Wednesday, December 25, 2019

Auckland City Small Businesses Analysis - 2014 Report - Free Essay Example

Sample details Pages: 4 Words: 1310 Downloads: 6 Date added: 2017/06/26 Category Business Essay Type Research paper Did you like this example? Auckland City Small Businesses Analysis 2014 Report Author: Leaziel Bayutas à ¢Ã¢â€š ¬Ã¢â‚¬Å" Senior Business Analyst, NZ Business Review Center Date Covered: Financial Year 2013-2014 31st March 2013 à ¢Ã¢â€š ¬Ã¢â‚¬Å" 1st April 2014 Report Submitted on:4th August 2014 TABLE OF CONTENTS COVER PAGEà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 2 TABLE OF CONTENTSà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â €š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. 3 EXECUTIVE SUMMARYà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 4 INTRODUCTIONà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ã ƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 5 METHODOLOGYà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦.. 6 DATA TABULATION and ANALYSISà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 7 CONCLUSION and RECOMMENDATIONà ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 10 APPENDIX (Project Budget and Schedule of Activity)à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 11 (References)à ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦Ãƒ ¢Ã¢â€š ¬Ã‚ ¦ 12 EXECUTIVE SUMMARY: This report is done in order to review and evaluate existing small businesses in current operation in the heart of Auckland City. Don’t waste time! Our writers will create an original "Auckland City Small Businesses Analysis 2014 Report" essay for you Create order It is aimed that at the end of businessà ¢Ã¢â€š ¬Ã¢â€ž ¢ operation analysis, the market position of each business will be defined in order to determine top and least performing enterprise. The local government has requested this analysis to aid the awarding of top performing business and provide training and financial assistance to low performing businesses. There are five small businesses covered in this report namely: RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' ©, Queen Street Dairy, Hiwa Sushi, Haba Bakery, and Oso Mini Mart. As a result of very impressive business performance during the 2014 financial year supported by effective marketing techniques and large market share, RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © has consistently shown top performance throughout the analysis process and is thereby recommended for the top performing enterprise award. Haba Bakery on the other hand is recommended for training and assistance offered by the local government. Graphical representations of financial elements necessary to be analysed are included in this report, however only limited to 2014 Financial Year. INTRODUCTION: This report covers the performance analysis of small businesses currently operating in the heart of Auckland City. Financial information gathered from each entity will be presented and compared so as to determine relevant performance ratings of each enterprise. Market position, marketing strategies and market competition of the considered small businesses will be reviewed. The economic performances of each business were based on business operations which occurred during the 2013-2014 Financial Year. Reviews and conclusions made by the author in this report is only limited to the period of 31st March 2013 until 1st April 2014. Small businesses operating in Central Auckland City to be considered in this report are as follows: RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © à ¢Ã¢â€š ¬Ã¢â‚¬Å" 119 Victoria St, Auckland Central Queen Street Dairy à ¢Ã¢â€š ¬Ã¢â‚¬Å" 132 Queen Street, Auckland Central Hiwa Sushi à ¢Ã¢â€š ¬Ã¢â‚¬Å" 15 Albert Street, Auckland Central Haba Bakery à ¢Ã¢â€š ¬Ã¢â‚¬Å" 62 High Street, Auckland Central Oso Mini Mart à ¢Ã¢â€š ¬Ã¢â‚¬Å" 59 Shortland Street, Auckland Central METHODOLOGY: Due to security and confidentiality of information, all data gathered and disclosed in this report are obtained through legal connections and with permission of the small businesses owning the information. Financial information was obtained through copies of financial reports from each business. Facts and figures regarding market position and strategies were collected as a result of permitted interviews with the business manager, financial manager or owner of each entity. Accuracy and relevance of all information disclosed is assured, however only limited to evidence held such as the financial reports generated by each entity and sufficient market research done by professional and licensed business analyst(s) involved in this project. DATA TABULATION and ANALYSIS: Performance (SWOT) and Competition In the graph presented above, it is evident that there is a good level of competition between three small businesses in the food industry (RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' ©, Hiwa Sushi, and Haba Bakery) and fair level of competition between the two small businesses in the retail market (Queen Street Dairy and Oso Mini Mart). The level of sales shows that RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s cafÃÆ' © has the strongest measure of revenue. This may have been due to the size of its target market which is composed of working professionals, students and tourists. Hiwa Sushi which has a similar target market has the second highest level of sales. Queen Street Dairy and Oso Mini Mart which are in the retail market have relatively the same level of sales achieved in the 2014 Financial Year. Haba Bakery on the other hand has relatively low level of sales compared to what RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © and Hiwa Sushi have made. One weakness of these businesses is their location. Central Auckland has a reasonably small geographical area where universities and large companies are established as well as where hundreds of small businesses compacted in tu rn aggressively competing in a day-to-day basis. Such quality of location may itself be a profitable opportunity just like what it has been for RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' ©. However may be a threat for hard-earning enterprise like Haba Bakery. Market and Strategies The pie-graph representing the market share of the five small businesses and other small businesses operating in Central Auckland is reflective of the sales level achieved by each business. RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © being the strongest in revenue making has approximately the same amount of market share as all the other businesses operating in Central Auckland. All five enterprises have similar target market à ¢Ã¢â€š ¬Ã¢â‚¬Å" working professionals, university students, local residents and tourists. Such target market has a very large consumer number that implies very good revenue potential. However, each business must generate an improving marketing strategy in a daily basis in order to maximise its profit. RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © has introduced meal deals for its weekday operations and were effectively attractive to its customers. Coupons and free coffee for every 10 bought have increased their chances of establishing customer loyalty. Retail stores like Queen Street Dairy and Oso Mini Mart also use a daily meal deal (ie. $5.50 pie coffee, $5 cup noodle drink, etc.). Hiwa Sushi has maintained its $5 lunch pack whilst alternating its noodle soup/rice combo meal. Such marketing strategies have been very strong and effective particularly in attracting working professionals that often want a quick serve meal and students who want à ¢Ã¢â€š ¬Ã‹Å"more for lessà ¢Ã¢â€š ¬Ã¢â€ž ¢ type of deals. However, Haba Bakery has only introduced a breakfast deal and maintains original prices throughout the day. Each business has also provided sign boards in order to advertise their services and deals for the day. CONCLUSION and RECOMMENDATION: Based on the financial records ma de for 2013-2014 Financial Year, analysis done based on business performance and its strategies and sufficient background market research, it is evident that there has been an acceptable level of competition and economic improvement in small business operating in Central Auckland. Most of the small businesses covered in this report have generated marketing strategies that are effective and helpful in increasing sales and maximising profit. As the purpose of this report states, analysis of small businessesà ¢Ã¢â€š ¬Ã¢â€ž ¢ performance currently operating in Central Auckland as requested by the local government in order to aid in determining top and least performing enterprise. Supported by this analysis report, there is a strong recommendation that the top performing enterprise award goes to RJà ¢Ã¢â€š ¬Ã¢â€ž ¢s CafÃÆ' © as the top earning entity and highest market share holder for year 2014. It is also recommended that Haba Bakery be given financial advice and marketing guid elines in order to increase revenue and improve market performance. This report is only limited to information disclosed and business operations that have occurred during the 2014 Financial year. APPENDIX: Project Budget This monetary budget is for expenses incurred in completing this project covering the two-month process from initiation until completion. Particulars $NZ $NZ Total Transport and Petrol 480 Legal Fees 3,800 Office Supplies 250 Administration Fees 2,700 Wages 21,600 TOTAL EXPENSES 28,830 Schedule of Activity WEEK NO. PLANNED ACTIVITY COMPLETED ON: Week 1 Book appointments and interviews with business managers and owners June 17, 2014 Weeks 2-3 Appointments and Interviews June 30, 2014 Week 4 Research and analysis July 7, 2014 Weeks 5-6 Report Writing July 17, 2014 Week 7 Meeting to refine report July 23, 2014 Week 8 Finalising report and presentation August 1, 2014 References: Victoria Business School. (July, 2013). How to Write a Business Report. Retrieved from https://www.victoria.ac.nz/vbs/teaching/publications/VBS-report-writing-guide-2013-July.pdf *This link has been used by the student named Leaziel Bayutas as a guide in writing this business report. All business names and financial information written in this report do not exist in the real Central Auckland and are only made up by the student in order to produce this report. 1

Tuesday, December 17, 2019

Corruption Is Defined As The Appropriation Of Public...

Corruption is defined as the appropriation of public resources for private profit and other private purposes through the use and abuse of official power or influence (Smith, S, C and Todaro, M, P, 2012, P.546). Examples of how governments do this can be through collecting bribes for providing permits and licenses, for giving passage through customs or for prohibiting the entry of competitors (Shleifer, A and Vishny, R,W, 1993, P.599). Corruption varies across different economies, which we will analyse throughout this assignment, we will also be using several economic theories to help analyse the effects of corruption on economic growth. Firstly we will observe a theoretical example of corruption by Becker and Stigler (1974) and see how it†¦show more content†¦Corruption also has negative consequences for human development as well as economic growth (Houston, D, A, 2007, P.325) particularly in emerging economies because less money is spent on developing human capital levels, an example of this is with Somalia. Somalia is currently ranked 176 and has been ranked the most corrupt country in the world according to Corruption Perceptions Index (2016) for several years. The Russian Presidency of the G20 state that there is also a very strong negative correlation between perceived corruption and the level of output, hence relating to why Somalia have such a low rate of economic growth, the annual growth rate was expected to be 1.98% according to Trading Economics global macro models (2016). Another theory which analyses corruption in a different way is the Principal Agent Problem. This is a problem generated from the relationship between the principal and the agent. The principal is the one who assigns tasks to an agent, whom then fulfils the task on behalf of the Principal. However if there’s a difficulty for the Principal to monitor the agents actions, the agent then has an incentive to cheat the principal, thus resulting in the Principal Agent Problem (Shah, S,N, 2014, P.1). The affect that the Principal Agent Problem has on economic growth depends on which theory we take intoShow MoreRelatedNigeria Is The Chronic Level Of Corruption1566 Words   |  7 Pagesmost pervasive and destructive issues facing Nigeria is the chronic level of corruption. Africa’s most populous country with over 170 million people, modern Nigeria emerged from British colonialism gaining full independence in 1960. After many years of military rule, a 1999 constitution heralded a move to a civilian democratic government which has been in place ever since. (Africa:Nigeria, 2013) Nigeria is a resource rich nation with extensive reserves of oil and in fact, is Africa’s largest producerRead MorePublic Corruption1462 Words   |  6 PagesPUBLIC CORRUPTION Kelly Monks Anthony F. Scarpelli CJ-305-02 Applied Criminal Justice Ethics Unit 2 Critical Analysis Essay May 1, 2011 PUBLIC CORRUPTION Public corruption involves a breach of public trust and/or abuse of position by federal, state, or local officials and their private sector accomplices. By broad definition, a government official, whether elected, appointed or hired, may violate federal law when he/she asks for, demands, solicits, accepts, or agrees to receiveRead MoreHydro And Thermal Power Infrastructure1761 Words   |  8 Pagesvandalization of power towers and check mate the activities of staff to avoid illegal electricity connections and other form of corruption. Bureaucracy leading to loss of time in spare parts acquisition should be avoided. Implication of Findings for the society The implications of the above findings for the general society in Nigeria include: The fact that budget implementation in the public sector enhances realization of macroeconomic objectives have some implications for the citizens. One of which is thatRead MoreCorporate Governance2469 Words   |  10 PagesTABLE OF CONTENTS GOOD CORPORATE GOVERNANCE 2 †¢ OBSERVANCE OF GOOD CORPORATE GOVERNANCE 3 †¢ FAILURES OF CORPORATE GOVERNANCE 5 CORRUPTION 5 †¢ BENEFITS OF AVOIDING CORRUPT PRACTICES 6 CONCLUSION 8 REFERENCES 9 â€Æ' GOOD CORPORATE GOVERNANCE Governance in the Oxford dictionary is defined as â€Å"control or influence†, while corporate is defined as â€Å"shared by all members of the group†. Therefore corporate governance refers to the structures and processes for the direction and control of membersRead MoreCompare and Contract the Budget Processes and Systems of Fiscal Accountability in Presidential and Parliamentary Systems of Government.8193 Words   |  33 PagesComparative Public Administration PROJECT Compare and contract the budget processes and systems of fiscal accountability in Presidential and Parliamentary systems of Government. Student: Lyn Marie James Abstract There is diversity of forms of government (Laundy, 1989) and different ways of classifying them and as such, this paper sets out to discuss the budgetary powers of the legislature under different forms of government, and the environment that informed the political structuresRead MoreBudget Essay12259 Words   |  50 Pagespreparation are (or should be) at the heart of good public expenditure management. To be fully effective, public expenditure management systems require four forms of fiscal and financial discipline: 1. control of aggregate expenditure to ensure affordability; that is, consistency with the macroeconomic constraints; 2. effective means for achieving a resource allocation that reflects expenditure policy priorities; 3. efficient delivery of public services (productive efficiency); and 4Read MoreCritical Analysis of the Fiscal Responsibility Act of Nigeria 2007: an Overview3786 Words   |  16 Pages2007: AN OVERVIEW BEING ASSIGNMENT SUBMITTED ON PUBLIC FINANCE (BKF 624) (FIRST SEMESTER COURSE WORK) BY ALAJEKWU UDOKA BERNARD 2008 162 001 MSc PROGRAMME DEPARTMENT OF BANKING AND FINANCE FACULTY OF MANAGEMENT SCIENCE SCHOOL OF POSTGRADUATE STUDIES ANAMBRA STATE UNIVERSITY LECTURER: DR. EZEABASILI V. N. OCTOBER, 2009 Page 1 of 19 ABSTRACT Fiscal Responsibility Act 2007 was designed to regulate and supervise the fiscal activities of public office holders in the country. This paper criticallyRead MoreArticle II: Declaration of Principles and State Policies16349 Words   |  66 Pagesalso share aspects of direct democracy such as INITATIVE ANDREFERENDUM (Art VI, Sec. 32) †¢Sovereignty is the power to make legal decisions. †¢All sovereignty resides in the people, and what ever power you have has to be given to you. †¢Sovereignty is defined by Jellinek as the supreme power to affect all legal interests either by executive, legal, or judicial action. Constitutional Authoritarianism = understood and practiced in the Marcos regime under the 1973 Constitution was the presumption of the extraordinaryRead MoreDifference Between Public And Private Sector2817 Words   |  12 PagesAccording to the assignment topic, the research will be an evaluation of the difference between public and private sector in Bangladesh prospective. The primary objective of this article is to point the conceptual overview of the nature and extent of public and private sector are competing to implement in Bangladesh. On this article also highlights the various features, factors and limitations of public and private sector in amplifying. I would like to mention that; this work is prepared based onRead MoreA Guide to Zimbabwe Goverment Revenue11248 Words   |  45 Pagesenforcement efficiency 28 4.10 Corruption 28 5.1 Oversight institutions 31 Chapter 5: The social and economic implications of the various ways of raising government revenue 32 5.2 Taxation and Development 33 5.3 Impact of taxation on economic and social development 33 5.4 Role of taxes in economic development 33 Chapter 6: Recommendations on other possible sources of revenue for Government. 35 6.1 Parliament can improve the management of mineral resources. 35 6.2 Other ways of raising

Monday, December 9, 2019

Biometrics for Authentication Past - Present and Future

Question: Discuss about theBiometrics for Authenticationfor Past, Present and Future. Answer: Forum Summary The research explores biometric authentication techniques, past, present and the future of biometric security. In 14th Century, Chinese merchants used to take fingerprints of children for identification. By 1890, Bertillonage method was used which involved exploration of body mechanics for identification of criminals(Bhattacharyya, Ranjan, A, Choi, 2009). In 1960s and 1970s, the technology went beyond fingerprinting and signature biometric authentication procedures were utilized for military. Today, biometric solutions are growing and biometric laws, regulations and industry standards are being developed. In the modern scenario, biometric devices measure physiological characteristics like fingerprints, faces, hand geometry, and iris and behavioural characteristics like signatures, keystrokes and voice. A new trend has also been observed in the field is cognitive biometrics which involves integration of databases with human perception. Various biometric techniques that are used in present were explored in the paper and these included fingerprinting, face recognition, IRIS technology, hand geometry, retina geometry, speaker recognition, signature verification, and other techniques like palmprint, hand vein, DNA, thermal imaging, ear shape, body odour, keystroke dynamics, and fingernail bed(Wayma, Jain, Maltoni, Maio, 2000). Applications of biometric solutions were identified in the research and these included network access, data protection, transaction security, web security, ecommerce, egovernment, electronic banking, financial transaction, retail sales, social services, health, law enforcement, POS, digital rights management and so on(Ahmad, Ali, Azizun, Adnan, 2012). Further, the paper highlighted the importance of understand the levels of security that is provided by biometric solutions and certain factors that could be used for evaluation of biometric solutions were discussed such as False Accept Rate (FAR), False Reject Rate (FRR), Relative Opening Characteristics (ROC), Equal Error Rate (ERR), Failure to Enrol Rate (FER), Failure to Capture Rate (FCR) and Template Capacity. Based on these evaluating measures, various biometric technologies were evaluated. The research discovered biometric as a strong security solution that worked well but there was still a need realized on improvement of security of biometric solutions(Jain, Nandakumar, Nagar, 2008). Uncovered Issues The paper covered various biometric technologies that exist today but did not explore the future trends and potential applications of biometric solutions such as use of biometric authentication for documents, access and attendance control, travel control, financial applications, remote voice authorization, automatic working devices, and action control(Adkins, 2007). Moreover, the paper did not cover the technologies that could be used in the field of biometric security such as optical technologies, acoustic technologies, microwaves, capacitive sensors, pressure sensors, particle rays, magnetic fields, electric fields, and chemical emissions that are likely to be used in near future for biometric authentication. The research could have explored newer trends that are likely to be seen in the field of biometric authentication such as acoustic holography, multimodal biometric, biometric devices, THz electromagnetic waves technique and so on(Bicz, 2006). Another area of biometric authentication was missing in the research which is understanding performance of the solutions in terms of various parameters like accuracy, cost, integrity, privacy, ease of use and deployment(Pankanti, Bolle, Jain, 2000). The research did not cover the verification mechanisms that could be used in biometric devices including identification, authentication, and verification. A verification system could have been covered for explaining how biometric systems work including information about getting identity, recording or checking records, extracting feature vector, authorizing user, configuring interface, comparing biometric records with live records, and clearing memory for security. The research could have also explored various functions and components of a biometric system such as capture device, policy manager, storage, portal, auditing, and transmission(COmmon Criteria, Federal Ministry of the Interior ). The research could also cover details of how biometric authentication helped securing systems in the cases of specific threats like bruteforce, asset modification attack, code reproduction, residual and so on. The security policies that are required to be used by organizations to ensure maximum level of security is obtained using biometric authentication could also have been covered in the research. Impact An understanding of various information related to biometric solutions such as how biometric solutions work, how they help in preventing attacks, how they can be evaluated, verification mechanism they can use and so on would be useful as biometric solutions are being increasingly used today and in the near future, the applications areas are likely to only grow taking more parts of lives of humans. In such cases, the security of biometric solutions has to be explored on priority such that biometric authentication does not fail or get exposed to attacks causing harm to a huge number of people using biometrics. Lessons Learnt Certain lessons were learnt from this exploration of literature on biometric authentication including: Biometric solutions are used by organizations for securing their networks and systems and in near future, the applications are likely to grow fast. Although biometric devices are used for security but there still are threats that can actually affect the biometric security systems and thus, it is important to understand the level at which biometric solutions are capable of providing security. Conclusion The report explored the area of biometric authentication by considering and assessing a research report on past, present and future of biometric authentication solutions. It was found that the selected research only covered the basics of biometric security including methods used for authentication, application of biometrics and evaluation parameters. The literature covered largely lacked in exploring various other areas like verification process, security against specific types of attacks, performance parameters, future technologies, and so on. References Adkins, L. D. (2007). Biometrics: Weighing Convenience and National Security against Your Privacy. Michigan Telecommunications and Technology Law Review, 541-555. Ahmad, S. M., Ali, B. M., Azizun, W., Adnan, W. (2012). Technical Issues And Challenges Of Biometric Applications As Access Control Tools Of Information Security. International Journal of Innovative, 79837999. Bhattacharyya, D., Ranjan, R., A, F. A., Choi, M. (2009). Biometric Authentication: A Review . International Journal of u- and e- Service, Science and Technology, 13-28. Bicz, W. (2006). Future of biometrics . OPTEL. COmmon Criteria. (Federal Ministry of the Interior ). Common Criteria Protection Profile Biometric Verification Mechanisms . Bundesamt fr Sicherheit in der Informationstechnik , 2-64. Jain, A. K., Nandakumar, K., Nagar, A. (2008). Biometric Template Security. EURASIP Journal on Advances in Signal Processing, 1-17. Pankanti, S., Bolle, R. M., Jain, A. (2000). Biometrics: The Future of Identification. CSE. Wayma, J., Jain, A., Maltoni, D., Maio, D. (2000). An Introduction to Biometric Authentication Systems. Springer.

Monday, December 2, 2019

Two Ways to Belong in America free essay sample

The importance of this Essay is that even though one sister fell into the â€Å"America Dream† she never lost who she was. She never lost her Indian background. Two sisters went to America, so that they can get a great education and also a great job. Even though they had the same idea coming to America, they both went different ways. These two sisters, they are exactly the same. They have some differences but then it starts happening when they get married. Mira gets married to an Indian man and Bharati gets married to an American man. Mira worked hard to make a living so that when she is ready to retire she has enough to move back to India. Bharati traveled around North America with her husband being an American citizen. Mira wasn’t a citizen and her boss wanted a labor certification, but she couldn’t provide it so she felt like she was being used. We will write a custom essay sample on Two Ways to Belong in America or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Mira paid her taxes, she loves America and she loves India. She believes that they should start the bill for immigrants who come into the country after the bill has been passed. I feel that Mira doesn’t have to be in love with the country but she puts enough dedication to the country that she wants to be a citizen so she doesn’t have to go back to India. In the end Bharati explains that her sister Mira is an example of a bigger issue that many people come to America on visa’s and when it’s over they want to stay because they think it’s a great place.