Thursday, September 3, 2020

The Tempest by William Shakespeare

The Tempest by William Shakespeare The connections among fathers and girls are typically specific. This association is more prominent when a dad need to raise a little girl himself. Clearly regardless of how old a little girl is a dad consistently considers her as a little young lady who needs care and protection.Advertising We will compose a custom exposition test on The Tempest by William Shakespeare explicitly for you for just $16.05 $11/page Learn More The presence of one more man close to a beautiful girl is typically considered as the endeavor to at present the dearest individual on the planet, that is the reason numerous dads are generally against their daughters’ associations with other men regardless of how great these men are. The disavowal is the principal response fathers normally understanding and their craving to check a man is comprehended. One of the fundamental conditions as indicated by which a little girl will be secured later on is the solid assuredness that a girl is in acceptable and cheri shing hands, ensured like under the father’s care. Perusing the play The Tempest by William Shakespeare, it becomes evident that a similar circumstance is going on among Prospero, Miranda and Ferdinand. Beginning the conversation with Prospero and Miranda it ought to be referenced that living on the island, Prospero sees how merciless the encompassing scene might be. Notwithstanding, Miranda is truly naã ¯ve and can't divert the basic issue from the genuine debacle. Taking consideration for a girl, Prospero is prepared to make the phony issues and put the aims of adoring Ferdinand under inquiry just to ensure that the man is prepared to battle for his little girl and to win in this fight. At the absolute starting point of the play Prospero says the accompanying to Miranda, I have sat idle however I care of thee,Advertising Looking for article on english writing? We should check whether we can support you! Get your first paper with 15% OFF Learn More Of thee, my darling, thee , my little girl, who Art uninformed of what thou craftsmanship, nothing knowing About whence I am: nor that I am more better Than Prospero, ace of a full helpless cell, And thy no more prominent dad (Shakespeare 7). This expression coordinates the further relations between Prospero, Miranda and the men who encompass her. Everything Miranda knows is the value of her farther. Being taught, affable and well bread, Miranda is an extraordinary case of a perfect little girl and a spouse. It appears that father will be happy when she meets an individual with whom they will live respectively, in any case, everything is totally extraordinary. Attempting to ensure that Miranda will be sheltered and secured, Prospero in keen on satisfying her at the island. In any case, he was unable to foresee the presence of Ferdinand who ruined all the fantasies of the dad. Each father needs their girls to be glad, be that as it may, simultaneously, numerous dads are certain that their kids will be close t o them all the time.Advertising We will compose a custom paper test on The Tempest by William Shakespeare explicitly for you for just $16.05 $11/page Learn More The presence of Ferdinand on the island and the primary scene where Miranda and Ferdinand meet each other appears to be excessively risky for Prospero. Prospero can't confide in Ferdinand and attempts to check his goals. Prospero comprehends that Miranda is going to become hopelessly enamored with Ferdinand as there is no another exit plan. A young lady has been at the island throughout the previous a long time (since she was 15) and the normal want of a young lady to adore and to be cherished is basic. Nonetheless, Prospero doesn't need Ferdinand to get such an extraordinary lady as his little girl for nothing, without fights. Prospero comprehends that being limited from the entire world, Miranda won't dismiss Ferdinand’s romance. Simultaneously thinking about his little girl as an incredible prize, excessively costl y and exceptional, Prospero utilizes his enchantment to compel Ferdinand to endure. Despite the fact that Miranda has never been become hopelessly enamored, she comprehends that she is prepared to do anything for her darling, [I weep] at mine disgracefulness, that challenge not offer What I want to give, and considerably less take What I will kick the bucket to need. In any case, this is piddling, And even more it looks to stow away itselfAdvertising Searching for exposition on english writing? We should check whether we can support you! Get your first paper with 15% OFF Find out More The greater mass it appears. Henceforth, reserved crafty, And brief me, plain and sacred guiltlessness. I am your significant other, on the off chance that you will wed me. If not, I’ll kick the bucket your house keeper. To be your kindred You may deny me, yet I’ll be your hireling Whether you will or no (Shakespeare 60) The further discourse is the declaration of the sentiments where two youngsters trade the craving to be together â€Å"a thousand thousand† hours (Shakespeare 60). Despite the fact that this scene surmises that two sweethearts won't meet any troubles, that these individuals won't endure, Miranda’s father thinks in an unexpected way. The narrative of affection talked about in the play resembles some other romantic tale needs to endure enormously to have a cheerful end. Having the option to control everything and everybody on the island, it is hard to envision that Prospero won't utilize a chance to make troubles for the fiancã © if the lad y of the hour isn't prepared (or isn't instructed) to make those. It is difficult to state whether it is the craving to ensure that all the standards are followed as when individuals love each other they are to be together. It appears that the creator of the compensation deliberately makes the snide circumstance. Darlings can be together with no challenges, be that as it may, the typical bequest of issues is unique and there is an individual who can make the complexities. In any case, the sweethearts are anticipated to be together. The writer shows the peruser that it is Prospero who joins two darlings to underline the way that everything on the island is heavily influenced by him. Accordingly, it might be presumed that the sentimental connections among Miranda and Ferdinand are conceivable simply because Miranda’s father permits them. Simultaneously, taking a gander at the circumstance from the point of view of the acknowledgeable crowd, it becomes evident that Prospero is a ctually the individual who has made extra conditions in transit for lovers’ association. For what reason is it fundamental? Regardless of whether the craving to make the circumstance which generally shows up is that extraordinary? Perusing the last words Prospero communicates to the crowd, it becomes clear that Prospero trusts himself the chief of the fates of individuals who encompass him. Miranda and Ferdinand’s love is neither anticipated nor coordinated by Prospero, that is the reason he needs to ensure that all the events which occur on the island (like it was before Ferdinand and his family showed up) are caused or constrained by him. â€Å"Our delights currently are finished. These our actors†¦Ã¢â‚¬  (Shakespeare 82) are the last words in the play which bolster the possibility of Prospero’s want to control the entire island with individuals there. In this way, the affection for two individuals some of the time depends not on the conditions which sh ow up, however on individuals who encompass them as once in a while the longing to be the principle individual in the lives of others may put under inquiry the positive aims. Shakespeare, William. The Tempest. New York: Cricket House Books LLC, 2010. Print.

Saturday, August 22, 2020

Causes of the Mexican-American War

Reasons for the Mexican-American War The causes of the Mexican-American War can to a great extent be followed back to Texas winning its freedom from Mexico in 1836. Following his destruction at the Battle of San Jacinto (4/21/1836), Mexican General Antonio Lã ³pez de Santa Anna was caught and compelled to perceive the sway of the Republic of Texas in return for his opportunity. The Mexican government, notwithstanding, wouldn't respect Santa Anna’s understanding, expressing that he was not approved to make such an arrangement and, that it despite everything thought about Texas as an area in disobedience. Any considerations the Mexican government had of recouping the region rapidly were disposed of when the new Republic of Texas got strategic acknowledgment from the United States, Great Britain, and France. Statehood During the following nine years, numerous Texans transparently preferred extension by the United States, in any case, Washington dismissed the issue. Numerous in the North were worried about adding another â€Å"slave† state to the Union, while others were worried about inciting a contention with Mexico. In 1844, Democrat James K. Polk was chosen for the administration on an expert extension stage. Acting rapidly, his ancestor, John Tyler, started statehood procedures in Congress before Polk got down to business. Texas authoritatively joined the Union on December 29, 1845. Because of this activity, Mexico undermined war yet was convinced against it by the British and French. Strains Rise As extension was bantered in Washington in 1845, discussion raised over the area of the southern outskirt of Texas. The Republic of Texas expressed that outskirt was arranged at the Rio Grande as set out by the Treaties of Velasco which had finished the Texas Revolution. Mexico contended that the stream specified in the reports was the Nueces which was found around 150 miles further north. At the point when Polk freely bolstered the Texan position, the Mexicans started gathering men and sent soldiers over the Rio Grande into the contested territory.â Responding, Polk guided Brigadier General Zachary Taylor to take a power south to authorize the Rio Grande as the outskirt. In mid-1845, he built up a base for his Army of Occupation at Corpus Christi close to the mouth of the Nueces. With an end goal to lessen strains, Polk dispatched John Slidell as pastor diplomat to Mexico in November 1845 with requests to open talks in regards to the United States buying land from the Mexicans. In particular, Slidell was to present to $30 million in return for finding the fringe at the Rio Grande just as the domains of Santa Fe de Nuevo Mexico and Alta California. Slidell was likewise approved to excuse the $3 million in harms owed to US residents from the Mexican War of Independence (1810-1821). This offer was declined by the Mexican government which because of interior shakiness and open weight was reluctant to arrange. The circumstance was additionally kindled when a gathering drove by noted pilgrim Captain John C. Frã ©mont showed up in northern California and started upsetting American pioneers in the area against the Mexican government.â  â   Thornton Affair War In March 1846, Taylor got orders from Polk to move south into the contested region and set up a situation along the Rio Grande. This was provoked by new Mexican President Mariano Paredes pronouncing in his debut address that he planned to maintain Mexican regional trustworthiness to the extent the Sabine River, including the entirety of Texas. Arriving at the stream inverse Matamoros on March 28, Taylor coordinated Captain Joseph K. Mansfield to fabricate an earthen star fortification, named Fort Texas, on the north bank. On April 24, General Mariano Arista showed up in Matamoros with around 5,000 men.â â The next night, while driving 70 US Dragoons to explore a hacienda in the contested region between the waterways, Captain Seth Thornton discovered a power of 2,000 Mexican officers. A wild firefight resulted and 16 of Thornton’s men were murdered before the rest of compelled to give up. On May 11, 1846, Polk, refering to the Thornton Affair requested that Congress proclaim war on Mexico. Following two days of discussion, Congress decided in favor of war-not realizing that the contention had just raised.

Friday, August 21, 2020

Black-Figure Amphora with Scenes of Apollo Entertaining Dionysus and Research Paper

Dark Figure Amphora with Scenes of Apollo Entertaining Dionysus and Hermes, and Theseus Killing the Minotaur situated at the Chr - Research Paper Example Apollo is remaining among Hermes and Dionysus, who are situated in collapsing stools. Apollo is playing the kithara or the lyre in the middle of the two. The lyre is by all accounts an honor for melodic rivalry. The work of art was made in Athens between 530-520 BC (Chrysler Museum Website). Expressions of the human experience are a consequence of Greek fantasies. The fine arts are classified under the Terracota Gift of the Mowbray Arch Society 2003. They are in the eighteenth floor room an and b. The workmanship shows Hermes, who is additionally alluded to as the ambassador god having a few wings joined to his shins. At the left, there is Dionysus situated, who is the richness god. He additionally fills in as the wine god. He has been spared as a newborn child by Hermes (Chrysler Museum Website). The opposite side of the course of action is the Athenian legend known as Theseus. The saint is secured a human battle with Minotaur. Minotaur is a mammoth that has the body of a person, ho wever the leader of a bull. He looks startling and tremendous. Likewise, there are two ladies that are taking a gander at Theseus. They are enthusiastic about what Theseus is doing: he is executing blood sprays and Minotaur from the neck of Minotaur. As per the current Greek legend, Theseus, who is a child to King of Athens, Aegeus, had elected to be among the seven youthful me and ladies that were every year sent to the city of Athens to be utilized as Crete’s tribute and were to be relinquished to the Minotaur. Theseus, rather than turning into a casualty, slaughtered the mammoth and wound up safeguarding every one of his mates. The craftsman of the referenced fine arts applied Lysippides’ painter way. The general components of the figures are 16.5 inch, which is a likeness 41.9 centimeters. The article number of human expressions is 2003.18. The craftsmanship exhibition is 114 (Chrysler Museum Website). I picked the above work of art because of the exciting and lege ndary story behind it. I know about the story and picking this work of art would really give me more point by point data about it than what I definitely knew. Minos, the King loathed the Athenians since they murdered his child. So as to vindicate, he requested the sending of the Athenian young people to Crete to take care of the Minotaur †the half bull and half man. He used to live in the maze under the King’s castle. Ruler Aegeus was extremely furious and sworn that he would pass without anyone else and execute the Minotaur, notwithstanding, his child, Thaseus went. The show arrived at its pinnacle when King Minos’ little girl, Ariadne, began to look all starry eyed at Theseus and proceeded to help him in the battle. She sneaked past the few watches and gave Theseus a blade and a long wad of string. Theseus entered the labyrinth, in the long run loosing the string. He went to the Minotaur’s sanctuary and had a brutal and horrible fight with the gigantic Mi notaur. He won the fight and the Minotaur kicked the bucket. Afterward, he discovered out the awful labyrinth by following the string trail (Connor 132). The above fascinating Greek legend filled in as an inspiration towards my craving to find out about the fine art identified with it, consequently the decision. Other than the story behind the work of art, the effectiveness and the expertness of the maker of the fine art likewise assumed a major job as a factor that impacted my choice to pick this specific craftsmanship a great deal. The craftsman has utilized expressive lines in the formation of the photograph. This is on the grounds that the image depicts, in a point by point way, the expectation, or the objective of the craftsman who made it. In craftsmanship, expressive lines effectively reveal or delineating the artist’

Sunday, June 7, 2020

Finance project on fixed income - 4675 Words

Finance project on fixed income (Research Paper Sample) Content: A project on fixed income securities and derivatives. This included currency swaps, option pricing, bootstrapping methodology Answer 1 a) Redemption yield It is the  total  return  anticipated on a  bond  if the bond is held until the end of its lifetime. Redemption yield is considered a  long-term  bond yield, but is expressed as an  annual  rate. In other words, it is the  internal rate of return  of an investment in a bond if the investor holds the bond until  maturity  and if all payments are made as scheduled. Par yield A par yield curve is a graph of the yields on hypothetical Treasury securities with prices at par. On the par yield curve, the  coupon rate  will equal the yield-to-maturity of the security, which is why the Treasury bond will trade at par. Yield to put The  annual  yield  on  a  bond,  assuming  the  security  will  be  put  (sold  back  to  the  issuer)  on  the  first  permissible  dateafter  purchase.  Bonds  are  quoted  in  this  manner  only  if  they  sell  at  a  price  below  the  put  price.  Therefore,  the  yieldincludes  interest  and  price  appreciation Yield to worst Yield to worst  (YTW) is the lowest yield an investor can expect when investing in a callable bond. (b) Bond equivalent yield = [(par value - purchase price)/purchase price] * [365/days to maturity] = 7.94 % (c) Discount yield = [(par value - purchase price) / par value] * [365/days to maturity] = 7.78% (d) Convexity  is a measure of the curvature or 2nd derivative of how the price of a bond varies with interest rate, i.e. how the duration of a bond changes as the interest rate changes. Specifically, one assumes that the interest rate is constant across the life of the bond and that changes in interest rates occur evenly. As convexity increases, the  systemic risk  to which the portfolio is exposed increases. As convexity decreases, the exposure to market interest rates decreases and the bond portfolio can be considered hedged. In general, the higher the  coupon rate, the lower the convexity (or market risk) of a bond. This is because market rates would have to increase greatly to surpass the coupon on the bond, meaning there is less risk to the investor. Answer 2 Refer excel for (a), (b) (c) Comparing the yield curves of different types of securities can help investors determine the "relative value" of a bond and can also help to create strategies to increase a portfolio's total return. Investors may wish to compare the German Sovereign yield curve against BB-rated corporate bonds, for example, to see how much additional yield they could capture by assuming some credit risk. One way to do this is to review the "spread," or the difference in yields between different types of securities. Investors can also evaluate spreads from a "current vs. historical" standpoint. In other words, let's say the spread today between a 3 German bonds vs. a 3-year BB corporate bond is +50 basis points. Perhaps the spread was only +35 basis points a year ago. If that's the case, the BB-rated corporate bond, with the +50 basis points yield advantage today, looks particularly attractive. (d) German Bund 10 year yield is 0.13 % (/markets/rates-bonds/government-bonds/germany) whereas the yield for Greece 10 year bond is 8.744 % (http://data.cnbc.com/quotes/GR10Y-GR). The spread is approximately around 8.61 %. This is higher than the long term average of 5.72%.The yield in German Bund is falling. Falling yields mean bond prices are being bid higher as investors look for safe places to park their money. And what's good for bonds is bad for people. Under certain circumstances, such alternative spreads may give a more true and fair view of the development in interest rates over time, e.g. in connection with general macroeconomic analyses. It would be complacent to altogether ignore the possibility that the latest widening of Greek spreads portends another wave of euro zone crisis down the line. Answer 3 * Duration and Convexity can be used to measure the changes in Bond prices in relative to changes in yield rates Duration: It  is a measure of the sensitivity of the price (the value of principal) of a fixed-income investment to a change in interest rates. Duration  is expressed as a number of years. Rising interest rates mean falling  bond  prices, while declining interest rates mean rising  bond prices. It is calculated as follows Percentage change = percentage change in yield * 100*Duration Convexity - Bond convexity  is a measure of the non-linear relationship between price and yield duration of a  bond  to changes in interest rates, the second derivative of the price of the  bond  with respect to interest rates (duration is the first derivative) Change in percentage due to convexity = convexity *  ½ * 100 * change in yield squared Estimating a Bond's Price Given Duration, Convexity and Change in Yield.This is done by simply adding the convexity adjustment and the percentage price change due to duration equations to achieve an estimate that is closer than just a duration measure. Total Price change  =  (-duration x change in yield x 100) + (C*1/2 x change in yield squared x 100) Example: Total Price ChangeUsing the Stone Co. bonds that had duration of 5.5, let's add a convexity of 93 and an increase of 150 bps in yield. Answer: Price IncreaseTotal Price Change = (-5.5 x .0150 x 100) + (93 x .0150 squared x 100) = -8.25 + 1.046= -7.204so if rates increase by 150 bps, the price will decrease by 7.2% Now let's look at a decrease of 150 bps in yield. Answer: Price Decrease Total Price Change = (-5.5 x -.0150 x 100) + (93 x -.0150 squared x 100) = 8.25 + 1.046= 9.29 So if rates decrease by 150 bps, the price will increase by 9.3 % (b) % change in Price = - Modified Duration * Change in yield *100 + Convexity *1/2 * Change in yield squared * 100 $ amount change of increase in yield -25.0369 $ amount change for decrease in yield 36.55185 (c) Interest rate sensitivity  is a measure of how much the price of a fixed-income asset will fluctuate as a result of changes in the  interest rate environment. Securities that are more  sensitive  will have greater price fluctuations than those with less  sensitivity. One of the primary objectives of asset/liability management is to maximize the net interest margin while minimizing the earnings risk associated with changes in interest rates. When a bank's assets and liabilities do not reprice at the same time, the result is a change in net interest income. The change in the value of assets and the change in the value of liabilities will also differ, causing a change in the value of stockholder's equity. The various risks associated with managing interest rate Reinvestment risk--variability in realized yield caused by changing market rates for coupon reinvestment. Price risk--variability in realized return caused by capital gains/losses or that the price realized may differ from par. Price risk and reinvestment risk offset one another, depending upon maturity and coupon rates. (d) The duration of fixed income liabilities is 1.5 years whereas the duration of loan deposits is 3 years. This has created a duration gap in the bank Duration gap- It is a financial and  accounting  term and is typically used by banks, pension funds, or other financial institutions to measure their risk due to changes in the interest rate. This is one of the mismatches that can occur and are known as  asset liability mismatches. Another way to define Duration Gap is: it is the difference in the price sensitivity of interest-yielding assets and the price sensitivity of liabilities (of the organization) to a change in market interest rates (yields) Duration gap = duration of earning assets à ¢Ã¢â€š ¬Ã¢â‚¬Å" duration of paying liabilities *(paying liabilities/ earning assets) = 3-1*(99/100) = 2 * .99 =1.98 So this means that asset duration is more than the duration of liabilities. The change is asset values happen more quickly than change is liabilities Positive DGAP indicates that assets are more price sensitive than liabilities, on average. Thus, when interest rates rise (fall), assets will fall proportionately more (less) in value than liabilities and EVE will fall (rise) accordingly To immune the bank from rate changes, it needs to decrease the asset duration by 1.98 years. Or it can increase the liability duration by 1.98 * 99/100 = 1.96 years Various strategies that can be used are as follows Zero-coupon bonds have no reinvestment risk. The duration of a zero equals its maturity. Buy a zero with the desired holding period and lock in the yield to maturity. To assure that the promised yield to maturity is realized, investors select bonds with durations matching their desired holding periods. (Duration-matching approach). Selecting a bond maturity equal to the desired holding period (maturity-matching approach) eliminates the price risk, but not the reinvestment risk. Yield curve strategy - When the U.S. economy hits its peak, the yield curve typically inverts, with short-term rates exceeding long-term rates. As the economy contracts, the Federal Reserve typically increases the money supply, which causes the rates to fall and the yield curve to return to its "normal" shape. To take advantage of this trend, when the yield curve inverts, banks could a)Buy long-term non-callable securities b )Prices will rise as rates fall c ) Make fixed-rate non-callable loan...

Sunday, May 17, 2020

Accounting Dissertations

Sample details Pages: 11 Words: 3168 Downloads: 8 Date added: 2017/06/26 Category Statistics Essay Did you like this example? Abstract The Financial Accounting Standards Board (FASB) and International Accounting Standards Board (IASB) are reviewing their guidelines on lease accounting this year. This paper provides background information on the Securities and Exchange Commission (SEC), FASB and IASB including what their role is in accounting. It details the history of lease accounting for them, changes that have occurred since the original guidelines were issued, and why the FASB and IASB are looking to update the current standards. History and Future of Lease Accounting for Leases The history of lease accounting provides numerous changes to the standards. FASB 13 is the last major change that has been made and that was 30 years ago. The financial community describes the changes that could arise from the FASB and IASB as an effort to bring transparency to company balance sheets. This is a continuing reaction to Enron and certain happenings earlier in the decade that brought off-balance sheet items to the forefront. There is a lot of focus on off-balance sheet obligations now. Don’t waste time! Our writers will create an original "Accounting Dissertations | Financial Accounting Standards Dissertation" essay for you Create order Users of financial statements depend on the statements to provide important information about a companys performance, financial condition, and the cash flow. Financial statement users include bankers deciding whether to lend money or renew a loan to a company, suppliers deciding to extend you credit. The FASB and IASBs conceptual framework objective is to provide a common framework that provides useful and complete accounting information (Monson, 2001). Standard Setting Bodies Security and Exchange Commission The Security and Exchange Commission (SEC) was established in 1933 after the Crash of 1930. Prior to this time there, no standard setting body existed. Even after its formation, the SEC encouraged the private sector to set them. In 1934, the SEC received the authority to establish financial accounting and reporting for publicly held companies. Committee on Accounting Procedures In 1939, the SEC suggested that the American Institute of Certified Public Accountants (AICPA) create a formal standard setting body. The AICPA established the Committee on Accounting Procedures (CAP). During its reign from 1939 to 1959, they issued 51 Accounting Research Bulletins. CAP was not as successful as had been hoped. CAP only issued standards on problems as they occurred. These standards are known as Accounting Research Bulletins or ARBs. Accounting Principles Board The Committee on Accounting Procedures was replaced with the Accounting Principles Board (APB) in 1959. They issued 31 opinions and 4 statements over the next 14 years. They are credited with the development of Generally Accepted Accounting Principles (GAAP) from the opinions and statements they issued. Financial Accounting Standards Board The APB was replaced by the Financial Accounting Standards Board (FASB), which was formed in 1973. FASB is an independent board with full-time members who no longer work in private firms or their employers. FASB establishes standards for businesses in the private sector. As part of the FASB mission statement it states that, standards are essential to the efficient functioning of the economy because investors, creditors, auditors, and others rely on credible, transparent, and comparable information (Financial, 2007.). In Facts about FASB (2007), the FASB seeks to accomplish their mission by acting to keep standards current to reflect any changes in methods of doing business, to improve the usefulness of financial reporting by focusing on relevance, reliability, comparability, and consistency, and to promote the international convergence of accounting standards. International Accounting Standards Board The International Accounting Standards Board (IASB) established in 2001 is based in London. It succeeded the International Accounting Standards Committee (IASC), which was founded in 1973. The IASB develops a solitary set of global accounting standards that provide transparent and comparable information in financial statements. The IASB works with national accounting standards bodies to accomplish a united set of accounting standards to be used around the world. Original Standards for Leases ARB 43, Chapter 14 In 1949, the Committee on Accounting Procedures issued ARB 43, Restatement and Revision of Accounting Research Bulletins, Chapter 14 Disclosure of Long-Term Leases in Financial Statements of Lessees. ARB 43, Chapter 14 only provides guidance for leasing land and buildings. ARB 43 (1953) requires that the lessee assumes all the expenses and obligations of ownership, such as taxes, insurance, and repairs. These types of arrangements differed from conventional long-term leases but the principles of disclosure were intended to be applied to both types of arrangements. The disclosures that need to be reported included the amount of annual rent to be paid, the period for which the payments are payable. The disclosure is to be reported for the life of the lease not just the first year. In the first year of the lease, the disclosure needs to detail the transaction (FASB, 1953). APB Opinion No. 5 The Accounting Principles Board issued Opinion No. 5, Reporting of Leases in Financial Statements of Lessees in September 1964 and supercedes ARB 43, Chapter 14. Since ARB 43 had been issued, leases had been disclosed on financial statements but not in a consistent manner. The information disclosed was often not enough for investors to get a clear picture of a companys financial position. According to APB Opinion No. 5 (1967), there had been very few instances of capitalization of leased property and recognition of the related obligation. In Accounting Principles Boards Opinion No. 5, rental (lease) payments for services, property taxes, utilities, maintenance, etc. are to be treated as an expense. Having the right to use property and paying a specific rental amount over a period are not considered an asset or liability. An operating lease should disclose relevant information about the lease or rental agreement and the information disclosed will vary from one situation to another. Lessees were to disclose the minimum annual payments and length of time at the least. The maximum they should disclose was the type of property leased, the obligation assumed, requirements of the lease. APB No. 5 (1967) states a capitalized lease may require a note or schedule to disclose the details of the lease agreement. Lease arrangements that are similar to an installment purchase should be listed on the balance sheet and depreciated accordingly. For a lease agreement to be capitalized there should be material equity in the purchase. IAS 17 The International Accounting Standards Board (IASB) issued IAS 17, Accounting for Leases, in September 1982. A lease is classified either as a finance lease or an operating lease. A finance lease is classified as such if it transfers substantially all the risks and rewards (International, 2003) to the lessee. Leases are classified as an operating lease if they do not meet the criteria of a finance lease. The following situations would lead a lease to be classified as a finance lease: Transfer of ownership of the asset to the lessee at the end of the lease The lessee has the option to purchase the asset at an amount that is sufficiently lower than the fair value The lease term is for most of the assets life At the beginning of the lease, the present value of the minimum lease payments is equal to the fair value of the asset. (International, 2003) IAS 17 (2003) requires that the following accounting principles be applied to finance leases. The finance lease should be recorded as an asset and a liability, lease payments should be distributed between finance charges or interest expense and the principle amount of the liability, and depreciation should be calculated using the same method as that of the companies owned assets. The International Accounting Standards Board (2003) defines the disclosure requirements lessees of finance leases must follow. Lessees of finance leases disclose the carrying amount of the asset, reconciliation between total minimum lease payments and the present value, amounts of minimum lease payments as of the balance sheet date, and the present value for the next years, years 2 through 5 combined, and beyond 5 years and a general description of the lease arrangement. In section 35 of IAS 17, the International Accounting Standards Board (2003) provides disclosure details for lessees of operating leases. Lessees must recognize lease payments as an expense on the income statement. They should provide in the financial statement disclosure a description of the lease arrangement, including any provisions, whether there is a purchase option, and any restrictions that are imposed. Also, lease payments as of the financial statement date for the next year, years 2 through 5 combined, and beyond 5 years. Changes to Original Standards APB Opinion No. 31 The Accounting Principles Board issued Opinion No. 31, Disclosure of Lease Commitments by Lessees, on June 1972 with an effective date of January 1, 1974. Opinion No. 31 was developed because investors, grantors, and users of financial statements acknowledged that at the time the disclosures did not provide all the information they deemed important. The APB issued it to clarify and now require the disclosure requirements of APB Opinion No. 5. The Board did not want to establish any disclosure requirements because the FASB had placed leases as a subject on its agenda at the time this was issued. The Board was hesitant because they did not want to bias the decision. The Board reworded its requirements for the disclosures of operating leases. A lease that is for one year or more needs to provide the total rental expense. The minimum rental payments should be disclosed for each of the five succeeding years, each of the next three to five year periods, and the remainder should be listed as a single amount. Additional disclosures that should be included are whether the payments are dependent upon any factors other than time, if so what is the basis for calculating the payments, is there a purchase or renewal option, and any restrictions. (FASB, 1973) FAS 13 In November 1976, the Financial Accounting Standards Board issued FAS 13, Accounting for Leases. The issuance was to provide detailed criteria that other statements had supplied for classifying leases that would prevent many different interpretations. This statement superseded APB Opinion No. 5, Reporting of Leases in Financial Statements of Lessees and APB Opinion No. 7, Reporting of Leases in Financial Statements for Lessors. FAS 13 established standards of financial reporting for both lessees and lessors. The standard provided a definition of leases, how leases should be classified, and what needed to be disclosed. The Financial Accounting Standards Board (1976) defined a lease as an agreement conveying the right to use property, plant, or equipment usually for a stated period of time. This definition includes agreements that although may not be identified as a lease but falls under the definition. FAS 13 (1976) states that a lease is classified either as an operating lease or as a capital lease. Capital leases meet one or more of the criteria FASB established for a capital lease. The criteria for classifying leases as a capital lease are: The lease transfers ownership of the asset at the end of the lease term. The lease contains a bargain purchase option The lease is longer than 75% of the products economic life The present value of the lease is more than 90% of the asset value using the lessees incremental borrowing rate. (FASB, 1976) FAS 13 provided the following accounting principles that are applied when it is determined that a lessee is involved in a capital lease. The lessee records a capital lease as an asset and liability for the amount equal to the value of the lease payments. If the lease has a bargain purchase option or if the property transfers ownership at the end of the lease term, the asset is depreciated according to the lessees normal depreciation for owned assets. If the lease does not contain a bargain purchase option or if the property does not transfer ownership at the end of the lease, the asset is depreciated for the life of the lease. Leases that do not meet the criteria of a capital lease are classified as an operational lease and are treated as an expense for the term of the lease on the income statement. (FASB, 1976) Capital leases should disclose the gross amount of the asset and the future minimum lease payments. Operating leases should disclose the future minimum rental payment required, a general description of the terms of the lease agreement to include how the rental payments are determined, terms of renewal or purchase option, any restrictions that may apply. FASB and IASB to Update Lease Standards In July 2006, the FASB and IASB announced that it had added a leasing project to its agenda to reconsider all aspects of lease accounting. One reason for the project is to harmonize lease accounting standards with the IASB. The IASB and FASB currently have substantial differences in their treatment of leases; particularly notable is that the bright line tests of FAS 13 (whether the lease term is 75% or more of the economic life, and whether the present value of the rents is 90% or more of the fair value) are not used by the IASB, which prefers a facts and circumstances approach that entails more judgment calls (Open, 2006). Both the FASB and IASB have the finance and operating lease concept. However, their criteria are different for classification. Another reason is a request from investors and other authoritative bodies who have been criticizing that similar lease transactions were still being accounted for in different ways. In the SECs 2005 report in response to Sarbanes-Oxley the SEC stated that too many leases were being kept off the balance sheet. The commissions staff estimated that the standards allow publicly traded companies to keep an undiscounted $1.25 trillion in future cash obligations off their balance sheet (Leone, 2006). Therefore, the current accounting standards are failing to provide the necessary complete and transparent information. FASB and IASB hope to have an exposure draft available in 2009. Solutions There are two solutions to the lease problem. The FASB and IASB can either recommend leases to be reporting on a companys income statement only as an expense or on a companys balance sheet only as an asset and liability. Income Statement Only Using the income statement only solution, companies would report their leases as operating lease. An operating lease recognizes the lessees payments as rent expense or lease expense on the income statement. Balance Sheet Only Using the balance sheet only solution, companies report their leases on the balance sheet as an asset and liability. It will also allow for depreciation and interest expense on the income statement. Capitalization of all leases will bring previously unreported assets and liabilities onto the balance sheet Analysis When companies lease an asset, the way it is accounted for depends on whether it is categorized as an operating or capital lease. How a lease is categorized may be different for tax purposes then for accounting purposes. The GAAP standards and Internal Revenue Service can have different sets of criteria. According to IRS Revenue Ruling 55-540 the IRS is wary of lease arrangements used to accelerate depreciation deductions. The IRS has no general rule for leases and each case is decided on an individual basis. However, from decisions previous made the following factors indicate a sale instead of a lease. If the asset meets one or more of the factors, it is considered a sale NOT a lease. A portion of the payments are specifically allocated as interest or it is obvious that is what is intended. The title is transferred at the end of the rental term. The lessee may purchase the asset at the end of the lease term for a bargain purchase price. When a lease qualifies as an operating lease, there are major consequences for the net income or loss and the return ratios of that company. In general, both the operating and net income of the firm will be decreased and the assets and liabilities for the firm will be understated. Debt management ratios are important to creditors and stockholders. Creditors want to make sure funds are available to pay interest and principal and are therefore particularly interested in short-run coverage ratios. Stockholders are concerned about the impact of excessive debt and interest on long-term profitability. Lenders and investors use such ratios as debt to equity, current ratios, and return on assets to evaluate the credit risk of current or prospective businesses. Ratios are used to measure the effectiveness that a company uses its assets and to compare a companys current performance. As shown below in the comparison of ratios in an operating or capitalized lease, the financial ratios can be misleading just by reporting leases off the balance sheet. By reporting the lease of ABC Restaurant, Inc. (Figures 1-4) as an operating lease or ABC Restaurant, Inc. (Figures 5-8) as a capitalized lease, the companys financial statements are affected. The financial statements of both are identical except for the accounts that were affected by the relative lease. The financial statements are not as accurate as investors and lenders are demanding. The current ratio is a quick indication of whether or not the company will have the means to pay its bills during the next year. It is clear to remain solvent, a company must have at least as much money coming in as it has going out. The current ratio is .31 for the operating lease and .30 for the capitalized lease. A current ratio over 1.5 to 2.0 is generally required for comfort. The debt ratio for the operating lease is 1.68%. In comparison, the debt ratio for the capitalized lease is 1.64%. A high debt ratio is generally viewed as risky by lenders and investors. The debt to equity ratio equals -1.32 and their return on assets is 38.45%. In relation to the capitalized lease which had a debt to equity ratio of -1.40 and their return on assets is 34.05%. The effect of a capital lease on net income is different then that of an operating lease because capital leases are treated the same as if assets are bought by the company. The company is allowed to claim depreciation on the asset and the interest payments on the lease are a tax deductions. By reporting assets on the balance sheet, this provides an increased level of information to lenders. This is especially useful to lenders of non public business or the small (S Corporations) who elect to omit disclosures on the financial statements. When a company does this those who review their financial statements will be misled because there will be no evidence of a lease existing. The payments will be accounted for on the income statement as rent expense or lease expense. Thereby, reducing the net income of those companies income statements. The AICPA issues Statements on Standards for Accounting and Review Services. The FASB issues standards for the public. The process for both the AICPA and the FASB starts with deliberations that are open to the public; the proposed Statements are then issued as Exposure Drafts, which allows the public to comment on them prior to the final pronouncement issued. Many accountants issued their opinions on what they feel should be done about this 30-year-old standard. Conclusion Currently, the lease standards are outdated. Lease arrangements have evolved considerably over the past 30 years and the standards are outdated (Miller, 12). FAS 13 was suppose to force leases to be capitalized but it did nothing but help lease companies create more cunning operating leases. The misclassification of leases affects not only the balance sheet but also the income statement and cash flow statement.

Wednesday, May 6, 2020

Essay On Investigative Journalism - 1366 Words

Complicating definitions: Latin American watchdogs [en] el periodismo de investigacià ³n†¦, sos tan grande como el enemigo que elegà ­s o como el desafà ­o que elegà ­s†¦ eso es lo que define tu capacidad de grandeza Eduardo Galeano (interviewed by Faà ºndez, 2002: 11) The narratives and the evidence about the status of IJ in Latin America are contradictory. For some, there is an increasing practice of this genre of journalism (Alves, 2005; Castillo, 2016; Joyce, Saldaà ±a, Schmitz Weiss, Alves, 2017) while for others, there is a relative declining of it (Dermota, 2002). These perceptions heavily depends on the chosen type of medium (newspapers, television, digital), the massiveness of them (mainstream or independent/non-profit), or the period of†¦show more content†¦Indeed, these countries share certain backgrounds, such economic crisis in the 1980s and the 1990s and the consequential foreign debt and adjustment policies, high inequality, poverty, and a skyrocketing corruption that came afterwards. Expressed in particular local tones, these features have framed Latin America’s entrance to neoliberalism during the 1990s. Violence in different shapes is also a common ground for Latin American societies, but with different patterns. For example, drug trafficking and drug lords’ violence –eventually in partnership with local authorities- are rather a familiar experience for Colombian and Mexican media workers, while political state violence was a landmark during dictatorships in South America. Cases of these unlikely experiences of violence against journalists populate this landscape. Colombian editor, Guillermo Cano, was killed by gunmen in Medellà ­n (Colombia) in the 1980s, as well as occurred to Javier Valdez in Cualiacà ¡n (Mà ©xico) in 2017; while reporters Rodolfo Walsh and Josà © Carrasco Tapia were victims of state polices’ brutality in Argentina in the 1970s and in Chile in the 1980s, respectively. Although violence was the shared feature of these cases, the contexts, the driven forces, and the journalists as targets vary. Precisely these Latin American particularities –among others- have challenged the established Anglo-American operationalization of IJ andShow MoreRelatedInvestigative Journalism Specialization Essay554 Words   |  3 PagesI was working for six months on my thesis research, a journalistic investigation entitled â€Å"The Other Side of Ecomafia †. It was my first experience as an investigative reporter, but I immediately realized that it would not be the last. Indeed, the problems my land was going through in those years awakened a passion for investigative journalism in me. The thesis has been an exciting challenge. It gave me the opportunity to conduct an in-depth research over several months, gather and organize largeRead MoreThe Importance of Investigative Journalism Essay769 Words   |  4 PagesThough connected through the general base of being a part of the media, investigative journalism is far from the daily reporting and paparazzi reports we are used to. Investigative journalists look to bring attention to violated laws, regulations or wrongdoings that they feel very strongly about. The topic of their research is completely up to their own personal interest and choosing. Their research often takes a long time to collect, and must be very thorough and involve many different sources whileRead MoreEssay on Investigative Reporting is the Driving Force in Journalism2455 Words   |  10 PagesInvestigative reporting has been a driving force in journalism for centuries. The reporting tradition of revealing misconduct was already well established muc h before the 20th Century. Its practise even predates the publication of the first successful colonial newspaper in 1704, demonstrating the press’ watchdog role has had deep historical roots in democracy much prior to the 1960s. Over the past three centuries, investigative reporters have tried to make a difference by raising public consciousnessRead MoreThe Field Of The Investigative Journalism1508 Words   |  7 Pagesthe journalistic field in a wider and strong way that other cultural transformations did before within the cultural field. Doing so, says Bourdieu, television and journalistic field have also triggered transformations in other fields upon which journalism has an impact. As it is performed, the journalistic field tends to reinforce the economic (commercial) field instead of the pure one. Following Bourdieu, the journalistic field was settled during the 19th Century through the opposition between theRead MoreThe Modern Era Of Reporting944 Words   |  4 Pages Journalism has come a long way since its early time, but has remained the same fundamentally. This essay will explain the different types of eras in reporting the news, starting from the colonial era all the way to what is currently called the modern era of reporting. This will also define the terms of the Penny Press, Jazz journalism, Yellow journalism, and Muckraking to its specific era. In 1690, Benjamin Harris published the first American newspaper. Freedom of press wasn’t exactly in styleRead MoreAl Jazeera and CNN1741 Words   |  7 Pageschallenged the CNN because it has juxtaposed itself with the few media conglomerates that have monopolized the market and they have highlighted the profit media outlets tendency to â€Å"emphasize or ignore stories to serve their corporate purpose† 3. This essay will unpack the issues that accompany the journalistic trends and what drives these trends in both the non-profit media outlet Al Jazeera and the profit media outlet CNN. It will discuss the issues that an emphasis on profits have on the public sphereRead MoreAnalysis Of The Editorial Rolling Papers The Denver Posts Fall From Grace 1378 Words   |  6 PagesKevin Lu Leonard Maltin CTCS-466 31 March 2016 Rolling Papers Film Essay Mitch Dickman’s Rolling Papers documents The Denver Posts fall from grace in the midst of Colorado’s legalization of marijuana. Although some may argue the message behind this film is the promotion and avocation of the legalization of marijuana, it actually depicts just how desperate print journalism is to survive in this age of social media and instant gratification. The film carries itself with a certain novelty as it triesRead MoreThe Role Of Journalism And Democracy And What Is The Most Powerful Current Threat That Role?2113 Words   |  9 PagesTHE ROLE OF JOURNALISM IN DEMOCRACY AND WHAT IS THE MOST POWERFUL CURRENT THREAT TO THAT ROLE? Journalism and democracy are arguably inextricably intertwined concepts, each having a vital role in the effective function of the other. Democracy as a term and an inherent notion finds it origins from Ancient Greece with the term being derived from the Ancient Greek words ‘demos’ – people and ‘kratia’ – power (The Daily Miracle: An Intriduction to JOuranlism p. 45). Traditionally, journalism has been consideredRead MoreWhat ´s Watchdog Journalism?2557 Words   |  10 PagesWatchdog journalism ideally involves independent scrutiny of the government and preventing abuses of power, with the goal of bringing issues such as abuses of power and corruption to the public eye. However, with the large turnkey costs involved with opening a media company (whether is be radio, tv or print) and the relatively low profit margin it is not the most realistic idea for news outlets. Due to the many large media outlets reducing the numbers of journalists dram atically, and an increasedRead MoreDiscuss the Relationship Between Public Relations and News Sources. How Does the Relationship Impact on the News Product?2572 Words   |  11 Pagesadopt the point of view. This essay aims to analyse the relationship between the industry of Public Relations and different types of sources that are seeking to gain media coverage, in order to support the argument that the PR industry is now a dominating source of information subsidy for journalists. It then asks the question ‘is the impact on the news product accurate and neutral?’ I will define and explain the elements that build Public Relations, journalism and news sources, discuss the evidence

Computer Behaviours and Topologies

Question: Discuss the Different types of computer behaviours and topologies, Comparison of the similarities between different types of computer criminal behaviour and topologies and Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies? Answer: Introduction According to Gostev (2012), the development of digital technologies represents an opportunity for any business to provide new tools for communication. The online activities become central to the way people live. However, this internet represents opportunities to cyber criminals. Computer crime is an act that is performed by the computer user, sometimes referred to as hacker that browses the companys private information illegally (Greenbaum, 2015). Additionally, computer crime includes the crimes that are to be conducted using internet such as hate crimes, online fraud, thefts of bank account details; these are considered to be computer or cyber crimes when these illegal activities are to be dedicated through the use of computer (Walker-Osborn McLeod, 2015). Different types of computer behaviours and topologies According to Prasanthi (2015), at a basic level, the types of computer behaviour are divided into the following categories, but there is no such universally accepted typology of the Internet crimes. Online Assault: It involves the violence that is raised through internet such as the threats that results in emotional response on the victim. The online assaults are of different types such as cyber bullying, online sexual exploitation of children etc. Cyber bullying occurs when the minors use the internet devices to tease as well as harass other minors (Henson, Reyns Fisher, 2011). The online sexual exploitation occurs when a child by using internet; establish some online relationships with other children. Social networking sites are the place for the offender to make such type of crime (Patel, 2012). Online Fraud: It uses the online sites in an effort to profit financially. Such types of online fraud are sale fraud, inheritance scams as well as phishing etc. In sale fraud, the selling of products on the online sites is misrepresented by the seller of the products (Walker-Osborne Price, 2011). Therefore, after the payment of the products, they never delivered those products to the buyer (Keen, 2011). Such that in inheritance scams, a criminal contacted the victim and told that they win some lottery online of a large amount (Al-Agaga, 2012). Then the victim is being instructed to pay an amount to initiate the process to deliver the money. In phishing, the criminal poses as lawful business includes credit card Company, online retailer to convince the victim to give the information related to password; bank details (Sood Enbody, 2011). Sometimes, it also involves spoofed emails to do the fraud. Such schemes are used to take the personal information of the victim to profit financial ly by withdrawing funds from the account of that victim (Holt, 2014). Cyber extortion: It occurs when a website as well as computer system is endangered with repeated denial of service by the malicious hackers. These hackers claim for money in return of promise to stop the attacks and promise to offer protection (Barn, 2012) Online theft: It is mainly used to steal the information as well as money from the owner. This type of crime often involves the misuse of the victims personal information for the purpose of committing theft (Vijaya Geeta, 2011). It consists of online piracy to share intellectual property by using the Internet; the problem of piracy is being compounded by peer-to-peer contribution of files throughout which the resources can be distributed illegally (Edwards, 2014). Online Intrusion: It involves the use of internet to infect the space of other individual, computer systems (Takieddine Sun, 2015). It is the act that an individual attempt to surpass a computer systems safety measures is referred to as hacking. Viruses are designed to spread throughout the whole computer to reduce the efficiency of the system (Raiu, 2012). Comparison of the similarities between different types of computer criminal behaviour and topologies The similarities between different types of computer criminal behaviour and topologies are that all the computer crime is being unauthorized access to computer systems or any networks (Caldwell, 2013). Most of the crime includes the stealing of information stored in the computer hard disks or detachable storage media. Normally, this kind of theft is done by getting hold of access of the login id as well as password of the victim (Cornford, 2011). This is one of the reported cases of cyber crime in all over the world. The crime is done against any organization, individuals, individual property (Nuredini, 2014). The offenders focus on the financial gain such as the use of phishing emails to gain access to details of the bank account. At the time of investigating the threat, the law enforcement is challenged while tracing the actions to the source (Barmaki, 2012). In some instances, technological devices are served as repositories for evidence of the cybercrime. All these cyber crimes w ould be harmful for the organization in the area of financial property as well as transfer of data within the organizations (Bednar, Katos Hennell, 2014). Comparison of the difference between different types of computer criminal behaviour and topologies Mostly, computer crimes focus on the financial gain but in case of child exploitation, the motive is not always profit. The motive may include intellectual curiosity or challenge, revenge, gaining some respect in online communities etc. The difference between a cyber attacks to commit crime as well as commit terror is found in the intension of the attacker (Mitchell Chen, 2014). Online frauds as well as online theft are different from each other. Fraud is a lie, if someone allows believing something that is not true and the victim are being fraud. Theft is losing of money from computer crime. Analysis of how organizations can benefit from understanding each of these different computer criminal behaviours and topologies Financial frauds as well as identify theft are conducted by the hackers to evolve into serious threats to the financial services industry and any organization (Vadza, 2011). According to computer crime and security survey, these two are the worlds most cyber crime threat. Most of the organizations are benefited from understanding the different computer criminal behaviour and topologies (Farrington Ttofi, 2014). From there understanding, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that there is no chance of suffering any data loss in case of hacking (Hrnle, 2012). The company should avoid sending the credit card number to any site that is not safe. The organization must use the latest as well as updated antivirus to prevent their computers data against the virus attacks; and use a security programme to give control over cookies (Patel, 2012). An organization should ensure a security awareness that prevent the attack and make the attackers think twice before committing any cyber crime (Hua Haughton, 2012). Psychological screening is an extreme step that should be done before the hiring of employees in an organization (Sahu, Maheshwari Sahu, 2015). Most of the organizations are benefited by the further research in psychological profiling of the hackers (Kumar Mittal, 2012). Therefore, modelling behaviour can be assisted and it is predictive in nature; providing a criminal justice system as well as information technology industry to prevent the unauthorized use of data (Payne Hollin, 2014). Although, various qualitative data exist to build the profile of the individuals that may fit the psychological model of the cyber crime (McIntyre, 2014). Conclusion The advancement of technology such as Internet provides both the individuals as well as organizations with a mean to commit crimes; therefore millions of people are affected by online crime every day. The computer crime is becoming one of the most threatening crimes for both law enforcement as well as the public. These crimes are hate crimes, internet fraud, thefts of credit card account, and telemarketing fraud, these are measured to be computer or cyber crimes when the illegal actions are to be committed throughout using of both computer and internet. Online assault is the crime that involves the crime of harassment, threats of violence etc. Online fraud or theft is the use of dishonesty as well as violate of confidence online to profit financially. Online intrusion involves using of Internet to damage other individuals computer programs. Therefore, the organization should avoid the disclosing of any information to any unknown sites as well as they should keep the back up of their important files such that the individual may not suffer from any data loss in case of hacking. Reference List Al-Agaga, A. (2012). FACTORS THAT INFLUENCE E-LOYALTY OF INTERNET BANKING USERS. Ijecs, 3(2), 297-304. doi:10.7903/ijecs.1097 Barmaki, R. (2012). Book Review: Computer Crime, Investigation, and the Law. Criminal Justice Review, 37(1), 132-133. doi:10.1177/0734016811405286 Barn, D. (2012). Insuring cyber-assets. Computer Fraud Security, 2012(9), 5-8. doi:10.1016/s1361-3723(12)70090-8 Bednar, P., Katos, V., Hennell, C. (2014). On the complexity of collaborative cyber crime investigations. DEESLR, 6(0). doi:10.14296/deeslr.v6i0.1894 Caldwell, T. (2013). Plugging the cyber-security skills gap. Computer Fraud Security, 2013(7), 5-10. doi:10.1016/s1361-3723(13)70062-9 Cornford, A. (2011). Criminalising Anti-Social Behaviour. Criminal Law, Philosophy, 6(1), 1-19. doi:10.1007/s11572-011-9134-9 Edwards, C. (2014). Ending identity theft and cyber crime. Biometric Technology Today, 2014(2), 9-11. doi:10.1016/s0969-4765(14)70033-5 Farrington, D., Ttofi, M. (2014). Criminal careers in self-reports compared with official records. Criminal Behaviour And Mental Health, 24(4), 225-228. doi:10.1002/cbm.1932 Gostev, A. (2012). Cyber-threat evolution: the year ahead. Computer Fraud Security, 2012(3), 9-12. doi:10.1016/s1361-3723(12)70052-0 Greenbaum, D. (2015). Cyber crime 2.0. Science, 348(6231), 193-193. doi:10.1126/science.aaa7298 Henson, B., Reyns, B., Fisher, B. (2011). Crime and Criminal Behavior. Retrieved 12 July 2015, from Holt, T. (2014). Cyber war will not take place, by Thomas Rid. Global Crime, 15(1-2), 206-208. doi:10.1080/17440572.2014.884235 Hrnle, T. (2012). Criminalizing Behaviour to Protect Human Dignity. Criminal Law, Philosophy, 6(3), 307-325. doi:10.1007/s11572-012-9177-6 Hua, G., Haughton, D. (2012). A network analysis of an online expertise sharing community. Soc. Netw. Anal. Min., 2(4), 291-303. doi:10.1007/s13278-012-0047-y Keen, A. (2011). Tracking online fraud across the globe. New Scientist, 211(2831), 62. doi:10.1016/s0262-4079(11)62358-0 Kumar, P., Mittal, S. (2012). The Perpetration and Prevention of Cyber Crime. International Journal Of Technoethics, 3(1), 43-52. doi:10.4018/jte.2012010104 McIntyre, L. (2014). Cyber-Takings: The War on Crime Moves into the Cloud. Pittsburgh Journal Of Technology Law And Policy, 14(2). doi:10.5195/tlp.2014.148 Mitchell, R., Chen, I. (2014). A survey of intrusion detection techniques for cyber-physical systems. CSUR, 46(4), 1-29. doi:10.1145/2542049 Nuredini, A. (2014). CHALLENGES IN COMBATING THE CYBER CRIME. Mediterranean Journal Of Social Sciences. doi:10.5901/mjss.2014.v5n19p592 Patel, K. (2012). End User Policy in Combating Cyber Terrorism and Cyber Crime. Global Journal For Research Analysis, 3(1), 28-30. doi:10.15373/22778160/january2014/11 Payne, K., Hollin, C. (2014). Alexithymia, Asperger's syndrome and criminal behaviour: a review. Journal Of Criminal Psychology, 4(2), 155-162. doi:10.1108/jcp-11-2013-0030 Prasanthi, M. (2015). Cyber Crime: Prevention Detection. International Journal Of Advanced Research In Computer And Communication Engineering, 45-48. doi:10.17148/ijarcce.2015.4311 Raiu, C. (2012). Cyber-threat evolution: the past year. Computer Fraud Security, 2012(3), 5-8. doi:10.1016/s1361-3723(12)70051-9 Sahu, B., Maheshwari, D., Sahu, N. (2015). Simulation Model for Cyber Crime Reduction. International Journal Of Computer Applications, 115(21), 20-22. doi:10.5120/20275-2693 Sood, A., Enbody, R. (2011). The state of HTTP declarative security in online banking websites. Computer Fraud Security, 2011(7), 11-16. doi:10.1016/s1361-3723(11)70073-2 Takieddine, S., Sun, J. (2015). Internet banking diffusion: A country-level analysis. Electronic Commerce Research And Applications. doi:10.1016/j.elerap.2015.06.001 Vadza, K. (2011). Cyber Crime its Categories. IJAR, 3(5), 130-133. doi:10.15373/2249555x/may2013/39 Vijaya Geeta, D. (2011). Online identity theft an Indian perspective. Journal Of Financial Crime, 18(3), 235-246. doi:10.1108/13590791111147451 Walker-Osborn, C., McLeod, B. (2015). Getting Tough on Cyber Crime. ITNOW, 57(2), 32-33. doi:10.1093/itnow/bwv042 Walker-Osborne, C., Price, J. (2011). The War on Cyber Crime. ITNOW, 53(6), 30-31. doi:10.1093/itnow/bwr061