asynchronous online undergraduate business degree programs in

Transcription

asynchronous online undergraduate business degree programs in
 Sam Houston State University College of Business Administration Smith‐Hutson Business Building Huntsville, Texas, USA Fifth Annual General Business Conference Proceedings April 19‐20, 2013 Proceedings Editor: Steve Nenninger, Ph.D. ISSN 2153‐9367 Volume IV Member of The Texas State University System Table of Contents
Papers are listed in the order presented.
Message from the Proceedings Editor ........................................................................................ 5
Family Business Research: An Examination of the Last 14 Years of Published Research
Teresa V. Menzies, Brock University, Ontario, Canada
Farrah Amikons, Brock University, Ontario, Canada
Jennifer Lococo, Brock University, Ontario, Canada ..................................................... 6
Connecting with Students Through Facebook: The Impact of Creating a Social Media
Marketing Plan for Academic Libraries
Chelsea Lorenz, Wartburg College, Iowa ..................................................................... 20
A Factorial Analysis of Gender and Rank on Business School Faculty’s Salaries as a Gauge for
Dissatisfaction
Reginald L. Bell, Prairie View A&M University, Texas
Robert J. Meier, Fort Hays State University, Kansas
Wally Guyot, Fort Hays State University, Kansas ....................................................... 33
A Comprehensive Theoretical Framework for Understanding Moral Behavior in Organizations
Timothy Ewest, Wartburg College, Iowa ..................................................................... 47
Fiscal Deficit, Money Supply and Inflation in Nepal
Nar Bahadur Bista, University of Warsaw, Poland ...................................................... 48
The Future of De Novo Banks
James B. Bexley, Sam Houston State University, Texas .............................................. 60
Does Hedging Reduce Risk?
Garland Simmons, Stephen F. Austin State University, Texas .................................... 61
Asynchronous Online Undergraduate Business Degree Programs in Traditional Regional
Colleges: Costs and Benefits
M. Keith Wright, University of Houston – Downtown, Texas ..................................... 73
What’s Continuous Improvement? Strategies for Developing – First Do – Then Learn
Chynette Nealy, University of Houston – Downtown, Texas ...................................... 89
International Sanctions Placed on Iran
Daniel Rodriguez, Sam Houston State University, Texas
Charles Moore, Sam Houston State University, Texas................................................. 92
2
Illicit Funds Flows from Developing Countries
Mark Leipnik, Sam Houston State University, Texas
James Ritter, Sam Houston State University, Texas................................................... 102
Auditing for Usefulness: A New Concern?
Carl Brewer, Sam Houston State University, Texas
Alice Ketchand, Sam Houston State University, Texas
Jan Taylor Morris, Sam Houston State University, Texas.......................................... 139
CPA Examination Performance of Candidates from Community College Accounting Programs
Gordon Heslop, Texas A&M University – Commerce, Texas
Byungil Kim, Texas A&M University – Commerce, Texas ...................................... 140
Reverse Convertibles Prices: Evidence from Secondary Market Trading
Timothy B. Michael, University of Houston – Clear Lake, Texas
Stephen J. Cotton, University of Houston – Clear Lake, Texas
Ivelina Pavlova, University of Houston – Clear Lake, Texas
Jeffrey Whitworth, University of Houston – Clear Lake, Texas ................................ 148
Online Business Students: Multimedia Principles to Promote Meaningful e-Learning
Courtney Kernek, Texas A&M University – Commerce, Texas
Leslie Toombs, Texas A&M University – Commerce, Texas
Charlotte Larkin, Texas A&M University – Commerce, Texas ................................. 164
Is There an Ideal Group Size? : Preparing Undergraduates for Successful Entry into the ‘Real
World’ of Business
Carol Wright, Stephen F. Austin State University, Texas
C. Henry Dunn. Stephen F. Austin State University, Texas ....................................... 166
Undergraduate Students Writing About Finance: Preparation & Assessment
Timothy B. Michael, University of Houston – Clear Lake, Texas
Melissa A. Williams, University of Houston – Clear Lake, Texas............................. 173
New Methods to Teach Information System Development
Vance Etnyre, University of Houston – Clear Lake, Texas ........................................ 197
An Analysis of Business Characteristics through Geocaching
Kevin Thomas Groth, Wartburg College, Iowa .......................................................... 198
Personality and Perceptions of Effective Leadership - Differences between Men and Women
James E. Eastham, Our Lady of the Lake University, Texas
Rocio Harrelson, Our Lady of the Lake University, Texas
Ben Cavazos, Our Lady of the Lake University, Texas
Mark T. Green, Our Lady of the Lake University, Texas........................................... 212
3
Assessing Student Critical Thinking Skills for Online Quantitative Courses
Annette Hebble, Trident University International, California
Mina Richards, Trident University International, California...................................... 214
Emotional Intelligence Driven Qualitative Market Research
Manish Sharma, Delhi Technological University, India
Pritam B. Sharma, Delhi Technological University, India
Shikha N. Khera, Delhi Technological University, India .......................................... 225
Analyzing Supervisory Communication Strategies: An Application of Message Design Logics
Theory
Geraldine Hynes, Sam Houston State University, Texas
Kathryn S. ONeill, Sam Houston State University, Texas
Heather R. Wilson, Sam Houston State University, Texas ........................................ 226
The Relationship Between Adolescent Personality and Leadership
Lucinda Parmer, Universtiy of Houston - Downtown, Texas ................................... 230
How do Perceived Usefulness of E-textbook-and-homework Systems Correlate with Students’
Personality Traits of Introversion and Thinking?
Joseph S. Mollick, Texas A&M University - Corpus Christi, Texas
Robert Cutshall, Texas A&M University - Corpus Christi, Texas ............................. 243
Job Stress and Job Performance Among Employees in Private Banking Sector in Istanbul:
Examining the Moderating Role of Emotional Intelligence
Uğur Yozgat, Marmara University, Turkey
Elif Bilginoğlu, Marmara University, Turkey
Orkun Demirbağ, Marmara University, Turkey
R. Hande Serim Bahadınlı, Marmara University, Turkey .......................................... 257
Corpus Christi Estate Planning Council Faces Challenges
Karen A. Loveland, Texas A&M University – Corpus Christi, Texas
Eugene Bland, Texas A&M University – Corpus Christi, Texas ............................... 268
4
Message from the Proceedings Editor
Welcome to the fifth issue of the Proceedings of the Sam Houston State University
General Business Conference. This issue includes twenty-seven of the papers presented at this
year’s conference spanning a wide range of topics, including finance, leadership,
communication, marketing, accounting, international business, and online teaching methods,
just to name a few.
I would like to thank all the authors for the high quality papers. Obviously, without
you there would be no conference. I also appreciate the support for this conference from the
Conference Chair, Laura Sullivan and from the Program Chair, Bala Maniam. It is a privilege
for all of us at Sam Houston State to host outstanding researchers and teachers from around the
globe.
It has been my pleasure to serve as proceedings editor for the past four years. In this
role, I have had the opportunity to read each of the papers as they are received, and I enjoy
becoming more familiar with the research conducted in areas outside my specific discipline.
While we each are dedicated to our areas of expertise, it’s refreshing to be a part of an
interdisciplinary conference.
We hope you take advantage of the wide variety of topics discussed over our two days
of presentations and that you will discover new ideas which you can use in a variety of ways at
your home institutions.
Steve Nenninger, Ph.D.
Assistant Professor of Finance
Proceeding Editor
5
FAMILY BUSINESS RESEARCH: AN EXAMINATION
OF THE LAST 14 YEARS OF PUBLISHED RESEARCH
Teresa V. Menzies
Brock University
Farrah Amikons
Brock University
Jennifer Lococo
Brock University
ABSTRACT
This paper reviews, from a unique perspective, family business research published in
the Family Business Review journal (the major journal in the field) over the 14 year time
period 1998-2011. The study examines methodology (conceptual, empirical, sample size) and
data source, by country, and also the topics of the papers and theories utilized. Finding show
that empirical papers, mostly from the US dominate but studies from 30 other countries are
also found in the FBR. Succession is still the main topic studied and Agency Theory is the most
commonly used. However, an additional 48 topics and 20 theories were found to be used with
new theories and topics being introduced mostly over recent years. This paper provides a
useful tool to assist with future research by identifying popular, emerging and underresearched topics and theories. Our condensation and analysis of many years of research is a
valuable guide for researchers, a teaching tool for use with students studying family business,
and also an information source for consultants and advisors to family businesses.
INTRODUCTION
A majority of businesses can be classified as “family businesses”. For example, in the
US, research shows that family businesses contribute 64% of GDP and employ 62% of the
workforce (Astrachan & Shanker, 2003). A broad definition of family business requires “there
be some family participation in the business and that the family have control over the business’
strategic direction” (Astrachan & Shanker, 2003, pp. 211-212). The prevalence of family
businesses means that for regional and national economic growth, it is important to find ways
to enhance performance. Moreover, it is important for families in business, that they optimize
opportunities for business growth and longevity, as well as ensuring harmonious relationships
amongst family, both in and out of the business. The academic field of family business
considers all these issues, with the leading topic being succession (Chua, Chrisman & Sharma,
2003). However, estimates indicate that only two-thirds of family businesses survive to the
6
second generation, and far fewer advance to the third generation and beyond (Poza &
Daugherty, 2014).
The importance of assisting families in business to deal with the particular issues
relating to the overlap of family and business is commonly recognized as an important field of
study. However, the field is still in the early stages of development as shown by the large
number of reviews that have been published over the last almost two decades. For example,
Dyer and Sanchez (1998) looked at the evolution of the family business field from 1988 to
1997. Bird, Welsch, Astrachan, and Pistrui (2002) examined the foundations of the field in the
1980s and trends in the late 90s to 2001. Sharma (2004) conducted a comprehensive review of
family business research and derived a four part categorization (individual, group, organization
and society). Zahra and Sharma (2004) and Casillas and Acedo (2007) used past research to
predict future trends in family business research. Debicki, Matherne, Kellermanns, and
Chrisman (2009) examined 30 management journals to determine family business topics and
trends. Chrisman, Kellermanns, Chan and Liano (2010) reviewed by analyzing the top 25
family business published papers. Furthermore, during 2012 several reviews were published in
the Family Business Review Journal summarizing 25 years of research accomplishments since
the journal’s creation. This paper builds on the work of previous reviews of family business.
The objectives of this study are to (1) examine the methodology (conceptual, empirical,
sample size etc.) and source (by country) of a major portion of family business research
(almost 1.5 decades of FBR publications); and (2) to determine the topics, and theories used in
the papers. Our study is the most comprehensive review to date of family business
publications. The rationale is to provide a useful research tool to assist with future research by
identifying popular, emerging and under-researched topics and theories. Our condensation and
analysis of many years of research is a valuable guide for researchers, a teaching tool for use
with students studying family business, and also an information source for consultants and
advisors to family businesses. This paper represents a work-in-progress, from a unique
perspective, looking at family business research over a considerable time period (1998-2011),
via an analysis of published papers in the major journal in the field, the Family Business
Review.
BACKGROUND
The Family Business Review Journal (FBR), launched in 1988, is the main journal in
Family Business and thus reviews of the field often examine this journal. However, recently a
second journal has been launched in 2010, the Journal of Family Business Strategy, and since
then the Journal of Family Business Management. In addition, Family Business papers are
published in a wide range of other academic, peer reviewed journals. Chrisman et al. (2010)
examined the intellectual foundations of current research in family business by identifying, and
then reviewing, the 25 most influential articles, based on frequency of citation, over a six year
period. The journals they examined were Entrepreneurship Theory and Practice (ETP) (20032008), Family Business Review (FBR) (2005-2008), Journal of Business Venturing (JBV)
(2003-2008) and Journal of Small Business Management (JSBM) (2003-2008). The 25 papers
7
were found in a much broader range of journals. These included Academy of Management
Journal (2 papers), Journal of Finance (2 papers), Journal of Financial Economics (2 papers),
Journal of Law and Economics (1 paper), Journal of Management (1 paper), Organizational
Dynamics (1 paper), and Organization Science (1 paper), as well as Entrepreneurship Theory
and Practice (6 papers), Family Business Review (6 papers), and Journal of Business
Venturing (3 papers).
Debicki et al. (2009) reviewed journals and authors of family business papers and
derived a list of 30 journals which had published 291 articles on family business over the
period 2001 to 2007. They determined that 47% had been published in the Family Business
Review Journal with the runner up being ETP with 15%.
Growth in Popularity
The popularity and the quality of family business research is increasing, evidenced by
the increasing number of academic journals and the increasing citation impact factor. The topic
is of extreme relevance to assisting families in business. However, the teaching of family
business courses has tended to lag behind. However, textbooks have been published on the
specific topic which facilitates the teaching of the subject (e.g. Poza & Daugherty, 2014 [4th
Ed.]). This heralds that a field has become sufficiently popular at universities to attract standalone courses. For example, a 2009 Canadian country-wide survey of courses offered in
Faculties of Business found that Family Business was taught as a separate course in only 26%
of undergraduate programs (Menzies, 2009).
Dyer and Sánchez (1998), is often quoted as an early and influential review that
examined publications to date in the FBR. They looked at 186 papers in the FBR from 1988 to
1997, examining three areas: (1) paper topic(s) (2) authorship (e.g. academics, consultants),
and (3) implications for future research. Not unexpectedly they found that essays,
commentaries and practical applications accounted for about a third of papers. Family business
management predominated as the main topic of papers, authored mainly by academics. They
labeled the FBR research they reviewed as similar to a “murky swamp” (p. 295). (Karl Popper
[1968] describes science and associated theories as being built above a “swamp” [p.111]).
Dyer and Sánchez urged that “Now is the time to begin adding the bricks and the mortar … as
we construct our “field of family business building” (p. 295).
An FBR review that considered a longer time span (1988 to 2005) set out to identify
whether family business research was developing as a distinct field within the general
management literature (Casillas & Acedo, 2007). Dyer and Sánchez (1998) as well as Casillas
and Acedo (2007) use Kuhn’s (1970) term “paradigm” in the sense that family business needs
to develop a distinctiveness if it is to be recognized as a separate academic area of study.
Casillas and Acedo’s (2007) review concluded that the FBR papers were fragmented and
lacked consensus, but that family business research was developing at the frontier “by
enlarging the number of approaches used for understanding” (p.141).
Bird et al. (2002); looked at family business research in the 1980s to study emergence
of the discipline and the 1997 to 2001 papers to gauge maturity of the discipline over that
8
period. An interesting finding was that no publications with less than a sample size of 100
respondents (so we can assume many qualitative studies) appeared in either ETP or JBV,
whereas 90% of the <100 sample size appeared in the FBR and 10% in JSBM. For sample
sizes >100, 75% of the studies were published in FBR, 11% in JSBM, 9% in ETP and 4% in
JBV. They inferred from this that sample size matters when it comes to publication in quality
journals. Zahra and Sharma (2004) looked at six trends in Family Business Research and
provided suggestions to step outside these trends to further advance the field. Sharma, (2004)
conducted an in-depth analysis of journal articles published in the Family Business Review
using four levels: individual, interpersonal/group, organizational, and societal/environmental.
Regarding type of paper, Empirical or Conceptual, Chrisman et al. (2010) in their review of the
25 most cited family business academic articles in journals between 2003 and 2008 found that
11 (44%) were empirical, while 14 (56%) were conceptual (including literature reviews and
definition discussions). Thus the increasing popularity of the academic domain of family
business has been well documented.
Topics
With the aim of encouraging researchers to focus more on theoretical perspectives,Yu,
Lumpkin, Sorenson, and Brigham (2012), developed a taxonomy of dependent variables based
on those found in 257 empirical family business studies from 1998 - 2009. They developed a
listing of 34 topics (dependent variables) and then went on to carefully group them into
clusters, as follows: Governance (7 of 34 topics, 21%, ) Family business roles (6, 18%), Family
dynamics (5, 15%), Strategy (5, 15%), Succession (5, 15%), Social and economic impact (4,
12%), and Performance (2, 6%). These authors go on to subdivide these topics into short or
long term and then into business or family topics, and as one would expect there is overlap.
(The frequency refers to categorization by topic, not by frequency of the topic being published
in papers.)
Regarding family business research by topic, Litz, Pearson and Litchfield’s (2012)
survey of over 80 family business scholars opinions regarding the current situation in family
business research, showed that currently the main topics were succession and governance, and
as one person said “succession issues have been studied to death” (p. 11). Regarding future
directions it was urged that there be a less positivist bent and a call for understanding success
factors, also for a focus on family influence, greater cross-cultural studies, and so on.
Much of the Family Business domain revolves around issues of planning and executing
ownership succession/transition. This topic is of immense interest to most families in business
(Chua, Chrisman & Sharma, 2003; Danco, 1982; Davis, 1968; Davis & Harveston, 1998).
Succession issues, in many instances are complex and often remain unplanned, and when
attempted are often unsuccessful. Gersick, Lansberg, Desjardines & Dunn (1999) state that
“understanding the structure of transitions” (p. 287), is the most salient interjection for
academics and advisors to assist families with ownership succession issues. It seems that over
the last decade research has been following the advice of Gersick et al.
9
Theoretical Approaches
The utilization of theories is an obligatory base for any paradigm or emergent body of
knowledge. Thus the extent and range of theoretical perspectives is another way in which we
can study the development and distinctiveness of a field of inquiry. With regards to theories,
Systems Theory is perhaps the most commonly associated with family business theory
building. The three-circle diagram (Gersick, Davis, McCollom Hampton, & Landsberg, 1997),
is a useful way in which to visualize the linkages between Family, Management and
Ownership, and the overlap that exists often between some or all of these stakeholders.
Similarly, life-cycle, or systems theory has been adopted to investigate succession in family
business (Dunn, 1999; Gersick et al., 1997). Agency Theory is very commonly used in
discussing families in business. This theory has been used to explore many aspects relating to
the survival of family firms (Mustakallio, Autio & Zahra, 2002; Tsai, Hung, Kuo & Kuo, 2006;
Vilaseca, 2002; Zahra, 2005).
The Resource-Based view of the firm is used to examine the competitive advantages
inherent to family businesses (Cabrera-Suarez, Saá-Perez & Garcia-Almeida, 2001;
Habbershon & Williams, 1999). The Stewardship Perspective, whereby the business is seen as
an extension of self is an important way to view family businesses according to Poza and
Daugherty (2014). Agency Theory and Resource Based View of the firm (RBV) were the two
main theories found by Chrisman et al. (2010) when they reviewed the 25 most cited family
business academic articles in journals between 2003 and 2008. Of the empirical papers, eight
(73%), and four (29%) of the conceptual papers utilized Agency Theory, with an additional
conceptual paper using both Agency (so 36%) and RBV. None of the empirical papers within
the 25 sample, used RBV, but five (36%) of the conceptual were RBV and that becomes 43%
if we include the paper that used both Agency and RBV theoretical frameworks. Additional
theories/perspectives in the survey of 25 papers include the Theory of the Firm, Strategic
Management, Sociology, and Organizational Theory.
James, Jennings and Breitkreuz (2012) analyzed theoretical approaches in family
business publications between 1985 and 2010 and found that there is a “dominance” of
business related theories (Agency Theory and RBV), and that family science theories
(structural functionalism and symbolic interactionism) are being overlooked. Sharma,
Chrisman, and Gersick (2012) concur that the two main theories are Agency and RBC, but also
state that other theoretical perspectives are finding their way into family business papers, e.g.
“Contingency Theory, Transaction Cost Economics, Stewardship Theory, Prospect Theory,
Stakeholder Theory and Institutional Theory” (P. 11).
Litz et al., (2012) surveyed over 80 family business scholars regarding where the field
was currently and where it should be headed. Findings showed that currently the field has
developed to include more theory-based research, using Agency, Stewardship and RBV, but
that there needs to be new theoretical frameworks utilized in the future, for example, family
therapy and social psychology theories.
10
METHODOLOGY
Our study investigates a 14 year period of published papers in the FBR journal. We will
shortly complete our data analysis for the year 2012 and include this additional data in our final
paper, which will be a 15 year analysis.
This study began in 2008 with a literature review, conducted online through the ABI
online database which provided access to all copies of the FBR for the ten-year period 1998 to
the last issue of 2007. The co-authors of this study include a senior student researcher (Jennifer
Lococo) who worked on stage 1 of this project. A paper summarizing stage one was presented
by the first author at the Small Business Institute Conference in Florida in 2011. Subsequently,
to complete the analysis of the 2008 to 2011 FBR articles (stage 2), a senior student researcher
(Farrah Amikons) joined our team. For stage two of the study, the online database, SAGE
Journals was used to access articles from the FBR for the four-year period of 2008 to 2011.
(Both student researchers had completed and excelled in an undergraduate course in family
business taught by the first author.)
For both stage one and two of this study, the first step was to identify whether the paper
was empirical or conceptual, as illustrated in Figure 1. In the case of an empirical paper, the
country from where the data was collected and the sample size were recorded. The next step
was to identify the major topic(s) of the paper and ancillary topic(s), as well as the major
theory(s) and ancillary perspective(s)/topic(s). For the conceptual papers, the major topic(s),
major theory(s) and ancillary perspective(s)/topic(s) were also recorded. Once the data for the
four years was recorded, major topics and theories were analyzed to identify any synergies that
existed. (Ancillary topics, theories and synergies are not reported in this paper.)
Each article included in the FBR journal, over the period 1998 to 2011 was examined
for the following information: research method/type, sample size, research sample country,
time lag between research and publication date (subsequently not analyzed as the information
was missing in most studies), major and subsidiary topic(s), and theory(s). Each paper was
analyzed in detail, not just the abstracts of the study. Book reviews, commentaries and
interviews were not included. An empirical paper is defined as an article that has collected
primary or secondary data for the purpose of analyzing and reporting results. A conceptual
paper is defined as a paper that has the purpose of presenting an in-depth analysis of a topic or
theory, not to present a study.
Each article included in the FBR journal, over the period 1998 to 2011 was examined
for the following information: research method/type, sample size, research sample country,
time lag between research and publication date (subsequently not analyzed as the information
was missing in most studies), major and subsidiary topic(s), and theory(s). Each paper was
analyzed in detail, not just the abstracts of the study. Book reviews, commentaries and
interviews were not included. An empirical paper is defined as an article that has collected
primary or secondary data for the purpose of analyzing and reporting results. A conceptual
paper is defined as a paper that has the purpose of presenting an in-depth analysis of a topic or
theory, not to present a study
11
An excel spreadsheet was utilized for recording of data and analysis of results.
Categories were agreed upon by the first author and one of the student researchers. Inter-rater
reliability of analyzed papers was observed.
Figure 1: Methodology Used to Analyze Articles Published in the FBR
RESULTS
Articles in the FBR between the beginning of 1998 and end of 2011 were included in
our study. Over this time period, a total of 278 papers were published within the FBR, 208
(75%) were empirical papers and the remaining 70 (25%) papers were conceptual.
Country of Origin for Data
Table 1 demonstrates the range of countries where empirical data from the 208 studies
was derived. Information about family businesses in the United States is the most common
source of data for FBR articles. Unfortunately, 36 data sets did not label the source country.
There are 8 papers where the data sets were conducted over two countries and 4 papers
collected data on a global scale.
Sample Size
The range of the sample size, which varies greatly, can be seen in Table 2. The sample
size ranged from 1 to 10,000, due to qualitative as opposed to quantitative methodologies. The
majority, 78 (38%) of the 208, of the empirical articles used a sample size that ranged from
101-500, followed by a data set of less than 10, which 50 (24%) empirical papers used. The
majority of papers that used a sample size of less than 10 performed longitudinal case studies
of firms. A total of 37 (18%) papers used a sample size between 11 and 99. There were 25
(12%) papers that used a data set of 501-1000 and 16 (8%) that used a sample size more than
1000. Of the 208, only two empirical papers used secondary data to complete their paper,
which are not included in the table.
12
Table 1
EMPIRICAL STUDIES BY COUNTRY (IF REPORTED) AS PUBLISHED IN THE
FAMILY BUSINESS REVIEW JOURNAL BETWEEN 1998-2011
Sample derived from the following Countries
No. by country
United States
71
Spain
19
Canada
14
Australia, China,
10
Belgium
7
China, Finland, Sweden
6
United Kingdom
5
Germany, India, Italy,
4
Chile, Taiwan
3
Austria, Brazil, France, Lebanon, Netherlands, Norway, Philippines,
2
Africa, Argentina, Brussels, Denmark, Ireland, Lithuania, Portugal,
1
Scotland, Switzerland
Table 2
SAMPLE SIZE, IF REPORTED, OF EMPIRICAL STUDIES PUBLISHED IN FAMILY
BUSINESS REVIEW JOURNAL BETWEEN 1998-2007 (N=150)
<10
50 (24%)
11-99
37 (18%)
101-500
78 (38%)
501-1000
25 (12%)
>1000
16 (8%)
Major Topics
The incidence of topics contained within the published papers in FBR over the period
1998 to 2011, are shown in Table 3. The most popular topic is succession, which appeared in a
total of 63 articles. Of these, 47 (75%) were empirical and 16 (25%) conceptual. The next most
popular topic is Governance with 21 papers, Commitment with 16 papers, Finance with 14
papers, Culture, and Women with 13 papers each. These represent the studied at the top of the
frequency table. However, there are a further 43 topics that are the major topic area of research
contained within from nine studies to just one or two.
Table 3
FBR ARTICLES BY TOPIC 1998 – 2011, CONCEPTUAL OR EMPIRICAL
BY INCIDENCE
Topic/Theory
Total
Empirical
Conceptual
Succession
63
47
16
Governance
21
18
3
Commitment
16
14
2
Finance
14
9
5
13
Culture
13
9
4
Women
13
11
2
Ownership
9
8
1
Theory Building
8
3
5
Relationships
7
6
1
Consulting
6
1
5
Control
5
5
-
Family Business Field
5
2
3
Power
5
4
1
Firm Performance
4
3
1
Market Orientation
4
4
-
Accounting
3
3
-
Estate Planning
3
1
2
New Venture Creation
3
2
1
Auditing
2
1
1
Entrepreneurial Orientation
2
2
-
Family Branding
2
1
1
Internationalization
2
2
-
Mergers and Acquisitions
2
2
-
Values
2
1
1
Work-Family Balance
2
-
2
Board Of Directors
1
1
-
Business Strategy
1
1
-
Cycle of Trust
1
-
1
Downsizing
1
1
-
Earnings Management
1
1
-
Entrepreneurial Behavior
1
1
-
Ethical Intensity
1
1
-
Ethnicity
1
-
1
Evolutionary Psychology
1
-
1
F-PEC Scale
1
1
Family Orientation
1
-
1
Growth
1
1
-
Incidence
1
1
Journal Review
1
-
1
Leadership
1
1
-
Life Insurance
1
-
1
14
Non-Family Managers
1
-
1
Possession Attachment
1
-
1
Professionalism
1
1
-
Public Policy
1
-
1
Role Salience
1
1
-
Identification & Salience
1
-
1
Trust
1
-
1
Valuation
1
-
1
Major Theories
The incidence of theories contained within the published papers in FBR over the period
1998 to 2011, is shown in Table 4. The most commonly discussed theories are Agency Theory
which was the major theory or topic in a total of 39 articles. Of these, 31 (79%) were empirical
and 8 (11%) conceptual. Family Capital Theory which includes human, social and financial
capital, was the principal or sole theory in 17 studies, and almost equally split between
empirical and conceptual studies. RBV was contained in 13 studies, 70% empirical and only
30% conceptual whereas systems theory was found in 10 studies, half empirical and half
conceptual. Stewardship Theory, was present in 8 studies, 88% empirical and only one study
conceptual. These five main theoretical areas were found in 87 studies published in the FBR
between 1998 and 2011. The remaining 16 theories were found in 19 studies.
Table 4
FBR ARTICLES BY THEORY1998 – 2011,
CONCEPTUAL OR EMPIRICAL BY INCIDENCE
Topic/Theory
Total
Empirical
Conceptual
Agency Theory
39
31
8
Family Capital Theory
17
9
8
Resource-Based Theory
13
9
4
Systems Theory
10
5
5
Stewardship Theory
8
7
1
Grounded Theory
3
3
-
Social Identity Theory
2
2
-
Behavioral Theory
1
1
-
Bibliometric Theory
1
1
-
Corporate Identity Theory
1
1
-
Cultural Theory
1
1
-
Evolutionary Theory
1
-
1
Holistic Systems Theory
1
1
-
Institutionalization Theory
1
1
-
15
Organizational Life Cycle Theory
1
1
-
Personality Theory
1
1
-
Self-Efficacy Theory
1
1
-
Stage Model Theory
1
1
-
Stakeholder Theory
1
-
1
Transactional Cost Theory
1
-
1
Transformational Leadership
Theory
1
1
-
CONCLUSION
This comprehensive review of studies in the FBR, over a 14 year period, shows that the
field is advancing in scope and rigor. Findings show that empirical articles dominate and use a
variety of research methods. The majority of articles are written by academics in the United
States and concern US firms. However, a good indication of growth in Family Business
research is the increasing number of countries where data is taken from. It is important to
continue to study new regions for a better understanding of the field.
Agency theory continues to dominate as the most popular theory. Family capital theory
is the second most discussed theory followed closely by RBV, Systems, and Stewardship
Theory. There are, however, a broad range of theories that are finding their way into the FBR
papers. Through the analysis of theories, shown in Table 4, there are 14 theories that appear
once in the journal. These theories tend to be from more recent papers. This trend shows that
authors are starting to find new theories to bring into the field that have not previously been
discussed, therefore, further advancing the field.
In terms of topics the succession process is the most popular but interest has been
broadened to include many more business and family related issues. In terms of the
advancement of the field, the incidence of Succession in articles is not a good sign. In order for
the field to progress, other topics need to be focused on and developed. Through the analysis of
topics, shown in Table 3, there are 24 topics that appear once in the journal. These topics are
from more recent papers, which could be seen as a good sign. This trend, just as with new
theories, shows that authors are starting to find new topics to bring into the field that have not
previously been discussed, therefore, also advancing the field.
There is an increasing emphasis on theory building in all areas of family business. This
growing emphasis on theory building is a significant achievement in the field of family
business, which began with case study approaches.
If we consider conceptual papers, they are very commonly about succession topics,
while the theories in conceptual papers tend to talk about Agency, Family Capital, Systems and
RBV. If we examine the balance between scholars conceptualizing about a topic(s) or theory(s)
or topics and theories, we can see some interesting trends. Further analysis will be required to
determine whether the conceptualizations precede, or follow the papers, that investigate the
topic or utilize the theory. However, it appears that conceptualization papers are clustered in
16
large numbers alongside the empirical papers by topic and theory. Scholars need to encourage
greater diversity in topic by developing conceptualizations that can then lead to good empirical
studies in new topic areas, utilizing new theoretical frameworks.
In conclusion, one of the most important trends observed is that the topics and theories
are being brought from other fields into Family Business. Another important trend is the focus
on family aspects of business rather than business interactions. Our findings are a useful tool
for determining future research questions, theoretical frameworks and associated methodology.
Also, we provide useful information for researchers, students and family business advisors.
Overall, this research has importance for summarizing past research and indicating future
directions.
REFERENCES
Astrachan, J.H. (2008). Editorial notes, Family Business Review, 21(4), 5.
Astrachan, J.H., & Shanker, M. C. (2003). Family businesses’ contribution to the U.S. economy: A closer look.
Family Business Review, 16(3), 9-26.
Bird, B., Welsch, H., Astrachan, J.H., & Pistrui, D. (2002). Family Business Research: The evolution of an
academic field. Family Business Review, 15(4), 337-350.
Bourdieu, P. (1986). The Forms of Capital, in The Handbook of Theory and Research for the Sociology of
Education. Ed. J. G. Richardson. New York: Greenwood Press, 241-258.
Cabrera-Suarez, K., Saá-Pérez, P. & Garcia-Almeida, D. (2001). The succession process from a resource- and
knowledge-based view of the family firm. Family Business Review, 14(1), 37-46.
Casillas, J. & Acedo, F. (2007). Evolution of the intellectual structure of family business literature: A bibliometric
study of FBR. Family Business Review, 20(2), 141-162.
Chrisman, J.J., Chua, J.S. & Sharma, P. (1998). Important attributes of successors in family business. Family
Business Review, 11(1), 19-34.
Chrisman, J.J., Kellermanns, F.W., Chan, K.C., & Liano, K. (2010). Intellectual foundations of current research in
family business: An identification and review of 25 influential articles. Family Business Review, 23(1),
9-26.
Chua, J.H., Chrisman, J.J. & Sharma, P. (2003). Succession and nonsuccesion concerns of family firms and
agency relationship with nonfamily managers. Family Business Review, 16(2), 89-107.
Coleman, J.S. (1988). Social capital in the creation of human capital, American Journal of Sociology, 94, 95-120.
Danco, L. (1982). Beyond survival. Cleveland: The University Press, Inc.
Davis, P.S. & Harveston, P.D. (1998). The influence of family on the family business succession process: A
multi-generational perspective. Entrepreneurship Theory and Practice, 22(3), 31-54.
Davis, S. (1968). Entrepreneurial succession. Administrative Science Quarterly, 13, 403-416.
17
Debicki, B.J., Matherne, C F. III, Kellermanns, F.W., & Chrisman, J.J. (2009). Family business research in the
new millennium: An overview of the who, the where, the what, and the why. Family Business Review,
22(2), 151-166.
Dunn, B. (1999). The family factor: The impact of family relationship dynamics on business-owning families
during transitions. Family Business Review, 12(1), 41-60.
Dyer Jr, W.G., & Sanchez, M. (1998). Current state of family business theory and practice as reflected in family
business review 1988 – 1997. Family Business Review, 11(4), 287-295.
Field, J. (2003). Social Capital, London: Routledge.
Gersick, K.E., Davis, J.A., McCollom Hampton, M. & Landsberg, I. (1997). Generation to generation: Life cycles
of the family business. Boston: Harvard Business School Press.
Gersick, K.E., Landsberg, I., Desjardins, M. & Dunn, B. (1999). Stages and transitions: Managing change in the
family business. Family Business Review, XII(4), 287-298.
Habbershon, T.G. & Williams, M.L. (1999). A resource-based framework for assessing the strategic advantages
of family firms. Family Business Review, XII(1), 1-26.
James, A.E., & Jennings, J.E. & Breitkreuz, R.S. (2012). Worlds Apart?: Rebridging the Distance Between
Family Science and Family Business Research. Family Business Review 25(1), 87-108.
Kuhn, T. (1970). The Structure of Scientific Revolutions. Cambridge, M.I.T. Press
Litz, R.A., Pearson, A.W. & Litchfield, S. (2012). Charting the future of family business research: perspectives
from the field. Family Business Review, 25(1), 16-32.
Menzies, T.V. (2009, August). Entrepreneurship and the Canadian Universities: Report of a National Study of
Entrepreneurship Education 2009, St. Catharines, ON: Brock University, 94pp. (ISBN 978-0-96835395-0)
Mustakallio, M., Autio, E. & Zahra, S.A. (2002). Relationed and contractual governance in family firms: Effects
on strategic decision making. Family Business Review, 15(3), 205-222.
Poza, E.J. & Daugherty, M.S. (2014). Family Business, (4th Edn.). Mason, Ohio: South-Western, Cengage.
Putnam, R. D. (1995). Bowling Alone: America’s declining social capital, Journal of Democracy, 6, 65-78.
Sharma, P. (2004). An overview of the field of family business studies: Current status and directions for the
future. Family Business Review, 17(1), 1–36.
Sharma, P., Chrisman, J.J., & Gersick, K. E. (2012). 25 years of family business review: reflections on the past
and perspectives for the future. Family Business Review, 25(1), 5-15.
Tsai, W.H., Hung, J., Kuo, Y. & Kuo, L. (2006). CEO tenure in taiwanese family and nonfamily firms: an agency
theory perspective. Family Business Review, 19(1), 11-28.
Vilaseca, A. (2002). The shareholder role in the family business: conflict of interests and objectives between
nonemployed shareholders and top management team. Family Business Review, 15(4), 299-320.
18
Woolcock, M. (1998). Social capital and economic development: toward a theoretical synthesis and policy
framework. Theory and Society, 27, 151-208.
Woolcock, M. (2001). The place of social capital in understanding social and economic outcomes. Canadian
Journal of Policy Research, 2(1), 1-17.
Yu, A., Lumpkin, G.T., Sorenson, R.L. & Brigham, K.H. (2012). The landscape of family business outcomes: a
summary and numerical taxonomy of dependent variables. Family Business Review, 25(1), 33-57.
Zahra, S. A., & Sharma, P. (2004). Family business research: a strategic reflection. Family Business Review,
17(4), 331-346.
Zahra, S.A. (2005). Entrepreneurial risk taking in family firms. Family Business Review, 18(1), 23-40.
19
CONNECTING WITH STUDENTS THROUGH
FACEBOOK: THE IMPACT OF CREATING A SOCIAL
MEDIA MARKETING PLAN FOR ACADEMIC
LIBRARIES
Chelsea Lorenz
Wartburg College
ABSTRACT
The expansion of technology in academic libraries and the decrease in physical items
needed or available reveals the movement toward service-based organizations, where
marketing and reaching out to users through social media may be useful in order to stay
relevant for college students. This analysis examines the impact of integrating a marketing
plan focused on social media in academic libraries, and explores the idea of marketing and
outreach becoming more of a necessity as academic libraries transition to service-based
organizations. Examining the current library trends indicates an opportunity for academic
libraries to better cater to the needs and wants of users through developing marketing plans.
Although marketing plans are generally associated with for-profit businesses, the basic
components can be applied to non-profit organizations, and specifically academic libraries.
Social media, and especially Facebook, may act as a promotional and communication tool to
connect with students. After reviewing the benefits of using Facebook in an academic library
setting including communication, cost effectiveness, and brand awareness, as well as the
negative aspects including negative attitudes, time, and communication challenges, it is evident
that integrating Facebook into a marketing plan within an academic library is an achievable
goal. Success is dependent on several key factors including training staff to effectively use
Facebook, making sure enough time is given to develop the page, and continually finding ways
to best connect with students in a reliable, convenient way. Flexibility and adaptation are also
necessary in staying current with college students, as social media is constantly changing and
improving.
INTRODUCTION AND BACKGROUND
As technology changes and develops, academic libraries face decisions regarding
marketing and outreach to students (ACRL, 2012). Today’s library is about more than just
physical books and items available. Many items such as journal articles, newspapers, and
statistics are now available online through databases and may be accessed with minimal effort.
Search engines such as Google provide access to almost unlimited amounts of information.
Libraries, and the information available to its users, have changed significantly over history
(ACRL, 2012).
The expansion of technology in academic libraries and the decrease in physical items
needed or available reveals the movement toward service-based organizations, where
marketing and reaching out to users through social media may be useful in order to stay
20
relevant for college students. For the purposes of this analysis, it is important to review the
definition of service organizations. The service sector within a business context includes
individuals and businesses that produce services instead of physical goods (Scott, 2009).
Within the United States, the service sector includes education, finance, communications,
health care, and many other fields (Scott, 2009). Because libraries are beginning to offer more
services rather than physical items for students, academic libraries fall under the definition of
the service sector. This change poses several questions including: How would the integration
of a marketing plan focused on social media impact academic libraries? Is marketing and
outreach becoming more of a necessity as academic libraries transition to service-based
organizations?
In order to answer these questions, this analysis will look at current academic library
trends, define a marketing plan, and discuss connections of a marketing plan with the trends in
academic libraries. Next, the use of social media, with a focus on Facebook, will be discussed
for college-age students, as well as how Facebook can specifically be applied to marketing
plans. Positive and negative effects of Facebook usage on academic libraries and specific
examples will be provided. Finally, implications and conclusions will be drawn based on the
research provided.
CURRENT ACADEMIC LIBRARY TRENDS
Examining the current library trends will reveal the direction that the library is headed
in the future. Some of the major relevant trends include the expansion of information
technology, user behaviors and expectations, changes or cuts in library budgets, and the
movement toward libraries becoming mostly service-oriented organizations (ACRL, 2012).
The first trend deals with an expansion of information technology. Students constantly
desire to have access to information through social media and technology at any time or place
(ACRL, 2012, p. 313). In a 2011 study of undergraduates, results found that 55% of
undergraduates own smart phones, 62% own iPods, 21% have a tablet. Over two thirds of these
undergraduates use these items for academic reasons. In addition, 59% use these items to get
information online, and 24% access library resources (ACRL, 2012, p. 314). The majority of
students have technology that enables them to access library materials online, with about one
fourth of these undergraduates using these devices to access materials available from library
websites (ACRL, 2012, p. 314). Another technological trend that is affecting libraries is the
increased usage of smart phones. 52% of smart phone owners are 18-29, and 28% of users
utilize their smart phones for most of their online activity (Smith, 2011, p. 6, 14). As students
are moving further toward accessing materials online, libraries are developing new ways to
cater to students’ needs in the future.
Another trend faced by academic libraries focuses on user behaviors and expectations.
Convenience plays a major role in the study usage of library materials and in looking for
information. The current challenge for libraries is to provide immediate information and
sources for research in order to compete with more convenient search engines such as Google
(ACRL, 2012). Students need librarians to be more available through social media, chat and
text services, as these are mediums that students use most often. Because students use more
technological devices, libraries are finding it necessary to provide better access to their
collections and services to students (Breeding, 2012). Mathews explains, “The process begins
21
when we stop pretending that we know what students want and instead genuinely attempt to
understand their needs and preferences – and speak to them in their language” (2009, p. 2).
An additional trend that is affecting academic libraries is the significant changes or cuts
in library budgets. Just as the United States’ economy has been suffering, the overall library
economy also is affected by major budget cuts that may never be completely restored
(Breeding, 2012) Academic libraries continue to reduce hours, decrease purchases of books,
journals and other materials, and also may be forced to lay off staff members (Mantel, 2011).
A combination of the economic recession of 2008 and less funding from the federal level led to
cuts in budgets (Bosch, 2011). During that time period and up until now, serial prices continue
to increase at an alarming rate. Serial prices increased by six percent in 2012, compared to the
2.9 percent increase in the Consumer Price Index (Bosch, 2012). This shows that serials
inflation goes far above general price inflation. In a survey conducted in February 2012, 69
percent of libraries reported that their budgets for the year remained the same or decreased
(Bosch, 2012). Because of increased prices, many librarians have to cut programs or eliminate
the availability of serials to online or print only (Bosch, 2011).
A final important trend in the world of academic libraries is the movement toward
becoming mostly service-oriented organizations. Within the past several years, many articles
and books focus on the topic of marketing within an academic library. The movement from
physical books and materials to eBooks and journal articles found through online databases
demonstrates a change in the focus of the academic library, especially as students’ needs
change as well. As of 2010, 21% of college students demand an increase in customer service,
while 29% of students request that services be added or updated (OCLC). More often, students
need guidance to find credible information. 43% of students recognize that information from
libraries is more credible than from search engines, however, 83% of students begin their
information search on search engines (OCLC, 2010). Search engines such as Google Scholar
also often limit what access is available to informational articles. For example, an article found
on Google Scholar may cost $20 to access, while it may be accessed through a library database
for free. As books are becoming less prominent in libraries, the service of helping students find
credible and trustworthy sources of information becomes more important.
These current library trends indicate a movement of academic libraries toward servicebased organizations where reaching out to users through the use of technology is becoming
more important. Creating a marketing plan provides an opportunity for academic libraries to
better cater to the needs and wants of users.
DEVELOPING A MARKETING PLAN
A marketing plan should fit in with the strategic plan of the organization as a whole.
Once an organization has established a strategic plan and analyzed the environment, then a
marketing plan may begin to take form. A marketing plan consists of situation analysis, market
segmentation, selecting a market strategy or strategies, and finally analyzing the market mix of
the decision (Bangs, 1998).
In the case of an academic library, a marketing orientation is best defined as “the
adoption by an organization of a customer focus” (Robinson, 2011, p. 6). Creating a customer
focus and truly becoming market oriented requires the establishment of a marketing plan. A
marketing plan not only creates a customer focus, but also becomes integrated into the overall
strategic planning process (Robinson, 2011). Rowe explains that marketing “entails a process
22
of creating an effective exchange relationship between the products and services of a library
and its current and potential users” (2009, p. 37).
The first step is to examine the environment through situational analysis. It is important
to realize that the environment affects the success of marketing programs within an
organization (Rowe, 2009). Situation analysis evaluates the organization, customers,
competitors, and the external and internal environment (Bangs, 1998). This begins by looking
at the specific goal and analyzing the individual products and services offered (Bangs, 1998).
Next, the customers are evaluated to discover how they perceive the organizations’ value of
products and services. This is important because an organization must know how products or
services are perceived in order to make the good marketing decisions (Bangs, 1998).
Competitors are also evaluated in order to learn about their strengths and weaknesses, as well
as find a way to hold the competitive advantage (Bangs, 1998). The assessment of the external
environment looks at political, economic, social, and technological aspects and the positive or
negative impacts on the organization. An assessment of the internal environment within the
organization provides a clear picture of the organization’s current position and ways in which it
can improve. The SWOT analysis technique assesses the internal strengths and weaknesses, as
well as the existing external opportunities and the threats faced (Rowe, 2009). The
environmental analysis provides an overview of what is happening within and outside of the
organization, which in turn aids in defining specific marketing strategies.
Once the external and internal environments of the organization are assessed, market
segmentation may take place. This can be the most controversial and difficult part of the plan,
because it requires identifying specific customers that will most likely respond to the
organization’s products or services (Rowe, 2009). The market may be split based on
geographics, psychographics (a customer’s inner-feelings and tendency to behave in certain
ways), or demographics such as age, gender, income-level, occupation, and so on (McDonald,
2009). In the case of academic libraries, sample segments may consist of first generation
college students compared to other students, faculty compared to students, or segments
comparing students based on years in college (Rowe, 2009).
The next step is to develop a marketing strategy based on looking at the situational
analysis and market segmentation. Once a strategy is chosen, the marketing mix is analyzed,
which includes product/service, price, place, and promotion (Bangs, 1998). Products and
services are analyzed for their benefits to customers as well as perceived value. Pricing
strategy is evaluated, especially focusing on market penetration and the market’s sensitivity to
price changes. Place is analyzed based on location, physical or virtual, of the organization.
Finally, promotion is examined for advertising, public relations, promotional programs, and the
budget for marketing related expenses (Bangs, 1998).
Although marketing plans are generally associated with for-profit businesses,
these basic components can be applied to non-profit organizations, and specifically academic
libraries (Rowe, 2009).
CONNECTIONS OF MARKETING PLAN WITH ACADEMIC LIBRARIES
Marketing within the setting of an academic library is not a new concept. However, the
idea has faced criticism mostly from librarians. In order to show the current use of marketing
in academic libraries, this section will discuss the past and present uses of marketing compared
23
to the business marketing plan, the obstacles and challenges faced by developing a marketing
plan, and current marketing plans present in academic libraries.
There has been an increased interest in marketing within academic libraries, especially
after the International Federation of Library Associations and Institutions developed a new
section on Management and Marketing in 1997 (Parker, 2007). Many academic libraries have
started to use marketing techniques, but can their objectives and goals be considered part of a
marketing plan? According to Parker, very few libraries have reached a marketing orientation,
as marketing is viewed as a set of tactical activities instead of part of the overall strategic
perspective. Also, marketing is seen as having an external and competitive focus, which
according to some librarians is not appropriate in an academic library environment (Parker,
2007).
Marketing techniques and strategic plans are often interconnected, and marketing
strategies are developed, but without necessarily following the structure of a marketing plan.
For example, the George T. Harrell Health Sciences Library outlined a new mission and core
values. The library also completed a SWOT analysis and developed a five-year strategic plan.
However, the library did not follow a marketing plan, but instead merely developed a few
marketing strategies (Robinson, 2011). Rowe and Britz provide a more detailed framework for
developing a marketing plan directly related to academic libraries. The components of a
marketing plan according to Rowe and Britz include a statement of mission, situational
analysis, market analysis and segmentation, developing a marketing strategy, and analyzing the
marketing mix (2009). The marketing mix is defined using the 4C’s instead of the 4P’s:
customer value, convenience for the user, cost to the user, and communication (2009). The
4C’s appear to cater more toward service-based organizations, rather than businesses that
primarily market products. However, there are many similarities between the two concepts. For
example, customer value corresponds to product and cost to the user corresponds directly with
price. Convenience and communication cater more specifically to services rather than
products, but correlate directly to place and promotion. The 4C’s provide a model of the
marketing mix that directly relates to marketing plans for libraries, but it appears to be one of
the few articles available on the subject.
When developing a marketing plan, academic libraries face challenges and obstacles,
especially as this is a fairly new idea to be applied in a library setting. One major obstacle is
pushing past librarians’ attitudes toward introducing marketing into an academic library
setting. Many librarians do not fully support the idea of marketing and also do not have an
understanding of what marketing involves (Parker, 2007). In a study of librarians from
different settings, the college and university libraries had the lowest positive marketing
attitudes compared to public, school, and special libraries (Parker, 2007). Another barrier is
librarians viewing staff expertise to be more important than students’ perceived needs. In this
case, librarians develop more of a selling orientation rather than a marketing orientation
(Parker, 2007). Lastly, most librarians do not have a business background, so have a limited
involvement with and understanding of marketing (Parker, 2007). Because of these obstacles,
libraries have not fully embraced using a marketing plan as a tool to better serve students’
needs.
Within a marketing plan for academic libraries, one promotional or communication tool
that may be used is Facebook and social media. Before applying Facebook to the use of a
marketing plan within an academic library, it is important to examine the current trends in
social media usage, especially for college-age students.
24
THE USE OF SOCIAL MEDIA AND FACEBOOK BY COLLEGE-AGE STUDENTS
The use of social media by college students has significantly increased over the past
several years (Rosa, 2010). In recent years, social media has begun to be interconnected with
social networking because of the blend between sites such as Facebook and Twitter with media
such as YouTube. Social networking sites including MySpace, Facebook, and Twitter provide
students with the ability to communicate with others through the medium of the Internet.
Social networking may best be defined as, “web-based services that allow individuals to
construct a public or semipublic profile within a bounded system, articulate a list of other users
with whom they share a connection, and view and traverse their list of connections and those
made by others within the system” (BRASS, 2011). In essence, students connect with other
users, which usually consist of family, friends, or acquaintances, and may even include
businesses or groups. Over the past several years, there has been a significant increase in the
usage of social media, especially for college-aged individuals. It is essential to explore the
trends in social media, as well as introduce Facebook as a medium for use in a marketing plan.
One of the major trends includes using social media for academic purposes. In a study
completed by California State University San Marcos (CSUSM), results found that 90% of
students that had both a MySpace and Facebook page used it to communicate with other
individuals about classes, school, or professors (Chu, 2008). This recent trend indicates that
college students do not merely use social networking for personal reasons, but also for
coursework.
Another trend includes that social media is used by businesses as a way to reach out to
the community. Khan (2012) states that social media allows businesses and organizations to
inform individuals in the community with information they need through a very convenient
and accessible medium. Individuals that may not actively seek out information are instead
provided with an easier way to find answers. Mansfield (2012) adds that if an organization
does not have a presence on a social networking site such as Facebook, then it is virtually
nonexistent with the hundreds of millions of people that utilize the site worldwide.
A final important trend to note is the movement toward using social media from mobile
devices. With the huge increase in the ownership of smartphones, more often individuals are
utilizing mobile social networking tools, location-based communities, or photo-sharing
applications (Mansfield, 2012). Because of this, organizations are beginning to modify
outreach to include marketing to individuals through mobile applications. For example, more
people on Facebook use the site from mobile devices than desktops. Facebook also has a
location-based service that was launched in 2012 where users can check in their smartphones
to indicate where they are located (Mansfield, 2012). Morgan Stanley analysts predict that
mobile internet users will outnumber internet desktop users by 2015, numbering up to 1.6
billion users (Meeker, 2010).
One of the most popular social networking sites is Facebook. Following are some of the
reasons why Facebook is appropriate for use in a marketing plan within an academic library
setting. These reasons include Facebook’s outreach to users around the world, the trends in
demographics, and the way that individuals utilize Facebook.
Since launched in 2006, Facebook now reaches over one billion monthly active users
(One Billion, 2012). The site has also expanded to mobile users. As of September 2012, 600
million Facebook users accessed the site through mobile devices (One Billion). As a result,
Facebook now reaches more individuals than any other social networking site. The Pew
25
Research Center found that 92% of social networking site users are on Facebook, which is an
overwhelming majority (Rainie, 2011). Of these users, about 52% utilize the site every day.
Over time, the median age of Facebook users has decreased from 26 in August of 2008 to 22 in
September of 2012 (One Billion), which indicates that the majority of users fall into the
category of college-age individuals. More specifically, according to a current Gallup poll, 73%
of adults ages 18-29 have a Facebook page (Morales, 2011). It is evident from these statistics
that many college students use Facebook to stay connected to others, often using the site daily.
Now that it is evident that college-age individuals utilize Facebook often, the question
remains about how Facebook is utilized. In a normal day, 15% of Facebook users update their
status, 22% comment on another’s status, 20% comment of photos uploaded by users, 26%
“like” others’ content, and 10% send private messages (Rainie, 2011). This indicates that
students utilize Facebook for a variety of reasons, which shows that there are many ways that
libraries can connect with students and market services.
THE APPLICATION OF FACEBOOK TO MARKETING PLANS IN AN ACADEMIC
LIBRARY SETTING
Now that the current trends in social media and specifically Facebook have been
discussed, it is important to investigate how Facebook can be applied to a marketing plan,
especially within an academic library setting. This section will discuss how Facebook can be
applied to the marketing plan described previously, within the categories of situation analysis,
market segmentation, selecting a market strategy, and finally analyzing the market mix of the
decision.
The first aspect of a marketing plan is completing situational analysis through the use
of SWOT and PEST analysis to examine the external and internal environment. An academic
library may look specifically at the internal strengths and weaknesses of using social
networking, as well as opportunities and threats provided by this specific technology. For
example, the previous examination of trends in social media revealed a movement toward
individuals utilizing Facebook in an academic setting. Also, because of Facebook’s widespread
popularity, this may indicate a great opportunity for academic libraries. However, there may
also be threats such as the time and knowledge needed to keep up with current technology
trends, as well as other networking sites such as Twitter that provide competition to Facebook.
It is also important to investigate the role of the library as a whole as related to the
environment. According to Woodward (2009), this includes how the library fits into the
academic community, the attitudes of the college administration toward the library, and the
needs of users. PEST analysis examines political, economic, social, and technological aspects,
which are important to think about in relation to the use of social media within a library.
Environmental conditions are important to analyze in order to give a clear picture of the library
and its surroundings, as well as provide a picture of the future, and what challenges the library
may face (Woodward, 2009). Libraries may also examine the social media accounts of other
similar libraries in order to see what types of posts are successful, how often people post on
their wall, and how many fans or followers the library has (Petit, 2011).
Facebook may also be incorporated into market segmentation. Besides examining
geographics, psychographics, and demographics, a library specifically may examine the usage
of Facebook or social media and openness to connecting with the library for academic
purposes, as well as information literacy skills (Rowe, 2009). An academic library may
26
subdivide the market into categories based on the diverse needs of beginning undergraduate
students, graduate students working on dissertations, faculty members, and community
members (Woodward, 2009). Determining what users need will help to provide the most useful
content. For example, Mathews (2009) recommends to not just create a storefront to sell library
products, but instead to integrate helpful library staff into the social network in order to
respond and promote library services as students need them. Defining a specific market
segment helps to focus the content and specific goals and objectives of the Facebook page.
According to current social media trends discussed previously, the market segment that may be
most successful for Facebook is focusing on undergraduate students, especially within their
first year.
Once a specific market segment is chosen, then the academic library may define a
market strategy. Within the overall market strategy, Facebook may be used as a promotional
and communicational tool with students by promoting library services, reaching a certain level
of “likes”, increased usage of library products such as databases, and many others. Other
specific objectives could include encouraging and facilitating the participation of users in the
services offered by the library, improving user experience, increasing the visibility and positive
image of the library (Mathews, 2009). Also involved in developing Facebook as a promotional
tool within a marketing plan is deciding who will be responsible for the social media outreach
as a whole or how tasks will be divided, what tools will best be utilized to fulfill objectives,
and managing the online communication with users (Romero, 2011). However, within an
academic library setting, marketing components should be flexible, especially with the rapid
development of technology (Romero, 2011).
Finally, the marketing mix is analyzed once Facebook or social media presence is
established and tactics are evaluated for their effectiveness. The marketing mix is defined by
businesses as the 4Ps, which consist of product, price, place and promotion. However, in
nonprofit organizations and specifically libraries, another definition of the marketing mix
consists of the 4Cs, which include customer value, convenience for the user, cost to the user,
and communication. Within a marketing plan focused on utilizing Facebook, customer value
may be evaluated through surveys and specifically examining what type of social media users
currently use as well as what the users are currently saying about the library and social media
(Petit, 2011). Convenience for the user may be examined by looking at students’ views on
social media within a library setting and how the social media will make student requests and
questions easier and more convenient to answer (Petit, 2011). Facebook has no cost to the user,
which makes it a good option in this category. Finally, if Facebook is utilized effectively then
communication will be improved between students and librarians (Petit, 2011).
A marketing plan provides a framework for the adoption of Facebook into the academic
library. Going through the process to create a marketing plan helps to provide a written plan to
follow in order to fulfill objectives and tasks in an organized way, as well as provide a
continual reminder of the market strategy (Romero, 2011). However, flexibility is crucial as
technology constantly changes and academic libraries may find more effective ways to reach
out to students.
POSITIVE EFFECTS OF FACEBOOK USE ON ACADEMIC LIBRARIES
After reviewing the use of Facebook specifically in marketing plans for academic
libraries, it is evident that using social media provides both positive and negative impacts on
27
the academic library as a whole. Facebook usage positively affects libraries through increasing
communication with students, providing a cost effective way of marketing available services,
and increasing brand awareness.
Communication
One benefit of using Facebook within a marketing plan for an academic library is
increasing communication between librarians and students. Chu (2008) explains that social
networking sites allow students a more convenient and less risky way to ask librarians for help.
Librarians also become more visible, approachable, and relatable to students (Mathews, 2009).
Facebook can act as an extension of the library webpage rather than a substitute, which allows
students to access the same information, but from a site that they are more comfortable with
(Mathews, 2009). Adding a Facebook page may also strengthen ties between librarians and
students, as well as establish new connections (Chu, 2008). Marketing goes far beyond
advertising, as students often look for authenticity and content right at the time they need it,
which is another positive impact of utilizing Facebook within academic libraries (BRASS,
2011).
Cost Effectiveness
An additional benefit of Facebook is that it is a cost effective marketing tool. Any
library can easily create a Facebook account at no cost besides staff time to maintain the site,
and the technology is easy to use (Petit, 2011). Facebook advertisements may also be used as
another marketing tool at a low-cost and effective approach at targeting specific market
segments (Chu, 2008).
Brand Awareness
Another positive impact of utilizing Facebook is increasing brand awareness and
establishing an online presence that relates to college students. Social networking sites such as
Facebook may be used as a way to promote library services and events, as well as establishing
a known image or brand for the library (Chu, 2008). Additionally, Facebook can easily be
integrated with other marketing tools such as e-mail, newsletters, and websites (BRASS,
2011). Libraries can also utilize Facebook to promote certain available services. For example,
The University of Michigan Libraries at Ann Arbor developed a catalog application along with
a JSTOR database search tool (Mathews, 2009). Other apps that may be used for Facebook
include note-sharing software, group project planning tools, and citation tools (Mathews,
2009). Although academic libraries have a captive audience, it is important to retain interest
and further connect to students.
One example of social media success within libraries is the New York Public Library
menu project. In April 2011, the library began recruiting volunteers to help upload 10,000
menus digitally from its historical restaurant menus collections to make the menus searchable
through the catalog. The project was promoted only through social media sites such as
Facebook and Twitter. After 3 months, volunteers were able to transcribe over 450,000 dishes
from 8,500 menus (Petit, 2011). This is one of the best examples of how a library can utilize
social media to promote library services or projects.
28
NEGATIVE EFFECTS OF FACEBOOK USE ON ACADEMIC LIBRARIES
Although there are many positive impacts of establishing a social media presence
through Facebook in an academic library setting, librarians face several challenges and
negative effects. The most significant challenges include overcoming the negative attitudes of
librarians, the time needed to implement and continually update social media, and being able to
successfully connect with students.
Negative Attitudes
One of the major challenges currently faced by libraries is overcoming the often
negative attitudes that library staff have toward marketing and social media within the context
of the library. Marketing is not a new concept within an academic library setting, but very few
libraries have fully achieved a marketing orientation that involves creating a detailed marketing
plan (Parker, 2007). One quote that best summarizes the negative attitudes explains:
All too often the concept of marketing leaves a bad taste in the mouths of librarians.
We associate it too much with for-profit institutions, the process of making money for
money’s sake, and the efforts to convince people to use unneeded services or products.
(p. 322)
Often librarians view a marketing orientation as implying an external and competitive focus
(Parker, 2007). Because of this, library marketing has often been limited to short-term
marketing activities. As a result, libraries have not been able to move past the outdated brand
image of libraries being seen as merely storehouses of books (Parker, 2007).
Time
Another significant challenge faced by libraries when creating a Facebook profile is to
have enough time to continually update and utilize the technology with a successful outcome.
One indirect cost faced by utilizing Facebook includes staff time to maintain the site (Petit,
2011). The time spent on social media may take away from other important activities. Library
staff members are often overbooked with daily schedules that do not allow flexibility to make
time to update social media (Parker, 2007). Social networking also often takes time to catch the
attention of students, which may discourage those who are developing the Facebook page
(Petit, 2011).
Communication with Students
The final challenge to libraries is successfully communicating with students through
Facebook. Even when a library’s Facebook page has many fans, there is not a guarantee that
users will utilize the site to make requests or ask reference questions (Petit, 2011). Also,
libraries may develop great marketing plans for Facebook, but they must follow through and
provide interaction and feedback continually in order to continue to receive benefits (BRASS,
2011). In the past, most library decisions about programs, services and collections available
have been made based on staff expertise rather than users’ needs.
29
IMPLICATIONS AND CONCLUSIONS
This analysis examined several questions including: How would the integration of a
marketing plan focused on social media impact academic libraries? Is marketing and outreach
becoming more of a necessity as academic libraries transition to service-based organizations?
In order to answer these questions numerous issues were examined including current library
trends, the development of a marketing plan and its use within an academic library setting,
social media trends, and finally the positive and negative impacts of integrating Facebook and
social media into a marketing plan for an academic library.
The top four current trends within academic libraries include the expansion of
information technology, user behaviors and expectations, changes or cuts in library budgets,
and the movement toward libraries becoming mostly service-oriented organizations. These
current library trends indicate a movement of academic libraries toward service-based
organizations where reaching out to users through the use of technology is becoming more
important. Creating a marketing plan provides an opportunity for academic libraries to better
cater to the needs and wants of users.
A marketing plan consists of situation analysis, market segmentation, selecting a
market strategy, and finally analyzing the market mix of the decision. Although marketing
plans are generally associated with for-profit businesses, these basic components can be
applied to non-profit organizations, and specifically academic libraries. Currently within the
academic library, marketing techniques and strategic plans are often interconnected, and
marketing strategies are developed, but without necessarily following the structure of a
marketing plan. Marketing is not a new topic within libraries, but most libraries do not fully
develop a marketing plan to guide their actions. Marketing plans within an academic library
setting also face criticism as many librarians have negative attitudes toward the subject.
Another current trend within the academic library is the use of social media. Facebook
specifically is now being used by libraries as a marketing tool, but is rarely integrated into a
marketing plan. Social media trends include using social media for academic purposes, using
social media to reach out to the community, and the movement toward using social media from
mobile devices. Because the majority of college students utilize Facebook on a daily basis, this
specific form of social networking may be applied to a marketing plan. Before utilizing
Facebook as a marketing tool, it is important to follow the steps of a marketing plan in order to
analyze the internal and external environment in regards to social media as well as choose a
specific strategy with certain objectives and goals. From the research provided, it is evident
that applying Facebook to a marketing plan can be done.
Utilizing Facebook as a marketing tool within an academic library provides both
positive and negative consequences. Facebook usage positively affects libraries through
increasing communication with students, providing a cost effective way of marketing available
services, and increasing brand awareness. Some of the challenges or barriers that affect
academic libraries include overcoming the negative attitudes of librarians, the time needed to
implement and continually update social media, and being able to successfully connect with
students.
After examining the evidence, one can conclude that integrating Facebook into a
marketing plan within an academic library is an achievable goal, however many obstacles may
get in the way throughout the process. Success is dependent on several key factors including
training staff to effectively use Facebook, making sure enough time is given to develop the
30
page, and continually finding ways to best connect with students in a relatable, convenient
way. As seen by previous examples, when a library fails to address these challenges, Facebook
is not as successful.
One final question remains: How can success of social media use within an academic
library be measured? The extent of a fan base on a Facebook page does not necessarily indicate
success. Instead, utilizing surveys and questionnaires to receive continual feedback may be an
effective way to create a successful Facebook page that is able to meet continually changing
and fluctuating students’ needs. If Facebook usage is tied to a strategic goal then it will also be
easier to measure. Flexibility and adaptation to change are key in staying current with college
students. Social media is constantly changing and improving, which means that libraries will
need to monitor what medium best serves students’ needs. In future years, Facebook may be
obsolete, so libraries need to be familiar with current trends.
REFERENCES
ACRL Research Planning and Review Committee. (2012). 2012 top ten trends in academic libraries. College &
Research Libraries News. 73(6), 311-320.
Bangs, D. (1998). The market planning guide: Creating a plan to successfully market your business, product, or
service (5th ed.). Chicago, IL: Upstart Publishing Company.
Bosch, S., Henderson, K., & Klusendorf, H. (2011). Under pressure, times are changing. Library Journal, 136(8),
30-34.
Bosch, S., & Henderson, K. (2012). Coping with the terrible twins. Library Journal, 137(8), 28-32.
BRASS Program Planning Committee. (2011). The business of social media: How to plunder the treasure trove.
Reference & User Services Quarterly, 51(2), 127-132.
Breeding, M. (2012). Agents of change. Library Journal. 137(6), 30-36.
Chu, M. & Meulemans, Y. (2008). The problems and potential of MySpace and Facebook usage in academic
libraries. Internet Reference Services Quarterly, 13(1), 69-85.
Khan, S., & Bhatti, R. (2012). Application of social media in marketing of library and information services: A
case study from Pakistan. Webology, 9(1).
Mansfield, H. (2012). A how-to guide for nonprofits: Social media for social good. New York: The McGraw-Hill
Companies.
Mantel, B. (2011). Future of libraries: Can they survive budget cuts and digitization? CQ Research. 21(27).
Retrieved
from
http://library.cqpress.com/cqresearcher/document.php?id=cqresrre2011072900&type=hitlist&num=1
Mathews, B. (2009). Marketing today’s academic library: A bold new approach to communicating with students.
Chicago: American Library Association.
McDonald, M., & Dunbar, I. (2010). Market segmentation: How to do it, how to profit from it. Mesa, AZ:
Goodfellow Publishers Unlimited.
Meeker, M., Devitt, S., & Wu, L. (2010). Internet trends [webinar]. Morgan Stanley. Retrieved from
http://www.slideshare.net/krishnade/morgan-stanley-internet-trends-report-2010#btnNext
31
Morales, L. (2011). Google and Facebook users skew young, affluent, and educated. Gallup, Inc. Retrieved from
http://www.gallup.com/poll/146159/Facebook-Google-Users-Skew-Young-Affluent-Educated.aspx
One billion - key metrics. (2012). Retrieved from http://newsroom.fb.com/imagelibrary/
downloadmedia.ashx?MediaDetailsID=4227&SizeId=-1
Parker, R., Kaufman-Scarborough, C., & Parker, J. (2007). Libraries in transition to a marketing orientation: Are
librarians’ attitudes a barrier? International Journal of Nonprofit and Voluntary Sector Marketing, 12,
320-337.
Petit, J. (2011). Twitter and Facebook for user collection requests. Collection Management, 36, 253-258.
Rainie, L., Purcell, K., Goulet, L., & Hampton, K. (2011). Social networking sites and our lives. Pew Research
Center Publications. Retrieved from http://pewresearch.org/pubs/2025/
social-impact-social-networking-sites-technology-facebook-twitter-linkedin-myspace
Robinson, C. (2012). Peter Drucker on marketing: application and implications for libraries. The Bottom Line,
25(1), 4-12. Doi: 10.1108/08880451211229153
Romero, N. (2011). ROI: Measuring the social media return on investment in a library. The Bottom Line:
Managing Library Finances, 24(2). 145-151.
Rosa, C., Cantrell, J., Carlson, M., Gallagher, P., Hawk, J., & Sturtz, C. (2010). Perceptions of libraries, 2010:
Context
and
community.
Dublin,
Ohio:
OCLC.
Retrieved
from
http://www.oclc.org/reports/2010perceptions/2010perceptions_all.pdf
Rowe, J. and Britz, J.J. (2009). Strategies for success: A framework for the development of a marketing plan for
information services. Mousaion, 27(2), 36-50.
Scott, D. (2009). The American heritage dictionary of business terms. Boston: Houghton Mifflin Harcourt.
Smith, A. (2011). 35% of American adults own a smart phone. Pew Research Center. Retrieved from
http://pewinternet.org/~/media/Files/Reports/2011/PIP_Smartphones.pdf
Woodward, J. (2009). Creating the customer-driven academic library. Chicago: American Library Association.
32
A FACTORIAL ANALYSIS OF GENDER AND RANK
ON BUSINESS SCHOOL FACULTY’S SALARIES AS A
GAUGE FOR DISSATISFACTION
Reginald L. Bell
Prairie View A&M University
Robert J. Meier
Fort Hays State University
Wally Guyot
Fort Hays State University
ABSTRACT
Business faculty salaries from 13 institutions of higher learning across 5 states were
collected via collegiatetimes.com, a public salary database. Those data included faculty
members’ gender, rank, and teaching field. A gender difference (p <.01) was found when four
null hypotheses were tested. Chi-square was used to ascertain whether differences existed
between relative frequency of occurrence of male and female faculty and ranks. Two-Way
Analysis of Variance, with a 2 x 4 factorial design, was used to test for main effects and
interaction effects when gender and ranks were the independent variables and salary was the
dependent variable. Although women earn less than men across all academic ranks, the
magnitudes in salary increases were non-significant with an interaction effect of p = .779.
Therefore, female business school faculty might not be subject to more dissatisfaction than men
when salary is used as a gauge for female dissatisfaction. Recommendations are made for the
benefit of business faculty, department chairs, and deans.
INTRODUCTION
University professors differ in many ways from other workers, including highly
educated professional workers. University administrators can devise more effective strategies
for recruiting and retention if they have the knowledge of the determinants of university
professors’ job satisfaction (Johnsrud & Heck, 1994; Seifert & Umbach, 2008; Smart, 1990;
and Weiler, 1985). According to Herzberg, Mausner and Snyderman (1959), and Herzberg
(1964), motivation and dissatisfaction are different factors. Herzberg (1964) included salary
among the list of hygiene factors, i.e., fringe benefits, status, job security, and salary. The
absence of these factors results in dissatisfaction. For example, when fringe benefits, status, job
security, and salary are not present there is more dissatisfaction; however, when they are
present there is less dissatisfaction, but this does not translate into more satisfaction because
satisfaction and dissatisfaction are different constructs, theoretically independent of one
another.
33
With respect to studies in the literature about the impact of hygiene factors in the
workplace, Burke, Duncan, Krall, and Spencer (2005) reported on gender differences in faculty
pay and salary compression. They found that annual fixed-dollar merit increases and similar
starting salaries contributed to comparable salary growth rates for all faculty. However, they
found the male faculty earnings advantage was traced to higher rank and years of service.
Additionally, they found that the literature was divided on whether the often observed lower
pay of senior faculty is deserved. Moreover, they found that merit pay rises with additional
years of seniority and that the seniority penalty was rooted in cost-of-living adjustments that
failed to keep pace with market trends. The findings illustrated how the seniority penalty can
be linked to budget considerations rather than the lower productivity of senior staff.
Renzuilli, Grant, and Kathuria (2006) compared the gender pay gap at predominantly
white institutions (PWIs) with the gap at historically Black colleges and universities (HBCUs).
They found that HBCUs seemed to have a smaller gap but that pay for all faculty at HBCUs
was lower than in PWIs. Secondly, the gap was significantly smaller in the rank of associate
professors. Third, the gap was smaller at the associate rank because men make less money in
HBCUs than they do in PWIs. Fourth, elite HBCUs are more similar to PWIs than to HBCUs
in terms of their gender pay gap. Race, class, and gender effects must be taken into account to
understand patterns of wage equity across these institutions. The greater gender equity at
HBCUs was apparent because of the absence of the “men’s bonus,” which was prevalent in
PWIs and elite HBCUs.
Umbach (2007) studied gender equity in the academic labor market. He found that
faculty in disciplines characterized by relatively low demand, high teaching loads, and low
amounts of research funding earned less than do faculty in other disciplines. Additionally,
after controlling for an array of individual and disciplinary characteristics, women faculty were
found to earn less than their male peers.
Travis, Gross, and Johnson (2009) conducted a case study of faculty salaries at one
university. The results indicated that both regression and simulation methods provided
evidence of a sizable pay gap associated with gender, even after controlling for rank, academic
field, and years of service. The gap occurred in fields traditionally viewed as female as well as
science fields with typically lower female representation.
Bell and Joyce (2011) conducted a study using data made available through the
Missouri Secretary of State’s Office, via its website, to test for differences in salaries as a
hygiene factor among business faculty teaching at ten Missouri State funded universities. OneWay ANOVA tests showed means differed significantly between gender and among ranks,
with p < .01 in most cases. Female faculty overall earned 15% less than their male
counterparts.
However, other research suggests that factors other than race and gender may have a
greater impact on salary. A study by Fairweather (2005) found that in the late 1980s and early
1990s, among all faculty activities, research consistently showed that publishing and other
forms of scholarly productivity were the strongest positive predictors of faculty pay. The
paper reported that after more than a decade of institutional and state policies enacted to
enhance the value of teaching, the results showed that spending more time on teaching still
meant lower pay.
A study by Toutkoushian, Bellas, and Moore (2007) showed that gender, race or
ethnicity, and marital status still mattered in determining faculty salary, but they did not exhibit
34
many interaction effects. In general, faculty of color appeared to have at least achieved parity
with white faculty and may enjoy a salary advantage.
Melguizo and Strober (2007) examined faculty salaries and the maximization of
prestige. Spending more time on teaching was found to have no effect on salary, even in
comprehensive universities and liberal arts colleges. The findings suggested that other types of
institutions were emulating research institutions in their pursuit of prestige. Looking at faculty
salaries through this lens raised serious questions about the implications of the current reward
system in higher education.
Faculty Salaries as Hygiene
According to Balkin and Gomez-Meji (2002), when male management professors
received a smaller pay raise than anticipated, they tended to resign from their positions more so
than their female colleagues. Quitting one’s job over money is clearly a sign of dissatisfaction.
Comm and Mathaisel (2003) found that satisfied employees are important for organizational
performance. They argued that employee satisfaction in higher education regarding workload,
salary, and benefits can be used to improve academic quality; nonetheless, they reported that
among faculty at a private college, most do not believe they are fairly compensated.
A study by Terpstra and Honoree (2004) reported that faculty were most satisfied in
their work and pay when teaching and research are given equal weight. Additionally, they
found that institutions that primarily emphasize teaching fared poorly in terms of faculty
teaching effectiveness, research performance, job, and pay satisfaction.
Bender and Heywood’s study (2006) compared job satisfaction among university
faculty, nonacademic researchers, and managers. They found that the more highly educated
often are more dissatisfied with their jobs thus confounding any comparison of university
professors with general occupational categories. The Bender and Heywood study showed that
for both males and females, the relationship of pay to job satisfaction was statistically
significant in both private business and in universities. Based on data from the U.S.
Department of Education’s 2005 Fall Staff Survey, Hurtado and DeAngelo (2009) reported
that teaching load was a slightly stronger predictor than salary when it came to retention of
senior women.
Crothers, Hughes, Schmitt, Theodore, Lipinski, and Bloomquist, et al. (2010) reported
a difference in job satisfaction negotiation techniques of male and female faculty members.
They reported that female faculty members earned significantly less than male faculty
members, even when they controlled for years of experience. Females also reported a negative
attribute of failed negotiations that they associated with their gender and vice versa when
negotiations were successful.
Research Purpose
Based on the aforementioned research, salary appears to be a hygiene factor that can be
used to gauge dissatisfaction. Thus, the magnitude of salary distributions across ranks and
between genders could be a corollary with dissatisfaction among female business school
faculty members. Our purpose for conducting this study is to test whether men and women
differ in salary (main effect), whether there is a difference in ranks regarding salary (main
35
effect), and if the magnitude of salary increases across ranks is different for male and female
faculty members (the interaction effect).
METHODS AND RESULTS
Business faculty salaries from 13 institutions of higher learning across 5 states were
collected via collegiatetimes.com, a public salary database. The rank and gender information
was verified by visiting the websites of the 13 institutions. Faculty members had written
biographical sketches and referred to themselves as he or she and most also showed photos.
They also listed their ranks in those bios. The data analyzed included faculty members’ gender,
rank, and teaching field. A gender difference (p <.01) was found when four null hypotheses
were tested. Chi-square was used to ascertain whether differences existed between relative
frequency of occurrence of male and female faculty and ranks. Two-Way Analysis of
Variance, with a 2 x 4 factorial design, was used to test for main effects and interaction effects
when gender and ranks were the independent variables and salary was the dependent variable.
The demographics and other independent descriptive variables (gender, rank, etc.,) are
included in Table 1.
TABLE 1
FREQUENCY AND PERCENT FOR DEMOGRAPHIC VARIABLES
Frequency Percent Cumulative Percent
Texas Southern University
43
5.4
5.4
Institution
Texas Tech University
85
10.6
16.0
Texas A&M University
154
19.2
35.2
SUNY-Buffalo
78
9.7
44.9
SUNY-SB
19
2.4
47.3
UC at Riverside
33
4.1
51.4
UC at Irvine
22
2.7
54.1
George Mason
63
7.9
62.0
Old Dominion
67
8.4
70.3
Virginia Tech
105
13.1
83.4
University of Virginia
55
6.9
90.3
Miami University
6
.7
91.0
The Ohio State University
72
9.0
100.0
Total
802
100.0
Male
604
75.3
75.3
Gender
Female
198
24.7
100.0
Total
802
100.0
Instructor
152
19.0
19.0
Rank
Assistant Professor
191
23.8
42.8
Associate Professor
198
24.7
67.5
Full Professor
261
32.5
100.0
Total
802
100.0
California
55
6.9
6.9
State
New York
97
12.1
19.0
Ohio
78
9.7
28.7
Texas
282
35.2
63.8
Virginia
290
36.2
100.0
Total
802
100.0
185
23.1
23.1
Teaching Field Accounting
36
Finance
Management
Marketing
MIS
Business Administration
Other
Total
Missing
Total
129
139
107
40
47
154
801
1
802
16.1
17.3
13.3
5.0
5.9
19.2
99.9
.1
100.0
39.2
56.6
69.9
74.9
80.8
100.0
We analyzed the data in this study with SPSS 18.0. It is easy to request a Goodman and
Kruskal tau be generated when running a Chi-Square Test in SPSS 18.0. Goodman and
Kruskal (1972) developed a useful mathematical method that enables a researcher to predict,
for example, if a male murderer is more likely to use a gun or a knife to commit a murder, or if
a female murderer is more likely to use poison than a gun (Levin & Fox, 2000). To further
investigate the differences in nominal-by-nominal variables and differences in salaries
produced by content analysis, the following four hypotheses were written and tested using Chisquare Tests, Goodman and Kruskal tau and Two-Way ANOVA Tests, with a 2x4 factorial
design.
Four Null Hypotheses
H1:
Male and female faculty members do not differ in their relative frequency or
percentage among the academic ranks as instructor, assistant professor,
associate professor and full professor.
H2:
Means for faculty salaries do not differ between male and female faculty
members.
H3:
Means for faculty salaries do not differ among the academic ranks of instructor,
assistant professor, associate professor and full professor.
H4:
Means for the magnitude of faculty salaries do not differ between male and
female faculty regardless of their rank as instructor, assistant professor,
associate professor and full professor.
Chi-Square Test Results
We rejected H1, with p = .000. Male and female faculty members differ in their relative
frequency or percentage among the academic ranks. Statistical test results are shown in Table
2. For instructor, the female observed count exceeded the female expected count 59/37.5 or
nearly 60%. For assistant professor, the female observed count exceeded the female expected
count 65/47.2 or nearly 38%. For associate professor, the male observed count exceeded the
male expected count 154/149.1 or just over 3%. For full professor, the male observed count
exceeded the male expected count 231/196.6 or just over 17%. Conversely, females were 11%
below the associate professor expected count and 115% below the full professor expected
count.
37
Goodman and Kruskal tau shows rank as independent variable predicts 6.3 percent of
the variance (error) in gender, when gender is the dependent variable. On the other hand, when
gender is the independent variable it only predicts 2.2 percent of the dependent variable rank.
Thus, rank is more predictive of the rank of a male or female than vice versa. Table 2
illustrates that female faculty are significantly crowded in the lower level ranks of instructor
and assistant professor while male faculty are significantly crowded in the upper ranks of
associate professor and full professor. This is consistent with the recent literature (Bell and
Joyce, 2011; Burke, et al, 2005; Travis, et al, 2009). Gender predicts that female faculty
members will be concentrated at the lower ranks of instructor and assistant professor, while it
predicts that male faculty members will be concentrated more often at the higher ranks of
associate and full professors.
TABLE 2
CROSS-TABULATION FOR RANK * GENDER
Gender
Male
Female
Total
Rank
Instructor
Count
93
***59
152
Expected Count
114.5
37.5
152.0
% of Total
11.6%
7.4%
19.0%
Assistant Professor
Count
126
***65
191
Expected Count
143.8
47.2
191.0
% of Total
15.7%
8.1%
23.8%
Associate Professor
Count
***154
44
198
Expected Count
149.1
48.9
198.0
% of Total
19.2%
5.5%
24.7%
Full Professor
Count
***231
30
261
Expected Count
196.6
64.4
261.0
% of Total
28.8%
3.7%
32.5%
Total
Count
604
198
802
Expected Count
604.0
198.0
802.0
% of Total
75.3%
24.7%
100.0%
Value
df
Asymp. Sig. (2-sided)
Chi-Square Tests
Pearson Chi-Square
50.368a
3
***.000
Likelihood Ratio
52.475
3
.000
Linear-by-Linear Association
49.120
1
.000
N of Valid Cases
802
a. 0 cells (.0%) have expected count less than 5. The minimum expected count is 37.53.
Asymp. Std. Approx. Approx.
Directional Measures
Value
Errora
Tb
Sig.
Nominal by
Lambda
Symmetric
.047
.013
3.620
.000
Nominal
Rank Dependent
.065
.017
3.620
.000
Gender Dependent
.000
.000
.c
.c
Goodman and Kruskal tau
Rank Dependent
.022
.006
.000d
Gender Dependent
.063
.016
.000d
a. Not assuming the null hypothesis.
b. Using the asymptotic standard error assuming the null hypothesis.
c. Cannot be computed because the asymptotic standard error equals zero.
d. Based on chi-square approximation
38
Two-Way ANOVA Tests Results
We failed to reject H2, with F (1, 794) = 2.149, p = .143; means for faculty salaries do
not differ between male and female faculty members. Tests of Between-Subjects Effects are
shown in Table 3. Although the male mean is higher than the female mean across all ranks, the
model does not show these means differ significantly. The finding is contrary to what is
reported in the literature. Although female faculty members earn less than men in general,
business school female faculty members are statistically the same as male faculty regarding
salaries.
We rejected H3, with F (3, 794) = 130.087, p = .000; means for faculty salaries differ
among the academic ranks of instructor, assistant professor, associate professor and full
professor. This finding is very consistent with the literature and is therefore not surprising.
Tests of Between-Subjects Effects are shown in Table 3. Rank is not surprisingly different
because hierarchy implies higher compensation. In our model of 802 faculty members from 13
institutions representing five US States, the only exception to this was for associate professors
who earn $6,057.46 less than assistant professors, but the mean difference was non-significant
in the Tukey’s HSD Post Hoc Comparison. The other ranks increased in salary in nearly a
stair-step pattern as they should.
We failed to reject H4, with F (3, 794) = .364, p = .779; means for the magnitude of
faculty salaries do not differ between male and female faculty regardless of their rank as
instructor, assistant professor, associate professor and full professor. Tests of BetweenSubjects Effects are shown in Table 3. The interaction effect was non-significant. This is a
surprise because based on the literature women earn less than men in business schools and
across the ranks. Nevertheless, the so called “men’s bonus” reported by Renzuilli, et al, (2006)
seems to have dissipated over the years. This is a very important finding and means a great
deal in terms of gauging the dissatisfaction levels of female business faculty members.
Estimated means and pairwise comparisons tables are located in the Appendix.
TABLE 3
UNIVARIATE ANALYSIS OF VARIANCE WITH DEPENDENT VARIABLE: SALARY
Gender
Rank
Mean
Std. Deviation
N
Male
Instructor
$51,182.10
$40,211.46
Assist. Prof.
$131,202.88
$34,662.98
Assoc. Prof.
$124,401.84
$35,449.14
Full Prof
$168,973.49
$65,843.85
Total
$131,593.14
$63,356.26
Female
Instructor
$50,151.39
$25,077.01
Assist. Prof.
$125,751.38
$31,946.07
dimension1
Assoc. Prof.
$120,437.50
$35,908.74
Full Prof
$155,619.83
$66,733.80
Total
$106,568.77
$54,201.03
Total
Instructor
$50,782.02
$35,028.13
Assist. Prof.
$129,347.66
$33,777.91
Assoc. Prof.
$123,520.88
$35,498.61
Full Prof
$167,438.59
$65,955.35
Total
$125,415.06
$62,136.01
Levene's Test of Equality of Error Variancesa Dependent Variable: Salary
F
df1
df2
Sig.
16.162
7
794
39
93
126
154
231
604
59
65
44
30
198
152
191
198
261
802
.000
Tests the null hypothesis that the error variance of the dependent variable is equal across groups.
a. Design: Intercept + Gender + Rank + Gender * Rank
Tests of Between-Subjects Effects, Dependent Variable: Salary
Source
Type III Sum of
Squares
df
Mean Square
F
Sig.
Corrected Model
1.318E12
7
1.883E11
84.226
.000
Intercept
7.300E12
1
7.300E12
3265.747
.000
Gender
4.804E9
1
4.804E9
2.149
.143
Rank
8.723E11
3
2.908E11
130.087
***.000
Gender * Rank
2.439E9
3
8.131E8
.364
.779
Error
1.775E12
794
2.235E9
Total
1.571E13
802
Corrected Total
3.093E12
801
a. R Squared = .426 (Adjusted R Squared = .421)
Partial Eta
Squared
.426
.804
.003
.330
.001
SUMMARY AND DISCUSSION
The literature review revealed that various studies had been conducted regarding
faculty satisfaction and salary differences according to rank, gender, and teaching field. Our
study’s contribution to the literature is derived from a multistate study of business school
faculty salaries according to gender and academic rank. These results can assist administrators
in devising strategies for recruiting and retention. The literature suggests there are three
variables that affect the hygiene of salaries: gender, rank and the job security of tenure (Bell
and Joyce, 2011). Women are less likely to receive the same salaries as men, regardless of
rank, thus, for women salaries is less hygienic. The states where professors teach might also
impact the level of pay. Rank has been shown to determine the level of pay and thus the level
of the salary hygiene. Nevertheless, if salary is to improve hygiene (less dissatisfaction), there
should be no meaningful differences between the means of male and female business faculty
and ranks should differ but only according to seniority and not lower-level ranks exceeding the
pay of higher ranking female faculty members. In other words, there should not be huge
magnitudes of difference at the various levels of rank if the salary hygiene is present. The plot
shown in Figure 1 is the best way to understand the dynamics of our findings; the 2x4 factorial
design is plotted by rank (1= instructor, 2= assistant professor, 3= associate professor, 4= full
professor) and gender (1= male, 2= female) and makes it clear as to why the interaction effect
was non-significant, with a p = .779.
40
FIGURE 1
PROFILE PLOTS FOR GENDER * RANK
Even though our Levene’s Test of Equality of Error Variance was significant (p =
.000), we are not concerned about a Type I error, because the p-value for rank was significant
well below p< .001. Also, in the fixed effects sampling frame, women are just not represented
as well as men in collegiate schools of business. Females represented roughly 25% of our
sample of 802 faculty members (198/802 x 100). Despite this fact, our findings appear to show
equity in the magnitude of salary increases as males and females rise through the academic
ranks. Crothers, et al (2010) found women in higher education institutions to be less satisfied
with their negotiation skills when negotiations were not in their favor, nevertheless, female
business faculty members working in the 13 business schools in our sample of 802 faculty
members don’t seem to have any deficiency in negotiating salaries.
Female full professors had higher salaries than male associate professors for the most
part, etc. We did not find any meaningful difference in the interaction between males and
females as they migrated through the four levels of rank. Therefore, hygiene theory would
suggest that female and male faculty members, both of whom are associate professors, should
be earning statistically the same incomes. And, they are. Recall that ranks were different at the
p = .000 level of significance. We found this to be true for all ranks, even though associate
professors earn slightly less than assistant professors, women associate professors do not earn
significantly less than their male counterparts at this same level of rank. We argue that when
salary is a hygiene factor that controls dissatisfaction among rank and between gender,
business schools are hygienic. Theoretically, women should be no more dissatisfied than men
regarding their salaries.
41
REFERENCES
Bell, R., & Joyce, M. (2011). Comparing business faculty’s salaries by rank and gender: Does AACSB
accreditation really make a difference? Academy of Educational Leadership Journal, 15(2), 19-40.
Balkin, D. B., & Gomez-Mejia, L. R. (2002). Business & Economics. New York: McGraw-Hill/Irwin.
Bender, K. A., & Heywood, J. (2006). Job satisfaction of the highly educated: The role of gender, academic
tenure, and earnings, Scottish Journal of Political Economy, 53, 253-279.
Burke, K., Duncan, K., Krall, L., & Spencer, D. (2005). Gender differences in faculty pay and faculty salary
compression. Social Science Journal, 42(2), 165-181.
Comm, C. L., & Mathaisel, D. F. X. (2003). A case study of the implications of faculty workload and
compensation for improving academic quality. The International Journal of Educational Management,
17(4/5), 200-210.
Crothers, L., Hughes, T., Schmitt, A., Theodore, L., Lipinski, J., Bloomquist, A., & Altman, C., (2010). Has
equity been achieved? Salary and promotion negotiation practices of a national sample of school
psychology university faculty. The Psychological – Manager Journal, 13(1), 40-59.
Fairweather, J. S. (2005). Beyond the rhetoric: Trends in the relative value of teaching and research in faculty
salaries. The Journal of Higher Education, 76(4), 401-422.
Goodman, L. A., &. Kruskal, W. H. (1972). Measures for association for cross-classification, I, II, III and IV.
Journal of the American Statistical Association, 67, 415-421.
Herzberg, F. (1964, January-February). The motivation-hygiene concept and problems of manpower. Personnel
Administration, 27, 3-7.
Herzberg, F., Mausner, B., & Snyderman, B. B. (1959). The motivation to work. New York: John Wiley.
Hurtado, S., & DeAngelo, L. (2009). Keeping senior women at your college. Academe, 95(5), 18-20.
Johnsrud, L. K., & Heck, R. H. (1994). A university’s faculty: Predicting those who will stay and those who
leave. Journal for Higher Education Management, 19, 71-84.
Levin, J., & Fox, J. A. (2000). Elementary statistics in social research, (8th ed.). USA: Allyn and Bacon.
Melguizo, T., & Strober, M. (2007). Faculty salaries and the maximization of prestige. Research in Higher
Education, 48(6), 633-668.
Renzulli, L. A., Grant, L., & Kathuria, S. (2006). Race, gender, and the wage gap: Comparing faculty salaries in
predominately white and historically black colleges and universities. Gender & Society, 20(4), 491-510.
Seifert, T. A., & Umbach, P. D. (2008). The effects of faculty demographic characteristics and disciplinary
context on dimensions of job satisfaction. Research in Higher Education, 49, 357-381.
Smart, J. C. (1990). A causal model of faculty turnover intentions. Research in Higher Education, 31, 405-424.
Terpstra, D. E., & Honoree, A.L. (2004). Job satisfaction and pay satisfaction levels of university faculty by
discipline type and by geographic region. Education, 124(3), 528-539.
Toutkoushian, R. K., Bellas, M. L., & Moore, J. V. (2007). The interactive effects of gender, race, and marital
status on faculty salaries. The Journal of Higher Education, 78(5), 572.
42
Travis, C., Gross, L., & Johnson, B. (2009). Tracking the gender pay gap: A case study. Psychology of Women
Quarterly, 33(4), 410-418.
Umbach, P. (2007). Gender equity in the academic labor market: An analysis of academic disciplines. Research in
Higher Education, 48(2), 169-192.
Weiler, W. C. (1985). Why do faculty members leave the university? Research in Higher Education, 23, 270277.
43
APPENDIX
Estimated Marginal Means
1. Gender
Estimates
Dependent Variable: Salary
Gender
Mean
Male
118940.078
Female
112990.027
dimension1
Std. Error
2030.462
3514.067
95% Confidence Interval
Lower Bound
Upper Bound
114954.369
122925.786
106092.067
119887.987
Pairwise Comparisons
Dependent Variable: Salary
(I) Gender
(J) Gender
95% Confidence Interval for Differencea
Mean Difference
a
(I-J)
Std. Error
Sig.
Lower Bound
Upper Bound
Male
Female
5950.051
4058.503
.143
-2016.612
13916.714
Female
Male
-5950.051
4058.503
.143
-13916.714
2016.612
Based on estimated marginal means
a. Adjustment for multiple comparisons: Least Significant Difference (equivalent to no adjustments).
dimension2
dimension1
dimension2
Univariate Tests
Dependent Variable: Salary
Contrast
Error
Sum of Squares
4.804E9
1.775E12
df
1
794
Mean Square
4.804E9
2.235E9
F
Sig.
2.149
.143
Partial Eta Squared
.003
The F tests the effect of Gender. This test is based on the linearly independent pairwise comparisons among the estimated
marginal means.
44
2. Rank
Estimates
Dependent Variable: Salary
Rank
95% Confidence Interval
Mean
Std. Error Lower Bound Upper Bound
Instructor
50666.743 3934.432
42943.625
58389.861
Assistant Professor 128477.133 3609.961 121390.938 135563.328
Associate Professor 122419.672 4040.858 114487.644 130351.700
Full Professor
162296.661 4587.556 153291.490 171301.833
Pairwise Comparisons
Dependent Variable: Salary
(I) Rank
(J) Rank
95% Confidence Interval for
Differencea
Mean Difference
a
(I-J)
Std. Error
Sig.
Lower Bound
Upper Bound
1
2
-77810.389*
5339.623
.000
-88291.835
-67328.944
*
3
-71752.929
5639.884
.000
-82823.774
-60682.083
4
-111629.918*
6043.627
.000
-123493.293
-99766.543
2
1
77810.389*
5339.623
.000
67328.944
88291.835
3
6057.461
5418.519
.264
-4578.856
16693.777
4
-33819.528*
5837.592
.000
-45278.467
-22360.590
3
1
71752.929*
5639.884
.000
60682.083
82823.774
2
-6057.461
5418.519
.264
-16693.777
4578.856
4
-39876.989*
6113.445
.000
-51877.414
-27876.565
4
1
111629.918*
6043.627
.000
99766.543
123493.293
2
33819.528*
5837.592
.000
22360.590
45278.467
3
39876.989*
6113.445
.000
27876.565
51877.414
Based on estimated marginal means; 1= instructor, 2= assistant professor, 3= associate professor, 4= full professor
*. The mean difference is significant at the .05 level.
a. Adjustment for multiple comparisons: Least Significant Difference (equivalent to no adjustments).
dimension2
dimension2
dimension1
dimension2
dimension2
Univariate Tests
Dependent Variable: Salary
Sum of Squares
8.723E11
1.775E12
Contrast
Error
df
3
794
Mean Square
2.908E11
2.235E9
F
130.087
Sig.
.000
Partial Eta
Squared
.330
The F tests the effect of Rank. This test is based on the linearly independent pairwise comparisons among the
estimated marginal means.
3. Gender * Rank
Dependent Variable: Salary
Gender
Rank
Male
dimension1
Female
1
2
3
4
1
2
3
4
Mean
51182.097
131202.881
124401.844
168973.489
50151.390
125751.385
120437.500
155619.833
Std. Error
4902.485
4211.846
3809.758
3110.654
6155.052
5864.096
7127.404
8631.715
95% Confidence Interval
Lower Bound
Upper Bound
41558.734
60805.460
122935.212
139470.550
116923.456
131880.232
162867.411
175079.567
38069.292
62233.488
114240.421
137262.348
106446.717
134428.283
138676.154
172563.513
45
Post Hoc Tests
Rank
Multiple Comparisons
Salary
Tukey HSD
(I) Rank
(J) Rank
95% Confidence Interval
Mean Difference
(I-J)
Std. Error
Sig.
Lower Bound
Upper Bound
1
2
-78565.64*
5138.854
.000
-91795.52
-65335.76
3
-72738.86*
5098.441
.000
-85864.69
-59613.03
4
-116656.57*
4823.816
.000
-129075.38
-104237.75
2
1
78565.64*
5138.854
.000
65335.76
91795.52
3
5826.78
4794.941
.617
-6517.70
18171.26
4
-38090.93*
4501.840
.000
-49680.82
-26501.03
3
1
72738.86*
5098.441
.000
59613.03
85864.69
2
-5826.78
4794.941
.617
-18171.26
6517.70
4
-43917.71*
4455.652
.000
-55388.69
-32446.72
4
1
116656.57*
4823.816
.000
104237.75
129075.38
2
38090.93*
4501.840
.000
26501.03
49680.82
3
43917.71*
4455.652
.000
32446.72
55388.69
Based on observed means. 1= instructor, 2= assistant professor, 3= associate professor, 4= full professor
The error term is Mean Square (Error) = 2235195289.532.
*. The mean difference is significant at the .05 level.
dimension3
dimension3
dimension2
dimension3
dimension3
Homogeneous Subsets
Salary
Tukey HSDa,b,c
Rank
N
Subset
2
1
3
1
152
3
198
123520.88
2
191
129347.66
4
261
Sig.
50782.02
167438.59
1.000
.620
1.000
Means for groups in homogeneous subsets are displayed.
Based on observed means. 1= instructor, 2= assistant professor, 3= associate professor, 4= full professor
The error term is Mean Square (Error) = 2235195289.532.
a. Uses Harmonic Mean Sample Size = 193.270.
b. The group sizes are unequal. The harmonic mean of the group sizes is used. Type I error levels are not guaranteed.
c. Alpha = .05.
46
A COMPREHENSIVE THEORETICAL FRAMEWORK
FOR UNDERSTANDING MORAL BEHAVIOR IN
ORGANIZATIONS
Timothy Ewest
Wartburg College
ABSTRACT
This paper explores the challenges and limitations of the predominate theory in
organizational ethics, normative ethical theory. The normative ethical theory is rooted in the
philosophical tradition of idealism and complemented by neoclassical economics’ rational
man and thus is largely committed to developing cognitive moral decision making. Yet, while
cognition is endemic, it is not seminal in regards to ethical motivation and therefore represents
only a truncated part of the ethical decision making process. Instead, this paper focuses on
endemic human dimensions, specifically human values, spiritual motivation of meaning making
and moral identity as they relate to agentic human endeavors. The paper suggests that all
human activity is motivated by endemic human values, a need for humans to make meaning of
their lives and arriving at those value(s) and personal meaning as ideal end state(s) are the
goals of human behavior (Schwartz, 1999; Haidt & Joseph, 2004; Emmonds, 2011). These
values are expressed through behaviors, which active agents who seek to demonstrate personal
interpersonal consistently, integrity. Specifically, the agentic endeavors result in selfregulated behaviors as a means to foster integrity as human agents within organizations seek
to live in congruency with those ends states and the goals which they represent, suggesting
support for moral leadership as a governing ethical criterion.
47
FISCAL DEFICIT, MONEY SUPPLY AND INFLATION
IN NEAPL
Nar Bahadur Bista
Global College of Management
Ph.D. Student at University of Warsaw
ABSTRACT
This paper is focused to examine the empirical relationship between fiscal deficit,
money supply, and inflation to test the hypothesis that domestic factors fiscal deficit and money
supply and external factor Indian inflation have positive effect on the inflation in Nepal. Nepal
has open border with India and India is the major international trade partner of Nepal.
Therefore, economy of Nepal can be influenced by the macroeconomic variables and policies
of India. The study has analyzed the time series data from 1990 to 2011. Econometric
techniques used in the study are unit root test, autoregressive distributed lag (ARDL) model
and Granger causality test. The empirical results show that there is positive effect of fiscal
deficit and narrow money supply on consumer price index of Nepal in short run and long run.
But, the relationship is weak and the effect is very small. While adding wholesale price index of
India as an explanatory variable along with fiscal deficit and narrow money supply, it shows
the significant short run and long run relationship among the variables. The positive and
significant effect of Indian wholesale price index is higher than the effect of fiscal deficit
whereas narrow money supply has not significant impact on consumer price index of Nepal.
Therefore, inflation in Nepal is affected by external factor rather than domestic factors.
Consequently, inflation controlling through monetary policy and fiscal policy are becoming
ineffective in Nepal. Thus, Nepal should diversify the over dependent trade with India and
explore the markets in other countries as well.
INTRODUCTION
The relationship between fiscal deficit, money supply, and inflation is a universal
phenomenon in theoretical and empirical grounds. From a theoretical perspective, both the
monetarist hypotheses, based originally on the quantitative theory of money, and the fiscal
theory of the price level, known as the quantitative theory of government financing of debt,
represent the two traditional approaches to understanding what links these macroeconomic
variables (Tiwari & Tiwari, 2011). There is a general concession among economists to support
monetarist view led by Milton Friedman, that inflation is strictly a monetary phenomenon
(Friedman, 1956). Growth rate of money supply exceeding the demand for cash balance
increases the demand for goods and it pushes up the price level (Ezeabasili et al., 2012). The
monetarists suggest for impendent monetary authority breaking the linkage between inflation
and budget deficit by refusing to monetize the fiscal deficit (Akcay et al., 1996; Chimodi &
Lgwe, 2010). Mortaza (2006) put forwards that in developing countries; inflation is not purely
a monetary phenomenon but is often linked with fiscal imbalances and deficiencies in sound
internal economic policies.
48
Inflation is a combined effect of monetary and fiscal imbalances. Monetary and fiscal
authorities are linked through money growth in the form of seigniorage, which provides
revenue to the fiscal authority (Ekanayake, 2012). The impact of monetary financing of a fiscal
deficit on the inflation rate was first formalized by Sargent and Wallace (1981). Since then,
attention has increasingly been given to the role of fiscal-factors in explaining inflation. In
developing countries, there is a need of budget deficit financing and revenue from seigniorage.
It causes increase in money supply and consequently the country faces inflation.
Nepal is among the poorest and least developed countries in the world. The
macroeconomic performance of Nepal is not satisfactory for more than two decades. Almost
one-quarter of its population lives below the poverty line and agriculture is the mainstay of the
economy, providing a livelihood for three-fourths of the population and accounting for about
one-third of GDP (NLSS, 2011). The economic growth rate remained 4.11 percent in an
average for this decade and per capita GDP growth rate is 1.99 percent (MoF, 2012). Fiscal
deficit and total public debt is 3.98 and 35.60 percent of nominal GDP respectively at the end
of fiscal year 2010/11. The annual growth rate of broad money supply (M2) is 12.30 percent
and narrow money supply (M1) is 5.17 percent in the same period. The inflation rate is 9.5
percent in the fiscal year 2010/11 and it has remained about double digit in past few years
(MoF, 2012).
India is a fast growing emerging economy and it has become the fourth largest economy
in terms of GDP (PPP) in the world (WB, 2012). The economic growth rate of India in fiscal
year 2010/11 was 8.39 percent and an average growth rate is about 8 percent in the recent
decade. The fiscal deficit in fiscal year 2010/11 was 5.20 percent of the GDP. Inflation in India
on the basis of consumer price index is 9.50 percent and 8.6 percent on the basis of whole sale
price index (PCI, 2012). The inflation remained near to double digit in past few years in India.
Therefore, it has been becoming the challenge for the economy in India.
Statement of the problem is whether the inflation of Nepal is caused by domestic factors:
fiscal deficit and money supply in Nepal. Nepal has faced the inflation even during the periods
of control over money supply and fiscal deficit. This situation may raise a question that
inflation in Nepal may be caused by external factors rather than monetary and fiscal
imbalances in Nepal. India is a major trading partner (two-third of total trade of Nepal is with
India) and it has open border of 1850 kilometers in three directions of Nepal. Therefore,
inflation in India may cause the inflation in Nepal. In order to answer these questions, the
objectives of this paper is investigate the relationship between fiscal deficit, money supply and
inflation in Nepal and to examine the casual relationship between consumer price index of
Nepal and whole sale price index of India.
LITERATURE REVIEW
The consensus on the relationship between fiscal deficit, money supply and inflation
differs among the economists. Persistent fiscal deficits, increasing money growth, and high
inflation are common in most developing countries. In order to analyse the relationship
between variables, many researchers have investigated time series as well as panel data. There
are huge differences in the monetary and fiscal policies consequences implemented by
different countries, and, sometimes, in the same country at different points in times (Edwards
& Tabellini, 1991 and Jha, 2001). The link between fiscal deficits and inflation is also less
obvious in countries that have institutional arrangements to curb fiscal dominance, wider
49
access to external financing, and a broader seigniorage tax base. When the differences in these
factors among countries are considerable, it is harder to uncover the relationship between fiscal
deficits and inflation from cross country panel studies (Catao & Terrones, 2005). Therefore, it
is important to analyse this issue within individual countries over time to build a sound
empirical basis to make country-specific policy recommendations (Ekanayake, 2012). In this
context, various empirical literatures have been reviewed in the following section.
NRB (2007) conducted an empirical analysis to identify the determinants of inflation in
Nepal. Empirical results in the study suggest that inflation in Nepal is mainly determined by
Indian inflation with narrow money only having an effect in the short run. The study has
considered the relationship among price indices, money supply, growth rate and inflation and it
has not included fiscal deficit as a determinant of inflation. Wolde-Rufal (2008) found in
Ethiopia that there was a long run cointegrating relationship among the series with a
unidirectional Granger causality running from money supply to inflation and from budget
deficits to inflation. In contrast, fiscal policy does not seem to have any impact on the growth
of money supply. Tiwari and Tiwari (2011) tried to establish the bi-directional casual
relationship among the variables. They analysed the time series data of India on fiscal deficit,
government expenditure, broad money supply and consumer price index. The results show
that the money supply has negative impact and government expenditure has positive and
significant impact on fiscal deficit. Another research in India was conducted by Tiwari et al.
(2012) to identify the casual relationship between fiscal deficit, government expenditure,
money supply, and inflation by employing Dolado and Lütkepohl (DL) and standard Grangercausality approach. Causality analysis based on DL approach suggests that both government
expenditure and money supply Granger-cause fiscal deficit while standard Granger-causality
test shows that only government expenditure Granger-cause fiscal deficit. Ekanayake (2012)
analysed the data of Sri Lanka to quantify the link between the fiscal deficit and inflation. The
estimated results in the research suggest that the ratio of fiscal deficit to narrow money supply
has the significant positive impact to increase inflation in Sri Lanka. Milo (2012) considered
the case study of three transition economies: Albania, Bulgaria and Romania. He found that
there is a positive relationship between monetary financing of government deficits and money
base growth in the case of Albania and Bulgaria, but it was not found strong relationship in
Romania. In his study, inflation is a cause of depreciation of exchange rate due to monetary
financing of budget deficits rather than direct impact of money supply and fiscal deficit. In
Tanzania, Ndanshau (2012) investigated the relationship among these three variables and result
shows that there is unidirectional causation of inflation on budget deficit and monetary base.
It can be concluded that there a link between fiscal deficit finance, money supply and
inflation in most of the economies. In most of the literatures, the domestic macroeconomic
variables like fiscal deficit and money supply are considered as the determinant of inflation and
rare of the studies have examined external causes of domestic inflation.
DATA AND METHODOLOGY
This study is based on secondary time series data from 1990 to 2011 from various
publications. The basic sources of the data are from Economic Surveys, National Planning
Commission and World Bank Database. Consumer price index (CPI) is taken as a measure of
inflation in case of Nepal and wholesale price index (WPI) of India is considered to measure
inflation in India in this study because the trade of Nepal occurs in WPI with India. The
50
absolute data are converted into natural logarithmic form for estimating the robust regression
results. The variables under the study are defined as natural logarithm of consumer price index
(LNCPI), natural logarithm of fiscal deficit (LNDEF), natural logarithm of narrow money
supply (LNM1), natural logarithm of broad money supply (LNM2) of Nepal and natural
logarithm of wholesale price index of India (ILNWPI).
The objective of the study is to establish the long run and short run relationship among
the variables. The econometric technique applied to analyze data is Autoregressive Distributed
Lag (ARDL) model for cointegration test. Though, the order of integration is not necessarily to
be same for the coitegartion in ARDL approach, but generally the data should be stationary
maximum of two time differences i.e. second difference (Pesaran et al., 2001). In order to test
the unit root, Augmented Dickey-Fuller (ADF) test has been employed which is most common
and widely used test in literatures.
The short-and long-run parameters with appropriate asymptotic inferences can be
obtained by applying OLS to ARDL with an appropriate lag length. The ARDL with Alkaike
Information Criterian (AIC) and Schwarz Bayesian Criterion (SBC) estimators have very
similar small-sample performances. ARDL-SBC has performed slightly better than ARDLAIC in the majority of the experiments (Pesaran & Shin, 1997). Therefore, in this study SBC is
used for lag selection while applying ARDL approach for small samples in this case.
Following Pesaran et al. (2001), an ARDL (p,q,r,…,m) representation can be written as:
p
q
i 1
j 0
r
m
p
l 0
i 1
 Yt   0    0 i Yt  i    1 j X 1t  j    2 k X 2 t  k  ...    nl X nt  l    0 i  Yt  i
q
   1 j X 1t  j 
j 0
k 0
r

k 0
m
2j
 X 2 t  k  ...    nl X nt  l  ... u t
... ... (1)
l 0
Where, Y is dependent variable, Xi are independent variables and i=1,2, …, n, Δ is the
first difference operator and ut is the usual white noise residuals. The coefficients (α0-αn)
represent the long-run relationship whereas the remaining expressions with summation sign
(β0-βn) represent the short-run dynamics of the model. The values (p,q,r,…,m) show the
number of lags of the corresponding variables. The F-statistics is used for testing the existence
of long run relationships. The ARDL level relationship is tested by Wald-test of coefficient
restrictions setting hypothesis as:
H 0 :  0   1   2  ...   n  0 , i.e. there is no level effect.
H 1 :  0   1   2  ...   n  0 , i.e. there is significant level effect.
The calculated F-statistic is compared with lower bound and upper bound critical
values to take the decision. If the calculated F-statistic lies between the bounds, the test is
inconclusive. If it is above the upper bound, the null hypothesis of no level effect is rejected. If
it is below the lower bound, the null hypothesis of no level effect can't be rejected. In this
study, the data are processed by using Microfit 5.0 software which has an in-build facility to
calculate the critical values on the basis of sample size (Pesaran & Pesaram, 2009).
After confirming the cointegration relationship among the variables, the estimated long
run model using the ARDL approach of above model (1) can be expressed as:
Yt   1   1 X 1t   2 X 2t  ...   n X nt  (ect ) t ...... (2)
The error correction representation based on the assumptions made by Pesaran et al.
(2001) of the ARDL model (1) can be expressed as:
51
 Yt   2 
m

l0
p

i 1
 0 i  Yt i 
 nl  X
nt  l
q

j0
  ect
t 1
 1 j  X 1t  j 
r

k 0
 2 jX
 t
2tk
 ... 
...... ( 3 )
The error correction term (ect)t is calculated from equation (2) and the coefficient of
(ect)t-1 i.e. λ indicates the long run dynamics. The coefficient λ also measures the speed of
adjustment towards equilibrium if disequilibrium exists in long run. The λ should possess
negative sign and it should be statistically significant to confirm the long run relationship
between the variables. The coefficients (β0- βn) in the model (3) show the short run impact of
corresponding independent variables on dependent variable (Narayan, 2004).
Finally, Granger Causality test is applied for the cointegrated variables to examine the
casual relationship between the variables (Granger, 1969). The model for two variables i.e.
with single independent variable case is expressed as:
n
n
Yt   0  1iYt i   2i X t i   1t
i 1
m
...... (4)
i 1
m
X t   0  1k X t k   2k Yt k   2t
k 1
...... (5)
k 1
Where, i and k indicate the number of lags used in the model. The Wald-test and Fstatistics for the coefficients restriction is performed setting hypothesis as following:
Null Hypotheses are:
X does not Granger-cause Y in first regression equation, and
Y does not Granger-cause X in second regression equation.
The coefficients restriction for Wald-test is:
1   2  ...   n  0
The regression estimations are tested for goodness of fit and overall significance by Rsquared/R-bar squared and F-test, statistical significance of the coefficients are tested by t-test.
Other residuals diagnostic tests are the Lagrange multiplier test of residual serial correlation,
the Ramsey's RESET test for functional form using the square of the fitted values, the
normality test based on a test of skewness and kurtosis of residuals and the heteroscedasticity
test based on the regression of squared residuals on squared fitted values. All the data are
processed in Mircofit 5.2 and Eviews-7 software. The paper has used APA (American
Psychological Association) sixth edition for citation and referencing.
EMPIRICAL RESULTS AND INTERPRETATION
Unit Root Test
In this study time series data from 1990 to 2011 of consumer price index, fiscal deficit,
narrow money supply and broad money supply of Nepal and wholesale price index of India are
analyzed. Augmented Dickey-Fuller (ADF) test is employed to test the unit root. The results of
ADF-test are presented in table 4.1 below:
52
Table 4.1
ADF-Test Results for Unit Root Test
Variables
Levels
t-Statistics
-1.109673
-0.446796
-1.346584
LNCPI
LNDEF
LNM1
LNM2
-0.438209
ILNWPI
-2.275734
ADF Test critical values
p-Value
0.6908
0.8834
0.5879
First Difference
t-Statistics
p-Value
-3.075897**
0.0460
-4.659427*
0.0016
-3.094952**
0.0401
0.8843
-2.498420
0.1306
0.1882
1% level
5% level
10% level
-3.550596**
0.0172
-3.808546
-3.020686
-2.650413
The symbols * and ** indicate data is stationary at 1 and 5 percent level of significant
respectively. In table 4.1, we can observe that all the variables have unit root at levels showing
that they are non-stationary but at first difference the variables are stationary except LNM2.
The data series of LNM2 is not significant even at 10 percent level of significance in first
difference. It is only stationary at second difference. In order to get reliable results time series
data should be stationary at the same order of integration to avoid the spurious regression
results (Gujarati, 2003, pp.792). Therefore, we have taken M1 as an indicator of money supply
and M2 has been dropped out in this study. After testing the unit root, we proceed to establish
the relationship among variables in the following section.
Consumer Price Index, Fiscal Deficit and Narrow Money Supply in Nepal
In order to establish the long run relationship among consumer price index, fiscal deficit
and money supply in Nepal, we apply ARDL approach to cointegration as discussed in the
methodology section. LNCPI is a dependent variable and LNDEF and LNM1 are explanatory
variables in this analysis. The ARDL (1,0,0) estimation and its coefficients bound testing Fstatistic and corresponding critical values at 95 and 90 percent confidence interval are
presented in table 4.2. The calculated value of F-statistic is 5.24 which is higher than 90
percent upper bound and lower than the 95 percent upper bound critical values. It means, there
is cointegration among the variables only at 10 percent level and the long run relationship is
not significant at 5 percent level. The long run coefficients of the ARDL estimation is also
presented in table 4.2. The coefficient of LNM1 is statistically significant at 1 percent level
whereas the coefficient of LNDEF is significant only at 10 percent level. Both coefficients are
positive showing that there is positive long run relationship with LNCPI. Also, the coefficient
of LNM1 shows that 1 percent increase in M1 causes 0.35 percent increase in CPI and the
coefficient of LNDEF shows that 1 percent increase in DEF causes 0.20 percent increase in
CPI and vice versa in long run. The impact of money supply is higher than the impact of fiscal
deficit on the consumer price index in the analysis.
53
F-statistic
Table 4.2
ARDL(1,0,0) Model: Dependent Variable is LNCPI
Bound Testing Result for Existence of Level Relationship
95% Lower Bound 95% Upper Bound 90% Lower Bound
5.2439
Independent Variable
LNDEF
LNM1
C
R-squared
F-statistic
Prob(F-statistic)
Test Statistics
Serial Correlation
Functional Form
Normality
Heteroscedasticity
90% Upper
Bound
4.7125
4.5695
5.8444
3.6546
Estimated Long Run Coefficients
Coefficient
Std. Error
t-Statistic
Prob.
0.20956
0.10845
1.9323
0.071
0.35094
0.07542
4.6529
0.000
-0.21789
0.25938
-0.8400
0.413
0.9956
Adjusted R-squared
0.9948
1218.8
DW-Statistic
1.3496
0.000
Diagnostic Tests
LM Version
F Version
CHSQ(1) = 1.1473 [0.284]
F(1,15) = 0 .912 [0.355]
CHSQ(1) = 5.1023 [0.024]
F(1,15) = 5.137 [0.039]
CHSQ(2) = 0.0190 [0.991]
………
CHSQ(1) = 0.1875 [0.665]
F(1,18) = 0.170 [0.685]
The coefficient of determination of the regression equation measured by R-Squared is
0.99. It means 99 percent of the variation due to explanatory variable can be explained by the
regression equation. The overall significance of the regression equation is also tested and it is
significant at 1 percent level shown by the F-statistic. The Lagrange Multiplier (LM) test of
serial correlation indicates the evidence of no serial correlation, the Chi-Squared value for
normality test shows that the residuals are normally distributed. Heteroscedasticity test and
corresponding Chi-squared value shows that the disturbance term in the model is
homoscedastic. These all are significant for desirable model specification except functional
form at 5 percent level.
After establishing the cointegration relationship among the variables, we can apply
error correction model (ECM) for short run relationship. The ECM results are reported in table
4.3. The coefficient of one period lag of error correction term i.e. ect(-1) is -0.40 which is
negative and significant at 5 percent level confirming once again the validity of long run
relationship between the variables. The speed of adjustment towards equilibrium is 40 percent
per annum in this model. The short run coefficients of LNDEF and LNM1 are 0.08 and 0.14
respectively. The first coefficient is statistically significant at 5 percent level but second is only
significant at 10 percent level. It means DEF has positive and significant but very small impact
on CPI where as M1 has higher positive coefficient but it is not significant at 5 percent level in
short run. The coefficient of determination of the regression equation measured by R-Squared
is 0.59 showing that the regression equation can explain about 59 percent variation in CPI due
to explanatory variables.
54
Table 4.3
ARDL(1,0,0) Model: Dependent Variable is ∆LNCPI
Error Correction Representation
Independent Variable
∆LNDEF
∆LNM1
ect(-1)
R-squared
F-statistic
Prob(F-statistic)
Coefficient
0.08496
0.14229
-0.40545
0.5925
7.7573
0.002
Std. Error
t-Statistic
0.032824
2.5885
0.068126
2.0886
0.12169
-3.3318
Adjusted R-squared
DW-Statistic
Prob.
0.020
0.053
0.004
0.5162
1.3496
Finally, the overall model is summarized as ARDL bound test and F-statistic is
significant only at 10 percent level. The long run coefficient of DEF and short run coefficient
of M1 are not significant at 5 percent level. These results show that there is very weak
relationship among the variables in Nepal.
Consumer Price Index, Fiscal Deficit, Narrow Money Supply and Indian Wholesale Price
Index
In the previous analysis, we have only considered the two major domestic factors
affecting to inflation in Nepal. But, the results show that the relationship is weak. Therefore, an
external factor of inflation in Nepal is wholesale price index of India as hypothesized in the
introduction part of the study. The ARDL technique has been again employed where LNCPI is
dependent variable and LNDEF, LNM1 and ILNWPI are independent variables. The results
are presented in table 4.4. The calculated F-statistic of the ARDL (1,0,0,0) model is 6.55 which
is higher than the 95 upper bound critical value showing that there is cointegration among the
variables at 5 percent level.
The long run coefficients of the model are presented in the same table 4.4. The
coefficients of LNDEF and ILNWPI are positive and statistically significant at 5 percent level.
The coefficient of LNDEF indicates that 1 percent increase in DEF causes 0.18 percent
increase in CPI and vice versa in long run. Similarly, the coefficient of ILNWPI shows that 1
percent increase in IWPI causes 0.95 percent increase in CPI and vice versa in long run. But,
the coefficient of LNM1 is negative and statistically not significant even at 10 percent level. It
shows there is no long run impact of M1 on CPI of Nepal.
55
Table 4.4
ARDL(1,0,0,0) Model: Dependent Variable is LNCPI
Bound Testing Result for Existence of Level Relationship
F-statistic
95% Lower Bound 95% Upper Bound
6.5500
4.1067
5.5713
90% Lower
Bound
3.2423
90% Upper
Bound
4.4751
Estimated Long Run Coefficients
Independent Variable
LNDEF
LNM1
ILNWPI
C
R-squared
F-statistic
Prob (F-statistic)
Coefficient
0.17596
-0.02847
0.95442
-0.88299
0.9967
1141.2
0.0000
Std. Error
t-Statistic
0.06796
2.5889
0.17060
-0.16688
0.36703
2.6004
0.31242
-2.8262
Adjusted R-squared
DW-Statistic
Prob.
0.021
0.870
0.020
0.013
0.9958
1.5931
Diagnostic Tests
Test Statistics
Serial Correlation
Functional Form
Normality
Heteroscedasticity
CHSQ(1)
CHSQ(1)
CHSQ(2)
CHSQ(1)
=
=
=
=
LM Version
0.4956 [0.481]
1.9630 [0.161]
1.4970 [0.473]
0.1222 [0.727]
F Version
F(1,14) = 0.35574 [0.560]
F(1,14)
= 1.5237 [0.237]
…..
F(1,18) = 0.11072 [0.743]
The regression equation has also passed through diagnostic tests. The regression
equation can explain 99 percent variation in dependent variable. The F-statistic shows the
overall significance of the regression equation. Other residual diagnostic tests at the bottom
rows of the table exhibit that there is no any specification and violation problems in the
regression equation.
Table 4.5
ARDL(1,0,0,0) Model: Dependent Variable is ∆LNCPI
Error Correction Representation
Independent Variable
∆LNDEF
∆LNM1
∆ILNWPI
ect(-1)
R-squared
F-statistic
Prob(F-statistic)
Coefficient
0.097131
-0.015716
0.52684
-0.55201
0.6937
8.4939
0.001
Std. Error
t-Statistic
0.029897
3.2489
0.093605
-0.16790
0.23672
2.2256
0.12732
-4.3355
Adjusted R-squared
DW-Statistic
Prob.
0.005
0.869
0.042
0.001
0.6120
1.5931
The error correction representation of above model is presented in table 4.5. The
coefficient of ect(-1) is negative and significant at 1 percent level. It shows that about 55
percent of the disturbance in the short run will be corrected each year. The short run
coefficients of LNDEF and ILNWPI are also significant at 1 percent level. There is positive
impact of DEF and 1 percent increase in DEF causes about 0.10 percent increase in CPI where
as 1 percent increase in IWPI causes about 0.53 percent increase in CPI in short run. The short
run coefficient of M1 is highly insignificant in the model. The coefficient of determination
indicated by R-bar squared is 0.61 showing the satisfactory explanatory power. The overall
regression equation is also significant at 1 percent level.
56
From this analysis, it is observed that the impact of DEF and IWPI are positive and
significant in short run and long run. The positive effect of IWPI is significantly higher than
the effect of DEF on CPI in Nepal. Thus, we can conclude that inflation in Nepal is highly
influenced by the Indian wholesale price index rather than the domestic macroeconomic
variables.
At last, one question may arise whether there is unidirectional causality or bidirectional
causality between CPI of Nepal and WPI of India. For this purpose, the Granger-causality test
for LNCPI and ILNWPI is carried out. The test results are presented in table 4.5. The Grangercausality test result rejects the null hypothesis that ILNWPI does not cause ILNCPI or it
accepts the alternative hypothesis that ILNWPI does Granger-cause LNCPI at 5 percent level
of significance. At the same time, the LNCPI does not Granger-cause ILNWPI null hypothesis
cannot be rejected rather it is accepted at 5 percent level of significance.
Table 4.5
Granger Causality Test for LNCPI and ILNWPI
Null Hypothesis:
ILNWPI does not Granger Cause LNCPI
Obs
20
LNCPI does not Granger Cause ILNWPI
F-Statistic
4.25812
Prob.
0.0343
1.13766
0.3467
This result shows that there is unidirectional causality between the variables from IWPI to CPI
of Nepal. It means wholesale price index (IWPI) of India affects the consumer price index
(NCPI) of Nepal but NCPI does not affect the IWPI which is the expected result.
CONCLUSIONS AND POLICY IMPLICATIONS
Deficit financing budget deficit from foreign loans or grants and revenue from
seigniorage expand money supply in an economy. Expansion in money supply higher than the
increase in economic activities causes inflation. From fiscal policy perspective, deficit
financing increases the government expenditure and it raises the aggregate demand. This
causes demand pull inflation. Therefore, fiscal deficit, money supply and inflation are
interrelated macroeconomic variables. In case of Nepal, inflation is about double digit in recent
years and fiscal and monetary remedial measures have been becoming ineffective to curb it.
India is a major trading partner and Nepal has open border with India. The inflation of India
may cause the inflation in Nepal. The study has focused to identify the domestic and external
factors to determine inflation in Nepal. The long run and short run relationship among the
variables fiscal deficit, money supply, consumer price index and Indian wholesale price index
are examined in this paper. The paper has used the secondary source of time series data from
1990 to 2011. The econometric instruments used in the study are unit root test, Autoregressive
Distributed Lag (ARDL) approach to cointegration and its error correction representation.
The empirical results while assessing the domestic data exhibit that the effect of fiscal
deficit and narrow money supply has positive short run and long run impact on inflation. But,
the relationship is very weak. While adding one more external factor i.e wholesale price index
of India along with domestic factors fiscal deficit and narrow money supply in the model, we
found very significant and positive impact on consumer price index of Nepal. Moreover, the
positive effect of Indian wholesale price index is significantly higher than the effect of fiscal
deficit in long run and short run. But, the effect of narrow money supply is highly insignificant
57
to cause the inflation in Nepal. Therefore, inflation in Nepal is highly affected by external
factor rather than domestic factors. Consequently, control of inflation through monetary policy
and fiscal policy is becoming challenging in Nepal. Thus, Nepal should diversify the over
dependent trade with India and explore the markets in other countries as well for the
implementation of independent monetary and fiscal policies.
REFERENCES
Akcay, O. C., Alper, C. E., & Ozmucur, S. (1996). Budget Deficit, Money Supply and Inflation: Evidence from
Low and High Frequency Data for Turkey. Bogazici University, Department of Economics. Retrieved
November
04,
2012,
from
http://edoc.bibliothek.uni-halle.de/servlets/MCRFileNodeServlet/
HALCoRe_derivate_00005580/ISS_EC_96_12.pdf
Catao, L., & Terrones, M. (2005). Fiscal Deficit and Inflation. Journal of Monetary Economics, 52(3), 529-554.
Chimobi, O., & Lgwe, O. (2010). Budget Deficit, Money Supply and Inflation in Nigeria. European Journal of
Economics, Finance and Administrative Sciences(19), 52-59.
Edwards, S., & Tabellini, G. (1991). Explaining Fiscal Policies and Inflation in Developing Countries. Journal of
International Money and Finance, 10(1), 16-48.
Ekanayake, H. (2012). The Link between Fiscal Deficit and Inflaion: Do Public Sector Wages Matter? . ASARC
Working Paper 2012/14.
Ezeabasili, V., Mojekwu, J., & Herbert, W. (2012). An empirical Analysis of Fiscal Deficits and Inflation in
Nigeria. International Business and Management, 4(1), 105-120.
Friedman, M. (1956). The Quantity Theory of Money: A Restatement.
Granger, C. (1969). Investigating Causal Relation by Econometric Models and Cross-spectral Methods.
Econometrica, 37(3), 424-438.
Gujarati, D. (2003). Basic Econometrics (Fourth ed.). MacGraw Hill.
Jha, R. (2001). Macroeconomics of Fiscal Policy in Developing Countries. World Institute for Development
Economic Research (WIDER), Finland.
MacKinnon, J. (1996). Numerical Distribution Functions for Unit Root and Cointegration Tests. Journal of
Applied Econometrics, 11(6), 601-618.
Milo, P. (2012). The Impact of the Budget Deficit on the Currency and Inflation in the Transition Economies.
Journal of Central Banking Theory and Practice, 25-57.
MoF. (2012). Economic Survey 2011/12. Kathmandu: Ministry of Finance, Government of Nepal.
Mortaza, G. (2006). Sources of Inflation in Bangladesh Recent Macroeconomic Experience. Dhaka: Research
Department, Bangladesh Bank., Working Paper Series: WP 0704. .
Narayan, P. (2004). Reformulating Critical Values for the Bounds F-statistics Approach to Cointegration: An
Application to the Tourism Demand Model for Fiji. Victoria, Australia: Monash University, Department
of Economics, Discussion Papers.
Ndanshau, M. (2012). Budget Deficits, Money Supply and Inflation in Tanzania: A Multivariate Granger
Causality Test, 1967 – 2010. Working Paper Series No. 04/12.
58
NLSS. (2011). Nepal Living Standard Survey (NLSS) 2010/11. Kathmandu: Central Bureau of Statistics,
Government of Nepal.
NRB. (2007). Inflation in Nepal. Kathmandu: Nepal Rastra Bank, Research Department.
PCI. (2012). Some Macroeconomic Indicarors of India. New Delhi: Planning Commission, Government of India.
Retrieved
November
04,
2012,
from
http://planningcommission.nic.in/data/datatable/
index.php?data=datatab
Pesaran, B., & Pesaram, M. H. (2009). Time Series Econometrics Using Microfit 5.0. Oxford University Press.
Pesaran, H., & Shin, Y. (1997). An Autoregressive Distributed Lag Modelling Approach to Cointegration
Analysis. Oslo: A Revised Version of a Paper Presented at the Symposium at the Centennial of Ragnar
Frisch, The Norwegian Academy of Science and Letters. Retrieved November 18, 2012, from
http://www.eprg.org.uk/faculty/pesaran/ardl.pdf
Pesaran, M., Shin, Y., & Smith, R. (2001). Bounds Testing Approaches to the Analysis of Level Relationships.
Journal of Applied Econometrics, 16, 289-326.
Sargent, T., & Wallace, N. (1981). Some Unpleasant Monetary Arithmetic. Federal Reserve Bank of Minneapolis
Quarterly Review.
Tiwari, A., & Tiwari, A. (2011). Fiscal Deficit and Inflation: An Empirical Analysis of India. The Romanian
Economic Journal, XIV(42), 131-158.
Tiwari, A., Tiwari, A., & Pandey, P. (2012). Fiscal Deficit and Inflation: What Causes What? The Case of India.
Journal of International Business and Economy, 13(1), 57-81.
WB. (2012). The World Bank Database. Retrieved from http://data.worldbank.org/country
Wolde-Rufael, Y. (2008). Budget Deficit, Money and Inflation: The Case of Ethiopia. The Journal of Developing
Areas, 42(1), 183-199.
59
THE FUTURE OF DE NOVO BANKS
James B. Bexley
Sam Houston State University
ABSTRACT
In today’s environment, it is very difficult to obtain a charter for a de novo (meaning a
new bank) bank. This study will examine the current environment for chartering de novo
banks, and examine the literature in the field of de novo banks. It will set out the critical
elements for obtaining a charter, such as examining market demographics, evaluate
competition, show need, the specific plan, professional involvement, and meeting with
regulators. Since the economic downturn in late 2008, very few charters have been
granted. In the years preceding the economic meltdown, there were hundreds issued over the
United States. Opportunities for future de novo charters will be discussed.
60
DOES HEDGING REDUCE RISK?
Garland Simmons
Stephen F. Austin State University
ABSTRACT
In this paper both theoretical and empirical methods are applied to understand the
hedging behavior of companies which compete in the American airline industry (2007-2012)
as they seek to cope with higher costs for jet fuel. In this context the question, “Does hedging
reduce risk?” is addressed. The empirical record demands an answer of no to this question,
even though in theory hedges could be constructed that would reduce risk.
In the first part of the paper the notion of risk is reduced to the problem of estimating a
first passage time given a random walk sequence of jet fuel prices so that the effect of reducing
the variability of jet fuel costs can be related to the probability that these fuel costs penetrate
some pre-specified upper boundaries can be studied. In the second part of this paper the
decision to hedge or not to hedge input costs is considered from the vantage point of game
theory. A Bayesian game in two future states, one where input costs increase and the other
where input costs do not is devised for two competing airlines in order to understand why
airlines may refuse to hedge away the possibility of future increases in input costs. The last
part of this paper is an empirical data analysis of differences in jet fuel costs, net of hedging
results, for the six largest American air carriers from 2007 through 2012. A parametric test,
the Randomized Block Analysis of Variance, and a non-parametric tool, the Friedman test, are
used to study differences in jet fuel prices that are explained by decisions on the part of
airlines to hedge or not to hedge jet fuel costs.
The purpose of a hedge is to reduce risk. A gold miner may agree to sell her some
portion of future production for a fixed price known today by way of a forward pricing
contract, thus shifting the risk that in the future gold prices might plunge to someone else. A
tractor manufacturer may transform its floating interest rate debt obligation into a fixed rate
commitment by entering into an interest rate swap agreement to make fixed interest rate
payments and accept floating rate payments. But what about an airline that hedges its jet fuel
costs by agreeing under contract to purchase jet fuel in the future at a fixed price? If in this
oligopoly competitors all hedge alike, then no airline will be at a disadvantage if in the future
jet fuel prices fall, even though all have locked in at an older, higher price. But what if some
airlines hedge and some do not? Hedging may have fixed the price of jet fuel for those who
61
chose to hedge, however: Can hedging still be said to reduce risk? That question motivates
this paper.
Since hedging is an investment problem, one might reasonably expect traditional
capital budgeting concepts to be applied to the question of whether or not a hedge investment
should create or destroy shareholder value. Irving Fisher (1930) invented the concept Net
Present Value (NPV), the quantity of shareholder wealth created by a management’s
investment decision. His concept is important, and remains even today a staple in universitylevel business curricula, because it links a company’s stock price that trades in capital markets
to the quality of that company’s strategic planning process. NPV is that analytical device that
attempts to link decisions made inside a business organization with their market values, as
determined in capital markets. Robert Heilbroner in his book, The Worldly Philosophers
(Heilbroner, 1986, pages 18-20) writes that economic problem of what to produce and how
much can be solved by one of three methods: tradition, command or free markets. NPV is that
concept which connects the investment decisions made within the context of the command
economy of the corporate pyramid with the free market economy of capital markets by
measuring the change in shareholder wealth that should result from the managerial investment
decisons. But in perfect markets where there is pure competition it may well be the case that
decisions to hedge or not are all zero NPV decisions; because, as Aretz and Bartram (2010)
note, shareholders themselves can choose to hedge or to not hedge risk without any assistance
from corporate management. To apply this reasoning to the case of the airline industry, if
Southwest Airlines should choose to stop hedging the risk that jet fuel prices might increase,
there remains nothing to stop shareholders and bondholders from choosing to hedge this risk as
individuals.
Some argue that corporate managers can generate positive NPV from hedging decisions
in the presence of capital market imperfections produced by tax law and bankruptcy costs, but
empirical evidence in this regard is slight. See Mackay and Moeller (2007) and Campello, Lin,
Ma, and Zou (2010) for more information about the connection of market imperfections and
the ability of corporate managers to create wealth by way of hedge decision making. Be that as
it may, Iin the context of oligopolistic market structures, I think that NPV should be informed
by random walk models and a game theory approach. What follows is a justification as to why
random walks and game theoretic models should be applied, and a section describing some
empirical realities concerning the hedging of jet fuel costs in the airline industry.
A RANDOM WALK
The purpose of hedging is to reduce risk. In this section the effect of hedging on risk
reduction is considered from the viewpoint of a random walk model which predicts first
passage times, the probability that a random variable following a random walk will penetrate
some pre-specified barrier over a longer period of time, say the next T years. I wish to study
the connection of reducing risk in the short run, measured below as the standard deviation σ,
62
which is determined by the volatility of rate of return on investment in the short run, to the
probability p of witnessing a loss of initial investment value greater than or equal to some
critical threshold amount at least once over the next T years. In this section it is demonstrated
that only if the standard deviation of possible short run rates of return can be reduced, will the
probability of witnessing a large loss of investment value be reduced. However, this result is
mitigated by the connection of the short term expected return µ to the probability of witnessing
such a loss. Larger expected returns are better than smaller expected returns, so if hedging
reduces expected return while at the same time reducing risk, the beneficial effect of hedging
could be eliminated altogether.
The first passage time model equation, notation, and parameter estimates follow: today
the value of the enterprise today is equal to S. The future value of this enterprise S(t) is a risky
value which is at present unknown. The problem here is to predict what this future value could
equal. In a random walk one estimates a drift parameter: assume that S earns a continuous
rate of return that is expected to equal to µ in each future time period. But this expected return
may or may not be realized for the continuous rate of return is a random variable, which in
every future time period is normally distributed with a standard deviation equal to σ. In every
future time period both the expected rate of return and the standard deviation around the
expected rate of return are assumed to be constant. The key measure one seeks is the
probability of a loss of some specified size on or before a certain period of time has elapsed.
To arrive at this answer, in a first passage time problem, one estimates the probability p that
this future value S(t) penetrates a threshold equal to C on or before future time period T is
reached.
Equation (1) below describes an answer to this question: the first passage time, or
hitting time, under a random walk. The probability p is the probability that the future value of
the enterprise shall have penetrated a future value equal to C on or before future time period T.

 C 

 C 
2
ln    T 

 ln S    T 
2
C 

    N   S 
p  N  




 S





T
T




(1)
where: C is the critical value that could be penetrated on or before time T by the future value
of the enterprise S(t), S is the present value of the enterprise today, μ is the expected
continuous rate of return, σ is the standard deviation of continuous returns, and T is the
number of years in horizon. If realized rates of return are normally distributed in cross-section
and investment values follow a random walk in time-series, the probability solution given in
this model above is exact.
Suppose we wish to never suffer a loss in value that is large enough to consume ten
percent or more of our original investment over the next T equal four years. Therefore, we
wish to know the probability p that such a loss would be realized at least once by the end of
63
four years. This type of problem is known as a first passage time problem in random walk
analysis. If we can know the parameters μ the expected continuous rate of return on
investment in the enterprise and σ is the standard deviation of continuous returns, then we can
solve for p, the probability that at least once in the next four years that the future value of the
enterprise will at any time be worth ninety percent of its initial value or less than that amount
over the next four years. Applying the first passage time model of equation one, if the future
value of the enterprise S(t) follows a random walk and given the following parameter
estimates: µ equals eight percent, σ equals twenty percent, T equals four years, S equals $100
and C equals $90, the probability p that the future value of the enterprise falls to $90 or less at
least once in the next four years approaches 100 percent.
What can be done to reduce this probability of witnessing a loss of ten percent or more
one or more times over the next four years? Hedging should work to reduce the standard
deviation σ of continuous returns so that this first passage time probability is reduced. So, in
this way hedging reduces risk. See Table 1 below to see the effect on the first passage time
probability that a reduction in standard deviation produces, assuming other variables held
constant.
Table 1
First Passage Time Probability Changes as Standard Deviation Changes
Expected
Continuous
Return on
Investment
Standard
Deviation Around
Expected
Continuous
Return on
Investment
Probability that a
Loss of 10 % or
More of the Initial
Investment Will Be
Witnessed at Least
Once Over
Investment
Horizon
10 %
8%
24 %
72 %
4 years
10 %
8%
20 %
65 %
4 years
10 %
8%
16 %
52 %
Investment
Horizon
Critical Loss
as a
Percentage of
Original
Investment
4 years
But the problem of hedging to reduce standard deviation is that hedging may also reduce
expected returns µ. However, this first passage time model allows the consideration of
changes in both of these variables. And even though hedging may reduce expected returns the
major point remains: hedging, if it is to work, must reduce the risk of witnessing a large loss
over an investment horizon by reducing the standard deviation around expected returns.
I think hedging can work to reduce risk in the case of business enterprises which
operate under pure competition. In the language of the first time passage model, σ can be
reduced by hedging. Certainly the wheat farmer can sell her crop at a certain price by way of a
producer’s hedge, thereby eliminating price risk associated with wheat. What about business
enterprises which compete in oligopolistic markets? The next section considers the question of
whether or not businesses competing in an oligopolistic market can reduce risk by way of
64
hedging. I think the next section shows that the answer to this question is no, unless all market
participants hedge alike.
HEDGING AS A GAME
In this section the problem airlines have of choosing whether or not to hedge jet fuel
prices is studied from a game-theoretic framework. The airline industry is studied because it is
an example of an oligopoly. As such it may be the case that your choice to hedge or not to
hedge jet fuel prices is not only connected to the future price of jet fuel but also connected to
your competitors’ hedging decisions. The combination of your hedging choice with that of
your competitors’ may have a bearing on which airlines survive apart from the future direction
of jet fuel prices.
To use game theory to think about hedging against the future possibility that future
input prices might increase, I begin with an assumed preference ordering over different future
states of the world. Certainly this preference ordering must reflect a desire for lower input
costs for each competitor. And in an oligopoly it must be true that one cares about their own
company’s cost structure but also care about the competitors’ cost structures too, so this idea
must also be reflected in a preference ordering.
What can each firm control in this game? Each can choose whether or not to hedge
against the possibility of higher input prices. What can firms not control? Two things:
whether or not their competitors hedge, and whether or not the prices for inputs rise. I hope
that game theory can help us predict under what conditions a firm should hedge.
In this section it is argued that in oligopolies, like the U.S. airline industry, that there
are profound problems associated with executing hedging strategies. To see this take the
problem of an airline that considers hedge possible increases in jet fuel prices. Perhaps all
airlines in this industry will choose to hedge. But if some airlines hedge while others do not,
then winners and losers are created based on the direction that jet fuel prices take and who
chooses to hedge. And if this is so, then the act of hedging when your competitor chooses not
to hedge, or vice versa, may not be risk reducing in the sense that buying insurance reduces
risk, but an act of placing a bet on the direction that jet fuel prices might take. So hedging
input prices reduces risk only when all participants in the industry hedge. Otherwise, winners
and losers are created by hedging: if you hedge and input prices go up, you win, but if you
hedge and input prices go down, you lose, and so forth.
Table 2 below describes preferences over possible future states of the world that will
permit us to keep score of who wins and who loses in a hedging game that will be illustrated in
a following table. Consider eight possible future states of the world. Each future state is
described in three dimensions: input prices, your decision to hedge input prices, and your
competitor’s decision to hedge input prices. To keep the model simple, it is assumed that one
can either hedge or not hedge, and input prices can only go up or down. A preference index
number of one indicates the worst possible future state and an index number of eight, the best
65
possible future state.
Table 2
Preference Over Possible Future States of The World
Where Rank 1 is Least Preferred
You
They
Input Price up
You Hedge
They Hedge
7
7
Input Price up
You Hedge
They Do Not Hedge
8
8
Input Price up
You Do Not Hedge
They Hedge
3
6
Input Price up
You Do Not Hedge
They Do Not Hedge
4
4
Input Price down
You Hedge
They Hedge
2
2
Input Price down
You Hedge
They Do Not Hedge
1
6
Input Price down
You Do Not Hedge
They Hedge
6
1
Input Price down
You Do Not Hedge
They Do Not Hedge
5
5
The way I have ordered these preference numbers, the worst thing that can happen to
“you” is that “you” hedges and “they” does not hedge when input prices fall: “they” can take
advantage of lower input costs, but “you” cannot do this because “you” has lost money
hedging. By contrast, the best thing that can happen to “you” is that input prices go up while
“you” has protected against that eventuality by hedging but at the same time “they” has no
such protection: “You” makes money from hedging that offsets higher input costs, but “they”
suffers from these higher costs. If both hedge, whether input prices rise or fall, neither gains
any advantage over the other. The same thing can be said if both do not hedge. My list of
preferences in Table 2 above are consistent with my hypothesis: in the context of oligopolies,
hedging does not reduce risk unless all participants hedge alike. Table 3 below shows a
reorganization of these same preferences such that each preference can be easily seen as
connected to the play of two players in a normal form (Bayesian) game. Reading from left to
right one sees pairs of preference index numbers. The first preference number of every pair is
the preference number for the row player, “you,” and the second preference number of every
pair is the preference number for the column player, “they.”
66
Table 3
Preferences In a Normal Form (Bayesian) Game With Two Players
INPUT PRICE UP
They Hedge
You Hedge
You Do Not Hedge
7
3
7
6
They Do Not Hedge
8
4
INPUT PRICE DOWN
They Hedge
You Hedge
You Do Not Hedge
2
6
2
1
8
4
They Do Not Hedge
1
5
6
5
Table 3 above reveals two sources of uncertainty in this hedging game. Both players
do not know whether or not input prices are going to move up or down, and neither player
knows if their competitor will choose to hedge or choose not to hedge input prices. In order to
simplify the analysis, I have assumed that players must choose either to hedge or to not hedge,
and that input prices can only move up or down. For the preference structure that I have
assumed, I can find no dominant (or dominated) strategy choice.
There is no dominant choice strategy choice consistent with the preference structure
that I have hypothesized. Such a finding is consistent with the notion that, in perfect markets,
corporate managers are not to be compelled to hedge price risk because shareholders
themselves can choose either bet or not bet against input price movements as they wish. This
freedom on the part of shareholders permits corporate managers to hedge or not hedge as they
like, but they cannot expect to create value for shareholders by their hedging decision. As a
matter of fact some airlines hedge and some do not. The effect that hedging or not hedging has
had on jet fuel prices for selected airlines is described in the next section.
EMPIRICAL
Data for this paper is made possible by the accounting professions’ desire to account
for derivative contracts at their market value so that investors and other interested parties could
more accurately gage the success or failure of publically held companies as they attempt to
deal with price volatility of foreign exchange and commodity markets. Originally
implemented in 2000, Statement of Financial Accounting Standards No. 133 defines cash flow
hedges and requires that the market value of those derivative contracts which are entered into
in order to make these hedges work be found on the balance sheet. And, for hedges that are
deemed under this standard to be effective at reducing risk, the changes in the market value of
derivative contracts employed to effect hedges are booked to other comprehensive income,
67
until the underlying exposure that is being hedged is either used or sold. When that is
accomplished, any gain or loss moves from other comprehensive income to the income
statement. In 2008 Statement of Financial Accounting Standards No. 161 amended FASB
Statement No. 133 to require that firms disclose how and why they hedge, and in what
accounts any gains or losses associated with hedging are located in the balance sheet, in other
comprehensive income, and in income statement accounts. Prior to the adoption of these
accounting standards it would have been difficult to gather data about the subject of the
empirical part of this paper, the jet fuel costs of large airlines after the results of hedging are
accounted for.
US Air being the exception, airlines wish to reduce the effect of a possible increase in
jet fuel prices, hedging jet fuel costs either by way of the swap market or by taking offsetting
positions in derivatives markets. However, these hedging efforts notwithstanding, the problem
of rising fuel costs persists. Hedging has not accomplished its purpose in the airline industry.
Hedges should have counteracted these rising jet fuel costs.
To see this failure, consider below the average per gallon fuel costs for six airlines in
the years 2007 through 2012, a period of rising jet fuel prices. This data below was found in
various 10-K reports. In each column a ticker symbol identifies each particular company.
Note in the table below that US AIR has the lowest jet fuel cost in three of the last four years.
Table 4
After Hedging Per Gallon Jet Fuel Costs After For Selected Airlines
UAL
AMR
DAL
LUV
USAIR
JBLUE
2012
$3.27
$3.20
$3.26
$3.30
$3.17
$3.21
2011
$3.06
$3.00
$3.05
$3.19
$3.11
$3.17
2010
$2.39
$3.20
$2.33
$2.51
$2.24
$2.29
2009
$1.80
$2.00
$2.15
$2.12
$1.74
$2.08
2008
$3.52
$3.03
$3.13
$2.44
$3.17
$3.08
2007
$2.18
$2.13
$2.24
$1.80
$2.20
$2.18
From left to right: United Airlines, American Airlines, Delta Air Lines, Southwest Airlines,
US Airlines, and JetBlue. Each number in the table above represents average jet fuel cost per
gallon, after the results of any hedging activity are accounted for. (Delta Air Lines, DAL,
since June of 2011 has declined to classify hedges as such in order to qualify accounting
treatment as hedges, but this has not distorted these comparisons above.)
The interesting point concerns US Air. Management of this airline decided in 2008 to
no longer hedge their jet fuel costs. By the third quarter of 2009 all of their hedging contracts
were gone. Since that time, even though jet fuel costs have continued to rise, their jet fuel
costs have been the lowest among the six airlines that I have studied. This makes me wonder:
how could it be that US Air has lowest jet fuel cost in a period of rising jet fuel prices when the
other five have hedged against these increases and they have not?
68
By contrast, Southwest Airlines, known for its past success in hedging rising jet fuel
costs, has not done as well as US AIR with regard to jet fuel costs. But hedging is not the
whole story for Southwest. Gwynne (2012) reports that Southwest, the largest domestic airline
which carried a record 104 million passengers last year, is the only domestic airline that has
avoided bankruptcy. The other major airlines: American, United, Delta, Northwest, and US
Airways have sought bankruptcy protection since September 11, 2011, or, like Continental,
have lost their separate existence. When the price of oil began to increase dramatically in 2000,
Southwest was protected in large degree by hedges, which saved the company four billion
American dollars from 2000-2011. But recently, as Carey and Nicas (2011) report, and as
Table 2 above shows, hedging has not benefited Southwest’s bottom line. Carey and Nicas
(2011) report that third quarter 2011 earnings deficit for Southwest Airlines were largely the
result of losses in its hedge portfolio. My sense is that when jet fuel prices dropped
dramatically after the recession of 2008, Southwest lost their cost advantage because their
hedges began to lose money, and in response, Southwest began a program of unwinding some
of their hedge positions while at the same time jet fuel prices started to climb.
Consider a ranking of airlines by their average jet fuel costs after the effects of hedging
are considered. Using the data set above Table 5 is created below. For each year, I assign rank
1 to the airline with the lowest cost and go up from there. In the year 2007 the average cost per
gallon of jet fuel for United and JetBlue were the same: third place and fourth place were tied.
Table 5
A Ranking of Selected Airlines By Their Per Gallon Jet Fuel Costs After
Hedging Effects
UAL
AMR
DAL
LUV
USAIR
JBLUE
2012
5
2
4
6
1
3
2011
3
1
2
6
4
5
2010
4
6
3
5
1
2
2009
2
3
6
5
1
4
2008
6
2
4
1
5
3
2007
3.5
2
6
1
5
3.5
Notice that the advantage that Southwest Airlines (LUV) had in lower jet fuel costs was gone
beginning in the year 2009, and that US Air, the airline that stopped hedging does well when
compared to the other airlines which have continued to hedge.
It may be that hedging is important in an economic sense, but that differences in
hedging practices from airline to airline are not statistically significant. Consider the null
hypothesis – Differences in hedging practices from one airline to another do not produce
different jet fuel costs. The alternative hypothesis is that differences in hedging practices do
produce different jet fuel costs. Take the data set contained in Table 4 which is the annual jet
fuel costs after hedging effects are accounted for, airline by airline for the years 2008 through
2012. Let the treatment variable be identified as the choice of airline, with six levels of that
69
treatment variable, one for each of the six airlines studied. And let the blocking variable be the
time periods in which annual per gallon jet fuel costs were measured, with six levels of that
blocking variable, one for each of the six years annual per gallon jet fuel costs were recorded.
Table 6 below is an ANOVA table that results:
Source
of
Variation
Airline
Year
Error
Total
Table 6
Analysis of Variance of Per Gallon Jet Fuel Cost After Hedging Effects
Degrees
Sum of
of
Mean
Squares
Freedom
Squares
0.15560
5
0.0311
8.761233
5
1.7522
1.41987
25
0.0568
10.3367
35
F Ratio
0.547939
30.84859
One cannot reject the null hypothesis that differences in hedging practices are uncorrelated
with jet fuel cost at any reasonable level of confidence. There is no evidence that differences
in hedging practices across the six airlines sampled over the years 2007-2012 produce different
annual jet fuel costs. As expected the inclusion of blocking variable – time period – was
highly effective in making the analysis of variance more powerful than it otherwise could be.
The blocking variable is statistically significant the 99 percent level of confidence. This test is
arguably powerful in a statistical sense and yet the null hypothesis cannot be rejected. This
leads me to believe that in fact airlines at least since the end of the 2008 recession do not see
that differences in their hedging practices lead to different results in regard to their jet fuel
costs. Although not shown above, a non-parametric approach, the Friedman test, produces
results identical to that of the analysis of variance.
But it may be the case that this will not be true in the future. Delta Air Lines (DAL)
has in 2012 purchased an oil refinery with the intention that this investment will alleviate a
shortage of jet fuel supply. Hargreaves (2012) reports that Delta purchased the shut-down
Phillips 66 Trainer Refinery for $150 million in 2012. It plans to invest another $100 million
to modify the refinery so that it can produce more jet fuel. From the Delta 2012 form 10-K I
find that in June of 2012 the Trainer refinery, located near Philadelphia, Pennsylvania, was
acquired in response to Delta’s inability to control jet fuel costs through hedging, in response
to higher refining margins for jet fuel, and declining supply of jet fuel in the North-Eastern
United States. The Trainer refinery has a capacity of 185,000 barrels per day. This refinery
restarted in September 2012 by Delta is buying its crude oil from BP under a three-year
agreement. Delta is selling non jet fuel products to Phillips 66 in exchange for more jet fuel.
Delta is also selling non jet fuel products to BP. Figure 1 below describes this transaction.
70
Figure 1
Delta consumes jet fuel
produced from its refinery
and produces other refined
products not consumed
BP purchases some refinery
production other than the jet fuel
from Delta’s refinery and sells
crude oil to the refinery
Delta exchanges some of
its refinery production
for more jet fuel with
Phillips
CONCLUSION
In the context of oligopolies hedging may be used by management to fix the price of
some input, but this decision cannot reduce risk unless all competitors hedge alike. If instead
some choose to hedge and others not, winners and losers will be created by the price
movement of the input being hedged. If input prices go down, those who hedge lose. If input
prices go up, those who hedge win. So, in the case of oligopolies, hedging does not reduce
risk.
REFERENCES
Aretz, Kevin and Sohnke M. Bartram. (2010). Corporate Hedging and Shareholder Value. Journal of Financial
Research 33(4), Winter, 317-371.
Bailey, Jeff. (2007, November, 28). Southwest Airlines gains advantage by hedging on long-term oil contracts.
The New York Times.Retrieved from http://www.nytimes.com/2007/11/28/business/worldbusiness/
Campello, Murillo, Chen Lin, Yue Ma, and Hong Zou. (2011). The Real and Financial Implications of Corporate
Hedging. Journal of Finance 64(5), October, 1615-1647.
Carey, Susan. and Jack Nicas. (2011, October 21). Hedge Moves Hamper Southwest, Alaska Air. The Wall
StreetJournal.
Retrieved
from
71
http://online.wsj.com/article/SB10001424052970204618704576642761294620674.html
Delta Air Lines. (2013). Delta Air Lines, Inc. 10-K Annual report pursuant to section 13 and 15(d) of the
Securities and Exchange Act of 1934 Filed on 02/01/2012 Filed period 12/31/2012. Atlanta, Georgia:
Delta Air Lines.
Delta Air Lines. (2012). Delta Air Lines, Inc. 10-K Annual report pursuant to section 13 and 15(d) of the
Securities and Exchange Act of 1934 Filed on 02/01/2012 Filed period 12/31/2011. Atlanta, Georgia:
Delta Air Lines.
Financial Accounting Standards Board. (1998). Statement of Financial Accounting Standards No. 133 Accounting
for Derivative Instruments and Hedging Activities. Norwalk, Connecticut: Financial Accounting
Standards Board of the Financial Accounting
Foundation.
Financial Accounting Standards Board. (2008). Statement of Financial Accounting Standards No. 161 Disclosures
About Derivative Instruments and Hedging Activities an amendment of FASB Statement No. 133.
Norwalk, Connecticut: Financial AccountingStandards Board of the Financial Accounting Foundation.
Fisher, Irving. (1930). The Theory of Interest. New York: The Macmillan Co.
Fitzpatrick, Dan and Gregory Zuckerman. (2012). ‘Whale’ Tab Hits $5.8 Billion. Wall Street Journal 155(11),
July 14-15, B1-B2.
Gwynne, S.C. (2012). Luv and War at 30,000 Feet. Texas Monthly 40(3), March, 124-196. Retrieved from
http://www.texasmonthly.com/story/luv-and-war-30000-feet
Hargreaves, Steve. (2012, May 2). Delta’s risky oil refinery bet. CNNMONEY. Retrieved from
http://news/companies/delta-refinery/index
Heilbroner, Robert L. (1986) The Worldly Philosophers, 6th Ed. New York: Simon & Schuster.
Mackay, Peter and Sara B. Moeller. (2007). The Value of Corporate Risk Management. Journal of Finance 52(3),
June, 1379-1419.
Southwest Airlines Co. (2012). Southwest Airlines Co. 2011 Annual Report to Shareholders. Dallas, Texas:
Southwest Airlines Co.
Southwest Airlines Co. (2013). Southwest Airlines Co. 2012 Annual Report to Shareholders. Dallas, Texas:
Southwest Airlines Co.
72
ASYNCHRONOUS ONLINE UNDERGRADUATE
BUSINESS DEGREE PROGRAMS IN TRADITIONAL
REGIONAL COLLEGES: COSTS AND BENEFITS
M. Keith Wright
University of Houston, Downtown
ABSTRACT
Because of popular beliefs about online education, many traditional business colleges
are now considering adding asynchronous online degree programs (AODPs) to their
classroom and/or hybrid programs. This paper reviews the important literature bearing on
that decision, and then examines it from the quality, economic, and ethical viewpoints. Our
review finds no evidence that such a strategy is, for traditional regional universities, likely to
create economic value equivalent to that of traditional classroom or hybrid strategies.
Furthermore, we find that online programs can damage the brand of traditional universities.
INTRODUCTION
Online learning is one form of distance learning. It involves the use of computer
networks and course management software to transmit educational materials among students,
teachers, administrators, and support staff.
Other forms of distance education include
interactive TV and teleconferencing. Online learning has become a global cultural
phenomenon. The use of internet tools such as search engines, social networks, YouTube,
Wikipedia, and course management systems, has truly revolutionized and popularized distance
education. For example Stanford University recently attracted more than 150,000 students to
a noncredit artificial intelligence MOOC (massively open online course) taught by a pair of
celebrity professors (Pappano, L, 2012; Rosenthal, 2013).
Because of popular beliefs about online courses, many traditional business colleges are
now considering offering entire degree programs online, in an apparent attempt to compete
head on with for-profit online schools such as The University of Phoenix, Devries University,
and many others. We call these programs AODPs - asynchronous online degree programs.
AODPs do not require students to perform learning and assessment activities at any exact time
or place, throughout the program. Thus, it is possible for such students to earn a college degree
without ever going to a physical classroom or testing center.
In today's service-oriented economy, most high paying jobs require a college degree.
Many traditional business college administrators view this new demand as an opportunity to
use AODPs as a low cost means to serve this new market segment. Many such administrators
initially saw this segment as consisting of self-motivated fulltime working adults without
access to a quality classroom education. We call this student "segment 2". Although many
colleges probably wanted to offer a quality AODP to segment 2, they instead had to settle for a
low quality program because of the unexpected high costs. These low quality programs have
in turn attracted a new segment of degree seeking students who find that these lower quality
AODPs require fewer study skills and less study time than do most classroom degrees (Beker,
73
et al, 2003). We call this student "segment 3". These students are attracted to asynchronous
online courses in part because of the associated un-proctored exams. This emergent "segment
3" culture is evidenced in this recently published quote from one of 250 Harvard students
recently accused of cheating on an un-proctored exam:
"He said that he also discussed test questions with other students, which he
acknowledged was prohibited, but he maintained that the practice was widespread and
accepted." (NY Times, 2012)
Due to the current popularity and convenience of online communication among younger
people, many traditional (segment 1) students with access to classrooms also prefer online
courses to classrooms.
Because of this burgeoning popularity of online courses, and increased demand for
college degrees, the incidence of online courses and has exploded. According to Columbia
University’s Community College Research Center, a third of all college students (more than
seven million) are now enrolled in online courses (Jaggars, S.J, 2009; NY Times, 2013).
There are now more than 90,000 college courses available online (AACSB, 2010). In addition,
89% of public, four-year colleges now offer at least one course online. More than 50% of
those colleges offer AODPs (asynchronous online degree programs) (Adams & Defleur, 2006).
As you may have guessed, many senior university administrators have been found
unfamiliar with much of the large body of empirical literature on asynchronous online learning
and its strategic implications for their institutions (Arbaugh et al., 2009; McCarthy & Samors,
2009; Kulchitsky, 2008).
One reason for this lack of awareness may be the obscure
distribution channels of this research (Redpath, 2012). Another reason is the frequency of
opinion articles that have appeared over the years in the Chronicle for Higher Education and
Biz Ed (Clift, 2009; del’Etraz, 2010; Bartlett & Smallwood, 2004b). The purpose of our paper
is to help fill this empirical knowledge gap.
Accordingly, we next review the most well respected empirical literature on online
teaching. Then we discuss its college-wide strategic implications and make recommendations
to administrators. We then conclude with suggestions for possible areas of valuable new
research.
LITERATURE REVIEW
Empirical studies comparing online to classroom learning typically use one or more of
the measures shown in table 1. Proponents of online courses cite primarily the 2009 metaanalysis published by the U.S. Department of Education. Table 2 shows some of the popular
conclusions drawn from that analysis. However, we now present a broader literature review,
which suggests that the US Department of education study does not sufficiently inform the
strategic decision to offer an AODP (asynchronous online degree program).
74
Table 1: Empirical Research Categories
Measures
Methods
Article Samples
Sautter, 2007;
learning outcomes direct or indirect
Lim, et al, 2007.
Allen et al, 2002;
student satisfaction indirect
Lim, et al 2007
grades
direct
Lim, et al 2007
Kim, & Bonk, 2010;
faculty satisfaction indirect
Seaman, J.2009;
Tanner, et al. 2009
Table 2: Popular Conclusions: U.S. Department of Education Study
1) there no significant differences between online and classroom
learning outcomes and satisfaction, independent of subject matter
and student type;
2) blended or hybrid courses are better than purely classroom delivery.
3) online courses are less expensive and more scalable that classroom
courses.
Conditions for success in online learning
A substantial body of evidence has now been accumulated indicating that success in
any single online course is strongly dependent on many variables, including subject matter and
student type (Aragon et al, 2002; Jahng et al, 2007; Kick et. al. 2007; Shachar, 2008; Seaman,
2009; Sitzmann, et al., 2006; Zhao et al., 2005). Table 3 shows the variables believed to be
strongly interacting with the mode of course delivery (Peltier et al 2007).
Course Subject
There is much evidence to suggest that, under the right conditions, online courses in
applied qualitative courses such as management, marketing, and computer operations can be as
good as classroom courses. ( Friday, et all, 2006; Priluck, 2004; Sweeny, et al, 2001; TalentRunnels, et al, 2006; Ivancevich et al, 2009; Weber & Lennon, 2007). On the other hand,
there is much evidence to suggest that online courses do not compare favorably to classroom
courses in quantitative or theory-based subjects, such as economics, finance, and accounting
(Arbaugh & Rau, 2007; Arbaugh, J. B. 2000a; Arbaugh, et al, 2010; Gagne & Shepard, 2001);
Smith et al 2008; Vamosi et al, 2004). These subject matter effects are likely due to a higher
level of student teacher social interaction needed in the quantitative and theory-based subjects
(Joy & Garcia, 2000; Redpath, 2012).
75
Table 3: Course Delivery Mode Interaction Effects
course subject
student perceptions of delivery mode
instructor perceptions of delivery mode
professor and student skills
faculty preferences
student learning styles
degree of possible social interaction
student and faculty preferences
student maturity
student learning styles
Social Interaction and Collaboration
Most studies of online learning indicate that the degree of effective social interaction,
especially between student and teacher, is one of the most important predictors of college
learning success (Brower, 2003; Liu et al.,2005; Garrison et al., 2000; Kim & Bonk, 2006,
2010; Ke, 2010; Nemanich et al.,2009; Peltier et al, 2003; Peltier et al., 2007; Shea et al.,
2010). Furthermore, there is literature indicating that successful undergraduate business
students require more teacher-student interaction than successful MBA students do. (Arbaugh,
J. B. 2010a). The research also shows that the teaching time and labor needed to facilitate
social interaction is much greater for online delivery than for the classroom (Alfred & Rovai,
2002).
The quality online teacher must take the time to provide explicit structure and rules for
social interaction; otherwise student participation will be lower than in the classroom (Sautter,
2007). Research also shows that for effective online collaboration, the instructor must create a
sense of “being there” through rapid response to individual student questions (Ke, 2010;
2010b).
Research shows clearly that merely opening a discussion board is not enough to ensure
effective collaboration (Redpath, 2012). The quality online instructor must also actively
facilitate the student-student interaction on discussion boards and group projects. This
includes identifying areas of agreement and disagreement, encouraging and reinforcing
contributions to learning, promoting exploration of ideas and productive dialogue, prompting
probing and prompting reflection (Ivancevich et al, 2009). This may require the instructor to
monitor several simultaneous discussions, provide timely feedback, and timely conclusions of
discussion threads. Such work requires a delicate sense of timing and balance among these
various instructional roles (Arbaugh, 2010b; Liu et al., 2005; Shea et al., 2010). Too much or
too little instructor involvement may have a negative effect on the quality and quantity of
student participation (Arbaugh, 2010b; Ke, 2010; Kellogg & Smith, 2009; Mazzolini &
Maddison, 2007).
Quality online teachers must provide clear instructions and monitoring of student time
constraints and dysfunctional group dynamics such as social loafing (Brower, 2003; Kellogg &
Smith, 2009). Such instructors must provide a strong rationale for online group work and a
76
good balance between that and individual assignments (Mullen & Tallent-Runnels, 2006). In
addition, research shows that if teachers do not grade group assignments in near real-time, low
student participation is likely (Brower, 2003). There is also evidence that low participation in
discussion boards is likely when students do not value their classmates' opinions (Redpath,
2012); and students have expressed dissatisfaction with superficial discussion board postings
that add no value (Ke, 2010).
Online instructors have reported feeling overwhelmed by the volume of discussion
board postings and the vigilance required to keep conversations on topic (Brower, 2003).
Teachers often respond to this pressure via coping behaviors such as superficial student
performance evaluation and avoidance of complex topics -- thus lowering course quality (Ke,
2010).
Economic Value of Online Programs
Many university administrators view online degrees a means to reduce costs, and to
gain economies of scale. However, as you might have surmised from the literature cited
above, the delivery time and labor involved in high quality online teaching significantly
exceeds that of an equivalent classroom. A study conducted by the Association of Public and
Land-Grant Universities found that 64% of faculty said it takes more effort to teach effectively
online as it does in the classroom (Seaman, 2009). In addition, there is research indicating that
the marginal cost of adding a student to a quality online course is greater than to an equivalent
classroom course (Noble, 1997). Finally, there is research indicating for online courses, there
is a negative relationship between class size and social interaction quality, and between class
size and student learning satisfaction (Hewitt& Brett, 2007).
In review, contrary to popular belief about high quality online courses, they are more
expensive per student than effective classroom courses. In turn, high quality AODPs are
significantly more expensive than equivalent classroom programs. Worsening the financial
picture for public colleges, there is some evidence that the extent of online course offerings can
reduce state appropriations (Jennings & Mixon, 2012). Furthermore, higher attrition rates and
faculty turnover may offset any revenue increases (Noble, 2007).
Attrition Rates and Ethical Issues in Online Programs
The attrition rates of MOOCs have been shown to be about 90% (Rosenthal, 2013).
However, MOOCs are non-credit, tuition-free programs. Unfortunately, the attrition rates for
online for-credit undergraduate courses are also significantly higher than those for classroom
programs. Columbia University’s Community College Research Center has done nine studies
covering thousands of programs in Washington and Virginia (Jaggars, S.J., 2006; Rosenthal,
2013). That research indicates that online community college students are significantly more
likely to fail or withdraw than classroom students. Another finding was that low-performing
students fall further behind in online courses than in classroom courses (Columbia, 2013;
Rosenthal, 2013). One of their studies, a five-year study issued in 2011, tracked 51,000
students enrolled in Washington State community and technical colleges. It found that those
who took higher proportions of online courses were less likely to earn degrees or transfer to
four-year colleges. The reasons cited were that students were attracted to online courses
77
because of their lack of English and time-management skills. A relevant quote from one of
these studies:
Lacking confidence as well as competence, these students need engagement with their
teachers to feel comfortable and to succeed. What they often get online is
estrangement from the instructor who rarely can get to know them directly. Colleges
need to improve online courses before they deploy them widely. Moreover, schools
with high numbers of students needing remedial education should consider requiring
at least some students to demonstrate success in traditional classes before allowing
them to take online courses…The online revolution offers intriguing opportunities for
broadening access to education. But, so far, the evidence shows that poorly designed
courses can seriously shortchange the most vulnerable student. (Jaggars, S.J., 2006).
In addition to the daunting challenges standing in the way of delivering a single high
quality online course, administrators should also consider the faculty perceptions AODPs.
This is one reason that many leading universities do not offer AODPs (Allen & Seaman,2009;
McCarthy & Samors, 2009).
For years, many leading academics have expressed direct and strong opposition to
purely online course delivery, viewing it as the harbinger of commoditization and
commercialization of higher education (Cox, 2005; Noble, 1997; Stahl, 2004). Some have
warned that that online learning may lead to a growing achievement gap between those who
can afford classroom courses and those who can not (Carr-Chellman, 2005). Then there are
the ethical issues associated with AODPs.
Public Perceptions of Online Programs
Impressions of AODPs have been negatively effected by recent media reports. There
have been many negative published accounts of cheating scandals, diploma mills, fake degrees
, and the aggressive advertising of for-profit online schools (Blumenstyk, 2005; Carnevale,
2002a; Perepres-Pena 2012; Wilner & Lee, 2002 ). It has been widely reported that some
online programs have faced legal accusations of false advertising (Bartlett & Smallwood,
2004a,b; Carnevale, 2002b; Koolan & Smith, 2003; Blumenstyk, 2005). Another example of
the bad press online degrees are now getting regularly is a recent NY Times editorial, which
asserts that courses delivered solely online:
"may be fine for highly skilled, highly motivated people, but they are inappropriate for
struggling students who make up a significant portion of college enrollment and who
need close contact with instructors to succeed" (Rosenthal, 2013)
Because of the 2008 downturn in the economy, business schools in general have come
under media attack from industry for not providing enough qualified graduates. Some leading
traditional business schools have defended themselves by criticizing online programs:
consider this quote from the dean of the Cambridge University business college (Barker,
2010):
78
"First and foremost, business education should be collaborative. Consider Oxford
University's MBA program, in which a class has about 240 students, each with about
six years of work experience, who represent nearly 50 countries and almost all sectors
of the economy. That amounts to some 1,500 years of experience. The pedagogical
opportunities in sharing it are obvious—and they require an environment in which
students actively work together and learn from one another….… in a collaborative
learning environment the people around you are more than just colleagues and friends;
they are an explicit and valuable part of your educational experience. It follows from
this that effective business education cannot be delivered exclusively online"(Barker,
2010)
Perhaps due in part to all the negative publicity online programs have recently gotten,
online degree programs face a difficult time getting accredited (AACSB International, 2007;
Redpath, 2012). Exacerbating the AODP image problem, the inconsistencies in US higher
education system have allowed many institutions to operate without accreditation, or with
accreditation by unrecognized agencies (Smallwood, 2004). Recent efforts to stop these nontraditional accreditation practices have led to tough state legislation ranging from mandating
additional accreditation requirements, to barring the use of unaccredited degrees on job
applications (Bartlett & Smallwood, 2004a).
Media rankings also contribute to the negative images of online programs. For
example, Financial Times Executive EMBA Rankings exclude executive MBA programs
(EMBA) that do not have 50% or more of their curriculum delivered in classrooms (Financial
Times, 2010). Instead, they relegate them to a separate list of unranked EMBAs that receive
far less attention (Financial Times, 2011).
The Market value of online Degrees
This negative impression of AODPs extends to employers as well: they have been
reluctant to hire graduates of purely online business programs (Carnevale, 2005, 2007). To
many employers, online degrees (and before that, correspondence degrees) are synonymous
with lower quality degrees. However, the brand recognition of the degree granting institution
mitigates the negative impression (Vault, Inc., 2001). Perhaps the best-respected study of these
effects was by Adams & Deflue in 2007. They addressed the question of whether a job
applicant with an online bachelor’s degree has the same chance of being hired as one who
completed their degree entirely in the classroom. Respondents were asked to choose one of a
pair of candidates based on the following three questions (See table 1.).
Table 4: Job Candidate Descriptions
Question 1: "Applicant A has the necessary degree. The degree was awarded by a college
or university where
100% of the applicant’s courses were completed via traditional classroom and lab
instruction."
Question 2: "Applicant B has the necessary degree. The degree was awarded by a ‘‘virtual
university.’’ This university does not have a campus, classrooms, labs or library, and
100% of the applicant’s courses were taken online".
Question 3: "Applicant C has the necessary degree. The degree was awarded by a college
79
or university, where 50%
of the applicant’s courses were taken online, and the other 50% were completed via
traditional classroom and lab instruction."
The first pairing, which had questions 1 and 2, showed that 96% (258 managers)
reported they would choose the classroom educated candidate over the online educated
candidate. The second pairing had questions 1 and 3 . Then 75% o f m a n a g e r s reported that
they would prefer the 100% classroom educated applicant to the 50% classroom educated
applicant.
These researchers also conducted a content analysis of the respondents' written
comments. Social interaction and classroom experiences surfaced as the theme of respondents'
most troubling perception of online coursework; but accreditation also surfaced as an important
hiring influence. Examples of such comments are shown in table 5. Another part of that
survey showed that many respondents commented that online courses from a known
‘‘traditional’’ college were "more acceptable" than those from an unknown. Furthermore,
about a third of respondents commented that an applicant with a mix of online and
classroom coursework was ‘‘more acceptable’’ than one with only online courses.
Respondents' comments also seemed to indicate that job experience was increasingly more
important than a degree, as a career progresses.
Table 5: Comments about hiring decisions
"The academic experience requires interaction between students, professors, and local
businesses. The internet, even when properly authenticated and accredited, creates a
‘‘sterile’’ learning environment. Opportunities to circumvent traditional learning methods
(interaction, role play, quizzing) create opportunities for less honest individuals to increase
their credentials."
"In my opinion a lot more than just the coursework is gained from classroom instruction;
feedback, interaction with others, participation, public speaking etc. It is my belief that this is
lost through on-line learning."
"Personal interaction between instructors and students presents a more real world
approach to learning. There are no jobs in this organization that are completed over the
Internet only."
"Students lose team experience and the ability to learn from each other. Part of learning is
interaction with peers and teachers. These skills are extremely useful in my work environment
and I would prefer candidates who have them."
Although we have seen no research that explains the processes at work when hiring
officials evaluate job applicant credentials, research implies that a significantly majority of
employers view AODPs with suspicion.
80
In another of their national surveys, DeFleur and Adams (2004) found graduate
school admission administrators extremely reluctant to accept students with online bachelor
degrees: only 7% of administrators in the public institutions and 11% of private
institutions indicated that they would be admit such an applicant.
DISCUSSION
In review, we believe that the perspective gained from an analysis of the entire vast
body of empirical literature comparing online to classroom delivery reveals several things.
First and foremost is that online technology can add value to any college course. However
there are many situations where purely asynchronous online courses are inferior to classroom
courses. This is mostly likely to occur when faculty don’t have the extra time, assistance,
compensation, or training needed for quality online course delivery (Redpath, 2012). As a
result may faculty don't consider online activities appropriate for their discipline. For years,
many leading academics have expressed direct and strong opposition to purely online course
delivery, viewing it as the harbinger of commoditization and commercialization of higher
education (Cox, 2005; Noble, 1997; Stahl, 2004). Some have warned that that online learning
may lead to a growing achievement disparity between those who can afford to access
classroom courses and those who cannot (Carr-Chellman, 2005).
On the other hand, the
literature clearly shows there are conditions under which online courses can be as good as
classroom courses (Larson & Sung 2009). A proponent of online teaching recently
summarized these conditions nicely. Here is an excerpt from that article:
"The lack of face-to-face interaction [in online delivery] can be overcome by creating a
context where students can learn collectively and collaboratively. Communication
immediacy and richness, typically an advantage of classroom learning, can be overcome
by effective online instructional techniques and students’ ability to adapt to online
environments. The use of humor, personal anecdotes, and the shorthand and emoticons
that are part of the lexicon for online communication can counteract the absence of
body language in online environments. Instructors can create safe environments for
meaningful and honest communications by establishing a sense of trust and fairness,
disclosing more about themselves and their interests, and employing a variety of
pedagogical and social roles that facilitate online collaboration and learning. Particular
attention must be paid to minimizing instructor time devoted to technical and course
administration support …"
"Faculty often lack knowledge of the
pedagogy, instructional techniques, and
technical skills employed in online learning environments …."
"Faculty respondents rated their universities as “below average” in providing support
and extra compensation for online teaching. Training, alone, will not be sufficient to
support effective online teaching. Creation of an active online learning community
where faculty can share experiences on a continuous basis is more likely to sustain
faculty commitment and skills development …" (Redpath; 2012).
81
Because the empirical literature clearly enumerates the myriad of conditions that must
be in place to deliver a single high quality asynchronous online college course, it seems
entirely unlikely that an entire degree program offered asynchronously online will be as
effective as either a classroom or a hybrid program. Furthermore, contrary to the expressed
opinions of many business school administrators, the empirical literature clearly indicates that,
instead of decreasing the economic costs to schools with existing classroom facilities, a quality
AODP is as likely to add to total economic costs (Noble, 1997). These costs may be hidden in
the extra duties of dedicated faculty, or compensated for by the lower quality teaching of less
dedicated faculty. Other costs are computers, software, maintenance, underutilized physical
facilities, higher attrition rates, and damage to the institution's brand. Furthermore, these costs
may not be offset by sustainable increased revenue because of faculty turnover, and lower
sustainable enrollment (Noble, 1997).
CONCLUSIONS AND FUTURE RESEARCH
In conclusion, despite the popularity of some online courses, investments in high
quality AODPs are quite risky (See also Kulchitsky, 2008). To mitigate these risks, we feel
that such schools should take the following steps.
To avoid charges of false advertising, administrators should promote AODPs only to
self-motivated, older non-traditional, or advanced students. Weaker students just out of high
school or community college should be dissuaded from enrolling in AODPs, especially those at
less well-known regional schools. Such students are subject to the pain of discovering upon
graduation that their degrees are not nearly as acceptable to employers as classroom degrees.
Administrators of hybrid programs should not pressure students to take online classes by not
offering an equivalent choice of classroom classes. In the latter case, many students will take
on online class not because of preference, but because they do not want to delay graduation.
However, these same students may file formal complaints if they can not find a good job after
graduation. In addition, providing students with unforced choices between online and
classroom course offerings enables valuable metrics for ongoing continuous improvement
programs applicable to both delivery modes. Finally, to avoid damaging the brands of coexistent traditional programs, colleges offering asynchronous online degrees should label them
as such, to avoid their confusion with their classroom programs.
The evidence shows that, although online technology can add value to almost any
single college course, the business case for a high quality AODP is hard to make, especially for
regional state colleges facing large budget cutbacks. Taking a cue from large corporations,
where online training has been quite successful, business colleges should limit the amount of
asynchronous activities in their online courses. Synchronous activities such as conference
calls, teleconferences and webinars can greatly improve the quality of online courses.
Furthermore, inexpensive test-proctoring centers are readily available in most cities.
To mitigate further the risks of online college courses, administrators should not choose
course delivery mode without faculty input. Expert faculty members are more likely than
generalist administrators to apply online technology where it can be most educationally
effective. Delivery mode decisions should not be driven solely by administrators' hopes of
revenue increases.
Business school administrators can further mitigate the risk of AODPs by collaborating
with educational technology experts, and encouraging pedagogical research across disciplines.
82
Future strategic advantages for business colleges will likely accrue to those schools that
promote teaching innovation regardless of delivery mode: there are likely to be minimal gains
from additional studies to prove which mode of learning is better. The complex interaction
effects among instructional methods, learner characteristics, faculty characteristics,
technology costs, attrition rates, and other variables affecting learning quality raise the best
questions for further research (Arbaugh et al., 2009; Peltier et al., 2007). Course
management software will benefit greatly if researchers continue to develop and test emerging
design models: today's online course management systems are very incomplete in the areas of
security, vigilance, and learner-directed study (Machado & Tao, 2007). Course management
research should continue to explore the application of technologies including design science,
social networking, knowledge management, self directed learning, and mobile computing. (Li,
2007; McKerlich & Anderson, 2007; Twining, 2009). Regardless of the future of AODPs,
business colleges will continue to depend on research faculty to explore advances in hybrid
pedagogy.
REFERENCES
AACSB International. 2007. Quality issues in distance learning. Tampa: AACSB International. On 3/14/13,
retrieved
from:
http://www.aacsb.edu/publications/whitepapers/quality-issues-distance-learning.pdf
Accessed 03/14/2011.
AACSB International. 2010. AACSB member schools are increasing online program offerings. In eNewsline:
Management education news from AACSB. Tampa: AACSB International.
AACSB. 2003. [Association to advance collegiate schools of business] international. Sustaining Scholarship in
Business Schools. Report of the Doctoral Faculty Commission to AACSB International’s Board of
Directors.Tampa: AACSB International.
Adams, J., & DeFleur, M. H. 2005. The acceptability of a doctoral degree earned online as a credential for
obtaining a faculty position. The American Journal of Distance Education, 19, 785.
Adams, J & Margaret H. DeFleur, M.H. 2006. The Acceptability of Online Degrees Earned as a Credential for
Obtaining Employment. Communication EducationVol. 55, No. 1, January 2006, pp. 32 - 45.
Alfred, A. Rovai, P, 2002. Ph.D., School of Education, Regent University A preliminary look at the structural
differences of higher education classroom communities in traditional and ALN courses. Journal of
Asynchronous Learning Net- works, 6. Retrieved from: http://sloanconsortium.org/jaln/v6n1/preliminarylook-structural-differences-higher-education-classroom-communities-traditional. Accessed 3/14/2013.)
Allen, I. E., & Seaman, J. 2008. Staying the course: Online education in the United States. Needham, MA: Sloan
Consortium.
Allen, I. E., & Seaman, J. 2009. Learning on demand: Online education in the United States. Needham, MA:
Sloan Consortium.
Allen, I. E., & Seaman, J. 2010. Class differences: Online education in the United States. Needham, MA: Sloan
Consortium. Retrieved from:
http://sloanconsortium.org/publications/ survey/pdf/class_differences.pdf.
Accessed 03/14/2013.
Aragon, S. R., Johnson, S. D., & Shaik, N. 2002. The influence of learning style preferences on student success in
online versus face-to-face environments. American Journal of Distance Education, 16: 227–244.
83
Arbaugh, J. B. 2000a. An exploratory study of the effects of gender on student learning and class participation in
an internet-based course. Management Learning, 31: 533–549.
Arbaugh, J. B., & Benbunan-Fich, R. 2006. An investigation of epistemological and social dimensions of teaching
in online learning environments. Academy of Management Learning and Education, 5: 435– 447.using a
multi-institutional sample. Internet and Higher Education, 11: 133–136.
Arbaugh, J. B., & Hwang, A. 2006. Does “teaching presence” exist in online MBA courses? Internet and Higher
Education, 9:9 –21.
Arbaugh, J. B., Cleveland-Innes, M., Diaz, S. R., Garrison, D. R., Ice, P., Richardson, J. C., & Swain, K. 2008.
Developing a community of inquiry instrument: Testing a measure of the Community of Inquiry framework
Arbaugh, J. B., Godfrey, M., Johnson, M., Pollack, B., Niendorf, B., & Wresch, W. 2009. Research in online and
blended learning in the business disciplines: Key findings and possible future direction. Internet and Higher
Education, 12: 71– 87.
Arbaugh, J. B., Bangert, A., & Cleveland-Innes, M. 2010. Subject matter effects and the Community of Inquiry
(CoI) framework: An exploratory study. Internet and Higher Education, 13: 37– 44.
Arbaugh, J. B. 2010a. Do undergraduates and MBAs differ online? Initial conclusions from the literature. Journal
of Leadership and Organizational Studies, 17: 129 –142.
Arbaugh, J. B. 2010b. Sage, guide, both, or even more? An examination of instructor activity in online MBA
courses. Computers and Education, 55: 1234 –1244.
Barker, R. 2010. No, management is not a profession. Harvard Business Review, 88: 52– 60.
Bartlett, T., & Smallwood, S. 2004a. Tilting at diploma mills. The Chronicle of Higher Education, 50, A15.June
25).
Bartlett, T., & Smallwood, S. 2004b. Let me be honest with you. The Chronicle of Higher Education, 50,
A15.June 25
Beker, A., Horn, L., & Carroll, D. 2003. Work first, study second: Adult undergraduates who combine
employment and postsecondary enrollment (Report No. NCES-2003 - 167). Washington, DC: National
Center for Education Statistics. Retrieved January 6, 2004, from http://nces.ed.ov/
pubsearch/pubsinfo.asp?pubid =2003167
Blumenstyk, G. 2005, January 31). For-profit education companies brace themselves for ’60 Minutes’ expose.
Chronicle of Higher Education, 51, A28.
Brower, H. H. 2003. On emulating classroom discussion in a distance- delivered OBHR course: Creating an
online learning community. Academy of Management Learning and Education, 2: 22–36.
Byrda, J. & Mixonb, P. Revenues and e learning: do universities need an online presence? Journal of Higher
Education Policy and Management, Vol. 34, No. 6, December 2012, 601–609 Revenues and e learning: do
universities need an online presence?
Carnevale, D. 2005. Employers still prefer traditional degrees over online learning, study finds. Chronicle of
Higher Education, 52: A43.
Carnevale, D. 2007. Employers often distrust online degrees. Chronicle of Higher Education, 53: A-28.
Carnevale, D. 2002a, January 25). Questions linger over rise and fall of online program. Chronicle of Higher
Education, 49, A27.
84
Carnevale, D. 2002b, September 6). Colleges demand that fakedegrees.com remove their names from its web site.
Chronicle of Higher Education, 49, A44.
Carr-Chellman, A. (Ed.). 2005. Global perspectives on e learning: Rhetoric and reality. Thousand Oaks, CA:
Sage.
Clift,
E. 2009, I’ll never do it again. Chronicle of Higher Education.
http://chronicle.com/article/Ill-Never-Do-It-Again/44250. Accessed 03/14/2013.
Retrieved
from
Cox, R. 2005. Online education as institutional myth: Rituals and realities at community colleges. Teachers
College Re- cord, May 21, 7: 1754 –1787.
de l’Etraz, P. 2010, November/December. What can an online program do for you? BizEd: 34 –39.
DeFleur, M. H., & Adams, J. 2004. Acceptability of online bachelor’s degrees as criterion for admission to
graduate school. Journal of Computing in Higher Education, 16, 150 - 163.
Gagne, M., & Shepard, M. 2001, April. A comparison between a distance and a traditional graduate accounting
class. THE Journal Online.
Financial
Times.
2010.
EMBA
rankings
2010.
Retrieved
http://rankings.ft.com/businessschoolrankings/emba-rankings-2010bAccessed 03/14/2013.
from:
Financial
Times.
2011.
Online
MBA
2011
listing.
Retrieved
http://rankings.ft.com/businessschoolrankings/online-mba-2011. Accessed 03/14/2013.
from:
Friday, E., Friday-Stroud, S. S., Green, A. L., & Hill, A. Y. 2006. A multi-semester comparison of student
performance between multiple traditional and online sections of two management courses. Journal of
Behavioral
and
Applied
Management,
18.
Retrieved
from:
http://ibam.com/pubs/jbam/articles/vol8/no1/JBAM_8_1_4.pdf. Accessed 03/13/2009.
Garrison, D. R., Anderson, T., & Archer, W. 2010. The first decade of the community of inquiry framework: A
retrospective. Internet and Higher Education, 13: 5–9.
Jaggars, S.J. 2006. Online Courses in Community Colleges. Communication Education Vol. 55, No. 1, January
2006, Columbia University’s Community College Research Centerhttp://ccrc.tc.columbia.edu/OnlineEducation-Instructional-Technology.html.
Joy, E., & Garcia, F. 2000, June. Measuring learning effectiveness: A new look at no-significant- difference
findings. Journal of Asynchronous Learning Networks, 4, 1. Retrieved December 20, 2004, from
http://www.sloan-c.org/publications/jaln/v4n1/v4n1_joygarcia.asp
Koolan, L., & Smith, S. 2003, State reviewing degree assertion by health lab chief. The Boston Globe, p. A5.November 12).
Hewitt, J., & Brett, C. 2007. The relationship between class size and online activity patterns in asynchronous
computer conferencing environments. Computers and Education, 49: 1258 –1271.
Ivancevich, J. M., Gilbert, J. A., & Konopaske, R. 2009. Studying and facilitating dialogue in select online
management courses. Journal of Management Education, 33: 196 –218.
Jahng, N., Krug, D., & Zhang, Z. 2007. Student achievement in online distance education compared to face-toface education. In European Journal of Open, Distance and E-Learning.
Jennings B., Mixon P.B., 201. Revenues and e learning: do universities need an online presence? Journal of
Higher Education Policy and Management. November 2012.
85
Ke, F. 2010. Examining online teaching, cognitive, and social presence for adult students. Computers and
Education, 55: 808 – 820.
Kellogg, D. L., & Smith, M. A. 2009. Student-to-student interaction revisited: A case study of working adult
business students in online courses. Decision Sciences Journal of Innovative Education, 7: 433– 455.
Kim, J., & Bonk, C. J. 2010. Towards best practices in online teaching: Instructional immediacy in online faculty
experiences. International Journal of Instructional Technology and Distance Learning, 7. Retrieved from:
http://www.itdl. org/Journal/Aug_10/article02.htm. Accessed 10/28/2010.
Kim, K., & Bonk, C. J. 2006. The future of online teaching and learning in higher education: The survey says...
Educause Quarterly, 29(4): 22–30.
Kock, N., Verville, J., & Garza, V. 2007. Media naturalness and online learning: Findings supporting both the
significant and no significant difference perspectives. Decision Sciences Journal of Innovative Education,
5: 333–355.
Kulchitsky, J. D. 2008. High-tech versus high-touch education: Perceptions of risk in distance learning.
International Journal of Educational Management, 22: 151–167.
Larson, D. K., & Sung, C. H. 2009. Comparing student performance: Online versus blended versus face-to-face.
Journal of Asynchronous Learning Networks, 13: 31– 42.
Li, X. 2007. Intelligent agent-supported online education. Decision Sciences Journal of Innovative Education, 5:
311–331.
Lim, D. H., Morris, M. L., & Kupritz, V. W. 2007. Online vs. blended learning: Differences in instructional
outcomes and learner satisfaction. Journal of Asynchronous Learning Networks, 10: 27– 42. (
Liu, S., Kim, K., Bonk, C. J., & Magjuka, R. 2007. What do online professors have to say about online teaching?
Online
Journal
of
Distance
Learning
Administration,
10.
Retrieved
from:
http://www.westga.edu/~distance/ojdla/summer102/ liu102.htm, accessed 3/14/13
Liu, X., Bonk, C. J., Magjuka, R. J., Lee, S. H., & Su, B. 2005. Exploring four dimensions of online instructor
roles: A program level case study. Journal of Asynchronous Learning Networks, 9: 29 – 48.
Machado, M. Tao, E., 2007. "Blackboard vs. Moodle: Comparing User Experience of Learning Management
Systems". Proceedings of the 37th ASEE/IEEE Frontiers in Education Conference, School of Information
Technology and Communication Design, California State University.
IEEE October 10 – 13, 2007
Milwaukee, WI.
Mazzolini, M., & Maddison, S. 2007. When to jump in the role of the instructor in online discussion forums.
Computers & Education, 49(2): 193–213.
McCarthy, S. A., & Samors, R. J. 2009. Online learning as a strategic asset, vol. 1, A resource for campus
leaders. In A report on the Online Education Benchmarking Study Conducted by APLU-Sloan National
Commission on Online Learning. Washington, DC: Association of Public and Land- grant Universities,
Office of Public Affairs.
McKerlich, R., & Anderson, T. 2007. Community of inquiry and learning in immersive environments. Journal of
Asynchronous Learning Networks, 11: 35–52.
Mullen, G. E., & Tallent-Runnels, M. K. 2006. Student outcomes and perceptions of instructors’ demands and
support in online and traditional classrooms. The Internet and Higher Education, 9(4): 257–266.
86
Nemanich, L., Banks, M., & Vera, D. 2009. Enhancing knowledge transfer in classroom versus online settings:
The interplay among instructor, student, content, and context. Decision Sciences Journal of Innovative
Education, 7: 123–148.
Noble, D. 1997. Digital diploma mills: part 1. In The automation of higher education.
Papano, L. 2012. The Year of the MOOC NY Times November 2, 2012. Accessed 3/29/13 from:
Timeshttp://www.nytimes.com/2012/11/04/education/edlife/massive-open-online-courses-are-multiplyingat-a-rapid-pace.html?pagewanted=all&_r=0
Peltier, J. W., Drago, W., & Schibrowsky, J. A. 2003. Virtual communities and the assessment of online
marketing education. Journal of Marketing Education, 25: 260 –276.
Peltier, J. W., Schibrowsky, J. A., & Drago, W. 2007. The interdependence of the factors influencing the
perceived quality of the online learning experience: A causal model. Journal of Marketing Education, 29:
140 –153.
Popovich, C. J., & Neel, R. E. 2005. Characteristics of distance education programs at accredited business
schools. American Journal of Distance Education, 19: 229 –240.
Pres-Pena, R. 2012. NY Times, Aug. 31 2012. http://www.nytimes.com/2012/09/01/education/students-ofharvard-cheating-scandal-say-group-work-was-accepted.html
Priluck, R. 2004. Web-assisted courses for business education: An examination of two sections of principles of
marketing. Journal of Marketing Education, 26: 161–173.
Puzziferro, M., & Shelton, K. 2009. Challenging our assumptions about online learning: A vision for the next
generation of online higher education. Distance Learning, 6: 9 –20.
Redpath, L, 2012. Confronting the Bias Against Online Learning in Management Education. Academy of
Management
Learning
&
Education,
2012,
Vol.
11,
No.
1,
125–140.
http://dx.doi.org/10.5465/amle.2010.0044Rosenthal, A. 2013. The Trouble With Online College. NY Times
February 19, 2013 pp A22. Accessed 3/29/13 from http://www.nytimes.com/2013/02/19/opinion/thetrouble-with-online-college.html?_r=0.
Russell, T. (1999). The ‘no significant difference’ phenomenon.
http://nt.media.hku.hk/no_sig_diff/phenom1.html
Retrieved June 15, 2005, from
Sautter, P. 2007. Designing discussion activities to achieve desired learning outcomes: Choices using mode of
delivery and structure. Journal of Marketing Education, 29: 121–131.
Seaman, J. 2009. Online learning as a strategic asset, vol. 2, the paradox of faculty voices: Views and experiences
with on- line learning. Results of national Faculty Survey (Ed.), Part of the Online Education Benchmarking
Study Conducted by the APLU-Sloan National Commission on Online Learning. Washington, DC:
Association of Public and Land-grant Universities, Office of Public Affairs.
Shachar, M. 2008. Meta-analysis: The preferred method of choice for the assessment of distance learning
quality factors. International Review of Research in Open and Distance Learning, 9. Accessed 3/14/2013
from http://www.irrodl.org/index.php/irrodl/article/view/493/1147.
Shea, P., Hayes, S., Vickers, J., Gozza-Cohen, M., Uzuner, S., Mehta, R., Valchova, A., & Rangan, P. 2010. A reexamination of the community of inquiry framework: Social network and content analysis. Internet and
Higher Education, 13:10 –21.
Sitzmann, T., Kraiger, K., Stewart, D., & Wisher, R. 2006. The comparative effectiveness of web-based and
classroom instruction: A meta-analysis. Personnel Psychology, 59: 623– 664.
87
Stahl, B. C. 2004. E teaching: The economic threat to the ethical legitimacy of education? Journal of Information
Systems Education, 15: 155–161.
Sweeny, J. C., & Ingram, D. 2001. A comparison of traditional and web-based tutorials in marketing education:
An exploratory study. Journal of Marketing Education, 23: 55– 62.
Smallwood, S. 2004, June 25). Maxine Asher has a degree for you. The Chronicle of Higher Education, 50, A42.
Tallent-Runnels, M. K., Thomas, J. A., Lan, W. Y., Cooper, S., Ahern, T. C., Shaw, S. M., Liu, X. 2006.
Teaching courses online: A review of the research. Review of Educational Research, 76: 93–135.
Tanner, J. R., Noser, T. C., & Totaro, M. W. 2009. Business faculty and undergraduate students’ perceptions of
online learning: A comparative study. Journal of Information Systems Education, 20: 29 – 40.
Twining, P. 2009. Exploring the educational potential of virtual worlds: Some reflections from the SPP. British
Journal of Educational Technology, 40: 496 –514.
U.S. Department of Education. 2009. Evaluation of evidence- based practices in online learning: A meta-analysis
and review of online learning studies. Washington, DC: Office of Planning, Evaluation, and Policy
Development.
Vamosi, A. R., Pierce, B. G., & Slotkin, M. H. 2004. Distance learning in an accounting principles course:
Student satisfaction and perceptions of efficacy. Journal of Education for Business, 79: 360 –366.
Vault, Inc. 2001, February. Is an online degree worthwhile? Retrieved December 12, 2004, from
http://vault.com/nr/main_article_detail.jsp?article_id =19393&ht_type =5
Weber, J. M., & Lennon, R. 2007. Multi-course comparison of traditional versus web-based course delivery
systems.
Journal
of
Educators
Online,
4.
Retrieved
from:
http://www.thejeo.com/Volume4Number2/Weber%20Final.pdf Accessed 3/14/13.
Wilner, A., & Lee, J. 2002, October. The promise and the reality of distance education. Update .Washington, DC:
National Education Association, Office of Higher Education, 8, 3. Woelfel, J., & Stoyanoff, N. (1993).
Yang, Y., & Cornelius, L. 2005. Preparing instructors for quality online instruction. Online Journal of
Distance Learning Administration, 8(4).
Zhao, Y., Lei, J., Yan, B., Lai, C., & Tan, H. S. 2005. What makes the difference? A practical analysis of research
on the effectiveness of distance education. Teachers College Record,
88
WHAT’S CONTINUOUS IMPROVEMENT?
STRATEGIES FOR DEVELOPING –
FIRST DO -THEN LEARN
Chynette Nealy
University of Houston Downtown
INTRODUCTION
In the varied topography of professional practice, there is a high, hard ground
practitioners can make effective use of research-based theory and techniques, and there is a
swampy lowland where situations are confusing “messes” incapable of technical solution. The
difficulty is that the problem of the high ground, however great their technical interest, are
often relatively unimportant to clients or to the larger society, while in the swamp are the
problems of greatest human concern (Schon, 1983, p. 42). This “reflective ideology” is used
with learners enrolled in my business communication classes to explain discrete points about
writing related to “continues improvement.” In brief, learners are told “practice isn't the
thing you do once you're good. It's the thing that makes you good (Gladwell, 2008, p. 42). This
paper examines previous research and proposes innovative strategies for closing the gap
between theory and practice that can help learners understand and be better equipped for
professional workplaces.
REVIEW OF LITERATURE
For summary purpose, a longitudinal study related to closing the gap between theory
and practice conducted by Du-Babcock (2006) found teaching business communication theory
and models without associated application materials is inadequate and will lead to learners not
being capable of applying communication skills in the future. The findings support Dewey’s
(1938/1997) theoretical approach that stated learning occurs when learners focus their
attention, energies, and abilities on solving real world problems and reflect on their
experiences. Despite this reliable academic evidences, gaps remain between transferable
workplace skills employers look for in college graduates. For example, employers and writing
coaches say business-school graduates tend to ramble, use pretentious vocabulary or pen toocasual emails (Middleton, 2011). In turn, business programs respond to such findings
recommending rethinking pedagogical approaches that develop skills rather than content
assessment (AACSB, 2003, 2007, 2011; Dias & Pare, 2000; Bell, 2009; Hoover, et al., 2010).
With this in mind, the author reviewed Bloom’s Taxonomy: knowledge,
comprehension, application, analysis, synthesis, and evaluation in terms of traditional
pedagogical grounded in - first learn, then do. The aim was to contribute to rethinking
traditional approaches by examining innovative strategies that suggests reflection as a practical
89
guide for developing skills – first do, then learn. Two approaches underpin this rethinking:
Problem-based learning (PBL) – action first learning by starting with a realistic problem and
taking action to solve the problem ( Smith, 2005; Pennell & Miles, 2009) and Shulman (2002)
table of learning: engagement and motivation, knowledge and understanding, performance and
action, reflection and critique, judgment and design and commitment and identity.
Both are rooted in action research, a disciplined process of inquiry conducted by and
for those taking action, thereby assisting
teachers-practitioners with improving and/or
rethinking actions (Sagor, 2000; Gordon, 2008; Lassonde & Israel, 2009). Critical reflection
on one's practice and understanding leads to higher-order thinking in the form of a capacity to
exercise judgment in the face of uncertainty and to create designs in the presence of constraints
and unpredictability (Shulman, 2002). It is important for business communication professor to
maintain currency in terms of disciplined based expertise and pedagogical skills and
knowledge. An example application using problem-based learning and Shulman’s table of
learning is provided. Additional examples with points to consider when applying these
strategies are available for exchange if this paper is accepted for presentation at the conference.
First Do –Then Learn
One of the key elements of Shulman’s model is it allows for learning to occur without
particular order. The implication of sequence and hierarchy within taxonomies obscures their
true value, because taxonomies are not and should not be treated as theories (Shulman, 2002).
It is plausible to suggest teachers-practitioners applying this premise when working with
learners prepare them to better understand what is expected in the workplace –best practices.
For example, learners enrolled in my business communication classes often view writing as an
“extreme challenge.” As such, it becomes crucial for the instructor to design applications
targeting Shulman’s last stage Commitment and Identity. This strategy improves learners’
insights about measurable outcomes related to - Engagement and Motivation. A common
assignment, free write, allows learners to experience an industry practice –performance
evaluation. The objective here is to explain to learners the relationship between thinking and
writing in term of continuous improvement with regard to writing challenges. The approach
encourages learners to work toward goals with bench indicators mapping continuous
improvement. To jumpstart the –do- we use a “Penny Journal” with a reflective question
designed to help each learner identify natural strengths and capabilities. We use the free writewrite for ten minutes-even if you draw a blank-write something, e.g. to do list, grocery list, or
muddiest point from last lecture. At the end of the ten minutes, learners reflect on their
comments and indentify the best comment/s. As the semester progresses, learners are able to
map continuous improvement of their writing skills within the context of course content and
professional development. Findings from this application show learners respond favorably in
terms of thinking about the application as an authentic work experience. So, learners are
engaged and motivated to understand why employers view writing as such a valuable
workplace skill.
90
REFERENCES
AACSB International – The Association to Advance Collegiate Schools of Business. (2003). Proposed eligibility
procedures and standards for business accreditation. Retrieved August 13, 2010, from
http://www.aacsb.edu/conferences/events/seminars.asp
AACSB International – The Association to Advance Collegiate Schools of Business. (2007), Eligibility
procedures and accreditation standards for business. Tampa, FLA. AACSB International.
AACSB International – The Association to Advance Collegiate Schools of Business. (2011). Recommendations to
AACSB International from the globalization of management education task force. 3, Tampa, FLA.
AACSB International.
Bell, M. (2009). Introduction: Changing the world through what and how we teach. Academy of Management
Learning & Education, 8, 574-575.
Dewey, J. (1938/1997). Experiences and education. Macmillan.
Dias, P. & Pare, A. (2000). Transitions: Writing in academic and workplace settings. Cresskill, NJ: Hampton
Press.
Du-Babcock, B. (2006). Teaching business communication: Past, present, and future. Journal of Business
Communication, 43, 253-264.
Gladwell, M. (2008). Outliers: The Story of Success. Little, Brown & Co., New York.
Gordon, S. (2008). Collaborative action research: Developing professional learning communities. New York:
Teachers College Press.
Hoover, J., Giambatista, R., Sorenson, R. & Bommer, W. (2010). Assessing the effectiveness of whole person
learning pedagogy in skill acquisition. Academy of Management Learning & Education, 9, 192-203.
Lassonde, C. & Israel, S. (2009). Teacher collaboration for professional learning: Facilitating study, research,
and inquiry communities. San Francisco, CA: Jossey-Bass.
Middleton, D. (2011). Students Struggle for Words. Wall Street Journal. Executive Education,
Pennell, M. & Miles, L. (2009). It actually made me think: Problem-based learning in the business communication
classroom. Business Communication Quarterly, 72, 377-394.
Sagor, R. (2000). Guiding school improvement with action research. Alexandria, VA: Association for Supervision
and curriculum development.
Shulman, L. (November/December 2002) . Making Differences: A Table of Learning. Change, 34, 6, 36-44.
Smith, G. (2005) Problem-Based Learning: Can It Improve Managerial Thinking? Journal of Management
Education, 29, 2, 357-378.
91
THE INTERNATIONAL SANCTIONS
PLACED ON IRAN
Daniel Rodriguez
Sam Houston State University
Charles Moore
Sam Houston State University
IRAN’S POLITICAL, RELIGIOUS, AND ECONOMIC HISTORY
Iran has a long history with the United States along with many of the countries that
neighbor the nation or have assisted the U.S. in trying to clean up the ongoing political turmoil
they face. Past encounters with Iran have resulted in barriers being imposed by the United
States in hope of gaining full co-operation to the guidelines the U.N. have set in place to
guarantee political rest moving forward. To understand this relationship we will look at Iran’s
political/religious background, economic resources, the road to international sanctions, and the
trade sanctions that have been imposed on Iran.
Beginning to understand the what, when, where, and why of Iran’s history requires a
brief overview of Iran’s religious/political background. Most countries have a reflection of
religious belief in their political structure however Iran has much more than many anticipate.
The original political structure of Iran was built on the Koran, which is the Islamic version of
the bible. “The Sharia comes from the Koran, the sacred book of Islam, which Muslims
consider the actual word of God” (Constitutional Rights Foundation). Sharia is the Islamic law
that was based on the teachings from the Koran and hadith. Hadith are the important tools from
the interpretation of the Koran by prophets, which were used to build the Islamic law that
governs their political system. The only law-based material in the Koran reflected through the
Sharia was law pertaining to family law, criminal law, and criminal procedure. An elected
leader known as the Wali Faqih, who essentially in Islamic belief reflects the will of God upon
their followers, is ruler of the legal system. The Sharia contains numerous regulations to both
public and private life that influence the way business interactions are performed. “Islamic law
prohibits usury, the collection and payment of interest, and prohibits trading in financial risk
(which is considered a form of gambling). Islamic law also prohibits investing in businesses
that are considered unlawful (businesses that sell alcohol or pork, or businesses that produce
media such as gossip columns or pornography, which are contrary to Islamic values)”
(WikiEducator). Several of these points go overlooked in business transactions around the
world particularly in the United States. Taking the responsibility of following these significant
details to pursue a business transaction within a country such as Iran is vital to the recognition
of the business deals.
92
The Koran has a major influence behind the political structure of Islamic law. For
example, as Hallaq (2009) suggests “Sharia (sic) does not distinguish between law and
morality…the absence of distinction becomes a clear and undoubtable liability…” (Hallaq
2009, 2). Iran’s political system still stands behind the Koran based ideology but appears to
have a more western influence. This western influence that many Muslims welcome with open
arms is one of the greatest reasons for their political tension. “Most Muslim legal scholars
today believe that the Sharia can be adapted to modern conditions without abandoning the
spirit of Islamic law or its religious foundations” (CRF). Presently not all Iran occupants
believe this to be the path of greater being. This has caused an ongoing crusade between the
two different ways of life. Even though the United States continues to have a westernized
influence on Iran, “The solutions of these problems cannot be left by default to the
fundamentalists in any society, but at the same time it is not productive to provoke the
fundamentalists to acts that can destroy a society” (Arnold), there is a happy medium between
guiding and forcing practices on a society.
Iran has countless economic contributors which come from being a country rich in
natural resources. The most notable of these resources is petroleum, which makes up over
eighty percent of their exports. “Iran is the second biggest importer of gasoline after the United
States, importing over 192,000 barrels daily in 2006, at a cost of $5 million dollars” (Middle
East Progress). As one of the chief exporters of petroleum Iran sells oil to many major
countries in exchange for products, consumable goods, and military equipment. There are
several other export items such as chemical/petrochemical products, nuts, fruit, and carpets.
These items don’t compare to the importance of petroleum production but offers a fair share of
economic income the country receives. Although rich in petroleum production the country
does not have the resources to meet the demands of its own country’s needs, consequently
causing them to actually import fuel from other surrounding countries.
Now with some minor knowledge on Iran’s political system along with economic
resources, we can look at how the relationship between the United States and Iran came to such
disagreement along with the development of numerous sanctions placed on Iran. “The United
States has long-standing concerns over Iran’s nuclear programs, sponsorship of terrorism, and
human rights record” (U.S. Department of State). The most significant reason the U.S., along
with many other countries, have placed sanctions on Iran is because of their nuclear
development and strategies to continue building upon that program. Any new development of
powerful weapons such as these, especially for a country who has an extended record of
violence towards other nations, must be watched and controlled to keep a major war from
developing. “Iran still has not recognized Israel’s right to exist and has hindered the Middle
East peace process by arming militants, including Hamas, Hizballah, and Palestinian Islamic
Jihad” (U.S. Department of State). Iran is a country filled with a great deal of terrorist groups
and citizens, which accept their beliefs over any other beliefs or ways of life.
The ongoing crusade between Israel and Iran has been going on for decades due to the
lack of appreciation of differences in culture, religion, and political parties. The United States
and Israel have a lengthy history as allies and aiding military power. This skirmish between
Iran and Israel involves a large number of the surrounding nations causing a massive problem,
93
which requires diplomatic presence to keep matters under control. “The United States broke
diplomatic relations with Iran in 1980 after the seizure of the U.S. Embassy and 52 Americans
by Iranian students” (U.S. Department of State). After the incident in the eighty’s the U.S.
broke all political ties with Iran and still today has no standing affiliation with Iran or any
country that does not follow sanctions imposed by the U.S and the U.N. Not only has the U.S
cut all political relations with Iran but also by presidential orders that there are to be no
financial assistance or investment performed towards Iran whatsoever.
The European Union’s relationship with Iran has not always been comparable to that of
the United States, but over time through aversion towards the development of their nuclear
program, ties to terrorist support, and the ongoing crusade against other nations; the E.U.
became inpatient with the lack of response to their requests and placed very similar sanctions
on Iran. A resolution was reached between the E.U. and Iran in 2003 but only lasted for about
three years after hiding evidence of nuclear progressions. “In early 2006, Iran was referred to
the U.N. Security council because of its failure to provide information on its past covert
nuclear program.The EU continued to take the lead in trying to convince Tehran to cooperate
with the international community” (Posch, 2010).
The UN followed suit of the United States by imposing strict sanctions on Iran dealing
with any type of trade or involvement. Any country doing business deals with Iran that
amounts over $20,000 U.S. dollars must first go through an authorization process by the
Department of Foreign Affairs and Trade before the deal can successfully be processed. Now
this instruction has no way of physically being disciplined if not followed, but the UN and EU
have major influence on countries to abide by international laws or instructions set in place to
ensure these types of programs are not nourished for growth.
THE SANCTIONS IMPOSED ON IRAN
The sanctions that have been drafted or imposed on Iran are of three categories those
established by the: United Nations Security Council; European Union (EU); and the U.S.,
respectfully. In order to understand Iran’s relations with the International community it is
integral to have cognizance of the sanctions that have been used in repugnance to its actions
worldwide. Despite, the factors relating to terrorism and lack of cooperation by Iran, the
sanctions that will be covered here are precise and delve much further into the underlying
issues that have caused International action.
UN Resolutions
The UN Security Council has proposed six (6) resolutions since 2006 to 2012; four of
which have become binding. Each of these resolutions will be considered separately in order to
exhibit the development and concern of the sanctions that have been proposed. The UN has
had ongoing difficulties with Iran and its officials since 2006; the first resolution stemmed
from,
“…the
IAEA
Director
General’s
report
of
27
February
2006
(GOV/2006/15)…which…lists a number of outstanding issues and concerns on Iran’s nuclear
94
programme…” (UN Security Council (1) 2006, 1). As the UN Security Council asserts (2006),
the International Atomic Energy Agency, IAEA, is in part the initiator of all the UN
resolutions. Within resolution 1696 (2006) there are at least five (5) main points and concerns
in regard to Iran’s nuclear program. The first of which is related to the intent or use of Iran’s
nuclear technology program and coincides with the second regarding an overall lack of
knowledge on the part of the IAEA regarding the program. It should be noted Iran’s noncooperation initially in 2006 involving its nuclear program developed a sense of deception or
concealment on their part; and was being displayed to camouflage their true intent. Moreover,
among the listed concerns the UN Security Council (2006) stresses the concern that Iran,
“…could have a military nuclear dimension…the existing gaps in knowledge continue to be a
matter of concern, and that the IAEA is unable to make progress in its efforts…” (UN Security
Council (1) 2006, 1).
The UN Security Council (2006) further emphasizes in issue three (3) that upon
agreement that IAEA officials are able to provide a report, that such a report would be not only
a relief but a benefit to the International community in its attempts to verify that the nuclear
program is for strictly non-proliferative purposes. While the first three issues are based on the
subject of intent and the IAEA’s lack of knowledge about Iran’s nuclear program, the issues
that follow are directly related to nuclear enrichment and proliferation activities. Issue four (4),
“Demands...that Iran shall suspend all enrichment-related and reprocessing activities…” (UN
Security Council (1) 2006, 2). Shortly thereafter the UN Security Council (2006), issue five
(5), highlights that China, the U.S., the United Kingdom, France, Germany, and the Russian
Federation have a solution to the overall situation in order to reestablish relations and
cooperation among Iran. Although Resolution 1696 (2006) is rather short in context it is the
general framework for the development of the next resolutions that will be covered.
Resolution 1737 (2006), is unique in that it begins to offer some restrictions on items
such as arms and financial assets that could be allocated for use in Iran’s nuclear program. In
an international context this could prove to be a very impacting resolution proposed by the
UN’s Security Council. As with Resolution 1696 (2006), and all resolutions hereafter, the UN
Security Council (2006) asserts that Resolution 1737 (2006) was the result of the details, or
lack thereof, of the IAEA Director General’s reports. Issue one (1) was a reiteration of the
previous demand for Iran’s suspension in relation to its nuclear activities; the difference here is
the request to suspend, “…research and development…and…work on all heavy water-related
projects…” (UN Security Council (2) 2006, 1). Although this may seem to be a rather short
extension of the previous suspension, the issue at hand is to cease all nuclear activities;
whether for a non-proliferation purpose or not. The next issue of notable value relates to the
decision of the Security Council to extend suspension of nuclear related items that are either
being imported to or exported from Iran to other nations. This is perhaps the first of many such
requests of the International Community in regards to restrictive relations relating to trade with
Iran. Furthermore, “…all States shall also take the necessary measures to prevent the provision
to Iran of…financial assistance, investment, brokering or other services…related to the supply,
sale, transfer, manufacture or use of the prohibited items…” (UN Security Council (2) 2006,
3). These preventative measures were related to prohibited items that were itemized in the
95
resolution. Another notable point to highlight is that Resolution 1737 (2006) has taken the
initiative necessary to advise States to, “…exercise vigilance regarding entry into or transit…of
individuals who are engaged in…or providing support for Iran’s proliferation sensitive nuclear
activities” (UN Security Council (2) 2006, 4).
The UN Security Council (2006) states that Resolution 1737 (2006), paragraph 17
directly relates to the training and education of Iranian nationals in the subjects that could
further develop Iran’s nuclear program; and depending on the interpretation of the sanction it
could go so far as to deny individuals access to higher education. The following is an excerpt
related to the restriction on education from paragraph 17 that, “Calls upon all States to exercise
vigilance and prevent specialized teaching or training of Iranian nationals, within their
territories or by their nationals… (UN Security Council (2) 2006, 6). The final highlight of
Resolution 1737 (2006) is the emergence of an Annex listing individuals and entities that are
either directly related to Iran’s program or have been in contact with it.
In relation to the preceding resolutions the suspension of two key resources, if only in a
restrictive sense, have been highlighted those being financial resources and the means of
International trade. The UN Security Council (2007) puts forth Resolution 1747 (2007) and
builds upon the restrictive items involved in International trade with Iran; the use of financial
assistance; and proposes an agreement set forth by the U.S., the United Kingdom, Russian
Federation, France, Germany, and China.
Resolution 1803 (2008) is mainly a reiteration of the previous resolutions with the
exception of a few distinct amendments. The UN Security Council (2007) in paragraph five (5)
builds upon the suspension of individuals who should be denied entrance into a country and
makes the sanction more specific by listing “…individuals designated in Annex II to this
resolution as well as additional persons designated by the Security Council or the
Committee…” (UN Security Council 2008, 3). The UN Security Council (2007) further
establishes in paragraph 10 there is evidence of a gradual suspension of financial resources on
a large scale by listing banks specifically such as “…Bank Melli and Bank Saderat and their
branches and subsidiaries abroad…” (UN Security Council 2008, 4). As with the suspension of
certain materials to or from Iran this suspension is regarding funds relating to nuclear
proliferative activities. The UN Security Council (2008) states further that the development
relating to International trading is set out in paragraph 11 advising States to inspect certain
vessels from Iran to dispel any suspicions that prohibited materials may be aboard.
Perhaps the most important sanction imposed by the UN Security Council (2010) in
Resolution 1929 (2010) is the suspension of uranium mining, as set in paragraph seven (7) and
further sanctions in relation to International trade with Iran. The decision to place further
suspensions on Iranian shipping vessels has been set out by in Resolution 1929 (2010) by
prohibiting aid and other services such, “…bunkering services, such as provision of fuel or
supplies, or other servicing of vessels…” (UN Security Council 2010, 6). Considering the
initial suspension on relations between Iran and States engaged in trade or commerce this one
in particular has a very distinct and effective potential regarding International law and
business. It could be gathered that this suspension would give the appropriate countries the
discretion to deny aid or service to any ship from Iran as long as, “…they have information that
96
provides reasonable grounds to believe they are carrying items the supply, sale, transfer, or
export of which is prohibited…” (UN Security Council 2010, 6). The Security Council (2010)
also created a “…(“Panel of Experts”), under the direction of the committee…” (UN Security
Council 2010, 8). The UN Security Council (2010) asserts that the creation of this “Panel of
Experts” was specifically for the purpose of assisting the committee in carrying out certain
provisions of previous resolutions to the end that the sanctions imposed may be carried out
properly. The final characteristic that the UN Security Council (2010) has highlighted in this
resolution is listed in Annex I which specifically describes and identifies the geographic
location of entities directly or indirectly related to Iran’s nuclear activities. The first Annex set
out in Resolution 1747 (2007) has developed and expanded dramatically and Annex I of
Resolution 1929 (2010) is the result thus far. As in Annex II of Resolution 1747 (2007) the UN
Security Council (2010) provides Annex IV of Resolution 1929 (2010) that amends and
develops the resolution by providing the conditions of an agreement between Iran and the U.S.,
the United Kingdom, Russian Federation, France, Germany, and China. Furthermore, the UN
Security Council (2010) establishes that the agreement sets out terms of economic,
humanitarian, and resource related goals that could be gained from an agreement.
Resolutions 1984 (2011) and 2049 (2012) will not be covered in this analysis since they
only relate to the extension of the mandates requested from the “Panel of Experts” that were
created in Resolution 1929 (2010). From the six resolutions described here four are “…legally
binding, sanctions on Iran: Resolution 1737 (2006), Resolution 1747 (2007), Resolution 1803
(2008), and Resolution 1929 (2010)” (Bureau of Economic and Business Affairs, 2012). It may
be presumed that any law or sanction that is mandated must also have the necessary
enforceability as is required in satisfaction of the intended end of the law. Member States that
sign on to a resolution or convention are the only nations that are bound under International
law by that specific mandate; the problem here is that although Iran is a member of the UN
they did not accept or agree to these resolutions. A notable concern that the UN has regarding
Iran’s secrecy is the fact that Iran is a signatory to the Treaty on the Non-Proliferation of
Nuclear Weapons (NPT) as the Jewish Virtual Library (2012) suggests. Additionally, even
though Iran may not abide by the resolutions the member States that do follow them are in the
position to restrict relations and trade on Iran in more than one sense. This highlights the
potential effects of the four resolutions that are labeled as binding; the ultimate end of these
resolutions is to establish a peaceful non-proliferative nuclear program in Iran and restore
peaceful relations.
EU Regulations
In contrast to the UN resolutions the regulations that are passed within the EU are
applicable to EU member States as well as, “…binding on individuals and companies within
the EU” (Chisholm, Linderman, Shour 2011, 2). The formulation of the EU’s sanctions began
with the drafting of EU Regulation 423/2007 and Chisholm, Linderman, and Shour (2011)
suggest that it stemmed from UN Resolution 1737 (2006). In short there are two (2) restrictions
that EU Regulation 423/2007 sets out to prohibit; the first of which is detailed in Article two
97
(2) and includes, “…to sell, supply, transfer or export, directly or indirectly…all goods and
technology contained in the Nuclear Suppliers Group and Missile Technology Control Regime
lists” (EU 2007, 2). The same was true of the first UN resolutions which began restricting trade
by the prohibition of certain nuclear related items.
The second restriction that has been applied by EU Regulation 423/2007 is listed in
Article five (5) and specifically prohibits, “…to provide, directly or indirectly, technical
assistance, or brokering services related to the goods and technology listed in Annex I…” (EU
2007, 3). Once again a trend has begun to emerge in the sanctions relating to a prohibition of
the outside financial resources that Iran is receiving. This regulation, as the UN Security
Council (2006) and EU (2007) may suggest, is intended to place such restrictive measures
upon Iran as to force their ready cooperation in the ultimate goal of establishing the existence
of a peaceful non-proliferative nuclear program.
The second of the three topics relating to EU regulations will cover the EU Council
Decision of July 26, 2010; which further amends and strengthens Regulation 423/2007 in a
more pressing manner. Chisholm, Linderman, and Shour (2011) assert that the nature of the
decision itself places restrictions on a few different areas affecting International business, three
of which will be covered here that are related to the Oil and Gas industry; transport; and
bunkering and supply. Those measures specifically intended to affect the Oil and Gas industry
prohibits, “…the sale, supply or transfer of key equipment and technology for the refining,
liquefied natural gas, exploration and production industries” (Chisholm, Linderman, Shour
2011, 2). Chisholm, Linderman, and Shour (2011) would further suggest that this decision has
to be accepted in the national legislation, the European Union, in order to become binding as is
the aforementioned Regulation 423/2007.
Chisholm, Linderman, and Shour (2011) further notes that the EU Council Decision
places an emphasis on inspecting Iranian vessels. In brief it states, “Member States will have to
inspect all cargo to and from Iran (seaports and airports) provided that they have information
that provides reasonable grounds to believe that the cargo being carried contains prohibited
items” (Chisholm, Linderman, Shour 2011, 2). If this decision were to become legally binding
in the EU, with respect to this measure, it would grant member States discretionary power to
inspect any and all vessels that are to and from Iran pending the specified requirements.
Under the authority of a legally binding decision the subject area of bunkering and
supply is further amended and modified from EU Regulation 423/2007 by stating, “…Member
States must not provide bunkering, supply or other servicing to Iranian owned or contracted
vessels…if they have information which provides reasonable grounds to believe that the
vessels carry prohibited items” (Chisholm, Linderman, Shour 2011, 2). This particular measure
could be compared to UN Resolution 1929 (2010); with the exception of having the potential
to become a more applicable and enforceable restriction.
EU Regulation 961/2010 is a modification of the EU Council Decision of July 26,
2010. It is unique in its entirety but most importantly in its restrictive measures in relation to
Member States. Furthermore, the jurisdiction of the regulation not only spans the geographical
boundaries of the EU but calls upon the use of nationality as a principle in Article 39 by
applying, “…to any person inside or outside the territory of the Union who is a national of a
98
Member State…” (Deering, Hickey, Jones, Linderman, Macfarlane, Shepherd 2012, 1). The
use of nationality as a principle in this case is a very restrictive measure to say the least and
could prove to interrupt business relations between representatives of EU countries doing
business with Iranian nationals.
The regulation also makes further use of the restricting the funds of those individuals
that are listed in its annexes; a measure of this nature was also employed in the UN Resolutions
as well. The EU (2010) states that Article 26 to this regulation further sets out restrictive
measures on insurance to not only include companies that might be associated, or directly
involved, with proliferative nuclear activities but, “…Iran or its Government, and its public
bodies, corporations and agencies…an Iranian person, entity or body other than a natural
person…” (EU 2010, 13). Moreover, the EU (2010) further places restrictions on equipment
that is used in the Oil and Gas industry and further restricts entry into Iran of such materials.
The regulation itself is quite extensive in its purposes but when put into force this regulation,
as with the preceding regulations, should have the potential to make a convincing impact on
Iran.
U.S. Restrictions
The sanctions that have been imposed and modified by the United States followed the
1979 the capture of the U.S. embassy in Tehran. The Bureau of Economic and Business Affairs
of the United States (2012) states the most recent sanctions imposed on Iran are, “…the
Comprehensive Iran Sanctions, Accountability and Divestment Act (CISADA)…and…added
new measures and procedures to the 1996 Iran Sanctions Act (ISA)” (Bureau of Economic and
Business Affairs, 2012).
Although U.S. relations with Iran are very restricted, the CISADA, formerly the ISA of
1996, set out to further restrict individuals, and companies of U.S. origin and operating in the
U.S. in their trade with Iran. The Bureau of Public Affairs (2012) provided a summary of the
CISADA that was signed by President Obama on July 1, 2010; the act further restricted and
denied any trade or assistance related activities with Iran’s finance and energy sector. An
example of an act that would be sanctioned is “…making an investment that directly and
significantly contributes to the enhancement of Iran’s ability to develop its petroleum
resources…” (Bureau of Economic and Business Affairs of the U.S. Department of State (2),
2012). These and the others restrictions related to energy are sanctioned beyond a specific
amount in U.S. dollars. That is an entity would be violating these new sanctions if they were to
exceed the specified amount of assistance in each category. The Bureau of Economic and
Business Affairs (2012) states that the sanctions listed in the new CISADA pertaining to the
financial sector contain activities that must be reported to the Treasury Department and are
restricted as to financial investment or assistance to certain entities or individuals within Iran.
These sanctions are fairly similar to, and are based upon, those proposed by the UN resolutions
mentioned previously.
99
CONCLUSION
In the contexts of International and business relations, all three categories of sanctions
when applied and enforced, have the potential to compel Iran into compliance with each
organization’s and nation’s pursuit to establishing the existence of a peaceful Iranian nuclear
program. Although the UN resolutions cover the intrinsic concerns of any and all countries that
wish to comply with them, they have laid the framework for the regulations established by the
EU as well as the most recent version of the United States’ CISADA.
Relationships between countries in the contexts of International and business relations
can be difficult when there is a conflict of differing cultures and a conflicting nature of
differing legal systems and business practices. In addition, Iran has been a sponsor of terrorist
activities and has been persistent in its non-cooperation in relation to its nuclear program’s
intent and composition. There is also the concern that has stemmed from Iran being a signatory
to the Treaty on the Non-Proliferation of Nuclear Weapons. Undoubtedly, the sanctions that
have thus been established by the respective organizations and countries will perhaps compel
Iran to aim their relations toward a sense of normalization; as set forth by the UN Resolution
1929 (2010). The end to which these sanctions were established will certainly be reached when
due to economic interests, at the least, Iran cooperates.
REFERENCES
Arnold, Terrell E. The Outsider Role In Transforming Islam at http://rense.com/general44/outsider.htm
Bureau of Economic and Business Affairs of the U.S. Department of State. (2012) Iran Sanctions.
http://www.state.gov/e/eb/esc/iransanctions/index.htm
Bureau of Public Affairs of the U.S. Department of State (1). (2012). U.S. Relations with Iran.
http://www.state.gov/r/pa/ei/bgn/5314.htm
Bureau of Economic and Business Affairs of the U.S. Department of State (2). 2012. Fact Sheet: Comprehensive
Iran Sanctions, Accountability, and Divestment Act (CISADA).
http://www.state.gov/e/eb/esc/iransanctions/docs/160710.htm
Bureau of Near Eastern Affairs (2012). U.S. Relations With Iran http://www.state.gov/r/pa/ei/bgn/5314.htm
Chisholm, Alex. Linderman, Michelle. Shour, Reema. (2011). Trade Sanctions Against Iran An Overview at
http://incelaw.com/documents/pdf/strands/international-trade/trade-sanctions-against-iran-anoverview.pdf
Deering, Bob. Hickey, Denys. Jones, Daniel. Linderman, Michelle. Macfarlane, Rory. Shepherd, Nick. (2012).
Trade Sanctions Against Iran An Update- January 2011 at
http://incelaw.com/documents/pdf/strands/international-trade/int-sanctions-against-iran-an-updatejanuary-2012
100
Encyclopedia of the Nations. Iran- Political Background http://www.nationsencyclopedia.com/World-Leaders2003/Iran-POLITICAL-BACKGROUND.html#b
European Union (EU). (2010). COUNCIL REGULATION (EU) No 961/2010of 25 October 2010on restrictive
measures against Iran and repealing Regulation (EC) No 423/2007. http://eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2010:281:0001:0077:EN:PDF
European Union (EU). (2007). COUNCIL REGULATION (EC) No 423/2007of 19 April 2007concerning
restrictive measures against Iran. http://trade.ec.europa.eu/doclib/docs/2010/august/tradoc_146397.pdf
Hallaq, Wael B. 2009. Sharia: Theory, Practice, Transformations. New York. Cambridge University Press.
Jewish Virtual Library. 2012. Signatories to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) (As
of February 2012) at http://www.jewishvirtuallibrary.org/jsource/Threats_to_Israel/nptsigners.html
Middle East Progress. Iran’s Economy and Natural Resources. http://middleeastprogress.org/2007/11/iranseconomy-and-natural-resources/
Posch, Walter. (2010). Iran and the European Union at http://iranprimer.usip.org/resource/iran-and-europeanunion
UN Security Council (1). (2006). Resolution 1696 (2006). http://daccess-ddsny.un.org/doc/UNDOC/GEN/N06/450/22/PDF/N0645022.pdf?OpenElement
UN Security Council (2). (2006). Resolution 1737 (2006). http://daccess-ddsny.un.org/doc/UNDOC/GEN/N06/681/42/PDF/N0668142.pdf?OpenElement
UN Security Council. (2007). Resolution 1747 (2007). http://daccess-ddsny.un.org/doc/UNDOC/GEN/N07/281/40/PDF/N0728140.pdf?OpenElement
UN Security Council. (2008). Resolution 1803 (2008). http://daccess-ddsny.un.org/doc/UNDOC/GEN/N08/257/81/PDF/N0825781.pdf?OpenElement
UN Security Council. (2010). Resolution 1929 (2010). http://daccess-ddsny.un.org/doc/UNDOC/GEN/N10/396/79/PDF/N1039679.pdf?OpenElement
Wikieducator. Cultural Issues Affecting International Trade.
http://wikieducator.org/Cultural_Issues_Affecting_International_Trade/Culture_Applied
101
ILLICIT FUNDS FLOWS FROM DEVELOPING
COUNTRIES
Mark R. Leipnik
Sam Houston State University
James R. Ritter
Sam Houston State University
ABSTRACT
Illicit Funds Flows (IFF) from developing countries are critical problems for both the
developing countries (because of loss of essential capital and due to the promotion of local
corruption) and can be a major foreign relations problem for those countries receiving the
funds (due, in part, to the loss of reputation for probity, the potential to finance illegal
activities, as well as potential loss of tax revenues). IFF are generally disguised or kept secret
in order to avoid regulatory controls and, for some of the originators, imprisonment. IFF often
involve complex networks of off-shore banks and front companies shielded by bank and
corporate secrecy laws and rapid electronic transfer of funds. In order to understand the
magnitude of IFF, a non-governmental organization called Global Financial Integrity (GFI)
has been established and it publishes reports on IFF that have become a global standard
measure of IFF. Estimates of IFF are inherently imprecise with the potential to understate (or
occasionally overstate) the magnitude of the flows. Clearly, improved means for identifying
and estimating IFF are necessary. Addressing this necessity, GFI reports on IFF are
correlated by the authors with quantified and rank ordered national attributes (e.g., oil
exports, military budget) in the search for strong indicators of IFF. Spatial factors are
assessed with tools available in the ArcGIS software from esri are analyzed and mapped. The
study concludes with recommendations for further analysis and reporting.
GOAL OF THIS ANALYSIS
The goal of this analysis is to identify strong indicators of IFF based on easily
obtainable collections of multinational data available on the Worldwide Web (“web”). The
search for strong indicators will be based on spatial and rank investigations of correlations
between IFF and other national attributes (e.g., oil exports, military budget). Secondary goals
include evaluation of the utility of the tools (Excel, ArcGIS, Python, Visio, Word) used to
conduct the analysis with the aim of making that information available for investigators
making related studies. Another secondary goal is to note correlations among other national
attributes. The final goal, of course, is to identify and recommend areas for further analysis
and reporting.
102
DEFINITION OF ILLICIT FUNDS FLOWS
This analysis adopts the IFF definition of Kar and Freitas, GFI analysts:
Illicit Financial Flows: funds that are illegally earned, transferred, or utilized and cover
all unrecorded private financial outflows that drive the accumulation of foreign assets by
residents in contravention of applicable laws and regulatory frameworks (Kar & Freitas, 2011).
IFF includes two components:
(1) an estimate of money that exits developing countries via trade channels (called trade
mispricing), and
(2) an estimate of money that leaves developing countries through other, private capital flows.
IFF estimates are the remainder, “residual” or funds not accounted for ,” resulting from
subtracting legal flows from total flows among nations. This model captures some licit funds
as well: IFF = (Trade Mispricing) + (Illicit Private Capital Flows).
The definition above, however, is not the only one; researchers investigating IFF tend
to create definitions that best suit their research topic. Reed and Fontana state:
The literature on illicit financial flows is troubled by imprecision of key terms. Clarification of
terms is not a nicety to be respected merely for academic purpose. It is a necessary condition
for a proper discussion of policy options in fighting corruption by tackling illicit flows (Reed
& Fontanna, 2011).
BACKGROUND
History
Charles C. Mann, author of 1493, Uncovering the New World Columbus Created, has
written a memorable description of silver trade traversing Asian waters in the 1600s (Mann,
2012):
Much or most of the silver was illegal. Worried Mexican officials informed the
[Spanish] monarchy in 1602 that the galleons that year had exported almost four
hundred tons of silver – eight times the declared amount. Furious instructions from
Madrid changed nothing; smuggling was too lucrative. ‘The King of China could build
a palace with the silver bars which have been carried to his country … without their
having been registered,’ Admiral Banuelos y Carrillo complained thirty-six years later.
In 1654, the San Francisco Javier sank near Manila Bay. Its official manifest claimed
that it carried 418,323 pesos. Centuries later, divers found 1,180,865 aboard. Even if
one assumes, absurdly, that the divers found every last coin, the cargo was almost twothirds contraband.
The obviously Illicit Funds Flow described above was secret, hidden from at least some
authorities, and it was large. Today’s illicit funds flows, aided by computers and a robust
Internet, are even larger, though it might be difficult to believe, more difficult to detect, and
nearly secret. Some notion of the major sources of IFF can be gathered from Figure 1.
103
Other illicit financial flows are more recent:
Last year, the People's Bank of China mistakenly released a report on its
website which was then quickly taken down.
The report said that between 16,000 and 18,000 government officials and employees of
state-owned enterprises had smuggled more than $120bn (£75bn) overseas between the mid1990s and 2008.
That works out to more than $6m per official. (Patience, 2012). The impact in China
and elsewhere is the same (OECD, 2012):
Corruption impedes economic growth, threatens the integrity of markets, undermines
fair competition, distorts resource allocation, destroys public trust and undermines the
rule of law.
The Tax Justice Network (TJN), founded in the UK in 2003, is dedicated to high-level
research, analysis, and advocacy in the field of tax and regulation; it publishes the Financial
Secrecy Index (FSI). TJN discusses IFF and concludes that the problem is a difficult one with
its difficulty compounded by the secrecy of financial flows to Organisation for Economic CoOperation and Development (OECD) nations, from developing countries:
These staggering [IFF] sums are encouraged and enabled by a common
element: secrecy. Secrecy jurisdictions . . . compete to attract illicit financial flows of
all kinds, with secrecy as one of the most important lures. A global industry has
developed where banks, law practices and accounting firms provide secretive offshore
structures to their tax dodging clients. Secrecy is a central feature of global financial
markets - but international financial institutions, economists and many others don’t
confront it seriously.
...
The . . . traditional stereotype of tax havens is misplaced. The FSI reveals
without doubt that the world’s most important providers of financial secrecy are not
small, palm-fringed islands as many suppose, but some of the world’s biggest and
wealthiest countries.
. . . financial flows that keep developing nations poor are predominantly enabled
by rich OECD member countries and their satellites, which are the main recipients of
these illicit flows. The trillion-dollar figure for annual illicit financial flows out of
developing countries . . . compares with little over US$100 billion in global foreign aid.
So for every dollar of aid provided by OECD countries to developing nations, ten
dollars or so flow back, under the table. The implications for global power politics are
clearly enormous.
The pattern that the FSI reveals also helps explain why widely heralded international
efforts to crack down on tax havens and financial secrecy have been so ineffective. It is OECD
countries, which receive these gigantic inflows, which set the rules of the game. It helps
explain why when the G20 declared in April 2009 that ‘the era of banking secrecy is over’, it
delivered very little indeed: not far off a whitewash.
It is business as usual in the secrecy jurisdictions, and global financial secrecy remains
entrenched (TJN, 2012).
104
Corresponding to the TJN comments above, the OECD nations pictured in blue in
Figure 2 are the recipients of IFF totaling over ten times the foreign aid that they give the
developing nations shown in gold.
Global Financial Integrity Reports
This origin of this analysis can be traced to a report from Global Financial Integrity
(GFI): Illicit Financial Flows from Developing Countries: 2000-2009, Update with a Focus
on Asia, with authors Dev Kar and Karly Curcio, dated January 2011 (Kar & Curcio, 2011).
Investigation (Fagan, 2012) of that GFI report led to discovery of an update: Illicit Financial
Flows from Developing Countries Over the Decade Ending 2009, published by Global
Financial Integrity, with authors Dev Kar and Sarah Freitas, December 2011 (Kar & Freitas,
2011). Neither report mentions Spanish galleons nor the unfortunate Admiral Banuelos y
Carrillo. Neither report contains any meaningful maps.
Both reports (Kar & Freitas, 2011) make use of Principal Components Analysis, a
mathematical technique used “to reduce the amount of data in a set of variables while still
returning the same amount of information that was in the original set.” (Kar & Freitas, 2011)
Review of the process shows that it is strongly based on covariance estimates and is, in
essence, a data-smoothing algorithm that produces estimates of illicit flows based on
discrepancies in legal funds flows as reported by the World Bank (Kar & Freitas).
Given that some of the data used in the reports is in error and some might have been
knowingly incorrectly reported, perhaps concealing illicit flows, an approach based on
reducing error (residuals) via least-square smoothing is reasonable. Buttressing this
observation, are the facts that illicit flows are intended to be secret and the data for some of the
components is drawn from estimates of uncertain accuracy and freshness. Greg Gillette, a
graduate student at Roskilde University and a trustee at Global Brigades UK, casts the problem
as follows (Gillette, 2012):
First of all, getting figures is difficult. The IMF tracks trades in commodities
and hard goods, meaning international comparisons to find over-pricing are possible
with hard goods. This is not done in services however and determining “brand value”,
let alone brand value in a specific geographic location, is so subjective it seems almost
futile to enforce norms. What can be enforced however is reporting, such as “most
favoured country” statistics when a company trades one good in multiple places.
The Magnitude of the IFF Problem
The magnitude of IFF have been estimated at 2.5 to 5 percent of the global gross
domestic product, a huge amount, but some analysts argue that the range stated is conservative
and that the actual value could fall above this range. A substantial portion of IFF come from
developing countries and the flows out of these nations to developed nations are likely higher
than the 5% estimate just given (Kar & Freitas, 2011).
105
The top ten exporters of illicit capital (China, Mexico, Russia, Saudi Arabia, Malaysia,
Kuwait, United Arab Emirates, Venezuela, Qatar, and Poland in declining order of magnitude),
account for an average of 70 percent of cumulative illicit outflows ($5,082.46 billion) from
developing countries over the period 2000-2009. Illicit flows from developing countries grew
by at least 10.2 percent annually over the decade ending 2009, with outflows from Africa (22.3
percent) growing faster than from the Middle East and North Africa (MENA) (19.6 percent),
developing Europe (17.4 percent). The total developing country outflow was estimated to be
$723.19 billion yearly, with 2007 and 2008 estimated at over $1 trillion dollars per year.
Illicit Funds Flows
A schematic of illicit funds flows is shown in Figure 3. The IFF might be of funds
from legal sources and, not surprisingly, some might be from corruption, human trafficking, or
drugs. Exfiltration of funds might comprise contraband on aircraft or, increasingly frequently,
Internet transfers, which come about from abusive transfers, tax evasion, or, possibly, bribery.
Although world leaders are searching for countermeasures to IFF, better tools are needed to
identify them. This report investigates such tools.
The inclusion of the lowest tier in the chart, countermeasures, is significant. Today,
countermeasures are based on “best estimates” by folks experienced with the IFF problem, not
certain knowledge that any countermeasure will be effective. The Tax Justice Network and
others have engaged analysts to study the flows so that countermeasures can be put into place,
as is shown by the efforts of the OECD, but effective countermeasures cannot be put into
practice until the flows are better understood. Once again, the creation of countermeasures
depends on better tools.
The Global Financial Integrity Approach
The material in this section closely follows: Illicit Financial Flows from Developing
Countries Over the Decade Ending 2009, published by Global Financial Integrity (GFI), with
authors Dev Kar and Sarah Freitas, December 2011 (Kar & Freitas, 2011).
GFI used a well-established economic model to estimate the illicit flows of funds, The
World Bank Residual Model. The model is intuitively appealing—legal sources of funds
exceeding recorded legal use of funds reflect unrecorded outflows, or illicit funds flows.
Source of Funds Exceeding Recorded Use Of Funds Reflect Unrecorded Outflows, or
[Illicit Funds Flows (IFF)] ≈ [Source of Funds] – [Use of Funds]
≈ → Approximately Equals
Source of funds includes increases in net external indebtedness of the public sector and the net
flow of foreign direct investment. Use of funds includes financing a current account deficit
and additions to reserves. GFI used the change in external debt (CED) rather than net debt
flows because of the wider availability of the series for most developing countries. Thus:
106
[Source of Funds] – [Use of Funds] ≈ [CED + FDI (net)] – [CA Balance + ΔR] ≈ IFF
CA
→
Current Account (National)
CED →
Change in External Debt
FDI →
Foreign Direct Investment
IFF
→
Illicit Funds Flows
ΔR
→
Change in Current Account Reserves
While the definition is uncomplicated, the availability of the data necessary to compute
illicit flows is, in many cases, restricted, subject to substantial errors, or missing altogether. It
is not without controversy with respect to inflows versus outflows. The recent Euro zone crisis
has raised questions on how illicit flows are estimated using economic models, particularly
illicit inflows. Estimates of capital flight according to the World Bank Residual Model
adjusted for trade misinvoicing and netting out inflows from outflows indicate that Greece and
other “Club Med” countries have received huge illicit inflows running into billions of dollars.
Yet, the governments could not tap these so-called inflows to stave off the financial crises they
were facing. While there is nothing new about the flight of capital from countries that are
politically unstable, poorly governed or badly managed, the traditional method appears to be
questionable in treating illicit inflows as if they benefit the country. This analysis avoids the
controversy mentioned by using estimated outflows only.
The relationships described above are input to a normalization process that has the
effect of smoothing the data via a least-squares approach and reducing its dimensionality via
Principal Component Analysis. Whether the estimates are normalized or un-normalized, they
must be weighed against the fact that even the best models rely on official statistics which do
not capture illicit transfers of capital occurring through smuggling, same-invoice faking, and
hawala-style swap transactions.
A Word about Geography
To some, it might seem out of place for an analysis prepared for a geography course to
discuss Spanish galleons and illicit funds flows, but the content of this paper reflects the
breadth of human geography as it is defined and practiced today (Human Geography, 2012).
Human activities can be spatially assessed, measured, and correlated. These are exactly the
properties emphasized in the sections to follow.
TOOLS FOR THE ANALYSIS
Spatial Analysis
Spatial analysis, using the topological, geometric, or geographic properties of nations,
most often depicted in maps created to analyze specific phenomena, assists in determining
whether our hypotheses about IFF are valid, points the way to previously unseen correlations,
107
and helps to strengthen the results overall. Our spatial analysis tools are those included in the
esri GIS (geographic information systems) mapping software as well as previous experience
based on the analysis of topological, geometric, and geographic properties.
Maps
Unless otherwise stated, maps used in this study are drawn in the Winkel Tripel
projection favored for general use by the National Geographic Society in an attempt to
minimize distortion of area and shape of the regions under study (Leipnik, 2012). The center
of the projection of the maps on IFF has been chosen to emphasize IFF flows; China and the
Russian Federation are nearly centered. Figure ??, which contains both a scale and a legend, is
centered on the Middle East. Scales, legends, and directional arrows have been included on
some maps but not on others so that the author could help others gather a notion of usefulness
of these items in spatial analyses. Maps of specific areas of the world generally have a scale
associated with them. With the exception of orthographic and stereo graphic maps, north is at
the top of all maps. A website showing the Winkel Tripel projection against another popular
compromise (i.e., minimizing distortion of area and shape) projection can be found through the
National Geographic website (NGS, 2012). Winkel Tripel projection of the whole earth results
in a non-rectangular figure that must be cropped and shaded for standard, rectangular,
presentation.
Selections of color and symbol size in the maps included in this analysis have been
made to emphasize the point(s) under discussion. For example, symbols on a map in this
analysis denoting the size of IFF per capita have been intentionally enlarged to show that some
small nations have very large IFF. With regard to color selection and symbol size, there are
those who would object that such selections are somehow “impure,” but the case in actual
practice, as experienced by the author, is that senior-level personnel will often ask that aspects
of an otherwise “pure” map be modified to emphasize points of importance to them (so that
they can present the same ideas themselves more convincingly or draw attention away from
items that they believe are less important or disadvantageous to them).
The continent of Antarctica has omitted from most maps and areas around the North Pole are
deemphasized by the projection and editing described.
Correlation of IFF with Other Variables
In practice, geographers and spatial analysts are faced with the need analyze such
variables and make recommendations in support of national or local governments or
international banking, for example. Complicating the analysts task is the fact that IFF can only
be estimated indirectly because the flows are almost always intended to be secret. Taking
these factors into account, they must find a way to make estimates of IFF from available data,
public data if possible.
When data is available by country in a category that might assist the analyst in
identifying and analyzing a particular aspect of IFF, the countries can be ranked by category
108
values and used the ranking used as a part of the analysis. Just as rankings of football teams
provide an approximate measure of each team’s relative strength, ranking of countries by
national attributes can give an estimate of relative strength of the nation in the domain of that
national attribute. Knowledge of the highest sources of IFF might tell researchers where to
focus their investigations.
Rank correlation coefficients, frequently denoted “r,” provide a measure of the
similarity between two sets of rankings. They can be computed for continuous data (e.g.
temperature); they can also be computed for discrete data (something that can be counted). In
particular, rankings of national attributes in one category can be compared to rankings in a
second category (the defense expenditures and oil exports mentioned elsewhere) to determine
if there might be a close statistical relationship. Correlation coefficients must be used with
care, however, because:
Unfortunately, r is a rather poor statistic for deciding whether an observed
correlation is statistically significant, and/or whether one observed correlation is
significantly stronger than another (Press & al., 1992).
As de Smith, Goodchild, and Longley point out, “The theoretical foundations of
statistics rely on a set of assumptions and sampling procedures that are often more applicable
to experimental datasets than purely observational data. Very few problems addressed by
spatial analysis fall into the category of truly experimental research (deSmith, Goodchile, &
Longley, 2012).” It is for these reasons that we see the computation of correlation coefficients
as a methodological tool to be used to complement spatial analyses and rank orderings.
Rank Correlation Coefficients
One question that arises is how best to compare variables that might contain both
systematic and random errors and that vary over several orders of magnitude and possess
unknown underlying distributions. Too often, the geographer is left with the only option of
saying that the defense expenditures, for example, of country A are greater than those of
country B and are assuredly less than country C, thus constructing a ranking (in the case, C >
A > B). If we wanted to assess the strength of relationship between the defense expenditures
just mentioned and, say, oil exports, the ranking for oil exports would be constructed and (it
might be A > B > C). So far, we have two rankings, but no way to compare them. The
computation of rank correlation coefficients provides one means of comparison. Spatial
analysis provides a check on the use of the statistical tool. The detail of computing correlation
coefficients is available from the authors and we suggest that the interested reader review our
approach.
Correlation and Causation
Correlation does not imply causation; nor, for that matter, does spatial similarity. For
example, the correlation coefficient between the number of high school graduates each year
from Susquehanna Township High School near Harrisburg, Pennsylvania, and the number of
109
basketballs sold in Harrisburg, Texas, a part of Houston, might be large (i.e., greater than 0.5),
but here is no obvious causal relationship despite the similarity of names.
DATABASES CREATED FOR THIS ANALYSIS
Pursuing our goal to identify strong indicators of IFF based on easily obtainable
collections of multinational data available on the Worldwide Web (“web”) and to being able to
verify them via spatial analysis and rank assessment, several web sources were used, the most
prominent of which are discussed here.
Off to a good start, the GFI reports are available on the web and their appendices are
contained in downloadable spreadsheets. Close behind, the Central Intelligence Agency (CIA)
makes substantial volumes of information ranking national attributes on the web. Similarly,
the World Bank puts data on the web related to their, principally finance-related, research
efforts. Transparency International, headquartered in Berlin, Germany, was the source of the
information used on perceived levels of public sector corruption in this report. Finally,
Freedom House, with national headquarters in Washington, DC, provided data on five
dimensions of freedom via the web.
Lest the reader think that the information available via the web is easy to use, the
author advises that there are substantial difficulties in collecting the data and preparing it for
use. Some is directly downloadable as spreadsheets (the GFI reports), but other data is buried
in web sites with no aim of spreadsheet compatibility (the perceived corruption data). Making
comparisons more difficult, the World Bank documents its research investigations in different
countries than those documented by the CIA. Each organization listed above seems to have its
own variant of country names (is Venezuela “Venezuela” or is it “Venezuela, Bolivarian
Republic of?”). There is an international standard for country names and abbreviations, but, in
the author’s view, it is not meticulously followed.
Because each information provider has its own research focus, different countries are
included on each list. For example, to ensure that Aruba could be included in this study, an
additional source had to be consulted to find that it is “mainly Catholic” on a web page
sponsored by Aruba. Even this, however, had to be revised to “Christian” for a section of our
database that turned out to be unused; much the same difficulties were true for defense
expenditures and perceived corruption for Aruba (which was estimated as average and used).
The 41 nations included in this analysis are shown in Figure 4 along with a locator map
showing those nations in red. A pie chart allows the reader to form a notion on the relative
sizes of national IFFs.
The sources of the data used in this report are shown in Figures 5 and 6.
An early version of the main database constructed for the analysis is depicted, in part,
in Figure 7. The reader should note that the database, constructed from multiple joins of
smaller single topic databases, continues past the right-hand margin. National attribute
rankings are shown in the columns with names ending in “_R”; these were the values used to
compute the correlation coefficients.
110
Finally, it became clear early in the process of creating the databases that complete
descriptions for over two hundred sovereign entities would be extraordinarily difficult to
achieve. After several fruitless attempts to solve this problem, the problems of consistency and
completeness were growing rather than diminishing, the author finally settled for the subset of
the nations originating 95% of the estimated IFF, 41 in all. These have been the basis for this
study.
Separate, smaller, databases were created to address specific sets of attributes (e.g., OECD
membership). These were generally joined to the main database described above in support of
spatial analysis.
The databases themselves are available to the reader by request to the authors.
SPATIAL ANALYSIS RESULTS
Small Nations with Large IFF
Aruba, Malta, and Kuwait stand out in IFF calculated on a per capita basis as is shown
in Figure 8. It could be because these nations are acting as gateways from the developing
countries to OECD nations. Aruba may have high IFF because of spatial proximity to
Venezuela and Colombia. Malta might have high IFF because of spatial proximity to Libya.
Kuwait, beside its high-IFF Saudi Arabian neighbor, might facilitate the flow of IFF from the
Middle East to inviting investments in more heavily developed regions.
Converting total national IFF amounts to per capita figures shows that China, Mexico,
and the Russian Federation fall to relatively low values. Aruba, Malta, and Kuwait, shown as
large red dots on the accompanying map (Figure 8), take the lead with large IFF per capita.
The three nations named are not the only IFF gateway nations. Cyprus, another island nation
in the Mediterranean Sea, has been identified as a possible IFF gateway. A German newspaper
describes the Cyprus situation as follows:
Cyprus requested assistance from the EU and International Monetary Fund
(IMF) in June. Experts believe that Cyprus needs about 10 billion euros. Voicing major
concerns, Germany has raised the issue of international payment of billions in aid to the
financial partners of Cyprus. "We cannot secure the deposits of Russian money in
Cypriot banks with German taxpayer money", said the news magazine "Der Spiegel"
budget expert Carsten Schneider: "Before a loan is approved for Cyprus, there must be
a discussion of its financial controls." According to the magazine report, the BND
claims that Cyprus inadequately applies the agreed rules on combating money
laundering and that rich Russians are afforded generous opportunities for illicit
activities. (Berliner Morgenpost, 2012)
Although the information from the Germans might help in our search for tools to
identify IFF, we leave it to a follow-on report.
111
China IFF Gateways?
There are two gateways, special administrative regions in China, Hong Kong and
Macau, which formerly were British and Portuguese territories. Neither of them is part of any
other administrative division. Each of them has a chief executive. Each territory has its Basic
Law, and in both bodies of law there is an article stating that the territory is a "local
administrative region of the People's Republic of China, which shall enjoy a high degree of
autonomy and come directly under the Central People's Government." (Special Administrative
Region, 2012) A Google map of these two regions is shown in Figure 9.
In addition, 15 free trade zones, 32 state-level economic and technological development
zones, and 53 new and high-tech industrial development zones have been established in large
and medium-sized cities. As these open areas adopt different preferential policies, they play the
dual roles of "windows" in developing the foreign-oriented economy, generating foreign
exchanges through exporting products and importing advanced technologies and of "radiators"
in accelerating inland economic development (Kar & Freitas, 2012).
Hong Kong and Macau were identified as IFF gateways in a report issued by GFI as
writing for this section was being completed (Kar & Freitas, October 2012). As it turns out,
Hong Kong, Macau, and the British Virgin Islands give Chinese interests a multipart gateway
to conceal funds. The 98 special zones described above might well be gateways for moving
illicit funds from China as well.
Regional Groupings: Ukraine and the Nations of the Caucasus
Georgia, Armenia, Azerbaijan, and Ukraine, strongly influenced by the Russian
behemoth to the north have common interests and common problems. They are shown in
Figure 10 from Google. Indeed, southern Russian Federation provinces border the Caucasus
themselves. Spatial analysis augmented by research on the web help lead to the results below
from the Central Asia-Caucasus Institute:
Until the Ukrainians become able to cope with their political and economic problems,
there will be a danger that the lack of Ukrainian competence may drive Ukraine back into the
Russian realm. The same dangers hold for the Caucasus. (CACI Anaylst, 2012)
This is notable because Ukraine has no land boundaries with Georgia (but a lengthy
boundary with the Russian Federation), Armenia, or Azerbaijan, and Azerbaijan comprises two
separate parts. Caucasus nations also include the southern tier of Russian Federation provinces
which, in all likelihood, will follow the Federation lead with respect to IFF. With regard to the
non-Federation, the Russians certainly are not helping this group of nations by holding them
hostage to energy supplies. The political and economic problems referenced portend larger
IFF flows if only because of the corrupt Russian Federation close by. Under Russian
influence, they are unlikely to lead the way towards greater financial integrity or transparency.
In this instance, both the ARCMap and Google presentations have been included to
facilitate spatial analysis. The ARCMap presentation is the product of complex and extensive
editing required to create and place the annotation and boundaries as shown in Figure 11.
112
The Continent of Africa
Africa, a continent with over 60 political entities, has only four of the 41 nations
contributing to the top 95% of IFF and these comprise only a small part of the overall
continental land area. Africa Mineral Resource Specialists Inc., of Littleton Colorado,
summarized Africa’s potential:
Some of the largest, and richest, mineral deposits in the world have been found
in Africa. For much of the last half of the 20th century little mineral exploration and
development work was done in Africa, except for southern Africa, even though there is
significant potential for the discovery of new deposits. By the mid 1990's modern
exploration started to spread across much of Africa and many new deposits have been
discovered and developed and some of the old major deposits are being renovated.
The potential of Africa for the discovery and development of mineral resources
is immense. Mineral occurrences are present throughout the continent in all countries.
Most of these occurrences will never be anything but isolated areas that contain small
amounts of a mineral resource and will never be developed as a modern mine. The
reason for that is because most of these occurrences do not contain enough volume of
the mineral to make mining economic. However, the use of modern exploration
methods in the region where these occurrences are known could result in the discovery
of new, and previously unknown, deposits which could be of sufficient quantity and
quality to allow for economic mining.
In addition to the influence of the rocks that underlie a mineral deposit, the
ability to conduct mineral exploration operations and mining operations is affected by
the landscape and vegetative cover. Areas which are predominantly semi-arid and
savannah are easier to operate in when compared to the areas of desert and tropical
rainforest. (Africa Mineral Resource Specialists Inc , 2004)
As the resources of Africa are developed, there is almost certain to be increased IFF.
Given the “immense” potential, the IFF are likely to be large.
The Continent of South America
Spatial analysis suggests that we turn our attention to South America. Using logic
almost identical to that above, South America should be watched by IFF analysts. The fund
balances of Brazil, in particular, should be watched for signs of IFF. Our tools should be
adjusted, if necessary, to accommodate Brazilian funds transfers.
Regional Groupings: The Scandinavian Countries
The Scandinavian countries, Denmark, Norway, Sweden, Finland, and, sometimes
included, Iceland, have closely linked economies, but do not contribute noticeably to IFF, are
not G7 members, and do not participate in the OECD. Sweden, in particular, strengthened its
113
banking system prior to the initiation of the GFI studies because it faced a financial crisis of its
own. Slate captures this turnaround in the author’s research on the web as follows:
Less than 20 years before the American crash, the Scandinavian country had
reformed a banking structure that was teetering on collapse after an overheated real
estate market—fueled by loose credit and financial deregulation—imploded. . . . Yet,
after the government’s bank takeover in 1992, not only did the economy swiftly
recover, but the country passed a series of structural reforms [providing greater
government control of banking practices and likely reducing IFF] that transformed the
nation into one of the most durable economies in Europe (Slate Group, 2012).
Religions Groupings
Finally, religions groupings, an area recommended for further study, allowed no
correlations with IFF because of the qualitative nature of the religion attribute (Christian,
Hindu, etc.). Such groupings might be handled statistically, but further work and insight is
needed.
RANKING AND CORRELATION RESULTS
Although it is possible to discuss the results of rank and correlation as distinct entities,
the interplay of these tools with spatial analysis is a necessary condition for their success.
The Search for Correlations with IFF
Figure 12 shows the four strongest correlations with IFF are: national exports, gross
domestic product, population, and oil exports. Correlations with other attributes are shown as
well.
The correlation with exports, 0.7720, is particularly strong, lending confirmation to the
notion that trade mispricing is a source of illicit gains by those controlling cross-border
exchanges. We suggest that at least the top four items confirm the GFI findings and provide a
basis for further investigations.
Correlations Between Other National Attributes
Correlation coefficients were computed among major attributes addressed in the study.
Figure 13 shows a subset of the correlations obtained between sets of national attribute
rankings that did not include IFF.
Of interest, we see that population and IFF per capita are strongly inversely related.
We suggest that this result is strongly influenced by China, which not only has the largest IFF
but also the largest national population; in this case, a large divisor (the number of people) of
the total IFF produces a per capita figure that is lower than many other nations.
114
The other strong correlations, we believe, show the effects of large countries (e.g.,
China, India, and Indonesia) combined with large volumes of exports.
All of the correlations reported would be statistically significant if the underlying data
were, in fact, randomly selected. The data used in this study has been selected with an eye
toward finding strong correlations and, indeed, some were found. Nonetheless, it is difficult to
say that any of the correlation results in Figure 12 break new ground.
Corruption, Freedom, and IFF
As this study progressed, a question arose about the correlation of corruption with the
national attributes included in this study. A separate database was constructed and correlation
coefficients among corruption, freedom, and IFF across 121 countries were computed.
Transparency International makes its data available as well as a map, in Figure 14, that shows
relative corruption around the world titled the Corruption Perceptions Index 2011. From their
manner of map presentation, Transparency International appears to be well aware of the value
of algorithmically shaded maps lending themselves to spatial and statistical analysis.
(Transparency International, 2011)
A map showing the relative freedom of nations around the word is shown in Figure 15.
The green nations are relatively free while the red are less free. The data for the map
presentation has been drawn from the Freedom House 2011 Freedom Index; it has been drawn
in ArcGIS to repeat some of the formatting themes of the Transparency International map
above. Nations shown in gray could not be surveyed for the 2011 edition.
The data from Transparency International has been used to compute the correlation
coefficients with other national attributes below.
The strongest correlation is between corruption and freedom at a value of -0.5781,
which, given the large sample size, is strong. The fact that this correlation is negative indicates
that there is an inverse relationship between corruption and freedom across the nations
sampled. The scatterplot is shown in Figure 16 and the analysis worksheet is shown in Figure
17.
The weakest correlation, -0.0791, occurred between IFF and freedom. This suggests
that stronger correlations, and indications of more IFF, might be found among those nations
with more authoritarian regimes. Extending this thought a bit further, it might suggest that the
principals in authoritarian regimes are more likely to be corrupt (reinforcing the finding
above).
SUMMARY
Starting with the goal of identifying strong indicators of IFF based on easily obtainable
collections of multinational data available on the Worldwide Web (“web”), this report has
identified strong indicators of IFF using spatial analysis and ranking. The results and questions
raised on Chinese IFF are, the author believes, important. We believe that we have identified
sources of easily available data (e.g., the CIA, GFI); indeed, the volumes far exceed those
115
needed for this analysis. Correlation coefficients corroborated other results but did not
contribute new insights. The best results by far were drawn from the maps supporting spatial
analysis which pointed to Hong Kong and Macau as conduits for Chinese IFF. We have
described and evaluated the tools used in the production of this report and depicted them in
Figure 17; the esri software works extraordinarily smoothly with Office 2010 and GIMP, but it
has the drawback of a steep learning curve for those beginning to use it. Descriptions of the
unanswered questions arising from this analysis have been captured and included in
recommendations for further research.
RECOMMENDATIONS FOR FURTHER RESEARCH
The Organisation for Economic Co-Operation and Development has been investigating
the problem of IFF since 1996 (OECD, 2012). The organisation’s report, Automatic Exchange
of Information, What It Is, How It Works, Benefits, What Remains To Be Done, recommends
increased information collection and processing in support of identifying and reducing IFF.
The detailed recommendations almost certainly will not be adopted without modification and
some compromises will have to be made, but they do provide a sense of direction. Our next
steps, then, should be to analyze the OECD recommendations to estimate how appropriate our
tools (spatial analysis, rank ordering, and rank correlation) are to work with the newly
gathered data. Assuming that the tools are appropriate at some level of analysis of the data
gathered, proof-of-concept applications of the tools should be created, applied to the data
(possibly simulated prior to actual data collection) matched to the data, and reviewed for
success in finding IFF.
Africa will almost certainly show increased illicit funds flows in the future. The
improved tools called for above, in combination with the exploitation of Africa’s mineral and
ground cover assets will help to identify flows that are currently in existence as well as those
that emerge with the increasing wealth of African nations. Near-term specialized studies
targeting the continent might be undertaken, especially as refined toolsets become available, to
provide a baseline for future IFF flows and techniques.
Inviting further analysis, Figure 17 shows the distribution of religions around the world
centered on the cluster of Muslim nations in the Middle East. Religion was not addressed in
this report because the author knows of no accepted way to assign a numeric value to the
religions of the world that has any meaning in comparison with others. We suggest further
investigation into the possibilities of including qualitative values describing religion in the
geostatistical analysis. Further, we suggest that current methodologies for identifying IFF be
reviewed to determine how best to account for hawala, an underground banking system based
on trust whereby money can be made available internationally without actually moving it or
leaving a record of the transaction; terrorists make extensive use of hawala. (Dictionary.com,
2012)
As additional information becomes available about China’s finances, especially IFF, it
should be analyzed to determine how large the actual size of the flows and where they are
116
going. Unless there is a dramatic change in the Chinese government’s approach to making
such information available (as called for in the “Transparency” initiative above), this will
likely be a long-term effort. Nonetheless, even the Chinese would agree with Lao Tzu that:
The journey of a thousand miles begins with one step. (ThinkExist, 2012)
REFERENCES
BerlinerMorgenpost,EU‐HilfefürZypernkönnteSchwarzgeldersichern,4November2012,
http://www.morgenpost.de/politik/ausland/article110596172/EU‐Hilfe‐fuer‐Zypern‐koennte‐
Schwarzgelder‐sichern.html?utm_source=twitterfeed&utm_medium=twitter,retrieved4
November2012,translatedbyMicrosoftBing.
CACIAnalyst,UkraineasaMajorPlayerIntheCaucasus,CentralAsia‐CaucasusInstitute,retrieved20
October2012,http://www.cacianalyst.org/?q=node/275.
CorruptionPerceptionsIndex2011,TransparencyInternational,retrieved20October2012,
http://cpi.transparency.org/cpi2011/results/.
deSmith,Goodchild,&Longley(2012).Retrieved22October2012,SpatialanalysisandthePPDACmodel,
GeospatialAnalysis3rdedition,webversion,http://www.spatialanalysisonline.com/output/.
Dictionary.com,retrieved24October2012,http://dictionary.reference.com/browse/Hawala.
Fagan,E.J.(2012).e‐mailexchangewith,18September2012,NewMedia/AdvocacyCoordinator,Global
FinancialIntegrity.
G.Gillette,G.(2012)RobbingFutures:IllicitFinancialFlowsintheGlobalEconomy,DistilledDaily,5
October2012,retrieved5October2012viaTwitter
http://www.distilledmagazine.com/blog/?p=573&utm_source=dlvr.it&utm_medium=twitter.
Humangeography(2012)Wikipedia,retrieved30September2012,
http://en.wikipedia.org/wiki/Human_geography
KarD.&FreitasS.(2011,December).IllicitFinancialFlowsfromDevelopingCountriesOvertheDecade
Ending2009,GlobalFinancialIntegrity.
KarD.&Curcio,K.(2011).IllicitFinancialFlowsfromDevelopingCountries:2000‐2009,Updatewitha
FocusonAsia,GlobalFinancialIntegrity,January2011.
KarD.&FreitasS.(2012,October),IllicitFinancialFlowsfromChinaandtheRoleofTradeMisinvoicing,
GlobalFinancialIntegrity.
Leipnik,M.(2012).Lecturefor“GeographicInformation,Lec.9Projection(&othercuriosities),”Sam
HoustonStateUniversity,27September2012.
Mann,C(2012).1493,UncoveringtheNewWorldColumbusCreated,NewYork:VintageBooks,p.198.
117
MineralResourcesofAfrica,AfricaMineralResourceSpecialistsInc.,20April2004,retrieved20October
2012,http://www.africaminerals.com/mineral_resources.htm.
OECD(OrganisationForEconomicCo‐OperationandDevelopment),(2012).TheTaskForceonFinancial
Integrity&EconomicDevelopment,TaskForceBlog,17October2012,retrieved18October2012,
http://www.financialtaskforce.org/2012/10/17/the‐slow‐but‐meaningful‐TheTaskForceon
FinancialIntegrity&EconomicDevelopment‐of‐the‐g20‐on‐illicit‐financial‐flows/.
OECD(OrganisationForEconomicCo‐OperationandDevelopment),GlobalForumonTransparencyand
ExchangeofInformationforTaxPurposes,retrieved18October2012,
http://www.oecd.org/tax/transparency/abouttheglobalforum.htm.
Patience,M.(2012)'Wallofshame'symbolisesChina'scorruptionwoes,BBCNewsChina,7October2012,
retrieved8October2012,http://www.bbc.co.uk/news/world‐asia‐china‐
19843176#?utm_source=twitterfeed&utm_medium=twitter.
Press,W.etal.(1992),NumericalRecipesinFortran77,SecondEdition,TheArtofScientificComputing,
CambridgeUniversityPress,1992,p.630.
ProjectionChangeattheNGS(NationalGeographicSociety)(2012).RetrievedviaBing22October2012,
http://www.bing.com/images/search?q=national+geographic+map+projectin&view=detail&id=9
4D0C5316659E35887A1924490C08B7ABF9725D1&first=1.
Reed,Q.&Fontana,A.(2011,January).Corruptionandillicitfinancialflows,Thelimitsandpossibilitiesof
currentapproaches,U4,theAnti‐CorruptionResourceCenter,p.6.
TheSlateGroup,HowSwedenSavedItself,17October2012,retrieved20October2012,Slate,
http://www.slate.com/articles/news_and_politics/the_pivot/2012/10/sweden_when_its_banks_fa
iled_the_scandinavian_country_made_a_miraculous.html.
Specialadministrativeregion,Wikipedia,retrieved23October2012,
http://en.wikipedia.org/wiki/Special_administrative_region.
SpecialEconomicZonesofthePeople'sRepublicofChina,Wikipedia,retrieved23October2012,
http://en.wikipedia.org/wiki/Special_Economic_Zones_of_the_People%27s_Republic_of_China.
ThinkExist,retrieved18October2012,
http://thinkexist.com/quotation/the_journey_of_a_thousand_miles_begins_with_one/214527.html
TJN(TaxJusticeNetwork),(2012).Introducingthe2011FinancialSecrecyIndex,retrieved19October
2012,http://www.financialsecrecyindex.com/#significance.
FigureCaption
Figure1.Thenationssourcing95%oftheIFFoutflowsareshownincolor.Nationsingraytoneshavenot
beenincludedinthisIFFanalysis.
Figure2.AstereographiclookattheIFFsourcesinredandtheIFFdestinationsinblue.
Figure3.AschematicviewofIllicitFundsFlows.Notethattheflowsare“residuals,”sotheendpointsof
theflowscanonlybeinferred.
Figure4.The41nationsincludedinthisanalysis.
Figure5.Datasources.
118
Figure6.Datasourcescontinued.
Figure7.Maindatabase.
Figure8.ThetopthreepercapitaIFFnationsaresmall–twoareislandnations.
Figure9.Acriticalquestion:ChinawithHongKongandMacauinaninsetmap.
Figure10.Georgia,Armenia,Azerbaijan,andUkrainearestronglyinfluencedbytheRussianbehemothto
thenorth.
Figure11.TheARCMappresentationistheproductofcomplexandextensiveeditingtocreateandplace
theannotationandboundaries.
Figure12.ThefourstrongestcorrelationswithIFFare:nationalexports,grossdomesticproduct,
population,andoilexports.
Figure13.Otherstrong(non‐IFF)correlations.
Figure14.CorruptionPerceptionsIndex2011fromTransparencyInternational.
Figure15.RelativeFreedomEstimatesbasedontheFreedomHouse2011Index.
Figure16.ScatterplotofFreedombasedonFreedomHouse2011Index.
Figure17.Freedomanalysisworksheet.
Figure18.ReportProductionSchematic:TheTools
Figure19.Distributionofworldreligions.
119
120
121
122
123
124
Nations Online
Military Expenditures
Matt Rosenberg's Eight Regional Groupings of the World
Illicit Funds Flows
GDP Growth
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2034rank.html, Accessed and Verified 29 September 2012.
Countries and Regions of the World from A to Z, One World ‐ Nations Online, http://www.nationsonline.org/oneworld/countries_of_the_world.htm, accessed 29 September 2012.
G‐20 major economies, Wikipedia, http://en.wikipedia.org/wiki/G‐
20_major_economies, accessed 29 September 2012.
G7, Wikipedia, http://en.wikipedia.org/wiki/G7, accessed 29 September 2012.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2001rank.html, Accessed and Verified 29 September 2012.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2003rank.html, Accessed and Verified 29 September 2012.
Illicit Financial Flows from Developing Countries Over the Decade Ending 2009, Dev Kar and Sarah Freitas, December 2011, Global Financial Integrity, Appendix Table 9. Cumulative Normalized and Non‐Normalized Illicit Financial Flows by Country Illicit Financial Flows from Developing Countries Over the Decade Ending 2009, Dev Kar and Sarah Freitas, December 2011, Global Financial Integrity, Appendix Table 9. Cumulative Normalized and Non‐Normalized Illicit Financial Flows by Country G20 Members
G7 Members
GDP (Purchasing Power Parity)
List of freedom indices, Wikipedia, http://en.wikipedia.org/wiki/List_of_indices_of_freedom, accessed 29 September 2012.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2147rank.html, Accessed and Verified 29 September 2012.
ISO 3166‐1, Wikipedia, http://en.wikipedia.org/wiki/ISO_3166‐1, accessed and verified 29 September 2012.
Numerical Recipes in Fortran 77, The Art of Scientific Computing, Cambridge University Press / William H. Press et al., 2nd ed.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐factbook/rankorder/2078rank.html
Source
Freedom Indices
Exports
Covariance
Country Name
Area
National Attribute
Information Sources:
Nations Online
Military
MilBud
IFF
Flows
MR C&R
GDPGrow
G7
GDP
G20
Freedom
Exports
Country
Area
Database Name
GDP Growth
G7
GDP
G20
Freedom Indices
Exports
ISO 3166
Area
Tab Name
125
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2176rank.html, Accessed and Verified 29 September 2012.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2175rank.html, Accessed and Verified 29 September 2012.
Report downloaded from http://cpi.transparency.org/cpi2011/in_detail/ Accessed 14 October 2012.
Central Intelligence Agency World Factbook, https://www.cia.gov/library/publications/the‐world‐
factbook/rankorder/2119rank.html, Accessed and Verified 29 September 2012.
Official Listing of Countries by World Region, About.com, http://geography.about.com/od/lists/a/officiallist.htm, accessed 29 September 2012.
Religions by country, Wikipedia, http://en.wikipedia.org/wiki/Religions_by_country, accessed 29 September 2012.
Illicit Financial Flows from Developing Countries Over the Decade Ending 2009, Dev Kar and Sarah Freitas, December 2011, Global Financial Integrity
Military expenditure (% of GDP), The World Bank, http://data.worldbank.org/indicator/MS.MIL.XPND.GD.ZS, accessed 29 September 2012.
WB Military Expenditures
Study Inclusion
Religion
Region
Population
Per Corr
Oil Imports
Oil Exports
WBMilBud
Stdy_Incl
Religion
Geo_Region
Population
Pcorr
OilImp
OilExp
The database names are shown. For ranking information, the name shown is appended with '_R' for rankings and 'perP' for values computed per person.
The sources are inconsistent in their capitalization of article titles. The items above reflect the convention adopted by the referenced source.
Many of the references provided data which was incorporated into the database for this project. Where a reference was used to provide such data, the title of the column in the Summary tab is shown in the 'Database Name' column.
World Bank Military Expenditure Estimates
Study Inclusion
Religion
Region
Population
Perceived Corruption
Oil Imports
Oil Exports
IFF
Argentina
83042
Aruba
25111
Azerbaijan
32546
Bahrain
19984
Bulgaria
22261
Chile
83532
China
2467214
Colombia
17039
Costa Rica
47975
Croatia
43319
Cyprus
31380
Czech Republic
41042
Egypt
59938
Honduras
28386
India
104154
Indonesia
118961
Iran, Islamic Republic of
65640
Israel
54221
Kazakhstan
123057
Kuwait
268589
Latvia
24729
Libya
40786
Malaysia
337870
Malta
53407
Mexico
453027
Nigeria
158294
Oman
19231
Panama
43659
Philippines
121416
Poland
159552
Qatar
169788
Romania
40660
Russian Federation
427170
Saudi Arabia
365811
Slovenia
40268
South Africa
59409
Trinidad and Tobago
33635
Turkey
46502
Ukraine
91612
United Arab Emirates
262348
Venezuela, Bolivarian Republic of 171093
Country
18 Western Hemisphere
36 Western Hemisphere
33 Europe
39 MENA
38 Europe
17 Western Hemisphere
1 Asia
41 Western Hemisphere
24 Western Hemisphere
27 Europe
34 Europe
28 Europe
20 MENA
35 Western Hemisphere
15 Asia
14 Asia
19 MENA
22 MENA
12 Europe
6 MENA
37 Europe
29 MENA
5 Asia
23 Europe
2 Western Hemisphere
11 Africa
40 MENA
26 Western Hemisphere
13 Asia
10 Europe
9 MENA
30 Europe
3 Europe
4 MENA
31 Europe
21 Africa
32 Western Hemisphere
25 Europe
16 Europe
7 MENA
8 Western Hemisphere
IFF_R Geo_Region
42192494
107635
9493600
1248348
7037935
17067369
1343239923
45239079
4636348
4480043
1138071
10177300
83688164
8296693
1205073612
248645008
78868711
7590758
17522010
2646314
2191580
5613380
29179952
409836
114975406
170123740
3090150
3510045
103775002
38415284
1951591
21848504
142517670
26534504
1996617
48810427
1226383
79749461
44854065
5314317
28047938
14
41
23
37
26
21
1
12
29
30
39
22
8
24
2
3
10
25
20
33
34
27
16
40
6
4
32
31
7
15
36
19
5
18
35
11
38
9
13
28
17
0.00196817
0.233297719
0.003428204
0.016008357
0.003163002
0.004894252
0.001836763
0.000376643
0.010347584
0.009669327
0.027572972
0.0040327
0.000716206
0.003421363
8.64296E‐05
0.000478437
0.000832269
0.007143028
0.007022996
0.101495514
0.01128364
0.007265854
0.01157884
0.130313101
0.003940208
0.000930464
0.006223322
0.012438302
0.001169993
0.004153347
0.086999786
0.001860997
0.002997313
0.013786238
0.020168114
0.001217137
0.027426179
0.000583101
0.002042446
0.049366269
0.006100021
Population Pop_R IFFperP
30
1
25
9
27
21
32
40
14
15
6
23
37
26
41
39
36
17
18
3
13
16
12
2
24
35
19
11
34
22
4
31
28
10
8
33
7
38
29
5
20
7.256E+11
2258000000
94250000000
31500000000
1.023E+11
3.035E+11
1.144E+13
4.78E+11
55730000000
81360000000
24030000000
2.886E+11
5.256E+11
36150000000
4.515E+12
1.139E+12
1.003E+12
2.382E+11
2.196E+11
1.555E+11
35370000000
37970000000
4.53E+11
10890000000
1.683E+12
4.187E+11
82820000000
51260000000
3.954E+11
7.815E+11
1.843E+11
2.706E+11
2.414E+12
6.915E+11
58630000000
5.622E+11
26880000000
1.087E+12
3.337E+11
2.621E+11
3.789E+11
IFFperP_R GDP
9
41
28
37
27
19
1
13
32
30
39
20
12
35
2
5
7
23
24
26
36
34
14
40
4
15
29
33
16
8
25
21
3
10
31
11
38
6
18
22
17
17197.37165
20978.30631
9927.740794
25233.34839
14535.51361
17782.47133
8516.721253
10566.08602
12020.23662
18160.53998
21114.67562
28357.22638
6280.458011
4357.157725
3746.659088
4580.827941
12717.3373
31380.26532
12532.80874
58760.97848
16139.04124
6764.195547
15524.35727
26571.60425
14637.91309
2461.149749
26801.28796
14603.80138
3810.166152
20343.46538
94435.77061
12385.28734
16938.25053
26060.40799
29364.67034
11518.03077
21918.11204
13630.18617
7439.682446
49319.60212
13509.01446
GDP_R GDPperP
17
13
32
10
23
16
33
31
29
15
12
6
36
38
40
37
26
4
27
2
19
35
20
8
21
41
7
22
39
14
1
28
18
9
5
30
11
24
34
3
25
8.9
2.4
0.1
1.8
1.7
5.9
9.2
5.9
4.2
0
0.5
1.7
1.8
3.6
7.2
6.5
2
4.7
7.5
8.2
5.5
2.5
5.1
2.1
4
7.2
5.5
0
3.7
4.4
18.8
2.5
4.3
6.8
‐0.2
3.1
‐1.3
8.5
5.2
4.9
4.2
3
29
37
32.5
34.5
11.5
2
11.5
21.5
38.5
36
34.5
32.5
25
7.5
10
31
18
6
5
13.5
27.5
16
30
23
7.5
13.5
38.5
24
19
1
27.5
20
9
40
26
41
4
15
17
21.5
84270000000
1276000000
34490000000
19910000000
28120000000
81710000000
1.904E+12
56220000000
10380000000
12280000000
2165000000
1.385E+11
27910000000
7204000000
2.994E+11
2.015E+11
1.318E+11
62850000000
88890000000
1.043E+11
12030000000
16460000000
2.256E+11
5204000000
3.497E+11
1.039E+11
45930000000
16950000000
47230000000
1.939E+11
1.07E+11
62680000000
5.209E+11
3.599E+11
28770000000
1.045E+11
14630000000
1.435E+11
69420000000
2.526E+11
92610000000
GDPperP_R GDPGrow GDPGrow_R Exports
19
41
27
31
29
20
1
24
37
35
40
11
30
38
5
8
12
22
18
15
36
33
7
39
4
16
26
32
25
9
13
23
2
3
28
14
34
10
21
6
17
9.85428E‐07
1.96795E‐05
9.43636E‐07
1.00372E‐06
7.91643E‐07
1.0223E‐06
1.29581E‐06
3.03077E‐07
4.62187E‐06
3.52761E‐06
1.44942E‐05
2.96332E‐07
2.14755E‐06
3.94031E‐06
3.47876E‐07
5.90377E‐07
4.98027E‐07
8.62705E‐07
1.38437E‐06
2.57516E‐06
2.05561E‐06
2.47789E‐06
1.49765E‐06
1.02627E‐05
1.29547E‐06
1.52352E‐06
4.18702E‐07
2.57575E‐06
2.57074E‐06
8.22857E‐07
1.5868E‐06
6.48692E‐07
8.20061E‐07
1.01642E‐06
1.39965E‐06
5.68507E‐07
2.29904E‐06
3.24056E‐07
1.31968E‐06
1.03859E‐06
1.84746E‐06
27
1
28
26
32
24
21
40
4
6
2
41
12
5
38
34
36
29
19
8
13
10
17
3
22
16
37
7
9
30
15
33
31
25
18
35
11
39
20
23
14
2780400
180
86600
760
110879
756102
9596961
1138910
51100
56594
9251
78867
1001450
112090
3287263
1904569
1648195
20770
2724900
17818
64589
1759540
329847
316
1964375
923768
309500
75420
300000
312685
11586
238391
17098242
2149690
20273
1219090
5128
783562
603550
83600
912050
Exp_R IFFoverExp IFFoverExp_R Area
4
41
26
39
25
17
2
12
32
31
37
28
13
24
3
8
10
33
5
35
30
9
19
40
7
14
21
29
22
20
36
23
1
6
34
11
38
16
18
27
15
238100
206400
651700
239900
75840
52390
506500
400700
2087
36080
0
25480
163000
5114
825600
404100
2523000
86010
1390000
2127000
5160
1580000
644900
0
1511000
2102000
592300
0
60460
50400
1038000
74080
5010000
7635000
8958
54930
242600
68450
114000
2395000
1871000
21
22
13
20
26
31
16
18
38
33
40
34
23
37
12
17
3
25
10
5
36
8
14
40
9
6
15
40
29
32
11
27
2
1
35
30
19
28
24
4
7
0.8
0
2.6
4.5
2.6
2.7
4.3
3.4
0.6
2.39
3.8
1.15
3.4
0.6
2.5
3
2.5
7.3
1.1
5.3
1.1
3.9
2.03
0.7
0.5
1.5
11.4
1
0.9
1.9
10
1.9
3.9
10
1.7
1.7
0.3
5.3
1.4
3.1
1.2
Area_R OilExp OilExp_R MilBud
126
127
128
129
130
Figure 4 The strongest correlations with IFF are exports, GDP,
population, and Oil Exports.
131
132
133
134
135
136
137
138
AUDITING FOR USEFULNESS: A NEW CONCERN?
Carl Brewer
Sam Houston State University
Alice Ketchand
Sam Houston State University
Jan Taylor Morris
Sam Houston State University
ABSTRACT
This paper argues that recent changes in the U.S. Generally Accepted Accounting
Principles (GAAP) hierarchy logically lead to a new audit objective. The elevation of FASB
SFAC 1, The Objectives of Financial Reporting by Business Enterprises, into GAAP also
elevated the objective of providing information useful for making economic decisions into the
GAAP hierarchy. Since auditing standards require the auditor to indicate if the financial
statements are in conformity with GAAP and GAAP now contains the useful information
objective, it is a logical conclusion that the audit report must also indicate if the information in
the financial statements is useful for making economic decisions.
139
CPA EXAMINATION PERFORMANCE OF
CANDIDATES FROM COMMUNITY COLLEGE
ACCOUNTING PROGRAMS
Gordon Heslop
Texas A&M University-Commerce
Byungil Kim
Texas A&M University-Commerce
In the past, the traditional path for students wishing to take the Certified Public
Accountancy (CPA) examination was a four year undergraduate degree in accounting. In
recent years, most states have increased the credit hours required to take the examination from
120 up to 150 hours, thereby forcing students to gain extra credit beyond an undergraduate
degree. These extra 30 hours are gained in one of two ways. Many students continue on to
complete a master’s degree while others take extra courses to gain the 30 hours without
completing a second degree. In obtaining an undergraduate degree students can transfer a
substantial number of hours from a community college to a four year institution; normally up
to half the number required for the undergraduate degree. However, traditionally, the only
accounting courses offered by community colleges were the two principles of accounting
courses and these usually cannot be used to satisfy the accounting hours required to qualify to
take the CPA examination as the required accounting courses must be upper level courses.
Although a baccalaureate is required to take the CPA examination, it is now possible in
some states to complete the accounting course work required of all candidates, at a community
college. The most strictly controlled example of this is in Texas, where a community college
must be approved by the Texas State Board of Public Accountancy (TSBPA) before it can
offer accounting courses which candidates can use to meet the educational requirements to take
the CPA examination. These courses must be taken after gaining a baccalaureate degree. The
TSBPA invited interested community colleges to apply for approval to offer such courses.
Community colleges which meet the Board standards are awarded the designation – Qualifying
Educational Credit for the CPA Examination – by the Board. Three community colleges were
granted such permission effective 1/1/2004 and a fourth effective 1/1/2005 (TSBPA, 20042005). The four approved community colleges are Austin Community College, Houston
Community College, Lone Star College (formerly North Harris Montgomery Community
College) and Mountain View College.
After the CPA examination was computerized in April 2004, the TSBPA began to
display the pass rate statistics for Texas on its website. Statistics are made available for each
examination section and by the university/college attended by the candidates. These statistics
show that since April 2004, the four community colleges, although not a dominant force in
140
terms of the number of candidates they have taught, have produced a significant number of
candidates for the CPA examination. They produced 2.3% of the total number of candidates,
who took 2.2% (2,181) of the total sections attempted during the period up to the end of 2012.
These candidates accounted for a total of 1,002 sections passed – 2.1% of the total. Overall,
community college candidates achieved a pass rate of 45.9%, just 3.3% below the pass rate of
49.2% for all candidates. Austin Community College, which had the most sections attempted,
and passed, of the four had a pass rate percentage of 55.8%, which exceeded the state average
by 6.6%. The other three community colleges had a pass rate lower than the state average. The
results are shown in Table 1.
Table 1
Texas Community College CPA Examination Statistics
April 2004 to Dec. 2012
Institutions
1
2
3
4
Austin Community
College
Houston Community
College
Lone Star College
Mountain View
College
Total for Community
Colleges
Total for all 81
Schools in TX
Community College
% of Total
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
550
779
435
55.8
561
757
306
40.4
286
368
168
45.7
199
277
93
33.6
1596
2181
1002
45.9%
69615
99117
48764
49.2%
2.3%
2.2%
2.1%
93.4%
Compiled from Texas State Board of Public Accountancy (TSBPA), 2004-2012
A number of other states also allow students to gain their accounting course credits at
community colleges but do not require that each community college obtain the prior approval
of their accounting courses by the state board. The board approval of community college
courses is stated in one of two ways. A number of states specify in their rules that community
college accounting courses are acceptable if they are gained from a school which is accredited
by one of the regional accrediting bodies – for example by SACS. Washington, California,
Virginia and Maryland follow this procedure. A number of other states specifically state in
their educational requirement rules that courses from community colleges are accepted. These
states are Ohio, Delaware and Georgia. Georgia further stipulates that such community college
credit must be “transferred to a four-year accredited university or college as credit earned
towards a bachelor’s degree or higher, and appear on the official transcript from the four-year
accredited institution.” This is different from the Texas rule which requires that the accounting
courses must be taken after the student has completed a bachelor’s degree.
141
Most state boards do not publish the detailed CPA examination pass rate statistics.
However, this data is available from the National Association of State Boards of Accountancy
(NASBA). Every year since 1985 NASBA has published a detailed report on the performance
of candidates on the Uniform CPA Examination. The statistics presented in this paper, with the
exception of those from Texas, were compiled from the 2009-2012 NASBA reports. Of all the
states accepting community college accounting courses for the CPA educational requirement,
Washington has the most sections passed by community college trained students when
expressed as a percentage of all sections passed in that state. Candidates from a total of 14
community colleges in Washington have taken the CPA examination over the past four years.
Individually, the numbers are not large from any community college, with the largest having
40 candidates over the four year period, an average of 10 per year. However, in total, these
candidates account for 4.4% of all sections taken and 3.9% of all sections passed. The pass rate
of 51.9% is respectable although it is 6.8% below the state average of 58.7%. Amongst the
community colleges the pass rate varies widely, from a high of 90% down to 32.1%. However,
six of the community colleges have a higher pass rate than the state average. The results are
shown in Table 2.
Table 2
Washington Community College CPA Examination Statistics
2009-2012
1
2
3
4
5
6
7
8
9
10
11
Institutions
Candidates Total
Sections Total
Sections
Passed
Sections
Passed (%)
Bellevue Community
College
40
84
39
46.4%
5
10
9
90.0%
7
20
7
35.0%
36
81
26
32.1%
11
26
17
65.4%
13
27
9
33.3%
37
75
56
74.7%
5
9
5
55.6%
11
29
18
62.1%
10
21
10
47.6%
6
11
5
45.5%
Clark College
Columbia Basin
Community College
Edmonds Community
College
Green River
Community College
Highline Community
College
North Seattle
Community College
Pierce College
Seattle Central
Community College
Shoreline Community
College
7
19
13
68.4%
13
Skagit Valley College
Spokane Falls
Community College
Tacoma Community
College
11
18
7
38.9%
14
Wenatchee Valley
5
9
7
77.8%
12
142
College
Total for Community
Colleges
Total for all 29
Schools in WA
Community College
% of Total
204
439
228
51.9%
3871
9994
5865
58.7%
5.3%
4.4%
3.9%
88.5%
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
California, with 21, has the most community colleges offering accounting courses
which meet the CPA educational requirement. However, within California, this represents a
lower percentage than Washington of the total sections taken, at 1.4%, and the sections passed,
at 1.2%. The average pass rate in California for all schools is 45.7%, and 40.2% for the
community colleges. Eight of the 21 community colleges have a pass rate higher than the state
average. The statistics are shown in Table 3.
Table 3
California Community College CPA Examination Statistics
2009-2012
Institutions
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
31
65
39
60.0%
5
10
9
90.0%
20
53
22
41.5%
5
10
0
0.0%
91
239
111
46.5%
5
American River
College
Chabot College
City College of San
Francisco
Coastline Community
College
De Anza College
6
Diablo Valley College
15
25
13
52.0%
7
El Camino College
6
17
3
17.7%
8
Foothill College
61
174
82
47.2%
9
El Camino College
Glendale Community
College
Golden West College
10
27
14
51.8%
52
149
44
29.6%
5
11
7
63.6%
13
49
10
20.4%
8
18
5
27.8%
10
27
9
33.3%
8
24
3
12.5%
22
82
25
30.5%
1
2
3
4
10
11
12
13
14
15
16
Irvine Valley College
Los Angeles Pierce
College
Mission College
Mount San Antonio
College
Orange Coast College
143
17
Pasadena City College
5
10
4
40.0%
18
5
14
8
57.1%
5
10
1
10.0%
20
Saddle Back College
San Mateo County
Community College
Santa Ana College
11
24
14
58.3%
21
Santa Monica College
128
349
134
38.4%
516
1387
557
40.2%
40233
101800
46531
45.7%
1.3%
1.4%
1.2%
87.9%
19
Total for
Community Colleges
Total for all 90
Schools in CA
Community College
% of Total
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
The Virginia statistics are almost identical to those in California. Candidates from the
two Virginia community colleges taking the examination account for 1.3% of total sections
taken and 1.1% of sections passed. The pass rate of 45.8% is considerably below the average
pass rate in Virginia of 54.8% - a difference of 9%. The statistics are shown in Table 4.
Table 4
Virginia Community College CPA Examination Statistics
2009-2012
Institutions
1
2
Northern Virginia
Community College
Tidewater
Community College
Total for
Community Colleges
Total for all 35
Schools in VA
Community College
% of Total
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
89
213
97
45.5%
18
40
19
47.5%
107
253
116
45.8%
7321
19591
10743
54.8%
1.5%
1.3%
1.1%
83.6%
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
In Maryland, there is only one community college with candidates taking the CPA
exam and they represent only a tiny fraction of all candidates. They comprise 0.6% of total
sections taken and 0.4% of sections passed. The pass rate of 30.8% is 15.2% below the state
average. The statistics are shown in Table 5.
144
Table 5
Maryland Community College CPA Examination Statistics
2009-2012
1
Institutions
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
Montgomery College
16
39
12
30.8%
16
39
12
30.8%
2414
6042
2779
46.0%
0.7%
0.6%
0.4%
66.9%
Total for
Community Colleges
Total for all 17
Schools in MD
Community College
% of Total
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
In Ohio also, there is only one community college with candidates taking the
examination. These candidates make up 0.3% of both the total number of sections taken and
passed. However, the pass rate is 56.8%, which is 5.2% higher than the state average. The
statistics are shown in Table 6.
Table 6
Ohio Community College CPA Examination Statistics
2009-2012
1
Institutions
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
Columbus State
Community College
39
81
46
56.8%
39
81
46
56.8%
11245
30602
15791
51.6%
0.3%
0.3%
0.3%
110.1%
Total for
Community
Colleges
Total for all 47
Schools in OH
Community College
% of Total
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
In Georgia, the participation of community college students is even smaller, making up
only 0.1% of both the total sections taken and passed. As in the case of Ohio, the pass rate of
56.3% is higher than the state average of 50.0%. The statistics are shown in Table 7.
145
Table 7
Georgia Community College CPA Examination Statistics
2009-2012
1
Institutions
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
Georgia Perimeter
College
5
16
9
56.3%
5
16
9
56.3%
7124
18312
9158
50.0%
0.1%
0.1%
0.1%
112.6%
Total for
Community Colleges
Total for all 35
Schools in GA
Community College
% of Total
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
In Delaware there is also just one community college with candidates taking the
examination, although they make up a bigger percentage of all candidates with 1.6% of the
total sections taken and 1.4% of the sections passed. The pass rate is 44.6%, 5.9% below the
state average. The statistics are shown in Table 8.
Table 8
Delaware Community College CPA Examination Statistics
2009-2012
1
Institutions
Candidates Total
Sections Total
Sections Passed
Sections Passed
(%)
Delaware Tech & CC
Owens
22
56
25
44.6%
22
56
25
44.6%
1340
3455
1744
50.5%
1.6%
1.6%
1.4%
88.4%
Total for
Community
Colleges
Total for all 6
Schools in DE
Community College
% of Total
Compiled from NASBA Reports and Commentary on the 2009-2012 CPA Examinations
CONCLUSIONS
Candidate preparation for the CPA examination is still almost exclusively carried out at
four year institutions. Nationally, most states do not allow the required accounting courses to
be taken at community colleges. In those few states where it is allowed, it still represents the
preparation of only a very small fraction of all candidates. However, three states are beginning
to stand out. Texas and Washington have the highest percentage participation of community
146
college trained students. California, as the most populous state, has the most community
colleges offering these accounting courses, and has a sizeable number of total sections taken
(1,387) and passed (557). Many of the individual community colleges have candidates with
pass rates which exceed their overall state average, while many others, although lower, are still
close to the average and respectable. While unlikely to become a dominant provider of
accounting courses for CPA examination candidates, many community colleges have
demonstrated an ability to produce successful CPA examination candidates and future public
accountants.
REFERENCES
California Board of Accountancy (CBA). Uniform CPA Examination Handbook. Retrieved from
http://www.dca.ca.gov/cba/publications/exambook.pdf
Maryland Board of Public Accountancy. Retrieved from http://www.dllr.state.md.us/license/cpa/cpareq.shtml#cirr
NASBA Delaware. Retrieved from http://www.nasba.org/exams/cpaexam/delaware/
NASBA Georgia. Retrieved from http://www.nasba.org/exams/cpaexam/georgia/
NASBA Ohio. Retrieved from http://www.nasba.org/exams/cpaexam/ohio/
National Association of State Boards of Accountancy (2009-2012). Uniform CPA Examination: Candidate
Performance (2009-2011 Editions), Nashville, TN: NASBA.
Texas State Board of Public Accountancy (TSBPA) (2004-2005). Texas Community Colleges awarded the Board
designation - Qualifying Education Credit for CPA Examination. Retrieved March 10, 2013, from
http://www.tsbpa.state.tx.us/education/board-awarded-community-colleges.html
Texas State Board of Public Accountancy (TSBPA) (2004-2012). Candidate success rates –CBT-Uniform CPA
Examination university comparison. Retrieved March 10, 2013, from
http://www.tsbpa.state.tx.us/php/fpl/unvcompare.php
Virginia Board of Accountancy (VBA). Retrieved from
http://www.boa.virginia.gov/CPAExam/EducationRequirements.shtml
Washington State Board of Accountancy. Retrieved from
http://www.cpaboard.wa.gov/CertificateLicense/schools_accreditation.shtml
147
REVERSE CONVERTIBLES PRICES: EVIDENCE
FROM SECONDARY MARKET TRADING
Stephen J. Cotton
University of Houston - Clear Lake
Timothy B. Michael
University of Houston - Clear Lake
Ivelina Pavlova
University of Houston - Clear Lake
Jeffrey Whitworth
University of Houston - Clear Lake
ABSTRACT
We examine the secondary market price changes and their determinants for a large
sample of reverse convertible notes issued by the Royal Bank of Canada. Our dataset includes
1,112 reverse convertible notes issued by the Royal Bank of Canada (RBC) between January
2007 and October 2010. We find that the daily return of the reference stock is the most
important factor affecting secondary market prices of RC bonds. Further research including
liquidity proxies may improve the goodness of fit of our models.
INTRODUCTION
Reverse convertible (RC) bonds are unsecured short-term securities backed by an
issuing bank and tied to an underlying stock. At maturity, the owner receives full par value
plus a relatively large coupon payment, or if the value of the stock has fallen to a barrier price,
a predetermined number of shares of the stock. There are three possible outcomes of owning an
RC: (1) the underlying stock price stays flat, so the investor collects their principal and the
large coupon payment; (2) the underlying stock price increases, so the investor collects their
principal and large coupon payment but foregoes the gains from owning the stock directly, or
(3) the underlying stock price increases and the investor is paid in stock at a loss. Issued since
1998, the market for RCs has dramatically grown in recent years, exposing inexperienced
investors to what can appear on the surface to be highly-desirable fixed-income securities
despite having a risky option component.
148
Recent research has shown that RCs have been a windfall for issuing banks. Investors,
exposed to both the risk of changes in the underlying stock price and the credit risk of the
issuer, have been consistently overpaying (see Ruf, (2011); Szymanowska, et al, (2009);
Stoimenov and Wilkens, (2005)) . In 2010, for example, the S&P 500 Index returned 8 percent
and corporate bonds gained 11.1%, while RCs, a $6 billion market that year, lost 1% on
average. Banks, meanwhile, charged fees averaging 1.6% on three-month RCs (Faux, 2011).
FINRA has issued a formal warning to investors that RCs contain significantly greater risks
than standard bonds and that only the default and credit risk are covered by the credit rating –
not the risk of variations in the price of the underlying equity.
Reverse-convertibles, being of short maturity, are typically a buy-and-hold investment
although a secondary market for them does exist. This secondary market is thin, providing
limited liquidity, but is of academic interest because of what transactions may reveal about the
behavior of investors in the primary market. Given the large nominal returns of successful RC
investments, the speculative motive for selling an existing RC rather than holding it to maturity
is to get rid of it before the underlying stock hits the barrier price (with a buyer betting the
underlying will not hit) or if the issuing bank is expected to be unable to make the coupon
payment. Secondary market trades driven by credit risk more than stock price changes may
suggest that credit risk has surprised primary market investors. Likewise, trades driven more
by stock price changes may suggest that the option component has surprised primary market
investors.
Using secondary market data for RCs issued by the Royal Bank of Canada (RBC),
which allows us to factor out effects on RC prices of different issuers and focus on the effect of
the underlying stock prices and changes in RBC’s credit risk, we find that there is a strong
relationship between the return of the reference stock and daily price changes of the RC, while
term-structure variables and issuer credit risk do not appear to be significant determinants. This
suggests that investors may have focused too much on the fixed-income component of RCs and
have insufficiently accounted for the option component and are reacting accordingly in the
secondary market. We also find that RCs exhibit an inverted yield curve. Given that the
structure of these securities lends strongly to a normal yield curve, this may be further evidence
of the degree to which inexperienced investors are making poor decisions with respect to RCs.
The rest of the paper is organized as follows. Section II outlines a brief review of recent
studies on the pricing of reverse convertibles bonds. Section III describes the data sources and
in Section IV we discuss the models and empirical results. Our conclusions and suggested
extensions are presented in Section V.
LITERATURE REVIEW
Reverse convertible notes are just one type of structured product, albeit a relatively
popular type (Hens and Reiger (2009)). As noted by Ruf (2011), the early literature on
structured products focuses on valuation and finds significant overpricing of these products
compared with their constituent securities. Ruf points out, though, that more recently there has
149
been an emphasis on examining whether issuers use this market to prey on investors with
weaker financial backgrounds and/or biases regarding liquidity (page 1).
Stoimenov and Wilkens (2005) study the German market for equity-linked structured
products. These authors refer to reverse-convertibles of the type we study as knock-in
products, wherein the product pays as a bond if the underlying equity remains above a barrier
price. They examine both pricing in the primary market and the secondary market for 2,566
different issues, including 408 knock-in securities. For the overall sample, they find that
structured products are priced well above their theoretical values, and with knock-in options
have higher premiums than other types of securities. They find that the secondary market
premiums decline as maturity approaches.
Another early study by Benet, et al (2006) looks more closely at reverse-exchangeable
securities (RES), and in particular those issued by ABN-AMRO Bank between June 2001 and
July 2003. These authors use a portfolio approach to determine the theoretical value of each
RES at issue and determine that there seems to be a sizable bias in favor of the issuer overall.
They suggest that this is consistent with the growth in these markets, and that the different risk
characteristics of these products are beneficial to the hedging of the sponsor.
Hens and Reiger (2009) provide a comprehensive analysis of many different types of
structured products, and attempt to rationalize these products from the view of an investor
rather than the issuer. These authors examine the popularity of different products in different
markets as well, and discuss the optimal design of the various contracts. In addressing the
question of “why” investors pursue these securities, they suggest that perhaps systematic
misestimation of risk or unwarranted attention to small-probability outcomes leads to their
appeal. They divide structured products into categories based on the “degree of deviation from
rational preferences” that is needed to justify investor preferences (Hens and Reiger (2009), pg.
27).1
Ruf (2011) uses a very large collection of German over-the-counter warrant data to
draw conclusions about the structured products market overall. This author finds that retail
investors are more likely to use options that are either far out-of-the-money or far in-themoney, and suggests that far out-of-the-money warrants may be overpriced because there is no
alternative and because investors may have the hardest time pricing them without institutional
input. With respect to the secondary market, this author finds evidence that issuers can
anticipate upcoming demand and exploit that to increase their returns on sales of these types of
securities. Additionally, the author finds that premiums decline over the life of these products,
but that this is mainly due to the time to expiration and “moneyness” of the option, which
should be expected. The large drop in premiums found by prior work is explained here as
perhaps an artifact of the matching methodology used by those authors and the unavailability
of proper matching securities. Finally, this author looks at the credit risk component of the
premiums and finds a negative effect from credit risk after the bankruptcy of Lehman Brothers
in the U.S.
Szymanowska et al (2009) examine the pricing of reverse convertible bonds in the
Dutch market and provide a thorough discussion of the characteristics of these issues. They
1
Hens and Reiger (2011) refines some of the analysis of the original study.
150
analyze a sample of 108 issues from four different issuing banks (ABN AMRO, Fortis Bank,
ING Bank, and Rabo Securities) and end up with a subsample of 75 issues that had enough
ancillary data to be priced using their method, including 43 “knock-in” issues. They find
overpricing of approximately 6 percent for their entire sample, and document that some
premium remains over the entire period these securities are outstanding. They address this
premium and its persistence in several ways, concluding that only a small percentage of
overpricing differences can be explained without behavioral reasons such as financial
marketing, framing and representativeness bias. They document substantial differences
between issuers and between those securities with trending underlying equities.
DATA
Our initial dataset includes 2,195 reverse convertible notes issued by the Royal Bank of
Canada (RBC). The total principal of these notes is $1,410,064,000 and the period during
which the notes were issued spans from January 2007 till October of 2010. We collect data on
the note’s pricing date, issuance date, maturity date, coupon rate, strike price and barrier price
from the prospectus and the pricing supplement of each issue. Daily stock prices for the
reference stocks and for the reverse convertible notes are gathered from Thomson Datastream.
The maturity of the notes is two, three, six, nine or twelve months. The coupon is paid monthly
or quarterly. After merging the initial dataset with the stocks and notes data from Datastream
and deleting observations with missing data our sample consists of 1,112 notes.
Descriptive statistics on the data are reported in Table 1. The majority of the notes in
our sample have a three-month maturity, followed by six and twelve months. The coupon rates
in our sample range from 7 to 42.5 percent. The means for the three-, six- and twelve-month
maturity notes are 18.2, 14.1 and 11.9 percent, respectively. On average, the coupon rate
appears to go down the longer to maturity. The lowest principal amount in our sample is
$4,000 and the highest is $10,778,000. The ratio of the barrier price to the initial stock price of
the underlying is close to 72 percent, with the highest range from 30 to 90 percent in the threemonth maturity notes.
Appendix A includes the list of the reference stocks and the number of notes issued for
each reference stock. The largest number of notes was issued on Apple, followed by Wells
Fargo, GM, Freeport-McMoRan Copper & Gold, Inc. and JPMorgan Chase. The total number
of reference stocks included in our sample for which reverse convertibles notes were issued is
316.
EMPIRICAL ANALYSIS
The reverse convertibles bonds included in our sample are senior unsecured obligations
issued by RBC. They are a combination of a bond and a put option written by the buyer of the
reverse convertible bond. Therefore, the price of the reverse convertible should reflect the
value of a bond less the value of the short put:
Reverse convertible note price = Bond price – Put option price
(1)
151
Theoretically, the variables affecting the reverse convertible’s price should be the
inputs in the bond pricing and option pricing models. The bond price depends on the time to
maturity, the face value of the bond, the coupon payment amount and yield to maturity. The
option price is affected by the time to maturity, the risk-free interest rate, the volatility of the
underlying stock return, as well as the stock price and the strike price.
While few recent papers investigate the overpricing of reverse convertibles at time the
securities are issued (Szymanowska et al (2009); Stoimenov and Wilkens (2005) among
others), our focus is on secondary market price determination. In particular, we examine to
what extent the theoretical determinants of RC prices help explain the changes in daily
secondary market prices of these notes. We run time series regression for each reverse
convertible note and then average the coefficients. Our base regression model follows:
Pt i   i  1Tnotet   2 Slopet   3 VIX t 1   4 S & P500 ret t 1
  5 RBCSpread t   6 Stockret ti   ti
(2)
Where Pt is the change in price of note i from day t-1 to day t, ΔTnotet is the change
ij
in the one-year treasury rate,ΔSlopet is the change in the term structure slope measured as the
difference between 10- and one-year treasury rates in first difference; S & P500rett is the
contemporaneous return on the S&P 500 Index, and ΔVIXtis the change in the VIX,
RBCSpread t is the change in the yield spread of a bond of the issuer (RBC) over the
corresponding treasury (used as a proxy for credit risk of the issuer) and Stockret ti is the daily
equity return of the reference stock for each reverse convertible note.
The parameters estimates of our base model are reported in Table 2. We run the model
separately for each note and then average them by maturity. We only use the three-, six- and
twelve-month maturities since we have only three notes with two- and nine-month maturity,
respectively. The regression results reveal that the most important factor in secondary market
price changes of reverse convertible bonds appears to be the daily return on the reference stock
and the statistical significance of the stock return increases the longer to maturity of the
note.The level and slope of the yield curve do not appear to have an effect for any of the
maturity groups. More surprisingly, the credit risk of the issuer of the reverse convertible does
not play a role in secondary market pricing even though there is significant widening in RBC
bond yield spread during the period of our study. Equity market risk proxies such as the VIX
are not significant in the regression either. A possible explanation for the significance of the
daily return of the reference stock in explaining daily changes in prices of the reverse
convertible bonds in our sample could be that investors trade RC bonds in the secondary
market mostly out of fear that the stock price will reach the barrier price, whereas the initial
focus at the time of issuance is on the coupon payments of the notes and the view of RC bonds
as a high yield fixed income instrument. Furthermore, the R2s of the regression models range
from approximately 46 to 49 percent, which means that there may be another factor playing a
significant role which is not captured in our model. A possible candidate is the liquidity of the
securities which may be quite limited in the secondary market.
152
To examine whether the regression results differ by coupon rate of the notes, we split
the sample into four subsamples based the quartiles of the distribution of the coupon rate. We
expect that the lower the coupon payment, the lower the risk of the bond converting into shares
of stock at maturity and the higher the significance of the term structure variables. The results
reported in Panel A of Table 3 are similar to those in Table 2 and again confirm the
significance of the stock return. We also investigate the extreme tails of the distribution of the
coupon rates in Panel B of Table 2 and find that in the bottom 1 percent the change in the
Treasury note becomes marginally significant. The stock return of the underlying is still the
most important determinant.
CONCLUSION
We examine the secondary market price changes and their determinants for a large
sample of reverse convertible notes issued by the Royal Bank of Canada.We find that the daily
return of the reference stock is the most important factor affecting secondary market prices of
RC notes. Further research including liquidity proxies may improve the goodness of fit of our
models.
One useful avenue of further research would be to more directly explore the behavioral
factors underlying the mispricing of reverse convertibles. Our results suggest that the fixedincome component seems to carry more weight with investors than the risk of the option
component, but there are numerous confounding factors. Laboratory testing could show how
individuals treat these types of investments when compared against normal bonds, straight
equity, and other types of structured notes. There is also room to compare reverse convertibles
across issuers to better explore the impact of credit risk on investor decisions.
REFERENCES
Benet, Bruce A., Antoine Giannetti, and Seema Pissaris. (2006). Gains from structured product markets: The case
of reverse-exchangeable securities (RES), Journal of Banking & Finance 30, 111-132.
Faux, Zack (2011). Wall Street turns stock gains into investor losses with structured notes, Bloomberg.com, June
6, 2011.
Hens, Thorsten, and Marc Rieger. (2011) Why do investors buy structured products? Working paper, University
of Zurich.
Hens, Thorsten, and Marc Rieger. (2009) The dark side of the moon: structured products from the customer’s
perspective, EFA 2009.
Ruf, Thomas. (2011) The bank always wins: The dynamics of overpricing in structured products, 2011 MFA
Annual Meeting Paper.
Stoimenov, Pavel A., and SaschaWilkens. (2005) Are structured products fairly priced? An analysis of the
German market for equity-linked instruments, Journal of Banking & Finance 29, 2971-2993.
Szymanowska, Marta, Jenke Ter Horst and Chris Veld. (2009). Reverse convertible bonds analyzed, Journal of
Futures Markets 29, 895-919.
153
Table 1
Descriptive Statistics
Term
in
Frequency
months
STAT
Coupon
Rate
2
3 MIN
MAX
MEAN
STD
0.24
0.25
0.243
0.006
3
Initial
Stock
Price
Barrier Price
Principal Amount
Barrier
to
Initial
price
ratio
$22.11
$95.19
$48.24
$40.75
$16.58
$71.39
$35.72
$30.92
$1,000,000.00
$1,000,000.00
$1,000,000.00
$0.00
0.70
0.75
0.73
0.03
599 MIN
MAX
MEAN
STD
0.081
$2.19
0.425 $464.19
0.182 $45.71
0.062 $46.28
$0.60
$371.35
$32.34
$34.05
$5,000.00
$6,058,000.00
$588,726.96
$715,619.18
0.30
0.90
0.71
0.07
6
327 MIN
MAX
MEAN
STD
0.083
$4.86
0.28 $555.98
0.141 $52.13
0.037 $48.04
$0.50
$444.78
$36.78
$36.38
$4,000.00
$10,778,000.00
$593,218.35
$1,044,267.76
0.50
0.80
0.72
0.06
9
3 MIN
MAX
MEAN
STD
0.109 $25.23
0.168 $118.64
0.129 $73.30
0.034 $46.76
$18.92
$71.18
$50.31
$27.67
$1,000,000.00
$2,087,000.00
$1,362,333.33
$627,579.74
0.60
0.80
0.72
0.10
12
180 MIN
MAX
MEAN
STD
0.07
$3.74
0.229 $530.26
0.119 $50.32
0.03 $54.38
$0.65
$424.21
$33.40
$40.41
$21,000.00
$7,601,000.00
$795,746.99
$1,073,338.87
0.50
0.85
0.72
0.08
154
Table 2
Regression models by maturity
Variable
Intercept
ΔRBCspread
ΔSlope
S&P500ret
Stockret
ΔTnote
ΔVIX
R2
3 month
Estimate tValue
-0.00011
0.11
-0.00017 -0.33
0.00214
0.01
-0.00104 -0.21
0.32375
4.15
0.02237
0.39
-0.00024 -0.12
6 month
Estimate tValue
-0.00136 -0.16
-5.9E-06 -0.01
0.00636
0.30
-0.00223 -0.77
0.47403
7.68
0.02871
0.92
-0.00028 -0.08
46.26%
48.72%
Table 3 Regression models by coupon rate
Panel A. Quartiles of the coupon distribution
Coupon <10.75%
10.75<=Coupon <13.20
Variable
Estimate
tValue
Estimate
tValue
Intercept
-0.00051
0.03
-0.00043
-0.02
ΔRBCspread
-1.7E-05
0.00
-5.8E-05
-0.12
ΔSlope
0.00611
0.40
0.00919
0.20
S&P500ret
-0.00085 -0.66
-0.0016
-0.62
Stockret
0.42291
7.97
0.40761
6.83
ΔTnote
0.0283
1.10
0.02108
0.74
ΔVIX
0.000453
0.32
-0.00028
-0.16
R2
45.98%
47.24%
45.60%
13.20<=Coupon <16.8
Estimate tValue -0.00098 -0.17
-9.2E-05 -0.17
0.00844
0.13
-0.0025 -0.73
0.4295
6.60
0.02887
0.73
-0.0006 -0.20
48.48%
Panel B. Top and bottom 1 percent of the coupon distribution
Coupon <8 (1%)
Coupon >31.1 (99th%)
Variable
Estimate tValue
Estimate
tValue
ΔRBCspread
-0.00012 -0.17
-0.00075
-0.07
ΔSlope
0.000212
1.41
-0.00052
-0.77
S&P500ret
0.00824
0.76
-0.0451
-0.82
Stockret
-0.00136 -1.53
0.000631
0.05
ΔTnote
0.53975 17.52
0.23031
4.06
ΔVIX
0.01458
1.74
0.03113
0.36
ΔRBCspread
0.000619
1.18
0.000329
-0.01
R2
58.64%
52.60%
155
12 month
Estimate tValue
-0.0016 -0.53
-3.6E-05 -0.10
0.00773
0.42
-0.00204 -1.26
0.47976 11.32
0.02516
1.30
-4.1E-06
0.06
16.80<=Coupon
Estimate tValue
-0.00083 -0.09
-0.00019 -0.34
-0.00347
0.02
-0.00105 -0.30
0.35134
5.21
0.0205
0.45
-0.00013 -0.10
46.22%
Appendix A
Number
Ticker
of Notes
AA
14
AAP
1
AAPL
42
ABK
1
ABX
1
ACAS
2
ACH
2
ACI
12
ADM
5
AFL
9
AGU
1
AHM
2
AIG
11
AIR
1
AKAM
1
AKS
1
AL
1
ALU
1
AMD
6
AMGN
2
AMLN
2
AMR
4
AMZN
9
ANR
1
APOL
1
ARBA
1
ATI
6
ATPG
5
AUY
2
AVR
1
AXP
11
BA
1
BAC
17
BBD
1
BBT
1
BBY
1
BCSI
1
BDC
1
BEAV
3
156
GC
BHP
BIDU
BK
BKS
BLDP
BRCM
BSC
BSX
BTU
BUCY
BUD
C
CA
CAL
CALM
CAT
CBG
CBI
CCJ
CCRT
CELG
CFC
CHK
CHRW
CLR
CMI
CMP
CNH
CNO
CNQ
CNX
COF
COH
COP
COST
CPN
CREE
CSCO
CTV
CUTR
CVS
1
1
2
1
1
1
1
4
1
22
7
3
14
2
6
3
21
1
3
1
1
1
2
22
1
1
1
1
3
1
3
2
1
1
2
1
1
2
3
1
3
1
157
CVX
CX
CY
DE
DECK
DHI
DO
DOW
DRYS
DSX
DV
DVN
DYN
EAC
EBAY
ELN
EMC
ENER
ESV
EV
EWH
EWZ
EXM
F
FAST
FCEL
FCX
FITB
FLR
FMD
FNM
FRO
FRPT
FSLR
FSYS
FTO
FWLT
GDX
GE
GG
GGB
GLW
4
1
1
16
1
1
1
4
2
3
1
7
2
1
3
12
2
2
1
1
1
2
1
17
1
1
28
1
1
3
4
2
2
6
2
9
7
1
21
17
2
3
158
GM
GME
GMXR
GNW
GOOG
GRMN
GS
HAL
HD
HIG
HK
HLX
HMY
HOG
HOLX
HOT
HPQ
HUN
ICE
IGT
INTC
IR
ISRG
ITWO
JBLU
JCP
JEC
JOYG
JPM
JSDA
JWN
KBR
KEY
KO
KSS
KSU
KSWS
KWK
LDK
LEH
LEN
LM
40
1
2
2
7
3
6
5
12
1
1
1
2
1
1
1
6
2
4
1
8
1
2
1
1
3
1
6
25
1
2
4
2
1
2
1
1
1
2
4
1
3
159
LNN
LO
LOW
LTM
LUV
LVLT
LVS
MA
MAR
MBI
MCD
MCO
MDC
MDR
MEDX
MEE
MER
MGM
MI
MICC
MMR
MO
MON
MOS
MOT
MPEL
MRO
MSFT
MTW
MU
MWA
NCC
NDAQ
NE
NFLX
NG
NHWK
NILE
NMX
NOG
NOK
NOV
1
1
7
2
1
2
9
2
1
1
4
4
1
1
2
4
6
4
1
1
3
1
11
13
1
1
1
8
3
1
1
1
4
3
4
1
2
2
1
1
1
2
160
NRGN
NTAP
NTRI
NUE
NVDA
NWL
NYX
OFG
OI
ORCL
OSK
OSTK
OVTI
PALM
PBR
PCAR
PCLN
PCU
PEIX
PENN
PFE
PG
PGH
PHM
PLLL
POT
PTEN
PWR
QCOM
RAX
RDC
REXX
RF
RHT
RIG
RIMM
RIO
RTP
RVBD
RYAAY
S
SBUX
1
1
5
13
2
1
12
1
1
1
1
1
1
5
11
4
2
1
1
1
6
3
1
1
1
7
3
2
2
1
4
1
1
1
1
24
7
1
1
1
1
7
161
SF
SFD
SGR
SHLD
SID
SIRF
SIRI
SLB
SNDK
SNP
SOLF
SONO
SOV
SPG
SPWR
SPY
STI
STJ
STP
SU
SUN
SWC
SWN
SYMC
T
TASR
TCB
TEX
TGT
THC
TIE
TIF
TMA
TOL
TRA
TRN
TSL
TSN
TSO
TXN
UA
UNG
1
1
3
2
2
1
4
3
3
1
2
2
2
2
4
1
2
2
3
3
1
2
6
1
1
1
1
4
7
1
10
1
1
2
1
1
1
2
5
1
2
2
162
UNH
UNP
USB
USG
VALE
VCLK
VLO
VSE
WB
WDC
WFC
WFMI
WFT
WM
WMG
WMT
WU
WY
WYNN
X
XMSR
XOM
YHOO
YRCW
ZOLT
2
8
12
1
7
1
8
1
3
1
41
2
1
9
1
6
2
2
2
11
1
3
1
1
1
163
ONLINE BUSINESS STUDENTS: MULTIMEDIA
PRINCIPLES TO PROMOTE MEANINGFUL
E-LEARNING
Courtney Kernek
Texas A&M University-Commerce
Leslie Toombs
Texas A&M University-Commerce
Charlotte Larkin
Texas A&M University-Commerce
Abstract
The purpose of this study was to examine the learning effects of dual code and
interactivity, two multimedia principles intended to promote meaningful e-learning, in an
online learning environment within the discipline of business. Existing research has examined
the effects of multimedia instruction designed to engage learners, facilitate learning, and
reduce cognitive load. However, further research was needed to examine whether the
instructional design principles of multimedia learning also applied to various types of
multimedia lessons and more than one kind of learner in an online learning environment. Thus,
using a different discipline (i.e., business), causal model (i.e., business communication model),
learner sample (i.e., familiar), and environment (i.e., online instruction system) from that used
by Moreno and Valdez (2005), the present study replicated and extended this earlier study to
explore whether dual code and interactivity principles are related and have an effect on
learning and mental effort in a cognitive load condition. The participants consisted of
undergraduate business students. The study utilized a quantitative research design to examine
whether students construct better models of causal systems when: they are presented with two
representation modes rather than one, they are asked to organize the causal chain themselves,
they can control the amount of time deemed necessary for self-organization, and the feedback
designs encourage the intentional processing of information.
This study yielded a mix of significant and non-significant findings regarding the effects
of cognitive load and multimedia learning principles upon instructional efficiency and
meaningful learning. Most notably the results suggest that students learn best when the
instructional materials present them the opportunity to make rather than take meaning. This
finding is one of great importance because it purports that multimedia environments have the
potential of promoting meaningful e-learning by varying the degree of student interactivity
while considering specific characteristics of learners, such as level of expertise and learning
styles. However, future research is needed to investigate the aforementioned issues,
particularly the interactivity effect and level of knowledge.
164
Moreno, R., & Valdez, A. (2005). Cognitive load and learning effects of having students
organize pictures and words in multimedia environments: The role of student interactivity and
feedback. Educational Technology Research & Development, 53, 35-45.
165
IS THERE AN IDEAL GROUP SIZE?
PREPARING UNDERGRADUATES FOR SUCCESSFUL
ENTRY INTO THE ‘REAL WORLD’ OF BUSINESS
Carol Wright
Stephen F. Austin State University
C. Henry Dunn
Stephen F. Austin State University
ABSTRACT
Group work is a staple of college, but there are so many dynamics to consider. Using
both face-to-face and online courses at both lower-level and upper-level classes, this study will
illustrate students’ perceptions of group work and what they perceive as the ideal group size in
a college setting. Findings show that students prefer smaller groups, however this may not be
realistic in workplace settings.
INTRODUCTION
Whether it is called a group, team, task force, or committee, students must learn to
work together. Part of the learning experience in college is designed to help students make the
transition into a workforce that will require collaboration skills. Group work has been a
widely-used tactic for teaching concepts. According to Gottschall and Garcia-Bayonas,
“Group work is also considered by many instructors as a methodologically sound way of
utilizing class time and a robust technique for students to interact and learn from each other”
(p. 4). This is reinforced by the Association to Advance Collegiate Schools of Business
(AACSB), who encourages teamwork in its Standard 13 that states students should be involved
in the learning process through collaboration and cooperation. This can be assessed by
reviewing in-class group activities, both formal and informal (AACSB, 2012). This shows the
importance of students working in groups, and The National Survey of Student Engagement
(NSSE), reports that 49% of seniors in higher education work with other students during class
time and 61% of seniors work on projects with other students outside of class time (NSSE,
2012).
According to the AACSB, “Each student is a resource who brings unique experience
and knowledge to combined tasks. Students need to acknowledge their responsibilities to their
fellow students by actively participating in group learning experiences” (2012, p. 58).
Learning these skills is essential for the workforce, where collaborative skills are needed for
166
success. Companies use teamwork to meet goals, and textbook authors Gitman and McDaniel
(2002) state that “using a team-based structure can increase individual and group motivation
and performance” (p. 299).
With this focus on learning to work together, faculty members struggle finding the right
parameters to help students learn the valuable skills for their future careers. Group work is a
staple of college, but there are so many dynamics to consider. One aspect to consider is how
many students should be included in a team. Aggarwal and O’Brien (2008) contend that
reducing the size of the group will help with free-riding, and therefore improve the group
experience. In this case, reducing the number of members “will make it harder for social
loafers to hide behind the shield of anonymity provided by the larger group” (p. 262) and
making it easier to meet outside the classroom. Gentry (1980) used a simulation for his class
which found that larger groups caused more disagreement among members, but there did not
seem to be any difference in performance.
A quantitative study by Gottschall and Garcia-Bayonas (2012) found that students
majoring in Business Administration were more likely (54.5%) to have a negative attitude
toward group work than Education or Science majors. Respondents indicated that trying to
meet outside class time was the major obstacle in group work. Free-riding was more prevalent
in Education and Science majors.
Working in a business environment undoubtedly requires good team skills; however,
the above study shows that business students are unhappy with the process. If these negative
attitudes carry into the workforce, it can be detrimental for students. Working in groups can be
cumbersome for both instructors and students. Also, with the steady increase in enrollment in
institutions of higher education, but continued emphasis on budget cuts, many faculty members
are experiencing increased class sizes. These phenomena are expected to increase the
likelihood of more group projects in classrooms.
THE STUDY
In an unusual semester, Instructor A found that he had an unusually large class for his
upper-level business class. To balance the workload, he decided to increase his group sizes
upwards to eight students. He felt that the larger group sizes would help to divide the
workload into smaller units for the students and help with the grading process. In this
semester, he had two face-to-face classes and one fully-online course for a total enrollment of
221 students. The teams were randomly generated using the Groups tool with the learning
management system, Desire2Learn (D2L). These teams were then assigned a real-world
business case study in the textbook to analyze. The teams were structured to mimic real-world
self-managed work teams as closely as possible.
Self-managed work teams (SMWTs), also referred to as self-directed work teams, are
typically composed of 10-15 people given many of the responsibilities of their former
supervisors (Robbins, 1996). Similarly, Yeatts and Hyten (1998) state that SMWTs usually
consist of 5-15 people. Based on these sources, students can expect to work in larger groups
than they may have experienced in college. These SMWTs, which operate with a degree of
167
autonomy with minimal direction from their former supervisors, are responsible for their own
work scheduling, work approach methods, workload distribution, and performance monitoring
(Muthusamy, Wheeler & Simmons, 2005). This performance monitoring is reflected in the
peer reviews conducted by members of the team. The utilization of SMWTs by Fortune 1000
companies grew from 28% in 1987 to 72% by 1999 (Muthusamy, Wheeler & Simmons, 2005).
A significant amount of research surrounding the use and effectiveness of SMWTs has been
conducted over the years. Examination of recent research gives no indication of any
substantial change in the size, structure, autonomy, or use of SMWTs over the last 25 years.
Electronic communication tools, such as discussion boards, emails and chat rooms,
were created for each team within D2L. These tools were created to facilitate information
sharing outside the boundaries of face-to-face team meetings. While the project had specific
format guidelines regarding the finished product, latitude was given to the teams to formulate
their own project approach planning and workload distribution. At the conclusion of the
project each team member submitted peer evaluations of each of their team members,
evaluating those individuals’ performance and contributions throughout the project. These
evaluations were taken into consideration when assigning individual grades for the project.
Instructor A hypothesized that the larger group sizes of approximately eight students
would be better received by the students and yield a better product. The instructor did not
provide any type of team building lessons, but set the groups like a SMWT. Almost all of the
students were business majors, so it was assumed the students had a business communication
course that taught some aspects of teams.
Instructor B had normal-size classes in lower-level business communication classes that
had both business and non-business majors enrolled. She kept her group sizes at 3-4 students,
with most groups having four members. She felt that keeping the groups small would help the
students to coordinate their schedules and divide the work easier. In this semester, Instructor B
had three face-to-face classes with an enrollment of 94 students. Groups were assigned by a
mixed method: both self-selection and randomization. Students were allowed to pair up, then
pairs were “shuffled” to form a group of four. Upon group formation, each group was to
complete a written team agreement that specified how the work was to be divided and
established some group norms.
Communication tools were also created in D2L and discussed with classes, however it
was not required that students use the tools. In fact, few of the groups showed activity in these
tools. The group chose a research topic, completed individual research, wrote a summary
report, then presented their findings in an oral presentation. The project was broken into
smaller units with dedicated deadlines. This helped each group to divide the tasks, and
preliminary work was graded on an individual basis. At the end of the approximately four
week project, the groups submitted their findings in both written and oral forms as a team
grade. In addition, each group member evaluated other members for a small portion of the
individual’s grade.
Instructor B hypothesized that the smaller group sizes of four students would be better
received by students and avoid the problem of free-riders. Prior to beginning group activities,
the students learned background information about forming groups and group dynamics.
168
At the end of the semester, the students were given an eight question survey
administered through D2L. Students were asked about their general view of group work, how
large their group size was, what they thought the group sizes should be, and how they should
be evaluated. The survey ended with an open-ended question that allowed the students to
provide additional input if they chose. Students were given a small credit in their grades for
completing the survey. Overall, 79 students in Instructor A’s classes completed the survey for a
response rate of 35.7% and 78 students in Instructor B’s classes completed the survey for a
response rate of 83%.
THE RESULTS
Overall, both class groups had 58% of students indicate they had a generally positive
attitude toward group work. Only 22% stated having a negative attitude. Instructor A’s
classes, which are majority business students, had more indicate negative attitudes. These
results contradict the Gottschall and Garcia-Bayonas study previously cited which indicated
54.5% of business students having a negative attitude toward groups.
Only 44% of Instructor A’s classes indicated they thought their group was the right
size, whereas 73% of Instructor B’s classes said the same. Other responses indicated that
Instructor A’s classes were too large and that allowed for more free-riding (27%), created
difficulty dividing the work (15%), and caused problems with meeting outside class time
(13%). These results are show in Figure 1 below. In another question, 49% of these students
indicated that four members was the ideal group size.
Figure 1
Responses from All Classes to the Question:
Considering your group work for this class, what is your perception of the biggest issue related to the
number of people in your group?
Instructor A Instructor B All
Classes
My group size was just the right size.
35 44.3%
57 73.08% 58.60%
My group was too large and it was difficult to divide the work evenly.
12
15.19%
3
3.85%
9.55%
My group was too large and that caused more members to "free ride."
21
26.58%
5
6.41%
16.56%
My group was too large and that made it more difficult to reach
consensus.
10
12.66%
3
3.85%
8.28%
My group was too small which made all members work harder to
complete the work.
0
0%
4
5.13%
2.55%
My group was too small because it limited the amount of ideas and
talents brought to the project.
0
0%
5
6.41%
3.18%
My group was too small and that made it harder to divide the work
evenly.
1
1.27%
1
1.28%
1.27%
169
At first glance, it would appear that smaller group sizes are better for underclassmen.
However, a further analysis of the data shows that the class format may be a bigger indicator of
student satisfaction in group work. All classes that were surveyed, with the exception of one,
were traditional face-to-face courses. The two face-to-face classes indicated satisfaction with
their group size only 5% and 11% of the time. However, the one on-line course showed
different results: 28% of students felt the larger group size was just the right size. This detail
is shown in Figure 2 below.
Figure 2
Responses from Instructor A’s Classes to Question:
Considering your group work for this class, what is your perception of the biggest issue related to the
number of people in your group?
Face-to-Face
Face-to-Face
Online Class
Class 1
Class 2
My group size was just the right size.
4
5.06%
9
11.39%
22 27.85%
My group was too large and it was difficult to divide the
work evenly.
3
3.80%
5
6.33%
4
5.06%
My group was too large and that caused more members to
"free ride."
5
6.33%
7
8.86%
9
11.39%
My group was too large and that made it more difficult to
reach consensus.
1
1.26%
7
8.86%
2
2.53%
My group was too small which made all members work
harder to complete the work.
0
0%
0
0.00%
0
0.00%
My group was too small because it limited the amount of
ideas and talents brought to the project.
0
0%
0
0.00%
0
0.00%
My group was too small and that made it harder to divide
the work evenly.
1
1.26%
0
0.00%
0
0.00%
Because some students maintain a neutral or negative attitude toward group work, it is
important to understand some of the issues that cause problems. Overall, communication was
cited as the biggest obstacle to group work, with 42% of students reporting this problem. This
was followed by free-riding at 19%, procrastination at 17%, and dividing the task at 12%.
There was a larger disparity between classes. Instructor A’s class indicated that 61% of
students felt that communication was the biggest problem; a large majority. However,
Instructor B’s class only ranked it first 23% of the time, but this was balanced with other
factors almost equally problematic. This may be explained by the fact that more class time
was used to help students manage the project in smaller segments. These results can be seen in
Figure 3 below:
170
Figure 3
What do you see as the biggest obstacle in group work?
Instructor A Instructor B All Classes
Dividing the tasks.
1
1.27%
17 21.79% 11.46%
Communication among members.
48
60.76%
18
23.08%
42.04%
Too many trying to be the leader.
2
2.53%
6
7.69%
5.10%
Someone acting like a free rider.
17
21.52%
13
16.67%
19.11%
Personality conflicts.
2
2.53%
7
8.97%
5.73%
Procrastination.
9
11.39%
17
21.79%
16.56%
DISCUSSION
Survey responses seem to support the previous study by Gottschall and Garcia-Bayonas
(2008) that business students have a lower perception of group work. Also, the finding that
smaller group sizes are preferred reinforces Aggarwal and O’Brien (2008). However, smaller
group sizes may not be the norm for real-world business settings. If this is the case, groups in
college should increase group sizes to emulate this and expose students to the complexities of
working with more people.
One must further investigate to find what factors contribute to student success. In this
study, these dynamics differ for an online class. The face-to-face classes stated that 67% felt
their groups were too large for various reasons, compared to only 41% in the online class. The
class was somewhat split in that 44% of them said it was the right size.
The qualitative response to the last question on the survey may provide some insight.
Many student comments in the face-to-face class were about difficulty in scheduling out-ofclass meetings and the challenge of combining work (writing styles) from so many different
people. Comments from the online course also mentioned scheduling problems. Both classes
commented that “the way it was set up” made the larger groups work. These students may be
referring to the use of the online communication tools provided in D2L. The instructor
reinforced the idea that students should use this forum to communicate because it provided
documentation of activities for students and the instructor. The online students were probably
more likely to use this feature because the groups did not have the benefit of the face-to-face
class meetings. The increase of virtual team work in businesses reinforces the idea of
continuing to teach team skills in college. The online course resembles this trend of bringing
together workers who are geographically dispersed.
This study is limited in that it used student responses from only one semester.
Depending on specific student and course characteristics during that semester, the results may
171
not represent all cases of student group work. Further research that looks at more classes will
help with generalizability of results.
One student in the face to face class commented, “…any size group will work as long
as the members are willing to participate and work together.” One student in the online class
eloquently sums up the group experience, “Collaborating is an everyday setting now in the
corporate force work [sic]. As the economy is becoming more global, scholars such as
ourselves must learn to interact and constructively work together to combine our unique
personalities and backgrounds to create exemplary results. For two is better than one.”
REFERENCES
The Association to Advance Collegiate Schools of Business. (2012, January 31). Eligibility procedures and
accreditation
standards
for
business
accreditation.
Retrieved
from
http://www.aacsb.edu/accreditation/standards-busn-jan2012.pdf
Gentry, J. W. (1980). Group size and attitudes toward the simulation experience. Simulation Gaming, 11(4), 451460). doi: 10.1177/104687818001100405
Gitman, L. J., & McDaniel, C. (2002). The future of business [interactive edition]. Cincinnati, OH: SouthWestern College Publishing.
Gottschall, H., & Garcia-Bayonas, M. (2008). Student attitudes towards group work among undergraduates in
business administration, education and mathematics. Educational Research Quarterly, 32(1), 3-28).
Muthusamy, S. K., Wheeler, J. V., & Simmons, B. L. (2005). Self managing work teams: Enhancing
organizational innovativeness. Organization Development Journal, 23(3), 53-66.
National
Survey of Student Engagement.
http://nsse.iub.edu/html/annual_results.cfm
(2012).
Annual
results
2011.
Retrieved
from
Robbins, S. P. (1996). Organizational behavior: Concepts, controversies, applications. Englewood Cliffs, NJ:
Prentice-Hall.
Yeatts, D. E., & Hyten, C. (1998). High-performing self-managed work teams: A comparison of theory to
practice. Thousand Oaks, CA: Sage.
172
UNDERGRADUATE STUDENTS WRITING ABOUT
FINANCE: PREPARATION & ASSESSMENT
Timothy B. Michael
University of Houston-Clear Lake
Melissa A. Williams
University of Houston-Clear Lake
ABSTRACT
Over the past two years our department has developed writing assignments for the
undergraduate students in the “Contemporary Financial Institutions” course (an upperdivision major requirement). This was due to what we saw was the need to challenge their
writing and research abilities – we felt that some students were deficient in this area and
perhaps leaving our program without sufficient experience writing about our field.
Coincidentally, faculty felt that it would be a good idea to assess writing abilities within one of
our upper-level finance requirements rather than just through a common business core
curriculum. This paper discusses the basic need for writing, the challenges of preparing
students to write, the help they need during the process, and the evaluation of their processes
and products. In addition, we discuss the use of directed writing assignments for programlevel assessment.
Introduction
As with many things we do in our field, learning to write clearly and concisely about
finance requires practice, feedback and effort on the part of both the professor and the student.
Our students will be expected to communicate in an effective, written fashion once they are
done with school, and it is up to us to prepare them for writing technical documents involving
the concepts they will learn in our area. Many of our students come to us after one or two
years of mind-numbing objective exams and may even have trouble writing a 5-6 sentence
essay response on a quiz. Our earliest courses in the business curriculum must reawaken the
writing talents they had in high school and we must push them to write as often as we can to
keep their basic skills sharp and immediate.
Once they are comfortable with writing, they then must become comfortable writing
about business and finance, and this itself requires more practice and critical analysis from
everyone. Our students may not have the background or desire to write coherently about
business topics until their junior or senior years, but when they find that knowledge and
interest we must pounce on it and keep it flowing.
173
The payoff, both to the new graduate and us, can be tremendous. Students who can
learn to express themselves professionally will be better prepared to make the most of their
remaining curriculum, and will be more likely to score the jobs that they want to have. We
also argue that they may be more likely to continue into graduate school or scholarly pursuits
once they are confident about their writing.
This paper discusses my ongoing efforts to ask students to write in my undergraduate
banking course, FINC 4331. Not only did we give students a creative outlet and a great deal of
practice in writing, but we were able to use these assignments for writing assessment in our BS
Finance program.
Individual Writing Assignments
Starting in Spring 2009 we began requiring students in the Contemporary Financial
Institutions course to complete at least two individual writing assignments during the semester
over and above any group assignments. This course is an upper-division undergraduate course
that is required for all finance majors (or double majors). We also started asking most MBA
and MS Finance students in our Financial Policy course (Corporate Finance II) to write
individual assignments over and above their group project writing and presentation
responsibilities for the semester. Exams in each course have a significant (50% or more) shortanswer component, so writing in many of our finance courses is nothing new, but it's been a
few years since we required individual papers from most students.
For the graduate students, this started out of the concern that they weren't writing
enough as individuals during the class, especially our MS Finance students (or perhaps in their
program curriculum in general); for the undergraduates, we were worried about their ability to
structure arguments and find and record knowledge on their own. Both sets of assignments
have been successful, and the assignment from my banking course has subsequently been
integrated into our writing assessment for our BS Finance program.
Benefits
I have used group projects in my courses for many years, especially when working with
harder case studies or when asking for presentations of analyses from students. My MBA and
MS Finance students in Advanced Corporate Finance (FINC 5133) work in groups every
semester, analyzing and presenting directed and open-ended cases. However, I began to feel
that students, even my graduate students, weren't being asked to write enough in their own
voices. I found not only that some groups would have a free rider, occasionally, but that
groups would have their "writer" and their "presenter" and their "Excel person." Specialization
is expected, of course, and I've done it in collaborative work as well, but I felt that it was time
to push students into writing something that they could put their name on.
As much as anything, we wanted students to realize that writing was a big component
of "the real world," and it was important for their career prospects. We also wanted them to
have something they could show potential employers at the end of their studies - in the arts we
174
call that a 'portfolio.' That kind of thing has always been useful to job seekers, and we thought
that even our undergraduate students could benefit from that type of project.2
As mentioned above, we also wanted my students to find their own voices, and to
actually have a stake in writing about something, to take ownership of a topic or two in our
classes. In some cases that has ended up as opinions (backed by facts and sources), but in
many instances it has just been good reporting or a journey that they wanted to take in
researching a topic. We wanted to show them, and show ourselves and other faculty, that if
students found a topic that they actually cared about and understood they could write well and
easily. We wanted our undergraduate students to be able to count on their ability to write
about their field.
Thankfully, my students have been motivated, encouraging and highly successful in
these things.
Integrating Student Research
This is the type of assignment that we can use to encourage independent student
research and eventual collaboration. This is becoming more and more important at many
schools. In both our graduate and undergraduate finance courses we routinely emphasize the
importance and accessibility of 1) knowledge of current events from the business press, and 2)
the current state of academic research in financial economics. We consistently bring fresh
research results into the classroom so that students can see that research is important and
relevant. With the graduate courses, we also emphasize practical research results and
applications in an effort to frame the student’s understanding of business in a scientific context
– to avoid the “war stories” reputation that graduate business education has been trying to
outdistance over the past three generations. We have steadfastly refused to "just pass" students
through my courses without requiring them to understand some core concepts and the scientific
framework of modern business management. Having both sets of students write about finance
topics helps them see the benefit of a systematic approach to understanding the basic
phenomena of our field.
Finally, an unexpected benefit to adding these assignments is the "divisibility" that
these projects gives the grades for the semester; writing assignments mean that students have
the ability to demonstrate their knowledge away from a test, and this is very beneficial to those
who have extreme test anxiety or who don't do well on tests for whatever reason. It also means
that we risk having someone else write their paper for them, which is always a consideration.
Costs
Most of us can visualize the time commitment involved in giving and grading
individual writing assignments. To be effective, you must be ready to commit class time every
2
This is made more relevant in recent months because my 3-year-old daughter likes to bring things home to
show me what she did in preschool. There must be something innate about the phrase "look what I did!" in
human behavior.
175
week of the semester to at least mentioning (prodding about) different topics related to the
writing assignments: how to pick topics (even from a list), how to start writing (with an
outline), how to find sources, how to avoid plagiarism, proper formatting, etc. In our courses
we discuss some aspect of the writing of these assignments every week.
You must be willing to give students enough credit for their writing, compensating
them for their time in effect, and you must have enough slack in your course objectives for it.
We typically give students no more than 20 percent of their course credit from writing
assignments - in most semesters it has been only 15 percent total. Any less than that and they
might not take it seriously, and any more than that and they might be able to do well in the
class, grade-wise, without performing well on tests or other projects.
You must be willing to help them develop their outlines and topics, although not all
students will take advantage of that help. It is sometimes more, and sometimes fewer.
Addressing issues in class saves a lot of email and office face time later in the semester, so it
works well to make it a regular "housekeeping" item at the beginning of class to discuss
writing, every week. Usually we have provided a list of topics to choose from to the
undergraduates, and this seems to help a great deal.
“Scaffolding” is when we require preliminary pieces of the assignments to be turned in
at various points during the semester.3 This approach is probably the best way to both keep
students moving and prevent plagiarism, but it is also time intensive because each component
must be reviewed, commented upon and handed back. We haven’t implemented this approach
yet in all of our sections, but it seems to be the most needed in undergraduate classes, although
if you have graduate students who are unfamiliar with personal writing then it can help them a
great deal as well.
The time it takes to grade the assignments themselves, and perhaps to read drafts for
students who ask for it, can be extensive, but it is ultimately very satisfying. Students can
benefit a great deal from your detailed, written comments, and fewer and fewer faculty are
willing to give them feedback of this type. This type of assignment allows us to help students
learn something that we know they will value more and more as time goes on.
Plagiarism
Plagiarism is pervasive these days, and not just with undergraduate students either. For
the past several years one of the authors has volunteered to serve on our university’s Academic
Honesty Council, which is the body responsible for prosecuting plagiarism cases. In this time,
we have seen dozens of examples of academic dishonesty by students at all levels, and so we
were very sensitive to this issue when asking students to write more papers in class.
There are resources such as SafeAssign and TurnItIn that help faculty track sources in a
paper, but the best defense is a good offense here: show students that 1) penalties are swift and
extensive, and 2) plagiarism is unnecessary (because we expect them to be learning how to
3
For example, see “"Scaffolding the Writing Development of Undergraduate Literacy Education Students:
A Win-Win Solution" by Elizabeth Swaggerty (http://www.ecu.edu/cs-acad/writing/swaggerty2010.cfm) .
176
write, not to be perfect writers).4 In most cases that we have seen or adjudicated, a simple
Google search is enough to nail things down pretty well and find most cut-and-paste work.
Also, it may be a simple matter of explaining plagiarism to most students -- in the Information
Age, their understanding of "common knowledge" may be overdeveloped. For example,
faculty will have to point out that Wikipedia is not a source, ever, but only a starting point.
In the syllabus, as well as in a separate handout, faculty should point to the university's
formal plagiarism or academic honesty policy and the procedures that can be used to resolve
any trouble. Also, faculty should be sure to point out how they will resolve the issues if they
come up. Find out what your rights and responsibilities as a faculty member are - you may be
limited in how you can prosecute even an egregious plagiarist unless you configure your
syllabus correctly to start with. Documentation is the key to winning both grade appeals and
academic dishonesty cases.
For any suspected plagiarism or multiple submissions, document carefully what has
been turned in and when, trot out the language from your syllabus or catalog regarding
academic dishonesty and your penalties, and with these things prosecution is very
straightforward in most cases. It may help to find other faculty members who have been
through the process and talk it over with them for pointers, because each institution is,
unfortunately, different.
Supporting Documentation for Students
The authors have developed two handouts that we give students in our courses: one is a
general guide to writing and avoiding plagiarism and the other is a guide to help them choose
their individual topics for the semester. These are attached as Appendix II and Appendix III.
The "general" document (6 pages, Appendix II) has been through several revisions, but
it hasn't grown very much over the semesters. In that document we point out the meaning of
plagiarism, and give students some tips on how to write in an orderly fashion. We also provide
some general formatting and style ideas for those who may not have a lot of experience with
professional writing.
Most importantly, in the general document we provide students with a format for
documenting their sources that is independent of a formal style guide format (MLA, APA,
etc.). We have found over the years that students are often intimidated by the idea of using a
formal process, so we give them the reasoning behind documentation and ask them to make
sure that their technique, whatever they choose to use, follows the spirit of why we document
in the first place. We also stress that a great deal of documentation (in practice) is for their
future purposes as well as their readers'. By making the process simpler, and more universal,
and by having it make sense, students have been more likely to document correctly. Indeed,
4
Recent versions of the BlackBoard course management system incorporate SafeAssign into the options for
writing assignments and gives students the ability to submit drafts (and see how they're doing) and faculty the
ability to automate the process of checking for plagiarism. It is our understanding that TurnItIn provides a similar
service.
177
we have many students over-document their sources, but only a few so far have been in danger
of prosecution for plagiarism of official sources due to their writing assignments.5
The other document, also attached, is the "individual" component (2 pages). This
outlines some common pitfalls and gives a list of topics that students can choose from for their
assignments. We currently have two assignments per semester in the banking course. Unlike
the general document, this one gets revised quite a bit from one semester to the next.
Writing Assessment for BS Finance
For the undergraduate program, these writing assignments also allow us to measure the
writing skills of finance majors for program-level assessment. We have traditionally measured
writing abilities as part of our overall assessment program in the major, as shown in Table I.
However, because we had already implemented this writing project in FINC 4331, it allowed
us the opportunity to take an additional, major-specific measurement of the writing ability of
each of our finance majors or double majors.
Eventually, we hope to compare initial measurements from our earlier undergraduate
core writing course with our results measured closer to graduation.6 Having two measurements
will allow us to tweak the items that students might lose or forget over that time period.
Because of our assessment efforts, we were obligated to add (several years ago) a
statement to every syllabus in the School of Business informing students that they are being
measured. This statement is very simple, but it has the potential to generate a great deal of
discussion among students. Our school’s statement mirrors that of the university and the
university system, and it reads:
Statement on Assessment:
The School of Business may use assessment tools in this course and other courses
for curriculum evaluation. Educational Assessment is defined as the systematic collection,
interpretation, and use of information about student characteristics, educational
environments, learning outcomes and client satisfaction to improve program effectiveness,
student performance and professional success.
This assessment will be related to the learning objectives for each course and
individual student performance will be disaggregated relative to these objectives. This
disaggregated analysis will not impact student grades, but will provide faculty with
detailed information that will be used to improve courses, curriculum, and students’
performance.
BS Finance Learning Goals for Effective Written Communication Skills are listed in Appendix
I, along with the actual rubric (as originally developed for the entire degree and amended for
5
My most recent experience with an honor violation involved a student who cut-and-pasted the definition of the
Federal Reserve into an online exam. This was a graduate student taking the undergraduate course after being
approved for credit.
6
Because we have a large number of non-traditional students, there can be quite a delay between the semester
that they take their core writing class and their major courses.
178
BS Finance), results from several semesters, and our discussion of those results for reporting
purposes for a recent cycle.
The rubric shows the areas that we are assessing: Writing skills, including
organization, style/tone, and mechanics; Critical Thinking skills; and Research Literacy skills.
These translate into five items, each with five potential outcomes from 'inadequate' to
'excellent.' As evaluated in 2010-2011, and consistent with prior results, students tend to
struggle most with Research Skills and the actual Mechanics of writing. These results have
helped us decide what to emphasize when discussing this with students in class and in the
write-ups.
Writing Assessment for Online Courses
We have tried to keep these supporting material freestanding to avoid having to revise
them every semester. In addition, we have been able to use them effectively in the Web-only
course without modification. For the Web courses we have also recorded several podcasts
specifically discussing the handouts and writing assignments, and we can incorporate any
classroom discussions and questions about the writing assignments into the regular weekly
podcasts for the courses.
Table I
University of Houston-Clear Lake
Learning Outcomes and Assessment for BS Degrees
B.B.A and B.S. Degree Learning Outcomes
Courses Responsible
for Assessment
Our students will be effective written communicators.
WRIT 3132 (may look at
other courses to see
where this may be
assessed)
ISAM 3033 (may look at
other courses to see
where this may be
assessed)
MGMT 3031 (may look
at other courses to see
where this may be
assessed)
Our students will have technical competence
Our students will possess ethical awareness.
Our students will possess a common body of business knowledge.
Initially, we used an exam that we called the CBK (common body of knowledge)
exam which had 6 questions from each of the courses listed to the right. This exam
was given the first week of the strategic management class. The results from that
exam were poor. So we have decided to push the assessment of the common body of
business knowledge back to those 8 undergraduate core classes.
179
FINC 3331
ECON 3131
MKTG 3031
MGMT 4534
MGMT 3031
ACCT 3331
DSCI 3231
DSCI 3131
Conclusion
As academics, most of us can appreciate the value of being able to write clearly and
concisely, and we hope that we can remember what it was like to struggle with our writing, our
research, and the writing process. Writing requires a structured thought process, it requires
order, and knowledge. Our students can benefit a great deal from our help in this area, just as
we benefitted from our mentors and peers, and from practice. Once they become comfortable
with their own writing, and once they are convinced that their opinions can be structured,
valuable and supported by research, we can ask them more complicated questions and demand
a higher level of understanding and they will respond – we have seen it over the past few years.
Certainly, it is a time-consuming process for all, but worth it. We argue here that we can help
them improve their professional skills and thought processes and simultaneously use individual
writing assignments to assess their personal progress and growth in their programs of study.
180
APPENDIX I
B.S. in Finance Learning Goals
Effective Written Communication Skills
Objective:
Students will successfully complete a (technical) writing project in which they demonstrate
writing skills, interpretation of research and background data, critical thinking, and logical
argument.
Measures:
Students will be graded from a rubric (attached) in 5 specific areas:
 Organization
 Style/Tone
 Mechanics
 Critical Thinking Skills
 Research Literacy Skills
A committee of two or more full-time faculty members in finance will select the categories and
emphasis for this rubric, with input from the entire department over time.
Scoring:
Each area is evaluated between 1 and 5 points, where
1.
2.
3.
4.
5.
Inadequate
Adequate
Good
Very Good
Excellent.
Criteria for Evaluation:
Mastery
20-25 points (average > 4)
Competent
15-19 points (average > 3)
Deficient
Less than 15 points (average < 3)
Seventy percent of students are expected to score at the Mastery or Competent levels.
Schedule for Administration:
Two similar, graded writing assignments will be collected at least once per academic year in
Contemporary Financial Institutions (FINC 4331). The second assignment will be used to
complete the rubric for each student. As implemented in Spring 2010, this aspect of the class
involves 7 contact hours throughout the semester (approximately 30 minutes per class session
181
over 14 weeks). For the online component, the Writing Assignments are described via handout
and podcast.
Notes:
The original School of Business assessment at the core level (2007) used one additional
measure: Ability to Write with Visual Aids. This has been deleted as noted below.
Assessment Rubric for FINC 4331
[adapted from WRIT 3132 (School of Business) 2007 rubric]
All categories are rated using a scale of 1-5:
1 = inadequate
2 = adequate
3 = good
4 = very good
5 = excellent
Writing Skills:
Organization: Does the writer follow an organizational format (direct/indirect) appropriate
for the writer’s purpose and audience? Is the purpose clearly stated? Do paragraphs contain
topic sentences that clearly support the purpose? Are the paragraphs unified and cohesive?
Style/Tone: Is the paper free of redundancies, clichés, and trite business language? Does the
writer choose language that is appropriate for a business environment (free of non-specific
language, colloquialisms, non-standard English)? Is the tone respectful and supportive of the
writer’s purpose?
Mechanics: To what extent are grammar, spelling, and punctuation correct throughout the
paper?
Critical Thinking Skills:
How well do the student’s conclusions fit the data he or she presents?
recommendations consistent with the interpretations?
Are the
Research Literacy Skills:
How credible are the sources the student selected for the report? Did the student include a
variety of sources? Did the student correctly cite the sources?
[Note: The remaining original measure is not appropriate for this assignment, so it was not
measured in FINC 4331.]
182
Ability to Write with Visual Aids:
Did the student choose meaningful data that supports an important point in the paper? Did the
student choose a visual aid that fits the selected data set? Did the student clearly and correctly
present the data? Did the student interpret the data in the text?
FINC 4331: Assessment of Writing Assignment
Student: ___________________________
Major: _________________
Student Number: ____________________
A. Writing Skills: Organization
1.
inadequate
2.
adequate
3.
good
4.
very good
5.
excellent
B. Writing Skills: Style/Tone
1.
inadequate
2.
adequate
3.
good
4.
very good
5.
excellent
C. Writing Skills: Mechanics
1.
inadequate
2.
adequate
3.
good
4.
very good
5.
excellent
D. Critical Thinking Skills
1.
inadequate
2.
adequate
3.
good
4.
very good
5.
excellent
E. Research Literacy Skills
1.
inadequate
183
2.
3.
4.
5.
adequate
good
very good
excellent
F. Ability to Convey Business Information Through Visual Aids
1.
inadequate
2.
adequate
3.
good
4.
very good
5.
excellent
184
B.S. in Finance Assurance of Learning
2010-2011 School Year
Effective Written Communication Skills
(Administered in FINC 4331, both Face-to-Face and Web-Only)
Term
Mastery
Competent
Deficient
Spring 2010*
2/26
13/26
11/26
N = 26
(7.69%)
(50.0%)
(42.3%)
Fall 2010
10/32
19/32
3/32
N = 32
(31.3%)
(59.4%)
(9.4%)
Spring 2011
3/28
14/28
5/28
N = 28
(10.7%)
(71.4%)
(17.9%)
185
Analysis By Measure
Spring 2010*
Fall 2010
Spring 2011
Measure
Average
Average
Average
ORG
3.19
3.31
3.39
STYLE
3.27
3.41
3.39
MECH
2.92
3.66
3.18
CRIT
3.27
3.88
3.61
RES
2.77
3.72
3.64
[* For comparison purposes.]
Discussion of Assessment Results
2010-2011
As mentioned above, this assignment required approximately 7 contact hours over the semester
in the face-to-face class. Students were given extensive guidance in the writing process, on
avoiding plagiarism, documentation of source material, and other aspects of written
communication in a business environment.
The topic choices provided by the instructor made the assignment congruent with the course
material for the semester; otherwise, this assessment exercise would not be appropriate for the
FINC 4331 course.
In general, students seemed willing to put forth some effort for these assignments, and seemed
to be interested. A few complained that they weren’t required to write papers in many other
courses, and so this was burdensome for them. Giving students a range of topics to select from
was critical in getting their “buy-in” for this assignment.
We saw a slight increase in "Deficient" in the second semester, but overall students were
"Competent" or better. By measure, the scores seem to be improving, with dramatic
186
improvement in the "Research Literacy" area, consistent with the increased effort to help
students identify acceptable sources.
As was the case in 2009-2010, it is the administering faculty's opinion that there should be
more emphasis on what constitutes “acceptable” research source material (in the age of the
Internet), documentation of the ideas of others, organization/planning and some components of
style/tone (jargon, for instance). Students scored well on Critical Thinking and Style,
generally, and the areas of improvement are those for which the most questions were generated
during class discussion or via correspondence. This interpretation and course of action is
consistent with the numbers above.
Online Assessment:
The results of the assessments from the Web-Only sections of this course are integrated into
the numbers above. In general, the results of the Web-Only students were slightly lower than
the numbers from the face-to-face students -- this may be due to the amount of time spent
answering questions on these assignments in class versus in an online environment; during the
semester, there were very few discussion board posts or email questions from online students
regarding the two writing assignments for the semester.
Recommendation:
It is the lead instructor's recommendation that we continue to discuss this in class and give
students resources to help them become better writers. Although our results are encouraging,
the quality of the papers could certainly improve, especially in the area of "Mechanics." Given
the large of number of students in our sections who have English as a second language, it is
becoming more obvious that they need examples and encouragement over and above what
traditional students would need. In addition, the students in this class are being encouraged to
seek help from the instructor, individually, and at the UHCL Writing Center, and this will be a
bigger emphasis in the future.
187
APPENDIX II
GENERAL DIRECTIONS & COMMENTS FOR ALL WRITING ASSIGNMENTS
This document is considered to be part of the syllabus for any class I teach, therefore you
should read it very carefully before working on your writing assignments
I. CITATION PURPOSE AND FORMAT
The hardest part of any non-fiction writing is the documentation of sources, but without
sources you might as well be writing a blog. In some cases (especially in the working world,
and especially when you’re starting out) your audience won’t care what your opinion is, but
they will care where you got your information and they will want to be able to go back and
read what you read on the way to your conclusions (your source material).
WHAT IS PLAGIARISM?
From an academic standpoint, writing down what someone else said and passing it off as your
own is called “plagiarism.” That includes many things, but we’ll keep it simple here: if you
use more than four of the same words as a source author uses without quotation marks
and a page number reference, you’re stealing, and that's plagiarism. Also, if you use
someone else’s idea without a reference to who thought of it and which article it’s from,
it’s plagiarism.
You don’t need to steal ideas to effectively present, use and discuss them, so please don’t
lower yourself to that standard. Ignorance is no excuse – you are bound by the UHCL Student
Handbook to understand this stuff. Plus, you can always ask your professor to clarify things
for you.
NOTE: IF YOUR PAPER IS TURNED IN WITHOUT PROPER DOCUMENTATION IN
THE FORM OF QUOTATIONS AND CITATIONS YOU WILL BE CHARGED WITH
PLAGIARISM. You will not have an opportunity to take it back and "fix" it once you've
turned it in. Should you want to ask for clarification of what you "should do" about references,
you'll need to do that BEFORE you turn it in, and well before any deadline for the assignment.
On the date that it is due, anything you turn in will be considered to be the final assignment,
and any lack of documentation will be charged as plagiarism. Even your “rough draft” should
contain properly-documented references.
If you turn in someone else's work, I will contact you to start the hearing process. In addition,
you will receive a grade of “F” on any assignment that has plagiarism in it, including tests. I
also will assign a course grade of “F” if I catch you plagiarizing or cheating in my class,
188
regardless of your other grades. You will have the opportunity to appeal my grade before the
Academic Honesty Council of the university.
If you’re not sure about plagiarism, you can always take advantage of UHCL’s Writing
Center. They can even answer questions online, and I think they’ll proofread papers for you
and help you fine-tune the writing process. There’s no excuse for turning in a plagiarized
document.
DIRECTIONS FOR CITING SOURCES
For purposes of effectiveness you can always use an established reference format: MLA,
APA, etc. You may have used these in other classes. At a minimum, however, you need to
make sure that your reference format includes the following (for your protection AND mine).
Step 1. Create a full list of everything you read in the preparation of your report or essay, put it
at the end of the paper, and title it "Bibliography" at the top of the page. This list should
include all papers, articles, books & interviews that you read for your paper, even those
that you didn’t directly quote or paraphrase in your writing. The format for this “bibliography”
needs to include sufficient information to allow your reader to go find the item you read, such
as names of all authors, full title of the work, date of publication, publisher (for books), volume
number, issue number, pages of the work, etc. Even if you only read something for
background, you should list it here so that your readers know where you’re coming from.
I realize that several citation formats don’t support this, asking only that you cite what you
quote or paraphrase. My method, however, works best in practice. It also makes it easier on
you if someone wants you to go back and do more work later on the same topic.
WHAT'S AN ACCEPTABLE SOURCE?
First, your source must be credible. For example, the fact that Lady Gaga has millions of
followers on Twitter is meaningless - it means she's qualified to comment on having millions
of followers on Twitter, and nothing else. You should start looking for sources with
recognized credible sources that fit the topic. For economy or business, it should be Financial
Times, The Economist, Wall Street Journal, and BusinessWeek. Forbes, Fortune, etc. also
count. For company information, start with the company itself via its 10-K filings online.
Wikipedia is NEVER a valid source, although it might point you in the right direction (via the
"References" part). Wikipedia can be edited by anyone, any time. Recognize that all sources
are biased - that's the point of writing, to inform someone or persuade them. Choosing how
and what and when to report is a function of one's biases. Blogs aren't valuable sources unless
the person writing it has some credibility in the field in question. The Internet has taught us
189
that EVERYONE has an opinion, and unfortunately most of the opinions on the Internet are
worthless because the writer has neither knowledge nor a reputation that they've put at stake.
Step 2. Once you have your bibliography together, make sure you use either a numbered note
system for references (where you number each citation when it happens and then create a
separate reference list of “endnotes”) or you can cite in the document with some unique
reference marker such as (Michael, 2004a, page 23) at the end of the relevant sentence. Again,
if you use more than four of somebody else’s words, you have to cite at the end of that
sentence, with no exceptions. You can either use a note marker such as I’ve done here, or do
what I did inside parentheses.1 If you just choose to use a numbering system, then you'll need
to create a list of endnotes on a page at the end of your document that you can use to cite page
numbers in an appropriate way. With the bibliography already done in advance, the endnote
page is simple. You can always use footnotes if you'd like to.
Step 3. A recent copy of the APA or MLA style guides have examples of how to cite different
types of work (books, magazines, journals, Web sites, etc.) Remember, the most important
thing is traceability – can I find your source with the information you’ve given me in the
bibliography? Can I find your quote? If neither of these is true, even the “correct” format
doesn’t get the job done.
Step 4. Citation Summary and Checklist: At a minimum



when you start doing research for the assignment, make a list of all of your sources, get
their full information, and keep them ordered them by the last name of your first author
every time you use something from each of these, either
o put quotations and then cite the author, year, and page number at the end of the
sentence, or
o number the quote and put it in a list of endnotes.
o for paraphrased ideas or expositions, use a parenthetical or a note as soon as you
use someone else's idea.
put a bibliography section and a notes section at the end of your document. Make sure that
each contains enough information for a reader to be able to find the exact reference source
easily.7
II. THE WRITING PROCESS
I suggest that you start with a thesis or topic, make an outline that you think you'll use, and
then start finding and reading sources. As soon as you start reading, you're going to want to
revise your outline, but that's normal. Also, you're going to want to keep notes of 1) what
7
Use an established method if you want to, but make sure I can follow your path if I need to. That’s the most
important thing.
190
sources you're using (even if you don't quote them or paraphrase them), and 2) what info and
ideas you found in each one.
Before you start researching: Think about using note cards or Excel to keep up with your
sources and the ideas that you take from each of them. Sometimes the old ways are still the
best ways. If you want to get high-tech, there are programs out there that will help you
organize your thought process. Believe it or not, 3x5 note cards are still useful for this
purpose. One reference, idea or fact per card.8
I've always found that writing each bibliographic source on its own notecard helps you to make
and use your reference list along the way.
You'll want to revise your outline, as I mentioned, as you write, but the outline will help you
make progress. Don't neglect it -- even if you're saying "I never needed that in high school"
you'll need it in your professional writing because projects are just too big for off-the-cuff
exposition. Practice using an outline and it will pay off later.
Another thing: write to your audience. An exception can be made if you want to make sure
that anyone can pick up your piece and read it, but usually the more carefully you target
something the better. Plus, if you keep all your sources handy you can go back and reframe
your work easily for others' to read. Thinking about something from the audience's perspective
should help you develop your thesis and outline.
Have an introduction, body and conclusion, and plan for documentation (and worksheets if
appropriate) in a table or appendix format at the end of the paper. Make sure you actually
write to fit the assignment, and if it isn't clear what the professor (or your boss) wants, go and
ask. And ask again. And keep asking until it's clear. Take notes while you’re asking. Same
with documentation of sources: if you're unsure, ask the professor about formatting, etc. Or
just note something just in case.
Believe me, it’s much better to ask enough to get the assignment clarified than to do weeks or
months of work only to find out that it’s opposite of what they wanted. That gives “live and
learn” a new meaning.
III. PRESENTATION FORMAT AND DISTRIBUTION
Finally, in professional writing, most readers will prefer that you turn in a one-sided, doublespaced document (with page numbers) that is stapled in the top left corner. Leaving out page
8
I still think note cards are better than a PC, because you don’t need battery power. If you figure out a better,
more portable, less error-prone method, please share it with me in an email sometime. Scrivener (software for
Mac & Windows) comes very close I think - it's a computerized corkboard for "notecards." EndNote and Zotero
(both platforms) can do the same thing for references.
191
numbers is a big no-no. Also, those slide-on plastic binders that people use just get in the way.
A single staple allows for easy page-turning, and one-sided, double-spaced allows for the easy
writing of comments. If your document has a lot of sections or different arguments within it,
make sure you have a table of contents (this doesn’t apply to anything less than about 5-6
pages, unless you just want to). If you have a good number of attachments, you might want to
have a list of those at the beginning of your document.
Remember, if a professor gives you a “recommended” number of pages, it usually doesn’t
include the cover or any table of contents, or reference pages. Those are extra.
Edit your document carefully for white space. This is a big problem with some student writers.
Actually print it out and look at it before turning it in (even via email).
Use full justification if you can, because it is less distracting to your reader.9
Other big problems are typos and spelling errors. You should assume that your audience is
actually going to read your work, and you should read it first. Proofreading EVERYTHING
YOU DO, as a habit, is a great way to get your work noticed by your bosses and professors. It
will set you apart from many of your peers (or competitors).
Finally, if you want to make things more durable (for discussion or distribution to those outside
your unit)10 you can use a plastic comb binder (so the document will open and lie flat on the
desk) with Mylar or cardstock covers. For really big docs people use 3-ring-binders
effectively, and cardstock numbered tabs make a good way to separate sections and/or
appendices or add-ons. It also makes it easier to add or update attachments if it is a "working
document." This binder approach is overkill for anything less than about 30 pages total.
In summary







double-spaced if comments or notes are expected from your reader (they usually are)
absolutely must have page numbers on every page but the cover & table of contents
absolutely must have all titles, names and a date on the cover
one-inch margins, 12-point font11; use Times Roman or something similar
full justification unless told not to
single-sided paper
stapled in top left corner
9
Especially if that reader is me.
Or to show to your parents so they’ll think you’re actually learning something in school. This works, trust me.
11
Unless it's a bunch of poetry; if it’s poetry you can do whatever you want to. Of course, your reader may not
LIKE poetry, so this is risky. For business reports, don’t get happy with font and margin sizes, and don’t use lots
of different fonts in a document. That’s called the "ransom note" effect.
10
192
o unless it's for wide distribution or needs to be durable; in that case use Mylar or
cardstock covers and a comb or 3-ring binder, with cardstock tabs to index or
separate sections
RESOURCES
The UHCL Writing Center has a lot of resources online.
Neumann Library has some as well. The can be found here
http://libguides.uhcl.edu/FINC or http://libguides.uhcl.edu/MGMT
Plagiarism is discussed on the library’s “Citing & Writing Help” tab at that link.
I have found online a working paper by Matthew O. Jackson entitled “Notes on Presenting a
Paper” (http://www.stanford.edu/~jacksonm/present.pdf) that will help you understand
citations in context.
I will also recommend a writing handbook such as “The Longman Handbook for Writers and
Readers” by Anson and Schwegler, Longman Publishing. (ISBN-10 0-205-74195-9, print
version). http://www.coursesmart.com/9780205794331/part01
The APA, Chicago or MLA style guides also contain a lot of good examples if you’re
struggling with citations. You can find more info about this at the Neumann Library site.
Also, you might be able to find an older edition of the APA or other guide at a used bookstore
for cheap.
"Writing a journal article summary" at www.donnavandergrift.com/WritingSummary.htm .
(3 pages)
"How to Read a Scientific Research Paper -- A four-step guide" located at
http://www.hampshire.edu/~apmNS/design/RESOURCES/HOW_READ.html , including the
"Teacher's Guide…" by Ann McNeal. (6 pages total)
"Summarizing a Scholarly Journal Article." online at www.ufv.ca/writing_centre (3 pages)
"Critiquing a journal article" (which is a related subject) can also be found there
"Writing a journal article review" found at https://academicskills.anu.edu.au (2 pages)
193
APPENDIX III
FINC 4331, Contemporary Financial Institutions: Individual Writing Assignments (2
pages)
BEFORE YOU DO ANYTHING ELSE ON THESE ASSIGNMENTS please read and
make sure you understand the document entitled "General Directions & Comments for all
Writing Assignments" which is on BlackBoard under “Writing Assignments.” That document
contains instructions and guidelines that you need to follow for completing these assignments.
Because of its remarkable and invaluable content, that document is incorporated herein by
reference as an important part of the assignment and part of the syllabus, too. In particular,
you must read and understand its comments on plagiarism as well as the plagiarism language
in the current UHCL Student Handbook and the official catalog.
Writing Assignment #1
Please write 8-10 pages (double-spaced) on one of the topics listed below. Please use at least
10 "real" sources for your paper (newspaper or magazine articles, including those duplicated
online, count -- reporter blogs do not count; Wikipedia doesn't count - ever - it's a starting
place only) and be sure to document them properly. Opinion pieces are OK as references if the
writers are actual experts, not just some blogger-type pundit.
You must also turn in a printed copy of these assignments at the beginning of class on the
date they are due. If you come to class late that day, or if you fail to turn it in at the beginning
of class, the paper will be considered “late” and may be subject to a late penalty of up to one
letter grade.
You should send a copy in *.doc or *.docx format to the instructor’s email address before
the due date in the Course Schedule. I will add the emailed copy to my electronic database of
student papers in SafeAssign, and I will use SafeAssign to screen for plagiarism. I will not
grade your paper unless I have an electronic version, and you will receive a zero for your grade
in that case.
Working Together
You can work with other folks on this project, but you must all have different topics (both
times) and you must turn in only your own work. I will treat any common writing on any of
these assignments as plagiarism, and I will prosecute everybody involved. Anything more
than four words is "common writing" unless you have a documented source (which has to be
cited anyway), and if your paper consists of only a bunch of quotes strung together, you'll get a
low grade. You must do and turn in only your own work on every assignment in this class.
PLEASE NOTE: Any questions about plagiarism should be addressed to me BEFORE you
turn in the assignment. "I was planning to ask you about that" will not be an acceptable
194
excuse, and I will prosecute what I think is plagiarism. If you make a “mistake” and turn in a
“rough draft” without references, I will STILL prosecute you for plagiarism. Even rough
drafts have to have references, and when they don’t it’s a violation.
Acceptable Topics

economic and political causes of the 2008 financial collapse

economic effects of proposed government solutions for "underwater" mortgages

predatory lending practices by mortgage banks and their economic effects

predatory lending practices by "subprime" consumer lenders and their economic effects

the growth & history of the subprime consumer lending industry (payday loans, title
loans, etc.)

provisions of the Dodd/Frank Act and its expected consequences for the banking
industry

solutions for the Freddie/Fannie problem going forward

the Community Reinvestment Act and its relationship to subprime mortgage lending*

impact of the subprime mortgage lending crisis on consumer finance*

the impact of the subprime lending crisis on consumer mortgage availability*

proposed government changes to regulations on management compensation at financial
institutions and their expected effects

the recent history of bonus compensation in the financial services industry (on "Wall
Street"), before and after the crisis

the effect of Sarbanes-Oxley on the banking and/or financial services industries

the importance of fair value accounting and its role in bank reforms
NOTE: You must choose from this list for your writing assignment topic. You cannot make up
your own topic. If you do not use a topic from this list for your writing assignment, you will
receive a grade of zero on your writing assignment, with no exceptions.
Also, for some topics your references may include Kindleberger & Aliber book (5th edition or
later). Chapters 8-11 (5th) are especially useful in understanding the current crisis with some
historical perspective. Other chapters may be useful -- you should see what you can find in
there. Chapter 9 (5th) is about fraud following a financial bubble, so it should be fun to read.
Writing Assignment #2
For Writing Assignment #2, I will expect you to choose a different and unrelated topic from
the list given above and follow the directions for Writing Assignment #1.
195
Grading
Your grade will be determined by how well you cover the topic, but I will also take off points
for grammar problems and awkward construction. Be sure to have someone proofread your
paper several times before you turn it in. You should also pay attention to five separate aspects
of the paper that I will grade and assess

Writing Skills: Organization: Did you use an outline? Does the paper flow logically
from one idea to another?

Writing Skills: Style/Tone: Is it written in a formal fashion? Does it use jargon and/or
first-person pronouns? Does it read like someone’s blog?

Writing Skills: Mechanics: Are the sentences complete? Are there lots of
proofreading errors?

Critical Thinking Skills: Do you understand the key aspects of the topic? Did you take
time to find out different opinions/facts regarding the topic?

Research Literacy Skills: Do you use enough sources, relevant sources, different
sources (instead of just a few)? Do you use sources that are questionable or off-topic?
All of these aspects were emphasized in your Business Communications course, so you should
be somewhat familiar with what they mean.
I will not grade papers on formatting, specifically, but they should meet the following
minimums:

one-inch margins all around

12-point font

title page with your title, name, course and date

page numbers

list of references in a proper reference format, and

other things mentioned in the "GENERAL DIRECTIONS…" document online.
I will grade your paper and give it back with some comments that explain why you lost points.
My comments may be specific or general in nature, but I am always willing to discuss grading
once you've gotten your paper back and reviewed my comments thoroughly.
196
NEW METHODS TO TEACH INFORMATION
SYSTEM DEVELOPMENT
Vance Etnyre
University of Houston – Clear Lake
ABSTRACT
Case studies have been used for decades in the teaching of information system
development. Since information system development is almost always a team effort, teamwork
strategies and team processes have been used in conjunction with information system
development cases to make learning information system development a realistic and efficient
endeavor. Etnyre [2011] described the use of multi-semester cases to extend the amount of
time available for programming and testing in a complex development situation.
The platform used to develop the project has an enormous effect on the level and
quality of learning that goes on. When a specific environment is used with established rules
and standards, students learn to follow the rules and standards in their efforts to develop a
system. Although following rules and standards is a positive thing, it is possible to do far
better in a systems development course. Developing the best set of rules and standards forces
the developer to examine possible alternatives, screen out those which would prove infeasible
or impractical and apply a decision-making strategy to determine the best set of alternatives.
Devising and applying the processes used to determine the best set of rules and standards
teaches students far more than they could learn by simply following an existing set.
One difficulty in forcing students to develop the rules and standards they will use is the
time it takes to do the job well is significant compared to the duration of a semester. If you add
the time required to complete the investigation and system analysis phases to the time it takes
to create rules and standards for developing the system, you have a substantial amount of time
relative to the duration of a semester. Doing these tasks sequentially would leave a small
amount of time remaining in the semester for detailed design, programming, testing and
implementation of the developed system. One useful approach requires each student to
simultaneously serve on an application development team and standards development group.
This approach can be used to reduce overall development time and still allow students to
benefit from the useful process of determining the best set of rules and standards for a
particular development project.
A process which has used this approach for several semesters at University of Houston
– Clear Lake will be discussed and demonstrated in this paper.
197
AN ANALYSIS OF BUSINESS CHARACTERISTICS
THROUGH GEOCACHING
Kevin Thomas Groth
Wartburg College
ABSTRACT
Geocaching is a free outdoor treasure hunting game where participants search for
concealed containers called geocaches by using a Smartphone or GPS. Various concepts of
geocaching are then explained to develop a better understanding of the activity. This paper
answers the question of whether positive and negative aspects of ethics, problem solving, and
teambuilding can be shown through geocaching and applied to business. Aspects discussed in
ethics include analyzing how the Geocachers’ Creed is similar to a establishing a code of
ethics in a business and the many different ways in which the Geocachers’ Creed can be
applied to business. Aspects discussed in problem solving include various effective methods of
solving a problem in business and how these effective methods can be used in geocaching.
Ineffective problem solving skills are also mentioned and ways in which these skills can be
avoided are also discussed. Aspects discussed in teambuilding include various ways in which
to develop a more effective and efficient team in business and how it can be applied to
geocaching. An analysis of negative teambuilding skills is also presented. From the evidence it
can be concluded that geocaching can effectively strengthen ethics, teambuilding, and problem
solving. Geocaching should be implemented in businesses because it strengthens ethics,
problem solving, and teambuilding and also can potentially strengthen many other business
related characteristics.
INTRODUCTION
What activity encompasses the entire world and can entertain for a lifetime? There
aren’t many activities that fit this description. However, geocaching fits this description very
well. Many people have never heard of geocaching. Geocaching is a free worldwide treasure
hunting game where participants go outside and try to find hidden containers called geocaches
by using a Smartphone or GPS. They can then share their experiences on geocaching.com
(“Geocaching,” 2012). “Currently, there are over 5 million geocachers worldwide and there are
1,934,791 active geocaches, located in more than 150 countries including Vatican City!”
(“Geocaching,” 2012 and “Hide and Seek a Cache,” 2012). The number of active geocaches
continues to grow as people place more and more geocaches. The locations of geocaches range
from Antarctica to the International Space Station (“Hide & Seek a Cache,” 2012). If one
198
started geocaching when they were 25, lived to be 100, and found one geocache a day, it would
take them over 5,300 years to find all of them. Geocaching is an activity that can be enjoyed by
all, helps to promote the outdoors, and also helps to promote physical activity.
In addition, geocaching can potentially offer those in a business setting opportunities to
develop and strengthen certain characteristics and apply those characteristics to business. There
are many characteristics that geocaching can possibly develop and strengthen. Some of these
characteristics include problem solving, teambuilding, goal setting, strategic planning, ethics,
leadership, camaraderie, observational acuity, and communication. What positive and negative
aspects of ethics, problem solving, and teambuilding can be shown through geocaching and
applied to business? This paper will address this question by providing evidence as to how
geocaching can affect the way in which each of these three characteristics can be applied to
business through an analysis of the positives and negatives of each characteristic. The scope of
this paper will be limited to these three characteristics since they relate the most similarities
between business and geocaching.
Since there is minimal scholarly evidence about geocaching, the majority of the
evidence will reveal how these three characteristics relate to business processes. This evidence
will then be connected with geocaching in order to determine if these three characteristics have
been effectively strengthened and developed through geocaching. The basics of geocaching
and the purpose of geocaching will first be discussed to develop an understanding of
geocaching. Then positive and negative aspects of ethics, problem solving, and teambuilding
through geocaching will be analyzed. A determination will be made as to whether each of the
three characteristics can be strengthened and developed through geocaching and effectively
applied to business.
The best way to understand geocaching is to physically participate in the activity, but since this
is not possible, a brief explanation of how to participate will suffice.
BACKGROUND OF GEOCACHING
The first step while participating in geocaching is to visit the geocaching.com website.
One can easily search for geocaches by entering the appropriate address or zip code and mile
radius. A listing of geocaches within the specified mile radius of the address or zip code will
appear (“Hide & Seek a Cache,” 2012). Users should simply click on the geocache they want
to find and record the coordinates provided. There are hints provided in case the geocache
cannot be found (“Search for Geocaches,” 2012).
The next step is to obtain a GPS or Smartphone and enter the coordinates in for the
cache. One should then travel to the geocache, park in a safe area, and begin searching. It may
seem like it would be too simple to find a geocache but GPS’ and Smartphone’s aren’t always
accurate and geocaches vary greatly in size. Geocaches range in size from micro caches, which
are less than one inch in diameter (about the same size as a dime but thicker), to regular size
caches, which are ammo boxes (“Geocache Details,” 2012). Geocaches can be placed
199
anywhere. However, if they are placed on private property the owner must approve of the
placement. Searches may take several minutes or several hours depending on the size of the
geocache and its location.
In addition, there are over a dozen different types of geocaches. Some of the more
common types include traditional, multicache, event caches, wherigo caches, virtual caches,
and mystery caches (“Geocache Types,” 2012). Traditional geocaches only require the
geocacher to search for the geocache at the posted coordinates. Multicaches involve the
geocacher going to multiple waypoints, or locations, that lead them to the cache. For event
caches, geocachers are given the coordinates to a certain place, such as a park, where
geocachers get the opportunity to socialize with other geocachers (Daggett, 2006). Wherigo
caches require the geocacher to participate in a quest to find the final coordinates of where the
geocache is located by following the instructions contained in a cartridge which can be found
online. (“Geocache Types,” 2012). Virtual caches don’t lead geocachers to a geocache, but
instead to a point of interest, such as a historic site or beautiful view. For these types of
geocaches, geocachers are usually required to answer a question or take a picture of where they
were to prove they were there (Daggett, 2006). Mystery caches are geocaches that usually
require the geocacher to solve a puzzle before they receive the final coordinates of the
geocache location. These puzzles can range from solving mathematical formulas to doing
research on historical events. Once the puzzle has been solved the final coordinates of the
cache will be revealed.
Geocachers must also be on the lookout for muggles, which are nongeocachers,
because if a muggle spots a geocacher finding a cache, then they may wonder what it is and
there may be a risk that the geocache may be stolen by the muggle. This is where stealth may
be required to find a geocache. (“Glossary of Terms,” 2012). Once the geocache is found
geocachers are allowed to take one item from the geocache and sign the logbook. Every
geocache contains at least a logbook. The rest of the items that may be in the geocache are a
mystery. Items that could be in a geocache range from pennies to foreign currency, decks of
cards to books, and sports paraphernalia to squirt guns. The possibilities of what could end up
in geocache are endless.
Once a geocacher takes an item and signs the logbook they must put an item in place of
the one they took that is of equal or greater value. Geocachers can put anything in a geocache,
but putting in food and other substances that could be harmful to the environment or other
geocachers are not allowed. Geocachers must also replace the geocache to the closest
representation of where they found it so other geocachers can enjoy finding the geocache as
well. Once the hunt is complete geocachers can log their find on geocaching.com stating when
they found the geocache and any additional comments that they would like to add (“Learn
How to Log Your Find,” 2012).
Now that a basic understanding of geocaching has been acquired the positive and
negative aspects of ethics, problem solving, and teambuilding can be analyzed to determine
whether any of these three characteristics can be strengthened and developed through
200
geocaching and applied to business. Ethics will be the first characteristic to be analyzed since
developing sound ethical practices are crucial to the growth and success of a business.
ETHICS
Following sound ethical practices while geocaching can be achieved through adhering
to Geocachers’ Creed in order for geocaching to remain safe, legal, and sustainable. This will
be explained in depth in the following paragraphs. Sound ethical practices that can be used in
geocaching will be weighed against unsound ethical practices to determine whether sound
ethical practices can be strengthened and developed through geocaching.
Sound ethical practices can be accomplished in business by establishing an ethics
policy, involving employees and community stakeholders in the development of the ethics
policy, and communicating and linking ethical standards to a business strategy (Thompson,
Thach, and Morelli, 2010). However, the scope of this paper will only focus on establishing an
ethics policy in an organization Establishing an ethics policy can be accomplished in
geocaching through following the Geocachers’ Creed. The Geocachers’ Creed contains a list of
seven elements. These seven elements include “not endangering myself or others, observing all
laws and rules of the area, respecting property rights, and seeking permission where
appropriate, avoid causing disruptions of public alarm, minimizing the impact on the
environment, and being considerate of others, and protecting the integrity of the game pieces”
(“Geocachers’ Creed, 2005, para. 1). These seven elements will be explained to determine
whether geocaching can strengthen sound ethical practices in business. A comparison of sound
and unsound ethical practices is not necessary since all of the unsound ethical practices in
geocaching are the exact opposite of the sound ethical practices.
Following sound ethical practices in element one (not endangering oneself or others)
would be including any dangers that may be present in the description of the geocache online
when attempting to find the geocache, placing geocaches in safe areas, and only placing safe
items in the geocache (“Geocachers’ Creed”, 2005). If these policies are not followed this may
lead to geocachers becoming injured while searching for the geocache. Reasons for this may
include hidden dangers that weren’t described online, searching for geocaches in dangerous
areas, such as near a busy highway or near train tracks, or due to harmful items placed in the
geocache, such as toxic chemicals or sharp objects. Geocachers should also not take
unnecessary risks when attempting to find a geocache, such as climbing a tall tree without the
proper equipment or supervision. This should also be included in a description of the geocache
online, or the person who placed the geocache may become liable for injuries caused to those
attempting to find the geocache. However, taking a reasonable risk while geocaching is
sometimes necessary in order to obtain items worth some sort of value.
Not endangering oneself or others can be applied to business by managing risks within
a business. CEO’s, managers, and employees within a business should be able to identify risks
that are worth pursuing and those that are not. Risks that are worth pursuing include areas
201
where the business has a competitive advantage. These risks should be utilized. Areas that are
not worth pursuing include areas where the business does not have a competitive advantage.
Risks in this area should be reduced (McShane, Nair, & Rustambekov, 2011). Risk
management can be beneficial because research has revealed that it can reduce expected costs
in certain areas, such as tax payments, financial distress and many other business related items
(McShane, Nair, & Rustambekov, 2011).
In order to follow ethical guidelines in element two (observing all laws and rules of the
area) geocachers should not place illegal items in a geocache and not place a geocache in an
area where geocaching is banned, such as national parks or certain historical sites
(“Geocaching: Giving Naturalists Headaches,” 2006). This can be accomplished in business by
implementing an ethics officer in the organization who ensures that the companies code of
ethics is followed (Pendse, 2012). This is similar to observing all laws and rules of the area
while geocaching and also relates to making sure that the Geocachers’ Creed is followed.
Another effective way that this can be accomplished in business is by implementing an ethical
hazards officer. Their role is to identify and predict possible ethical issues that could take place
within the business, and notify the board of directors of these issues (Pendse, 2012).
Following ethical guidelines in element three (respecting property rights and seeking
permission where appropriate) can be accomplished by checking to see if permission from the
landowner has been granted before placing a geocache. This can also be accomplished by not
damaging buildings while placing a geocache (“Geocachers’ Creed,” 2005). If geocachers
don’t follow these policies then the geocachers may be charged with trespassing when placing
or searching for a geocache on private property where the owner has not granted permission
for the placement of the geocache. The geocachers may also be charged with vandalism if they
damage the building or property where the geocache is being placed.
Respecting property rights and seeking permission in business can be accomplished
through not taking credit for others work, and seeking authorization from upper management
when appropriate. An example of not taking credit for others work in business would be
enforcing anti-plagiarism policies in business classes to prepare students not to plagiarize in
the business world. If someone takes the ideas of others in business, and uses them as their
own, the perpetrator may face costly litigation and damage to their reputation. An example of
authorization in the workplace would be not accessing an unauthorized computer and only
having access to a computer that does not exceed an employee’s authorized access (Lavin and
DiMichele, 2012). Employees using unauthorized computers may be fired from their job.
Avoiding causing disruptions of public alarm (element four) can be accomplished by
placing geocaches in areas that are not near schools or government buildings, using caution
when searching for geocaches in areas where children are playing, and not placing geocaches
by critical infrastructure (“Geocachers’ Creed,” 2005). If these policies are not enforced then
people may call the police if geocachers are searching for geocaches around schools or
government buildings. Also, parents may become concerned if strangers are acting suspicious
around their children, and some people may mistake the geocache container for a bomb if it is
202
placed around critical infrastructure, such as a school or important government building
(“Geocachers’ Creed,” 2005).
Following ethical guidelines in element four can be applied to business mainly during
the audit of a business. If fraud is discovered during the audit it should only be reported to an
appropriate level of management, and if it is material it should be reported directly to the board
of directors. This helps to avoid causing disruptions of public alarm. If the fraud is disclosed to
unauthorized parties then the auditor could face litigation due to the ethical and legal
obligations of confidentiality (Messier, Glover, & Prawitt, 2012). The auditor may also
disclose the information in an improper manner, which may cause unnecessary alarm for
public investors in the business.
Minimizing the impact on the environment (element five) can be accomplished by
leaving better than it was found and cleaning up litter in the area. If there is a significant
amount of litter in an area then geocachers will not want to visit the geocache. Also, if a
geocacher stops maintaining a geocache they should remove the container from its location so
it doesn’t harm the environment, and so other geocachers don’t attempt to find it
(“Geocachers’ Creed,” 2005). Geocachers should also not place food in the geocache so
animals won’t be attracted to the geocache, and possibly become injured due to tampering with
the geocache or eating something harmful from the geocache. One way all of this can be
accomplished in business is by adopting a local compliance strategy for becoming more
environmentally friendly. This could include recycling, energy conservation, maintaining
equipment for maximum efficiency, and rewarding employees for practicing conservation.
Furthermore, this may also involve purchasing more up to date technologies, changing
products, and changing current business processes (Wijen and van Tulder, 2011).
Following ethical guidelines in element six (being considerate of others) can be
achieved by treating other geocachers with dignity and respect (“Geocachers’ Creed,” 2005).
Geocaching can be a very competitive activity and this may tempt geocachers to sabotage the
plans of other geocachers so they won’t be as successful at finding the geocaches. Another way
of being considerate includes refraining from spoiling the hunt for others. Geocachers should
avoid leaving easily seen tracks to the geocache or marking the spot where the geocache is
located. In addition, after geocachers have found the cache they should not include spoilers in
their logs online so others can enjoy the hunt as well (“Geocachers’ Creed,” 2005).
Being considerate of others relates well to business because one should be considerate
of others while at the workplace, be considerate toward their competitors in the business world,
and most importantly, in this global economy, .learn cross cultural communication and
etiquette if the business is international. Learning proper business etiquette skills is crucial for
business success in a competitive global environment (Bovee and Thill, 2010).
In many instances when business objectives have not been achieved, this can be mainly
attributed to the lack of cross-cultural etiquette (Okoro, 2012). This is a very important
consideration for international businesses that have locations in many countries around the
world. In fact, the failure of international business ventures and objectives has been attributed
203
to three significant factors. These factors include lack of proper cultural skills, lack of effective
communication skills among different cultures, and failing to practice business etiquette. In
order to solve these problems international businesses need to understand the significance of
different cultures and their values, in addition to developing strong communication and respect
among those cultures (Washington, Okoro, and Thomas, 2012).
Protecting the integrity of the game pieces can be accomplished by making sure that the
geocache is not damaged when it is found and that it is left in the same spot so the next
geocacher can find it. Making sure the geocache is properly closed is also crucial so the items
contained in the geocache don’t get stolen or damaged. Being inconspicuous when retrieving
the geocache is also very important so muggles (nongeocachers) don’t become alerted to where
the geocache is hidden and then either steal or vandalize the geocache. Another important
aspect is not asking someone else for the solution for a geocache that involves solving a puzzle
to get the correct coordinates. This can relate to business through the auditing of financial
statements. Corporations rely on auditor’s to carefully prepare an auditor’s report, which is
meant to ensure that the corporation’s financial statements are not materially misstated so
investors can rely on the integrity of the financial statements when making investment
decisions (Messier, Glover, and Prawitt, 2012).
As evidenced above an ethics policy in business can be strengthened through
geocaching by not endangering others, observing all laws and rules of the area, respecting
property rights, seeking permission where appropriate, avoid causing disruptions of public
alarm, minimizing the impact on the environment, being considerate of others, and protecting
the integrity of the game pieces.
PROBLEM SOLVING
Following ethical practices in business is important, but developing problem solving
skills are crucial for success in business as well. Problem solving relates very well to
geocaching because geocachers must use their ingenuity and creativity to find geocaches. The
larger geocaches are usually very easy to find, but the smaller ones require much more work.
Geocaches that have a high difficulty rating or are placed in areas where there are significant
amounts of people are difficult to find as well. Positive problem solving skills that can be used
in geocaching will be weighed against negative problem solving skills to determine whether
problem solving can be developed and strengthened through geocaching.
An analysis of positive problem solving skills, which can be applied to business, will be
briefly mentioned and then will be applied to geocaching. “In business, there are 8 effective
ways for a manager to solve a problem. These include collecting facts about the problem,
defining the problem and the desirable solution, finding out how people feel about it,
identifying the objectives, generating possible solutions, reviewing the solutions and selecting
the most promising solution, putting the solution into action, and evaluating the outcome”
(Khan, Hafeez, & Saeed, 2012, p. 317).
204
Collecting facts about geocaching can be accomplished in several ways. This can be
accomplished by going on geocaching.com and finding relevant information about how to find
the geocache. This includes information such as the coordinates, a detailed map of where the
geocache is located, the difficulty and terrain of the geocache, the size of the geocache, hints
about where to find the geocache, and a description of the geocache (“Geocache Details,”
2012).
Defining problems can reduce costs and strengthen processes in businesses. (Spradlin,
2012). In the same way, defining the problem and solution saves time and energy costs by first
determining where the geocache is located and then planning when to search for the geocache
due to other people being present. If the geocache is located in an area where there are
significant amounts of people then the geocache should be searched for at a more cost effective
time of day when there aren’t as many people present. Also, by viewing the description of the
geocache online one can determine if tools or special clothing are needed beforehand in order
to retrieve the geocache and replace it. During this stage geocachers should only spend time on
figuring out the causes of the problem, and not spending time yet on the solutions (Liang and
Zhang, 2010).
Finding out how people feel about the solution can be accomplished through
geocaching l if one is geocaching with a group, which is a more fun and effective way to
geocache. The solution should be discussed among those in the group. If one is geocaching
alone then this cannot be accomplished. In business, communication plays a critical role while
solving problems (Liang and Zhang, 2010). Discussing solutions to a problem can only be
accomplished with effective communication. Otherwise the solutions will be implemented
improperly.
In the same way as a successful business, identifying the objective of what one hopes to
achieve in geocaching is critical. One of the primary objectives should be to find the geocache
with as little disruption as possible. This is important because several communities have
banned geocaching. For example, a wilderness area in Oregon has banned geocaching and a
bill in South Carolina proposed a $100 fine for anyone caught placing geocaches in cemeteries
or historic sites without proper approval (“Geocaching: Giving Naturalists Headaches”, 2006).
If disruptions are not kept to a minimum geocaching may be banned in more areas making it
less accessible to geocachers.
Generating solutions is a constant requirement of business managers. Geocachers must
also generate possible solutions to the problem by determining how they are going to get to the
geocache, and once in the area, how they are going to reach it. They can review these solutions
by talking amongst the group about how they are going to achieve these solutions and decide
which solution is most promising to the particular situation. Putting the solution into action can
be accomplished by carrying out the solutions planned for and discussed among the group.
And finally, evaluating the solution can be accomplished by considering how long it took to
find the geocache by using the solution that was implemented. If a considerable amount of time
205
was used to find the geocache, or if the geocache was not found, then the solution to finding
the geocache should be revised.
The negative aspects of the problem solving process involved in geocaching should
also be considered. One of these negative aspects is giving less experienced team members the
responsibility to come up with solutions to the problem (Jameson, 2009). When this occurs
during geocaching some possible solutions may be overlooked, and while searching for a
particular geocache, it may not be found because those solutions were overlooked. For
example, a geocache that has the appearance of a rock may not be found if inexperienced
geocachers have never found a rock type geocache. However, this problem can be overcome
for less experienced geocachers by doing some simple research on the geocaching website to
determine that there are geocaches that are shaped as rocks as well as many other naturally
appearing items such as pinecones. (“Cache Containers,” 2012).
Another negative consequence of problem solving occurs when team members with
convincing personalities focus on only one solution due to their preconceived notions about the
problem and its solutions when there is more than one possible solution (Jameson, 2009). This
can occur while geocaching when a convincing leader rules out possibilities of where the
geocache could be because they think it won’t be there. For example, while searching for a
geocache around a tree, the leader may rule out the possibility that the geocache is in the tree
when it really is in the tree. This may cause other members in the group not to look up in the
tree which will lead to failure in finding the geocache.
Others ways in which problem solving is not strengthened during geocaching include
“several problems that can detrimentally affect the recognition of a problem, which include
ignoring or omitting relevant information, identifying wrong causes or problems from the
information, skipping over the recognition stage altogether, and trying to solve problems
before they are clearly defined” (Charles, 1976, p. 91).
The omission of relevant information and incorrectly recording coordinates can be a
common among impulsive geocachers who are eager to get outside and search for geocaches
so in the process they may also try to solve problems before they are clearly defined. It is very
likely that this hurried and careless approach will lead to failure in finding the geocache and
result in disappointment and frustration. Relevant observations and recordings that should not
be omitted or overlooked include recording the correct coordinates, noticing that the geocache
hasn’t been found for a long period of time, as evidenced by the online logs, recognizing that
the geocache is disabled, and noting the size, difficulty and terrain of the geocache.
Identifying wrong causes of problems passed on to future geocachers can occur when
there is a misinterpretation of the size of the geocache and an underestimation of the difficulty
and terrain of the geocache. Since these factors are subjective, wrong assumptions are made,
resulting in ineffective planning and preparation on those attempting to find the geocache
because they don’t take into account these considerations. Using this ambiguous information it
is easy to attribute the problem to a missing or misplaced geocache. At that point the search is
ended, when in reality the geocache could have been if they had made an effective plan.
206
After analyzing the positive and negative aspects of problem solving it can be inferred
that geocaching can help strengthen positive problem solving skills required for success in the
business world. In organizations it is critical for management to be able to find problems to
resolve, to grasp opportunities, and to take actions against challenges (Nickerson, Yen, &
Mahoney, 2012). This can be accomplished by having experienced geocachers solve problems,
record the correct information, and plan for all possible outcomes. Geocachers should avoid
having less experienced geocachers solve problems, focusing on only one solution, incorrectly
recording information, and assuming the difficulty, terrain, and size of the cache is always
accurate.
TEAMBUILDING
Problem solving is an important aspect of business, but there is also a need for
teambuilding so new knowledge and skills can be used effectively and efficiently (Teire,
1982). Teambuilding will be analyzed to determine whether it can be strengthened while
geocaching because teambuilding is critically important to the success and growth of a
business. Teambuilding can be applied to business by “getting the right people on the team and
the wrong ones off, making sure the top team does only the work it can do, and addressing
team dynamics and processes” (Kruyt, Malan, & Tuffiled, 2011). An analysis of the positives
and negatives of teambuilding will be discussed in each instance.
Getting the right people on the team and making sure the top team does only the work it
can do involves delegating specific authorities to those on the geocaching team. For example,
those technologically savvy should operate the GPS, those who pay close attention to detail
should be the primary searchers for the geocaches, and those who are stealthy should search for
geocaches when there are people around. This relates well to the skill differentiation team
taxonomy used to evaluate teams in business. Skill differentiation means the amount of special
knowledge members have on a particular process and how difficult it would be to substitute the
person if they were absent (Hollenbeck, Beersma, & Schouten, 2012). For instance, if the
person who normally operates the GPS cannot participate in the geocaching excursion then
others who may not be as effective at operating the GPS may not be able to efficiently find
geocaches because they didn’t learn how to effectively use the GPS. It may be difficult to
substitute someone else for this person’s position if everyone lacks the proper training in how
to use the GPS besides the person who is absent.
It may be better to focus on having all members of the geocaching team learn how to
effectively operate all aspects involved in geocaching instead of strictly focusing their attention
on one area of expertise. This helps to create a well rounded geocaching team and prevents the
problem of solely relying on one person for a particular operation of the geocaching process
(operation of GPS, searching for geocaches, etc.).
Another method of getting the right people on the team would involve including more
geocachers on the team that have worked together in the past. This relates to the temporal
207
stability taxonomy. This taxonomy means that team members work more effectively with those
they have a history of working with in the past and an expectation of working with them in the
future (Hollenbeck et al., 2012). Geocachers who have worked with each other in the past will
be more efficient in their teamwork because they know from past experience how the other
team members think and solve problems. However, a negative outcome of this would be the
creation of team members, who have not worked well with each other in the past, working
together again. There will most likely be dissent between the members and they will not work
together as well due to disagreements or differences in style they may have.
An effective way to help address team dynamics and processes is to create a
geocaching team that is diverse in their ways of thinking. This can point out differences that
may invoke team members to brainstorm novel ideas. (Perry-Smith & Shalley, 2003) It may
also encourage them to think differently by viewing something in a different way (Jehn,
Northcraft, & Neale, 1999). By having a diverse geocaching team there will always be more
than one way to find the geocache (solve the problem), which will lead to greater success in
finding the geocache. Having more than one method of finding the geocache will provide a
backup plan if the initial method fails. A negative aspect related to creating a diverse
geocaching team may relate to differences between team members that are not tolerable. This
may result in the team members treating each other harshly, and it may be difficult for them to
accept one another’s strengths (Shin, Kim, Lee, & Bian, 2012).
Addressing team dynamics and processes can also be achieved by including different
types of problem solvers on the geocaching team, similar to what was described earlier. This
adds diversity to the team, which creates innovative ideas due to the team members being
exposed to a wider variety of information and viewpoints (Shin, et al., 2012). According to Xu
and Tuttle there are two types of problem solvers; adaptors and innovators. Adaptors like
working with existing techniques and frameworks for solving problems while innovators enjoy
seeking novel solutions and therefore may ignore existing frameworks (2012). On the
geocaching team, the adaptors would draw upon existing methods and experience, while the
innovators would think out of the box when the tried and true methods prove to be ineffective.
On the negative side this may also lead to arguments between the two types of problem
solvers due to emotional and relational conflict (Jehn et al., 1999; Mannix &Neale, 2005). This
will weaken the teambuilding experience and possibly lead to developing ineffective solutions
for finding the geocaches. Team members are less likely to consider creative methods, such as
testing, constructing, and elaborating on thoughts with one another when these conflicts are
present (Shin, et al., 2012).
CONCLUSION
In conclusion, after analyzing the application of ethics, problem solving, and
teambuilding to geocaching and business, several determinations were made. Sound ethical
practices can be strengthened through geocaching and applied to business primarily by
208
following the seven elements in the Geocachers’ Creed which are akin to establishing an ethics
policy for business. Sound ethical practices in business that can be strengthened through
geocaching include managing risks within an organization, implementing an ethics officer,
ensuring there is proper authorization, ensuring fraud is reported appropriately, following
regulations to become more environmentally friendly, practicing business etiquette, and being
audited to provide reliable information to investors and the public interest. In addition to ethics,
problem solving can be strengthened through geocaching and applied to business by having
experienced geocachers (employees) solve the major problems, recording the correct
information, and planning for all possible outcomes. Defining problems can be cost effective
for organizations and can also help improve organizational performance. Furthermore,
teambuilding that is strengthened through geocaching and applied to business includes getting
the right people on the team, ensuring that the top team does only the work it can do, and
addressing team dynamics and processes by including those in a team that have worked
together in the past. In addition, it is critical to create a diverse team, and include different
types of problem solvers on the team, such as adaptors and innovators. The free worldwide
treasure hunting game of geocaching has multiple benefits. Anyone can participate, it promotes
the outdoors and physical activity, and it strengthens the ethical, problem solving, and
teambuilding aspects of a business. It is recommended that geocaching be implemented during
business lunch hours or breaks to maintain those characteristics that keep businesses
successful.
REFERENCES
Bovee, C. L., & Thill, J. V. (2010). Business communication today (10th ed.). Boston: Prentice Hall
Cache Containers. (2012) Geocaching. Retrieved November 15, 2012 from
http://shop.geocaching.com/default/cache-essentials/cache-containers
Charles, E.W. (1976). The Problems of Problem Solving, Business Horizons. Pp. 88-94.
Dagget, S. (2006, Jan). Treasure hunts – with a twist. LocumLife, pp. 20-21.
Geocaching. (2012). Geocaching. Retrieved November 14, 2012, from http://www.geocaching.com/
Geocachers’ Creed. (May, 2005). Geocachers’ Creed. Retrieved November 14, 2012, from
http://www.geocreed.info/
Geocache Details. (2012) Geocaching. Retrieved November 15, 2012 from
http://www.geocaching.com/seek/cache_details.aspx
Geocaching: Giving naturalists headaches. (2006, Dec.). GPS World, 17(12), p.60.
Geocache Types. (2012) Geocaching. Retrieved November 14, 2012 from
http://www.geocaching.com/about/cache_types.aspx
209
Glossary of Terms. (2012) Geocaching. Retrieved November 16, 2012 from
http://www.geocaching.com/about/glossary.aspx
Hide & Seek a Cache. (2012) Geocaching. Retrieved November 14, 2012 from http://www.geocaching.com/seek/
Hollenbeck, J.R., Beersma, B., & Schouten, M.E. (2012). Beyond team types and taxonomies: A dimensional
scaling conceptualization for team description. Academy of Management Review, 37(1), 82-106.
Jameson, D.A. (2009). What's the right answer? Team problem-solving in environments of uncertainty. Business
Communication Quarterly, 72(2), 215-221.
Jehn, K. A., Northcraft, G. B., & Neale, M. A. (1999). Why differences make a difference: A field study of
diversity, conflict, and performance in workgroups. Administrative Science Quarterly, 44, 741–763.
Khan, S., Hafeez, A., & Saeed, M. (2012). The impact of problem solving skill on heads’ on students’ academic
achievement. Interdisciplinary Journal of Contemporary Research in Business, 4(1), 316-321.
Kruyt, M., Malan, J., & Tuffiled, R. (2011). Three steps to building a better top team. McKinsey Quarterly, 1,113117.
Lavin, H.S., & DiMichele, E.E. (2012). Employee Relations Law Journal, 38(1), 80-84.
Learn How to Log Your Find. (2012) Geocaching. Retrieved November 15, 2012 from
http://www.geocaching.com/about/logging.aspx
Liang, K., & Zhang, Q. (2010). Study on the organizational structured problem solving on total quality
management. International Journal of Business & Management, 5(10), 178-183.
Mannix, E., & Neale, M. A. (2005). What differences make a difference? The promise and reality of diverse
teams in organizations. Psychological Science in the Public Interest, 6(2), 31–55.
McShane, M.K. Nair, A. & Rustambekov, E. (2011). Does enterprise risk management increase firm value?
Journal of Accounting, Auditing & Finance, 26(4), 641-658.
Messier, W.F., Glover, S.M., & Prawitt, D.F. (2012). Auditing & Assurance Services. New York, NY: McGrawHill.
Nickerson, J., Yen, C.J., & Mahoney, J.T. (2012). Exploring the problem-finding and problem-solving approach
for designing organizations. Academy of Management Perspectives, 26(1), 52-72.
Okoro, E. (2012). Cross-cultural etiquette and communication in global business: Toward a strategic framework
for managing corporate expansion. International Journal of Business & Management;7(16), 130-138.
Pendse, S. (2012). J Ethical hazards: A motive, means, and opportunity approach to curbing corporate unethical
behavior. Journal of Business Ethics, 107(3), 265-279.
Perry-Smith, J. E., & Shalley, C. E. (2003). The social side of creativity: A static and dynamic social network
perspective. Academy of Management Review, 28, 89–106.
Search for Geocaches. (2012) Geocaching. Retrieved November14, 2012
http://www.geocaching.com/seek/nearest.aspx
210
Shin, S.J., Kim, T.Y., & Bian, L. (2012). Cognitive team diversity and individual team member creativity: A
cross-level interaction. Academy of Management Journal, 55(1), 197-212.
Spradlin, D. (2012). Are you solving the right problem? [Abstract] Harvard Business Review, 50 (9), 84-93.
Teire, J. (1982). Working together: A practical look at teambuilding. [Abstract] Industrial & Commercial
Training, 14(6). 201.
Thompson, K.J., Thach, E.C., & Morelli, M. (2010). Implementing ethical leadership: Current challenges and
solutions. Insights to a Changing World Journal, (4), 107-130.
Washington, M.C., Okoro, E., & Thomas, O. (2012). Intercultural communication in global business: An analysis
of benefits and challenges. International Business & Economics Research Journal, 11(2), 217-222.
Wijen, F., & van Tulder, R. (2011). California Management Review, 53(4), 23-46.
Xu, Y., & Tuttle, B. (2012). Adaption-innovation at work: A new measure of problem- solving styles. Journal of
Applied Management Accounting Research, 10(1), 17-33.
211
PERSONALITY AND PERCEPTIONS OF EFFECTIVE
LEADERSHIP – DIFFERENCES BETWEEN
MEN AND WOMEN
Ben Cavazos
Our Lady of the Lake University
James E. Eastham
Our Lady of the Lake University
Mark T. Green
Our Lady of the Lake University
Rocio Harrelson
Our Lady of the Lake University
ABSTRACT
The meta-analytic literature indicates that the personality of a leader is related to
perceptions of how that leader leads. In 2004, Bono (Bono, Joyce and Judge, Timothy)
published a meta-analysis studying 384 correlations from 26 different studies looking for links
between personality and leadership behavior. The Big 5 Model of Personality was used to
measure personality and the Full Range of Leadership, indicating transformational,
transactional and passive avoidant dimensions of leadership, was used to measure leadership
behavior. The study found that Extraversion (r = .24) was positively linked and Neuroticism (r
= -.17) was negatively linked to transformational leadership. The study further reported that
Charisma is the leadership trait most commonly linked to personality, while management by
exception was linked least frequently with personality.
The meta-analytic literature also indicates that women and men are typically rated
differently on leadership. In a study conducted in 2003, (Eagley, Johannesen-Schmidt and
Engen) determined that female leaders were more transformation than men. The study
identified significant differences in the areas of transformational, transactional and laissezfaire leadership styles. Women scored higher in the transformational subscales of idealized
influence, intellectual stimulation and individual consideration. In addition, women scored
higher in the transactional subscale of contingent reward, while men scored higher in the
212
transactional subscales associated with management by exception (passive), management by
exception (active) and the laissez faire scale.
What is less clear is how gender moderates the relationships among personality and
followers’ perceptions of leadership.
In this study 115 female and 76 male leaders were each rated by three followers and
two colleagues on the Multifactor Leadership Questionnaire. Each leader also completed the
NEO-PI personality assessment. A 5 by 9 correlation matrix for leadership ratings and leader
personality found very limited relationship between personality and leadership.
Ree, Carretta and Earles (1999) have pointed out that sometimes when analyzed
independently relationships can be found for males or females and a third variable that is not
apparent when the sexes are combined.
In this study, when relationships between personality and leadership were analyzed for
male leaders and again for female leaders, strikingly different patterns emerged.
Generally, extraversion and conscientiousness were positively related to ratings of
transformation/effective leadership for male leaders, but were unrelated for female leaders.
Conversely, a lack of openness and lack of emotional stability were related to ratings of female
leaders as passive/ineffective leaders.
Additional research of possible reasons for these distinctions is needed.
213
ASSESSING STUDENT CRITICAL THINKING SKILLS
FOR ONLINE QUANTITATIVE COURSES
Annette Hebble
Trident University International
Mina Richards
Trident University International
ABSTRACT
Using rubrics is an accelerating trend in education, especially in the online
environment. Rubrics are tools for assessing learning outcomes and evaluating critical
thinking skills are currently of interest given a changed emphasis in education. How well do
rubrics capture student improvement of critical thinking skills over time? Can the ability to
perform quantitative analysis also be captured under the category of critical thinking skills? Is
quantitative analysis a distinct skill that needs to be captured by a separate measurement such
as a rubric for numeracy or quantitative literacy?
INTRODUCTION
Over the last two decades, it has become apparent that the acquisition of knowledge is
no longer a sufficient goal in higher education. The world of business is changing so rapidly
leading to changes in instruction to nurture cognitive abilities for problem solving. The
increase in the diversity among students has also brought the emphasis on critical thinking to
help individuals be successful in today’s business environment. New instructional methods in
higher education has devised ways to standardize learning by establishing institutional,
program, and course learning outcomes levels to measure student learning.
Frequently, academia is posed with the question of how one knows that students are
acquiring critical thinking skills when doing coursework. The motivation of this study is to
attempt to measure student critical thinking and analytical skills as students make progress in
their coursework. Rubrics have facilitated the way to measure institutional outcomes. In
particular, the Association of American Colleges and Universities (AAC&U) has published a
collection of VALUE rubrics developed by a diverse team of university professors and
administrators. The Critical Thinking and Quantitative Literacy VALUE rubrics will be used
for this study.
214
LEARNING OUTCOMES, ASSESSMENTS, AND RUBRICS
Learning Outcomes
Learning outcomes (LOs) are defined as statements that describe significant and
essential learning that learners have achieved, and that can reliably be demonstrated at the end
of a course or program (Program Assessment Guide, 2012). A learning outcome must be clear,
specific, learner-oriented, task-focused, and measurable (Fulcher, 2010). Learning outcomes
are assessed to provide evidence of knowledge, skills, and values learned and what remains to
be learned. This outcome-based approach is essentially a “learner centered” approach in which
outcomes determine the teaching and learning activities.
Assessments
Baroudi (2007) and Johnson and Jenkins (2013) likewise define two types of
assessments: formative and summative. The professor uses formative assessments to determine
a student’s level of knowledge and understanding. The results are used to provide the student
with developmental feedback and to improve future instruction. In contrast, summative
assessments are those to evaluate and grade student learning at a point in time.
Assessments are further classified into direct and indirect measures. Direct measures
are based on a sample of actual student work, including reports, exams, demonstrations,
performances and completed works. The strength of direct measurement is that faculty
members are capturing a sample of what students can do, which can be very strong evidence of
student learning. This type of assessment is also used to perform gap analysis for continuous
classroom improvements (Shepard, 2000, p.7). Indirect measures are based upon a report of
perceived student learning. The reports can come from many perspectives including students,
faculty, and employers. Indirect measures are not as strong as direct measures because one
needs to make assumptions about what exactly the self-report means to faculty and students.
Setting learning outcomes encourage and measure student achievement. Learning outcomes
state the goal and rubrics assist in measuring the attainment of such goals.
Rubrics
Rubrics are multi-purpose tools. Rubrics are used to measure institutional, program,
and course outcomes as well as to determine the grades on individual assignments. Rubrics are
not only popular with instructors and administrators but are also encouraged and supported by
accrediting organizations. Consequently, the design and use of rubrics in education has a wide
adoption. The information gleamed from rubrics’ ratings can also be used to improve the
educational experience for students.
The term rubric was often associated with instructional rubrics in the past. They were
used to guide students and assist instructors to evaluate student work in a consistent manner. It
can be an efficient manner of grading that can easily be explained to students (Andrade 2002).
Another crucial aspect of a rubric is that the performance assessed should be observable and
215
measurable (Wolf & Stevens 2007). The latter is true whether a rubric is used for institutional
assessment or individual grading. There is much to learn about using rubrics for evaluating
LOs, so the emphasis will be on institutional assessment for purposes of this study.
VALUE Rubrics
Among the many developers of rubrics, the Association of American Colleges and
Universities (ACC&U) has served as the leader. The association designed various types of
VALUE rubrics with the intent to measure learning outcomes in 15 intellectual and practical
kill areas of study (ACC&U, 2013). The association consists of a diverse advisory board,
leadership and partner campuses representing development teams. VALUE rubrics are
designed to accommodate different campuses, disciplines, and courses aiming at measuring
learning outcomes. Depending on the assignment, these rubrics can be used as analytical tools
to grade students’ work. According to ACC&U (2013), several initiatives are ongoing to
establish the reliability of VALUE rubrics and to ensure that all users have the same
understanding of rubrics’ criteria, levels, and descriptors. VALUE rubrics are examples of
summative assessments with direct measure properties, and these are designed to accommodate
different type of campuses, disciplines, and courses. VALUE rubrics include progressively
more sophisticated criteria for meeting learning outcomes.
Critical Thinking VALUE Rubrics Defined
According to Striven and Paul (1987), “critical thinking is the intellectually disciplined
process of actively and skillfully conceptualizing, applying, analyzing, synthesizing, and/or
evaluating information gathered from, or generated by, observation, experience, reflection,
reasoning, or communication, as a guide to belief and action. In its exemplary form, it is based
on universal intellectual values that transcend subject matter divisions: clarity, accuracy,
precision, consistency, relevance, sound evidence, good reasons, depth, breadth, and fairness.”
This study adapted the Critical Thinking Rubric developed by American Association of
Colleges and Universities for their Valid Assessment of Learning in Undergraduate Education
(VALUE) project, using the following domains of critical thinking:

Explanation of issues

Evidence

Influence of context and assumptions

Student position (perspective)

Conclusions and related outcomes (implications and consequences)
A sample of this rubric can be found in the AAC&U website, which site address is listed in the
reference page.
216
Quantitative Literacy VALUE Rubrics Defined
According to the Mathematical Association of America (2013), “colleges and
Universities should accept responsibility for overseeing their quantitative literacy programs
through regular assessments. A quantitative literacy program should be managed watchfully.
At appropriate times and in appropriate ways, the results should be evaluated so as to obtain
enlightened, realistic guidance for improvement. Evaluation methods should reflect course
goals and teaching methods used, and besides pointing to possible improvements in the
program can themselves be educationally beneficial. In particular, the evaluation methods
should involve clearly applications-oriented tasks.”
Due to the nature of the material covered in accounting a second VALUE rubric was
applied for these two courses. The Quantitative Literacy VALUE rubric was selected for the
second evaluation for comparison purposes. It is possible that a different type of categorization
is needed to capture quantitative analytical skills. The following domains were scored.

Interpretation

Representation

Calculation

Application/analysis

Assumptions

Communication
The Quantitative Literacy Rubrics can be also found in the AAC&U website. See reference
page for site address.
PURPOSE OF STUDY
A persistent lack of evidence remains as to whether students improve their critical
thinking skills in quantitative courses. In fact, it is unclear if faculty can apply the same criteria
to assess gains in higher level thinking skills for courses involving numeracy skills. It is
common knowledge that many students struggle with this type of course materials, so it is an
issue of interest. Since the authors already have some experience with the VALUE rubrics
from working on an institutional assessment committee and regional accreditation activities,
the use of VALUE rubrics was chosen for this exploratory study. The authors are both
interested in the successful implementation of rubrics for quantitative courses. The goal of
conducting assessments at the university where the author teach is to support a learner-centered
environment and apply effective techniques to conduct and measure learning. The primary
function is to benchmark improvements of student learning and to enhance academic
programs. Assessments play a significant role for the university mission, and instructional
outcomes and rubrics are tools to improve the learning culture and instructional practices
(WASC, 2013). Another issue of interest is to assess the information learned from using
alternative VALUE rubrics.
The authors used the AAC&U’s VALUE rubrics because these instruments have been
thoroughly tested and offer strong validity and reliability. The rubrics are also available for use
217
by any institution. Critical thinking skills are paramount in today’s education and are an
important skill to take away from any course. Although quantitative courses have
computational and written components, the use of VALUE could inherit challenges not
otherwise observed with faculty-driven rubrics.
The major concern voiced about assignment evaluations is if a teaching institution
should use rubrics to assess student improvements in a quantitative course. Similarly, faculty is
faced with the question if a thinking skills rubric is applicable or whether a quantitative literacy
rubric should a better measure of analytical skills. Accrediting institutions endorse numeracy
as a separate category; however, measuring literacy skills in quantitative courses is important
just as it is in any other course. Can the same critical thinking skills rubric be successfully
applied to a course that has a significant quantitative component? Is quantitative reasoning or
numeracy distinct from critical thinking skills? Can one apply the same rubric to both types of
courses to measure performance? Given the rapidly growing use of rubrics, these questions are
worthy of attention.
Because student evaluations are pervasive in use, it is essential to apply rubrics to gain
an understanding of the advantages and disadvantages and how to best use them to assess the
meeting of outcomes. While it is a compelling idea to use the same generic rubric to assess an
important skill for all courses, the practicality remains an issue until proven otherwise.
Sample Selection
The authors used signature assignments to rate six undergraduate and two graduate
classes taught during a recent session at Trident University International (TUI). The accounting
courses do not include signature assignments. Instead, two equivalent types of assignments
were evaluated. Signature assignments all have elements of theory application, computations,
analysis, synthesis, and conclusions. The selection encompassed both critical thinking skills
and performance of financial analysis for the accounting courses since these courses lacked a
signature assignment.
A signature assignment is an assignment or milestone that is used to measure
competency or progress in achieving an institutional or program learning outcome. As a
guideline, it is generally recommended that signature assignments occur in the first course and
after students have had the opportunity to develop and refine the skills related to the outcome.
For this reason, the first course and last course were chosen for the Information Technology
Management (ITM) graduate program. For accounting, a required MBA core course and an
accounting elective covering similar type of material were chosen. The two accounting courses
are sequential as opposed to the other courses evaluated.
For the undergraduate computer science and BS ITM programs, a total of 28 student
submissions were selected and another 30 submissions for the MSITM program. Fifteen
student submissions were randomly selected for the MBA accounting graduate courses. The
number of student submissions evaluated for different courses varied based on the availability
of assignments to evaluate. All identifying criteria of the authors were removed before
downloading and saving the documents. Each assignment was read twice and carefully
218
analyzed before applying the rubric by evaluators familiar with the assignments. In all, 88
assignments were evaluated; and 30 of those assignments were evaluated on two dimensions.
Selected assignments were scored using modified levels for Critical Thinking VALUE
Rubric on a scale of 1 – 4. The representing levels were 1 = weak, 2 = marginal, 3 = adequate,
and 4 = strong. The rubric was administered in the form of a summative assessment and used
to evaluate the learners’ critical thinking abilities.
Assignments were scored using a holistic approach for all criteria and levels. To
process the scores, the means were calculated for each category and thereafter compared
between the first and last course of the ITM program for mean changes. Percentages were also
calculated by level within each criterion to determine what level had the highest and lowest
ranking in the rubrics. Accounting courses also noted a minimal variation in mean changes
between the core and elective course.
RESULTS AND CONCLUSION
Results of the Study
All courses in the ITM program evaluated with the Critical Thinking VALUE rubrics
showed gains in mean for all criteria except for “position” in the Computer Science Program.
Since computer courses are technical and programming oriented, there is little room to
“synthesize” principles across courses. Therefore, a low level of fluctuation was noticed.
Significant gains were observed in “evidence and conclusions” in the CSC program,
demonstrating knowledge increase between the first and last course. The “analysis” criterion
also showed a substantial increase, proving that students’ analytical skills improved over time.
The BSITM program did not vary dramatically in gains, but “position” or synthesis showed a
noteworthy increase above other criteria. See details in Table 1.
The MSITM program enjoyed the best gains across criteria. The ITM courses indicate a
gain in critical thinking skills as evidenced by the data in Table 1. It is also interesting that the
score increased for all the categories assessed. Additional details for the undergraduate courses
are displayed in the last two tables, 7 and 8.
Table 2 indicates that the results are less consistent for the accounting courses than ITM
courses. The difference may be explained by the courses analyzed. The ITM courses were the
first and last in a sequence, implying that there were several courses between the two. The
highest increase was on “position,” demonstrating strong arguments to defend points of view.
The lowest gain was on “analysis,” which could be justified by the pressure of the learning task
(Kottasz, 2005).
The accounting courses yielded only modest gains in “interpretation, analysis, and
position.” There was no intervening accounting course between the two courses evaluated in
this study. Additionally, the assignment evaluated for the core accounting course were placed
in the middle of the course while the assignment evaluated for the accounting elective was in
the beginning of the course. The study reveals that those two courses do not have prerequisites
and are close together in the program and could be taken in any order. The analysis of the
219
accounting courses shows a different pattern. Table 3 indicates some gain in “interpretation,
knowledge, comprehension” and analysis, but a loss for the “conclusion, evaluation” category.
The negative gain in “conclusions” may indicate that students did not tie the application of
knowledge and analysis together to provide a statement on how they supported the thesis. The
findings remain consistent with the lack of bringing closure on essay writing (Norton & Pitt,
2011) and engaging students in difficult courses through online schools.
Table 4 below shows the results from the emphasis of numeracy or quantitative
reasoning and analysis. Comparing this table to Table 3, it demonstrates a gain on all
dimensions of quantitative literacy for the accounting courses. The gain for analysis is lower
than a similar dimension using the critical skills rubric.
Table 5 provides a summary of the gain in means for the graduate courses of the two
disciplines evaluated in this study using the critical thinking skills VALUE rubric. Table 6
provides a concise summary comparing the two VALUE rubrics for accounting.
CT Criterion
Interpretation
Evidence
Analysis
Position
Conclusions
Table 1
DISCIPLINES
Summary of Gain in Means
CSC
BSITM
0.50
0.40
1.00
0.40
0.75
0.40
0.00
0.80
1.00
0.40
Average
0.65
MSITM
0.53
0.73
0.40
1.07
0.66
ACC
0.27
-0.06
0.20
0.06
-0.20
0.68
0.05
0.48
Table 2
ITM COURSES – CRITICAL THINKING VALUE RUBRIC
Average Ratings
CT Criterion
ITM524
ITM590
Interpretation/Knowledge/
Comprehension
2.80
3.33
Evidence/Application
2.47
3.20
Analysis
2.73
3.13
Position/Synthesis
2.20
3.27
Conclusions/Evaluation
2.47
3.13
Average
Gain in Mean
0.53
0.73
0.40
0.53
0.53
0.54
220
Table 3
ACC COURSES – CRITICAL THINKING VALUE RUBRIC
Average Ratings
CT Criterion
ACC501
ACC504
Interpretation/Knowledge/
Comprehension
2.80
3.07
Gain in Mean
0.27
Evidence/Application
2.93
2.87
-0.06
Analysis
Position/Synthesis
Conclusions/Evaluation
2.87
2.87
2.93
3.07
2.93
2.73
0.20
0.06
-0.20
Average
0.05
Table 4
ACC COURSES – QUANTATIVE LITERACY VALUE RUBRIC
Average Ratings
CT Criterion
ACC501
ACC504
Gain in Mean
Interpretation
2.47
2.80
0.33
Representation
2.47
3.13
0.66
Calculation
2.47
2.93
0.46
Application/Analysis
2.73
2.87
0.14
Assumptions
2.67
2.73
0.06
Communication
2.79
2.87
0.08
Average
0.29
Table 5
COMPARISON OF ITM AND ACC - – CRITICAL THINKING VALUE RUBRIC
Gain For the Next Course
Gain in ITM
Gain in ACC
Mean
Mean
Interpretation/Knowledge/
Comprehension
0.53
0.27
Evidence/Application
0.73
-0.06
Analysis
0.40
0.20
Position/Synthesis
0.53
0.06
Conclusions/Evaluation
0.53
-0.20
Average
0.54
221
0.05
Table 6
ACC Courses
Comparison of Two VALUE Rubrics
ACC501
Overall Mean for Critical Thinking Rubric
Overall Mean for Quantitative Literacy
CT Criterion
Interpretation/Knowledge/
Comprehension
Evidence/Application
Analysis
Position/Synthesis
Conclusions/Evaluation
ACC504
2.88
2.60
2.934
2.89
Table 7
BS COURSES - COMPUTER SCIENCE
Average Ratings
CSC111
CSC111
2.25
2.25
2.25
2.75
2.00
Average
2.75
3.25
3.00
2.75
3.00
Gain in
Mean
0.05
0.29
Gain in Mean
0.50
1.00
0.75
0.00
1.00
0.65
Table 8
BS COURSES - INFORMATION TECHNOLOGY MANAGEMENT
Average Ratings
CT Criterion
ITM206
ITM491
Gain in Mean
Interpretation/Knowledge/
Comprehension
2.20
2.60
0.40
Evidence/Application
2.20
2.60
0.40
Analysis
2.00
2.40
0.40
Position/Synthesis
1.80
2.60
0.80
Conclusions/Evaluation
2.40
2.80
0.40
Average
0.48
CONCLUSION
The results of the study indicate that the application of the Critical Thinking Skills
VALUE Rubric to the first and last course in a given program yields the best results as
demonstrated by the evaluation on the quantitative non-accounting course assignments. This
kind of rubric can provide valuable insights into student achievement even in some quantitative
courses.
The application of two separate VALUE rubrics does not appear to yield meaningful
222
differentiation even though the quantitative rubric shows some improvement from one course
to the other. The study also observed that using both rubrics at the same time might
contaminate the scoring by trying to fit the understanding of the analysis into more than one
rubric. Also, timing could attribute the lack of significant improvement from the first required
course to the second elective accounting course. The assignment evaluated for the first
accounting course was due mid-session while the assignment for the second accounting course
was due early in the semester. Yet another possibility is that the assignment are not comparable
meaning that the assignment chosen in the first case may have been at a higher difficult level
than the one chosen for the next course.
Regardless of the issues discussed above, this exploratory study provides some initial
observations into the use of VALUE rubrics for assessing student progress on thinking and
analytical dimensions for quantitative online courses. The initial observations and information
gleamed warrant further investigation, and it should be tested with larger course samples and
course variety.
REFERENCES
Andrade, H.G. (2000). Using Rubrics to Promote Thinking and Learning. Educational Leadership, vol. 57, no.5.
Retrieved from http://www.ascd.org/publications/educational-leadership/feb00/vol57/num05/UsingRubrics-to-Promote-Thinking-and-Learning.aspx
Association of American Colleges and Universities. (2013.). Critical Thinking VALUE Rubric. Retrieved from
http://www.aacu.org/value/rubrics/pdf/CriticalThinking.pdf
Association of American Colleges and Universities. (2013.) Quantitative Literacy VALUE Rubric. Retrieved
from http://www.aacu.org/value/rubrics/pdf/QuantitativeLiteracy.pdf
Baroudi, Z. (2007). Formative assessment: Definition, elements, and role in instructional practice. Post Script:
Post Graduate Journal of Education Research, 8(1) pp. 37-48.
Formative versus Summative Assessments. (2012). Why’s and how’s of assessments. Carnegie Mellon
University. Retrieved from: http://www.cmu.edu/teaching/assessment/howto/basics/formativesummative.html
Fulcher, K. (2010). Student-centered learning Objectives. In the “Complete How-to Guide.” The Center for
Assessment & Research Studies. James Madison University.
Norton, L., & Pitt, E. (2011). Writing essays at university: A guide for students by students. Write Now Centre for
Excellence in teaching and learning. Retrieved from
http://www.writenow.ac.uk/assessmentplus/documents/WritingEssaysAtUni-11.pdf
Kottazs, R. (2005). Reasons for student non-attendance at lectures and tutorials: An analysis. Investigations in
University Teaching and Learning, 2(2), 53-59.
Johnson, E., & Jenkins, J. (2013). Formative and summative assessments. Retrieved from
http://www.education.com/reference/article/formative-and-summative-assessment/
223
Mathematical Association of American. (2013). Quantitative reasoning for college graduates: A complement to
the standards. Retrieved from http://www.maa.org/past/ql/ql_toc.html
Program Assessment Guide. (2012). Program learning outcomes manual. Center of Assessment. Trident
University International.
Shepard, L. A. (2000). The role of assessment in a learning culture. Educational Researcher 29(7), 4-14.
Retrieved from the worldwide web on 2/27/2012 at:
http://dante.udallas.edu/DallasDiocese/unit/Readings/Shepard_Role_of_Assessment.pdf
Striven, M., & Paul, R. (1987). Critical thinking as defined by the National Council for Excellence, 1987.
Retrieved from http://www.criticalthinking.org/pages/defining-critical-thinking/766
WASC Program Learning Outcomes. (2013). Rubric for assessing the quality of academic program learning
outcomes. Retrieved from
http://www.wascsenior.org/findit/files/forms/Program_Learning_Outcomes_Rubric_4_08.pdf
WASC on Critical Thinking and Quantitative Reasoning. Measuring thinking worldwide. Retrieved from
http://www.insightassessment.com/Uses/Client-Solutions/WASC-on-Critical-Thinking-and-QuantitativeReasoning
Wolf. K. & Stevens, E. (2007). The Role of rubrics in advancing and assessing student learning. The Journal of
Effective Teaching, 17(13-14). Retrieved from http://uncw.edu/cte/et/articles/vol7_1/Wolf.pdf
224
EMOTIONAL INTELLIGENCE DRIVEN
QUALITATIVE MARKET RESEARCH
Manish Sharma
Delhi Technological University
Pritam.B.Sharma
Delhi Technological University
Shikha N. Khera
Delhi Technological University
ABSTRACT
This paper seeks to investigate the role of emotional intelligence in doing qualitative
market research. This research is done with the aim of enriching commonly used qualitative
research methodologies for doing market research with emotional intelligence. A one week
course on emotional intelligence was attended by 48 qualitative researchers while working in
different market research companies in India. After three months of this course, authors
moderated 8 focus groups (in a group of 6) among these researchers and conducted in-depth
interviews of 44 out of these 48 researchers. It is found that qualitative researchers, who
attended one week course on emotional intelligence, found it easier to sail through minds of
consumer while conducting market research. These qualitative researchers reported that
emotional intelligence helped them to get better insights and in understanding consumer
behavior in a better manner. Companies are turning every stone to understand their existing
and prospective customers; and are getting this done with help of market research companies
in addition to their own researchers. Not just the needs of customers but they are trying to
know everything about the customers and are using qualitative research methods like
Ethnographies, Focus groups, In-Depth Interviews. Using emotional intelligence can enrich
these methods and can increase the output of qualitative market research projects.
225
ANALYZING SUPERVISORY COMMUNICATION
COMPETENCY: AN APPLICATION OF
MESSAGE DESIGN LOGICS THEORY
Kathryn S. O’Neill
Sam Houston State University
Geraldine E. Hynes
Sam Houston State University
Heather Wilson
Sam Houston State University
Organizations in the U.S. invested $133.4 billion in 2011 to train supervisors to work
effectively with their direct reports (ASTD, 2011). Because so much of management consists
of talk, most of this training centers on improving communication. Often, organizations
promote those who are best at their work into positions of overseeing the work of others,
expecting that they will be able to transfer their knowledge and skill to their direct reports. To
accomplish this transfer, however, requires skill and ability in delivering feedback, both
reinforcing and corrective. Most of us understand how to deliver a reinforcing statement that
compliments performance, but performance and effectiveness vary widely when it comes to
corrective feedback designed to achieve a change in someone else’s behavior. If organizations
have a way to determine at a pre-supervisory stage who of their candidates is already skilled as
a communicator of corrective feedback, likelihood increases of improved performance and
productivity.
Feedback of performance results is a critical phenomenon in all work settings because
it affects the course and success of organizations. Scholars have noted its effectiveness in
producing improvements in a number of organizational areas, including tardiness and
absenteeism, customer service, safety (Balcazar, Hopkins & Suarez, 1986), productivity
increases (Wilk & Redmond, 1990), and job performance in general (DeGregorio & Fisher,
1988; Davenport, 1985).
No organization can survive and prosper with below par job
performance, and feedback is essential to maintaining satisfactory performance (Barry &
Watson, 1996).
In general, the position of the supervisor as a primary and important source of feedback
is well established by research (Vecchio & Sussman, 1991; Becker & Klimoski, 2989).
Sullivan (1988) asserted that language and speech acts are the heart of motivating employees,
and previous research substantiates that good communication is essential to managing people
well (Penley, Alexander, Jernigan & Henwood, 1991; Luthans and Larson, 1986).
Communication scholars define corrective feedback as a “regulative message,” delivered with
the object of changing behavior versus changing attitudes, opinions, or beliefs (O’Keefe &
226
McCornack, 1987; Seibold, Cantrill & Meyers, 1985). Feedback given by a supervisor to a
subordinate is, thus, goal-oriented communication.
Both communication (O’Keefe & McCornack, 1987) and management and
organizational behavior scholars (Dugan, 1989; Podsakoff & Farh, 1989; Liden, Ferris &
Dienesch, 1988) note that giving corrective feedback poses more problems to the supervisor
than reinforcing feedback. In so critical an area of supervisory competence, then, having an
explanation and a methodology to assess the abilities of the communication could improve
outcomes for job incumbents, their direct reports, and the organization.
O’Keefe and McCornack’s (1987) theories of Message Design Logic and Message
Goal Structure seek to answer the question of why some situations, such as regulative
messages, elicit enormous variant in messages. O’Keefe and Delia (1988) agree with other
scholars that successful communicators form message using skills associated with the task at
hand. They further state that, as communicators become more sophisticated about the ways in
which they communicate, they begin to appreciate that they may call upon characteristics of
the audience to accomplish their purposes. In a corrective feedback situation, the desire to
improve performance would motivate the supervisor to compose and deliver a message, but
this goal does not automatically specify the form of the message. The supervisor would make
choices about message formation dictated by his/her communication skill level. This skill
level is, in turn, bound up with individual concepts of how communication processes operate,
including specific problems posed by specific targets.
O’Keefe (1988) proposed that messages arise from three fundamental premises in
reasoning about communication and called them Message Design Logics. Communicators use
these premises to reason from goals to message, that is, to consider what they wish their
communication to accomplish and to form a suitable message. She theorized three levels of
premises, Expressive, Conventional and Rhetorical, and asserted that they formed a
developmental progression with each level a prerequisite to the next.
O’Keefe (1988) tested Message Design Logics and related theory regarding multifunctional goals with students by posing a situation in which the respondents produced a
message to change the behavior of an under-performing group member in a class project.
Most recently, researchers in the healthcare field have used the theory to explore message
formation and effectiveness (Caughlin, Brashers, Ramey, Kosenko, Donovan-Kicken & Bute,
2008; Peters, 2005), but no research has tested the theory with supervisors in the workplace.
This gap is a significant omission, considering the potential advantage to improving selection
and training.
This presentation reports on a pilot study of Message Design Logics in a group of
working supervisors.
The study collected messages in response to a typical corrective
feedback situation centered on tardiness to work. The design of the study followed O’Keefe’s
and McCornack’s (1987) design, and the analysis classified messages collected for level of
premises and goal structure with a view towards expanding the study to include additional
supervisors from multiple industry settings, and adding in a procedure for assessing perceived
effectiveness of the messages.
The presenters, who are co-investigators, will present and explain Message Design
Logics and report on the progress and findings of the study to date.
227
REFERENCES
American Society for Training and Development (ASTD). (2011). 2011 State of the industry
report. Alexandria, VA: ASTD.
Balcazar, F., Hopkins, B. & Suarez, Y. (1986). A critical objective review of performance
feedback. Journal of Organizational Behavior Management, 7(3/4). 65-89.
Barry, B. & Watson, M. R. (1996). Communication aspects of dyadic social influence in
organizations: A review and integration of conceptual and empirical developments. In
B. Burleson (ed.), Communication Yearbook, 19 (pp. 269- 317). Thousand Oaks, CA:
Sage.
Becker, T. & Klimoski, R. (1989). A field study of the relationship between the organizational
feedback environment and performance. Personnel Psychology, 42. 343-356.
Caughlin, J. P., Brashers, D. E., Ramey, M. E., Kosenko, K. A., Donovan-Kicken, E., & Bute, J.
J. (2008). The message design logics of responses to HIV disclosures. Human
Communication Research 34. 655-684.
Davenport, D. (1985). The effects of supervisors’ level of interpersonal skill and feedback
valence on supervisee self-efficacy judgments, subsequent performance, and task
satisfaction (Doctoral dissertation, Georgia State University, 1985). Dissertation
Abstracts International, 46(9), 3250B.
DeGregorio, M. & Fisher, C. (1986). Providng performance feedback: Reactions to alternate
methods. Journal of Management, 14. 605-616.
Dugan, K. (1989). Ability and effort attributions: Do they affect how managers
communication performance feedback information? Academy of Management Journal,
32. 87-114.
Liden, R., Ferris, G. & Dienesch, R. (1988). The influence of causal feedback on subordinate
reactions and behavior. Group & Organizational Studies, 13(3). 348-373.
Luthans, F. & Larson, J. (1986). How managers really communicate. Human Relations, 39.
161-178.
O’Keefe, B. (1988). The logic of message design: Individual differences in reasoning about
communication. Communication Monographs, 55 (March). 80-103.
O’Keefe, B. & Delia, J. (1988). Communicative tasks and communicative practices: The
development of audience-centered message production. In B. A. Rafoth and D. A.
Rubin (Eds.), The social construction of written communication (pp. 70-95). Norwood,
NJ: Ablex Publishing Corp.
O’Keefe, B. & McCornack, S. (1987). Message design logic and message goal structure:
Effects on perceptions of message quality in regulative communication situations,.
Human Communication Research, 14(1). 68-92.
Penley, L., Alexander, E., Jernigan, I. & Henwood, C. (1991). Communication abilities of
managers: The relationship to performance. Journal of Management, 17. 57-76.
Peters, M. (2005, November). Message design logic and comforting communication in a
chronic illness context: Introducing a message elicitation task and adapted coding
228
scheme. Paper presented at the annual convention of the National Communication
Association, Boston, MA.
Podsakoff, P. & Farh, J. (1989). Effects of feedback sign and credibility on goal setting and
task performance. Organizational Behavior and Human Decision Processes, 44. 4567.
Seibold, D., Carntrill, J. & Meyers, R. (1985). Communication and interpersonal influence.
In M. L. Knapp and G. R. Miller (Eds.) Handbook of interpersonal communication (pp.
551-611). Beverly Hills, CA: Sage Publications.
Sullivan, J. (1988). Three roles of language in motivation theory. Academy of Management
Review, 13(1). 104-115.
Vecchio, R. & Sussman, M. (1991). Choice of influence tactics: Individual and
organizational determinants. Journal of Organizational Behavior, 12. 73-80.
Wilk, L. & Redmon, W. (1990). A daily-adjusted goal-setting and feedback procedure for
improving productivity in a university admissions department. Journal of
Organizational Behavior Management, 11(1). 55-75.
229
THE RELATIONSHIP BETWEEN ADOLESCENT
PERSONALITY AND LEADERSHIP
Lucinda Parmer
University of Houston-Downtown
ABSTRACT
Personality and leadership in adolescents is a complex research area. There is an
abundance amount of research in adults in the area of personality and leadership; however in
adolescents there is a need for further development and analysis. This paper examines
personality and leadership in adolescents utilizing the Mini-International Personality Item
Pool (McCrae & Costa, 1987) and the Roet’s Rating Scale for Leadership (Roets, 1997)
instruments to conduct a multiple regression research analysis. It was found that extraversion,
gender (female), and the number of clubs and organizations the participant belonged to were
significant factors in self-ratings of leadership.
INTRODUCTION
Leadership is a business discipline regarding several related disciplines (e.g.
management, organizational behavior), as well as, facets which involve different theories
starting with the Great Man Theory (Carlysle, 1850) to GLOBE (House et al, 1994).
Arguments have been made regarding whether leaders are born or made. If leaders are born,
does it begin at birth? If leaders are made, does it begin at birth through the experiences the
person goes through in life? This debate will surely go on for many years to come. This study
examines the relationship between adolescent personality and leadership.
When it comes to examining leadership in adolescents, the first notion is to review
scholastic grades, or the talents of the individual, such as, whether the person is a star athlete,
or student council president, for example. Often times, within these scenarios, it is perceived
that the adolescent has leadership abilities, and rightfully so, because it does take leadership
qualities to be a leader on a sports team or within a club or organization. It takes determination
to win the game, self-confidence to play and participate, and sociability skills to effectively
function within a group or team. When it comes to examining personality traits in adolescents,
the most known traits are whether an adolescent is outgoing or quiet, mean or nice, or whether
the adolescent makes outstanding versus mediocre grades in school. These are some of the
more observable characteristics. However, adolescents are encompassed with many emotionaltype personality traits, for example, are the adolescents happy or funny, or pushy and calm?
These are just a few of the varying different degrees of behaviors that can surface within an
adolescent at such an unpredictable time in his/her life.
REVIEW OF THE LITERATURE
The literature shows through various studies found through teacher evaluations that the
more open to new experiences, conscientious, extraverted, and agreeable the students were the
230
more likely the students could adjust well to school (Graziano & Ward, 1992). Additional
studies found that the more peers had expectations; the more likely their goals would be
realized (Filisetti, Looney, & Wentzel, 2007). Another study found that the more anti-social
the adolescent was, the less likely he/she would adhere to group interactions (Bates, et al.,
2003). Various studies found that males had more anxiety, and had more negative attitudes
than females (Kenny, 2009; Costanzo et al., 2009; and Reynolds, Riccio, & Sullivan, 2008).
Alternate studies showed that boys and girls with career goals had higher self-esteem levels
(Chiu, 1990). One study found that the age of the older sibling was related to projected goal
outcomes (Hildy Ross et al., 2006). Another study found that the older the participant, the
more prone to emotional problems he/she had (Sellers et al., 2006).
Numerous studies found that older children were more apt to instigate conflict over
their younger siblings Older siblings were also more likely to blame their younger siblings for
wrongdoings (Hildy Ross et al., 2006). Another study found that the specific birth order of the
sibling contributed significantly to the level of sociability skills the participant portrayed
(Daniels, 1986). Several studies found within the African-American culture, the more
aggressive the participant; the more the participant pressured his/her peers (Costanzo et al.,
2009). An additional study found the higher socio-economic status of the participant, the
harder it was for the participant to stay focused. Additionally, the study found that the higher
the socio-economic status of the individual, the happier the individual was (Masten, 1986).
Family income was found to be a significant factor on getting along with others (Powell &
Steelman, 1985). Lastly, it was found that the higher the socio-economic status of the
participant, the less self-esteem he/she had (Huebner & Mancini, 2004).
An additional analysis indicated that group members had significantly higher scores on
sociability, and positive socio-metric nominations than did nonmembers (Chang et al., 2003).
An additional study found that the more transformational of a leader the participant was, the
more he/she rated having effective peer relationships, and more satisfaction with his/her peer
relationships (Barling et al., 2000). Another study found females scored higher over males on
perceived competence (Filisetti, Looney, & Wentzel, 2007). Another study found that boys had
lower scores on leadership than did girls (Chang et al., 2003). One study found that older
siblings’ age was related to the strategies used by older and younger siblings. Younger siblings
were less likely to suggest plans, and more likely to request assent to plans, and to agree to
plans (Hildy Ross et al., 2006). Another study found significant differences between the age of
the participants, empathic skills, and social confidence (Oberklaid et al., 2001). An additional
study found that biracial black/white adolescents showed more self-deprecation, and feelings
of alienation, over the mono-racial counterparts (Cheng & Lively, 2009).
Another study showed that Hispanic students out-performed White students during the
twelfth-grade (Battle & Pastrana Jr., 2007). Another study found that Black/White adolescents
are significantly more likely to feel alienated in school than are mono-racial White adolescents
(Cheng & Lively, 2009). Another study (Bohnert, et al, 2008) found, in regards to, AfricanAmerican adolescents; the more motivated, and engaged the participant was, the more
confident the person felt, and the more motivated, and engaged the participant was, the less
alienated the person felt. Lastly, one study found the higher the socio-economic status, the
higher the White students out-performed the Hispanic students for eight-grade status (Battle &
Pastrana Jr., 2007).
231
METHODOLOGY
Overview
The current research examined the relationship between adolescent personality, and
leadership. The personality assessment instrument ratings will measure the Big Five (McCrae
& Costa, 1987) personality traits within the sample including, conscientiousness,
agreeableness, neuroticism, openness to new experiences, and extraversion. The Roets Rating
Scale for Leadership (Roets, 1997) was used to measure how the student self-rates on differing
leadership scales. A multiple regression analyzed the results of the relationship between the
personality and leadership in adolescents.
Participants
The sample for this research consisted of a total of five groups in public and private
sectors in the greater Gulf Coast area. The groups included Galena Park High (Galena Park,
Texas); St. Pius X High School (Houston, Texas); Girl Scouts Troops (Houston, Texas);
Houston Mayor’s Youth Council, and friends in family (Alabama/Florida). The total sample
consisted of 264 adolescents. Sample subjects were 43% male and 57% female, with 72%
Hispanic, 17% Caucasian, and 11% were classified as Other. The mean age was 15.5 years.
Instruments
The research survey was given in two forms, administered in person with paper
surveys, and administered online at www.surveymonkey.com. The survey was constructed of
three sections, the demographic section, Mini-International Personality Item Pool Assessment
(Mini-IPIP), based on McCrae and Costa (1997) rating of personality and the Roets Rating
Scale for Leadership (RRSL), from Roets, 1997. The RRSL is a self-rating scale for students
ages 8-18 years old. It is a measurement for students to rate themselves. It measures leadership
(already active, or in the daydream stage), ambition, and desires.
Research Design
This study was a multiple regression analysis. Research area one addressed the
relationship between the participant’s personality, as defined by the Big Five Factor Model
(McCrae & Costa, 1987) of personality, and the participants’ self-rating of leadership, based on
the Roet’s Rating Scale for Leadership (Roets, 1997). Research area two examined adolescent
leadership and predictors of personality.
NULL HYPOTHESIS
H1:
Ho2:
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and overall leadership.
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and critical thinking leadership.
232
Ho3:
Ho4:
Ho5:
Ho6:
Ho7:
Ho8:
Ho9:
Ho10:
Ho11:
Ho12:
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and guidance leadership.
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and courage leadership.
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and charismatic leadership.
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and tolerant leadership.
There is no relationship between adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and willpower leadership.
There is no relationship between adolescents’ leadership, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and conscientiousness.
There is no relationship between adolescents’ leadership, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and agreeableness.
There is no relationship between adolescents’ leadership, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and neuroticism.
There is no relationship between adolescents’ leadership, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and openness to new experiences.
There is no relationship between adolescents’ leadership, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, extraversion.
EXPLORATORY FACTOR ANALYSIS
An exploratory factor analysis was conducted using a Principal Components Method
for the Roet’s Rating Scale for Leadership (Roets, 1987). Six components were found with
an Eigenvalue greater than .5 or less than -.45. The first component, which measured critical
thinking leadership, had an Eigenvalue of 3.09 which explained 11.88% of the variance.
Using a Varimax rotation, five questions loaded on this component with an Eigenvalue vector
score greater than .45 or less than -.45. The second component, which measured guidance
leadership had an Eigenvalue of 2.34 and explained 9% of the variance. Using a Varimax
rotation, three questions loaded on this component with an Eigenvalue vector score greater
than .45 or less than -.45. The third component, which measured courage leadership had an
Eigenvalue of 2.32 and explained 9% of the variance. Using a Varimax rotation, four
questions loaded on this component with an Eigenvalue vector score greater than .45 or less
than -.45. The fourth component, which measured charismatic leadership had an Eigenvalue
of 2.21 and explained 8% of the variance. Using a Varimax rotation, four questions loaded on
this component with an Eigenvalue vector score greater than .45 or less than -.45. The fifth
component, which measured tolerant leadership had an Eigenvalue of 1.93 and explained 7%
of the variance. Using a Varimax rotation, five questions loaded on this component with an
Eigenvalue vector score greater than .45 or less than -.45. Table 1 shows the rotated
component matrix of the six components of leadership including critical thinking leadership,
233
guidance leadership, courage leadership, charismatic leadership, tolerant leadership, and
willpower leadership. Table 1 shows the rotated component matrix of the exploratory factor
analysis.
Table 1
ROTATED COMPONENT MATRIX
L23
L21
L3
L24
L22
L20
Thinking
.713
.584
.496
.493
.478
.468
Guidance
.076
.230
-.021
.153
.130
.296
Courage
.179
.006
.124
.365
.180
.044
Charismatic
.120
.157
-.016
.265
.222
.299
Tolerant
.119
.061
.493
.018
.250
.145
Willpower
-.021
.069
.226
-.335
.084
.320
L10
L9
L8
.193
.304
.051
.788
.782
.515
.088
.050
.347
.111
.024
.118
.065
.047
.450
.123
.122
.010
L13
L1
L11
L4
.281
.022
.352
.004
.181
-.012
.107
.071
.677
.585
.535
.526
.030
.037
.055
.389
-.041
.216
.112
-.119
-.069
.204
.248
-.128
L5
L19
L15
L6
.168
.356
.408
-.140
.048
-.056
.265
.144
.283
-.053
.115
.064
.628
.599
.470
.469
.096
.221
-.096
.014
.079
-.051
.132
.551
L17
L16
L12
.148
.419
.063
.069
.040
.370
.020
.006
.405
.004
.333
.159
.719
.502
.454
.078
.037
.138
L7
L2
.284
.046
.177
-.036
.045
.424
-.043
.170
.055
.185
.680
.476
L26
L18
L14
L25
.356
.235
.400
.008
.175
.214
.306
.402
.182
.102
.342
.066
.053
.431
.340
.331
.167
.113
.032
.425
.200
.182
.086
-.110
234
FINDINGS
Ho1:
There is no relationship between the adolescents’ personality, age, gender, ethnicity, number of
clubs and organizations, number of older siblings, number of younger siblings, and the number
of computers at home, and overall leadership.
In order to test null hypothesis 1, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and overall leadership. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
personality dimensions of conscientiousness, agreeableness, neuroticism, openness to new
experiences, and extraversion. The stepwise method was used for both blocks.
Number of clubs and organizations explained 12% of the variance in leadership scores
2
(R = .12, β = .27, rp = .27, p = .00). The partial correlation of .27 indicated that the higher the
number of clubs and organizations the adolescent belonged to, the higher the adolescent rated
him/herself as a leader. The number of younger siblings explained an additional 3% of the
variance in leadership scores (ΔR2 = .03, β = -.20, rp = -.21, p = .00). The partial correlation of
-.21 indicated that the higher the number of younger siblings the adolescent had, the lower the
adolescent rated him/herself as a leader. Gender explained an additional 3% of the variance in
leadership scores (ΔR2 = .03, β = .18, rp = .19, p = .00). The results of a t-test, t(264) = -3.371,
p = .00, found that girls (M2 = 52.04) rated themselves higher on leadership than boys
(M1 = 46.57). Age explained an additional 1% of the variance in leadership scores (ΔR2 = .01,
β = .14, rp = .14, p = .05). The beta weight of .14 indicated that the older the adolescent was,
the higher the adolescent rated him/herself as a leader. Extraversion explained an additional
2% of the variance in leadership scores (ΔR2 = .02, β = .13, = .15, p = .02). The partial
correlation of .15 indicated that the higher the adolescent scored in extraversion, the higher the
adolescent rated him/herself as a leader.
Ho2:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, the number of computers
at home, and critical thinking leadership.
In order to test null hypothesis 2, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, the number of computers
at home, and critical thinking leadership. Two blocks of data were used in the regression.
Block 1 contained age, gender, ethnicity, number of number of clubs and organizations,
number of older siblings, number of younger siblings, and the number of computers at home.
Block 2 contained the personality dimensions of conscientiousness, agreeableness,
neuroticism, openness to new experiences, and extraversion. The stepwise method was used in
both blocks.
Number of clubs and organizations explained 11% of the variance in critical thinking
leadership scores (R2 = .11, β = .29, rp = .31, p = .00). The partial correlation of .31 indicated
that the higher number of clubs and organizations the adolescent belonged to, the higher the
adolescent rated him/herself as a critical thinking leader. Gender explained an additional 6% of
the variance in critical thinking leadership (ΔR2 = .06, β = .27, rp = .29, p = .00).The results of a
t-test, t(264) = -4.812, p = .00, found that girls (M2 = 13.47) rated themselves higher on critical
thinking leadership than boys (M1 = 11.21). The number of younger siblings explained an
235
additional 3% of the variance in critical thinking leadership scores (ΔR2 = .03, β = -.17, rp = .19, p = .00). The partial correlation of -.19 indicated that the higher the number of younger
siblings the adolescent had, the lower the adolescent rated him/herself as a critical thinking
leader.
Ho3:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, the number of computers
at home, and guidance leadership.
In order to test null hypothesis 3, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, the number of computers
at home, and guidance leadership. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
personality dimensions of conscientiousness, agreeableness, neuroticism, openness to new
experiences, and extraversion. The stepwise method was used in both blocks.
Number of clubs and organizations explained 7% of the variance in guidance leadership
scores (R2 = .07, β = .26, rp = .26, p = .00). The partial correlation of .26 indicated that the
higher the number of clubs and organizations the adolescent belonged to, the higher the
adolescent rated him/herself as a guidance leader. Extraversion explained an additional 2% of
the variance in guidance leadership (ΔR2 = .02, β = .13, rp = .13, p = .04). The partial
correlation of .13 indicated that the higher the adolescent scored on extraversion, the higher the
adolescent rated him/herself as a guidance leader.
Ho4:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and courage leadership.
In order to test null hypothesis 4, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and courage leadership. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
personality dimensions of conscientiousness, agreeableness, neuroticism, openness to new
experiences, and extraversion. The stepwise method was used on both blocks.
Number of younger siblings explained 2% of the variance in courage leadership scores
(R2 = .02, β = -.15, rp = -.15, p = .02). The partial correlation of -.15 indicated that the higher
number of younger siblings the adolescent had, the lower the adolescent rated him/herself as a
courage leader. Extraversion explained an additional 2% of the variance in courage leadership
scores (ΔR2 = .02, β = .15, rp = .15, p = .00). The partial correlation of .15 indicated that the
higher the adolescent scored on extraversion, the higher the adolescent rated him/herself as a
courage leader.
Ho5:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and charismatic leadership.
In order to test null hypothesis 5, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, and number of computers
at home. Two blocks of data were used in the regression. Block 1 contained age, gender,
ethnicity, number of clubs and organizations, number of older siblings, number of younger
236
siblings, and number of computers at home. Block 2 contained the personality dimensions of
conscientiousness, agreeableness, neuroticism, openness to new experiences, and extraversion.
The stepwise method was used in both blocks.
The number of clubs and organizations explained 8% of the variance in charismatic
leadership scores (R2 = .08, β = .19, rp = .19, p = .00). The partial correlation of .19 indicated
that the higher the number of clubs and organizations the adolescent belonged to, the higher the
adolescent rated him/herself as a charismatic leader. Gender explained an additional 2% of the
variance in charismatic leadership scores (ΔR2 = .02, β = .15, rp = .16, p = .02). The results of a
t-test, t(264) = -2.61, p = .01, found that girls (M2 = 8.23) rated themselves higher on
charismatic leadership than boys (M1 = 7.40). The number of younger siblings explained an
additional 2% of the variance in charismatic leadership scores (ΔR2 = .02, β = -.14, rp = -.15,
p = .04). The partial correlation of -.15 indicated that the higher number of younger siblings the
adolescent had, the lower the adolescent rated him/herself as an charismatic leader. Age
explained an additional 2% of the variance in charismatic leadership scores (ΔR2 = .02, β = .15,
rp = .15, p = .03). The beta weight of .15 indicated that the older the adolescent was, the higher
the adolescent rated him/herself as a charismatic leader. Extraversion explained an additional
2% of the variance in charismatic leadership scores (ΔR2 = .02, β = .15, rp = .16, p = .01). The
partial correlation of .16 indicated that the higher the adolescent scored in extraversion, the
higher the adolescent rated him/herself as a charismatic leader. Openness to new experiences
explained an additional 2% of the variance in charismatic leadership scores (ΔR2 = .02, β = .13,
rp = .14,
p = .03). The partial correlation of .14 indicated that the higher the adolescent scored in
openness to new experiences, the higher the adolescent rated him/herself as a charismatic
leader.
Ho6:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and tolerant leadership.
In order to test null hypothesis 6, a multiple regression was conducted to predict the
relationship between the adolescents’ personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and tolerant leadership. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
personality dimensions of conscientiousness, agreeableness, neuroticism, openness to new
experiences, and extraversion. The stepwise method was used in both blocks.
The number of clubs and organizations explained 9% of the variance in tolerant
leadership scores (R2 = .09, β = .23, rp = .22, p = .00). The partial correlation of .23 indicated
that the higher the number of clubs and organizations the adolescent belonged to, the higher the
adolescent rated him/herself as a tolerant leader. Gender explained an additional 2% of the
variance in tolerant leadership scores (ΔR2 = .02, β = .16, rp = .17, p = .02). The results of a ttest, t(264) = -2.86, p = .01, found that girls (M2 = 9.27) rated themselves higher on tolerant
leadership than boys (M1 = 8.09). The number of younger siblings explained 2% of the
variance in tolerant leadership scores (ΔR2 = .02, β = -.13, rp = -.13, p = .03). The partial
correlation of -.13 indicated that the higher the number of younger siblings the adolescent had,
the lower the adolescent rated him/herself as a tolerant leader. The number of computers at
home explained an additional 2% of the variance in tolerant leadership scores (ΔR2 = .02, β =
.13, rp = .13, p = .04). The partial correlation of .13 indicated that the higher the number of
237
computers the adolescent had at home, the higher the adolescent rated him/herself as a tolerant
leader.
Ho7:
There is no relationship between personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and willpower leadership.
In order to test null hypothesis 7, a multiple regression was conducted to predict the
relationship between the adolescent’s personality, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and willpower leadership. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
personality dimensions of conscientiousness, agreeableness, neuroticism, openness to new
experiences, and extraversion. The stepwise method was used for both blocks.
The number of clubs and organizations explained 5% of the variance in willpower
leadership scores (R2 = .05, β = .20, rp = .20, p = .00). The partial correlation of .20 indicated
that the higher the number of clubs and organizations the adolescent belonged to, the higher the
adolescent rated him/herself as a willpower leader. The number of younger siblings explained
an additional 2% of the variance in willpower leadership scores (ΔR2 = .02, β = -.14, rp = -.15,
p = .02). The partial correlation of -.15 indicated that the higher number of younger siblings the
adolescent had, the lower the adolescent rated him/herself as a willpower leader. Openness to
new experiences explained an additional 2% of the variance in willpower leadership scores
(ΔR2 = .02, β = .12, rp = .13, p = .04). The partial correlation of .13 indicated that the higher the
adolescent scored in openness to new experiences, the higher the adolescent rated him/herself
as a willpower leader.
Ho8:
There is no relationship between leadership, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and conscientiousness.
In order to test null hypothesis 8, a multiple regression was conducted to predict the
relationship between leadership, age, gender, ethnicity, number of clubs and organizations,
number of older siblings, number of younger siblings, number of computers at home, and
conscientiousness. Two blocks of data were used in the regression. Block 1 contained age,
gender, ethnicity, number of clubs and organizations, number of older siblings, number of
younger siblings, and number of computers at home. Block 2 contained the leadership
subscales of critical thinking leadership, guidance leadership, courage leadership, charismatic
leadership, tolerant leadership, and willpower leadership.
Age explained 8% of the variance in conscientiousness scores (R2 = .08, β = .11, rp =
.11, p = .02). The beta weight of .11 indicated that the older the adolescent was, the higher the
adolescent scored in conscientiousness. Charismatic leadership explained an additional 2% of
the variance in conscientiousness scores (R2 = .02, β = .15, rp = .15, p = .02). The partial
correlation of .15 indicated that the higher the adolescent scored in charismatic leadership, the
higher the adolescent scored in conscientiousness.
Ho9:
There is no relationship between leadership, gender, age, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and agreeableness.
In order to test null hypothesis 9, a multiple regression was conducted to predict the
relationship between leadership, age, gender, ethnicity, number of clubs and organizations,
number of older siblings, number of younger siblings, number of computers at home, and
agreeableness. Two blocks of data were used in the regression. Block 1 contained age, gender,
238
ethnicity, number of clubs and organizations, number of older siblings, number of younger
siblings, and number of computers at home. Block 2 contained the leadership subscales of
critical thinking leadership, guidance leadership, courage leadership, charismatic leadership,
tolerant leadership, and willpower leadership.
The number of clubs and organizations explained 5% of the variance in agreeableness
scores (R2 = .05, β = .17, rp = .17, p = .00). The partial correlation of .17 indicated that the
higher number of clubs and organizations the adolescent belonged to, the higher the adolescent
scored in agreeableness. Charismatic leadership explained an additional 2% of the variance in
agreeableness scores (R2 = .02, β = .15, rp = .15, p = .02). The partial correlation of .15
indicated that the higher the adolescent scored in charismatic leadership, the higher the
adolescent scored in agreeableness.
Ho10:
There is no relationship between leadership, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and neuroticism.
In order to test null hypothesis 10, a multiple regression was conducted to predict the
relationship between leadership, age, gender, ethnicity, number of clubs and organizations,
number of older siblings, number of younger siblings, number of computers at home, and
neuroticism. Two blocks of data were used in the regression. Block 1 contained age, gender,
ethnicity, number of clubs and organizations, number of older siblings, number of younger
siblings, and number of computers at home. Block 2 contained the leadership subscales of
critical thinking leadership, guidance leadership, courage leadership, charismatic leadership,
tolerant leadership, and willpower leadership. The stepwise method was used in both blocks.
Gender explained 7% of the variance in neuroticism scores (R2 = .07, β = .15, rp = .19, p =
.00). The results of a t-test,
t(264) = -2.212, p = .01, found that girls (M2 = 11.60) rated themselves higher on neuroticism
than boys (M1 = 10.92).
Ho11:
There is no relationship between leadership, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and openness to new experiences.
In order to test null hypothesis eleven, a multiple regression was conducted to predict the
relationship between leadership, age, gender, ethnicity, number of clubs and organizations,
number of older siblings, number of younger siblings, number of computers at home, and
openness to new experiences. Two blocks of data were used in the regression. Block 1
contained age, gender, ethnicity, number of clubs and organizations, number of older siblings,
number of younger siblings, and number of computers at home. Block 2 contained the
leadership subscales of critical thinking leadership, guidance leadership, courage leadership,
charismatic leadership, tolerant leadership, and willpower leadership. The stepwise method
was used for both blocks.
Ethnicity explained 2% of the variance in the openness to new experiences scores
(R2 = .07, β = -.11, rp = -.11, p = .03). A comparison of means indicated that “other” ethnicity
(M = 15.08) scored higher on openness to new experiences over the Hispanic ethnic group
(M = 14.13). Charismatic leadership explained an additional 2% of the variance in openness to
new experiences scores (ΔR2 = .02, β = .15, rp = .14, p = .02). The partial correlation of .14
indicated that the higher the adolescent rated him/herself on charismatic leadership, the higher
the adolescent scored in openness to new experiences.
Ho12:
There is no relationship between leadership, age, gender, ethnicity, number of clubs and
organizations, number of older siblings, number of younger siblings, number of computers at
home, and extraversion.
239
In order to test null hypothesis twelve, a multiple regression was conducted to predict the
relationship between leadership, age, gender, ethnicity, number of clubs and organizations,
number of older siblings, number of younger siblings, number of computers at home, and
extraversion. Two blocks of data were used in the regression. Block 1 contained age, gender,
ethnicity, number of clubs and organizations, number of older siblings, number of younger
siblings, and number of computers at home. Block 2 contained the leadership subscales of
critical thinking leadership, guidance leadership, courage leadership, charismatic leadership,
tolerant leadership, and willpower leadership. The stepwise method was used in both blocks.
Courage leadership explained 2% of the variance in extraversion. (R2 = .02, β = .30, rp = .15,
p = .02). The partial correlation of .15 indicated that the higher the adolescent rated him/herself
in courage leadership, the higher the adolescent scored in extraversion.
DISCUSSION OF FINDINGS
A person’s personality disposition is a complex element involving several factors of
conscientiousness, agreeableness, neuroticism, openness to new experiences, and extraversion,
among new and developing factors. Do personality factors, as well as, the demographic
characteristics of an individual predict leadership behaviors? Within research area one, this
study examined the relationship between adolescent personality and predictors of leadership
and found that ethnicity, the number of older siblings a person has, nor does the personality
dimensions of conscientiousness, agreeableness, and neuroticism predict leadership behaviors
in adolescents. However age, gender, number of clubs and organizations (group affiliation),
number of younger siblings, number of computers at home (SES indicator), openness to new
experiences, and extraversion did predict leadership behaviors in adolescent leaders. The
strongest predictors of leadership were the number of clubs and organizations the adolescent
belonged to, gender (Female), and extraversion. The number of younger siblings the adolescent
had was also a strong predictor with an inverse relationship. The higher the number of younger
siblings the adolescent had, the lower the adolescent rated him/herself as a leader.
Females rated themselves higher as leaders than boys. An ANOVA post hoc analysis
indicated that girls rated themselves higher as leaders on 11 of the 26 items. The higher the
number of clubs and organizations the participant belonged to, the higher the participant rated
him/herself in overall leadership, critical thinking leadership, guidance leadership, charismatic
leadership, tolerant leadership, and willpower leadership. The higher the participant scored in
extraversion, the higher the participant rated him/herself in overall leadership, guidance
leadership, courage leadership, and charismatic leadership. An ANOVA post hoc analysis
showed that the St. Piux X High School group (Student Council and Honors Students) scored
higher on overall leadership, openness to new experiences, conscientiousness, extraversion,
and agreeableness.
In regards to research area two, the relationship between adolescent leadership and
predictors of personality; age, gender (Female), number of clubs and organizations, charismatic
leadership, and courage leadership were the strongest predictors of personality. The older the
participant was, the higher the participant scored in conscientiousness. The higher the
participant rated him/herself on charismatic leadership, the higher the participant scored on
conscientiousness, agreeableness, and openness to new experiences. The higher the number of
clubs and organizations the adolescent belonged to, the higher the adolescent scored on
agreeableness. Females scored higher on neuroticism. The “Other” race scored higher on
240
openness to new experiences over the Hispanic race; and the higher the participant scored on
courage leadership, the higher he/she scored on extraversion.
SUMMARY OF FINDINGS
In regards to research area one, the higher the number of clubs and organizations that
the adolescent belonged to strongly predicted leadership behaviors, as well as extraversion, and
gender (Female). The higher the number of younger siblings showed an inverse relation to
predicting leadership. In regards to research area two, charismatic leadership predicted the
personality dimensions of conscientiousness, agreeableness, and openness to new experiences.
LIMITATIONS OF FINDINGS
The limitations of this study included that the sample did a self-rating as a leader; the
sample base was a convenience sample which required parental consent; and the sample was
almost entirely Hispanic.
RECOMMENDATIONS FOR FUTURE RESEARCH
The recommendations for future research are to focus on other ethnicities, repeat the
study with different leadership instruments, and repeat the study with different age groups, for
example 11 – 14 year olds.
REFERENCES
Barling, J., Kelloway, K. E., & Zacharatos, A. (2000). Development and effects of transformational leadership in
adolescents. The Leadership Quarterly, 11(2), 211-224.
Bates, J. E., Criss, M. M., Dodge, K. A., Lansford, J. E., & Pettit, G. S. (2003). Friendship quality, peer group
affiliation, and peer antisocial behavior as moderators of the link between negative parenting and
adolescent externalizing behavior. Journal of Research on Adolescence, 13(2), 161-184.
Battle, J., & Pastrana, A., Jr. (2007). The relative importance of race and socioeconomic status among hispanic
and white students. Hispanic Journal of Behavioral Sciences, 29(1), 35-47.
Bean, S. M., & Karnes, F. A. (1996). Leadership and the gifted. Focus on Exceptional Children, 29(1), 1-12.
Benford, M. W., Coleman, M., Dollar, K. M., Kibler, J. L., Lott, L., Ma, M., . . . Samuels, D. (2008). The
relationship of character strengths to sexual behaviors and related risks among African-American
adolescents. International Journal of Behavioral Medicine, 15, 319-327.
Bennis, W. (n.d.). Introduction to the revised edition, 2003. In On becoming a leader (pp. XXV-XXVI)
[Introduction]. Philadelphia, PA: Basic books.
Bohnert, A. M., Kolmodin, K. E., Lakin, B. L., & Richards, M. H. (2008). Young urban African American
adolescents’ experience of discretionary time activities. Journal of Research on Adolescence, 18(3), 517539.
Chan, D.W. (2000). Assessing leadership among Chinese secondary students in Hong Kong: The use of the Roets
Rating Scale for Leadership. Gifted Child Quarterly, 44(2), 115-122.
241
Change, L., Chen, X., & He, Y. (2003). The peer group as a context: Mediating and moderating effects on
relations between academic achievement and social functioning in Chinese children. Child Development,
74(3), 710-727.
Charbonneau, D., & Nicol, A. A. (2002). Emotional intelligence and leadership in adolescents. Personality and
Individual Differences, 33(7), 1101-1114.
Cheng, S., & Lively, K. J. (2009). Multiracial self-identification and adolescent outcomes: A social psychological
approach to the marginal man theory. Social Forces, 88(1), 61-98.
Chiu, L. (1990). The relationship of career goal and self-esteem among adolescents. Adolescence, 25(99).
Daniels, D. (1986). Differential experiences of siblings in the same family as predictors of adolescent sibling
personality differences. Journal of Personality and Social Pyschology, 51(2), 339-346.
Filisetti, L., Looney, L., & Wentzel, K. R. (2007). Adolescent prosocial behavior: The role of self-processes and
contextual cues. Child Development, 78(3), 895-910.
Graziano, W. G., & Ward, D. (1992). Probing the big five in adolescence: Personality and adjustment during a
developmental transition. Journal of Personality, 60(2), 425-439.
House, L., Teasley, M. L., & Tyson, E. (2007). Understanding leadership development in African American
youth. Journal of Human Behavior in the Social Environment, 15(2-3), 79-98.
Huebner, A. J., & Mancini, J. A. (2004). Adolescent risk behavior patterns: Effects of structured time-use,
interpersonal connections, self-esteem characteristics, and socio-demographic influences. Child and
Adolescent Social Work, 21(6), 647-666.
Karnes, F.A., & Shaunessy, E. (2004). Instruments for measuring leadership in children and youth. Gifted Child
Today, 27(1), 42-47.
Kenny, M. C. (2009). Children’s self-concept: A multicultural comparison. Professional School Counseling,
12(3), 207-212.
Lee, K. (2009). The bidirectional effects of early poverty on children’s reading and home environment scores:
Associations and ethnic differences. Social Work Research, 33(2), 79-94.
Lewis, R. L., Copeland-Linder, N., Martin, P. P., & Sellers, R. M. (2006). Racial identity matters: The
relationship between racial discrimination and psychological functioning in african american adolescents.
Journal of Research on Adolescence, 16(2), 187-216.
Oberklaid, F., Prior, M., Sanson, A., & Smart, D. (2001). Longitudinal predictors of behavioral adjustment in preadolescent children. Australian and New Zealand Journal of Psychiatry, 35, 297-307.
Ross, H., Ross, M., Stein, N., & Trabasso, T. (2006). How siblings resolve their conflicts: The importance of first
offers, planning, and limited opposition. Child Development, 77(6), 1730-1745.
Smart, R. G. (1965). Social-group membership, leadership, and birth order. The Journal of Social Psychology, 67,
221-225.
Wentzel, K. R. (1991). Relations between social competence and academic achievement in early adolescence.
Child Development, 62, 1066-1078.
Ying, Y.-W., & Han, M. (2008). Variation in the prediction of cross-cultural adjustment by ethnic density: A
longitudinal study of taiwanese students in the united states. College Student Journal, 42(4), 1075-1086.
242
HOW DO PERCEIVED USEFULNESS OF
E-TEXTBOOK-AND-HOMEWORK SYSTEMS
CORRELATE WITH STUDENTS’ PERSONALITY
TRAITS OF INTROVERSION AND THINKING?
Joseph S. Mollick
Texas A&M University - Corpus Christi
Robert Cutshall
Texas A&M University - Corpus Christi
ABSTRACT
Using the theoretical literature on personality and temperament, technology
acceptance model and task technology fit model, we theoretically build and empirically test a
research model to explore how perceived usefulness of e-textbook and homework systems for
business statistics courses correlate with the strength of students’ personality traits of
introversion and thinking.
INTRODUCTION
Many publishers are offering electronic textbooks and homework systems or e-learning
systems targeting learners and educators in general, especially in the higher education industry.
These e-learning systems can be viewed and analyzed as special types of information systems
that directly relate to learners, educators, authors and publishers. The writers of this article are
interested to understand how two dimensions of psychological preferences or traits-introversion and thinking-- relate to how students perceive the usefulness of an Internet-based,
electronic textbook and homework system used in a business statistics course at a business
school in the USA. The personality traits of introversion and thinking are common across
many Jungian personality assessment tools including the popular Myers-Briggs Type Indicator.
The Myers-Briggs Type Indicator (MBTI) assessment is a psychometric questionnaire
designed to measure psychological preferences in how people perceive the world and make
decisions (Myers and Myers, 1995).
LITERATURE REVIEW
There is an extensive body of literature in psychology about psychological types,
temperaments, and dimensions of personality (Hogan, Johnson and Briggs, 1997). The
243
personality trait called introversion-extraversion is also studied in sociology, personnel studies
and organizational behavior, and other behavioral sciences. Thinking is a function of the
human mind that has been the subject of study not only in typology and cognitive psychology
but also in philosophy in general and epistemology, computer science, neurology, and
virtually in all the branches of knowledge to the extent that learning involves thinking and
sense making. Perceived usefulness of a computer-based tool or a system has been a major
subject of study in the discipline of information systems which deals with creating value or
benefits for users of computer-based tools and information systems. Customers' perception of
usefulness or utility of a product or cost benefit analysis of a choice are subjects studied in
disciplines such as economics and marketing as well. In the literature review, we limit
ourselves to the most relevant sources related to the one dependent variable in sub-section 2.1
followed by discussions on two independent variables in sub-section 2.2.
The Dependent Variable: Perceived Usefulness of Aplia System
An extensive body of research literature in the field of information systems shows that
perceived usefulness of any technology, tool, procedure or system is a reliable predictor of
intention to use and actual usage of a system by its intended users (Davis, 1989). Similar
research is also available in fields such as diffusion of innovation, evolutionary biology,
anthropology, and educational technology. Throughout history, usefulness has driven adoption,
acceptance and usage of any tool, technology, procedure or system by humans and other living
things in their struggle for survival. The usefulness of a teaching tool used for teaching a
business statistics course need to be evaluated by tool developers, teachers, students,
employers and other stakeholders of professional business schools, among others. Student
centered teaching demands that students’ perspectives on tools, methods and procedures used
in teaching any course be given an appropriate consideration in adopting, modifying or
discontinuing the use of any tool or procedure. If students perceive a teaching tool as useful,
they can motivate themselves to use that tool because of its fit with their learning style and its
effectiveness in helping them achieve their learning goals. It is of great practical value to assess
the perceived usefulness of a new teaching tool, especially when it has been experimentally
used by some professors who teach difficult and unpopular courses like a required
undergraduate course in business statistics.
|Items Used to measure perceived usefulness (Y)
PU1| Aplia was effective for your learning style.
PU2| I was better able to learn the material using Aplia.
The dependent variable Y for this research is labeled perceived usefulness of an etextbook and homework system for students. The system is called Aplia. Using the items listed
above, the perceived usefulness of Aplia was rated by students on a scale ranging from 1 to 5,
with 1 being the least useful and 5 being the most useful. Knowing how useful students
perceive the Aplia system to be is important for teachers, Aplia tool developers, institutions of
244
education that have adopted or are planning to adopt Aplia, students and others. In addition to
having electronic textbooks, Aplia has a learning tool which enables students to try a problem
and then receive a complete explanation of the problem once it has been submitted for grading.
The explanations allow the student to follow a step by step process to get the right answer. It is
a system of trying and learning from mistakes. The Aplia system takes place in an online web
browser environment, which many current university students are familiar with.
The Independent Variables: Personality Factors
Western conceptualizations of individual differences in personality can be traced back
at least 2000 years to the ancient typologies of Hippocrates and Galen (McAdams, 1997; p.7).
However, personality psychology became an identifiable discipline in the social sciences in the
1930s (McAdams, 1997; p.4). Personality studies focus on how people are different from one
another as well as how they are alike. Three distinguishing features of personality psychology
are the emphases on (1) the whole person, (2) motivation and dynamics, and (3) individual
differences (McAdams, 1997; p.4). Personality tests have been used and continue to be used
widely in management such as for screening applicants unfit for military service (Woodworth,
1919) or for advising and guiding students as they make choices regarding specific academic
majors, jobs and professions. Among the hundreds of variables, traits, factors or dimensions of
personality that have been identified by psychologists, we have limited ourselves to studying
the effects of two important traits or dimensions of personality: introversion and thinking.
These are the independent variables used in this study to predict and explain the dependent
variable—perceived usefulness of an e-textbook and homework system.
Introversion (X1)
Myers-Briggs literature uses the terms extraversion and introversion as Jung first used
them. Extraversion means "outward-turning" and introversion means "inward-turning" (Zeisset,
2006). Introversion, introduced by Jung (1921), has been identified as an extremely important
concept in trait psychology or temperament studies. In Jung’s typology, introverts oriented
toward internal, subjective experience, focusing on their own thoughts, feelings, and
perceptions. As a result, they tend to be introspective, ruminative, and self-preoccupied, and
appear aloof, quiet, unsociable, and reserved to others. An introversion-extraversion factor can
be identified in virtually every widely used multidimensional personality inventory (Watson
and Clark, 1997; P. 767). Eysenck and Eysenck (1975) describes an extravert as: “The typical
extravert is sociable, likes parties, has many friends, needs to have people to talk to, and does
not like reading or studying by himself.” (p. 5). An introverted person is directed internally and
usually solves problems on his or her own. An introversive person who thinks within himself
or herself rather than speaking every thought will likely approach problem solving this same
way—alone, within one’s own personal space of ideas. Introverted personalities need their
concentration, quiet, and their own space at times, especially when problem solving.
245
While extraversion is associated with being directed outward toward people and objects,
introversion is associated with being directed inward toward concepts and ideas. Some
contrasting characteristics (Tieger and Tieger, 1999) between extraverts and introverts include
the following:
1. Extraverts are oriented toward action, while introverts are thought oriented.
2. Extraverts seek and value breadth of knowledge and influence, while introverts seek
and value depth of knowledge and influence.
3. Extraverts often prefer more frequent interaction, while introverts prefer more
substantial interaction.
4. Extraverts recharge and get their energy from spending time with people, while
introverts recharge and get their energy from spending time alone.
Introversion is a personality type or trait that is very misunderstood. Because of the
personality aspects and the comparison to what an American is expected to be, many
introverted personality types feel guilty about what they are. Instead of seeing themselves as
just reserved, introverts may see themselves as worthless or abnormal. Even with this
misunderstanding, Henjum (1982) discusses how introverts many times are among the most
successful people and can attain great things, especially with education. The ability to
concentrate and the lack of need for constant social stimulation allows introverts to ponder
many problems that the world needs solved (Henjum, 1982).
The results of a study by Ebeling-Witte, Frank, and Lester (2007) showed that shy
people prefer an online setting for conversing. The trait of shyness is a classic trait of an
introverted personality. This type of shy person also spent more time on and thought about the
Internet more than one normally should, by psychological measures. This shows a tendency for
introverted personality types toward a preference for computer aided situations such as online
networking and conversing. The preference for a computer aided environment is consistent
with the traits of a shy, introverted personality (Ebeling-Witte, Frank, & Lester, 2007).
Thinking (X2)
The second independent variable in our study,X2, is the thinking personality trait. One
of C.G. Jung's four functions through which a person deals with the world inside and around is
thinking; the other three being sensing, intuiting and feeling. Jung's concept about the thinking
function involves evaluating information, experiences and ideas rationally, logically. Since
thinking involves decision making or judging, rather than simple intake of information, Jung
called the thinking function rational.
The type indicator, based on Jung's concepts of types and functions of personality, that
Katherine Briggs and her daughter Isabel Briggs Myers developed, has four scales or
dimensions of personality: extroversion-introversion, sensing-intuiting, thinking-feeling and
judging-perceiving. According to the Myers-Briggs type indicator (MBTI), the four functions
have opposite forces such as thinking and feeling tend to be opposite ends of the same scale or
dimension of personality. Researchers have found that roughly two-thirds of men are thinkers,
246
while about two-thirds of women are feelers, depending on whether thinking or feeling is the
superior or dominant function of one's personality.
A study by Furnham, Moutafi, and Paltiel (2005) showed that “individuals high on g ,
general intelligence, tend to logically analyze information in terms of the strict principles of
cause and effect instead of identifying the emotional value that is attached to objects or events”
(p. 9). This means that thinking based people tend to have higher intelligence levels because of
their way of evaluating problems and solving them. Taking the logical approach enables the
thinking based personality type to achieve greater success in solving problems.
Those who prefer thinking have the tendency to decide things from a more detached
standpoint, evaluating the decision by conditions that seem reasonable, logical, causal and
consistent with rules, goals and objectives. Those who prefer feeling tend to make decisions
by empathizing with the situation, looking at it 'from the inside' and weighing the situation to
achieve, on balance, the greatest harmony, consensus and fit, considering the emotional needs
of the people involved. Thinkers usually have trouble interacting with inconsistent and illogical
people, and tend to give very direct feedback to others without considering much how a
person's feelings may be affected. They are concerned with the truth and view it as more
important than being tactful, sweet or nice but dishonest. Thinking trait may be associated with
economists' and psychologists' conceptualization of logic and rationality (Kahneman, Amos
Tversky, 2000) in personal judgment and decision making, such as utility maximizing or
optimizing decisions and multi-criteria decision making.
Items used to measure the second independent variable X2 attempt to assess how
thinking based, logical, and rational a student’s personality is. Seven items, each on a scale
ranging from 1 to 5, have been used in this study, to measure the strength of the thinking trait
of each student. The Likert-scale based response score values from the seven items were
summed for each student to derive the thinking personality trait score for each student. A
summed response score of 7 means that the respondent is less of a thinking-based personality
type; while a response of 35 means the respondent is more of a thinking-based personality
type. Any score between seven and thirty five is an indicator of the importance, dominance or
strength of the thinking trait in one's decision making and cognitive functions. The thinking
based personality type relates to how a person evaluates information and uses a technical,
systematic approach to solving a problem. It measures the extent to which the use of logic in
problem solving is important to a person. In contrast, a feeling dominated personality type
would examine problems more along emotions than logic. Thinking based types try to use an
objective approach to a problem rather than letting his or her emotions get involved in the
process.
The Research Model and Hypotheses
We theorize that personality traits such as introversion and thinking can predict and
explain how students perceive the usefulness of e-learning systems such as Aplia. Because
Aplia has features, tools, and capabilities that cannot be customized to the personality of each
person or each personality type, Aplia may be perceived more useful to some and not so useful
247
to other personality types. The research hypotheses about the relationships between X1 and Y
(Ha1) and X2 and Y (Ha2) are summarized in Figure 1. Theoretical arguments to support
hypotheses Ha1 and Ha2 are presented in subsections 2.3.1 and 2.3.2, respectively.
Figure 1: The Research Model
X1= Introversion
Ha1:
+
X2= Thinking
Ha2:
Y= Perceived
Usefulness of etextbook and homework
systems for a business
statistics course
Ha1: Relationship between Introversion and Perceived Usefulness
A study by David Unfred discussed that Transforming and Performing learning
orientation types, which thrive on self motivation and self directness, had greater achievement
than other learning types with the electronic textbook (Unfred, 2002, p.102). Based on this
source, it can be argued that the more introversive a person is the more he or she will find the
Aplia electronic textbook and homework system useful. The more introverted a person is, the
more useful he or she will find the system because the system allows one to be self-direct and
self-motivated with regard to study and practice at one’s own pace as opposed to being with
human tutors. Introverted people are directed inward, less social, and less outgoing than an
extroverted personality type. They also tend to be self directed and would likely favor self
directed online homework rather than an in-class discussion. For this reason, more introverted
personality types will find the Aplia system to be more useful because they have the ability to
direct and control their learning of the material.
Henjum (1982) found that an introvert’s “ability to ‘stick to the task’ accounts for a
great deal of this success” (p. 41). I believe this statement supports the hypothesis that
introverted personalities will find Aplia useful because of their concentration level and ability
to stay focused on the Aplia system. The fact that introverts do not need constant interaction
and social stimulation enables them to sit and focus on the Aplia system and learn the material.
Aplia encourages self motivated and self timed work and these qualities are fitting with the
temperament of an introverted personality. With the Aplia system being so fitted to the
introverted personality, more introverted types will likely find the system more useful in their
learning efforts.
248
The results of the Ebeling-Witte, Frank, and Lester (2007) study that shy people prefer
the online environment can be used to support the hypothesis of a positive relationship between
introversion and perceived usefulness of Aplia. If an introverted student is physically online
and thinking out the Internet more than others, he or she will find the Aplia system useful
because it is an environment he or she is comfortable with. Likewise, if the student is already
on the Internet visiting social networking sites and checking email, they also have the ability to
do their homework on the Aplia system while doing these other things. This ability to multitask
and be in a comfortable environment should increase a student’s perceived usefulness of the
environment because they see it as convenient (Ebeling-Witte, Frank, & Lester, 2007) and,
using the language of task-technology fit model, good fit with their personality, the learning
task at hand and the e-learning technology. Task-technology fit (TTF) theory holds that IT is
more likely to have a positive impact on individual performance and be used if the capabilities
of the IT match the tasks that the user must perform (Goodhue and Thompson, 1995).
On the basis of the arguments presented above, it can be hypothesized that
Ha1: Relationship between Introversion and Perceived Usefulness of e-learning systems is
positive.
Ha2: Relationship between Thinking Personality Trait and Perceived Usefulness
Three arguments are presented here to support a hypothesized negative relationship
between a thinking personality trait of students and students’ perceived usefulness of etextbook-and-homework systems or e-learning systems like Aplia.
Argument 1. Higher intelligence associated with a thinking personality trait could be
the first reason for the existence of a negative relationship between thinking personality trait
and perceived usefulness of an e-textbook and homework system. Furnham, Moutafi, and
Paltiel (2005) found that a thinking based personality is positively associated with higher
intelligence. It can be argued that because of higher intelligence, the more thinking driven a
person is the more open and active that person will be in processes involving thinking,
studying and learning which require use of intelligence. The Aplia e-textbook-and-homework
system provides only limited opportunities for reading or thinking because the –e-textbook can
only be used on an Internet-enabled computer. The homework problems are structured, with
multiple choice answers, and the explanations are readily available after an answer is submitted
by a student. If the explanations were not so readily available, a student would have to think
long and hard to find out what went wrong during the first attempt and then attempt to discover
the right answer and embark upon a voyage of discovery. This voyage of discovery through
arguing with classmates in groups and questioning professors might not be quick and easy, but
it would stimulate the brain and provide food for a thinking, active brain, resulting in true
training of the brain to seek and discover. The result would be not just learning but metalearning-- learning how to learn. A higher intelligence level can be associated with an
increased desire to learn and therefore a desire to achieve more in classes. The desire to
achieve more would be consistent with putting more effort in to learning the material. Because
of the limitations inherent in Aplia, it will not work as an effective and useful aid for learners
249
with stronger thinking personality traits to achieve the combined higher goal of learning and
meta-learning.
Argument 2. Not getting adequate chance to think because the explanations are readily
available. Thinkers need opportunities to think through problems and argue about problems in
substantial terms. Thinkers find Aplia less useful because they may find arguing with
classmates or professors to be more useful for learning statistics in a non-structured, open
environment where arguments and interactions can be customized to a person’s specific
questions and concerns. The problems and explanations provided by Aplia are not customized
to an individual’s personality traits, learning styles and specific concerns—they are standard
explanations—the same for every student.
Those who like the convenience of having to think less and embrace fast and ready
explanations will find Aplia more useful. On the other hand, those who naturally like to think
through problems, may find Aplia less useful. Its structured and readily available explanations
make e-learning systems like Aplia a fast-food type learning environment that do not give
thinking students enough food for thought.
Argument 3. Students’ need for control of their learning environment is another reason
why a thinking personality trait may be negatively associated with perceived usefulness of etexbook and homework systems. A recent study suggested that a student’s academic
achievement can be predicted by how in control they feel they are of the outcome (Adeyinka
Tella, Adedeji Tella, & Lawrence O Adika, 2008). The feeling of being in control of the
situation is a way of thinking. If a student believes their achievement is based on their actions
and thoughts, this would be a sign of a thinking based person. Because the study showed that a
person’s perception of their level of control is positively related to their level of achievement, it
can be argued that the Y variable and the X2 variable will show a negative relationship. The
more thinking driven a student’s personality is, the less effective and useful the student will
find the Aplia system to be because they have a feeling of less control in their methods of study
within the structured and controlled environment set up by the Aplia e-textbook and homework
system. The Aplia system is more guided, focused, and result oriented than a classroom
discussion would be. I believe a thinking based student will find a guided step-by-step process
driven learning system less useful than a free flowing question-answer and discussion situation
that the student can control by asking questions that are in the student’s thinking mind. The
student can only look at the standard explanation that the Aplia system provides for a question.
A student cannot ask Aplia a question that is on his or her mind because Aplia will not answer
his or her specific question in the context of a specific problem—peers in a class or a professor
will do that. As such, group work and free discussions and arguments with peers and
professors might be more useful for students with higher need for control of the learning
environment.
In light of the arguments presented above, it can be hypothesized that
Ha2: Thinking personality trait and perceived usefulness of e-learning systems are related
negatively.
250
DESIGN AND METHODOLOGY
Items used to measure introversion and thinking personality traits, borrowed from
(Myers and Myers, 1995), are in Figure 2. The X1 variable measures how introverted a student
is on a scale ranging from 7 to 35. These scores were derived by adding the scores of each
student on the seven items used to measure the degree of introversion of that student. Likewise,
the X2 variable measures the thinking trait or how thinking driven a student’s personality is on
a scale ranging from 7 to 35. In this paper, each of the two traits has been measured and treated
as a continuous variable on the interval scale just as the dependent variable has been treated as
a continuous, quantitative variable on the interval scale. As such, scatter diagrams, correlation
coefficients and regression analysis have been chosen as appropriate procedures for analyzing
the data and testing the statistical significance of the hypotheses. Students were given extra
credit points for participating in the study by anonymously filling up a survey questionnaire at
the end of the semester in which they used Aplia for a business statistics course.
Figure 2: Instrument used to measure Introversion and Thinking personality traits
Rate how well each of the sentences below apply to you.
1 = not at all 2 = only a little 3 = somewhat 4 = strongly 5 = very strongly
Statement
Type
circle one number
T I prefer to be logical about things.
1 2 3 4 5
I I am hard to get to know.
1 2 3 4 5
T I consider myself objective.
1 2 3 4 5
I I am a rather deep person.
1 2 3 4 5
T I often base my decisions on principles.
1 2 3 4 5
I I like reflecting on life.
1 2 3 4 5
T Sometimes one needs to be firm with others.
1 2 3 4 5
I I like having just a few close relationships.
1 2 3 4 5
T I like to figure out why things happen.
1 2 3 4 5
I Being with people drains me.
1 2 3 4 5
T Justice is more important than mercy.
1 2 3 4 5
I I like being by myself.
1 2 3 4 5
T I believe people don't use their brains enough.
1 2 3 4 5
I I prefer to deal with ideas and feelings.
1 2 3 4 5
RESULTS OF DATA ANALYSIS
The first scatter diagram exhibited in Figure 3 shows a positive linear relationship
between the variables X1 and Y. This scatter diagram shows that the level of introversion of a
person’s personality and the perceived usefulness of the Aplia system are positively related.
This shows that the higher level of introversion a person has, the more useful he or she will
perceive the Aplia system to be. The second diagram shown in Figure 4 exhibits a weak
251
negative linear relationship between the variable of X2 and Y. This means that there is a
moderate negative relationship between one’s level of thinking based personality and the
perceived usefulness of the Aplia system. The first scatter diagram fairly strongly supports
hypothesis Ha1 ,while the second scatter diagram weakly supports hypothesis Ha2.
Figure 3
Perceived Usefulness of Aplia
Relationship between Introversion (X1) and Perceived
Usefulness of Aplia (Y)
6
5
4
3
2
1
0
0
5
10
15
20
25
30
35
Level of Introversion
Figure 4
Perceived Usefulness of Aplia
Relationship between Thinking Based Personality (X2) and
Perceived Usefulness of APlia (Y)
6
5
4
3
2
1
0
0
5
10
15
20
25
30
35
40
Level of Thinking Based Personality
The mean, median, and standard deviation of each of the variables X1, X2, and Y are
exhibited in Figure 5. The average level of introversion of the subjects that were sampled was
22.18 on a scale ranging from 7 to 35. The median value of introversion was 22. The average
252
level of thinking based personality trait score in the sample was 26.92 on a scale ranging from
7 to 35. The median value of the thinking based personality trait score was 27. The average
perceived usefulness of Aplia system for all 89 students was 3.05 on a scale ranging from 1 to
5. The median, middle value, of perceived usefulness was 3. The standard deviation of the
introversion data was 3.84. The standard deviation of the thinking based personality was 3.45.
The standard deviation of the usefulness of Aplia data was 1.03. The standard deviation values
show the variability of each of the variables in the sample data.
Figure 5: Descriptive Statistics of the Variables under study
X1=Introvert X2=Thinking
Scale: 7 to 35 Scale: 7 to 35 Y=Usefulness
Descriptive Statistics
Mean
22.1798
26.9213 Scale: 1 to 5
Median
22.0000
27.0000
3.0000
Standard Deviation
3.8363
3.4484
1.0254
The correlation matrix shown in Figure 6 below shows the correlation coefficients of
the three variables of the research project. The .3082 value of rX1Y shows a moderate positive
relationship between the variables introversion and perceived usefulness. This moderately
supports Ha1. The value of -.0680 of rX2Y shows a weak negative relationship between the
thinking based personality and perceived usefulness of Aplia. This weakly supports research
hypothesis Ha2. The value of .2605 for rX1X2 shows a weak positive relationship between the
variables of X1 and X2, which are introversion and thinking based personality, the independent
variable in this study. There is some linear association as exhibited by statistic that rX1X2=
.2605, but this does not pose the problem of multicollinearity to the research because it remains
well under the threshold of .70. If the rX1X2 value were above .70, the two independent
variables would be related in a way that could pose multicollinearity problems for the research
outcomes of multiple regression. So, the finding that correlation coefficient rX1X2<.70 supports
the appropriateness of multiple regression as the method of data analysis.
Figure 6: Correlation Matrix and Tests of Hypotheses
Correlation Matrix with 1-tailed P-values
n=89
X1=Introvert
X2=Thinking
Y=Usefulness
X1=Introvert X2=Thinking Y=Usefulness
1
0.2605
1
0.3082
-0.0680
1
Figure 7 shows the regression output for this research project. The estimated regression
equation is y-hat= 2.2509 + .0935X1 - .0473X2. The estimated parameters are as follows: B0=
2.2509, B1= .0935, and B2= -.0473. F-test for the multiple regression model and t-test for each
of the beta coefficients B1 and B2 are performed based on the values of the F-statistic and two
t-statistic values in Figure 7.
253
For the F test the null hypothesis is Ho: B1=B2=0 and the alternate hypothesis is Ha:
One or more of the parameters is not equal to zero. The F test statistic is the MSR value of
5.4852 divided by the MSE value of .9483. The F test statistic is therefore 5.7844 and the p
value is 0.0044. This p value permits the rejection of H0 because the p value is less than the
alpha value of .05 for the 95% confidence level. Since the null hypothesis is rejected, we
accept the alternate hypothesis that one or more of the parameters is not equal to zero. This
means that there is a significant relationship between the dependent variable and one or more
of the independent variables.
Figure 7: Multiple Regression Output and Tests of Hypotheses
Regression Statistics
Multiple R
0.3443
R Square,R2
2
Adjusted R
Standard Error
Observations
0.1186
0.0981
0.9738 Estimated model
89 Y-hat= 2.2509+0.0935*X1 - 0.0473*X2
ANOVA
df
Regression
Residual
Total
2
86
88
SS
10.9705
81.5520
92.5225
Standard
Coefficients
Error
Intercept
2.2509
0.9109
I=X1
0.0935
0.0280
T=X2
-0.0473
0.0312
*** Ha1 is supported with at least 99% confidence.
* Ha2 is supported with at least 90% confidence.
MS
F
5.485
0.948
t Stat
2.471
3.334
-1.517
5.784
Significance F
0.004395968
1-tailed
P-value
0.00772 Hypotheses
0.00063 Ha1: supported***
0.06651 Ha2: supported *
Since the overall significance, the F test, exhibited a significant relationship we use the
T test to explore which of the independent variables are related to the dependent variable. The
hypotheses for the T test for B1 are H0: B1≤0 and Ha: B1>0. The t test statistic is 3.3344 and the
one-tailed p value is 0.0006. Since this p-value is less than the alpha of .01, H0 is rejected with
at least 99% confidence. This shows that the variable introversion, X1, is statistically
significantly related to the dependent variable Y, perceived usefulness of Aplia.
The hypotheses for the T test for B2 are H0: B2≥0 and Ha: B2<0. The t test statistic is 1.5167 and the one-tailed p value is 0.0665. This p value is greater than the alpha of .05 but les
than .10. So H0 is rejected with 90% confidence. This shows that there is a statistically
significant negative relationship between the variable X2 and the dependent variable Y. We
can be at least 90% confident that there is a negative relationship between the thinking
personality trait and perceived usefulness of Aplia.
The R2 value is 0.1186 or 11.86%. The meaning of this value is the goodness of fit of
the estimated regression model that was created. The value means that 11.86% of the total
254
variability in the perceived usefulness of the Aplia system can be explained by the regression
model. This means that the model with b1 and b2 is not a great fit because 88.14% of the
variability of the y variable remains unexplained by the created model.
DISCUSSION AND CONCLUSION
While both hypotheses have been supported by the sample data, the explanatory power
or goodness of fit of the multiple regression model, indicated by the R-square value, is low.
This could be explained by the argument that perceived usefulness of an electronic textbook
and homework system like Aplia depend on many other variables not included in our multiple
regression model which had only two independent variables.
The R2 could possibly be improved by the addition of more variables to the estimated
regression model. Other dimensions of personality type could be added to the model to
improve the fit of the estimated model. An X3 variable such as whether a sampled person is a
Type B personality or not. Using this theory of type A or Type B personality could help
explain some more of the variability in how sampled people perceive the Aplia system as
useful or not. Other dimensions of personality could also be explored and examined to see
whether they show a significant relationship to the Y variable of the perceived usefulness of
the Aplia system.
The results of sampling may not be accurate because of the stigma in society that was
discussed by Henjum (1982). For example, a sampled person, even in an anonymous survey,
may not want to admit to themselves that they prefer to be by themselves and have less
interaction with people. Other dimensions of personality type or factors related to learning
styles that could affect the perceived usefulness of Aplia could be explored to see if they show
a significant relationship to the dependent variable.
Other variables not associated with personality type could also be added to the model to
try to increase the R2 value. Variables from the literature on technology acceptance model and
task technology fit model could also be used to explain perceived usefulness of a computerbased system like Aplia. Other variables such as grade point average, years in the university,
and preference for web based or in person classes, computer experience, computer selfefficacy, computer anxiety, Internet anxiety, and math anxiety could also help explain and
predict why a person would find the Aplia system to be more or less useful.
REFERENCES
Myers, Isabel Briggs; McCaulley Mary H.; Quenk, Naomi L.; Hammer, Allen L. (1998). MBTI Manual (A guide
to the development and use of the Myers Briggs type indicator) p.131. Consulting Psychologists Press;
3rd ed edition. ISBN 0-89106-130-4.
Daniel Kahneman, Amos Tversky (2000). Choice, Values, Frames. The Cambridge University Press. ISBN 0521-62172-0.
Davis, F. D. (1989), "Perceived usefulness, perceived ease of use, and user acceptance of information
technology", MIS Quarterly 13(3): 319–340
255
Davis, F. D.; Bagozzi, R. P.; Warshaw, P. R. (1989), "User acceptance of computer technology: A comparison of
two theoretical models", Management Science 35: 982–1003
Ebeling-Witte, S., Frank, M., & Lester, D. (2007, October). Shyness, Internet Use, and Personality.
CyberPsychology & Behavior, 10(5), 713-716. Retrieved April 1, 2009, doi:10.1089/cpb.2007.9964
Furnham, A., Moutafi, J., & Paltiel, L. (2005, April). Intelligence in Relation to Jung's Personality Types.
Individual Differences Research, 3(1), 2-13. Retrieved April 1, 2009, from Psychology and Behavioral
Sciences Collection database.
Goodhue, Dale L; Thompson, Ronald L.Task-technology fit and individual performance. MIS Quarterly; Jun
1995; 19 (2) pp. 203-236.
"Guide to the Isabel Briggs Myers Papers 1885-1992". University of Florida George A. Smathers Libraries,
Department of Special and Area Studies Collections, Gainesville, FL.. 2003.
Henjum, A. (1982, Fall82). INTROVERSION: A MISUNDERSTOOD INDIVIDUAL DIFFERENCE AMONG
STUDENTS. Education, 103(1), 39. Retrieved April 1, 2009, from Psychology and Behavioral Sciences
Collection database.
Myers, Isabel Briggs with Peter B. Myers (1980, 1995). Gifts Differing: Understanding Personality Type.
Mountain View, CA: Davies-Black Publishing. ISBN 0-89106-074-X.
Briggs Myers, Isabel; McCaulley, Mary H.; Quenk, Naomi L.; Hammer, Allen L.; Mitchell, Wayne D. MBTI Step
III Manual: Exploring Personality Development Using the Myers-Briggs Type Indicator Instrument
p.119. Consulting Psychologists Press (2009)
Tella, Adeyinka, & Tella, Adedeji, & Adika, Lawrence O. (2008). Self-efficacy and locus of control as predictors
of academic achievement among secondary school students in Osun State Unity Schools. Ife
Psychologia, 16(2), 133-147. Retrieved March 18, 2009, from ProQuest Psychology Journals database.
(Document ID: 1637151821).
Tieger, Paul D.; Barbara Barron-Tieger (1999). The Art of SpeedReading People. New York, NY: Little, Brown
and Company. pp. 66. ISBN 978-0-316-84518-2.
Unfred, David Wayne (2002). A comparative study of two electronic textbook interface design metaphors
relative to learner self-efficacy, attitudes, and learning orientation. Ed.D. dissertation, Texas Tech
University, United States -- Texas. Retrieved March 24, 2009, from Dissertations & Theses: Full Text
database. (Publication No. AAT 3069188).
Zeisset, Carolyn (2006). The Art of Dialogue: Exploring Personality Differences for More Effective
Communication. Gainesville, FL: Center for Applications of Psychological Type, Inc. p. 13. ISBN 0935652-77-9.
256
JOB STRESS AND JOB PERFORMANCE AMONG
EMPLOYEES IN PRIVATE BANKING SECTOR IN
ISTANBUL: EXAMINING THE MODERATING ROLE
OF EMOTIONAL INTELLIGENCE
Uğur Yozgat
Marmara University
Elif Bilginoğlu
Marmara University
Orkun Demirbağ
Marmara University
R. Hande Serim Bahadınlı
Marmara University
ABSTRACT
This study was conducted among 476 private banking sector employees to examine the
relationship between job stress and job performance considering emotional intelligence as a
moderating variable. It was also intended to be a replication of a previous study on job stress
and job performance which was conducted in the Taiwanese Finance industry. The result
pattern across both samples was similar. While a negative relationship was found between job
stress and job performance, it was reported that emotional intelligence had a positive impact
on job performance and moderated this relationship.
INTRODUCTION
Job stress is one of the common problems that employees confront with increasing
frequency. Recently job stress is becoming an epidemic in the work environment. Therefore a
large number of researches have focused on job stress and its effects on the various aspects of
the organizational output. Due to the fact that job stress has become a common negative
outcome of today’s dynamic work life, growing number of people complain about stress as a
result of work overload, job insecurity and increasing pace of life. Researches support the idea
that the higher the imbalance between demands and the individual’s abilities, the higher job
stress experienced will be (Jamal, 2005).
257
Job performance, which can be affected by job stress as well as other numerous factors,
can be viewed as an activity in which an individual is able to accomplish successfully the task
assigned to him or her, subject to the normal constraints of the reasonable utilization of
available resources (Jamal, 1984). In order to be competitive in a rapidly changing economic
and work environment, increasing the job performance of the employees and consequently the
performance of the companies has become more crucial. Therefore it is necessary for the
companies to analyze the issues such as stress that are related with job performance.
Nowadays the financial sector, defined as the set of institutions, instruments, and the
regulatory framework that permit transactions to be made by incurring and settling debts; that
is, by extending credit by OECD, is facing new challenges and threats because of the global
financial crisis and this makes the competitiveness quite problematic. Most of the companies in
this sector are going through a difficult period and that’s why they are expecting a very high
performance from their employees. In order to clarify the theoretical issues related to stress and
performance relationship, this study aims to search the effect of stress on performance among
the private banking sector employees.
Additionally the moderating role of the emotional intelligence, based on the fact that
the ability to manage one’s own emotions plays an extremely important role in appraisal and
coping with work related stress and reducing stress helps them to facilitate their performance,
was examined.
LITERATURE REVIEW AND HYPOTHESES
Job Performance
Performance is “evaluatable behaviors (Viswesvaran, 2001, 113). It is something that
people do and is reflected in the actions that people take. Further, it includes only those actions
or behaviors relevant to the organization’s goals (Campbell, 1990, 704). Murphy and Kroker
(1988) define that performance as a function of the individual’s performances on the specific
tasks that comprise standard job descriptions, and declare that it is also affected by variables
such as maintaining good interpersonal relations, absenteeism, and withdrawal behaviors,
substance abuse and other behaviors that increase hazards at the workplace (Murphy, 1989).
According to Motowidlo (2003), job performance is the total expected value to the
organization of the discrete behavioral episodes that an individual carries out over a standard
period of time. Job performance is directly related to the level of energy and the specific form
of action characterizing a worker's behavior. To the extent that motivation raises a worker's
energy and shapes appropriate behavioral patterns, it plays a key role in determining overall
job performance. Thus, job performance can properly be said to represent an operational
measure of worker motivation (Mitchell, Ortiz& Mitchell, 1987).
258
Job Stress
Stress is a feeling that's created when we react to particular events. It's the body's way
of rising to a challenge and preparing to meet a tough situation with focus, strength, stamina,
and heightened alertness (D’arcy, 2007). Job stress can be defined as an individual’s reactions
to characteristics of the work environment that seem emotionally and physically threatening
(Jamal, 2005). Job stress is very much an individual reaction, and differs from general stress as
it is also organization, and job–related (Chen & Silverthorne, 2008). Based on these definitions
job stress can produce adverse consequences for both the individual and the company since it
has the effect of lowering motivation levels and performance, and increases turnover intentions
(Montgomery, Blodgett & Barnes, 1996).
Because stress is a contributing factor to organizational inefficiency we would like to
propose the following hypothesis:
H1
Job stress is negatively associated with job performance.
Emotional Intelligence (EI)
Thorndike (1920, 228) was one of the first to identify the aspect of EI he called “social
intelligence”. He declares that social intelligence refers to “the ability to understand and
manage men and women, boys and girls—to act wisely in human relations”. Mayer and
Salovey view emotional intelligence (EI) as ability, that is, a set of skills for processing
emotion-relevant information. This model is the only one for which an objective, ability
measure has been developed (Mayer, Salovey, & Caruso, 2004; Mayer, Salovey, Caruso, &
Sitarenios, 2003). Carmeli (2003) emphasized that employees with a high level of intelligence
can manage their emotions in terms of retaining a positive mental state which can lead to
improved job performance. Based on these we researches would like to propose the following
hypothesis:
H2
There is a positive relationship between emotional intelligence and job performance.
Mayer, Roberts and Barsade (2008) claim that EI involves the ability to carry out
accurate reasoning about emotions and the ability to use emotions and emotional knowledge to
enhance thought. Based on the fact that the ability to manage one’s own emotions plays an
extremely important role in appraisal and coping with work related stress and reducing stress
helps them to facilitate their performance, we researches would like to propose the following
hypothesis:
H3
Emotional intelligence moderates the relationship between job stress and job performance.
259
RESEARCH METHOD
The research of Wu “Job Stress and Job Performance among Employees in The
Taiwanese Finance Sector: The Role of Emotional Intelligence” (2011) is used in this study
with the researcher’s permission. Just like his study we used the same model and hypothesizes
intended to find out the relationship between job stress and job performance and the
moderating role of emotional intelligence on this relationship. Different from the original study
we have chosen a private banking sector in Istanbul for conducting our study. Employees in the
private banking sector have tasks with deadlines and high stress owing to time pressure.
Sampling Design
More than 140.000 employees were working in 12 Turkish and 16 foreign capital
invested private banks in Turkey (Türkiye Bankalar Birliği, 2012). Different branches of the
private banking sector in Istanbul where circa 40 % of them were employed were chosen for
conducting this study. Considering the number of employees in each branch of our study’s
scope, we have made quoted convenient sampling and distributed 300 questionnaires to
Turkish and 400 to foreign capital invested banks’ branches. Total 700 questionnaires were
distributed to several branches and 498 (83 %) were returned. After deleting the semi-filled
ones 476 (79.3 %) questionnaires were analyzed using SPSS statistical program.
The sample consists of 274 female (57,6 %) and 202 male (42,4 %) employees with a
mean age of 32.88 (Standard Deviation: 5.69) and with an average tenure of 7.02 years
(Standard Deviation: 4.94) in the current position or sector. The sample included both
managers and non-managers.
Measures
A multi-item questionnaire used by Wu in his research “Job Stress and Job Performance
among Employees in The Taiwanese Finance Sector: The Role of Emotional Intelligence”
(2011) is used with the researcher’s permission.
Job Stress
Job Stress is measured using the questionnaire developed by Parker and DeCotiis
(1983). Participants are asked to rate each of the 13 items using a 5-point Likert scale so that
they can select a numerical score ranging from 1 to 5 for each statement to indicate the degree
of agreement or otherwise, where 1, 2, 3, 4, and 5 denote “Strongly Disagree”, “Disagree”,
“Neither Agree nor Disagree (Neutral)”, “Agree”, and “Strongly Agree”, respectively.
260
Emotional Intelligence
Emotional Intelligence is measured by the widely used The Self-Report Emotional
Intelligence Test (SREIT) developed by Schutte et al. (1998) Participants are asked to rate each
of the 33 items using a 5-point Likert scale (1=strongly disagree, 5= strongly agree) Although
the original scale of Schutte has one factor, in different studies three and sometimes four
aspects of the scale were explored (Schutte et al. 2009) like emotion perception, utilizing
emotions, managing self- relevant emotions and managing others’ emotions. In this study
original one factor model is used.
Job Performance
Job performance is measured by the scale developed by Dubinsky and Mattson (1979),
and was modified by Singh, Verbeke and Rhoads (1996). Participants were asked to rate each
of the 6 items using a 5-point Likert scale (1=poor performance, 5= excellent performance).
Control Variable
Job tenure which is measured by the number of years an employee has worked for
his/her company, is controlled due to its positive effects on job performance in many studies.
The findings of our study have also shown that job tenure may impact job performance. Just
like the study of Wu, we have explained this for the positive impact of job tenure within an
organization on job performance, because employees learn and enhance their skills as they gain
experience.
Findings
As can be seen from the Cronbach Alpha values reported in Table.1, variables of our
study are found to be reliable.
Bivariate correlations between the variables involved in this research are reported in
Table.1, job stress has a significant negative correlation with job performance (r = -0.212,
p
< 0.001), while the EI has a significant positive correlation (r = 0.465, p < 0.001).
Table 1
Means, Standard Deviations, Alpha Coefficients, and Correlations Among Study
Variables
Variables
Job Performance
Job Stress
Emotional Intelligence
*
M
3.97
2.75
3.87
SD
.66
.96
.49
1
(.90)
-.212***
.465***
2
3
(.92)
-.115*
(.92)
Note: Values on the diagonal represent alpha coefficients.
p <0.05, ** p <0.01, *** p <0.001 (two-tailed tests); N=476.
261
In order to test the first two hypothesizes the hierarchical regression analysis is
conducted. The control variable job tenure was added in Model 1. As shown in Table.2 two
variables regressed job performance linearly. Job stress has low, negative significant effect on
job performance and EI has moderate positive effect supporting the Hypothesis 1 and 2.
The interaction term was created by multiplying the two main effects and added in
Model 2 to test the moderating effect (Hypothesis 3) (Aiken and West, 1991). The results of
Model 2 show a significant change in R-squared (ΔR = 0.010, ΔF = 5.42, p < 0.05). The
moderating effect of emotional intelligence on the relationship between job stress and job
performance (β=0.532, p<0.05) is significant but standardized beta value is lower compared to
the study of Wu.
Table 2
Hierarchical Regression Results
Variables
Job Performance
Model 1
β
Model 2
Β
152***
0.150***
-0.180***
0.439***
-0.796**
0.222*
0.265
0.265***
0.635*
0.272
0.007*
Control variable
Job tenure
Main effect variables
Job stress (JS)
Emotional Intelligence (EI)
Interaction variables
JS*EI
R2
ΔR2
Notes: *p<0.05, ** p <0.01, *** p <0.001
Figure 1
Moderating Effect of Emotional Intelligence on Job Stress - Job Performance Relation
4.4
Job Performance
4.2
4
3.8
3.6
3.4
3.2
low
Job med
Stress
highEI
high
P
262
high
low
lowEI
The moderating effect of emotional intelligence on the relationship between job stress
and job performance is depicted in Figure.1. As can be seen from the figure low stressed
employees has higher job performance levels compared to high job stressed employees
whether they have high or low EI (latter having higher performance values). However
employees with high EI shows higher performance levels in high job stressed conditions.
CONCLUSION
Various behavioral outcomes have been linked to high or persistent stress, including
lower job performance, poor decision making, and increased workplace accidents and
aggressive behavior (McShane & Steen, 2009, 91). Although some researchers have indicated
that the relationship between stress and performance is either a positive (e.g. LePine et al.,
2005) or an inverted-U shape, most have found a negative stress-performance relationship
(e.g., Van Dyne et al., 2002; Siu, 2003; Gilboa et al, 2008; Jamal, 2011; Jehangir et al., 2011;
Wu, 2011; Yozgat et al., 2012). Suprisingly, some studies (e.g. Baddeley, 1972; Cohen, 1980)
suggest that a moderate amount of stress is optimal for job performance because, at such
levels, the individual is not only activated but also able to direct his or her energies toward
better job performance. There are also studies which have found no relation between job stress
and job performance. (e.g., Chen et al., 2006)
The results of this study support our hypotheses that job stress has significant impact on
job performance and it is moderated through EI. These findings are consistent with Wu
(2011)’s original and our in the public sector conducted initial study’s (Yozgat, Yurtkoru,
Bilginoğlu, 2012) arguments.
As a result of the global financial crisis in the world where the countries are about to go
bankrupt, it’s not only the profit making organizations, but also the countries that compete with
each other. Job stress is a major problem both for the employees and for the organizations. In
order to increase organizational efficiency and organizational effectiveness in the
organizations, it is suggested to help the employees to cope with their stress which is an
uncomfortable and undesirable to the individual. To make a budget plan for the coaching and
training of the employees on stress management can be regarded as a necessary action to help
them reduce the stressors without delay or help them be successful in coping with them so that
they can reach their full potentials.
Considering the positive impact of job tenure on job performance it is suggested that
the organizations should not make policies on early retirement of the old employees, but
support them to work for longer. In evaluation of the employees senior ones should have an
advantage to the junior ones regarding their higher job performance or the organizations can
create important incentives on job tenure in order to increase their intent to remain in the
organization.
263
LIMITATION AND FUTURE RESEARCH
This study was limited and only focused on the role of the job stress among employees
of the private banking sector in Istanbul. Further research is suggested to collect data over a
wider range of the employees of the private banking sector overall in Turkey or other areas of
private finance sector such as investment, leasing, factoring etc.
Another limitation is that all data were obtained from sources using self-reports.
Nevertheless, in future research, supervisory and peer ratings should be used as well as selfreports, so that this potential issue is overcome.
Because the EI is discussed to be just another aspect of personality, it is suggested that
future research be directed at the proposed linkage between personal characteristics and the job
stress and job performance relationship.
A further research can also be conducted on the effect of organizational support, which
is found to be effective on job performance in many researches.
ACKNOWLEDGEMENT
This work was supported by BAPKO - Marmara University (SOS-D-100413-0141).
REFERENCES
Aiken, L.S. & S.G. West (1991). Multiple Regression: Testing and Interpreting Interactions. Newbury Park: Sage
Publications.
Baddeley, A.D. (1972). Selective attention and performance in dangerous environments. British Journal of
Psychology, 73, 537-546.
Campbell, J.P. (1990). Modeling the performance prediction problem in industrial and organizational
psychology. In M. D. Dunnette & L. M. Hough (Eds.), Handbook of industrial and organizational
psychology, vol. 1 (2nd ed.): 687–732. Palo Alto, CA: Consulting Psychologists Press.
Carmeli, A. (2003). The relationship between emotional intelligence and work attitudes, behavior, and outcomes:
an examination among senior managers. Journal of Managerial Psychology, 18(8), 788-813.
Chen, J., C. Silverthorne & J. Hung (2006). Organization communication, job stress, organizational commitment,
and job performance of accounting professionals in Taiwan and America. Leadership & Organization
Development Journal, 27(4), 242-249.
Chen, J. & C. Silverthorne (2008). The impact of locus of control on job stress, job performance and job
satisfaction in Taiwan. Leadership & Organization, Development Journal, 29(7), 572-582.
D’arcy,
L. Retrieved November 27, 2012, from
stress.html?tracking=81347_A#a_What_Is_Stress.
http://kidshealth.org/teen/your_mind/emotions/
Cohen, S. (1980). After-effects of stress on human performance and social behaviour: a review of research and
theory. Psychological Bulletin, 88, 82-108.
264
Dubinsky, A.J. & E.M. Bruce (1979). Consequences of role conflict and ambiguity experienced by retail
salespeople. Journal of Retailing, 55(4), 70-86.
Gilboa, S., A. Shirom, Y. Fried & C. Cooper (2008). A meta-analysis of work demand stressors and job
performance: examining main and moderating effects. Personnel Psychology, 61(2), 227-271.
Jamal, M. (1984). Job stress and job performance controversy: an empirical assessment. Organizational Behavior
and Human Performance, 33, 1-21.
Jamal, M. (2005). Burnout among canadian and chinese employees: a cross-cultural study. European
Management Review, 2, 224-230.
Jamal, M. (2011). Job stress, job performance and organizational commitment in a multinational company: an
empirical study in two countries. International Journal of Business and Social Science, (2/20), 20-29.
Jehangir, M., N. Kareem, A. Khan, M.T. Jan & S. Soherwardi (2011). Effects of job stress on job performance &
job satisfaction. Interdisciplinary Journal of Contemporary Research in Business, (3/7), 453-465.
LePine, J.A., N.P. Podsakoff & M.A. LePine (2005). A meta-analytic test of the challenge stressor-hindrance
stressor framework: an explanation for inconsistent relationships among stressors and performance.
Academy of Management Journal, 48(5), 764-775.
Mayer, J.D., P. Salovey, D. Caruso & G. Sitarenios (2003). Measuring emotional intelligence with the msceit
v2.0. Emotion, 3, 97-105.
Mayer, J., P. Salovey & D. Caruso (2004). Emotional intelligence: theory, findings and implications.
Psychological Inquiry, 15(3), 197-215.
Mayer, J.D., R.D. Richard & S.G. Barsade (2008). Human abilities: emotional intelligence. Annual Review of
Psychology, 59, 507-536.
McShane, S.L. & S. Steen (2009). Canadian Organizational Behaviour, 7th Ed. Toronto: McGraw-Hill Ryerson.
Mitchell, D.E., F.I. Ortiz & T.K. Mitchell (1987). Work orientation and job performance: the cultural basis of
teaching rewards and incentives. Albany: State University of New York Press.
Montgomery, D.C., J.G. Blodgett & J.H. Barnes (1996). A model of financial securities salespersons’ job stress.
The Journal of Services Marketing, 10(3), 21-34.
Moon, T.W. & W. Hur (2011). Emotional intelligence, emotional exhaustion and job performance. Social
Behavior and Personality, (39/8), 1087-1096.
Motowidlo, S.J. (2003). Job Performance: In Borman, W.C., D.R. Ilgen & R.J. Klimoski (eds), Handbook of
Psychology: Industrial and Organizational Psychology, New York: Wiley. 12, 39-53.
Murphy, K.R. & L. Kroeker (1988). Dimensions of Job Performance (Rep. No. TN 88-39). San Diego:
NavyPersonnnel Develeopment and Research Center in Murphy, K.R. (1989). Is the relationship between
cognitive ability and job performance stable over time? Human Performance, 2(3), 183-200.
OECD. Retrieved December 25, 2012, from http://stats.oecd.org/glossary/detail.asp?ID=6815
265
Parker, D.F. & T.A. DeCotiis (1983). Organizational determinants of job stress. Organizational Behavior and
Human Performance, 32, 160-167.
Schutte, N., J. Malouff, L. Hall, D. Haggerty, J. Cooper, C. Golden & L. Dornheim (1998). Development and
validation of a measure of emotional intelligence. Personality and Individual Differences, 25, 167-177
Schutte, N.S., J.M. Malouff & N. Bhullar (2009). The Assessing Emotions Scale. Stough, C., D. Saklofske & J.
Parker (Eds.). The Assessment of Emotional Intelligence. New York: Springer Publishing, 119-135.
Singh, J., W. Verbeke & G. Rhoads (1996). Do organizational practices matter in role stress processes? A study of
direct and moderating effects for marketing-oriented boundary spanners. Journal of Marketing, 60(3),
69-86.
Siu, O.L. (2003). Job stress and job performance among employees in hong kong: the role of chinese work values
and organizational commitment. International Journal of Psychology, 38(6), 337-347.
Thorndike, R.K. (1920). Intelligence and its uses. Harper’s Magazine, 140, 227-235.
Türkiye
Bankalar Birliği. Retrieved March 21, 2013,
bilgileri/banka_sube_bilgileri.asp?tarih=21.03.2013.
from
http://www.tbb.org.tr/modules/banka-
Van Dyne, L., K.A. Jehn & A. Cummings (2002). Differential effects of strain on two forms of work
performance: individual employee sales and creativity. Journal of Organizational Behavior, 23(1), 5774.
Viswesvaran, C. (2001). Assessment of individual job performance: a review of the past century and a look ahead.
Handbook of Industrial Work & Organizational Psychology, 1, 110-126.
Wu, Y. (2011). Job stress and job performance among employees in the taiwanese finance sector: the role of
emotional intelligence. Social Behavior and Personality, 39(1), pp. 21-32.
Yozgat, U., S. Yurtkoru & E. Bilginoğlu (2012, October). Job Stress and Job Performance Among Employees in
Public Sector in Istanbul: Examining the Moderating Role of Emotional Intelligence. Presented to
International Conference on Leadership, Technology and Innovation Management, İstanbul, Turkey.
266
APPENDIX - Questionnaire
Job Stress
 Working here makes it hard to spend enough time my family.
 I spend so much time at work; I can’t see the forest for the trees.
 Working here leaves little time for other activities.
 I frequently get the feeling I am married to the company.
 I have too much work and too little time to do it in.
 I sometimes dread the telephone ringing at home because the call might be job-related (d).
 I feel like I never have a day off (d).
 Too many people at my level in the company get burned out by job demands.
 I have felt fidgety or nervous as a result of my job.
 My job gets me more than it should.
 There are lots of times when my job drives me right up the wall.
 Sometimes when I think about my job I get a tight feeling in my chest.
 I feel guilty when I take time off from job.
Emotional Intelligence
 I know when to speak about my personal problems to others.(d.)
 When I am faced with obstacles, I remember times I faced similar obstacles and overcame them.
 I expect that I will do well on must things I try.
 Other people find it easy to confide in me.
 I find it hard to understand the non-verbal messages of other people. (r)
 Some of the major events of my life have led me to re-evaluate what is important and not important.
 When my mood changes, I see new possibilities.
 Emotions are one of the things that make my life worth living.
 I am aware of my emotions as I experience them.
 I expect good thing to happen.
 I like to share my emotions with others.
 When I experience a positive emotion, I know how to make it last.
 I arrange events others enjoy.
 I seek out activities that make me happy.
 I am aware of non-verbal messages I send to others.
 I present myself in a way that makes a good impression on others.
 When I am in a positive mood, solving problems is easy for me.
 By looking at their facial expressions, I recognize the emotions people are experiencing.
 I know why my emotions change.
 When I am in a positive mood, I am able to come up with new ideas.
 I have control over my emotions.(d)
 I easily recognize my emotions as I experience them.
 I motivate myself by imaging a good outcome to tasks I take on.
 I compliment others when they have done something well.
 I am aware of non-verbal messages other people send.
 When another person tells me about an importance event in his or her life, I almost feel as though I have experienced this event myself.
 When I feel a change in emotions, I tend to come up with new ideas.(d)
 When I am faced with a challenge, I give up because I believe I will fail. (r,d)
 I know what other people are feeling just by looking at them.
 I help other people feel better when they are down.
 I use good moods to help myself keep trying in the faceoff obstacles.
 I can tell how people are feeling by listening to the tone of their voice.
 It is difficult for me to understand why people feel the way they do. (r)
Job Performance
 How would you rate yourself in terms of the quantity of work (e.g., sales) you achieve?
 How do you rate yourself in terms of your ability to reach your goals?
 How do you rate yourself in terms of your performance potential among coworkers in your company?
 How do you rate yourself in terms of quality of your performance in regard to customer relations?
 How do you rate yourself in terms of quality of your performance in regard to management of time, planning ability, and management
of expenses?
 How do you rate yourself in terms of quality of your performance in regard to knowledge of your products, company, competitors'
products, and customer needs?
(r): Reverse
(d): Deleted due to the low factor loading
267
CORPUS CHRISTI ESTATE PLANNING COUNCIL
FACES CHALLENGES
Eugene Bland
Texas A&M University – Corpus Christi
Karen A. Loveland
Texas A&M University – Corpus Christi
CASE DESCRIPTION
This case can be used to illustrate a variety of concepts in marketing including
strategic market planning for non-profit organizations, event planning & promotion strategies,
marketing of educational services, and the challenges associated with small
businesses/organizations. This case is appropriate for a variety of courses and teaching
strategies. The case contains enough information to permit students to perform a situation
analysis (with or without external research required), identify and prioritize issues/problems,
evaluate alternative courses of actions (including “do nothing), and recommend one or more
strategies making it appropriate for upper-level (3 or 4) case-based courses in marketing
strategy, promotional strategy or services marketing. Formal case analysis would require
three to ten hours of preparation by students depending on the requirements of the
class/instructor. Alternatively, this case could be employed in lower-level marketing classes by
asking students to respond to several discussion questions. Depending on the topics and
complexity of the questions, this type of usage would require from one to three hours of
preparation time by students and one to two class periods for in-class discussion.
CASE SYNOPSIS
The Corpus Christi Estate Planning Council (CCEPC) is a non-profit organization
dedicated to improving the practice of estate planning in South Texas. Recognized by the IRS
as a 501(c)(3) organization, the primary mission of the CCEPC is to provide continuing
education opportunities to members and non-members. The CCEPC recently recovered from a
significant decline in membership numbers but is still concerned that membership dues are not
covering the membership meeting costs and operating costs for the organization. As the
organization prepares for FY 2013, the board is considering raising dues (again) to increase
membership revenue or allowing proceeds from the annual educational seminar to subsidize
membership dues. In either case, the annual seminar is suffering from a significant decline in
268
attendance and the board needs to consider options for reversing this trend and perhaps even
returning attendance levels to the highs enjoyed during the 1990s.
INTRODUCTION
The Corpus Christi Estate Planning Council (CCEPC) is a non-profit organization
dedicated to improving the practice of estate planning in South Texas. Recognized by the IRS
as a 501(c)(3) organization, the primary mission of the CCEPC is to provide continuing
education opportunities to members and non-members.
Many professionals involved in estate planning require continuing education to
maintain state licensure. For example, license renewal for Certified Public Accountants
(CPAs) in Texas requires a minimum of 200 hours of continuing education during the most
recent three year period with a minimum of 20 hours per year (from an accredited provider).
The CCEPC provides two primary opportunities for members and non-members to earn
continuing education credit: membership meetings (members only) and an annual seminar
(members and non-members). Both opportunities qualify for continuing education credit for a
variety of professions including CPAs, attorneys, insurance professionals, certified financial
planners and bank trust officers.
BACKGROUND
The CCEPC is governed by a nine-member Board of Directors (hereinafter referred to
as “the board”) elected by the membership to serve a nine-year term. The board consists of
two attorneys, two bank trust officers, two CPAs, two insurance professionals, and the past
president. The newest member of the board represents the same group as the past president to
ensure consistent representation of the primary membership groups.
For the first four years of service, board members are classified as “directors”. In the
fifth year, they begin progressing through the following executive positions: Treasurer,
Secretary, Vice President and President until they conclude their term by serving as past
president (and advisor to the current president). The Board meets on the Thursday following
each monthly meeting and once a month in the summer to prepare for the following year.
The CCEPC has nine membership meetings per year (adjourning for the summer).
Each membership meeting includes dinner and a guest speaker. Each member of the board is
responsible for arranging the guest speaker for one meeting. Members who attend the meeting
are eligible for one hour of continuing education credit.
The first meeting of each fiscal year (July 1 to June 30) is held in September. At this
meeting, the organization provides each member with two coupons for drinks at the bar.
Members pay for their own drinks at subsequent meetings. Direct membership meeting
expenses include room fees and meals. In addition, the guest speaker’s actual travel costs (if
applicable) and an honorarium of $250 (though in recent years, many speakers have declined
269
the honorarium and instead considered their service as a charitable contribution to the
CCEPC).
The secretarial service sends a notice to the members about two weeks prior to each
meeting and then sends a reminder the following week. Members that want to attend the
meeting are asked to confirm their attendance to provide a count for the caterer. Members that
confirm attendance but do not attend are charged a no-show fee of $15 to cover the cost of the
meal. Members that do not confirm attendance, but come to the meeting are charged a late fee
of $5. Otherwise, the cost of the meeting is included in membership dues.
Annual operating expenses for the CCEPC consist of:
 Clerical Support – a secretarial service that handles membership support, promotion
and communication activities, and basic record keeping. In FY 2010-11, the CCEPC
switched from using a commercial secretarial service to an independent contractor.
 Continuing Education (CE) Accreditation – expenses associated with maintaining
accredited status for CE. An increasing number of licensure boards have reporting and
fee requirements to maintain the accredited CE status of CCEPC educational programs.
 Tax Return – expenses associated with filing federal taxes and maintaining 501(c)(3)
status.
 Gifts – Speakers at the membership meetings receive an appreciation gift, usually a
coffee table book. In addition, the organization provides funds for recognizing the
contribution of past presidents of the organization.
 PO Box Rental
 Check Printing
 Postage
For many years, membership in the CCEPC remained fairly constant at about 90 members.
Membership dues were structured to cover the costs of membership meetings, board meetings,
and annual operating expenses. A variety of factors caused membership to decline during the
first part of the last decade (between 2000 and 2005). During the decline, the Board held
annual membership dues constant at $95 to avoid further loss of membership. Following
strategic improvements in membership communication and a variety of efforts to encourage
word-of-mouth promotion by existing members, membership stabilized and eventually grew to
its pre-2000 levels by 2006.
With the strengthened membership retention, the board was comfortable raising
membership dues to $100 in 2007 and then to $125 in 2008 to cover increased meeting and
operating expenses. Membership dues were increased again in 2010 to $135. The increases do
not appear to be having a negative impact on membership as the organization grew to 105
members in 2012.
As the first Board meeting of fiscal year 2012-13 approaches, some members and advisors
have expressed concerns that, even with the recent increases in membership numbers and
annual dues, membership receipts are still not meeting the objective of covering all meeting
and operating expenses. One option the board will consider is increasing membership dues to
270
$150, but some members are concerned that another increase might reverse the recent growth
trend in membership numbers. Other members favor a strategy of subsidizing membership
receipts with revenue from the annual seminar, but opponents suggest that such a strategy is
riskier and requires significantly more cost and effort. Recent declines in attendance at the
annual seminar and the fact that the annual seminar is the last event of the year, occurring after
all the costs for membership meetings are incurred, increase the riskiness of relying on the
annual seminar to cover membership meeting and operating expenses. In addition, profits
from the annual seminar have historically been used to award scholarships to local
college/university students and increasing the costs covered by seminar receipts may reduce
future contributions.
CCEPC ANNUAL SEMINAR
The CCEPC Annual Estate Planning Seminar (hereinafter referred to as the “annual
seminar”) is the second primary source of funds for the organization. The annual seminar is
held in May on the campus of Texas A&M University – Corpus Christi (TAMUCC). Seminar
participants are eligible for eight hours of continuing education credit. In addition to this
primary benefit, the annual seminar also offers social and networking benefits to participants
that some members of the board believe are even more valuable than the continuing education
benefit.
The primary source of revenue for the annual seminar is the seminar registration fee.
Between 1989 and 2001 (when attendance began a downward trend), the average number of
paid registrations per year was 118 with a high of 152 in 1993 and a low of 86 in 2001. Table 1
displays the number of paid registrations and selected participant information for the 2002
through 2012 annual seminars.
Following flat registration numbers for 2002 and 2003, the board identified poor
communication as an issue and implemented various strategies to improve communication
with potential participants including expanding mailing lists and sending promotional materials
farther in advance of the seminar date. Paid registrations increased to 100+ in 2004 and
remained there until 2007 when they again fell to less than 90. The downward trend has
continued since that time with the 2012 numbers falling below 80 for the first time in the 39year history of the seminar.
Some members of the board assume that the decline in registration is a function of the
proliferation of continuing education providers, especially online providers, and increasing
opportunities for CE credit through other professional organizations. One board member
noted that, “…the glory days of the early 1990s appear to be gone”. Increases in competition
may present significant challenges for the organization going forward. Other environmental
variables such as changes in state licensing regulations and requirements, economic forces, and
others may also affect the revenue and/or costs of the organization in general and the annual
seminar in particular.
271
The annual seminar generates a small but increasing amount of sponsorship revenue for
the CCEPC. The College of Business and the Office of Institutional Advance at TAMUCC are
the named co-sponsors of the annual seminar. The College of Business provides resources for
seminar development and support for student guests. The Office of Institutional Advancement
also provides resources including a $500 cash donation to cover selected seminar expenses. In
addition, a local bank donates the cost of the luncheon (up to $1,700) and receives recognition
on the back cover of the seminar book. Starting in 2011, another bank agreed to donate the
cost of the continental breakfast ($750) and is acknowledged with tent cards on the breakfast
tables and on the inside back cover of the seminar book.
In recent years, the seminar coordinator (a finance professor at TAMUCC) has
encouraged the CCEPC to sponsor an increasing number of “student guests” at the annual
seminar. Student guests are asked to pay a nominal fee ($30) to cover meal expenses with the
remaining costs of attendance absorbed by the CCEPC. Some members believe that the board
should look for opportunities to expand the student guest program without incurring additional
costs.
The president of the board is responsible for choosing the speaker(s) for the annual
seminar. The speaker(s) provides a packet of materials that the CCEPC compiles into a
“seminar book” that participants can take away from the event. Some participants (and nonparticipants) have expressed an interest in purchasing additional copies of the seminar book for
recent seminars but the CCEPC has not yet established policies to administer the practice.
Seminar participants are given the opportunity to evaluate the annual seminar. The
evaluation instrument asks respondents to rate the following factors on a scale of poor (1) to
excellent (4): speaker(s) content, speaker presentation, usefulness of the information, quality
of the facilities, value for the money, and overall quality of the seminar. Average ratings for
the 2008 through 2012 seminars appear in Table 2.
The seminar evaluation instrument also includes the following question: “What day of
the week is best for continuing education seminars?” Between 2008 and 2010, 46% of the
evaluators that expressed a preference indicated that Friday was a better day than the historical
Monday date for the annual seminar (see Table 3). The board responded by moving the
seminar to Friday in 2011 and 2012.
Informal comments by seminar participants suggest that some of the participants that
travel from more distant locations may favor the CCEPC annual seminar because it allows
them to take advantage of the tourist and recreational opportunities offered by the Corpus
Christi location. At least one advisor has suggested that the CCEPC might be able to increase
attendance (or at least reverse recent declines) by selectively targeting more “out of area”
prospects and positioning the annual seminar as an opportunity to earn continuing education
credit and enjoy a “weekend break”.
Expenses associated with the seminar speaker can vary widely. Speaker honorariums
for the last five years have varied by as much as $5,000 with speaker expenses (automobile or
airline travel & meals) ranging from a low of less than $400 to a high of nearly $2,500. In
272
addition, the costs of reproducing the seminar book depend on the amount of materials
provided by each speaker. Total costs for producing the seminar book ranged from as little as
$458 to over $2,200 in the last five years.
Because of the co-sponsor relationship with the university (TAMUCC), most of the
activities associated with promoting and delivering the annual seminar are performed by
university personnel for a much lower cost than the CCEPC would incur if it relied on external
providers or contractors. Table 3 lists the Annual Seminar expenses for resources/services
provided by TAMUCC for 2008 through 2012.
The “pre-mailer” and “slick brochure” are the primary promotional materials for the
annual seminar. The pre-mailer is a 5”x8” card mailed to prospective participants about two
months before the seminar announcing the date and speaker. Exhibit 1 is a sample of the premailer for the 2012 annual seminar.
About three weeks after the pre-mailer is sent (in early April), a slick brochure with
more information is sent to the same prospects. The slick brochure is printed on glossy paper,
folded and sealed with mailing information and a brief “teaser” on the outside (see Exhibit 2
for a sample from the 2012 seminar). The inside contains the seminar agenda, registration
information and a detachable registration form (see Exhibit 3 for a sample for the 2012
seminar).
Both promotional fliers are designed and printed at the university and then sent to the
CCEPC clerical support staff for distribution. The CCEPC maintains several mailing lists of
prospects, but has not yet considered consolidating the lists and renting additional prospect lists
to increase the reach of promotional efforts.
In October 2011, the CCEPC created a Facebook page and began posting
announcements for membership meetings and the annual seminar. As of the end of FY 2012,
the CCEPC Facebook page had garnered just 13 “likes” (and was not structured to allow
people to join the group) prompting one advisor to suggest that they are not taking full
advantage of the promotion, communication, and relationship-building opportunities offered
by Facebook (and other social and networking media sites such as Twitter and LinkedIn). The
CCEPC does not have a web site and does not currently accept online registrations for the
annual seminar. Some board members have expressed concerns that the costs of developing an
online registration option outweigh the benefits while other have noted that the ease and
convenience of online registration may increase the number of registrations by more than
enough to cover any costs incurred.
The CCEPC does not currently have a formal process for soliciting additional sponsors
for the annual seminar. Recent economic conditions prompted the bank that sponsors the
annual seminar luncheon to limit its contribution to $1,700. While that level of support has
come within $100 of the actual cost of the lunch in recent years, some members have
expressed concern that any increase in the cost of catering might force the CCEPC to either
reduce the quality of the meal provided or seek additional sponsorship funds.
273
Future sponsorship contributions from TAMUCC may also be influenced by economic
conditions. While the university was able to continue (and even increase) its contribution for
the 2011 and 2012 seminars, there is concern on both sides that the trend toward higher
education budget cuts in Texas may affect the ability of the university to maintain its current
level of sponsorship.
Several companies have offered to sponsor selected costs of the seminar (e.g., the
seminar book, snacks provided during breaks) in recent years. All have requested that their
products be advertised to seminar participants, but most members of the board believe that
allowing advertising in seminar materials for products that may compete with the products and
services offered by CCEPC members is “…a bad idea”. However, a few members and
advisors believe that it may be possible to attract new sponsors for the event that sell noncompeting products and services (e.g., travel & tourism organizations, publishers, business
supplies & services providers, etc…).
The seminar registration fee remained stable at $150 from 1997 until 2004. The fee
increased to $160 in 2004 and to $180 in 2010. In 2011, The Board experimented with a twotier pricing strategy that increased the base fee to $185 while offering a $25 discount to
CCEPC members. The two-tiered strategy yielded a small increase in registrations by existing
members, but decreased registrations by non-members to the lowest level ever recorded.
The board has have expressed concern about breaking through ‘psychological prices
levels.’ For instance, $199 would be more palatable than $200. However, the board is
reluctant to raise the seminar registration fee again so soon after the last increase, especially in
the face of declining registration numbers.
Most of the annual seminar expenses are incurred in the final two weeks before the
seminar.
The seminar book is printed at the university the week before the seminar and
delivered to the University Center the Friday before the meeting. Catering is confirmed seven
(7) days before the meeting. While the University Center is booked a year in advance, because
the seminar qualifies as a university-sponsored event, the CCEPC does not pay a deposit or
incur the normal cancelation fees for reservations. The speaker’s hotel room is booked through
the university to take advantage of state rates, but the reservation is not billed until the speaker
checks into the room. The university also provides a welcome message and directions to the
event (and event parking) on university marques for a nominal fee. Miscellaneous expenses
including name tags and phone and other support by graduate students are also incurred during
the week of the seminar.
If the annual seminar were to be cancelled, the expenses that were already incurred
would have to be reimbursed to the university and would expenses associated with services
already rendered by the secretarial service. For example, if the speaker cancelled before the
catering was confirmed or the books printed, those expenses would not be incurred, nor would
the rental of the ball room. Likewise, the speaker’s fee, hotel and travel expenses would not be
due. The worst case scenario would be if a problem on campus that occurred the day of the
event. If the university suffered a power or water outage or if an early hurricane threatened the
274
area the day of the event, the seminar would likely have to be cancelled and the registration
fees returned, but the expenses paid. Such events are not probable but do increase the risk of
any strategy that involves subsidizing monthly meeting costs or membership dues with the
annual seminar.
Table 5 summarizes the total receipts and disbursement for the CCEPC for the most
recent five years. It also shows the year-end balance for the organization’s checking and
investment (CD) accounts.
As the board prepares for the first director’s meeting of the 2012-13 fiscal year, they
face a number of challenges revealed by ongoing analysis of the information presented above.
If the board wishes to cover membership meeting costs and operating expenses with
membership dues, then it must consider increasing membership dues. Alternatively, if the
board wishes to subsidize membership dues (possibly to the point of reducing dues in the
future), then it must identify strategies to increase receipts and/or decrease the costs of the
annual seminar. As evidenced by some of the information presented above (e.g., changing the
day of the seminar, creating a Facebook page), the board has demonstrated its openness to new
marketing strategies for the annual seminar as long as those strategies don’t compromise the
mission or reputation of the organization.
TABLE 1
ANNUAL SEMINAR PARTICIPANTS
2002 2003 2004 2005 2006
91
87
116
104
105
Paid Registrations
Career Field
2007
89
2008
92
2009
91
2010
84
2011
91
2012
77
22
31
17
11
10
91
23
39
15
6
4
87
32
42
26
10
5
115
27
46
14
7
10
104
31
47
12
6
9
105
28
34
13
5
7
87
31
33
15
5
8
92
26
29
12
5
10
82
27
34
12
10
3
86
35
32
15
5
4
91
18
32
11
14
2
77
83
79
93
88
81
74
76
69
69
70
60
1
1
9
4
11
9
11
11
13
9
9
5
4
11
8
9
2
3
5
1
2
2
2
3
0
2
1
1
0
0
0
1
1
5
0
91
0
87
2
115
2
104
3
105
1
87
2
92
6
91
1
84
9
91
5
77
Member
Non-member
Total
50
41
91
50
37
87
63
52
115
72
32
104
61
44
105
54
33
87
49
43
92
54
34
88
47
35
82
49
42
91
53
24
77
Attorney
CPA
Trust Officer
CLU/Insurance
Other
Total
Geographic Location
1
Corpus Christi, TX
2
Victoria, TX
3
San Antonio, TX
4
Brownsville-Harligen, TX
Other
Total
Membership Status
1
Includes the communities of Portland, Robstown, Beeville, Alice, Port Aransas, Aransas Pass, Rockport, Refugio, Bayside, Freer & Kingsville
Includes the communities of Port Lavaca, Goliad, and Palacios
3
Includes the communities of Pleasanton & Karnes City
2
4
Includes the community of Rio Grande City
Includes participants from as far away as Houston, Austin, and Henderson.
5
275
TABLE 2
ANNUAL SEMINAR EVALUATIONS
2008
2009
2010
Speaker Content
n/a
n/a
Speaker Presentation
n/a
Overall Rating
Usefulness of Information
1
2011
2012
3.38
3.54
3.46
n/a
3.23
3.67
3.54
3.04
3.55
3.38
3.65
3.44
3.04
3.3
3.32
3.59
3.23
Facilities
3.65
3.74
3.5
3.55
3.77
Good Value
3.35
3.68
3.5
3.67
3.66
2
1
Speaker Content & Speaker Presentation numbers are the average of three speakers. Individual
ratings ranged from 3.04 to 3.74 for content and from 2.75 to 3.81 for presentation.
2
Speaker Content & Speaker Presentation numbers are the average of five speakers. Individual
ratings ranged from 3.11 to 3.77 for content and from 3.11 to 3.83 for presentation.
TABLE 3
BEST DAY FOR CE SEMINARS
2008 2009 2010 2011 2012
Monday
13
11
21
27
12
Tuesday
5
5
5
5
2
Wednesday
3
2
4
3
3
Thursday
10
8
9
11
6
Friday
32
29
22
13
30
TABLE 4
ANNUAL SEMINAR EXPENSES (TAMUCC)
2008
2009
2010
2011
2012
Pre-mailers
$48.62
$37.88
$63.17
$62.27
$81.83
Slick Brochures
220.22
270.63
355.59
$313.21
$303.00
Seminar books
2,208.15
458.48
910.60
$1,095.35
$740.78
Catering (breakfast, lunch & breaks)
2,510.75
2,783.35
2,668.35
$1,748.53
$2,587.65
University Center
636.37
664.56
667.70
$604.65
$784.50
Speaker's Hotel Room
185.30
97.75
196.20
$189.66
$0.00
University Marques
75.00
75.00
75.00
$75.00
$0.00
Pin Name Tags
20.98
37.18
0.00
$16.89
$15.12
Phone and Graduate Student Support
100.00
135.00
50.00
$200.00
$250.00
$6,005.39
$4,559.83
$4,986.61
$4,305.56
$4,762.88
TOTAL
276
TABLE 5
CCEPC RECEIPTS & DISBURSMENTS
FYE 6/30/08
FYE 6/30/09
FYE 6/30/10
FYE 6/30/11
FYE 6/30/12
$10,760.00
$11,835.00
$12,515.00
$12,690.00
$13,350.00
$35.00
$315.00
$285.00
$200.00
$75.00
$16,415.00
$16,045.00
$15,205.00
$16,790.00
$13,900.00
$1,254.00
$2,163.50
$3,017.70
$4,900.00
$5,000.00
$30.00
$210.00
$115.00
$270.00
$360.00
Receipts
Membership Dues
Late Registration/No-show Fees
Seminar Registration Fees
Seminar Sponsorships
Seminar Guest Fees
Other Receipts
1
TOTAL RECEIPTS
$0.00
$448.29
$597.79
$2,500.00
$0.00
$28,494.00
$31,016.79
$31,735.49
$37,350.00
$32,685.00
$1,268.14
Disbursements
Board Meeting Expenses
$824.83
$1,280.52
$1,286.54
$1,052.14
Membership Meeting Expenses
$7,831.37
$8,464.56
$9,921.88
$8,728.40
$7,772.18
Meeting Speaker's Expenses
$1,167.81
$1,112.36
$1,100.39
$1,244.50
$1,501.01
$9,824.01
$10,857.44
$12,308.81
$11,025.04
$10,541.33
$2,467.07
$2,859.56
$2,510.56
$1,444.49
$2,796.57
$347.50
$499.50
$1,344.00
$1,540.50
$987.00
$0.00
$0.00
$775.00
$810.00
$0.00
$211.00
$38.00
$42.00
$40.00
$52.00
SUBTOTAL MEMBERSHIP MEETING COSTS
Clerical Support
CE Accreditation
Tax Return
PO Box Rental
Check Printing Charge
Postage
Gifts
SUBTOTAL OPERATING COSTS
Annual Seminar Speaker's Expenses
$78.95
$63.96
$0.00
$0.00
$0.00
$0.00
$680.00
$350.44
$585.00
$458.23
$75.00
$254.28
$433.25
$400.00
$270.63
$3,179.52
$4,395.30
$5,455.25
$4,819.99
$4,564.43
$2,227.85
$157.06
$365.39
$1,382.44
$379.01
$3,000.00
$5,000.00
$3,500.00
$4,000.00
$0.00
Annual Seminar Expense
$6,005.39
$4,559.83
$4,986.61
$4,305.56
$4,762.88
Seminar Coordinator Stipend
$1,500.00
$1,500.00
$1,500.00
$1,500.00
$1,600.00
$0.00
$185.00
$160.00
$160.00
$350.00
$10,662.45
$11,610.22
$11,529.05
$10,344.57
$8,940.73
Annual Seminar Speaker's Honorariums
2
Seminar Refunds
SUBTOTAL ANNUAL SEMINAR COSTS
Scholarships
3
TOTAL DISBURSEMENTS
NET RECEIPTS
$10,000.00
$5,000.00
$6,000.00
$1,500.00
$6,000.00
$33,665.98
$31,862.96
$35,293.11
$27,689.60
$30,046.49
($846.17) ($3,557.62) $9,660.40
$2,638.51
($5,171.98)
Additional Information
Actual Checking Account Balance
CD Balance
$12,250.32
$17,948.05
$9,904.15
$18,497.37
$5,161.73
$18,869.17
$14,572.13
$16,454.08
$17,210.64
$16,454.08
1
Following the significant shortfall of funds in FY 2010, the board cashed in a CD for $2,500 to cover scheduled disbursements at the beginning of
FY 2011.
2
The 2012 annual speaker requested that the honorarium be used to fund an additional scholarships ($1,000) to TAMUCC.
The CCEPC traditionally awards $5,000 in scholarships each year. An adminstrative oversight caused the FY 2006-07 scholarship funds not to be
distributed to TAMUCC until after the award deadline and the funds were not distributed to students in Fall 2007. When the CCEPC requested a
five-year summary of recipients in early FY 2011, the error was discovered and the CCEPC decided to apply the balance of the funds held by the
university to the Fall 2011 scholarships instead of making the scheduled contribution in May. The CCEPC added an extra $1,500 in scholarship
funds for FY 2011
3
277
EXHIBIT 1
2012 ANNUAL SEMINAR PRE-MAILER1
THE CORPUS CHRISTI ESTATE PLANNING COUNCIL’S
39th Annual Estate Planning Seminar
Co-sponsored by the College of Business, Texas A&M University-Corpus Christi & the
Division of Institutional Advancement, Texas A&M University-Corpus Christi
FRIDAY, MAY 18, 2012 From 8am to 5pm
University Center, Texas A&M University-Corpus Christi
Reserve this date on your calendars now!
A detailed brochure and registration form will be mailed 4-5 weeks prior to the seminar.
Presented by the Prestigious Law firm of
Meadows, Collier, Reed, Cousins,
Crouch & Ungerman, L.L.P.
Topics include: Using Family Limited Partnerships; IRS and Tax Update; Estate Planning with
Life Insurance and Annuities; and much more!
Approval is being requested for continuing education hours for member professions
For more information: (361) 825-2829, eugene.bland@tamucc.edu,
Don’t miss this year’s presentation…Great Speakers & Invaluable Materials!!
1
Speakers’ names and contact information for CCEPC hidden to protect privacy
278
EXHIBIT 2
2012 ANNUAL SEMINAR SLICK BROCHURE -- OUTSIDE1
1
Speakers’ names and contact information for CCEPC hidden to protect privacy
279
EXHIBIT 3
2012 ANNUAL SEMINAR SLICK BROCHURE -- INSIDE1
1
Speakers’ names and contact information for CCEPC hidden to protect privacy
280