Wednesday, September 2, 2020

The Changing Face of Business Free Essays

Part 1 The Changing Face of Business http://www. wileybusinessupdates. com Learning Goals 1 Distinguish among business and notfor-benefit associations. We will compose a custom exposition test on The Changing Face of Business or on the other hand any comparable theme just for you Request Now Distinguish and depict the variables of creation. 5 Explain how today’s business workforce and the idea of work itself is evolving. Distinguish the abilities and ascribes directors need to lead organizations in the 21st century. Framework the attributes that make an organization respected by the business network. 2 6 3 Describe the private endeavor framework, including essential rights and business. Recognize the six times of business, and clarify how the relationship era†including unions, innovation, and natural concernsâ€influences contemporary business. 7 4 What is Business? Benefit looking for exercises and ventures give products and enterprises important to a financial framework. Benefit looking for is the award for specialists who face the challenge required to offer products and ventures to clients. See Fortune 500 for a rundown of significant U. S. organizations. Elements of Production Natural Resources Capital Human Resources Entrepreneurship Occupational Outlook Handbook The Private Enterprise System Capitalism Adam Smith is the dad of private enterprise. â€Å"Invisible Hand† Economic framework decides business proprietorship, benefits, and assets Rewards firms for their capacity to serve the necessities of buyers Minimized government mediation Competition is the fight among organizations for shopper acknowledgment. Fundamental Rights in a Private Enterprise System Entrepreneurship An Entrepreneur: Is a daring individual Takes money related, individual, social, and profession dangers Entrepreneurial reasoning is significant inside enormous firms. Sees a possibly beneficial open door Devises an arrangement to make progress in the commercial center and procure those benefits Fuels the U. S. economy Provides advancement Six Eras in the History of U. S. Business Managing Relationships through Connections Relationship Management Activities to fabricate and keep up commonly advantageous binds with clients and different gatherings Relationship the executives relies upon innovation. Vital Alliances and Partnerships An organization is a connection of at least two organizations that help each other accomplish shared objectives. A key coalition is an organization shaped to make an upper hand for the two players (see Amazon). Today’s Business Workforce Committed specialists who can encourage solid binds with clients Capable of great creation Able to contend in worldwide markets Technically adroit Changes in the Workforce: Aging Population By 2030, the quantity of U. S. laborers 65 or more established will arrive at 72 million. Many gen X-ers are hitting the pinnacle of their vocations, while Generations X and Y are propelling their professions. Innovation has increased the employing challenge by expecting laborers to have perpetually propelled aptitudes. U. S. Statistics Bureau Changes in the Workforce: Shrinking Labor Pool/Diversity Economists foresee the U. S. abor pool could before long miss the mark by upwards of 10 million individuals. The two quickest developing ethnic populaces in the United States are Hispanics and individuals of Asian starting point. Worker groups with people of various sexual orientations, ethnic foundations, societies, religions, ages, and physical and mental capacities are progressively compelling. Chan ges in the Workforce: Outsourcing is utilizing outside merchants to create merchandise or satisfy administrations and capacities that were recently dealt with in-house or incountry. Offshoring is the migration of business procedures to bring down cost areas abroad. Changes in the Workforce: Innovation through Collaboration Younger specialists are looking to some different option from work-starts things out Telecommuting and occupation sharing Part-time and impermanent laborers are developing Collaboration is supplanting working alone Value hazard taking and advancement The 21st-Century Manager Critical-figuring Creativity Ability to lead change Vision Critical Thinking and Creativity Critical reasoning is the capacity to break down and evaluate data to pinpoint issues or openings. Innovativeness is the ability to create novel answers for apparent hierarchical issues. Capacity to Lead Change Guide workers and associations through changes Managers must be alright with intense choices. Components that require hierarchical change can emerge out of outer and inward sources. What Makes a Company Admired? Strong benefits Stable development Safe and testing workplace High-quality products and ventures Business morals and social duty Fortune’s rundown of Most Admired Companies The Future of Business New Technologies Population Shifts Emerging countries Shrinking Global Barriers Trade, correspondence, transportation Step by step instructions to refer to The Changing Face of Business, Papers

Saturday, August 22, 2020

A Clean Well-lighted Place by Ernest Hemingway Essay

â€Å"A Clean, Well-Lighted Place† by Ernest Hemingway â€Å"A Days Wait† by Ernest Hemingway â€Å"The Short Happy Life of Francis Macomber† by Ernest Hemingway â€Å"Indian Camp† by Ernest Hemingway â€Å"Soldier’s Home† by Ernest Hemingway Ernest Hemingway has given us probably the best writing of the twentieth century. He has been perceived lately as probably the best author ever, and the impact his work has left upon us is contrasted and that of Shakespeare’s. His incredible achievement could be expected, partially, to the way that characters in his writing lead lives which reflect his own from multiple points of view. Artistic pundits have named these equals â€Å"code heroes,† and have introduced rules with regards to what ways of life they lead in Hemingway’s stories. I wish to show similitudes within the sight of these specific, uniform characteristics that are normal among Hemingway’s code saint in the na rratives, â€Å"A Clean Well-Lighted Place† and â€Å"A Day’s Wait,† both by Ernest Hemingway. The particular components that make up a code legend are as per the following: (1) â€Å"Eat, drink, and be happy, in light of the fact that tomorrow you may die.† (2) â€Å"When you’re dead, you’re dead.† (3) â€Å"Avoid demise at all expense, yet don’t be reluctant to die.† (4) â€Å"Always be trained, never show emotion.† (5) â€Å"Grace under pressure.† (6) Nada idea †a code saint isn't happy around evening time. They become generally dynamic during murkiness, since they dread it and attempt to maintain a strategic distance from it consistently. In the short story, â€Å"A Day’s Wait,† the nearness of code legend attributes is apparent in the musings, words, and activities of Schatz, the principle character in the story. Schatz is a little youngster who accepts that he is going to kick the bucket, yet he doesn't fear it. Rather, the kid lies in bed and takes it. He comprehends that passing is an acknowledged reality instead of a troubling end for a code legend. Schatz drives himself to be solid for his dad. He lets him know, â€Å"You don’t need to remain in here with me, Papa, on the off chance that it irritates you.† Schatz keeps on substantiating himself as a code saint by continually smothering any feeling that he is feeling. He not even once shares with his dad the tremendous unrest that is available inside himself. At the point when his dad asks him how he believes, he essentially answers, â€Å"Just the equivalent, so far.† This is a sufficient answer for a Hemingway code legend since he generally feels the nearness of an undying harmony that is control. He realizes that he should display a steadfast graceâ under pressure. Schatz embodies these attributes, and in light of the fact that his coded conduct is obvious, but since he isn't a fighter at the front or a man with a devastating physical issue which no longer permits him to appreciate life, he is just a kid of nine years. Schatz shows a beauty that most grown-ups can not comprehend. He is resolved to show an enthusiastic quality that is past his years. Likewise with the greater part of Hemingway’s code legends, Schatz knows about the clumsy inclination in which haziness presents. His dad instructs him to hit the hay a few times, however Schatz realizes that he should stay cognizant and make the most of his last long stretches of life. On the off chance that he permits himself to pass onto a powerless express that is rest, he realizes that he may not wake up. â€Å"I’d rather stay awake,† he tells his dad in the uneventful manner by which just a code legend can. The elderly person in the short story â€Å"A Clean Well-Lighted Place† additionally comprehends the stuff to be one of Hemingway’s first class. He drinks each night until he is tanked, on the grounds that he realizes that today around evening time might be his last. He realizes that the world is a consistent battle and that he should be victor, in case he lose the game. For once the game is lost, it's anything but a simple assignment to play once more. In the realm of a code saint, there are no prizes for second spot. When the elderly person is done, he realizes that he can stay away for the indefinite future in the wonder which he once delighted in. Be that as it may, he doesn't fear this. That would not be the style which suits him. Truth be told, we discover that the elderly person invites demise, â€Å"He draped himself with a rope.† He has a preferred position over the individuals who dread passing. He feels that he would be more joyful in death than throug hout everyday life. The elderly person demonstrates to us that he is troubled, yet he can't show this. He stays stately in his misery and comprehends that it would not be â€Å"sporting† to end the game along these lines. His regard originates from playing the game well, for he is a code saint. Indeed, even in the tipsy stun that he should battle each late evening during his long walk home, he is gathered, a brightened warrior who gladly faces the great conflict. â€Å"The server watched him go down the road, an extremely elderly person strolling temperamentally yet with dignity.† The elderly person, as all code legends must, likewise precludes the nearness from claiming haziness. Hemingway utilizes specific code components more than others in specific stories, and this is noâ exception. The short story â€Å"A Clean Well-Lighted Place† is totally founded on the nothing idea. The storyteller clarifies the old man’s requirement for a lit spot so as to some way or another forestall the agonizing depression wherein he will not capitulate to. Hemingway, in his virtuoso, comprehends this need in each one of us. In his portrayal of this light, he triggers a similar sentiment of warmth that the elderly person has developed to rely upon. The elderly person goes to that place in his youth where he recollects the newly washed ledge, the warm, fluorescent shine of a grandmother’s kitchen around evening time not long before sleep time. Much the same as us all, he wouldn't like to hit the sack. He yearns to be conscious and within the sight of that security. Numerous likenesses are seen between the code legends of Schatz, in â€Å"A Day’s Wait,† and the elderly person from â€Å"A Clean Well-Lighted Place.† Both have a quality which permits them to see passing in an unexpected way. They can see a bigger picture wherein they play the game well, however when they are through they should acknowledge the way that they can't return. This capacity to see passing is the thing that permits Schatz to acknowledge an early end, and furthermore what invigorates the elderly person the to gaze his producer in the eyes and kick the seat out from underneath himself. Both Schatz and the elderly person can dispense with the feelings which confuse the entirety of our lives. In the ownership of this characteristic, the two characters can concentrate totally on the errand which is within reach. Schatz realizes that he should be solid for his dad, so he can sit around idly time on emotions. The elderly person likewise realizes that he has another reason in life than to advance cause. He is called to carry on with a real existence deserving of a code hero’s acknowledgment. He is called to play the game better than any other person until the end no longer allows him to. These characters both power themselves to carry on a noble presence. Schatz realizes that moaning and continuing don't exist in the realm of a code saint. He realizes that the main way he can confront demise is with a similar disposition that he confronted every day of his reality. To surrender currently would lose the fight. The elderly person likewise realizes how to lead an existence of respect. â€Å"I wouldn’t need to be that old. An elderly person is a frightful thing. Not generally. This elderly person is spotless. He drinks without spilling. Indeed, even now, inebriated. Take a gander at him.† It is clear to the server that the elderly person is by one way or another constrained by an undetectable power, an inner power, which doesn't permit him to give any impression aside from one of control, one of elegance. Ultimately, these two code saints share a regard for dimness. This regard fuses everything that murkiness speaks to. They can't fear dimness, for it isn't in the idea of a code saint to fear anything, however they additionally can't overlook the inclination that haziness gives them. In the short story â€Å"A Day’s Wait,† the undeniable perception must be made that the kid not even once permits himself to get powerless in the unreadiness which is rest. The elderly person is so awkward with this weakness that he lives out haziness underneath a roof light in a cafãÆ'â © stall. Schatz and the elderly person are instances of Hemingway code legends at their best. In each short story that Hemingway’s pen has graced, we see a character who can be viewed as gallant in a manner explicit to themselves and to Ernest Hemingway. Nonetheless, it is the point at which these single characters are introduced in the light of a correlation that it is conceivable to see just precisely what Hemingway was attempting to achieve in building up every one of them.

Friday, August 21, 2020

Assessing ability to remember words read

An association advancement mediation is an arrangement of exercises, activities, and occasions proposed to enable an association to improve its presentation and adequacy. Mediation structure, or activity arranging, gets from cautious conclusion and is intended to determine explicit issues and to improve specific zones of authoritative working recognized in the determination. OD intercessions change from normalized programs that have been created and utilized in numerous associations to moderately exceptional projects custom fitted to a particular association or office. What are powerful intercessions? The term intercession alludes to a lot of sequenced arranged activities or occasions expected to enable an association to expand its viability. Intercessions intentionally upset business as usual; they are conscious endeavors to change an association or subunit toward an alternate and progressively powerful state. In OD, three significant models characterize a viable intercession: (1) the degree to which it fits the requirements of the association; (2) how much it depends on causal information on planned results; and (3) the degree to which it moves change-the board fitness to association individuals. The primary rule concerns the degree to which the mediation is pertinent to the association and its individuals. Successful mediations depend on substantial data about the organization’s working; they give association individuals chances to settle on free and educated decisions; and they gain members’ inner duty to those decisions. Substantial data is the consequence of a precise determination of the organization’s working. It must reflect decently what association individuals see and feel about their essential concerns and issues. Free and educated decision proposes that individuals are effectively engaged with settling on choices about the progressions that will influence them. It implies that they can decide not to take an interest and that intercessions won't be forced on them. Inside duty implies that association individuals acknowledge responsibility for intercession and assume liability for executing it. In the event that intercessions are to bring about important changes, the board, staff, and other significant individuals must be focused on completing them. The second measure of a compelling mediation includes information on results. Since intercessions are planned to deliver explicit outcomes, they should be founded on substantial information that those results really can be created. In any case there is no logical reason for structuring a compelling OD intercession. Lamentably, and rather than other applied teaches, for example, medication and building, information on mediation impacts is in a simple phase of advancement in OD. A significant part of the assessment look into needs adequate meticulousness to make solid causal deductions about the achievement or disappointment of progress programs. Additionally, barely any endeavors have been made to inspect the similar impacts of various OD strategies. These variables make it hard to tell whether one strategy is more viable than another. In spite of these issues, more endeavors are being made to survey deliberately the qualities and shortcomings of OD mediations and to think about the effect of various methods on association viability. The third model of a viable intercession includes the degree to which it upgrades the organization’s ability to oversee change. The qualities basic OD recommend that association individuals ought to be better ready to do arranged change exercises on their own after an intercession. They should pick up information and ability in overseeing change from dynamic support in planning and actualizing the intercession. Capability in change the executives is basic in today’s condition, where innovative, social, monetary, parched political changes are fast and tireless. Instructions to plan successful mediations: Designing OD intercessions requires giving cautious consideration to the necessities and elements of the change circumstance and creating a change program that will be reliable with the recently depicted rules of viable intercessions. Current information on OD intercessions gives just broad remedies to change. There is sparse exact data or research about how to structure intercessions or how they can be required to cooperate with authoritative conditions to accomplish explicit outcomes. In addition, in light of the fact that the capacity to execute most OD intercessions is exceptionally reliant on the aptitudes and information on the change operator, the structure of a mediation will depend somewhat on the skill of the specialist. Two significant arrangements of possibilities that can influence intercession achievement have been talked about in the OD writing: those having to do with the change circumstance (counting the specialist) and those identified with the objective of progress. The two sorts of possibilities should be considered in planning mediations. Possibilities Related to the Change Situation: Specialists have recognized various possibilities present in the change circumstance that can influence intercession achievement. These incorporate individual contrasts among association individuals (for instance, requirements for self-rule), hierarchical components (for instance, the board style and specialized vulnerability), and measurements of the change procedure itself (for instance, level of top-administration support). Except if these variables are considered in structuring an intercession, it will have little effect on authoritative working or, more regrettable, it might create negative outcomes. For instance, to determine persuasive issues among hands on laborers in a petroleum processing plant it is critical to know whether intercessions planned to improve inspiration (for instance, work enhancement) will prevail with the sorts of individuals who work there. Much of the time, information on these possibilities brings about altering or modifying the change program to fit the setting. In applying a prize framework mediation to an association, the progressions may must be adjusted relying upon whether the firm needs to fortify individual or group execution. In spite of the fact that information on possibilities is still at a simple phase of improvement in OD, specialists have found a few situational factors that can influence mediation achievement. Increasingly conventional possibilities that apply to all OD intercessions are introduced beneath. They incorporate the accompanying situational factors that must be considered in planning any mediation: the organization’s availability for change, its change capacity, its social setting, and the change agent’s aptitudes and capacities. Availability for Change: Intercession achievement relies intensely upon the association being prepared for arranged change. Pointers of preparation for change incorporate affectability to pressures for change, disappointment with the norm, accessibility of assets to help change, and duty of noteworthy administration time. At the point when such conditions are available, mediations can be intended to address the hierarchical issues revealed during analysis. At the point when availability for change is low, be that as it may, mediations need to concentrate first on expanding the organization’s readiness to change. Capacity to Change: Overseeing arranged change requires specific information and aptitudes, including the capacity to rouse change, to lead change, to create political help, to deal with the progress, and to support force. On the off chance that association individuals don't have these capacities, at that point a fundamental preparing mediation might be required before individuals can connect genuinely in intercession structure. Social Context: The national culture inside which the association is implanted can apply an incredible impact on members’ responses to change, so mediation configuration must record for the social qualities and suppositions held by association individuals. Mediations may must be altered to fit the nearby culture, especially when OD rehearses created in one culture are applied to associations in another culture. For instance, a group building mediation intended for top supervisors at an American firm may should be altered when applied to the company’s remote auxiliaries. Abilities of the Change Agent: Many disappointments in OD result when change specialists apply intercessions past their skill. In structuring intercessions, OD professionals ought to survey their experience and mastery against the necessities expected to execute the mediation adequately. At the point when a jumble is found, professionals can investigate whether the intercession can be altered to accommodate their abilities better, regardless of whether another mediation progressively fit to their aptitudes can fulfill the organization’s needs, or whether they should enroll the help of another change specialist who can control the procedure all the more successfully. The moral rules under which OD specialists work requires total honesty of the relevance of their insight and ability to the customer circumstance. Specialists are required to mediate inside their capacities or to prescribe somebody progressively fit to the client’s needs. Possibilities Related to the Target of Change: OD mediations look to change explicit highlights or parts of associations. These objectives of progress are the principle focal point of intercessions, and analysts have distinguished two key possibilities identified with change focuses on that can influence mediation achievement: the authoritative issues that the mediation is planned to determine and the degree of hierarchical framework at which the mediation is required to have an essential effect. Authoritative Issues: Organizations need to deliver certain issues to work successfully. Figure 9. 1 records these issues alongside the OD mediations that are planned to determine them. It shows the accompanying four interrelated issues that are key focuses of OD intercessions: 1. Vital issues. Associations ne

Thursday, June 4, 2020

Purchase Car in the United Kingdom Research Paper

Purchase Car in the United Kingdom Research Paper This research paper is the outline of the possible research strategy on the purchase analysis for a car in the United Kingdom. This paper will share the research example that drove the customer to the decision to change the purchase of the car to the motorbike. The purchase is intended to serve the needs of the delivery company. There are a number of specific requirements and aspects of sales-customer relationships that should be taken into account, when considering purchasing a car. It is important, however, to determine the objectives and set the limitations. For the purpose of this paper we have set the following criteria: Price ceiling is 2000 pounds. Age of the care should not exceed ten years. Mileage should be up to 130,000 miles. With the set basic criteria, the next logical step would be to make a research on the second hand market. After careful analysis, we have selected five top sales points that meet our criteria. The critical requirement for the overall process is to fit the purchase in the budget of 3600 pounds. In order to make preliminary analysis of the budget against objectives, we have to consider the following elements: MOT price. Tax on the car per year. Insurance costs. When adding the above criteria into the budget assumption, we found it not possible to fit this purchase in the allocated budget due to extremely high insurance price for this type of the car and the region of residence. After careful consideration of the business needs, it was decided to compare this purchase proposition and return on investment with an option of purchasing a motor bike. As a result of this survey, the company has purchased motorbike that allowed them to fit in the allocated budget and meet the requirements of the delivery company.

Sunday, May 17, 2020

A Report On Tick Tock - 1177 Words

Tick-Tock 1 Every day brings a new surprise and this day sure brought a good one. The thing that I dealt 1with that day was something I never would imagine happening to me or anyone in a million years. I 2 was home with just my two brothers. It was an ordinary summer afternoon. The wind blowing, the 3birds tweeting. Not a problem in sight. Until I took a short nap and rose a few hours later. My eyes 4quickly opened to a vexatious sound. A continues ticking which messed with my head. Tick-tock 5tick-tock over and over again. I took a deep breath and calmed down for a second. Then, the 6monstrous noise hit me again. I couldn’t take it anymore. I got up off of the bed and intensely ran into 7my brother s room. 8 â€Å" Wade, Wade do you hear†¦show more content†¦29â€Å" KATIE!!!† Wade screeched. 30Ignoring Wade once again, I hustled down the stairs. I expeditiously left my house, slamming 31the door behind me. Out in my dad’s garage, I grabbed a hammer and then dumped the bag of 32watches out on the floor. I deathly gripped the hammer and smashed each watch one by one. After I 33had finished, I piled the watch scraps back in the bag and grabbed a shovel. I ran to the side of the 34house and dug a small hole where I buried each and every watch. After I was done, I returned my 35items and went back inside and I swear that the ticking went away for a few minutes, but the 36moments of glory didn’t last long. Suddenly, the deplorable sound started again. I cringed. I took a 37deep breath and thought for a second. Then, something in my kitchen caught my eye. A clock. 38How could I not know that a clock in the house was making the noise! Relief struck me like 39lightning, powerfully and quickly. I skedaddled and grabbed the clock I had originally spotted. After, 40I collected the few other clocks that hung in my house. Once more, I flew out the door to get the 41hammer. Just like before, I smashed each clock to its death. Just like you do to people, I buried the 42clocks right by the watches I earlier put in the ground. When I walked back, I had high- hopes that 43the ticking would be gone, but this time it didn’t even go away for a second! Right when I walked in 44the door tick-tock flew into myShow MoreRelatedAdvanced Micro Devices Inc: Business Analysis and Recommendations1741 Words   |  7 Pageshave taken place since the revenue dropped. Advanced Micro Devices Inc announced that for fourth quarter of 2012, it expects revenue to decrease 9%, plus or minus 4%, sequentially. According to I/B/E/S Estimates, analysts are expecting the Company to report revenue of $2.4 billion for fourth quarter of 2012 (Advanced Micro Devices Inc Comments On Q4 2012 Revenue Guidance, 2012). Furthermore, there has been two rounds of lay offs this year t o cut down on operating expenses. This second round of lays offRead MoreTorture: Why It Should Stop800 Words   |  4 Pagesinformation, enemy resistance and utter uselessness. Tortured prisoners give false information. One writer writes â€Å"Many survivors of torture report that they would have said anything to make the torture stop.† (Mayer, 2005; McCoy, 2006) Another says that â€Å"We had people who were willing to confess to anything if we would just stop† (Andersen). The NY times reports that in 2002, A Syrian born Canadian named Maher Arar was stopped in an airport and was interrogated. He was later sent to a prison whereRead MoreCitizen 2000: Helping Out the Community952 Words   |  4 Pagesinsight into the world on modern day policing. He knew that some of the rules were meant to be bent or even broken for the sake of getting his job done properly. Never the less, his gut feeling told him it wouldn’t help him at the annual review. â€Å"Tick-tock, buddy,† said Micky. â€Å"Fine let’s just go. But if we end up on suspension for this I’ll never talk to you again.† â€Å"Ha-ha, you got it, man.† The car sped out of the car park and back through the small winding streets and finally out onto the carriagewayRead MorePersonal Narrative Reflection Paper1526 Words   |  7 Pageshere. My mother was in the courtroom along with my dad arguing: who deserved guardianship and how much child support should be paid.(Citations) I contorted myself in a chair and waited for what seemed like an eternity for the judge to summon me. â€Å"Tick Tock† overtook the room due to the clock. I did not realize how long I had been sitting there, and I was soon in the courtroom. I timidly entered into the wood-filled room, and I spotted my dad’s first cousin, Court Poore, and looked around for anotherRead MoreInfluential Factors of International Business and International Business Environment4145 Words   |  17 PagesConditions on Business Environment let us take the following example. The report in Business Population Monitor  from chartered accounting and business advisory firm PKF, in conjunction with Access Economics examines the impact of demographic changes on the Australian business landscape, detailing the anticipated winners and losers across industry types and geographical regions. The Beneficiaries of ‘Grey Gold’ The report highlights the prognosis that Australia’s working-age population is expectedRead MorePros And Cons And Pros1825 Words   |  8 Pagesis as small as a rice grain and may come in other forms such as, a ring or other type of jewelry if you do not want the chip to be implanted inside your body. (Maggie Astor, Microchip Implants for Employees? One Company Says Yes) †¢There are no reports of the chip causing harm in the human body, however, only the employees of the company have been chipped. (Maggie Astor, Microchip Implants for Employees? One Company Says Yes) †¢There is no need to carry around your credit card or other informationRead MoreLeadership Qualities Of The Great Leaders Of Our Time1833 Words   |  8 Pagesin the morning anxiously awaiting for the day to begin, along with the other 80 or so of us trying desperately to get some sleep before our first full day. The anticipation was as thick as a morning fog rolling in on the eastern seaboard. Every tick-tock of the wall mounted clock could be heard over the thunderous snoring from a dude at the other end of the compartment. I had no idea what to expect or what was expected of me over the next eight weeks. Somewhere in the middle of This was my choiceRead MoreCase Study2264 Words   |  10 Pagesexamined it closer. Yes, Sir. What does the first line say? Boffins hand shook as he held the paper. Ive read your last school report,’ said Doctor Pax, as he opened the folder on his desk. ‘Yet, I see you excelled in all subjects apart from one. Boffin gulped. Care to tell me which subject that was? Boffin bent forward to study the floor. Shall I read this report? You received top marks for maths, Gloriana, and all the sciences. Oh yes, here it is†¦foreign languages E. You failed. Despite excellentRead MoreGlobal Business Management: Current Trends and Practices5739 Words   |  23 Pagesproviding services in the anticipated operating environment. TRENDS IN CONTRACTUAL ISSUES Organizations are generally concerned with contractual issues such as scope of service, performance standards, security and confidentiality, controls/audits/reports, sub-contracting, dispute resolution, and indemnification. The level of detail and importance of contract provisions varies with the scope and risks of the services outsourced. Contracts describe the rights and responsibilities of parties. SpecialRead MoreBank of Queensland Research Paper Banking Industry21330 Words   |  86 Pagesthe Annua Report 2011, loan 0. al 2 ns and a advances a amortiz costs c at zed comprised 83.4%. A high pro d oportion o the said loans an of d nd advan nces at am mortized c costs comp mprised res sidential securitiz proper loans secured b zed rty by mortg gages ($m 24,177 ) f followed b commer by rcial loans ($m 4,986) as detai in the notes to th iled he finan ncials of the 2011 an e nnual repor (2011 An rt nural report, page 75 5). tated in th Chairm he manâ₠¬â„¢s report (BOQ Annual Report, 201 and

Wednesday, May 6, 2020

A Norm Is A Rule Of Behavior Of Individuals In Society

A norm is a rule of behavior of individuals in society or groups, Emile Durkheim sociological founder considered norms to be social factors that exist in individual’s society of independence that creates the shapes of our behaviors and thoughts (Crossman, 2017). In the terms of not having sociality without social control the society would have no function without enforcing social orders that make daily life and the complex division of labor possible (Crossman, 2017). Social order is produced by ongoing life longs process of socialization that individual experience. Through the process of stages of growing up when we are taught the norms, behavioral rules and appropriate interaction that is common to our families. The process of how†¦show more content†¦Emile Durkheim developed the first mod ern strain theory of crime and deviance, but Merton’s classical strain of theory came to dominant criminology during the middle part of the 20th century (â€Å"Strain t heories - criminology - Oxford bibliographies - obo,† 2017). Classic strain theory focuses on the type of strain involving inability to achieve success or focused on a broader goal of the middle-class status (â€Å"Strain theories - criminology - Oxford bibliographies - obo,† 2017). Robert Agnew developer of general strain theory in 1992, becoming the most leading version of strain theory and major theories of crime (â€Å"Strain theories - criminology - Oxford bibliographies - obo,† 2017). General strain theory focuses on a wide range of strains including the inability to achieve a variety of goals, loss of balanced passions ad negative treatment by others (â€Å"Strain theories - criminology - Oxford bibliographies - obo,† 2017). General strain theory deviates the explanation of race, gender, ethnic, age, communities and society differences in crime rates (â€Å"Strain theories - criminology - Oxford bibliographies - obo,† 2017). People that gravitate to general strain theory are more likely to relieve less support that increases the crime of rate. Differential association theory wasShow MoreRelatedThe Concept of Sociological Perspective of Deviance Essays1127 Words   |  5 Pagesof Deviance also known as â€Å"rule-breaking† behavior or â€Å"counter culture† can be defined as culture norms, values, and morals which shape the social acceptance of individuals or group through their actions or â€Å"unmoral or illegal† behavior. In order to gain a better understanding of Sociological Perspective of Deviance it is important to understand the broad consensus of behavior and its place in society. Situational deviance pertains to a group who engages in behavior that is considered â€Å"non- defiantRead MoreWhy do people comply to social rules and expectation.1570 Words   |  7 PagesWhy Do People Comply With Social Rules and Expectation? Rules are statement on what can, should or must be done in particular circumstances. They govern our daily life whether we are aware of them or not. Rules are divided into two, direct rules(written formal rules) such as laws regarding manslaughter or incest and indirect rules(unwritten informal rules) such as norms, values and traditions of a particular society. Social expectation serves as a powerful tool to reinforce common beliefs and hopesRead MoreEmile Durkheim s Theory Of Anomie1144 Words   |  5 Pagestypes of norms in societies that cause crime. He explains that social norms are an agreement of some people who live in that geographical location. Conservative societies incline to have less population and be more oppressive. If certain behavior goes against social norms, then severe punishment can ensure to reject the behavior. In opposite case more advanced societies allow more facilities for different behavior and accepts changes. Behavior against the norm is tolerated in a dvance societies. DurkheimRead More Deviant Behavior Essay1653 Words   |  7 PagesDeviant Behavior Deviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivationRead MoreSocial Control Theory Essay1247 Words   |  5 Pagesin crime and deviant behavior. Unlike theories that seek to explain why people engage in deviant behavior, social control theories approach deviancy from a different direction, questioning why people refrain from violating established norms, rules, and moralities. The theory seeks to explain how the normative systems of rules and obligations in a given society serve to maintain a strong sense of social cohesion, order and conformity to widely accepted and established norms. Central to this theoryRead MoreSocial Deviance Is Based On The Violation Of Social Norms1721 Words   |  7 Pagesis to examine the concept of social deviance, which is based on the violation of social norms. Depict the social construction based o Becker and The moral entrepreneur such as rule creator and ruler enforcers. To the extend of why rules are created, based on the evolving of the society based on social panic. How society are being brainwashed by the news to place pressure on higher authority in put some rules about. Social panics according to Cohen and the seven stages of a moral panic. FurthermoreRead MoreThe Purpose Of Paper Is To Is Examine The Concept Of Social1722 Words   |  7 Pagesto is examine the concept of social deviance, which is based on the violation of social norms. Depict the social construction based o Becker and The moral entrepreneur such as rule creator and ruler enforcers. To the extend of why rules are created, b ased on the evolving of the society based on social panic. How society are being brainwashed by the news to place pressure on higher authority in put some rules about. Social panic according to Cohen and the seven stages of a moral panic. FurthermoreRead MoreGang Affiliation and Social Factors Underlying their Deviant Behavior1460 Words   |  6 PagesWe have discussed gang affiliation and the social factors underlying their deviant behavior, however, the motives for why people engage in this deviant behavior have different sociological theoretical explanations. I will use the following theories to interpret and analyze this cause of deviance. Functionalist theory/perspective The Functionalist theory through the studies of Durkheim, states that society is comprised of a greater network of parts that contributes to its stability. The functionalistRead MoreDeviant Behavior Essay1674 Words   |  7 PagesDeviant behavior refers to behavior that does not conform to norms, does not meet the expectations of a group of a society as a whole. After birth, children begin to experience situations with others. They are taught what he or she should and should not do, what is good or bad and what is right or wrong. Learning habits that conform to the customs and traditions of the groups into which the child is born develops a system of values. These values provide justification and motivation or for wantingRead MoreA Norm Is A Standard Behavior That Is Expected From A Group1130 Words   |  5 Pages A norm is a standard behavior that is expected from a group of individuals. People must live by the expectations that their culture has set for them. Culture s eems to have a major influence on people’s cognition. Ethan Watters believes that culture influences people. In â€Å"Being Weird†, Watters explores anthropologist Joe Henrich’s research on how culture shapes the world around us. Julia Serano also talks about culture in her essay â€Å"Why Nice Guys Finish Last†. Serano addresses how sexuality

Tuesday, May 5, 2020

Understand The Use Of ICT Samples †MyAssignmenthelp.com

Question: Discuss about the Understand The Use Of ICT. Answer: Introduction The purpose of the report is to understand the use of ICT in the business scenario. In the modern day, every business organisation needs to use technology in order to enhance itself and make the product available to the customers. This can help the organisations to gain a competitive advantage in the market (McDermid, 2015, p.45). The report focuses on the application of ICT on a specific organisation. The company in question is a 5-year-old software organisation based in Melbourne. The organisation develops an in-house application and has its market spread across the small and medium sized industries in the country. However, there is limited scope for development for the organisation hence; the option of developing internet security is a top priority. One of the strategies developed by the company is the expansion of business to have an online presence. The executive managers of the organisation are concerned with the type of business that goes on in the market. The potential client for the organisation could be pharmaceutical and hospitality industries. The concern is more on the economic factors rather than the social-economic and environmental factors. The report analyses the ways by which such an organisation can protect itself from the risk of internet security. The application of modern internet security is described in the report. The objective of the report is to investigate the ways by which ICT can be used in order to gain a competitive advantage in business. The organisation is a software company and as a result, it is important for every member to develop acute knowledge about the application of ICT and its uses in the modern world. The uses of the application in order to expand the organisation in the global market are also stated in the report. Furthermore, the report also provides recommendations based on the ways by which the use of ICT can be improved by the organisation. Concept of information and network security Network security is referred to as the actions undertaken by an organisation to prevent any security threats in the software or computers. In the modern world, there have been several instances of breached security services. This occurs due to poor anti-virus and improper monitoring of the software and computer systems. The information and network threat usually occurs during the time of data transfer. According to Bannister Connolly, (2014, p.119), the data transfer can be in the form of both physical as well as electronic. In most cases, data transferred via electronic media is prone to security threats. Network security usually comprises of policies and practises that prevent the threat of unauthorized access to the computer system. The accessibility is monitored and the ways by which these threats can be prevented or mitigated are accessed by the professionals in-charge of the online security system. Markus Mentzer, (2014, p.353) stated that network security is mainly used for the authentication of data. It is a one-factor authentication, as it requires a sole variable for the authentication of data. After the authentication, the data is encrypted with a firewall that prevents the entrance of any threats in the system (Stallings Tahiliani, 2014, p.90). In the light of this statement, it can be said that the firewall needs to be strong and need to have the potential to prevent a threat of the software. Without a proper firewall, the threat of security can be immense. In the modern days, the use of anti-virus software can prevent a threat of attacks. Another immensely important factor that needs to be done is the update of the software. Stahl et al., (2013, p.435) stated that the backdated software is prone to threats from the viruses and hackers. With the quick update of technology in the modern world, it is necessary that the software remain updated to prevent the entry of viruses. In this regard, it can be said that several applications are developed th at prevent the threat of security in the software. Recent technologies used in information and network security In the modern day, the threat of virus and hackers has been a major concern for industries. This is because lots of valuable information is taken away from the organisations that can pose a huge opportunity for the competitors. Not only business, the threat also engulfs the military database that may threaten a country. Hence, Stahl et al., (2016, p.55) stated that technologies need to be developed that can help in the protection of threats in the organisation. Some of the most recent technologies that are used in the security of information and prevention of security are provided. Symantec Advanced Threat Protection Symantec Advanced Threat Protection (SATP) is used for the purpose of uncovering, prioritising, investigating and providing remedial measures to advanced threats that occur in an organisation. This can be done under a single window and can provide resistance to the threat of any security (Chen Zhang, 2014, p.314). The technology also involves cloud-based sandbox and detonation services in order to provide services related to cross point control. The visibility allows customers to check into any security threats and make rectifications based on the threat. ProtectWise Cloud Network DVR According to Hall, (2014, p.21), the ProtectWise Cloud Network offers visualisation, detection and responses to network security events. This includes advanced persistent threats, data filtration and so on. The software detects attacks automatically and prevents the spread of the attack. The advantage of this technology is that it can detect an attack on any device such as computers or mobile phones. It does not have any limit about the window of retention for a network. Fireglass Threat Isolation Platform Firewall is one of the pioneers of isolation technology. This software can be used to fend off malware and phishing threats from the computer. Al-Saggaf et al., (2015, p.235) stated that this software creates a gap between the attacks developed from the web and the applications. Any threat from the web is blocked instantly in order to prevent threats of attack. This provides security for the computers as well as other devices that detect possible threats. Application of these technologies in the organisation Based on the use of this software it can be said that the application of these can help in the improvement of any organisation. In the case of the organisation mentioned in the case study, the use of the software can help it to attain its objective of diversifying the business. The reason for the inability to perform this task was due to the lack of resources to manage the websites and client database. In order to perform this task in an efficient manner, the use of the modern technologies and software related to prevention of web-based threats can be utilised in order to carry the company in a global context (Bull, 2015, p.19). For example, the use of Advanced Threat Protection developed by Symantec is software that can identify complex attacks to the system. This can be used in order to detect any virus or hackers that may use complex software to steal information. According to Ming et al., (2015, p.360), this system can be used worldwide in an effort to curb the increase and sprea d of hackers and viruses through various means of malware. On the other hand, technology such as ProtectWise Cloud can be used to detect threats from any devices. In the modern world, this can prove to be a huge advantage for an organisation, as most people tend to use the internet from various devices apart from the computer. Organisations seeking a long-term future in the software industry can utilise this software, as it has a bright future in the software industry. Chou, (2013, p.79) observed that the use of fire glass can also be effective for business. This is because the spread of malware in corporate business settings is blocked by the use of fire glass. Fire glass isolates the threats and mitigates it without the knowledge of the organisation or the system. This creates an advantage as system clean up is not always necessary for the organisations. In the global context, this software can help in the development of a secured web service throughout the world. Advantages and risks of the technologies Pieprzyk et al., (2013, p.343) stated that the technologies used have certain advantages that may be useful for organisations. These advantages provide opportunities to explore the technologies and implement it for better use in the future. However, Hsiao et al., (2014, p.67) stated that certain risks are also involved that may threaten the use of these technologies. The advantages and the risks that the technologies provide can be listed individually. Symantec Advanced Threat Protection The advanced threat protection developed by Symantec provides for the automatic detection of threats in a system. The system prioritises the critical events that may threaten the software and system. Apart from this, even if the system is infected then the technology can provide remedies within a few minutes (Vasilakos et al. 2015, p.10). These advantages provide organisations with proper support and prevention techniques that help to eliminate any threats of a virus. However, the risks that are involved because of this include the use of updated software (Carroll, 2014, p.90). An organisation adopting the use of this software needs to ensure that the system in which they are installing the technology is updated and have the potential to install the software. The high maintenance of the software makes it a risk factor for the organisations implementing the use of the technology. The application of this technique in the organisation provided in the case study can help in the protectio n of the system. The automatic detection of threats is a huge advantage for the organisation as it lacks the required employees to handle the technology. The risk factor needs to be considered in order to ensure that the software can be installed in the system (Perlman et al., 2016, p.56). ProtectWise Cloud Network DVR The advantage that ProtectWise can provide is the flexibility of the coverage of the threats. According to Jouini et al., (2014, p.489), the threat of attacks come from various sources. These sources need to be identified and eliminated in such a manner so that it can help in mitigating the threats of the viruses and hackers. ProtectWise helps in maintaining the flexibility regarding covering large areas in the system. The data that is passed by the use of this technology remains encrypted (Kahate, 2013, p.67). This provides additional security of data in the end. The managing of customers is also done with the help of this software. However, as stated by Hau, (2013, p.99), the challenges to this system are also intense. The use of sophisticated malware can catch the software off-guard. The sudden attack on the cloud-computing model can make it difficult for ProtectWise to make recommendations using suitable solutions. This important factor needs to be considered by the case study or ganisation before implementing its technique. The reason for the failure to detect immediate threat is the vast expansion of range in the domain that makes it difficult to anticipate the threat from the correct sources. Fireglass Threat Isolation Platform The advantage provided by fire glass threat is the fact that the software blocks malware threats from reaching the systems. The uniqueness by which the technology deals with the handling of malware can help it to ensure that the software can be used to detect any threats from viruses. Pathan, (2016, p.89) stated that another advantage that the fire glass is that it increases the productivity of an organisation. This is because employees can maintain their focus on the job that they are doing rather than worrying about the security threat. However, the risk factor that remains is the fact that the fire glass blocks the use of any website that is deemed to be dangerous (Bhargava et al., 2013, p.12). In this regard, any helpful information may not be accessed easily due to issue in accessibility. Hence, the use of this technology in the system needs to be done strategically. In the case of the given organisation, the use of fire glass can help in maintaining the total security of inform ation without having to access online portals. Conclusion Thus, it can be concluded that in order to maintain proper cyber security at the workplace it is necessary that every organisation adopt certain technologies that can help in maintaining proper security in the workplace. The purpose of the report was to analyse the security threats that exist in an organisation and as a result, certain issues were addressed. The issues addressed in this context include the security threats that are posted by the hackers and viruses. This can cause problems in an organisation as secret documents can be seized. These technologies need to be verified and tested before its application in the organisational context. Every organisation needs to verify the advantages and risks that are involved in the use of these technologies. This provides an opportunity to analyse the security software before implementing it in a final context. The significance of the findings is to keep people aware of the possible threats that can be suffered if proper anti-virus is no t used. The objective of the report has been achieved by identifying the technologies that can help in mitigating the security threats. These technologies are built keeping in mind the amount of threat that exists in the modern world. The use of these technologies can help in the identification of immediate dangers and prevent the loss of any important documents. The advantages and risks involved in these techniques have identified that need to be managed by the organisations implementing it. In this regard, the organisation in the case study has been taken as the primary example. The application of these in an organisational context is analysed. The report also provides a future scope of study for the topic. Researchers can also identify the use of these technologies in a reputed organisation. Recommendation After analysing the situation of the organisation and identifying the advantages and risks of the technologies, recommendations can be made that can help in the improvement of the organisation. Some of the recommendations include the authentic use of anti-virus system. The anti-virus used by the organisation need to be authentic so that it can detect the threats at any time. This can help in keeping out any possibilities of a virus as viruses normally occur in a system that uses backdated anti-virus technology. Apart from another recommendation, include the constant update of software. In order to use the modern technologies effectively, the organisation needs to maintain software that supports the working of the technologies. A third recommendation includes the recruitment of trained IT personnel. This is required in order to manage the technologies effectively and ensure that trained personnel manage to implement the technologies and identify threats that may occur. A fourth recomm endation includes the application of any one of the technologies. The application of these technologies can help in preventing any virus attack or threat in the systems. The risk factors need to be mitigated strategically in order to ensure a smooth flow of work activity. References Al-Saggaf, Y., Burmeister, O., Weckert, J. (2015). Reasons behind unethical behaviour in the Australian ICT workplace: An empirical investigation.Journal of Information, Communication and Ethics in Society,13(3/4), 235-255. Bannister, F., Connolly, R. (2014). ICT, public values and transformative government: A framework and programme for research.Government Information Quarterly,31(1), 119-128. Bhargava, V. K., Poor, H. V., Tarokh, V., Yoon, S. (Eds.). (2013).Communications, information and network security(Vol. 712). Springer Science Business Media. Bull, R. (2015). ICT as an enabler for sustainable development: reflections on opportunities and barriers.Journal of Information, Communication and Ethics in Society,13(1), 19-23. Carroll, J. M. (2014).Computer security. Butterworth-Heinemann. Chen, C. P., Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data.Information Sciences,275, 314-347. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Hall, B. R. (2014). A synthesized definition of computer ethics.ACM SIGCAS Computers and Society,44(3), 21-35. Hau, E. (2013).Wind turbines: fundamentals, technologies, application, economics. Springer Science Business Media. Hsiao, D. K., Kerr, D. S., Madnick, S. E. (2014).Computer security. Academic Press. Jouini, M., Rabai, L. B. A., Aissa, A. B. (2014). Classification of security threats in information systems.Procedia Computer Science,32, 489-496. Kahate, A. (2013).Cryptography and network security. Tata McGraw-Hill Education. Markus, M. L., Mentzer, K. (2014). Foresight for a responsible future with ICT.Information Systems Frontiers,16(3), 353-368. McDermid, D. (2015).Ethics in ICT: an Australian perspective. Pearson Higher Education AU. Ming, T. M., Jabar, M. A., Sidi, F., Wei, K. T. (2015). A systematic literature review of computer ethics issues.Journal of Theoretical and Applied Information Technology,78(3), 360. Pathan, A. S. K. (Ed.). (2016).Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC press. Perlman, R., Kaufman, C., Speciner, M. (2016).Network security: private communication in a public world. Pearson Education Pieprzyk, J., Hardjono, T., Seberry, J. (2013).Fundamentals of computer security. Springer Science Business Media. Stahl, B. C., Flick, C., Hall, R. (2013). Evaluating research quality in technology ethics.The possibilities of ethical ICT, 435. Stahl, B. C., Timmermans, J., Mittelstadt, B. D. (2016). The ethics of computing: A survey of the computing-oriented literature.ACM Computing Surveys (CSUR),48(4), 55. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson. Vasilakos, A. V., Li, Z., Simon, G., You, W. (2015). Information centric network: Research challenges and opportunities.Journal of Network and Computer Applications,52, 1-10.

Sunday, April 19, 2020

Managing Change at Byfield Business College

Problem identification In the case study, the main problem is based on the challenges and inabilities to predict the outcomes of change management that is considered to be a crucial component of any organizational development process. Not every member of a working team is ready for particular changes, and to comprehend the problems associated with managing change and offer reliable alternatives for an organization, it is necessary to overview some literary sources, consider the specific issues, and rely on personal ideas and suggestions.Advertising We will write a custom case study sample on Managing Change at Byfield Business College specifically for you for only $16.05 $11/page Learn More Analysis Change management is not a simple issue that leads to certain problems within a company. It is a complicated process, a combination of steps that result in a sequence of outcomes that change the way of how an organization and the people within it can and have to work. Reiss (2012) introduces this process as a combination of such â€Å"far-reaching, significant and sometimes dramatic transitions† as â€Å"dynamics, turbulence, transformation, or discontinuity† (p. 1). The process of change management described in the case study about the work of the Byfield Business College shows how unpredictable and hard-to-control any kind of change may be in case it does not correspond or even contradicts the well-accepted management theories.  In fact, there are three main theorists, whose models are usually discussed when the theory of change is mentioned. These are (1) the John Kotter’s theory that consists of eight main steps according to which communication, focus, and empowerment have to be combined; (2) the Lewin’s three-stage model according to which a change is compared with an ice block; and (3) the Change Curve within the frames of which Kubler-Ross focuses on employees’ personal transitions, reactions, and possible outcomes of the implementation (Bourda 2013). Each of these theories is a powerful contribution to change management and a true understanding of this concept. If a person or a group of people, who implements a change within an organization, fails to meet all issues of one of the theories, the success of the change will be hard to predict. Considering these three theories, the case of the Byfield Business College team will be analyzed. Being appointed as a new director of the college, George Boon is not satisfied with the methods used by Jane Hacking, an experienced head of central records, and comes to the conclusion to change the whole system of work as soon as he finds out that the office â€Å"had been handling a workload almost 20 per cent beyond its theoretical maximum for the past six months† (Corbett 1994, p. 93) after Robert Mangers from the operations research department analyzed the situation. Mr. Boon involves two more persons to work out the details of a new system on the basis of which loyalty and ownership could be the main concepts. Unfortunately, the results of the change turn out to be not as successful as they are expected.  On the basis of the Kotter’s model, the change of the office work has to pass through eight main steps. In Bourda’s (2013) analysis, based on the Kotter’s model, it is necessary to:Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Underline the urgency of the change (in the case, it is based on a new director’s inability to understand and accept the already working system); Create a guiding coalition (in the case, there are only four people (none of the office team) generally involved in the change management); Develop a change vision (in the case, no strategies are offered, just the order of the director); Discuss the vision (in the case, no one from the office is aware abo ut the possibility of change); Implement the ideas (in the case, the ideas and changes are simply imposed by the leader); Generate the benefits (in the case, it is hard to find a person, who can benefit from the change except the director, who gains a kind of control over the office’s work); Continue working with the change (in the case, employees are not promoted or developed, they are just faced with the necessity to follow a new order); Incorporate the change with the culture of an organization (in the case, the Jane’s team does not get a chance to introduce its own culture). In general, almost each step of the model is present in the case, still, not all of them are implemented the way Kotter offered it to be. This is why it is wrong and even useless to believe that the change of the Byfield Business College central record office leads to success and benefits. The Lewin’s theory of change talks about the importance to unfreeze (prepare the office for the ch ange, consider the beliefs and demands, and provide clear explanations), change (implement changes involving each member of the team), and refreeze (evaluate the shortages and benefits of the change in regards to different aspects of the office work) the idea (Paton McCalman 2008). The mistake made by Boon is the inability to inform all members of the record office about the necessity to change or, at least, improve the conditions under which the work is organized. He does not provide the team with clear explanations of why something should be changed. What he does is he defines the problem for himself and makes the team accept it. The point is that all changes are accepted within a short period of time by each employee.  But this acceptance is based on the professionalism of the team but not on their desire or enthusiasm (that is lately explained by the head of the office).  Even the Change Curve that is characterized by the obligation to accept the change cannot be properly i dentified in the case (Cummings Worley 2014). Kubler-Ross’ model consists of four main stages: status quo (when people are introduced to a change), disruption (when people understand the real challenges and necessities), exploration (when people have to accept the change turning their pessimistic behavior into optimistic ones), and rebuilding (when people embrace the changes and try to rebuild their working conditions accordingly) (Huczynski Buchanan 2013). According to this model, the team from the case just omits several stages and faces the last one, when they have to rebuild everything according to new rules. As a result, the emotions inherent to the previous stages are combined and can be shown with time. Anyway, all these three theories offered by different people at different periods of time prove one thing – the change offered by Boon does take place. Still, the consequences of this change cannot be properly identified and supported by all members of the team that has to accept the changes.Advertising We will write a custom case study sample on Managing Change at Byfield Business College specifically for you for only $16.05 $11/page Learn More The positive effects cannot be observed. To help the record office and the college in general overcome the challenges of the change, it is necessary to think about some alternatives taking into consideration the fact that the change has been already implemented and certain emotions do take place. Alternatives In fact, it is wrong and inappropriate to do nothing in regards to the situation described in the case study. The situation at the Byfield Business College and in the record office in particular can be changed and improved if a number of actions are taken. The following alternatives can be offered: Consider employees’ opinions. It is possible to resolve the case study problems by paying more attention to the employees as the integral part of the college, whose opinions cannot be neglected. Questionnaires and personal meetings may be applied to understand how the director can pay more attention to the needs of the employees within the frames of a new order. Use Jane Hacking as a means of communication between the staff and the director. In the case, it is seen that Hacking is in good and trustful relations with all workers in the report office. She may impact and control their work. The director should try to explain his intentions and expectations to the head of this office in a kind manner as it is used within the office. Make everyone follow a new order. Though it is one of the cruelest alternatives, it may still be effective. The director may offer those, who are not satisfied with new rules and obligations, share their own opinions in a written form, evaluate their suggestions, and exclude those, who are not ready to cooperate and promote the development of the college. It is always possible to find a new worker, provide him/her with the necessary practice, and get a professional office manager, who obeys the orders. Recommendation Regarding the theories mentioned in the analysis, it is evident that Boon fails to follow one of the most crucial aspects of organizational change – he does not want to pay any attention to the workers’ opinions and suggestions on how the quality of work and working conditions may be improved. The case study shows that Jane Hacking has a certain impact on each worker. Her opinion is respected. Her ideas are supported. Not to demonstrate his attempt to meet the demands of the workers and the inability to gain control over each office of the college, Boon may develop a good communication that can lead to a successful cooperation with the head of the office. Taking into consideration the fact that the work of the office is based on trust and personal understanding of employees’ needs, Boon may organize a business meeting with Hacking in an appropriate place (n ot in his office, as it is too official). It is possible to choose a restaurant and try to develop a talk within the frames of which the current problems, possible improvements, and expected outcomes can be suggested. Still, beforehand, it is necessary to discuss some ethical limitations and confidentiality of the conversations. In this case, the reputation of the director will not be affected, Hacking retains the position of the leader and a kind of guardian for her office, and the employees may come to a consensus on how to continue working respecting new innovations. Plan of action The implementation of the recommendation offered in the paper should be based on the following steps:Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Identification of the people, involved in the change: Boon, the director, has to inform Hacking, the head of the record office, about the intentions to consider some opinions of the office workers using the professionalism of two or three organizational change managers. Recognition of timing frames: one week is necessary before the meeting with Hacking to analyze the reaction to the change of the office; the day of the meeting; one week after the meeting is for the analysis of the possible improvements; two weeks are for the implementation of the change and control of the workers’ reactions and the effectiveness of the change. In general, one month is necessary for the recommended change improvement. Attention to the examples of other organizations: Boon should ask the organizational change managers to find out the real-life examples that show how effective the offered program and a new order can be underling the benefits for all workers. Evaluation of the work of the record office: the recommendation may affect several aspects such as the record office’s quality of work, Boon-office, Boon-Hacking, and Hacking-office relations may be also changed. Analysis of the effects of the change: it may happen that the office cannot accept Hacking’s intention to follow the Boon’s order and define her actions as a kind of betrayal; Hacking may not accept the Boon’s offer to cooperate and improve the conditions under which the office has to work; Boon has to be ready to be persuasive, logical, and confident in all his intentions and ideas. The office as well as the whole college should realize that Boon is the head of the team that can combine such qualities like understanding and control at the same time. References Bourda, FM 2013, Change management: Theories and methodologies. Web. Corbett, M 1994, Critical cases in organizational behavior, Palgrave Macmillan, London. Cummings, T Worley, C 2014, Organization development and change, Cengage Learning, Stamford, CA. Huczynski, AA Buchanan, DA 2013, Organizational behavior, Pearson Education, Harlow, United Kingdom. Paton, RA McCalman, J 2008, Change management: A guide to effective implementation, SAGE Publication, Thousand Oaks, CA. Reiss, M 2012, Change management: A balanced and blended approach, Books on Demand, Norderstedt. This case study on Managing Change at Byfield Business College was written and submitted by user Kayson Reed to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, March 15, 2020

Investment vs fiscal regime in small scale solid mineral mining in west africa The WritePass Journal

Investment vs fiscal regime in small scale solid mineral mining in west africa Introduction Investment vs fiscal regime in small scale solid mineral mining in west africa Introduction 1. Analysis 1.1. Literature Review 1.2. Research Methodology 1.3. Deductive and inductive reasoning 1.4. Research Limitations 1.5. Data Analysis 1.6. Overall analysis ConclusionREFERENCESRelated Introduction Small scale solid mineral mining (SSM) in the West African region of Nigeria and Ghana has been subject to analysis by many writers before to bring out the hidden aspects related to the outcomes of taxation and investment in the industry. However most of these studies are focused on the volume related outcomes rather than the strategic scenarios of the region. SSM industry output in Nigeria in 1959 contributed a mere 1% to the Gross Domestic Product (GDP) of the country.   By 2010 mining contributed just 0.3% to the total GDP[1]. This insignificant contribution made by the mining industry to the country’s GDP is attributed to the vast petroleum deposits (African Development Bank and the African Union, 2009). In Nigeria the existing mining law is incorporated in the Federal Minerals and Mining Act of 1999 and the Ministry of Solid Minerals Development[2] is responsible for the oversight of all management of mineral resources in the country. The Law has been developed from the rudimentary system of regulations starting from 1903 when mining industry in Nigeria was launched by the British colonial government (Ayine, 2011). By the 1940’s the country was one of the leading producers of coal, columbite and tin. The government monopoly over SSM in Nigeria came to an end in 1999 when the government began to sell assets in mining corporations to private entrepreneurs. However, it must be noted that the Law governing the SSM in Nigeria [3]was not as sophisticated as that of Ghana. Ghana’s fiscal policy measures were particularly conducive for the development of the SSM industry on a small scale. Though the country too has a sizable amount of oil it did not neglect the SSM related developments. The fiscal policy regime in Nigeria concerning SSM has been described by researchers as one-sided, i.e. it is overloaded with petroleum resources related developments while tax concessions to SSM business, especially private is almost non-extant. Thus this study analyses the outcomes related to the possibility developing SSM related fiscal and investment framework in Nigeria in comparison to Ghana (The Nigerian Minerals and Mining Act, 2007). 1. Analysis 1.1. Literature Review Nigeria’s SSM cannot be well understood without a reference to its gradual neglect of the industry as well. For instance according to many writers on the subject during the 1980’s the country had relied on coal and wood as a source of fuel for most of the countryside population’s day-to-day cooking needs (www.dundee.ac.uk). Subsequently coal was sought to be replaced by diesel for the railways though the rural communities continued to use coal and wood into the foreseeable future for their cooking needs. Just 73,000 tons of coal were produced in 1986 as against a whopping figure of 940,000 tons in 1958. The same fate befell the columbite and tin mining because by the end of 1980’s high grade iron ore was almost completely depleted. The  Ministry of Mines and Steel Development  was created with a view to developing the solid mineral industry in the country (www.mmsd.gov.ng). Though the Minster himself has assured the international investors of good opportunities and invited them to come and invest in the SSM industry there is a general trend of reluctance among investors primarily due to the inadequacy and inefficiency of fiscal regulations to assure good returns on their investments (Alison-Madueke, 2009). Fiscal policy [4]measures adopted by Nigeria concerning SSM have been known to be scanty and sparse.   SSM related fiscal policy and investment measures in Nigeria have to be studied against the Ghanaian developments in SSM because the latter has adopted some of the far reaching changes in respect of the country’s SSM thus encouraging the small scale investors to identify and invest in more lucrative areas of the industry (Environmentally and Socially Sustainable Development Department, 2006). Nigeria right now has one of the most undeveloped fiscal policy regimes in the whole continent concerning SSM while on the other hand Ghana has adopted some advanced features in the system of taxation. In addition to the macroeconomic policy reforms the country has extensively adopted MMS related policy reforms in order to attract investment to the country. The Mineral and Mining Law (PNDCL 153) of 1986 [5]vests all rights of ownership in the Ghanaian government thus creating one of the most successful pillars for effective governance of the industry (files.africanstudies.webnode.com). Subsequently two addendums were introduced – the Additional Profit Tax Law (PNDCL 122) and Minerals (Royalties) Regulations (LI 1349). These laws along with highly generous tax incentives and exemptions to foreign investors have served as the cornerstone of the entire SSM in Ghana. But nonetheless these laws were codified in the Ghana Internal Revenue Act [6]since 2000. By 1994 the level of corporate tax in the industry was brought down to 35% in Ghana while the capital expenditure allowance to investors was increased to 20% in the first year. Subsequently in each year the investor is entitled to 15% .of allowances from 1986. The Royalty rate calculated at 6% of the total worth of the mineral was subsequently reduced to 3%. All other duties such as import duty, mineral duty and the foreign exchange tax were done away with. The import taxes on machinery and equipment were also exempted (www.dundee.ac.uk). These developments created a positive cumulative impact on the SSM scenario in Ghana. There was also the provision to permit the leaseholder to retain 25% of the foreign exchange earnings in a foreign bank account. This is intended to facilitate the purchase of equipment and machinery. Ghana’s fiscal policy measures on SSM are wide and varied. For instance the net present value of the investment is sought to be maximized for the investor in conformance with a comparison on probable net returns from alternative investment vehicles such as purchasing government or/and corporate bonds, shares and other investments in funds (www.ghana-mining.org). After tax yield of the investment matters so much that the net present value of the company ought to be maximized especially in an SSM environment. Mineral taxation systems [7]ought to take into consideration the realized profitability as against the potential and empower the firm to pay back capital borrowings at an early date. Tax duplication must be avoided and any structural adjustment initiatives undertaken by the company must come to a successful conclusion with the help of the tax system (Hossain, 2003). Since the SSM industry requires a higher level of capital investment for a longer period of time before adequate positive earnings are made the tax system of the country must be designed to accommodate concerns of the investor. According to some recent research works tax systems on mineral exploration and development often run into rough weather in times of economic recessions because governments fail to provide adequate buffer against the investment failure (Economic Commission for Africa, 2004). If the government fails to maximize the net present value of tax revenue and earn more tax revenue during periods of high profit earnings by companies, then there would be some incapacities coming into the system to prevent it from registering positive growth. Marginally productive mines have to be brought into higher yield capacity through capital intensive production techniques. Internal cost drivers like administration and research development [8](RD) must be controlled in such a manner to avoid cost rises in production. 1.2. Research Methodology Secondary data was collected through an extensive research effort conducted in libraries and online. The information regarding SSM was collected in order to analyze and come to conclusions. Secondary data is regarded as the second hand data or the data that have been exposed before for various reasons. It is not fresh data as the primary data. It is relatively easier to find secondary data than the primary data (Twerefou, 2009). Various sources are used to implement the objective by using secondary data gathered from such sources as textbooks, professional journals, and various university publications, corporate reports of various companies and the government, and university theses. These sources were used to analyze and provide the reliable accurate inferences regarding the SSM in Nigeria and Ghana. These secondary data sources have provided an extensive understanding of the fiscal policy measures adopted by Nigeria and Ghana (Davis, Ossowski Fedelino, 2003). The comparison has been made to show that Ghanaian system of taxation [9]is far superior in the solid mineral mining and exploration industry when compared to the Nigerian system.   Ã‚  Various textbooks and publications were used to build and draw reliable theoretical conclusions and make findings. References were taken from most of the research material available in the field.   Theoretical analysis is much well facilitated than primary material which is basically limited to responses in the questionnaire and the survey. Also there is considerable reflection on the state and relevance of current research.   Relevant web sites and official documents links were accessed to provide more credibility to the study and for further reference (Onugu, 2005).  Ã‚   Future research possibilities in the field are discussed in depth to show how theoretical underpinnings evolve with time and space with specific reference to the current developments in the SSM field. 1.3. Deductive and inductive reasoning This paper used deductive reasoning as against inductive reasoning. Deductive research refers to a process in which a more general approach leads to a more particular approach. For example the researcher may start off with a theory on the subject and then build up a series of hypotheses to arrive at specific details of the research topic (Campbell, 2009). Deductive reasoning is sometimes known as top-down approach. On the other hand inductive reasoning refers to the opposite process or approach. In inductive research the researcher starts from more specific hypotheses and then go on to generalized areas of study. This is sometimes known as bottom-up approach. 1.4. Research Limitations The industry-centric research methodology aspect was focused on both the quantitative and qualitative paradigms but nevertheless the qualitative aspect was hindered by a variety of shortcomings including the inability of this researcher to obtain quality testing measures.   However it must be noted here that this detailed study would pay more attention to qualitative shifts than to quantitative data shifts caused by an industry in transition (Daniel Keen, 2010). The skewed nature of published data cannot be stressed on too much either because such bias and prejudice are only too common at each level. However for the purpose of ascertaining the tax system related outcomes such skewed data did not have a greater negative impact on conclusions. Next the all too well known limitations, viz. cultural bias [10]and prejudice displayed by researchers in Nigeria and Ghana might have hampered the efforts of this researcher to a certain extent. By following strict control mechanisms and a set of relevant guidelines the accuracy of the analysis can be made right though. This tendency apart some data sets were characterized by a degree of inaccuracy with regard to analysis. The recent developments in the SSM were not adequately borne out by these analyses (MBendi, 2011).   Thus the qualitative research aspect also assumes a significant dimension of right or wrong. Organizational settings could have hampered the data collection efforts of many researche rs and as a result they might have been influenced by cultural attachments and biases. The most significant data sets for any serious conclusions have been sifted to come to some conclusions that have a direct bearing on the learning outcomes of this study. For instance the Nigerian fiscal policy measures as based on attracting foreign investors to invest in solid mineral mining and exploration is particularly influenced by a desire on the part of the government to provide employment to local population (Chamber of Mines Newsletter, 2001). 1.5. Data Analysis Source: developingmarkets.com/dma/wp-content/uploads/2009/05/minister-of-mines1.pdf Table 2.5.1: Nigeria’s seven strategic solid minerals Source:developingmarkets.com/dma/wp-content/uploads/2009/05/minister-of-mines1.pdf      Table 2.5.2: Gold Production in Ghana Source:ghana-mining.org/ghweb/en/ma/mincom/mainStageParagraphs/06/childParagraphs/01/document/Major%20Minerals%20Prod%2090-07.pdf 1.6. Overall analysis Tax analysis with emphasis on fiscal policy in Nigeria requires a systematic theoretical analysis of the net present value. When corporate taxes are considered the firm is entitled to interest expense deduction which enables it to increase value of its assets. According to Modigliani Miller (1963) the tax exemption allows the firm to reduce the leverage-based premium in the cost associated with raising the equity capital. Subsequently Miller added personal taxes to the equation. An investor ought to make an investment only when it has a positive Net Present Value (NPV). Those investments or projects whose returns are negative must be disregarded.   The following formula is generally used to depict the NPV [1]of an investment or a project. The hypothetical example that follows the formula shows a positive NPV equal to  £123,928.60 at the end of the five year period. Here the opportunity cost of capital is assumed to be 12%. Year  Ã‚  Ã‚   Cash flow  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Discounted cash flow 0  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   =    £-(10,000.00) 1  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   10,000.00  Ã‚  Ã‚   =     Ã‚  Ã‚    £ 8,928.57 2  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   20,000 .00  Ã‚   =       £ 17,857.14 3  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   40,000 .00  Ã‚   =       £ 35,714.28 4  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   50,000.00  Ã‚   =  Ã‚     Ã‚    £44,642.85 5  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   30,000 .00  Ã‚   =       £ 26,785.71 NPV  Ã‚   =  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚    £123,928.60 Thus by adopting it as the discount rate for all future cash flows one can effectively obtain the NPV for them. This gives a few advantages. In the first place proper financial management requires a realistic opportunity cost to be set against capital. Though over a period of 5 years there can be considerable pressure on interest rates, a steady return of earnings would be ensured through proper cash flow management. After all the above cash flow forecasts are assumed to be constant though, in reality they might vary. The decision to make the investment is based on the apparent returns by way of future cash flows and it does not take into account the risk factor involved. For instance the investor has totally disregarded DCF method because he probably considers those future returns to be final and conclusive with respect to their values. The DCF calculations and the NPV figure of the total investment show that the decision is fairly justifiable because the NPV is equal to  £ 123,928.60 which is a considerable value against probable future inflationary pressure, i.e. the opportunity cost of capital. The importance of discounting future cash flows by using these formulas also depends on other factors as well. Discounted cash flows give a real picture of the future possibilities.   Since DCF[2] is what an individual is willing to pay at present in order to have what he   expects to have in the future, it’s a process of expressing future revenue flows in terms of today’s value. Probably the most important reason behind DCF is the fact that inflation erodes the value of money in times to come, i.e. future. Therefore it’s essential to make up for the loss. That is why in each subsequent DCF multiplied by the number of years, a lower value comes up (Notermans, 2000). The Internal Rate of Return (IRR) [3]sets the present value of all future cash flows of an investment equal to zero. IRR usually holds the assumption that all future cash inflows would be reinvested at the internal rate as calculated at present. Assuming that there are investment projects with returns that exceed the cost of capital or interest, such projects would be seriously considered for investment. In other words when the IRR is greater the investment is more attractive. However it’s the NPV that every investor seeks to adopt because it has a less number of disadvantages or flaws. However there is abatement or mitigation of systematic risk through hedging. Individual investment decisions concerning risk mitigation are inevitably focused on the capital adequacy rules. Concurrent decisions to mitigate risk and maintain capital adequacy are nothing new in the investment sphere. Sharpe ratio is used to calculate the amount of systematic risk: Here the performance evaluation is based on risk-adjusted measures. Now the question â€Å"is the return adequate compensation for the risk?† has to be answered by working out the returns given the risk involved. The following explanations are used to work it out. The Sharpe ratio enables the adjustment of returns on investments to be conclusive with respect to risk-free returns and the degree of volatility of an investment. Rp   Ã‚  Ã‚  Ã‚  Ã‚   = Average return on the portfolio Rf   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   = Average risk free rate Sp  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   = Standard deviation of portfolio return (total risk). While Sharpe ratio is useful in determining adjusted risk and performance of a portfolio, there are other measures as well that have to be used in order to determine the level of risk accurately. Treynor ratio: rp   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   = Average return on the portfolio rf   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   = Average risk free rate ÃŽ ²p  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   = Beta of portfolio (systematic risk) Treynor ratio is used to measure returns that are in excess of what could have been made on risk-free investment.   For example Treasury Bills are less risky than other volatility-prone assets. That’s why it’s sometimes called reward-to-volatility ratio. It uses systematic risk. Thus higher the Treynor ratio, the higher the returns made on investments. However it is not like Sharpe ratio which is a measure of the excess return and does not help much. Next there is the Jensen’s Alpha, a measure that calculates the excess returns above the security market line as done in the capital asset pricing model (CAPM).[4] CAPM also uses beta as a multiplier to determine the total value of returns. Jensen’s Alpha is a risk adjusted portfolio performance metric. It’s calculated by using a regression technique to determine the performance of a given portfolio of a manager tested against a benchmark. On the other hand unsystematic (un-systemic) risk refers to a risk inherent in a particular industry or market that falters due to a specifically divergent variable. Unsystematic risk[5] (or residual risk or diversifiable risk) can be overcome by resorting to diversification of one’s portfolio (Lo, 2005).   Since unsystematic risk is specific to a particular market/industry or market segment, diversification helps investors either to reduce risk or totally cancel out depending on the relative offsetting effect of less risky investments. Unsystematic risk essentially presupposes the existence of a remedial measure without resorting to hedging which can be uncertain for a number of reasons. In the first place hedging is carried out with the intention of obviating systematic risk which occurs as the result of an exogenous variable going astray. In the case of unsystematic risk exogenous variables are assumed to behave in the predictable way (Lehmann, 1990). Thus forecasts are reliable to the extent that the individual potential investor does not feel the need to shuffle the basket of investments. Fund managers whose instincts the investor relies on, do not feel obliged to advice clients on the contrary decisions. In fact such advice depends not only the instincts of fund managers but also statistical forecasts. As the portfolio is more diversified unsystematic risk moves closer to zero. Accounting risk[6], financial risk [7]and economic risk[8] are all part and parcel of unsystematic risk. They signify the very nature of risk. For instance a financial risk might involve mistakes in cash flow forecasts thus leading to liquidity problems. These residual risks do not have a big impact on the whole system. The systemic imperviousness stands out as the most credible security against risk. But nevertheless the degree of this imperviousness is determined by a number of other factors that are inherent to the system itself. Calculations involve the same process as above. However, CAPM is often used to measure an individual security or a portfolio. Additionally the security market line [9](SML) is used to measure the reward-to-risk ratio of a security in relation to the total market as shown below. Finally total risk is the sum total of systematic risk and unsystematic risk. While the choice of the individual investor between different types of securities or investment instruments matters here, there is the need for the investor to make some decisive decisions involving which risk out of systematic and unsystematic risks to be reduced visvis the other. The following graph illustrates the hypothetical scenario of a company which invests in a given portfolio of securities. The red line is the Security Market Line. the horizontal axis shows the betas of all companies in the market   the vertical axis shows the required rates of return, as a percentage Assuming that the risk free rate is 5%, and the overall stock market will produce a rate of return of 12.5% next year the following would give a clearer picture of fundamental financial ratio analysis. The imaginary investor/shareholder/company has a beta of 1.7. This result is obtained by substituting a few sample betas into the CAPM equation as follows. Ks = Krf + B (Km Krf). Table 2.5.3: Beta Values Security Beta (It’s a measure of risk) Rate of Return Risk Free 0.0 5.00% Overall Stock Market 1.0 12.50% Utopia Company 1.7 17.75% Source: www.teachmefinance.com    This figure and hypothetical data can be applied to understand all three types of risks in investing in the Nigeria’s solid mineral mining and exploration industry.    Conclusion Time and again it has been argued that Nigeria’s existing fiscal policy regime in general and the tax system in particular regarding the SSM requires urgent revision to invite both local foreign investors. It has also been suggested that such a revision or an overhauling would be worked out in conformance with SSM’s current developments. Nigeria has been heavily dependent on its oil resource and in fact has been neglecting solid mineral mining industry [1]while another West African country Ghana has been systematically developing its solid minerals industry at a consistent pace. Thus the analysis is focused on a distinction between industry related features in Nigeria and Ghana to bring about a conviction of the existing tax anomalies in the former. While the paper focuses attention on a variety of tax related shortcomings in Nigeria ranging from the near total absence of a well structured corporate tax system in the solid mineral mining industry[2] in general and the SSM sector in particular, it has stressed on the significance of fiscal policy measures that require a systematic effort sustained over the years to bring about both a qualitative and quantitative shift in the solid mineral mining industry. The comparison with Ghana is made to in order to delineate a series of positive developments that have taken place within the Ghanaian taxation system in the solid mineral mining and exploration sector. Ghana has put in place a number of corporate tax incentives and relaxed its rules and regulations on the acquisition of mining rights[3] to assure the potential foreign investor that net returns on their investment in the sector would produce more than anticipated net returns. Nigeria just needs this kind of change in its tax sys tem to create a series of positive synergies. REFERENCES Books African Development Bank and the African Union, 2009. Oil and Gas in Africa, New York: Oxford University Press. Campbell, B., 2009. Mining in Africa: Regulation and Development, New York: Pluto Press. Daniel, P. Keen, M. (Eds), 2010. Charles McPherson (Editor) the Taxation of Petroleum and Minerals: Principles, Problems and Practice, Oxon: Routledge. Notermans, T., 2000. Money, Markets, and the State: Social Democratic Economic Policies since 1918 (Cambridge Studies in Comparative Politics), Cambridge: Cambridge University Press. Journals Lehmann, B., 1990. ‘Fads, martingales, and market efficiency’, Quarterly Journal of Economics, vol .105, pp. 1–28. Lo, A., 2005. ‘Reconciling efficient markets with behavioral finance: the adaptive markets hypothesis’, Journal of Investment Consulting, vol.7, pp.21–44. Modigliani, F. Miller, M. H., 1963). â€Å"Corporate Income Taxes and the Cost of Capital: A Correction†, American Economic Review.   Articals Alison-Madueke, D., 2009. Opportunities in Nigeria’s Minerals Sector, Available at: developingmarkets.com/dma/wp-content/uploads/2009/05/minister-of-mines1.pdf [Accessed 03rd May 2011]. Ayine, D., 2011. Natural Resource Investment Review In Developing Countries: Ghana’s Mininng Sector In Perspective, Available at: http://www2.americanbar.org/calendar/section-of-international-law-2011-spring-meeting/Documents/Friday/The%20New%20Gold%20Rush/NATURAL%20RESOURCE%20INVESTMENT%20REVIEW%20IN%20DEVELOPING%20COUNTRIES-%20GHANA’S%20MININNG%20SECTOR% [Accessed 03rd May 2011]. Chamber of Mines Newsletter, 2001. Tanzania Chamber of Mines Newsletter, Available at: chamberofmines-tz.com/newsletter/news4a33b01078f7a.pdf [Accessed 03rd May 2011]. Davis, J.M., Ossowski, R, Fedelino, A. (Eds), 2003. ‘Fiscal Policy Formulation and Implementation in Oil-Producing Countries’, International Monetary Fund, Available at: imf.org/external/pubs/nft/2003/fispol/index.htm#ch1 [Accessed 03rd May 2011]. Economic Commission for Africa, 2004. Harmonization of Mining Policies, Standards, Legislative and Regulatory Frameworks in Southern Africa, Available at: http://vi.unctad.org/files/wksp/oilgaswksptanz10/docs/Background%20readings/SRO-SA%20Mining%20Report_final%20Harmonisation%20Study.pdf [Accessed 03rd May 2011]. Environmentally and Socially Sustainable Development Department, 2006, Ghana Country Environmental Analysis, Available at: http://siteresources.worldbank.org/INTRANETENVIRONMENT/3635842-1175696087492/21919456/Ghana_CEA.pdf [Accessed 03rd May 2011]. Hossain, S.M., (2003). ‘Taxation and pricing of petroleum products in developing countries: A framework for analysis with application to Nigeria’, International Monetary Fund Working Paper, Available at: imf.org/external/pubs/ft/wp/2003/wp0342.pdf [Accessed 03rd May 2011]. KopiÅ„ski, D., Undermining mining: the impact of the financial crisis on the mineral based economies of Sub-Saharan Africa, Available at: files.africanstudies.webnode.com/200000108/Undermining%20mining.pdf [Accessed 03rd May 2011]. Lawal, M. A., Constraints to Small Scale Mining in Nigeria: Policies and Strategies for Development, Available at: dundee.ac.uk/cepmlp/car/assets/images/Nike.pdf [Accessed 03rd May 2011]. Nwete, B.O.N., Mineral and Petroleum Taxation How Can Tax Allowances PROMOTE Investment in the Nigerian Petroleum Industry, Available at: dundee.ac.uk/cepmlp/car/html/car8_article14.pdf [Accessed 03rd May 2011]. Onugu, B. A. N., 2005, Small and Medium Enterprises (SMEs) In Nigeria: Problems and Prospects, Available at: stclements.edu/grad/gradonug.pdf [Accessed 03rd May 2011]. The Minerals Commission of Ghana, The Minerals Commission of Ghana, Available at: ghana-mining.org/ghweb/en/ma/mincom.html [Accessed 03rd May 2011]. Twerefou, D.K., 2009. Mineral Exploitation, Environmental Sustainability and Sustainable Development in EAC, SADC and ECOWAS Regions, Available at: uneca.org/atpc/Work%20in%20progress/79.pdf [Accessed 03rd May 2011]. Websites MBendi, 2011. Mining in Nigeria, Available at: mbendi.com/indy/ming/af/ng/p0005.htm [Accessed 03rd May 2011]. Acts Ministry Of Mines And Steel Development, National Minerals and Metals Policy, Available at: mmsd.gov.ng/Downloads/NATIONAL%20POLICY%20ON%20MINERALS%20METAL.pdf [Accessed 03rd May 2011]. The Nigerian Minerals and Mining Act, 2007. Mining In Nigeria, Available at: gbc-law.com/Mining_in_Nigeria.pdf [Accessed 03rd May 2011].