15 resultados para cash from operations

em Digital Commons at Florida International University


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Most research on tax evasion has focused on the income tax. Sales tax evasion has been largely ignored and dismissed as immaterial. This paper explored the differences between income tax and sales tax evasion and demonstrated that sales tax enforcement is deserving of and requires the use of different tools to achieve compliance. Specifically, the major enforcement problem with sales tax is not evasion: it is theft perpetrated by companies that act as collection agents for the state. Companies engage in a principal-agent relationship with the state and many retain funds collected as an agent of the state for private use. As such, the act of sales tax theft bears more resemblance to embezzlement than to income tax evasion. It has long been assumed that the sales tax is nearly evasion free, and state revenue departments report voluntary compliance in a manner that perpetuates this myth. Current sales tax compliance enforcement methodologies are similar in form to income tax compliance enforcement methodologies and are based largely on trust. The primary focus is on delinquent filers with a very small percentage of businesses subject to audit. As a result, there is a very large group of noncompliant businesses who file on time and fly below the radar while stealing millions of taxpayer dollars. ^ The author utilized a variety of statistical methods with actual field data derived from operations of the Southern Region Criminal Investigations Unit of the Florida Department of Revenue to evaluate current and proposed sales tax compliance enforcement methodologies in a quasi-experimental, time series research design and to set forth a typology of sales tax evaders. This study showed that current estimates of voluntary compliance in sales tax systems are seriously and significantly overstated and that current enforcement methodologies are inadequate to identify the majority of violators and enforce compliance. Sales tax evasion is modeled using the theory of planned behavior and Cressey’s fraud triangle and it is demonstrated that proactive enforcement activities, characterized by substantial contact with non-delinquent taxpayers, results in superior ability to identify noncompliance and provides a structure through which noncompliant businesses can be rehabilitated.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Recent advances in airborne Light Detection and Ranging (LIDAR) technology allow rapid and inexpensive measurements of topography over large areas. Airborne LIDAR systems usually return a 3-dimensional cloud of point measurements from reflective objects scanned by the laser beneath the flight path. This technology is becoming a primary method for extracting information of different kinds of geometrical objects, such as high-resolution digital terrain models (DTMs), buildings and trees, etc. In the past decade, LIDAR gets more and more interest from researchers in the field of remote sensing and GIS. Compared to the traditional data sources, such as aerial photography and satellite images, LIDAR measurements are not influenced by sun shadow and relief displacement. However, voluminous data pose a new challenge for automated extraction the geometrical information from LIDAR measurements because many raster image processing techniques cannot be directly applied to irregularly spaced LIDAR points. ^ In this dissertation, a framework is proposed to filter out information about different kinds of geometrical objects, such as terrain and buildings from LIDAR automatically. They are essential to numerous applications such as flood modeling, landslide prediction and hurricane animation. The framework consists of several intuitive algorithms. Firstly, a progressive morphological filter was developed to detect non-ground LIDAR measurements. By gradually increasing the window size and elevation difference threshold of the filter, the measurements of vehicles, vegetation, and buildings are removed, while ground data are preserved. Then, building measurements are identified from no-ground measurements using a region growing algorithm based on the plane-fitting technique. Raw footprints for segmented building measurements are derived by connecting boundary points and are further simplified and adjusted by several proposed operations to remove noise, which is caused by irregularly spaced LIDAR measurements. To reconstruct 3D building models, the raw 2D topology of each building is first extracted and then further adjusted. Since the adjusting operations for simple building models do not work well on 2D topology, 2D snake algorithm is proposed to adjust 2D topology. The 2D snake algorithm consists of newly defined energy functions for topology adjusting and a linear algorithm to find the minimal energy value of 2D snake problems. Data sets from urbanized areas including large institutional, commercial, and small residential buildings were employed to test the proposed framework. The results demonstrated that the proposed framework achieves a very good performance. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research addresses the problem of cost estimation for product development in engineer-to-order (ETO) operations. An ETO operation starts the product development process with a product specification and ends with delivery of a rather complicated, highly customized product. ETO operations are practiced in various industries such as engineering tooling, factory plants, industrial boilers, pressure vessels, shipbuilding, bridges and buildings. ETO views each product as a delivery item in an industrial project and needs to make an accurate estimation of its development cost at the bidding and/or planning stage before any design or manufacturing activity starts. ^ Many ETO practitioners rely on an ad hoc approach to cost estimation, with use of past projects as reference, adapting them to the new requirements. This process is often carried out on a case-by-case basis and in a non-procedural fashion, thus limiting its applicability to other industry domains and transferability to other estimators. In addition to being time consuming, this approach usually does not lead to an accurate cost estimate, which varies from 30% to 50%. ^ This research proposes a generic cost modeling methodology for application in ETO operations across various industry domains. Using the proposed methodology, a cost estimator will be able to develop a cost estimation model for use in a chosen ETO industry in a more expeditious, systematic and accurate manner. ^ The development of the proposed methodology was carried out by following the meta-methodology as outlined by Thomann. Deploying the methodology, cost estimation models were created in two industry domains (building construction and the steel milling equipment manufacturing). The models are then applied to real cases; the cost estimates are significantly more accurate than the actual estimates, with mean absolute error rate of 17.3%. ^ This research fills an important need of quick and accurate cost estimation across various ETO industries. It differs from existing approaches to the problem in that a methodology is developed for use to quickly customize a cost estimation model for a chosen application domain. In addition to more accurate estimation, the major contributions are in its transferability to other users and applicability to different ETO operations. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In response to a crime epidemic afflicting Latin America since the early 1990s, several countries in the region have resorted to using heavy-force police or military units to physically retake territories de facto controlled by non-State criminal or insurgent groups. After a period of territory control, the heavy forces hand law enforcement functions in the retaken territories to regular police officers, with the hope that the territories and their populations will remain under the control of the state. To a varying degree, intensity, and consistency, Brazil, Colombia, Mexico, and Jamaica have adopted such policies since the mid-1990s. During such operations, governments need to pursue two interrelated objectives: to better establish the state’s physical presence and to realign the allegiance of the population in those areas toward the state and away from the non-State criminal entities. From the perspective of law enforcement, such operations entail several critical decisions and junctions, such as: Whether or not to announce the force insertion in advance. The decision trades off the element of surprise and the ability to capture key leaders of the criminal organizations against the ability to minimize civilian casualties and force levels. The latter, however, may allow criminals to go to ground and escape capture. Governments thus must decide whether they merely seek to displace criminal groups to other areas or maximize their decapitation capacity. Intelligence flows rarely come from the population. Often, rival criminal groups are the best source of intelligence. However, cooperation between the State and such groups that goes beyond using vetted intelligence provided by the groups, such as a State tolerance for militias, compromises the rule-of-law integrity of the State and ultimately can eviscerate even public safety gains. Sustaining security after initial clearing operations is at times even more challenging than conducting the initial operations. Although unlike the heavy forces, traditional police forces, especially if designed as community police, have the capacity to develop trust of the community and ultimately focus on crime prevention, developing such trust often takes a long time. To develop the community’s trust, regular police forces need to conduct frequent on-foot patrols with intensive nonthreatening interactions with the population and minimize the use of force. Moreover, sufficiently robust patrol units need to be placed in designated beats for substantial amount of time, often at least over a year. Establishing oversight mechanisms, including joint police-citizens’ boards, further facilities building trust in the police among the community. After disruption of the established criminal order, street crime often significantly rises and both the heavy-force and community-police units often struggle to contain it. The increase in street crime alienates the population of the retaken territory from the State. Thus developing a capacity to address street crime is critical. Moreover, the community police units tend to be vulnerable (especially initially) to efforts by displaced criminals to reoccupy the cleared territories. Losing a cleared territory back to criminal groups is extremely costly in terms of losing any established trust and being able to recover it. Rather than operating on a priori determined handover schedule, a careful assessment of the relative strength of regular police and criminal groups post-clearing operations is likely to be a better guide for timing the handover from heavy forces to regular police units. Cleared territories often experience not only a peace dividend, but also a peace deficit – in the rise new serious crime (in addition to street crime). Newly – valuable land and other previously-inaccessible resources can lead to land speculation and forced displacement; various other forms of new crime can also significantly rise. Community police forces often struggle to cope with such crime, especially as it is frequently linked to legal business. Such new crime often receives little to no attention in the design of the operations to retake territories from criminal groups. But without developing an effective response to such new crime, the public safety gains of the clearing operations can be altogether lost.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Malaria is a threat to United States military personnel operating in endemic areas, from which there have been hundreds of cases reported over the past decade. Each of these cases might have been avoided with proper adherence to malaria chemoprophylaxis medications. Military operations may detract from the strict 100% adherence required of these preventive medications. However, the reasons for non-adherence in military populations are not well understood. This behavior was investigated using a cross sectional study design on a convenience sample of U.S. Army Ranger volunteers (n=150) located at three military instillations. Theoretical support was based on components of the Health Belief Model, the Theory of Reasoned Action/Theory of Planned Behavior, and the Social Cognitive Theory. ^ Data on knowledge, attitudes, and practices, as well as multiple environmental domains was collected using an original yet unvalidated questionnaire. The data was analyzed using bivariate Pearson correlations, binary logistic regression, and moderated logistic regressions employing a 0.05 criterion of statistical significance. Power analyses predicted 96-98% power for this analysis. ^ Multiple significant medium strength Pearson correlation coefficients were identified relative to the two dependent variables Take medications as directed and Intend to take the medications as directed the next time. Binary logistic regression analyses identified multiple variables that may predict behavioral intentions to adhere to these preventive medications, as a proxy for behavioral change. Moderated logistic regression analyses identified Command Support for adherence to these medications as a potential significant moderator that interacts with independent variables within three domains of the survey questionnaire. ^ The findings indicate that there may be potential significant beneficial effects, which may improve this behavior in this population of Rangers through 1) promoting affirmative interpersonal communications that emphasize adherence to these medications, 2) including malaria chemoprophylaxis medications in the mission planning process, and 3) military command support, in the form of including the importance of proper adherence to these medications in the unit safety briefings.^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In - Protecting Your Assets: A Well-Defined Credit Policy Is The Key – an essay by Steven V. Moll, Associate Professor, The School of Hospitality Management at Florida International University, Professor Moll observes at the outset: “Bad debts as a percentage of credit sales have climbed to record levels in the industry. The author offers suggestions on protecting assets and working with the law to better manage the business.” “Because of the nature of the hospitality industry and its traditional liberal credit policies, especially in hotels, bad debts as a percentage of credit sales have climbed to record levels,” our author says. “In 1977, hotels showing a net income maintained an average accounts receivable ratio to total sales of 3.4 percent. In 1983, the accounts receivable ratio to total sales increased to 4.1 percent in hotels showing a net income and 4.4 percent in hotels showing a net loss,” he further cites. As the professor implies, there are ways to mitigate the losses from bad credit or difficult to collect credit sales. In this article Professor Moll offers suggestions on how to do that. Moll would suggest that hotels and food & beverage operations initially tighten their credit extension policies, and on the following side, be more aggressive in their collection-of-debt pursuits. There is balance to consider here and bad credit in and of itself as a negative element is not the only reflection the profit/loss mirror would offer. “Credit managers must know what terms to offer in order to compete and afford the highest profit margin allowable,” Moll says. “They must know the risk involved with each guest account and be extremely alert to the rights and wrongs of good credit management,” he advocates. A sound profit policy can be the result of some marginal and additional credit risk on the part of the operation manager. “Reality has shown that high profits, not small credit losses, are the real indicator of good credit management,” the author reveals. “A low bad debt history may indicate that an establishment has an overly conservative credit management policy and is sacrificing potential sales and profits by turning away marginal accounts,” Moll would have you believe, and the science suggests there is no reason not to. Professor Moll does provide a fairly comprehensive list to illustrate when a manager would want to adopt a conservative credit policy. In the final analysis the design is to implement a policy which weighs an acceptable amount of credit risk against a potential profit ratio. In closing, Professor Moll does offer some collection strategies for loose credit accounts, with reference to computer and attorney participation, and brings cash and cash discounts into the discussion as well. Additionally, there is some very useful information about what debt collectors – can’t – do!

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Unacceptable employee behavior ultimately results in higher prices for consumers. Members of the Indiana Hospitality and Restaurant Association were surveyed about the practices being used to safeguard their assets and control employee deviance in food service. They were also asked to estimate the losses that result from employee theft. This information was used to investigate whether certain policies and procedures were more effective than others in limiting their losses.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Las Vegas gaming arena was one of the most severely affected consumeroriented industries to be impacted by the recent economic recession. The purpose of this study was to investigate the impact of relational benefits on customers’ behavioral loyalty in the Las Vegas gaming industry. This study particularly took a comparative approach and examined the relational impact during the economic recession and after the economic recession. Secondary data was obtained and regression analysis was performed to test the study hypothesis. The findings of this study revealed the economic recession impact on the Las Vegas gaming industry, as well as valuable insights for effective utilization of relational benefits to increase customer loyalty.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our understanding of employee attitudes and their impact on business outcomes has been further complicated in recent years by the newest cohort of service workers. Known as Generation Y (Gen Y), they appear to approach employment in a manner different to that of their predecessors. A review of the academic literature reveals little empirical evidence to support an appropriate understanding of the impact of such difference. This paper provides an overview of a large-scale study into generational differences in employee attitudes and reports on the preliminary data analysis of a survey of over 900 hospitality employees. The most important initial finding from the data analysis is that, on the whole, Gen Y employees have lower scores on those constructs that an organization should be attempting to maximize. Non-Gen Y employees are more satisfied with their jobs, more engaged and more affectively committed to the organization they work for than their Gen Y counterparts, amongst a range of other important constructs. Conversely, Gen Y employees display higher scores onthe constructs that an organization would want to minimize in its staff. Gen Y employees are more likely to be planning to quit their jobs, are more likely to perform poorly if their co-workers are doing so, and are also more likely to switch jobs for no particular reason. The discussion covers implications for management as well as directions for future research.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Just as all types of business firms are now expected to go beyond their profit-oriented activities in boosting the well-being of the community, so, too, is corporate social responsibility (CSR) expected from foodservice firms. The significance of the obesity epidemic, combined with the foodservice industry's role in the development of this epidemic, suggests that the industry has an ethical responsibility to implement CSR activities that will help reduce obesity, particularly among children. CSR should be seen as an efficient management strategy through which a firm voluntarily integrates social and environmental concerns into its business operations and its interactions with stakeholders. Although costs are associated with CSR initiatives, benefits accrue to the firm. Decisions regarding alternative CSR activities should be based on a cost-benefit analysis and calculation of the present value of the revenue stream that can be identified as resulting from the specific CSR activities. CSR initiatives should be viewed as long-term investments that will enhance the firms’ value. Key areas for foodservice firms' CSR activities include marketing practices, particularly practices impacting advertising to children and marketing that will enhance the firms’ visibility; portion-size modification; new-product development; and consistent nutrition labeling on menus.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In their study - From Clerk and Cashier to Guest Service Agent - by Nancy J. Allin, Director of Quality Assurance and Training and Kelly Halpine, Assistant Director of Quality Assurance and Training, The Waldorf-Astoria, New York, the authors state at the outset: “The Waldorf-Astoria has taken the positions of registration clerk and cashier and combined them to provide excellent guest service and efficient systems operation. The authors tell how and why the combination works. That thesis statement defines the article, and puts it squarely in the crosshairs of the service category. Allin and Halpine use their positions at the Waldorf-Astoria in New York City to frame their observations “The allocation of staff hours has been a challenge to many front office managers who try their hardest to schedule for the norm but provide excellent, efficient service throughout the peaks,” Allin and Halpine allude. “…the decision [to combine the positions of registration clerk and cashier] was driven by a desire to improve guest service where its impact is most obvious, at the front desk. Cross-trained employees speed the check-in and check-out process by performing both functions, as the traffic at the desk dictates,” the authors say. Making such a move has resulted in positive benefits for both the guests and the hotel. “Benefits to the hotel, in addition to those brought to bear by increased guest satisfaction, include greater flexibility in weekly scheduling and in granting vacations while maintaining adequate staffing at the desk,” say Allin and Halpine . “Another expected outcome, net payroll savings, should also be realized as a consequence of the ability to schedule more efficiently.” The authors point to communication as the key to designing a successful combination such as this, with the least amount of service disruption. They bullet-point what that communication should entail. Issues of seniority, wage and salary rates, organizational charting, filing, scheduling, possible probationary periods, position titles, and physical layouts are all discussed. “It is critical that each of the management issues be addressed and resolved before any training is begun,” Allin and Halpine suggest. “Unresolved issues project confusion and lack of conviction to line employees and the result is frustration and a lack of commitment to the combination process,” they push the thought Allin and Halpine insist: “Once begun, training must be ongoing and consistent.” In the practical sense, the authors provide that authorizing overtime is helpful in accomplishing training. “Training must address the fact that employees will be faced with guest situations which are new to them, for example: an employee previously functioning as a cashier will be faced with walking guests. Specific exercises should be included to address these needs,” say the authors.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The applications of micro-end-milling operations have increased recently. A Micro-End-Milling Operation Guide and Research Tool (MOGART) package has been developed for the study and monitoring of micro-end-milling operations. It includes an analytical cutting force model, neural network based data mapping and forecasting processes, and genetic algorithms based optimization routines. MOGART uses neural networks to estimate tool machinability and forecast tool wear from the experimental cutting force data, and genetic algorithms with the analytical model to monitor tool wear, breakage, run-out, cutting conditions from the cutting force profiles. ^ The performance of MOGART has been tested on the experimental data of over 800 experimental cases and very good agreement has been observed between the theoretical and experimental results. The MOGART package has been applied to the micro-end-milling operation study of Engineering Prototype Center of Radio Technology Division of Motorola Inc. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This research focuses on developing a capacity planning methodology for the emerging concurrent engineer-to-order (ETO) operations. The primary focus is placed on the capacity planning at sales stage. This study examines the characteristics of capacity planning in a concurrent ETO operation environment, models the problem analytically, and proposes a practical capacity planning methodology for concurrent ETO operations in the industry. A computer program that mimics a concurrent ETO operation environment was written to validate the proposed methodology and test a set of rules that affect the performance of a concurrent ETO operation. ^ This study takes a systems engineering approach to the problem and employs systems engineering concepts and tools for the modeling and analysis of the problem, as well as for developing a practical solution to this problem. This study depicts a concurrent ETO environment in which capacity is planned. The capacity planning problem is modeled into a mixed integer program and then solved for smaller-sized applications to evaluate its validity and solution complexity. The objective is to select the best set of available jobs to maximize the profit, while having sufficient capacity to meet each due date expectation. ^ The nature of capacity planning for concurrent ETO operations is different from other operation modes. The search for an effective solution to this problem has been an emerging research field. This study characterizes the problem of capacity planning and proposes a solution approach to the problem. This mathematical model relates work requirements to capacity over the planning horizon. The methodology is proposed for solving industry-scale problems. Along with the capacity planning methodology, a set of heuristic rules was evaluated for improving concurrent ETO planning. ^

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Cutting tools less than 2mm diameter can be considered as micro-tool. Microtools are used in variety of applications where precision and accuracy are indispensable. In micro-machining operations, a small amount of material is removed and very small cutting forces are created. The small cross sectional area of the micro-tools drastically reduces their strength and makes their useful life short and unpredictable; so cutting parameters should be selected carefully to avoid premature tool breakage. The main objective of this study is to develop new techniques to select the optimal cutting conditions with minimum number of experiments and to evaluate the tool wear in machining operations. Several experimental setups were prepared and used to investigate the characteristics of cutting force and AE signals during the micro-end-milling of different materials including steel, aluminum and graphite electrodes. The proposed optimal cutting condition selection method required fewer experiments than conventional approaches and avoided premature tool breakage. The developed tool wear monitoring technique estimated the used tool life with ±10% accuracy from the machining data collected during the end-milling of non-metal materials.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The applications of micro-end-milling operations have increased recently. A Micro-End-Milling Operation Guide and Research Tool (MOGART) package has been developed for the study and monitoring of micro-end-milling operations. It includes an analytical cutting force model, neural network based data mapping and forecasting processes, and genetic algorithms based optimization routines. MOGART uses neural networks to estimate tool machinability and forecast tool wear from the experimental cutting force data, and genetic algorithms with the analytical model to monitor tool wear, breakage, run-out, cutting conditions from the cutting force profiles. The performance of MOGART has been tested on the experimental data of over 800 experimental cases and very good agreement has been observed between the theoretical and experimental results. The MOGART package has been applied to the micro-end-milling operation study of Engineering Prototype Center of Radio Technology Division of Motorola Inc.