Monday, January 27, 2020

Components Of A Good Password Computer Science Essay

Components Of A Good Password Computer Science Essay Computer manufacturer and OS developers often build and deliver systems in default modes to secure the system from external attacks. From developers view this is the most efficient mode of product delivery. As per the organisation or a user, they require more protected and secured system before it is placed into service. Security baselines are standards which defines a minimum set of security controls for organisations. Security baselines typically address both technical issues such as software configuration and operational issues such as keeping applications up to date with vendor patches. In the security baselines, if hardware, OS, network and application followed the recommended minimum set of security settings then it will significantly decrease its vulnerability to security threats. The process of securing and preparing the system against the internal and external threats and system vulnerabilities is called hardening. Reduce the main reasons of attack that includes the removal of unnecessary services, software and unnecessary usernames or logins. It makes the system more secure, reliable, efficient and gives optimised performance. 12.2 Password Selection Password selection is one of the critical activities that often get neglected as part of a good security baseline. Currently most systems are protected by a user ID and password. If an attacker discovers the correct user ID and password by guessing or by using freely available password cracker tools, then they can gain access to the system. By following basic guidelines and principles in choosing passwords, the passwords used on the system will protect the assets. 12.2.1 Selecting a Password Users should consider a few basic requirements while choosing the password. Set a minimum number of characters and never accept shorter password. Do not use dictionary words and mix of lowercase and uppercase letters with usually one or two numbers. Randomly created passwords are strong passwords and they are difficult to guess and will defeat most password-cracking utilities. However, randomly generated passwords are difficult to remember and users often write down these passwords usually in a location close to the machine. Thus it defeats the purpose of the password. 12.2.2 Components of a Good Password User should create their own easy to remember passwords. Password is meant to protect access and resources from hackers. It should not be easy for them to guess or crack through password cracking tools. Common guidelines to make the password more difficult to guess or obtain are as follows: It should be at least eight characters long. It should include uppercase and lowercase letters, numbers, special characters or punctuation marks. It should not contain dictionary words. It should not contain the users personal information such as their name, family members name, birth date, pet name, phone number or any other detail that can easily be identified. It should not be the same as the users login name. It should not be the default passwords as supplied by the system vendor such as password, guest, admin and so on. 12.2.3 Password Aging Password aging is technique used by system administrators and it forces the user to change their passwords after specified period of time. If it is not changed within a specific period of time, it expires and must be reset. Password aging can also force a user to keep a password for a certain number of weeks before changing it. Changing passwords periodically will protect against brute-force attacks because when password is changed the attacker must restart the attack from the beginning. If password is changed periodically, an attacker will never be able to cycle through all the possible combinations before the password is changed again. Most operating systems have options that allow system administrators to apply password aging and prevent password reuse. Common guidelines are as follows: User must change their passwords in every 60 to 90 days. A very secured service requires to change passwords every 30 to 45 days. System must remember each users last five to ten passwords and should not allow the user to reuse those passwords. 12.3 Hardening Most computers provide network security features to control outside access to the system. All nonessential softwares such as spyware blockers and antivirus programs prevent malicious software to run on the system. Even with all these security measures, systems are still vulnerable to outside access. System hardening is a step by step process of securely configuring a system to protect it against unauthorised access. It also helps to minimise the security vulnerabilities. The three basic areas of hardening are as follows: Operating system-based hardening It includes information about securing and hardening various operating system. It also includes methods to secure file systems. Network-based hardening It examines the methods and procedures of hardening network devices, services and protocols. Application-based hardening It includes security of client-side user applications and services such as Domain Name Service (DNS), Dynamic Host Configuration Protocol (DHCP) and Web servers. 12.3.1 Operating System-Based Hardening Operating system hardening is the first step towards safeguarding systems from intrusion. Systems received from the vendors have preinstalled development tools and utilities which are beneficial to the new user as well as it also provide back-door access to an organisations systems. Operating system hardening includes the removal of all non essential tools, utilities and other systems administration options through which hackers can easily access the system. Hardening process will ensure that all security features are activated and configured correctly. This process makes the system secure, efficient, reliable and gives optimised performance. Some of the security tips to harden the OS include the following: Disable all unnecessary protocols. Disable all unnecessary services. Disable all unnecessary programs and processes. Verify and then install all vendor patches. Install all product updates. Use vulnerability scanner to identify potential security weaknesses. Configure file system security according to the least privilege rule. Note: Least privilege rule states that, allow access to those individuals who require it and allow only as much access required to complete the task. File System Controlling access to the resources is an important factor in maintaining system security. The most secure environment follows the rule of least privilege. The network administrator receives more complaints from users after following this rule as they are unable to access resources. However, receiving complaints from unauthorised users is more beneficial than suffering access violations that damage the organisations capability to conduct business. The least privileged environment can use the user groups to assign the same access to the resources instead of assigning individual access controls. However, in some cases individual users need more or less access than other group members. To maintain security, network administrator provides greater control over what each user can and cannot access. Updates OS updates are provided by the manufacturer of the specific component. Updates contain improvements to the OS and hence, will make the product more secure, efficient and stable to the users. For example, Microsoft updates are labelled with security updates. These updates address security concerns recognised by Microsoft and install them if required. In addition, updates enhance the capability of a specific function that was underdeveloped at the time the system or application was released. Updates should be thoroughly tested in non-production environments before implementation. Since this new and improved function has more security breaches than the original components, it requires complete testing. Hotfixes, security packs and patches are product updates to resolve a known issue. Hotfixes Hotfixes are components that are designed to fix a particular critical system fault. Hotfixes are created by the vendor when a number of client systems indicate that there is compatibility or functional problem with a manufacturers products used on a particular platform. These are fixes for reported or known problems. Hence, hotfixes should only be installed to correct a specific problem. Service Packs Service packs are collection of updates or hotfixes. It correct known issues and provide drivers, updates and system administration tools that extends product functionality that include enhancements developed after the product is released. Service packs are tested on different hardware and applications to ensure compatibility of existing patches and updates. Service packs must be thoroughly tested and verified in non-production environment before it installed on working systems. Patches Patches are used to prevent hackers from invading the system with virus and other malware that exploits the operating systems vulnerabilities. This improves the usability and performance of the system. OS patches are available on the vendor Website that supplies the product. Since patches are issued at unpredictable intervals, it is important to configure the system to automatically connect with the latest security patch updates. When the new update is released, the OS will prompt to install. While preparing clean installation it is advisable to download and install all known patches before introducing the system to the network. 12.3.2 Network-Based Hardening The tremendous growth of the Internet allows to openly access any system on a network. Hence, proper control over network access must be established on systems by controlling the services that are running and the ports that are opened for network access. In addition to the systems, network devices such as hub, routers, switches and modems must be examined for any security vulnerability. Any flaws in the coding of the OS can be exploited to gain access to the network components. These components should be configured with very strict parameters to maintain network security. The softwares of these components require to be updated regularly. By taking necessary steps, network administrator should limit or reduce attacks, accidental damage through their networks. In addition, network hardening also recommend the correct configuration of network devices and the requirement to enable and disable the services and protocols within a network. Firmware Updates Updating the firmware of the hardware device is provided by the manufacturers. These updates fix incompatibility problems or device operation problems. These updates should be applied if the update includes fixes for an existing condition or if it will make the device more secure and more functional or extends its operational life. It is recommended to install and test the firmware updates in a non-production environment to verify if the update contains the necessary fixes and benefits that are required. Device Configuration Network devices such as routers and switches configured with default installation settings. These default settings leave a system extremely vulnerable as it is set for convenience and not for security. Choosing a good password and limiting access to any open ports is very important in maintaining security of the devices. Good passwords are one of the most effective security tools because a good password can be resistant to several forms of attack. Determining the minimum set of services that the devices are running and good passwords is important for maintaining security of those devices. Apply patches and updates that are released by the product vendor in a regular interval. Enabling and Disabling Services and Protocols It is important to measure the current requirements and conditions of the network and infrastructure and then disable the unnecessary services and protocols. This leads to network infrastructure that is less vulnerable to attack. Access Control Lists Configure access list at the network devices to control access to a network. Access list can prevent certain traffic from entering and exiting a network. Access control lists are controlled by an administrator. 12.3.3 Application-Based Hardening Application hardening is the process to prevent exploitation of various types of vulnerabilities in software application by implementing the latest updates. Applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, File Transfer Protocol (FTP), DNS servers and DHCP servers on a network require regular updates to provide protection against newly developed threats. Web Servers At present most of the organisations have a Web presence on the Internet for numerous business advantages. Due to Internet popularity, Web servers have become extremely popular targets for attackers. Original content on the Websites are replaced with hackers data. E-commerce sites are attacked and users personal account information is stolen. Microsofts Internet Information Server (IIS) or Apache server are most popular Web servers applications in use today. To secure Web servers from hackers, administrator must apply updates and patches, remove unnecessary protocols and services and properly configured all native controls. It is also recommended to place the Web server behind a firewall or a reverse proxy. Microsoft has developed URLScan and IIS Lockdown tools which are designed to secure IIS servers from attacks and exploits. URLScan is a monitoring utility that examines all incoming URLs and rejects any requests for files, directories or services outside the intended scope of the Website. The IIS Lockdown tool turns off unnecessary functions which reduces the attack surface available to an attacker. E-mail Servers E-mail servers and clients are vulnerable to different attacks such as Denial of Service (DoS) attacks, virus attacks, relay and spoofing attacks. There are numerous deficiencies in the different versions of e-mail server software such as Sendmail for Linux and UNIX and the Exchange or Outlook for Microsoft. E-mail servers are constant potential sources of virus attacks and therefore must have the strongest possible protection for scanning incoming and outgoing messages. E-mail servers should not have non-essential services and applications installed. Administrative and system access should also be securely controlled to block installation or execution of unauthorised programs and trojans. The following attack points should be considered while hardening an e-mail server: Open mail relay allows unauthorised users to send e-mail through an e-mail server. Storage limitation, to limit DoS attacks based on message size. Spamming includes identical messages sent to numerous clients by e-mail. Virus propagation, ensure the anti-virus programs and applications are performing correctly. FTP Servers FTP allows number of users to access and download remotely stored data. It distributes application updates, device drivers and free software to users. Users access this data anonymously. This anonymous access to FTP servers becomes a problem as administrator does not provide anonymous access or does not properly secure the FTP service. This involves setting the appropriate permissions, not allowing the FTP process to be run by an unprivileged user and not allowing users to upload or modify files. Some FTP servers allow upload and download service for authorised users and hence, in that case anonymous access should be completely removed. To overcome buffer overflow problem ensure that FTP server software is up to date and patched. DNS Servers DNS server converts systems host names into IP addresses so that the communication can be correctly routed through the network. Client systems use DNS to locate Web servers, e-mail servers, FTP servers and number of other servers and network services. DNS can be major target for an attacker. The DNS server can be exploited by the following ways: Stealing zone transfers DNS servers are configured to provide information such as list of hosts and routers with IP addresses to other secondary DNS servers. This secondary DNS server is used to maintain a backup copy of the DNS database and to provide name resolution services for client systems. An attacker can receive a zone transfer and use it to track victims network and search for potential targets. Zone update spoofing An attacker can spoof the address of the primary DNS server and send a bogus update to a secondary DNS server. Client systems receive incorrect information and network communication from this bogus server and redirects users to a location controlled by the attacker. DNS cache poisoning Some DNS servers allow attackers to insert bogus information into a DNS cache. To secure and harden the DNS server from various types of exploits, actions to be taken are as follows: Do not place any information on publicly accessible DNS server to avoid snooping around the DNS server. Do not provide additional host information in Host Information (HINFO) records of DNS. HINFO record contains descriptive information about the OS and features of particular system and attacker could use this information to gain access. Configure the DNS servers to only allow zone transfers to specific secondary servers. Berkeley Internet Name Domain (BIND) allows zone transfer to be signed. Zone transfer signing allows secondary servers to verify the credentials of the primary server before accepting data. Ensure that DNS software is patched and up to date to avoid DNS cache poisoning. NNTP Servers Network News Transfer Protocol (NNTP) servers allow news clients to connect to news servers to share information privately or to post articles to a public NNTP server. NNTP servers are vulnerable to DoS attacks, buffer overflows. To exploit server, attackers connect to a private NNTP server to gain any information to compromise network. Sometimes users post accurate diagrams of their network to ask a technical question and attacker can use this information to find ways to exploit a network. They can even offer bogus advice to create a hole in the networks defences. To protect the organisation from NNTP server exploits, block the NNTP port at the firewall to make NNTP server inaccessible to external users. To protect posted private information, authenticate user to prevent anonymous logins to the NNTP server. Also encrypt communications using SSL/TLS to prevent packet sniffing of confidential data. Do not allow users to post confidential information to the public which will compromise their network. File and Print Servers Files and print servers in a network are used to share resources but it is a common way in which hackers can gain information and unauthorised access. When sharing is enabled to share the resources with a trusted internal network over a NIC, the system is also sharing those resources with the entire untrusted external network over the external interface connection. Attackers attempt to make unauthenticated connections to shared resources on the network. If sharing permissions are configured incorrectly for an easily exploited user account, attackers can gain access to resources and alter them. To secure the file and printer shares block access to shares and related information at the firewall. Use the rule of least privilege to secure shares from external attacker. Virtual Private Network (VPN) is also used to encrypt communications between clients and servers to secure data transmission. Data Repositories Data repositories are locations that hold information about networks, applications and users. Attackers can use the information stored in data repositories to formulate attacks against organisation. Hence, ensure that this information is limited and restricted for external users. As well as authentication and encryption of the data is necessary to protect them from external attacks. Directory Services A directory service is used to store, organise and provide access to information in a directory. The information in a directory services can include system accounts, user accounts, mail accounts, service locations and shared resource information. The Lightweight Directory Access Protocol (LDAP) is a common directory service that organises data in a hierarchical manner. The top entry in a LDAP directory information tree is called root and this LDAP root server creates the hierarchy. The directory service hierarchy and the information it stores provide a good map of network infrastructure. This is convenient for authorised users in a network as well as for attacker. Attacker can use numerous ways to compromise LDAP servers such as attacker can use network resources information stored at directory service to examine network structure, resources and potential targets. Attacker can gain victims network information that is transferred over LDAP through eavesdropping. Some of the ways to protect LDAP hierarchy are as follows: Protect LDAP hierarchy by configuring the strongest authentication to the different versions of LDAP. Both LADP v2 and LDAP v3 support anonymous and simple authentication which are not very secure. Anonymous authentication does not require password and simple authentication uses a password in unencrypted format which attacker can easily hack. Strong authentication over LDAP v2 and LDAP v3 is provided through Kerberos version 4 authentication and Simple Authentication and Security Layer (SASL) communications respectively. Use Secure LDAP (LDAPS) that allows encrypting communications using SSL/TLS. Block access to LDAP ports from the Internet so that attackers cannot make connections using these ports. Databases Database servers are used to store data. Both the data and the database server can be target for an attacker. An attacker can steal the data or take over the database server to exploit it. Some of the ways that the database servers can be exploited are as follows: Unexpected data queries or commands Numerous database servers use Structured Query Language (SQL) which allows for the querying and posting of data. An attacker can use SQL commands to do unexpected things is called SQL injection. Unauthenticated access If unauthenticated access to database server is allowed then the attackers can easily connect and exploit the database server. To secure database servers consider the following points: Test the database by running irrelevant queries and attempt to access unauthorised information. Do not allow unauthenticated connections to the database server. While transferring confidential data to and from database server, use SSL/TLS or VPN connection to protect data. To avoid database server to be queried by external users, block access to it at the firewall. 12.4 Chapter Review Questions 1. How an individual should secure a password? (A) Selecting a password with at least eight characters, at least one change in case and at least one number or special character (C) Storing the password in wallet or purse (B) Using the same password on every system (D) Changing passwords at least once a year Ans: A 2. Which of the following steps is part of the hardening process for OS? (A) Remove unnecessary programs and processes (C) Setting appropriate permissions on files (B) Disable unnecessary services (D) All of these Ans: D 3. Which amongst the following is the correct step to overcome buffer overflow problems? (A) Select strong passwords (C) Install the latest patches (B) Remove sample files (D) Set appropriate permissions on files Ans: C 4. Which of the following requires software up to date and patched? (A) Operating systems (C) Applications (B) Network devices (D) All of these Ans: D 5. Rule of least privilege states that ____. (A) allow access to users who requires it (C) allow limited access (B) allow access to everyone (D) allow full access Ans: A and C 6. Which of the following is designed to fix a particular critical system fault? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: A 7. Which of the following extends product functionality after the release of product? (A) Hotfixes (C) Patches (B) Service packs (D) None of these Ans: B 8. Which of the following fixes incompatibility problems or device operation problems? (A) Hotfixes (C) Firmware update (B) Service packs (D) None of these Ans: C 9. Which of the following steps are used to secure Web servers? (A) Apply patches and updates (C) Place the web server behind a firewall (B) Remove unnecessary protocols and services (D) All of these Ans: D 10. BIND stands for _______. (A) Berkeley Internet Network Domain (C) Berkeley Intranet Name Domain (B) Berkeley Internet Name Domain (D) Business Internet Network Domain Ans: B 12.4.1 Answers 1. A 2. D 3. C 4. D 5. A and C 6. A 7. B 8. C 9. D 10. B Summary In the chapter, Security Baselines, you learnt about: Components of a good password and password aging. Different ways to harden the OS. Different ways to harden the network and its devices. Different ways to harden applications such as browsers, office suites, e-mail client and services provided through servers such as Web servers, E-mail servers, FTP servers, DNS servers, NNTP servers, file and print servers, directory services and databases.

Sunday, January 19, 2020

Essay --

Latin American countries should provide free birth control devices to all its citizens. Giving free birth control devices will cause a cascade effect that will help these countries that are in poverty. Since many of these Latin American countries are in poverty such as Brazil, Colombia and Guatemala it will make these countries have less deaths, crime and drug trafficking. In many of these countries there are huge amounts of drug trafficking and gang violence happening in these same countries that have a huge poverty and high amount of children born. Since many of these children are born with poverty they struggle to eat. Providing birth control devices for the Latin American countries would allow a lesser birth rate in these countries allowing these family to afford a living rather than having to survive whether it be legal or not. Since these countries are not providing birth control devices there is a high birth rate that far exceeds the income that one can provide. However there are many different ways that are birth control such as pills, condoms, etc.; since none of these devi...

Saturday, January 11, 2020

Part a Critical Analysis of Project Management Plan

Part A Critical Analysis of Project Management Plan Executive Summary Table of Contents 1 Introduction This report will present the critical analysis about humanities financial services review project management plan. The purpose of the report is to apply the different theories and ideas regarding the project management plan. The main purpose of the critical analysis is to critique as well as evaluate somebody’s work based on the opinion, idea and perspective of someone. It is an academic report that contains a description of the project plan (part B) as well as its content.This report will also express the opinion of the author with regards to the different part of the project management plan that has chosen. It will analyze the whole project plan by breaking down the project into parts and then studying and evaluating each and every part using the support and help of different references from different books, journals and other related studies. This report will also show the importance of a project plan and who will be benefited from its use and implementation. The structure of the report will follow the structure of the chosen project plan.It will individually analyze the different part or aspect of the project plan based on the project management body of knowledge. The main focus of the report is to give analysis about the different important aspect of the project management plan such as the time or schedule, money or cost, human resource or work breakdown structure as well as different risk that can be encountered by the project during the implementation of the plan. 2 Project Background 2. 1 Information about the Work 2. 1. 1 Title: Humanities Financial Services Review Project Management Plan . 1. 2 Author: Craig Medley 2. 1. 3 Publication Information: Project Id HUM-PR-P1, v. 04 Draft, August 30, 2007, from http://edo. humanities. curtin. edu. au/pdf/Project_Managem ent_Plan_2007. pdf 2. 2 Project Description The chosen document focuses on the pla n for the management of the humanities financial services review project. It was written in order to show or review the different areas or aspects of the newly implemented new transactional systems in November 2007, with an upgrade to the finance one to the Concur and BPI in Humanities only.It can help to know the different processes and flow of data and information of its accounting and purchasing transactions across each and every division (Medley 2007, p. 4). The Faculty of the Humanities of the Curtin University of the Technology offers different courses in Media, Communications, Built Environment, Art and Design, Education, Languages, Human Services as well as Social Sciences. All f the said courses are only few of the courses that the said department of the Curtin University is offering (Faculty of Humanities 2008).The project plan focuses on the implementation of the finance and accounting system of the department that focuses on the needs of the users of the system like invo icing, ordering, approving, reconciling, access to the system, structure of the outputs, skills and request and access for the different outputs (Medley 2007, p. 4). The project management plan will help the current system to improve its operations and increase the security that will eventually help to meet the demands and needs of the different stakeholders or users. Structure and contents of the Project Plan 3. 1 Project Management Plan and Its Purpose 3. 1. 1 What is Project Plan? Project management plan or simply project plan is a document that corresponds to the overall purposes or objectives, responsibilities, resource requirements and agenda for the project (Baker & Baker 2003, p. 29). It is considered as more than a playbook that determine what are the different works or task that are need to done and accomplish (Phillips 2004, p. 32). It is a fluid document that controls the following elements: Provide structure – project plan is developed in order to present a struc ture or composition in order to get the project to its completion. It must be methodical and systematical but brief and short, compilation of different documents that serves as a point of references in the course of the project implementation (Phillips 2004, p. 32). ? Provide Documentation – documented project plan is needed in order for the project to be a successful one. This is due to the fact that it must present historical references and the different reasons behind the decisions that have been made (Phillips 2004, p. 32). Provide Baselines – a project plan includes a number of baselines. As the project shift towards the finishing point, the management together with the stakeholders and the project managers can use the project plan in order to see what was predicted for the costs, schedules, qualities and scopes – and compare it to the present condition (Phillips 2004, p. 32). Project plan is the output or result of the planning phase that confines the diff erent information that has been observed and fulfilled with the team and lays out the different activities and processes about how the project will be carried out.It also represents the projected reality (Martin & Tate 2001, p. 155). 3. 1. 2 Purposes and Importance of the Project Plan The major function of the project plan is to provide a step-by-step insight into what it takes in order to satisfy the requirements or the needs of the system (Frame 2002, p. 97). An inclusive and fittingly comprehensive project plan is essential to a successful completion of any project. It can help to direct the project itself.Without the aid or help of a project plan, it will hard and even impossible to lead a group to carry out their different responsibilities in order achieves their common goal (Baker & Baker 2003, p. 29). It is a directing document of the project management that serves up as a storage area for all of the supplementary plans. It is a guiding document for the project and it’ s intrinsically needs to replicate all of the information that is critical or crucial to the project manager, project team, customer as well as management sponsor. It offers broad direction as to the cost, schedule and requirements baselines.In its thorough and comprehensive form, it provides much more exact and precise guidance on the nature of the components of the different supporting plans (Pritchard 2004, p. 100). 3. 2 Stakeholder of the Humanities Financial Services Review Project Management Plan The main audience or target of the humanities of the financial services review project management are the higher officials who are involved in the overall process and management of the different financial and accounting activities in the humanities department of the   Curtin University of the Technology.The plan will focus on the review of the different areas of the current system of the humanities of the Curtin University of the Technology such as the different internal process flo ws such as invoicing, ordering, approving as well as reconciling; the number of the people or the user that can access the systems of the Concur and the Finance One; the structure of the invoicing as well as procurement function as well as the different responsibilities and functions of each and every users; the different skills of every users; the different uses and what they are used for such as the request for the Curtin tax invoice and its different uses and the different types of transactions that are involved with the credit card or purchase request (Medley 2007, p. 4).All of the said information together with other result of the review will be helpful for the management in order for them to improve the current system of the Humanities department that will ensure competitive advantage for their part because it can make the life of their stakeholders a lot easier. It can also help them to excel in their different operations as well as to ensure or add their financial security. 3. 3 Structure of   Ã‚  Ã‚  Ã‚  Ã‚   the Humanities Financial Services Review Project Management Plan 3. 4 Different Sections of the Humanities Financial Services Review Project Management Plan 4 Conclusions 5 Recommendations Part B Humanities Financial Services Review Project Management Plan 1 Introduction 1. 1 About this Document This document provides a plan for the management of the Humanities Financial Services Review Project. 1. 2 BackgroundNew transactional systems and processes have been implemented recently, being Concur and BPI (Humanities only) with an upgrade to Finance One to occur in November 2007. In addition, the Division is looking at ways in which to best undertake support activities including purchasing and accounting to ensure that efficiencies are obtained. A Financial Services Office is already operational and undertakes some financial processes i. e. electronic processing of credit card transactions. Based on the above, it is now timely to review current sys tems, processes and structures which accounting and purchasing transactions operate under across the Division.The areas that would be reviewed include but are not limited to; internal process flows (including invoicing, ordering, approving and reconciling), the number of people with access to systems (both Concur and Finance One), the structure of the invoicing and procurement function (who does what), skills, and how systems are used and what they are used for (e. g. request for Curtin tax invoice, what are allonges used for, what type of transactions are going through credit cards / purchase request). 1. 3 Project Sponsor The Project Sponsor is Ken McCluskey 1. 4 Project Manager The Project Manager is Craig Medley. 1. 5 Project Team The Project team is comprised of Raymond Seah and Craig Medley 1. 6 Key StakeholdersThe key stakeholders (Humanities only) of this project include: Executive Dean Deans Review Panel 2 Project Scope 2. 1 Strategic Link This project specifically contribu tes towards to the following strategic objective(s):  §Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Excellence in operations  §Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Financial security 2. 2 Project Benefits The expected benefits and impacts of the project deliverables are: ? Improved definition and understanding of the role / scope of work of the Financial Service Office in Humanities, ? Roadmap and high level implementation plan for the agreed changes, ? Improved efficiencies and effectiveness of processes within Humanities through standardization and centralization where identified, Potential cost savings and risk reduction in procurement and credit cards processes / systems. 2. 3 Project Deliverables The project’s key deliverables are: Document / s covering: ? Matrix of processes and systems under Humanities Financial Services Office and respective Teaching Areas, ? Services identified for improvement via end to end processing / procurement arrangements / invoicing, ? Recommended proces s flow for identified services, ? List of service deliverables (with the resource requirement) of the Humanities Financial Services Office, ? Policies to support recommended services, ? High level implementation plan 2. 4 Out of Scope The following items are considered out of the scope: ? Implementation of recommendations Expenditure incurred whilst traveling (this may be included at a later date) 2. 5 Work Breakdown Structure (WBS) The project tasks to produce the project deliverables are listed in the Gantt chart at Appendix B1. 2. 6 Constraints The following key project constraints were identified: ? Availability and willingness of staff to contribute ? Data quality 2. 7 Assumptions The following key assumptions influenced the development of this Project Management Plan: ? All staff will be available as required 3 Project Time Schedule 3. 1 Schedule The detailed project schedule is provided in the Gantt chart at Appendix B1 4 Project Costs 4. 1 Budget summary The budget breakdown is summarized as follows: Resource Type |Total Cost ($) |Hours | |Human resources |$30,000 | |Equipment and products | |Consumables | |Totals |$30,000 | |   |   |   |   | The Communication Plan examines the key contacts, frequency of communications, and communication medium to be deployed.It is used to ensure adequate consideration has been given to consultation and information dissemination. It is attached as Appendix D. 5 Project Accountabilities 5. 1 Project Organizational Chart The Project Organizational Chart provides a visual representation of the project team and project reporting structure. It is attached as Appendix B. 5. 2 Responsibility Assignment Matrix The Responsibility Assignment Matrix outlines responsibilities allocated to individuals for each task. It is attached as Appendix C. 5. 3 Project Sponsor The roles and responsibilities of the Project Sponsor include: Responsibility to senior management for the project;Endorsing this document to confirm that proj ect scope and deliverables are correct; Approving changes to scope, schedule, and quality; Reviewing progress and providing strategic direction; Resolving issues beyond the Project Manager’s authority; Providing the resources and sponsorship for the project; and Examining the project at completion2 and completing a Project Sign-off form. 5. 4 Project Manager The roles and responsibilities of the Project Manager include: Managing the day-to-day operations of the project to ensure the project deliverables are produced to scope, schedule, and quality; Monitoring and controlling the Project Management Plan;Providing status reports to the Project Sponsor; Leading the project teams to meet the project objectives; Undertaking the tasks assigned, as specified in the Responsibility Assignment Matrix (refer Appendix C); and Consulting with the Project Sponsor and key stakeholders to maintain communications and keep parties up to date on project progress. 6 Communications Plan 6. 1 Plan The Communication Plan examines the key contacts, frequency of communications, and communication medium to be deployed. It is used to ensure adequate consideration has been given to consultation and information dissemination. It is attached as Appendix B4. 7 Risk Management Plan 7. 1 Risk AssessmentThe Risk Management Plan, attached as Appendix B5, examines risks, rates those risks and identifies potential treatment strategies. 8 Project Control 8. 1 Progress Reporting The Project Management Plan will be controlled on a regular basis, by means of completing Project Status Report to the Project Sponsor on a fortnightly basis. The key elements are scope, schedule, and risk, with the control process comprising: †¢ Monitoring and measuring performance; †¢ Comparing performance to this plan; †¢ Reporting on deviations and issues; and †¢ Taking corrective action (where necessary). 8. 2 Change Management Any proposed changes to the scope or quality will be processed as follows: Proposed changes will be evaluated on the basis of their impact on the project process and outcome, and in light of reasonable alternatives; ? Proposed changes will be formally recorded on a Project Change Control report and submitted to the Project Sponsor; ? The Project Sponsor will review proposed changes, and either accept or reject them; and ? Accepted changes will be communicated to all concerned stakeholders, and project documentation will be amended accordingly. Appendices Appendix A1 Project Management Areas of Knowledge and Its Process ? Appendix B1 Task, Schedule & Gantt Chart Adapted from (PMI Standards & Duncan 1996, p. 7) Appendix B1 Timeline/ Gantt Chart Appendix B2 Project Organizational Chart Appendix B3 – Responsibility Assignment Matrix ID |WBS TASKS |Project |Team Member |Review Committee |Sponsor | | | |Manager | | | | | | |Craig |Raymond |Ken |   | |1 |Policy review |R |I |N |I | |2 |Purchase to Pay Stream |R |I |N, C |A | |2. 1 |Data analysi s |R |I |N, C |C | |2. 2 |Data modelling |R |I |N |N | |3 |Invoicing Stream |N, I |R |I, C |I, C | |3. |Invoice profiling |N, I |R |N |N | |3. 2 |Develop process documentation |N, I |R |N |N | |3. 3 |Present P2P and Invoice data |R |I |N |N | |4 |Interviews |R |I |I, C |C | |4. 1 |Define questions |R |R |C |I | |4. 2 |Agree on questions |R |I |C |A | |4. |Conduct interviews |R |R |I, C |N | |4. 4 |Collate information |R |I |N |N | |4. 5 |Develop activity lists / |R |R |I |N | | |matrices | | | | | |4. 6 |Develop process maps |R |R |N |N | |4. 7 |Review process maps with users|R |R |I |I | |4. |Present findings |R |I |N |C, I | |5 |Recommendations development |R |R |I |I, A | |5. 1 |Analyze prior findings |R |I |N |N, I | |5. 2 |Brainstorm options |R |I |I |I | |5. 3 |Develop recommendations |R |I |I |I | |5. 4 |Review recommendations |R |I |I |I | |5. 5 |Finalize ecommendations |R |I |A |A | |   | |LEGEND | |R – Responsible for executing activity A – Approval author ity | |I – Provides input C – Consulted | |N – Notified | APPENDIX B4 – Communication Plan Stakeholder |Information To Be Communicated|Frequency |Medium |Responsible |Timing | |Faculty/Area Administration staff affected by this review | |Review Panel |Request for feedback on the |Once before the |Meeting |Project Sponsor, |31st August | | |draft project plan and |project is | |Chair of panel & | | | |outlining next steps |officially kicked| |Project Manager | | | | |off | | | | |Executive Dean |Presentation of the draft |Once before the |Meeting |Project Sponsor and |Beginning of Sept 07 | | |project plan. The purpose of |project is | |Project manager | | | |the project; next stage on |officially | | | | | |from previous financial |kicked-off | | | | |services review project | | | | | | |looking at financial | | | | | | |transactional processes & | | | | | | |where these could be improved | | | | | | |& additional services that may| | | | | | |then res ide within the | | | | | | |division’s financial Services | | | | | | |office in the future. | | | | | |Representative from |Outline of Humanities |Prior to project |Meeting & Emails |Project Sponsor and |1st meeting end of August | |Price Waterhouse looking|Financial Services Review |kick-off | |Project Manager | | |at standardization of |project and the Project Team’s| | | | | |processes & systems |approach.Also to gain input | | | | | |across the organization |into the project depending on | | | | | | |some of the objectives that | | | | | | |Price Waterhouse have been | | | | | | |tasked with. | | | | | |Executive Dean and Deans|Kick-off Project, Project plan|At start of Presentation at HMB |Project Sponsor & |10th Sept | | |- main project objectives, |Project | |Project Manager | | | |communications plan, risks & | | | | | | |key areas being covered in the| | | | | | |project | | | | | |Project Sponsor |Project Status updates – |Fortnightly |Meeting |Projec t Manager |Starting 5th September | | |activities, key findings and | | | | | | |issues | | | | | |Financial Services |Introduce the new Associate |Once |Meeting |Project Sponsor, |Approx 3rd week in Sept | | |Director Transaction services | | |Project Team, & | | | |to the project and go through | | |Chair of Review | | | |project plan & request his | | |Committee | | | |involvement on the review | | | | | | |committee | | | | | |Review Committee |Introduction of the new |One of three |Committee meeting |Chair of Review |Towards end of September | | |Associate Director Transaction| | |Committee & Project | | | |services to the review | | |Manager | | | committee as a new member, | | | | | | |Also Summarization of | | | | | | |activities, findings at end of| | | | | | |Purchase to Pay Stream Phase | | | | | | |plus next steps | | | | | |Faculty/Area |General communication to staff|One of three |One on One meetings |Review Panel Members|Towards end of Sept | |Administration staff |in their area about the 1st | | | | | |affected by this review |phase i. e.P2P & Invoicing | | | | | | |quantitative analysis | | | | | |Review Committee |Summarization of activities, |Two of Three |Committee meeting |Project Manager |Towards end of October | | |findings at end of Invoice | | | | | | |Phase plus next steps | | | | | |Faculty/Area |General communication to staff|Two of Three |One on One meetings |Review Panel Members|Towards end of October | |Administration staff |in their area about the 2nd | | | | | |affected by this review |phase i. e. Interviews | | | | | |Review Committee |Review of draft |Three of Three |Committee meeting |Project Manager |Mid November | | |recommendations and gather | | | | | |feedback for inclusion in | | | | | | |final report | | | | | |Faculty/Area |General communication to staff|Two of Three |One on One meetings |Review Panel Members|Mid November | |Administration staff |in their area about the | | | | | |affected by this review |‘draf t’ recommendations | | | | | |Executive Dean and Deans|Project Outcomes and |Conclusion |Presentation at HMB |Project Sponsor and |Early December | | |Recommendations | | |Manager | | Appendix B5 Communication Plan Calendar *Note – Meeting dates with exception of HMB are indicative and subject to change Appendix B6 Risk Management Plan Legend for the Risk Management Plan Defining Likelihood Ratings The following table outlines the definition of likelihood rating as applied to the risk assessment. Descriptor |Definition | |Almost certain |Expected to occur in most circumstances | |Likely |Will probably occur in most circumstances | |Possible |Might occur at some time | |Unlikely |Could occur at some time | |Rare |May only occur in exceptional circumstances | Defining Consequence Ratings The following table outlines the definition of consequence rating as applied to the risk assessment. Consequence |Project Consequence | |Catastrophic |Unacceptable effect on project ob jectives | |Major |Major effects on project objectives, requiring significant effort to rectify. | |Moderate |Moderate effects on project objectives, requiring management effort to rectify | |Minor |Some difficulties experienced, but these are easily managed. | |Insignificant |No noticeable effect on project management objectives | Defining Risk Rankings The following table outlines the definition of risk categorizes, determined by combining the likelihood and consequence of a risk. RISK FACTOR |Insignificant |Minor |Moderate |Major |Catastrophic | |Almost |Low |High |High |Extreme |Extreme | |certain | | | | | | |Likely |Low |Moderate |High |Extreme |Extreme | |Possible |Low |Moderate |High |High |Extreme | |Unlikely |Low |Low |Moderate |High |High | |Rare |Low |Low |Low |Moderate |High |

Friday, January 3, 2020

Competition Is The Cornerstone Of Capitalism - 1499 Words

Competition is the cornerstone of capitalism. It creates rivalry among businesses to produce quality goods and services at competitive prices. This gives consumers a better sense of variety when making purchases. Competition in its purest form creates small buyers and sellers none of which are too large to negatively affect the market as a whole. Competitive markets can be dated back to ancient times when merchants competed in foreign trade. In the 19th century economists considered competition as a natural phenomenon in which growth of an operation was fueled by supply and demand in a free market economy. They also believed that supply and demand worked better in a laissez faire type environment. This was possible through freedom to trade, transparent knowledge of market conditions, no government restrictions on trade, and access to buyers and sellers. These conditions prevented any buyer or seller to significantly affect the market price of a single commodity. After the mid 1800â⠂¬â„¢s, limitations to compete became evident during the industrial revolution. Corporations achieved manufacturing capabilities that would surpass their competitors and would allow them to fix prices and squeeze out their rivals. Eventually some businesses became so large that they controlled enough market share to deceptively manipulate prices in their industry. This activity created an atmosphere for President Theodore Roosevelt to launch his famous trust busting campaigns. The era of antitrustShow MoreRelatedCommunism, Capitalism, and Socialism Essay652 Words   |  3 PagesThree different types of economic systems used by governments are Communism, Capitalism, and Socialism. Each type of system is unique in different ways. Each has distinct aspects that make it what it is. In communism, the government runs everything and there are no social classes. The government in capitalism doesn’t interfere with any businesses and lets the citizens own and operate them. Social ism is basically a mixture of the two economic systems. The government runs certain businesses,Read MoreThe New Deal: Radical Policies towards a Conservative Goal1539 Words   |  6 Pagespolicies that gave the federal government unprecedented power in the nation’s economy and society, however, the New Deal did not bring America out of the Great Depression and could be considered conservative in the context of the era, ultimately saving capitalism from collapsing in America. Many of the New Deal’s relief programs were revolutionary; the federal government was now responsible for relieving the problems of society previously left to individuals, states, and local governments. Work relief programsRead MoreThe Major Systems Of The World Capitalistic And Socialistic2278 Words   |  10 PagesThere are two major systems in the world capitalistic and socialistic. Both are quite different. Both systems are competing for moral standing. Capitalism is about you pursuing your own goals without caring about the others. Socialism is about you pursuing goals with others in mind at the same time. The question is which system is morally right. This is of high importance for the future of our world. Socialism is a political and economic theory of that advocates that the means of production, distributionRead MoreThe Gilded Age : Fear Of Reform1351 Words   |  6 Pagesstrike. The poor began to realize the American ideology of pulling up your bootstraps and that hard work would pay off was an inaccurate pipe dream. The laborers hard work only provided a better life for their already wealthy employers. Greed and competition drove these employers to treat their workers inhumanely and had the mentality of the workers being unappreciative of them providing jobs. Again with this tension the root of the problem was fear of reform. The wealthy businessmen feared an uprisingRead MoreMigrating to Miami from Nigeria: The Nigerian Culture Essay919 Words   |  4 Pagesautocrat.    Masculinity-femininity: Nigeria scores 60 on this dimension and is thus a masculine society. In masculine countries people â€Å"live in order to work†, managers are expected to be decisive and assertive, the emphasis is on equity, competition and performance and conflicts are resolved by fighting them out. Other observations 2: My Nigerian friend has a young child who is not able to walk on his own yet. I noticed that she carries her child on her back. The child would be carried byRead MoreWhole Foods Market Inc: Company Analysis1219 Words   |  5 Pagesrevenues, profits, and increasing share price; in 2011 the company recorded 10.1 billion in revenues, 342 million in profit, and a 38% boost in stock price (Whole Foods Market.com. Whole Foods Market.com. 2011 Annual Report. PP. 4). Competition From a competition perspective, Whole Foods shares the Supermarket space with a plethora of rivals ranging from the big box retailers Wal-Mart and Costco, to regional chains such as Safeway and Krogers, and to specialty stores such as Trader Joes. The foodRead MoreEthics vs. Capitalism2412 Words   |  10 PagesCan Business Ethics Capitalism coexist? The concept of business ethics has tried to change the way businesses operate over the years. Business ethics is a form of ethics that governs the actions of businesses to circumvent the affects business has on every day society. But some question its effectiveness in the application of capitalism. Several case studies have shown that this is the case; many companies place the pursuit of money in front of the pursuit of virtue. Although, the majority ofRead MoreThe Great Impact On Intellectual And Artistic Endeavors And Theses Ideas Essay1262 Words   |  6 Pagesbe seen in this time period is a clear change in direction for a nation recovering from a very real and bitter war. Sciences will change, Philosophy will change, and even Literature will change. These directional changes will begin laying a new cornerstone for which the United States will continue towards the new century with such an evolving identity. There are many important events that occurred during the Gilded Age. This age was birthed at a time following the Civil War, around the ReconstructionRead More Business Ethics vs. Capitalism Essay2407 Words   |  10 Pageseffectiveness in the application of capitalism. Several case studies have shown that this is the case; many companies place the pursuit of money in front of the pursuit of virtue. Although, the majority of companies are not in the spotlight of acting unethically, can we conclude that they follow the ethical norms? It is natural for normal human beings to act ethical but businesses are on a completely different playing field. But could business ethics be clearly possible in capitalism?   Ã‚  Ã‚  Ã‚  Ã‚  In order to understandRead MoreStrategic Alliances and International Mergers and Acquisitions in the Modern Global Business Environment2317 Words   |  10 Pagesincrease their market power, reduce their transaction costs, or as a defensive reaction to guard against losing a potential opportunity. The market power approach, a strategy utilized by firms to capitalize on a particular market while restraining competition, and the transaction cost approach, a inter-firm relationship to reduce transaction costs between companies, both are reflected in the world economy practices of international firms of most of the past century. While each of these objectives still

Thursday, December 26, 2019

The Truth Early American Assumptions Uncovered - 1572 Words

The Truth: Early American Assumptions Uncovered The â€Å"Narratives of the Life of Frederick Douglass† is the story of Frederick Douglass’ life from the time he was born into slavery, to the time he escaped to freedom in the north. When Douglass wrote this book, slavery was still legal in a large portion of the United States. After Douglass’ escape to freedom and his continuation of his education, he became an abolitionist through his works of literature and speeches. In â€Å"The Blessings of Slavery†, by George Fitzhugh he states that southern slaves for the most part are the freest and happiest people in the world. He also goes on to say a number of other things that basically establish that slaves live an easy and good life compared to others. Frederick Douglass’ pure story telling in the â€Å"Narrative of the Life of Frederick Douglass† directly goes against any argument for slavery from Fitzhugh, by revealing the harshness of the institution of slavery and the individuals behind it . In each piece of literature both authors also unknowingly touch on topics of early American history such as free labor ideology and paternalism therefore deepening our knowledge of popular understandings during this time period. Douglass refutes Fitzhugh’s pro-slavery argument of the average slave living an ideal life, by disproving early ideas of the free labor system and paternalism through real life encounters of the physical oppression slaves faced on the day to day basis in the forms of inhumaneShow MoreRelatedMy Life with SDS and The Weathermen by Mark William Rudd1493 Words   |  6 Pageswith the Weather Underground. Rudd became a member of the Columbia University chapter of Students for a Democratic Society (SDS), in nineteen sixty-three. By nineteen sixty-eight, he became a leader for Columbia’s SDS chapter. Rudd’s works’ include Truth and Consequences: The Education of Mark Rudd and Underground: My Life with SDS and The Weathermen. Underground: My Life with SDS and The Weathermen was based upon a man named Mark Rudd. In nineteen sixty-eight, Mark Rudd led the historic act of revoltRead More The Search for Enlightenment Essay1868 Words   |  8 Pages but rather to the universe as a whole--the entirety of the physical universe ranging from human nature to quantum nature while also including, plants, animals, and mountains as part of this greater whole. It has been the search for knowledge and truths of the wonders and mysteries of nature, or rather the universe (in other words science) that has, over the past few years been the underlying motivation in my life. Not only do I find the search for knowledge exciting and intellectually stimulatingRead MoreFeminist Theory2762 Words   |  12 Pagesautomatically trickle-down to women and other disadvantaged groups in Third World nations (1970:8). Women involved with development issues in the United States lobbied to bring this evidence to the attention of policymak ers. These women challenged the assumption that modernization would automatically increase gender equality. The first formal dating of feminism began in the 1630s, for example Abigail Adams famous Remember the Ladies letter to her husband has been referred to in numerous historiesRead More Various Interpretations of the Progressive Era Essay2820 Words   |  12 PagesWomen and American Political Society, 1780-1920†. While all the works are logical in arguing their opinions about the Progressive Era, some are more effective than others in convincing the reader. Based on their use of specific evidence, Filene and McCormick’s articles are the most effective and persuasive. On the other hand, Hofstadter and Baker, while they present their arguments logically and generally use evidence well, do not consistently cite evidence which link their assumptions to theirRead MoreThe Apologetics of Christianity Essay2762 Words   |  12 Pages These gospels are a biography of the life and works of Jesus Christ himself. The remainder of the Bible contains mostly letters to various people and churches throughout Asia Minor, Greece, and Italy. These are letters of encouragement to the early churches of the world and many Christians who may have been imprisoned or in captivity in several countries. Still one question that plagues the minds of several modern day Christians is, how did the modern day B ible come to be? The Old TestamentRead MoreDoes Study of the Information Content of Profits Announcements Explain Why Firms Use Particular Accounting Practice? Does It Help to Predict Which Firms Will Use Particular Accounting Practices?10615 Words   |  43 Pagesof extant practices. To advocates of the latter, previous attempts to develop a theory of accounting were futile as there could never be agreement over many of the inputs into a theory such as the postulates, principles but most specifically the assumptions. Although a very inaccurate description the two approaches are labelled normative (the prescriptive theories that dominated prior to 1970) and positive (the descriptive research that has dominated mainstream accounting research since 1970). WithRead MoreDanshui Essay10393 Words   |  42 Pagesof extant practices. To advocates of the latter, previous attempts to develop a theory of accounting were futile as there could never be agreement over many of the inputs into a theory such as the postulates, principles but most specifically the assumptions. Although a very inaccurate description the two approaches are labelled normative (the prescriptive theories that dominated prior to 1970) and positive (the descriptive research that has dominated mainstream accounting research since 1970). WithRead MoreMarge Piercy Barbie Doll Analysis1860 Words   |  8 PagesThe standards of women since early history has always been set to an unrealistic bar, that make girls around the world feel insecure and unworthy of being beautiful. Society has cemented views of women and what they â€Å"should† look and act like based on things like makeup, body figure, clothing, etc. Women from all places are urged to alter their appearances in order to fall into the category of beautiful. The impulse for women to â€Å"paint their face† is due to the fear of other people not seeing themRead MoreEssay on Theory and Practice in Post-Colonial Literatures4270 Wor ds   |  18 Pagesand distinctive regional characteristics is that they emerged in their present form out of the experience of colonization and asserted themselves by foregrounding the tension with the imperial power, and by emphasizing their differences from the assumptions of the imperial centre. It is this which makes them distinctively post-colonial. Post-colonial literatures and English Studies The study of English has always been a densely political and cultural phenomenon, a practice in which languageRead MoreA Comparison of EVA and NPV3878 Words   |  16 Pagesthe latter half of the 20th century more specifically during the last decade, there were more common and vehement objections to the ‘classical’ profitability indicators. (Baran, Hrotko Olejnà ­k, 2007, p. 669) In response, Stern Stewart Co. an American consultancy firm developed two new evaluation criteria’s for measuring a company’s output; Economic Value Added (EVA, also known as residual income, operating profit less a capital charge or economic profit) and the Market Value Added (MVA). (Baran

Wednesday, December 18, 2019

The Assassination Of President John F. Kennedy - 2245 Words

On November 22, 1963 in Dallas, Texas one single event transpired one of the most contentious mysterious of our time, sparking an endless amount of criticism and conspiracy theories. Who truly killed President John F. Kennedy? The facts of the most famous assassination of an United States President in history are clear. The assassination happened on a routine visit to Dallas, Texas on the Presidential campaign trail. At 12:30pm shots are fired and President John F. Kennedy is mortally wounded. President John F. Kennedy is rushed to nearby Parkland Hospital. At 1:00pm President John F. Kennedy is pronounced dead. Approximately 1:15pm, 45minutes after the assassination, John F. Kennedy’s suspected killer Lee Harvey Oswald murders a police officer before being arrested in a movie theatre at 2:15pm. President John F. Kennedy is flown to Washington DC for the autopsy. Vice President Lyndon Johnson take the oath of office onboard Air Force 1. Two days later, Dallas night club owner Jack Ruby shoots and kills Lee Harvey Oswald in an underground parking lot. November 25, 1963 President John F. Kennedy was buried at Arlington cemetery. (http://www.cnn.com/2013/06/28/us/john-f-kennedy-assassination-fast-facts/) That’s where the accepted facts of the assassination of President John F. Kennedy end, and the mystery begins. In suspicion that Lee Harvey Oswald was part of a greater criminal plot, President Lyndon Johnson appoints Supreme Court Justice Earl Warren to investigate. Over theShow MoreRelatedThe Assassination Of President John F. Kennedy1242 Words   |  5 Pages1963: The assassination of President John F. Kennedy is an event in American history that will forever as one of the nation’s darkest days. The brutal murder of the President is seemingly terrible enough, but suspicious decisions of the federal government in regards to investigating the assassination alienated American youths from being able to trust the government, and is partially responsible for the current detachment that many citizens feel towards it. Many things about the assassination do notRead MoreThe Assassination Of President John F. Kennedy1376 Words   |  6 PagesLee Harvey Oswald and the assassination of President John F. Kennedy November 22, 1963 (Jennings), a day that changed American history, and a day that’s events still haunt the nation of freedom and liberty. Whether it be Jacqueline Kennedy’s pained cries or the hoodless limousine, a piece of this day in history lies in every American’s mind. The assassination of President John F. Kennedy, the thirty-fifth President of the United States of America (Bugliosi 11), to this day has several conspiraciesRead MoreThe Assassination Of President John F. Kennedy1112 Words   |  5 PagesThe assassination of President John F. Kennedy is one of the most memorable days in American history. The Making of Modern America states â€Å"Americans would compare the personal impact of the assassination to Pearl Harbor, and later to the collapse of the World Trade Center in New York† (123). Kennedy’s assassination brought about many conspiracy theories and ultimately begs the question, what if Kennedy had lived? President John F. Kennedy was sworn into office on January 20, 1961. Kennedy and hisRead MoreThe Assassination Of President John F. Kennedy1951 Words   |  8 Pagesinevitable.† JFK was a man defined by his morality, however his appeasing methods were perceived by some as a weakness, ultimately preluding his inescapable death. It is to a highly significant extent that the CIA was responsible for the assassination of President John F. Kennedy, as contrasting ideologies, acting as motive, integrated with extensive influence and power, enabled the CIA to eliminate JFK, to infiltrate their own desired means of governing. as an impediment of desired governing. UncertaintyRead MoreThe Assassination Of President John F. Kennedy1754 Words   |  8 Pagesinvolve the assassinations of previous presidents, vice presidents, senators, civil rights activists and political figures. Assassinations although tragic are inevitable that usually occur due to political reasons or payments and they don’t only affect the lives of their families but the lives of innocent citizens. Three political assassinations that might interest you are the assassinations of President Abraham Lincoln, President John F. Kennedy and his brother Attorney General Robert F. Kennedy consideringRead MoreThe Assassination Of President John F. Kennedy1431 Words   |  6 PagesThe Assassination of President John F. Kennedy â€Å"On Friday, November 22, 1963 just southwest of the intersection of Elm and Houston streets in Dallas, Texas, hundreds of people witnessed one of the most famous murders in recent history† (Waggoner 8) . His wife was with him and she tried to save him but he died on the way to the hospital. President Kennedy was only 46 years old when he got killed. His term of presidency lasted from 1961-1963 (Kreiser Par.) President Kennedy was married with 3 kidsRead MoreEssay on The Assassination of President John F. Kennedy1576 Words   |  7 Pagesheld on November 22, 1963, but by mid-afternoon one of the most tragic events to ever plague not only the United States but the entire world. The assassination of President John F. Kennedy would go on to be one of the most infamous days in history; surrounded in scandals, controversy, and conspiracy. There were three main reasons that the president was in Dallas, Texas. One of those reasons being his mission of reelection. Another reason was to raise more Democratic Party presidential campaignRead MorePresident John F. Kennedy s Assassination2463 Words   |  10 Pages President John F. Kennedy s assassination has plagued the nation for over fifty years. America has come to associate death, conspiracy, and change with the tragic events of November 22, 1963. John and Jackie Kennedy traveled from the White House to the state of Texas to began a campaigning tour for the upcoming presidential election. Kennedy began his trip with hopes of securing votes to help him secure a victory for the 1964 election. John F. Kennedy began his tour through Texas to regain supportRead MoreThe Assassination Of Presidents Abraham Lincoln And John F Kennedy1225 Words   |  5 PagesMany treasonous acts have plagued American soil in the past, most notably, the assassinations of Presidents Abraham Lincoln and John F Kennedy. Tragic events such as a loss of a political figure, or leader, emphasize the dark and bloody motives that often stem from greed and lead to poor decision making skills. Oftentimes, similar incidents occur in both literature and Hollywood productions, from Shakespeare’s classic plays to James Bond films, with the antagonist always facing dire consequencesRead Moreâ€Å"The President Has Been Shot† the Assassination of John F. Kennedy600 Words   |  3 Pagesâ€Å"The President Has Been Shot† the Assassination of John F. Kennedy tells the story of one of the most horrifying events in American history. James L. Swanson takes the reader through the events leadin g up to the assassination and depicts the sunny, Texas afternoon on November 22, 1963 with dramatic details and an impeccable perspective. Born in Brookline, Massachusetts in May of 1917, Kennedy remains the youngest man ever elected president of the United States. John, known to friends as Jack, had

Tuesday, December 10, 2019

Business Decisions Patties Foods Ltd

Question: Discuss about the Business Decisions for Patties Foods Ltd. Answer: Introduction Patties Foods Ltd, the company, had started its operation long back in 1966 with the small cake shop at Lakes Entrance by Peter and Annie Rijs, who were migrated from Netherlands. The company has its head quarter at Bairnsdale in Victoria, Australia. Initially the company was with the legal status of ownership firm under the proprietorship of Rijs Family, which had been converted to the limited company since 2006. The conventional concept of products are being continued by the Rijs while the introduction of several other frozen products in the forms of Pies and bread rolls provided the required level of variety in the product range which the people had sought for. During the course of time the turnover and the business of the company is inflated with the company increased its distribution in other cities of Australia with the ultimate objective of entering into the export business through its entry in New Zealand in 1995. Since 1996 the company had extended its product range with the prioritization on the pastry segment and so they had sold their bread unit to Sunicrust in 1996. As a part of their expansion and consolidation program, the company had invested 2 million AUD in 1998 for renovation of plant with extension with the installation of a spiral freezer. The company had started a parallel line of production in 2000 which was capable of producing pastries, sausage rolls and finger foods to add in the variety of savories the company is specialized in. The company has a long history of acquisition which was evidently found by acquiring of iconic brands of Australia in the specific segment like Fourn Twenty , Herbart Adams and Nannas which were being acquired from the US MNC Simpleton and the company is more equipped with the variety of products to be served to the community of Australia. As a result of their constant endeavor to prove their ability of being a market leader, the company was awarded with the prestigious Victorian Manufacturing Hall of Fame and Gippsland Business Awards Hall of Fame. The company has crossed the remarkable landmark of golden jubilee year celebration in 2016 and with the strong leadership of the Managing Director and Chief Executive Officer, Steven Chaur with his team will leave no stones unturned to make the company run its business in the future with ensured sustainability and through the path of excellence (Week, 2016). Statement of financial position A-Balance sheet items Analysis of Balance Sheet- Patties Foods Ltd period - f Y 2014 and 2015 partiulars 2015 2014 variance in $'000 in $'000 Total Current Assets 103032 91882 12 Total Non-Current Assets 145159 152148 -5 Total Assets 248191 244030 2 Total Current Liabilities 34575 38891 -11 Total Non-Current Liabilities 79654 67995 17 Total Liabilities 114229 106886 7 Net Assets 133962 137144 -2 Total Equity 133962 137144 -2 The above working shows the comparative analytical statement of balance items of Patties Foods Ltd for the financial year of 2014 and 2015. The respective chart will be found in Appendix as Chart 1 The observations are as follows: Total current assets had been increased in macro level with 12% growth Total non-current assets had been decreased by 5% de-growth Total assets of the company is increased with 2% growth Total current liabilities is decreased by 11% de-growth Total non-current liabilities is increased by 17% growth Total net assets (assets over liabilities) is decreased by 2% de-growth Total Stock Holders Equity is decreased by 2% de-growth The comment on the comparative financial statement is being appended below as inference drawn based on above analysis and respective observations of balance sheet items of Patties Foods Ltd for the FY 2014 and 2015 are as follows: The micro analysis with item-wise instruments showed that out of the current assets, cash and cash equivalent had increased substantially. Other items like receivables and inventories increased in standard norms considering the growth and stability of the business. Derivatives financial instruments held by the company in 2015 with the amount of $67,000 is for securing the future interest the company has to pay against its loans which is part of financial risk management of the company(Ft, 2016). The micro analysis of item-wise non-current assets featured that the property and investment had shown increase but there is a decrease of intangible assets by the management of the company which is instrument for overall de-growth of 2%. The total assets had been found with 2% growth as a result of the accumulated effect of current and non-current assets. The micro analysis of current liabilities had shown substantial de-growth in the items of payables, borrowings, derivative financial instruments, current tax liability, with the increase of provisions for unaccountable liabilities. The overall impact showed 11% de-growth which is a good sign towards sustainability of the company. The micro analysis of non-current or long term liabilities had shown 17% growth which is consisting of items like borrowings, deferred tax liabilities, derivative financial statements, and provisions. Out of these, only provisions had de-growth while the other items had been observed as growth(CapitalCube, 2016). Total liabilities had shown 7% growth which is healthy so far the organization for the future of the business considering the planned expansion in pipe-line. The Net Assets (assets over liabilities) had been decreased by 2%. The total equity had found 2% de-growth. The ingredients of equity are consisting of contributed equity which is shareholders equity, reserves and retained earning. While the shareholders equity and reserves had showed the increment, the decrement had been found in case of retained earnings. Stockholders equity Analysis of Stockholder's Equity- Patties Foods Ltd Period - F Y 2014 and 2015 particulars 2015 2014 variance in $'000 in $'000 contributed equity 68797 68682 0 reserves -583 -894 -35 Retained Earnings 65748 69356 -5 Total 133962 137144 -2 As per the figures shown in the financial report of Patties Foods Ltd. Refer to stockholders equity which are consisting of three items- contributed equity, reserves and retained earnings, the observations are as follows: The contributed equity had been raised from 68658 to 68697 with marginal growth or no growth (1%). This is due to the issues related to employees share schemes. The reserves with -894 were reduced to -583 with drastic decreased of 35%. Retained earnings had come down from 69356 to 65748 with a moderate decrease of 5% The inferences related to stockholders equity are as follows: The contributed equity had been raised with below 1% growth. During this period the company had not issued any new stock in the ASX. The minor increase is due to the issues of employees share scheme as the company encourages the incentive plan for the employees with share issue for their achievements. The risk management of the company towards it capital is run with the objectives of safeguarding the risk to the stakeholders by providing the return to them and to minimize the cost of capital, the company tries to use the optimum level of utility from the accumulated capital(ASX, 2016). Reserves of the company, as per the shareholders equity are consisting of hedging reserve and share based payment reserves. Hedging reserve is being generated from reserve of cash flow and reserves raised from share based payment reserves. The movements of hedging reserves are dictated by the items of cash flow hedges with the features of revaluation and deferred tax items. For the share- based payment reserves, the item of option expenses/gain is being considered as one factor for determination of the same. Retained earnings for the period are being dictated by the factor of profit for last year acquisition of associates and dividends. The composite effect of all these factors derives the balance as of 2014 and 2015. Stockholders equity Account Balances and number of outstanding shares- a comparison for the FY 2014 and 2015: Analysis of Stockholders' equity balance in No.s - Patties Foods Ltd Period - F Y 2014 and 2015 particulars 2015 2014 Variance In no.s in no.s Balance of equity share in No.s 139,234,153 139,144,338 0.06 Chart No. 2A Analysis of Stockholders' equity balance in No.s - Patties Foods Ltd Period - F Y 2014 and 2015 particulars 2015 2014 Variance in $'000 in $'000 Balance of Equity Share in Value 68,797 68,682 0.17 Statement of Profit and Loss To review the income statement of Patties Foods Ltd for the financial year 2014 and 2015 the following analysis had been made with the figures taken from financial report of the company for the two financial years and with analysis of variance of current year in respect of last year. The respective chart is enclosed in the appendix as chart 3. Analysis of Income Statement- Patties Foods Ltd Period - F Y 2014 and 2015 particulars 2015 2014 variance in $'000 in $'000 Total Revenue 256858 247665 4 cost of goods sold 172080 161222 7 total expenses 82723 69760 19 non-operating gains or losses 364 -940 -139 in cent in cent earnings per common share 1.5 1.5 0 After going through the income statement of the company for last two financial years, the following observations are found which are being discussed head-wise: Total revenue of the company( including the income from sales of goods, other revenue from ordinary activities and other income had been increased by 4% compared to last year. Cost of goods sold or the cost of raw materials had been increased from last year to the tune of 7%. Total expenses of the company including fixed and variable overheads are increased by 19%. Non operating gains or losses are with 139% variance compared to last year. The earning per common share is same as it was last year and not featuring any type of variance(Capitalcube, 2016). The comment on the comparative financial statement is being appended below as inference drawn based on above analysis and respective observations: The total revenue has three components- sales revenue, other revenue from ordinary activities and other income. While the increment is found in the sales revenue, two other heads have no such significant increment compared to last year. Cost of goods sold or the cost of raw materials had substantial increase compared to last year with the %age of 7. This may have happened due to production increase in volume which gives the scope to the company to have higher sales revenue this year than last year. Total overhead expenses of the company including fixed and variable costs have increased by 19% which may be also due to more production and inflation factor prevailing globally with the effect in the current year. Non operating gains or losses had been featured in the financial report for both years and termed as other comprehensive income. The elements featured as other comprehensive income is cash flow hedges and income tax related to that income. The declared dividend for common share is kept at 1.50 cent like last year only and there is no change in declaring that amount. Statement of cash flow To analyze cash flow statement of Patties Foods Ltd. The different factors related to cash inflow and outflow from different sources to the company with ultimate cash accumulation at the end of both financial years of 2014 and 2015 to be forwarded in next year as balance. Cash flow analysis is the livewire of any company which ensures the cash liquidity of any company. The main inflow for cash comes from different sources like receivables, other sources in the form of different income to the company is featured. The outflow is consisting of different heads through which different expenses and capital expenditure is ensured(Finance, 2016). Given below the analysis of cash inflow and outflow in consolidated manner to find out the financial health of Patties Foods Ltd.: Analysis of cash flow statement - Patties Foods Ltd Period - F Y 2014 and 2015 particulars 2015 2014 variance in $ '000 in $ '000 Net Cash Inflow(decrease) from operating activities 5,267 23,162 -77 Net Cash Inflow(decrease) from financing activities 5788 -12266 -147 Net Cash Inflow ( decrease) from investing activities -10475 -9050 16 Net increase( decrease) in cash flow 664 84 690 The related chart is attached in the appendix as chart 4. The observations of cash flow statement are appended below: To project cash flow of the company in respect of inflow or outflow, main components considered are cash and cash equivalents including cash in hand and different investments in the form of deposits with different financial institutions which are easily convertible with the nature of high liquidity and the cash inflow or outflow from the different activities which can generate cash. The figures shown in net cash inflow from operating activities which is mainly consisting of the sales and subsequent recovery from sales is positive for both the year but the inflow amount of 2015 is reduced from that of 2014 with the negative variance of 77%. This figure also shows that the receivables are managed well and not getting piled up as slow recoverable. Net cash inflow from investing activities is consisting of items like receiving funds from different financial activities like dividend and interest received, proceeds for sale of property, plant and equipments during the period, while the cash outflow is mainly done for the purpose of procurement of property, plant and equipment, payments for intangibles, acquisition of controlled associates. The variance showed negative impact with 147%(Morningstar, 2016). Net cash inflow from financing activities of the company is related to issuance of share and other equity securities, proceeds from borrowings which are contributing towards inflow of funds while the outflow is generated from repayment of borrowing and payment of dividend to shareholders. Net increase in cash flow is made from the retrospective effect of the above three elements and with the impact of opening balance of the financial year 2014 and 2015 which is accumulated as the closing balance of cash for the respective year ending. The overall review and subsequent comment are given above which shows that the company is comfortably placed on cash flow from operating activities, financial activities, and net increase in cash flow, where as cash flow from investing activities is not up to the mark(Morningstar, 2016). Conclusion The above article is based on the authorized financial reports of Patties Foods Ltd. for 2014 and 2015. The main emphasis had been given in this article on the balance sheet, income statement, equity holding and cash flow with proper analysis. The company is found stable with the performance as financial reports reveal. There is no such threat found and the analysis had been done for the purpose of giving proper feedback to enable the management concentrating in the areas of probable development with the standard business should be run with efficiency and professionalism. Recommendation The recommendation coming out of the analysis is likely to emphasize on the selection of products to enhance the level of sales of the company. The operating expenses should be taken proper care so that pilferage should not occur. The company is passing through stable time and this is the right time for the company to look for diversification in the domain of other food products like beverages. The standard infrastructure possessed by the company encourages for further expansion and development and the company will do so for the sustainability of the company. References: ASX, 2016. Annual General Meeting. [Online] Available at: https://www.asx.com.au/asxpdf/20160418/pdf/436kwng9dkn2sf.pdf [Accessed 13 September 2016]. Capitalcube, 2016. Patties Foods Ltd. Value Analysis (ASX:PFL) : January 22, 2016. [Online] Available at: https://www.capitalcube.com/blog/index.php/patties-foods-ltd-value-analysis-asxpfl-january-22-2016/ [Accessed 19 September 2016]. CapitalCube, 2016. Patties Foods Ltd. Earnings Analysis: For the six months ended December 31, 2015. [Online] Available at: https://www.capitalcube.com/blog/index.php/patties-foods-ltd-earnings-analysis-for-the-six-months-ended-december-31-2015/ [Accessed 19 September 2016]. Finance, 2016. Patties Foods Ltd. :PFL-AU: Earnings Analysis: 2016 By the Numbers : September 7, 2016. [Online] Available at: https://finance.yahoo.com/m/48054fcd-de3c-3a37-97d9-9ae90a07e34f/undefined [Accessed 19 September 2016]. Ft, 2016. Patties Foods Ltd. [Online] Available at: https://markets.ft.com/data/equities/tearsheet/financials?s=PFL:ASX [Accessed 19 September 2016]. Morningstar, 2016. Patties Foods Ltd PFL. [Online] Available at: https://financials.morningstar.com/ratios/r.html?t=pflregion=aus [Accessed 19 September 2016]. Week, I., 2016. Patties Foods celebrates 50 years. [Online] Available at: https://c-store.com./2016/08/15/patties-foods-celebrates-50-years/ [Accessed 19 September 2016].