Free Essay

Key Ratios

In:

Submitted By humera316
Words 639
Pages 3
Case 1
Insider Trading

Purpose: This case discusses a new and potentially alarming trend in the area of illegal insider trading. The Internet is giving people a false sense of anonymity which does not discourage them from sharing private corporate information. This case also makes students aware of how easy it is becoming to gain access to illegal inside information and how to avoid breaking securities law when the information comes to them.

1. This question is not as straightforward as it may seem on the surface. But an acceptable definition is as follows: Information becomes public when a company representative officially makes an announcement via a major media.

2. Absolutely anyone can come into contact with inside information. You do not have to work for the firm to have private information. In fact, it seems that private information is often readily volunteered these days.

3. If someone conveys to you information that could be useful in making buy or sell decisions, that information would be illegal to trade upon. Private information only becomes illegal trading when (1) you actually trade on the information, or when (2) you convey the information to someone else and they trade on the information. No matter how long the chain of passing along information gets, if you are identified as one of the links in the chain, in the eyes of the court you are just a guilty as the one who eventually trades.

4. For some reason people think the Internet is a secure place to discuss secretive issues. Despite reports that your employer monitors your e-mail and Internet usage, and despite the fact that the persons responsible for sending out the “I love You” virus were tracked down on the other side of the world in a matter of days, people still think there is no way to learn of the Internet user’s identity.

5. If you come in contact with non-public information, the best thing to do is ignore it. You can’t help what you hear, but you can control what you do, or do not do, with the information. Case 2
The Tobacco Industry

Purpose: Everyone knows that ethics are a part of business decision making. In classroom discussions, students find the unethical hypothetical debate to be rather clear-cut. However, in the real world, when ethical decisions hurt one party to help another, there are no easy answers. This case centers around the tobacco industry's alleged increase in nicotine levels in cigarettes in an attempt to induce addiction amongst smokers. This case also addresses the government's role in regulating smoking in the work place. Ethics questions are possibly the most difficult to answer. One must consider all sides of the argument and attempt to remain objective. Instead of stating my personal opinions, I will try to objectively present both sides of each argument.

1. Any time a consumer purchases a product he/she has a right to know the ingredients of the product. If tobacco companies alter nicotine levels (either with the intent to induce addiction or without) without notifying consumers, most people feel this would be extremely unethical.

2. As long as customers know what they are smoking, the practice of providing high or low nicotine cigarettes is generally deemed acceptable by most. The alcoholic beverage industry sells various types of beers based on the level of alcohol or the fullness of the beer, etc. Hence, it is reasonable to allow tobacco firms to market different strengths of cigarettes. Since nicotine is argued by the tobacco industry to be the source of flavor, cigarette manufacturers could easily justify the need for various nicotine levels.

3. Fine print warnings on the side of cigarette packs have been frowned upon because they are hard to notice and even harder to read. Most people do not read their

Similar Documents

Premium Essay

Key Financial Ratios

...September 2014 Story Between the numbers We bring some key ratios that you can use to analyse companies Rahul Oberoi/Money Today        Edition:September 2014 Commerce Ministry wants sunset clause for SEZs to go 27 PSU banks write off Rs 1.14 lakh cr bad debts during 2012-15 Impose antidumping duty on ceramic tiles from China Raise public healthcare spending to 2.5% of GDP Lenovo launches Yoga 900 convertible laptop, Tab 3 Pro tablet MORE ECONOMY CORPORATE MARKETS MONEY INDUSTRY TECH OPINION PHOTOS VIDEOS MAGAZINE MORE Railways' make in India: A look at 24coach train features Netflix launches in India, plans start at Rs 500 Vodafone's 4G services in Delhi, Mumbai by March Maruti releases first sketch of its compact SUV Vitara Breeza Supreme Court extends ban on 2000cc diesel cars Delhi-Agra train fare less than a kg of apples PHOTOS VIDEOS MORE 'Ratio analysis is crucial for investment decisions. It not only helps in knowing how the company has been performing but also makes it easy for investors to compare companies in the same industry and zero in on the best investment option', says DK Aggarwal, Chairman and Managing Director at SMC Investments and Advisors 'A high P/E ratio may indicate that the stock is overpriced. A stock with a low P/E may have greater potential for rising. P/E ratios should be used in combination with other financial ratios for informed decision-making' , says Sabyasachi Mukherjee...

Words: 619 - Pages: 3

Premium Essay

Tqm Assignment

...estimate the level of applicability of each TQM characteristic to the organization. 5. Discuss your finding and provide conclusion on the state of TQM in the organization. Q2. Exercise No. 4 on pg. 151 Give an example of the use of the PDSA cycle in your personal life and in your work experiences. Personal Life Experience A personal life experience of the Plan, Do, Study and Act cycle is my decision to go back to school to get my Masters degree in Engineering. The planning required me to define the length of time it would take for me to finish my degree. The key sequence of events were for me to let my manager know of my intention to get my degree and that it would not affect my job performance. Then I had to lay our my educational plan and my overall purpose of getting my degree. The Do cycle required me register for a class and ensure that it didn’t interfere with my job performance. Another key part of the do process was for me to study and get a passing grade. The Study cycle required me to study for my exams and assignments on my own time and not on company time. The Act cycle requires me to continue to push myself to finish my degree in a recent amount of time. Work Experience A work experience of the Plan, Do, Study and Act cycle is my involvement on our latest diesel engine in our Superduty truck line where I was the lead for powerplant NVH. The planning required...

Words: 875 - Pages: 4

Premium Essay

Norton Lilly

...around. Burton was expected to develop a sustainable business platform that would be capable of doubling the company’s size and generating an attractive return on investment. Jim Burton did everything in his power to help turn around Norton Lilly International. Due to the fact that he was new to this industry and dealing with veterans that had 30 years of experience he had to use an incremental approach by introducing ideas and building on them once accepted. He formed an executive committee in order to begin decentralizing the decision-making processes away from the owners. Burton also established process mapping, which focused on the key processes involved in delivering each type of service. This process helped management understand the underlying causes of service failures and began to close performance gaps. Burton then established key performance indicators that identified operating level...

Words: 996 - Pages: 4

Free Essay

General Introductio

...technologies evolve, an irresponsible person may try to find a way to excavate any loopholes within the system in order to penetrate into the heart of its weaknesses. This is due to the fact that human-made designs can also be broken by another human. Thus, over time security measures must constantly be reviewed and strengthened in order to combat hackers or culprits hot on the heels of system developers who are also using high technologies. One of the means to secure the data is to apply a secret code of encryption. By having it encrypted, the sender can pass the data to the receiver and only the receiver or authorized personnel can have access to the data provided they have been given a key by the sender to decrypt it in order for them to view the information. Thus, without having the right key, nobody is able to read the encrypted data received or stored. Even if hackers or unauthorized person managed to intercept or steal the data, it would be futile because the text looks ridiculous to them. It is widely recognized that data security will play a central role in the design of future IT systems. Many of those IT applications will be realized as embedded systems which rely heavily on security mechanisms. Examples include security for wireless phones, wireless computing, pay-TV, and copy protection schemes for audio/video consumer...

Words: 7475 - Pages: 30

Free Essay

Different Types of Encryption

...be understood by unauthorized readers.” (Dyson) Encryption can be thought as locking something valuable into a strong box with a key. Sensitive data is encrypted by using a key algorithm, which renders it unreadable without the knowledge of the key. Data encryption keys are determined at connect time between a connection and the computer on the other end. The use of data encryption can be initiated by a personal computer or by the server it’s connecting to. On these terms, “Encryption is the technology that makes E-COMMERCE possible because it underlies the security systems used to protect electronic financial transactions.” (Dyson) Similarly, Dan Boneh, Professor of Computer Science and Electrical Engineering at Stanford University, gives another definition for the term. “Encryption is a method for users to securely share data over an insecure network or storage server.” (Boneh, Sahai and Waters) Since there are many transactions people do every day such as online banking or online shopping, it is necessary to make sure that they are done safely with the use of Encryption. As a matter of fact, the applications of encryption are very important. First of all we have data protection. Here we are referring to files and email encryption. The data is protected in the hard disk in case a hacker gets into the system. However, if the person who has the key of the encryption to decode...

Words: 1201 - Pages: 5

Free Essay

Future Innovations on Phones

...Summary: The number of illiterates in India is estimated to be over 400 million of which 75% live in rural areas. Of the literate population, a significant proportion lack basic vocational skills. India has world-class institutes of higher learning, such as the IITs, IIMs and medical colleges but the rural India still remain isolated to them. India’s most valuable intellectual capital migrates to western countries keeping gap in demand and supply of such intellectual capital in India, therefore we need to develop the equal opportunities for the isolated communities and enable them to access the elitist structure of Indian education. With the weak and tottering foundation India will not be able to achieve social and economic development The key challenge of India is to rapidly provide opportunities to the rural population to empower them with education and make them literate, and develop basic leadership and problem-solving skills. Have strong basic education foundation rural India will be able to raise productivity, entrepreneurship and material standards of living Here we would like to opt to do research into how into how provide solution to the critical issues of primary education in India through innovation strategy. As a part of research we will be meeting and collecting information from founders of NGO called “eVidyaloka (www.eVidyaloka.org)”. eVidyaloka is a not for profit organization registered under the Trusts Act, focuses on...

Words: 702 - Pages: 3

Free Essay

Journey of the Self: Example Through Symobols

...Journey of the Self The road I’m traveling on I see as a dirt road through a light forest in the mountains of northern California. I’m not sure exactly where I am, but it is a bright day with some clouds and blue skies, but off to the distance I can see storm clouds. All I have with me is my backpack containing a notebook, a pen, a pair of gym shorts, a spare t-shirt, a pack of cigarettes with a lighter, a bottle of water and a couple of granola bars. In my pockets I have a cell phone with a dead battery, a pocketknife, and my wallet with five dollars and my I.D. inside. I’m walking, surrounded by trees of all types. There is a light breeze, but it’s quiet as I walk and look around. As I’m walking, the road is flat and somewhat narrow, but it is easy going for the most part, with random spots where the road becomes rocky and somewhat stressful, but it evens itself out and becomes smooth for a period of time again. I feel happy and serene, but exhausted at times and in need of a bit of rest, but I always continue and begin to walk again. As I’m walking, I come to a two-way fork in the road with a sign in the middle. The sign has two arrows with words printed on them. Each arrow is pointing in the opposite direction of the other. To the left I have the choice to walk to the city, while to the right I have the choice to walk to a small country town. After some thought and consideration of both of my choices, I eventually choose to head towards the Country. I’m not sure exactly...

Words: 2126 - Pages: 9

Premium Essay

What Is Honor?

...What is Honor? My understanding of the term honor. Honor is defined as a source of credit or distinction, and is associated with reverence, dignity, reputation, good name and a good sense of what is morally correct. The key part to honor is having respect for others and for you; the two must act together because without both, there is nothing. I strongly believe that reputation is hard to gain and easily lost. Think about this, every day thousands of planes fly somewhere and there is never any news about a successful landing, but if any of those flights crash, it is all over the news. This fact tells me that in order to keep one’s honor, one must maintain a set standard of excellence. It will only take one infraction to cause said person to forfeit one’s honor. Nicholas Boileau once said: “Honor is like a rugged island without a shore, once you have left it, you cannot return.” Honor is something in which is not obtained and sustained easily. One must have patience and study to become a person of integrity and goodwill. Honor is an everyday thing; obstacles trying to deter one from being honorable lay in life’s everyday path. Perseverance is a key to honor; one must fight the constant impeding objects in order to maintain the highest level of honor. The shore of an island is often looked at as something isolated and secluded yet has a certain charm about it. Honor is much like the shore in this sense. Honor must come from inside and resist being influenced by minor factors...

Words: 556 - Pages: 3

Premium Essay

Business Management

...David Srep Computer Literacy New Tech Update These three phones allow you to have the Unikey app. No more digging your pockets and looking for your keys. There a new app that you can get for the phones that are above this paragraph. This key is called the Unikey system, and it has some cool features that are actually kind of clever. The unikey app transmits a Bluetooth signal from the user iPhone, android, or blackberry smart phone, which is picked up by a paired unikey deadbolt lock as it is approached by a user. All the user has to do is walk up to the door and the phone has to be nearby the door. Next the user has to touch the outer surface of the lock, at which point the bolt will electronically withdraw. You can do the same thing when you leave the house. What I like about the Unikey system is that you can text someone the key to your house. This way your family member doesn’t have to wait until you get home. It gives you an option if you want that person have the key permanent or a one- time use. If you lose your phone you can deactivate the app from a computer and the unikey comes with a spare key. The unikey system is being sold for 199.00. It will be cool if they can make these apps for cars. I have car key 3 times and hand to pay 80 dollars for someone to get my key out the car. Source: http://www.unikeytech.com/ Source:...

Words: 276 - Pages: 2

Free Essay

Cryptgraphh

...Cryptography Cryptography             Some data is very sensitive and therefore it has to be hidden away from parties who are not supposed to view it. In this age of computers, their capacity for transfer and retrieval of information may be exploited by other parties to gain access to confidential and potentially dangerous data. Therefore, measures have been taken to ensure that data is not accessed by others which is done by using several methods which, besides physical security, includes the use of encryption algorithms which are programs that change the way information looks by rendering it illegible. Data encryption is an important part of computing and, if done properly, can provide the user with means through which data can be protected from other parties. Encryption is done in many areas including end point devices such as computer terminals and servers which store important information. As such, data encryption has been applied in the military, banking sector, in businesses and other areas which require secure storage and transfer of data. Data encryption is simply the change of raw data or ordinary information referred to as plaintext into indecipherable material called cipher text. The data can then be stored or transferred securely since it cannot be read by another party. If the data is to be accessed, a cipher, which is the pair of algorithms that encrypts and decrypts data, is used to decrypt the data. The data can then be read and it is therefore accessible only...

Words: 1679 - Pages: 7

Premium Essay

Pfl Case Study

...Asia. product segments: Frozen savoury, Dessert, Fruit products customer segments: retailers (supermarkets), foodservice outlets (sporting venues or cafes), Petrol and Convenience Channel (Reliance BP sites) oversease markets: US market, Asia market Value chain: PFL doesn't sell directly to consumers. 2 What is the current life cycle position of the industry? (industry life cycle, and demonstrate why?) Maturity stage : The case mentioned that PFL has already achieved leadership in serveral markets. Besides, serveral other markets are very competitive. In addition, PFL is continuing to pursue conversion cost reduction, which is another character of maturity stage. So we conclude that this industry is in maturity stage. What are the key issues that will affect historical/future industry growth? What is their likely impact and the overall assessment of the industry’s future growth? (TEMPLES) Technology + The technology development, especially information systems and manufacuturing systems, will improve the efficiency and effectiveness of this industry by enabling economies of scale and scope. So the smaller compititors who doesn't have strong cash flow to invest in the new technology, will be swept out. And the left competitors will grow market share by both further acquisitions and cost management. Economy + The potential growing sales in US and Asia may make the total industry grow by expanding to international markets. The global financial crisis (Case doesn't mention)...

Words: 932 - Pages: 4

Free Essay

Flash Burn

...Ariel Martin October 16, 2013 Descriptive narration Flash Burn My dad was set on fire when the car backfired. He was in the process of getting his Jeep fixed. On this particular day, the project of choice was working on the carburetor. The process was simple, he would pour gas into the carb well my boyfriend Mat would turn the key over. They must have done this at least a dozen times. The last time it all went wrong. My dad poured the gas and Mat turned the key. A loud bang like a gun shoot startled me, but I did not expect to turn my head to see the most devastating thing. I looked over to where the bang was there were flames coming from under the hood. The bottle of gas my dad was holding was on fire. He was unsure where my son was so he didn’t want to throw the bottle. Instead he tried to shake the bottle that’s when it all went wrong. The gas splashed his face then the flames; he hit the floor stop, drop and roll. It didn’t work as he hit the floor the bottle of gas fell and he rolled right into it. Now his chest is on fire, he realized it’s not working he stands up and rips his shirt off and starts hitting his head to put the flames out. The smell of burning flesh and hair was all we could smell. The sight was heart breaking when he turned around; the skin that was left on his face was hanging. From the time the fire started to when he looked me in the eyes and asked how he looked had only been about a minute and a half. That fast I had to look my dad in his...

Words: 515 - Pages: 3

Free Essay

Enterprise Security Services

...SECTION ONE INTRODUCTION BACKGROUND OF STUDY In years past, when enterprises were starting, it suffered data lose and information retrieval was difficult since there was no strong security service to protect already gathered information. Production, distribution and some other functions were very difficult to achieve due to weak security services but as the days passed by enterprise has struggled to secure its services and with the aid of growth in technology and programming enterprise services has reached a reasonable degree in achieving its dream by protecting its services from harm. An enterprise is an activity or a project that produces services or products. There are essentially two types of enterprise, business and social enterprises. Business enterprises are run to make profit for a private individual or group of individuals. This includes small business while social enterprise functions to provide services to individuals and groups in the community. These shows that an enterprise security service is a form of protecting the services or the product of individuals and groups in the community from harm (preventing unauthorized users from gaining access). Enterprise now uses Biometric, Encryption and some others forms of security to form the backbone of its services. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on...

Words: 4428 - Pages: 18

Free Essay

Wlan

...Having a secure WLAN is very important, I would even go to say more important than a normal LAN. One way to secure a WLAN is to use encryption. This uses a key that will encrypt and decrypt data on the WLAN so only people what the key would be able to connect to the network. The encryption needs to be strong or a sniffer will crack the key so using a WPA2 would be best. Another way would be to simple change the SSID or ESSID. The reason this is a good way to secure a WLAN is because in most cases if you didn’t change the SSID a hack would think that you didn’t do anything to your network, making it easier to hack. “Though knowing the SSID does not allow anyone to break into your network, it usually indicates that the person hasn't taken any steps to protect their network, thus these networks are the most common targets” ("How to secure," 2007). The ramification of your WLAN being breached could be many things. The first thing I can think of is data theft and by that personal or secret information if someone can get on your WLAN. Also they could be trying to disrupt your network to cause damage or just want to ride on your wireless to gain access to the Internet. I think that stolen information would be the biggest threat. Reference: How to secure a wlan. (2007, February 15). Retrieved from...

Words: 254 - Pages: 2

Free Essay

Tehe!

...Dance like There's No Tomorrow As you open the door into Dance Like There's No Tomorrow, you will immediately see a cheerful, sprightly woman sitting at a maple oak desk full of neat, organized papers. Right in front of her, a bright green apple laptop sits, glowing. What hits you second is the lemony smell of air freshener, to mask the smell of the oak floor. She invites you to sign up with a shiny clipboard and yellow pencils. After you finish the tedious registration, you get to enter the studio! Your hand grabs the cold, slippery doorknob on the soundproof door and turns the knob. You get hit by a breeze of cold, fresh air coming from a grey fan hung in the back corner of the studio. Loud pop music from a stereo in the front of the room blasts out, and vibrates your eardrums. You find yourself enclosed by four walls of crystal, clear mirrors on every side of you and it mimics every move. Long, polished wooden bars wraps around two sides of the walls. A portable blue jug of ice water sits in the front of the room, covered with little beads of water. In the very back of the studio, there is a hidden door which blends into the walls because it also has mirrors on it. It contains apparel for dance, sweatpants, T-shirts, camis, dance shoes, and sweatshirts with Dance Like There's No Tomorrow on the very front of them. The shiny, glittering world of Dance is intriguing and popular for all ages. If you need to release your stress, want to have fun, or Dancing is just your...

Words: 284 - Pages: 2