
- •Contents Section I. Modern business administration
- •Section II. Management information systems
- •Section III. Legal matters
- •Section IV. Business etiquette
- •Section V. Office safety. Stress at work
- •Section VI. Business documentation
- •Section VII. Insurance
- •7.3 Marine Insurance…………………………………………………….. Section VIII. Psychology in work
- •Передмова
- •Section I. Modern business administration Unit 1.1. Responsibility for Office Work
- •1.1.1. Office work
- •Assignments
- •1.1.2. Centralization and Decentralization
- •Centralization of office services
- •Selection of office site
- •Assignments
- •1.1.3. Layout of Office
- •Vocabulary notes
- •Assignments
- •1.1.4. Forms Design and Control
- •Assignments
- •1.1.5. Work Measurement
- •Assignments
- •Unit 1.2. Office Machinery and Equipment
- •1.2.1. Written Communication
- •Dictating machines
- •Facsimile reproduction and transmission
- •Teleprinters and telex systems
- •Real-time systems
- •Assignments
- •1.2.2. Oral Communication Telephone
- •Intercommunication (intercom) systems
- •Staff location or paging systems
- •Assignments
- •1.2.3. Other Office Services Filing
- •Filing equipment
- •Records retention
- •Microphotography
- •Assignments
- •1.2.4. Mailing
- •Reproduction
- •Assignments
- •1.2.5. Data Processing (dp)
- •1.Input
- •2. Storage
- •3. Arithmetic unit (or processing unit)
- •4. Output unit
- •5.Control unit
- •Assignments
- •1.2.6. Some other Terms Used
- •Word processor
- •Assignments
- •1.2.7. Databases
- •Digital Image Processing (dip)
- •Some advantages of dip
- •Assignments
- •1.2.8. The Future of the Office Teleworking
- •The integrated office
- •Assignments
- •1.2.9. Security, Data Protection and Audit
- •Security of information
- •Assignments
- •1.2.10. The Place of Management Services in a Company The data processing (dp) manager
- •A systems analyst
- •A programmer
- •The operations manager
- •Organization of machine room
- •Assignments
- •Section II. Management information systems Unit 2.1. Introduction to mis
- •2.1.1. What is mis?
- •Assignments
- •2.1.2.Management Functions and Levels
- •Assignments
- •2.1.3. The Nature of Planning and Decision Making and the Techniques Available
- •Assignments
- •2.1.4. The Influence of Information Technology (it)
- •Assignments
- •1. What is it?
- •2.1.5.Changes Affecting Organisations
- •Vocabulary notes
- •Assignments
- •Unit 2.2. Information, Data and Communication
- •2.2.1. Information and Management
- •Information Classifications
- •Assignments
- •2.2.2. Data and Information
- •Assignments
- •2.2.3. Characteristics of Good Information
- •Communication Methods
- •Assignments
- •2.2.4. Perception
- •Assignments
- •2.2.5. Communication Systems
- •Assignments
- •2.2.6. Mis Definition
- •Information in Organisations
- •Assignments
- •Unit 2.3.Information Technology and mis
- •2.3.1. What is it?
- •Assignments
- •2.3.2. It and Information Systems
- •Text Handling
- •Teletext/Viewdata
- •Assignments
- •2.3.3. Telecommunications
- •Voice Mail
- •Assignments
- •2.3.4. Tele-conferencing and Video-conferencing
- •Elecronic Data Interchange (edi)
- •Other communication systems
- •Assignments
- •Section III. Legal matters Unit 3.1. Company law
- •3.1.1. Characteristics of a Company
- •Vocabulary notes
- •Assignments
- •3.1.2. Board Meetings
- •1. Board meetings
- •2. Shareholders’ meetings
- •Assignments
- •3.1.3.Shareholders’ Meetings
- •Assignments
- •Golden Tours Limited
- •Vocabulary notes
- •Memorandum
- •3.1.4.Removal of a Director from the Board
- •Assignments
- •Director’s service agreement
- •3.1.5.Unfair Dismissal
- •Assignments
- •3.2.1. Full-time Employment Contract
- •3.2.2. Disciplinary Warnings (verbal and written)
- •3.2.3. Letter of Redundancy
- •3.2.4. Employment Law and Human Resource Terms
- •3.2.5. Employment Discrimination
- •Section IV. Business etiquette Unit 4.1.How to Behave in Business
- •4.1.1.The Rules of Good Business Manners
- •Assignments
- •4.1.2. Dealing with People Face to Face
- •Grammar notes
- •Assignments
- •4.1.3. Dealing with Customers and Suppliers
- •Assignments
- •4.1.4. Handling Conflict
- •Assignments
- •4.1.5. Building Relationships
- •Assignments
- •4.1.6. The Etiquette of Using Mobile Phones
- •Assignments
- •4.1.7. Business Meetings
- •4.1.8. Formal Meetings
- •Assignments
- •4.1.9.Business Meals
- •Assignments
- •4.1.10. Social Occasions
- •Hospitality events
- •Office parties
- •Assignments
- •Unit 4.2. Dealing with Different Cultures
- •4.2.1.Being Courteous toForeign Business People
- •Assignments
- •4.2.2.Dealing with the Americans
- •4.2.3. Dealing with the Japanese
- •Assignments
- •4.2.4. Dealing with the Arabs
- •Ethnic and Religious Differences
- •Assignments
- •4.2.5. Dealing with Continental Europeans
- •Assignments
- •4.2.6.Relationships between Businesses
- •Respect hierarchies
- •Be loyal to your firm
- •Handling complaints
- •Confidential material
- •Assignments
- •4.2.7. Office Rage
- •Assignments
- •Section V. Office safety. Stress at work. Unit 5.1. Office Safety.
- •5.1.1. Housekeeping
- •Assignments
- •5.1.2. Electrical appliances
- •Assignments
- •5.1.3. Dangerous Substances
- •Assignments
- •5.1.4. Fire Precautions
- •Assignments
- •5.1.5. Office Health and Safety Audit
- •Assignments
- •Unit 5.2. Stress at Work
- •5.2.1. What is Stress?
- •Assignments
- •5.2.2. Role Theory
- •Assignments
- •5.2.3. The Effects of Stress
- •Assignments
- •5.2.4. Coping Strategies
- •Assignments
- •Vocabulary notes
- •5.2.5. Priorities in Managing Stress
- •Vocabulary notes
- •Assignments
- •5.2.6. Stress Management and Communication
- •Assignments
- •5.2.7. Stress Management Techniques
- •Assignments
- •5.2.8. Steps to Combat Stress
- •Assignments
- •Section VI. Business documentation Unit 6.1. Business Letters
- •6.1.1. Introduction to Business Letters
- •Parts of a Business Letter
- •Inside Address
- •Introduction
- •Identification Initials
- •Assignments
- •6.1.2. Sample Business Letters
- •6.1.2.1. Job Application Letters1
- •Assignments
- •Job Application Letter (follow-up)
- •Assignments
- •Job Application Letters (unsolicited letter)
- •Assignments
- •Reply to an Unsolicited Letter
- •Assignments
- •Covering Letter
- •Assignments
- •CurriculumVitae
- •Example cv wendy benson
- •Assignments
- •6.1.2.2. Complaint Letters
- •Complaint about Truck’s Breakdown
- •Assignments
- •Reply to Complaint about Delay in Submiting Technical Documentation
- •Assignments
- •Complaint about Damage
- •Assignments
- •Reply to Complaint about Damage
- •Assignments
- •Reply to Complaint about Bad Workmanship
- •Assignments
- •Reply to Complaint about Non-delivery
- •Assignments
- •Points to Remember
- •6.1.2.3. Banking Request for a Standing Order
- •Assignments
- •Credit (request for general credit facilities)
- •Assignments
- •Refusal of Credit Facilities
- •Assignments
- •Credit Denied
- •Assignments
- •Credit Granted
- •Assignments
- •Assignments
- •Credit (referee’s reply)
- •Assignments
- •Credit (enquiry agent’s reply)
- •Assignments
- •6.1.2.4. Payment Payment (request for an extension)
- •Vocabulary notes
- •Assignments
- •Payment (offer of a compromise)
- •Assignments
- •Payment (reply to second request)
- •Assignments
- •Payment (third request, final demand)
- •Assignments
- •Error: Mistake in Payment
- •Assignments
- •Collection Letter(first request)
- •Assignments
- •Collection Letter (subsequent requests)
- •Assignments
- •6.1.2.5. Insurance Request for Comprehensive Insurance
- •Assignments
- •Reply to Claim for Fire Damage
- •Assignments
- •Transportation and Shipping
- •Assignments
- •6.1.2.6.Miscellaneous Replies and Quotations
- •Assignments
- •Delay in Delivery
- •Assignments
- •Quotation of Terms
- •Assignments
- •Placing an Order (covering letter)
- •Assignments
- •Rendering Technical Assistance
- •Assignments
- •Reply to Request to Eliminate the Breakdown of the Generator
- •Assignments
- •Tenders for the Construction Works
- •Assignments
- •Letter of Acknowledgment
- •Assignments
- •Letter of Appreciation
- •Assignments
- •Letter of Recommendation
- •Assignments
- •Reservation Letter
- •Assignments
- •Assignments
- •Letter of Resignation
- •Assignments
- •Unit 6.2. Other Business Documents
- •6.2.1. The Memorandum
- •6.2.2. Sample Memorandums Sample Memorandum 1
- •Sample Memorandums 2
- •Sample Memorandums 3
- •Interoffice message
- •Assignments
- •Sample Memorandum 4
- •Assignments
- •Sample Memorandum 5
- •Visit of a customer
- •Assignments
- •Sample Memorandum 6
- •Industrial change
- •Assignments
- •Sample Memorandum 7 Redundancies
- •Assignments
- •Sample Memorandum 8
- •Assignments
- •6.2.3. Minutes
- •Assignments
- •14 In suite 15, administration building
- •Assignments
- •Assignments
- •6.2.4. Report Writing
- •Setting the objective
- •Researching and organising information
- •1. Decide what information you need
- •2. Collect the material
- •3.Collate the information
- •4. Sort it into groups
- •Structuring the report
- •Writing in a clear style
- •Using correct English
- •Adding the finishing touches
- •Assignments
- •6.2.5. Sample Reports Sample Report 1
- •Market research summary
- •1. Sales
- •2.Advertising
- •3. Competition
- •4. Finance
- •Assignments
- •Sample Report 2
- •Report on Internet sales
- •Assignments
- •Sample report 3 Advertising agency’s report
- •Preliminary Market Research Report for Katz Electrical Ltd
- •Assignments
- •6.2.6. Documents Used in Transportation of Goods Road, Rail, and Air Transport
- •Road transport
- •Documentation
- •Rail transport
- •Documentation
- •Documentation
- •General
- •Assignments
- •Shipping
- •Types of vessel
- •Containers services
- •Shipping documentation
- •Shipping Liabilities
- •Vocabulary notes
- •Assignments
- •6.2.7. Essential Features of Contract
- •Assignments
- •Terms of Payment
- •Assignments
- •Terms of Delivery
- •Incoterms
- •Insurance of Goods
- •Assignments
- •Force Majeure
- •Assignments
- •Claims and Sanctions
- •Claim Procedure
- •Ways of Settling a Claim
- •Assignments
- •6. Packing and Marking
- •7. Terms of Payment
- •8. Sanctions and claims
- •9. Force majeure
- •Settlement of disputes and arbitration
- •11. Miscellaneous
- •Legal Addresses of the Parties
- •Assignments
- •Sample Contract 2
- •Article 1
- •Article 2
- •Article 3
- •Article 4
- •Article 5
- •Article 6
- •Article 7
- •Article 8
- •Article 9
- •Article 10
- •Article 11
- •Article 12
- •Assignments
- •Article 4
- •Article 5
- •Article 6
- •Article 7
- •Article 8
- •Section VII. Insurance
- •7.1. Insurance Procedures
- •Fire and Accident Insurance
- •Assignments
- •7.2. Accident Insurance
- •Assignments
- •7.3. Marine insurance
- •Marine Insurance Policies
- •Assignments
- •Section VIII. Psychology in work.
- •8.1. Psychological Theories about Unemployment and Retirement
- •Assignments
- •8.2. Retirement and Responsibility
- •Assignments
- •8.3. Leadership
- •Assignments
- •8.4. Choosing People for Jobs
- •Assignments
- •Список літератури
- •Dictionaries
1.2.9. Security, Data Protection and Audit
When an organization computerizes its procedures, it becomes dependent on a system to which it has committed vital business information. Disruption of the computer system could lead to losses from which the company may not recover.
In the USA computer fraud is said to be increasing at the rate of 500 per cent per annum. There are many other risks, e.g. software error, industrial action, system abuse, hardware failure, theft and vandalism, fire and flood, industrial espionage. Counter-measures are therefore needed to safeguard the business operation and in particular the computer installation.
In many parts of the world a person's privacy is considered a basic human right. However, information about individuals is stored for many organizations. Some data is held on computers, e.g. payroll, local authorities for council tax, social security, inland revenue and health authorities, car taxation, credit card agencies and electoral rolls. These are usually separate databases, but with telecommunication advances, they could be linked together. Illegal access to databases is more likely and a person's privacy could be said to be threatened. This privacy of personalized data held on computer databases is referred to as data protection.
Security of information
New technology brings new opportunities for crime, which ranges from computer theft, desk-top forgery, voice and electronic mail terrorism, to graffiti sent by facsimile transmission and electronic data interchange fraud, including 'hacking' and destruction of data by introducing computer viruses. Desk-top publishing software combined with the latest colour laser printers and photocopiers are increasingly being used by forgers. Many business documents, including cheques, can be forged. The extent of the forgery is only limited by the quality of the paper. Various measures are taken by organizations in an attempt to combat forgery. Another big security issue involves the use of networking computers, especially as they allow information to be transferred between databases from many locations worldwide. A crime can be committed at a distance from where the criminal actually is. Passwords by themselves are not adequate security. Computer software anti-virus programs will scan disks for known viruses, which destroy computer data. Use of disks not originated on the network should be avoided unless they have been throughly checked.
Computing staff are the key to all security measures. Qualifications and references of staff recruited should be verified.
The strict control of operations is vital, especially where satellite devices are connected to a central processor, allowing easy access to files. Unauthorized users should be immediately locked out of the machine. Mathematical locks can be used on larger systems.
Records of old manual systems should be retained for a few years when a new system is being tried out, in case files and software are destroyed. The location of the central processor should be in an area of difficult access with suitable locking or card identifying systems employed. Master software tapes and disks with security copies of daily business transactions should be safely stored away.
If outside software houses write systems programs, these should be screened. Insurance cover should be adequate, and cover the cost of hardware, software, costs of recreating data and consequential loss.