首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
在非核心企业加入供应链运行后,如何预防与应对供应链风险,是非核心企业风险管理中不可回避的问题。借助平衡计分卡与风险管理等相关理论知识,设计出风险平衡积分卡,从财务、客户、内部流程、学习与成长4个维度分析了非核心企业因加入供应链后而产生的特有风险及原因,提出相应的对策建议,让非核心企业更好地实行供应链风险管理。  相似文献   

2.
价值链管理过程中存在着种种不确定性,价值链风险管理将成为企业价值链管理未来研究的一个重要方向。针对价值链风险的主要类型进行了具体的分析,并针对具体风险相应地提出了防范价值链风险的对策。  相似文献   

3.
王志民 《内江科技》2006,27(7):15-15,24
企业的财务活动贯穿于生产经营的整个过程.财务风险是一种信号,通过它能够全面综合反映企业的经营状况.因此要求企业经营者要进行经常性财务分析.树立风险意识.建立有效的风险管理机制.加强风险管理,防范财务危机.建立预警分析指标体系,进行适当的时务风险决策。  相似文献   

4.
财务风险是企业众多风险中最重要的风险之一,作为一种信号,它能够全面反映企业的经营状况。通过分析财务风险及其特征,阐述了管理者如何建立和完善财务风险控制机制,树立风险管理意识,加强财务风险的防范,确保企业风险管理的有效性,提高企业的风险承受能力,从而有效地规避风险。  相似文献   

5.
本文从财务分析的视角出发,应用上市公司的数据,对价值链企业价值相关性进行了实证研究。结果表明:价值链企业的价值存在相关性,影响价值链企业价值的某一种因素的变化对该企业上下游企业价值影响程度是不同的。该研究结论一方面为完善企业价值评估理论提供新的思路,另一方面为价值链上的企业应对价值波动问题的解决方法和对策提供了支持。  相似文献   

6.
通过对企业信息能力的再认识,首先研究了基于平衡计分卡的企业信息能力的培育;然后,在构建信息价值链内涵与模型的基础上,分析了基于信息价值链的企业信息能力的培育内容;最后,建立了基于平衡计分卡和信息价值链的企业信息能力培育模型.  相似文献   

7.
以招商银行网上银行为例,结合波特的企业价值链理论分析了我国网上银行的价值链与所存在的问题,并分别从产品创新、市场营销和风险管理等角度提出了相应的发展战略建议。  相似文献   

8.
基于价值链的企业价值评估方法探讨   总被引:1,自引:0,他引:1  
提出企业应建立一种基于价值链的企业价值评估方法,即以企业价值最大化为目标,在对影响企业价值增值的财务因素进行评估的同时,将影响企业价值增值的非财务因素也加以评估。  相似文献   

9.
价值链战略驱动企业实行人力资源管理外包,以便获得了更多的战略价值、技术价值和经济价值,从而增强人力资源管理绩效,提升价值链竞争力。外包时企业应从战略层、技术层和财务层建立外包分析模型,设计基于战略价值和技术价值的外包决策模式,并通过高质量的外包机构、有效的合约管理和风险控制来实现外包的价值创造。  相似文献   

10.
价值链战略驱动企业实行人力资源管理外包,以便获得了更多的战略价值、技术价值和经济价值,从而增强人力资源管理绩效,提升价值链竞争力.外包时企业应从战略层、技术层和财务层建立外包分析模型,设计基于战略价值和技术价值的外包决策模式,并通过高质量的外包机构、有效的合约管理和风险控制来实现外包的价值创造.  相似文献   

11.
Aresearch group led by Prof. ZHAI Qiwei from the Institute for Nutritional Sciences under the CAS Shanghai Institutes for Biological Sciences has discovered that even relatively low doses of resveratrol--a chemical found in the skins of red grapes and in red wine--can improve the sensitivity of mice to the hormone insulin, according to a report in the October,2007 issue of Cell Metabolism. As insulin resistance is often characterized as the most critical factor contributing to the development of Type 2 diabetes, the findings“provide a potential new therapeutic approach for preventing or treating” both conditions, the researchers said.  相似文献   

12.
CAS should stick to the principle of rendering service to, and giving impetus for, the development of China's science enterprise by making S&T innovations, said CAS President LU Yongxiang. The CAS president made the remarks in a recent talk to communicate the gist of the winter session of the Party's Leading-member Group at CAS, which was held from 7 to 11 January in Beijing.  相似文献   

13.
This study examined how students who had no prior experience with videoconferencing would react to the use of videoconferencing as an instructional medium. Students enrolled in seven different courses completed a questionnaire at the beginning of the semester and again at the end of the semester. Students at the origination and remote sites did not differ in their reactions toward videoconferencing but there was a significant difference for gender. Women reacted less favorably to videoconferencing. Compared to the beginning of the semester, students reported significantly less positive attitudes toward taking a course through videoconferencing at the end of the semester. There were no significant differences in students' attitudes toward videoconferencing across courses at the beginning of the semester but there were significant differences across the courses at the end of the semester. The results suggest the need for better preparation for both students and instructors.  相似文献   

14.
With great care, Dr. ZHOU Zhonghe takes out a package wrapped by cotton tissue from a drawer and says: "This is the gem of our collections: the fossil of a bird that lived 125 million years ago!" Then, pointing at a tiny mound, he explains: "Look, this is the claw and that is the head. It was in the egg shell and ready to hatch ... The species fell into a family of waterside inhabitants."  相似文献   

15.
Ajoint study by Prof. ZHANG Zhibin from the CAS Institute of Zoology and his co-workers from Norway, US and Swiss have indicated that historical outbreaks of migratory locusts in China were associated with cold spells, suggesting that China's projected climate warming could decrease the pest's numbers. The study was published in Proceedings of theNational Academy of Sciences on 17 September, 2007.  相似文献   

16.
A computer-mediated group is a complex entity whose members exchange many types of information via multiple means of communication in pursuit of goals specific to their environment. Over time, they coordinate technical features of media with locally enacted use to achieve a viable working arrangement. To explore this complex interaction, a case study is presented of the social networks of interactions and media use among members of a class of computer-supported distance learners. Results show how group structures associated with project teams dominated who communicated with whom, about what, and via which media over the term, and how media came to occupy their own communication niches: Webboard for diffuse class-wide communication; Internet Relay Chat more to named others but still for general communication across the class; and e-mail primarily for intrateam communication. Face-to-face interaction, occurring only during a short on-campus session, appears to have had a catalytic effect on social and emotional exchanges. Results suggest the need to structure exchanges to balance class-wide sharing of ideas with subgroup interactions that facilitate project completion, and to provide media that support these two modes of interaction.  相似文献   

17.
Active biological molecules and functional structures can be fabricated into a bio-mimetic system by using molecular assembly method. Such materials can be used for the drug delivery, disease diagnosis and therapy, and new nanodevice construction.  相似文献   

18.
Electronic data interchange (EDI) provides means for interorganizational communication, creates network externalities, requires an advanced information technology (IT) infrastructure, and relies on standards. In the diffusion of such innovations, institutional involvement is imperative. Such institutions contain governmental agencies, national and global standardization organizations, local government, and nonprofit private organizations like industry associations. The last type of organizations we call intermediating institutions. They intermediate or coordinate ("inscribe") the activities of a group of would-be adopters. Unfortunately, little is known of how these organizations shape the EDI diffusion trajectory. In this article we examine one specific type of intermediating organizations?industry associations?and how they advanced the EDI diffusion process in the grocery sectors of Hong Kong, Denmark and Finland. We identify six institutional measures, placed into a matrix formed by the mode of involvement (influence vs. regulation) and the type of diffusion force (supply push vs. demand pull), that can be mobilized to further the EDI diffusion. Industry associations were found to be active users of all these measures to varying degrees. Their role was critical especially in knowledge building, knowledge deployment, and standard setting. Furthermore, institutional involvement varied due to policy and cultural contingencies and power dependencies.  相似文献   

19.
This essay focuses on universal service and the Internet as means to support social and political participation. The emphasis on access to telecommunications systems in conventional approaches to universal service is contrasted with access to content. A model of the information environment is described that accounts for the roles of content and conduit, both of which are necessary conditions to achieve true access. A method is outlined for employing information indicators to observe or measure the information environment.  相似文献   

20.
The increasing prospects of digital piracy has prompted the perceived need by electronic publishers to adopt technical systems of protection, and governments to reform their copyright laws. This article is a preliminary study of the management of intellectual property by electronic publishers, defined as those involved in the production of online databases, and CD-ROMs. It focuses on three main issues: (1) how electronic publishers view the increasing threat of piracy; (2) the methods of protection employed to protect intellectual property in digital format; and (3) the importance of technological protection of intellectual property in electronic publications. The analysis is based on a sample of 23 UK electronic publishers. The interviews revealed an interesting assortment of protection methods and did not show that technological protection was a preferred way. Instead, the means of protection, in addition to copyright law, comprised niche markets, pricing, trust, bad publicity, and nontechnical and technical means.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号