7 resultados para Leveraged buyouts

em Digital Commons at Florida International University


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article presents a general overview of leveraged buyouts, relating their feasibility as an option for hospitality management. Specifically, the author explores the background and main features of leveraged buyouts, focusing attention on their risks and rewards, management's opportunities, tax ramifications, planning, and future outlook. Denny's leveraged buyout is examined in order to provide an insight into the structuring of a buyout for a major food service firm.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

When the author wrote her first article for the FIU Hospitality Review on leveraged buyouts' some five years ago, this business strategy was beginning to enjoy increasing popularity. Since that time leveraged buyouts grew to unprecedented levels both in number and size of transactions. However, following the failure of the UAL proposal and the collapse of the junk bond market in 1989, there has been a marked slowdown in buyout activity this article examines major developments affecting leveraged buyouts over the past five years and addresses their future implications for the hospitality industry.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In her dialogue entitled - Restructuring in the Hospitality Industry - Elisa S. Moncarz, Associate Professor, the School of Hospitality Management at Florida International University, intends for you to know the following: “Recent years have seen a proliferation of restructurings of major American corporations creating an extremely important issue that has affected U.S. business. This article discusses restructuring issues in the hospitality industry, focusing attention on its causes and motivations, as well as on its benefits and perils. The author considers the impact of restructuring on investors and management while examining recent restructurings involving hospitality firms.” In defining the concept of restructuring, Associate Professor Moncarz informs you, “Restructuring entails the implementation of fundamental and comprehensive modification of a company's operational and/or financial structure.” “It has, indeed, become fashionable to take a company apart and put it back together in a different form,” the author says. Additionally, Moncarz refers to a Wall Street Journal study, dated August 1985, which reveals that nearly half the large American corporations were, or were soon to be restructured in the 1984/85 time frame. There are several distinct types of restructurings and the author wants you to be aware of some of them. “…threats of takeover attempts, the larger part of all restructuring have been initiated willingly in order to expand or divest a company's line of business (i.e., operational restructurings) or redirect its finances (i.e., financial restructurings),” the author reveals. “Two principal types of operational restructurings are mergers and acquisitions [M&A], and divestitures [disposing of unwanted units or assets],” Moncarz further defines the concepts of expansion and divestiture. The author explains several types of financial restructuring sketches used in the hospitality industry, including stock re-purchasing, debt issuances and redemptions, swapping debt for equity, and effective theories of realigning debt through extending loans and/or revising terms. To expand their businesses, Moncarz makes anecdotal reference to several major food and beverage corporations that have successfully employed operational restructuring principles. The author wades into the shallow end of the hostile takeover pool by explaining some of the corporate restructuring concepts used to repel that aggressive technique. Walt Disney Company completely redesigned their entire upper level management structure in a successful effort to thwart a hostile takeover bid by corporate raider Saul P. Steinberg, Moncarz informs. To close, the author touches on leveraged buyouts [LBOs], and stock repurchases to divest unwanted divisions and immobilize hostile takeover attempts. A lengthy table of - Selected Restructurings in the Hospitality Industry [1982 to date of article] – is also included.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Employee orientation problems for a resort chain were studied and addressed through action research. The implemented solution leveraged experiential learning to foster employee initiative and problem solving to instill a culture of learning, improve customer satisfaction and increase employee retention. Business results were achieved but learner/ management reaction was mixed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Exchange traded funds (ETFs) have increased significantly in popularity since they were first introduced in 1993. However, there is still much that is unknown about ETFs in the extant literature. This dissertation attempts to fill gaps in the ETF literature by using three related essays. In these three essays, we compare ETFs to closed ended mutual funds (CEFs) by decomposing the bid-ask spread into its three components; we look at the intraday shape of ETFs and compare it to the intraday shape of equities as well as examine the co-integration factor between ETFs on the London Stock Exchange and the New York Stock Exchange; we also examine the differences between leveraged ETFs and unleveraged ETFs by analyzing the impact of liquidity and volatility. These three essays are presented in Chapters 1, 2, and 3, respectively. ^ Chapter one uses the Huang and Stoll (1997) model to decompose the bid-ask spread in CEFs and ETFs for two distinct periods—a normal and a volatile period. We show a higher adverse selection component for CEFs than for ETFs without regard to volatility. However, both ETFs and CEFs increased in magnitude of the adverse selection component in the period of high volatility. Chapter two uses a mix of the Werner and Kleidon (1993) and the Hupperets and Menkveld (2002) methods to get the intraday shape of ETFs and analyze co-integration between London and New York trading. We find two different shapes for New York and London ETFs. There also appears to be evidence of co-integration in the overlapping two-hour trading period but not over the entire trading day for the two locations. The third chapter discusses the new class of ETFs called leveraged ETFs. We examine the liquidity and depth differences between unleveraged and leveraged ETFs at the aggregate level and when the leveraged ETFs are classified by the leveraged multiples of -3, -2, -1, 2, and 3, both for a normal and a volatile period. We find distinct differences between leveraged and unleveraged ETFs at the aggregate level, with leveraged ETFs having larger spreads than unleveraged ETFs. Furthermore, while both leveraged and unleveraged ETFs have larger spreads in high volatility, for the leveraged ETFs the change in magnitude is significantly larger than for the unleveraged ETFs. Among the multiples, the -2 leveraged ETF is the most pronounced in its liquidity characteristics, more so in volatile times. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Many systems and applications are continuously producing events. These events are used to record the status of the system and trace the behaviors of the systems. By examining these events, system administrators can check the potential problems of these systems. If the temporal dynamics of the systems are further investigated, the underlying patterns can be discovered. The uncovered knowledge can be leveraged to predict the future system behaviors or to mitigate the potential risks of the systems. Moreover, the system administrators can utilize the temporal patterns to set up event management rules to make the system more intelligent. With the popularity of data mining techniques in recent years, these events grad- ually become more and more useful. Despite the recent advances of the data mining techniques, the application to system event mining is still in a rudimentary stage. Most of works are still focusing on episodes mining or frequent pattern discovering. These methods are unable to provide a brief yet comprehensible summary to reveal the valuable information from the high level perspective. Moreover, these methods provide little actionable knowledge to help the system administrators to better man- age the systems. To better make use of the recorded events, more practical techniques are required. From the perspective of data mining, three correlated directions are considered to be helpful for system management: (1) Provide concise yet comprehensive summaries about the running status of the systems; (2) Make the systems more intelligence and autonomous; (3) Effectively detect the abnormal behaviors of the systems. Due to the richness of the event logs, all these directions can be solved in the data-driven manner. And in this way, the robustness of the systems can be enhanced and the goal of autonomous management can be approached. This dissertation mainly focuses on the foregoing directions that leverage tem- poral mining techniques to facilitate system management. More specifically, three concrete topics will be discussed, including event, resource demand prediction, and streaming anomaly detection. Besides the theoretic contributions, the experimental evaluation will also be presented to demonstrate the effectiveness and efficacy of the corresponding solutions.