Tuesday, January 28, 2020

Literature Review: Burglary and Crime Prevention

Literature Review: Burglary and Crime Prevention LITERATURE REVIEW INTRODUCTION The literature study in this study revolved around a document analysis on the Constitution, (SA 1996: Constitution), Crime Prevention Strategies, previous studies in the field by discussing the following concepts: environmental criminology, the burglary/robbery process, motivation, target selection, residents’ activities and lifestyle, accessibility of neighbourhood, perspective on environmental crime prevention, crime prevention through environmental design, situational crime prevention. ENVIROMENTAL CRIMINOLOGY A range of factors including social, economic, demographic, biological, psychological and physical, influence the occurrence of crime. According to Naude (2000:7) high levels of crime are more prevalent in countries where there is a high proportion of people who feel economically deprived. From the suspects arrested for housebreaking residential and house robbery in Westville policing area for the period 2012/2013 it is evident that the suspects are not resident in Westville policing area. This study will therefore focus on locations of crime, the characteristics of those locations, the movement paths that bring offenders and victims together at those locations as it would be easier to alter the environmental opportunities for crime than to influence the complex soci-economic factors motivating offenders (Smith 1986:82). This was also found in Naude (1988:11) who stated that it would be easier to prevent opportunities for crime in the physical environment, since committing the crime can mainly be attributed to rational decisions rather than being the result of pathological, biophysical, psychological or social factors. Sovensend in (David 2003:7) argues that a crime only occurs when there is integration in what motivates the offender to commit the crime. The aim would thus be as also found in Smith (1986:84), to reduce opportunities for crime as perceived by potential offenders, by introducing target hardening, target removal, reducing the payoff and encouraging public surveillance. THE BURGLARY/ROBBERY PROCESS This process refers to the causal events within a specific time and space context that leads to the commission of the offence. For burglary/robbery to take place there must be a ready, willing and able offender, a vulnerable attractive provocative target, a favourable environment and the absence of a willing, able and credible modulator (Ekblom 1996:47-50). According to Wilcox (1990:1) the following elements must be present in order for a crime to occur: Desire, Ability and Opportunity. This is depicted in the crime triangle below Fig.2.3.1 OPPORTUNITY The desire and ability refers to the characteristics of a criminal or potential criminal and the opportunity, conditions conducive to a criminal act. The absence of any one of the elements will result in no crime taking place. For a crime to occur the potential perpetrator must have a need and a target. According to Brangtinham and Brantingham (1993:268) the search for a suitable targets rests on a general backcloth formed by routine activities and on a template that helps identify what a great chance is or what a good opportunity would be or how to search for chance and opportunities. By performing daily routines of non-criminal activities the triggered potential burglar develops an awareness space. In accordance with his/her idealized crime template, his/her target will be searched in the awareness space. When the potential burglar finds such a target, he/she will commit the burglary. It is important to realize that the triggered event, the probable crime template, the activity backcloth and the criminal readiness are interrelated. They further went on to say that mixed-use developments are likely to contain a variety of land-users which could potentially provide increased and more diverse opportunities for crime. Shopping malls, storage places, schools, and service stations and restaurants tend to attract criminals as well as legitimate customers to the area. The routine activities of the community (including potential offenders) will therefore affect the incidence of crime in and around these nodes of activity, which are systematically more concentrated in mixed-use developments. Westville’s mixed land development ensures many persons outside Westville to traverse into Westville for work, leisure and potential criminal activity. The above indicate that criminals identify their targets during their day to day activities identifying those areas where they would not be easily identified, are easily accessible and are affluent. Research on burglaries done by (Brantingham and Brantingham 1981, Rengert and Wasilchick 1985) suggests that residential burglars engage in a search process along â€Å"activity spaces† in order to select neighbourhoods in which to commit burglaries. Neighbourhoods are chosen along familiar routes and this is done during the day to day movement of the burglars. This was also found in Schneider and Kitchen 2002:107 who stated that , offenders , like ordinary people, have day to day schedules which involve trips to and from work, visiting friends, going shopping and it is during the course of these activities that they search out likely targets. These targets may even be repeatedly victimised. The busyness of a location also creates opportunities for criminal activities as was found in Shover (1991) who stated that the busyness and anonymity of a large city attracts those who earn a living through crime as it reduces the possibility of offenders being recognised as strangers. This view was also held by Rubenstein H, Murray C, Motoyama T and Rouse W (1980) who reported that heavy pedestrian and vehicular traffic flows were associated with higher victimisation rates as it creates high-density environments and this reduces the risk of strangers and potential offenders being recognised. OFFENDERS MOTIVATION According to Reppetto (1972:21) the satisfaction of a perceived need for money appeared to be the primary motive for most burglaries although offenders did acknowledge that subsidiary satisfactions such as excitement revenge curiosity and feelings of group solidarity also played a role in their decision to offend. This was also found in the study done by Dr. Zinn( ) where he interviewed 30 convicted residential robbery perpetrators on the motivation for offending. 97% of the perpetrators in the study stated their motivation being economic gain; the victims were target because of their wealth. 80% stated that their families and friends and acquaintances in their communities had knowledge of their criminal activities. They stated that residential robbery resulted in quick money. In a study done by May (2011:70) it was found that the majority of perpetrators reported that unemployment triggered their aggravated robbery. TARGET SELECTION The manner in which criminals select potential crime sites, penetrate a variety of symbolic and physical barriers to commit crime, has drawn attention from environmental criminologists. Weatherburn (2001:6) states that criminals commit more crime when the opportunities to do so are more and incentives to do so are good. The following are factors that are conducive for the selection of a possible target: lax physical security, lax personal security, lax law enforcement or low perceived risk of apprehension, attractive commercial or residential targets and easy opportunities for selling or disposing of stolen goods. In Bernasco and Nieuwbeerta (2004:297) it was found that burglars target specific areas that offer increased revenue, requires minimal effort when the premises or property is entered, the premises/property appear to have valuable items; and the burglars feel (perceive) that they will not be apprehended or disturbed while conducting the burglary (low risk of being detected and apprehended. They further state on (2004:297-298) that the burglar would look at the affluence level of the property; and the possibility (likelihood) of the successful completion of the criminal act. The wealth displayed in the form of properties and vehicles by Westville residents may be what criminal are drawn to. Felson and Clark (1988) states that there are four elements designated by acronym VIVA that influences a targets risk of being victimized by crime namely: value, target must be rewarding , inertia, the ability of the target to be moved, visibility, exposure of targets to offenders, access, all those environmental and situational features that my facilitate offenders getting to the target. Sovensend (2003:17) is of the opinion that burglars estimate the potential rewards by assessing the size and condition of houses, yards, and vehicles parked in garages. Conspicuous evidence of wealth places a property at a higher risk of victimisation. As is the case in Westville which is an affluent area. However, Wessel (2002:13) argues that there is evidence that most expensive looking homes are spared for fear of security devices or the presence of staff on the property. According to Tilley, N Pease, K Hough, M Brown, R ( 1999:7) that burglars target areas were there is a possibility of high value valuables, nobody present to prevent the burglary from taking place, that there is a market where the stolen goods can be disposed of and in return receive a monetary incentive for the stolen goods and the dwelling have insufficient security hardware to provide it with any reasonable level of perceived guardianship (protection) This was supported by Reppetto (1971:16) in his study he obtained from the interviewees as to the reason for selection of their targets being, ease of access, appears affluent, feels inconspicuous, presence not be questioned, isolated neighbourhoods, few police patrols and anonymity of neighbours. Kleemans ( 1996:55) in his findings as to why perpetrators repeatedly victimise he said, the first is the knowledge the burglar has obtained about the goods to be stolen, the second time the burglar can steal the goods he/she could not transport the first time, the goods that he/she forgot to steal the first time; or the goods for which he/she has only now found a potential client for, the burglar can be reassured that after a time the goods stolen the first time have been replaced, knows the risk factors (layout of the house, the ease of access and egress). Pease (1998:6) argued that the key reasons for repeats are believed to be the presence of good, and lack of bad, consequences of the first crime for the offender, and the stability of the situation which presents itself to an offender on the first and subsequent visits to the scene of his/her crime. PERMEABILITY OF NEIGHBOURHOOD According to Garland F White (1990:59) permeability is the number of access streets from traffic arteries to the neighbourhoods. He is of the opinion that permeable neighbourhoods may provide less risk of apprehension for offenders as there are more escape routes. In addition they may be more likely to be selected for burglaries on the basis of chance. If a neighbourhood has more avenues of access, the chance of an offender entering it while searching for a burglary location would be greater. Schneider and Kitchen (2007:121) reported on a study which compared a dense permeable housing estate with a lower density estate dominated by cul-de- sac. Their finding was that burglaries, auto crime, arson and public disorder were significantly higher for the area with a higher density permeable development. They were cautious to note that there are many other factors, other that density and street layout, which may help to explain these patterns Although neighbourhood permeability has been linked to neighbourhood crime rates, the results have not always been conclusive. An experimental study in Hartford Connecticut (Fowler 1982) found that decreasing the number of entrances to the experimental neighbourhood and thereby decreasing the amount of traffic did not necessarily reduce robberies and burglaries in the long run although there was a short-term reduction in crimes. The pattern of victimisation moved from less-travelled side streets to the more heavily travelled streets in the district. The study suggests that a reduction in crime could be achieved both when physical permeability is reduced and when the neighbourhood is organized socially to prevent crimes. The physical changes alone were not enough to produce a long term reduction in crime. (Taylor and Nee 1988) are of the opinion that dwellings which are more visible from the street or neighbours and passers-by, are less desirable as a target for burglars. David WM Sovensend 2003:17 were of the same opinion. He also stated that burglars tend to avoid targets easily observed by neighbours or passers-by. Therefore, it can be deduced that houses in isolated areas, not visible from the road and on large properties of land which are next to parks or other non-residential areas are more attractive to burglars. A study by Davison and Smith (2003) revealed that crime was more frequent in accessible areas with commercial land use and residential burglary was reported to be more frequent in residential properties close to commercial areas (Dietrick 1977). Research by Wilcox and Quisenberry (2004) revealed that businesses in residential areas exhibited an increased risk of burglary. Yang’s research (2006) which investigated some three thousand burglaries, found that burglaries are more likely to occur in properties located in mixed-use sites. Brantingham and Brantingham (2008:91) have discussed mixing land-users as supported by New Urbanism and commented â€Å"this planning practice will increase the activity in some nodes and is likely to produce a clustering of crime† CRIME PREVENTION Currently crime prevention is the primary function of the South African Police Service. The South African Police is mandated by the Police Act 68 of 1995 as well as section 205(3) of the constitution to combat crime, investigate crime, maintain public order, protect and secure South Africa’s inhabitants and their property; and to uphold and enforce the law. However the SAPS are not in a position to effectively combat crime on their own. The Government since 1994 recognised the need for crime prevention. This need saw the acceptance of the National Crime Prevention Strategy (NCPS) in 1996 and the White Paper on Safety and Security in 1998. The NCPS is a multi-agency approach to crime prevention and aimed to influence the operations of the Departments of Safety and Security, Justice, Correctional Services, Welfare, Intelligence, Health and Education. The NCPS document made mention of environmental design as one of its pillars (1996:67). To assist the NCPS and the White Paper on Safety and Security, a National Crime Prevention Strategy Centre (NCPSC) was established within the department of Safety and Security and their functions are to mobilise other government departments, to assist provincial and local government in preventing crime, to assist in co-ordinating and managing the prevention of certain crimes and to monitor the effectiveness of social crime prevention interventions. The White Paper on Safety and Security (South Africa 1998:14) places emphasis on two approaches to crime prevention, viz, crime prevention through effective criminal justice and, social crime prevention. The White Paper (1998:19) further states that social crime prevention can be categorized as follows, viz. developmental crime prevention, situational crime prevention, community crime prevention and continuous improvement to the integrated Justice System. A multi-departmental or multi-sectoral approach is thus needed, which involves all levels of government and includes relevant organisations of civil society (South Africa 1998:20) According to the Crime Prevention Module level 1 (2001:9) crime prevention emphasises community involvement and without community involvement, crime cannot be prevented effectively. To accomplish this Police have to form a partnership with other role players which include but not limited to, the community, private security companies, business Against Crime (BAC), media, non-Governmental Organisations (NGO’S), etc. Naude and Stevens (1998:48) argue that co-operation must be forged by means of guidance, meetings and interaction with businessmen, public and use of media to succeed in long preventative programme. The researcher supports the arguments of Naude and Stevens as this can filter through to the prevention of house robberies and housebreaking residential in the Westville policing precinct. Lab (1997:19) states that prevention activities should not be restricted to the efforts of the criminal justice system alone but should include that of the public and private organisations. According to Bennett and Wright (1984:19) situational crime prevention refers to any environmental community or individual based method which aims to increase the risk, decrease the reward or increase the difficulty of committing the crime. Brantingham and Faust (1976:284) offer three types of crime prevention approaches viz, primary crime prevention (the identification of those conditions in the physical and social environment that offer opportunities for criminal acts), secondary crime prevention, the early identification of offenders (the intervention before an offence is committed), tertiary crime prevention (this aims to deal with offenders with the purpose of preventing further criminal activities). Lab (1997:20) is of the opinion that primary crime prevention is to put measures in place with the aim of making crime less attractive and more difficult for the offenders to commit whilst secondary prevention focuses on problems that already exist and are fostering deviant behaviour. Lab (1997:23) states that tertiary prevention includes arrests, prosecutions, incarceration, treatment and rehabilitation.

Monday, January 20, 2020

Is Subliminal Advertising Effective? Essays -- essays research papers

Is Subliminal Advertising Effective? The average American views an average of 1500 ads every single day! Did you know that some of these ads have hidden pictures, words, or even sound inside of them? These hidden things are called subliminal messages. When used correctly, these hidden messages have been proven to persuade us to do certain things. What are Subliminal Messages? Subliminal messages are things that are stored inside of our subconscious. They are known as are hidden messages because we have no knowledge of the things inside our subconscious. The subconscious is one part of our brain. We are not aware of the things inside our subconscious part. However, our subconscious remembers every single detail of every single thing we see! It works just like a computer because it views information (ads), and stores it into our memory (brain.) Some examples are: †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  a small image(s) hidden inside a larger picture †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  a audio message hidden inside a cassette tape †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  hidden messages inside songs that you hear when you play it backwards †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  hidden words or pictures that quickly appear inside a television show, movie, or commercial In order for these items to be subliminal or "hidden" messages, they must not be noticeable to the human eye or ear. Our subconscious effects us on a daily basis. In fact, it is responsible for the following: †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  little slips of the tongue †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  unexplainable actions or thoughts †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ideas, songs and memories that suddenly "pop" into our heads In the Beginning: Subliminal messages have become a very powerful way to get your message out to the public. It all started in 1957 when James M. Vicary created an "invisible commercial" for a movie theatre. This "invisible commercial" contained several brief messages that were hidden inside of one main message. For example, during the main commercial the words "Drink Coca-Cola" and "Hungary? Eat Popcorn" would flash on the screen. These interruptions would occur every five seconds, and they would last for 1/3000th of a second. These brief food and beverage interruptions were not noticeable to the viewers. However, the people that watched these commercials had an unexplainable urge to eat popcorn and drink coca-cola. Overall, popcorn sales increased 57.5% and drink sales increased 18.1%. People were outraged when they heard about th... ...ble teach people who would have been almost impossible to reach any other way. Subliminal messages are also inside tapes to help people quit smoking and lose weight. These tapes have proven to be very effective. Unfortunately, people don't always stop smoking after listening to these tapes, but they do smoke less than they used to. Conclusion Subliminal messages are a very, very powerful marketing tool. They can be used to persuade us to feel or do may different things. However, the effects of subliminal messages are short term. The only exception to this short term effect occurs when the subliminal messages are teaching us to do or not to do something. Here is a list of websites with examples of subliminal ads. Sources: "Subliminal Messages Alive and Well" komar.cs.stthomas.edu.qm425/fisher3.htm Butler, S. Ron, "subliminal advertising: return of the hidden persuaders" disinfo.com/pages/dossier/id321/pg1/ "The Effects of Subliminal Advertising" uoguelph.ca/~mbateson/subliminal.html Thomas, Chris "Subliminal Perception" cbt.wiu.edu/John_Drea/subliminal_perception.htm Leroux, Kivi "Subliminal Messages" emagazine.com/july-august_1999/0799curr_subliminal.html Is Subliminal Advertising Effective? Essays -- essays research papers Is Subliminal Advertising Effective? The average American views an average of 1500 ads every single day! Did you know that some of these ads have hidden pictures, words, or even sound inside of them? These hidden things are called subliminal messages. When used correctly, these hidden messages have been proven to persuade us to do certain things. What are Subliminal Messages? Subliminal messages are things that are stored inside of our subconscious. They are known as are hidden messages because we have no knowledge of the things inside our subconscious. The subconscious is one part of our brain. We are not aware of the things inside our subconscious part. However, our subconscious remembers every single detail of every single thing we see! It works just like a computer because it views information (ads), and stores it into our memory (brain.) Some examples are: †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  a small image(s) hidden inside a larger picture †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  a audio message hidden inside a cassette tape †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  hidden messages inside songs that you hear when you play it backwards †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  hidden words or pictures that quickly appear inside a television show, movie, or commercial In order for these items to be subliminal or "hidden" messages, they must not be noticeable to the human eye or ear. Our subconscious effects us on a daily basis. In fact, it is responsible for the following: †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  little slips of the tongue †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  unexplainable actions or thoughts †¢Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  ideas, songs and memories that suddenly "pop" into our heads In the Beginning: Subliminal messages have become a very powerful way to get your message out to the public. It all started in 1957 when James M. Vicary created an "invisible commercial" for a movie theatre. This "invisible commercial" contained several brief messages that were hidden inside of one main message. For example, during the main commercial the words "Drink Coca-Cola" and "Hungary? Eat Popcorn" would flash on the screen. These interruptions would occur every five seconds, and they would last for 1/3000th of a second. These brief food and beverage interruptions were not noticeable to the viewers. However, the people that watched these commercials had an unexplainable urge to eat popcorn and drink coca-cola. Overall, popcorn sales increased 57.5% and drink sales increased 18.1%. People were outraged when they heard about th... ...ble teach people who would have been almost impossible to reach any other way. Subliminal messages are also inside tapes to help people quit smoking and lose weight. These tapes have proven to be very effective. Unfortunately, people don't always stop smoking after listening to these tapes, but they do smoke less than they used to. Conclusion Subliminal messages are a very, very powerful marketing tool. They can be used to persuade us to feel or do may different things. However, the effects of subliminal messages are short term. The only exception to this short term effect occurs when the subliminal messages are teaching us to do or not to do something. Here is a list of websites with examples of subliminal ads. Sources: "Subliminal Messages Alive and Well" komar.cs.stthomas.edu.qm425/fisher3.htm Butler, S. Ron, "subliminal advertising: return of the hidden persuaders" disinfo.com/pages/dossier/id321/pg1/ "The Effects of Subliminal Advertising" uoguelph.ca/~mbateson/subliminal.html Thomas, Chris "Subliminal Perception" cbt.wiu.edu/John_Drea/subliminal_perception.htm Leroux, Kivi "Subliminal Messages" emagazine.com/july-august_1999/0799curr_subliminal.html

Sunday, January 12, 2020

Target Financial Analysis

Juan A. Torres Rodriguez D01596038 Mini Case Assignment Target Corp. started in 1902 as Dayton’s Dry Goods company. At 1911, Dayton’s Dry Goods is renames as Dayton Company, and commonly known as Dayton’s Department Store. In 1946 Dayton’s Department Stores started giving the community back 5% of their pretax profits, a practice that Target Corp still maintains. During the 1960’s Dayton’s create a new kind of store to appeal the masses called Target, opening the first Target store in the Twin Cities on May 1, 1962. The industry sector in which Target Corporation competes is in the retail sector reaching the $62. 7 Billion in sales. As mentioned above, Target competes in the retail sector, which makes the operating risks of the company mainly focused on customer’s perceptions, differentiation of brand, and anticipating consumer preferences to boost their sales, gross margin and profitability. If we take a look at Target’s 10K, th e first risk factor they mention is the ability of differentiate the business from other retailers by creating attractive value propositions through a careful combination of price, merchandise assortment, convenience, guest service and marketing efforts.Another risk that all companies in this sector face is the macroeconomic condition of the country and the impact this has in their consumers. This lead us to the financial risk the company might have. One of the financial risks we have to consider in any type of company is the debt to total capitalization ratio. Based on financial information of their 2011 report, we can calculate the debt to total capitalization ratio in the following manner: Total debt: 15,726 million Total stockholder’s equity: 15,487 million, therefore: 15,726 / 31,213= . 50 or 50%Comparing their debt to total capitalization ratio with industry average, Target’s is too high. The industry debt to total capitalization ratio is 0. 36. Comparing the fin ancial information of previous years Target went from 0. 58 in 2009 to 0. 52 in 2010, to 0. 50 in 2011. Overall, Target is improving significantly their debt to capitalization ratio, but still has some work to do. In regards of Target stock, currently they don’t have any preferred stock outstanding, just common stock. Target’s common stock is traded in the NYSE as TGT. The price of it’s common stock as of today is $62. 0, going up 0. 06 points. Target’s cash dividend yield on the Common Stock is 0. 0192 = 1. 92% = 2. 0: Cash dividends declared per share: $1. 20 Current stock price: $62. 50 Cash dividend yield= 1. 15 dividends declared/ 62. 50 stock price = 1. 92 = 2. 0 Target’s market capitalization is: 668. 4 million shares issued and outstanding x $62. 50 of stock prices = 41. 8 Billion Continuing with Target’s capital structure, if we look at Target’s liabilities section: Short portion of Long-Term Debt = $3. 3 Billion Long-term de bt = $15. 2 Billion Therefore the total debt for Target would be: . 3 B + 15. 2 B = 18. 5 Billion Dollars Taking the previous calculation of Targets market capitalization of 41. 8 the total capitalization would be: 18. 5 B + 41. 8 B = 60. 3 Billion, or: 31% Debt 69% Equity As of November 18, 2012, Target’s current beta is . 48. Now if we would like to calculate what would be Target’s new beta without the long-term debt (unlevered beta) we need to use the Hamada formula for the unlevered beta bu= b/ [1 +(1-T)(D/S) bu= . 48 / [ 1 + (1-34. 3%) (18. 5/40. 6)] bu= . 37 If Target would not have any long-term debt, its beta would be of . 7. Moving to Target’s current Marginal Tax Rate, according to the Income Statement found at Target’s annual report, the rate is 34. 3%. In order to calculate Target’s Cost of debt before and after taxes, we need to look for the bonds issued by a corporation. Since Target has not issued bonds, I took the cost of a long-ter m debt due in 2020 as my example. The rate of that long-term debt is 3. 875%. This would be the Cost of debt before any taxes taken. Now to calculate the Cost of Debt after tax, we need to proceed with the following calculation: 3. 875 ( 1 – 34. %) = 2. 545875 As mentioned before, Target doesn’t have any preferred stock. We can calculate the Cost of Equity using the Risk Free Rate of 3. 00% and a Risk Premium of 7. 5% points. Using the new beta of . 48 we can determine what is the Expected Total return by Common Stockholders: rRF = 3. 00 rRP = 7. 5 b= . 48 Cost of Equity = rRF + (rRP x b) =3. 00% + (7. 5% pts x 0. 48) = 0. 066 ? 6. 6% Given the dividend yield of 2. 0 we can also determine the Expected annual appreciation of Target’s Common Stock: 6. 6% Total Return – 2. 0 Dividend Yield = 4. % of E. A. A. With the previous information calculated we could proceed and calculate the Weighted Average Cost of Capital: wd = 31% ws = 69% rs = 6. 6% rd = 3. 875% Tax = 34. 3 WACC = wd ( 1 – T)rd + ws(rs) =31% ( 1 – 34. 3%) 3. 875% + (69% x 6. 6%) = 0. 053432 = 5. 3432% One of the last things used to evaluate in order to consider investing in a company is its Price Earnings Multiple. Target’s Price Earnings Multiple is calculated the following way: Stock Price= $62. 50 Earnings Per Share = $4. 50 P/E = Stock Price / EPS = 62. 50 / 4. 50 = 13. 89If we compare Target’s P/E ratio with Wal-Mart, which is in the same industry, (14. 03 P/E), Target’s P/E is within ndustry. http://finance. yahoo. com/q/bc? s=TGT+Basic+Chart&t=5y This chart was retrieved from Yahoo! Financial. In here we can see the performance of Target’s Stock (TGT) during the past five years. In 2008 Target’s started at approximately $55. 00; looking at 2009, the stock plummeted from the 60’s to the mid 20’s, which reflects the market crash. After this episode in the economy we can see that Target’s stock has re covered significantly.After performing the calculations, Target’s capital structure is optimal. However, the debt to capitalization ratio is high, at 50%. Target needs to lower its Long-Term Debt. Comparing Target’s debt to capital to the industry average, the industry average is 0. 36. However I would invest in Target. I think I would have an advantage over outsiders, because I used to work at Target Corporation. Target is a company that is constantly growing, and their sales demonstrate their market advantage over other retailers. What convinced me to invest into Target mostly was the P/E ratio.Comparing it to a corporation like Wal-Mart, which is really successful, Target’s P/E ratio is acceptable and attractive. References 1. Scovaner, Douglas A. (2011). Target 2011 Annual Report. Retrieved on November 18, 2012: https://corporate. target. com/annual-reports/2011/images/company/annual_report_2011/documents/Target_2011_Annual_Report. pdf 2. Stock Analysis on n et. (2012). Retrieved on November 18, 2012. http://www. stock-analysis-on. net/NYSE/Company/Target-Corp/Ratios/Long-term-Debt-and-Solvency#Debt-to-Capital 3. Retrieved on November 18, 2012 http://ycharts. com/companies/TGT/pe_ratio 4.Yahoo! Finance. (2012). Retrieved on November 18, 2012. http://finance. yahoo. com/q/bc? s=TGT+Basic+Chart&t=5y ——————————————– [ 1 ]. https://corporate. target. com/annual-reports/2011/images/company/annual_report_2011/documents/Target_2011_Annual_Report. pdf, page 5. [ 2 ]. http://www. stock-analysis-on. net/NYSE/Company/Target-Corp/Ratios/Long-term-Debt-and-Solvency#Debt-to-Capital [ 3 ]. https://corporate. target. com/annual-reports/2011/images/company/annual_report_2011/documents/Target_2011_Annual_Report. pdf, [ 4 ]. http://ycharts. com/companies/TGT/pe_ratio

Friday, January 3, 2020

Employees and Social Media - Free Essay Example

Sample details Pages: 4 Words: 1146 Downloads: 2 Date added: 2019/04/10 Category Society Essay Level High school Tags: Social Media Essay Did you like this example? The use of social media channels has increased recently in all places (in homes, restrooms, events, travel and even within the offices of the job). Because the job and the job are denied, it is not permissible for the employees rooms and offices to turn into sites where employees browse through Twitter, or Facebook. According to the social media what employers need to know there has been a huge increase in the popularity of social media such as Facebook, twitter, and LinkedIn, and the loss of the interests of the auditors, and conversion of hours of employment, which takes a salary to a time of entertainment and makes his salary in those hours a place of doubt. Don’t waste time! Our writers will create an original "Employees and Social Media" essay for you Create order It remains important for all of us to invest time in serving us and serve the public interest, and do not waste time on the auditors in the official and civil facilities because this employee or that busy with this technique. And here highlights the role of awareness and guidance by every wise and intellectual. Employers are entitled to monitor employees social media use. First, know the employees personality in the social media. There is a clear confusion in the concept of the impact of the social networks, and the responsibility of the society to be exposed to the collapse of morality, social isolation, family disintegration, the absence of values and principles and the language of dialogue, is an extremism in thought and opinion. Some people have their personalities in websites that are different from those who may find them respectable in fact or in social communication indifferent. The manager will look at this person and be know his personality. how is he affect with others how is talking with others and how is he respond? According to the online reviewed children and teenagers using social media are less likely than adults to be concerned about privacy or to understand how to protect themselves. Because a lot of people they do not use their own social media, so its affect to them. Furthermore, monitor the performance and action of staff. Although there is evidence of many of the positive effects of social networking sites on employee productivity, it was also somewhat difficult to find a direct relationship between productivity and the use of social networking sites. The purpose of this concept paper is to study the importance of collaborative technology such as social media in employee productivity and to discuss the importance of challenges and constraints on social media in the workplace. This paper also addresses the positive and negative perceptions of social networking sites, the relationship between social networking sites and employee productivity, and examines whether social networking sites can increase employee performance. Publication on social networking sites is a display of cybercrime through the dissemination of false information which causes embarrassment to the organization concerned. Giving many personal information may eventually be in the hands of criminals or in the hands of criminal employers who may cause harm to employees or their family members. At present many employers are trying to look into the world of social media to study the other side of the employees personality before giving him a job offer. Because of the widespread use of social networking sites, it has become common to understand the need for employers to consider how social networking sites affect their organizations. The extensive use of these sites by staff raises inevitable questions. Many small business owners recognize the importance of presence on social media channels in terms of customer service and long-term marketing. But few of them are aware of the security burden of this presence, and that the burden is increasing in the presence of their employees on social media independently of the company. Some companies prevent employees from any association with the company even out of work on their social platforms. Protecting company assets; The confidentiality and ownership of confidential information is one of the most important the companys assets. Including confidentiality and ownership of information generally Information not available to the public in case it has been disclosed Benefit competitors or harm the company. Examples are thats technical information, designs or action steps data pricing information and action plans or strategic plans acquisition plans or group work plans and stages of action manufacturing information and enterprise applications and software technologies, research and development and customer and supplier schedule as well as proprietary information and confidential information of Parties which are secured and that you commit to save such as private and confidential information for customers and partners. You must be vigilant during and outside work hours, to protect confidentiality and ownership of confidential information as much as possible. Can If you have the authority to do so, you must submit this information for co-workers and external parties who have the legitimate need for it in their work. be sure to follow the safeguards that have been put in place to protect this information of intentional or unintentional misuse. Do not discuss this information in public places where others can hear it. It is your duty to keep information confidential especially after you leave work. Managers should ensure that safeguards are taken confidential and confidential information of intentional misuse or unintentionally and to ensure that other employees do not reach it only on the basis of their need for work. Sometimes you may need to use equipment the companys computers for limited personal use, allows you do this within limits if they are used reasonable and work objectives are accomplished. the use of facilities and equipment for other purposes will not be tolerated authorized, offensive, immoral or inappropriate. Do not use the companys assets a re overexploited or abused for use. For personal gain or to perform acts on behalf of others. The exaggeration of this may amount to theft or fraud. If you were required to spend your time on the company and make sure customers do this honestly and accurately. You should not post any comments or related files in social networking sites such as social networking sites, publishing photos and videos. Blogs, wiki sites and other sites if it is positive or which is characterized by a confidential nature of the company. You should not use time, property or corporate networks for Social Media. If you do so outside of the work environment You should make sure that your communications do not violate the law (For example, defamation, defamation and harassment laws), And copyright (or company policies) as a example policies regarding disclosure of confidential information or own or speak on behalf of the company do not distort or insult the reputation of the companys services or customers If you are talking about your career you should confirm that this is your personal opinion and does not necessarily represent an opinion company. And finally you have to Protect your personal information.