Research Papaer

In: Business and Management

Submitted By gala3089
Words 1966
Pages 8
UNIT VIII
RESEARCH PAPER

Student name: Nguyen Thi Ngoc Minh
Student Number: 217527
School: Columbia Southern University

I. Introduction
At the beginning, Sacombank was just a small bank, established in 21st December 1991, with the initial chartered capital of 3 billion VND and operated within Ho Chi Minh City (Sacombank, 2012). After about 22 years’ operating, Sacombank is now one of the leading Vietnamese commercial joint stock banks with strong financial capacity and stable operation. Through all the ups and downs, changes in policies, economy, Sacombank has expanded the size, assets, equity, and especially Sacombank has the broadest network of business locations in Vietnam, Laos, and Cambodia.

As a Sacombank’s staff, I would like to analyze my company to find out how to develop the bank as the mission to be the leading retail bank in Indochina. In this report, I will intro briefly about the Sacombank, go through the organization structure, operating activities, effectiveness and discussion about some problem appearing when the company in service with this organization structure. Moreover, recommendations will be given to solves the problems and allow the organization operate efficiently.

II. Mission and objective:

Sacombank through 22 year has created a good business network, modern technology system, and stable financial capacities which allow the bank to constantly maximize value for customers and shareholders, bring value to staff in terms of career development and wealth, contribute to the development of the community (Sacombank, 2012).

From the missions, according to the broad of management, there are 5 core objectives approached by the broad of management. First is pioneering to be an explorer and accept challenges to discover new directions. The second is novel, dynamic and innovative to turn difficulties and…...

Similar Documents

Research Papaer

...1) Why windows server 2008 comes in different versions? What is the significance of each version? The reason Windows Server 2008 many different versions are to meet the needs of its customers. They provide many 7 different versions ranging from the basic entry level software for a small business to very large corporations that require immense computing power. The Microsoft website states “Each Windows Server 2008 R2 edition provides key functionality to support any sized business and IT challenge.” (Microsoft.com, 2010) Windows Server 2008 R2 (Foundation) – Is the basic starter server package. Windows Server 2008 R2 (Standard) – Is well built, with the average tools and flexibility. Windows Server 2008 R2 (Enterprise) – Specialized to meet the needs of very unique applications. Windows Server 2008 R2 (Datacenter) – Has a Very large capacity. Windows Server 2008 R2 (Web) – For internet applications only. Windows Server 2008 R2 (HPC Suite) – It is Customizable to get the most out of the system resources. Windows Server 2008 R2 (Itanium Based) – It is the most scalable. (Microsoft.com, 2010) 2) What are the new features or enhancements made to windows server 2008? How is windows server 2008 different from windows server 2003? Some of the new features according to Microsoft’s website are Powerful Hardware and Scaling Features, Reduced Power Consumption, Hyper-V in Windows server 2008 R2 SP1, Expand Desktop Deployment Options with VDI, and Easier and more......

Words: 439 - Pages: 2

Term Papaer

...create applications for the Android platform. The Android SDK includes sample projects with source code, development tools, an emulator, and required libraries to build Android applications. Applications are written using the Java programming language and run on Dalvik, a custom virtual machine designed for embedded use which runs on top of a Linux kernel. User Friendliness – is term used to define how the system works for the user’s capabilities and how does it makes the user capable to use such a application or a software. Chapter III Methodology This deals with Project Research Design, methods used in developing the system design. Together with the Evaluation Procedure, Evaluation Criteria, the data gathering instruments and techniques used as well as the methods used to evaluate the developed software should be discussed. Project Research Design Figure 3.1 Context Diagram (Proposed System) In this the diagram, the coordinator will send a .xls file to the professor’s android gadget then inputs the students class standing then compute its grades then send it back to the coordinator and to the guidance referral. [pic] Figure 3.2 DATA FLOW DIAGRAM: LEVEL 1 Android Monitoring System This diagram is for Android Monitoring System. It shows the flow of the whole Android Application, from importing files up to exporting reports. The sequences of process are the prerequisite to each process wherein the......

Words: 7822 - Pages: 32

Papaer

...and Marcus (1986) even criticize the very idea that social scientificmethods can prove or disprove theories. In their quest for a monopoly on truth or science, scholars often use a Authors9 Note: An earlier version of this article was presented at the annual meetings of the American Sociological Association, Chicago, August 2002. Gregoire Mallard acknowledges the support of a graduate research fellowship from the Lurcy Foundation, which funded his work at Princeton University in 2002-2003. Michele Lamont acknowledges a generous grantfrom theNational Science Foundation (grant no. SES-0096880), which made this research possible, as well as a fellowship from theRadcliffe Institute for Advanced Studies and theCenter for Advanced Andrew W. Mellon Foundation (grant no. Study in theBehavioral Sciences, with the support of the 29800639). Joshua Guetzkow acknowledges the support of theRobert Wood Johnson Foundation inHealth Policy Research Program. We thank the following organizations for authoriz ing access to their funding panels: theAmerican Council of Learned Societies, the Social Science Research Council, the Woodrow Wilson National Fellowship Foundation, and two anonymous fellowship competitions. We are particularly indebted to Craig Calhoun, the late JohnD'Arms, Scholars Judith Pynch, Stanley Katz, Robert Weisbuch, and all the participants of this study formaking itpossible. We thank JohnBowen, Don Brenneis, Nina Eliasoph, David Frank, Howard Gardner, Patricia Gumport,......

Words: 14653 - Pages: 59

Bp Papaers

...Need a custom research paper on Technology? Click here to buy a custom term paper. About two hundred years before, the word "computer" started to appear in the dictionary. Some people even didn't know what is a computer. However, most of the people today not just knowing what is a computer, but understand how to use a computer. Therefore, computer become more and more popular and important to our society. We can use computer everywhere and they are very useful and helpful to our life. The speed and accuracy of computer made people felt confident and reliable. Therefore, many important information or data are saved in the computer. Such as your diary, the financial situation of a oil company or some secret intelligence of the military department. A lot of important information can be found in the memory of computer. So, people may ask a question: Can we make sure that the information in the computer is safe and nobody can steal it from the memory of the computer? Physical hazard is one of the causes of destroying the data in the computer. For example, send a flood of coffee toward a personal computer. The hard disk of the computer could be endangered by the flood of coffee. Besides, human caretaker of computer system can cause as much as harm as any physical hazard. For example, a cashier in a bank can transfer some money from one of his customer's account to his own account. Nonetheless, the most dangerous thief are not those who work with computer every day, but youthful......

Words: 1020 - Pages: 5

Hand Hygeine Research Papaer

...significantly the participant’s hand hygiene compliance and would result in increased maintenance of these behaviors. Method of obtaining Approval Obtaining approval and support for the program of hand washing and hand hygiene as a measure to reduce the spread of hospital acquired infection will start from my unit manager. Involvement of my department manager and director is very essential since my proposed changes will start from my unit, then approval from the nurse practice advisory board, the CNO, CFO, and CEO of the hospital. I have to appeal to my key stakeholders by demonstrating how my proposed changes will benefit the hospital, the patient and HCWs. This can be achieve through literature reviews and utilization of evidence based research. I need to involve the hospital educators to develop and find the best course of action for educating staff on my proposed changes and to provide culture context poster for the program. Assessment of existing policies, procedures, training, material, staffing roles and organizational structure of the facility has to be considered. Schedule a meeting with the head of department, the summary of the meeting will focus on what the problems or needs that are affecting patient care and outcome. Brief reason why the problem is worth solving, putting in mind how it affect the patient and the hospital, and how the idea will benefit both patient and the hospital. Bringing the topic to light during monthly unit staff meeting and committee......

Words: 6478 - Pages: 26

Papaer

...other course equivalent to the said stream. Note: The duration of scholarship will be fixed as per above criteria and will not vary with the prolongation of session(s). l. The total number of scholarships, their amount and conditions governing each scholarship will be decided by the Board, from time to time. m. Merit list shall be circulated every year. Eligible candidates shall be required to apply for scholarship on the prescribed application forms, supplied to their institution by the Board, from where they appeared in the examination and in case of private candidates, these will be sent on their permanent home addresses. n. Initial award of scholarship/medals will be sanctioned by the Chairman and subsequent releases by the Director (Research). o. The Chairman will be empowered to settle time barred applications/bills for award of scholarships. 8.3 Award of medal/merit certificate/personal computer & cash prize a. Medals and merit certificates shall be awarded to the candidates each year who secure the first three positions in their own groups irrespective to gender discrimination. b. c. A candidate securing at least 60% marks shall be eligible for the medal. A private candidate shall also be given medal if otherwise eligible. d. The medals shall be awarded/based on the merit list prepared after the rechecking of answer books. e. The Chairman shall approve the design / cost of the medals. f. The medals and merit certificates shall be awarded in a special function......

Words: 1287 - Pages: 6

Context Papaer

...century. It should be realized that his works played an important role motivating more people to establish the justice and equity in modern society and pushing forward the development of social democracy. Works Cited Ingwersen, Niels. "Martin Andersen Nexo." Twentieth-Century Danish Writers. Ed. Marianne Stecher-Hansen. Detroit: Gale Group, 1999. Dictionary of Literary Biography Vol. 214. Literature Resource Center. Web. 28 Feb. 2014. Johanson, Joel M. "Pelle, the Conqueror: An Epic of Labor." The Sewanee Review 27.2 (Spring 1919): 218-226. Rpt. in Twentieth-Century Literary Criticism. Vol. 43. Detroit: Gale Research, 1992. Literature Resource Center. Web. 28 Feb. 2014. Thompson, Lawrence S. "Martin Andersen Nexø, 1869-1954." Books Abroad 28.4 (Autumn 1954): 423-424. Rpt. in Twentieth-Century Literary Criticism. Vol. 43. Detroit: Gale Research, 1992. Literature Resource Center. Web. 28 Feb. 2014. ----------------------- Zhang 4...

Words: 939 - Pages: 4

Term Papaer

...following four things: • Define a clear topic and stick to it throughout the paper, addressing a consistently defined audience. • Use the best available sources of information and acknowledge them appropriately. • Display careful organization and clear wording. • Follow scholarly standards for format, grammar, spelling, and other mechanical matters. If the paper reports original research or technical work, a large part of the grade is based on the quality of the work itself, but presentation still counts; if you can’t present your work well, you might as well not have done it. 3 Receiving and acknowledging help Getting help from the right sources is a useful skill. Real scientists do it all the time. 2 When writing a term paper or thesis, you are permitted to receive any amount of help from anyone, as long as you acknowledge the help so that your instructors can distinguish your work from the work of others. You can acknowledge help in an “Acknowledgments” section at the beginning of the paper, or in a footnote attached to the first sentence. Be sure to acknowledge grants if you are supported by research grant funds; this is usually done by a sentence such as, “This work was supported by National Science Foundation Grant ZZZ-99-99999, Michael A. Covington, Principal Investigator.” It is not necessary to acknowledge scholarships or fellowships. 4 Planning a term paper or thesis Before you start writing — in fact before you get very far gathering information......

Words: 5028 - Pages: 21

Papaer

...indicators for the huge rise. [pic]Figure 6 In this scatter plot you can see that it lung cancer cases has indeed gone up with the rise of tobacco sales. This comes back to my hypothesis, that indeed tobacco sales are a primary indicator for future Lung Cancer cases (bronchus). [pic]Figure 7 The above graph shows that as the car sales go up, so does the amount of lung cancer cases go up. This comes back to my hypothesis that indeed car sales do cause lung cancer, but this leaves a question to the people that want to know why? How? Which also leaves me a question that how on earth can car sales cause lung cancer, but as the graph shows it does. As I am researching the study right now, I cannot find the answer to this, one has to research in this study for so many ears to just find the simple answer as to how. [pic]Figure 8 This graph is not as confusing as the car sales and lung cancer were, because in some way gas (petroleum) has a really little chance of causing lung cancer, because people believe that petroleum (jelly) do cause cancer, but the experts have found no studies that show that “yes indeed it does”. This graph is somewhat realistic because there is a chance that gas can cause cancer. [pic]Figure 9 This shows that as gas prices go up s does the sales of tobacco, and it is completely true because of everything getting expensive and the prices of everything are going up. But the tobacco sales have not gone up that high; it’s the taxes that are......

Words: 1620 - Pages: 7

Papaer

...Era there was an article entitled screening your screen time. Its message encourages us to be wise with how we’re connected to the Internet, TV, and phones. Elder Ardern emphasizes that, “As good as these things are; we cannot allow them to push to one side those things of greatest importance. How saw would it be if the phone and computer with all their sophistication drowned out the simplicity of sincere prayer to a loving Father in Heaven. Let us be as quick to kneel as we are to text.” Having said that, this article tells us how others are plugging in and unplugging from technology to make a positive difference. First we will read the responses for plugging in for good. Elder Ardern says that he has found it helpful to access research articles, conference talks, and ancestral records, and to receive emails, Facebook reminders, tweets, and texts. A youth member said, “Technology ties the world together. I can listen to general conference at the click of a button. It also allows my family to communicate with each other. The Internet has helped me prepare a talk for church. It helps us to share the gospel worldwide.” Here are the responses for unplugging for balance in our life. You need to take time out to enjoy the world and talk to God, not just to your friends on Facebook. Technology itself isn’t bad, but if it distracts you from what’s important, then it is. Like everything else, “moderation in all things.” We do need to unplug every day, usually......

Words: 3652 - Pages: 15

Test Papaer

...info in body) • Preferred Alternative with rationale. • Justification/Predicted Outcome: It is important that all guesstimates or creative ideas be founded upon some marketing rationale and a solid understanding of the metrics related to the target market and anticipated financial changes/impact. Using target market analysis and education estimation of population, $, and units is appropriate. If you are not confident in your ability to do so…PLEASE FEEL FREE TO DISCUSS “HOW TO” as a team with the professor well in advance of your case presentation. Conclusion References Recommend that you source business journals, periodicals, and textual references as well as any online research. Make sure you support your ideas with facts and figures. Please try to use your own words and ideas based on research rather than copy and paste other’s words from the internet. You should USE PROPER HARVARD style in-line citations, image source citations, and an alphabetical CITATION LIST in a references section. Appendices All charts, financials, visuals, and other related items can be placed here and referenced in the report....

Words: 284 - Pages: 2

Tuskegee Research Papaer

... Southern University | Who AM I | FCSC 481 | | L’Asia George | 1/20/2016 | | Who am I? That’s a question most people have a difficult time answering. When I think of this question it brings Alice in Wonderland to mind; the scene when the caterpillar asked her “Who are you?” As a child I didn’t really get concept of the deeper meaning. He was trying to get her to think because, as you know she found herself in an unfamiliar place. In most cases, that’s when the real you come on the scene. I know if someone would have asked me this question three years ago I couldn’t have answered correctly. I would have given them the typical respond such as, “I am the proud daughter of”, “I am from”, etc. Afterwards they will still have not knowledge of who I am. In order for anyone to answer properly they will have to truly know themselves, and for awhile I didn’t. It wasn’t until last year that I discovered myself. College is the time youngest people have this epiphany. The journey getting there wasn’t easy. I had to go through a season of what most church folk call a “stripping”, which means losing everything that was familiar to you. There is nothing about me that is the same from the inside and out including my environment. It started when I graduate high school. I didn’t have any specific plans for myself; I just knew the next step was college. I didn’t have any idea of what I wanted to choose for a concentration so, I picked the normal nursing. It was pretty easy......

Words: 687 - Pages: 3

Data Breach Research Papaer

...Secure or Breached? As technology is becoming more prevalent the manner in which we store information is changing. Gone are the days of information being stored into file cabinets. Instead information is stored in databases, a system of hard drives that stores information electronically normally accessible remotely. With this comes a rise in hackers and correspondingly a rise in security breaches, where hackers have access to sensitive information. Vulnerabilities are the root of all hacks. For businesses, they result in a decline in reliability. If an individual or a group wants to breach information, they will almost always find a way. With the increasing need for information databases, businesses have to weigh the risks of hacks. When an individual allows their information to be stored in a database, with or without their knowledge they are at risk. When this information enters the database, it becomes the business's responsibility to protect this information. With the amount of sensitive data being stored in databases, current cyber security measures and laws are not up to par. Infamous Data Breaches In 2015, there were 781 data breaches according to the Identity Theft Resource Center (ITRC). One of these infamous breaches being with Anthem, otherwise known as BlueCross BlueShield insurance company. In this breach, hackers stole over 80 million social security numbers and other sensitive information of customers was obtained by the hackers. Similar to Anthem, Target......

Words: 1455 - Pages: 6

Ethics Papaer

...hard and treat everyone right, my church taught me that God is good and that no one is perfect, and my old boss taught me to always be the best. I have learned so much but I feel I have so much more to understand. I continue to revise myself by constantly being opened minded with new ideas and possibilities. I believe once I feel I have everything figured out then my ethics will suffer. My ethics has a positive effect in my workplace because I always try my best at everything that needs to be accomplished. I worked at a company for seven years as a Senior Sales Rep. I was always the first one in the office and usually the last one to leave for the day. I treated everyone with respect and I received the same in return. I did research on my product and service in order to provide the best service possible during a phone call or appointment. My personal ethics and business ethics allowed me to win sales man of the month five of the seven years at the job. I remember that everyone would always wonder what I was doing different but the formula was simple, I was just working harder than everyone else. My dad always told me, “If you want something in life, you have to go out and get it” and that’s exactly what I did everyday I went to work. I would sometimes wonder why some individuals would not do their best at the job and what made me different. I came to the conclusion that somewhere in my path of life, I was fortunate to be influenced by certain individuals......

Words: 1139 - Pages: 5

Grad Papaer

...force against victims. Additionally, crime is defined as an act of violence that is carried out by one or more individuals and can be toward another person or property. The purpose of the analysis of this case study is to evaluate available data and to determine the variables that contribute the most to crimes and address several conceptions and misconceptions about the leading causes of property crimes in the U.S. Questions the study will attempt to answer include: 1. Are crimes rates higher in urban than rural areas? 2. Does unemployment or education level contribute to property crime rates? 3. Does public assistance contribute to property crime rates? 4. What other factors relate to property crimes? Lastly, the research is going to examine the cause property crime based on the income, dropout, precipitation, public aid recipients, density, kids, unemployment, urban area and state. Analysis and Methods Minitab, a statistical analysis program, was used to analyze the collected data and test various factors. Crime was chosen as the dependent variable and the possible contributing factors were chosen as the independent variables (stated below). It is important to note the variable STATE was not used during data analysis as it skewed the data output. This variable is best used as a grouping variable and is not pertinent to this study. Regression Analysis: CRIMES_1 versus PINCOME, DROPOUT, PUBAID, DENSITY, KIDS, PRECIP, UNEMPLOY and URBAN. The......

Words: 1992 - Pages: 8

Soft drink | [Read more...] about Operation Mekong 2016 BRRip 720p Dual Audio In Hindi Chinese | Business to Business