Sunday, December 29, 2019

Identify the business risks at Sunshine. - Free Essay Example

Sample details Pages: 9 Words: 2665 Downloads: 3 Date added: 2017/06/26 Category Business Essay Type Analytical essay Did you like this example? Question 1 a) There are eight business risks which should be assessed by the management of Sunshine. Exclusive right risk In July 2009, Sunshine obtained exclusive rights to operate a car and passenger ferry route between Hong Kong and Shekou until December 2025. It about only 15 years exclusive right, it is relative short. Don’t waste time! Our writers will create an original "Identify the business risks at Sunshine." essay for you Create order Besides, it may be cancel in the future. Sunshine facing cannot extend the exclusive right risk. Entrance of competitor risk Between Hong Kong and Shekou has an alternative to driving 300 kilometers using the road. There have been several ambitious plans to build a bridge crossing Hong Kong to Shekou in the future, but they have failed due to lack of public support and the government funds only. If the road is build, then it will be a high business risk for Sunshine, since using the road is faster than boats. Sunshine is facing entrance of competitor risk in the future. Old boats risk Sunshine refurbished two 20-year-old boats to service the route. In this case, Sunshine facing boats are relatively old. Old boats need higher repair and maintenance costs in order to operate the business. Environmental Protection Regulations risk The boats have no yet met the emission standards of the Environmental Protection Regulations which will come into force in 2015. Sunshine sh ould be update the old boats or buy new boats. Both suggestions need a very high cost for Sunshine to meet Environmental Protection Regulations. Unused capacity risk Each boat makes three return crossings every day of the year, subject to weather conditions. Each has the capacity to carry 250 passengers and 40 vehicles. Sunshine carried 70,000 vehicles in the year ended 31 December 2013(2012:58,000; 2011:47,000). According to above, capacity to carry vehicles is 3ÃÆ'—2ÃÆ'—40ÃÆ'—365=87600 vehicles. Sunshine has over unused capacity during 2011-2013. Franchise risk Hot and cold refreshments and travel booking facilities are offered on the one-hour crossing. These services are provided by independent businesses on a franchise basis. The services quality very depends on the suppliers. Besides, extra income is not subject to Sunshine. Oil cost risk Oil cost will be affected by global environment, such as, required of oil consumption, objectives a nd needs, current and future business environment etc. So it may be rise or drop dramatically. The cost of oil may be very unstable. Weather risk Sunshine is facingpotential financial losses caused by unusual weather. Besides, it may be leading to shipwreck. Weather is an important element for boats industry. b) The risks identified in (a) could be managed and maintained at an acceptable level by Sunshine. Show as following: Exclusive right risk Sunshine should be maintain a good relationship with customers and good brand name in order to obtain the exclusive right to operate a car and passenger ferry route between Hong Kong and Shekou for a long time more easily. Besides, it can reduce the entrance of competitor. Thus, exclusive right will be not taken by another company. Entrance of competitor risk Sunshine should be built up their brand name in order to retain customer. Promote comfortable, conveniences and cheaper for customer. Besides, keep profession cu stomer service and maintain good customer relationship in order to defense the entrance of competitor. Old boats risk Old boats facing old machine problem, then it may be suddenly have some accident, thus Sunshine should be keep more frequency on repair and maintenance, in order to avoid the accident. Environmental Protection Regulations risk New Environmental Protection Regulations will be effect in 2015, Sunshine cannot avoid the event. Besides Sunshine can prepare early, because the cost of met the emission standards of Environmental Protection Regulations will be more expensive when near the regulation effect in 2015. On the other hand, early to improve the boats emission standard are more elasticity and cheaper. Unused capacity risk Unused capacity is an opportunity cost for the company, Sunshine should utilize the opportunity cost, and thus some of place can transport goods in order to utilize all unused capacity. Franchise risk Sunshine should be direc tly manages hot and cold refreshments and travel booking facilities, so Sunshine can easy to maintain the quality of services in order to keep the brand loyalty. Besides, Sunshine can earn extra income from the hot and cold refreshments and travel booking facilities. Thus, dont use franchise basis. Oil cost risk Oil cost will be affected by global environment, so implementation of an oil price risk strategy is needed. Sunshine can besthedgeagainst costly exposures to oil price risk.The best method is use oil price risk management services in order to decrease the oil cost risk. Weather risk Weather risk may be lead to Sunshine facing financial impact, so Sunshine should be use risk transfer instruments based on a defined weather element, such as temperature, rain, snow, wind, etc. in order to decrease the financial exposure due to the weather problem. Thus, Sunshine should buy insurance to cover the potential loss. c) Business risk identified in (a) may be linked t o a financial statement risk. Show as following, Exclusive right risk The exclusive right risk will be affect Sunshine going concern problem, because cannot obtain the exclusive right will be close the business Entrance of competitor risk Build a road crossing Hong Kong to Shekou will be decrease Sunshines revenue, because one more method crossing Hong Kong to Shekou. Old boats risk Old boats will increase repair and maintenance expenses. Environmental Protection Regulations risk Government Environmental Protection Regulations will lead to increase repair and maintenance expenses. Unused capacity risk Unused capacity will lead to decrease Sunshines revenue. Franchise risk Franchise basis may be decrease revenue, because supplier provides bad services and goods. Oil cost risk Oil cost increase may be increase material expense. Weather risk Unstable weather may be lead to decrease revenue. Question 2 a) Fred decided to inspect d ocumentary evidence that all shipments made by Top Shop Ltd. have been invoiced by matching shipping documents with invoices. So he has identified all sales invoices as the population from which he intends to take a sample. Select sales invoices to inspect documentary evidence that all shipments made by Top Shop Ltd is incorrect, since all sales invoices must have shipping documents. However, have shipping documents may not issue sales invoices. Thus, Fred should not take sales invoices for the sample test. Fred should take shipping documents as sample test. b) Since Fred plans to place a high degree of reliance on this particular control, he assesses the risk of overreliance at 5%. In previous years, a 10% level was used. High percentage of risk of overreliance is more irrelevance on their clients. On the other hand, Lower percentage of risk of overreliance is more reliance on their clients. According to this case, audit manager (Mike Wong) and audit partner (Mary Lee) indicate that a higher degree of reliance is planned in the current audit, so Fred assesses the risk of overreliance at 5% which is lower than 10% level was used in previous years is correct. c) Fred assessed the expected population deviation rate at 1% in current audit year. While the rate of deviation from prior audits has approximated 2% High percentage of expected population deviation rate is worst in its processing of sales invoices. On the other hand, Lower percentage of expected population deviation rate is better in its processing of sales invoices. In this case, Top Shop Ltd. has made several improvements in its processing of sales invoices; as a result, Fred believes that a lower expected population deviation rate is appropriate. Thus, expected population deviation rate decrease from prior audit 2% to current audit 1% is correct. d) Fred uses sampling tables to calculate s sample size of 156 prior years. In current year, more than 30,000 sales invoi ces are processed per year, and then he increases the sample size to 175 because the population of sales invoices is extremely large. In this case, population of sales invoices is extremely large, and then increase sample size from 156 to 175 cannot have a good sample test. Since, increase 175-156=19 is relative small. On the other hand, the population of sales invoices is extremely large, continuous increase the sample size is not significance for the test. e) The sum of sample rate of deviation of 2% and allowance for sampling risk of 2.5% equal to 4.5% is less than the risk of overreliance 5% by d), Fred concluded that the control is operating effectively and decided to rely on this control as planned to reduce the scope of his substantive procedures. In this case, Fred is incorrect and risk of overreliance is irrelevant to the sample rate of deviation plus allowance for sampling risk. He should use tolerable rate of deviation to compare with the sum of sample rate of deviation and allowance for sampling risk. Thus, sample rate of deviation of 2% and allowance for sampling risk of 2.5% equal to 4.5% is more than the tolerable rate of deviation 4% by d). The control is not operating effectively and cannot rely on this control as planned to reduce the scope of his substantive procedures. Question 3 a) These third parties more likely pursue litigation against Madeoff under common law because of the auditor breach of failure to exercise reasonable skill and care. b) Case (1) First Trust Bank First Trust Bank was specifically named in the engagement letter. Prior to committing the capital, First Trust Bank had reviewed Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s financial statements and, based on the financial condition reflected in its statement of financial position, deemed Madeoff to be a qualified loan candidate. According to the case, First Trust Bank is primary beneficiaries with Allen which is known and named third parties. By law, prim ary beneficiaries as having this privity to contract, as a result, First Trust Bank will be treated same as client. First Trust Bank was specifically named in the engagement letter. Case (2) MoonTrust Bank MoonTrust Bank is not named in the engagement letter nor identified to Allen, Madeoff had previous business dealings with MoonTrust and maintained several accounts at MoonTrust. Based primarily on its prior relationships with Madeoff, as a result approved the financing to Madeoff prior to receiving the audited financial statements. In this case, MoonTrust Bank is foreseen beneficiaries with Allen which is known and unnamed third party. Because MoonTrust Bank is not named in the engagement letter nor identified to Allen, but based on its prior relationships with Madeoff. Case (3) Alice Lay Alice Lay request and review Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s audited financial statements and Allenà ¢Ã¢â€š ¬Ã¢â€ž ¢s report on those financial statements prior to providing funding. H owever, Alice had never entered into a loan agreement of this nature in the past. In this case, Alice Lay is foreseeable third parties with Allen which is unknown and unnamed third party. Because Alice Lay felt personal ties to Madeoff and was interested in its continued success, but never entered into a loan agreement of this nature in the past. c) Allenà ¢Ã¢â€š ¬Ã¢â€ž ¢s audit did not follow the HKSA but that it did not demonstrate a lack of minimum care or actual knowledge of the misstatements. Case (1) First Trust Bank According to contract law, First Trust Bank is a primary beneficiary with Allen. First Trust Bank was specifically named in the engagement letter. Besides, First Trust Bank had reviewed Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s financial statements, and then based on the financial statement deemed Madeoff to be a qualified loan candidate. Allen did not follow the HKSA, he breach of common law duties, because he failure to exercise reasonable skill and care. Be sides, under contract law, Allen owed the First Trust Bank a duty of care, Allen was negligent and First Trust Bank suffered a loss as a result of the auditors negligence. Thus, Allen is liable to First Trust Bank. To conclude, First Trust Bank ability is to against Allen in potential claim. Case (2) MoonTrust Bank According to contract law, MoonTrust Bank is a foreseen beneficiary with Allen. MoonTrust Bank is not named in the engagement letter nor identified to Allen, however, MoonTrust Bank based on prior relationships with Madeoff, then reviewed Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s financial statements and based on the financial statement qualified the loan. Same as case (1) Allen did not follow the HKSA, he breach of common law duties and failure to exercise reasonable skill and care. Although, MoonTrust Bank is not named in the engagement letter, Allen foreseen MoonTrust Bank will be based on the financial statement and qualified the loan. Because, based on primarily on its prior relationships with Madeoff. Under contract law, Allen owed the First Trust Bank a duty of care, Allen was negligent and First Trust Bank suffered a loss as a result of the auditors negligence. Thus, Allen is liable to third parties of First Trust Bank. To conclude, MoonTrust Bank ability is to against Allen in potential claim. Case (3) Alice Lay Alice Lay, provided $200,000 of capital to Madeoff. While her decision was primarily motivated by Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s role in the community and its corporate citizenship, besides, she did request and review Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s audited financial statements and Allenà ¢Ã¢â€š ¬Ã¢â€ž ¢s report on those financial statements prior to providing funding. However, she did not entered into any loan agreement to Madeoff before. In this case, although Allen did not follow the HKSA, he breach of common law duties and failure to exercise reasonable skill and care. However, Allen can prove he did not demonstrate a lack of m inimum care or actual knowledge of the misstatements, so there is no duty owed to Alice. Furthermore, they are absence of causal connection. Alice didnt rely on the financial statement make the decission. To conclude, Alice do not have ability to against Allen in potential claim. d) The parties could prove that Allen was aware that Madeoffà ¢Ã¢â€š ¬Ã¢â€ž ¢s financial statements contained a material misstatement. In this case, an intentional act by one or more individuals among management, those charges with governance, employees, or third parties, involves the use of deception to obtain an unjust or illegal advantage. This is a fraud action. Relationship is irrelevant with the fraud case, when these parties prevail against Allen in a potential claim. These parties are eligible to claim the loss from Allen. To conclude, Allen is liable for these three parties potential loss. Question 4 a) Audit committees can enhance a listed companys corporate governance. Th ere are following eight benefits. Audit committees reviewing the financial statements on behalf of the Board, it improves the quality of financial reporting Audit committees can help risk management awareness and control which will reduce the opportunity for fraud, by create a climate of discipline. Non-executive directors sitting on the Audit Committee can contribute an independent judgment and play a positive role. Audit committees can help the finance director, and then finance director can get things done which might otherwise be difficult. Audit committees can provide a channel of communication and forum for issues of concern, so it can strengthens the position of the external auditor. Audit committees can provide a framework, when the external auditor can assert his independence in the event of a dispute with management. Audit committees can strengthen the position of the internal audit function, because it can provide high degree of independence from management. Audit committees can increase public confidence in the credibility and objectivity of financial statements and the Board. Reference: Auditing and Assurance in Hong Kong Third Edition (Peter Tze Yiu Lau and Nelson Chi Yuen Lam) P.818 b) Good self regulation can lead to absence of major corporate failure or fraud and government will be reluctant to impose regulations on industry. However, without regulated by law, then audit committees may be inconsistency of practice and standards. Audit committees may be disproportionate significance being given to its role and may impact on corporate performance. Thus, the role of the audit committee should be left to voluntary codes of practice and should be regulated by law in all countries. Reference: The Hong Kong University of Hong Kong, à ¢Ã¢â€š ¬Ã‹Å"Auditing I studyà ¢Ã¢â€š ¬Ã¢â€ž ¢ The Hong Kong University of Hong Kong, à ¢Ã¢â€š ¬Ã‹Å"Auditing II study unit 1-2à ¢Ã¢â€š ¬Ã¢â€ž ¢ Eilifsen, Aasmund., Auditing assurance services, McGraw-Hill Education (2nd international) Peter Tze Yiu Lau, Nelson Chi Yuen Lam, Auditing and assurance in Hong Kong, Pilot Pub, (3rd edn) ACT B417 TMA1 P.1

Saturday, December 21, 2019

Examining the Villainous Characters of Shakespeares King...

King Lear by William Shakespeare is one of the ionic plays that depict behavior of mankind as either good or bad. As one of the earliest plays to show cast good vs. evil, King Lear paved the way for other such symbolic plays to written. Goneril, Regan, and Edmund, three of the characters from Shakespeare’s King Lear, are symbols of evil with in human society to its greatest entity. These three are the most highlighted villains in the play. A villain is a bad or evil person, usually the antagonist of the play. Throughout this play one question stands unanswered; who is the most villainous of the three. In order to decide which character is the most villainous, fist each character must be spotlighted. Goneril is the oldest of Lear’s†¦show more content†¦When her sister joins her at her house, she unites with her and tells her father â€Å"the old man and ‘s people can’t be well bestowed.† (Act. 2, Sc. 4, ll. 286-287) She sends father out in the treacherous storm. As a daughter Regan is expected to respect her father, even after he gave up all of his royal power. Her husband Cornwall was also blindsided by Regan’s actions. Edmund is the mean bastard son of Gloucester a noble man. Edmund’s father loves him as much as he loves his legitimate son Edgar. Edmund believes he is much better then his brother and would go to any length to prove that. First he gives his father a phony letter describing how Edgar wants to kill his father and how he will do it soon. Then Edmund wounds himself and then tells his father that Edgar did it. Edmund’s father Gloucester is so blind that he does not see Edmund’s true nature. Gloucester turns to Edmund and says, â€Å"Where is the villain, Edmund.† (Act. 2, Sc. 1, ll. 37) Edmund is still not satisfied with all the he has done so he decides to cause more ciaos. When the Duke of Cornwall came to visit Edmund, Edmund convinced him that Gloucester was a committing treason. Cornwall and his wife Regan asked Edmund to go seek his father so he can be properly punished. The least villainous of the three is definitely Regan because she had less evil activity. She was blinded by her feeling for Edmund that she did not see her

Friday, December 13, 2019

Financial Analysis of Axis Bank Free Essays

CORPORATE FINANCE END TERM PROJECT To study the Financials of ICICI bank, HDFC bank and Axis bank and to conduct Comparative Financial Analysis among them. UNDER THE GUIDANCE: Dr. ASHISH GARG PROGRAM COORDINATOR PGDM (FINANCE) Submitted by: Janmey Patel (202) Nikhil Arora (206) Shashank Mohore (228) Aniket Gupta (229) Parandeep Singh Chawla (231) TABLE OF CONTENTS Overview of Indian Banking Industry4 Types of Commercial Bank4 Public Sector Bank4 Private Sector Bank4 Foreign Bank4 Regional Rural Banks4 Overview of ICICI Bank 5 Overview of Axis Bank 5 Overview of HDFC Bank 5 Stock Analysis6 Return Risk Analysis7 Calculations:7 Terms:7 Risk7 Return7 Risk Returns Figures8 Covariance Correlations8 Terms8 Correlation Effect8 Covariance Correlation Figures8 Portfolio Variance Standard Deviation9 Portfolio Return Figures9 Portfolio Risk Figures9 Cost of Capital10 Cost of Debt10 Cost of Equity10 Cost of Debt Equity Figures10 Weighted Average Cost of Capital Calculations11 Comparative Analysis11 Leverages11 Leverage Figures12 Graphical Representation for Leverages12 P/E Ratio Analysis13 P/E Ratio Figures13 Dividend Policy Analysis13 Dividend Yield and Dividend Payout Ratio14 Conclusions and Inference14 Return14 Risk15 Choice based upon Risk and Return15 Cost of Capital16 Choice Based on Cost of Capital16 PE Ratio Analysis17 Leverage17 Dividend Policy18 Overview of Indian Banking Industry Types of Commercial Bank Public Sector Bank In case of Public Sector banks the major shareholders is Government of India. We will write a custom essay sample on Financial Analysis of Axis Bank or any similar topic only for you Order Now For example State Bank of India, Punjab National Bank, Bank of India etc. Private Sector Bank In case of Private Sector Banks the major Shareholders are Private Individuals. For example ICICI Bank, Axis Bank, HDFC Bank etc. Foreign Bank In case of Foreign Bank the major Shareholders are the foreign entities. For example Standard Chartered Bank, Citi Bank, HSBC etc. Regional Rural Banks In case of Regional Banks the major shareholders are Central Government, Concerned State Government and Sponsor Bank in the ratio of 50:15:35. For example Andhra Pradesh Grameena Vikas Bank etc. Overview of ICICI Bank ICICI (Industrial Credit and Investment Corporation of India) Bank offers a wide range of banking products and financial services to corporate and retail customers through a variety of delivery channels and through its specialized subsidiaries in the areas of investment banking, life and non-life insurance, venture capital and asset management. ICICI bank is the 2nd largest bank in India by assets and 3rd largest by  market capitalization. Overview of Axis Bank Axis Bank was begun its operations in 1994, after the Government of India allowed new private banks to be established. The Bank was promoted jointly by the Administrator of the specified undertaking of the Unit Trust of India (UTI), Life Insurance Corporation of India (LIC) and General Insurance Corporation of India (GIC) and other four PSU insurance companies, i. e. National Insurance Company Ltd. , The New India Assurance Company Ltd. , The Oriental Insurance Company Ltd. nd United India Insurance Company Ltd. Overview of HDFC Bank HDFC (Housing Development Finance Corporation Limited) bank was amongst the first to receive an approval from the Reserve Bank of India (RBI) to set up a bank in the private sector, as part of the RBI’s liberalization of the Indian Banking Industry in 1994. HDFC Bank is the fifth largest bank in India by assets and the second largest bank by  market capitalization  as of march 31, 2012. Stock Analysis Bankex (Index tracking the performance of leading banking sector stocks) has grown at a compounded annual rate of about 31%. India’s gross domestic product (GDP) growth will make the Indian banking industry the third largest in the world by 2025. In coming years with its assets size poised to touch USD 28,500 billion by the turn of the 2025 from the current asset size of USD 1,350 billion. Return ; Risk Analysis Calculations: 1) The daily stock prices for the 3 banks for the duration of 5 years are taken from Nifty. 2) For the daily stock prices of the market we took the figures for 5 years of Nifty Bank. ) Formula for Daily Return Current Stock Price-Previous Stock PricePrevious Stock Prices 4) Average Daily Return is calculated by taking the average of Daily Returns. 5) Formula for Annualized Daily Return (1+Average Daily Return)249 – 1 6) Formula for Beta Covariance(Market, XYZ Bank)Standard DeviationMarket*Standard Deviation(XYZ Bank) 7) Formula for Annualized Stand ard Deviation (1+Variance(XYZ))249 – 1 8) Formula for Correlation Covariance(X, Y)Standard DeviationX*Standard Deviation(Y) Terms: Risk 1) Risk is the chance that an  investment’s actual  return  will be  different  than expected. 2) Risk  is usually measured by calculating he  standard deviation  of the  historical returns  or  average returns  of a specific investment. 3) A high standard deviations indicates a high degree of risk. Return 1. The gain or loss  of a security in a particular period. 2. The return consists of the  income  and the  capital gains relative  on an  investment. 3. It is usually quoted as a percentage. Risk ; Returns Figures Particulars| ICICI Bank| Axis Bank| HDFC Bank| Average Daily Return | 0. 001| 0. 001| 0. 00031| Standard Deviation | 0. 034| 0. 032| 0. 03393| Covariance (Nifty Bank, X)| 0. 001| 0. 001| 0. 00048| Standard Deviation (Nifty Bank)| 0. 025| 0. 025| 0. 02454| Beta | 1. 53| 1. 077| 0. 80000| A nnualised Daily Return | 0. 159| 0. 331| 0. 08| Annualised Standard Deviation | 0. 580| 0. 545| 0. 58| Annualised Standard Deviation (Nifty Bank)| 0. 402| 0. 402| 0. 40| Covariance ; Correlations Terms Correlation Effect 1. Relationship depends on correlation coefficient 2. -1. 0 ; r ; +1. 0 3. The smaller the correlation, the greater the risk reduction potential 4. If r = +1. 0, no risk reduction is possible Covariance ; Correlation Figures Covariance| ICICI Bank| Axis Bank| HDFC Bank| ICICI Bank| 1. 00000| 0. 00081| 0. 00058| Axis Bank| 0. 00081| 1. 00000| 0. 00052| HDFC Bank| 0. 00058| 0. 0052| 1. 00000| Correlation| ICICI Bank| Axis Bank| HDFC Bank| ICICI Bank| NA| 0. 00255| 0. 00174| Axis Bank| 0. 00255| NA| 0. 00167| HDFC Bank| 0. 00174| 0. 00167| NA| Portfolio Variance ; Standard Deviation Portfolio Return Figures Equal Weight Portfolio Return| Particulars| Return | Weight | Portfolio Return| ICICI | 16| 0. 33| 5. 333| HDFC | 8| 0. 33| 2. 667| AXIS | 33. 07| 0. 33| 11. 023| T otal | 19. 023| Portfolio Risk Figures RISK (%) | ICICI | 0. 58| HDFC | 0. 58| AXIS | 0. 55| Portfolio | 0. 3278| Cost of Capital It is the minimum rate of return the suppliers of capital would expect to receive if the capital were invested. Cost of Debt Cost of debt is calculated using the formula: cost of debt kd=interest X (1-t)debt 1) Interest is the amount paid by the company as a interest on the Debt in the current year. It is taken from the Profit ; Loss statement of the company. 2) Debt is long term debt which we have taken from the Balance Sheet of the Company. 3) The tax rate t is the corporate tax rate and is equal to the 33. 9%. Cost of Equity The Cost of Equity in this case has been calculated with the help of Gordan Dividend Model. Cost of Equity ke=Proposed DividendMarket Price per Share*Number Of Shares+Dividend Growth Rate Cost of Debt ; Equity Figures Particulars| ICICI Bank| Axis Bank| HDFC Bank| Interest (Interest Expenses)| Rs. 8,50,44,350. 00| Rs. 1,79,32,646. 00| Rs. 2,29,99,060. 00| Total Debt| Rs. 1,40,16,49,073. 00| Rs. 34,07,16,721. 00| Rs. 23,84,65,086. 00| Corporate Tax Rate| 30. 00%| 30. 00%| 30. 00%| Cost of Debt (kd)| 4. 25%| 3. 68%| 6. 75%| Equity Capital| Rs. 1,15,27,683. 00| Rs. 41,32,039. 00| Rs. 46,93,377. 00| Proposed Equity Share Dividend| Rs. 1,90,20,400. 00| Rs. 77,00,725. 00| Rs. 1,17,27,733. 00| Number of Shares| 13565154| 41,32,03,952| 23,36,704| Dividend Growth Rate (g)| 17. 95%| 14. 87%| 30. 06%| Cost of Equity (ke)| 18. 11%| 14. 87%| 31. 02%| Weighted Average Cost of Capital Calculations Comparative Analysis Leverages The leverage analysis consists of: 1) Operational Leverage defined by Degree of Operational Leverage. 2) Financial Leverage defined by Degree of Financial Leverage. 3) Total leverage defined by Degree of Combined Leverage. Operational Leverage (DOL) = % change in EBIT % change in Sales Financial Leverage (DFL) =% change in EPS% change in EBIT Total Leverage (DCL) = % change in EPS% change in Sales = DOL* DFL Leverage Figures Graphical Representation for Leverages P/E Ratio Analysis P/E ratio is calculated using the formula: P/E RATIO=Current market price of share EPS P/E Ratio Figures Dividend Policy Analysis Dividends paid by a firm are measured using one of two measures. 1) Dividend Yield: Which relates the dividend paid to the price of the stock. Dividend Yield=Annual Dividend per Share Market Value per Share 2) Dividend Payout Ratio: Relates dividend paid to the earning of the Firms. Dividend Payout Ratio=Dividend Distributed Total Earnings Dividend Yield and Dividend Payout Ratio Particulars| ICICI Bank| Axis Bank| HDFC Bank| Dividend Paid (000’s)| Rs. 19,013,434| Rs. 6,697,611| Rs. 7,695,463| Number of shares| 13,565,154| 413,203,952| 2,336,704| Dividend per share| 1. 402| 0. 016| 3. 293| Intrinsic value per share| 890. 2| 1146. 2| 519. 85| Dividend Yield| 0. 157%| 0. 001%| 0. 634%| Earnings (000’s)| Rs. 103,860,000| Rs. 74,308,700| Rs. 89,504,000| DP Ratio| 0. 183| 0. 090| 0. 086| Retention Ratio| 0. 817| 0. 910| 0. 914| Conclusions and Inference Return As one can see from the above chart , Axis Bank offers the highest returns per annum at 33% , followed up by ICICI and HDFC Bank at 16% and 8% respectively. It can be safely concluded that Axis Bank is the best option to invest in. Let us now have a look at the Risk analysis before we go any further. Risk The following chart depicts the Risk witnessed by each of the Banks. As one will notice, each of the three Banks i. e. ICICI , Axis and HDFC Bank belong to the same risk class. Risk of ICICI and HDFC Bank is equal at 58%, while that of Axis Bank is little lower at 54%. There is not much to choose between the Banks when it boils down to Risk. Choice based upon Risk and Return Based upon Risk and Return Assessment Axis Bank stands out to be a clear choice. On one hand it offers returns which are twice that of ICICI Bank and four times in comparison to HDFC Bank, on the other hand, its risk is marginally lower than that of the other two Banks, which makes AXIS Bank to be the standout choice. Cost of Capital The Cost of Capital of each Bank is depicted in the following chart: As one can see from the above chart The total cost of Capital for ICICI Bank averages out to be 8. 42%, Whereas Axis Bank has a WACC of 8. 15 % and HDFC bank has its cost of capital in excess of 20%. HDFC Bank needs to substitute its Equity and reserves with more of Debt, if it wants to lower down its WACC. Cost of Capital for HDFC Bank is high primarily owing to its huge Cost of Equity which is more than 30%. It needs to substitute more of debt in its Capital Structure if it wants to reduce its hurdle rate. Choice Based on Cost of Capital If one is viewing the affairs og the company based on the Cost of Capital, HDFC gets eliminated without any second thought. It needs to bring down its Cost of Capital if it wants to sustain in the long run. While on the other hand there is not much to choose between ICICI and Axis Bank , as both of them have almost the same hurdle rate close to 8%. PE Ratio Analysis The PE Ratio of ICICI and Axis Bank is very much comparable. ICICI Bank has a PE ratio of around 15 , whereas, the same for Axis Bank Hovers around at 11. One can easily draw a conclusion that investors are willing to pay more for ICICI Bank and also expect a higher growth rate in its earnings in the future. Following Chart depicts the comparative analysis of ICICI Bank along with HDFC Bank and ICICI Bank. It can be clearly seen that the PE ratio of ICICI Bank and Axis Bank are Comparable. But, the PE Ratio of HDFC exceeds 120. One can safely draw a conclusion that the Market Price of HDFC Bank is highly overpriced compared with the Industry average and one can expect a downfall in its share prices in the near future, because such high level of PE Ratio cannot be sustained in the long run. Leverage The Position of Leverages for each of the Banks depict the same story. Following chart will substantiate it: Each of the Banks has a operating leverage lower than 1 , which implies that EBIT is not increasing in the same proportion as the sales of these Banks. Even the degree of financial leverage and the degree of combined leverage of each of these three Banks is comparable and there is not much to choose from when it comes to leverages. Dividend Policy When it comes to total dividend Paid by the Bank, ICICI Bank exceeds the two other Banks with quite a margin. The following Chart depicts the situation more comprehensively: As one can see from the Chart ICICI Bank is the clear leader when it comes to the amount of dividend paid, while there is not much to choose between Axis Bank and HDFC Bank. Total Amount of Dividend Paid doesn’t show the true picture as , it has not been adjusted for number of shares. In other words , Dividend per share will show the appropriate picture. Following chart will depict the amount of dividend paid by each bank per share. As one can see clearly from the graph above , it is the HDFC Bank which is more liberal while declaring the dividend vis-a-vis ICICI and Axis Bank. HDFC pays dividend in excess of Rs 3 per share. ICICI pays a dividend just exceeding a rupee on a share. While, Axis Bank doesn’t even pay 50 paisa on a share. From Investors point of view who wants a steady flow of Income, HDFC stands out to be the most logical choice of Investment. Such an Investor should obviously resist and desist from investing any amount of money in AXIS Bank. How to cite Financial Analysis of Axis Bank, Essay examples

Thursday, December 5, 2019

Protecting of your confidential information - Myassignmenthelp.Com

Question: Discuss about the Protecting of your confidential information. Answer: Introduction This report discusses ecommerce security and proposes development of a secure ecommerce system for which a plan has been proposed using an integrated methodology for the development. The paper covers the problem statement, research objectives, needs for the research, conceptual framework, research questions, methodology for development, data collection methods, and the work break down structure of the ecommerce development project. Rationale Problem domain Ecommerce is a fast growing field that has emerged over past few years only. Ecommerce security concerns are also on rise and thus, security management has become one significant component in the ecommerce development and implementation projects. Attackers use different strategies and come up with new ones every time such as code injection for stealing credit card data. Several security dimensions are affected by these security attacks on software such as system integrity, accuracy, authenticity, availability, confidentiality, privacy, and repudiation. Ecommerce technologies are constantly changing and thus, there is an increased demand for enhancing the security solutions that can meet the demands of ecommerce users (Ma, 2008). Purpose and justification The reason for this paper may be on investigate the most recent patterns What's more innovations in the field from claiming ecommerce security. Ecommerce security being An significant territory from claiming worry today with expanding reception of the engineering organization everywhere throughout the world, a investigation of the thing that security advances alternately progresses are going on on ensure ecommerce starting with security dangers might be an crucial range from claiming ponder. Done UK, the number from claiming ecommerce clients have developed should 92% of the populace and which puts an immense amount from claiming individuals In hazard Assuming that ecommerce platforms need aid not great ensured(OECD, 2008). Sponsor or Supervisor recommendation Exploration of the threats and advanced in the ecommerce security management was recommended by the supervisor. Research Questions What security threats are ecommerce systems facing today? What solutions are used by companies for managing security of the ecommerce system? What latest advances are seen in the field of ecommerce security? How can we develop a secure ecommerce system?(Optus, 2016) Conceptual or Theoretical Framework There need aid mixed bag from claiming security norms that are utilized for securing ecommerce platforms for example, transport layer security (TLS), XML encryption, XML signature, XML enter management specifications, security assertions markup language, and Kerberos(Varmour, 2011). TLS is connected will transport layer for information correspondence Also it gives security will ecommerce administration through authentication, secrecy Furthermore integument. TLS may be a standout amongst those old protocol for Building security in the web space However, TLS layer need confronted security strike for example, renegotiation, padding, breaches, RC4, truncation, et cetera. Later to 2002 went XML encryption which might have been created by W3C Furthermore included encryption from claiming documents What's more information components utilizing calculations like DES, AES, Furthermore RSA. (Security Awareness Program Special Interest Group, 2014). However, this information Might be decrypted Eventually Tom's perusing sending changed cipher-texts. XML marks were afterward included. Similarly, as a security layer that included transmitted message confirmation. However, the framework might have been discovered should be mind boggling Also posture genuine dangers On not executed legitimately. XKMS gives interface the middle of XML What's more KPI in the web space (TrustSphere, 2012). However, it Additionally confronted security dangers in DDOS What's more Answer strike. SAML might have been a open standard code In view of XML that given exceptional verification and commission. Kerberos, a Confirmation protocol gives shared verification the middle of clients What's more servers Furthermore secures frameworks against eavesdropping Furthermore Answer strike. (Luhach, Dwivedi, Jha, 2014). Methodology Research and Systems Development method Figure 1: Integrated Security System Development Framework for Ecommerce (Youseef Liu, 2012) An secure ecommerce improvemen schema might aggravate utilization of a few advancement methodologies similar to amazing programming, coordinated will be What's more security building methodologies. Standard improvement methods in amazing modifying might not have the capacity to completely coordinated circuit those parts of security in the advancement and thus, a intenerated methodology is suggester which incorporates those security viewpoints toward each stage of the improvement transform utilizing i*language(MYOB, 2016). A schema camwood a chance to be suggested which might comprise for three parts including business earth modeling, majority of the data engineering organization framework modeling, Also may be security modeling (Youseef Liu, 2012). Data collection To the advancement of the security framework to ecommerce, An investigation might a chance to be led with respect to how coordinated framework advancement approach meets expectations to which ICT journals, security merchant websites, and exploration reports might a chance to be investigated What's more examined. Grade information might Additionally make gathered from the security experts on comprehend how practically framework camwood worth of effort Furthermore might make produced(Optus, 2016). Ethical Issues Same time gathering grade information starting with security professionals, their customized certain majority of the data might not be recorded so as on look after secrecy Also protection. Also, they might make educated something like the purpose behind directing Scrutinize Furthermore might be given certification that their reactions might best be utilized for those academic motivation(MYOB, 2016). Compliance Requirements The standards defined in a security framework must be complied with. Analysis of data A content analysismightbeutilizedontheinformationwiththought of an understandingoftheadvancementprocedurefromclaimingsecureecommerce framework What's more accordingly; anarrangementmightmakesuggestedcharacterizingpartsforsecureecommerce website. Project Plan Deliverables The project deliverables include: Recommendations on security features that are needed for ecommerce website Security concerns and the solutions to take care of them Recommendations on the development framework to secure ecommerce system Documentation of the process of secure ecommerce system development Work breakdown structure (WBS) 1.0 Literature Review 1.1 Ecommerce 1.2 Security Risks 1.3 Security solutions 2.0 SDLC 2.1 Integrated system 2.2 Study of components 3.0 Data gathering 3.1 secondary data 3.1.1 Journals 3.1.2 Research report 3.1.3 Website 3.2 Primary data 3.2.1 Interviews 4.0 Data analysis 4.1 content analysis 4.2 data analysis 4.3 Framework development 5.0 Prototyping 5.1 security components 5.2 development methodology 6.0 project closure Risk Analysis Risk analysis displays distinctive types of dangers that can happen same time completing those examination venture alongside their likelihood about occurrence, those level about sway they could foundation once one task and the reaction arrangement to manage them. Risk Probability Impact Response plan Information may not be sufficient to design an appropriate solution Medium High Experts can be contacted to fill the information gap in the process Delays spilling over the work beyond timelines. Medium Medium Increase the speed of the remaining work to ensure that the final deadline of the project is met Duration This development project would take 3 months to conduct a research, one month for collecting data needed for development, 1 month for analyzing the collected data and 15 days for the creation of the security framework for the ecommerce website. Gantt chart References Luhach, A. K., Dwivedi, D. S., Jha, D. C. (2014). DESIGNING A LOGICAL SECURITY FRAMEWORK FOR E-COMMERCE SYSTEM BASED ON SOA. International Journal on Soft Computing (IJSC) , 5 (2), 1-10. Ma, D. Q. (2008). A Review of Emerging Technology Trends in E-Commerce. International Technology Management Review , 1 (2), 2-15. MYOB. (2016, September 13). Company file security. Retrieved from MYOB: https://help.myob.com/wiki/display/ar/Company+file+security MYOB. (2016, September 13). Protecting your confidential information. Retrieved from MYOB: https://myob.com.au/myob/australia/myob-security-recommendations-1257829253909 OECD. (2008). Malicious Software (Malware): A security Threat to Internet Economy. OECD. Optus. (2016). Security in the cloud. Optus. Security Awareness Program Special Interest Group. (2014). Best Practices for Implementing a Security Awareness Program. PCI. TrustSphere. (2012). Advanced Security Methods for eFraud and Messaging. TrustSphere. Varmour. (2011). Pathway to Multi-Cloud Security Architecture. Varmour. Youseef, A., Liu, F. (2012). A new Framework to Model a Secure E-commerce System. International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering , 6 (2), 159-164.