21 resultados para Funds flow statements
Resumo:
This thesis evaluates a start-up company (Jogos Almirante Lda) whose single asset is a board game named Almirante. It aims to conclude whether it makes sense to create a company or just earn copyrights. The thesis analyzes the board game’s market, as part of the general toy’s market, from which some data exists: European countries as well as the USA. In this work it is analyzed the several ways to finance a start-up company and then present an overview of the valuation of the Jogos Almirante based on three different methods: Discounted Cash Flow, Venture Capital Method and Real Options.
Resumo:
This paper is mainly concerned with the tracking accuracy of Exchange Traded Funds (ETFs) listed on the London Stock Exchange (LSE) but also evaluates their performance and pricing efficiency. The findings show that ETFs offer virtually the same return but exhibit higher volatility than their benchmark. It seems that the pricing efficiency, which should come from the creation and redemption process, does not fully hold as equity ETFs show consistent price premiums. The tracking error of the funds is generally small and is decreasing over time. The risk of the ETF, daily price volatility and the total expense ratio explain a large part of the tracking error. Trading volume, fund size, bid-ask spread and average price premium or discount did not have an impact on the tracking error. Finally, it is concluded that market volatility and the tracking error are positively correlated.
Resumo:
The goal of this paper is to determine and to quantify how subjective brand valuation is. To do so, we review the different valuation methods and apply the Hirose model to a sample of 20 US companies from the technology sector. Even if the results vary in function of the rankings we choose as a comparison, we may identify the trend that brands are usually overvalued in those rankings. It explains why internally generated goodwill (which includes brand names) is not recognized as an intangible asset in the financial statements.
Resumo:
Research literature and regulators are unconditional in pointing the disclosure of operating cash flow through direct method a section of unique information. Besides the intuitive facet, it is also consistent in forecasting future operating cash flows and a cohesive piece to financial statement puzzle. Bearing this in mind, I produce an analysis on the usefulness and predictive ability on the disclosure of gross cash receipts and payments over the disclosure of reconciliation between net income and accruals for two markets with special features, Portugal and Spain. Results validate the usefulness of direct method format in predicting future operating cash flow. Key
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.