Explain the six areas of organizational control.
What will be an ideal response?
The six areas of organizational control are physical, human, informational, financial, structural, and cultural.
The physical area includes buildings, equipment, and tangible products.
The human resources controls are those used to monitor employees and include personality tests and drug testing for hiring, performance tests during training, performance evaluations to measure work productivity, and employee surveys to assess job satisfaction and leadership.
The informational area includes production schedules, sales forecasts, environmental impact statements, analyses of competition, public relations briefings that are controls on an organization's various information resources.
The financial area looks at the financial controls of the organization.
The structural area refers to how the organization is arranged from a hierarchical or structural standpoint such as bureaucratic and decentralized control.
The cultural area is an informal method of control. It influences the work process and levels of performance through the set of norms that develop as a result of the values and beliefs that constitute an organization's culture.
You might also like to view...
Manufacturers benefit from co-op advertising in all of the following ways, except:
A) gain additional advertising exposure at reduced costs B) reimbursed by retailers for their share of the ad costs C) co-op dollars are directly tied to retail sales D) gain prominent exposure in an ad since no other competing brands can also be displayed
Which of the following types of brands are also known as store brands?
A) generics B) value brands C) private labels D) national brands
Discuss how adopting a value chain perspective reveals advantages of adopting an REA approach to information system development
What allows information to be sent in encoded format over unsecured networks like the Internet and is widely used to protect data and ensure privacy?
a. Virtual private network b. Public-key encryption c. Cross-site scripting d. SQL injection