162 resultados para Leveraged buyout
Resumo:
The proliferation of data throughout the strategic, tactical and operational areas within many organisations, has provided a need for the decision maker to be presented with structured information that is appropriate for achieving allocated tasks. However, despite this abundance of data, managers at all levels in the organisation commonly encounter a condition of ‘information overload’, that results in a paucity of the correct information. Specifically, this thesis will focus upon the tactical domain within the organisation and the information needs of management who reside at this level. In doing so, it will argue that the link between decision making at the tactical level in the organisation, and low-level transaction processing data, should be through a common object model that used a framework based upon knowledge leveraged from co-ordination theory. In order to achieve this, the Co-ordinated Business Object Model (CBOM) was created. Detailing a two-tier framework, the first tier models data based upon four interactive object models, namely, processes, activities, resources and actors. The second tier analyses the data captured by the four object models, and returns information that can be used to support tactical decision making. In addition, the Co-ordinated Business Object Support System (CBOSS), is a prototype tool that has been developed in order to both support the CBOM implementation, and to also demonstrate the functionality of the CBOM as a modelling approach for supporting tactical management decision making. Containing a graphical user interface, the system’s functionality allows the user to create and explore alternative implementations of an identified tactical level process. In order to validate the CBOM, three verification tests have been completed. The results provide evidence that the CBOM framework helps bridge the gap between low level transaction data, and the information that is used to support tactical level decision making.
Resumo:
Continuing advances in digital image capture and storage are resulting in a proliferation of imagery and associated problems of information overload in image domains. In this work we present a framework that supports image management using an interactive approach that captures and reuses task-based contextual information. Our framework models the relationship between images and domain tasks they support by monitoring the interactive manipulation and annotation of task-relevant imagery. During image analysis, interactions are captured and a task context is dynamically constructed so that human expertise, proficiency and knowledge can be leveraged to support other users in carrying out similar domain tasks using case-based reasoning techniques. In this article we present our framework for capturing task context and describe how we have implemented the framework as two image retrieval applications in the geo-spatial and medical domains. We present an evaluation that tests the efficiency of our algorithms for retrieving image context information and the effectiveness of the framework for carrying out goal-directed image tasks. © 2010 Springer Science+Business Media, LLC.
Resumo:
Guided by theory in both the trust and leadership domains, the overarching aim of this thesis was to answer a fundamental question. Namely, how and when does trust-building between leaders and followers enhance leader-member exchange (LMX) development and organisational trust? Although trust is considered to be at the crux of the leader-follower relationship, surprisingly little theoretical or empirical attention has been devoted to understanding the precise nature of this relationship. By integrating both a typology of trustworthy behaviour and a process model of trust development with LMX theory, study one developed and tested a new model of LMX development with leader-follower trust-building as the primary mechanism. In a three wave cross-lagged design, 294 student dyads in a business simulation completed measures of trust perceptions and LMX across the first 6 months of the LMX relationship. Trust-building was found to account for unexplained variance in the LMX construct over time, while controlling for initial relationship quality, thus confirming the critical role of the trust-building process in LMX development. The strongest evidence was found for the role of integrity-based trust-building behaviour, albeit only when such behaviour was not attributed to insincere motives. The results for ability and benevolence-based trustworthy behaviour revealed valued insights into the developmental nature of trustworthiness perceptions within LMX relationships. Thus, the pattern of results in study one provided a more comprehensive and nuanced understanding of the dynamic interplay between trust and LMX. In study two, leader trust-building was investigated cross-sectionally within an organisational sample of 201 employees. The central aim of this study was to investigate whether leader trust-building within leader-follower relationships could be leveraged for organisational trust. As expected, the trust-building process instigated by members in study one was replicated for leaders in study two. In addition, the results were most consistent for benevolence-based trust building, whereas both integrity- and ability-based trust-building were moderated by the position of the leader within the organisation’s hierarchy. Overall, the findings of this thesis shed considerable light on the richness of trusting perceptions in organisations, and the critical role of trust-building in LMX development and organisational trust.
Resumo:
The eighth edition is a fundamental and essential update to the seventh edition published in 2000. This new edition examines a comprehensive range of existing and newer topics that are relevant to project financing in 2012 and explores current trends in the project finance and leasing industries. Contributors are experienced academics and practitioners. Since the first edition was published, the financial markets have undergone tremendous upheavals and many new structures and instruments have been created to meet the financing needs of business. This edition considers the wider world of project finance, applicable to such diverse situations as venture capital and leveraged buyouts, and using new approaches such as Islamic finance techniques. The eighth edition is an essential and over-due update to the previous edition published in 2000. The eighth edition updates a comprehensive review of financial and related topics which are relevant to project financing in 2012 and explores current trends in financial modelling of a project, risk management and the private finance initiatives. This is a comprehensive and practical book full of advice and tips for successful project financing, including leasing, offering a clear, easy to understand guide to a complex area with examples. The topic coverage is well organized and complete moving from the fundamentals to the more complex issues. There is an extensive glossary to support readers. Finally the use of 12 practitioner case studies brings many of these complex issues to life. This is the new edition of the clear, easy-to-understand industry-standard text on project financing. With a good overview of a broad area and using principles of project financing to explain complex structures, this book includes lots of examples and case studies (including Eurotunnel, Dabhol, multiple Paiton deals and other recent deals along with subsequent developments) to show the concepts in use, examine outcomes and to ensure you understand important issues such as effective project structuring and financing, financial modelling for project valuation, and risk management. Substantially updated and expanded to provide the latest developments in all aspects of project financing. An important manual reference, this book is a must-have for every project financier's desk. The text unites the domain of project financing with a wealth of project management techniques, supported by diagrams and charts and other pictorial features, where appropriate. All these supporting features facilitate a better understanding of the accompanying text for the reader. In many chapters there are diagrams to clarify the specific transaction structure discussed in the accompanying text. These diagrams enable the reader to get a very clear idea of the transaction structure, which is particularly useful where it is complex or unusual. There are also a number of checklists to assist stakeholders in the project and resource management of complex project financings. The new financial modelling chapters allow exploration of some of the pitfalls project models encounter, challenging the accurate replication of the project cash flows for stakeholders to evaluate. In the later new risk management chapters, worked examples are included to illustrate the techniques in practice. The new public private partnership/private finance initiatives chapter introduces readers to this new approach to public projects. References are made to useful websites throughout the text. Cases are included at the end of the main text to encourage examination of real-life examples of project financing in practice and also highlight specific issues of current interest. The book will be helpful to project finance sponsors, lawyers, host governments, bankers and providers of capital
Resumo:
In order to address problems of information overload in digital imagery task domains we have developed an interactive approach to the capture and reuse of image context information. Our framework models different aspects of the relationship between images and domain tasks they support by monitoring the interactive manipulation and annotation of task-relevant imagery. The approach allows us to gauge a measure of a user's intentions as they complete goal-directed image tasks. As users analyze retrieved imagery their interactions are captured and an expert task context is dynamically constructed. This human expertise, proficiency, and knowledge can then be leveraged to support other users in carrying out similar domain tasks. We have applied our techniques to two multimedia retrieval applications for two different image domains, namely the geo-spatial and medical imagery domains. © Springer-Verlag Berlin Heidelberg 2007.
Resumo:
Drawing from both trust-building theory and interpersonal trust literature, we investigate how trust between a leader and follower may be leveraged to influence organizational trust. We also explore the mediating mechanisms of this link and test a potential moderator. A cross-sectional, multi-foci design was adopted and participants were 201 employees within a public sector organization. Leader trustworthy behavior was found to predict organizational trust, mediated by trustworthiness perceptions and trust in the leader. Support for the boundary condition was found; namely, when leaders were more senior, the relationship between trustworthy behavior and organizational trust was stronger. The findings suggest that leaders can meaningfully influence organizational trust perceptions through the enactment of trustworthy behavior, although the strength of this effect varied as a function of their position.
Resumo:
Employee orientation problems for a resort chain were studied and addressed through action research. The implemented solution leveraged experiential learning to foster employee initiative and problem solving to instill a culture of learning, improve customer satisfaction and increase employee retention. Business results were achieved but learner/ management reaction was mixed.
Resumo:
The growth of criminal gangs and organized crime groups has created unprecedented challenges in Central America. Homicide rates are among the highest in the world, countries spend on average close to 10 percent of GDP to respond to the challenges of public insecurity, and the security forces are frequently overwhelmed and at times coopted by the criminal groups they are increasingly tasked to counter. With some 90 percent of the 700 metric tons of cocaine trafficked from South America to the United States passing through Central America, the lure of aiding illegal traffickers through provision of arms, intelligence, or simply withholding or delaying the use of force is enormous. These conditions raise the question: to what extent are militaries in Central America compromised by illicit ties to criminal groups? The study focuses on three cases: Nicaragua, El Salvador, and Honduras. It finds that: Although illicit ties between the military and criminal groups have grown in the last decade, militaries in these countries are not yet “lost’ to criminal groups. Supplying criminal groups with light arms from military stocks is typical and on the rise, but still not common. In general the less exposed services, the navies and air forces, are the most reliable and effective ones in their roles in interdiction. Of the three countries in the study, the Honduran military is the most worrying because it is embedded in a context where civilian corruption is extremely common, state institutions are notoriously weak, and the political system remains polarized and lacks the popular legitimacy and political will needed to make necessary reforms. Overall, the armed forces in the three countries remain less compromised than civilian peers, particularly the police. However, in the worsening crime and insecurity context, there is a limited window of opportunity in which to introduce measures targeted toward the military, and such efforts can only succeed if opportunities for corruption in other sectors of the state, in particular in law enforcement and the justice system, are also addressed. Measures targeted toward the military should include: Enhanced material benefits and professional education opportunities that open doors for soldiers in promising legitimate careers once they leave military service. A clear system of rewards and punishments specifically designed to deter collusion with criminal groups. More effective securing of military arsenals. Skills and external oversight leveraged through combined operations, to build cooperation among those sectors of the military that have successful and clean records in countering criminal groups, and to expose weaker forces to effective best practices.
Resumo:
In her dialogue entitled - Restructuring in the Hospitality Industry - Elisa S. Moncarz, Associate Professor, the School of Hospitality Management at Florida International University, intends for you to know the following: “Recent years have seen a proliferation of restructurings of major American corporations creating an extremely important issue that has affected U.S. business. This article discusses restructuring issues in the hospitality industry, focusing attention on its causes and motivations, as well as on its benefits and perils. The author considers the impact of restructuring on investors and management while examining recent restructurings involving hospitality firms.” In defining the concept of restructuring, Associate Professor Moncarz informs you, “Restructuring entails the implementation of fundamental and comprehensive modification of a company's operational and/or financial structure.” “It has, indeed, become fashionable to take a company apart and put it back together in a different form,” the author says. Additionally, Moncarz refers to a Wall Street Journal study, dated August 1985, which reveals that nearly half the large American corporations were, or were soon to be restructured in the 1984/85 time frame. There are several distinct types of restructurings and the author wants you to be aware of some of them. “…threats of takeover attempts, the larger part of all restructuring have been initiated willingly in order to expand or divest a company's line of business (i.e., operational restructurings) or redirect its finances (i.e., financial restructurings),” the author reveals. “Two principal types of operational restructurings are mergers and acquisitions [M&A], and divestitures [disposing of unwanted units or assets],” Moncarz further defines the concepts of expansion and divestiture. The author explains several types of financial restructuring sketches used in the hospitality industry, including stock re-purchasing, debt issuances and redemptions, swapping debt for equity, and effective theories of realigning debt through extending loans and/or revising terms. To expand their businesses, Moncarz makes anecdotal reference to several major food and beverage corporations that have successfully employed operational restructuring principles. The author wades into the shallow end of the hostile takeover pool by explaining some of the corporate restructuring concepts used to repel that aggressive technique. Walt Disney Company completely redesigned their entire upper level management structure in a successful effort to thwart a hostile takeover bid by corporate raider Saul P. Steinberg, Moncarz informs. To close, the author touches on leveraged buyouts [LBOs], and stock repurchases to divest unwanted divisions and immobilize hostile takeover attempts. A lengthy table of - Selected Restructurings in the Hospitality Industry [1982 to date of article] – is also included.
Resumo:
Exchange traded funds (ETFs) have increased significantly in popularity since they were first introduced in 1993. However, there is still much that is unknown about ETFs in the extant literature. This dissertation attempts to fill gaps in the ETF literature by using three related essays. In these three essays, we compare ETFs to closed ended mutual funds (CEFs) by decomposing the bid-ask spread into its three components; we look at the intraday shape of ETFs and compare it to the intraday shape of equities as well as examine the co-integration factor between ETFs on the London Stock Exchange and the New York Stock Exchange; we also examine the differences between leveraged ETFs and unleveraged ETFs by analyzing the impact of liquidity and volatility. These three essays are presented in Chapters 1, 2, and 3, respectively. ^ Chapter one uses the Huang and Stoll (1997) model to decompose the bid-ask spread in CEFs and ETFs for two distinct periods—a normal and a volatile period. We show a higher adverse selection component for CEFs than for ETFs without regard to volatility. However, both ETFs and CEFs increased in magnitude of the adverse selection component in the period of high volatility. Chapter two uses a mix of the Werner and Kleidon (1993) and the Hupperets and Menkveld (2002) methods to get the intraday shape of ETFs and analyze co-integration between London and New York trading. We find two different shapes for New York and London ETFs. There also appears to be evidence of co-integration in the overlapping two-hour trading period but not over the entire trading day for the two locations. The third chapter discusses the new class of ETFs called leveraged ETFs. We examine the liquidity and depth differences between unleveraged and leveraged ETFs at the aggregate level and when the leveraged ETFs are classified by the leveraged multiples of -3, -2, -1, 2, and 3, both for a normal and a volatile period. We find distinct differences between leveraged and unleveraged ETFs at the aggregate level, with leveraged ETFs having larger spreads than unleveraged ETFs. Furthermore, while both leveraged and unleveraged ETFs have larger spreads in high volatility, for the leveraged ETFs the change in magnitude is significantly larger than for the unleveraged ETFs. Among the multiples, the -2 leveraged ETF is the most pronounced in its liquidity characteristics, more so in volatile times. ^
Resumo:
Many systems and applications are continuously producing events. These events are used to record the status of the system and trace the behaviors of the systems. By examining these events, system administrators can check the potential problems of these systems. If the temporal dynamics of the systems are further investigated, the underlying patterns can be discovered. The uncovered knowledge can be leveraged to predict the future system behaviors or to mitigate the potential risks of the systems. Moreover, the system administrators can utilize the temporal patterns to set up event management rules to make the system more intelligent. With the popularity of data mining techniques in recent years, these events grad- ually become more and more useful. Despite the recent advances of the data mining techniques, the application to system event mining is still in a rudimentary stage. Most of works are still focusing on episodes mining or frequent pattern discovering. These methods are unable to provide a brief yet comprehensible summary to reveal the valuable information from the high level perspective. Moreover, these methods provide little actionable knowledge to help the system administrators to better man- age the systems. To better make use of the recorded events, more practical techniques are required. From the perspective of data mining, three correlated directions are considered to be helpful for system management: (1) Provide concise yet comprehensive summaries about the running status of the systems; (2) Make the systems more intelligence and autonomous; (3) Effectively detect the abnormal behaviors of the systems. Due to the richness of the event logs, all these directions can be solved in the data-driven manner. And in this way, the robustness of the systems can be enhanced and the goal of autonomous management can be approached. This dissertation mainly focuses on the foregoing directions that leverage tem- poral mining techniques to facilitate system management. More specifically, three concrete topics will be discussed, including event, resource demand prediction, and streaming anomaly detection. Besides the theoretic contributions, the experimental evaluation will also be presented to demonstrate the effectiveness and efficacy of the corresponding solutions.
Mount Carmel in the Commune: Promoting the Holy Land in Central Italy in the 13th and 14th Centuries
Resumo:
The Carmelite friars were the last of the major mendicant orders to be established in Italy. Originally an eremitical order, they arrived from the Holy Land in the 1240s, decades after other mendicant orders, such as the Franciscans and Dominicans, had constructed churches and cultivated patrons in the burgeoning urban centers of central Italy. In a religious market already saturated with friars, the Carmelites distinguished themselves by promoting their Holy Land provenance, eremitical values, and by developing an institutional history claiming to be descendants of the Old Testament prophet Elijah. By the end of the 13th century the order had constructed thriving churches and convents and leveraged itself into a prominent position in the religious community. My dissertation analyzes these early Carmelite churches and convents, as well as the friars’ interactions with patrons, civic governments, and the urban space they occupied. Through three primary case studies – the churches and convents of Pisa, Siena and Florence – I examine the Carmelites’ approach to art, architecture, and urban space as the order transformed its mission from one of solitary prayer to one of active ministry.
My central questions are these: To what degree did the Carmelites’ Holy Land provenance inform the art and architecture they created for their central Italian churches? And to what degree was their visual culture instead a reflection of the mendicant norms of the time?
I have sought to analyze the Carmelites at the institutional level, to determine how the order viewed itself and how it wanted its legacy to develop. I then seek to determine how and if the institutional model was utilized in the artistic and architectural production of the individual convents. The understanding of Carmelite art as a promotional tool for the identity of the order is not a new one, however my work is the first to consider deeply the order’s architectural aspirations. I also consider the order’s relationships with its de facto founding saint, the prophet Elijah, and its patron, the Virgin Mary, in a more comprehensive manner that situates the resultant visual culture into the contemporary theological and historical contexts.
Resumo:
Family health history (FHH) in the context of risk assessment has been shown to positively impact risk perception and behavior change. The added value of genetic risk testing is less certain. The aim of this study was to determine the impact of Type 2 Diabetes (T2D) FHH and genetic risk counseling on behavior and its cognitive precursors. Subjects were non-diabetic patients randomized to counseling that included FHH +/- T2D genetic testing. Measurements included weight, BMI, fasting glucose at baseline and 12 months and behavioral and cognitive precursor (T2D risk perception and control over disease development) surveys at baseline, 3, and 12 months. 391 subjects enrolled of which 312 completed the study. Behavioral and clinical outcomes did not differ across FHH or genetic risk but cognitive precursors did. Higher FHH risk was associated with a stronger perceived T2D risk (pKendall < 0.001) and with a perception of "serious" risk (pKendall < 0.001). Genetic risk did not influence risk perception, but was correlated with an increase in perception of "serious" risk for moderate (pKendall = 0.04) and average FHH risk subjects (pKendall = 0.01), though not for the high FHH risk group. Perceived control over T2D risk was high and not affected by FHH or genetic risk. FHH appears to have a strong impact on cognitive precursors of behavior change, suggesting it could be leveraged to enhance risk counseling, particularly when lifestyle change is desirable. Genetic risk was able to alter perceptions about the seriousness of T2D risk in those with moderate and average FHH risk, suggesting that FHH could be used to selectively identify individuals who may benefit from genetic risk testing.
Resumo:
The map representation of an environment should be selected based on its intended application. For example, a geometrically accurate map describing the Euclidean space of an environment is not necessarily the best choice if only a small subset its features are required. One possible subset is the orientations of the flat surfaces in the environment, represented by a special parameterization of normal vectors called axes. Devoid of positional information, the entries of an axis map form a non-injective relationship with the flat surfaces in the environment, which results in physically distinct flat surfaces being represented by a single axis. This drastically reduces the complexity of the map, but retains important information about the environment that can be used in meaningful applications in both two and three dimensions. This thesis presents axis mapping, which is an algorithm that accurately and automatically estimates an axis map of an environment based on sensor measurements collected by a mobile platform. Furthermore, two major applications of axis maps are developed and implemented. First, the LiDAR compass is a heading estimation algorithm that compares measurements of axes with an axis map of the environment. Pairing the LiDAR compass with simple translation measurements forms the basis for an accurate two-dimensional localization algorithm. It is shown that this algorithm eliminates the growth of heading error in both indoor and outdoor environments, resulting in accurate localization over long distances. Second, in the context of geotechnical engineering, a three-dimensional axis map is called a stereonet, which is used as a tool to examine the strength and stability of a rock face. Axis mapping provides a novel approach to create accurate stereonets safely, rapidly, and inexpensively compared to established methods. The non-injective property of axis maps is leveraged to probabilistically describe the relationships between non-sequential measurements of the rock face. The automatic estimation of stereonets was tested in three separate outdoor environments. It is shown that axis mapping can accurately estimate stereonets while improving safety, requiring significantly less time and effort, and lowering costs compared to traditional and current state-of-the-art approaches.
Resumo:
The tourism industry globally has grown steadily in recent decades, showing a progressive interest oriented toward rural areas due to characteristics of tranquility, nature, biodiversity, traditions and culture. Therefore, such aspects should be preserved and can be leveraged through adequate strategic orientation. Within the framework of global tourism trends community tourism is among the options that arise in the tourism market, and is one that is more likely to grow in the future. In the case of Ecuador, community tourism has become more dynamic over the years since many of the natural reserves in the country are in the hands of indigenous communities. Sustainable tourism in this sense is concerned with the maintenance of ethnic, cultural and biological diversity of the country, and current projects and regulatory laws support its development. Therefore, the aim of this paper is to present a strategy for the integrated management of community tourism following the principles of cooperation and collaboration between stakeholders, this study focuses on the Amazon region of Ecuador, specifically the province of Pastaza, in respect to how community tourism contributes to local development