Monday, December 30, 2019

The New Equipment Finance Subsidiary Of First Certificate...

We’re back to consider another transaction for credit approval. This one caused some spirited debate. I have changed the names and circumstances for this example and I’ve simplified the presentation to fit this article length. Borrower: PimerMed Products, Inc. Lender: The new equipment finance subsidiary of First Certificate Bank (FCB), a local $2.2 billion bank Relationship: No previous/existing relationship with the bank but PimerMed is an attractive bank prospect for FCB Amount: $6MM Equipment: primary manufacturing equipment for expansion and efficiency Term: 60 Month capital lease Pricing: 4% yield (a below average spread for FCB) Overview: PimerMed is a $110MM specialized cardio medical device manufacturer started in 1985 by Gerald Pimer, current Chairman, CEO and 100% shareholder. Mr. Pimer is a well-respected executive in the industry but his daughter is now actively managing the business. The company is considered to be one of the top 3 privately held companies in its segment. Trends are positive for sales growth and cash flow, but the growth has slowed substantially in recent years. Mr. Pimer personally has significant real estate interests. His net worth is estimated to be in the $15MM range with personal debt of approximately $25MM. He no longer offers his personal guaranty for new PimerMed obligations. Financial Highlights: PimerMed is a $110MM revenue company. The business has a diverse customer base with both long time and recently acquired clients. No singleShow MoreRelatedWould You Do The Deal?919 Words   |  4 Pagesexample and I’ve simplified the presentation to fit this article length. Borrower: PimerMed Products, Inc. Lender: The new equipment finance subsidiary of First Certificate Bank (FCB), a local $2.2 billion bank Relationship: No previous/existing relationship with the bank but PimerMed is an attractive bank prospect for FCB Amount: $6MM Equipment: primary manufacturing equipment for expansion and efficiency Term: 60 Month capital lease Pricing: 4% yield (a below average spread for FCB) Overview:Read MoreVietnam’s Textile Industry7086 Words   |  29 Pages Vietnam’s economy is driven primarily by tourism and exports as investment is hard due to the absence of transparency in the legal and regulatory system. Company Basics Our company is the Augusta Textile Company, founded in 1985. Being fairly new, it has remained a mid-sized apparel importing firm that involves the exportation of clothing, as well as selling to local shops. Currently, the company employs 200 full-time employees, about 50 part-time employees, and a managerial team consistingRead MoreAssignment2 Fin100989 Words   |  4 Pages Business Finance and the Capital Structure FIN 100 Strayer University August 4, 2014 Business Financing and the Capital Structure Small business can finance their firms through debt or through equity sources of capital. Debt sources typically include; short or long-term loans from wealthy individuals to banks, while equity sources often include the owner’s wealthy individuals and/or Angel Networks. Venture capital is not a typical source of equity financing for most small businessRead MoreInternship Report on Hbl6597 Words   |  27 PagesINTERNSHIP REPORT ON â€Å"HABIB BANK LIMITED† SUBMITTED BY Sadia Siddiqui Reg#14365 Enrollment# 02-211082-11 SUBMISSION DATE MAY 15, 2012 Acknowledgements: All the praises are for the almighty, Allah who bestowed me with the ability and potential to complete this Internship. I also pay my gratitude to the Almighty for enabling me to complete this Internship Report within due course of time. Words are very few to express enormous humble obligations to my affectionate Parents for their prayers and strongRead MoreNbfc13828 Words   |  56 PagesINTRODUCTION: We studied about banks, apart from banks the Indian Financial System has a large number of privately owned, decentralised and small sized financial institutions known as Non-banking financial companies. In recent times, the non-financial companies (NBFCs) have contributed to the Indian economic growth by providing deposit facilities and specialized credit to certain segments of the society such as unorganized sector and small borrowers. In the Indian Financial System, the NBFCs playRead MoreHistory of the Banking Idustry in Zimbabwe3381 Words   |  14 Pagesthe Reserve Bank of Zimbabwe, Discount Houses, Commercial Banks, Merchant Banks, Finance Houses, Building Societies and The Post Office Savings Bank. The development of the Zimbabwean banking sector can be analysed within three separate periods, which the banking industry went through different development phases. PRIOR 1991 PERIOD The financial system in Zimbabwe inherited a regulated environment and it has for years pursued segmented or specialised funding. For instance merchant banks were restrictedRead MoreMerchant Banking18039 Words   |  73 PagesBanking. Functions Merchant banking is a service oriented industry. Merchant banks all over the world carry out the same set of services. Merchant banks in India carry out the following functions and services specifically. 1. Corporate Counseling 2. Project counseling 3. Pre-investment Studies 4. Capital restructuring 5. Credit Syndication 6. Issue Management and underwriting 7. Portfolio Management 8. Working Capital Finance 9. Acceptance Credit and Bill discounting 10. Mergers, Amalgamations and TakeoversRead MoreThe Stock Of A Company1261 Words   |  6 Pagesinvestors to get paid out in terms of shares in case a company may be financially unwilling to pay out. Q6: Par value is very essential for any investing body, this enable them to identify the acceptable value for the nominal value stated in the certificate for their common stock. This is meant to assure the investors that no one else will acquire a favourable price after they have made their purchases. Q7: Consolidated financial statements are prepared because they can be used in the determinationRead MoreThe Accounting Profession and Nat39077 Words   |  157 Pages1 No. 1 March, 2009 THE EFFECT OF AUDIT ON CORPORATE SUSTAINABILITY, GROWTH AND DEVELOPMENT By J. R. A. Adefiranye Abstract For profitability and liquidity, companies need adequate finances. Finance stakeholders (that is, shareholders, creditors and other financial lenders) are the providers of these finances. Their interests and beliefs in the activities of the companies are required to make them invest. A recent share investments survey in Lagos and Abuja, involving 100 respondents coveringRead MoreProject Report on Comparative Study of Icici Bank Nd Hdfc Bank8770 Words   |  36 Pages A SUMMER TRAINING REPORT On COMPARISON BETWEEN ICICI BANK amp; HDFC BANK SUBMITTED TO PUNJAB TECHNICAL UNIVERSITY JALANDHAR In partial fulfillment of the Requirements for the award of Degree of Master of Business Administration SUBMITTED BY: SUBMITTED TO: ROHIT

Sunday, December 22, 2019

A Very Brief Biography of William Shakespeare - 1609 Words

William Shakespeare William Shakespeare, man with intelligence, creativity, and with great passion for love, was one of the most prestige playwright, poet, and actor from the British Literature. He contributed his whole life writing some of the finest and well known plays and poems that are still highly valued in the present literary world. Shakespeare’s conventional themes for most of his plays and poems are about universal matters such as love, jealousy, and beauty which were common focus during the Renaissance era. During this period, Shakespeare’s poems, Sonnet 29 and Sonnet 130, demonstrates his views and morals regarding love to convey the theme of triumph of true love over beauty and wealth. William Shakespeare born and raised in â€Å"provincial town of Stratford upon Avon in 1954† to wealthy merchant John Shakespeare and Mary Arden (Ruby198). Being a son of a merchant, he was able to attend one of the finest grammar school in town, The King’s New School, where he co uld attain education under highly qualified tutors which benefited his writing skills. At the age 18, Shakespeare married Ann Hathaway, who was eight years older than him followed by three children. Since Shakespeare’s lyrics are mostly about love, passion and beauty, it is believed by the audience that the lady in his sonnets represents his wife, however, it has been implied that, â€Å"no one can determine to what degree Shakespeare’s personal experiences are reflected in his sonnets† (Hacht 798). HeShow MoreRelatedWilliam Shakespeare: A Legendary Author Essay896 Words   |  4 PagesWilliam Shakespeare’s intellectual use of the English language is what brought him prosperity throughout his lifetime, and what brings us to tears and laughter in the modern world. The life of Shakespeare is of great importance to English literature because of his many contributions including poetry, stories, and plays. However, many people do not know that he also owne d a business. â€Å"William Shakespeare was a professional actor, a businessman, and a playwright. Today, nearly four hundred yearsRead MoreDelving into the Personality of Shakespeare in â€Å"What Was He Really Like? by Stanley Wells653 Words   |  3 PagesMost biographies written about William Shakespeare attempt to explain his life chronologically from birth to death. These accounts aim to describe his life through discussing his works and accomplishments. The problem with this pattern is that there are only so many ways humans can rewrite the same facts about the same person. Contrary to most papers about Shakespeare, the essay titled â€Å"What Was He Really Like?†, written by Stanley Wells, focuses internally on who Shakespeare was as an ordinary personRead MoreShakespeare and Women vs. Society and Queen Elizabeth Essay1366 Words   |  6 PagesQueen Elizabeth fought for women to be seen as equals to men through her reign. But in loving the theatre, she never allow ed women to be on the stage; forcing men to play the role of men and women makes her ideals and societys hypocritical. William Shakespeare writes using strong women characters, such as Katherine Minola and Juliet Capulet, to show the society he inhabits just how important women are. Through his writing he shows that he views women as strong and independent. In Romeo and JulietRead MoreWilliam Shakespeare s Life And Accomplishments1819 Words   |  8 Pages As we all know William Shakespeare was a well known and a highly sought after writer, but did he really deserve all that fame? As early as 1709, with Nicholas Rowe s publication of his edition of Shakespeare s works, the little information that we had about William Shakespeare began to show. Other than several early minor accounts, the preface of Nicholas Rowe s edition contained the first biography of William Shakespeare. Rowe presented eleven known facts about Shakespeare s life. By 1821,Read MoreEssay on The Unaccounted for Period of William Shakespeares Life1954 Words   |  8 PagesThe Unaccounted for Period of William Shakespeares Life William Shakespeare was born on April 26th 1564[1] in Stratford on-Avon to parents John and Mary. Growing up, he received a good education for a country boy of that period. He attended the village elementary school, was tutored by his mother and others, and learned a great deal by himself[2]. At the age of 18 he married Anne Hathaway, had his first child, Susanna in 1583 followed by twins Judith and Hamnet in 1585. DocumentationRead MoreEnglish Reflection924 Words   |  4 Pagesinclude, irresolute, consecrate, escarpment, monolithic, incandescent, and much more. Although our class spend numerous hours perfecting our essays, Mrs.Yu had us research and discover interesting facts about William Shakespeare. To begin our Shakespeare research, I wrote a biography on Shakespeare with the help of my index cards packed with useful information. Soon after learning about Shakespeare’s life, we began to read his plays, which introduced us to a new form of the english la nguage. DespiteRead MoreEssay on Biography of John Marshall1607 Words   |  7 PagesBiography of John Marshall John Marshall was born on September 24, 1755 in prince William County, Virginia. His father moved the family from there before john was ten to a valley in the Blue Ridge Mountains, about 30 miles away. Unlike most frontier dwellings, the home Thomas Marshall built was of frame construction rather than log and was one and a half story. Both parents, while not formally educated, were considered adequately educated for the ties and could read and write. They held a significantRead More An Analysis of Arnolds Essay, The Function of Criticism at The Present Time1226 Words   |  5 Pagesanalyzing Matthew Arnold‘s essay through my reading of his essay. It becomes clear that Arnold defends the importance of criticism. That’s to say he tries to display that the critical mind is of a paramount importance as well as the creative mind. A Brief Biography Arnold, Matthew 1822-1888, English poet and critic, he was a leading literary figure of the Victorian period, and the foremost literary figure of his age. His writings have a distinct style which is characterized by the use of symbolism and earnestnessRead MoreA Brief Biography of Agatha Christie1750 Words   |  7 Pagesloving parents and was the youngest of three children. Louis Montant Miller, was her brother who was ten years older than she, and her sister, Margaret Frary Miller, was eleven years older. The children were brought up in a comfortable home, but not very wealthy. A tragic moment in Agatha’s childhood was when her father, Frederick Alvah Miller, confessed to cheating on her mother, Clarissa Margaret Boehmer. He didn’t reveal this disappointing information to his family until after Clarissa passed awayRead MoreOthello : William Shakespeare s Othello2542 Words   |  11 PagesJack Martin Mrs. Siplivy British Literature 3 March 2015 Othello Introduction Shakespeare is the second most quoted writer in the English language – after the various writers of the Bible. Many of Shakespeare’s ideas for the play Othello came from a collection of tales written by Giraldi Cinthio. In Othello the character of Iago acts as the prominent main character throughout the play, even though he plays the role of the antagonist to the other central characters in the comedy Iago is the tragic

Saturday, December 14, 2019

Save the Ailing Earth from Vehicular Pollution Free Essays

Delhi Metro (Hindi: Dilli Me? ro) is a rapid transit system serving Delhi, Gurgaon and Noida in the National Capital Region of India. The network consists of five lines with a total length of 125. 67Â  kilometres (78. We will write a custom essay sample on Save the Ailing Earth from Vehicular Pollution or any similar topic only for you Order Now 09Â  mi). The metro has 107 stations of which 17 are underground. It has a combination of elevated, at-grade and underground lines and uses both broad gauge and standard gauge rolling stock. Delhi Metro is being built and operated by the Delhi Metro Rail Corporation Limited (DMRC).As of April 2010, DMRC operates more than 100 trains daily between 6:00 — 23:00 with a frequency of 3 to 4. 5 minutes. [5] The trains have four to six coaches[6] and the power output is supplied by 25-kilo volt, 50 Hz AC through overhead catenary. The metro has an average daily ridership of over a million commuters,[3] and has carried over a billion commuters in seven years since its inception. The concept of a mass rapid transit for Delhi first emerged from a traffic and travel characteristics study carried out in the city in 1969. 8] Over the next several years, many official committees by a variety of government departments were commissioned to examine issues related to technology, route alignment and governmental jurisdiction.In 1984, the Delhi Development Authority and the Urban Arts Commission came up with a proposal for developing a multi-modal transport system, which would consist of constructing three underground mass rapid transit corridors as well augmenting the city’s existing suburban railway and road transport networks. 10] While extensive technical studies and search for financing the project were in progress, the city expanded significantly resulting in a two-fold rise in population and a fivefold rise in the number of vehicles between 1981 and 1998. [10] Consequently, traffic congestion and pollution soared, as an increasing number of commuters took to private vehicles with the existing bus system unable to bear the load. 8] An attempt at privatising the bus transport system in 1992 merely compounded the problem, with inexperienced operators plying poorly maintained, noisy and polluting buses on lengthy routes, resulting in long waiting times, unreliable service, extreme overcrowding, unqualified drivers, speeding and reckless driving. [11] To rectify the situation, the Government of India and the Government of Delhi jointly set up a company called the Delhi Metro Rail Corporation (DMRC) on March 5, 1995 with E. Sreedharan as the managing director. [12 How to cite Save the Ailing Earth from Vehicular Pollution, Papers

Friday, December 6, 2019

The Case Study of Procter and Gamle-Free-Samples for Students

Question: Discuss about the Case Study of Procter and Gamle. Answer: Introduction Technology is something that is being used by the business organizations and users from all across the globe. There are many technological tools and components that are used by the business units to execute the business operations and tasks. The technical tools have provided the business units with a lot many advantages for the ease of execution of operations and the streamlining of the activities as well. The report covers the case study of Procter and Gamble (PG) by explaining the importance of information governance in the organization. There is also an analysis of the use of Information Technology and Information System in the other organization along with the use of cloud computing, cloud-based applications, social media integration, and possible areas of improvements and importance of security in the organization. Procter and Gamble Role of Senior Leadership in Information Governance Information Governance (IG) is defined as a set of discipline including a number of different processes and methods so that information security is maintained and the business objectives are achieved. The business organizations in the present time are making use of technology for the management if their information sets and for the execution of the business tasks and operations. There are several assets that the organizations must manage so that the streamlining of the business activities is achieved. One such significant asset for the organization is the information and data sets. Procter Gamble (PG) is a multi-national corporation that is based out of America and has its headquarters in downtown Cincinnati, Ohio. The Company is a manufacturer of family, household and personal care products. The company has done numerous modifications and enhancements to make sure that information management is carried out in an adequate manner. Information Governance is one of the major pillars to make sure that the information and data sets are correctly managed and organized. There are a lot many activities that are involved in the management and organization of information. It is, therefore necessary that the resources are selected for the information governance. Senior resources and leadership engaged with the organization has a lot of responsibility for required information governance (Ico, 2014). PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership started with the setting up of Global Business Units (GBUs) for the company. These GBUs were formed on the basis of the various product categories that are offered by the organization, such as personal care, health care etc. The next step of action was to set up Market Development Organizations (MDOs) to make sure that the company had a competitive advantage over the local firms and units. Global Business Services (GBSs) along with several corporate functions were executed. This practice led to the classification and allocation of more than 129,000 employees to four different verticals. This initiative was taken so that the management of the employees could be done with ease (Wolverhampton, 2017). Passerini was provided with the charge of GBS in the year 2003. IT capabilities and efficiencies of the organization were transformed as an outcome. Information and Decision Solutions (IDS) were the units that were set up and brought in action so that information sets could be handled in a better manner and the information organization could be done correctly. This also proved to be of a great aid in the analytics and decision making activities for the business executives. Bob McDonald was termed as the companys CEO and President in the year 2009. Bob further transformed the IT practices and laid a great emphasis on the IT capabilities. Technology is changing at a rapid pace and it is necessary that the organizations adapt to such changing face of technology. The senior leadership at PG adopted the idea of changing technology and data analytics including other technologies under the domain of Business Intelligence were adapted for better information management and analysis. The senior leaders and middle level managers worked together to enhance the technological capabilities. The company experienced increased profits and revenues as an outcome. The senior leadership that is engaged with an organization thus has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. The senior leadership in an organization is always aware about the organizational strategies, vision, mission, purpose and goals. There are several resources in an organization structure with resources deployed at different levels. The senior leadership is at the higher level in the structure and has the utmost clarity on the goals and business objectives. Also, in order to execute the changes that are highlighted, it is necessary to have the necessary authority and ownership for the same. The senior leadership has an authority to bring the steps in action and can also manage the resources in an efficient manner (Arma, 2011). PG could witness and experience the business gains due to the efficiency and capability of its senior leadership and management. The skill set of the senior leaders and their decision making abilities led to the enhancement of the organizational profits and also led to the higher customer engagement and satisfaction levels. Critical Analysis of the Organization on the Use of Is IT Organization Overview XYZ is a business organization that works in the domain of finance and provides financial solutions to its customers. The company has its headquarters in Sydney, Australia and is spread over five different locations in the country. The company currently has more than 260 employees in different departments and units. The company has made sure that the information sets are adequately managed and the latest technology is always adopted by the organization. There are numerous cloud services, social media platforms and likewise that are used and implemented in the organization. Cloud Infrastructure in the Organization Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols (Iyoob, 2015). Cloud Delivery Model: Platform as a Service (PaaS) The company makes use of the cloud delivery model as cloud Platform as a Service (PaaS). This model is used in the business applications and development of the financial solutions for the clients making use of cloud resources and elements. This is the cloud model that provides the framework for the development as well as the customization of the business tasks and activities (Intel, 2013). The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The cloud vendors that the company works with include Amazon Web Services (AWS) and Microsoft Azure. These cloud vendors manage the operating system framework along with information storage and virtualization activities. The company also makes use of an enterprise PaaS solution so that a self-service portal is formed for the management and organization of the entire computing infrastructure. The model also works well with the private cloud deployment model that is used by the organization (Nasr and Ouf, 2012). The PaaS model provides a number of advantages to the company in terms of automatic updates along with the decrease in the costs. The model also provides the business organization with the necessary compatibility with the rest of the technical solutions and components that are used. Private Cloud Model The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual environment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. This model also provides a number of benefits to the organization which are as listed below. The primary advantage that the cloud model provides to the company is the security of information and data sets. The model also offers the benefits in terms of dedicated resources along with firewalls and on-site resources. Enhanced control is another benefit that is offered by the cloud model to the organization as well as its resources. The tracking of the progress and the applications also becomes easy (Ibm, 2009). There are several resources that are engaged in the organization. Resource allocation is improved because of the cloud model and the availability of the resources does not appear as a challenge for the senior management and leadership (Gorelik, 2013). Application reliability is always maintained with the aid of virtual partitioning. Cloud Software - CRM Customer Relationship Management (CRM) is software that is used by the business organizations for better customer engagement and management of the customer data and information sets. There are several cloud-based CRM systems that are available in the market and the one that is used by the XYZ Company is the Salesforce CRM. This software is designed by Salesforce and it has provided XYZ Company with the capability to easily manage the customer data and information. There are several other benefits and features that are included in this software as automated analysis of the data sets, social media integration, improved workflows and improved customer engagement along with many others. The company has managed to gain benefits out of this CRM system due to the correct implementation of the software in the company. One of the essential activities that were carried out as the first step of implementation was the planning of the cloud-based implementation of Salesforce CRM. The step included the definition of the objectives along with the definition of the schedule and budget. The next step included the allocation of the roles and duties to the members of the project team. Stakeholder management was also carried out efficiently so that the stakeholders remained satisfied of the outcomes of the system. Salesforce CRM is a system that had to be customized as per the requirements of the organization. This was done with ease owing to the planned implementation of the software using the phased approach for the same. Setting up of the Key Performance Indicators (KPIs) was the next step and the Salesforce report builder was also used to keep a track of the progress. Maintenance and support activities were carried out as the final step of the implementation process. The use and implementation of cloud-based CRM has made sure that there are several advantages offered to the organization. The customers can easily contact the business organization in case they get stuck during the execution of a specific operation or activity. There are also other benefits that are offered in terms of improved customer relations and engagement. Social Media Platforms Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks (Modeus, 2013). XYZ Company also made sure that it included the social media platforms and networks in its business tasks and activities. There are numerous social media accounts, such as Facebook, Twitter, Instagram and likewise that have been set up by the company and are managed for a variety of different purposes, such as information sharing and handling, management of customer relationships along with marketing and advertising tasks. The social media networks that have been set up by the organization are managed by the social media management team that comprises of social media managers, social media advertisers, social media analysts and associates. These social media accounts are used by the company to make sure that the information is handled in a better way and there are maximum benefits that are gained out of the same (Cvijikj, 2011). The customer interaction has also improved as a result of the social media integration that is carried out by the organization along with speedy resolution of customer queries and complaints. Impacts on the Organization The company is making use of numerous information systems and technology in their architecture. There have been positive impacts of the same on the organization along with the emergence of a few points of concern. The implementation of these systems has led to the improvement of sharing of information along with the enhancement of the communication capabilities internally as well as with the external stakeholders. The enhanced communication and sharing has also allowed better employee integration and connection. The employees have gained the ability to immediately connect with their supervisors for guidance and resolution of the queries. The automated system has led to the enhancement of the decision making abilities along with the decision support activities. There are Decision Support Systems (DSS) and Management Information Systems (MIS) that have been implemented so that the senior management and leadership can take decisions quickly using the information and data sets that have been provided to them (Esmt, 2016). Big Data tools are also being used in the organization for advanced management and analysis of the data sets. There are huge clusters of data that are used by the organization on a daily basis. Big Data tools have provided the capability to make sure that these data sets are correctly organized and managed. These tools are integrated with other technical tools and applications as well. There have been a few negative implications of the information systems and technologies in the organization in terms of the security attacks and risks. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the or ganization. In case of XYZ Company, security is one of the aspects that needs to be enhanced for the organization. Possible Improvements Technology is something that is witnessing a constant change. There are new tools and technologies that are being developed on a daily basis and XYZ Company is also required to maintain pace with the same. There are changes and improvements that are required to be done in the infrastructure and the architecture along with the procedures and methodologies that are used for maintenance, management and deployment of the technology. The organization is spread over five locations and each of these locations has its own set up and resources. The employees that are engaged with these locations need to communicate and collaborate with the internal staff members along with the external stakeholders. It has been observed that there are cases of inefficient and ineffective communication that come up that lead to further issues. There are also issues in the networking infrastructure of the organization which can be improved. It is also necessary to make sure that the network integration is improved so that the resource sharing capabilities are improved. The company currently follows only the private cloud for the deployment of cloud services and applications. There are other cloud models that can be used, such as community and hybrid cloud models. These models provide a combination of public and private cloud models which provide the best of the both models. There are scenarios wherein it is necessary to use public cloud only. Hybrid cloud will provide the organization with the capability to use both. There are also numerous NoSQL databases that are available. Such databases shall be used by the organization in place of the SQL databases and MySQL databases. These databases will be easy to integrate with the Big Data tools along with the Business Intelligence tools. (He, 2014). The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. The organization shall, therefore make sure that the security of the applications is maintained. There are new and improved security tools and controls that must be used and implemented in the organization (Utica, 2014). The security attacks can have extremely severe consequences on the information properties along with the customer trust in the organization. The occurrence of security events, such as denial of service attacks, attacks on information integrity, confidentiality, and availability may lead to legal obligations as well (Msb, 2015). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by usin g the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. The Business Intelligence tools that are used in the organization shall also be further enhanced. There must be use of data analysis and data warehouse tools that must be used. This will allow the organization to understand the customer preferences and choices along with the estimation of the customer needs and demands. The level of customer satisfaction and the customer engagement will also rise with the use of such tools and technologies. Importance of Security in Information Management There are several properties of information that need to be managed and maintained. Some of these properties include security of information, reliability of information, information privacy etc. One of the most significant aspects of information is the security of information sets. There are different data sets that are used in the organization, such as public data sets, private data sets, confidential and critical data sets, sensitive data and many more. The organization works on the finance solutions and services for the customers. The information category that is usually associated with such solutions and services is generally extremely critical in nature. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy (Kissel, 2013). Also, the frequent occurrence of security risks and attacks leads to the deteriorated customer trust and satisfaction. The level of customer engagement may also come down as an outcome along with the legal obligation. The data sets that are associated with XYZ Company comprise of the financial and accounting details of the customers and employees along with the personal information of these entities. There are also details of the projects undertaken by the company along with the shareholder and stakeholder that is involved. The exposure of such information to the entities that are not authorized to view or modify them may lead to adverse impacts. There can also be legal obligations due to the occurrence of such cases. The company makes use of cloud-based services and applications, such as private cloud model, customer relationship management system and many more. There are also social media platforms and networks that are used. The attacks on such applications and the data sets that are associated with these applications can be dangerous for the organization. The employees that are engaged with the organizations are provided with access to the internal data and information sets and there is a great level of authority that is usually provided to the employees. There are insider threats and attacks that may take place that are given shape by the employees and such attacks have a great impact on the information security along with the reputation of the organization. This is because of the reason that employees may pass on the sensitive details to the competitors of the business organization which may be misused to gain a competitive edge in the market (Geant, 2010). There are many security controls that shall be used and implemented in the organization to avoid the security attacks and risks. There are numerous network-based security attacks that take place which shall be prevented and avoided by using the techniques as intrusion detection and prevention systems along with other tools like network monitors and scanners. This will provide the organization with the complete network activity being carried out. There are also other security tools that have been developed in the form of anti-malware and anti-denial tools. These tools shall be installed and implemented across the organization and all of the associated systems. Malware attacks and denial of service attacks will be avoided as a result. The use and application of such security controls will provide the organizations with the ability to avoid, control, detect and prevent the security risks and attacks. The further security attacks will also be avoided as a result. Disaster Recovery and Risk Management In order to make sure that the security of information is maintained, it is necessary to carry out risk management process as well. Such a process will make sure that all of the security risks and attacks that may be possible in the organization are identified in advance. There is a specific risk management process that shall be designed and identified. The risk management process must include risk identification, risk assessment, risk evaluation, risk treatment, risk control and closure. In such a process, all of the possible security risks from the areas of network security, information security, malware attacks etc. will be identified and assessed. The specific treatment strategies will also be mapped with the security risks that will be identified. However, in spite of all of the efforts and initiatives, there may be cases of security occurrence and attacks. In such cases, it would be essential to have a disaster recovery plan and policy in place. This policy and plan will comprise of the measures that shall be followed in case of a security attack to control the damage and minimize the downtime. The plan will comprise of the back-up tasks and processes that the organization must follow. In this manner, even if a malicious entity succeeds in capturing the data sets, the organization will have a copy of its information sets ready in advance. Similarly, the plan will cover the encryption and cryptography processes that shall be used and implemented in the organization for the control of the disasters and associated activities. Conclusion PG is a multi-national company that was set-up in the year 1859 and now operates in more than 180 countries all across the globe. Due to widespread operations, customer base and office units, there are huge clusters of data sets that PG manages on a per day basis. The senior leadership and management of the organization took several steps for adequate and efficient information governance and management. The senior leadership that is engaged with an organization has a huge role to play in information organization, management and governance. The senior leadership carries out the tasks around activity monitoring along with control and evaluation. A number of verification and validation activities are carried out by the senior leaders in the form of reviews, inspections and walkthroughs. Such practices bring out the areas of improvements and the necessary changes that shall be made. Cloud computing is defined as a form of computing that utilizes the computing resources over the network for the execution of business operations and activities. There are various cloud services and platforms that have been developed for the execution of business tasks. XYZ Company, a finance corporation, has included a lot many cloud services and activities in its structure, such as cloud based database, digital market, cloud-based Customer Relationship Management (CRM) systems, cloud-based finance management and account management systems along with communication protocols. The company carries out a number of business tasks and operations in terms of development, testing and many others. The use of the PaaS model in the organization leads to the simplification of the tasks and is also a cost-effective approach. The deployment model that is used in the company is the private cloud model. This model makes sure that the cloud services are securely used by the clients in the virtual en vironment. There is an enhanced control and privacy that is reflected in the business organization with the use of this model. Social media has come up as an integral part of the business organizations in the present era. It has become mandatory to ensure that social media presence is made and is reflected to the stakeholders and the customers. There are also dedicated social media management teams that are being set up in the organizations for the management of social media platforms and networks. There are various forms of security attacks that may take place in the organization, such as denial of service and distributed denial of service attacks, media and message alteration attacks, information breaches and loss, information leakage, physical security attacks and likewise. These attacks can have a negative implication on the confidentiality, integrity and availability of the information along with a poor implication on the information security and privacy. The organization must make use of the security controls and risk management strategies for avoiding the same. References Arma (2011). Senior Leadership Imperative to Information Governance Success. [online] Arma.org. Available at: https://www.arma.org/r1/news/newswire/2011/07/27/senior-leadership-imperative-to-information-governance-success [Accessed 26 Nov. 2017]. Cvijikj, I. (2011). Social Media Integration into the GS1 Framework. [online] Available at: https://cocoa.ethz.ch/downloads/2013/05/1230_AUTOIDLAB-WP-BIZAPP-058.pdf [Accessed 26 Nov. 2017]. Esmt (2016). The Evolving Role of Information Systems and Technology in Organizations: A Strategic Perspective. [online] Available at: https://www.esmt.org/sites/default/files/peppard-c01.pdf [Accessed 26 Nov. 2017]. Geant (2010). Information Security Policy. [online] Available at: https://services.geant.net/sites/cbp/Knowledge_Base/Security/Documents/gn3-na3-t4-ufs126.pdf [Accessed 26 Nov. 2017]. Gorelik, E. (2013). Cloud Computing Models. [online] Web.mit.edu. Available at: https://web.mit.edu/smadnick/www/wp/2013-01.pdf [Accessed 26 Nov. 2017]. He, X. (2014). Business Intelligence and Big Data Analytics: An Overview. [online] Available at: https://core.ac.uk/download/pdf/55334437.pdf [Accessed 26 Nov. 2017]. Ibm (2009). The Benefits of Cloud Computing. [online] Ibm.com. Available at: https://www.ibm.com/ibm/files/H300444G23392G14/13Benefits_of_Cloud_Computing_634KB.pdf [Accessed 23 Nov. 2017]. Ico (2014). Information governance strategy 2014-16. [online] Available at: https://ico.org.uk/media/about-the-ico/policies-and-procedures/1043029/information-governance-strategy-2014-2016.pdf [Accessed 26 Nov. 2017]. Intel (2013). Virtualization and Cloud Computing. [online] Intel.com. Available at: https://www.intel.com/content/dam/www/public/us/en/documents/guides/cloud-computing-virtualization-building-private-iaas-guide.pdf [Accessed 23 Nov. 2017]. Iyoob, I. (2015). Cloud Computing Operations Research. [online] Available at: https://www.columbia.edu/~ad3217/publications/cloudOR.pdf [Accessed 26 Nov. 2017]. Kissel, R. (2013). Glossary of Key Information Security Terms. [online] Available at: https://nvlpubs.nist.gov/nistpubs/ir/2013/NIST.IR.7298r2.pdf [Accessed 26 Nov. 2017]. Modeus, G. (2013). Social media - Integrate it and perform better?. [online] Available at: https://www.diva-portal.org/smash/get/diva2:632477/FULLTEXT01.pdf [Accessed 26 Nov. 2017]. Msb (2015). Strategy for information security in Sweden 2010 2015. [online] Available at: https://www.msb.se/RibData/Filer/pdf/25940.PDF [Accessed 26 Nov. 2017]. Nasr, D. and Ouf, S. (2012). A Proposed Smart E-Learning System Using Cloud Computing Services: PaaS, IaaS and Web 3.0. International Journal of Emerging Technologies in Learning (iJET), 7(3). Utica (2014). The Need for Security. [online] Available at: https://www.utica.edu/faculty_staff/qma/needforsecurity.pdf [Accessed 26 Nov. 2017]. Wolverhampton (2017). Information Governance Board Definitions, Roles and Responsibilities. [online] Available at: https://wolverhampton.moderngov.co.uk/documents/s4114/Appendix%20B%20-%20Information%20Governance%20Board%20Definitions%20Roles%20and%20Responsabilities.pdf [Accessed 26 Nov. 2017].