Saturday, August 31, 2019
Mind/Body Problem Essay
The mind/body problem is the problem of specifying the relationship between the mind and body. Before further explanation of this issue, it is important to fully understand each term as it is being used throughout this paper. The mind, as I will call it, is representational of the consciousness of an individual. This is to say that the part of a person which determines will and choice, the experiences and sensations are collectively referred to as mind. The body, at times more specifically, the brain, denotes the physical aspects of a person. This is inclusive of the physical mass, neurons responsiveness to stimuli, and physical location. Now, with a more complete understanding of mind and body, one is able to return to the issue of the relationship concerning the two. One way to view this subject is to think of it as defining the relationship of mental states and brain (neural) states. While philosophers have not reached a definitive explanation to this issue, the years have provided ample time for a few prominent theories to develop. It may be thought that science could provide an answer to our problem, though this is not the case. While science may give us insight to different functions of brain states that correlate to mental processes, it does not definitely prove how they are related or why. This can be explained through the point of view perception. Science can give a clear understanding of how the brain functions; it can paint a rich picture of the inputs and outputs. Science may also have the ability to explain what feelings and emotions are. For example, it may be able to explain biting into a summer peach and describe the taste. However, science cannot experience the way a summer peach tastes to me, as an individual. It cannot feel the way I do whenever I think about my mother. This is the difference in the third person perspective (the only one that science is truly able to offer) and the first person perspective of the individual actually experiencing the situation. While it seems as though there is a causal relationship between the mind and body, meaning that the mind affects the body and the body has an effect on the mind, the question still remains as to how this interaction functions and why. It is at this point that philosophers provide different solutions to these questions. The dualist perspective offers that the mind and body are two completely distinct ontological entities, whether in composition, function, or interaction. Conversely, the physicalist argues that the mind and body are both explainable in physical terms because there is nothing more to this world than the physical aspects. This is to say that the mind is of the same stuff as the body because in fact, they are the same. The mind is simply a process of the physical brain. Frank Jackson utilizes a mind experiment in his writing, What Mary Didnââ¬â¢t Know to challenge this thought of physicalism. Jackson asks his readers to imagine a woman named Mary who is confined to a black and white room. She is taught through a black and white screen everything that there is to know about the physical nature of the world. According to physicalism, she knows all there is to know. However, one day Mary is taken outside of the black and white room. At this time, she will learn what it is like to see and experience the color red. According to Jackson, Mary learns something new; something above and beyond all of her physical knowledge of the world. If this is the case, that would result in the fact that there are some things in the world that are not physical things. Jacksonââ¬â¢s argument may be structured in a way that clearly defines his point. Mary knows everything physical there is to know about other people. Mary does not know everything there is to know about other people. It follows that there are truths about other people that escape the physicalistââ¬â¢s story. Utilizing the knowledge argument, Jackson asserts that because Mary learned what experiencing the color red is like, that she learned something new and gained knowledge about something outside the physicalistââ¬â¢s argument. This, in Jacksonââ¬â¢s perspective, discredits physicalism because if while in the black and white room Mary knows every physical fact, then she must know everything. However, by gaining a new experience and learning something outside of the room, then there are things that cannot be explained physically. Jackson argues that learning on a black and white screen isnââ¬â¢t enough to learn about mental life. It is not enough to learn about the qualia of experiences. These qualia refer to the individual qualitative feelings of an experience. For example, what tasting a ripe summer peach is actually like to experience. Therefore there must be something more to the story. Taking a different view, Colin McGinn offers his perspective on the mind/body problem in his writing, Can we Solve the Mindââ¬âBody Problem? McGinn suggests that no, we cannot solve the mind/body problem and therein lies our solution- that we should not be worried about this issue because we will never be able to solve it. McGinn maps out several reasons to support his conclusion. He begins by explaining why previous attempts of explanation have failed to clarify the mind/body problem. McGinn states that previous arguments use one of two tactics. The first is to resort to the use of supernatural means. McGinn says that this is just as ââ¬Å"extreme as the problemâ⬠, meaning that proving this premise is just as difficult as the conclusion it is designed to support. Furthermore, he says that other arguments employ the use of explaining mental states through physical properties of the brain. This proves problematic as well. McGinn offers a different avenue, it is what he calls, cognitive closure. He believes that there is a natural explanation for the way in which the mind and body interact with each other but that we, as humans, are closed to its explanation. He proposes his argument in this way: Human minds are similar to biological bodies in which that they have different levels of capacity and cognitive capability. Even though a mind may not possess the cognitive ability to understand a concept, this would not imply that the concept is untrue. He uses the example of the light spectrum. While humans can only view a small portion of the light spectrum, it does not discount the other levels. The same principle may be applied here. Furthermore, an idea may be completely cognitively closed if there is no possibility of any mind being able to understand it. However, the same standard of its truth value remains. McGinn argues that the mind/body problem is an issue that is completely cognitively closed to humans. Therefore, no matter what advancements in science or technology that may occur, it will still never be enough to understand the mind/body problem. This should give humans some peace of mind. McGinn says that there should be not need to worry about solving an issue that can never be solved. Keeping McGinnââ¬â¢s paradigm of thought in mind, once again consider Jacksonââ¬â¢s article, What Mary didnââ¬â¢t know. While Jackson seems to offer a strong argument, McGinn may object to it on the basis of his first premise. If the human mind is cognitively closed to certain levels of knowledge, then it is impossible for Mary to learn everything there is to know in her black and white room. In fact, it does not matter where Mary receives her learning, she will never gain complete knowledge. Her limit would reach the level of knowledge in which her brain is cognitively open to her. While it is true that Mary would have the knowledge of everything that humans could possibly understand; she still is not all-knowing. By denying Jacksonââ¬â¢s first premise, it renders his argument invalid.
Friday, August 30, 2019
Online Blood Banking (Srs)
SRS FORMAT Index & Tables 1. Introduction Purpose of the Project: Online Blood Bank is aims serving for human welfare. We have all the information, you will ever need. Many people are here for you, to help you, willing to donate blood for you anytime. We have done all the job, rest is yours. search the blood group you need. You can help us by registering on Online Blood Bank if you are willing to donate your blood when needed. As a proud member of OnlineBloodBank and a responsible human being, you can help someone in need. So donate blood in online. Scope of the project: Online Blood Bank is aims serving for human welfare.We have all the information, you will ever need. Many people are here for you, to help you, willing to donate blood for you anytime. We have done all the job, rest is yours. search the blood group you need. You can help us by registering on Online Blood Bank if you are willing to donate your blood when needed. As a proud member of OnlineBloodBank and a responsible h uman being, you can help someone in need. So donate blood in online. Modules: 1. Admin 2. Donar 1. Admin: This module focuses on the both donars & acceptors. Each member in a donar & acceptor is given a user id and password, which identifies him uniquely.The member is given a login form. he enters the login details user id and password. .. The options given to â⬠¢ Change Password â⬠¢ Maintain donar details â⬠¢ Maintain referral once â⬠¢ Update donar details â⬠¢ View Experiances â⬠¢ Logout Whenever a user wants to change his / her password he can select the change password option. The system displays the form, which asks him for his old password and new password. The system then compares the old password with the existing password in the database and if they match then the password is set to the new password in the database.The id for retrieving the details from the database is brought through the session, which is maintained using cookies in the form. This re moves the burden on user in typing user id again and also maintains security by not allowing one user to change password of other accidentally. 2. Donar: Each member in a Donar is given a user id and password, which identifies him uniquely. The member is given a login form. he enters the login details user id and password. .. The options given to a each member in a staff are â⬠¢ Change password â⬠¢ Find a Blood group. â⬠¢ Why donate blood â⬠¢ Who needs blood â⬠¢ Find A Donar. â⬠¢ Refer A Friend. â⬠¢ LogoutWhenever a user wants to change his / her password he can select the change password option. The system displays the form, which asks him for his old password and new password. The system then compares the old password with the existing password in the database and if they match then the password is set to the new password in the database. The employee id for retrieving the details from the database is brought through the session, which is maintained usi ng cookies in the form. This removes the burden on user in typing user id again and also maintains security by not allowing one user to change password of other accidentally.At the end the user is able to log out from the system using the logout option. References: 1. ââ¬Å"Windows Programming Using MFCâ⬠ââ¬â Jeff Prosice 2. ââ¬Å"MFC Internalsâ⬠ââ¬â Geroge Shepherd 3. ââ¬Å"Programming in Microsoft VC++â⬠ââ¬â Kruglinnki. 4. ââ¬Å"Software Engineering Conceptsâ⬠ââ¬â Pressman 5. ââ¬Å"Object Oriented Analysis and Designâ⬠ââ¬â Rambaugh Technologies: you can use the . NET Framework to develop the following types of applications and services: â⬠¢ Console applications. â⬠¢ Scripted or hosted applications. â⬠¢ Windows GUI applications (Windows Forms). â⬠¢ ASP. NET applications. â⬠¢ XML Web services. â⬠¢ Windows services. 2. Overall Description: Sotware Interface:OPERATING PLATFORM : WINDOWS 2000/NT/XP RDBMS: SQ LSERVER 2000 SOFTWARE : VS. NET 2008 FRONT END TOOL : ASP. NET Hardware Interface: RAM :128MB HARD DISK :MINIMUM 20 GB 1. Data Flow Diagrams: Data flows are data structures in motion, while data stores are data structures. Data flows are paths or ââ¬Ëpipe linesââ¬â¢, along which data structures travel, where as the data stores are place where data structures are kept until needed. Data flows are data structures in motion, while data stores are data structures at rest. Hence it is possible that the data flow and the data store would be made up of the same data structure.The following are some DFD symbols used in the project External entities DATAFLOWS FIRST LEVEL DTAFLOW DIAGRAM donar Information Employee Status DFD For Admin DFD For User Account 2. Unified Modeling Language Diagrams (UML): â⬠¢ The unified modeling language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rule s. â⬠¢ A UML system is represented using five different views that describe the system from distinctly different perspective. Each view is defined by a set of diagram, which is as follows. User Model View i.This view represents the system from the users perspective. ii. The analysis representation describes a usage scenario from the end-users perspective. Structural model view (In this model the data and functionality are arrived from inside the system. (This model view models the static structures. Behavioral Model View (It represents the dynamic of behavioral as parts of the system, depicting the interactions of collection between various structural elements described in the user model and structural model view. Implementation Model View ? In this the structural and behavioral as parts of the system are represented as they are to be built.Environmental Model View In this the structural and behavioral aspects of the environment in which the system is to be implemented are repre sented. UML is specifically constructed through two different domains they are ? UML Analysis modeling, which focuses on the user model and structural model views of the system? ? UML design modeling, which focuses on the behavioral modeling, implementation modeling and environmental model vie Use-Case Model Survey: 1) Use Case Diagrams Admin: The Administrator is the user of the system. He is the responsible person to require the new Donars and status, Matins the Add new Tasks Details.Donar: This module focuses on the basic Donar. Each Donar is given a user id and password, which identifies him uniquely. The Donar is given a login form where in he enters the login details user id and password. As he is a registered into the system shows his form with his/her select options 1) Sequence Diagrams Administrator Login Sequence 2) Sequence Diagrams Employee Login Sequence . ELABORATION PHASE [pic] Flow chart: 3. ENTITY-RELATIONSHIP Diagrams E-R (Entity-Relationship) Diagram is used to re presents the relationship between entities in the table. The symbols used in E-R diagrams are: SYMBOL PURPOSERepresents Entity sets. Represent attributes. Represent Relationship Sets. Line represents flow Structured analysis is a set of tools and techniques that the analyst. To develop a new kind of a system: The traditional approach focuses on the cost benefit and feasibility analysis, Project management, and hardware and software selection an personal considerations. Admin Donar: 11. CONCLUSION This project has helped us in implementing the Visual C++ using AppWizard and MFC. We automated the work of allocating shifts to the Employee according to their Designation and Gender . All Tasks are done by different Groups.Each group formed as same department Employees or different department Employees. Generation of shifts allocation for Employee helped us in learning Object oriented features and implementing them in MFC. We came to know about the scheduling the tasks updating by time an d have a plan of completing task with in time proper designing of Rotating the schedules. ââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬âââ¬â Process: A transaction of information that resides within the bounds of the system to be module. DATASTORE:A repository of data that is to be stored for use by one or more processes, may be as simple as buffer of queue or as a relational database.Donar Module Admin information Module Donar Donar New Registrations [pic] Matian Client Details donars Details Donar blood information Login Admin New Donar Registrations Donar Information Referral once Details Experiances Logout Validate Log name () Validate Password () Check for required privileges () Authenticate The id Admin Master Donar Registrations and Add New Task Details . Enter log name Login Get the Information about why donate blood Find a donar Change Password Refer a friend ( Donar Administrator login master Administrator login master Login screen Admin Master Authenticate T he id Check for required privileges ()Validate Password () Validate Log name () Enter log name Administrator login master Administrator login master Login screen Leave Applications and Information of Task and Shifts ( Admin Store re login Query Analyzer Authenticate the given parameter ( Check for any specific schedules allocated upon him Donate blood Store ery Analyzer Donar Supply the customer ID Experiances Authenticate the customer ID Store Sto Store re Query Analyzer Enter the required policy parameters Change Password Insert Admin Verify Data 3. 1 Verify Data 3. 1 Check for Donar Admin Master Admin Master Verify Data 3. 1 Admin Master Check for Schemes InsertAdmin Master Check for User Account User Master Insert Donar Verify Data 2. 1 Verify Data 2. 2 Verify Data 2. 3 Donar Master Page Check for the Donar Profile Insert Donar Master Check for the Donar Account Details Donar Registrations Who needs blood Donar information Phno Location yob BloodType Username Gender Password Ful l Name Admin Name Donar Details Donar blood details How to donate bloods Experiances details Comments donar Details Who needs blood Blood details Donate blood Phno Location yob BloodType Username Gender password Full Name Donar profile Donar Name Donar Details Experience details comments Refer a friends
Walt Disney: a Cultural Transformation
ââ¬Å"All our dreams can come true, if we have the courage to pursue them. â⬠Walt Disney believed in this passionately. This is one of the many reasons Walt Disney accomplished so many things in his lifetime. With hard work and a great imagination you can truly do anything just as Walt Disney did. Even today Walt Disneyââ¬â¢s company is extremely successful. All of the different things that Walt Disney and his company have done have contributed to the worldââ¬â¢s popular culture. Walt Disney was born on December 5th, 1901. His parents were Elias and Flora Disney. Walt had a good childhood although it is said that his father had a bad temper that at times he could not control. Walt started to become interested in acting and drawing at a young age. At school, instead of focusing on his work, he would draw endlessly. Among his classmates he was known as Walt Disney, the artist. In 1917 Walt attended the Chicago Art Institute where he gained more experience. He dropped out of school in an attempt to join the army but was too young. Instead of the army, Walt joined the Red Cross where he drove an ambulance for a year. In 1919, Walt moved back to Chicago and started drawing for a living. After a couple fail attempts he and his brother were able to open Disney Brothers Studios. In 1927, Walt had created Oswald the lucky rabbit. Oswald turned out to be a huge success but Walt was betrayed. Universal pictures bought out Waltââ¬â¢s staff and he lost all rights to the character. Walt was desperate to create another successful character like Oswald. In 1928, Walt and his small circle of associates came up with a mouse character. The new character was named Mickey Mouse. At the time they didnââ¬â¢t know how much this little mouse would impact America. Mickey Mouse hit stardom when Steamboat Willie, the first animated short with sound and movement, was released. Thatââ¬â¢s when Walt Disney Productions was formed. During the time in which Mickey Mouse was introduced America was in the depths of a depression. The economy was hit badly on Black Tuesday October 29th 1929 when the stock market crashed. Then, tragedy struck again when a long drought destroyed crops and farms. So many people lost everything they had. Mickey Mouse was someone to pick them up in those hard times; a source f wishful thinking. In this time unemployment reached historic levels and the whole country looked for prosperity ahead. Throughout the 1930s the Disney cartoons were a business stimulus. Mickey Mouse merchandising exploded and there were a hundred products not only across the country but around the world. Mickey Mouse products were the only thing getting some companies through the Depression. By 1934 Mickey Mouse merchandise was earning around $600,000 a year. Political historians would likely say that the 1930s were the age of Franklin Roosevelt but cultural historians consider it the age of Mickey Mouse. Walt Disney is famous for saying, ââ¬Å"I only hope that we don't lose sight of one thing ââ¬â that it was all started by a mouse. â⬠Mickey Mouse is now one most recognized faces of all time and an icon of American culture. There is no doubt that Mickey Mouse and his ears are the face of The Disney Studios but Mickey isnââ¬â¢t the only iconic character that the company has created. Hundreds of characters have been born from Disney Studios, although some are more popular than others, they all have contributed to Disney Studios. Around the same time Mickey Mouse was introduced his ââ¬Å"friendsâ⬠, as they have been come to be called, were created. Mickeyââ¬â¢s friends included Minnie Mouse, Donald Duck, Goofy, and Pluto. These characters represented friendship and often taught moral lessons like Disney often did. Snow White and Cinderella started the princess phenomenon. These movies lead to other Disney Princesses including The Sleeping Beauty, The Little Mermaid, Beauty and the Beast, Aladdin, Pocahontas and Rapunzel. Girls around the world look up to these female heroes. The one thing that all these Disney characters have in common is that they will forever be embedded in pop culture. In 1937, Walt Disney made history when Snow White and the Seven Dwarfs was released. The film was the first full length animated film of its time. Critics had little faith in the productive of Snow White and the Seven Dwarfs but were proven wrong when the film earned over 8 million on its first release. The film was such a success that Walt built a studio specifically for the making of animated films. The film became a foundation for future feature length animated films. During the 1940s and 1950s the studio made many animated films including Fantasia, Bambi, Cinderella, Alice n Wonderland, and Peter Pan. Snow White and the Seven Dwarfs was an artistic and technological breakthrough in the entertainment world. Animated films lead to the production of live-action features and television programs. Snow White and the Seven Dwarfs showed that animated films could be just as entertaining as other motion pictures. Walt Disney was known for transforming imagination into reality which was es pecially true when he made Disneyland, the first ever theme park. Disneyland changed the amusement park industry forever when it opened on July 18th 1955. Disneyland was the first start in making theme parks popular. Walt Disney once said, ââ¬Å"Disneyland will never be completed. It will continue to grow as long as there is imagination left in the world. â⬠Although Disneyland was successful, it wasnââ¬â¢t the perfection Walt was looking for. Disneyland in California didnââ¬â¢t meet his vision because of the sleazy restaurants and hotels that were around the park. Fifteen years later Walt decided to build a new theme park in Orlando, Florida that would be a magical experience all around. Walt tried to keep the operation low key by setting up dummy corporations to buy the land. It was a reporter from the Orlando Sentinel newspaper who broke the news that it was Disney who bought the land. Walt never did get to see Disney World completed because of his death on December 15th 1966 of a cardiac arrest. Waltââ¬â¢s brother stayed on the project and Disney World opened to the public on October 1, 1971. Central Florida now has more theme parks than any other place in the world with Walt Disney World resort being the largest recreational resort ever built. The happiest place on earth didnââ¬â¢t just stay in the United States. Besides Disneyland in California and Walt Disney World in Florida there are three other Disney resorts in Tokyo, Paris, and Hong Kong. Many people wonder how such a successful enterprise was created. At first, the Walt Disney Studio wasnââ¬â¢t profitable but it was staying afloat. Even when in debt Walt Disney looked to do more. He made smart moves to fundraise money to start new projects including Disneyland. As early as the 1930s Disney enterprises became global with branch offices in Chicago, Toronto, London, Paris, Copenhagen, Milan, Barcelona, Lisbon, and Sydney. After the death of Walt and his brother, Roy, the company struggled. In 1980s and 1990s the stock grew rapidly which made Disney the largest entertainment empire in the world. Before Walt Disney died he managed to build the first multinational media corporation. Disney now has five business segments including media networks, parks and resorts, studio entertainment, consumer products and interactive media. The Walt Disney Company is now a $60 million dollar company and is the complete entertainment experience. Walt Disney is known for saying ââ¬Å"if your dream it, you can do it. â⬠He and his company are an example of just that. Although Walt Disney died his legacy lives on. The Walt Disney Company continues to create blockbuster films, parks, and television. Disney has made a few hundred movies and more than fifty of them being animated films. There is now a Disney channel on all five continents in several languages. The Walt Disney Company has become part of the worldââ¬â¢s culture especially in the United States. He has created some of the most iconic characters of all time including the timeless Mickey Mouse. Disney characters have touched the hearts of people around the world. When the first full length animated movie was made it changed the course of film making forever. Disneyland and Disney World were the start of theme parks as we know them today. The achievements of Walt Disney are impressive and they have laid out the foundation for the whole entertainment industry. Even to this day, Walt Disney will forever be known as the king of animation.
Thursday, August 29, 2019
Marxist Account of Class in Contemporary Society Essay
Marxist Account of Class in Contemporary Society - Essay Example During the twentieth century the working class has been shaped by three trends. In the workplace the displacement of craft and skilled labor by mass production techniques has allowed the employment of large numbers of unskilled workers; culturally, the integration of diverse ethnic strains produced by the centralization of production facilities and the constant infusion of petty bourgeois ideology has precluded the development of a clear-cut working-class consciousness; politically, the increasing intervention of the state in the regulation and management of the economy has added to the complexity of class relations and complicated the formulation of working-class strategy and tactics. These treads are typical; for modern society and social relations between the classes. The theoretical problems are linked because the relationship between the development process and class capacities largely depends on how one conceptualizes working-class capacities. If one accepts traditional plurali st notions of class capacity as applicable to the working class, then it is probably true that the capitalist development process erodes working-class capacities (Elster 1985). If, however, the capacity of the working class is something other than an aggregation of sovereign individuals, a more dialectical relationship between development and working-class capacity can be established (Braverman 2004). In modern society, similar to the Marxist approach to class, the institution of mass production techniques and the separation of the knowledge of how steel is made from the workers themselves is the key to breaking worker control of the industry. The rich would voluntarily renounce their wealth; a community of goods and absolute equality would be established. Marx began from the postulate that men, by their nature, are species-beings, that is, beings who are conscious of belonging to a species composed of others like themselves, and beings who can realize their full human potential only in loving collaboration with those others (Geschwender 1990). Perceiving their own imperfections as isolated individuals and not yet conscious of their collective potential, men seek consolation in an imagined God, abase themselves, and worship him as a power standing over them, when he is in reality their own alienated species-essence and represents only a schism within themselves. Marx now saw this phenomenon in politics as well as in religion. For him, man's present isolation is not simply a matter of perception but a reality, a product of modern civil society: "egoistic man is the passive and given result of a dissolved society" (Marx and Engels 1972, p. 65). Equally real is man's debasement: he is "corrupted by the entire organization (Braverman 2004). It is typical for modern society that the affable young man plunged himself into working-class activities, attending meetings by the score, and gained a profound respect for the people he came to know. Marx repeatedly marveled at "the extent to which the English workers have succeeded in educating themselves." "I have sometimes come across workers, with
Wednesday, August 28, 2019
Google Versus Microsoft Essay Example | Topics and Well Written Essays - 750 words
Google Versus Microsoft - Essay Example By designing strategies that enhanced further applications through the PageRank search algorithm, in concurrent with online advertising services and employing highly competent, qualified and professionalized experts in the industry, Google has managed to be the leader in the technology industry. On the other hand, Microsoftââ¬â¢s business model and strategies focused initially on the desktop computer with the applications provided by Windows operating system and Office desktop productivity programs. It is continually seeking innovative strategies that would enhance further applications of current core competencies, while trying to expand applications in the internet. (2) Has the Internet taken over the PC desktop as the center of the action? Why or why not? The Internet has continued to find ways and means to take over the PC desktop as the center of the action, specifically through Googleââ¬â¢s cloud computing. Plummer (2009) defines cloud computing as ââ¬Å"a style of Comput ing where scalable and elastic IT capabilities are provided as a service to multiple customers using Internet technologiesâ⬠(par. 3). ... 289). For consumers without internet connections and are apprehensive to expand applications due to security reasons were appeased through Googleââ¬â¢s emphasis on the ubiquitous characteristic of the Internet, as well as the increasing proliferation of Wi-Fi and broadband connections. However, users of PC desktop, particularly businesses and consumers who have been accustomed to Office and Windows applications aver that the wide range of applications provided by the PC desktop are firmly entrenched and innovative Internet applications would not abruptly shift their loyalty to these models. (3) Why did Microsoft attempt to acquire Yahoo!? How did it affect its business model? Do you believe this was a good move? As any organizationââ¬â¢s reason for acquisition, Microsoftââ¬â¢s attempt to acquire Yahoo! was due to prospects of increasing its market share in the technology industry by combining Yahoo!ââ¬â¢s second line leadership. As emphasized in the case facts ââ¬Å"Micr osoft wanted not only to bolster its Internet presence but also to end the threat of an advertising deal between Google and Yahoo!â⬠(p. 290). The move manifested an attempt of Microsoft to divert from its business model of confining to desktop computers by purchasing an organization with an antithetical business model focusing on the Internet and the search engine. Rather than going through the intricate details of learning the trades of the internet business model, Microsoftââ¬â¢s attempt could facilitate entering the search engine model through Yahoo!, deemed to be an expert in the field. Taking the decision in perspective, Microsoftââ¬â¢s attempt to acquire, despite being unsuccessful, was still a good move given the potentials and prospects that the strategy offers.
Tuesday, August 27, 2019
Training and Development in Food & Beverage Dissertation
Training and Development in Food & Beverage - Dissertation Example In this current business environment, various factors have direct influence over the operations and entire performance of an organisation. The prior reason behind the establishment of any businesses is to sell maximum products and/or services to the customers with the prime intention of earning high revenue. In this regard, it becomes quite crucial and important for the organisations to effectively manage and utilise the various resources in an efficient manner for maintaining the economies of scale in their respective operations. In the current scenario of increasing level of globalisation and business market competition, the organisations tend to effective manage their internal practice and desire to provide exceptional products and/or services in the dynamic business environment. This particular scenario has certainly led the organisations to carry out their different activities in a well and integrated manner with forming as well as preserving well-built contractual relationship amid the workforce. The performance of any business is highly dependent on how efficiently the organisations are involved in producing goods and/or services to satisfy the customers. Thus, placing required number of workforce does not led towards ensuring the succession of the business (Saks, 2010). In relation to the above context, the workforce should remain efficient in terms of their skills and necessary responsibilities that have been assigned to them. In this regard, appropriate and regular training along with development are necessary.
Monday, August 26, 2019
#2,#3,#4 Essay Example | Topics and Well Written Essays - 750 words
#2,#3,#4 - Essay Example The four Es refers to: having positive energy; being able to energize other people; ability to make critical decisions; and ability to get work done in the required manner. Looking at the article ââ¬Å"How to Conduct Interviewsâ⬠it is noticeable that none of the information entailed in the article would be new for a typical student in BNAD 301. Just like it was taught during BNAD 301 lectures it is of importance for an interviewer to prepare in advance by creating a structure and agenda for the interviewing process. It is also notable that the article points out that an interviewer should consider creating questions in four categories, namely: fact-finding, problem-solving, creative-thinking, and behavioural. Fact finding questions will help and interviewer in finding details such as skills and experience of the candidates. Creative thinking questions are important in determining the extent to which the candidate can be creative. Problem solving questions are important in finding out the extent to which a candidate can use critical thinking in solving problems. Behavioural question can help in knowing how a candidate will react to certain situat ions. The article also asserts that it is always important to interview the candidate in person whenever possible. This helps in observation of intervieweesââ¬â¢ non-verbal cues and communication skills. Taking notes is also given emphasis as it had been in BNAD 301 since it helps in making sure that an interviewer is able to use the details for the final decision later. Sometimes an interviewer might forget some of the details and observations made during the interview process. However, there are some new things that can be learnt from this article. For instance,even a typical student in BNAD 301 will find the information about taking candidates off campus for a meal or drink after the formal interview process is over new.
Sunday, August 25, 2019
Defining Intelligence Essay Example | Topics and Well Written Essays - 750 words
Defining Intelligence - Essay Example Dr. Howard Gardner developed the theory of multiple intelligences in 1983. This theory outlines eight different intelligences, including bodily-kinesthetic, interpersonal, intrapersonal, linguistic, logical-mathematical, musical, naturalist and spatial. Today, IQ tests are routinely used to rank an individual's intelligence. This test generally only assesses linguistic ("word smart") and logical-mathematical ("number/reasoning smart") intelligences. Many educators believe this is too limiting, and more use should be made of the broader range of intelligences.IQ tests are given to children all over the world, either as a written test or with an examiner. The test is customized for cultural differences, and typically only tests your ability to handle numbers, words and problems. IQ tests can be a good indicator for how well a child will do in school, where the standard teaching method is by reading textbooks and listening to lectures. However, the IQ score can influence how people will treat that person throughout life, "determining her eligibility for certain privileges" (Gardner, Year). If you're not good at reading ("word smart") or you don't understand algebra ("number/reasoning smart"), then you may be considered dumb. A child may be disadvantaged because they are not considered smart by normal standards. But normal is only defined as two out of eight possible intelligences. Is this fair Many think it isn't and believe teaching methods should change. If the other six intelligences are recognized and used in teaching, this will give children and people of all ages more opportunities. As adults with jobs, our intelligence strengths can influence how successful we are. A child who liked to write stories in English class might become a journalist with a newspaper. Another child who loved to play number games might go on to become a computer programmer. These are good matches. But some people might find themselves in jobs they are not suited to because it does not make full use of their individual intelligences. For example, a gifted sportsperson may have a job sitting at a desk typing on a computer all day. A desk job may suit a person who is word and number smart, but may not suit this person who is body smart. They may find their job mundane because they are not active. They would rather be outdoors moving around. Another example is a talented musician ("music smart") who can easily make up beautiful and original music by playing it on an instrument but cannot read or write. Usually people with high IQ scores tend to be in well-paid jobs, while people with low IQ scores do not. But IQ alone cannot predict success. "The vast majority of one's ultimate niche in society is determined by non-IQ factors, ranging from social class to luck" (Goleman, Year). Because a person has a particular strength in one type of intelligence, may not mean they are strong in other intelligences. For example, a student who loves mathematics got a job as an engineer. He was very good at his job, but when asked to speak at a meeting, he felt complete dismay because he didn't want to talk in front of a lot of people. He was "number and reasoning smart", but not "word smart". A sales person may sell lots of cars because he is "people smart", but may fatigue easily when he goes for a walk because he is not "body smart". Another person might be a talented guitar player ("music smart") but causes a calamity and looses his job in the band because he can't control his bad temper. He is not "self smart". To help people make the most of opportunities, school provides an important role in identifying a person's talents. If a school offers a broad range of subjects, then you have more opportunity to find out what you are good at and like doing. For example, if a school didn't offer art classes, a student might miss the opportunity to find out they were good at drawing ("picture smart"). Or if a school didn't
Saturday, August 24, 2019
World Religions Report Essay Example | Topics and Well Written Essays - 2000 words
World Religions Report - Essay Example Marriage of non-Filipinos to those belonging in Iglesia families is just one of the examples of how those comprising the minority of the Iglesia population have been involved in the religion (Catholic Answers, 2004). Despite the widespread estimate of the number of the constituents (which is between three million and ten million including those outside the Philippines), the Iglesia conceals their real population. It has a larger population than the more known Jehovahââ¬â¢s Witnesses, which also assert their being the genuine Church of Christ (Catholic Answers, 2004). Indeed, unlike most of the other cults which have Western origins, Iglesia ni Kristo (INC) or the Church of Christ has its roots from the Philippines with Encyclopedia Britannica (2007) describing it as indigenous. Historically, it was a small church founded by Felix Manalo in July 27, 1914 (Elesterio, 1988). Thus, he was considered by his followers as the messenger of God. After the fast expansion 1945, the number of members reached the 600,000 mark by the end of the 20th century (ââ¬Å"Iglesia ni Kristoâ⬠, 2007). This has also led to the building of chapels throughout the country and to their being a well-heeled federal religious organization. However, the foundation of INC was not an easy task; it was a great struggle for Manalo. Yet, Harper (2001) noted that one thing is certain: preliminary association with the Bible pushed him to impugn what has been taught to him regarding religion and God in the Roman Catholic Church. According to her research, Manalo had joined other religious groups before he finally established INC. At the age of 18, it was found out that he joined the Methodist Episcopal Church where he trained about the Bible and become a lay preacher. At 22, he also studied with the Presbyterians and joined Mision Cristiana, the Christian Mission of the
Friday, August 23, 2019
Contingency Theory Research Paper Example | Topics and Well Written Essays - 1250 words
Contingency Theory - Research Paper Example Science is a process of inquiry and is an organized body of knowledge, and so contingency theory is a science because it involves the two. Accordingly, contingency theory can as well be categorized technology, and technology refers to activities developed by individuals to satisfy their needs. Contingency theory is a body of knowledge and knowledge acquired can be applied in various organizations to change to a more efficient processes. Literally, humans develop organizations and so the application of contingency theory helps to satisfy their needs (Betts, 2011). This article clearly explains how the operation and performance of an organization and the environment in which it operates relates. More so, it provides a clear elaboration of contingency theory as a science and technology. However, some of the weaknesses that have been identified in this article is that the causation that is assumed has not been explained in a more convincing manner. According to contingency theorists, the re is an association between the environmental conditions and organizational design and this was assumed the best fit. However, this assumption has not been well elaborated and it does not put into consideration other factors that related to organizationââ¬â¢s performance (Betts, 2011). ... nce of that particular organization, for instance, organizationââ¬â¢s performance is associated with the internal operational effectiveness and support from external forces. More so, the strategy of Information Technology (IT) in an organization is supposed to be aligned with its business strategy since the performance of a business is promoted by effective alignment between the organizationââ¬â¢s competitive strategy and technologies that it uses (Croteau and Raymond, 2004). Arguably, the study of competencies alignment and organizationââ¬â¢s performance is conducted based on the contingency theory. This article thoughtfully describes IT competencies alignment and organizational performance. It proposes that contingency theory covers other issues such as the organizationââ¬â¢s competencies and strategic orientation and explains how they affect the performance of business (Croteau and Raymond, 2004). On the other hand, this article does not provide useful and convincing e xplanation of the underlying assumptions, for instance, one of the major assumption of contingency theory is that the better the fit among various contingency variables the better performance of the organization. Furthermore, this theory claims that there is a fit between strategic variables and use of IT and this positively affects the performance of information system (Croteau and Raymond, 2004). Tackling Design Anew: Getting Back to the Heart of Organizational Theory This article mainly focuses on the importance of organization design, and according to contingency theory, every relevant axis of an organization needs to be present in the organization design (Greenwood and Miller, 2010). Moreover, contingency theory suggests that the size of an organization and its geographical cover leads to the
Thursday, August 22, 2019
Conflict Management Plan Research Paper Example | Topics and Well Written Essays - 250 words
Conflict Management Plan - Research Paper Example Firstly, they should begin with Davidââ¬â¢s accusations against James, which have stated that James is causing confusion in the production line, which is causing the earlier to miss quality checks. It is vital to solve this through collaboration that is a win-win strategy for all the parties (Dontigney, 2014). The problem in question that is quality checks requires an all-inclusive approach. If situation is resolved as per Davidââ¬â¢s accusation, James will be of the view that the solution favours one side. Similarly, if the manager and the superintendent dismiss Davidââ¬â¢s allegations, then he will miss more quality checks. Based on the above, the two senior officers should check if there is anything, which James does which results in David missing quality checks. If there is, then James should desist from doing it, if there is not, then David missing quality checks was a culmination of his own inefficiency, which he had heaped upon James. Subsequently David should be reprimanded for levelling false allegations against a co-worker. The two senior officers, the manager and superintendent, should focus on forging cooperation between the two employees, which is vital for ensuring that the industry churns out products that meet set quality regulations (Dontigney, 2014). Cooperation between the two employees will result in an effective production
Manchester Products Essay Example for Free
Manchester Products Essay Manchester Home expanded household furniture division by adding market leader PLFD ââ¬â Addition of 990 million in PLFD revenues ââ¬â Addition of established sales force, talented design teams ââ¬â PLFDââ¬â¢s Signature Style line very popular with consumers â⬠¢ Ability to combine PL design skills with MH engineering and manufacturing ââ¬â Manufacturing expertise and ergonomic designs â⬠¢ Concerns ââ¬â How to tie-in PLââ¬â¢s bold designs with MHââ¬â¢s conservative style ââ¬â Customer confusion over new brand name 5Cââ¬â¢S OF THE ACQUISITION Company â⬠¢ Companiesââ¬â¢ strengths and weaknesses complement each other 5Cââ¬â¢S OF THE ACQUISITION Customers â⬠¢ Target consumers ages 34-55; Income over $50K ââ¬â MH consumers are categorized as conservative elegance ââ¬â PLFD consumers are more fashion-conscious, trend setters ââ¬â Will need a way to reach both customer segments â⬠¢ Results from target consumer surveys ââ¬â Low brand loyalty ââ¬â 60% would change brands ââ¬â High information search ââ¬â Style, design, quality, comfort most important qualities ââ¬â all covered by MH/PL ââ¬â PL has high brand awareness, almost double that of MH, will help to co-brand them to raise awareness for MH 5Cââ¬â¢S OF THE ACQUISITION Collaborators â⬠¢ Manchester already has network of office distribution channels, now they gain access to household distribution channels through Paul Logan. ââ¬â PL sales force has strong ties to leading distributions channels ââ¬â PL strength in upscale furniture stores, specialty stores, department stores â⬠¢ Strong relationship with buyers ââ¬â Concern over brand going away, necessary to create a smooth brand transition so consumers make the switch â⬠¢ Push strategies important to build strong relationships with distribution network ââ¬â 90% of PL shipments include Purchase Allowances 5Cââ¬â¢S OF THE ACQUISITION Competitors â⬠¢ Paul Logan was market leader â⬠¢ Household Furniture Industry $36.64 billion in 2004; positive % growth projections A mature industry Large number of corporate consolidations Low-cost imports from Asia/Mexico moving into higher price levels Domestic companies ready to attack the vulnerability of the new brand and position â⬠¢ We need strong advertising and marketing mix â⬠¢ Many competitors have company owned stores ââ¬â Crucial to leverage our distribution channels to gain market access 5Cââ¬â¢S OF THE ACQUISITION Context â⬠¢ Office furniture sales growth tied to employment growth and new business formation. ââ¬â Burst of dot.com bubble and recession have decreased demand for office furniture â⬠¢ Rise in ââ¬Ëteleworkingââ¬â¢ could increase demand for home office â⬠¢ Demand for home furniture is tied to new home construction and home sales. â⬠¢ Innovative and stylish products to bolster demand MOVING FORWARD ANALYSIS OF FUTURE BRANDING: OPTIONS â⬠¢ Drop the Paul Logan name right away ââ¬â Losing their current brand awareness ââ¬â Need to educate customers ââ¬â Strong distribution channel relationships could be damaged â⬠¢ Keep using the Paul Logan name for the entire allotted three years ââ¬â Ad agency advises against this option, as they donââ¬â¢t want to allocate advertising dollars to a brand with a three year shelf life â⬠¢ Transition mid-point ââ¬â Leverage the Paul Logan name to build strong brand awareness for Manchester ââ¬â Continue to use the PL name in subtext for 1.5 yrs.; conduct consumer research to reevaluate after this time. ââ¬â Business recommendation to convert the name 100% to Manchester Home after 1.5 yrs. ANALYSIS OF FUTURE BRANDING: OPTIONS â⬠¢ Brand name transition: ââ¬â First 6 months: Manchester Home: The New Home for Paul Logan Furniture ââ¬â Following year: Manchester Home: The Home for Paul Logan Furniture ââ¬â After 1.5 yrs.: Conduct consumer research to reevaluate transition â⬠¢ Business recommendation is to drop the Paul Logan name â⬠¢ Want to ensure the Manchester Home brand has achieved a sufficient awareness before removing PL OUR FUTURE ADVERTISING STRATEGIES â⬠¢ Strong campaign is critical to the success of the new brand name ââ¬â $184 million allotted for 2005 ââ¬â Includes national and cooperative advertising for both PLFD and MH products â⬠¢ Push vs. Pull ââ¬â MH to allocate more $ towards Push advertising ââ¬â Heavy Push Pull the first 1.5 yrs. ââ¬â Marketing Communications mix to form long-term company image â⬠¢ Promotional Programs ââ¬â Purchase allowances ââ¬â Recommend amending the planned 2005 marketing expenditures to allow for purchase allowances. â⬠¢ Currently based on % of sales ââ¬â Due to brand transition, allocate a fixed amount to advertising to ensure the levels do not drop RECOMMENDATIONS â⬠¢ Continue to use the Paul Logan name to leverage brand awareness and channel partnerships â⬠¢ Focus strongly on both Push and Pull strategies the first 1.5 yrs. to communicate the acquisition ââ¬â Amend proposed 2005 advertising plan to incorporate more Push strategies, specifically Purchase Allowances that contributed to the success of the PL distribution network â⬠¢ After 1.5 yrs., the business goal is to transition brand officially to Manchester Home QUESTIONS?
Wednesday, August 21, 2019
The Effects Of Cyber Crime Information Technology Essay
The Effects Of Cyber Crime Information Technology Essay Perhaps the most prominent form of cyber crime is identity theft, in which criminals use the Internet to steal personal information from other users. Two of the most common ways this is done is through phishing and pharming. Both of these methods lure users to fake websites (that appear to be legitimate), where they are asked to enter personal information. This includes login information, such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account numbers, and other information criminals can use to steal another persons identity. For this reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate before entering your personal information. The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage. In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquards employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime! We are currently living in Cyber age, where Internet and computers have major impacts on our way of living, social life and the way we conduct businesses. The usage of information technology has posed great security challenges and ethical questions in front of us. Just as every thing has positives and negatives, usage of information technology is beneficial as well as insecure. With the growth of the internet, network security has become a major concern. Cyber crimes have emerged rapidly in the last few years and have major consequences. Cyber criminals are doing every thing from stealing money, hacking into others computer, stealing intellectual property, spreading viruses and worms to damage computers connected on the internet and committing frauds. Stoppage of cyber crimes is a major concern today. Cyber criminal make use of the vulnerabilities in computer soft wares and networks to their advantage. Hacking: Hacking or Cracking is a major cyber crime committed today. Hacker makes use of the weaknesses and loop holes in operating systems to destroy data and steal important information from victims computer. Cracking is normally done through the use of a backdoor program installed on your machine. A lot of crackers also try to gain access to resources through the use of password cracking soft wares. Hackers can also monitor what u do on your computer and can also import files on your computer. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Important data of a company can also be hacked to get the secret information of the future plans of the company. Cyber-Theft: Cyber-Theft is the use of computers and communication systems to steal information in electronic format. Hackers crack into the systems of banks and transfer money into their own bank accounts. This is a major concern, as larger amounts of money can be stolen and illegally transferred. Many newsletters on the internet provide the investors with free advice recommending stocks where they should invest. Sometimes these recommendations are totally bogus and cause loss to the investors. Credit card fraud is also very common. Most of the companies and banks dont reveal that they have been the victims of cyber -theft because of the fear of loosing customers and share holders. Cyber-theft is the most common and the most reported of all cyber-crimes. Cyber-theft is a popular cyber-crime because it can quickly bring experienced cyber-criminal large cash resulting from very little effort. Furthermore, there is little chance a professional cyber-criminal will be apprehended by law enforcement. Viruses and worms: Viruses and worms is a very major threat to normal users and companies. Viruses are computer programs that are designed to damage computers. It is named virus because it spreads from one computer to another like a biological virus. A virus must be attached to some other program or documents through which it enters the computer. A worm usually exploits loop holes in soft wares or the operating system. Trojan horse is dicey. It appears to do one thing but does something else. The system may accept it as one thing. Upon execution, it may release a virus, worm or logic bomb. A logic bomb is an attack triggered by an event, like computer clock reaching a certain date. Chernobyl and Melissa viruses are the recent examples. Experts estimate that the My doom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. Solutions: An important question arises that how can these crimes be prevented. A number of techniques and solutions have been presented but the problems still exists and are increasing day by day. Antivirus And Anti spy ware Software: Antivirus software consists of computer programs that attempt to identify, thwart and eliminate computer viruses and other malicious software. Anti spy wares are used to restrict backdoor program, Trojans and other spy wares to be installed on the computer. Firewalls: A firewall protects a computer network from unauthorized access. Network firewalls may be hardware devices, software programs, or a combination of the two. A network firewall typically guards an internal computer network against malicious access from outside the network. Cryptography: Cryptography is the science of encrypting and decrypting information. Encryption is like sending a postal mail to another party with a lock code on the envelope which is known only to the sender and the recipient. A number of cryptographic methods have been developed and some of them are still not cracked. Cyber Ethics and Laws: Cyber ethics and cyber laws are also being formulated to stop cyber crimes. It is a responsibility of every individual to follow cyber ethics and cyber laws so that the increasing cyber crimes shall reduce. Security soft wares like anti viruses and anti spy wares should be installed on all computers, in order to remain secure from cyber crimes. Internet Service Providers should also provide high level of security at their servers in order to keep their clients secure from all types of viruses and malicious programs. The Effects of Cyber crime When you purchase a home it comes with a door and a lock. You always will make sure that the door/lock exist and that the lock is working properly. If you want you can aim to further secure your home against any threats. You may purchase a new security system, an additional lock or maybe even a pet dog for added safety. Why would you not secure your investment? Would you invite criminals to use your home to commit additional crimes wherever he/she pleases? In the same fashion, computer viruses that can generate havoc on your PC system are just as criminal. Viruses can cost companies millions and dollars in time to repair an infected system. Recently, Microsoft went as far as to post a $250,000 bounty for the writers of the MSBlast worm and the SoBig.F virus. Organizations such as Interpol now have sections of their website devoted to cyber-crime, with other websites such as the IFCC Internet Fraud Complaint Center specializing in Internet Crime. In General, computer viruses can be transferred to an unsuspecting PC through a variety of formats. Viruses can appear through e-mail, infected software, diskettes, infected CD/DVD discs or computer documents. Furthermore, if you do not run regular Microsoft Windows updates (http://windowsupdates.microsoft.com), even regular Internet web browsing can cause major problems, through known security exploits in your Operating System. An unsuspecting user can open what they think is a legitimate webpage, however then end up downloading a virus or allowing access to their PC by a hacker. Viruses are showing up on a weekly basis. Your Anti-virus software, security applications or Windows Operating System is only as good as its last update. To get complete protection, you must regularly update with the latest virus definition files, scanning engines, patches and fixes. Prevention is always better then hours of frustration and lost data. Some of the main ways to ensure your PC is protected from malicious computer viruses are as follows. Computer-based crime Computers facilitate the theft of money and property and the destruction of data when there are inadequate controls against their misuse. Crimes perpetrated by unauthorized access to keyboards, terminals and communications devices generally can be described as thefts, misapplications of assets, or destruction of information. These terms may apply to the misappropriation of money and real property, or of proprietary information and intangible assets. The misuse of the computer may involve the forgery of computer signatures such as authorizing codes; the creation of false accounts payable to disburse cheques; improper use of personal information; the creation of virus or rogue programmes which interfere in software operations and destroy data. All of these crimes include programming the erasure of any evidence of the computer crime perpetrated. Probably the fastest growing category of computer related crime is that involving electronic fund transfer systems. The most significant types of computer crime were: arson, sabotage and malicious damage of computer installations; system penetration, or hacking; unauthorized use of computer time; thefts of assets, including software; embezzlement of funds; defrauding of consumers and investors; and destruction or alteration of data (including college transcripts and diplomas) and software. The motive is usually personal financial gain, anger or revenge but another significant impetus is the intellectual challenge associated with computer crime The absence of, or inadequate provision for, documentation and access controls for computer installations, facilitates computer crime. Unauthorized access to software and hardware is almost exclusively the means of crime perpetration. With authorized access, but with criminal collusion, two or more persons may commit crimes unnoticed, until financial audits, inventories, and computer operation system checks uncover the fraud or misuse. In the case of theft of intangible properties such as computer-stored patents of engineering, chemical or other designs, processes, or marketing and strategic data, the crime is exposed, if at all, by inferences drawn from the activities, products or knowledge shown by competitors Studies in the USA indicate that about one-third of such crimes were committed by staff or consultant data-processing personnel, almost exclusively below management level; but the bulk were committed by non-data-processing personnel with normal, job-related access to computers. A recent USA study has concluded that computer-related crime now rivals white collar crime in cost and seriousness. The report was based on a survey of 283 corporations and government agencies and among the conclusions were the following: about 48% of those surveyed reported some form of computer crime during 1983 with total annual losses estimated to be $145 million to $730 million. More recent estimates based on actual reported crime place losses in the USA at $3 billion per annum. An Australian computer expert has estimated that there were about 4000 computer-related frauds over the period 1975-1983. Pranksters in Canada in the past have re-routed the entire delivery system for Pepsi-cola; in 1971 the New Y ork-Penn Central Railroad Company discovered 200 of its box-cars had been re-routed and ended up near Chicago and another 200 cars were found to be missing. In New Jersey seven young people, all under 18 years, were charge with conspiring to use their home computers for exchanging stolen credit card numbers, information on how to make free phone calls, and to call coded phone numbers in the Pentagon. They were found with codes capable of changing the position of communication satellites. One youngster had run up a large phone bill at home and when berated by his parents, he proceeded to break into the phone billing system and cancelled the charge Few computer crimes are actually reported. In the US is required by law to report computer crimes; many commentators agree that only about 15% of computer-related crimes are actually reported. The Australian Computer Abuse Research Bureau argues that only one in 20 cases of the $2 million or so worth of computer-related offences in Australia during 1980 was in fact reported. The reasons given are that there is not much faith in the legal system and its ability to prosecute a case of computer crime successfully; that companies fear that to declare publicly that their system has been breached and that their assets are not as secure as once thought will cause a flight of capital in shareholders funds and deposits; and that there is a reluctance to expose the companys records and systems to public scrutiny and competitors In the UK in 1989, it was estimated that the cost to industry of computer-based crime was over à ¿Ã ½400 million per year. The average annual incidence was9 incidents per 100 companies (rising in some cases to 1 in 2), costing on average à ¿Ã ½46,000 per incident. Other estimates put the cost of computer crime as high as à ¿Ã ½2 billion per year. The most vulnerable sector is the communications industry in which there were 192 incidents per 100 companies. Fraudulent input of information, notably on payroll systems, accounted for 4.1 million pounds of losses A person stealing trade secrets no longer has to physically copy documents because much scientific and technical information is now stored on computers. Instead of copying hundreds of pages of information on a duplicating machine, a person can download that material onto a single computer disk which can be easily concealed in a pocket. The information on the disk can then be sent or transmitted anywhere in the world without ever engendering the employers suspicions. Additionally, if a thief is able to illegally penetrate a companys computer system, he or she can download that companys trade secrets and transmit them on international computer networks without removing the originals from the victim company 1. While the Internet provides dramatic and exciting benefits to enhance our lives, it also allows those who want to violate or evade the law an opportunity to reach exponentially greater numbers of people Common Types of Computer Related Crime There are a number of common attacks and methods of committing a computer related crime. Some of these are less sophisticated than others, and can be committed by someone with limited knowledge of computers. Others require programming skills and/or an advanced knowledge of how computers and various software can work together to commit a crime. COMPUTER VIRUSES Computer viruses are programs that can attach themselves to other programs or files. The virus infected files can then become carriers of the virus, or become damaged in some way. The virus may effect computer services, displaying messages or playing sounds, or may crash the operating system so that the computer wont run as expected (if at all). You can prevent computer viruses by installing an anti-virus program on your computer, which scans files for known viruses. There are a number of these programs on the market, and they can be purchased from software stores or acquired on the Internet. Once installed, you will need to regularly update anti-virus files, which are used to detect and remove viruses from your system. DATA DIDDLING Data diddling involves changing data prior or during input into a computer. In other words, information is changed from the way it should be entered by a person typing in the data, a virus that changes data, the programmer of the database or application, or anyone else involved in the process of having information stored in a computer file. The culprit can be anyone involved in the process of creating, recording, encoding, examining, checking, converting, or transmitting data. This is one of the simplest methods of committing a computer-related crime, because it requires almost no computer skills whatsoever. Despite the ease of committing the crime, the cost can be considerable. For example, a person entering accounting may change data to show their account, or that or a friend or family member, is paid in full. By changing or failing to enter the information, they are able to steal from the company. To deal with this type of crime, a company must implement policies and internal controls. This may include performing regular audits, using software with built-in features to combat such problems, and supervising employees. HACKERS AND CRACKERS In computer jargon, hacker has a variety of meanings, including being synonymous with programmers and advanced computer users. In these cases, it refers to someone who hacks away at a keyboard for long periods of time, performing any number of computer-related tasks. In recent years, hacking has come to mean the same as another term cracker, which is a person who cracks the security of a system or computer application. Hacking (and cracking) now refers to the act of gaining unauthorized access to a computer, network, Web site, or areas of a system. A person may hack their way into a system for a variety of reasons; curiosity, the challenge of breaking through security measures, or to perform malicious actions and destroy or steal data. All to often, it involves performing mischief and damaging a Web site or corporate network in some manner. Commonly, hackers will impersonate a valid user to gain access to a system. If the system requires a username and password before allowing entry, a hacker may take an authentic users identity. On a network or an office with Internet access, a hacker can impersonate someone else by simply sitting at the unattended workstation of another user who hasnt logged off. It also commonly occurs when someone has an easy to guess username and password, or allows this information to be known by others. Another common method hackers use to gain access is to guess or crack a username and password thats used to access a computer, network, or Internet account. To prevent being hacked in this manner, you should use passwords that are difficult to guess. You should also make your passwords a mixture of letters, numbers, and special characters (e.g. !, @, #, $, %, ^, , *).à You should change your password at regular intervals, and set a minimal length to passwords (such as being a minimum of six or eight characters). LOGIC BOMBS A logic bomb is a program that runs at a specific date and/or time to cause unwanted and/or unauthorized functions. It can effect software or data, and can cause serious damage to a system. Generally, it will enter a system as hidden content, or may be installed on the system by someone within a company. For example, a disgruntled employee may write a program designed to crash the system one month after he plans to quit the company. When this date and time arrives, the program then executes. In other words, the bomb goes off. Often, logic bombs arent detected until after they execute à ¢Ã¢â ¬Ã ¦ when the damage is done. However, by installing anti-virus software, firewalls, and other security software, you can block hidden content, and stop the bomb before it becomes a problem. Anti-virus software can detect known logic bombs, trojan horses, and viruses. Firewalls allow you to set policies on your system that will strip hidden content out of messages, removed file attachments, and so forth. TROJAN HORSE Trojan horses get their name from the story of the attack on Troy. In the story, the army couldnt get past the gates of Troy to attack. A covert attack was needed, so soldiers hid inside of a giant wooden horse, which was offered as a gift to the citizens of Troy. Once inside the gates of the city, the Trojan Horse opened and the attack began. In computer terms, Trojan Horses live up to the name derived from the Greek story. Covert instructions are hidden inside of a program. These instructions are embedded in software or email, and may provide any number of undesired or unauthorized functions. Once opened, they may modify or damage data, or send information over the Internet (which can then be used by a hacker for future attacks). By dealing hidden content in messages or software, you can avoid problems with Trojan Horses. Using anti-virus software, firewalls, and other security software, your system can check for Trojan Horses and prevent them from attacking. Computer Crime Prevention Computer crime is becoming ever prevalent in our society. More and more, companies and individuals rely on the services and resources provided through networks and computers. Companies may be dependent on the data to conduct business, while individuals may store information that is important to their personal or work-related activities. Due to this, it becomes vital that steps are taken to protect computer systems and the data thats stored on them. It is important to remember that no system can ever be completely secure. The only network, Web site, or computer system thats 100% secure is one that cant be accessed by anyone or anything, which makes it completely unusable. Natural disasters, malicious, users who make mistakes, or motivated criminals can compromise security and/or cause damage. The goal for securing your system should be to balance security with accessibility. Community Crime Prevention Everyones Doing It: Planning a Successful Community Crime Prevention Project Are you tired of walking by playgrounds that are filled with trash and broken equipment? You know kids wont play there because its such a mess. Make a difference by cleaning up that playground as a community crime prevention project. Keeping Insider Information Inside Protect confidential information against insider leaks, and corporate espionage. Take Crime Prevention to Work Local law enforcement agencies will experience greater cooperation and success with crime prevention programs if they include local businesses and corporate offices. Presentations at local businesses are designed to provide basic information and tips on crime prevention. Safer Seniors An increasing population of senior citizens, including those in assisted-living communities, has made police officers aware of the challenges of reaching this group with safety information. Strong support from the police chief and elected officials helps ensure that time, staff, and resources are dedicated to aiding seniors. Also see Neighborhood Watch and School Safety
Tuesday, August 20, 2019
Impact of Mergers and Acquisitions on Operating Performance
Impact of Mergers and Acquisitions on Operating Performance Chapter-1: Introduction 1.1 Introduction Along with boosting their own profits, businesses create gains for their shareholders and exist to serve customers. According to Ghosh and Das (2003) these aims can be achieved a) by reducing costs since this increases competitiveness and market share and so wins over more customers, b) by capturing wider markets through offering an increased range of products and services, c) by undertaking diversification operations, and d) by undertaking mergers to grow the company inorganically. Mergers and acquisitions (MAs) are suggested as measures to revive failing companies and as strategic tools. Conducive to strategic alliances and mergers in an increasingly competitive business environment are global economies, favorable policies and incentives, relaxed rules, and liberalization. New products, diversification, RD etc.have also been included as critical factors when businesses scale up operations and responsibilities along with increased roles in world economies as has been noted by Yadav and Kumar (2005). Due to brand building and PR exercises, a few MA deals may have taken place as pointed out by Malatesta (1983) and Roll (1986). One fact prevalent across numerous sectors relates to an increase in MA competence levels and competitiveness. Corporations involved in MA deals around the worldconsistAir France and KLM in the airlines sector, Daimler-Benz and Chrysler in the automobilesector, and SBC and ATT in the telecom domain. A lot of research on shareholder gains in the event of an MA exists today. When word gets out that an MA is imminent, the stock prices of both companies goes up tremendously and favorably impacts shareholder value. As the nature of the market reports why details of impending mergers are not leaked and could lead to stock crashes affecting prices many reasons are there. While MAs may lead to healthier bottom lines and improved cash flows as felt by most business managers, however, to the shareholders, some mergers and acquisitions may be loss making enterprises which are of no use. So to generalize that MAs always result in favorable circumstances for the shareholders is not always true. Due to the fact that in terms of synergy, expertise, and objectives, the companies do not match up some mergers may not be effective. If the following are not aligned correctly i.e. asset allocation, resources, and core strengths and if through a planned integrated approach, care is not taken to fuse the two companies into one then, along with an expose of operating weaknesses, share value can fall. This may lead to erosion and drying up of capital.The failures in MA deals are placed at over 60% as estimated by Schweiger (2003). 1.2 Background of the study Through the economic activities across Europe and the world it is clear that FDI activity has risen over the past decade. In addition, the merger and investment acquisition mode has risen sharply and as a percentage of all FDO risen as noted by Lipsey (2002). From 1995-2001 the Global Wave has been labeled as the most recent merger wave by Jobanovic and Rousseau (2002), through an emphasis on their importance and a move to more cross-border mergers. According to Jovanovis and Rousseau in the EU in 2000-2001, about 40% of all mergers occurred through cross-border deals and from 1991-2000 these deals accounted for about 100% of the total number of mergers in the EU. According to the EC (2001), to make acquisitions for euro-zone companies becomes easier by increased financial markets integration. Among the EU nations, a rapidly increasing number of cross-border MA were contributed to by an active market for corporate control given the boom of the 1990s. Similar to Ueng and Ojahsresearch (1998) the FDI wealth effects investigation the effects of these integrating transactions on form shareholders using methods are examined in this study. In the EU nations, the merger analysis and acquisition activity is warranted certainly as suggested by the importance of the international business community and increased activity. In the EU,of the integration process, a significant piece is owed to cross-border mergers and more than others, the benefits have filtered in to some countries. Therefore, it is important to understand who has gained or lost, and why. Instead of the individual states of the United States (US), the EU nations have greater political disparity. This would seem to imply that across the US the nations across EU are of greater importance in a level playing field in the business community. Within the US however, instead of a similar study of interstate transactions, this key factor makes this study much more interesting. 1.3 Statement of the problem In terms of markets, resources, technology, money, or skills, mergers have a high chance of taking place in terms of the size of the top managements of two similar companies and when they are evenly matched to register and contribute to the merger as observed by Samuel and colleagues (1990). Between equals, these mergers are mergers and generally, when the existing companies do not function as an entity anymore, they are complete and a new structure is created to merge the assets and resources of both the companies. The new companys shares are then redistributed among both the companies shareholders. In another scenario, giving them a majority shareholding by buying a large percentage of their shares, a company may acquire another company and become the new owners. This is termed an acquisition and the company acquired is merged into the existing business of the company. The target ceases to be an independent entity legally. Along with trading on the stock exchanges the shares of the acquiring company still exist. 1.7 Significance of the study In the industry involved the three big entities Lloyds TSB and HBOS have special significance as their merger provesthrough the rationale behind this topic.This merger sought to create the largest steel company and this leaves much scope for research. 1.8 Possible contribution to knowledge Based on the home country of the target and the acquiring firms, there are differentials in the average wealth effects of cross-border mergers and a study of this is the possible contribution of this research. From the EU averages it is clear that several EU nations differ significantly, which would imply that from cross-border mergers than those in other countries the owners i.e. shareholders of firms in particular countries stand to benefit more. Why these differences exist, the research continues to explain empirically and this is beyond showing that such country-specific differences exist. In Europe, by examining a small sample of cross-border mergers, it is evident that these findings are not unique to the EU. 1.9 Limitations of the study The research deals with a specific industry and that is the key limitation of the study. Hence, the implications of this study cannot be applied as every industry has its own conceptualization with regard to the effects of mergers and acquisitions. The country-specific nature is the other limitation, since these organizationswork within individual financial environments pertinent to these countries. 1.3. Purpose of the research and aims What is the impact of mergers and acquisitions on the operating performance of the firm? Objectives of the Research To critically analyze the impact of mergers and acquisitions on the operating performance of the firm in India. To strategically evaluate the impact on shareholders wealth post-MA. 1.4. Structure of the rest of the report Chapter 1- Introduction: Chapter one is the Introduction which will cover the brief aspects about mergers and acquisitions. Chapter 2- Literature Review: Chapter Two will dealwith Literature Review which will draw theoretical underpinnings on the subject area of the research. Chapter-3-Conceptual Framework: Chapter Three will discuss the Indian Banking Industry with the perspective of MAs. Chapter 4- Research Methodology: Chapter Four will be on Research Methodology and Process which will cover the process which is adopted by the researcher for conducting the research. Chapter 5-Data Findings and Analysis: Chapter Five will be on Data Findings and Analysis which will cover broadly the sectors which are involved in the mergers and acquisitions. Chapter 6- Conclusion: Chapter Six will be the Conclusion which will specify the way the entire research has been conducted and the end result of the same. Topic: A study of recent mergers and acquisitions in India and their impact on the operating performance and shareholder wealth: An analysis Banking Industry. Chapter-2: Literature Review 2.1. Introduction Investigators have been analyzing amalgamations and takeovers in the context of their characteristics and the impact on the development of both the entities over the past several years. In actuality, Weston et al. (2004) opine that the experts and researchers in the field have provided a large quantity of records related to the topic. There are many reasons why companies follow development policies related to amalgamations and takeovers. This permits rapid acceleration in addition to having a quick and instant approach to markets, both local and international. It is also likely to touch renowned brands, apply knowledge and skill, and widen the dimension and extent without losing time. In the sphere related to real estate, a participant (real estate firm) may want to promote a mutual organization for funding ventureson an individual basis. It may also consider entering into a joint venture with a construction enterprise in the domestic market so as to execute the venture as per assure d measurements and highlighted conditions as stated by Jensen (2006). Clients are reassured when they involve themselves with big enterprises, which have a great degree of brand reputation and remembrance. During these times, they articulate their backing, not merely as clients but also as financers as they buy stakes so as to invest money in the enterprise. It also possible for a company to advance by augmenting returns or managing expenses which in turn can be attained by reorganizing and reconfiguring finances apart from using creative methods and reengineering. Some enterprises may also purchase brands, goods, and utilities to expand the goods portfolio of the enterprise. The capability of an enterprise to undertake a development policy by reallocating its resources in creating different facets of its presence was maintained by Hogarty (2000). This could be denoted by its production unit, RD, and through creating and promoting its brands and setting up more projects in parallel or varied spheres. Firms may also purchase extant enterprises or amalgamate with others to attain their objectives. Amalgamations and takeovers assist in accelerating development as the roles pertaining to infrastructure, branding, and manufacturing are clearly set up. Superior mediums which endorse development comprise of contracts, treaties, and agreements for varied ventures for a pre-determined time. All across the world, international corporates and enterprises are entering into purchases of and amalgamations with new firms, forming joint ventures and such equivalent associations on a common basis. Nearly fifty percent of the contracts pertaining to amalgamations and takeovers in India have been initiated by global enterprises. In 2005 alone, India witnessed global contracts of around 58 percent, a number which was double compared to Japans agreements at 21 percent. Internationally, amalgamations and takeovers entail dogmatic frameworks particular to a specific nation and the labor unions of the enterprises. Post the 1990s, economic revolutions have been occurring globally and this has seen a growing attraction for amalgamations and takeovers. The financial segment witnessed a newness which saw modifications being made to possession and trade regulations, an increase in the disposable earnings and as a result, the capacity to discover newer marketplaces and newer chances. Firms are now fully utilizing the reduced interest rates and cost of capital. This has assisted several enterprises in broadening their scope of operations at the domestic and global levels through partnerships, associations, amalgamations, and takeovers. Additionally, the presence of many global media enterprises which publish information pertaining to contracts and partnerships on a large extentà ¢Ã¢â ¬Ã¢â¬ particularly in segments related to production, cars, retail and others. On the other hand, it is extremely crucial for companies to ensure specific advisory metrics before they perform their functions related to amalgamations and takeovers, especially in huge markets which have not been discovered. Amalgamations and takeovers also have the ability to shift the stakeholder worth affirmatively or adversely, which may result in a scenario, which eats away into the prosperity. When local takeovers in addition to global amalgamations get transformed into deficit-making and zero-worth developing patterns, all of these experience impediments. When stakeholders are not going to benefit from such projects, the costs of shares decline and thus, such agreements must consider all the primary essentials before opting for the linked choices. The influence of amalgamations and takeovers may be favorable or harmful to the development and this may take a long time and also be extremely costly for a total revival from an impediment. The existing segment also highlights the investigations and examinations undertaken on the topic by analysts. One needs to have sufficient data evaluation and also conduct hypothetical tests while assessing the influence of amalgamations and takeovers. Adequate links should also be deduced to comprehend the reason and impact correlations in amalgamations and takeovers in context to the criteria such as development of trade, stakeholder worth, productivity, and general performance. As the current study is linked to the influence of international amalgamations and takeovers, it is crucial to analyze the global amalgamations. Global partners who function from India while being based in the European Union framework have been examined depending on specific extant data. Additionally, domestic amalgamations and takeovers have also been analyzed. 2.2. Theoretical Background: Mergers Acquisitions (MAs) 2.2.1. Definition Amalgamations and takeovers can be superiorly comprehended as development polices to enhance the income of the enterprise and also, its capital foundation. Sometimes, for two enterprises, with similar or dissimilar trade functions, to amalgamate on specific ranks is a superior trade choice. An amalgamation of this type assists in imparting a blend of experience and finances. A commercial amalgamation of this type functions as a solitary body between edifying impacts and worth values of a commercial amalgamation and takeover (Jensen and Ruback, 2003). Though the phrases amalgamations and takeovers are frequently employed collectively, they are two extremely varied procedures. Amalgamations describe the merging of two different enterprises into a single entity. The two enterprises join each other, and shift all their resources and functions into a new one. This procedure includes the merging of all types of resourcesà ¢Ã¢â ¬Ã¢â¬ employees, manufacturing facilities, and functions into the new entity that is shaped. The new entity shaped out of this has its individual distinctiveness, edifying representation, and groups of convictions. It is pointless to state that they are possessed by both the parties which share their resources to develop the new identity (Huang and Walkling, 2007). A takeover is considered as the purchasing-out procedure of an enterprise by another with the goal to stimulate management of its assets, investments, and functions. Takeovers occur when a firm purchases a major share of another firms stakes, assets, and liabilities (Weston et al., 2004). Firms experience a supplementary benefit when this occurs as they get the management apart from the functioning assets, in contrast to when they purchase merely the stakes, in which scenario they have to only compete with the other shareholders. Purchasing assets includes more expenses and offers an extensive capital foundation (Singal, 2006). Now let us consider acquisitions. This phrase also has been employed for many perspectives and is understood also. Takeover is a vague expression and though it may denote a context similar to acquisitions; the two are actually varied types of trade agreements (Jensen, 2006). A takeover is when a purchase is conducted without acquiesce or permission of the ente rprise being taken over. Takeovers come with an adverse action that entails the attaining of another firm with the intent to manage it. When an enterprise desires to take over another firm, it tries to purchase all its shareholders. Takeovers are the ones which do not have the approval of the firm being purchased and they are often nearly undertaken as a hostile proposal. This now clearly explains the different expressions and implications attached to amalgamations, acquisitions, takeovers, partnerships, and associations and how their context is based in the situation in which they are being applied. 2.2.2. Types of Mergers Acquisitions Mergers can occur at parallel, perpendicular, or multinational levels. Each kind of amalgamation has not only its own typical characteristics but also a distinct impact on the work processes and trade functions. Horizontal Mergers When two enterprises or enterprises that have parallel trades, which amalgamate to develop an entirely novel trade enterprise, it is known as a parallel merger. The enterprises which enter into a parallel amalgamation combine their assets as individual enterprises to shape a novel entity. These enterprises are thus capable of making a more robust enterprise which has a wider capital base and greater resources. The rationale behind this is to acquire a larger market share and become a dominant force in the market (Shleifer and Vishny, 2009). Such parallel amalgamations provide several benefits. They enable larger presence and greater range in addition to optimal performance ability to the novel entity. The two previously distinct entities now have the benefit of augmented resources capable of executing procedures in a superior method to ensure consistent supply of goods, which are of much better quality (Mitchell and Mulherin, 2006). Even in India there are a few instances of parallel amalgamations, for instance, the amalgamation between Indian carriers which occurred between Lufthansa and Swiss International apart from Air France and KLM (Bottazzi et al., 2001). The United Kingdom (UK) has witnessed several parallel amalgamations. In reality, the results of several investigations have depicted that nearly 60 percent of all amalgamation agreements which have occurred post-2001 have been parallel amalgamations (Firth, 2000). The same notion is also put forth by Berndt (2001). He also states that most of the amalgamations which happened post-deregulation and liberalization of the economy were parallel in character. Another instance of a parallel amalgamation like the one ofBirla Cement and Larsen Toubro (LT) is related to the cement sector. Additionally, the amalgamation ofKingfisher Airlines and Air Deccan in addition to the one between Jet Airways and Air Sahara depict parallel amalgamations in the airlines sector. The Tatas and the Birlas are two huge corporate entities, which have amalgamated in the telecommunications sector. Vertical Mergers A perpendicular amalgamation is one in which enterprises which are elements in a supply chain or which function as utility suppliers or subsidies in the equivalent type of trade resolve to become one entity. It is noticed that such amalgamations occur when firms resolve to augment their forte in the supply aspect (Agrawal et al., 2002). Perpendicular amalgamations manage to keep rivals away by maintaining stress and managing their supply firms. The perpendicular amalgamation is thus capable of seizing a bigger market share for their goods while the supply group fails to back the goods of other contenders. This plan assists the enterprises to closely react to their clients needs. The element pertaining to the rivals is capable of keeping the prices from rising as the supplies are not reimbursed for (leanmergers.com). Logically, the outcome of this action is an extremely robust management and more revenues as the firms attain an upper hand over their contenders. An instance of perpendicular amalgamation is the one between Ford and Vauxhall who are car producers, who have acquired or purchased automobile enterprises. When Ford purchased Hertz, it was an instance of a perpendicular amalgamation (Loughran and Vijh, 2007). Another example of a perpendicular amalgamation in the telecommunication industry is that of Reliance Communication Ltds purchase of Flag Telecom. Conglomerate Mergers Multinational amalgamations occur amongst two entirely varied enterprises. Such enterprises are participants at distinct degrees and have no equivalents in the good variety, markets, clients, supply chain, or any other criterion. Multinational amalgamations occur amongst such enterprises and a novel association is shaped in addition to new trade contracts. Multinational amalgamations show only one line of power or authorization, which manages the trade functions from a solitary aspect of knowledge, resources, client power, and market experience which guarantee enhanced trade after the multinational trade which occurred before (Asquith et al., 2003). Multinational amalgamations are executed so as to diffuse the dangers over an extensive base and thus avoid any chief impediment for the enterprise (Huang and Walkling, 2007). Financial Acquisitions Monetary attainments are related to the capital and fiscal aspect of trade plans such as Management Buyouts (MBOs) or Leveraged Buyouts (LBOs). Such purchases are not considered in the same context as amalgamations and takeovers (Travos, 2007). 2.2. Stimulus for Amalgamations A large chance to develop the value of mergers is when incentives for the same are anticipated or envisaged by investors. Investigators such as Asquith et al. (2003), Agrawal et al. (2002), and AndrÃÆ'à © et al. (2004) have developed comprehensive data related to the topic pertaining to the incentives for mergers. Mergers must be discouraged by varied reasons such as a superior geographic market, varied economies, superior capabilities and price efficient conduct, widening of the trade, the synergy incorporated, and shifting assets to superior administrators so as to maximize the assets and create superior results, which is the chief objective. It has been proved that mergers and amalgamations are distinctive mediums related to financing in the context of advancement by many investigators. The chief idea or objective behind attaining a profitable investment would be important, particularly if such a concept is considered. In the event of the presence of incentives such as professions or sometimes pure respect improvement occurrences, the possibilities of investments becoming valuable, particularly when there are totally varied incentives for the varied enterprise to triumph and create the line of business. In the event of mergers, at the point when the primary incentive shapes the real advantageous investment, one has to consider the reason why the merger may seem to be priceless. A primary reason may be the lack of the expanding capability to access an unexploited market. One may anticipate a merger so as to achieve these objectives in an effortless manner (Gugler et al., 2003). For a triumphant merger, one should ascertain aspects of robust revenues and synergies. The focus in this matter should also lie on comprehending the incentives for cross-border mergers. It is noticed that dissimilar to domestic mergers for cross-border mergers, one needs to develop an incentive evaluation (Conn et al., 2001). The FDI incentives would resort to internalization, ownership, and position advantages as good instances as mentioned by Moeller et al. (2004). In the context of cross-border mergers, a merger is not likely to have unique ownership advantages. On the other hand, locational advantages may be unclear. Thus, in lieu of purchasing an enterprise in a totally varied geographical market, there are many idea-procedures which happen constantly. The majority of crucial internalization advantages in the instance of cross-border mergers are when products are sold overseas by one nation to another. In the event of the incentives, the OLI framework provides a backdrop for the objective of cross-border mergers, but other factors are also very crucial. It is considered by Chen and Findley (2002) that there is a speed if the retrieval to international markets since those from Greenfield investment cannot be equaled. By the end of the initial ten years of the 21st century, the waves in mergers were analyzed by Danzon et al. (2004). This was later referred to as the Cross Border wave. In contrast to other waves of the century, Evenett explained the trends of the merger wave to be distinct. The utility segment displays how the merger wave comprises of more mergers since specific elements had become components of the Cross Border and more so, with the liberalization effects in addition to the industrial monetary facet, this has additionally intensified privatization. There had to be a greater milieu to assist cross-border mergers. With the chief investment, the incentives had to be linked to the dogmatic surrounding to guarantee an element of the merger wave as depicted by Evenett. For other such grounds, cross-border mergers rise as depicted by Nicholson and McCullough (2002). When the researcher has to handle the theoretical information pertaining to mergers, he tries to present an expansive literature for better understanding. In the context of mergers, a maximized direct policy contention seems to be the most superior and is accountable for the impact of the mergers. A reasonable facet of the investigation discusses how both, markets and clients in the market commence many types of mergers. There has also been a theoretical investigation relating to ideas such as benefit predictions, envisaged variations in the outlays, diversified and varied quantum, in addition to who will eventually gain or lose on account of mergers. These theoretical investigations found their crux in oligopoly markets. Oligopoly markets have been the only crucial markets to utilize the rationale behind mergers opine Conn et al. (2001). So as to manage such market situations, a firm which enjoys a monopoly generally cannot enter into a merger. In a merger of firms, there would be no impact on the market outcomes. In varied production scenarios, the strengths of demand and cost in varied types of oligopoly markets function in different ways while the emphasis of the literature is on studying mergers. 2.3. Cross-Frontier There are several literatures which pertain to theories related to mergers. In reality, none of these literatures actually differentiate that in the management of international merger procedures there must be variations. To achieve cross-border mergers several simultaneous investigations have been undertaken, which complement that there are several literatures dealing with the impacts of these mergers. In terms of globalization, it relies so this is a close expansion and additionally it fulfills international economy apart from varied types of market endeavours to expand international firms of their functions. With consistent methods related to cross-border mergers there is relevant contention for the perusal of Indianization of different segments as described by Ozawa (2002). On account of the absence of attempts in merging administrative techniques, business is the driving aspect behind communication and culture which is why different cross-border mergers were unsuccessful states F inkelstein (2009). Every type of merger is impacted by these matters instead of cross-border agreements which may be dominant. A further peril is that cross-border contracts are entered into merely to gain benefits. To regard the facets of wondering literature there are subjects and anxieties in context of the methods which incorporate cross-border mergers that have been completed. For cross-border mergers, informative differences are real in the hypothetical model facet as stated by Estrin (2009). In the process of achieving merger benefits, jargon, cultural problems, and official systems are cited as types of primary obstacles. The capabilities to draw attention of skills from other enterprises have been provided to differences useful influence procedures, attainment of communal mergers in firms and the particular speed. Generally, between the links amongst the merging methods of firms informative differences are the source of distrust, to which the triumph can be impeded by the communication matters. There is no clear theoretical model on the other hand, which is related to the impediments which harm the efficiency; despite it being a hypothetical exemplar. In contrast to domestic mergers, for a successful cross-border merger, however, this proves that the closer the facets, the more the obstacles, and these are limited to specific countries since many of th ese obstacles are linked to the regulatory and informative systems prevalent there. According to the origin of enterprises in context to the obstacles,there exist behavioral national variations which need to be expected and depend on the country. By being a source of synergy, informative differences can enhance merger ability in addition to generating benefits as opined by Fama (2009). However, impediments can be built by this, for expanded manner of spreading that is more possible. Instead of any of the domestic mergers participating in cross-border mergers as to gain more useful outlooks for the firms a theoretical exemplar method has been developed by Bjorvatn (2001) for the profit of handling cross-border mergers. By allowing varied mediums of entry in addition to cross-border mergers and for assessing and impacting triumph of cross-border mergers in addition to assessing entry outlays these are the primary variables, he employed to follow Fama (2001). Greenfield investment has been shifted into avenues which are minimally attractive by entry outlays, by methods using cross-border mergers augmented to the degree of revenue. On the other hand, in that market for achieving success as expected facets domestic mergers are regarded to be linked to a rise in the entry expenses. In contrast to the domestic ones in envisaging cross-border mergers success focus on hesitancy which is the outcome in this scenario. While choosing the expected outputs in addition to the entry outlays, the cross-border mergers can also provide access benefits to the distinctive market. In this regard, for both domestic and cross-border mergers, there is present, a theoretical merger literature. In terms of price uncertainty and demand exemplar depending on the matter of the doubt as put forth by Das and Sengupta (2001) both in domestic and cross-border mergers is the correct method. 2.4. Experiential Study MAs are expansion strategies that corporates adopt to increase scale and market share rapidly. They are also used to diversify business interests or acquire technological capability, capital, expertise, or enter new markets. From the business perspective, growth is seen in terms of capital, profits, and shareholder value, operations become more efficient, and busin
Subscribe to:
Posts (Atom)