The Ineffective Enterprise

Total Page:16

File Type:pdf, Size:1020Kb

The Ineffective Enterprise THE INEFFECTIVE ENTERPRISE MOST AMERICANS TODAY WORK, either directly or indirectly, for enterprises, for large organizations that employ specialized workforces and multiple layers of management. Enterprises have been driving the American economy for well over a centu- ry, and Americans have been debating, for almost as long, just what needs to be done to make enterprises effective. The debates have revolved, for the most part, around a single simple question: How do you turn dozens, hundreds, or thousands of people who don’t know each other — and may not even know much about the work they have been hired to perform — into an operation that efficiently produces goods or provides services? At the end of the nineteenth century, one American felt sure he knew the answer. To make enterprises effective, industrial engineer Frederick Winslow Taylor asserted, managements needed to manage — down to the most minute details of the work to be done. Taylor called his approach to enterprise effec- tiveness “scientific management.” In a scientifically managed enterprise, Taylor taught, management does the thinking. All of it. Managers, he advised, should always “fully” plan out every single task every single worker “is to accomplish, as well as the means to be used in doing the work.”1 Taylorism — the notion that workers need to be carefully scripted, motion by motion — would go on to flourish in the new twentieth century. Businesses hustled to organize themselves, as best they could, along “scientific manage- ment” lines. Total management control over the work process, executives believed, would make for enterprises that functioned efficiently, with no effort ever wasted, no minutes ever lost. Today, a century later, the nostrums of “scientific management” seem a quaint, even barbaric, relic of a distant past. No contemporary business leader would dare suggest, at least not in polite company, that employees only do good work when management tells them exactly what to do and how to do it. Instead, modern executives orate, at every opportunity, about empowering workers, about the importance of creating workplaces that encourage employ- ees to exercise their creativity. 159 Originally published in Greed and Good: Understanding and Overcoming the Inequality That Limits Our Lives by Sam Pizzigati (Apex Press/Rowman & Littlefield, 2004). For more, see Inequality.org. 160 Greed and Good Almost every high-level corporate manager now knows, by heart, this empowerment mantra: In generations past, they have learned at innumerable management seminars, command-and-control might have made some business sense. In the old days of mass production, with workers standing at assembly lines, performing the same mindless tasks over and over, corporations didn’t really need to know what workers thought. They just needed workers to do what they were told. But that mass-production world, the story continues, no longer exists. The Industrial Age has given way to an Age of Information. In the old days, enterprises could prosper churning out the same product by the millions. Customers were expected to buy what manufacturers produced — and they usually did. “You can have any color you want,” as automaker Henry Ford once quipped, “so long as it’s black.” In the new Information Age, by con- trast, enterprises only do well when they customize products to what customers want. And who knows what customers want? The workers at the front lines, the employees who interact directly with consumers. These workers, through their contacts with customers, gain incredibly significant information. An effective enterprise values this information — and the employees who have it. The effective enterprise, adds the empowerment mantra, also values work- ers on the production line, because modern production operations must be constantly changing to keep up with evolving consumer preferences. Who bet- ter to help figure out how to change, how to produce products ever faster, smarter, and more efficiently, than the workers actually involved in the pro- ducing? For Information Age business success, in short, workers simply must be engaged and involved. In our modern world, command-and-control no longer makes any sense.2 Think of modern enterprise life, suggests British economist John Kay, as a basketball game. If a basketball game were entirely predictable, coaches could succeed merely by defining what they want each player to do at each exact moment. But no coach ever tries to script an entire game. No script, coaches understand, could ever anticipate “the almost infinite variety of situations that might arise.”3 Smart coaches prepare players — and expect players — to make their own decisions. Expectations like these, notes Edward Lawler, the director of the Center for Effective Organizations at the University of Southern California, go against the “old logic” grain of corporate America. In the old logic enterprise, management makes all the decisions. Management, the old logic assumes, creates most value. What Lawler calls the “new logic” enterprise subscribes to a quite different set of assumptions. Corporate success, the new logic enterprise understands, requires that all employees, not just managers, “must add significant value.”4 And just how can corporations maximize this added value? In the late twen- tieth century, experts rushed forward with guidance. Their strategies would go by a host of different labels. Participative management. Quality circles. Total quality management. Experts would talk endlessly about “reengineering” cor- THE INEFFECTIVE ENTERPRISE 161 porations to effect “high-performance organizations.” Employee involvement, the experts stressed over and over, gives corporations smart enough to try it the “ultimate competitive advantage.”5 This empowering ethos swept through corporate America in the 1980s and 1990s. Managers and their staffs sat together, in meeting after meeting, draft- ing, discussing, and debating “mission” and “values” statements. And journals, magazines, and newspapers noticed. They celebrated, year after year, the tri- umphs of enterprises that were said to have successfully empowered their employees. One typical triumph came at Ironite, an Arizona fertilizer company. An Ironite customer had asked for the company’s fertilizer in boxes instead of bags, a reasonable enough request. But Ironite didn’t have a boxing machine, and buying one would have cost the company far more than the firm could have comfortably afforded. No problem. Ironite’s employees simply built a box- maker themselves, at a tenth of the cost of buying one. That sort of employee creativity, Ironite’s chief executive pointed out proud- ly, does not just happen out of the blue. “You get this only if you involve and respect employees,” explained Ironite CEO Heinz Brungs. “You can’t order them to build a machine.”6 Every company, “effective enterprise” gurus insisted throughout the 1980s and 1990s, could become an Ironite. But few companies, researchers agreed by century’s end, had actually reached anything close to Ironite status. Study after study reached the same dispiriting conclusion. Enterprises, by and large, were not empowering workers.7 Just 10 percent of Fortune 1000 corporations, Edward Lawler would report in 1996, were managing “according to the new logic.”8 And only a small frac- tion of the companies that claimed to be empowering workers, a Journal of Business study would reveal two years later, were actually engaging in any seri- ous empowerment work.9 Another study, published in 2000 by Administrative Science Quarterly, found executives across the United States quick to proclaim their allegiance to the new logic, but slow to practice it. On empowerment, concluded Barry Staw and Lisa Epstein, the study’s authors, top executives are essentially going through the motions.10 But why? Why aren’t top executives giving empowerment strategies a real go?11 Empowering employees, the experts all agree, can enhance enterprise efficiency. Why aren’t executives making any real effort to see whether the experts are right? What CEOs, after all, wouldn’t want their enterprises to be more efficient? Strange. Something is stopping American business from creating the employee-empowering, customer-focused “new logic” enterprises that the Information Age so clearly demands. What is it? ALMOST ANYONE WHO HAS EVER WORKED in a large company would probably agree, in a heartbeat, that the obstacles to enterprise effectiveness can almost always be summed up in just one eleven-letter word. Bureaucracy. Average 162 Greed and Good employees experience frustrating doses of “bureaucracy” each and every day, in everything from turf wars between managers to the endless delays while ideas go up and down the decision-making ladder. Bureaucracies, sociologists tell us, grow naturally — and inevitably — in enterprises organized along hierarchical lines. In the classic corporate hierarchy, workers sit at the base of a steep pyramid. Above them rest layers upon layers of management. The more layers, the steeper the pyramid, the greater the dis- tance between actual workers and ultimate corporate decision-making author- ity. To succeed in the Information Age, analysts contended in the 1980s and 1990s, enterprises needed, above all else, to “flatten” these towering pyramids.12 Many top executives readily agreed, some intensely. “Rigid hierarchies,” exclaimed one such executive, J. Burgess Winter, the CEO of an empowerment-minded Tucson copper company, “are the corporate cholesterol of organizations.”13 Reformers
Recommended publications
  • Maximum Internet Security: a Hackers Guide - Networking - Intrusion Detection
    - Maximum Internet Security: A Hackers Guide - Networking - Intrusion Detection Exact Phrase All Words Search Tips Maximum Internet Security: A Hackers Guide Author: Publishing Sams Web Price: $49.99 US Publisher: Sams Featured Author ISBN: 1575212684 Benoît Marchal Publication Date: 6/25/97 Pages: 928 Benoît Marchal Table of Contents runs Pineapplesoft, a Save to MyInformIT consulting company that specializes in Internet applications — Now more than ever, it is imperative that users be able to protect their system particularly e-commerce, from hackers trashing their Web sites or stealing information. Written by a XML, and Java. In 1997, reformed hacker, this comprehensive resource identifies security holes in Ben co-founded the common computer and network systems, allowing system administrators to XML/EDI Group, a think discover faults inherent within their network- and work toward a solution to tank that promotes the use those problems. of XML in e-commerce applications. Table of Contents I Setting the Stage 1 -Why Did I Write This Book? 2 -How This Book Will Help You Featured Book 3 -Hackers and Crackers Sams Teach 4 -Just Who Can Be Hacked, Anyway? Yourself Shell II Understanding the Terrain Programming in 5 -Is Security a Futile Endeavor? 24 Hours 6 -A Brief Primer on TCP/IP 7 -Birth of a Network: The Internet Take control of your 8 -Internet Warfare systems by harnessing the power of the shell. III Tools 9 -Scanners 10 -Password Crackers 11 -Trojans 12 -Sniffers 13 -Techniques to Hide One's Identity 14 -Destructive Devices IV Platforms
    [Show full text]
  • 2015 Valuation Handbook – Guide to Cost of Capital and Data Published Therein in Connection with Their Internal Business Operations
    Market Results Through #DBDLADQ 2014 201 Valuation Handbook Guide to Cost of Capital Industry Risk Premia Company List Cover image: Duff & Phelps Cover design: Tim Harms Copyright © 2015 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748- 6008, or online at http://www.wiley.com/go/permissions. The forgoing does not preclude End-users from using the 2015 Valuation Handbook – Guide to Cost of Capital and data published therein in connection with their internal business operations. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose.
    [Show full text]
  • Cohen-Internet-History-2011.Pdf
    International Journal of Technoethics, 2(2), 45-64, April-June 2011 45 Internet History Raphael Cohen-Almagor, University of Hull, UK ABSTRACT This paper outlines and analyzes milestones in the history of the Internet. As technology advances, it presents new societal and ethical challenges. The early Internet was devised and implemented in American research units, universities, and telecommunication companies that had vision and interest in cutting-edge research. The Internet then entered into the commercial phase (1984-1989). It was facilitated by the upgrading of back- bone links, the writing of new software programs, and the growing number of interconnected international networks. The author examines the massive expansion of the Internet into a global network during the 1990s when business and personal computers with different operating systems joined the universal network. The instant and growing success of social networking-sites that enable Netusers to share information, photos, private journals, hobbies, and personal as well as commercial interests with networks of mutual friends and colleagues is discussed. Keywords: ARPANET, History, ICANN, Innovation, Internet, Open Architecture, Packet Switching, Social Networking INTRODUCTION the biological kingdom. The third was Sigmund Freud (1856–1939), who acknowledged that History consists of a series of accumulated the mind is also unconscious and subject to the imaginative inventions. defence mechanism of repression, thus we are – Voltaire far from being Cartesian minds entirely transpar- ent to ourselves. And now, in the information Floridi (2009, 2010) argues that we are now revolution, we are in the process of dislocation experiencing the fourth scientific revolu- and reassessment of humanity’s fundamental tion.
    [Show full text]
  • List of Section 13F Securities, Third Quarter 2001
    OFFICIAL LIST OF SECTION 13(F) SECURITIES USER INFORMATION SHEET General This list of "Section 13(f) securities" as defined by Rule 13f-I(c) [I7 CFR 240.13f-I (c)] is made available to the public pursuant to Section13 (f) (3) of the Securities Exchange Act of 1934 [I5 USC 78m(f) (3)]. It is made available for use in the preparation of reports filed with the Securities and Exhange Commission pursuant to Rule 13f-1 117 CFR 240.1 3f-I] under Section 13(f) of the Securities Exchange Act of 1934. An updated list is published on a quarterly basis. This list is current as of September, 15, 2001 ,and may be relied on by institutional investment managers filing Form 13F reports for the calendar quarter ending September 30, 2001 . Institutional investment managers should report holdings--number of shares and fair market value--as of the last day of the calendar quarter as required by [ Section 13(f)(l) and Rule 13f-I] thereunder. Features (1 ) Additions and Deletions: Revisions made to the list of Section 13(f) securities are indicated in a column titled "STATUS." The word "ADDED" in the status column opposite the name of a security indicates that the security has become a Section 13(f) security. The word "DELE-TED" in the status colurr~nopposite the name of a security indicates that the security ceases to be a 13(f) security since the date of the last list. (2) List of options: An asterisk is placed next to the name of any security having a listed option and each option is individually listed with its own CUSlP nurr~berimmediately below the name of the security having the option.
    [Show full text]
  • The Law of Electronic Commerce
    This page intentionally left blank The Law of Electronic Commerce Written specifically for legal practitioners and students, this book examines the concerns, laws and regulations involved in electronic commerce. In just a few years, commerce via the World Wide Web and other online platforms has boomed, and a new field of legal theory and practice has emerged. Legislation has been enacted to keep pace with commercial realities, cyber- criminals and unforeseen social consequences, but the ever-evolving nature of new technologies has challenged the capacity of the courts to respond effectively. This book addresses the legal issues relating to the introduction and adoption of various forms of electronic commerce. From intellectual property, to issues of security and privacy, Alan Davidson looks at the practical challenges for lawyers and commercial parties while providing a rationale for the underlying legal theory. Alan Davidson is Senior Lecturer in the School of Law, University of Queensland. He is also a solicitor and barrister of the Supreme Court of New South Wales and the High Court of Australia. The Law of Electronic Commerce Alan Davidson CAMBRIDGE UNIVERSITY PRESS Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, São Paulo, Delhi, Dubai, Tokyo Cambridge University Press The Edinburgh Building, Cambridge CB2 8RU, UK Published in the United States of America by Cambridge University Press, New York www.cambridge.org Information on this title: www.cambridge.org/9780521678650 © Alan Davidson 2009 This publication is in copyright. Subject to statutory exception and to the provision of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University Press.
    [Show full text]
  • The Economics of the Internet Backbone
    THE ECONOMICS OF THE INTERNET BACKBONE NICHOLAS ECONOMIDES New York University, New York Contents 1. Competition among Internet backbone service providers 1.1. Internet backbone services 1.2. Interconnection 1.3. The transit and peering payment methods for connectivity 1.4. Conduct of Internet backbone service providers 1.4.1. Pricing of transport services in the backbone networks 1.4.2. ISP multihoming; Additional demand responsiveness to price changes 2. Structural conditions for Internet backbone services; Negligible barrier to entry and expansion 2.1. The markets for raw transport capacity and other inputs to Internet transport services 2.2. Ease of expansion and entry 2.3. Public standards and protocols on the Internet 3. Potential for anticompetitive behavior on the Internet backbone 4. Network externalities and the Internet 4.1. Procompetitive consequences of network externalities 4.2. Conditions under which network externalities may inhibit competition ., 5. Network externalities and competition on the Internet I 5.1. Conditions necessary for the creation of bottlenecks fail on the Internet 5.2. Bottlenecks such as the ones of the local exchange telecommunications network do not exist on the Internet 6. Strategies that a large IBP might pursue 6.1. Raising the price of transport 6.2. Discriminatory price increases directed simultaneously against all backbone rivals 6.3. Raising rivals' costs and degrading connectivity 6.3.1. Terminating interconnection simultaneously with all rivals (refusal to deal) Handbook of TelecommunicationsEconomics, Volume 2, Edlted by S. Majumdar et a1 02005 Published by Elsevier B. V. 001: 10 1016/S1569-4054(05)02009-9 N. Economides 6.3.2.
    [Show full text]
  • Company Name Ticker Symbol Industry Name Adstar Inc ADST
    Company Name Ticker Symbol Industry Name SIC Code AdStar Inc ADST Advertising 7310 ActionView Int'l Inc AVEW Advertising 7310 Betawave Corporation BWAV Advertising 7310 V Media Corporation CMDI Advertising 7310 ChinaNet Online Holdings Inc CNET Advertising 7310 Dynamic Response Group Inc DRGZ Advertising 7310 Interep National Radio Sales I IREP Advertising 7310 MaxWorldwide Inc MAXW Advertising 7310 Vertical Branding Inc. VBDG Advertising 7310 Digital Generation Inc DGIT Advertising 7310 Clicker Inc CLKZ Advertising 7310 Int'l Commercial Television ICTL Advertising 7310 MSGI Security Solutions Inc MSGI Advertising 7310 mktg inc. CMKG Advertising 7310 Coupon Express Inc CPXP Advertising 7310 Klever Marketing Inc KLMK Advertising 7310 Tiger Media Inc. IDI Advertising 7310 VisionChina Media Inc VISN Advertising 7310 Onstream Media Corporation ONSM Advertising 7310 Monster Worldwide MWW Advertising 7310 Wilhelmina International Corp WHLM Advertising 7310 Marchex Inc. MCHX Advertising 7310 Clear Channel Outdoor Holding CCO Advertising 7310 Lamar Advertising LAMR Advertising 7310 Global Sources GSOL Advertising 7310 Interpublic Group IPG Advertising 7310 Valassis Communic. VCI Advertising 7310 Harte-Hanks HHS Advertising 7310 ValueClick Inc. VCLK Advertising 7310 National CineMedia NCMI Advertising 7310 WPP PLC ADR WPPGY Advertising 7310 Omnicom Group OMC Advertising 7310 American Ammunition Inc. AAMUQ Aerospace/Defense 3720 Air Lease Corp AL Aerospace/Defense 3720 Applied Science Products Inc APLD Aerospace/Defense 3720 Bulova Technologies Group Inc BLVT Aerospace/Defense 3720 Erickson Air-Crane Inc. EAC Aerospace/Defense 3720 E'Prime Aerospace Corporation EPEO Aerospace/Defense 3720 Environmental Tectonics Corp. ETCC Aerospace/Defense 3720 Huntington Ingalls HII Aerospace/Defense 3720 Oakridge Holdings Inc OKRG Aerospace/Defense 3720 OPT Sciences Corp OPST Aerospace/Defense 3720 Passur Aerospace Inc PSSR Aerospace/Defense 3720 American Defense Systems Inc.
    [Show full text]
  • 3Rd Quarter, 2000
    RUN DATE:10/06/00 ** LIST OF SECTION 13F SECURITIES ** PAGE 1 RUN TIME:14:34 IVMOOl CUSIP NO. ISSUER NAME ISSUER DESCRIPTION STATUS B49233 10 7 ICOS VISION SYS CORP N V ORD B5628B 10 4 * LERNOUT & HAUSPIE SPEECH PRODS COM B5628B 90 4 LERNOUT & HAUSPIE SPEECH PRODS CALL B5628B 95 4 LERNOUT & HAUSPIE SPEECH PRODS PUT D1497A 10 1 CELANESE AG ORD D1668R 12 3 * DAIMLERCHRYSLER AG ORD D1668R 90 3 DAIMLERCHRYSLER AG CALL D1668R 95 3 DAIMLERCHRYSLER AG PUT F9212D 14 2 TOTAL FINA ELF S A WT EXP 080503 G0070K 10 3 * ACE LTD ORD G0070K 90 3 ACE LTD CALL G0070K 95 3 ACE LTD PUT GO2602 10 3 * AMDOCS LTD ORD GO2602 90 3 AMDOCS LTD CALL GO2602 95 3 AMDOCS LTD PUT GO2995 10 1 AMERICAN SAFETY INS GROUP LTD ORD GO3910 10 9 * ANNUITY AND LIFE RE HLDGS ORD GO3910 90 9 ANNUITY AND LIFE RE HLDGS CALL GO3910 95 9 ANNUITY AND LIFE RE HLDGS PUT GO4074 10 3 APEX SILVER MINES LTD ORD GO4074 11 1 APEX SILVER MINES LTD WT EXP 110402 GO4397 10 8 * APW LTD COM ADDED GO4397 90 8 APW LTD CALL ADDED GO4397 95 8 APW LTD PUT ADDED GO4450 10 5 ARAMEX INTL LTD ORD GO5345 10 6 ASIA PACIFIC RES INTL HLDG LTD CL A G0535E 10 6 ASIA PACIFIC WIRE & CABLE CORP ORD GO5354 10 8 ASIACONTENT COM LTD CL A 620045 20 2 CENTRAL EUROPEAN MEDIA ENTRPRS CL A NEW G2107X 10 8 CHINA TIRE HLDGS LTD COM G2108N 10 9 * CHINADOTCOM CORP CL A G2108N 90 9 CHINADOTCOM CORP CALL G2108N 95 9 CHINADOTCOM CORP PUT 621082 10 5 CHINA YUCHAI INTL LTD COM 623257 10 1 COMMODORE HLDGS LTD ORD 623257 11 9 COMMODORE HLDGS LTD WT EXP 071501 623773 10 7 CONSOLIDATED WATER CO INC ORD G2422R 10 9 * CORECOMM LTD ORD G2422R 90 9 CORECOMM LTD CALL G2422R 95 9 CORECOMM LTD PUT G2519Y 10 8 CREDICORP LTD COM G2706W 10 5 DELPHI INTERNATIONAL LTD ORD 627545 10 5 DF CHINA TECHNOLOGY INC ORD G2759W 10 1 DIGITAL UNITED HOLDINGS LTD ORD ADDED 628471 10 3 DSG INTL LTD ORD 629526 10 3 EK CHOR CHINA MOTORCYCLE CO COM 629539 14 8 ELAN PLC R T 630177 10 2 * EL SIT10 INC ORD 630177 90 2 EL SIT10 INC CALL RUN DATE:10/06/00 ** LIST OF SECTION 13F SECURITIES ** PAGE 2 RUN TIME:14:34 IVMOOl CUSIP NO.
    [Show full text]
  • Software Equity Group Flash Report
    Software Equity Group Flash Report Select M&A Transactions and Valuations and Financial and Valuation Performance of 250+ Publicly Traded Software, SaaS and Internet Companies by Product Category LEADERS IN SOFTWARE M&A • Industry leading boutique investment bank, founded in 1992, representing public and private software and We Do Deals. internet companies seeking: • Strategic exit • Growth capital • Buyout • Inorganic growth via acquisition • Buy and sell-side mentoring • Fairness opinions and valuations • Sell-side client revenue range: $5 - 75 million • Buy-side clients include private equity firms and NASDAQ, NYSE and foreign exchange listed companies • Clients span virtually every software technology, product category, delivery model and vertical market • Global presence providing advice and guidance to more than 2,000 private and public companies throughout US, Canada, Europe, Asia-Pacific, Africa and Israel • Strong cross-functional team leveraging transaction, operating, legal and engineering experience • Unparalleled software industry reputation and track record. • Highly referenceable base of past clients Copyright © 2015 by Software Equity Group, L.L.C., All Rights Reserved EXTENSIVE GLOBAL REACH Current Sell‐side Representation • SEG currently represents software companies in the United States, Canada, France, Germany, Australia & Saudi Arabia Recent Sell‐side Representation • In addition to the countries listed above, SEG has recently represented software companies in the United Kingdom, France, Netherlands, Israel, and South Africa SEG Research Distribution • SEG’s Quarterly and Annual Software Industry Equity Reports and Monthly Flash Reports are distributed to an opt‐in list of 50,000 public software company CEOs, software entrepreneurs, private equity managing directors, VCs, high tech corporate lawyers, public accountants, etc.
    [Show full text]
  • Detecting and Measuring Financial Market Bubbles
    Detecting and Measuring Financial Market Bubbles By Fariba Rad A Thesis submitted to the Faculty of Graduate Studies of The University of Manitoba In partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Department of Agribusiness and Agricultural Economics University of Manitoba Winnipeg, Manitoba August 2018 ABSTRACT Reviewing the history of financial bubbles indicates that there is no unique definition of the financial bubbles. Given the importance of understanding financial bubbles, the focus of this research is to define and detect bubbles in financial markets. The identification of bubbles is conducted by using stock prices from the internet bubble in the late 1990‘s. This study defines a bubble based on if the current stock price increases by more than 100% and then decreases by at least 50%. Bubbles were found in 30 of the 40 internet companies studied. The first approach using mostly 10 and 40 day moving averages indicated that most bubbles occurred in less than 150 days from beginning to end. The second approach was to measure the size of the bubble and results showed that most of the bubbles were smaller in size. For the third approach, measuring asymmetry of bubbles, results showed that stocks fall faster than they rise. These insights may be valuable to assist investors and policymakers with their decision making. Keywords: financial bubbles, bubble size, asymmetry, bubble definition, internet bubble I ACKNOWLEDGEMENTS I would like to express my sincere gratitude and appreciation to my advisor, Dr. Milton Boyd ‎for his encouragement and support throughout my studies. ‎The advice and inspiration you provided for successful completion of my research was invaluable.
    [Show full text]
  • The Library of Congress Information Bulletin, 2001. INSTITUTION Library of Congress, Washington, DC
    DOCUMENT RESUME ED 464 636 IR 058 442 AUTHOR Lamolinara, Guy, Ed. TITLE The Library of Congress Information Bulletin, 2001. INSTITUTION Library of Congress, Washington, DC. ISSN ISSN-0041-7904 PUB DATE 2001-00-00 NOTE 423p. AVAILABLE FROM For full text: http://www.loc.gov/loc/lcib/. r)Tro w^-k. JOURNAL CIT Library of Congress Information Bulletin; v60 n1-12 2001 EDRS PRICE MF01/PC17 Plus Postage. DESCRIPTORS Electronic Libraries; *Exhibits; *Library Collections; *Library Services; *National Libraries; World Wide Web IDENTIFIERS *Library of Congress ABSTRACT These 12 issues, representing one calendar year (2001) of "The Library of Congress Information Bulletin," contain information on Library of Congress new collections and program developments, lectures and readings, financial support and materials donations, budget, honors and awards, World Wide Web sites and digital collections, new publications, exhibits, and preservation. Cover stories include:(1) "5 Million Items Online: National Digital Library Program Reaches Goal";(2) "Celebration and Growth: The Year in Review"; (3) "The World of Hannah Arendt: Selection of Papers of Political Philosopher Now Online"; (4) "'Born in Slavery': An Introduction to the WPA Slave Narratives"; (5) "Photographer to the Czar: The Startling Work of Sergei Prokudin-Gorskii"; (6) "World Treasures: Library Opens New Gallery of Global Collections"; (7) "National Book Festival: First Lady, Library To Host First-Ever Event"; (8) "Shadows, Dreams, Substance: 'The Floating World of Ukiyo-e' Exhibition Opens"; (9) "'The Joy of the Written Work': Library and First Lady Host First National Book Festival"; (10) "'Human Nature and the Power of Culture': Margaret Mead Exhibition Opens"; and (11)"Photos from the Clarence H.
    [Show full text]
  • Valor De Mercado Vs. Valor De Libros En Empresas De Internet
    VALOR DE MERCADO VS. VALOR DE LIBROS EN EMPRESAS DE INTERNET JUEVES 30 DE MARZO DE 2000 UNIVERSIDAD DEL CEMA JOSE PABLO DAPENA FERNANDEZ DATOS AL 03/23/00 (Muestra de 163 empresas) Earnings Revenues Current Mkt Cap ($MM) ($MM) ($MM) TOTAL (11,675.60) 31,410.97 964,291.35 Fuente: Yahoo Finance FULL VALUE DE LA EMPRESA = VALOR CORRIENTE DEL NEGOCIO + VALOR DE LAS OPCIONES DE CRECIMIENTO (Stewart Myers, Journal of Financial Economics, 1977) ➨OPCIONES REALES ESTAS OPCIONES SON DEFINIDAS COMO REALES (EN CONTRAPARTIDA CON LAS FINANCIERAS) LOS ACTIVOS QUE GENERAN ESTE TIPO DE OPCIONES PUEDEN SER CATEGORIZADOS COMO ESTRATÉGICOS (LA INVERSION SE REALIZA SI LAS CIRCUNSTANCIAS LO HACEN ÓPTIMO) ➨OPCIONES REALES ESTE COMPONENTE PUEDE APROXIMARSE (CON SALVEDADES) A TRAVES DE LA DIFERENCIA ENTRE EL VALOR DE MERCADO DE LOS ACTIVOS Y SU VALOR EN LIBROS. UTILIZAMOS COMO PROXY LA DIFERENCIA ENTRE VALOR DE MERCADO DEL EQUITY Y VALOR EN LIBROS. Company Company Company Company America Online Allaire Onemain Net2Phone Yahoo! Prodigy Talk City Open Market CMG Nextcard ftd.com Viant Amazon.com Intraware Autoweb ZDNet VeriSign barnesandnoble.com Value America Ask Jeeves eBay Verity Rocky Mountain Internet Concentric Network Exodus Stamps.com iTurf Interliant Ariba 24/7 Media Alloy Online eToys InfoSpace.com El Sitio Autobytel MP3.com BroadVision WebTrends Peapod TheStreet.com RealNetworks MyPoints.com Cyberian Outpost Voyager.net Excite@Home About.com*** CyberCash EarthWeb Check Point Software Net Perceptions theglobe.com uBid Inktomi DLJdirect Beyond.com Rowecom Vignette High Speed Acces Online Resources & Communications Secure Computing EarthLink Network Wit Capital Primix *** Launch Media Portal Software drugstore.com JFAX.COM NetSpeak Intuit SportsLine musicmaker.com CDNow Commerce One Juno Online Streamline.com Charles Schwab Co.
    [Show full text]