Employee Relations Emerald Article: Managing HRM risk in a merger Jane Bryson Article information: To cite this document: Jane Bryson‚ (2003)‚"Managing HRM risk in a merger"‚ Employee Relations‚ Vol. 25 Iss: 1 pp. 14 - 30 Permanent link to this document: http://dx.doi.org/10.1108/01425450310453490 Downloaded on: 06-11-2012 References: This document contains references to 53 other documents Citations: This document has been cited by 10 other documents To copy this document: permissions@emeraldinsight
Premium Mergers and acquisitions Trade union Management
as human resource. During last thirty years‚ there are five major global recessions‚ what considered more beneficial to the survived companies is‚ to focus on their Human Resources. There are many Human resources practices. Efficiency and cost control‚ communication and information disclosure‚ fairness and trust‚ human resource development‚ managing working time are the most effective in helping to manage the recession. In following essay‚ we will discuss the importance of Human resources management
Premium Human resource management Human resources
2 Economic Systems for Resource Allocation Decisions about resource allocation are necessary because we live in a world of scarcity. A review of the ideas listed at Key Points 1.1 and 1.2 should remind you of how central this basic premise is to the study of any branch of economics. To take a surreal example‚ when you open your front door in the early morning there are not millions of bottles of milk covering the neighbour’s lawn; nor is there no milk. There is just enough bottled milk to meet
Premium Planned economy Economic system Market economy
Water resources are sources of water that are useful or potentially useful. Uses of water include agricultural‚ industrial‚ household‚ recreational and environmental activities. Virtually all of these human uses require fresh water. 97% of the water on the Earth is salt water. However‚ only three percent is fresh water; slightly over two thirds of this is frozen in glaciers and polar ice caps.[1] The remaining unfrozen freshwater is found mainly as groundwater‚ with only a small fraction present
Premium Water Water supply Water resources
of Management Information Systems by Kenneth Hamlett‚ Demand Media Related Articles * Type of Information in a Customer Service Management System * What Is a Management Information System? * The Features of an Information Management System * Importance of the Management Information System * Differences Between Human Resource Management Systems & Human Resource Information Systems * What Are the Basic Kinds of Reports Produced by a Management Information System? Many
Premium Management Information systems Decision theory
Developing & Managing Resources The learning resource I have chosen is actually also used as an ice breaker for a lesson and then used to build on students communication‚ reading and understanding skills. The task is used to put students under a time constraint to complete a task of ready and answering simple and possibly trick questions in a short time frame. This resource is not used in a way to trick students but used to then get them to reflect on their ready and interpretation of a question
Premium Education Learning styles Question
“A STUDY ON WELFARE MEASURES IN TTK HEALTH CARE LTD-CHENNAI”. By G. JEEVA (Reg No: 35104125) SRM ENGINEERING COLLEGE A PROJECT REPORT Submitted to the Department of SRM SCHOOL OF MANAGEMENT In partial fulfillment of the requirements For the award of the degree of MASTER OF BUSINESS ADMINISTRATION S.R.M INSTITUTE OF SCIENCE & TECHNOLOGY‚ (Deemed University)
Premium Human resource management
Characteristics of Information Security; The extended characteristics of information security as proposed by (Whitman‚ M.E. & Mattord‚ H.J‚ 2010) are planning‚ policy‚ programs‚ protection and project management. Being highly respectable experts in the field of information technology‚ specifically information systems and security‚ transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained. Planning; The planning stage in Information Security (InfoSec)
Premium Security Information security Computer security
sender and receiver. The traditional communication view point is broken down into a sender sending information‚ and receiver collecting the information processing it and sending information back‚ like a telephone line. With dissemination‚ only half of this communication model theory is applied. The information is sent out and received‚ but no reply is given. The message carrier sends out information‚ not to one individual‚ but many in a broadcasting system. These seeds are metaphors for voice or
Premium Marketing
Information Technology Management from 1960-2000 By Richard L. Nolan - IT ( Information Technology. Digital convergence in data‚ voice and‚ video - new functions were continuously assigned to the computer due to organizational learning - IT became an information revolution that changed the way companies worked Stages Theory of IT Management - Four stages of organizational learning on an S-shaped Curve o Stage I: Initiation ( proving the value of the technology
Premium Strategic management Management