Monday, December 30, 2019

Nike - 1200 Words

JOHN MOLSON SCHOOL OF BUSINESS | CASE ANALYSIS: NIKE INC. – COST OF CAPITAL | FOR PROF. EDWARD WONG | | ARUN KUMAR DURAIRAJ – 27416008 NIDISH PC – 27254423 VIPUL PARTI – 27246307 | 12/3/2015 | | Evaluation of Cohen’s Report and Calculation of WACC We do not agree with Cohen’s report about the cost of capital because of the following reasons. * Capital Structure (% equity vs % debt): In calculating the capital structure of Nike Inc., Johanna†¦show more content†¦is given below with the terminal value as above. The present value for the cash flows is found as per the WACC (9.26%) to arrive at the enterprise value. Free Cash Flow For Nike Inc. for 2002 - 2011 | | | | | | | | | | | | (All figures in millions) | 2002 | 2003 | 2004 | 2005 | 2006 | 2007 | 2008 | 2009 | 2010 | 2011 | Operating Income | 1218.4 | 1351.6 | 1554.6 | 1717 | 1950 | 2135.9 | 2410.2 | 2554.8 | 2790.1 | 2957.5 | Taxes | 463 | 513.6 | 590.8 | 652.5 | 741 | 811.7 | 915.9 | 970.8 | 1060.2 | 1123.9 | NOPAT | 755.4 | 838 | 563.9 | 1064.5 | 1209 | 1324.3 | 1494.3 | 1584 | 1729.9 | 1833.7 | Capex, Net Depreciation | - | - | - | - | - | - | - | - | - | - | Change in NWC | 8.8 | -174.9 | -186.3 | -198.4 | -195 | -206.7 | -219.1 | -232.3 | -246.2 | -261 | Free Cash Flow | 764.1 | 663.1 | 777.6 | 866.2 | 1014 | 1117.6 | 1275.2 | 1351.7 | 1483.7 | 1572.7 | Terminal Value | - | - | - | - | - | - | - | - | - | 25876.69 | Total Flow | 764.1 | 663.1 | 777.6 | 866.2 | 1014 | 1117.6 | 1275.2 | 1351.7 | 1483.7 | 27449.4 | | | | | | | | | | | | Present Value of Cash Flows@ WACC | 699.34 | 555.46 | 596.17 | 607.82 | 651.23 | 656.93 | 686.04 | 665.57 | 668.64 | 8072.58 | Enterprise Value = $17109.36 million Total Equity Value = Enterprise Value – Total Debt = 17109.36-1296.6 Total Equity Value = $15812.76 million Current Outstanding shares = 271.5 million Equity Value perShow MoreRelatedNike And Nike Vs. Nike1268 Words   |  6 PagesAdidas and Nike are two major athletic clothing companies on the market. The two brands are both commonly worn by athletes. Nike has endorsed some of the top athletes in the world. Take Michael Jordan for example, Nike created an entire brand off his name, â€Å"Air Jordan’s.† Adidas also has multiple athletes that advertise for them including soccer player David Beckham. The two companies have been in constant competition with their footwear and apparel for several years. Deciding between the two brandsRead MoreNike And New Balance : Nike937 Words   |  4 PagesNike and New Balance Introduction Nike and New Balance both are companies that sell sports apparel. Nike brand is one of the most popular brands and has been around years and has the popular slogan â€Å"Just Do It†. Nike’s goal is to make products to every person by making sports apparel that will decrease injuries, enhance performance, and lastly that will feel good to wear. On the other hand, New Balance is not as popular. New Balance is still trying to become one of the top brands for sports apparelRead MoreNike And Challenges Of Nike Inc. Essay1349 Words   |  6 PagesExecutive Summary Nike was founded in 1972 by Philip Knight and Bill Bowerman. The focus of this report would be an analysis of how Nike’s manages and delivers its service to its customers. It also looks into Nike’s emphasis on its product quality and innovative design to meet the ever changing consumer preferences. By looking at its current strategies that Nike adopt and its appropriateness, this report will provide you a better understanding on how consumer see Nike and challenges that Nike Inc. facesRead MoreNike : Nike, Inc.1965 Words   |  8 PagesNike, Inc. NIKE, Inc. â€Å"was founded by William Jay Bowerman and Philip H. Knight in 1964 and is headquartered in Beaverton, OR† (Nike, Inc.). NIKE, Inc. concentrates on NIKE Brand and Jordan Brand products divided in seven key categories: Nike sportswear, football, action sports, women and men’s training, basketball and running. The operating segments for its Brand are: North America, China, Japan, Western, Central Eastern Europe and Emerging Markets. Its wholly-owned subsidiaries include ConverseRead MoreBrand Analysis : Nike And Nike1300 Words   |  6 PagesBrand Analysis: a case study of NIKE Background of Nike: Nike Inc. is an American corporation that was founded in 1971 and extended its market to the globe. It is known as one of the largest supplier for sports-related products in worldwide. The company mainly focus on selling athletic shoes, sportswear and other sports-related products. In year 2014 its brand value was valued at 19 billion, making it the most valuable brand among all sports-related business. By the end of 2015, It had an incomeRead MoreNike : Business Analysis : Nike1484 Words   |  6 PagesNike Business Analysis Donny Otwell, Jasen Saavedra, Mohamed Takkouch Business 10 Mrs. Rochin December 5, 2016 Donny Otwell, Jasen Saavedra, Mohamed Takkouch Mrs. Rochin Bus 10 December 5, 2016 NIKE Although facing major competition throughout their history, Nike has been able to grow from a two-man team into a multibillion-dollar corporation in less than 40 years. Nike was started in 1971 after Phil Knight had done research with FormerRead MoreNike s Marketing Plan For Nike Essay962 Words   |  4 PagesFounded January 25, 1967, NIKE, Inc. (About Nike, 2016) became one of the biggest designing and marketing companies across the globe. A designer and marketer, Nike sells athletic footwear, apparel, equipment and accessories for men, women and children/infants. The company has three major brands as found on their product portfolio: NIKE, Jordan, Hurley and Converse. Their product is sold through-out North America, Central America, South America, Asia-Pacific, Africa, the Middle East and Europe andRead MoreCompetitive Analysis Of Nike Vs. Nike1497 Words   |  6 Pagescompetitors to Nike are Adidas, Reebok, Under Armor and Puma and the minor competitors are ASICS and VANS. In accordance with Porter’s 5 Forces, Nike has faced competition by using different and distinct capabilities in marketing. One attribute to such capability is its va lue or benefit offered to its customers. The intensity of competition from its competitors is high for each firm competes in various key areas of business. For example, Adidas has loyal customers who are soccer players, while Nike has highRead MoreNike s Financial Analysis : Nike2236 Words   |  9 PagesCornerstone University â€Æ' Nike Financial Analysis On January 25th, 1964 a hand shake changed the world. It was on this day that a track athlete, Phil Knight, and his previous coach, Bill Bowerman, from the University of Oregon founded Blue Ribbon Sports. Blue Ribbon Sports operated under this name for roughly eight years, and then became known as the globally infamous, Nike. In 1972 the first line of Nike footwear debuted. The company was so successful that in its first year Nike,Inc. cleared 1.96 millionRead MoreMarketing Analysis : Nike, Adidas, Aon, And Nike1161 Words   |  5 Pagesthe best favorable terms to woe more customers. The sports industry is not any exception. The industry confronts lots of competition amongst its key players. The major players as discussed in the industry analysis paper are Puma, Adidas, AON, and Nike. This essay entails a discussion of the competitive strategies each firm has over the others, giving reasons why the brands have been exceptional in the market. Strengths and weaknesses of Puma A SWOT analysis may be utilized to investigate into the

Sunday, December 22, 2019

Analysis of Mental Health in Canada - 1588 Words

Close to six million Canadians live with mental illness; let alone the thousands that are undiagnosed. Mental illness has made big headlines in the news in the recent years. The people suffering from mental illness have been faced with discrimination a caused by a stigma towards them. Mental illness can be caused by many different factors whether they are psychological or environmental. Although only twenty percent of Canadians personally experience mental illness in their lifetime, it affects everyone in their lives. Many of the people suffering from mental illness live their lives in silence because of the stigma attached to the illness. They would rather nobody know about their condition than face the stigma and discrimination of the†¦show more content†¦This caused them to treat them poorly. They would try to hide them from the rest of the world in fear of being publicly ridiculed and put to shame. They would hide them in the cellars, lock them in rooms, hand them off to servants, or abandon them on the streets. Many religions and groups of people believe that people suffering from mental illness were thought to have bad luck. â€Å"Historically in Greece, a mentally ill [family] member implies a hereditary, disabling condition in the bloodline and threatens [the family’s] identity as an honourable unit,† therefore treatment of the mentally ill in these cultures meant a life of hidden confinement or abandonment by one’s family (Blue 305).† (qtd. in Foerschner, 2010). This stigma attached to mental illness is still present today in society Mental illness indirectly affects everybody. Everybody will have at least one person in their life that is suffering from mental illness; whether it is a family member, a friend, or a colleague. One on every five Canadians under sixty-five will suffer from a mental illness at some point in their lifetime (Ontario.cmha.ca, 2014). These illnesses usually develop in adolescence and young a dulthood usually at a time where they are creating valuable relationships and making huge decisions that impact our whole lives. Mental illnesses are categorized into the following categories; anxiety disorders, concurrent disorders and dual diagnosis, dementia, eating disorders, mood disorders,Show MoreRelatedThere Are Multiple Barriers That Prevent Recent Immigrants1543 Words   |  7 Pagesmultiple barriers that prevent recent immigrants to Canada from accessing mental health services including culture, stigma, and affordability. One of the barriers that prevents immigrants from seeking mental health services is language proficiency (Ohtani, Suzuki, Takeuchi, Ochida, 2015). Language barriers and their implications on mental health care will be reviewed. Brisset et al. (2013) highlights the importance of dialogue between the health care practitioner and the client receiving care. ThisRead MoreCanada Welcomes An Ethno Cultural Diversity And Follows The International Mandate1260 W ords   |  6 PagesIn 2012, Canada received approximately 23,000 refugees and their families (Statistics Canada, 2012). Canada welcomes an ethno cultural diversity and follows the international mandate to ensure safety, stability and accessibility to health services for refugees. The refugees come from different countries, which are socioeconomically unstable, and they are in search of stability and a better destiny. Canada is recognized as one of the most developed countries in the world, it is undeniable that theRead MoreMilitary Sexual Trauma ( Mst )1269 Words   |  6 Pagesacts experienced during military service (U.S. Department of Veteran Affairs, 2015). There is a current lack of research regarding MST within the Canadian Forces and in turn there is a severe knowledge gap regarding the effects it has on veteran mental health and if the resources available to them are adequate. MST research currently available is based off of American studies but highlights many areas of concern and inadequacy of current data. The U.S. Department of Defense reports that approximatelyRead MoreCanadas Mental Health System1404 Words   |  6 PagesCanada’ mental health system has struggled to implement compassionate mental health treatment and the persistent problem of stigmatization negatively impacts its development. There are prevailing misconceptions and misunderstanding that result in those with mental illnesses being labelled as â€Å"idiots†, â€Å"imbeciles† and lunatics (Kirby Keon, 2004). Fighting this stigma is of paramount importance to ensure the support of those with mental illness and enable them to seek the necessary treatment. Read MoreOntario s Health : Briefing Note1538 Words   |  7 Pages Ontario s Health: Briefing Note Alysha Savji Ryerson University Health Policy MN8910 Dr. Karen Spalding October 8, 2015 Ontario s Health: Briefing Note Health care expenditure accounted for an estimated 11% (214.9 billion) of Canada’s GDP in 2014 (CIHI, 2014). Canada boasts a universal, cost-effective and fair health care system to its citizens (Picard, 2010). However, despite great claims and large expenses incurred Canada’s health care system has been reported inefficient in it’sRead MoreHealth And Safety Of Canada And Bangladesh1703 Words   |  7 Pagescross-cultural ethical issue discussed in this paper is workplace health and safety. Having occupational health and safety laws in place ensures a safe environment for employees, the public, and stakeholders. The organization as a whole becomes more productive, creative, and happy. Many countries have in place laws and regulations to ensure that the workforce is protected, however, there are still several other countries who lack these necessary laws. Canada and Bangladesh will be used to further discuss thisRead MoreCommunity Assessment And Project Goal13 01 Words   |  6 Pagesdiscussing numerous ideas with the faculty and coordinators at the ORCC, it was decided that a nutritional analysis of the meals being served to the guests was a necessary project that would improve the overall quality of the food. This project is needed as the ORCC is a new program at The Warming Room Community Ministries, and was only implemented in the beginning of January 2017, and no nutritional analysis of the food has been completed in the past. This is important as for many of the individual s diningRead MoreUniversal School Based Violence Prevention Programs994 Words   |  4 PagesUniversal school-based violence prevention programs represent an important means of reducing violent and aggressive behavior as found by Hahn et al (2007) in their study about the United States. The findings by Durlak et al (2011) from a meta-analysis of school-based, universal social and emotional learning (SEL) programs involving pupils from kindergarten through high school, have also added to the growing empirical evidence regarding the positive impact of SEL programs on improved social andRead MoreImmigration Has Been A Significant Part Of Canada1581 Words   |  7 PagesImmigration has been a significant part of Canada. Immigrants come here to search for work opportunities, a new life, and to prepare to start or support a family. However, there are many challenges that come along with a new life, significantly, social exclusion. Social exclusion is characterised by unequal access to resources, capabilities and rights, which leads to health disparities. Immigrants are experiencing a new circumstance and a new culture, they might lose sense of belonging due to limitedRead MoreApplication Of Concept Analysis For Clinical Practice1254 Words   |  6 PagesApplication of Concept Analysis to Clinical Practice Introduction The article is â€Å"eHealth: A Concept Analysis from a Nursing Perspective† from the Canadian Journal of Nursing Informatics, written by Jeff Reed of Arthur Labatt Family School of Nursing, Western University. The main goal of this article was to provide an accurate definition of eHealth, in the context of nursing. The emergence of technology in health care has been very rapid and changing the health care sector exponentially. This development

Friday, December 13, 2019

Assignment on Annual Report Free Essays

Assignment On Mercantile Bank Limited Annual Report for the year ended 31st December, 2009 Topics are to be discussed here (Context) 01. Letter to Transmittal 02. Notice of 11th Annual General Meeting 03. We will write a custom essay sample on Assignment on Annual Report or any similar topic only for you Order Now Mission, Vision Objectives 04. MBL Timeline 05. Credit Rating 06. Sponsors of the Bank 07. Board of Directors 08. Corporate Structure 09. Management Team 10. Head Office Branch Network 11. Where We Locate 12. Financial Summary 13. Economic Impact Report 14. Message from the Chairman 15. From the Desk of Managing Directors and CEO 16. Directors’ Report 17. Managing Directors and CEO’s Report on Risk Management 18. Report on Corporate Governance 19. Compliance Report on SEC Notification 20. Report of Audit Committee 21. Report on Corporate Social Responsibility 22. Report on Customer Service 23. Report on Human Capital 24. Recognition 25. Signing of Financial Statements 26. Auditors’ Report 27. Financial Statements 28. Notes to the Financial Statements 29. Annexure A-G 30. Highlights of Mercantile Bank Limited 1. Letter to Transmittal: Here the Executive Vice President and Company Secretary wrote a letter to all shareholders informing the important items of the Annual Report. Such as Balance Sheet, Income Statement, Cash Flow Statement of the year. 2. Notice of 11th Annual General Meeting: In the notice the date, year, day, time and place of the AGM clearly (in bold letter) described. Important Agenda also represented in the notice. There are 5 Agenda are mentioned. In addition 6 footer Notes also published here. Important notes are record date of the share (March 07, 2010), amount of dividend (22%) etc. Executive Vice President and Company Secretary give his signature with date. 3. Vision, Mission Objectives: The Vision of the back is make finest corporate institution. Mission is making the make profitable by caring, equitable growth by required and proper distribution of recourses. Strategic Objectives: to positive Economic Value Added, market leader in product innovation, achieve cost efficiency, be in the top five financial institution in Bangladesh. Financial Objectives: to achieve stable (? 20%) return on shareholders’ equity. Moreover Core value for Customers, Shareholders, Employees and Community 4. MBL Timeline: Here the development of Mercantile Bank Limited stated. It started incorporation in business and commercialization in 1999. Circulated Primary Share (IPO) in 2003. Got listed in both Bangladesh Stock Exchanges (Dhaka Chittagong) in 2004 and end of year 2009 it has 50 braches all over the country. 5. Credit Rating: As per Credit Rating and information Services Limited (CRISL), Mercantile Bank Limited rated as â€Å"A† (Pronounced as Single A) in the long term and ST-2 rating in the short term on the basis of Financial Statements as on December 31, 2008. High certainty of timely payments, strong liquidity factors, good company fundamentals, easy excess to capital market and minimal risk factors are the key issues of the rating. 6. Sponsors of the Bank: Here the 27 sponsors’ names with photos are representing clearly. 7. Board of Directors: 22 Directors’ name and photo with their designation stated here. There are 1 Chairman, 2 Vice Chairmen and 18 Directors and 1 Managing Director and CEO in the Bank managing committee. 8. Corporate Structure: In Corporate Structure there are 8 different government body represented. Including Board of Directors (22 persons), Executive Committee (18 persons), Audit Committee (3 persons), Managing Director CEO (1 person), Chief Financial Officer (1 person), Company Secretary (1 person), Auditors (2 persons) and Tax Advisor (1 person). . Management Team: Here the detail list of different managing committee separately represented with their designation. There are 10 categories of designation. Such as Managing Director CEO, Additional Managing Director, principal, Deputy Managing Director, Senior Executive Vice Presidents, Executive Vice Presidents, Senior Vice Presidents, Vice President s, First Vice Presidents and Assistant Vice Presidents. 10. Head Office Branch Network: Under this title the details addresses of bank’s all 50 banking branches, SME braches and Brokerage House with Phone, Mobile and Fax number given. 1. Where We Locate: Here the map of Bangladesh given and all 53 (3 SME/Agro Branches) branches marked by company’s logo under district wise. 12. Financial Summary: Under Financial Summary Company’s last 5 years Net Interest Margin (NIM), Profit after Tax, Return on Assets (ROA), Cost Income Ratio, Return on Equity (ROE), Operating Efficiency Ratio and in the last 8 years comparable company’s Income Statement, Balance Sheet, Foreign Exchange Business, BIS Capital Measure, Credit Quality, Share Information, Operating Performance Ratio and Other Information represented. 3. Economic Impact Report: Here Economic Impact described in two ways; Direct Impact and Indirect Impact. Direct Impact are employment opportunities, payment o f tax to the government, increase value to the Shareholders. Indirect Impact created by catering financial services, Bank generated wealth in the economy and profit for itself which is ultimately distributed amongst the shareholders and other participants in different form. In 2009, total value added by MBL was BDT 2,559. 96 (millions) and direct contribution to the economy was BDT 855. 26 (millions). There are two value added statements (Economic and Market) showed by column chart. A pie chart showed for distribution of Value Addition (maximum for government tax 33. 4%). Bank added BDT 129. 5 (million) under Economic Value Addition and BDT 4229. 48 (million) under Market Value Addition. 14. Message from the Chairman: At the first of the message the Chairman invited Shareholders to the 11th Annual General Meeting. There are some topics the Chairman discussed briefly. Those are: World Economy in 2009: here the impact of sub-prime mortgages landslip discussed. Bangladesh Economy in 2009: here the benefit of growth Bangladesh economy in the particular year stated. Performance of the Bank in 2009: here the actual amount of bank’s deposits collection, loan and advance, import business, export business and foreign remittance described. Diversified Business Activities of the Bank: under this section the details activity of bank represented here. Such as Deposits, Loan and Advances, Import Export Business and Inward Foreign Remittance. SME: here bank’s SME structure described. Card Business: here bank’s different card business represented. Such as Credit card, Debit Card, VISA dual prepaid card, VISA Dual Hajj Card. Described it’s features and services. Corporate Governance Practice: here the responsibilities and activities of Board of Directors to the business operation represented. CSR Programs: here the guideline of management of the bank informs the board on CSR activities and is responsible to implement a specific line of approving authority, control and monitoring for financial support of such activities. Customer Service: here the Chairman describe how the bank server to the customer for achieve highest customer satisfaction. Human Resources Development: here the promotion and intensives to the employees represented for their superior performance. Recognition and Award: here the different achievements and rewards stated that in 2009 the bank gets thorough out the year. Future Outlook: here the challenges and opportunities for the bank in upcoming years described thoroughly. Challenges in 2010: here the economic effect on the bank in year 2010 is represented. Such as global downturn, slower growth of exports and workers’ remittance etc. Acknowledgement: here the Chairman gives his thank you notes and committed a stable growth of back where shareholder can rely on. 15. From the Desk of Managing Directors and CEO: Here the CEO describes the banks’ situation in the year 2009. He also represented Bank’s performance during the year 2009, its prospects and potential challenges in 2010. Such as Positive Growth: A Step Further: describing here the growth of the bank during the year. Prospects in 2010: he describe the opportunity, hope for the bank in upcoming year. Reviewing Our Business in 2009: here the business operation during the year stated clearly. Assets and Liabilities Position, International Business, MBL’s Products and Services, MBL’s Card Business, Agro-Based Financing, SME Financing, Our Priorities, Operation, Customer Relationship, Technology, Human Capital Development, Corporate Social Responsibilities (CSR), MBL Brokerage House, Mobile Banking, Commitment to Government, Base I-II Capital Accord, Anti Money Laundering, Network Expansion, Challenges in 2010, Our Preparation and Acknowledgement are the main topics he discussed. 6. Directors’ Report: The parts of the Director’s Report are World Economy, Bangladesh Economy (GDP, Inflation, Investment and Saving, Broad Money, Domestic Credit, Export, Import, Trade Balance, Remittance, Foreign Exchange Market, Prospect of Bangladesh Economy in 2010), Business Review (Deposit and Deposit Mix, Loan and Advance, Import Trade, Export Trade, Foreign Remittance, Treasury Operation and Fund Management, Earning Base in Assets, Asset Portfolio, Funding Structure, Capital, Statutory Reserve, Capital Adequacy, Number of Shareholders, Contribution to National Exchequer and Economy, Acquisition of IDLC Share, Purchase of Land, Branch Network, Board of Directors, Board and Committee Meeting, Corporate and Financial Reporting, External Auditors, Correspondence Relationship , RD, Information Technology, Financial Products and Services, Different Deposit Products, Different Loan Products), Financial Review (Different Profit Incomes, Different Expenses, Different Tax, Dividend, EPS, O/E Ratio), Outlook 2010 and Acknowledgement are represented here. After that it repeated in Bengali Language. 17. Managing Directors and CEO’s R eport on Risk Management: Here start with basic discussion on Risk Management. Such as Risk Management Realities, Approach, Oversight, Process etc. And later describe different types of Risk Management described with photo and tree table. Such as Credit Risk Management, Market Risk Management, Interest Rate Risk Management, Foreign Exchange Risk Management, Operational Risk Management, Internal Control and Compliance Risk Management, Equity Risk Management, Money Laundering Risk Management, Information Technology Risk Management, Liquidity Risk Management, Marketing Related Risk Management, Human Resource Related Risk Management etc. 18. Report on Corporate Governance: At first different names of Corporate Governance with responsibility and duty in the bank represented. Such as Board Of Directors, Board’s Supporting Committee, Management Committee, Control Environment Committee. Each of every committee are presented with meetings photo. 19. Compliance Report on SEC Notification: It is the notification issued by The Security and Exchange Commission for all listed companies in order to improve Corporate Governance on ‘Comply or Explain’ basis. There are three tables. First is Complied or Not Complied table. Only 3 rules are not complied by the bank among 43 rules which are under review. In second table the numbers with names of Directors attained Board Meeting during the year. And the last one is The Patter of Shareholding where shows the nos. and percentage of shares hold by Directors. 20. Report of Audit Committee: Here the name of Auditor with photo presented. And also some other topics such as composition of the Audit Committee, Role of the Audit Committee, Internal Control, Meetings, Financial Reporting, Internal Audit and Inspection, External Audit, Regulatory Compliance and Miscellaneous issues given here. 21. Report on Corporate Social Responsibility: Here the roles and responsibilities of the bank toward society described. In this section a table shows how much the bank contributed their profit to the society. The highest donation went to health sector. MBL has slogan to be the â€Å"Banglar Bank†. MBL has given different awards to different sectors. Photos and arenas are mentioned here. 22. Report on Customer Service: The importance of customer to the bank is presented here. Some core demands of customer are fulfilling by the back. Such as Bringing Mass and More people into the Banking net, Addressing Unique Needs of the Customers, Meeting Demand of Customers through Alternative Banking Channels, Response from the People etc. 23. Report on Human Capital: In this topic the process of giving service in effective manner the back took some steps such as Nursing the People with Utmost Care, Recruiting the Best People (bonus, promotion, recognition, training etc), Managing the people, Performance from the People etc. 24. Recognition: An award giving ceremony’s (ICAB Award-2008) photo given here. 25. Signing of Financial Statements: Here a photograph of Directors represented where they all present there for signing Financial Statements – 2009. 26. Auditors’ Report: At first Auditors declared those elements that they audited. Such as Balance Sheet, Profit and Loss account, Cash Flow Statement, Statement of Changes in Equity, Statements of Liquidity Analysis and Explanatory notes to Financial Statements. Also mention their responsibilities. In the auditor’s report they include Scope, Opinion (14 opinions), Auditors Firm Names, Auditor Signatures, Auditor Designation, Place and Date. 27. Financial Statements: In the Financial Statements there are 7 part of it. At first there is Balance Sheet (Classified Statement of all types of Assets and Liabilities), then Off-Balance Sheet Items (Contingent Liabilities and Other Commitments), Profit and Loss Account (Include all types of Incomes and Expenses, Provisions, Appropriations etc. , Cash Flow Statement (Net Cash Inflow and Outflow recorded here), Statement of Changes in Equity (Capital gain/reserve and losses/dividend), Liquidity Statement (assets and liabilities maturity analysis), Notes to the Financial Statements (details of financial statement such a s calculations, principals, disclosures etc). 28. Annexure A-G: In Annexure A all related asset’s depreciation charges calculated here, Annexure B described number of shares hold by Directors with their positions, Annexure C represented different Investment in Shares during the year. Annexure D stated market adjustment of approved Securities HTM and HFT shares. Annexure E mentioned maturity analysis of other assets (like as advanced deposits, stamps in hand etc. , Annexure F represented Compliance of BAS and BFRS (among 29 BAS 6 are not applied and among 4 BFRS none are applied), Annexure G provide Computation of Risk- Weighted Assets list. 29. Highlights of Mercantile Bank Limited: Here all necessary information towards the investors are presented here, such as paid-up capital, total assets, total deposits, ROA, ROI, EPS, NI per share, P/E Ratio etc. 30. Proxy Form: It is the application printed and provided by the firm to shareholders incase of his absence, shareholder can give voting power to his nominated person. Need to fill up the gaps and attach revenue stamps and send to the authority before particular date. It has two parts, one for office and other for shareholder. ————-END————– How to cite Assignment on Annual Report, Papers

Thursday, December 5, 2019

Ethical Consideration Of National Security -Myassignmenthelp.Com

Question: Discuss About The Ethical Consideration Of National Security? Answer: Introduction Ethics is an integral part in the workplace operations. Exposure of ethical approach reflects the culture of the employees. This approach is crucial for the managers in terms of involving the employees in group discussions. Respecting the individual sentiments is one of an essential component of workplace ethics. Consciousness in this direction enhances the professionalism of the employees. Legal compliance is one of the other examples of workplace ethics (Cohen 2016). Delving deep into the aspect, ethics brings in behavioral theory into the discussion. This assignment peeks into the ethical consideration of NSA. This is carried out through the Doing Ethics Technique and ACS Code of ethics. Analysis of the situation using Doing Ethics Technique Edward Snowden performed an action of leaking the classified information of the National Security Agency, which intensified the danger of the malfunctioning of the systems. On the other hand, the step that was taken by the .employee of the NSA has compromised the details of the people. The violation of the ethics of the company was based on the compromise of the phone and internet traffic details of the terrorists (Nsa.gov 2018). The systems helped the security systems to keep a close track on the activities of the terrorists and therefore the leakage of the functioning of the systems has helped the terrorists in finding a refuge away from the security systems. Some of the people however think that Snowden is a marketing whistleblower who has drawn attention on the undertakings of the NSA, which is unethical. On the other hand, some others believe Snowden to be traitor to the security systems and the country by compromising the security of millions of people (Nsa.gov 2018). What is the facts/information? In the year 2013, June, Edward Snowden revealed certain classified information of the National Security Systems (NSA) and thereby compromised the information of the systems that are undertaken by the agency. On the other hand, the compromise of the information that is being undertaken by Edward has made the terrorists aware of the practices that are undertaken by the agency for tracking their activities (Nsa.gov 2018). Edward revealed the classified information of the undertakings of the agency in a mass media channel through which the mass is made aware of the processes that are undertaken by the organization. The report on the NSA surveillance programs has helped in undertaking steps for bringing in the varied changes in the security systems that are undertaken by the agency. Alternatively, the revelation of the functioning of the NSA has helped in the understanding of the unethical and unconstitutional procedure undertaken by the agency. What are the issues? The issues that are being faced by the organization are based on the revelation of the important classified information, which has made the terrorists and the other antisocial aware of their functioning and the processes undertaken by the organization. The major aspects of the change that is being undertaken by the organization is based on the requirements of the people to secure their surroundings and the neighborhood. On the other hand, the information of the processes has made the processes vulnerable to the cyber theft and data piracy, which might affect the smooth functioning of the organization (Nsa.gov 2018). The proper functioning of the organization is based on the resourcefulness and the processes that are undertaken by the organization for the better functioning of the same related to the security of the people. Therefore, the issues that are faced by the organization are due to the concession of the data of the organization in the markets and the people being made aware o f the systems of the security that is being undertaken by the agency (Nsa.gov 2018). Who are affected? The people of the nation and the security systems are affected by the breach in the information of the agency. On the other hand, it has affected the functioning of the organization as per the requirements to deal with the issues faced by the people relating to their security (Nsa.gov 2018). The mishandling of the phone records and the other significant documents are subjected to the data theft and has resulted to an issue in the cyber security system of the agency. The organization and its functioning is mostly affected through the breach of information. On the other hand, the people of the region are affected through the mismanagement of their private details that has endangered their existence in the region. Ethical issues and implication The ethical issues that are faced by the agency is based on the revelation of the classified information of the systems that are undertaken by the organization. The classified information has not only affected the functioning of the organization but also has affected the security of the people (Nsa.gov 2018). The major impact that the agency might face while making use of the security systems are based on the data piracy, which might affect the smooth functioning of the security systems. On the other hand, the breach of the information has caused havoc impacts on the livelihood of the people. The security systems of the company should have been integrated which would have helped in the prevention of the data theft and other unethical practices. What can be done? In order to avoid the circumstances and the atrocities, the agency might take steps in order to ensure the safety of the data from the piracy and the cyber crime activities. The steps that might be taken by the agency are framing policies for the control of the cyber theft and the development of the organization in the markets. On the other hand, the agency must take steps in order to review the policies for the proper management of the information that is retained by the agency. Limited access to the employees will also help the organization in securing the classified information. The company must also take steps to secure the information through the application of various software that helps in retaining the important information away from the outsiders and even provide very limited access to the employees. What are the options? The various options that can be implemented by the organization in order to handle the situation is being discussed in this section of the report. It helps in the understanding of the different steps that are undertaken by the management of the organization. The various options that can be undertaken by the organization in order to handle the situation are: Review of the policies The company must take steps in order to review the policies of the security in order to keep the classified documents secured and away from the cyber crime. It will be helping the organization in retaining the secrecy of the information safe and away from breaches and leaks. Introduction of a firewall The introduction of a firewall through the implementation of a software, which might help the organization in keeping the records safe and away from disclosure. It helps the organization in safeguarding the classified information away from the disruptions in the systems. Limited access to the employees Ensuring the limited access to the employees also helps the organization in monitoring over the security of the information and therefore prevent data theft from affecting the systems of the undertakings of the agency. What is the best option and why? The best option that can be counted by the organization is based on the level of security systems and the importance of the documents that are required to be secured. The best option that might be undertaken by the agency is the introduction of a firewall, which will actually help the organization in preventing invaders from looking into the confidential documents of the organization. The NSA must take steps in order to implement the software in the best possible manner in order to prevent data theft and disclosure of classified information of the agency. Analysis of the situation using ACS code of ethics ACS code of ethics is an essential component of the Australian constitution. According to the standard and protocols of ACS code of ethics, maintaining the honor, dignity of the personnel is very important in order to abide by the workplace ethics (Jensen and Delany 2016). These aspects contradict the situation of NSA, as one of the personnel, Edward Snowden, leaked the private and confidential data of the operations. As he leaked the private and confidential information, it can be considered that he neglected the public interest of his colleagues, managers and other staffs. This negligence strained the relationship between Snowden and the organization. Herein lays the appropriateness of the instance, suggesting different perceptions regarding Snowdens deeds. Delving deep into the perspective, the intensity of crime is so high, that any initiative from Snowdens end would not bear positive result. This is in terms of raising the standard of living of his colleagues. Snowdens deeds lack honesty in the practical application of the learnt skills in the workplace operations. This is reflected from his unethical revelations of the confidential data to the third party. This revelation also indicates Snowdens lack of competence regarding catering to the needs, demands and requirements of the stakeholders (Erford 2017). Absence of these skills stalls the professional development of personnel like Snowden. Along with this, it also acts as an obstacle towards the professional development of his colleagues, as they are compelled to bear with the illegal issues and scandals. Viewing it from broader perspective, obstacles in the professional development adds an ombre shade to the professionalism of Snowden as well as the other staffs of NSA. Countering this, obstacles in the professional development aggravates complexities towards enhancing the quality of life. This is applicable both in cases of Snowden and his colleagues in NSA. These complexities reflect the misutilization of the preconceived competencies by people like Snowden compelling the organization to encounter losses (Rogers and Braunack 2015). Confessing regarding the crime can be considered as the presence of honesty within Snowdens characteristic traits. However, in terms of the loss, which NSA had to face, this honesty is of no use. Leaking the information to terrorists is Snowdens unethical approach, adding interrogative parameter to Snowdens professional career. Fleeing from the country nullifies the attribute of honesty in case of Snowden. Avoiding the federal charges reflects the negligent attitude of Snowden towards performing the duties of a faithful citizen. Being a whistle blower raises doubts over Snowdens post as an employee. Violation of the civil rights and constitutional elements attaches questions regarding the Snowdens citizenship as well as the post offered (Congress 2017). In view of this parameter, perspectives his prosecution is appropriate. Herein lays the appropriateness of the term traitor. Countering this, his confession regarding committing a crime reduces the intensity of prosecution. In his confession, the names of Newspaper agencies emerge, which spoils the reputation of NSA. Revealing the information to these agencies reflects the foolishness of Snowden in terms of ensuring the betterment of the organization, of which he is an employee. This foolishness contradicts the true essence of ethics in workplace. As a matter of specification, ACS code of ethics indicates the responsibility of the individuals to adhere to the societal values for adding value and weightage to their citizenship (Komi?, Marui? and Marui? 2015). In view of this, Snowdens citizenship is at stake. This is because he has assisted terrorists in misutilizing confidential data about the organization. Taking into consideration all these aspects, perceiving Snowden as a traitor is appropriate. Along with this, prosecution is also justified. Delving deep into the aspect, Snowdens activities makes him a violator of security in his own country. Revealing details of the surveillance programs can be Snowdens disinterest towards keeping track of the information, which flows from the internal to the external environment of NSA. Known terrorists can be correlated with the fact that without the information of the Agency, Snowden was practicing illegal alliance with the terrorists, supplying them with confidential information and data (Holtzhausen 2015). Delving deep into Snowdens position, he works for a defence contractor Booz Allen Hamilton. This side parting with the terrorist puts Hamilton in an awkward situation. However, this is just an assumption. The word code in the AcS code of ethics represents the customs, rules and regulations developed by an organization for maintaining the workplace decorum. All the employees, upon their recruitment are expected to abide by these rules and regulations. However, Snowden is an exception, as he violates the Agency norms. This connotation raises doubts over the ways and means adopted by him to gain this position (Parsons 2016). Along with this, violation of the constitutional rights contradicts the aspect of public interest in case of Snowden. In view of this connotation, the aspect of professional development is nullified. This is in terms of neglecting the interest of his colleagues, managers and the organization as a whole. Viewing it from the perspective of ICT industry as a whole, the loss of secret and confidential data degrades the reputation. Violation of the code of ethics compels the employees like Snowden to encounter illegal instances, which can go up to the extent of termination. Accepting this consequence reflects the absence of competence from Snowdens end regarding the application of learnt skills to the execution of the workplace operations (Barker and Branson 2014). This incompetence can be perceived in terms of intentional or incapability. In case of Snowden, it is intentional as Snowden neglects public interest as well as the interest of his colleagues. Overall, it can be said that in case of Snowden, none of the elements of AcS code of ethics is applicable. He is not at all conscious towards protecting the of his colleagues, which reflects the lack of competence towards the proper application of the learnt skills. This lack contradicts honesty, stalling the professional development of employees like Snowden. Consistency in this approach acts obstacle in the enhancement of professionalism for these employees, degrading their quality of life (Brinkman et al. 2016). Perceptions about Snowden are the consequences of his own actions. The adjectives whistle blower and traitor degrade his individualism. However, confessing that he has commited a heinous crime, reflects his consciousness about the consequences, which he has to face on violation of the constitutional rights. Placing the personal interests above the organizational interest makes him self-centred, nullifying the aspect of ensuring the benefit of organization as a whole (Holtzhausen 2015). This type of approach is against the workplace ethics, raising doubts over his adherence to the position offered. Conclusion This assignment emerges successful in providing an insight into the workplace ethics. The consideration of the analytical tools of Doing the Ethics and ACS code of ethics enliven the ways and means in which the workplace ethics can be preserved. The example of NSA enhances the clarity of the readers in this regards. Doing the ethics analysis mainly enlightens the knowledge of the readers regarding the issues and the solutions in which these issues can be resolved. AcS code of ethics is relevant with the requirements of the assignment. The case study of Edward Snowden reflects unethical approach towards the workplace activities. This approach stalls the professional development of such employees, degrading their individualism. References Barker, R.L. and Branson, D.M., 2014.Forensic social work: Legal aspects of professional practice. Routledge. Brinkman, B., Gotterbarn, D., Miller, K.W. and Wolf, M.J., 2016. All hands on deck for ACM Ethics: updating the Code, revising enforcement, promoting integrity.ACM SIGCAS Computers and Society,46(3), pp.5-8. Chou, T.S., 2013. Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), p.79. Cohen, A.I., 2016. Ethics and professional practice. InPracticing Professional Ethics in Economics and Public Policy(pp. 237-244). Springer, Dordrecht. Congress, E.P., 2017. What social workers should know about ethics: Understanding and resolving practice dilemmas.Social Work Ethics, p.1909. Erford, B.T., 2017.Orientation to the counseling profession: Advocacy, ethics, and essential professional foundations. Pearson. Guo, K.H., 2013. Security-related behavior in using information systems in the workplace: A review and synthesis.Computers Security,32, pp.242-251. Holtzhausen, D.R., 2015. The unethical consequences of professional communication codes of ethics: A postmodern analysis of ethical decision-making in communication practice.Public Relations Review,41(5), pp.769-776. Jain, P., 2012. Security Issues and their solution in cloud computing.International Journal of Computing Business Research, pp.2229-6166. Jensen, G. and Delany, C., 2016. The Discourse on Ethics and Expertise in Professional Practice. InProfessional Practice Discourse Marginalia(pp. 73-82). SensePublishers, Rotterdam. Jing, Q., Vasilakos, A.V., Wan, J., Lu, J. and Qiu, D., 2014. Security of the Internet of Things: perspectives and challenges.Wireless Networks,20(8), pp.2481-2501. Komi?, D., Marui?, S.L. and Marui?, A., 2015. Research integrity and research ethics in professional codes of ethics: Survey of terminology used by professional organizations across research disciplines.PloS one,10(7), p.e0133662. Kshetri, N., 2014. Big data? s impact on privacy, security and consumer welfare.Telecommunications Policy,38(11), pp.1134-1145. Modi, C., Patel, D., Borisaniya, B., Patel, A. and Rajarajan, M., 2013. A survey on security issues and solutions at different layers of Cloud computing.The journal of supercomputing,63(2), pp.561-592. Moore, J.F. and Labovitch, B.A., NewsILike Media Group Inc, 2013.Security systems and methods for use with structured and unstructured data. U.S. Patent 8,347,088. Morrow, B., 2012. BYOD security challenges: control and protect your most sensitive data.Network Security,2012(12), pp.5-8. Nsa.gov (2018).NSA.gov. [online] Nsa.gov. Available at: https://www.nsa.gov/ [Accessed 6 Feb. 2018]. Parsons, P.J., 2016.Ethics in public relations: A guide to best practice. Kogan Page Publishers. Rogers, W. and Braunack-Mayer, A., 2015. General practice ethics: inter-professional responsibilities.Australian family physician,44(7), p.519. Verma, S. and Singh, A., 2012, December. Data theft prevention endpoint protection from unauthorized USB devicesImplementation. InAdvanced Computing (ICoAC), 2012 Fourth International Conference on(pp. 1-4). IEEE.