22 resultados para Cash flow
Resumo:
21st Annual Conference of the International Group for Lean Construction – IGLC 21 – Fortaleza, Brazil
Resumo:
A Work Project, presented as part of the requirements for the Award of a Masters Degree in Management from the NOVA – School of Business and Economics
Resumo:
Fundação para a Ciência e a Tecnologia (FCT) - SFRH/BD/64337/2009 ; projects PTDC/ECM/70652/2006, PTDC/ECM/117660/2010 and RECI/ECM-HID/0371/2012
Resumo:
I investigate the impact of foreign pre-tax income on the total amount of cash held by companies and on the amount of cash that is held in companies’ foreign subsidiaries. I also investigate the impact of the existence and amount of cash held on companies’ foreign subsidiaries in the composition of cash holdings in terms of risk and liquidity. Using a sample of 100 largest U.S. non-financial and non-utilities companies I find that companies with higher earnings overseas present higher cash reserves and invest a higher fraction of their cash in risky assets. My evidence suggests that companies have a different optimization strategy for cash overseas, in which precautionary motives are not the main driver for holding cash.
Resumo:
We use a new dataset to study how mutual fund flows depend on past performance across 28 countries. We show that there are marked differences in the flow-performance relationship across countries, suggesting that US findings concerning its shape do not apply universally. We find that mutual fund investors sell losers more and buy winners less in more developed countries. This is because investors in more developed countries are more sophisticated and face lower costs of participating in the mutual fund industry. Higher country-level convexity is positively associated with higher levels of risk taking by fund managers.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.