Saturday, November 16, 2019
Kirkpatricks Theory of Change Management
Kirkpatricks Theory of Change Management According to (Kirkpatrick, 2001), the important element of a preforming well manager is handling with change. Running change combine theoretical in image with practical application to address the manager effective managing change with record interference. There are three element empathy, participation and communication are the approaches for managing change efficiently. In effective managing change Kirkpatrick describe that how the key and action is supportive for implementing new ideas policies and strategies for almost any kind of organization. According to (Rags dell, 2001)The main objective of every organizational change is to shift the organization from its existing position to an advantageous position, on the other hand the organization change can be achieve in different ways whichever through fundamental change or through incremental change. According to (Tushan et al, 1985) Dealing between two types of change by creation of punctual equilibrium model of organization change. According (Charles Handy, 1990), today change is pole apart because it is flashing. He thinks this kind of modern disorganized change calls for alternating positive impact thinking to compact with it. In case of curt house hotel the management needs to look after for the upcoming changes in the organization. As they are changing the property from 3 stars to 4 stars they need to look after on the three element of the change management. If the organization will give a look on these elements they will achieve the objective in next summers. Its a long term plan so that they have to think before and they need to use the management function. They will provide a quality service to Japanese delegates with no hassle. How to manage change effectively Kirkpatrick recommends a organized model for managing change. There are certain steps for managing change efficiently are as follows: Shaping the requirements and aspiration for a change Formulating an uncertain strategy. Investigating possible feedbacks. Creating an ultimate result. Creating a schedule. Making a plan for change. Executing the change. Individual reaction on managing change. (Bridges, 1986 et al), we can identify that how individual apply change by the use of various models to describe this occurrence by process. The most important objective of each and every skilled employee to understand the concept of change and how its effects on individual, and change is also give an advantage to the employee to accomplish the goals and objectives. Change affects the performance of an individual with an organization more efficiently. From here (Juck, 1990 et al), The set of approaches to change concerns the experience of individual in the managing process focus on the psychological adjustment that individual person of organization must make during organizational change. Kirkpatricks 3 elements of managing change (Kirkpatrick, 1985), the first things to managing change are believe that change is necessary; employee can be motivating in the company towards change by creating the realness for change. These are 3 methods for creating realness to change first one is sensitive people about the pressure of change, shows discrepancy between undesirable stale of affairs, and communicate positive realistic expectation for the advantage of change. (Kirkpatrick, 2001), three elements explore how employee thinks about change and how their motives, needs, and possibilities carried them until goal. The crucial ingredients of Kirkpatrick three elements of managing change is empathy which is really beneficial and use full for organization. The main thing of any organization is communication, which is called central of all the effective change. Communication is creating understanding between two or more people- is not complete definition of communication but the communication is treatment of listening and feed back is practical and cogent. Another and very important elements of change management are participation, which is perceived as a sough- after result of the empathy and communication. Empathy, 1st key (Robert bacal), the first elements of managing change is empathy, employee reaction to change are commonly not logical from and outsiders perspective. People reach according to their needs and want. People reaction to any change differs between person-to-person or even within one person. It refers to ability to walk in other persons shoes and more importantly, the emotional of individual faced with change. Knowing the employees understanding their concerns, and developing empathetic relation ship with the employees should be normal procedure of all managers. It is more critical during period of managing change. (Kirkpatrick, 2001), According to Kirkpatrick manager should put him self in the place of employee, which is, best way to realize the employees feeling and it is also better for manager to achieve the goal with the support of team. Empathy is also a good way to know the person individually. A better manager knows the individuals who will be affected by change. There are some steps by which a manager can know about the employees, first step is looking personal files, second step is asking questions from the employee and the next and last step is listening and observing. Empathy is no inherited trait; this is something that can be developed by gating to know the other person the better way to know the person individually to analyze of conversation with each of the staff members, which they resist of, accept a change. Empathy also helps to provide clues for the communication and participation. Participation, 2nd key. (Coch et al, 1948), Main action step in managing change is participation. Participation is the change tends to reduce resistance build on the change and motive people to make the change to work. Participation may also lead to obtaining new information from that participation, information that may enhance the effectiveness of the change or the future (Kirkpatrick, 2007), Participation is technique for use in conducting instructional meetings. It consists of participation of the part of learners under the guidance and control of the leaders. It only effectively used when experience have idea to contribute. The participation has its two basic approached first one is which one is most common form is to have discussion among the participation without any hesitation and leaders gives questions and problems to entire group. Employers answer it to the leader. Second approach is that group is divided into buzz group of 4 or 5 people so that each employee can participate actively. (Cynthia D.scott, 1995), people will more really accept change if they are involved in the process involvement means that they will have a role in defining how to meet a goal, or respond to a new situation. Communication, 3rd key (Robert bacal), communication play an essential role to the employees for effective change management in an organization. Managers need to have an effective communication between employees to make them realize how communication is important and it also create understanding in an organization. Managers need to look after on the employees whether they understand the importance of change management because its a two way method. (Kavanaugh and ninemier), the effective communication will build a better relationship among the staffs in the organization. It also improves productivity in an organization and it provides a growth to better levels of guest satisfaction. (Sir nick Scheele, 2007), systematic communication with the employees in an organization offer an important phase for creating support to feel part of the result.
Wednesday, November 13, 2019
The Impact of Gender on Family Life Essay -- The Social Construction o
Conceiving of gender as a social construction rather than a biologically assigned identity helps explain historical fluctuations in menââ¬â¢s and womenââ¬â¢s practices and in culturally bound definitions of appropriate male and female behavior. Hansen argues that an individualââ¬â¢s gendered behavior is influenced by culturally constructed notions of what is appropriate for good mothers or good fathers or good people to do when caring for children (Hansen 7). The perception of American families as ââ¬Å"small, self-reliant units headed by a breadwinning father and cared for by a stay-at-home motherâ⬠(1) has considerable influence over family life. This cultural construction affects everything from childrearing to networking to the workplace and individuals must consciously strive to break away from these roles. Both clinging too and attempting to break from these roles can have significant effects on oneââ¬â¢s family experience. For the past two centuries at least, the tasks of child rearing and caregiving have been assigned primarily, though not exclusively to women (Hansen 6). Arlie Hochschild presents the idea of a gender strategy as ââ¬Å"a plan of action through which a person tries to solve problems at hand, given the cultural notions of gender at playâ⬠(7). This is something that is necessary for ââ¬Å"not-so-nuclearâ⬠families in order to function and get by. Women are ââ¬Å"located at the structural nexus of domestic work, child rearing, and paid labor, they nonetheless exercise some discretion about how they act on and interpret their situationsâ⬠(7). Many women take into consideration where it is appropriate to take a stand for a equality or when they should back down for the sake of a marriage or to prevent fighting within the family. Men and wome... ...ry have shaped the mindset of the people. The idea is so solidified in our minds that a complete change may never be able to occur. Either way, the most important factor for changing the family dynamic will be time. Works Cited Cherlin, Andrew J. Public and Private Families: An Introduction. 6th. New York: McGraw Hill, 2010. Print. Hansen, Karen V. Not-So-Nuclear Families: Class, Gender, And Networks of Care. New Brunswick, NJ: Rutgers University Press, 2005. Print. Johnson, Michael P. A Typology of Domestic Violence: Intimate Terrorism, Violent Resistance, and Situation Couple Violence. Boston: Northeastern University Press, 2008. Print. Tichenor, Veronica Jaris. ââ¬Å"Gendered Bargain: Why Wives Cannot Trade Their Money For Houseworkâ⬠from Earning More and Getting Less: Why Successful Wives Canââ¬â¢t By Equality. 2005. Rutgers University Press. Print. The Impact of Gender on Family Life Essay -- The Social Construction o Conceiving of gender as a social construction rather than a biologically assigned identity helps explain historical fluctuations in menââ¬â¢s and womenââ¬â¢s practices and in culturally bound definitions of appropriate male and female behavior. Hansen argues that an individualââ¬â¢s gendered behavior is influenced by culturally constructed notions of what is appropriate for good mothers or good fathers or good people to do when caring for children (Hansen 7). The perception of American families as ââ¬Å"small, self-reliant units headed by a breadwinning father and cared for by a stay-at-home motherâ⬠(1) has considerable influence over family life. This cultural construction affects everything from childrearing to networking to the workplace and individuals must consciously strive to break away from these roles. Both clinging too and attempting to break from these roles can have significant effects on oneââ¬â¢s family experience. For the past two centuries at least, the tasks of child rearing and caregiving have been assigned primarily, though not exclusively to women (Hansen 6). Arlie Hochschild presents the idea of a gender strategy as ââ¬Å"a plan of action through which a person tries to solve problems at hand, given the cultural notions of gender at playâ⬠(7). This is something that is necessary for ââ¬Å"not-so-nuclearâ⬠families in order to function and get by. Women are ââ¬Å"located at the structural nexus of domestic work, child rearing, and paid labor, they nonetheless exercise some discretion about how they act on and interpret their situationsâ⬠(7). Many women take into consideration where it is appropriate to take a stand for a equality or when they should back down for the sake of a marriage or to prevent fighting within the family. Men and wome... ...ry have shaped the mindset of the people. The idea is so solidified in our minds that a complete change may never be able to occur. Either way, the most important factor for changing the family dynamic will be time. Works Cited Cherlin, Andrew J. Public and Private Families: An Introduction. 6th. New York: McGraw Hill, 2010. Print. Hansen, Karen V. Not-So-Nuclear Families: Class, Gender, And Networks of Care. New Brunswick, NJ: Rutgers University Press, 2005. Print. Johnson, Michael P. A Typology of Domestic Violence: Intimate Terrorism, Violent Resistance, and Situation Couple Violence. Boston: Northeastern University Press, 2008. Print. Tichenor, Veronica Jaris. ââ¬Å"Gendered Bargain: Why Wives Cannot Trade Their Money For Houseworkâ⬠from Earning More and Getting Less: Why Successful Wives Canââ¬â¢t By Equality. 2005. Rutgers University Press. Print.
Monday, November 11, 2019
Harshad Mehta Scam
Harshad Mehta scam: Harshad Mehtaà was an Indian stockbroker and is alleged to have engineered the rise in the BSE stock exchange in the year 1992. Exploiting several loopholes in the banking system, Harshad and his associates siphoned off funds from inter-bank transactions and bought shares heavily at a premium across many segments, triggering a rise in the Sensex. When the scheme was exposed, the banks started demanding the money back, causing the collapse. He was later charged with 72 criminal offenses and more than 600 civil action suits were filed against him.He died in 2002 with many litigations still pending against him. 3. 1 Ready Forward Deal (RF): â⬠¢ The crucial mechanism through which the scam was effected was the Ready Forward deal. â⬠¢ The Ready Forward Deal (RF) is in essence a secured short term (typically 15 day) loan from one bank to another bank. The lending is done against Government Securities exactly the way a pawnbroker lends against jewelry. â⬠¢ In fact one can say that the borrowing bank actually sells the securities to the lending bank and buys them back at the end of the period of the loan at (typically) a slightly higher price. It was this RF deal that Harshad Mehta and his associates used with great success to channel money from banking system. 3. 2 The Mechanics of the Scam: As explained above, a ready forward deal is, in substance, a secured loan from one bank to another.To make the scam possible , the RF had to undergo a complete change. In other words it practically had to become an unsecured loan to broker. This was wonderfully engineered by the brokers. To give a better understanding of the mechanism, the whole process has been segregated into 3 different parts. . The settlement process 2. Payment cheques 3. Dispensing the security 1. The settlement Process: ? The normal settlement process in government securities is that the transacting banks make payments and deliver the securities directly to each other. ? Dur ing the scam, however, the banks or at least some banks adopted an alternative settlement process which was similar to the process used for settling transactions in the stock market. ? In this settlement process, deliveries of securities and payments are made through the broker.That is, the seller hands over the securities to the broker who passes them on to the buyer, while the buyer gives the cheque to the broker who then makes the payment to the seller. ? In this settlement process, the buyer and the seller may not even know whom they have traded with, both being known only to the broker. ? There were two important reasons why the broker intermediated settlement began to be used in the government securities markets. ? The brokers instead of merely bringing buyers and sellers together started taking positions in the market.In other words, they started trading on their own account, and in a sense became market makers in some securities thereby imparting greater liquidity to the mar kets. ? When a bank wanted to conceal the fact that it was doing an RF deal, the broker came in handy. The broker provided contract notes for this purpose with fictitious counter parties, but arranged for the actual settlement to take place with the correct counter party. 2. Payment Cheques: ? A broker intermediated settlement allowed the broker to lay his hands on the cheque as it went from one bank to another through him.The hurdle now was to find a way of crediting the cheque to his account though it was drawn in favor of a bank and was crossed account payee. ? As it happens, it is purely a matter of banking custom that an account payee cheque is paid only to the payee mentioned on the cheque. In fact, exceptions were being made to this norm, well before the scam came to light. ? Privileged (corporate) customers were routinely allowed to credit account payee cheques in favour of a bank into their own accounts to avoid clearing delays, thereby reducing the interest lost on the amo unt. Normally, if a customer obtains a cheque in his own favour and deposits it into his own account, it may take a day or two for the cheque to be cleared and for the funds to become available to the customer. At 15% interest, the interest loss on a clearing delay of two days for a Rs. 100 crores cheque is about Rs. 8 lakhs. ? On the other hand, when banks make payments to each other by writing cheques on their account with the RBI, these cheques are cleared on the same day. ? The practice which thus emerged was that a customer would obtain a cheque drawn on the RBI favoring not himself but his bank.The bank would get the money and credit his account the same day. ? This was the practice which the brokers in the money market exploited to their benefit. 3. Dispensing the security: ? The brokers thus found a way of getting hold of the cheques as they went from one bank to another and crediting the amounts to their accounts. This effectively transformed an RF into a loan to a broker r ather than to a bank. ? But this, by itself, would not have led to the scam because the RF after all is a secured loan, and a secured loan to a broker is still secured. What was necessary now was to find a way of eliminating the security itself! There are three routes adopted for this purpose: 1. Some banks (or rather their officials) were persuaded to part with cheques without actually receiving securities in return. A simple explanation of this is that the officials concerned were bribed and/or negligent. A more intriguing possibility is that the banks' senior/top management were aware of this and turned a Nelson's eye to it to benefit from higher returns the brokers could offer by diverting the funds to the stock market. One must recognize that as long as the scam lasted, the banks benefited from such an arrangement.The management of banks might have been sorely tempted to adopt this route to higher profitability. 2. The second route was to replace the actual securities by a wort hless piece of paper ââ¬â a fake Bank Receipt (BR). This is discussed in greater detail in the next section. 3. The third method was simply to forge the securities themselves. In many cases, PSU bonds were represented only by allotment letters rather than certificates on security paper. And it is easier to forge an allotment letter for Rs. 100 crores worth of securities than it is to forge a 100 rupee note!Outright forgery of this kind however accounted for only a very small part of the total funds misappropriated 3. Bank Receipt: ? In an RF deal, as we have discussed it so far, the borrowing bank delivers the actual securities to the lender and takes them back on repayment of the loan. In practice, however, this is not usually done. Instead, the borrower gives a Bank Receipt (BR) which serves three functions: ? The BR confirms the sale of securities. ? It acts as a receipt for the money received by the selling bank. Hence the name ââ¬â bank receipt. ? It promises to deliver the securities to the buyer.It also states that in the meantime the seller holds the securities in trust for the buyer. ? In short, a BR is something like an IOU (I owe you securities! ), and the use of the BR de facto converts an RF deal into an unsecured loan. The lending bank no longer has the securities; it has only the borrower's assurance that the borrower has the securities which can/will be delivered if/when the need arises. BRs issued without Backing of Securities: ? As stated earlier, a BR is supposed to imply that the issuer actually has the securities and holds them in trust for the buyer.But in reality the issuer may not have the securities at all. ? There are two reasons why a bank may issue a BR, which is not backed by actual securities: 1. A bank may short sell securities, that is, it sells securities it does not have. This would be done if the bank thinks that the prices of these securities would decrease. Since this would be an outright sale (not an RF! ), the ban k issues a BR. When the securities do fall in value, the bank buys them at lower prices and discharges the BR by delivering the securities sold. Short selling in some form is an integral part of most bond markets in the world.It can be argued that some amount of shortselling subject to some degree of regulation is a desirable feature of a bond market. In our opinion, an outright sale using a BR, which is not backed by securities, is not harmful per se though it violates the RBI guidelines. 2. The second reason is that the bank may simply want an unsecured loan. It may then do an RF deal issuing a ââ¬Å"fakeâ⬠BR which is a BR without any securities to back them. The lending bank would be under a mistaken impression that it is making a secured loan when it is actually advancing an unsecured loan.Obviously, lenders should have taken measures to protect themselves from such a possibility During the scam, the brokers perfected the art of using fake BRs to obtain unsecured loans fr om the banking system. They persuaded some small and little known banks ââ¬â the Bank of Karad (BOK) and the Metropolitan Cooperative Bank (MCB) ââ¬â to issue BRs as and when required. These BRs could then be used to do RF deals with other banks. The cheques in favour of BOK were, of course, credited into the brokers' accounts. In effect, several arge banks made huge unsecured loans to the BOK/MCB which in turn made the money available to the brokers. 4. Breakdown of the Control system in scam: ? The scam was made possible by a complete breakdown of the control system both within the commercial banks as well as the control system of the RBI itself. ? We shall examine these control systems to understand how these failed to function effectively and what lessons can be learnt to prevent failure of control systems in the future. ? The internal control system of the commercial banks involves the following features: 1. Separation of Functions:The different aspects of securities tr ansactions of a bank, namely dealing, custody and accounting are carried out by different persons. 2. Counterparty Limits: The moment an RF deal is done on the basis of a BR rather than actual securities, the lending bank has to contend with the possibility that the BR received may not be backed by any/adequate securities. In effect, therefore, it may be making an unsecured loan, and it must do the RF only if it is prepared to make an unsecured loan. This requires assessing the creditworthiness of the borrower and assigning him a ââ¬Å"credit limitâ⬠up to which the bank is prepared to lend.Technically, this is known as a counterparty limit. 5. Other Aspects of the scam: ? There are several aspects of the scam which are closely related to the securities markets, but which are different from the operational aspect of the markets. ? These pertain to information that can cause significant changes in the prices of securities as well as the information supplied by the commercial ba nks on their financial performance. ? On each occasion the coupon rate was increased by 1/2%, thereby raising the coupon rate from 11. 5% to 13% during this ten month period.The major implication of raising interest rate on new borrowings is that it would trigger a fall in the market prices of the old loans which are pegged at the old (lower) interest rates. The price of the 11. 5% Government Loan 2010 dropped by 3% to 5% with each coupon rate hike. If anyone has advance information about these changes in the coupon rates, he could make enormous amounts of riskless profit by short selling the old securities just before the announcement of rate hike and buying back (covering his position) after the prices have fallen. ? Somebody who took a short position of Rs. 00 crores before the coupon hike of September 1991 could have made a profit of Rs. 15 crores, practically overnight! Since several persons in the Finance Ministry and the RBI are likely to be aware of the impending hike in the coupon rate, the chance of leakage of this all important information is always there. ? There have been several allegations in this regard. However, it will probably be very difficult to prove with any degree of certainty that there was insider trading based on information about coupon rate changes, because of the size of the market. With a daily trading volume of Rs. 3000 ââ¬â 4000 crores, it would have been very easy for anyone to take a position (based on inside information) of Rs. 500 or even Rs. 1000 crores without anyone suspecting anything untoward. 6. Impact of the scam: ? The immediate impact of the scam was a sharp fall in the share prices. The index fell from 4500 to 2500 representing a loss of Rs. 100,000 crores in market capitalization. [pic] ? Since the accused were active brokers in the stock markets, the number of shares which had passed through their hands in the last one year was colossal.All these shares became ââ¬Å"taintedâ⬠shares, and overnight they became worthless pieces of paper as they could not be delivered in the market. Genuine investors who had bought these shares well before the scam came to light and even got them registered in their names found themselves being robbed by the government. This resulted in a chaotic situation in the market since no one was certain as to which shares were tainted and which were not. ? The government's liberalization policies came under severe criticism after the scam, with Harshad Mehta and others being described as the products of these policies. Bowing to the political pressures and the bad press it received during the scam, the liberalization policies were put on hold for a while by the government. The Securities Exchange Board of India (SEBI) postponed sanctioning of private sector mutual funds. ? The much talked about entry of foreign pension funds and mutual funds became more remote than ever. The Euro-issues planned by several Indian companies were delayed since the ability of In dian companies to raise equity capital in world markets was severely compromised. Harshad Mehta Scam Harshad Mehta scam: Harshad Mehtaà was an Indian stockbroker and is alleged to have engineered the rise in the BSE stock exchange in the year 1992. Exploiting several loopholes in the banking system, Harshad and his associates siphoned off funds from inter-bank transactions and bought shares heavily at a premium across many segments, triggering a rise in the Sensex. When the scheme was exposed, the banks started demanding the money back, causing the collapse. He was later charged with 72 criminal offenses and more than 600 civil action suits were filed against him.He died in 2002 with many litigations still pending against him. 3. 1 Ready Forward Deal (RF): â⬠¢ The crucial mechanism through which the scam was effected was the Ready Forward deal. â⬠¢ The Ready Forward Deal (RF) is in essence a secured short term (typically 15 day) loan from one bank to another bank. The lending is done against Government Securities exactly the way a pawnbroker lends against jewelry. â⬠¢ In fact one can say that the borrowing bank actually sells the securities to the lending bank and buys them back at the end of the period of the loan at (typically) a slightly higher price. It was this RF deal that Harshad Mehta and his associates used with great success to channel money from banking system. 3. 2 The Mechanics of the Scam: As explained above, a ready forward deal is, in substance, a secured loan from one bank to another.To make the scam possible , the RF had to undergo a complete change. In other words it practically had to become an unsecured loan to broker. This was wonderfully engineered by the brokers. To give a better understanding of the mechanism, the whole process has been segregated into 3 different parts. . The settlement process 2. Payment cheques 3. Dispensing the security 1. The settlement Process: ? The normal settlement process in government securities is that the transacting banks make payments and deliver the securities directly to each other. ? Dur ing the scam, however, the banks or at least some banks adopted an alternative settlement process which was similar to the process used for settling transactions in the stock market. ? In this settlement process, deliveries of securities and payments are made through the broker.That is, the seller hands over the securities to the broker who passes them on to the buyer, while the buyer gives the cheque to the broker who then makes the payment to the seller. ? In this settlement process, the buyer and the seller may not even know whom they have traded with, both being known only to the broker. ? There were two important reasons why the broker intermediated settlement began to be used in the government securities markets. ? The brokers instead of merely bringing buyers and sellers together started taking positions in the market.In other words, they started trading on their own account, and in a sense became market makers in some securities thereby imparting greater liquidity to the mar kets. ? When a bank wanted to conceal the fact that it was doing an RF deal, the broker came in handy. The broker provided contract notes for this purpose with fictitious counter parties, but arranged for the actual settlement to take place with the correct counter party. 2. Payment Cheques: ? A broker intermediated settlement allowed the broker to lay his hands on the cheque as it went from one bank to another through him.The hurdle now was to find a way of crediting the cheque to his account though it was drawn in favor of a bank and was crossed account payee. ? As it happens, it is purely a matter of banking custom that an account payee cheque is paid only to the payee mentioned on the cheque. In fact, exceptions were being made to this norm, well before the scam came to light. ? Privileged (corporate) customers were routinely allowed to credit account payee cheques in favour of a bank into their own accounts to avoid clearing delays, thereby reducing the interest lost on the amo unt. Normally, if a customer obtains a cheque in his own favour and deposits it into his own account, it may take a day or two for the cheque to be cleared and for the funds to become available to the customer. At 15% interest, the interest loss on a clearing delay of two days for a Rs. 100 crores cheque is about Rs. 8 lakhs. ? On the other hand, when banks make payments to each other by writing cheques on their account with the RBI, these cheques are cleared on the same day. ? The practice which thus emerged was that a customer would obtain a cheque drawn on the RBI favoring not himself but his bank.The bank would get the money and credit his account the same day. ? This was the practice which the brokers in the money market exploited to their benefit. 3. Dispensing the security: ? The brokers thus found a way of getting hold of the cheques as they went from one bank to another and crediting the amounts to their accounts. This effectively transformed an RF into a loan to a broker r ather than to a bank. ? But this, by itself, would not have led to the scam because the RF after all is a secured loan, and a secured loan to a broker is still secured. What was necessary now was to find a way of eliminating the security itself! There are three routes adopted for this purpose: 1. Some banks (or rather their officials) were persuaded to part with cheques without actually receiving securities in return. A simple explanation of this is that the officials concerned were bribed and/or negligent. A more intriguing possibility is that the banks' senior/top management were aware of this and turned a Nelson's eye to it to benefit from higher returns the brokers could offer by diverting the funds to the stock market. One must recognize that as long as the scam lasted, the banks benefited from such an arrangement.The management of banks might have been sorely tempted to adopt this route to higher profitability. 2. The second route was to replace the actual securities by a wort hless piece of paper ââ¬â a fake Bank Receipt (BR). This is discussed in greater detail in the next section. 3. The third method was simply to forge the securities themselves. In many cases, PSU bonds were represented only by allotment letters rather than certificates on security paper. And it is easier to forge an allotment letter for Rs. 100 crores worth of securities than it is to forge a 100 rupee note!Outright forgery of this kind however accounted for only a very small part of the total funds misappropriated 3. Bank Receipt: ? In an RF deal, as we have discussed it so far, the borrowing bank delivers the actual securities to the lender and takes them back on repayment of the loan. In practice, however, this is not usually done. Instead, the borrower gives a Bank Receipt (BR) which serves three functions: ? The BR confirms the sale of securities. ? It acts as a receipt for the money received by the selling bank. Hence the name ââ¬â bank receipt. ? It promises to deliver the securities to the buyer.It also states that in the meantime the seller holds the securities in trust for the buyer. ? In short, a BR is something like an IOU (I owe you securities! ), and the use of the BR de facto converts an RF deal into an unsecured loan. The lending bank no longer has the securities; it has only the borrower's assurance that the borrower has the securities which can/will be delivered if/when the need arises. BRs issued without Backing of Securities: ? As stated earlier, a BR is supposed to imply that the issuer actually has the securities and holds them in trust for the buyer.But in reality the issuer may not have the securities at all. ? There are two reasons why a bank may issue a BR, which is not backed by actual securities: 1. A bank may short sell securities, that is, it sells securities it does not have. This would be done if the bank thinks that the prices of these securities would decrease. Since this would be an outright sale (not an RF! ), the ban k issues a BR. When the securities do fall in value, the bank buys them at lower prices and discharges the BR by delivering the securities sold. Short selling in some form is an integral part of most bond markets in the world.It can be argued that some amount of shortselling subject to some degree of regulation is a desirable feature of a bond market. In our opinion, an outright sale using a BR, which is not backed by securities, is not harmful per se though it violates the RBI guidelines. 2. The second reason is that the bank may simply want an unsecured loan. It may then do an RF deal issuing a ââ¬Å"fakeâ⬠BR which is a BR without any securities to back them. The lending bank would be under a mistaken impression that it is making a secured loan when it is actually advancing an unsecured loan.Obviously, lenders should have taken measures to protect themselves from such a possibility During the scam, the brokers perfected the art of using fake BRs to obtain unsecured loans fr om the banking system. They persuaded some small and little known banks ââ¬â the Bank of Karad (BOK) and the Metropolitan Cooperative Bank (MCB) ââ¬â to issue BRs as and when required. These BRs could then be used to do RF deals with other banks. The cheques in favour of BOK were, of course, credited into the brokers' accounts. In effect, several arge banks made huge unsecured loans to the BOK/MCB which in turn made the money available to the brokers. 4. Breakdown of the Control system in scam: ? The scam was made possible by a complete breakdown of the control system both within the commercial banks as well as the control system of the RBI itself. ? We shall examine these control systems to understand how these failed to function effectively and what lessons can be learnt to prevent failure of control systems in the future. ? The internal control system of the commercial banks involves the following features: 1. Separation of Functions:The different aspects of securities tr ansactions of a bank, namely dealing, custody and accounting are carried out by different persons. 2. Counterparty Limits: The moment an RF deal is done on the basis of a BR rather than actual securities, the lending bank has to contend with the possibility that the BR received may not be backed by any/adequate securities. In effect, therefore, it may be making an unsecured loan, and it must do the RF only if it is prepared to make an unsecured loan. This requires assessing the creditworthiness of the borrower and assigning him a ââ¬Å"credit limitâ⬠up to which the bank is prepared to lend.Technically, this is known as a counterparty limit. 5. Other Aspects of the scam: ? There are several aspects of the scam which are closely related to the securities markets, but which are different from the operational aspect of the markets. ? These pertain to information that can cause significant changes in the prices of securities as well as the information supplied by the commercial ba nks on their financial performance. ? On each occasion the coupon rate was increased by 1/2%, thereby raising the coupon rate from 11. 5% to 13% during this ten month period.The major implication of raising interest rate on new borrowings is that it would trigger a fall in the market prices of the old loans which are pegged at the old (lower) interest rates. The price of the 11. 5% Government Loan 2010 dropped by 3% to 5% with each coupon rate hike. If anyone has advance information about these changes in the coupon rates, he could make enormous amounts of riskless profit by short selling the old securities just before the announcement of rate hike and buying back (covering his position) after the prices have fallen. ? Somebody who took a short position of Rs. 00 crores before the coupon hike of September 1991 could have made a profit of Rs. 15 crores, practically overnight! Since several persons in the Finance Ministry and the RBI are likely to be aware of the impending hike in the coupon rate, the chance of leakage of this all important information is always there. ? There have been several allegations in this regard. However, it will probably be very difficult to prove with any degree of certainty that there was insider trading based on information about coupon rate changes, because of the size of the market. With a daily trading volume of Rs. 3000 ââ¬â 4000 crores, it would have been very easy for anyone to take a position (based on inside information) of Rs. 500 or even Rs. 1000 crores without anyone suspecting anything untoward. 6. Impact of the scam: ? The immediate impact of the scam was a sharp fall in the share prices. The index fell from 4500 to 2500 representing a loss of Rs. 100,000 crores in market capitalization. [pic] ? Since the accused were active brokers in the stock markets, the number of shares which had passed through their hands in the last one year was colossal.All these shares became ââ¬Å"taintedâ⬠shares, and overnight they became worthless pieces of paper as they could not be delivered in the market. Genuine investors who had bought these shares well before the scam came to light and even got them registered in their names found themselves being robbed by the government. This resulted in a chaotic situation in the market since no one was certain as to which shares were tainted and which were not. ? The government's liberalization policies came under severe criticism after the scam, with Harshad Mehta and others being described as the products of these policies. Bowing to the political pressures and the bad press it received during the scam, the liberalization policies were put on hold for a while by the government. The Securities Exchange Board of India (SEBI) postponed sanctioning of private sector mutual funds. ? The much talked about entry of foreign pension funds and mutual funds became more remote than ever. The Euro-issues planned by several Indian companies were delayed since the ability of In dian companies to raise equity capital in world markets was severely compromised.
Friday, November 8, 2019
The History of the Freedom Riders Movement
The History of the Freedom Riders Movement In 1961, men and women from throughout the nation arrived in Washington, D.C. to end Jim Crowà on interstate travel by embarking on what were called ââ¬Å"Freedom Rides.â⬠à On such rides, racially mixed activists traveled together throughout the Deep South- ignoring signs marked ââ¬Å"for whitesâ⬠and ââ¬Å"for coloredâ⬠in buses and bus terminals. The riders endured beatings and arson attempts from white supremacist mobs, but their struggles paid off when segregationist policies on interstate bus and rail lines were struck down. Despite these achievements, the Freedom Riders arenââ¬â¢t the household names like Rosa Parks and Martin Luther King Jr., but theyââ¬â¢re civil rights heroes nonetheless. Both Parks and King would be heralded as heroes for their roles in ending segregated bus seatingà in Montgomery, Ala.à How the Freedom Rides Got Started In the 1960 case Boynton v. Virginia, the U.S. Supreme Court declared segregation in interstate bus and rail stations unconstitutional. But the high courtââ¬â¢s ruling didnââ¬â¢t stop segregation on interstate bus and rail lines in the South from persisting. Enter the Congress of Racial Equality (CORE), a civil rights group. CORE sent seven blacks and six whites on two public buses headed for the South on May 4, 1961. The goal? To test the Supreme Court ruling on segregated interstate travel in the Confederate states. For two weeks, the activists planned to flout Jim Crow laws by sitting on the front of buses and in ââ¬Å"whites onlyâ⬠waiting rooms in bus terminals. ââ¬Å"Boarding that Greyhound bus to travel to the Deep South, I felt good. I felt happy,â⬠Rep. John Lewis recalled during a May 2011à appearance on ââ¬Å"The Oprah Winfrey Show.â⬠Then a seminary student, Lewis would go on to become a U.S. congressman. During the first few days of their trip, the mixed-race group of activists traveled largely without incident. They didnââ¬â¢t have security and didnââ¬â¢t need it- yet. After arriving in Atlanta on May 13, 1961, they even attended a reception hosted by the Rev. Martin Luther King Jr., but the celebration took on a decidedly ominous tone when King alerted them that the Ku Klux Klan was organizing against them in Alabama. Despite Kingââ¬â¢s warning, the Freedom Rides did not change their course. As expected, when they reached Alabama, their journey took a turn for the worse. A Perilous Journey On the outskirts of Anniston, Alabama, members of a white supremacist mob showed just what they thought about the Freedom Riders by bashing in their bus and slashing its tires. To boot, the Alabama Klansmen set the bus on fire and blocked the exits to trap the Freedom Riders inside. It wasnââ¬â¢t until the busââ¬â¢ fuel tank exploded that the mob dispersed and the Freedom Riders were able to escape. After a similar mob attacked the Freedom Riders in Birmingham, the U.S. Justice Department stepped in and evacuated the activists to New Orleans. The federal government did not want more harm to come to the riders. The Second Wave Due to the amount of violence inflicted on Freedom Riders, the leaders of CORE had to abandon the Freedom Rides or continue sending activists into harmââ¬â¢s way. Ultimately, CORE officials decided to send more volunteers on the rides.à Diane Nash, an activist who helped to organize Freedom Rides, explainedà to Oprah Winfrey: ââ¬Å"It was clear to me that if we allowed the Freedom Ride to stop at that point, just after so much violence had been inflicted, the message would have been sent that all you have to do to stop a nonviolent campaign is inflict massive violence.â⬠On the second wave of rides, activists journeyed from Birmingham to Montgomery, Alabama in relative peace. Once the activists touched down in Montgomery, though, a mob of more than 1,000 attacked the riders. Later, in Mississippi, Freedom Riders were arrested for entering a whites-only waiting room in a Jackson bus terminal. For this act of defiance, authorities arrested the Freedom Riders, housing them in one of Mississippiââ¬â¢s most notorious correctional facilities- Parchman State Prison Farm. ââ¬Å"The reputation of Parchman is that itââ¬â¢s a place that a lot of people get sent . . . and donââ¬â¢t come back,â⬠former Freedom Rider Carol Ruth told Winfrey. During the summer of 1961, 300 Freedom Riders were imprisoned there. An Inspiration Then and Now The struggles of the Freedom Riders garnered nationwide publicity. Rather than intimidate other activists, however, the brutality the riders encountered inspired others to take up the cause. Before long, dozens of Americans were volunteering to travel on Freedom Rides. In the end, an estimated 436 people took such rides. The efforts of the Freedom Riders were finally rewarded when the Interstate Commerce Commission decided on Sept. 22, 1961, to ban segregation in interstate travel. Today, the contributions the Freedom Riders made to civil rights are the subject of a PBS documentary called Freedom Riders. In addition, in 2011, 40 students commemorated the Freedom Rides of 50 years before by boarding buses that retraced the journey of the first set of Freedom Riders.
Wednesday, November 6, 2019
Evolution of music essays
Evolution of music essays In the video we saw in class we learned about the advancement of music with the development of technology. The first thing that we saw was how the bell makers now use computers to eliminate the unwanted sounds from bells by creating bells of different shape. Also we saw how the organ manipulates sound by sending it through different tubes of different diameters and by decreasing or increasing the size of the tubes then we saw how technology manipulates all those sounds by using filters. How those filters work. Sound is converted into a digital signal of ones and zeros that that signal can be filtered using hardware or software. Since sound is already converted into ones and zeroes, using software we can eliminate parts of sound for which we already know how the signal would lock like in numbers. Hardware wise I dont really know how it is done. Then we saw how a professor from a university was given the task of finding out the quemical components of the varnish and of the wood of Stradivarius violins that way we could reproduce those. When locking into the varnish he found out that the varnish contained powder made from precious stones. Then when he locked into the chemical components of the wood of the violine he found out that the wood was wood of fresh just cut wood that was marinated since it was fir a time in salt water probably do to that the wood was transported by drag in it through the sea to the place of its destination. The professor theory is that the two famous violin makers didnt really knew or specifically choose the wood and the varnish it was gust luck and being at right place at the right time. ...
Monday, November 4, 2019
Strict Censorship Policies of Google Case Study Example | Topics and Well Written Essays - 500 words
Strict Censorship Policies of Google - Case Study Example The worldââ¬â¢s largest search engine then announced redirecting to an uncensored version located in Hong Kong in the hopes of circumventing mainland Chinaââ¬â¢s laws which only heightened Chinese officialsââ¬â¢ ire. Furthermore, regardless of Googleââ¬â¢s act of leaving China, it remained to be a far competitor from the Haidu, Chinaââ¬â¢s most popular search engine. In the same vein, Google did not lose as much revenue as the Chinese market represented only a small fraction of what comprised the company (Heft and Barboza). As reported by the prevalently government lenient news agency, Xinhua, the government sees that ââ¬Å"regulation on the Internet is a sovereign issueâ⬠and that Google has no right to attempt or to impose its own standard on what the government should and should not censor (Na, Yunlu, and Hao, par. 5). There seems to be a great disparity between the conception of human rights as viewed in a Western concept especially among Americans and the en cumbrance of Chinese law which majority of its citizens tend to dismiss. To reiterate, it is difficult to point out peopleââ¬â¢s rights when they are in fact unaware that such rights do exist.The worldââ¬â¢s largest search engine then announced redirecting to an uncensored version located in Hong Kong in the hopes of circumventing mainland Chinaââ¬â¢s laws which only heightened Chinese officialsââ¬â¢ ire. Furthermore, regardless of Googleââ¬â¢s act of leaving China, it remained to be a far competitor from the Haidu, Chinaââ¬â¢s most popular search engine. In the same vein, Google did not lose as much revenue as the Chinese market represented only a small fraction of what comprised the company (Heft and Barboza). As reported by the prevalently government lenient news agency, Xinhua, the government sees that ââ¬Å"regulation on the Internet is a sovereign issueâ⬠and that Google has no right to attempt or to impose its own standard on what the government should and should not censor (Na, Yunlu, and Hao, par. 5). There seems to be a great disparity between the conception of human rights as viewed in a Western concept especially among Americans and, the encumbrance of Chinese law which majority of its citizens tend to dismiss. To reiterate, it is difficult to point out peopleââ¬â¢s rights when they are in fact unaware that such rights do exist. A countryââ¬â¢s business climate must be understood by a business professional in order to have a greater perspective on how to conduct oneââ¬â¢s self and how to carry out oneââ¬â¢s business in a certain location. This would be applicable on specific matters as people and cultures are diverse. More than this, laws are also an integral part that must be kept in mind to avoid complications that could lead to lawsuits and legal dilemmas. The instant case presents us with two sides of an argument where a companyââ¬â¢s very own principle goes against a countryââ¬â¢s law and regulations. What may be a common practice in one country may be absolutely prohibited in another and where a company cannot make amends with this fact, then there is inevitably the meandering situation where things are bound not to work out.Ã
Saturday, November 2, 2019
Jesus & Mohammed Paper Assignment Example | Topics and Well Written Essays - 1000 words
Jesus & Mohammed Paper - Assignment Example Jesus and Mohammed singlehandedly made a greatest impact on the society of their time and shaped the course of history for over two thousand years. Their religions reflected similarities and differences in lives and deaths of both Jesus and Mohammed. Jesus was born 4BC from Virgin Mary and did not have an earthly father but was raised by his mother and stepfather. Mohammed was born 570 CE (Common Era), almost 6 centuries after Jesus, from Abdullah and Aminah, and was raised mostly by his nurse as was customary in the desert countries, as well as grandfather and uncle because his parents and other closest relatives had died when he was just a boy. (Rodinson, 2002, p.46) The lives of these great religious leaders were described in hagiographical books: Jesusââ¬â¢ in Gospels and Mohammedââ¬â¢s in Suras. Jesus was a carpenter and Mohammed was first shepherd and then caravan trader. (Rodinson, 2002, p.58) Jesus was speaking Aramaic, Hebrew and Greek (Peters, 2011, p.45) but did not write any book himself; Mohammed spoke Arabic and left records that were compiled into Quran (Phipps, 1999, p.81). Jesus started his ministry at 30 and continued it for the next 3 years. Most of the time, he was staying in Galilee. It is believed that Mohammed have received a revelation and a call at 40 and ministered for 22 years traveling more widely due to his occupation. (Peters, 2011, p.65) Both Jesus and Mohammed performed miracles. The first miracle Jesus performed was turning water into wine at the wedding party (John 2:1-11); to contrast, Mohammed forbade wine drinking as he considered it ââ¬Å"an abomination of Satan's workâ⬠(Quran, Sura 5:90). Jesus attracted people by miracles, signs and sermons (Peters, 2011, p.47) and Mohammed - by his teaching and wisdom. In the Gospel, Jesus is often described in the presence of women; however, there is not a single mention about any relationship or wife. Jesus did not have a wife; he was a celibate (Peters, 2011, p.46). The n umber of Mohammedââ¬â¢s wives is uncertain as they go in Quran unnamed and uncounted (Peters, 2011, p.180). Both spiritual leaders caused religious disruption and brought change to the traditional establishments. Their ministries and teachings led to the new religion creation rather than reformation of the old. Jesus shook Judaism, stating that he was the Son of God, while Mohammed never made such claims. Their messages were contrasting in many ways. Jesus himself did not wage any war and never ordered to kill anyone. To the contrary, he taught to ââ¬Å"turn the other cheekâ⬠, did not resist the arrest and discouraged his disciples from the fight. Jesusââ¬â¢ legacy is the religion of pardon, tolerance and love even for the enemies. On the opposite, Mohammed fought in a number of battles, converting captives into Islam; he was granting them forgiveness in exchange for conversion. He wore ââ¬Å"two coats of mailâ⬠, swinging the sword and leading Muslims into war (Phi pps, 1999, p.62) He believed that Allah gave him permission to cut infidels (The Quran, Sura 9:5, 29), calling his actions ââ¬Å"Jihadâ⬠ââ¬â ââ¬Å"holy warâ⬠. Jesus death was public: he was crucified by Romans at the age 33 as one of the worst criminals, suffered an excruciating pain, was forsaken by all and a mob was spitting on him. However, after such a terrible death, Jesus resurrected and ascended to Heaven. The tomb he was buried in was opened three days after his death by angels. Mohammed
Subscribe to:
Posts (Atom)