bloc utilises forms of countertrade for both political and economic reasons relating to its ideologically superior status and shortage of convertible currency, but the practice is also found to a limited degree in Western Europe, the Mediterranean and Near East, Asia, Africa, Latin America, the Caribbean and New Zealand. Countertrade is not for the amateur: it is vital to know all aspects of the deal, including exactly what goods are involved, how and when to be supplied, quality and quantity control procedures, what come‐back is available if goods do not meet standards previously agreed, prices, and market restrictions.
Details
Keywords
The letter of credit is commonly utilised when an exporter has doubts regarding the prospects of receiving payment. It is essential that all possible precautions are taken to…
Abstract
The letter of credit is commonly utilised when an exporter has doubts regarding the prospects of receiving payment. It is essential that all possible precautions are taken to ensure that the letter of credit's conditions can be met and are conformed with. If documents are rejected, if it is possible for them to be corrected and returned to the advising bank within the expiry date, then this should be done.
Details
Keywords
Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover…
Abstract
Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover specific articles devoted to certain topics. This Bibliography is designed to help. Volume III, in addition to the annotated list of articles as the two previous volumes, contains further features to help the reader. Each entry within has been indexed according to the Fifth Edition of the SCIMP/SCAMP Thesaurus and thus provides a full subject index to facilitate rapid information retrieval. Each article has its own unique number and this is used in both the subject and author index. The first Volume of the Bibliography covered seven journals published by MCB University Press. This Volume now indexes 25 journals, indicating the greater depth, coverage and expansion of the subject areas concerned.
Details
Keywords
C.W. Neale and David D. Shipley
Provides insight into the credit offerings of manufacturers via an analysis of data which are unique in several ways. Focuses specifically on the dimensions of the credit package…
Abstract
Provides insight into the credit offerings of manufacturers via an analysis of data which are unique in several ways. Focuses specifically on the dimensions of the credit package supplied to customers for consumer and industrial goods in both domestic and export markets in the USA and the UK. Offers an analytical model for use in improving credit policy. Concludes first that, bi‐nationally, consumer goods firms tend to be more generous than industrial goods sellers, except in the matter of maximum credit duration; and second, that UK firms are more generous than their US counterparts in export markets.
Details
Keywords
This chapter first examines evidence concerning departures of the four flights out of Boston, D.C., and Newark, including identifications of the aircrafts involved, some evidence…
Abstract
This chapter first examines evidence concerning departures of the four flights out of Boston, D.C., and Newark, including identifications of the aircrafts involved, some evidence regarding the flight paths, and then the hijackings. Alleged video evidence at airports for the hijackers themselves is examined, but found to be unacceptable.
The fact of a conspiracy is uncontested by all. Three alternative conspiracy possibilities regarding the planes are examined: the ‘official’ one of suicide hijackers skillfully guiding planes with steeled determination into targets (independent of the hijackers’ identities); use of beaconing or electronic control, similar to ordinary commercial landings, into the targets; and use of ‘drone’ airplanes. The third alternative is not supportable at this time, but the other two are possible explanations, not necessarily equally likely.
The issue of insider trading before 9-11 is addressed. Publicly available data from OptionMetrics are provided and analyzed, indicating that many early reports were not using accurate data. Turning to an academic study in the Journal of Business which relies upon confidential, superior data, the findings are summarized that, indeed, there is evidence of insider trading before 9-11 on American Airlines and United Airlines. Larger concerns of insider trading are also summarized. Lastly, we give brief consideration to the profits certain capitalists make out of 9-11.
The purpose of this study is to show how simple “collectivities” of non-interconnected similar agents, which the author has termed “combinatory systems” and which produce…
Abstract
Purpose
The purpose of this study is to show how simple “collectivities” of non-interconnected similar agents, which the author has termed “combinatory systems” and which produce analogous micro behaviors, reveal very interesting forms of micro and macro behaviors and effects attributable to a cybernetic mechanism the author shall call “micro-macro feedback”. On the one hand, the macro behavior of the system as a whole derives from the “combination” of the analogous micro behaviors or effects of the agents, and on the other hand, the macro behavior determines, conditions or directs the subsequent micro behavior, thereby creating observable effects and patterns in the collectivity.
Design/methodology/approach
This paper proposes a new combinatory system theory (CSysT) by constructing a formal model that explains a vast group of phenomena produced by the cybernetic behavior of the collectivity as if an internal organizer were regulating the micro dynamics of agents, producing self-organization, synchronization, path dependence and chaos.
Findings
In addition to illustrating the CSysT, this study also proposes a new and powerful tool to simulate combinatory systems: the “combinatory automaton”. This is composed of a lattice, each of whose cells contains a variable representing the state of an agent. The value of each cell at each time depends on a synthetic global variable whose values derive from some operations carried out on the values of the cells and that represents the synthetic state of the automaton. The micro-macro feedback connects the analytical values of the cells and the synthetic state of the automaton.
Practical implications
The CSysT suggests how to control combinatory systems through external actions aimed at making the macro and micro behaviors conform to the desired behaviors. The control is carried out through suitable strengthening or weakening actions, which operate by acting directly on the macro behavior – the author will define this as macro or external control – or by influencing the micro behaviors; in this case, the control will be called micro or internal control. The macro-level control is achieved through strengthening or weakening actions aimed at modifying some recombining factor. Instead, the micro-level control acts on the necessitating factors.
Originality/value
The CSysT is original and represents an effective tool for observing collective behavior. Combinatory systems are not easily recognizable; nevertheless, they are widely diffused and produce most of the social and economic collective phenomena involving the accumulation of objects, the spread of features or information, the pursuit of a limit and the achievement of general progress as the consequence of the individual pursuit of particular interests.
Details
Keywords
David D. Shipley and C.W. Neale
Countertrade is a widely used and important means for financing business transactions. Participation involves some serious risks and care should be taken in the selection of…
Abstract
Countertrade is a widely used and important means for financing business transactions. Participation involves some serious risks and care should be taken in the selection of countertrade goods, partners and institutions. Forms of countertrade, its benefits to companies and countries, its disadvantages, and guidelines for countertrades are described. Using prudence and sound decision criteria practitioners may gain considerable benefits from this mode of trading.
The purpose of this paper is to review computational techniques that differ from the familiar “von Neumann” or “Turing” model. The review is prompted by an issue of ERCIM News in…
Abstract
Purpose
The purpose of this paper is to review computational techniques that differ from the familiar “von Neumann” or “Turing” model. The review is prompted by an issue of ERCIM News in which a variety of current projects is reviewed, but attention is also given to earlier computational schemes that were important in the development of cybernetic ideas. The early work was aimed at simulation of biological mechanisms, but accepting neurons as complete entities. The current projects now reviewed fall under two headings, one relating to biology, but differing from the earlier studies in giving attention to internal cellular mechanisms. The other heading is quantum computing, which at first sight seems distinct from the first. Attention is drawn to a paper by Ball in 2011that narrows this apparent gap by indicating important connections between quantum physics and biology.
Design/methodology/approach
The aim is to review developments on the internet, especially those of general cybernetic interest.
Findings
The material from the special issue of ERCIM News refers to ongoing research that offers, in the biological context, new computing paradigms with capacity for adaptation and self‐organisation, and in the quantum context super‐fast computing and security.
Practical implications
In addition to the above, two‐way interaction is claimed to give fresh insight into biological mechanisms.
Originality/value
It is hoped this is a valuable periodic review.