Six Dimensions of Emotional Style

According to neuroscientist Richard J. Davidson, each person has a unique emotional profile. As he puts it, “Just as each person has a unique fingerprint and a unique face, each of us has a unique emotional profile, one that is so much a part of who we are and those who know us well can often predict how we will respond to an emotional challenge.” Based on his research, Davidson identified six dimensions of Emotional Style in his classic work The Emotional Life of Your Brain written with Sharon Begley. According to him, Each of the six dimensions has a specific, identifiable neural signature—a good indication that they are real and not merely a theoretical construct. The six dimensions of Emotional Style are as follows : Resilience Style : People at one end of this dimension recover quickly from adversity whereas people at the other end of this dimension recover Continue reading

Case Study: Mergers and Acquisitions in the Automotive Industry

Different companies, similarly to people, have their own unique culture that is founded on ethnic, regional, temporal and industry-relevant factors. Therefore, when two or more businesses work together or decide to merge, these specific attributes may clash, leading to conflicts and worsened performance outcomes. The process of acquisition has to be planned in detail from the first contact between the companies to their full integration. In most successful cases, firms prepare thoroughly to enter the new relationship by mapping out the process of the merger and trying to predict the potential issues. However, the importance of the steps following the official merger may be overlooked by managers who fail to account for the fundamental cultural and structural differences between the businesses. In foreign mergers, this lack of attention to the whole strategy may be detrimental to the outcome of the project. This problem is especially evident for cultures that have Continue reading

Classification of Security Threats in Information Systems

As use of internet and related telecommunications technologies and systems has become pervasive, use of these networks now creates a new vulnerability for organizations or companies. These networks can be infiltrated or subverted a number of ways. As a result, organizations or companies will faced threats that affect and vulnerable to information system security. Threats to information system can come from a variety of places inside and external to an organizations or companies. In order to secure system and information, each company or organization should analyze the types of threats that will be faced and how the threats affect information system security. Examples of threats such as unauthorized access (hacker and cracker), computer viruses, theft, sabotage, vandalism and accidents. Unauthorized Access (Hacker and Cracker): One of the most common security risks in relation to computerized information systems is the danger of unauthorized access to confidential data. The main concern comes Continue reading

Procedure of Tribunal on Debt Recovery

1) Application to the Tribunal: (1) Where a bank has to recover any debt from any person, it may make an application to the Tribunal within the local limits of whose jurisdiction By Act 1 of 2000, sec. 8 (w.r.e.f. 17-1-2000).Subs. by Act 1 of 2000, sec. 9, for section 19 (w.r.e.f.17-1-2000). (a) the defendant, or each of the defendants where there are more than one, at the time of making the application, actually and voluntarily resides or carries on business or personally works for gain; or (b) any of the defendants, where there are more than one, at the time of making the application, actually and voluntarily resides or carries on business or personally works for gain; (c) the cause of action, wholly or in party, arises. (2) Where a bank, which has to recover its debt from any person, has filed an application to the Tribunal under subsection Continue reading

Strategic Thinking Dichotomies: Logical Thinking vs. Creative Thinking

It is mutually agreed that the converses of intuition and analysis generate tension during the strategic thinking process. Researchers and contributors to strategic management making the case for logic argue that for strategy to be effective, the strategic thinking process must involve extensive formal analyses and objective collection and processing of data both from within and without the corporation. Rational reasoning enables managers gain an accurate perspective on the different options available before identifying the strategic option that best serves the organization’s cause: achieving its goals and objectives. Logical analysis encompasses assessing internal and external risks, strengths and weaknesses, market need and so on; so that strategy can be thought out to fit each of the above factors. In contrast to logical thinking, creative thinking involves taking a “leap of imagination” without any logically defined reason for taking such a leap. Creative thinking is a divergence from the rules governing Continue reading

Problems in Determination of Cost of Capital

It has already been stated that the cost of capital is one of the most crucial factors in most financial management decisions. However, the determination of the cost of capital of a firm is not an easy task. The finance manager is confronted with a large number of problems, both conceptual and practical, while determining the cost of capital of a firm. These problems in determination of cost of capital  can briefly be summarized as follows: 1. Controversy regarding the dependence of cost of capital upon the method and level of financing There is a, major controversy whether or not the cost of capital dependent upon the method and level of financing by the company. According to the traditional theorists, the cost of capital of a firm depends upon the method and level of financing. In other words, according to them, a firm can change its overall cost of capital Continue reading