Thesis Outline

Nervous and full of college life will be curtains, graduates have to go through the final thesis, thesis is a more formal form of testing the results of university learning, how to make the thesis to focus on it? The following is my collection of thesis outline, just for reference, I hope to be able to help you.

Thesis Outline Part 1

(A) The basic idea of the thesis:

(A) Introduction

1, the significance of the study of the thesis

2, the purpose of the study of the thesis

3, the content of the study of the thesis

4, the basis of the thesis (① the concept of human resources ② the concept of human resource management) The concept of human resource management ③ Hierarchy of needs ④ Two-Factor)

(2) Analysis of the current situation of risk management in human resource management

1, the concept of risk management in human resource management.

2. Analysis of the current situation of risk management in human resource management

Analysis of the current situation of human resource management in foreign countries

Analysis of the current situation of human resource management in China

3. Analysis of the types of risk management in human resource management

①Recruitment risk

②Performance appraisal risk

③Salary management risk

③Salary management risk

3. p>

④ Employee Recruitment Risk

⑤ Labor Management Risk

(C) Reasons for Risks in Human Resource Management

① Individual Employee Reasons

② Corporate Reasons

③ Market Reasons

(D) Risks Managing in Human Resource Management risk management

1, the concept of risk management management in human resource management

2, the steps of risk management in human resource management

① according to the type of risk management in human resource management to carry out targeted and effective research

② based on the results of the survey and experience risk management predictions (quantitative, presented in the form of a percentage)

② based on the results of the survey and experience (measured, presented in the form of a percentage)

③ risk management predictions (measured, presented in the form of a percentage). (percentage form)

③ According to the results of the prediction of the risk associated with the ranking, for the ranking of the elimination of the risk of the draft program

④ reported the draft program to the higher authorities

⑤ implementation of the program (with examples)

⑥ in the implementation of the program in the process of the emergence of new problems, in order to address the new problems to the program to be modified

(E) risk monitoring of human resources management

1, the concept of risk monitoring of human resources management

2, the steps of risk monitoring of human resources management

① Risk survey ② Risk identification and awareness ③ Preparation of the program to prevent risk ④ Implementation and adjust the program at any time ⑤ Assessment ⑥ Establishment of a risk database

(VI) Summary

(VII) Main References

Thesis Outline Part 2

I. Thesis Topic

Analysis of Innovative Marketing of Blog Marketing

II, Thesis point of view source:

With the development of the network, more new things are constantly emerging. The emergence of the network and e-commerce has completely changed the original marketing and practice of the foundation of existence. The foundation has changed, the environment has changed, the market has changed, and the ensuing marketing and management model will be fundamentally changed.

Through the form of writing blogs, introducing the seller himself and selling products, to make friends and product sales of people are also increasing day by day. This has given rise to a new innovative marketing - blog marketing.

Third, the basic point of view:

1, what is blog marketing, blog marketing is not the same as marketing blog

2, the current situation and development of blog marketing

3, the basic characteristics of the blog marketing

4, to understand the opportunities and challenges of the blog marketing to enterprises

5, Challenges and Countermeasures of Blog Marketing on Internet Marketing (Deficiencies)

Fourth, the structure of the paper:

(a) Introduction

Introduces the current situation, characteristics, prospects for the development of blog marketing and raises the question.

Conduct a superficial analysis of blog marketing and solve the problem.

1. What is blog marketing, blog marketing is not equivalent to marketing blogs

(1) What is blog marketing

(2) Understand that blog marketing is not equivalent to marketing blogs

2. p> 3. The basic characteristics of blog marketing

(1) Blog marketing is based on bloggers' personal and viewpoints

(2) It is necessary to combine the idea of blog marketing with the internal strategy of the enterprise's web site

(3) A suitable blogging environment is a necessary condition for the benign development of blog marketing

(4) Blog marketing should correctly deal with the relationship between the personal viewpoints and the enterprise's The relationship between personal viewpoint and enterprise position

4. Understanding the opportunities and challenges brought by blog marketing

5. Challenges and countermeasures of blog marketing to network marketing (deficiencies)

(3) Conclusion: Blog marketing is a new model under innovative marketing, which is a product of innovative marketing in the network era.

Dissertation Outline Part 3

Dissertation Name: Innovation and Development of Management Accounting in the 21st Century

Dissertation Source: Self-selected

Dissertation Type:

Supervisor:

Student's Name:

Student's No.:

Specialty:

I. Basis for Selection

21st century management accounting.

The 21st century will be a knowledge-based economy dominated by the rapid development of computer technology and modern network technology as the representative of the information revolution to the depth and breadth of social life penetration; the rapid development of high-tech and technology content of the proportion of the economy has greatly increased; all aspects of human society will undergo major changes in the era. In order to adapt to the requirements of the times, enterprise management innovation has made progress in all aspects, while management accounting innovation is not strong enough. There are many issues that need to be innovated and developed in the field of management accounting, this paper is only on the concept of management accounting, the content of management accounting and management accounting research methodology in three aspects of the slightest opinion

Second, the basic idea of writing

Preface

First, the update of the concept of management accounting

1.1 market Concept

1.2 The overall concept of the enterprise

1.3 The concept of dynamic management

1.4 The concept of corporate values

II. Adjustment and Expansion of the Content of Management Accounting

2.1 The Cost Management Aspect

2.2 The Decision Analysis and Evaluation Aspect

2.3 The Human Resource Management Issues

III. Development and Improvement of Management Accounting Research Methods

Conclusion

References

IV. Research Objectives and Key Problems Solved

The paper mainly talks about its own rough views from three aspects, namely, from the concepts of management accounting, the contents of management accounting and the research methods of management accounting.

Third, the data collection plan

The sources of information are mainly books, journals and magazines and the Internet, with the development of the economy, people's understanding of service marketing is also improving and deepening. Many scholars at home and abroad have carried out research on service marketing of commercial banks, and the following materials have been studied in the process of writing this paper:

[1]Guo Daoyang. The emergence and evolution of management accounting in the twentieth century [J]. Exploration, 1999, (3).

[2]Yu Ou Tassel. Briefly discuss the new development of contemporary management accounting [J]. Accounting Research, 1995, (7).

[3]Pan Fei. Management accounting research results and future prospects in the nineties [J]. Accounting Research, 1998,(9).

[4]Yu XU Tassel. Briefly discuss the application of Sun Tzu's Art of War in strategic management accounting [J]. Accounting Research, 1997, (12).

[5]Li Pingli. Strategic management accounting development and challenges [J]. Accounting Research, 1999, (1).

[6]Yang Xiongsheng. Improving the quality of accounting research in China's thinking [J]. Accounting research, 1997, (11).

[7]China Accounting Society Nuclear Industry Professional Committee. Cost management problems of contemporary enterprises in China [J]. Accounting Research, 1996, (9).

[8]Wang Yu. Corporate development strategy and management [M]. Shanghai: Lixin Accounting Press, 1997.

[9]Guo Xiaojun et al. Knowledge economy and enterprise management [M]. Beijing: China Economic Press, 1998.

Fourth, the conditions and advantages of completing the dissertation

The previous scholars and experts on the innovation and development of management accounting issues, has accumulated a certain foundation and practical basis, so the study of this topic has considerable and practical significance; I have on the issue of management accounting issues problems I have done a lot of preliminary information search and analysis and paved the way for research work; at the same time, I studied the accounting profession, but also has a certain degree of professional knowledge.

V. Thesis writing progress plan:

20xx February XX day before the completion of the opening report

20xx XXX day before the completion of the thesis fine outline of the writing, and began the first draft of the paper

20xx XXX day before the completion of the first draft of the paper, and began to the paper binding

20xx XXX day before the completion of the first draft of the paper

Submit the final draft of the dissertation to the instructor before XXX, 20xx

Start to prepare for the dissertation defense before XXX, 20xx

Signature of Instructor: Date:

Dissertation Outline Part 4

Abstract 4-5

Abstract 5

Chapter 1 Preface 8-15

1.1 Background and Significance of the Study 8-10

1.1.1 Background of the Study 8-9

1.1.2 Significance of the Study 9-10

1.2 Current Status of Domestic and Overseas Research 10-13

1.2.1 Research on the Contents of Corporate Social Responsibility Disclosure 10

1.2.2 Research on the Corporate Social Responsibility Disclosure Mode Research 10-111.2.3 Research on Measurement Methods of Corporate Social Responsibility Information Disclosure 11-121.2.4 `Empirical Research on the Relationship between Corporate Social Responsibility Information Disclosure and Enterprise Value 12-131.2.5 Literature Review 13

1.3 Research Ideas and Content Framework 13-14

1.4 Research Methods 14-15

Chapter 2 The Basis of Corporate Social Responsibility Disclosure and Corporate Value 15-212.1 Definition of Relevant Concepts 15-16

2.1.1 Definition of Corporate Social Responsibility 15-16

2.1.2 Definition of Corporate Value 16

2.2 Relevance of Corporate Social Responsibility 16-19

2.2.1 Entrusting Agency 16 -17

2.2.2 Stakeholders 17

2.2.3 Signaling 17-18

2.2.4 Sustainable Development 18-19

2.3 Corporate Value 19-20

2.4 Summary of the Chapter 20-21

Chapter 3 Indicators of Social Responsibility Disclosure of Listed Companies in China Construction and Current Situation Analysis 21-323.1 Content Definition of Social Responsibility Information Disclosure of Listed Companies in China 21-223.1.1 Characteristics of Content Definition Research 21

3.1.2 Definition of the Content of CSR Disclosure in this Paper 21-223.2 Selection of Measurement Methods of Social Responsibility Information Disclosure of Listed Companies in China 22-243.2.1 Comparison of various measurement methods Comparison 22-24

3.2.2 Measurement Methods of Corporate Social Responsibility Information Disclosure Selected in this Paper 243.3 Analysis of the Current Situation of China's Listed Companies' Social Responsibility Information Disclosure 24-303.3.1 Sample Selection and Data Source 24-25

3.3.2 Descriptive Statistical Analysis of China's Listed Companies' Social Responsibility Information Disclosure 25-303.3 .3 Problems of Social Responsibility Information Disclosure of Listed Companies in China 303.4 Summary of the Chapter 30-32

Chapter 4 Empirical Research on the Value Relevance of Social Responsibility Information Disclosure of Listed Companies in China 32-414.1 Analysis and Research Hypotheses 32

4.2 Sample Selection and Data Sources 32-33

4.3 Modeling and Variable Description 33-35

4.3.1 Model Construction 33

4.3.2 Description of Variables 33-35

4.4 Empirical Analysis 35-40

4.4.1 Descriptive Statistics of Variables 35-36

4.4.2 Correlation Analysis of Variables 36

4.4.3 Regression Analysis of Models 36-39

4.4.4 Robustness Test 39-40

4.5 Summary of the Chapter 40-41

Chapter 5 Conclusions and Recommendations 41-43

5.1 Main Conclusions 41

5.2 Relevant Recommendations 41-42

5.3 Limitations of the Study and Research Outlook 42-43

< p> References 43-46

Appendix: Examples of Social Responsibility Disclosure Scores of Listed Companies in China 46-49 Acknowledgements 49

Dissertation Outline Part 5

Dissertation Outline Format:

I. Dissertation Title. Thesis title should be able to summarize the most important content of the entire thesis, concise, compelling, generally should not exceed 20 words. Thesis title is generally divided into general title, subtitle, sub-title several.

Second, the catalog. Both the outline of the thesis, but also the thesis components of the subheading, should be labeled with the corresponding page number.

Third, the abstract. Abstract is a microcosm of the contents of the full text. Here, the author of a very economical ink, sketched out the overall face of the whole text; put forward the main arguments, reveal the findings of the paper, briefly describe the framework structure of the whole text.

Fourth, keywords or subject lines. Keywords are selected from the title of the paper, synopsis and the body of the paper, is the expression of the central content of the paper has a substantial significance of the vocabulary. Keywords are words used to systematically characterize the content of the paper, so that the information system can be assembled for readers to retrieve. Generally, 3-8 words are selected as keywords for each paper, which are placed on a separate line to the lower left of the abstract. Theme words are normalized words, in determining the theme words, the theme of the paper, in accordance with the rules of citation and grouping converted into the standardized words in the theme word list.

V. Introduction (or preface). The content should include the current situation of the research field at home and abroad, the problems to be solved in this thesis and the significance and practical value of this research work in economic construction, scientific and technological progress and social development.

Sixth, the body. The main body is the main body of the paper, the body should include the argument, argument, argumentation process and conclusion. The main part includes the following content: a. put forward - argument; b. analyze the problem - arguments and arguments; c. solve the problem - arguments and steps; d. conclusion. The conclusion of the paper should be clear, concise, and complete, and should set out your creative results or new insights, as well as the significance in the field.

VII. References and Notes. The references and notes are listed in the order of the number of the cited literature or notes in the paper after the body of the paper and before the references. Figures or data must be cited with source and provenance.

References are journals, written in the following format:

[number], the author, the title of the article, the name of the journal (foreign language can be abbreviated), the year, volume number, issue number, page number.

When the reference is a book, the writing format is:

[number], author, title of the book, publishing unit, year, edition, page number.

Eight, appendix. Including placed in the body of the excessively lengthy derivation of formulas, in order to prepare for the convenience of others to read the required auxiliary mathematical tools, repetitive data charts, the meaning of the symbols used in the paper, the unit abbreviation, the full text of the program and the relevant instructions.

Model:

In the enterprise management information system there are many enterprise documents in the flow, which certainly have the importance of the document, and some even involved in the development of the future of the enterprise, if these information in the general over the network transmission by competitors or criminals 20xx, leaks, tampering or forgery, will seriously threaten the development of the enterprise, so the small and medium-sized electronic information.

These are the most important and important information that can be used for the development of a company.

First, the significance of the information construction of small and medium-sized enterprises

In this network information age, the process of informationization of enterprises continues to develop, and information becomes the key to the success or failure of enterprises, but also an important way to improve the level of management. Nowadays, the business activities of enterprises, basically using the form of e-commerce, enterprise production operations, transportation and sales of all aspects of the use of information technology. For example, through the network to collect some information about the quality of raw materials, price, origin and other information to establish a raw materials information system, this information system has a great role in the procurement of raw materials. Through the analysis of data, we can get more procurement suggestions and countermeasures to achieve the level of enterprise electronic information technology. Relevant surveys show that eighty-two percent of small and medium-sized enterprises should be on the website is still in the publicity of corporate image, release of product and service information, to collect customer information at this stage, and e-commerce so that the relationship between the transaction of the application of less than a quarter, which shows that the enterprise has not yet been fully developed and utilize the commercial channels of information. The era of informatization of small and medium-sized enterprises has come, enterprises should speed up the construction of information technology.

Second, electronic information security technology

1, electronic information in the encryption technology

Encryption technology can make the transmission of data more secure and complete, encryption technology is divided into symmetric and asymmetric encryption. Symmetric encryption is usually realized through the sequence code or group secret, including plaintext, key, encryption algorithm and decryption algorithm and other five basic components. Asymmetric encryption is different from symmetric encryption in that asymmetric encryption requires two keys, a public key and a private key, which must be used in pairs, and encryption with the public key can only be decrypted by its corresponding private key. Encryption with a private key can only be decrypted with its corresponding public key.

Encryption technology can protect the confidentiality of transmitted electronic messages. When sending electronic messages, the sender encrypts the message with an encryption key or algorithm, and then sends it out. If someone steals the message during transmission, he can only get the ciphertext, which is unintelligible. The receiver can use the decryption key to decrypt the ciphertext and restore it to plaintext.

2, firewall technology

With the development of network technology, some of the mail 20xx, viruses, Trojans and online hackers and other security of the network has also caused a great threat. The informationization of the enterprise makes its network also suffered the same threat, the security of the enterprise electronic information is difficult to be guaranteed. One of the first protection measures against network insecurity is the firewall. In our personal computers, firewalls also play a great role, it can prevent the invasion of non-hackers, computer information tampering and so on.

3, authentication technology

Message authentication and identity authentication are two forms of authentication technology, message authentication is mainly used to ensure the integrity of the information and anti-repudiation, the user through the message authentication to confirm the authenticity of the information and whether it is modified by a third party or forgery. Identity authentication is used with the identification of the user's identity, including identification and verification of two steps. Clarifying and distinguishing the identity of the visitor is identification, and confirming the identity of the visitor is called verification. Users must pass authentication when accessing some non-public resources. For example, when accessing the score checking system of a university, the student number and password must be verified before accessing. Some of the resources in the university library have to be accessed from the campus network, and non-campus networks cannot be accessed unless they pay for a qualified access identity.

Three, the main security elements of electronic information in small and medium-sized enterprises

1, the confidentiality of the information

In today's network era, the confidentiality of information seems to have become less easy to work with, but the information directly on behalf of the enterprise's commercial secrets, how to protect the enterprise information is not stolen, tampered with, misused and How to protect corporate information from theft, tampering, abuse and destruction, how to use the Internet for information transfer and can ensure information security has become an important issue that small and medium-sized enterprises must address.

2, the effectiveness of the information

With the development of electronic information technology, small and medium-sized enterprises are using the electronic form of information transfer, the effectiveness of the information is directly related to the economic interests of the enterprise, but also a business trade is a prerequisite for the smooth progress. So to rule out a variety of network failures, hardware failures, the potential threat of these network failures to control and prevent, so as to ensure the effectiveness of the transmission of information.

3, the integrity of the information

The business strategy of the parties to the enterprise transaction is seriously affected by the integrity of the information of the parties to the transaction, so to maintain the integrity of the information of the parties to the transaction is very important to the parties to the transaction are very important. In the process of information processing to prevent the arbitrary generation and modification of information, in the transmission process to prevent the loss of information, to maintain the integrity of the information is the basis for transactions between enterprises.

Four, to solve the small and medium-sized enterprises in the electronic information security problems of the strategy

1, build small and medium-sized enterprises electronic information security management system to solve the problem of information security in addition to the use of security technology, but also should be established a set of perfect electronic information security management system to ensure that the smooth progress of information security management. In general small and medium-sized enterprises, the initial establishment of the relevant information management system to a large extent restricts the security of an information system. If there is a problem with the security management system, then the selection and use of security management techniques and means around this system will not be able to proceed normally, and the security of information will not be guaranteed. Perfect, strict electronic information security management system has a great impact on the security of information systems. In the enterprise information system, if there is no strict and perfect information security management system, electronic information security technology and related security tools are unlikely to play a due role.

2, the use of enterprise network conditions to provide information security services many enterprises in the system of a number of secondary units are connected through the wide area network, local area network in the units are all built, the enterprise should take advantage of this good network conditions for the enterprise to provide good information security services. Through the enterprise this network platform to publish technical standards, security announcements and security regulations, to provide information security software downloads, security equipment selection, to provide online information security education and training, and at the same time for the enterprise staff to provide a place to exchange experience.

3, regular evaluation of the security protection software system, improve with the development of enterprises, enterprise information technology applications and information technology is also constantly developing, people's understanding of information security issues with the development of technology and constantly improve, in the electronic information security issues continue to be found at the same time, to solve the problem of information security security security protection software system should be constantly improved, regular system To evaluate.

In short, the various small and medium-sized enterprises electronic galaxy security technology contains technology and management, as well as systems and other factors, with the continuous development of information technology, not only small and medium-sized enterprises office gradually tend to office automation, but also to ensure that the enterprise electronic information security.