2 resultados para internal audit contribution and external audit fees

em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Research on strategic management of resources for small consulting firms which are international or planning to operate internationally is scarce or not existing at all. It is however important to start generating the theories that will support managers in their decision making and planning. This thesis investigates how do small management consulting firms manage their internal and external resources while operating in international markets. Throughout the study, aspects related to internal and external resources management as well as management strategies in these firms have been examined in relations to firm’s internationalisation activities. A qualitative analysis was carried out whereby four small consulting firms in Export Management Consulting, Integration Services Consulting-, Software Development Consulting- and Business Solutions Consulting companies were interviewed. In order to generate the holistic understanding of the study, the thesis writer selected Value Enhanced Collaborative Working (VECW) model as an analysis framework. The model focuses on people, processes and tools as key elements that small consulting firms consider when thinking about managing their international operations. The findings of the thesis reveal that, internal and external resources in the interviewed consulting firms are viewed similarly, but managed differently depending on the nature and size of the firm. Firm’s management strategies concentrate on the adequate utilisation of the employees' motivation and experiences, effective stakeholders' management, various administrative evaluation processes and tools, the ability to realise useful networks, constant improvement through employee trainings, employees and customers’ feedbacks as well as enhanced freedom in order to support employees’ creativity. Further research to examine functional administrative tools and tools that small consulting firms could use to assess their resource capabilities when planning to become international would benefit the smaller businesses in terms of resources management and certainty in planning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Modern automobiles are no longer just mechanical tools. The electronics and computing services they are shipping with are making them not less than a computer. They are massive kinetic devices with sophisticated computing power. Most of the modern vehicles are made with the added connectivity in mind which may be vulnerable to outside attack. Researchers have shown that it is possible to infiltrate into a vehicle’s internal system remotely and control the physical entities such as steering and brakes. It is quite possible to experience such attacks on a moving vehicle and unable to use the controls. These massive connected computers can be life threatening as they are related to everyday lifestyle. First part of this research studied the attack surfaces in the automotive cybersecurity domain. It also illustrated the attack methods and capabilities of the damages. Online survey has been deployed as data collection tool to learn about the consumers’ usage of such vulnerable automotive services. The second part of the research portrayed the consumers’ privacy in automotive world. It has been found that almost hundred percent of modern vehicles has the capabilities to send vehicle diagnostic data as well as user generated data to their manufacturers, and almost thirty five percent automotive companies are collecting them already. Internet privacy has been studies before in many related domain but no privacy scale were matched for automotive consumers. It created the research gap and motivation for this thesis. A study has been performed to use well established consumers privacy scale – IUIPC to match with the automotive consumers’ privacy situation. Hypotheses were developed based on the IUIPC model for internet consumers’ privacy and they were studied by the finding from the data collection methods. Based on the key findings of the research, all the hypotheses were accepted and hence it is found that automotive consumers’ privacy did follow the IUIPC model under certain conditions. It is also found that a majority of automotive consumers use the services and devices that are vulnerable and prone to cyber-attacks. It is also established that there is a market for automotive cybersecurity services and consumers are willing to pay certain fees to avail that.