Free Essay

Global Finance

In:

Submitted By gsjcorlove2027
Words 3346
Pages 14
Global Finance, Inc. is an international organization with expansions in many states. In every state, the company has a number of sites and each site has several workers and customers. Offices are interconnected to each other and to the host organization. As an international organization, Global Finance, Inc. requires a robust network that can support its daily operations, a secure network system and efficient network management strategies. Normally, network choices rely on the company budget, network coverage, and internal and external regulations. Effective network security requires constant upgrades and close monitoring to ensure possible loopholes are sealed in time.
Executive Summery Global Finance, Inc. network is constructed by sets of routers and switches. The network switches and routers are designed with unique typologies including different sizes of meshes. The network adopted packet switching and circuit technologies. Packet switches are effective transfer paths and sharing carriers. The network system allows sharing with clients and other management teams. There are also virtual circuits connected to the main path to serve various needs. Additionally, the network has circuit system, which facilitates data transfer only when needed. Global Finance, Inc. has employed Integrated Services Digital Network (ISDN), which only transfer data when initiated (Acharya, Lasse, Thomas & Matthew, 2011). Apart from Wide Area Network (WAN) and Local Area Network (LAN) connections, Global Finance, Inc. has utilized other forms of connections such as different internet ISPs, private networks and telephone connections. The design has also incorporated Virtual Private Network (VPN) for in public switched networks (PSTN) to enhance information privacy and security. Global Finance, Inc. developed an encrypted network system as a security measure against its data (Dana & Arkin, 2010). The expansion of Global Finance, Inc. has created openings for new threats, risks and vulnerabilities. Some of these network challenges were not envisioned during network structure development. Despite the expansion, Global Finance, Inc. has experienced any incident as per PCI DSS. However as move to maintain network security compliance, this Risk Assessment has been undertaken to limit any future network risk that might have been overlooked during network initiation and over the past risk assessments. During the Global Finance, Inc. Risk Assessment, a number of potential network threats were found. The company has no measures to contain physical harm to computers and security measures to manage tampering from end users are minimal. Global Finance, Inc. has no continuity plans to manage in the organization, in case, the internet’s go out. Financial intuitions are vulnerable to attacks, owing to the nature of business. As a result, mitigation measures should be in place for any form of incompliance. Priority should be put in the most vulnerable places, which could harm the organization in short term. Security breach in Global Finance, Inc. might result into losses and loss of customers’ confidence. The diagram below illustrates the major risk domains in Global Finance, Inc. (Dana & Arkin, 2010).

Fig 1. Global Finance, Inc. Network Risk Domains While several organization network system can pose risk to the organization, during this risk assessment priority was put on:
1. Un-Patched Servers.
These are servers used in the organization network. Un-Patched Servers exposed to internal servers and internet without direct connection are vulnerable points. Many companies, including Microsoft have not succeeded in managing their patches, despite their diligence in patch maintenances. Usually, patches leads to internet disruption by warms such as Code Red. The most vulnerable points are the internal servers, which do not directly connect to the internet (Acharya, Lasse, Thomas & Matthew, 2011).
2. Un-patched Client Software Internet client applications such as Internet Explorer, Outlook and Outlook Express have many security vulnerabilities. The weaknesses can be easily exploited by Viral code or Worms. Usually, they slip through anti-virus and add their signature to anti-virus software making them difficult to identify. The solution to the problems is to update all browsing and emails with available security patch. Today, emails are widely used in work places, while at the same time they offer the greatest security threats. However, Microsoft Office XP and Microsoft Outlook offers automatic blockage to potential email threats.
3. Insecure File Sharing Daily routines in Global Finance, Inc. include sending files, printing and making file copies with an office. Usually, this happens between or among office computers. This is essential part organization administration; however, maximum security must be taken in managing risks associated with file sharing. Warms and virus spread easily among computers within LAN. At times, data managers even spread the risks through portable devices such as hard disks and compact disks. To manage possible file transfer risks, program folders, root folders and operating system folders should not be shared (Acharya, Lasse, Thomas & Matthew, 2011).
4. Insecure Passwords
Passwords are common risks in organization networks. Passwords need to be guarded with a lot of secret and hard to guess. Passwords should be given only to specific individuals and at set times. It is important to determine password sharing and usage during network risk evaluations (Dana & Arkin, 2010).
5. Dial-up Connections
Corporate computers can be configured to use dial up connections, which bypasses security implement on the corporate network. Usually, such activities exposes corporate network to email borne Trojans, viruses and warms. Servers should be parched to limit the use of dialup connections in corporate network.
6. Corporate owned laptops Corporate portable laptops are big security threats. They are exposed to several networks including client networks and dial up connections. The disk space of laptops, memory and speed makes them hard to keep up to date with patches. In some corporations, employees are allowed to use their own laptops, which offer similar security challenges to corporate laptops. The portability nature of laptops also increases data insecurity when they are stolen.
Network Risk Assessment Tool Network Security Designs should be geared towards meeting organization goals and objectives. While planning financial organization network, the following should be taken into consideration:
• Managers should focus on value return and not investment return. The harm security breach can cause to an organization should be the key consideration rather than the profit on the network investment.
• Assumptions should not be made on possible sources of network vulnerabilities. Network threats and risk emanates from both within the organization and external sources.
• Security threats should never be tackled in piecemeal. A unified strategy, which protect the entire network should be put in place when handling security challenges.
• Network security issues should be rolled out as a collaborative approach. All network users should be trained and advise accordingly on security matters.
• A balance of network security and usability should be put in place. Normally, more secure networks are very complex to use. The following table indicates the risk assessment tool that was used to determine Global Finance, Inc. network vulnerabilities, threats and risks. The major areas of concern included acceptance use policy, communication activities, antivirus use, identity policy, information encryptions, password policy and remote access policy.
Table 1. Organization Network Checklist
Global Finance, Inc. Network Security Inventory
Security Technologies
1. Does Global Finance, Inc. has Yes No (1) Up to date Firewall System (2) Secure Private Network (VPN) (3) Intrusion Prevention Mechanisms (4) Network Content Security (5) Identity control and management (6) Secure networks system (7) Compliance validation procedures
Organization’s Digital Assets and their Users
2. Are all organization digital systems (intellectual property and client information) in place
3. Are the digital system locations documented
4. Are the access to digital systems controlled
5. Do third parties have access to the digital systems
6. How are there control measures on access to digital systems
The Impact of Security Breach to the Organization
7. Is there potential financial risk in cases of network outage
8. Could security breach disrupt organization’s operations
9. Is there a significant financial risks when network is down
10. Are there e-commerce features in the organization
11. Is the organization network fluctuating
12. Is the organization network damages insured
Organization Current and Future Network Needs
16. Are there further organization expansion strategies in place
17. Are the network equipment regularly updated
18. Are the organization software and antiviruses regularly updated
19. Are employees undergo network security trainings
20. Is there significant effect on organization growth to its digital platform
21. Are end user network policies communicated to third parties
Physical Security System
22. Are offices locked properly during none office hours?
23. Are all maintenance officials have identification details?
24. Are computers securely placed in the offices
25. Are methods taken to control entry and movement of people in the offices
26. Are the computers served by uninterruptable power supply to avoid unsaved data loses
27. Are there measures in place against vandalism and any other form of attacks

Analysis of Global Finance, Inc. value chain was also important in determining the type of risks organizations are exposed to. Values chains were used to illustrate the organization activities, which can expose its network to vulnerabilities. Through value chain analysis, we were able to understand how various activities and stakeholders interact with the organization network. Examination of organization value chain was also important in determining critical network paths, which required utmost security procedures from those that posed limited threats. Among the activities that was identified include Global Finance, Inc. online and offline inbound and outbound logistics, operations, marketing, services and sales. These activities expose the financial institution to interaction with different stakeholders, which exposes its network to external vulnerabilities. Value chains enumerated network components of the value activities. Based on the assessment, each of Global Finance, Inc. value chain presented both physical and online processing components. While the physical components are concerned with physical handling of products, information components functions on information delivery and data management. Financial institutions have very comprehensive information components that their health is vital for organization performance. Global Finance, Inc. have in place many computer aided programs such as automatic teller machines, money withdrawals, deposit alerts, and automatic money transfers services. As a result, secure network system is vital for Global Finance, Inc. survival. The company has employed its information system in multimedia marketing and sales, the value chain include telecommunications, scheduling service force, answering clients on social sites and desktop publishing. The information was vital in determining possible sources of network vulnerabilities for enhancing their remedies. The assessment also linked organization value chain and that of supplies such as entry systems on inbound and outbound logistics, and communication within and outside organization with systems such as electronic data interchange. The linkages provide information on how organization assets are linked to the network system and dollar value of investing in network technology can computed. Delphi technique was employed to determine the asset list and characteristic of network assets.
Table 1. Organization Risk Compliance Table

Risk - Threat - Vulnerability Primary Domain Impacted Risk Impact/Factor Recommendations
Service Provider SLA is not achieved LAN-to-WAN 1 Alternative service provider should be sought and non-functional networks terminated.
Unauthorized public internet access LAN-to-WAN 1 PCI compliance should be maintained by Creating DMZ to protect data.
Hacker bypasses security system and gain access to organization data System/Applications 1 Create DMZ to keep hackers out.
Primary data is destroyed by fire LAN 1 Offsite back up station should be constructed
Mobile employees should have security measures in place while accessing organization information Remote Access 1 Use encryption software to tunnel the system.
Users uses personal storage devices on organization computers User 1 Rules and regulations should be put in place to control the use of personal devices in organization computers.
VPN tunneling between remote computer and egress/ingress router is needed Remote Access 1 Set up system
Need to prevent eavesdropping on WLAN due to customer privacy data access WAN 1 Create DMZ and encryption software
DoS/DDoS attack from the WAN/Internet WAN 1 Create DMZ for data protection. Ensure the use of up to date software to prevent such attacks
User destroys data in application and deletes all files User 2 Create back up of all data after use and limit user access to deletion permissions.
Unauthorized access to organization owned workstations User 2 Authorization protocols should be made stricter.
Loss of essential production data System/Applications 2 Create multiple reflection system and ensure data is continuously backed up to prevent loss
Service denial attacks on DMZ and e-mail server LAN-to-WAN 2 Allow access to DMZ using only specific sources
Remote communications from any given organization home office Remote Access 2 Use encryption software
User downloads and popups on unknown e-mail attachment User 2 Policies should be in place, which restrict opening of unknown emails. An up to date virus protection software should be used to scan the system for potential risks
Weak ingress/egress traffic filtering hampers performance LAN-toWAN 2 New filtering methods should be put in place to replace the none functional ones
WLAN access points are required for LAN connections within warehouse LAN-to-WAN 2 Secure point should be established inside warehouse for LAN connection to WAN
Intra-office employee communications such as romantic affairs User 3 Fraternization policy should be established and employees involved should be separated when working.
Workstation Operation Software has a known software vulnerability LAN-to-WAN 3 All patches should be updates to date as per the growing concerns.
LAN server OS has a known software vulnerability LAN 3 All patches should be updates to date as per the growing concerns
Workstation browser experiencing software vulnerability Workstation 3 All patches should be updates to date and anti-virus software should be installed.
Service provider is experiencing a major network outage WAN 3 The provider should be replaced with new person.

Legend: 1= Critical – these are threats, risks, or vulnerability affect network compliance and affect organization network system 2= Major - these are threats, risks, or vulnerability affecting confidentiality, integrity, or intellectual property rights 3= Minor - these are threats, risks, or vulnerability, which impacts on users or employees productivity to the organization.
Risk Assessment Plan The risk assessment method employed in this project enabled risk auditors to identify, score and rank risks in Global Finance, Inc. high priority risks were included in the project schedule and marked appropriately for risk managers to take the most appropriate steps in coming up with risk implementation strategies (Lelyveld & Liedorp, 2006). It was recommended that risk managers to provide monthly status update on the assigned areas. Based on the reports, the project managers will determine risk improvement strategies, which could be necessary for feature projects. During the risk assessment, short-term mitigation recommendations were put in place to manage risks, which could have high impacts on the organization within a short time. These include back up procedures and incidental responses.

Table 2. Network Server Disaster Back-up Procedures.
Step 1 Use the backup recovery tool for Windows Servers. Open the current backup recovery for the operating server and reset the system to restore.
Step 2 After restore process, restart the main server managers should restart the main server for old pre-fetching data to be released. The backup system is important at this level since the systems require very negligible downtime.
Step 3 Bring the main server back up and determine whether the backup process is complete. Install necessary updates, anti-virus, other vital software and operating system definitions.
Step 4 Switch control of the main server and stop the backup server from storing addresses and other network information.
Step 5 Back up current data should be backed up on the main server to facilitate recovery processes if the need arises in futures.

Table 3. Computer Incident Response Procedures These are routine procedures to maintain computers health and to avoid adverse information loss and damages due to attack on computers (Lelyveld & Liedorp, 2006). Prevention
Preparation Install and update firewall on the server with updated ACLs that monitors incoming and outgoing traffics. ACLs should be set up on the router to limit traffic flow. Blacklist and Whitelist websites and host email and addresses that contain virus and other harmful materials. Ports, which are not used, should be closed to manage harmful leaks.
Identification Firewall should be set to a level sensitive enough to detect unnecessary materials; additionally, sub-root directives, which notifies, when potential threats occur should be put in place.
Containment Sniffing software and anti-viruses should be used to eliminate threats in DMZ and Sandbox utilized to prevent any further damage.
Recovery Incremental backups should be restored after scanning and debugging to ensure that no vital information is lost during the process. All ports should be checked to ensure they are all sealed and safe from any possible leak.

The diagram below illustrates a secured Network system with IDS censors for Global Finance, Inc.
Fig 2. Global Finance, Inc. with IDS censors There are sensors to monitor public network since these are prime areas for attackers. Another sensor has been placed behind the firewall LAN network and internet. IDS can also be placed around remote servers such as VPN and dial ups.

Conclusion It is hard to come by one hundred percent network security in financial organizations. The root of network insecurities majorly emanates from lack of awareness, concern, attention and commitment from organization management team. As result, purchasing security wares contribute insignificantly on network security management. Usually, new security measures come with regulations, which require organization change management. The best approach is constantly assess the organization security and makes improvement. This Risk Assessment paper has employed multiple qualitative methodologies, which include the use of questionnaires, scenarios and Delphi methods. Single risks assessment methods do not offer flexibility required for the wide variety of financial organizations’ threats, vulnerabilities and assets with easily interpreted data. Based on the risk assessment findings, Global Finance, Inc. needs to constantly update its security software, ensure security parches are effectively sealed and develop secure VPN networks. Network security is important for this company owing to its online transactions and storage systems. Risk assessments also need to be conducted regularly to facilitate effective mitigation measures.

References
Acharya, V., Lasse H., Thomas P., & Matthew R. (2011). Measuring Systemic Risk, Working paper. New York: New York University.
Lelyveld, I., & Liedorp, F. (2006). Interbank contagion in the Dutch banking sector: a sensitivity analysis. International Journal of Central Banking 2, 99–133.
Dana P., & Arkin, W. (2010). "A hidden world, growing beyond control". The Washington
Post. n.p. Accessed March 2014.

APPENDIX A. Network Security Checklist Scores
Global Finance, Inc. Network Security Inventory
Security Technologies
1. Does Global Finance, Inc. has Yes No (1) Up to date Firewall System  (2) Secure Private Network (VPN)  (3) Intrusion Prevention Mechanisms  (4) Network Content Security  (5) Identity control and management  (6) Secure networks system  (7) Compliance validation procedures 
Organization’s Digital Assets and their Users
2. Are all organization digital systems (intellectual property and client information) in place 
3. Are the digital system locations documented 
4. Are the access to digital systems controlled 
5. Do third parties have access to the digital systems 
6. Are there control measures on access to digital systems 
The Impact of Security Breach to the Organization
7. Is there potential financial risk in cases of network outage 
8. Could security breach disrupt organization’s operations 
9. Is there a significant financial risks when network is down 
10. Are there e-commerce features in the organization 
11. Is the organization network fluctuating 
12. Is the organization network damages insured 
Organization Current and Future Network Needs
16. Are there further organization expansion strategies in place 
17. Are the network equipment regularly updated 
18. Are the organization software and antiviruses regularly updated 
19. Are employees undergo network security trainings 
20. Is there significant effect on organization growth to its digital platform 
21. Are end user network policies communicated to third parties 
Physical Security System
22. Are offices locked properly during none office hours? 
23. Are all maintenance officials have identification details? 
24. Are computers securely placed in the office desks 
25. Are methods taken to control entry and movement of people in the offices 
26. Are the computers served by uninterruptable power supply to avoid unsaved data loses 

Similar Documents

Premium Essay

Global Finance

...otherwise would not be possible due to a lack of funding. The absence of banks would therefore limit the economic development and growth by preventing individuals from purchasing e.g. houses, cars and other consumer goods, and limiting the businesses’ access to start-up capital or financing of business development activities. Alternatively, a lack of reliable banks could lead individuals to agree to unfavorable loan conditions with extremely high interest rates from for instance loan sharks, possibly leaving them worse off than before and unable to pay the loan back. 2. Historically, how has political instability impacted bond markets? Historically, political instability has caused governments to sell bonds to citizens in order to finance e.g. wars. As the return you get on a bond is highly related to the riskiness of the investment, the price of bonds would typically go down during periods of political instability, due to the decreased credibility of the government and the unwillingness among citizens to invest in bonds, causing the returns to be higher. Furthermore, political instability has previously pressured the governments to increase the supply of printed money, which made the inflation spike. As bonds normally have a fixed interest rate, the bondholders are not compensated for the loss of value caused by high inflation, why inflation causes bond prices to fall. 3. What factors typically contribute to the formation of bubbles? Prior to the formation of a bubble...

Words: 582 - Pages: 3

Premium Essay

Global Finance Environment

...Cash Management FIN/486 Cash Management Cash Management is a vital tool for the success of any company. In today’s worlds it is important that companies pay close attention to the cash they are spending and receiving. Effective cash management can offer businesses stability, and it could make them more competitive. Big companies use these techniques and have demonstrated that they can be successful. One company that good with cash management techniques is Wal-Mart. Wal-Mart is one of the biggest retail companies in the world with more than 8,500 stores in 15 countries and sales of $258billion in 2009. In the following paragraphs the different cash management techniques of Wal-Mart will be analyzed and explained. Also with support of examples the effectiveness of the different techniques will be examine, which will help determine ways to improve the company. Techniques The significance of cash management consists of taking the essential procedures to keep up sufficient levels of cash to congregate operational and capital requirements and to gain the greatest yield on short-term investments of pooled, inactive cash. The most important goal of a superior cash management method is to maintain sufficient money to meet the daily cash necessities of the company at the same time as increasing the amount accessible for investment. Also it is helpful to receive the greatest earnings on invested funds while make sure their safety. One cash management technique that Wal-Mart...

Words: 760 - Pages: 4

Free Essay

Desai Finance Function in a Global

...ORGANIZATION & CULTURE FINANCE & ACCOUNTING MARKETING MANAGING TECHNOLOGY MARKETING STRATEGY & COMPETITION HUMAN RESOURCES MARKETING ORGANIZATION & CULTURE MANAGING TECHNOLOGY FINANCE & ACCOUNTING ORGANIZATION & CULTURE MARKETING STRATEGY & COMPETITION HUMAN RESOURCES MANAGING TECHNOLOGY FINANCE & ACCOUNTING ORGANIZATION & CULTURE MARKETING STRATEGY & COMPETITION HUMAN RESOURCES MANAGING TECHNOLOGY MARKETING STRATEGY & Honing Your HUMAN RESOURCES ORGANIZATION & CULTURE FINANCE & ACCOUNTING HUMAN RESOURCES COMPETITIONCompetitive Edge Finance Function in a Global Corporation The H 108 Harvard Business Review | by Mihir A. Desai HISTORICALLY, the finance functions in large U.S. and European firms have focused on cost control, operating budgets, and internal auditing. But as corporations go global, a world of finance opens up within them, presenting new opportunities and challenges for CFOs. Rather than simply make aggregate capital-structure and dividend decisions, for example, they also have to wrestle with the capital structure and profit repatriation policies of their companies’ subsidiaries. Capital budgeting decisions and valuation must reflect not only divisional differences but also the complications introduced by currency, tax, and country risks. Incentive systems need to measure and reward managers operating in various economic and financial settings. The existence of what amounts to internal markets for capital gives global corporations a powerful mechanism...

Words: 2206 - Pages: 9

Premium Essay

Finance Function in a Global Corporation

...by the Global CEO is giving companies a powerful mechanism for arbitrage across national financial markets as capital markets open up within them. CFO has to balance the traditional question with new questions which arises due to the globalization. By exploiting their internal capital markets, CFO can create value in 3 functions: 1. Financing the internal capital market. 2. Managing Risk Globally, 3. Global Capital Budgeting. 1. Financing the internal capital market – A CFO can significantly reduce a groups overall tax bill by borrowing disproportionately in countries with high tax rates and lending the excess cash to operations in countries with lower rates. But the global CFO needs to be aware of downside of getting strategic about financing in these ways. Saddling the mangers of subsidiaries with debt can cloud their profit performance. 2. Managing Risk Globally – The existence of an internal capital market also broadens a firms Risk management options. Instead of managing all currency exposures through the financial market, global firm can offset natural currency exposures through their worldwide operations. Given this potential for minimizing risk, it might seem perverse that many multinationals let local subsidiaries and regions manage their risks separately. Doing so, however, can obscure the performance of local units, making it harder for headquarters to assess local managers and easier for financial managers to take purely speculative positions. 3. Global Capital...

Words: 291 - Pages: 2

Premium Essay

Global Finance Environment Paper

...Global Finance Environment Paper FIN/403 May 4, 2008 Globalization refers to the merging of national markets into one huge global marketplace. In today’s market, selling internationally is much easier due to falling barriers in cross-border trade. Now businesses don’t have to be industry giants to operate and succeed in global markets. Although it can be beneficial to offer a standard product that can be used worldwide, significant differences still exist between national markets such as cultural differences, consumer taste differences, product preferences and legal regulations. It is important to define and understand these differences when merging into national markets. Globalization is inevitable and it’s happening at an astonishing speed in nearly every market possible. The technology era that we are in has enabled businesses to join forces like never before and we are seeing significant changes in the global marketplace. There are main drivers in globalization and this paper will define three of them, as well as describe the risks associated with financial investing, and explain the importance of cultural sensitivity and ethics in global finance. Drivers of Globalization Market drivers Domestic markets are saturated and growth opportunities are often times limited. Expanding globally opens up many new opportunities allowing for real growth within a business. The following lists in detail the specific market drivers that play a key role...

Words: 1180 - Pages: 5

Premium Essay

Islamic Finance: a Therapy for Healing the Global Financial Crisis

...Islamic Finance: A Therapy for Healing the Global Financial Crisis Miranti Kartika Dewi 1 *Researcher of Centre for Islamic Economics and Business ** Lecturer of Department of Accounting Faculty of Economics, University of Indonesia Ilham Reza Ferdian * Student of Master of Science on Finance Programme Kuliyyah of Economics and Management Sciences International Islamic University Malaysia ** Fellow of PT. Bank Muamalat Indonesia ABSTRACT Global financial crisis which hit many too-big-too-fail countries and financial institution in the world was mainly made happen by debt securitization. Derivative instruments resulted from this process obviously were not backed by real asset. When any party came up with investment on these instruments, the investment would never support the development of real sector economy, instead, it just worsen the situation by creating bubble economic. This condition becomes more harmful when the securitized debts default. This practice is strictly forbidden according to Islamic finance principles. It has inherent risk management tools to prevent the crisis. This paper attempts to examine the root of the financial crisis and find the solution from Islamic finance principles. Keywords: Financial crisis, Derivative, MBS, CDO, CDS, Islamic finance                                                              1  Corresponding author can be contacted by email: miranti_k_dewi@yahoo.com. “The credit and capital markets have grown too rapidly...

Words: 2256 - Pages: 10

Free Essay

Global Health Issues in Behavioral Finance

...Title Page Introduction a. Global Health Issues b. Economic Impact Behavioral Finance a. Emotional Biases i. Risk Aversion ii. Regret Aversion Market Implications a. Every market in today’s economy was impacted either directly or indirectly by the SARS epidemic. i. Most saw measurable decreases in GDP b. Global cost of lost economic activity due to SARS was approximately $54 billion Conclusion a. Economic damage caused by SARS can be attributed to the behavioral finance emotional biases of loss aversion and regret aversion affecting investors globally. Global Health Issues, Behavioral Finance and the Markets: The Role of Behavioral Finance in how Global Health Issues Impact the Economy Jonathan Davis David A Kennedy Lee V Smith Tayler T Young Syed Zain T Zaidi November 10, 2015 University of Houston- Downtown Global Health Issues, Behavioral Finance and the Markets: The Role of Behavioral Finance in how Global Health Issues Impact the Economy With globalization on the rise, infectious diseases that appear in one country have the opportunity to spread rapidly to others. Recent examples include the 2003 outbreak of Severe Acute Respiratory Syndrome (SARS) and the 2014 outbreak of the Ebola virus. According to the World Health Organization (WHO), 8,098 individuals became infected worldwide with SARS and 774 of those individuals ultimately died from the illness (CDC, 2005). While Ebola killed 5,160 out of the 14,098 people...

Words: 1051 - Pages: 5

Premium Essay

Global Finance

...Global Finance EnvironmentThis paper will analyze the drivers and consequences of globalization, describe the risks associated with global investing, and explain the importance of cultural sensitivity and ethics in global finance. However, there first must be an understanding of what globalization entails. Globalization is the expansion of companies and entities into the international market; working, manufacturing, and selling or buying from two or more countries. Companies that sell to other countries or buy from other countries are not a good example, but those that have investment, manufacturing, or other divisions of the company in another country is definitely globalization. Drivers of GlobalizationMany drivers of globalization affect an organization financially. Improvements in communication and transportation such as internet, emails, mobile phones, formation of trading blocs, depletion of trade restrictions and creating of new trade agreements among nations, comparative and competitive advantage being offered by certain nations and markets are all driving globalization and increasing trade among nations. Today, countries are increasingly becoming dependent on each other and companies are making a foray into global markets, either to increase their sales or to achieve comparative advantage in terms of production and thus satisfying the needs and wants of ever increasing demands of customers. These changes are increasing the resource requirements of global corporations...

Words: 1614 - Pages: 7

Premium Essay

Global Finance

...IMF STAFF POSITION NOTE December 22, 2009 SPN/09/29 Global Imbalances: In Midstream? Olivier Blanchard and Gian Maria Milesi-Ferretti I N T E R N A T I O N A L M O N E T A R Y F U N D INTERNATIONAL MONETARY FUND Research Department Global Imbalances: In Midstream? Prepared by Olivier Blanchard and Gian Maria Milesi-Ferretti1 Authorized for Distribution by Olivier Blanchard December 22, 2009 Disclaimer: The views expressed herein are those of the author(s) and should not be attributed to the IMF, its Executive Board, or its management. Before the crisis, there were strong arguments for reducing global imbalances. As a result of the crisis, there have been significant changes in saving and investment patterns across the world and imbalances have narrowed considerably. Does this mean that imbalances are a problem of the past? Hardly. The paper argues that there is an urgent need to implement policy changes to address the remaining domestic and international distortions that are a key cause of imbalances. Failure to do so could result in the world economy being stuck in “midstream,” threatening the sustainability of the recovery. JEL Classification Numbers: E21, E22, F32, F33, F36, F41 Keywords: Current account deficits, saving, investment, portfolio choice. Authors’ E-mail Addresses: oblanchard@imf.org ; gmilesiferretti@imf.org 1 One of the series of “Seoul papers” on current macro and financial issues. We are grateful to Caroline Atkinson...

Words: 9289 - Pages: 38

Premium Essay

Learnings from Article Review – Finance Function in a Global Corporation

...Learnings From Article Review – Finance Function In a Global Corporation Learnings from Article Review – Finance Function in a Global Corporation As companies globalize, they face new financial challenges. Here, the major challenge faced by the Global CEO is giving companies a powerful mechanism for arbitrage across national financial markets as capital markets open up within them. CFO has to balance the traditional question with new questions which arises due to the globalization. By exploiting their internal capital markets, CFO can create value in 3 functions: 1. Financing the internal capital market. 2. Managing Risk Globally, 3. Global Capital Budgeting. 1. Financing the internal capital market – A CFO can significantly reduce a groups overall tax bill by borrowing disproportionately in countries with high tax rates and lending the excess cash to operations in countries with lower rates. But the global CFO needs to be aware of downside of getting strategic about financing in these ways. Saddling the mangers of subsidiaries with debt can cloud their profit performance. 2. Managing Risk Globally – The existence of an internal capital market also broadens a firms Risk management options. Instead of managing all currency exposures through the financial market, global firm can offset natural currency exposures through their worldwide operations. Given this potential for minimizing risk, it might seem perverse that many multinationals let local subsidiaries and regions...

Words: 257 - Pages: 2

Premium Essay

Global Finance

...Global Finance and Exchange Rate Roderick Duncan MGT 448 06/11/2013 Sue Caruthers Global Finance and Exchange Rate Global finance operations are financial processes, such as accounting, financial planning and analysis, investor relations, treasury, and strategic planning. Web Finance states, exchange rate is “Rate at which one currency may be converted into another. The exchange rate is used when simply converting one currency to another (such as for the purposes of travel to another country), or for engaging in speculation or trading in the foreign exchange market” (exchange rate, para.1). The purpose of this paper is to examine the exchange rate mechanism (Euro Currency Markets), explain how this mechanism is used in global financing operations, and to describe its significance in managing risks. The euro’s evolution began in 1946 when England’s Prime Minister Winston Churchill and other European leaders anticipated Europe to simulate the United States. This brought about the making of the 15- nation European Union that formed the euro. A&E (2013), states “On March 25, 1957, France, West Germany, Italy, the Netherlands, Belgium, and Luxembourg sign a treaty in Rome establishing the European Economic Community (EEC), also known as the Common Market. The EEC, which came into operation in January 1958, was a major step in Europe's movement toward economic and political union” (common Market founded, para. 1). The European Monetary Unit (EMU) was formed in...

Words: 781 - Pages: 4

Premium Essay

Learnings from Article Review – Finance Function in a Global Corporation

...Learnings from Article Review – Finance Function in a Global Corporation As companies globalize, they face new financial challenges. Here, the major challenge faced by the Global CEO is giving companies a powerful mechanism for arbitrage across national financial markets as capital markets open up within them. CFO has to balance the traditional question with new questions which arises due to the globalization. By exploiting their internal capital markets, CFO can create value in 3 functions: 1. Financing the internal capital market. 2. Managing Risk Globally, 3. Global Capital Budgeting. 1. Financing the internal capital market – A CFO can significantly reduce a groups overall tax bill by borrowing disproportionately in countries with high tax rates and lending the excess cash to operations in countries with lower rates. But the global CFO needs to be aware of downside of getting strategic about financing in these ways. Saddling the mangers of subsidiaries with debt can cloud their profit performance. 2. Managing Risk Globally – The existence of an internal capital market also broadens a firms Risk management options. Instead of managing all currency exposures through the financial market, global firm can offset natural currency exposures through their worldwide operations. Given this potential for minimizing risk, it might seem perverse that many multinationals let local subsidiaries and regions manage their risks separately. Doing so, however, can obscure the performance...

Words: 395 - Pages: 2

Premium Essay

Global Finance

...Global Value Chain Logistics Case Analysis Patricia West GEN 483 – GLOBAL VALUE CHAIN MANAGEMENT David Fogarty – Faculty June 9, 2008 Global Value Chain Logistics Case Analysis Laura Ashley, founded in 1953 by Bernard and Laura Ashley when they began printing textiles on the kitchen table of their London attic flat, was a specialty retailer, primarily of upscale women’s fashions, fabrics, and home furnishing products. The company was known for products that typified the tradition of English rural life. LA segmented its market in terms of customer lifestyles. As opposed to many of its competitors who targeted specific demographic or age groups, LA offered styles that would be appropriate for a customer from an early age to an older age. In 1990 LA appeared to be growing with 481 retail stores throughout the world a label that was well known. However, despite the continued success the sales went up, profits were flat, and capital employed rose out of control and Andrew Higginson felt all the problems were internal. The fundamental weaknesses in the LA supply chain were overdependence on in-house manufacturing, significant currency exposure, working capital intensity, excessive short-term dept, and rapid cash outflow. Information technology investments lagged growth and, where systems did exist, they were totally inadequate. In 1990 the LA company made changes to the supply chain using a worldwide network of third party product sources, limiting company-owned...

Words: 809 - Pages: 4

Premium Essay

Global Finance Note

...Chapter 1 Current Mutinational Challenges and the Global Economy The Global Financial Marketplace Assets(government debt securities), institutions(central banks, commercial/investment bank), linkages(interbanks) Eurocurrency markets serve two valuable purposes:Eurocurrency deposits are an efficient and convenient money market device for holding excess corporate liquidity, The Eurocurrency market is a major source of short-term bank loans to finance corporate working capital needs (including export and import financing) What Is Different About International Financial Management Market Imperfections: A Rationale for the Existence of the Multinational Firm MNE motives: Market seekers, Raw material seekers, Production efficiency seekers, Knowledge seekers, Political safety seekers Globalization process -Stage I: early domestic phase growing into the international trade phase, Stage II: A successful firm will continue to grow from simple international trade to the multinational phase characterized by production and investment both at home and abroad Twin agency: Chapter 2 Corporate Ownership, Goals, and Governance Who Owns the Business The Goal of Management two models: 1.shareholder wealth maximization(max return&min risk): market efficient&risk exsit, unsystematic risk can be diversified, systematic risk can be eliminated. Replace, take-over, vote/share 2.stakeholder capitalism model(labor...

Words: 1984 - Pages: 8

Premium Essay

Global Finance and Investments

...Global Financial Markets and Investments FM702 Individual Assignment Learning Outcomes This assignment aims at ensuring that the following learning outcomes are achieved: * Understand the various global financial markets available to business operations; * Appreciate the nature of financial instruments; * Understand the fundamental concepts of financial markets; * Know about the institutional framework in which securities are traded; * Explain and evaluate the conditions of the capital market; * Locate and extract data from a variety of sources and evaluate the reliability and credibility of both sources and data; * Analyze complex, incomplete or contradictory information and communicate the outcome effectively; * Examine problems and issues from a number of perspectives, challenge viewpoints, ideas and concepts, and make well reasoned judgments. * Extract, process and present data for a given purpose, using both qualitative and quantitative analysis; * Use word processing and spreadsheet packages; locate and extract information from the internet; * Act independently in setting personal objectives and in planning and undertaking tasks using effective time management; manage and reflect on own learning and performance; seek and make use of feedback. Policy notes 1. All work must adhere to the University regulations on ‘Cheating, Collusion and Plagiarism’ which are provided as an Appendix in...

Words: 636 - Pages: 3