Tuesday, December 24, 2019

Conquest And The Conquest Of Land - 1059 Words

Conquest is one simple little word with tremendously rich background and history. Conquest in short is defined to gain a victory over. Conquest has lead to the beginnings of new lands and has created the end of an old. Many different interactions between groups of people and their lands have occurred throughout history that ultimately lead into the conquest of land. First and foremost before interactions occurred there was reasoning behind conquests. The root of conquest can be narrowed down into three categories. These categories are God, glory, and gold. Religions that are big on conversion looked upon conquest as an opportunity to gain more believers, therefore pleasing their god more. Glory was as simple as glory for the homeland to claim increased land. Lastly, just like today humans wanted riches. Striking gold meant just that, becoming rich. Along with each conquest brought upon many different interactions and consequences from those interactions. These interactions are what s et up the foundation of nations’ relationships. Starting with the background of conquest before the two types of interactions. The Spanish main religion in the fifteenth to sixteenth centuries was Catholic. As members of the Catholic faith, the Spanish felt as though it was there right to explore new lands as long as that meant converting the natives from their previous religious views to the beliefs of Catholicism. â€Å"As Hernà ¡n Cortà ©s tore through the Aztec Empire, he was following a letter ofShow MoreRelatedThe World Of War : Conquest Of Land ( Political View ) Or Religion2143 Words   |  9 Pagespresence of dark clouds over your head, with the company of great terror that follows has always brought great suffering. War is the main event that will change history for the best or worst. There are only two reasons to start or to go to war: conquest of land (political view) or religion. Terrorism has been around since the Roman Empire and the Greeks, however the ter m terrorism was adopted during the French Revolution in the 1700 s. Since the early days of the Roman and Greeks, there have beenRead MoreImpact Of Trade And Conquest On The Civilizations1244 Words   |  5 Pagescivilizations. Although trade and conquest were the two more prominent impacts, conflict (conquest) had the most important impact on the developments of these early civilizations. Trade and conquest both had their impacts, but looking closer one impact was more significant than the other. Trade was a way for people to obtain goods they didn’t have or couldn’t make by giving away an item they had a surplus amount of. Trade, in my opinion, didn’t have much of an impact as conquest. Trade was only small developmentRead MoreConquest And The Start Of Colonialism1336 Words   |  6 PagesConquest In the era preceding the age of conquest and the start of colonialism around the late 1400s was a dark time in Europe both socially and economically. Under the feudalist system, there was strict social classes which made upward mobility nearly impossible, even for those born into lower-level nobility. Morale was also waning as pestilence and war persisted. The bubonic plague in the mid-1300s ravaged Europe and by some estimates, cut the population by half. France and England fought in theRead MoreThe Religious Motivations Of The Crusades1671 Words   |  7 Pagespious zeal. Whilst revisions to this history have considered more mundane and ordinary motives, such as a want for land or an attempt to reinforce the Peace of God movement, there is something to be said of the religious motivations of the crusaders. The words ‘conquest’ and ‘conversion’ seem ideologically charged – with conquest being what is done by temporal rulers to physical land and peo ple, and conversion being what is done to the spiritual self, by someone who does not have anything materialRead MoreEssay on Aztec and Inca Religious Zeal1726 Words   |  7 Pagesleaders of the empires could not control. These empires were built through ideologically driven conquests, which became the cornerstones of their societies and something beyond the control of the rulers.   Ã‚  Ã‚  Ã‚  Ã‚  Every imperialistic nation has a motive for expansion. Military, materialism, and missionary are three of the biggest motives foe expansion that imperialistic countries use to expand their borders. Conquests that are based strictly on militaristic or materialistic goals make up long-lasting empiresRead MoreConquest And Its Impact On The World1377 Words   |  6 Pages From the beginning of time, every great empire has emerged out of conquest. Conquest has definitively shaped our current world. Yet, conquest would not be conquest without the aspect of â€Å"othering.† â€Å"Othering† is simply treating the a different group of people as not human or completely different, therefore not identifying[a] with them. In order for an empire to conquer another territory, they must first dehumanize or â€Å"other† the group they are conquering. Empires did this as an attempt toRead MoreThe Conflict Of The United States1380 Words   |  6 Pagesc ultures and ideologies. Conquest narratives often fail to contextualize the true plight of Indigenous peoples in protecting their land. These Indigenous used various political, economic, and military efforts to fight off conquerors. Therefore, the establishment of the New World is just as much a story of conflict and deceit as it is one of development and exploration. These conflicts are documented in the stories of Cabeza De Vaca and Andrew Jackson’s ventures in the New World. A Land So Strange and JacksonlandRead MoreEssay about Mans Quest for Utopia861 Words   |  4 Pagesalways arisen: everyone holds their own image of utopia. And when these images clash, problems arise that make utopia harder to grasp. By examining history as the documentation of mans quest for utopia, we see man striving for utopia in three ways: conquest, reform, and isolation. Hitler, Napoleon, Caesar, and Ghengis Khan all saw their own personal utopia as a world in which they were in control of a vast empire. For Hitler it was an arian society where the world was cleansed of the impuritiesRead MoreThe Spanish Conquest1711 Words   |  7 PagesAlthough some may consider the fall of the Nahua and Inca empires an encounter of the Spanish, the meeting of the two cultures was a conquest because the Spanish brutally defeated and took over the indigenous cultures with the help of many advantages. There are three major factors which contributed to the successful conquest between the Spanish and the Nahuas, also known as the Aztecs, and Incas.   First, the Spanish leaders had experience in forming alliances with indigenous people.   Second, theRead MoreChristian Crusades And The Spanish Inquisition Essay1344 Words   |  6 PagesSome Old Testament skeptics claim that the Israelite conquest of Canaan was an act of divine cruelty. I can see this accusation b eing leveled due to the Christian Crusades, which began in 1095 and showed no love of God nor adherence to God’s commands. The formation of the Spanish Inquisition, which began in 1478, and led the inquisitors to believe that their gruesome actions actually saved Jews from their fate awaiting them in the afterlife; since the Jews were dying at the hands of God s children

Monday, December 16, 2019

Loans Advances of Dhaka Bank Free Essays

string(58) " to achieve a distinction like the luminaries in the sky\." Home  » Business  » Economics  » Report on Procudure for Distributing Loans and Advance at Dhaka Bank Report on Procudure for Distributing Loans and Advance at Dhaka Bank on March 20, 2013 in Economics [pic][pic]1. a. Introduction Internship program is a pre-requisite for acquiring M. We will write a custom essay sample on Loans Advances of Dhaka Bank or any similar topic only for you Order Now B. A. degree. Before completion of the degree, a student must, undergo the Internship program. As the classroom discussion alone cannot make a student perfect in handling the real business situation, therefore, it is an opportunity for the students to know about the real life situation through this program. The program consists of three phases: 1. The orientation of the Intern with the organization, its function and performance. 2. The project work pertaining to a particular problem or problems matching with the Intern’s area of specialization and organizational requirement. 3. The report writing to summarize the Intern’s analysis, findings and achievements in the proceeding of the followings. 1. b. Objectives of the Report: The report has two objectives: 1. General Objective 2. Specific Objective 1) General objectives of the report: The general objective of the report is to complete the internship. As per requirement of MBA program of Chittagong University, a student need to work in a business organization for two months to acquire practical knowledge about real business operations of a company. 2) Specific objective of the report: The specific objective of this report is to find and analyze the Credit facilities (its outstanding, recovery, classified loans etc), approval and monitoring process of Dhaka Bank Limited, Local office. It will also include gathering an idea about the securities behind the loan facilities and issuing different bank guarantees. The detail objectives of my study are as follows- †¢   To access the credit structure of banks in practice. †¢   To measure the effectiveness of the selected banks in utilization of their available deposit and resources. †¢   To identify the relationship with their customers. †¢   To identify the loan recovery performances of the selected banks. †¢   To find out the deposit utilization problems. †¢   To find out the implementation of credit risk management policy of the selected banks. †¢   To find out the implementation of the credit risk grading manual of Bangladesh bank by the selected banks. To find out the unsound credit according to the credit risk management policy. 1. c. Methodology Methodology of the study: This report is mainly prepared by the secondary sources of information some few primary sources of information like – O Direct observation. O Information discussion with professionals. O Questioning the concerned pe rsons. The secondary sources of my information – O Annual reports of DBL. O Credit rating report of DBL by credit rating information services limited. O Desk report of the related department. O Credit manual information. O Different reference books of the library. O Some of my course elements as related to this report. 1. d . Scope of the study: This report will cover an organizational overview of Dhaka bank. It will give a wide view of the different stages of credit appraisal system of Dhaka bank, starting from the loan application to Loan disbursement and the comparison between standard and existing credit appraisal system of a Bank. The study is organized as follows: †¢   Credit profile of the selected banks. †¢   Loan recovery. †¢   The nature of default. †¢   Credit management and guidelines. †¢   Analysis of the findings and recommendation. 1. e. Limitations There are some limitations I had to face while preparing this report. It is very difficult to collect some of the important data and information. There is some information very secret and the Bank didn’t want to provide this information. But this information may help to build a good report. Another limitation is availability of the data. The bank doesn’t have sufficient documents of the interest amount they collect from different loans. For this there is no specific profit calculation of the credit department. So, These kinds of limitations I faced while preparing the report. . a. Dhaka Bank Limited DHAKA BANK LIMITED was incorporated as a public limited Company on 6th April 1995 under the company act. 1994 and started it’s commercial operation on June 05, 1995 as a private sector bank. The bank started its journey with an authorized capital of Tk. 1,000. 00 million and paid up capital of Tk. 100. 00 million. The strength of a bank depends on its mana gement team. The Employer in Dhaka Bank is proud to have a team of highly motivated, well-educated and experienced executives who have been contributing substantially in the continued progress of the bank. The marketing activities at the Dhaka Bank are very implicit and vast comparing to that of other bank in the country today. The Philosophy of the bank is â€Å"EXCELENCE IN BANKING†. Dhaka Bank is always willing to offer new product features to the client. Besides the applications of these products or services are prepared in a very modern way so that the service can be provided in least time required. The Credit facilities approved by Dhaka Bank are increasing day by day because of its well-organized and trained management and also well-equipped facilities. In recent time banking sector becomes very competitive and without giving good and attractive facilities and service no bank can survive in this time. Dhaka Bank is also trying to provide good service to keep going with this competition. 2. b. Mission Statement: To be the premier financial institution in the country providing high quality products services backed by latest technology and a team of highly motivated personnel to deliver Excellence in Banking. 2. c. Vision Statement: At Dhaka Bank, we draw our inspiration from the distant stars. Our term is committed to assure a standard that6 makes every banking transaction a pleasurable experience. Our endeavor is to offer you razor sharp sparkle through accuracy, reliability, timely delivery, cutting edge technology, and tailored solution for business needs, global reach in trade and commerce and high yield on your investments. Our people, products and processes are aligned to meet the demand of our discerning customers. Our goal is to achieve a distinction like the luminaries in the sky. You read "Loans Advances of Dhaka Bank" in category "Papers" Our prime objective is to deliver a quality that demonstrates a true reflection of our vision- Excellence in Banking. . d. Slogan: Excellence in Banking. 2. e. Company Philosophy The motto or the philosophy of the Bank is â€Å"Excellence in Banking†. Whether in Personal, Corporate, Treasury or Trade transactions of Dhaka Bank Limited is committed to provide the best. Meeting the demand of the bank’s discerning c ustomers is not the sole objective. The Bank endeavor to deliver a quality that makes every transaction a pleasurable experience. Dhaka Bank feels that, if they can meet maximum clientele requirements in less time with efficiency, then they will be able to accomplish a successful business in the world of banking. Their main objective is – they want to provide every single customer service available in today’s banking procedure for their clientele. Thus they can guarantee the excellence in banking to their valuable customers. 2. f. Company Activities and Performances Paid up Capital The paid up capital of Dhaka Bank Limited amounted to Tk. 1,547 million as on December 31, 2008 which was Tk. 100 million when the Bank started its operation. The total equity (capital and reserves) of the Bank as on December 31, 2008 stood at Tk. 3125 million. Deposits A strong deposit base is critical for success of a bank. During the years the Bank has mobilized a substantial amount in deposits in transactional and savings account. The deposit base of the bank continued to register a steady growth and stood at Tk. 48,731 million excluding call as of 31 December 2008 compared to Tk. 41,554 million of the previous year registered a 17% growth. Investment Dhaka Bank has diversified its investment portfolio through Lease Financing, Hire Purchase, and Capital Market Operations besides the investment in treasury bills and Prize Bonds. The emphasis on high quality investment has ensured the bank to maximize its profit. Dhaka Bank Limited is a member of the Dhaka Stock Exchange and Chittagong Stock Exchange. A specialized unit of the Bank, the Investment Division manages the Bank’s portfolio and actively participates in the screen-based on-line trading of both the Stock Exchanges. Profit Dhaka Bank Limited registered an operating profit of Tk. 2,010 million in 2008 compared to Tk. 1,183 million in 2007 making a growth of 70%. After all provisions including general provisions on unclassified loans, profit before tax stood at Tk. 1,531 million. Provision for tax for the year 2008 amounted to Tk. 27 million. The net profit of the bank as on 31 December 2008 stood at Tk. 704 million compared to previous year’s Tk. 580 million making growth of 21%. Earning per share (EPS) was Tk. 46. 06 in 2007 compared to Tk. 45. 17 in 2007. Loans and Advances The Bank implemented the system of credit risk assessment and lending procedures by stricter separation of responsibilities between risk assessment, lending decisions and monitoring functions to improve the quality and soundness of loan portfolio. The Bank recorded a 17 % growth in advances with a local loans and advances portfolio of Tk. 9,972 million at the end of December 2008 compared to Tk. 34049 million at the end of December 2007. As of 31 December 2008, 96. 85 % of the total Bank’s loan portfolio was regular while only 3. 15 % of the total portfolio was non-performing as compared to 1. 64 % of 2007. Bank made required provision as on 31 December against performing loans as per rate and classification norm provided by Bangladesh Bank (se note-2c). The volume of non-performing loans stood at Tk. 1,258 million in 2008 from Tk. 554 million in 2007. Of the total loan provision of Tk. 04 million, Tk. 465 million was general provision, which was 51 % of total provision. The rest Tk. 439 million was against the classified accounts. 1. Non-performing loan 2. Regular Loan A wide range of business industries and sectors con stitutes the Bank’s advance portfolio. Major sectors where the Bank extended credit include steel and engineering, ship breaking, edible oil, sugar, housing and construction, pharmaceuticals, chemicals, electronic and automobiles, energy and power, service industries, trade finance, personal or consumer credit, leasing etc. The Bank continued to support Small and Medium Enterprises (SME) and expended credit facilities to them through its SME Cell. Sector wise allocation of advances reveals a well-diversified portfolio of the Bank with balance exposure in different sectors. High concentration sectors are textile and garment industries with outstanding of Tk. 7,524 million, housing and construction with Tk. 4,093 million, food and allied industries with Tk. 2,949 million and engineering and metal including ship braking with Tk. 1,903 million as at 31 December 2008. Customer Service Customer is in the core of everything a service-oriented company does. Accuracy, reliability, and timely delivery are the key elements of the Dhaka Bank’s service. Well-qualified and experienced officials always prepared to provide efficient, personalized and quality service man Dhaka Bank Limited. The banks prime objective is to provide high quality product and services to the customers. The bank also performs according to the needs of its corporate clients and provides a comprehensive range of financial services to national and multinational companies. International Trade Foreign Exchange International trade constituted the major business activity conducted by the bank. Dhaka Bank offer a full range of trade finance services, namely, Issue, Advising and Confirmation of documentary Credits; arranging forward Exchange cover; Pre-shipment and post- shipment finance; Negotiation and purchase of Export bill; Discounting of bills of Exchange, Collection of bills etc. In the year 2008, Dhaka Bank Limited was active in extending services to their valued clients related with import business. As of 31st December 2008 the import volume was Tk. 49,496 million compared to the volume of 2006 for Tk. 6,277 million marking as increase of 7% from the last year. Dhaka Bank Limited experienced sound growth of export business in 2007 from 2006. The volume of export business rose to Tk. 31,081 million from Tk. 23,269 million in 2007 showing an increase of 34%. Branches Dhaka Bank has opened already 41 branches in different Cities, Places and areas in Dhaka and also in Chittagong, Sylhet, Narayangonj, Norshingdi and Savar. This shows the banks commitment to provide services to their valued customers through an extensive branch network at all commercially important places across the country. They also have planned to open more branches in the sort coming year. These branches are well decorated and well secured with the new technologies. Human Resources and Training The driving force behind Dhaka Bank has always its employees. The bank recognizes that professional development of its people is vital to establishing workers as a provider of quality service. In this regard, the bank have expanded its training facilities and set up a full-fledged training institute at SaraTower, Motijheel, Dhaka. Environmental Management Program The Bank’s Environmental Management Program stipulates adherence with environmental, health and safety regulations and guidelines, refraining from business that impairs the ability of future generations to meet their own needs, assessing an mitigating risks concerning environment, health and safety issues that the bank undertake. Community Service The Bank extends assistance to socio-cultural and community development programs. During the years under review, the Bank had provided support to a number of community welfare programs. At present Dhaka Bank assist the National Hokey Federation. Technologies, Products and Services Dhaka Bank’s products and services are regularly upgraded and realigned to fulfil customer expectation. Their delivery standards are constantly monitored and improved to assure the highest satisfaction. The bank specially emphasizes on the service base on technologies. Because the life became very fast and people want take service within sort time. The consumer-banking sector of the Bank deals with number of tasks related to various services. The products that are recently being offered by the bank are as follows –   Accounts: Dhaka Bank provides the Savings Account; Current Account; Short Term Deposit; Fixed Deposit Receipt etc. or the customers. ATM (Automated Teller Machine): Dhaka Bank ATM Cards enable their valued customers to carry out a variety of banking transactions 24 hours a day. Credit Cards: Dhaka Bank Credit Card has earned wide acceptability and reputation within a very short time. The Bank has developed the process such that it can deliver the Credit C ard within only 7 days against security; for unsecured cards it takes only 10 days. Phone banking: Dhaka Bank phone banking service allows customers to conduct a variety of transactions by simply making a phone from anywhere. Customers can inquire about the balance in their account, check transaction details or request for account statement by fax or e-mail. Locker: By this facility customers can put their valuable things such as jewelry items, valuable papers etc. for the safety reason. Consumer Credit: Dhaka Bank also provides consumer credit facilities with very attractive terms and conditions. Industrial Loan: Loans issued for purchasing equipment, inventories, plants, payrolls etc. Any Branch Banking: By this customers can transact from any branch insight the country. Utility Bill Payment: Customers can pay different utility bill such as phone bill, credit card bill etc. 3. a. Bank: Banks are among the most important financial institutions in the economy. They are the principle source of credit (loanable fund) for millions of households (individuals and families) and for most local units of government. Moreover, for small businesses ranging from grocery stores to automobile dealers, banks are often the major source of credit to stock the shelves with merchandise or to fill a dealer’s showroom with new goods. When the business and consumers need financial information and financial planning, it is the bankers to whom they turn most frequently for advice and council. 3. b. Types of Bank Loans: The banks make a wide variety of loans to a wide variety of customers for many different purposes-from purchasing automobiles and buying new furniture, taking dream vacations and pursuing college education to constructing homes and office buildings. Bank loans may be divided into the following broad categories of loans, delineated by their purpose:   1. Real Estate Loans, which are secured by real property-land, buildings, and other structures- and include short-term loans for construction and land development and longer-term loans to finance the purchase of farmland, residential, and commercial structures etc. 2. Financial institution Loans, including credit to banks, insurance companies, finance companies, and other financial institutions. 3. Agricultural Loans, extended to farm and ranch operations to assist in planting and harvesting crops and to support the feeding and care of livestock. 4. Commercial and Industrial Loans, granted to business to cover such expenses as purchasing inventories, plant, and equipment, paying taxes, and meeting payrolls and other operating expenses. 5. Loans to Individuals, including credit to finance the purchase of automobiles, homes, appliances and other retail goods to repair and modernize homes, cover the cost of medical care and other personal expenses, either extended directly to individuals or indirectly through retail dealers. 6. Lease Financing Receivables, where the bank buys equipment or vehicles and leases them to its customers. Among the categories, the largest volume is in the real estate loans. The next largest category is commercial and industrial loans. 7. Asset-based Loans, loans secured by a business firm’s assets, particularly accounts receivable and inventory. Installment Loans, credits that is repayable in two or more consecutive payments, usually on a monthly or quarterly basis. 9. Letter of credits, a legal notice in which a bank or other institution guarantees the credit of one of its customers who is borrowing from another institution. 0. Retail Credit, smaller-denomination loans extended to individuals and families as well as to small business. 11. Term loans, credit extended for longer than one year and designed to fund longer-term business investments, such as the purchase of equipment or the construction of new physical facility. Term Loans are designed to fund long-and medium-term business investments, such as the purchase of equipment or the construction of physical facilities, cov ering a period longer than one year. Usually the borrowing firm applies for a lump-sum loan based on the budgeted cost of its proposed project and then pledges to repay the loan in a series of installment. 12. Working Capital loan, provide businesses with short-run credit, lasting from a few days to about one year. Working Capital Loans are most often used to fund the purchase of inventories in order to put goods on shelves or to purchase raw materials; thus, they come closest to the traditional self-liquidating loan described above. Frequently the Working Capital Loan is designed to cover seasonal peaks in the business customer’s production levels and credit needs. 3. c. Credit Analysis: The division of the bank responsible for analyzing and making recommendations on the fate of most loan applications is the credit department. This department must satisfactorily answer three major questions regarding each loan applicat 1. Is the Borrower Creditworthy and how know that? The question must be dealt with before any other is whether or not the customer can service the loan- that is, pay out the credit when due, with a comfortable margin for error. This usually involves a detailed study of six aspects of the loan application: – Character   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   🙠 well defined purpose for loan request and a serious intention to repay), Capacity   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   🙠 proper authority to request for the loan and legal standing to sign a loan agreement), Cash   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   🙠 ability to generate enough cash, in the form of cash flow), Collateral   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   🙠 enough quality assets to provide adequate support for the loan), Conditions   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   🙠 aware borrower’s line of work and also economic conditions), and Control   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   : All must be satisfactory for the loan to be a good ne from the lender’s point of view. 2. Can the loan agreement be properly struc tured and documented so that the bank and depositors are adequately protected and the customer has a high probability of being able to service the loan without excessive strain? The loan officer is responsible to both the customer and the Bank’s depositors and stockholders must seek to satisfy the demands off all. This requires, first, the drafting of a loan agreement that meets the borrower’s need for funds with a comfortable repayment schedule. The borrower must be able to comfortably handle any required loan payments, because the bank’s success depends fundamentally on the success of its customers. If a major borrower gets into trouble because it is unable to service a loan, the bank may find itself in serious trouble as well. So, the bank’s loan officer must be a financial counselor to customers as well as a conduit for their loan applicants. 3. Can the bank perfect its claim against the assets or earnings of the customer so that, in the event of default, bank funds can be recovered rapidly at low cost and with low risk? While large corporations and other borrowers with impeccable credit ratings often borrow unsecured, with no specific collateral pledged behind their loans except their reputation and ability to generate earnings, most borrowers at one time or another will be asked to pledge some their assets or to personally guarantee the repayment of their loans. Getting a pledge of certain borrower assets as collateral behind a loan really serves two purposes for a lender. If the borrower cannot pay, the pledge of collateral gives the lender the right to seize and sell those assets designated as loan collateral, using the proceeds of the sale to cover what the borrower did not pay back. Secondly, collateralization of a loan gives the lender a psychological advantage over the borrower. Because specific assets may be at the stake a borrower feels more obligated to work hard to repay his or her loan and avoid losing valuable assets. The most popular assets pledged as collateral for bank loans are- Accounts Receivable, Factoring, Inventory, Real Property, Personal Property, Personal Guarantee etc. . d. Loan Review: Banks today use a variety of different loan review procedures; nearly all banks follow a few general principles. These include: 1)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Carrying out reviews of all types of loans on a periodic basis- for example, every 30, 60, or 90 days the largest loans outstanding may be routinely examined, along with a random sample of smaller loans. 2)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Structuring the loan review process carefully to make sure the most important features of each loan are checked. )  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Reviewing most frequently the largest loans, because default in these credit agreements could seriously affect the bank’s own financial conditions. 4)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Conducting more frequent reviews of troubled loans, with the frequency of review increasing as the problems surrounding any particular loan increase. 5)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Accelerating the loan review schedule if the economy slows down or if the industries in which the bank has made a substantial portion of its loans develop significant problems. 3. e. Handling Problem Loans: Inevitably, despite the safeguards most banks build in their lending programs, some loans on a bank’s books will become problem loans. Usually this means the borrower has missed one or more promised payments or the collateral pledged behind a loan has declined significantly in value. The process of recovering the bank’s funds from a problem loan situation- suggests the following key steps: 1)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Always keeps the goal of loan workouts firmly in mind: to maximize the bank’s chances for the full recovery of its funds. )  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The rapid detection and reporting of any problems with a loan are essential: delay often worsens a problem loan situation. 3)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Keep the loan workout responsibility separate from the lending function to avoid possible conflicts of interest for the loan offers. 4)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Estimate what resou rces are available to collect the troubled loan. 5)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Loan workout personnel should conduct a tax and litigation search to see if the borrower has other unpaid obligations and many other processes. CREDIT MANAGEMENT: POLICY PROCEDURES Introduction: In general, a banking system aggregates a high number of low value deposits to fund enterprises with a smaller number of high value loans. This intermediation through a well functioning bank helps to achieve some economic benefits for the depositors, the borrowers and above all — the economy in the following ways: The depositors: †¢ Higher return †¢ Lower risk †¢ Greater liquidity The borrowers: †¢ Availability of fund for all credit worthy borrowers †¢ Thus allows to enterprises grow and expand The economy Economic growth is maximized as the banks channels the country’s scare financial resources into those financial opportunities with maximum return †¢ Thus profitable enterprises receive funding, grow and expand. †¢ Loss making enterprises are refused funding and allowed to go out of the business – thus saving the economy from drainage of resources. The bank must allocate loans effectively for achieving these broa d objectives of the economy and the pre-requisites are: †¢ Banks are able to identify reliably those enterprises that can repay their loans. Banks allows loans to those enterprises likely to yield high return and deny loan to those likely to yield low or negative returns. While identifying profitable enterprises, the bank – in fact – identifies risks of the borrower and business in order to allow loan in the context of its risk – return profile. Credit risk management (CRM) is a dynamic process, which enables banks to proactively manage loan portfolios. Four major areas of CRM are: †¢ Policy – lending guidelines †¢ Procedure – evaluating viability and associate risks of business enterprises. Organizational structure – segregation of risk taking and risk approving authority †¢ Responsibility – decision making and accountability A clear understanding of the four areas are crucial for maximizing bank’s earning by carefully evaluating credit risks and attempting to minimize those risks. 4. a. Policy objectives: 1) Maximize Bank’s earning from loan portfolio 2) Improve quality of loan portfolio to maximize earnings by: a) To keep non-performing assets below 10% b) Arresting new loans to become classified. ) Utmost emphasis on loan sanctioning is to be given in order to improve quality of the loan portfolio. Credit facilities are to be considered solely on viability of business / enterprises / project / undertaking having adequate cash flows to adjust the loans, and management capacity of the borrower to run the business profitably. 4) Evaluate credit risks before sanctioning, which may hamper generation of the projected cash flows of the borrower and might delay or hinder repayment of bank’s loan. ) Monitoring continuously performances of the financed projects / business / enterprises will be bank’s main trust for ensuring repayment of the loan, and receiving early warn ing (EL) for taking timely corrective measures. 6) Price the loans on the basis of loan pricing module of the bank focusing on risk rating of the borrower. 7) Strict adherence to Bangladesh Bank’s policy guidelines 4. b. Lending guidelines As the very purpose bank’s credit strategy is to determine the risk appetite of the bank, so bank’s focus should be to maintain a credit portfolio to keeping in mind of our risk absorbing capacity. Thus its strategy will be invigoration loan processing steps including identifying, measuring, containing risks as well as maintaining a balance portfolio through minimizing loan concentration, encouraging loan diversification, expanding product range, streamlining security, insurance etc. as buffer against unexpected cash flow. Types of credit facilities Bank will go for: †¢ Term financing for new project and BRME of existing projects (Large, Medium, SE) †¢ Working capital for industries, trading, services and others (Large, Medium, SE) †¢ Import and export Finance Lease Finance †¢ Consumer Finance †¢ Fee Business †¢ Islamic mode of finance Single borrower/ Group limits / Large Loans / Syndication The limit for single client / group under one obligor concept will be as under: 1. The total credit facilities by a bank to any single person or enterprise or organization of a group shall not any point of time exceed 35% of the bank’s total capital sub ject to the condition that the maximum outstanding against fund based financing facilities (fund facilities) shall not exceed 15% of the total capital. 2. Non-funded credit facilities, e. g. etter of credit, guarantee etc. can be extended to a single large borrower. But under no circumstances, the total amount of the funded and non-funded credit facilities shall exceed 35% of bank’s total capital 3. However, in case of export sector, single borrower limit shall be 50% of the bank’s total capital. But funded facilities in the form of export credit shall not 15% of the total capital   Large loan 1. Loan sanctioned to any individual or enterprise or any organization of a group amounting to 10% or more of bank’s total capital shall be considered as large loan. 2. The bank shall be able to sanction large loans as per the following limits set against their respective classified loans: |Rate of net classified loans |The highest rate fixed for large loans against bank’s total | | |loans advances | |Up to 5% |56% | |More than 5% but up to 10% |52% | |More than 10% but up to 15% |48% | |More than 15% but up to 20% |44% | |More than 20% |40% | 3. In order to determine the above maximum ceiling for large loans, all on-funded credit facilities e. g. letter of credit, guarantee etc. shall also be considered to arrive 50% credit equivalent. However the entire amount of non-funded credit facilities shall be included while determining the total credit facilities provided to an individual or an enterprise or an organization or a group. 4. A Public Limited Company, which has 50% or more public share holdings, shall not be considered as an enterprise / organization of any group. 5. In case of credit facilities provided against government guara ntees, the aforementioned restrictions shall not apply 6. In the case of loans backed by cash and excusable securities (e. g. FDR), the actual lending facilities shall be determined by deducting the amount of such securities from the outstanding balance of the loans. 7. Banks shall collect the information to the borrowers from Credit Information Bureau (CIB) of Bangladesh Bank before sanctioning, renewing or rescheduling loans to ensure that credit facilities are not provided to defaulters. 8. Banks shall perform Lending Risk Analysis (LRA) before sanctioning or renewing large loans. If the rating of an LRA turns to be â€Å"marginal†, a bank shall not sanction large loan, but it can consider renewal of an existing large loan taking into account other favorable conditions and factors. However, if the result of an LRA is unsatisfactory, neither sanction nor renewal of large loans shall be considered. 9. While sanctioning or renewing large loan, a bank shall assess borrower’s overall debt repayment capacity taking into consideration the borrower’s liabilities with other banks and financial institutions. 10. A bank shall examine its borrower’s Cash flow Statement, Audited Balance Sheet, income Statement and other financial statement to make sure that the borrower has the ability to repay the loan. Term Financing and Syndication Like large volume of loan, long term financing is one of the riskiest areas of the bank because of long duration of repayment. Long duration casts uncertainties on repayment as variable with which financial and other projections are made very widely in a dynamic global economic scenario. Thus utmost care is to be exercised while considering long term financing †¢ Long term relationship with the borrower is prerequisite for considering term financing †¢ Due diligence is to be exercised for accessing viability of the projects in terms of Management ability, Market gap, Technical suitability, Financial viability. †¢ Information on projects should be adequate and reliable †¢ Minimum information for project viability analysis is to be given. Syndication Syndication means joint financing by more than one bank to the same clients against a common security basically, to spread the risk. It also provides a scope for an independent evaluation of risk and focused monitoring by the agent / lead bank. In syndication financing banks also enter into an agreement that one of the lenders may act as Lead Bank, who has to co-ordinate the activities at various stages of handling the proposal i. e. appraisal, sanction, documentation sharing of the security, disbursement, inspection, follow – up, recovery etc. it may also call meetings of syndication members, whenever necessary to finalize any decision Discouraged business types In the context of present economic situation vis-a-vis government policy as well as market scenario, the following industries and lending activities are considered as discouraged †¢ Military Equipment / Weapon Finance †¢ Highly leveraged Transactions †¢ Finance of speculative business Logging, Mineral Extraction/ Mining or other activity that is ethically or environmentally sensitive †¢ Lending to companies listed on CIB black list or known defaulters †¢ Counter parties in countries subject to UN sanctions †¢ Share lending †¢ Taking an equity stake in borrowers †¢ Lending to holding companies †¢ Bridge loans relying on equity / debt issuance as a source of repayment Loan facility parameters Size: Funded: maximum 15% of Bank’s total capital : Funded + Non Funded: 1)  Ã‚  Ã‚  Ã‚  Ã‚   Shall not exceed 35% of bank’s total capital 2)  Ã‚  Ã‚  Ã‚  Ã‚   Maximum 50% of Bank’s total capital for export sector. (Funded facility shall also not exceed 15% of bank’s total capital). Tenor: Short term: Maximum 12 months Medium Term: Maximum 5 years   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Long Term: Maximum 15 years Margin: To be determined by Banker Customer relationship and nature of business. Security: Return of Banks funding to any business is ensured primarily on the cash flow of the business. A smooth flow of cash in the business requires efficient management competence in conducting the business in a given market. However as the market never remains stable owing to various uncontrollable factors, the continuity of well-managed business cash flow is difficult to visualize in the long run. As such to ensure realization of Banks finance in case of any eventuality, other adequate security coverage deemed necessary with a view to protects interest of the bank. General Covenants Bank shall not extend any credit facility to any defaulter as defined in the bank company act 1991(clean CIB report required. ) †¢ The borrower shall have valid Trade license, †¢ In case of partnership firm there must be a partnership deed duly notarized / registered. †¢ Limited Company must be registered with the Registrar of Joint Stock Company. †¢   Directors and other loans will be subordinated to Dhaka Banks loan. Directors loan (if any) will be interest free and no dividend will be declared/paid before full adjustment of Term Loan of Dhaka Bank. †¢ The borrower shall submit annual audited/un-audited/projected financial statements regularly where applicable. †¢ The borrower shall maintain current ratio of not less than 1. 5 times.. The borrower shall obtain and maintain in full force and effect all Government of Bangladesh (GOB) authorizations, licenses and permits required to implement and operate Borrowers business. †¢ The borrower shall maintain all insurance as detailed in Loan Documents. †¢ The borrower shall maintain satisfactory swing/turnover of the limit in case of continuous loans/advance. †¢ The borrower shall pay all fees , duties , taxes etc, that are due to the Government of Bangladesh (except where waivers or deferrals have been gr anted by Government of Bangladesh) when due. †¢ The borrower shall not create any charge, mortgage or any encumbrances of any other security interest over any of its assets without the prior written consent of the Bank. The borrower shall not avail any credit facility from other source without the prior written consent of the bank. †¢ The borrower shall not make any amendment/alteration in the Company’s Memorandum Articles of Association without obtaining prior approval of Dhaka Bank Ltd in writing. †¢ The borrower shall not furnish any corporate guarantee to other firm/company without Banks permission. Events of Default Bank will have the right to call back the Loan/Advance in the event of default under the following circumstances: †¢ Failure to repay †¢ Breach of Covenants of the loan agreement. †¢ Bankruptcy or liquidation or insolvency event affecting the Borrower. †¢ Occurrence of a material adverse change in the financial position of the Borrower. Any change in GOB directives, which in the opinion of the Lenders would prejudice the Borrowers ability to meet the financial obligations in respect of this facility, †¢ Any security interest over any asset of the Borrower becomes enforceable or any execution or distress is levied against or any person is entitled to or does take possession of the whole or any part of the assets or undertakings. Facility Wise Charge Documents %3 |L/C |LTR |BG |TL |CC Hypo/CC Pledge (Key Stock to | | | | | |Bank) | |1. Promissory Note|1. Promissory Note |1. Promissory Note |1. Promissory Note |1. Promissory Note | |2. Letter of |2. Letter of Undertaking |2. Letter of Undertaking |2. Letter of Undertaking |2. Letter of Undertaking | |Undertaking | | | | | |3. A/C Balance |3. A/C Balance confirmation |3. A/C Balance confirmation |3. A/C Balance confirmation |3. A/C Balance confirmation Slip | |confirmation Slip |Slip |Slip |Slip | | |4. Letter of |4. Letter of Continuity |4. Letter of Continuity |4. Letter of Continuity |4. Letter of Continuity | |Continuity | | | | | How to cite Loans Advances of Dhaka Bank, Papers

Sunday, December 8, 2019

Business Process and Technology Alignment †Free Samples to Students

Question: Discuss about the Business Process and Technology Alignment. Answer: Introduction With the ramified economic changes and complex business structure, each and every organization is running its business effectively to meet their objectives and goals. In this research paper, Rio Tinto Company has been taken into consideration. . It is an Australian- British company also known as one of the worlds largest metals and mining corporations. This company is engaged in providing the mining related works around the globe to increase its turnover. However, due to the non-effective communication channel, it has faced various critical issues in its business plans and communication channel. In addition to this, management department of the company has passed the proposal to adopt the cyber computing enterprises resources planning in its business functioning. It will help employees and management department to communicate with each other. It is evaluated that vendors of the organization faces several issues in the supply chain management program and logistic works. Thus, by adopt ing proper cyber computing enterprises resources planning in its business functioning will surely increase the overall outcomes of the Rio Tinto business. With the ramified changes in business functioning of Rio Tinto, it needs to be proactive before implementing new cyber computing enterprises resources planning in its value chain activities. In addition to this, vendors and other could also follow automated cyber computing enterprises resources planning in their communication channel to perform their assigned works. There are several benefits which will be seen such as establishment of automation in business, reduce the complex business structure, set new business structure and restructuring of business. This research paper focus what types of problems and issues will be faced by Rio Tinto while adopting new cyber computing enterprises resources planning in its value chain activities. However, need to adopt this new cyber computing enterprises resources planning in business of Rio Tinto arises due to its less effective internal control system and increased cost occurred from recitative business functioning. Thus, Rio Tinto by adoptin g proper cyber computing enterprises resources planning in its value chain activities in its business could easily increase the overall outcome of the business and establish automation in its business functioning. Research questions What is the significance of adopting the cyber computing enterprises resources planning in business? How Rio Tinto could increase the business efficiency by adopting cyber computing enterprises resources planning in its value chain activities? What are the strategies and business problems which would be faced by organizations before installing cyber computing enterprises resources Theoretical frameworks It is evaluated that due to the complex business structure and increased needs of adoption of the cyber computing enterprises resources planning in business, Rio Tinto should use this cyber computing system in its value chain activities. It will increase the overall productivity and effective communication in the business of Rio Tinto. It is evaluated that clients in Australia and other current countries are more inclined towards the organizations that have adopted the advanced technologies in their business. Rio Tinto has strong brand image and in order to keep its sustainable business, it should adopt newly adopted cyber computing enterprises resources planning in its value chain activities. This will establish automation in business and increase the overall outcomes of the organization. The main benefit will be related to communicating with the vendors and implementing logistic supply chain with outsiders. This below given chart will reflects the actual process system which Rio Tinto will follow after adopting the cyber computing enterprises resources planning in its business (Rizzo, van Erp, Troncy, 2014). It is evaluated that successful implementation of cyber computing enterprises resources planning in its value chain activities require assessment of the internal and external factors of the business. It is considered that Rio Tinto has faced high amount of loss in its business due to no time delivery of its raw material in its business. In addition to this, communication channel and public relation of the Rio Tinto is also not that effective. It has increased its business functioning cost and increased the complex set of activities. Rio Tinto by adopting this proper level of cyber computing enterprises resources planning in its value chain activities could establish automation and mitigate various manual works. It will not only save the time of the process functioning but also reduce the cost of the production of the business (Ram Corkindale, 2014). This new Cyber computing system enterprises resources planning is consisted of the web program which will help company to increase its communication effective and increase the overall outcomes of the business. For instance, enterprises resources planning accompanied by the cyber computing will assist Rio Tinto to generate an automation channel in its business. It will allow suppliers to identify the Economy order quantity of the business at which it could allow business. It has been observed that if Rio Tinto use cyber system then it will save the time and cost of the business. Another example is related to vendors business functioning. Rio Tinto by adopting enterprises resources planning accompanied by the cyber computing could establish dashboard for its business. This dashboard mechanism will allow suppliers to create their own username and login ID which will be used by suppliers to supply required mining raw material to Rio Tinto. However, mining raw material orders will be plac ed by the Rio Tinto automatically at the time when company reaches the economic order quantity. This enterprises resources planning accompanied by the cyber computing showcases how company could establish automation in business and increase the business efficiency in determined approach (Fink, 2013). It is evaluated that Rio Tinto could create core competency in market by using cyber computing enterprises resources planning. It is evaluated that the main outcomes of using cyber computing enterprises resources planning in business of Rio Tinto would be related to creating core competency in this mining industry. Rio Tinto could increase the overall productivity and efficiency of business by using this cyber computing enterprises resources planning in business. This will establish automation in the value chain activities and will result to save in time and cost of the business. It is considered that the process mining system which connects all the vendors and stakeholder with the organization will also be strong after adopting increase the business efficiency by adopting cyber computing enterprises resources planning (Erickson, 2005). This system will help Rio Tinto to increase its productivity and efficiency of the business. It will increase the overall productivity and efficiency of the business. It is evaluated that this cyber computing system will be installed in value chain activities of Rio Tinto and all the employees needs to adapt with the newly advanced system of the business. This will requires training and development program of the business which will make employees more employable. Company needs to hire more experts employees in the business before installing new cyber computing system in business. Strategies and long term plans in Rio Tinto will be taken by the management department. In order to increase the effectiveness of cyber computing system of the Rio Tinto will be done by entering into strategic alliance with other organizations. It is evaluated that Rio Tinto has its business chain around the globe and by adopting cyber computing enterprises resources planning it could establish proper level of nexus between its all value chains. It will help management department to command all of its units under one surveillance channel (Thomson Singh, (2011). This one system will increase the productivity of all the department of the Rio Tinto and establish effective level of nexus among all the units. This cyber computing system will create web mail chain which will establish nexus for the entire department to communicate with each other. Nonetheless, this cyber computing system will be accompanied by high amount of cost of investment in the initial time which is initial cost. Th ere are several factors which will affect the decisions to adopt the cyber computing enterprises resources planning in business such as existing offering of rivals, technologies adopted by organization and proposed business plans of organization. This information could be extracted from the annual report of company. Therefore, it could be inferred that Rio Tinto should use PESTLE analysis, SWOT analysis and balance score card approach before implementing the effective strategic business plans. These strategies and business plans will help business organization to evaluate the key business factors of business to identify the key factors of business. These strategic business plans will surely showcase the best possible way and mitigate the problems associated with adoption of cyber computing enterprises resources planning in business. Thus, it is clear to understand that Rio Tinto could use this PESTLE analysis, SWOT analysis and balance score card approach for taking strategic busine ss decision. These strategic tools assist Rio Tinto to identify all the internal and external factors of the business. This will help company to prepare proper level of strategic plans in business. It is observed that installing cyber computing enterprises resources planning is related to strategic alliance with other organizations. It is evaluated that most of the respondents have strongly agree with the fact that Rio Tinto should use strategies and system functioning to increase the effectiveness of cyber computing enterprises resources planning in its business. In addition to this, the main problem arises due to the internal and external factors of business. It is evaluated that if Rio Tinto installs cyber computing enterprises resources planning in its business functioning then it may result to increase the complexity, employee turnover increment, big level of cash outflow from the business (Pridmore, et al. 2014). These are the biggest disadvantages for the Rio Tinto while adopting new cyber computing system. After evaluating all the data and given details of the study, it is evaluated that Rio Tinto has been facing various issues in its business functioning such as less effective communication, low productivity of the business, increased complexity with the increased number of employees. It is evaluated that literature review prepared in this research paper has shown that Rio Tinto needs to hire more experts employees before implementing new cyber computing enterprises resources planning method. This will not only increase the overall effectiveness of the business but also reduce the complexity of the business. In addition to this, company also needs to restructure its business working by following innovative designed method. This will allow company to create a special dashboard for the management department, employees and vendors for their work. It will increase the efficiency of the value chain activities of the Rio Tinto. In addition to this, if company needs to arrange other innovati ve mechanism of work in its business to make more effective output of the business then it will have to invest more funds in entering into strategic alliance with ITC Company. This research paper has shown that Rio Tinto needs to evaluate all the internal and external business factors before installing cyber computing enterprises resources planning method. The main problem would be related to increased employees turnover, low level productivity and arrangement of the resources for the business. Therefore, clear understanding on the critical concepts of the cyber computing enterprises resources planning method and its implementation of the same in the business is the clear point. This shall serve as the base for the making extensive research and identifying the specified research questions in the first section (Ravasan Mansouri, 2014). It is evaluated that phenomenology in the research is based on various realities and research subjects. It is considered on the basis of the independent experience and knowledge of the persons conducting the research. This research philosophy is based on the particular experience and empirical science not on human experience. This philosophy or phenomenology in the research will be used to conduct the specified research on the research problems and helps researchers to identify the problems and issues faced by Rio Tinto while implementing cyber computing system enterprises resources planning in its business functioning. The phenomenology in this research is prepared on the multiple research subjects which is evaluated from the different individual and independent experience. It has two unfolding research parts. First is related to positivism i.e. defense with the phenomenology. It put emphasis up on the empirical scenes not the practice human experience In this research, various research methods and approach have been followed. However, research approaches followed in this research paper helps users to evaluate all the problem and issues faced by Rio Tinto in adopting cyber computing system has been discussed. Deductive approach will help researcher to collect and analysis the information through existing theory. It helps in meeting the research objectives and identifies the real time information from collected data. This approach enables researchers to observe all the existing theories and practices on these particular problems which were faced by other organization while adopting cyber computing system in their business. This project assists researcher to analyzing all the required data and information to make researcher to study validity of the collected information. All the information and data collected is tested through hypothesis generation. Inductive approach is not utilized in this research since data collected without rele vancy will be of no use in this research paper. However, hypothesis test will measure the genuinely of the collected data and will help research to trust on the collected data to the particular extent There are several data collection methods such as primary and secondary data collection methods which are used by researcher to collect the required amount of information. The primary data collection methods which will be used by researchers are observation, questionnaire, meeting and direct meeting. In addition to this, other secondary data collection methods are using annual report, web information and other documents to increase the overall effectiveness of the research. In this research, quantitative research methods used in this research deals with the statistic and logical data of the company. This will allow researcher to put focus on the downfall and increase in revenue and market share of the company after and before installing cyber computing system. This will reflect the quantitate impact of the change in business structure of the Rio Tinto on its earning and clients inclination towards the business. On the other hand, qualitative research focuses on experience, demonstrat ion and paradigm of the research context. In this research, quantitative data have been used which will be reflected by using graphs, charts and tables. It will showcase all the required information about why Rio Tinto should adopt cyber computing system in its business. Nonetheless, secondary data sources such as journals and other official gazettes have not been used in this research paper due to its time bound limitation in business (Thomson Singh, 2011). In this research paper, case study analysis research strategy has been taken into consideration. This research strategy focuses on identifying the small group of people in Rio Tinto and clients. This observation research strategy program will give deep study on the problems and opportunity which will be seen by Rio Tinto in the business after adopting cyber computing system. Apart from that, survey is another strategy of this research which is used to collect the data from the respondent. This survey is used by preparing different questionnaire for the respondent to identify their choices in particular situation. This questionnaire is designed in the self-administered format to identify the actual view points of the respondent with the particular asked questions. All the data and information collected in this research will help researcher to collect the required amount of information to prepare this research paper in best effective manner. Sampling and sample size In this research purposive research technique have been used which is used to collect the specific sample units for the research. This technique selects the sample data for the research which are more suitable and knowledge to prepare more accurate research. These samples are collected on the random basis which in which 50 respondents is selected for the sample survey. These 50 respondents are the employees and key managerial persons of the Rio Tinto. These persons will provide the information regarding the problems and issues which Rio Tinto will face while adopting the new cyber computing system in business. This technique is time saving and involve larger sample size for preparing the research sample. This survey will showcase why Rio Tinto needs to install new cyber computing enterprises resources planning in its business. This stratified and random sample survey has been used. The sample size of 50 respondent have been selected which showcase the productivity and overall turnove r of the business. It is evaluated that quantities research method deals with the statistics such as overall revenue, market share and net profit earned by Rio Tinto after implementation of the cyber computing system. This research method requires evidences and expiation on the research context which explains paradigm of the research. The interview research method used to evaluate the choices of the respondents which represent qualitative data on the adoption of the cyber computing system in business of Rio Tinto. All the empirical data and numerical information of the business will showcase whether adopting cyber computing enterprises resources planning in Rio Tinto will be beneficial for the organization or not. The finding obtained from this research analysis would be used to create better understanding by using proper charts, tables and graphs in business. Thus, quantitative method of analysis shall be employed in this research to identify the proper research methods in business. Qualitative resear ch methods shall be utilized to evaluate the limitation and problems of adopting cyber computing system in business of Rio Tinto. In this research descriptive research method helps in analyzing the current situations and provides solutions accordingly. It assists researcher to evaluate the current market situations and associated problems which Rio Tinto will face while adopting cyber computing system in business of Rio Tinto Descriptive research method. In addition to this, exploratory research showcases the control actions of the respondents rather than the studies of the data obtained through various resources. These both types of the research methods help researchers to identify the proper value methods and increase the overall value of the research. For instance, descriptive research method focuses on the current events and associated factors of the topic. On the other hand, exploratory research focuses on using journals and existing researchs to identify the outcomes of the research. There are several strategies for adopting the cyber computing system in business of Rio Tinto. The main variables of the research are related to how Rio Tinto could evaluate all the problems and issues before adopting this innovation. However, with the ramified changes in clients needs and demand, the outcome of cyber computing system in business of Rio Tinto may decrease. These all variable depends upon the use of innovative technologies and system in business and advanced strategies followed by other rivals in market. If Rio Tinto wants to increase its overall efficiency of the business then hiring of experts staffs and arrangement of the training for the employees will also be done in organization (Hrabanski, 2013). It is evaluated that 25% respondents are agree that adopting cyber computing enterprises resources planning system in Rio Tinto will increase the efficiency of the business. On the other hand, 15% are strongly disagreeing with the same. Furthermore, 20% are neutral with the same statement of the research. 20% of the respondent are disagree whether the adopting cyber computing enterprises resources planning system in Rio Tinto will increase the efficiency (Ramakrishna, 2017). It is considered that 20% respondents are strongly disagree that Hiring of IT experts required for the success of cyber computing system implementation in Rio Tinto will increase the efficiency of the business. On the other hand, 15% are strongly disagreeing with the same. Furthermore, 20% are neutral with the same statement of the research. 20% of the respondent are strongly agree whether the adopting cyber computing enterprises resources planning system in Rio Tinto will increase the efficiency (Fink, 2013). It is considered that 25% respondents are strongly agree that there will be increase in efficiency of the communication channel by using enterprises resources planning cyber computing system. Apart from that, 25% are strongly dis agree with the same. Furthermore, 10% are dis agree with the same statement of the research. 15% of the respondent are strongly agree whether increase in efficiency of the communication channel by using enterprises resources planning cyber computing system (Thomas, Silverman Nelson, 2015) It is identified that using of cyber computing system in business will increase the brand image of company. 30% of the respondent are strongly agree with the statement. On the other hand, 25% respondents are neutral on this. 15% of the respondent are disagree and inferred that it will increase the complexity of the business. Restructured of business process before implementing cyber computing system enterprises resources planning It is identified that restructured of business process before implementing cyber computing system enterprises resources planning is required. 30% of the respondent are strongly agree with the statement. On the other hand, 25% respondents are neutral on this. 15% of the respondent are disagree with the re-engineering of business (Greenhalgh, 2014). It is considered that 20% respondents are strongly disagree that Entering into strategic alliance with the other IT Company to increase the efficiency of the business of Rio Tinto. 25% are strongly disagree. Furthermore, 25% are neutral with the same statement of the research. 20% of the respondent are strongly agree whether the adopting cyber computing enterprises resources planning system in Rio Tinto will increase the efficiency. It is considered that 25% respondents are strongly agree that there will be increase in Harmonize its IFRS rules and regulation with the GAAP standards by using enterprises resources planning cyber computing system. 25% are strongly dis agree with the same. Furthermore, 10% are dis agree with the statement that by adopting cyber computing system company could harmonize its IFRS rules and regulation with the GAAP standards. 15% of the respondent are strongly agree whether harmonize its IFRS rules and regulation with the GAAP standards will be done by using enterprises resources planning cyber computing system (Rajnoha, et al. 2014). This research was prepared by collecting required data from the respondents highly denominated by the experienced male staffs of the Rio Tinto. This research was participated by the men and women over the ages of 50 years. Most of the participants of this research are having less than 1years. It is evaluated that the main significant of adopting cyber computing system in business of Rio Tinto would related to increased business efficiency and increased productivity of the business (Fadlalla Amani, 2015). Adoption of cyber computing enterprises resources planning in Rio Tinto Company is done with a view to establish automation in its existing business functioning (Argent, 2013). It is evaluated that Rio Tinto has faced issue of cumbersome process and complexity while running its business on domestic and international level. Nonetheless, the main issues are related to establishment of the communication between its employees and vendors around the globe (Fonseca, 2010). Rio Tinto has taken its business worldwide. Therefore, adoption of cyber computing enterprises resources planning in Rio Tinto Company is required to run the business effectively. In addition to this, if company fails to achieve its set targets and goals then these newly advanced cyber computing enterprises resources planning could increase the overall efficiency of the business (Panayiotou, et al. 2015). Management department of Rio Tinto also needs to be proactive before implementing new cyber computing enterprises resources planning in its value chain activities. They will have to arrange special training for the employees and vendors before accepting this new cyber computing enterprises resources planning in its value chain activities, It will assist vendors and other stakeholders to increase the business efficiency of the business. It would also benefits themselves by using this cyber computing enterprises resources planning in their communication channel. There are several benefits which will be seen such as establishment of automation in business, reduce the complex business structure, set new business structure and restructuring of business There into strategic alliance with are several strategies and strategic alliance which should be used by Rio Tinto before implementing cyber computing enterprises resources planning in its business functioning. It is considered that entering the ITC Company will increase the overall productivity and increase the number of efficient number of employees in business. The Rio Tinto company has been running its business on international level and has been facing complex business structure due to cumbersome process. In addition to this, clients in Australia and other current countries are more inclined towards the organizations that have adopted the advanced technologies in their business (Parthasarathy Sharma, 2014). It is considered that 25% of the respondent are strongly agree that Management department of the Rio Tinto needs to change the business structure of the company. However, the information which could be used while adopting cyber computing enterprises resources planning in the value chain activities of the Rio Tinto is related to taking consent from the stakeholders, identifying the new market functions and rivals offering in market (Martin, and Rice, 2014). After evaluating the required data of this research paper, it is considered that this cyber computing enterprises resources planning in the business will require re-structure of business. If company could change its business structure or re-engineering of its business then it will increase the overall productivity and help company to create core competency in the market. It is evaluate that if Rio Tinto wants to adopt cyber computing enterprises resources planning in its business then it will bring automation and change in its existing business functioning. Therefore, it could be inferred that company needs to hire more experts IT employees who could operate this new system and could impart training to employees in effective manner (Gupta, et al. 2017). After evaluating all the collected data, it could be inferred that if Rio Tinto wants to cyber adopt computing enterprises resources planning then it will first have to enter into strategic alliance with IT Company. The communication channel established by the company is also not that effective currently which could be stronger by adopting proper level of cyber computing enterprises resources planning in their communication channels (Gupta, et al. 2014). It is considered that if company adopts this cyber computing enterprises resources planning in business then it will also help Rio Tinto to harmonize its IFRS rules and regulation with the GAAP standards in preparing its financial statement and reporting the same. The main outcomes of using cyber computing enterprises resources planning in business will be related to creating core competency in this mining industry. Rio Tinto could increase the overall productivity and efficiency of business by using this cyber computing enterprises resources planning in business (Jenkins, Yakovleva, 2016). After evaluating all the data and collected information, it could be inferred that adopting cyber computing enterprises resources planning in business is very crucial strategic decision. This Rio Tinto has not been using effective technologies in its business which has decreased its quality of the mining work. Thus, it could be inferred that if Rio Tinto could use these ERP cyber computing system then it will establish automation in its business and maintain effective communication for its business (Chiang, et al. 2014). This research follows all the ethical consideration and this researcher has complied with all the legal rules and regulations in determined approach. This research shall not involve texts and any other comments which oppose anything against social, culture and political issues. In addition to this, researcher will make sure that all the data privacy rules and personal details will be kept safe. This researchers outcomes and study prepared will be kept only in university and will not be used for any personal purpose. After evaluating all the details and study, it is considered that all the required consent have been taken before implementing this research and plagiarism issues have also been evaluated in determined approach. In addition to this, respondents personal right has also been taken to save them in efficient manner (Tallon, et al. 2016). This research is accompanied by utilizing the primary data collection methods. This research has little limitation such as financial budget problems, expanding the research and lack of understanding has been taken into consideration. In this research assessment and evaluating the research questionnaire has consumed lot of time. In this research, qualitative and quantitative data have been selected which increases the overall efficiency of the research and help researcher to increase the overall efficiency of the research paper. In this research, all the ethical considerations have been taken but uses of journal articles and previous theories have been rejected due to the time bound limitation. In addition to this, other research problems and limitation of the budget are also the main problem of this research program. The data collected by using questionnaire and other methods have been analyzed through the quantitative method. There are several factors which have also been analyzed such as inadequate data, inability to control the environmental factors, time effective changes and lack of resources. Therefore, this research needs to overcome these barriers and hurdles to improve the quality of this research paper. In future, both quantitative and qualitative methods would be used to improve the research clarity. Further research could also be used as secondary methods to collect other required information on the same research subject (Mital, Pani Ramesh, 2014). Conclusion This research has been prepared on the adoption of the enterprises resources planning cyber computing system in business functioning of Rio Tinto. This research has reflected what types of the problems and issues will be faced by the management department of Rio Tinto for adopting new enterprises resources planning cyber computing system in business functioning. The phenomenology and deductive approach have been used in this research focus on analyzing the research outcomes. The data has been collected from the real time respondents through primary data collection methods. The main survey method is based on the questionnaires which have been filled from 50 respondents. These respondents have given their views points on the particular questions asked in this research and reflected all the required information to identify whether enterprises resources planning cyber computing system should be adopted in the business functioning of Rio Tinto. These all collected data have been analyzed with evaluating all the quantitative data analyze methods and descriptive approach. This helps in developing strategic view points on the facts that enterprises resources planning cyber computing system will increase the efficiency of the business. This conclusion part of this research provides the complete answer to decide whether adopting enterprises resources planning cyber computing system will be fruitful for the business functioning of the Rio Tinto (Ali Miller, 2017). Cyber computing enterprises resources planning is considered to be the best innovative business system which increases the overall outcomes and efficiency of the business. It is evaluated that Rio Tinto has faced various issues and program such as increased business cost, less effective value chain activities and destruction of its communication channel. If Rio Tinto uses cyber computing enterprises resources planning in its business then it will easily establish effective solution methods in business. It is evaluated that company could increases the overall outcomes of the business by using this cyber computing system. This is evaluated that installing cyber computing enterprises resources planning in business will requires proper level of strategic planning and use of business tools. This will help organization to increase the overall productivity. It is considered that If Rio Tinto properly use these strategic tools before installing cyber computing strategic alliance tools then it will help company to restructure its business in best efficient manner. In addition to this, if these proper strategic tools are used in business then company could easily increase the overall outcome of the business. The analysis revealed that brand image of an organization creates a positive impact on customer perception meeting their satisfaction level. In order to maintain the positive image the management would take effective decisions that lead to future development. Thus, the second research question has been answered. It is considered that Rio Tinto should use PESTLE analysis, SWOT analysis and balance score card approach to install cyber computing system. These strategies and business plans will help business organization to evaluate the key business factors of business to identify the key factors of business. If management department could identify all the internal and external factors of business then 4they could easily evaluate what kind of problems and Issues Company would face in business. Nonetheless, all the data collected from the questionnaire survey has shown that Rio Tinto could use these strategic plans and business activities to evaluate whether company should adopt this cybe r computing system or not. This research has revealed that Rio Tinto has faced various issues and challenges due to its not advanced business functioning. It is considered that management department has proposed this cyber computing system in its business due to reduce the complexity of the business. It has increased its overall efficiency of the business and establish automaton in the business. However, company has faced several key variables such as internal and external factors business which arise due to systematic and unsystematic risk of the business. These business arise due to the increased premium of the organization and the complexity of the business functioning. The main recommendation is related to that company should follow proper structured program. Conducting meeting and organizing the proper general business functioning will help management department to evaluate all the associated problems of organization. In addition to this, the main point of business would be related to arrangement of the training and development program for the employees. Company should invest more funds in arranging employees training program to increase their adaptability with the newly advanced program. This will help employees to increase their overall output of the business. Moreover, company should also check the overall turnover increment. If company could implement proper level of strategic program and efficient business functioning then it will help management department to pursue the entire employee with the new changes and adapt them with the advanced technologies in organization. (Xu, 2015). It is evaluated that restructuring of the existing business process is the key pillar for adopting cyber computing enterprises resources planning. If company could follow these programs then it will result to following benefits such as increased overall turnover, business efficiency and less employees turnover in organization. This will change the existing business structure and will hire more experts employees to handle newly advanced adopted cyber computing system in organization. In addition to this, company needs to invest more funds in hiring more expert employees. It is further observed that if company needs to implement new strategic program and business restructuring program then it will make organizations more suitable for the new advanced enterprises resources planning in organization. Now in the end, after evaluating all the details and collected information, it could be inferred that if Rio Tinto could hire new IT experts in its business then it will help organization to easily adapt with the new advanced cyber computing system in organization. In addition to this, company also needs to evaluate the outcomes of other organizations who have adopted new cyber computing system in organization. This is evaluated that Rio Tinto has more than 1,12000 employees around the globe. If company uses this new advanced cyber computing enterprises resources planning in its business then it will bring several changes in organization. Employees of the company may also feel demotivated because of this new system. Therefore, arrangement of this training and development is the key aspect of the business development which will reduce the employees turnover of the organization. References Ali, M., Miller, L. (2017). ERP System Implementation in Large Enterprises-A Systematic Literature Review.Journal of Enterprise Information Management,30(4). Allen, D. E., Singh, A. K., Powell, R. (2013). Analyzing the return distributions of Australian stocks: the CAPM, factor models and quantile regressions.Global Business and Economics Review,15(1), 88-109. Awang Ollong, K., Ndzi, E. (2016). The Implementation of Corporate Social Responsibility Strategies by Extractive Multinational Corporations in Cameroon. Carrington, K., Hogg, R., McIntosh, A. (2015). The hidden injuries of mining: Frontier cultural conflict. InEnvironmental Crime and Social Conflict: Contemporary and Emerging Issues(pp. 241-264). Ashgate Publishing Limited. Carter, R. A. (2014). Digital Tools for Mines Help Maintain a Competitive Edge.Engineering and Mining Journal,215(4), 65. Chareyre, M., Boivin, S. (2014). Key Success Factors Deploying a Manufacturing Excellence Solution (Mesal) in Rio Tinto Alcan. InLight Metals 2014(pp. 471-475). Springer International Publishing. Chareyre, M., Boivin, S. (2014). Key Success Factors Deploying a Manufacturing Excellence Solution (Mesal) in Rio Tinto Alcan. InLight Metals 2014(pp. 471-475). Springer International Publishing. Chiang, W. C., Urban, T. L., Hu, J., Li, H., Xu, Y., Li, S. (2014). Interdisciplinary research in operations management.International Journal of Production Economics,147, 571-572. Enterprises resources planning system, 2017, retrieved on 2nd December, 2017, from https://www.google.co.in/url?sa=irct=jq=esrc=ssource=imagescd=ved=0ahUKEwjtpPTe5OPXAhWBu48KHTkeC7oQjxwIAwurl=http%3A%2F%2Fcreately.com%2Fblog%2Fdiagrams%2Fbusiness-process-modeling-techniques%2Fpsig=AOvVaw1vsEqeoRQkQgBBEQf2ZhpPust=1512044499327885 Erickson, F. (2005). Qualitative Methods in Research on Teaching. Occasional Paper No. 81. Fadlalla, A., Amani, F. (2015). A keyword-based organizing framework for ERP intellectual contributions.Journal of Enterprise Information Management,28(5), 637-657. Fink, A. (2013).Conducting research literature reviews: From the Internet to paper. Sage Publications. Fink, A. (2013).Conducting research literature reviews: From the Internet to paper. Sage Publications. Greenhalgh, T. (2014).How to read a paper: the basics of evidence-based medicine. John Wiley Sons. Gupta, H., Aye, K. T., Balakrishnan, R., Rajagopal, S., Nguwi, Y. Y. (2014). A study of key critical success factors (CSFs) for Enterprise Resource Planning (ERP) systems.International Journal of Computer and Information Technology,3(4), 813-818. Gupta, S., Gupta, S., Misra, S. C., Misra, S. C., Singh, A., Singh, A., ... Kumar, U. (2017). Identification of challenges and their ranking in the implementation of cloud ERP: A comparative study for SMEs and large organizations.International Journal of Quality Reliability Management,34(7), 1056-1072. Hrabanski, M. (2013). Private Sector Involvement in the Millennium Ecosystem Assessment: Using a UN Platform to Promote Market?Based Instruments for Ecosystem Services.Environmental Policy and Governance. Hrabanski, M. (2013). Private Sector Involvement in the Millennium Ecosystem Assessment: Using a UN Platform to Promote Market?Based Instruments for Ecosystem Services.Environmental Policy and Governance. Lee, K. H. (2017). Does size matter? Evaluating corporate environmental disclosure in the Australian mining and metal industry: A combined approach of quantity and quality measurement.Business Strategy and the Environment,26(2), 209-223. Mital, M., Pani, A., Ramesh, R. (2014). Determinants of choice of semantic web based Software as a Service: An integrative framework in the context of e-procurement and ERP.Computers in Industry,65(5), 821-827. Panayiotou, N. A., Gayialis, S. P., Evangelopoulos, N. P., Katimertzoglou, P. K. (2015). A business process modeling-enabled requirements engineering framework for ERP implementation.Business Process Management Journal,21(3), 628-664. Parthasarathy, S., Sharma, S. (2014). Determining ERP customization choices using nominal group technique and analytical hierarchy process.Computers in Industry,65(6), 1009-1017. Pridmore, J., Deng, J., Turner, D., Prince, B. (2014). Enhancing Student Learning of ERP and Business Process Knowledge through Hands-On ERP Exercises in an Introductory Management of Information Systems Course. InSouthern association for information systems conference (SAIS) 2014. AIS Macon, GA, USA. Rajnoha, R., Kdrov, J., Sujov, A., Kdr, G. (2014). Business information systems: research study and methodological proposals for ERP implementation process improvement.Procedia-social and behavioral sciences,109, 165-170. Ram, J., Corkindale, D. (2014). How critical are the critical success factors (CSFs)? Examining the role of CSFs for ERP.Business Process Management Journal,20(1), 151-174. Ramakrishna, H. K. (2017). Introduction. InMedical Statistics(pp. 1-2). Springer, Singapore. Ravasan, A. Z., Mansouri, T. (2014). A FCM-based dynamic modeling of ERP implementation critical failure factors.International Journal of Enterprise Information Systems (IJEIS),10(1), 32-52. Rizzo, G., van Erp, M., Troncy, R. (2014, May). Benchmarking the Extraction and Disambiguation of Named Entities on the Semantic Web. InLREC(pp. 4593-4600). Tallon, P. P., Coltman, T., Queiroz, M., Sharma, R. (2016). Business process and information technology alignment: construct conceptualization, empirical illustration, and directions for future research.Journal of the Association for Information Systems,17(9), 563. Thomas, J. R., Silverman, S., Nelson, J. (2015).Research methods in physical activity, 7E. Human kinetics. Thomson, D., Singh, M. (2011, December). An e-procurement model for B2B exchanges and the role of e-markets. InProceedings of 6th Annual CollECTeR Conference on Electronic Conference(pp. 3-4) Waller, S. (2017). The Digital Champion: Connecting the dots.IQ: The RIM Quarterly,33(2), 31. Xu, H. (2015). Business processes for enhancing coordination in supply networks.International Journal of Information Systems and Supply Chain Management (IJISSCM),8(2), 14-30.

Sunday, December 1, 2019

The Internet Essays (508 words) - Digital Technology,

The Internet The Internet The Internet, or ?net, is a vast network of computers that connects many of the world's businesses, institutions, and individuals. The Internet is composed of many parts, including the World Wide Web, FTP, IRC, Newsgroups, Gopher, WAIS, Archie, and of course Electronic Mail (Email). The Internet is mainly used for communication. Email is the most heavily used resource of the Internet- over 40 million email messages are sent through the Internet a day. The second most used resource, called the World Wide Web, or WWW, consists of pages of words, images, sounds, and video. The Internet is continuing to grow at 40% a year, with about 20 million users, mainly in USA, Canada, and Australia, but still many all over the world. You can do many things on the Internet, such as shop for just about anything, bank and manage money, watch and listen to live cable televison and radio broadcasts, talk to other users with voice like a telephone, conduct international meetings, and access all kinds of information on any subject imaginable. As mentioned earlier, the WWW consists of pages and pages of text, images, sounds, and video. Unlike pages in a book, there is no maximum size for a page, and there is HyperText Links. If you click on any one of these links, the computer will automatically go to the page specified by the link. The WWW is programmed in a computer language called Hyper Text Markup Language, or HTML. Searching the Web can be a difficult thing to do, or if you use a search engine, it can be really easy. Since so many new web pages are added to the Web a day, a very good index is hard to keep, and an alphabetical listing of millions of web pages would be almost impossible to navigate through. To help this problem, people developed search engines that search the Web for you. Some search engines, like Yahoo, search in a big web directory they have made of hundreds of thousands of web pages, that is organized like a phonebook. Other search engines, like Alta Vista, or Magellan, search in a list of Web pages it has created as it surfed the web all by it's self. People usually access the Internet through a computer using a device called a modem. Modems connect people to the ?net through telephone lines. Some companies, and the "heart" of the Internet, Use Fiber-Optic cables to connect. Fiber-Optic cabled are made of hair-thin strands of glass that carry information at the speed of light as pulses of light. Fiber-Optics are thousands of times faster than standard copper telephone lines. The Internet began in the 1960's. In 1962, the Advanced Research Projects Agency (ARPA) of the United States Department of Defense developed a network of computers called ARPAnet. At first, this network only connected military and government computer systems. The purpose was to make all information safe, so that in disaster or war, if one computer was destroyed, it's information would not be lost. In 1966, the ARPAnet was expanded to include universities and other institutions. One of the first universities to be added was Utah State University. Soon, large companies and corporations were added, too. By 1990, anyone with a computer, a modem, and Internet software could connect to the Internet. There are many things in the future of the ?net, including video conferencing, online virtual reality worlds, and faster Internet connections.

Tuesday, November 26, 2019

Criticism of Mel Gibsons Hamlet, How well did he maintain the character Essay Example

Criticism of Mel Gibsons Hamlet, How well did he maintain the character Essay Example Criticism of Mel Gibsons Hamlet, How well did he maintain the character Paper Criticism of Mel Gibsons Hamlet, How well did he maintain the character Paper Essay Topic: Hamlet The aspects of Hamlets character that Mel Gibson played up, in the movie production in which Gibson was acting in, were the characteristics of Hamlets strong affections for his mother, Gertrude, along with his subsequent hatred and deep resentment of his step-father, Claudius. Also, his fear and subservient reverence for the ghost of his late father, his scholarly, perceptive, sometimes introspective mind, and his charisma, to the extent of the Castle Ellsinore, for the peoples love for him is mentioned in a few instances, but there is not much advancement on this apparent love, or what Hamlet himself did to be awarded it, save a few laughs at jokes he makes. Gibson plays the Hamlet afflicted with the oedipal complex quite blatantly. This passionate affection is displayed in many of the scenes between Hamlet and his mother, as they are very physical with each other, more so than in a normal mother-and-son relationship, with a lot of touching faces with their hands, and full-lip kissing. In the pictures scene (III. 4) Hamlet becomes very indecently physical with his mother, almost as if he is raping her. I personally felt that the oedipal aspect had been taken a bit too far at that point, but those actions did serve to illustrate that Hamlet may indeed have been confused in the context of sexuality, or it may have helped to emphasize the fact that Hamlet is indeed mad, if you chose to take that stance towards his character. This oedipal aspect of Hamlets character was probably derived from the text, by Gibson, the many references to Claudius and Gertrude in bed and the many sexual allusions he makes when he thinks or talks about them. Why, she would hang on him as if increase of appetite had grown on what it fed on. O, most wicked speed, to post with such dexterity to incestuous sheets! At the same time that Hamlet is talking about his mother, he makes many hateful references to Claudius, and this aspect was much emphasized by Gibson throughout the movie, but a memorable moment was directly after the players had enacted the scene where the player king was killed in exactly the same way as Claudius had done to old Hamlet, and Claudius becomes frantic and starts calling for lights. We see Hamlet running and jumping about, singing ecstatically and almost reveling in the fact that his uncle had given himself away by his actions. In other scenes, especially in ones where Hamlet is talking face to face with Claudius, he doesnt make any effort to conceal his feelings about his uncle, as he is either sarcastic or seething through his teeth. I thought that these methods of expressing his anger, and also the outburst of happiness and delight in his uncles suffering were appropriate, as sarcasm would serve to emphasize not only his hatred, but also his wit and cunning with words. Excellent, ifaith; of the chameleons dish. I eat the air, promise-crammed. You cannot feed capons so. In the act three, scene four, I felt that Hamlets outburst of happiness was appropriate, because his hatred for the uncle that had murdered his father had been so great that he became absolutely ecstatic when his uncle became subjected to torment of guilt, and this action was a kind of revenge. Hamlets monologue scenes are well done in the movie. The setting of an actual castle gives the audience a more realistic and cold, hard setting, and helps to emphasize the mood of his speeches. For example, in the To be or not to be monologue, a suicidal and deathly mood or air was emphasized by Hamlet staring into the eye sockets of a skull, surrounded by more skulls and more symbols of death such as tombs and even the cold, dark, stone walls. Hamlets speech at the end of act three, scene three is also greatly emphasized by the dark and gloomy night, with the castle towering in the background. These scenes could, of course, be done just as well on stage, but the authentic setting of a real castle adds an extra layer of realism and atmosphere to Mel Gibsons carrying of the monologue that would be hard to replicate on a stage.