Spring. Instructor Office Phone CBA (512) class.) Office Hours Web. Required. Reading. short. rendering. first.
|
|
|
- Loreen Chandler
- 10 years ago
- Views:
Transcription
1 TECHNOLOGY STRATEGY Spring 2014 Instructor Office Phone Office Hours Web Dr. Polidoro CBA (512) Wednesdays 2:00-3:00 pm or by appointment (Office hours may vary periodically. Check announcements in class.) Required Reading Course packet at UT Copy Center. (Note: It is a violation of the honor system to duplicate course packets.) Course Overview Technologies have long been recognized as vital drivers of economic growth and wealth creation, as well as potential sources of competitive advantage. Technologies also create the impetus for organizational change and renewal, as firms attempt to seize technological opportunities to attain competitive advantage in the marketplace. However, several characteristics of technology-intensive industries compound the challenge of firm strategy. These characteristics refer, for example, to high levels of R& &D investments, significant uncertainty surrounding technological innovations, highly skewed distribution of returns from R&D investments, and interdependencies across the innovation ecosystem. Moreover, technology- short based firms typicallyy accumulate R&D investments during long gestation periods and face time windows to recoup those investments before new technologies emerge, sometimes rendering pre-existing technologies obsolete. Examining how these issues that often arise in technology-intensivee settings affect competitive strategies constitutes this course s agenda. The course is organized around four modules, each off which focuses on different aspects of strategy in technology-intensive industries. The first module explores technology-driven markets with the goal of understanding how technologies evolvee and what challenges they pose for firms competing in such markets. The second module examines how firms create value, placing the discussion against the backdrop of the broader technological context that we explore in the first module. This module comprisess topics such as allocation of inventive effort, organization of R&D activities, and knowledge-sourcing strategies. In module threee we turn to the challenges of capturing value from technology investments. These challenges relate to the protection of intellectual property, competition with similar technologies and potential substitutes, network externalities, and standard-driven competition. Finally, students will have the opportunity to integrate their learning and apply the course content to examination of the technology strategy of a real organization. Students will work in groups to conduct an in-depth analysis of an industry that is experiencing impactful technologicall change, ass well as of the technology strategy of a particularr firm in that industry. The final product will be a report that comprises not only the aforementioned in-depth analysis but also realistic strategic recommendations for the top executives of your targeted company. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 1
2 The perspective adopted in this course is that of a general manager concerned with firm strategy. Many managers have viewed technological innovations from a functional perspective and approached them as an engineering issue, a marketing problem, or a challenge for the design of rewarding systems and organizational structures. This course, in contrast, approaches technology from a big-picture viewpoint with an emphasis on how technological innovations can affect the logic of value creation and value capture in the industry and the corresponding implications for firm strategy. This course is designed to increase your effectiveness and skills in analyzing, understanding, and crafting firm strategy in technology-intensive contexts. The goal of the course is not to develop a deep understanding of technology itself it does not assume that students have a technological background, nor does it assume that students have worked in technology-based companies. The content of this course and the analytical approach it adopts, besides preparing students who expect to work in technology-intensive industries, are also suited for those interested in consulting, financial services, and venture capital industry, as well as those students whose primary goal is to take an advanced strategy course. Students seeking to develop a career in consulting can enhance their abilities to analyze competitive landscapes marked by inordinately high levels of uncertainty and interdependencies. Students seeking a career in financial services can become better equipped to evaluate the strategy of firms in industries in which technology plays a significant role. Students heading to the venture capital industry can also benefit from understanding technology strategy, since much of venture capital investments are concentrated in technology-intensive industries. More broadly, this course provides students with the opportunity to refine their skills in analyzing competitive strategies in complex business environments. Course Objectives 1. Develop an appreciation for the role of technological innovations in fueling economic growth and economic change, as well as a rich understanding of the implications they carry for firm strategy. 2. Develop an understanding of fundamental concepts and frameworks relevant to technology strategy, such as discontinuous changes, internal and external knowledge-sourcing strategies, interdependencies across innovation ecosystems, open innovations, intellectual property strategies, and standard-driven competition. 3. Sharpen skills for rigorous analytical thinking and effective communication by applying this conceptual understanding to examine the competitive strategies of real-world technologybased companies. 4. Amplify the analytical apparatus for addressing strategic issues that arise in inordinately complex environments characterized by high levels of technological uncertainty, network externalities, and interdependencies involving outside parties such as universities, regulators, investors, and financial analysts. 5. Gain familiarity with some of the practical realities faced by firms competing in a vast array of innovation-driven industries, such as biofuels, biotechnology, digital photography, e- books, flat panels, infrastructure, mobile devices, microprocessors, music, pharmaceuticals, video-games, and wind energy. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 2
3 Instructional Method The instructional method in this course is based on the premise that students can learn more effectively through the combination of conceptual rigor with practical applications. To ensure students exposure to rigorous conceptual content, classes will be infused with key insights from current research on technology strategy, including the instructor s own published and on-going research on the competitive strategies of technology-based companies. Rigorous academic content provides students with the opportunity to refine their critical reasoning and analytical skills that are essential to their understanding of firm strategy in inordinately complex environments. Moreover, this conceptual focus enhances the generalizability of the knowledge that students develop in this course it helps students acquire fundamental skills that they can later apply to a broad range of industries and specific business situations. To capture the pragmatic, action-oriented, and complex nature of technology strategy, this course places great emphasis on in-depth case analysis and discussion. This case-based approach provides an extensive opportunity to integrate abstract concepts and frameworks and apply them in a practical business strategy context. Moreover, case studies stimulate immersion in the specific realities faced by technology-based firms competing in a variety of industries. By grappling with issues similar to those faced by the general managers of real-world organizations, students can establish linkages between conceptual knowledge and normative knowledge, thus refining their abilities to provide strategic recommendations that are informed by sound reasoning and, whenever possible, supported by empirical evidence. In addition, a field project conducted during the semester enables students to apply course content to examine the technology strategies of real organizations and to devise realistic strategic recommendations. In essence, students will work in groups to analyze how technology is expected to transform the logic of value creation and value capture in an industry of their choice. Next, informed by such industry-level analysis, students will examine the strategic implications from the viewpoint of a particular firm and propose a few realistic strategic recommendations. The instructional method outlined here implies that the evaluation of a student s performance in this class will largely rely on her/his contributions to class discussions and to their field project. Course Requirements and Evaluation Class contributions 30% Case write-ups 20% Field project 50% Presentation (20%) Final Report (30%) TOTAL 100% Individual final grades will result from a student s performance in each of the activities and assignments listed above. The purpose of grading in this course, as in all courses, is twofold. The first one is to evaluate your performance for purposes of the academic system. The other one is to provide you with feedback on your ability to develop, utilize, and share your ideas and conclusions concerning the topics and situations covered in the course. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 3
4 Class Contributions Attendance As discussed earlier, the instructional method in this course emphasizes in-depth case analysis and, accordingly, an important part of learning takes place in the classroom. Moreover, this is not an easy course, since it provides an in-depth introduction to an extraordinarily complex subject. Accordingly, cutting classes will adversely affect your own learning, your classmates experience in the class, and your grade. If for some unavoidable reason you must miss a class, it is your responsibility to find out from your classmates what materials we covered in class, what assignments were made, and what handouts you missed. Preparation At the end of the syllabus you find a detailed session plan indicating the learning objectives, topics, and materials that we will cover in each session. When designing this syllabus, I tried to reduce the reading load as far as possible without compromising the course content and your learning experience. Of course, if you become interested in a topic, I would be delighted to suggest further readings. For the learning process to be effective, it is absolutely necessary that you carefully prepare the cases and readings before class and actively participate in discussions during class. Preparation involves reading all the materials assigned for a particular session, as well as a thorough analysis of the case and developing a personal position on the case s issues. Unless you think about these issues and adopt a personal position when preparing for class, it will be very hard to contribute to class discussions and learn from your peers' contributions. At the start of a typical session, I will ask a couple of students to review their key learning points from the previous session, or to share with their classmates how the content covered in the previous class informs their perspectives on some contemporaneous management issues faced by real organizations. When addressing a case in class, I will ask a few students to open the discussion by answering a specific question or discussing a specific issue. The aforementioned preparation should be sufficient for such a leadoff role. Toward the end of a typical class, I will ask a few students to close the session by summarizing the key takeaways that should be derived from that session s readings, cases, and in-class discussion. After the selected students report their conclusions, other students may then comment and modify or extend the list of learning points. Evaluation of class contributions Effective class contributions refer to both the content of your comments and the process of class participation. When assessing your class contributions, I will ask myself the following questions, which capture some of the behaviors that lead to effective class contributions: a) Is this person an excellent listener? b) Are the points made relevant to the discussion and linked to the comments of others? c) Are the comments informed by concepts we covered in class and in the readings? Although you may not agree with all the concepts introduced in a particular reading, you should be able to substantiate your position with an informed, evidence-driven perspective. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 4
5 d) Do the comments convey analysis and insight, or are they, instead, simple recitations of case facts or cursory speculations? e) Do the comments add to our understanding by clarifying and highlighting the important aspects of earlier remarks? f) Does the participant distinguish among different kinds of data facts, opinions, personal convictions, theoretical concepts, etc.? g) Is this person willing to test new ideas or are all comments safe? h) Does this person raise great questions that appropriately expand the scope of our conversation, spur a meaningful debate, or help us cut to the heart of the matter? Case Write-ups During the course, you will work in groups (the same groups for the field project further detailed in the section below) and submit two write-ups articulating the key points in the analysis of two cases one related to value creation (Sessions 5-12), another related to value capture (Sessions 16-25). Each group should decide which cases to analyze. The write-ups are due at the start of the session in which the respective case is discussed in class. In other words, the first write-up is due at no later than Session 12, and the second write-up no later than Session 25. Further information about the content of the write-ups will be discussed in class during our first session. Each write-up (one per group) should not exceed 2double-space typewritten pages, using 1-inch margins all around and a 12-point font. I will read only the first 2 pages, so please stay within this page limit. You may include up to 3 additional pages with supporting exhibits containing charts, tables, or figures that you consider pertinent to the analysis. Make sure that each additional page contains only one exhibit, which should be explicitly referenced and explained in the main text. Field Project During the semester, students will work on a field project, which will help them consolidate their learning and apply the course content to examination of the technology strategy of a real organization. In a self-selected group of 5 or 6 students (see Group composition below), students will conduct an in-depth analysis of an industry that is experiencing impactful technological change, as well as of the technology strategy of a particular firm in that industry. The final product will be a report that comprises not only the aforementioned in-depth analysis but also realistic strategic recommendations for the top executives of your targeted company. The field project is broken down into several sequential parts. The rationale behind this design is twofold. First, decomposition of the project into interrelated parts should facilitate your progressive accumulation of knowledge about what constitutes an inherently complex issue, as well as encourage you to distribute your effort during the course of the semester. Second, by working in sequential segments and submitting intermediate reports, you will have the opportunity to receive feedback you can build upon to revise your analysis and tighten the logic underlying your arguments before you turn in the final report, which is the only report of the field project that will be graded. The assignment for each segment and the respective due date are listed below. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 5
6 Group composition (due Session 5, January 29) Segment 1 (due Session 9, February 12) Segment 2 (due Session 22, April 7) Identify the group members, the technology industry, and the targeted company for your report. Characterization of the technological environment. Identify the technology that underlies your industry. Discuss how that technology has evolved, highlighting any discontinuities that have recently emerged or that you expect to occur. Provide a brief discussion of your preliminary thoughts on how these recent (or expected) technological changes affect competition in the industry, and the ways in which firms create and capture value. This report should be 6-8 pages long (not counting exhibits), double spaced, 12 point font, 1-inch margins). Creating value and capturing value. Having developed a rich understanding of the technological environment, as well as some preliminary ideas about the strategic implications associated with a recent or expected technological change, you should now provide an in-depth analysis of the challenges that firms competing in the industry face in creating and capturing value. Your analysis should be informed by the key questions discussed in class. For instance, are firms expected to develop new knowledge or can they still build on their pre-existing knowledge? What are the implications in terms of knowledge sourcing strategies? Has there been a shift in what constitute the relevant value capture mechanisms? Which players in the innovation ecosystem are more likely to benefit from the technological change? Complement your report with your preliminary ideas about the strategic implications from the viewpoint of the focal firm. For instance, you should discuss whether it is particularly wellpositioned to seize the opportunities, whether it is particularly vulnerable to the emerging challenges, and the extent to which the unfolding technological change affects or disrupts the ways in which that firm creates innovations and captures the corresponding value. Conclude this report with a brief outline of your recommendations for the technology strategy of the targeted company. This report should be 6-8 pages long (not counting exhibits), double spaced, 12 point font, 1-inch margins). Presentations (Sessions 26 and 27, April 21 and 23) Groups will have the opportunity to present their projects to the class during sessions 26 and 27. The presenting groups will have a chance to share their key insights and to receive additional feedback they can build on to refine their final reports. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 6
7 Segment 3 (due Session 29, April 30) Final report. Equipped with a rich characterization of the technological environment and with an in-depth understanding of how technologies affect value creation and value capture in the industry, you should evaluate the current technology strategy of the targeted company and provide strategic recommendations. To frame the report, imagine that your team is responsible for charting the technology strategy of the company and that this report is intended to prepare the board to discuss this issue. Use the first two segments (and feedback) to discuss the technology-level and industry-level issues. Then, analyze in detail the strategic implications from the viewpoint of the targeted company, highlighting the key challenges it faces in terms of value creation and value capture. Critically evaluate the current technology strategy of the targeted company and devise two or three distinct realistic recommendations. The complete final report should have between 18 and 24 pages (double spaced, 12 point font, 1-inch margins) plus exhibits. McCombs Classroom Professionalism Policy The highest professional standards are expected of all members of the McCombs community. The collective class reputation and the value of the Texas MBA experience hinges on this. You should treat the Texas MBA classroom as you would a corporate boardroom. Faculty are expected to be professional and prepared to deliver value for each and every class session. Students are expected to be professional in all respects. The Texas MBA classroom experience is enhanced when: Students arrive on time. On time arrival ensures that classes are able to start and finish at the scheduled time. On time arrival shows respect for both fellow students and faculty and it enhances learning by reducing avoidable distractions. Students display their name cards. This permits fellow students and faculty to learn names, enhancing opportunities for community building and evaluation of in-class contributions. Students do not confuse the classroom for the cafeteria. The classroom (boardroom) is not the place to eat your breakfast tacos, wraps, sweet potato fries, or otherwise set up for a picnic. Please plan accordingly. Recognizing that back-to-back classes sometimes take place over the lunch hour, energy bars and similar snacks are permitted. Please be respectful of your fellow students and faculty in your choices. Students minimize unscheduled personal breaks. The learning environment improves when disruptions are limited. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 7
8 Students are fully prepared for each class. Much of the learning in the Texas MBA program takes place during classroom discussions. When students are not prepared they cannot contribute to the overall learning process. This affects not only the individual, but their peers who count on them, as well. Students attend the class section to which they are registered. Learning is enhanced when class sizes are optimized. Limits are set to ensure a quality experience. When section hopping takes place some classes become too large and it becomes difficult to contribute. When they are too small, the breadth of experience and opinion suffers. Students respect the views and opinions of their colleagues. Disagreement and debate are encouraged. Intolerance for the views of others is unacceptable. Laptops are closed and put away. When students are surfing the web, responding to , instant messaging each other, and otherwise not devoting their full attention to the topic at hand they are doing themselves and their peers a major disservice. Those around them face additional distraction. Fellow students cannot benefit from the insights of the students who are not engaged. Faculty office hours are spent going over class material with students who chose not to pay attention, rather than truly adding value by helping students who want a better understanding of the material or want to explore the issues in more depth. Students with real needs may not be able to obtain adequate help if faculty time is spent repeating what was said in class. There are often cases where learning is enhanced by the use of laptops in class. Faculty will let you know when it is appropriate to use them. In such cases, professional behavior is exhibited when misuse does not take place. Phones and wireless devices are turned off. We ve all heard the annoying ringing in the middle of a meeting. Not only is it not professional, it cuts off the flow of discussion when the search for the offender begins. When a true need to communicate with someone outside of class exists (e.g., for some medical need) please inform the professor prior to class. Remember, you are competing for the best faculty McCombs has to offer. Your professionalism and activity in class contributes to your success in attracting the best faculty to this program. Academic Dishonesty I have no tolerance for acts of academic dishonesty. Such acts damage the reputation of the school and the degree and demean the honest efforts of the majority of students. The minimum penalty for an act of academic dishonesty will be a zero for that assignment or exam. The responsibilities for both students and faculty with regard to the Honor System are described in the Appendixs. As the instructor for this course, I agree to observe all the faculty responsibilities described therein. As a Texas MBA student, you agree to observe all of the student responsibilities of the Honor Code. If the application of the Honor System to this class and its assignments is unclear in any way, it is your responsibility to ask me for clarification. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 8
9 Students with Disabilities Upon request, the University of Texas at Austin provides appropriate academic accommodations for qualified students with disabilities. Services for Students with Disabilities (SSD) is housed in the Office of the Dean of Students, located on the fourth floor of the Student Services Building. Information on how to register, downloadable forms, including guidelines for documentation, accommodation request letters, and releases of information are available online at Please do not hesitate to contact SSD at (512) , VP: (512) or via if you have any questions. Religious holy days By UT Austin policy, you must notify me of your pending absence at least fourteen days prior to the date of observance of a religious holy day. If you must miss a class, an examination, a work assignment, or a project in order to observe a religious holy day, you will be given an opportunity to complete the missed work within a reasonable time after the absence. Campus Safety Please note the following recommendations regarding emergency evacuation from the Office of Campus Safety and Security, , Occupants of buildings on The University of Texas at Austin campus are required to evacuate buildings when a fire alarm is activated. Alarm activation or announcement requires exiting and assembling outside. Familiarize yourself with all exit doors of each classroom and building you may occupy. Remember that the nearest exit door may not be the one you used when entering the building. Students requiring assistance in evacuation should inform the instructor in writing during the first week of class. In the event of an evacuation, follow the instruction of faculty or class instructors. Do not re-enter a building unless given instructions by the following: Austin Fire Department, The University of Texas at Austin Police Department, or Fire Prevention Services office. Behavior Concerns Advice Line (BCAL): Further information regarding emergency evacuation routes and emergency procedures can be found at: Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 9
10 Other Administrative Details 1. As the course progresses, I will post information on the blackboard system. So please check the website regularly. 2. I urge you to take notes during class. As I mentioned earlier, one of the main purposes of the course is to help you develop your own personal approach for identifying and addressing key strategic challenges. I will not post slides summarizing cases. After each class I will post slides used in that class to detail assignments or communicate administrative issues. 3. Password-protected class sites will be available for all accredited courses taught at The University. Syllabi, handouts, assignments and other resources are types of information that may be available within these sites. Site activities could include exchanging , engaging in class discussions and chats, and exchanging files. In addition, class rosters will be a component of the sites. Students who do not want their names included in these electronic class rosters must restrict their directory information in the Office of the Registrar, Main Building, Room 1. For information on restricting directory information see: 4. I frequently call on individuals whose hands are not raised to participate in class discussions. The goal is both to engage everyone in the discussion and to provide a basis for your class contribution grade. 5. To help me learn your names and assign your class contribution grades, I will circulate a seating chart by the start of our second session. Please take the same seat each class. An expanded version of this syllabus including a detailed session plan will be available to students registered for MAN385 Dr. Polidoro Spring Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 10
11 APPENDIX Honor Code Purpose Academic honor, trust and integrity are fundamental to The University of Texas at Austin McCombs School of Business community. They contribute directly to the quality of your education and reach far beyond the campus to your overall standing within the business community. The University of Texas at Austin McCombs School of Business Honor System promotes academic honor, trust and integrity throughout the Graduate School of Business. The Honor System relies upon The University of Texas Student Standards of Conduct (Chapter 11 of the Institutional Rules on Student Service and Activities) for enforcement, but promotes ideals that are higher than merely enforceable standards. Every student is responsible for understanding and abiding by the provisions of the Honor System and the University of Texas Student Standards of Conduct. The University expects all students to obey the law, show respect for other members of the university community, perform contractual obligations, maintain absolute integrity and the highest standard of individual honor in scholastic work, and observe the highest standards of conduct. Ignorance of the Honor System or The University of Texas Student Standards of Conduct is not an acceptable excuse for violations under any circumstances. The effectiveness of the Honor System results solely from the wholehearted and uncompromising support of each member of the McCombs School of Business community. Each member must abide by the Honor System and must be intolerant of any violations. The system is only as effective as you make it. Faculty Involvement in the Honor System The University of Texas at Austin McCombs School of Business Faculty's commitment to the Honor System is critical to its success. It is imperative that faculty make their expectations clear to all students. They must also respond to accusations of cheating or other misconduct by students in a timely, discrete and fair manner. We urge faculty members to promote awareness of the importance of integrity through in-class discussions and assignments throughout the semester. Expectations Under the Honor System Standards. If a student is uncertain about the standards of conduct in a particular setting, he or she should ask the relevant faculty member for clarification to ensure his or her conduct falls within the expected scope of honor, trust and integrity as promoted by the Honor System. This applies to all tests, papers and group and individual work. Questions about appropriate behavior during the job search should be addressed to a professional member of the Career Management Office. Below are some of the specific examples of violations of the Honor System. Lying. Lying is any deliberate attempt to deceive another by stating an untruth, or by any direct form of communication to include the telling of a partial truth. Lying includes the use or omission of any information with the intent to deceive or mislead. Examples of lying include, but are not limited to, providing a false excuse for why a test was missed or presenting false information to a recruiter. Stealing. Stealing is wrongfully taking, obtaining, withholding, defacing or destroying any person's money, personal property, article or service, under any circumstances. Examples of stealing include, but are not limited to, removing course material from the library or hiding it from others, removing material from another person's mail folder, securing for one's self unattended items such as calculators, books, book bags or other personal property. Another form of stealing is the duplication of copyrighted material beyond the reasonable bounds of "fair use." Defacing (e.g., "marking up" or highlighting) library books is also considered stealing, because, through a willful act, the value of another's property is decreased. (See the appendix for a detailed explanation of "fair use.") Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 11
12 Cheating. Cheating is wrongfully and unfairly acting out of self-interest for personal gain by seeking or accepting an unauthorized advantage over one's peers. Examples include, but are not limited to, obtaining questions or answers to tests or quizzes, and getting assistance on case write-ups or other projects beyond what is authorized by the assigning instructor. It is also cheating to accept the benefit(s) of another person's theft(s) even if not actively sought. For instance, if one continues to be attentive to an overhead conversation about a test or case write-up even if initial exposure to such information was accidental and beyond the control of the student in question, one is also cheating. If a student overhears a conversation or any information that any faculty member might reasonably wish to withhold from the student, the student should inform the faculty member(s) of the information and circumstance under which it was overheard. Actions Required for Responding to Suspected and Known Violations As stated, everyone must abide by the Honor System and be intolerant of violations. If you suspect a violation has occurred, you should first speak to the suspected violator in an attempt to determine if an infraction has taken place. If, after doing so, you still believe that a violation has occurred, you must tell the suspected violator that he or she must report himself or herself to the course professor or Associate Dean of the McCombs School of Business. If the individual fails to report himself or herself within 48 hours, it then becomes your obligation to report the infraction to the course professor or the Associate Dean of the McCombs School of Business. Remember that although you are not required by regulation to take any action, our Honor System is only as effective as you make it. If you remain silent when you suspect or know of a violation, you are approving of such dishonorable conduct as the community standard. You are thereby precipitating a repetition of such violations. The Honor Pledge The University of Texas at Austin McCombs School of Business requires each enrolled student to adopt the Honor System. The Honor Pledge best describes the conduct promoted by the Honor System. It is as follows: "I affirm that I belong to the honorable community of The University of Texas at Austin Graduate School of Business. I will not lie, cheat or steal, nor will I tolerate those who do." "I pledge my full support to the Honor System. I agree to be bound at all times by the Honor System and understand that any violation may result in my dismissal from the McCombs School of Business." Excerpts from the University of Texas at Austin Office of the Dean of Students website ( The Standard of Academic Integrity A fundamental principle for any educational institution, academic integrity is highly valued and seriously regarded at The University of Texas at Austin, as emphasized in the standards of conduct. More specifically, you and other students are expected to "maintain absolute integrity and a high standard of individual honor in scholastic work" undertaken at the University (Sec , Institutional Rules on Student Services and Activities). This is a very basic expectation that is further reinforced by the University's Honor Code. At a minimum, you should complete any assignments, exams, and other scholastic endeavors with the utmost honesty, which requires you to: acknowledge the contributions of other sources to your scholastic efforts; complete your assignments independently unless expressly authorized to seek or obtain assistance in preparing them; follow instructions for assignments and exams, and observe the standards of your academic discipline; and avoid engaging in any form of academic dishonesty on behalf of yourself or another student. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 12
13 For the official policies on academic integrity and scholastic dishonesty, please refer to Chapter 11 of the Institutional Rules on Student Services and Activities. What is Scholastic Dishonesty? In promoting a high standard of academic integrity, the University broadly defines scholastic dishonesty basically, all conduct that violates this standard, including any act designed to give an unfair or undeserved academic advantage, such as: Cheating Plagiarism Unauthorized Collaboration Collusion Falsifying Academic Records Misrepresenting Facts (e.g., providing false information to postpone an exam, obtain an extended deadline for an assignment, or even gain an unearned financial benefit) Any other acts (or attempted acts) that violate the basic standard of academic integrity (e.g., multiple submissions submitting essentially the same written assignment for two courses without authorization to do so) Several types of scholastic dishonesty unauthorized collaboration, plagiarism, and multiple submissions are discussed in more detail on this Web site to correct common misperceptions about these particular offenses and suggest ways to avoid committing them. For the University's official definition of scholastic dishonesty, see Section , Institutional Rules on Student Services and Activities. Unauthorized Collaboration If you work with another person on an assignment for credit without the instructor's permission to do so, you are engaging in unauthorized collaboration. This common form of academic dishonesty can occur with all types of scholastic work papers, homework, tests (take-home or in-class), lab reports, computer programming projects, or any other assignments to be submitted for credit. For the University's official definitions of unauthorized collaboration and the related offense of collusion, see Sections (c)(6) & (e), Institutional Rules on Student Services and Activities. Some students mistakenly assume that they can work together on an assignment as long as the instructor has not expressly prohibited collaborative efforts. Actually, students are expected to complete assignments independently unless the course instructor indicates otherwise. So working together on assignments is not permitted unless the instructor specifically approves of any such collaboration. Unfortunately, students who engage in unauthorized collaboration tend to justify doing so through various rationalizations. For example, some argue that they contributed to the work, and others maintain that working together on an assignment "helped them learn better." The instructor not the student determines the purpose of a particular assignment and the acceptable method for completing it. Unless working together on an assignment has been specifically authorized, always assume it is not allowed. Many educators do value group assignments and other collaborative efforts, recognizing their potential for developing and enhancing specific learning skills. And course requirements in some classes do consist primarily of group assignments. But the expectation of individual work is the prevailing norm in many classes, consistent with the presumption of original work that remains a fundamental tenet of scholarship in the American educational system. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 13
14 Some students incorrectly assume that the degree of any permissible collaboration is basically the same for all classes. The extent of any permissible collaboration can vary widely from one class to the next, even from one project to the next within the same class. Be sure to distinguish between collaboration that is authorized for a particular assignment and unauthorized collaboration that is undertaken for the sake of expedience or convenience to benefit you and/or another student. By failing to make this key distinction, you are much more likely to engage in unauthorized collaboration. To avoid any such outcome, always seek clarification from the instructor. Unauthorized collaboration can also occur in conjunction with group projects. How so? If the degree or type of collaboration exceeds the parameters expressly approved by the instructor. An instructor may allow (or even expect) students to work together on one stage of a group project but require independent work on other phases. Any such distinctions should be strictly observed. Providing another student unauthorized assistance on an assignment is also a violation, even without the prospect of benefiting yourself. If an instructor did not authorize students to work together on a particular assignment and you help a student complete that assignment, you are providing unauthorized assistance and, in effect, facilitating an act of academic dishonesty. Equally important, you can be held accountable for doing so. For similar reasons, you should not allow another student access to your drafted or completed assignments unless the instructor has permitted those materials to be shared in that manner. Plagiarism Plagiarism is another serious violation of academic integrity. In simplest terms, this occurs if you represent as your own work any material that was obtained from another source, regardless how or where you acquired it. Plagiarism can occur with all types of media scholarly or non-academic, published or unpublished written publications, Internet sources, oral presentations, illustrations, computer code, scientific data or analyses, music, art, and other forms of expression. (See Section (d) of the Institutional Rules on Student Services and Activities for the University's official definition of plagiarism.) Borrowed material from written works can include entire papers, one or more paragraphs, single phrases, or any other excerpts from a variety of sources such as books, journal articles, magazines, downloaded Internet documents, purchased papers from commercial writing services, papers obtained from other students (including homework assignments), etc. As a general rule, the use of any borrowed material results in plagiarism if the original source is not properly acknowledged. So you can be held accountable for plagiarizing material in either a final submission of an assignment or a draft that is being submitted to an instructor for review, comments, and/or approval. Using verbatim material (e.g., exact words) without proper attribution (or credit) constitutes the most blatant form of plagiarism. However, other types of material can be plagiarized as well, such as ideas drawn from an original source or even its structure (e.g., sentence construction or line of argument). Improper or insufficient paraphrasing often accounts for this type of plagiarism. (See additional information on paraphrasing.) Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 14
15 Plagiarism can be committed intentionally or unintentionally. Strictly speaking, any use of material from another source without proper attribution constitutes plagiarism, regardless why that occurred, and any such conduct violates accepted standards of academic integrity. Some students deliberately plagiarize, often rationalizing this misconduct with a variety of excuses: falling behind and succumbing to the pressures of meeting deadlines; feeling overworked and wishing to reduce their workloads; compensating for actual (or perceived) academic or language deficiencies; and/or justifying plagiarism on other grounds. But some students commit plagiarism without intending to do so, often stumbling into negligent plagiarism as a result of sloppy note-taking, insufficient paraphrasing, and/or ineffective proofreading. Those problems, however, neither justify nor excuse this breach of academic standards. By misunderstanding the meaning of plagiarism and/or failing to cite sources accurately, you are much more likely to commit this violation. Avoiding that outcome requires, at a minimum, a clear understanding of plagiarism and the appropriate techniques for scholarly attribution. (See related information on paraphrasing; notetaking and proofreading; and acknowledging and citing sources.) By merely changing a few words or rearranging several words or sentences, you are not paraphrasing. Making minor revisions to borrowed text amounts to plagiarism. Even if properly cited, a "paraphrase" that is too similar to the original source's wording and/or structure is, in fact, plagiarized. (See additional information on paraphrasing.) Remember, your instructors should be able to clearly identify which materials (e.g., words and ideas) are your own and which originated with other sources. That cannot be accomplished without proper attribution. You must give credit where it is due, acknowledging the sources of any borrowed passages, ideas, or other types of materials, and enclosing any verbatim excerpts with quotation marks (using block indentation for longer passages). Plagiarism & Unauthorized Collaboration Plagiarism and unauthorized collaboration are often committed jointly. By submitting as your own work any unattributed material that you obtained from other sources (including the contributions of another student who assisted you in preparing a homework assignment), you have committed plagiarism. And if the instructor did not authorize students to work together on the assignment, you have also engaged in unauthorized collaboration. Both violations contribute to the same fundamental deception representing material obtained from another source as your own work. Group efforts that extend beyond the limits approved by an instructor frequently involve plagiarism in addition to unauthorized collaboration. For example, an instructor may allow students to work together while researching a subject, but require each student to write a separate report. If the students collaborate while writing their reports and then submit the products of those joint efforts as individual works, they are guilty of unauthorized collaboration as well as plagiarism. In other words, the students collaborated on the written assignment without authorization to do so, and also failed to acknowledge the other students' contributions to their own individual reports. Multiple Submissions Submitting the same paper (or other type of assignment) for two courses without prior approval represents another form of academic dishonesty. You may not submit a substantially similar paper or project for credit in two (or more) courses unless expressly authorized to do so by your instructor(s). (See Section (b) of the Institutional Rules on Student Services and Activities for the University's official definition of scholastic dishonesty.) You may, however, re-work or supplement previous work on a topic with the instructor's approval. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 15
16 Some students mistakenly assume that they are entitled to submit the same paper (or other assignment) for two (or more) classes simply because they authored the original work. Unfortunately, students with this viewpoint tend to overlook the relevant ethical and academic issues, focusing instead on their own "authorship" of the original material and personal interest in receiving essentially double credit for a single effort. Unauthorized multiple submissions are inherently deceptive. After all, an instructor reasonably assumes that any completed assignments being submitted for credit were actually prepared for that course. Mindful of that assumption, students who "recycle" their own papers from one course to another make an effort to convey that impression. For instance, a student may revise the original title page or imply through some other means that he or she wrote the paper for that particular course, sometimes to the extent of discussing a "proposed" paper topic with the instructor or presenting a "draft" of the paper before submitting the "recycled" work for credit. The issue of plagiarism is also relevant. If, for example, you previously prepared a paper for one course and then submit it for credit in another course without citing the initial work, you are committing plagiarism essentially "self-plagiarism" the term used by some institutions. Recall the broad scope of plagiarism: all types of materials can be plagiarized, including unpublished works, even papers you previously wrote. Another problem concerns the resulting "unfair academic advantage" that is specifically referenced in the University's definition of scholastic dishonesty. If you submit a paper for one course that you prepared and submitted for another class, you are simply better situated to devote more time and energy toward fulfilling other requirements for the subsequent course than would be available to classmates who are completing all course requirements during that semester. In effect, you would be gaining an unfair academic advantage, which constitutes academic dishonesty as it is defined on this campus. Some students, of course, do recognize one or more of these ethical issues, but still refrain from citing their authorship of prior papers to avoid earning reduced (or zero) credit for the same works in other classes. That underlying motivation further illustrates the deceptive nature of unauthorized multiple submissions. An additional issue concerns the problematic minimal efforts involved in "recycling" papers (or other prepared assignments). Exerting minimal effort basically undercuts the curricular objectives associated with a particular assignment and the course itself. Likewise, the practice of "recycling" papers subverts important learning goals for individual degree programs and higher education in general, such as the mastery of specific skills that students should acquire and develop in preparing written assignments. This demanding but necessary process is somewhat analogous to the required regimen of athletes, like the numerous laps and other repetitive training exercises that runners must successfully complete to prepare adequately for a marathon. Dr. Polidoro MAN385 Spring 2014 Syllabus (version Jan 7, 2014) Page 16
FIN 367 INVESTMENT MANAGEMENT
FIN 367 INVESTMENT MANAGEMENT FALL 2015 Professor Mindy X. Zhang Office CBA 6.316 Office Hours Phone 512-232-6826 E-Mail Course Web Page Teaching Assistants Course Objectives Tuesday 5:15pm 6:45pm, Wednesday
ACC380K.13: Information Technology for Accounting Control (ITAC) Fall 2012 Syllabus
Class Hours: TTH 8:00-9:30am (Course ID: 02900) Location: CBA 4.348 Professor: Patti Brown, CPA Office: CBA 3.250 E-mail: [email protected] Phone: (512) 471-0787 Office Hours: TTH 11:00-12:00pm
FINANCIAL MANAGEMENT (BA 385T)
FINANCIAL MANAGEMENT (BA 385T) FALL 2007 Professor Clemens Sialm Office B6.316 Office Hours Tuesdays 4:00-5:30 pm Wednesdays 4:00-5:30 pm E-Mail [email protected] Course Web Page via Blackboard
ART AND SCIENCE OF NEGOTIATION
ART AND SCIENCE OF NEGOTIATION FALL 2010 Professor Jeffrey Loewenstein Office CBA 4.252 Office Hours Phone 512-475-8020 E-Mail Course Web Page Negotiation is a Core Leadership Skill Wednesday 11am-12pm
OM 337: Total Quality Management Fall 2012 TTH 2:00 3:15 PM UTC 4.104 Unique # 04173
(August 14, 2012) OM 337: Total Quality Management Fall 2012 TTH 2:00 3:15 PM UTC 4.104 Unique # 04173 Instructor: Rayan Bagchi Office: CBA 3.434A; Phone: 458-1831 (Home) Office Hours: T 2-3 PM; TH 9:30-10:30
Department of Accounting ACC 311 - Fundamentals of Financial Accounting Syllabus
Department of Accounting ACC 311 - Fundamentals of Financial Accounting Syllabus Instructor: Kristen Valentine E-mail: [email protected] Office: CBA 5.334W Office Hours: Monday Thursday
MIS 373: Mobile Apps and Web Services Spring 2014 Unique Number: 04170
MIS 373: Mobile Apps and Web Services Spring 2014 Unique Number: 04170 Instructor Joshua Rock [email protected] Information, Risk and Operations Management (IROM) Department Class Time TTh
Accounting 327 Spring 2013 (IDs: 02565 02570 Financial Statement Analysis Professor Office Hours Phone E-Mail Course Time/Location T Th:
Accounting 327 Spring 2013 (IDs: 02565 02570) Financial Statement Analysis Professor Patrick Badolato, PhD, CPA Office Hours 4M.252. Primary: Tues 5-6 pm. Wed 11-12 pm. Secondary: Tues 11-12 pm. Wed 5-6
Accounting 312H: Fundamentals of Managerial Accounting Spring 2014 Lendecky Syllabus - Unique # 02610, 02615, & 02620
Classes TTh 9:30-11:00 (Unique #02610) GSB 5.153 TTh 11:00-12:30 (Unique #02615) GSB 5.153 TTh 12:30-2:00 (Unique #02620) GSB 5.153 Instructor: Brian Lendecky, MPA, CPA Office: CBA 4M.210 E-mail: [email protected]
FIN 357 BUSINESS FINANCE
FIN 357 BUSINESS FINANCE D SPRING 2014 TTH 12:30AM 1:45PM UTC 4.104 SECTION 03165 TTH 2:00AM 3:15AM UTC 3.104 SECTION 03170 TTH 3:30PM 4:45PM UTC 3.104 SECTION 03175 Professor Stuart Webb Office CBA 6.312
Statement of the Kelley School of Business MBA Code of Student Ethics
Evening MBA Code of Conduct Members of the Indiana University community are governed by rules that support the university s mission of preserving, improving, increasing, transmitting, and applying knowledge.
The University of Texas at Austin McCombs School of Business Foundations of Accounting (ACC 310F) Course Syllabus Spring 2015
The University of Texas at Austin McCombs School of Business Foundations of Accounting (ACC 310F) Course Syllabus Spring 2015 Course Information Section Time Location 02160 MW from 9:30-11am UTC 2.112A
The University Of Texas At Austin. The McCombs School of Business
The University Of Texas At Austin The McCombs School of Business Financial Risk Management FIN 377.2 Spring 2012 Location: CBA 4.332 Time: TTH 8:00 9:30 Professor: Josh Alexander, CFA Phone(s): 512 439
THE UNIVERSITY OF TEXAS AT TYLER COLLEGE OF BUSINESS AND TECHNOLOGY Fall 2015
THE UNIVERSITY OF TEXAS AT TYLER COLLEGE OF BUSINESS AND TECHNOLOGY Fall 2015 COURSE NUMBER: MANA 3370.060 and.061 COURSE TITLE: INSTRUCTOR: Business Writing and Oral Presentations Jennifer Hicks Martinez,
Investment Management Course
Investment Management Course FIN 367 - Spring 2012 Instructor: Vito Sciaraffia Office: CBA 6.312 Ph: (512)232-6830 Email: [email protected] Class meetings 03085: Tu & Th from 9:30 am to
THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 Computer Audit & Systems Security (03100) Course Syllabus FALL 2015
THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 (03100) Course Syllabus FALL 2015 Phone: Office: E-Mail: Bob George (Professor) Department of Accounting (512) 232-6788 GSB 5.124F (in McCombs) [email protected]
MAN 385: POWER AND POLITICS
MAN 385: POWER AND POLITICS FALL, 2013 MON/WED 12:30 1:45 Professor Ethan Burris Office CBA 4.210 Office Hours Mon/Wed 11:00 12:30; By appointment Phone 512-471-4803 E-Mail [email protected]
BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY
BUSINESS INTELLIGENCE WITH DATA MINING FALL 2012 PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining: MIS 373/MKT 372 Professor Maytal Saar-Tsechansky UTC 1.146 For every leader in the company, not just for me,
Course Syllabus HUDE 0111 Transition to College Success 8 Week Session
Department Chair: Tobin Quereau Office: RGC-Attache 202 Phone: 223-3391 Fax: 223-3392 Email: [email protected] Course Syllabus HUDE 0111 Transition to College Success 8 Week Session Instructor: Christie
PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS
The Johns Hopkins University Krieger School of Arts & Sciences/Whiting School of Engineering PROCEDURES FOR HANDLING ALLEGATIONS OF MISCONDUCT BY FULL-TIME & PART-TIME GRADUATE STUDENTS Established March
Paralegal/042 Workers Compensation for Paralegals Spring 2016 Section 1660 CE 206 Saturdays 9:00 a.m. 1:00 p.m. March 12 June 4, 2016
Paralegal/042 Workers Compensation for Paralegals Spring 2016 Section 1660 CE 206 Saturdays 9:00 a.m. 1:00 p.m. March 12 June 4, 2016 Instructor: Deborah Zexter, Attorney at Law Telephone: 310-287-7285
UNIVERSITY OF DAYTON MANAGEMENT AND MARKETING DEPARTMENT MKT 315: RETAIL MARKETING Course Syllabus Winter 2008, Section 01
UNIVERSITY OF DAYTON MANAGEMENT AND MARKETING DEPARTMENT MKT 315: RETAIL MARKETING Course Syllabus Winter 2008, Section 01 INSTRUCTOR: Serdar S. Durmuşoğlu, Ph.D. OFFICE LOCATION: Miriam Hall 703 PHONE:
COURSE SYLLABUS PADM 6950-98 Introduction to Nonprofit Organizations Fall 2015
COURSE SYLLABUS PADM 6950-98 Introduction to Nonprofit Organizations Fall 2015 Professor: Kyujin Jung, Ph.D. Phone: 615-963-7251 (office) Office: TSU Avon Williams Campus, Room 411 / Email: [email protected]
Forensic Biology 3318 Syllabus
#syl-biol3318.501.11s-@anwu-üu7606uj_page 1 of 5 Course Information BIOL 3318-501, Forensic Biology, Spring 2011 Mondays 7:00-9:45 PM, CN1.120 Forensic Biology 3318 Syllabus Instructor Contact Information
Personal Integrity Policy for Duke University School of Nursing Students
Personal Integrity Policy for Duke University School of Nursing Students Purpose: The objective of the Personal Integrity Policy is to promote an environment in the Duke University School of Nursing of
Florida Gulf Coast University Lutgert College of Business Marketing Department MAR3503 Consumer Behavior Spring 2015
Course name: Class schedule: Course mode: Classroom: Lutgert Hall, Room 2208 CRN: 10141 Consumer Behavior Tuesday & Thursday, 9:30 AM 10:45 AM On campus, face-to-face meetings Credit hours: 3 Final exam:
ISM 4113: SYSTEMS ANALYSIS & DESIGN
GENERAL INFORMATION: ISM 4113: SYSTEMS ANALYSIS & DESIGN COURSE SYLLABUS Class Times: Tuesday, Thursday 9:35 11:30 AM Class Location: HVNR 240 Professor: Dr. Aditi Mukherjee Office; Phone: STZ 360, 39-20648
Psychological Testing (PSYCH 149) Syllabus
Psychological Testing (PSYCH 149) Syllabus Psychological Testing (PSYCH 149) is held on Mondays, Wednesdays, and Fridays from 11:45 a.m. 12:50 p.m., in Science 2, Room 107. This 4-unit course is designed
THE UNIVERSITY OF TEXAS AT TYLER COLLEGE OF BUSINESS & TECHNOLOGY Fall 2015
COURSE NUMBER: ACCT 3312 THE UNIVERSITY OF TEXAS AT TYLER COLLEGE OF BUSINESS & TECHNOLOGY Fall 2015 COURSE TITLE: INSTRUCTOR: REQUIRED TEXT: Intermediate Accounting II Dr. Mary Fischer Intermediate Accounting:
HRD 5343 Foundations of Human Resource Development (HRD)
HRD 5343 Foundations of Human Resource Development (HRD) College of Business and Technology Department of Human Resource Development and Technology The University of Texas at Tyler Course Syllabus Fall
The Mendoza College of Business Graduate Academic Code of Honor 2014-15
The Mendoza College of Business Graduate Academic Code of Honor 2014-15 Table of Contents 1. Introduction 2. Pledge to Abide by the Honor Code 3. The Mendoza College of Business Graduate Committee on the
THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 Computer Audit & Systems Security (71243) Course Syllabus SUMMER 2012
THE UNIVERSITY OF TEXAS AT AUSTIN ACC 380K.12 (71243) Course Syllabus SUMMER 2012 MW 1:00 to 5:00 PM in CBA 4.328 Instructor: Bob George Office: CBA 6.304H Department of Accounting Office Phone: (512)
Florida International University College of Nursing and Health Sciences Health Services Administration Policies and Procedures
Grading Scale Florida International University College of Nursing and Health Sciences Health Services Administration Policies and Procedures Total Points Letter Grade Total Points Letter Grade 93-100 A
Child Development 382 Professional Seminar in Child Development: Current Issues Fall 2016 Tuesdays 5-7:50pm in Modoc 120
Child Development 382 Professional Seminar in Child Development: Current Issues Fall 2016 Tuesdays 5-7:50pm in Modoc 120 Instructor: Tess Manley, M.Ed Office: Modoc 102 Phone: (530) 898-4761 Email: [email protected];
How To Be A Responsible Student
Bauer Code of Ethics and Professional Conduct Preface The Bauer Code of Ethics and Professional Conduct (Bauer Code) is designed to reflect the values held by the C.T. Bauer College of Business (Bauer
Faculty: Sabine Seymour, [email protected], Office hours by email
Syllabus Parsons The New School for Design ADHT Skin as Metaphor, Theory of Fashionable Technology PGTE 5525A; CRN: 7337 3 credits, Academic Elective Fall 2012 Time: Wednesday, 3:50 5:30, Room: 66 5 th
CISM 2201 - Fundamentals of Computer Applications
CISM 2201 - Fundamentals of Computer Applications Philip Reaves, MBA RCOB 1214, on the Miller (RCOB) Advising Hall [email protected] (678) 839-4772 Office Hours: I have an infant at home and will be staying
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance Course Outline Term 2 (Regular Session 2013-2014), Sections
DATA MINING FOR BUSINESS INTELLIGENCE. Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky
DATA MINING FOR BUSINESS INTELLIGENCE PROFESSOR MAYTAL SAAR-TSECHANSKY Data Mining For Business Intelligence: MIS 382N.9/MKT 382 Professor Maytal Saar-Tsechansky This course provides a comprehensive introduction
PVAMU Course Syllabus for: Philosophy 2303 Critical Thinking Division of Social Work, Behavioral, and Political Sciences
PVAMU Course Syllabus for: Philosophy 2303 Critical Thinking Division of Social Work, Behavioral and Political Sciences Division of Social Work, Behavioral, and Political Sciences Instructor Name: Dr.
Course Evaluation Methods
1 PVAMU Developmental English Course Syllabus Integrated Reading/Writing 0133 Department of Academic Enhancement College of University College Instructor Name: Dr. Ayodeji Daramola Office Location: Delco
Psychology 4978: Clinical Psychology Capstone (Section 1) Fall 2015
Psychology 4978: Clinical Psychology Capstone (Section 1) Fall 2015 Instructor: Julianne Gray Ludlam, Ph.D. Class Location: McAlester 101 Class Time: T/Th, 9:30 AM 10:45 AM CST Office Location: McAlester
Professor: Monica Hernandez Phone: (956)295-3562 Dept. Secretary Ms. Canales 956-295-3817
Texas Southmost College PSYC 2301 50A/60A General Psychology Course Syllabus PSYC 2301. 50A/60A General Psychology Professor: Monica Hernandez Phone: (956)295-3562 Dept. Secretary Ms. Canales 956-295-3817
MINNESOTA STATE UNIVERSITY, MANKATO Department of Speech Communication Mankato, MN 56001
MINNESOTA STATE UNIVERSITY, MANKATO Department of Speech Communication Mankato, MN 56001 1 COURSE SYLLABUS SPEE 101: Interpersonal Communication Course ID: 005064 Section: 03 Instructor: Rachel Anderson
AEC 3073 INTERCULTURAL COMMUNICATION Ms. Mary Rodriguez
Spring 2015 AEC 3073 - Section 2D38 General Education Categories: Social & Behavioral Sciences (S) and International (N) or S and Diversity (D) Three (3) Credit Hours Tuesday (5 th and 6 th period) 11:45-1:40pm
Course Outline. Fall Session 2015 A03
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance Course Outline Fall Session 2015 A03 Instructor: Campus Office:
HRD 5336 Adult Learning
HRD 5336 Adult Learning College of Business and Technology Department of Human Resource Development and Technology The University of Texas at Tyler Course Syllabus Fall 2015 Instructor: Afton Smith Barber,
MGT 367 Human Resource Management Fall 2015 Online. General Information Academic Division: Career and Technical Education Discipline: Management (MGT)
1 MGT 367 Human Resource Management Fall 2015 Online General Information Academic Division: Career and Technical Education Discipline: Management (MGT) Prerequisite: BUS 101 and MGT 201 Credits: 3 Instructor
Digital Production Art 3-D AET 326 19725. Bringing ones imagination to life has never been easier. Fall 2015 CBA 4.340 TTH 9:30-11:00 AM
Digital Production Art 3-D AET 326 19725 Bringing ones imagination to life has never been easier. Fall 2015 CBA 4.340 TTH 9:30-11:00 AM Instructor: Office Hours: Dax Norman [email protected] before
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance
MIS 2000 - Information Systems for Management The University of Manitoba, I.H. Asper School of Business Department of Accounting and Finance Course Outline Term 2 (Regular Session 2014-2015), Sections
Course Syllabus. Course Information ED 3342 001 Classroom Management Grades EC 6 Classroom CB2 1.204
Course Syllabus Course Information ED 3342 001 Classroom Management Grades EC 6 Classroom CB2 1.204 Professor Contact Information Jan Chapman-Green Phone number 972-883-2730 Email address [email protected]
BAC 380C IT Management Summer 2011 Unique Number: 70890
BAC 380C IT Management Summer 2011 Unique Number: 70890 Instructor tructor Kit Webster [email protected] Information, Risk, & Operations Management (IROM) Department Class times Mondays,
Human Resource Management Political Science (POLS) 543 Spring 2013 Course Meets: Tuesday and Thursday 11:00-12:15 p.m. Faner 3075
Human Resource Management Political Science (POLS) 543 Spring 2013 Course Meets: Tuesday and Thursday 11:00-12:15 p.m. Faner 3075 Southern Illinois University Carbondale Department of Political Science
COURSE OUTLINE Business 2257: Accounting and Business Analysis
COURSE OUTLINE Business 2257: Accounting and Business Analysis This course presumes no prior knowledge of business administration. It is required by other faculties for some of their programs and is the
MKT 363 Professional Selling & Sales Management Course Syllabus (Spring 2011)
MKT 363 Professional Selling & Sales Management Course Syllabus (Spring 2011) Instructor: Professor Herbert A. Miller, Jr. Office Hours: T TH 11:00-11:45am Class Hours: T - TH 12:30pm - 2:00pm Office Location:
ISQS 3358 BUSINESS INTELLIGENCE FALL 2014
ISQS 3358 BUSINESS INTELLIGENCE FALL 2014 Instructor: Dr. Miguel. I. Aguirre-Urreta, Ph.D. Office: BA E322 Phone: 806.834.0765 Email: [email protected] Office Hours Tuesdays and Thursdays from
Table of Contents. Department and University Contacts 1
Table of Contents Department and University Contacts 1 The M.A. Program in Advertising 2 Introduction to the M.A. Program in Advertising 2 Admission Status 2 Program Prerequisites 2 Basic Program Requirements
STUDENT LEARNING OUTCOMES:
SYLLABUS Course Information: PSYC 2320.060: Lifespan Psychology ONLINE Instructor Information: Anthony Todd Lawson Email: [email protected] COURSE DESCRIPTION: Physiological, perceptual, cognitive, social
Prairie View A&M University Course Syllabus ACCT 2113 Financial Accounting Fall 2015
Prairie View A&M University Course Syllabus ACCT 2113 Financial Accounting Fall 2015 Department of Accounting, Finance & MIS College of Business Instructor Name: Ada L. Till, MS, CPA Office Location: Hobart
COURSE SYLLABUS PHILOSOPHY 001 CRITICAL THINKING AND WRITING SPRING 2012
1 COURSE SYLLABUS PHILOSOPHY 001 CRITICAL THINKING AND WRITING SPRING 2012 All students are required to read and have a thorough understanding of the syllabus. Any questions or concerns need to be addressed
University of Nevada, Reno Division of Health Sciences Orvis School of Nursing. Professional Ethics and Academic Policy (PEAP)
University of Nevada, Reno Division of Health Sciences Orvis School of Nursing Professional Ethics and Academic Policy (PEAP) Introduction to the Professional Ethics and Academic Policy The Orvis School
College of Business Department of Accounting and Management Information Systems
College of Business Department of Accounting and Management Information Systems Syllabus for ACCT530 Financial Planning, Control and Performance Evaluation Using SAP Spring 2012 Instructor Nancy Jones,
MGT 367 Human Resource Management Spring 2015 Online
1 Institutional Student Learning Outcomes Student learning is the core of WNC's mission and the college celebrates this importance with institution-wide learning outcomes. The Institutional Student Learning
DePaul University Kellstadt Graduate School of Business ACC 555 Management Accounting for Decision Making
DePaul University Kellstadt Graduate School of Business ACC 555 Management Accounting for Decision Making Instructor: John J Vitanovec, M.B.A., C.P.A. Office: 6027 DePaul Center Phone: 312 362 8398 Email:
Course Syllabus: POLS 543 Human Resources Management
Course Syllabus: POLS 543 Human Resources Management Professor: Randy Burnside [email protected] (618) 453-3174(Faner Hall 3138) (618) 453-7654(Anthony Hall 16) Class Meeting: Tuesday and Thursday 11:00
http://fdelgadillo.ba.ttu.edu [email protected] (Texas Tech) AND [email protected] (personal)
Area of ISQS Professor: Francisco Delgadillo, PhD. Course Name: Working Professionals: Information Technology and Operations Management Course Code: ISQS 5331- Section 294 Meeting time: Saturday, May 30
POLS 209: Introduction to Political Science Research Methods
POLS 209: Introduction to Political Science Research Methods Benjamin Tkach MWF 1:15-2:05 Allen 1005 Office: AgrilLife 408J Office Phone: 979.458.8591 Office Hours: TR 3:30-4:30 & by appointment Email:
MGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008
INSTRUCTOR: MGSC 290 Computer Information Systems in Business SYLLABUS Spring 2008 Phil Marshall Office: BA 728 Phone: 803-777-2303 / On campus, you can dial 7-2303. E-mail: Website: Office Hours: Section
Financial Statement Analysis University of Texas at Austin ACC 327 Spring 2009 J. William Kamas
University of Texas at Austin J. William Kamas Office: CBA 6.304B Contact info: [email protected] Office Hours: Mon 2:00-4:00 P.M. & Th 9:30-10:30 A.M. Web Site: Blackboard (syllabus, assignments,
ACCT 3103 Intermediate Accounting I Oklahoma State University Spring 2015
ACCT 3103 Intermediate Accounting I Oklahoma State University Spring 2015 Instructor: Angela Wheeler Spencer, PhD, CPA Office: Business 428 Telephone: 744-2863 (Please send an e-mail if you are unable
MKT 6V99-001Topics in Marketing Analytics Professor Mike Grigsby, PhD Term Spring 2016 Meetings F 4:00-6:45 p.m., SOM 2.901
Course MKT 6V99-001Topics in Marketing Analytics Professor Mike Grigsby, PhD Term Spring 2016 Meetings F 4:00-6:45 p.m., SOM 2.901 Professor s Contact Information Email Address [email protected] Office
DFST 2313-001 Courtship and Marriage Fall 2014
DFST 2313-001 Courtship and Marriage Fall 2014 Instructor Kelly M Roberts, PhD, LMFT Assistant Professor, Educational Psychology at UNT Email: [email protected] Office: Matthews Hall, Room 316K Office
George Washington University Department of Psychology PSYC 001: General Psychology
George Washington University Department of Psychology PSYC 001: General Psychology Course Syllabus Fall 2006 Times & Place Section 14 (CRN #70754) Tues & Thurs: 11:10am 12:25pm: Corcoran #302 Section 15
NEW YORK CITY COLLEGE OF TECHNOLOGY City University of New York
NEW YORK CITY COLLEGE OF TECHNOLOGY City University of New York Health Services Administration Program HSA 3630-2769 Health Care Finance and Accounting Management COURSE OUTLINE Professor Josef Bohm Revised
Elmira Business Institute Medical Transcription I (OFF 131)
Instructor Information: Instructor: Office Location: Telephone: Email: Office and Tutoring Hours: Elmira Business Institute Student Syllabus: Medical Transcription I (OFF 131) Semester: Summer 2014 Course
IS 301 - Management Information Systems
IS 301 - Management Information Systems Professor Dr. Chad Anderson E-mail [email protected] Office Phone (775) 784-6146 Office Location 314F Ansari Business Building Office Hours Tuesday & Thursday
Lisa K. Thompson, Ph.D., Instructor: 936-261-3653 (office); 936-261-3617 (fax); [email protected]. SYLLABUS Spring 2013
ADMN 5133-1 of 6 College of Education Department of Educational Leadership & Counseling Gaining academic knowledge through scholarly pursuit, seeking wisdom and understanding. ADMN 5133 School Community
The world is a complex place, and. requires that we learn how to. imagine its full potential.
Management 328.004 (Course #13352) International Management Fall 2015 Wednesdays 5:30 8:00 ASM 1065 Office Hours MW 1-2 and 3-5pm Last updated: March 25, 2015 Professor: Dr. Manuel R. Montoya Email: [email protected]
Entrepreneurship 490a Grand Challenges for Entrepreneurship
Entrepreneurship 490a Grand Challenges for Entrepreneurship Professor: Emily Cox Pahnke Office Hours: by appointment Office: Paccar 422 Email: [email protected] website: https://canvas.uw.edu Course Objectives
This course is required of all doctoral students in the College of Design, Construction, and Planning (DCP).
Doctoral Program College of Design, Construction, and Planning University of Florida Doctoral Seminar: DCP7794 Section1H48 Spring 16 Class Meets: Every Wednesday Period 9 (4:05 to 4:55 pm) in RNK 0225
VALENCIA COLLEGE, OSCEOLA CAMPUS PSYCHOLOGY 2012 32733 (General Psychology) Summer B, 2014 Dr. Nancy Small Reed
I. GENERAL INFORMATION VALENCIA COLLEGE, OSCEOLA CAMPUS PSYCHOLOGY 2012 32733 (General Psychology) Summer B, 2014 Dr. Nancy Small Reed Instructor: Dr. Nancy Reed Office hours: The first 15 minutes of class
Email to set up appointments at other times. SYLLABUS
PROVIDENCE UNIVERSITY COLLEGE 471.12 Business Communications 3 credit hours 2015 Winter Professor: Office: Website: Jeremy Funk, PhD [email protected] 2H22 Providence Student Portal Classes: Mon. & Thurs.
Introduction to Criminal Justice Central College
Introduction to Criminal Justice Central College Tuesday 5:30PM - 8:30PM CRIJ 1301-1 Introduction to Criminal Justice CRN 70091 - Fall 2015 Central Campus EDC RM 244 Tuesday 5:30-8:30 PM 3 hour lecture
Organizational Behavior and Leadership (MGT 557) Dr. NASIR AFGHAN. COURSE SYLLABUS MBA Fall Semester 2011
Organizational Behavior and Leadership (MGT 557) Dr. NASIR AFGHAN COURSE SYLLABUS MBA Fall Semester 2011 Institute of Business Administration (IBA) 1 Background and Objectives of the course Organizational
Binghamton University Thomas J. Watson School of Engineering and Applied Science Student Academic Honesty Code
Binghamton University Thomas J. Watson School of Engineering and Applied Science Student Academic Honesty Code Preamble Like all universities, Binghamton University depends on the honesty and integrity
Honor Code Owen Graduate School of Management
Honor Code Owen Graduate School of Management Preamble Owen Students are honorable. They stand for that which is right: they do not lie, cheat, steal, or plagiarize, nor tolerate those who do. Owen Students
University of Texas at San Antonio English 2413: Technical Writing Fall 2011
University of Texas at San Antonio English 2413: Technical Writing Fall 2011 Instructor: Kristina Gutierrez Office Hours: MW 9:30am -10:30am or by appointment Office location: MB 2.308 Email: [email protected]
IDEAL PROGRAM PRST 224 Critical Thinking & Writing SYLLABUS ONLINE
Dear Student, IDEAL PROGRAM PRST 224 Critical Thinking & Writing SYLLABUS ONLINE Please read the following course syllabus carefully, especially the course dates, times and location. If you have any questions,
