Conflicts with Firms Profit Maximization Objective

Profit  maximization  is the most popular hypothesis in economic analysis, but there are many other important objectives, which are not to be avoided by any firm. Modem business firms pursue multiple objectives. An important aspect of profit is its use in measuring and controlling  performances  of the individuals of the large business firms. Researches have concluded that the business  individuals  of middle and top management often deviate from profit objective and try to  maximize  their own utility functions. They give importance to job security, personal ambitions for promotion, larger perks, etc. But this often conflicts with firms profit-making objective. The reasons for conflicts are as follows: More energy is spent in expanding sales volume and product lines than in raising profitability. Subordinates spend too much time and money doing jobs perfectly regardless of its cost and usefulness. Individuals depend more to the needs of job security in the absence of Continue reading

Scope of Strategic Marketing

Strategic Marketing has been defined as the management function responsible for identifying, anticipating and satisfying customer requirements profitably. Strategic Marketing is, therefore, both a philosophy and a set of techniques which address such matters as research, product design and development, pricing, packaging, sales and sales promotion, advertising, public relations, distribution and after-sales service. These activities define the broad scope of marketing and their balanced integration within a marketing plan is known as the marketing mix. A modification of a definition of  strategic marketing suggests that marketing is the management process that seeks to maximize returns to shareholders by creating a competitive advantage in providing, communicating and delivering value to customers thereby developing a long-term relationship with them. This definition clearly defines the objectives of marketing and how its performance should be evaluated. The specific contribution of marketing in the organization lies in the formulation of strategies to choose the right Continue reading

Barriers to Effective Communication in Business

Planning, preparation and practice of communication will be incomplete and unsuccessful unless one identifies and understands the barriers to effective communication. These barriers are physical, sociological and psychological obstacles that interfere with the planning, organization, transmission and understanding of the message. There are a number of such obstacles that can occur in the process of communication. The natural result of such obstacles or interfering factors is the misunderstanding of the message. These factors interfere with the self-confidence, self-disclosure and self-consciousness of the communication senders and receivers. The barriers to effective communication are dangers to any organization if they are not removed on time. When the communicator transmits the idea in an unchanged and un-distorted form to the receiver and the receiver responds to it, then, the process of the communication is supposed to have been perfect. But this process of ‘perfect’ communication can never exist due to the number of Continue reading

Social Engineering – Meaning, Types and Defenses

Living at the height of the Information Age means information security has never mattered more. With a greater amount of people and businesses going paperless, there is an ever-increasing need and demand to keep digital information secure. The CIA triad or the Confidentiality, Integrity, and Availability of a company’s data is a general model designed to guide security policies for information security inside an organization.  Confidentiality refers to the privacy of data – making sure that only people who are allowed to access data are able to access it.  Integrity refers to maintaining a data’s accuracy and trustworthiness – making sure that data cannot be altered by an unauthorized person. And lastly, availability refers to the ability to access data when an authorized person tries to access it. Cybercrime is a billion-dollar industry, which is built upon hackers breaking an organization’s CIA triad. This includes but is not limited to: Continue reading

The Four Branch Model of Emotional Intelligence

The four branch model of emotional intelligence proposed by  Salovey and Mayer, that identified four areas of capacities or skills  of emotional intelligence: the perception of emotion, the ability reason using emotions, the ability to understand emotion and the ability to manage emotions. According to Salovey and Mayer, the four branches of their model are, “arranged from more basic psychological processes to higher, more psychologically integrated processes. For example, the lowest level branch concerns the (relatively) simple abilities of perceiving and expressing emotion. In contrast, the highest level branch concerns the conscious, reflective regulation of emotion” (1997). Salovey and Mayer  add that abilities that “emerge relatively early in development are to the left of a given branch; later developing abilities are to the right.” They also say that, “people high in emotional intelligence are expected to progress more quickly through the abilities designated and to master more of them.” The Continue reading

Important Perspectives on Asset Securitization

Asset securitization is the transformation of a mix of illiquid individual loans that are combined into relatively similar pools and transformed into highly liquid bonds traded in securities markets and usually, when securities are backed by non-mortgage loans, they are referred to as asset-backed securities (ABS). Securities issued exclusively against credit and loans with mortgage guarantees are referred to as mortgage-backed securities (MBS). Assets like ABS, MBS and it likes are now widely spread in fixed income portfolios at both the institutional and individual investor level. Although the largest and most well known example of asset securitization is the residential mortgage market. The dealings of asset securitization transactions vary, the typical transaction involves the sale by a bank or financial institution (who are called originator) of certain assets on its balance sheet to a trust, corporation or a separate entity, called special purpose vehicle (SPV). Thus, through the asset securitization Continue reading