Search results

1 – 10 of 82
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 1 September 1983

K.A. Dewdney

The in‐flow of cash is vital to any business. If companies are to survive and grow, cash must flow into the business at a rate adequate to meet commitments. Cashflow must be…

172

Abstract

The in‐flow of cash is vital to any business. If companies are to survive and grow, cash must flow into the business at a rate adequate to meet commitments. Cashflow must be budgeted and carefully controlled at all times and, during times of recession, cashflow control takes on even greater importance. If the in‐flow of cash is to be adequate, and profits are to be maximised, proceeds from sales must be received as close as possible to the due date. Any delay in the receipt of sums due will reduce profits and, in extreme cases, could bring about the insolvency of the business.

Details

Industrial Management & Data Systems, vol. 83 no. 9/10
Type: Research Article
ISSN: 0263-5577

Access Restricted. View access options
Article
Publication date: 1 January 1985

K.A. Dewdney

Countertrading for many countries acts as a viable alternative when overseas purchasing requirements stretch foreign currency too far, though it is also used as a means of…

160

Abstract

Countertrading for many countries acts as a viable alternative when overseas purchasing requirements stretch foreign currency too far, though it is also used as a means of employment protection. The principle can be further divided into the process of barter, switch trading, buy‐back, evidence accounts and counterpurchase, the latter being the most widely utilised form. The communist bloc utilises forms of countertrade for both political and economic reasons relating to its ideologically superior status and shortage of convertible currency, but the practice is also found to a limited degree in Western Europe, the Mediterranean and Near East, Asia, Africa, Latin America, the Caribbean and New Zealand. Countertrade is not for the amateur: it is vital to know all aspects of the deal, including exactly what goods are involved, how and when to be supplied, quality and quantity control procedures, what come‐back is available if goods do not meet standards previously agreed, prices, and market restrictions.

Details

Industrial Management & Data Systems, vol. 85 no. 1/2
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 July 1985

K.A. Dewdney

The letter of credit is commonly utilised when an exporter has doubts regarding the prospects of receiving payment. It is essential that all possible precautions are taken to…

440

Abstract

The letter of credit is commonly utilised when an exporter has doubts regarding the prospects of receiving payment. It is essential that all possible precautions are taken to ensure that the letter of credit's conditions can be met and are conformed with. If documents are rejected, if it is possible for them to be corrected and returned to the advising bank within the expiry date, then this should be done.

Details

Industrial Management & Data Systems, vol. 85 no. 7/8
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 1 January 1985

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover…

16667

Abstract

Since the first Volume of this Bibliography there has been an explosion of literature in all the main areas of business. The researcher and librarian have to be able to uncover specific articles devoted to certain topics. This Bibliography is designed to help. Volume III, in addition to the annotated list of articles as the two previous volumes, contains further features to help the reader. Each entry within has been indexed according to the Fifth Edition of the SCIMP/SCAMP Thesaurus and thus provides a full subject index to facilitate rapid information retrieval. Each article has its own unique number and this is used in both the subject and author index. The first Volume of the Bibliography covered seven journals published by MCB University Press. This Volume now indexes 25 journals, indicating the greater depth, coverage and expansion of the subject areas concerned.

Details

Management Decision, vol. 23 no. 1
Type: Research Article
ISSN: 0025-1747

Keywords

Access Restricted. View access options
Article
Publication date: 1 June 1985

C.W. Neale and David D. Shipley

Provides insight into the credit offerings of manufacturers via an analysis of data which are unique in several ways. Focuses specifically on the dimensions of the credit package…

158

Abstract

Provides insight into the credit offerings of manufacturers via an analysis of data which are unique in several ways. Focuses specifically on the dimensions of the credit package supplied to customers for consumer and industrial goods in both domestic and export markets in the USA and the UK. Offers an analytical model for use in improving credit policy. Concludes first that, bi‐nationally, consumer goods firms tend to be more generous than industrial goods sellers, except in the matter of maximum credit duration; and second, that UK firms are more generous than their US counterparts in export markets.

Details

European Journal of Marketing, vol. 19 no. 6
Type: Research Article
ISSN: 0309-0566

Keywords

Available. Content available
Book part
Publication date: 14 July 2006

Abstract

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Access Restricted. View access options
Book part
Publication date: 14 July 2006

Paul Zarembka

This chapter first examines evidence concerning departures of the four flights out of Boston, D.C., and Newark, including identifications of the aircrafts involved, some evidence…

Abstract

This chapter first examines evidence concerning departures of the four flights out of Boston, D.C., and Newark, including identifications of the aircrafts involved, some evidence regarding the flight paths, and then the hijackings. Alleged video evidence at airports for the hijackers themselves is examined, but found to be unacceptable.

The fact of a conspiracy is uncontested by all. Three alternative conspiracy possibilities regarding the planes are examined: the ‘official’ one of suicide hijackers skillfully guiding planes with steeled determination into targets (independent of the hijackers’ identities); use of beaconing or electronic control, similar to ordinary commercial landings, into the targets; and use of ‘drone’ airplanes. The third alternative is not supportable at this time, but the other two are possible explanations, not necessarily equally likely.

The issue of insider trading before 9-11 is addressed. Publicly available data from OptionMetrics are provided and analyzed, indicating that many early reports were not using accurate data. Turning to an academic study in the Journal of Business which relies upon confidential, superior data, the findings are summarized that, indeed, there is evidence of insider trading before 9-11 on American Airlines and United Airlines. Larger concerns of insider trading are also summarized. Lastly, we give brief consideration to the profits certain capitalists make out of 9-11.

Details

The Hidden History of 9-11-2001
Type: Book
ISBN: 978-1-84950-408-9

Access Restricted. View access options
Article
Publication date: 7 August 2017

Piero Mella

The purpose of this study is to show how simple “collectivities” of non-interconnected similar agents, which the author has termed “combinatory systems” and which produce…

846

Abstract

Purpose

The purpose of this study is to show how simple “collectivities” of non-interconnected similar agents, which the author has termed “combinatory systems” and which produce analogous micro behaviors, reveal very interesting forms of micro and macro behaviors and effects attributable to a cybernetic mechanism the author shall call “micro-macro feedback”. On the one hand, the macro behavior of the system as a whole derives from the “combination” of the analogous micro behaviors or effects of the agents, and on the other hand, the macro behavior determines, conditions or directs the subsequent micro behavior, thereby creating observable effects and patterns in the collectivity.

Design/methodology/approach

This paper proposes a new combinatory system theory (CSysT) by constructing a formal model that explains a vast group of phenomena produced by the cybernetic behavior of the collectivity as if an internal organizer were regulating the micro dynamics of agents, producing self-organization, synchronization, path dependence and chaos.

Findings

In addition to illustrating the CSysT, this study also proposes a new and powerful tool to simulate combinatory systems: the “combinatory automaton”. This is composed of a lattice, each of whose cells contains a variable representing the state of an agent. The value of each cell at each time depends on a synthetic global variable whose values derive from some operations carried out on the values of the cells and that represents the synthetic state of the automaton. The micro-macro feedback connects the analytical values of the cells and the synthetic state of the automaton.

Practical implications

The CSysT suggests how to control combinatory systems through external actions aimed at making the macro and micro behaviors conform to the desired behaviors. The control is carried out through suitable strengthening or weakening actions, which operate by acting directly on the macro behavior – the author will define this as macro or external control – or by influencing the micro behaviors; in this case, the control will be called micro or internal control. The macro-level control is achieved through strengthening or weakening actions aimed at modifying some recombining factor. Instead, the micro-level control acts on the necessitating factors.

Originality/value

The CSysT is original and represents an effective tool for observing collective behavior. Combinatory systems are not easily recognizable; nevertheless, they are widely diffused and produce most of the social and economic collective phenomena involving the accumulation of objects, the spread of features or information, the pursuit of a limit and the achievement of general progress as the consequence of the individual pursuit of particular interests.

Access Restricted. View access options
Article
Publication date: 1 March 1986

David D. Shipley and C.W. Neale

Countertrade is a widely used and important means for financing business transactions. Participation involves some serious risks and care should be taken in the selection of…

158

Abstract

Countertrade is a widely used and important means for financing business transactions. Participation involves some serious risks and care should be taken in the selection of countertrade goods, partners and institutions. Forms of countertrade, its benefits to companies and countries, its disadvantages, and guidelines for countertrades are described. Using prudence and sound decision criteria practitioners may gain considerable benefits from this mode of trading.

Details

Industrial Management & Data Systems, vol. 86 no. 3/4
Type: Research Article
ISSN: 0263-5577

Keywords

Access Restricted. View access options
Article
Publication date: 27 April 2012

Alex M. Andrew

The purpose of this paper is to review computational techniques that differ from the familiar “von Neumann” or “Turing” model. The review is prompted by an issue of ERCIM News in…

437

Abstract

Purpose

The purpose of this paper is to review computational techniques that differ from the familiar “von Neumann” or “Turing” model. The review is prompted by an issue of ERCIM News in which a variety of current projects is reviewed, but attention is also given to earlier computational schemes that were important in the development of cybernetic ideas. The early work was aimed at simulation of biological mechanisms, but accepting neurons as complete entities. The current projects now reviewed fall under two headings, one relating to biology, but differing from the earlier studies in giving attention to internal cellular mechanisms. The other heading is quantum computing, which at first sight seems distinct from the first. Attention is drawn to a paper by Ball in 2011that narrows this apparent gap by indicating important connections between quantum physics and biology.

Design/methodology/approach

The aim is to review developments on the internet, especially those of general cybernetic interest.

Findings

The material from the special issue of ERCIM News refers to ongoing research that offers, in the biological context, new computing paradigms with capacity for adaptation and self‐organisation, and in the quantum context super‐fast computing and security.

Practical implications

In addition to the above, two‐way interaction is claimed to give fresh insight into biological mechanisms.

Originality/value

It is hoped this is a valuable periodic review.

Details

Kybernetes, vol. 41 no. 3/4
Type: Research Article
ISSN: 0368-492X

Keywords

1 – 10 of 82
Per page
102050