Write a short report on your findings from the set task.
The two video records provided different accounts of the observed event. The second video consists of added information not present in the first video, which appears exaggerated. Drawing my explanation from Hugo Munsterberg, a researcher, EWT often gives different accounts of an event since the testimony is often affected by emotions, such as excitement, anger or sadness. According to the task, the second testimony is exaggerated due to false memories where the witness ends up recalling the event. The second record findings may have been distorted due to poor questioning skills or the observers forgetting the scene, hence recalling.
Briefly describe what you did.
I took a video of people explaining an observation for five seconds. After an hour, I took another video of them explaining the same observation. I made a comparison between the two videos to check the validity of the information provided.
How many people did you test?
I tested three people present in the event at the same time.
What did your results show?
The results provided different accounts of the event from the three individuals. The first video was brief and concise compared to the second video, where all the three individuals provided almost similar information. The second video was different in all the three individuals, where each provided different accounts of the event. The explanation given by the first person was different from the second and third. Each information was exaggerated and consisted of added information not present in the first video.
Does this confirm or disagree with research on eye witness testimonies?
The findings confirm to the research on eye witness testimonies that how crime is perceived depends on the witness’s ability to define crime and testify. The main challenge with Eye witness testimony is the observer’s ability to give a valid and exact account of the event. The test provides a different account because the observer’s memory is influenced socially by either life experiences or culture. Most of the time, the eye witness testimony is considered biased. To provide accurate testimonies, eyewitnesses are trained, and police officers are trained on how to question suspects.

Posted in Blog

Elliptic curve cryptosystems are used in most companies, especially companies using the internet of daily operations. ECC is used in smart home IoT, especially in creating wireless communication, connecting different machines and connecting individuals. Both private and public companies have embraced ECC in computation and global communication through the public and private ket cryptosystem. ECC is used by companies that require critical security, such as financial institutions, health care systems and forensic organizations. Payment methods have advanced to cloud payment where today, people use smart cards and mobile phones to make payments. Digital signatures are used to offer high-security and provide strength in terms of bits. Smart cards are used in almost everything hence require a critical security system and a technology that can solve complex mathematical problems. The systems used include the discrete logarithm systems, Integer factorization and elliptic curve cryptosystems. Electronic payment uses the key exchange protocol, which detects an intrusion from malicious customers. Additionally, other protocols, such as SSL/TSL, are used to detect security vulnerabilities, such as malware detection fraud detection and data breach. Nevertheless, electronic payment used RSA n securing communication between clients and bank officials.
Healthcare industries now use EEC to secure medical information systems. Hospitals consist of very sensitive data, such as patients’ treatment and diagnosis information. ECC is used to offer top security; for example, the use of RFID technology. RFID card enhances secured communication between different healthcare systems, secure patient’s data and securing the companies network system. RFID is cost-effective, especially in computation services; also, ECC enhances authentication around RFID, servers and card readers. Elliptic curve cryptosystem offers cost-friendly services and top security protocols.
ECC is used in detecting anti-forensic attacks, especially terrorist attacks. The federal national security uses ECC in carrying out intelligence investigations. The technology secured the countries’ top secret through the private keys and communicated with the public or within the system through the public key. However, ECC protects evidence from damage using the B-tree Huffman encoding algorithm(BHE), used to store data in packet form. Additionally, the modified elliptic curve cryptosystem is used to transmit the stored data to receivers. Training has been made easier and faster through the learning modified neural network(DLMNN), which sends and receives messages in data packets. The sent messages are assessed by ECC protocols to identify security threats.

Posted in Blog

ASSESSMENT BRIEF
Subject Code and Name LAW6000 Business and Corporate Law
Assessment Assessment 2: Case Study
Individual/Group Individual
Length 2 000 Words
Learning Outcomes b) Critically analyse and interpret the essential elements required to create, manage and discharge a contract and assess the remedies available for breach of a contract.
c) Examine legal principles related to creation and operation of various forms of business organisations and critically evaluate their effectiveness across a range of business scenarios.
d) Explain the processes for incorporating, managing and winding up of a company, including key director duties, the importance of the Corporations Act 2001 and the role of regulatory bodies.
e) Evaluate the role of agency in contract formation for different business vehicles and identify the associated risks such as vicarious liability for negligent acts.
f) Employ legal skills (statute law and case law), critical reasoning and make informed judgements as to likely legal outcomes of a range of business scenarios.
Submission By 11:55pm AEST/AEDT Sunday of Module 5.2/ Week 10
Weighting 30%
Total Marks 100 marks
Context:
This assessment allows students to solve practical legal problems from real life client s scenario and provide advice to a client on the likely outcome.
Instructions:
There are five case studies you are required to critically analyse.
With respect to each case study:
9 Identify the legal issue(s) arising from the facts of the case study
9 Identify the appropriate legal rules that requires discussion in the case study
9 Apply the law to the facts of the case study
9 Reach a conclusion/ give practical advice to your client.
Your analysis should refer to appropriate cases and statutes and be referenced using the APA referencing system.
You will be assessed in accordance with the Assessment Rubric.
Submission Instructions:
9 Submission is through Turnitin by 11.55 AEST Sunday of Week 10
Question 1
Jeff owns a business which makes and sells a well-kno n b and of each b and he B ine Jeff hold a b ine name and a adema k fo a logo a ocia ed i h he B ine b and of each brandy. The Business sources fruit from local producers. The Business is operated on land which is also owned by Jeff.
Jeff decides it is time to sell the Business and is introduced to Tina who is interested in buying the Business. Jeff and Tina enter into negotiations and agree on a deal. Both Jeff and Tina sign the following document which Jeff prepared.
Heads of Agreement between Jeff and Tina
1. Jeff ag ee o ell and Tina ag ee o b Jeff peach b and b ine and he land i i on
2. Purchase Price: $2.5 million.
3. All existing supplier agreements to be transferred to Tina.
4. All fixtures and fittings, as inspected and agreed, are included in sale.
5. All employees to be transferred as per solicitor prepared agreement.
6. Parties to negotiate transfer of trademark and business name at a future date for a separately determined amount.
7. This agreement is subject to the preparation of a formal contract of sale based on these terms acceptable to the duly appointed solicitors for Jeff and Tina.
Jeff arranges for his solicitor to prepare a formal contract for sale and then sends the completed contract to Tina. When Tina receives the contract, she calls Jeff and says:
“Jeff, I have changed my mind. I don’t want to buy your business anymore”.
Jeff replies:
“ You have got to be joking Tina, it is way too late to change your mind, you have already signed the Heads of Agreement. You are legally bound to buy the business. Make this easy and buy it as we agreed for I will have to sue.”
Required:
Part A ( 15 Marks)
Yo a e Tina olici o U ing he IRAC legal oblem ol ing oce gi e o concl ion on he he
Tina is legally bound to buy the Business as a result of signing the Heads of Agreement.
Part B ( 5 Marks)
What would be your conclusion if Tina had included in the Heads of Agreement a term stating:
This agreement is subject to Tina obtaining suitable finance
Question 2
Sa alo Sho ing Cen e L d SSC ecen l o ened a ne o e in o ci SSC i a membe hi warehouse club: – this means customers must become a member before they can shop at SSC. As a new business in the area, SSC was keen to attract as many new members as possible so it started an advertising campaign.
The advertising campaign included a catalogue with the following wording at the top of the front page in large bold font:
Do you want to save $$$$ you know you do!!!!!!
Huge savings for all new members
Get a HUGE 25% off all products if you join right now! Today in fact! 30 todays only!
Memberships will go fast, first in best dressed. Be late be disappointed memberships are limited
At the very bottom of the advertisement, there is additional wording in very small print which states:
The ice ed c ion fo ne membe onl a lie o he fi of i em purchased. Fruit and ege able e cl ded
Dess saw the advertisement flyer and picked it up. Dess thought he could save money by buying bulk lie fo hi la ge famil ho e e he ba icall o ed eading a di co n and didn no ice the fine print.
De didn an o mi o on he limi ed membe hi o he en o SSC he ne da and aid a
$10 monthly membership fee, signed some terms and conditions which he briefly glanced at, got his membership card and started shopping. Dess filled five trollies with bulk household items worth about $1200.00.
At the checkout, Dess is told that the 25% discount only applies to the first $100.00 of items purchased.
De com lained and a efe ed o Mi S ic a c ome ca e e e en a i e
Miss Strict showed Dess the fine print in the advertisement. Dess got very angry and decided not to buy anything. Dess then asked Miss Strict to cancel his membership. However, Miss Strict reminded Dess he signed the terms and conditions which included the following term:
1. The Customer is not permitted to cancel the membership before the expiry of 12 months unless the customer pays a cancellation fee of $150.00.
Dess attempted to negotiate with Miss Strict arguing it was just ridiculous to have such small printing and this was an entirely unacceptable to charge $150 to cancel a $10 membership However, Miss Strict told Dess:
“This is your fault, you should have read the advertisement more carefully, and you indicated you read the terms and conditions by ticking this box and signing the terms and conditions. I think it is unreasonable you think you have grounds to complain.”
Dess stalks out of SSC and decided to lodge a complaint with the Australian Competition and Consumer
Commi ion he ACCC
Required
Part A ( 15 Marks)
Using the IRAC legal problem solving process give your conclusion on whether the ACCC have any g o nd o a legal oceeding again SSC
Please limit your response to a consideration of the general protections under the Australian Consumer Law.
Part B ( 5 Marks)
Using the IRAC legal problem solving process give your conclusion on whether the ACCC have any g o nd o a legal oceeding again SSC if De had cha ed food fo e in hi café
Question 3
Phil is managing director of LightsBright Pty Ltd. Phil has accepted a large order for electrical fittings from CheepCheep Pty Ltd on behalf of LightsBright.
The order has been delivered to CheepCheep as per the agreed terms, however CheepCheep have not paid their $75 000 invoice.
CheepCheep is in serious financial difficulty and this was well known or suspected across the industry. Consequently, at the time the order was made, CheepCheep was known generally as a bad credit risk in the industry. Phil was aware of this, however he is a good friend of Robert, the managing director of CheepCheep. Phil decided to provide the order in any event.
CheepCheep has now been placed into liquidation and has still not paid the debt owed to LightsBright Pty Ltd.
Required
Using the IRAC legal problem solving process give your conclusion on whether:
(a) Phil, the managing director of LightsBright Pty Ltd be held personally liable for the unpaid
debt, and if so why? ( 10 Marks)
(b) Could Robert, the managing director of CheepCheep Pty Ltd be held personally liable for the unpaid debt, and if so why? ( 5 Marks)
(c) Will he b ine j dgmen le be ele an o ei he Phil o Robe in he e ci c m ance
(5 Marks) Question 4
Francis collects music related merchandise, in particular she is a big fan of Kiss (American glamrock band) and Status Quo (English boogie band) merchandise. Francis appoints Rick as her agent and instructs him to purchase three specific Kiss related items from Allan, another collector of Kiss merchandise. Francis gives Rick a limit of $25,000 to spend, which Rick promptly deposits in his own personal bank acco n o kee i afe n il i i needed
Francis also instructs Rick to keep the purchase of the three items confidential. Rick is very pleased abo hi a oin men a F anci agen and ell h ee of hi clo e f iend on he o i o he f iend do not share any information with anyone. However, two of these friends work in the music industry and immediately tell their employers.
Rick a oache Allan and in od ce him elf a F anci agen Follo ing nego ia ion i i ag eed
Allan will sell the three Kiss items to Francis for $32,000. When Francis is informed of the contract, Francis flatly refuses to pay and says:
“Rick never had the authority to make any contracts involving this amount of money. I simply will not pay this amount of money for those three items.”
Allan states the contract stands, wants to proceed with the sale and demands payment in 7 days or he will start legal proceedings for breach of contract.
When Rick was inspecting the items, he noticed Allan also had 3 original Status Quo albums which Francis has always wanted for her collection. Rick also facilitates an agreement where Allan will sell the albums to Francis for $45,000.
Required
Part A ( 15 Marks)
Using the IRAC legal problem solving process give your conclusion on whether:
(a) Allan can enforce the contract for the three Kiss items with Francis.
(b) Francis is bound to go ahead with the contract to purchase the Status Quo albums from Allan, and the consequences for Rick if Francis is not bound to the purchase.
Part B ( 5 Marks)
Describe the ways in which Rick is in breach of his common law duties as an agent, and any consequences of such breaches.
Question 5 ( 20 Marks)
Jenn ha ecen l beg n nning he o n cce f l mall b ine called Da ling Dog Thi i a day care centre and boutique for dogs providing day care, grooming treatment, food, and designer clothes and accessories.
In growing her business, Jenny has used her creative talents to produce new ideas and new products. Jenny has developed the following items:
1. A logo/brand ing he h a e Da ling Dog hich he has placed on all her products.
2. A computer software program teaching dog training techniques.
3. A revolutionary electronic dog collar which translates the barking of a dog into talking so that the owner can respond appropriately.
With regard to each separate item, advise Jenny:
a) What type of intellectual property protection should Jenny obtain to protect the items and how would she obtain that protection?
b) How long would the intellectual property protection last?
c) What conduct would amount to infringement of the protection?
d) What remedies would be sought upon infringement?

Posted in Blog

More about:


ASSIGNMENT 2 Written Critique of the care provided in a Case Study according to a Clinical Practice Guideline to improve patient care
Students to provide an 1800-word critique of a provided case study scenario inline with relevant elements of a selected clinical practice guideline (CPG) upholding
• NSQHSS and/or
• NMBA standards and/or
• Palliative Care standards
Due date: 14/10/2020 1600 hours
Weighting: 50%
Length and/or format: 1800 words +/- 10%
Purpose: Students are required to demonstrate an understanding of how theory translates into practical nursing care and how evidence underpins best practice. Each student will review and critique the care given in the Case Study provided according to their choice of ONLY ONE of the provided Clinical Practice Guidelines (CPG’s) best suited to the highlighted discussion (See Assessments LEO Tile for Case Study and CPG’s) .
Learning outcomes assessed: LO1, LO5, LO7
How to submit: Electronic Submission via Turnitin
Return of assignment: The assessment feedback and grade will be returned via Turnitin.
Assessment criteria: The assessment will be marked using the criteria-based rubric.
Please note that in-text citations are included in the word count
whilst the reference list is not included in the word count. Words that are more than 10% over the word count will not be considered.
WORD COUNT
Writing requires skill and being able to write within a specified word limit is an essential component of professional and academic work. Reading and writing critically are fundamental skills which demonstrate an understanding and an ability to make judgements and solve problems, hence why only 10% of a word count should be direct quotes. That is, if the word count is 1500 words only 150 of those words should be direct quotes. Word counts provide students with an indication of the amount of detail and work required for each assessment item.
What is included in a word count?
Essentially, all text within an assessment item from the introduction through to the conclusion is counted in the word count. This includes all in-text citations, direct quotes and headings. The word count does not include the following:
• Title page
• Reference list
• Appendices
• Tables
• Figures and legends
ASSIGNMENTS SUBMITTED JUST BEFORE THE DUE DATE AND TIME
Please note that if you submit your assignment, notice that the similarity index is high but do not have time to revise your assignment before the due date has passed, then you are advised to:
• contact the Lecturer in Charge and request that your assignment be removed.
• revise the assignment, submit it within three days of the due date and incur a late submission penalty.
• submit it into the regular drop box. Do not submit into the extension drop box.
Please review the Academic Integrity and Misconduct policy if you choose not to do this.
REFERENCING
This unit requires you to use the APA referencing system.
See the ‘Academic referencing’ page of the Student Portal for more details.
ACU POLICIES AND REGULATIONS
It is your responsibility to read and familiarise yourself with ACU policies and regulations, including regulations on examinations; review and appeals; acceptable use of IT facilities; and conduct and responsibilities. These are in the ACU Handbook, available from the website.
A list of these and other important policies can be found at the University policies page of the Student Portal.
Assessment policy and procedures
You must read the Assessment Policy and Assessment Procedures in the University Handbook: they include rules on deadlines; penalties for late submission; extensions; and special consideration. If you have any queries on Assessment Policy, please see your Lecturer in Charge.
Please note that:
(1) any numerical marks returned to students are provisional and subject to moderation;
(2) students will not be given access to overall aggregated marks for a unit, or overall unit grade calculated by Gradebook in LEO; and,
(3) students will be given a final mark and grade for their units after moderation is concluded and official grades are released after the end of semester.
Academic integrity
You have the responsibility to submit only work which is your own, or which properly acknowledges the thoughts, ideas, findings and/or work of others. The Academic Integrity and Misconduct Policy and the Academic Misconduct Procedures are available from the website. Please read them, and note in particular that cheating, plagiarism, collusion, recycling of assignments and misrepresentation are not acceptable. Penalties for academic misconduct can vary in severity and can include being excluded from the course.
Turnitin
The Turnitin application (a text-matching tool) will be used in this unit, in order to enable:
• students to improve their academic writing by identifying possible areas of poor citation and referencing in their written work; and
• teaching staff to identify areas of possible plagiarism in students’ written work.
While Turnitin can help in identifying problems with plagiarism, avoiding plagiarism is more important. Information on avoiding plagiarism is available from the Academic Skills Unit.
For any assignment that has been created to allow submission through Turnitin (check the Assignment submission details for each assessment task), you should submit your draft well in advance of the due date (ideally, several days before) to ensure that you have time to work on any issues identified by Turnitin. On the assignment due date, lecturers will have access to your final submission and the Turnitin Originality Report.
Please note that electronic marking, Grademark, is used in this unit using Turnitin. Turnitin will be used as a means of submitting, marking and returning assessment tasks and so a text matching percentage will appear on your submission automatically.
FIRST PEOPLES AND EQUITY PATHWAYS DIRECTORATE FOR ABORIGINAL AND TORRES STRAIT ISLANDER STUDENTS
Every campus provides information and support for Aboriginal and Torres Strait Islander Students.
Indigenous Knowing’s are embedded in curricula for the benefit of all students at ACU.
STUDENT SUPPORT
If you are experiencing difficulties with learning, life issues or pastoral/spiritual concerns, or have a disability/medical condition which may impact on your studies, you are advised to notify your Lecturer in Charge, Course Coordinator and/or one of the services listed below as soon as possible.
For all aspects of support please visit ACU Info section in the Student Portal.
• Academic Skills offers a variety of services, including workshops (on topics such as assignment writing, time management, reading strategies, referencing), drop-in sessions, group appointments and individual consultations. It has a 24-hour online booking system for individual or group consultations.
• Campus Ministry offers pastoral care, spiritual leadership and opportunities for you to be involved with community projects.
• The Career Development Service can assist you with finding employment, preparing a resume and employment application, and preparing for interviews.
• The Counselling Service is a free, voluntary, confidential, and non-judgmental service open to all students and staffed by qualified social workers or registered psychologists.
• Disability Services can assist you if you need educational adjustments because of a disability or chronic medical condition; please contact them as early as possible.
INHERENT REQUIREMENTS
• To support your progression in this unit, students are directed to access the course inherent requirements, on the link below, to understand the essential aspects of their course. If you require assistance to enable you to achieve the knowledge, skills and attitudes outlined in the inherent requirements, please speak with your academic and or a disability advisor for support.
• www.acu.edu.au/inherent-requirements
ONLINE RESOURCES AND TECHNOLOGY REQUIREMENTS
The LEO page for this unit contains further readings/discussion forums. https://leo.acu.edu.au/course/view.php?id=33843
Key activities that have been provided to support your learning include

Posted in Blog

A SSESSMENT 2 BRIEF
Subject Code and Title MGT501 Business Environment
Assessment Internal and External Stakeholder Analysis
Individual/Group Individual
Length 2,500 words
Learning Outcomes This assessments addresses the following Subject Learning Outcomes:
c) Analyse and synthesise the fundamentals of business inthe contemporary environment.
d) Construct and Justify a professional value propositionas a business practitioner
Submission 12 Week Delivery: By 11:59pm AEST/AEDT Friday of Module 5.2 (week 10)
Intensive Class: Due By 11:59pm AEST/AEDT Friday of Module 5 (week 5)
Weighting 50%
Total Marks 50 marks
Context:
Business stakeholder analysis is a technique for identifying stakeholders and analysing their roles. The aim of the analysis is to map out the stakeholders’ level of influence and degree of interest with regards to the business. Stakeholder analysis can also be used to assess the relationships between different stakeholders and the issues they care about most.
Internal stakeholders are individuals or groups who are directly involved in the business, such as owners, board members, managers, employees, and investors. External stakeholders are indirectly influenced by the business activities, like customers, suppliers, competitors, society and government.
By understanding both perspectives, the business can engage and enhance communication with relevant stakeholders, reduce or prevent risks, identify business opportunities, improve internal stakeholders’ commitment in the business and the reputation of the business amongst external stakeholders.
Instructions:
In this assessment, you will examine a business in an industry that you have either previously worked in or would like to in the future. Leading up to the assessment submission, you must participate in the Assessment 2 weekly discussions in the Discussion Forums on Blackboard. You will locate this discussion forum in the Assessment Area of blackboard. Weekly contributions are required in Modules 2-4.
Please Remember your contributions to the discussion topics are one of the assessment attributes.
(LMS please create an Assessment 2 Discussion Forum separately in the Assessment area of blackboard as students are required to participate in this to complete the assessment)
Presenting a business example and contributing to the discussion forum, you will:
• identify and analyse functional areas in the business
• identify and analyse the internal and external stakeholders
• compare two industries with each other
• create a stakeholder matrix
• discuss chosen stakeholders and industries in the context of relevant theories and frameworks
Suggested format
Your individual stakeholder analysis should follow standard report structure and include the following:
• Cover page
• Executive Summary o A concise summary of the main report in bullet points
• Introduction and background information on your business example
• Main body
o Identify functional areas
o Identify internal and external stakeholders and their roles
o Identify the nature and degree of main stakeholders’ interests, and implications of conflicting interests
o Identify the level of main stakeholders’ influence
o Create a stakeholder matrix
o In the discussion forum, choose an example from your peers and compare the industry your business operates in with their industry, identify the main points of stakeholder dissimilarities and analyse the differences in stakeholder interests and influences
• Conclusion
• References
• Appendices (if necessary)
Support your observations and statements by incorporating links to theory and conceptual frameworks. Please ensure your sources are referenced clearly in the APA 6th style both in-text and in the reference list.
Referencing:
It is essential that you use the appropriate APA style for citing and referencing research. Please see more information on referencing here
http://library.laureate.net.au/research_skills/referencing
Tips to get started:
PESTLE is a good tool to use to help you identify all stakeholders. By considering political, economic, social, technological, legal and environmental/ethical factors and how they relate to the business, it’s easy to identify stakeholders.
Submission Instructions:
Submit your Assessment 2 Internal and External Stakeholder Analysis in the submission link in the main navigation menu in MGT501 Business Environment by the end of Module 5.2 (week 10).
Intensive Class: Due By 11:59pm AEST/AEDT Sunday of Module 5 (week 5)
A rubric will be attached to the assessment. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal. Feedback can be viewed in My Grades.
Marking Rubric:
Your reports will be marked against the rubric, which is shown on the next pages. Please ensure that your submission addresses all five of the Assessment Attributes in the rubric.
Learning Rubric: Assessment 2 Internal and External Stakeholder Analysis
Assessment Attributes Fail (Unacceptable) 0-49% Pass
(Functional)
50-64% Credit
(Proficient) 65-74% Distinction
(Advanced)
75 -84% High Distinction
(Exceptional)
85-100%
Knowledge and
understanding
Understands theory
and concepts
Percentage for this
criterion
30% Limited understanding of required concepts and knowledge.
Key components of the assignment are not addressed.
Knowledge or understanding of the concepts and theory.
Resembles a recall or summary of key ideas.
Often confuses assertion of personal opinion with information substantiated by evidence from the research/course materials.
Thorough knowledge or understanding of the concepts and theory.
Supports personal opinion and information substantiated by evidence from the research/course materials.
Demonstrates a capacity to explain and apply relevant concepts.
Highly developed understanding of the concepts and theory.
Discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
Well demonstrated capacity to explain and apply relevant concepts.
A sophisticated understanding of the theory.
Systematically and critically discriminates between assertion of personal opinion and information substantiated by robust evidence from the research/course materials and extended reading.
Mastery of concepts and application to new situations/further learning.
Contribution to the
discussion forum
Percentage for this
criterion
10% Never or rarely posted messages with very little or occasional activity.
Simple entries lack insight, depth or are superficial.
The entries are short and are frequently irrelevant to the events.
Entries show some insight, depth and are connected with events, topic or activity.
Entries are typically short and may contain some irrelevant material. Entries show insight and depth.
The content of posts is connected with events, topic or activity.
Entries show insight,
depth and understanding.
The content of posts is connected with events, topic or activity, and are
They do not express opinion clearly and show little understanding.
There are some personal comments or opinions which may be on task.
These entries may contain some irrelevant material but are for the most part on task.
supported by evidence and examples.
Entries are relevant with links to supporting material.
Analysis and application with synthesis of new
knowledge
Demonstrates a clear understanding of the practical applications and implications of relevant concepts
Percentage for this
criterion
30%
Limited synthesis and analysis.
Limited application based upon analysis.
Demonstrated analysis and synthesis of new knowledge with application.
Shows the ability to interpret relevant information and literature.
Well-developed analysis and synthesis with application of recommendations linked to analysis/synthesis.
Thoroughly developed and creative analysis and synthesis with application of pretested models and/or independently developed models and justified recommendations linked to analysis/synthesis.
Highly sophisticated and creative analysis, synthesis of new with existing knowledge.
Strong application by way of pretested models and/or independently developed models. Recommendations are
clearly justified based on the analysis/synthesis. Applying knowledge to new situations/other cases.
Effective
Communication
Well-structured report with a clear line of reasoning Difficult to understand for audience, no logical/clear structure, poor flow of ideas, argument lacks supporting evidence.
Audience cannot follow the line of reasoning. Information, arguments and evidence are presented in a way that is not always clear and logical.
Line of reasoning is often difficult to follow.
Information, arguments and evidence are well presented, mostly clear flow of ideas and arguments.
Line of reasoning is easy to follow.
Information, arguments and evidence are very well presented; the presentation is logical, clear and well supported by evidence.
Demonstrates analytical skills. Expertly presented; the presentation is logical, persuasive, and well supported by evidence, demonstrating a clear flow of ideas and arguments.
Percentage for this
criterion
20%
Engages and sustains audience’s interest in the topic, demonstrates high levels of insight and analytical skills.
Correct citation of key resources and evidence
Percentage for this
criterion
10%
Demonstrates inconsistent use of good quality, credible and relevant resources to support and develop ideas.
Demonstrates use of credible and relevant resources to support and develop ideas, but these are not always explicit or well developed.
Demonstrates use of high quality, credible and relevant resources to support and develop ideas.
Demonstrates use of good quality, credible and relevant resources to support and develop arguments and statements. Shows evidence of wide scope within the organisation for sourcing evidence
Demonstrates use of high-quality, credible and relevant resources to support and develop arguments and position statements. Shows evidence of wide scope within and without the organisation for sourcing
evidence

Posted in Blog

Business Intelligence Degrees

The changing scope of business, technology and the link between these two disciplines with the ever increasing demands for human control of data and information have led to the development of a wide range of disciplines to meet the current and future trends. For instance, the educational curriculum in Turkey has adopted the teaching practice of Business Intelligence and Analytics as a relatively new field in the business and technology world. At the core of Business Intelligence and Analytics as a degree course in Turkey as provided by the Sabancı University is the specialization of the individuals studying the course in certain useful industrial techniques. This analysis considers the nature of the Business Intelligence and Analytics degree courses in Turkey as offered by Sabancı University. Moreover, the analysis will also delve into the a comparison of different institutions that offer Business Intelligence and Analytics degree courses within Turkey with a view to developing a postulate on the future trends that the course may have on the business and technological niche.
Business Intelligence and Analytics degree at Sabancı University pays special focus on the tools or mechanisms that experts usually adopt in a bid to categorize data for proper synthesis. The synthesized data is important in the sense that it helps organizations as well as other public and international agencies to obtain the requisite set of information from the available data (Zhang, 2011). The field of Business Intelligence and Analytics is most relevant since the graduates from such a bachelor’s degree or master’s degree in Business Intelligence and Analytics Sabancı University have the opportunity to obtain highly paying placements within the industry as technology or business decision makers under the support role in organizations. Sabancı University offers both the bachelor’s degree and master’s degree in Business Intelligence at the school of engineering as seen in the categorization of the degree course as either a bachelor’s or a master’s of science degree. The university also mentions the operational angle of the graduates of the degree course by explaining that the professionals within the niche of business intelligence operate in unique way from the traditional support information technology experts (Jordan, 2014). For instance, this distinction is readily evident in the sense that the professionals in Business Intelligence and Analytics adopt the usage of complex software in programming as well as other essential management skills as a basis to complete the support decision making function in the context of an organization.
This approach to bachelor’s degree or master’s degree in Business Intelligence Sabancı University fundamentally differs from the rest of the universities in Turkey which also offer courses in business intelligence. The universities under comparison in this analysis include Bahcesehir University which offers a course in Big Data Analytics and Management, Istanbul Sehir University which offers a course in Business Analytics both on a thesis and non- thesis basis (Guha & Kumar, 2018). The current trend that is easily notable from the analysis of the Business Intelligence and Analytics degree by Sabancı University is that this course seeks to explore and manage information in a fun provoking manner that is enjoyable to the professionals within the field or students under the course (Maheshwari, 2015). For instance, at the current moment, the Business Intelligence and Analytics degree is crucial in the sense that it enables an individual to acquire the useful set of skills in information gathering and analysis. This is a venture that is crucial for the present times as well as for the future of business information technology in the manner in which the skill allows a person so sieve through a large amount of data in a very short period of time to eradicate unreliable or data that is majorly irrelevant to the demands of the moment (Minelli, Chambers & Dhiraj, 2013). The Business Intelligence and Analytics course within Turkey is crucial towards the future of business and technological success since it will help businesses to narrow down on the time that is consumed in analysis of information or big data as well as the decision analysis and decision making (Haertzen, 2012). These are important frontiers that determine the future success of businesses hence this discipline is likely to prove most important to large organizations as more stakeholders seeks methods to ensure success.
The Business Intelligence at Sabancı University is similar to the courses offered by Bahcesehir University which offers a course in Big Data Analytics and Management as well as Istanbul Sehir University which offers a course in Business Analytics in certain ways (Fong et al., 2015). For instance, all the courses emphasize the need for the adoption of business intelligence as a crucial tool towards gauging the needs of the business as well as the changing scope of consumer behavior within the market environment (Salahshour, Nilashi & Mohamed, 2018). However, the three universities are essentially different in their conceptualization of the courses in business intelligence since the modes of instruction of the learners vary depending on the combination of the use of data knowledge, statistics as well as computer programming and software engineering knowledge. The field of Business Intelligence has different concentration areas under the course stipulation within Sabancı University and the career choices could include: program developer, BI manager, statistical and data analyst as well as system analysts within the different organizations (Anderson, 2012). The emphasis is heavily placed on the learners within the context of Business Intelligence degree to enable the optimum attainment of the general knowledge under the bachelor’s degree. The specialization initiatives under Business Intelligence usually occurs at the master’s level as the professional narrows down on a smaller niche to grow the skills and knowledge set under demand within the industry (Akhgar & Arabnia, 2013).
In conclusion, the Business Intelligence and Analytics course of Sabancı University in Turkey is peer- based and it runs for a total duration of about twenty one months and is majorly undertaken within the Behavioral Analytics & Visualization Lab. The programme is taught in English language and prior to the admission; an individual is bound to attend an entry level exam as well as a rigorous process of interviewing. The online resources that are used in the course training include the use of practical Behavioral Analytics & Visualization Lab, the use of webinars and podcasts for long- distance learning and sharing of notes and other useful resources through the e-learning portal and blackboards.

University Similarity Differences
Sabancı University Long-distance learning for all; online resources like e-learning portals and blackboards; peer- based learning Use of Behavioral Analytics & Visualization Lab;
Bahcesehir University Long-distance learning for all; online resources like e-learning portals and Peer- based learning process
Big Data Analytics and Management
Istanbul Sehir University Long-distance learning for all; online resources like e-learning portals and Peer- based learning process
Business Intelligence and Analytics are both thesis and non- thesis

References
Anderson, R. K. (2012). Visual data mining: The VisMiner approach. Chichester, West Sussex, U.K: Wiley.
http://tamusa.worldcat.org/title/visual-data-mining-the-visminer-approach/oclc/793340277&referer=brief_results
The article discussed the important role that the concept of data mining plays in the search for simple solutions in complex databases by use of business intelligence and analytics skills.
Jordan, K. (February 01, 2014). Initial Trends in Enrolment and Completion of Massive Open Online Courses. International Review of Research in Open and Distance Learning, 15, 1, 133-160.
http://tamusa.worldcat.org/title/initial-trends-in-enrolment-and-completion-of-massive-open-online-courses/oclc/5602810303&referer=brief_results
The author considers the rate of growth of open online courses as a consequence of the advent of more data platforms. The work also highlights the rising number of enrolment as a result of increased participation of people due to information availability.
Guha, S., & Kumar, S. (September 01, 2018). Emergence of Big Data Research in Operations Management, Information Systems, and Healthcare: Past Contributions and Future Roadmap. Production and Operations Management, 27, 9, 1724-1735.
http://tamusa.worldcat.org/title/emergence-of-big-data-research-in-operations-management-information-systems-and-healthcare-past-contributions-and-future-roadmap/oclc/7848270570&referer=brief_results
The work renders a comprehensive discussion on the rise of big data projects and the extent to which this new digital footprint dominates websites as well as its influence on the daily lives of individuals.
In Akhgar, B., & In Arabnia, H. (2013). Emerging trends in ICT security. Waltham, Massachusetts: Morgan Kaufmann/Elsevier.
https://books.google.co.ke/books?id=ndqwAAAAQBAJ&printsec=frontcover&dq=open+data+trend+in+jordan&hl=en&sa=X&ved=0ahUKEwiLhbzg5cvdAhXKpo8KHdnlAT8Q6AEIMTAC#v=onepage&q&f=false
The author explains the recent trends in Information Technology and links them to the foundational aspects of open data and its analysis in the current world order as discussed under the Jordan State.
International Conference on the Applications of Digital Information and Web Technologies, In Mizera- Pietraszko, J., & In Fong, S. (2015). Advances in digital technologies: Proceedings of the 6th International Conference on Applications of Digital Information and Web Technologies 2015. Amsterdam: IOS Press.
http://tamusa.worldcat.org/title/advances-in-digital-technologies-proceedings-of-the-6th-international-conference-on-applications-of-digital-information-and-web-technologies-2015/oclc/914229932&referer=brief_results
The author explains the concept of Business Intelligence and its crucial nature towards the future of business and technological success since it will help businesses to narrow down on the time that is consumed in analysis of information or big data as well as the decision analysis and decision making.
Haertzen, D. (2012). The analytical puzzle: Profitable data warehousing, business intelligence and analytics. Westfield, NJ: Technics Publications.
http://tamusa.worldcat.org/title/analytical-puzzle-profitable-data-warehousing-business-intelligence-and-analytics/oclc/824876084&referer=brief_results
The article explains that business intelligence is an important frontiers that determine the future success of businesses hence this discipline is likely to prove most important to large organizations as more stakeholders seeks methods to ensure success.
Maheshwari, A. (2015). Business intelligence and data mining. New York, New York (222 East 46th Street, New York, NY 10017): Business Expert Press.
http://tamusa.worldcat.org/title/business-intelligence-and-data-mining/oclc/900878630&referer=brief_results
The article captures the fact that professionals in Business Intelligence and Analytics adopt the usage of complex software in programming as well as other essential management skills as a basis to complete the support decision making function in the context of an organization.
Minelli, M., Chambers, M., & Dhiraj, A. (2013). Big data, big analytics: Emerging business intelligence and analytic trends for today’s businesses. Hoboken, New Jersey: John Wiley & Sons, Inc.
http://tamusa.worldcat.org/title/big-data-big-analytics-emerging-business-intelligence-and-analytic-trends-for-todays-businesses/oclc/818985740&referer=brief_results
The author conceptualizes the important role that the availability of Big Data plays in both the present and future of information analysis and how this is likely to affect organizations and other future trends in business intelligence and analytics.
Salahshour, R. M., Nilashi, M., & Mohamed, D. H. (June 01, 2018). Information technology adoption: a review of the literature and classification. Universal Access in the Information Society: International Journal, 17, 2, 361-390.

http://tamusa.worldcat.org/title/information-technology-adoption-a-review-of-the-literature-and-classification/oclc/7673148924&referer=brief_results

This article emphasizes the intensive nature of the research work that is currently ongoing in the field of information technology as a basis for search of innovation on the usefulness of open data to governments, organizations and other corporate bodies.

Zhang, S. (July 01, 2011). Information enhancement for data mining. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 1, 4, 284-295.
http://tamusa.worldcat.org/title/information-enhancement-for-data-mining/oclc/5156301868&referer=brief_results
The author discussed enhancement techniques that are crucial in the process of invention of the usefulness of open data in the rapidly evolving digital world.

Posted in Blog

The internet plays an important role in our lives, and that is a fact that is universally accepted. It helps us in various ways, such as in our jobs, the impact of the internet on economy
businesses, in areas where information and communication are required and during relaxation. All these activities are related to this innovation of technology. The internet-related environment is complicated, vast, and still very agreeable, making it arouse interest in many people. The internet has portrayed an enormous potential in the development of a business. That has led to the stimulation of the appearance and promotion of concepts that are new such as electronic commerce and electronic business.

The internet has improved channels of communication. Through emails, a business owner can retrieve information about the business, even when the search engine is a bit slow or not working. Buying some of the things through the internet is very convenient. For example, books, CDs, and music is economical and convenient (Angelova, Kiryakova & Yordanova, 2017). Shopping online by the use of the internet has also made life very easy because goods will just be brought at the buyer’s doorstep after delivery. The activity of buying and selling online goes beyond e-commerce and deep into the enterprise’s culture and process.
The internet helps businesses lower costs across the supply and demand chains, create more streams of revenue, take the customer service into a different level, enter new markets, and redefine business relationships. Intercompany trade in the united states doubles every year. According to some statistics, business to business spending in the economy is more significant than consumer spending. The impact of network effects has enabled online stores to move from a handful of evangelizing companies with the clout of strong markets like ford, dell, visa, cisco systems, and general electric to myriad customers and suppliers.

The internet is efficient and fast. It is full of resources that assist businesses to get access to anything they require. Having an online presence offers the company some prestige, helps in improving the visibility of the brand, and helps to increase the potential customer’s confidence in the offer given by the business. Lack of an online presence induces a feeling of dealing with small or weak business to the customers hence having doubts about purchasing a product. There are ten retailers’ policy options suggested to help enterprises to survive the new economy. The options encourage the adoption of electronic shopping to physical businesses.

Both buyers and sellers have increased their efficiency by investing in the capacity to perform their businesses on the internet, which has helped in the reduction of cost. These businesses need to create a self- reinforcing circle by persuading more business partners to do the same thing (Breivold & Rizvanovic, 2018). The integration of the electronic business sector with the traditional or rather the real businesses can be made relative to areas that are functional such as finding sources, human resources, production, marketing, logistics, financing, and investment sources, performance criteria.
With the internet, businesses can get global news instantly since information travels faster. Geography is no longer that important because it does not hinder a company from making essential decisions from anywhere in the world. Businesses are now working for twenty-four hours, seven days a week, from being a nine to five. Especially in the united states, businesses go for three shifts since communication can take place anytime in the day or night. The business size does not matter anymore because even small businesses are offering services that big companies can offer.

Impact on the US economy
The internet sector accounted for two-point one trillion dollars of the US economy in 2018. That was about ten percent of the gross domestic product of the nation. The internet industry in the US has created jobs in every sector of the economy. It is responsible for close to six million direct jobs. These account to four percent of US jobs. Additional thirteen million jobs have been indirectly supported by the internet sector (Leatherman, 2016). The economy has been demonstrated by this sector strong positive downstream effects for supporting two indirect jobs for every internet job.

The internet sector invested Sixty-four billion dollars through capital expenditure into the economy of the united states. The IA members spent more than the fourth two billion dollars alone. Between 2012 to 2018, the internet sector grew nine times faster than the country’s economy. The internet has a great potential in increasing productivity growth in a variety of distinct, but mutually reinforcing ways, such as, first, reducing the transaction costs that are required in producing and distributing services and goods significantly.
Second, increasing the efficiency of management by enabling firms to effectively manage their supply chains and secure communication with customers and partners within the firm. Third, the increase in competition makes prices more transparent, hence broadening markets for sellers and buyers. Fourth, increase of marketing and pricing effectiveness. Lastly, it impacts the increase in consumers’ choice, satisfaction, and convenience in different ways (Hopper, 2018). These impacts manifest in ways such as cheaper transactions across financial service industries resulting in an improved economy.

In conclusion, the internet seems to be taking over all the businesses in the united states. It is doing so at a higher speed than other disruptive technologies of the 20th century, such as cars, electricity, and telephone. With the invention of a simple-to-use browser used for surfing the world wide web, the internet developed a mass-market potential that still affects many people’s daily lives. People are now able to work both from the office and at home. The internet has proved more of an addition to the lives of the people.

References
Angelova, N., Kiryakova, G., & Yordanova, L. (2017). The significant impact of the internet of things on business. Trakia Journal of Sciences, 15(1), 406-412.

Breivold, H. P., & Rizvanovic, L. (2018, July). Business Modeling and Design in the Internet-of-things Context. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp. 524-531). IEEE.
Leatherman, J. C. (2016). The internet-based economy and rural economic competitiveness. The American Midwest: Managing Change in Rural Transition: Managing Change in Rural Transition, 197.
Hopper, P. (2018). Understanding development. John Wiley & Sons.

Posted in Blog

Questions
Name
Institution

Discussion Questions
Question #1
 ARP: Address Resolution Protocol is the process of mapping an IP address to a Media Access Control. It, therefore, serves the function of translating 32-bit addresses to MAC addresses, which are 48-bit and vice versa.
 DHCP: Dynamic Host Configuration Protocol allows the server to take the scope of numbers allocated to a network and allocate them to a specific computer as an IP address.
 ICMP: Internet Control Message Protocol is used by devices on the network to determine whether messages are successfully reaching the recipient. The ICMP helps devices detect communication issues across the network.
 SNMP: Simple Network Management Protocol uses agents in the form of utility programs to monitor the network’s behavior and traffic and store the information on a management information base (Rouse, 2019). The programmed utility is usually loaded on devices such as routers, servers, or hubs.
 DNS: A domain name service aid TCP/IP protocols identify hosts by their IP addresses. DNS servers translate host addresses instead of giving users the task of memorizing the domain names.
Question #2
 Bastion host: A specialized computer that acts as a gateway from a public to a private network. It is exposed to the public network and outside a firewall or between two firewalls as it logs access on a proxy server (Bittlingmeier and King, 2003).
 DMZ: A subnetwork that faces outward to create a node that is exposed to attacks before they reach the main network. The role of a DMZ is to add an extra layer of protection.
 Dual-homed firewall: A technique whereby two network interfaces are placed between a trusted and untrusted network. The firewall is application-based, and its role is to provide security services to untrusted networks.
 Screened host: Both a proxy server and a router are used as security layers. The role is to form a closed network where the router is the first to screen for disallowed access then the proxy server acts as the web server’s front end.
 Screened subnet: The use of three components that act as firewalls. Most routers are used, and they make up the internal, external, and perimeter components. The role is to offer a public interface, buffer, and additional subnet.
Question #3
The four main VPN access tunneling protocols are OpenVPN, PPTP, SSTP, and L2TP/IPSec. PPTP is known as Point-to-Point Tunneling Protocol, and it is the easiest method to use. It requires only a password, username, and IP address to connect to the corporate servers. The protocol uses TCP ports to send and receive data across the network to the server. However, this method was phased out due to numerous vulnerabilities that were prone to attacks. There is then the use of Layer 2 Tunneling Protocol (L2TP) alongside an Internet Protocol Security (IPSec). This protocol encapsulates and encrypts data hence creating dual security measures for the data being transmitted across the tunnel. SSTP is known as Secure Socket Tunneling Protocol, and it transmits data through the SSL, which works in conjunction with the Transport Layer Security on the Windows OS (Athow, 2019). For the OpenVP, the protocol was developed recently, enabling open source AES 256-bit encryption of data packets being transmitted over the network. Users can select from a range of cryptographic algorithms, and the method is supported on any OS.
References
Athow, D. (2019). VPN Tunnels explained: what are they, and how can they keep your internet data secure computer science homework help. Retrieved from https://www.techradar.com/vpn/vpn-tunnels-explained-how-to-keep-your-internet-data-secure#:~:text=Types%20of%20VPN%20tunneling%20protocols,most%20or%20all%20of%20them.
Bittlingmeier, D. & King, T. (2003). Understanding the Concepts of Security Topoligies. Retrieved from https://www.pearsonitcertification.com/articles/article.aspx?p=31562&seqNum=4#:~:text=The%20third%20type%20of%20topology,proxy%20server%20(bastion%20host).
Rouse, M. (2019). Address Resolution Protocol (ARP). Retrieved from https://searchnetworking.techtarget.com/definition/Address-Resolution-Protocol-ARP

Posted in Blog

Ethical Dilemma
Name
Institution

Ethical Dilemma
I would try to get custody of my grandson. Courts usually act when substance abuse-in the form of alcohol or unlawful drugs-essentially obstructs a parent’s ability to care for his/her children, or the parent presents a danger to the well-being of the child (Jackson, Klee & Lewis, 2016). In this case, my daughter’s abuse of crack has made her unable to take care of her son, and as a result, she has neglected him. She also leaves him at her so-called friends’ houses, where strange men are watching him. This puts my grandson at risk of being introduced to drugs at a young age and even at risk of being molested. Therefore, I believe that I have a strong case against my daughter, and any judge who gets to hear what my grandson has to put up with will rule in my favor. If I am given custody, I will not allow my daughter to see him again until she admits she has a problem and seeks treatment.
The withdrawal symptoms of crack and cocaine are so much worse than opiates because crack and cocaine are more potent than opiates. This means that they evoke a given response at low concentration, that is, they generate the “high” feeling at low concentrations. Smoking crack/cocaine allows it to reach the brain very essay rapidly and hence brings a strong and instant-but very short-lived-high that lasts approximately 15 minutes (Padwa & Cunningham, 2010). And because of this, an abuser can begin experiencing withdrawal symptoms after his/her first time of trying cocaine or crack.
Detoxification is one of the primary forms of treatment for crack users, and it is the initial step toward recovery. When done in an environment that is regulated, detoxification assists in safely cleansing the drug from the body of the user. Inpatient rehabilitation is another form of treatment. There are multiple rehabilitation centers with different treatment plans, but most of them focus on support groups, process group therapy, and cognitive-behavioral therapy.

References
Jackson, M., Klee, H., & Lewis, S. (2016). Drug misuse and motherhood. Routledge.
Padwa, H., & Cunningham, J. (2010). Addiction: A reference encyclopedia. ABC-CLIO.

Posted in Blog

Page 1 of 8
HA1022 Principles of Financial Management Group Assignment
HOLMES INSTITUTE
FACULTY OF
HIGHER EDUCATION
Assessment Details and Submission Guidelines
Trimester T2 2020
Unit Code HA1022
Unit Title Principles of Financial Management
Assessment Type Group Assignment
Assessment Title Research on the Australian Financial Market
Purpose of the
assessment (with ULO
Mapping)
To complete this assessment, students are required to:
1. Explain the institutional framework of the Australian financial system.
2. Discuss the financial instruments available from their chosen company.
their uses and apply the financial concepts to their chosen company.
3. Perform financial ratio calculations and analysis.
4. Assess the relationships between financial institutions that make up their
chosen industry.
Weight 40% of the total assessments
Total Marks 40
Word limit 3,000 words (Maximum)
Due Date Week 10 – Friday 25th, September, 2020 at 5pm
Submission
Guidelines
• All work must be submitted on Blackboard by the due date along with a completed
Assignment Cover Page.
• The assignment must be in MS Word format, no spacing, 12-pt Arial font and 2cm
margins on all four sides of your page with appropriate section headings and page
numbers.
• Use appropriate referencing (in-text citation and reference lists)
Reference sources must be cited in the text of the report and listed appropriately at
the end in a reference list using Harvard referencing style.
• Submitted work should be your original work showing your creativity. Please ensure
the self-check for similarity to be done before final submission in accordance with
SafeAssign Student Guide in Blackboard. Please note that it can take 48 hours for
the self-check report to be available for your viewing.
• You are required to submit the assignment at Group Assignment Final Submission,
which is under Assessment folder on Blackboard. Always keep an electronic copy
until you have received the final grade for the Unit. Please make sure that you
submit the correct file. Any appeal relating to wrong submission after the deadline
will not be considered.
Page 2 of 8
HA1022 Principles of Financial Management Group Assignment
Assignment Specifications
Assignment Tasks
The assignment task is a written report and analysis of your chosen financial institution and the
financial environment. You will be required to apply the financial concepts you have learned in
class to your chosen industry and company.
In groups of 3-4, students should first choose one ASX listed company to undertake financial ratio,
market and competitor analysis. Finally, identify the regulator of the industry and your chosen ASX
Listed Company and the recent actions (within the last 3 years) that they have taken to control ethical
behaviour in the industry.
Note that groups cannot have the same ASX Listed Company. The first-come, first-served rule will
apply.
Assignment Structure should be as the following:
Requirement/s and Guide Questions
1 Industry Description (4 marks, up to 400 words)
a) Discuss the size of the industry and the level of competition.
b) Identify the regulator/s of the industry. Comment on the extent of the regulator’s
power to ensure compliance within the industry.
2 Company Description (6 marks, up to 600 words)
a) What is/are the main source of business (the main source of revenue)?
b) What is the ownership structure of your company?
3 Financial Instrument Analysis (6 marks, up to 600 words)
a) Secure a copy of the 2019 or 2020 Balance Sheet and Income Statements of your
chosen firm and attach it as an exhibit or table in your appendix.
b) What are the financial instruments that your firm deals in? Check Assets, Liabilities
and Equities section. Also read through the Notes to Financial Statements to get a
better description of the financial instruments.
c) Evaluate the cash or liquidity situation of the company and provide your opinion
based on the liquidity ratios.
4 Financial Structure Analysis (10 marks, up to 1000 words)
Suppose your chosen company requires AUD 10 Million to finance a new project and your
finance managers are evaluating whether to borrow or issue new shares.
a) Identify 2 key financial ratios that will be important to creditors.
b) Identify 2 key financial ratios that will be important to shareholders.
c) Calculate the 4 financial ratios (above) based on the financial statements you have
attached.
d) Based purely on Financial Ratios, recommend whether it is better for the company to
borrow the AUD 10 Million or issue AUD 10 Million new shares.
Page 3 of 8
HA1022 Principles of Financial Management Group Assignment
5 Financial Market Analysis (8 marks, up to 600 words)
a) Conduct further research on your chosen company and explain the governance
environment of the company. Has it been involved in any unethical practices in the
past? How did the regulators and investors react? What corrective actions were taken
by the company? If there has been no reported incidence of unethical behaviour,
comment on your chosen company’s strategies that ensure compliance with the law.
6 Findings, Conclusion and Recommendations (4 marks, up to 400 words)
Based on a summary of your findings, conclude whether the financial market for your chosen
industry is healthy.
7 Presentation of Paper (including Assignment Cover Page and Reference List) – 2 marks and
not included in word count
Marking Criteria Weighting
Industry Description 4
Company Description 6
Financial Instrument Analysis 6
Financial Structure Analysis 10
Financial Market Analysis 8
Findings, Conclusion and Recommendations 4
Presentation of Paper (including references) 2
TOTAL Weight 40
Academic Integrity
Holmes Institute is committed to ensuring and upholding Academic Integrity, as Academic Integrity
is integral to maintaining academic quality and the reputation of Holmes’ graduates. Accordingly, all
assessment tasks need to comply with academic integrity guidelines. Table 1 identifies the six
categories of Academic Integrity breaches. If you have any questions about Academic Integrity issues
related to your assessment tasks, please consult your lecturer or tutor for relevant referencing
guidelines and support resources. Many of these resources can also be found through the Study Sills
link on Blackboard.
Academic Integrity breaches are a serious offence punishable by penalties that may range from
deduction of marks, failure of the assessment task or unit involved, suspension of course enrolment,
or cancellation of course enrolment.
Page 4 of 8
HA1022 Principles of Financial Management Group Assignment
Table 1: Six Categories of Academic Integrity Breaches
Plagiarism Reproducing the work of someone else without attribution.
When a student submits their own work on multiple occasions
this is known as self-plagiarism.
Collusion Working with one or more other individuals to complete an
assignment, in a way that is not authorised.
Copying Reproducing and submitting the work of another student,
with or without their knowledge. If a student fails to take
reasonable precautions to prevent their own original work
from being copied, this may also be considered an offence.
Impersonation Falsely presenting oneself, or engaging someone else to
present as oneself, in an in-person examination.
Contract cheating Contracting a third party to complete an assessment task,
generally in exchange for money or other manner of
payment.
Data fabrication and
falsification
Manipulating or inventing data with the intent of supporting
false conclusions, including manipulating images.
Source: INQAAHE, 2020
Page 5 of 8
HA1022 Principles of Financial Management Group Assignment
Marking Rubric
Excellent
(85% – full marks given)
Very Good (80%) Good (65%) Satisfactory (50%) Unsatisfactory (0%)
Industry
Description (4%)
Identification of the players
within the industry, the level of
competition, the regulators of
the industry and how they
interact with each other.
Identification of the players
within the industry, the level of
competition, and the regulators
of the industry.
Identification of the
players within the industry
and the level of
competition.
Identification of the players
within the industry.
No introduction or description
of the industry.
Company
Description
(6%)
Identified an ASX Listed
Company within the chosen
industry with clarity and
relevance and have included all
3 of the requirements of the
section and linked them with
the company’s mission, vision
and goals.
Identified an ASX Listed
Company within the chosen
industry with some clarity and
relevance and have included all
3 of the requirements of the
section.
Identified an ASX Listed
Company within the
chosen industry with some
clarity and relevance and
have included at least 2 of
the requirements of the
section.
Identified an ASX Listed
Company within the chosen
industry with some clarity and
relevance and have included at
least 1 of the requirements of
the section.
No introduction or description
of the ASX Listed Company
included in the report.
Inappropriate choice of
organisation. Not in the
approved list nor in the
correct industry.
Financial
Instrument
Analysis (6%)
Balance Sheet and Income
Statement attached in
appendices and at least 2
financial instruments have
been identified and analysed
correctly. Check for any OBS
business has been done and
commented on. Risk
between Balance Sheet and
OBS business in terms of
volume has been analysed.
Balance Sheet and Income
Statement attached in
appendices and at least 2
financial instruments have
been identified and analysed
correctly. Check for any OBS
business has been done and
commented on. If none,
then a comment must still be
made.
Balance Sheet and
Income Statement
attached in appendices
and at least 2 financial
instruments have been
identified and analysed
correctly.
Balance Sheet and Income
Statement attached in
appendices and at least 1
financial instrument has been
identified and analysed
correctly.
Balance Sheet and Income
Statement not attached in
appendices.
Financial instruments not
identified.
Page 6 of 8
HA1022 Principles of Financial Management Group Assignment
Financial
Structure
Analysis (10%)
Balance Sheet and Income
Statement attached in
appendices and all 6
financial ratios appropriate
for the company has been
chosen and analysed
correctly. Analysis of
whether each ratio is a
strength or weakness is
provided.
Conclusion provided on
whether AUD 10 Million is to
be raised using debt or
equity.
Excellent marks will be given
if the 6 ratios are linked with
each other or if more
relevant ratios are provided
and analysed.
Balance Sheet and Income
Statement attached in
appendices and at least 6
financial ratios appropriate
for the company has been
chosen and analysed
correctly. Analysis of whether
each ratio is a strength or
weakness is provided.
Conclusion provided on
whether AUD 10 Million is to
be raised using debt or
equity.
Balance Sheet and
Income Statement
attached in appendices
and at least 4 financial
ratios appropriate for
the company has been
chosen and analysed
correctly. Analysis of
whether each ratio is a
strength or weakness is
provided.
Conclusion provided on
whether AUD 10 Million
is to be raised using debt
or equity.
Balance Sheet and Income
Statement attached in
appendices and at least 2
financial ratios appropriate
for the company has been
chosen and analysed
correctly. Analysis of
whether ratio is a strength
or weakness is provided.
Balance Sheet and Income
Statement not attached in
appendices.
Financial ratios not
appropriate for the
company and/or incorrectly
calculated.
Financial Market
Analysis (8%)
Good data presented in
support of the role/s or the
ASX Listed company within
the financial system and well
researched ethical issues that
are linked to company
practices and policies.
Good data presented in
support of the role/s or the
ASX Listed company within
the financial system and well
researched ethical issues
within the chosen industry.
Good research on role/s
of the ASX Listed
company within the
financial system,
including the level of
regulation within the
industry.
Enough research to support
comment on the role of the
chosen ASX Listed Company
within the financial system.
Inadequate research to
support the financial
market analysis. No
comment on the role of
the chosen ASX Company
in the financial system.
Page 7 of 8
HA1022 Principles of Financial Management Group Assignment
Findings,
Conclusion and
Recommendation
ns (4%)
Presenting a wide range of
adequate recommendations
that exemplarily supported
by justification and analysis;
Using data and information
derived from financial
analysis completed in an
efficient, analytical and
logical manner;
Presenting very good
recommendations that
properly supported by
justification and analysis;
Data and information derived
from financial analysis
completed are properly used
to support the
recommendations
Presenting adequate
recommendations that
properly supported by
justification and
research;
Data and information
derived from financial
analysis completed are
properly used to support
the recommendations
Demonstrating limited
justification and analysis of
the given recommendations;
Providing no
recommendations or
inadequate
recommendations for
financial institutions;
No relevant justification
using data and information
derived from the analysis of
financial statements;
Presentation of
Paper – including
references
(2%)
Demonstrated a high level of
understanding and skills of
academic writing by means
of criticism, logical
argument, and interpretation
of data and information.
Assignment Cover Page and
Reference List provided and
can be traced to in text
citation. Reference list is
appropriate for the research.
Very rational demonstration
of the ability to present the
ideas in proper analytical
and contextual level
Assignment Cover Page and
Reference List provided and
can be traced to in text
citation. Reference list is
appropriate for the research.
Demonstrating the
ability to present the
ideas in proper
analytical and
contextual level
Assignment Cover Page
and Reference List
provided and can be
traced to in text citation.
Demonstrating limited skills
of academic writing in terms
of structure, presentation,
wordings and referencing
Assignment Cover Page and
Reference List provided
Failing to meet the
requirements of academic
writing in terms of
structure, presentation,
wordings and referencing.
No Assignment Cover Page
and Reference List
Page 8 of 8
HA1022 Principles of Financial Management Group Assignment

Posted in Blog