Once Upon A Time Essays (Examples)

Studyspark

Study Document Study Document

Purchasing And Supply Management

Pages: 9 (2780 words) Sources: 8 Document Type:Essay Document #:73672529

… of the job in many ways. Though the purchasing and supply management professional will aim to get the best prices possible, it will sometimes be the case that the best price does not come from the most reputable supplier. Should the manager sacrifice quality and reliability for … make a profit after production. The two will be able to negotiate price by focusing on other aspects of the deal—such as delivery time, schedule or frequency; payment terms; warranties and a merchandise return policy; and the ease of reordering or signing a long term contract based … the firm to keep costs down and the bottom line going up. If done poorly, it opens the firm to innumerable risks—from lost time on the production line to consumer flight to financial ruin. Supply managers must be cognizant of the overall goal of the company and ……

References

References

BDC. (2019). 6 ways the purchasing department can improve your business. Retrieved from  https://www.bdc.ca/en/articles-tools/operations/purchasing/pages/purchasing-department-objectives.aspx 

Benton, W. C. (2013). Supply chain focused manufacturing planning and control. Nelson Education.

Burt, D. N. (2010). Supply Management, 8th Edition. Devry.

Harland, C., Brenchley, R., & Walker, H. (2003). Risk in supply networks. Journal of Purchasing and Supply management, 9(2), 51-62. Retrieved from  http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.471.2910&rep=rep1&type=pdf 

Holmlund, M. & Strandvik, T. (1999) Perception configuration in business relationship, Management Decision, 37(9), 686-696

MacNeil/Lehrer Productions (Producer). (1999). Your computer, your way: Dell and thedirect sales model [Video file]. Retrieved from https://libraryresources.columbiasouthern.edu/login

Monczka, R. & Handfield, R. (2016). Purchasing and supply chain management. Boston, MA: Cengage.

NC State University. (2003). Negotiating for success. Retrieved from  https://scm.ncsu.edu/scm-articles/article/negotiating-for-success

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

Executive Summary
The purpose of this study is to develop timely and informed answers to a series of guiding research questions and subquestions to identify the risks and barriers that are associated with Internet … that these implementations are increasing exponentially. The Internet of Things allows conventional computer-based networks to incorporate data collected from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the … variance in actual technology usage (Venkatesh et al., 2016). In sum, the UTAUT model provides a useful conceptual framework in which to develop timely and informed answers to the following guiding research questions and subquestions as stated in the introductory chapter:
RQ1. Why do SMEs view implementing … these technologies even further, including using cloud-based technologies and sensor-equipped devices to collect, aggregate and analyze a wide range……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".