What is bank loan portfolio credit risk
Commercial Banking & Finance – Semester 2, 2014 This individual assessment (Assessment Task 2) is designed to test your achievements in the BFF2401 unit learning objectives 1, 2, 3, 5 and 7. It requires you to answer the following questions: 1. What is bank loan portfolio credit risk? (2 marks) 2. What is the difference between a general reserve for credit losses and specific provision? (2 marks) 3. (i) Graph on two separate lines (1) loan loss reserve/gross loans, (2) impaired loans (NPLs)/gross loans from 2006 to 2013. Please include the 4 major Australian banks and 2 smaller banks from the following options (Suncorp-Metway Ltd, Bendigo and Adelaide Bank Ltd, Bank of Queensland Ltd) (4 marks) (ii) Interpret these banks’ credit quality over 2006-2013 (8 marks) 3. (i) Outline the APRA regulations regarding to credit risk for the large major banks and contrast them to those for smaller banks (6 marks). (ii) Comment on whether the four major or smaller banks benefit from the current regulatory setting regarding bank credit risk and why? (8 marks) Word limit: 2,000 words – please note more than one or two sentence answers are expected
What is bank loan portfolio credit risk Commercial Banking & Finance – Semester 2, 2014 This individual assessment (Assessment Task 2) is designed to […]
Describe some of the cues that might cause a company to suspect there is unmet demand for its products or servicesDescribe some of the cues that might cause a company to suspect there is unmet demand for its products or services. How would you design a test to determine whether your suspicions are correct? Explain the connection between demand, competitive advantage, and strategy.
Apply one of the analysis tools (SWOT analysis) to an organization you are familiar with to create a sample analysis. Justify your choice of tool (SWOT), interpret the results, and share the insights you gained from your analysis.
In a firm that has identified very few strategic options, what are some of the obstacles you might face in generating and evaluating strategic options? What steps would you as a manager take to overcome these obstacles? How would you measure whether your interventions were effective?
How do strong managers reconcile the competing priorities that demand their attention and set their top priorities?
What options might you consider if you and your CEO had different opinions about the top priorities for your company? How would you decide what to do?
Only 5-7 sentences are needed for each question. This is for a Strategy course.
Describe some of the cues that might cause a company to suspect there is unmet demand for its products or servicesDescribe some of the […]
Identify the Components of a Best Practice Program for Prisoner Re-entry
Identify the Components of a Best Practice Program for Prisoner Re-entry
The topic that you will explore is “Identify the Components of a Best Practice Program for Prisoner Re-entry.”
Research the field of corrections, correctional journals, correctional periodicals, various departments of corrections, and other resources to identify exemplary correction programs for prisoner reentry programs.
Determine the elements of these programs that make them exemplary and would be considered “best practice” in the correctional field.
Write up your findings in a report that provides a description of the program, the elements that lead to the success of the program, and the program structure and design that provide for an effective and successful correctional program.
Identify the Components of a Best Practice Program for Prisoner Re-entry Identify the Components of a Best Practice Program for Prisoner Re-entry The topic […]
Identify the strategy and methods to achieve the goal of each scenario
Content requirements: Your report should include the following:
– An Introduction that explains the purpose of the paper
– Your assessment of the assignment from the Commissioner
– A detailed description of your strategy and method(s) to achieve the assigned goals
NOTE: Your report of each Assignment should be supported by a minimum of one (1) outside resource (not the course instructional materials) for a total of not less than three (3) outside resources for the Final Project.
You are the Director of Programs for a large state correctional system. The Commissioner comes to you with three (3) projects. Each project has specific goals. Unfortunately, achievement of these goals cannot require an increase in the systems’ administrative or operational budget. Specifically precluded are any increases in staffing or allotment for new equipment.
With few exceptions, every inmate in the system is destined to return to the community. Successful transition from institutional life to community-based supervision is dependent upon the pre-reentry program the inmate will complete prior to parole. The goal is to develop a detailed outline of the instructional curriculum for inmates eligible for the transition and reentry program and a plan to coordinate the training of staff members, both inside the institutions and in the Division of Parole.
The life blood of every correctional system is its budget. In order to plan for future budget needs, the Commissioner must be able to project future priorities for the correctional systems over the next decade. As Program Director your assigned goal is to identify the emerging and driving forces over the next ten years that the system will need to manage in order to continue to be effective? This projection must include what priorities will need to be set, and what changes will need to be made in staffing, technology, training, and management and supervision to meet these new challenges.
Within the Commissioner’s correctional system a large medium security prison is nearing completion. This institution will house 1,000 male inmates transferred in from around the state. The transferees have already been identified. All are convicted felons and their projected average length of institutional incarceration is approximately 37 months. As the Programs Director your goal is to identify which traditional correctional programs should be replicated in the new institution as well as any new programs to meet the needs of these offenders. Describe each program, the eligibility criteria for inmates (if any), and the intended outcomes.
Identify the strategy and methods to achieve the goal of each scenario Content requirements: Your report should include the following: – An Introduction that […]
Security PolicyMany organizations and consumers are increasingly using social media and mobile devices. They are enjoying the fast and convenient access to information and entertainment with low cost, flexibility; and ease of using these technologies. For example, social media wechat can enable a person to communicate with families and friends by text message or ‘phone call’ anywhere in the world if both sides have access to a wireless network.
While mobile technologies and social media have brought in fundamental changes in how we work and communicate with each other, these new technologies are vulnerable to additional risks, as well as those ones faced by the traditional ICT technologies. For example, small and portable mobile phones are much more likely to be lost or be stolen than desktop computers. It is also easier for intruders to exploit wireless networks, where data is transmitted by radio frequencies. There are many damages to the owners if the intruders access our mobile operating systems, such as destroy or steal data, and launch deny of service attacks. Therefore, the introduction of mobile technologies and social media need to be carefully planned and managed.
Security policies for mobile technologies and social media in organizations are still in their infancy. The knowledge about the potential risks of these new technologies is still developing. The organisational maturity in managing these technologies is yet to be developed.
Your task is to audit two policies, one for the use of mobile technologies, and the other for the use of social media, in organisations. If the policies are incomplete and need improvement, you may provide a revised policy; if the policies are lacking, you may draft it for the organisation (3000 words, excluding references and policies).
Security PolicyMany organizations and consumers are increasingly using social media and mobile devices. They are enjoying the fast and convenient access to information and […]