Premium Essay

Securities Investment

In: Business and Management

Submitted By liaweitian
Words 6513
Pages 27
Section A: Introduction
Now a day, investment is one of the most important variables in economics. By investment, economists mean the production of goods that will be used to produce other goods, wherein decision to purchase stock or bonds are thought as investment. An investment theory is a concept based on different factors processing of invests to determine how to choosing the right investments for a particular goal or purpose. When it comes to investing, there is no shortage of investment theories can be applied it to makes the markets tick.
Odd Lot Theory is contrarian strategy based of a very simple form of technical analysis which measuring odd lot sales. An odd-lot trade is one of less than 100 shares and only small investors tend to engage in odd-lot transactions How successful an investor or trader following the theory is depends heavily on whether the investor checks the fundamentals of companies that the theory points toward or simply buys blindly. Small investors are not going to be right or wrong all the time, so it is important to distinguish odd lot sales that are occurring from a low-risk tolerance from odd lot sales that are due to bigger problems.
Individual investors are more mobile than the big funds and thus can react to severe news faster, so odd lot sales can actually be a precursor to a wider sell-off in a failing stock instead of just a mistake on the part of minor investors. The odd-lot trader is on the correct path as the market is going up that is selling off part of the portfolio in an up market by buy low and sell high. This net selling posture is reflecting by declining odd-lot index, which is purchase-to-sales ratio. However, as the market continues upward, the odd-lot trader suddenly thinks he or she sees an opportunity for a killing in the market and becomes a very strong net buyer.
The Efficient Market Hypothesis (EMH) states…...

Similar Documents

Premium Essay

Security Plan Outline for Richman Investments

...Security Plan Outline for Richman Investments User Domain • Restrict access to data and applications that is not required for employee to do their job. • Review and Revise user conduct and security polices every six months. • Conduct annual security training seminars with system users and staff. Conducting annual security training for the user in the user domain will cover the Acceptable Use Policy (AUP) for which users will be informed of what is and what is not acceptable use of the system. Workstation Domain • In house testing of operating system updates prior to user workstation deployment. • Strict access control policies and procedures for user access to system and data. • 72 Day password renewal for workstation and 180 day user password renewal. • Content filtering and anti-virus scanning of all incoming data. Quarantine of unknown file types. Securing a user workstation with approved updates will help prevent potential system corruption and in house data from being exposed. LAN Domain • Proper identification and two key turners to be granted access to Data Centers and wiring closets with 24/7 CCTV monitoring. • Periodic LAN vulnerability assessments. Keeping our LAN under lock and key prevent tampering of with the networks hardware. Access to the LAN devices is the easiest way to compromise a network. LAN to WAN Domain • Disable ping, probing, and port scanning of exterior devices. • Strict monitoring for intrusion detection on inbound......

Words: 501 - Pages: 3

Free Essay

Richman Investments Security Outline

...Richman Investments Security Outline Welcome to Richman Investments (RI) where we strive to bring you the most secure, reliable, and available resources that we can offer. We know that work needs to be done and that most of you aren’t aware of the security procedures taking place behind the scenes. We have devised a summary of the seven domains of the company and its security model. Please take the time to read this over and understand the implications of not following company guidelines, procedures, and policies. The user domain contains the users and/or employees that will be accessing resources within the organizations information system. A user can access systems, applications and data within the rights and privileges defined by the AUP (acceptable use policy). The AUP must be followed or the user may be dismissed or have their contracts terminated. With the user domain being one of the most vulnerable aspects of any organization, there are a wide variety of user related threats ranging from lack of awareness to blackmail and extortion. Employees are responsible for their own actions when using company assets and the HR department will be doing background checks on all employees within the company to ensure integrity within the workforce. Enforcement of the user level domain will include the use of RFID badges and pins for all areas of the facility and rooms that require special access. The workstation domain is where most users connect to the organizations......

Words: 1016 - Pages: 5

Premium Essay

Investment

...collateral provides a clear claim on a company’s assets, mortgage bonds are considered high-grade and safe from default. A trustee acting on behalf of bondholders holds the collateral; if the bond defaults, this trustee may foreclose for the bondholders. There are two types of mortgage bonds: first mortgage bonds and junior mortgage bonds. Should an issuer have to liquidate, first mortgage bonds are paid off before juniors are. To finance projects such as bridges, hospitals, and power plants, municipalities sell revenue bonds (or limited obligation bonds). Revenue bonds are backed by the revenue generated by those projects. Collateral trust bonds are backed by financial assets in the form of a securities portfolio containing stocks and bonds. A third-party trustee holds the securities. Equipment-trust certificates are backed by company equipment. They are popular with airlines and railroads that need to finance new purchases of equipment. The equipment bought may be the same equipment that is collateralized. A trustee for the bondholders keeps the title to the equipment. After all the bondholders have been paid back, the trustee then returns the title to the company. Unsecured Bonds Unsecured bonds, also called debentures, are not backed by equipment, revenue, or mortgages on real estate. Instead, the issuer promises that they will be repaid. This promise is frequently called "full faith and credit." Why issue unsecured bonds? Some companies do not have enough assets......

Words: 811 - Pages: 4

Premium Essay

Investment

...[pic] TERM PAPER ON INVESTMENT THEORY Submitted To Rafiqul Matin Course Instructor Investment Theory East West University Submitted By A. K. M. Mamunur Rashid ID # 2011-2-90-005 Md.Reza-E- Mostafa ID # 2011-3-90-010 Md. Rakibul Islam ID # 2011-1-90-011 Sabiqun Nahar ID # 2011-1-90-005 Date of Submission: 11th December, 2012 LETTER OF TRANSMITTAL December 11, 2012 Md. Rafiqul Matin Course Instructor Investment Theory East West University Dear sir, The term paper writing in the assigned topic by you is a part if the course, Investment Theory to judge our understanding. In response to that our group prepared this report. As you will see this report tries to find out the term paper on the of the analysis of Investment Theory & Market Investment you asked us to conduct. Our study reveals some specific trends of how DSE basically operates it’s functions. Based on annual report and website of DSE, we have tried to find out the security trade functionality of 10 individual stocks regarding different category & sectors. According to it’s process, It will help you to understand the prevailing perception of how the securities are traded considering all factors & what steps DSE usually takes to maintain the whole trade functions. Thanks for giving us the opportunity to work on this report. It’s been a real education for us. If you have any question to ask us,......

Words: 3398 - Pages: 14

Premium Essay

Investments

...regression: the portion of the variation in IBM excess returns that is explained by the variation in the market index - The standard error of the regression: the standard deviation of the residual (influence of the firm-specific factor) The alpha of a security helps determine whether it is a good or bad buy The Information Ratio measures the extra return we obtain from security analysis per unit of firm specific risk we are exposed to if we under or overweight securities relative to the market index CAPM Investors are price takers: individual trades do not affect prices - Single-period investment horizon - Investments are limited to traded assets - No taxes or transaction costs - All investors are rational mean-variance optimizers - Information is costless and available to all - Investors have homogenous expectations The mutual fund theorem (the separation property): - All investors choose to hold a market index mutual fund - The allocation between the mutual fund and the riskfree asset depends on individual investor’s risk aversion The CAPM predicts that alpha should be zero The CAPM fails the tests of the expected return-beta relationship: - Low-beta securities have generally positive alphas, high-beta securities tend to have negative alphas Black’s zero-beta model - Absence of a risk-free asset (i.e. restrictions on borrowing or investing in the risk-free asset) - Combinations of portfolios on the efficient frontier are also efficient -......

Words: 2387 - Pages: 10

Premium Essay

Multi-Layered Security Plan for Richman Investments

... David Girten Jr 05 Aug 2013 Multi-Layered Security Plan for Richman Investments User Domain: Main concern at this domain is lack of user knowledge on what different attacks look like and proper response protocols. Here are a few solutions: A) Training: send emails on security best practices; alerts on common and new attack vectors; hold company-wide training segmented throughout the day; place Infosec, Opsec posters and incident response procedures in every space B) Auditing of user activity: Setup a script to run on the proxy server utilizing a dirty word list to search user internet usage Workstation Domain: Main concern here is unauthorized access and out-of-date anti-virus software. Here are some solutions: A) Anti-virus/Anti-malware: Keep up-to-date with latest patches from vendor websites B) Passwords; Technical Controls: Enable password policies through GPO’s and screen-saver passwords for extra access protection LAN Domain: Main concern here is physical access to network assets. Here are some solutions: A) Securing high-priority systems: Establish access lists; combo/cipher locks for server and switch rooms; also have a sign-in sheet for contractors and tech-reps working on-site B) Implement Kerberos as another secure means of identifying users over a non-secure network LAN to WAN Domain: Main concern here is the attempt for attackers to scan the network. Here are some solutions: A) Install IDS/IPS on the network to monitor and combat network anomalies;......

Words: 390 - Pages: 2

Premium Essay

Wise Investments to Reach Financial Security

...Wise investments to Reach Financial Security by: Jannie Gracelyn P. Aviles Financial security is what all people hoped for. It isn’t making or having a certain amount of money. It is also not limited to being independently wealthy. Being debt-free, able to control your expenses, able to increase your savings, and not being forced at a work you dislike are some signs that you are financially secured. Reaching a point of financial security is a progress that takes time, effort and some sacrifices. After all the sacrifices you made, the results are worth it. On an article of Howard University entitled “Starting on the Road to Financial Security” said that reaching financial security is like building a house. You start with a foundation, you add the floors as you go on, you put on a roof, you finish the inside and then you move in. For most people, the only way to attain financial security is to save and invest over a long period of time. You just need to have your money work for you and that’s what you call investing. You become an investor when you put your money into things that can grow in value. You can invest your money in term deposit, the safest kind of investment that most people are more likely to be engage with. This kind of investment are very appealing to conservative, low risk investors because of the fact that there is no risk of losing your money. But wait, do term deposits give you a big return from the money you invested after waiting a long period of time?......

Words: 1006 - Pages: 5

Premium Essay

Investment

...Chapter 01 The Investment Environment Multiple Choice Questions 11. The material wealth of a society is equal to the sum of _________. A. all financial assets B. all real assets C. all financial and real assets D. all physical assets E. none of the above Financial assets do not directly contribute the productive capacity of the economy. 13. _______ are financial assets. A. Bonds B. Machines C. Stocks D. A and C E. A, B and C Machines are real assets; stocks and bonds are financial assets. Difficulty: Easy 14. An example of a derivative security is ______. A. a common share of General Motors B. a call option on Mobil stock C. a commodity futures contract D. B and C E. A and B The values of B and C are derived from that of an underlying financial asset; the value of A is based on the value of the firm only. 17. An example of a primitive security is __________. A. a common share of General Motors B. a call option on Mobil stock C. a call option on a stock of a firm based in a Third World country D. a U.S. government bond E. A and D A primitive security's return is based only upon the earning power of the issuing agency, such as stock in General Motors and the U.S. government. Difficulty: Easy 19. _________ financial asset(s). A. Buildings are B. Land is a C. Derivatives are D. U.S. Agency bonds are E. C and D A and B are real assets. Difficulty: Easy 20. The value of a derivative security _______. A. depends on the value of the related......

Words: 1247 - Pages: 5

Premium Essay

Investment

...Chapter 1 UNDERSTANDING INVESTMENTS Multiple Choice Questions Establishing a Framework for Investors 1. Which of the following is the best definition of wealth? a. the sum of all current and future income b. the total of all assets and all income c. the total of assets and income less any liabilities. d. the sum of current income and the present value of future income. (d, moderate) 2. Stocks and bonds would be classified as: a. real assets b. indirect assets c. personal assets d. financial assets (d, easy) 3. Technically, investments include: a. only financial assets. b. only marketable assets. c. financial and real assets that are marketable or non-marketable. d. only financial and real assets that are marketable. (c, easy) 4. The retirement plans that guarantee retirees a set amount of money each month are known as: a. 401(k) plans b. self-directed plans c. defined-benefit plans d. defined-contribution plans (c, moderate) The Importance of Studying Investments 5. The investment professionals that arrange the sale of new securities are called: a. arbitragers b. traders c. investment bankers d. specialists (c, moderate) 6. Another name for stockbrokers is: a.......

Words: 1615 - Pages: 7

Premium Essay

Investment

... Investment Banking Giuliano Iannotta Investment Banking A Guide to Underwriting and Advisory Services Professor Giuliano Iannotta Department of Finance ` Universita Bocconi via Roentgen 1 20136 Milano Italy giuliano.iannotta@unibocconi.it ISBN: 978-3-540-93764-7 e-ISBN: 978-3-540-93765-4 DOI 10.1007/978-3-540-93765-4 Springer Heidelberg Dordrecht London New York Library of Congress Control Number: 2009943831 # Springer-Verlag Berlin Heidelberg 2010 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Cover design: WMXDesign GmbH, Heidelberg, Germany Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) To my......

Words: 86170 - Pages: 345

Premium Essay

Investment

...CHAPTER 1 THE INVESTMENT SETTING Answers to Questions 1. When an individual’s current money income exceeds his current consumption desires, he saves the excess. Rather than keep these savings in his possession, the individual may consider it worthwhile to forego immediate possession of the money for a larger future amount of consumption. This trade-off of present consumption for a higher level of future consumption is the essence of investment. An investment is the current commitment of funds for a period of time in order to derive a future flow of funds that will compensate the investor for the time value of money, the expected rate of inflation over the life of the investment, and provide a premium for the uncertainty associated with this future flow of funds. 2. Students in general tend to be borrowers because they are typically not employed so have no income, but obviously consume and have expenses. The usual intent is to invest the money borrowed in order to increase their future income stream from employment - i.e., students expect to receive a better job and higher income due to their investment in education. 3. In the 20-30 year segment an individual would tend to be a net borrower since he is in a relatively low-income bracket and has several expenditures - automobile, durable goods, etc. In the 30-40 segment again the individual would likely dissave, or borrow, since his expenditures would increase with the advent of family life, and......

Words: 2675 - Pages: 11

Premium Essay

Investment Funds and Security Analysis

...Investment Fund and Security Analysis Assignment Question 1 There are several examples of the various types of mutual funds. In fact the list is listless but the most common ones include; Aggressive growth funds, Growth funds, Growth and Income Funds, Value Funds, International Equity Funds, US Government Income Funds, Municipal Bond Funds, Corporate Bond Funds, High Yield Bond Funds, Treasury Bills, Money Market Funds among many more. Load Mutual Funds are funds that have a sales charge or commission attached when they are purchased. The charge is used to compensate or pay for the services of the intermediary their time and expertise in selecting the appropriate mutual fund. Such charge is either paid while buying the funds or when selling them. On the other hand, No-Load Mutual Funds are either purchased directly or indirectly through a mutual fund company. These funds may have a small 12b-1 fee i.e. the cost of distribution which is incorporated into the fund as expense ratio. The expense ratio is paid by the shareholder of the fund on Daily basis through reduction of the price of the fund. Most investors prefer no-load funds since there is no more expenses required to pay for the broker services. Question 2 There are several types of mutual funds and they include the following; Stock Funds Stock Funds are at times referred as equity funds is a fund that invests in stocks which at times are also known as equity securities. These types of fund mainly consist of stock......

Words: 1382 - Pages: 6

Free Essay

Land Securities Investment Analysis

...Investment analysis November 2015 Jaime J. Delgado Code Unit STR364  Student Num. Q12576077 TABLE OF CONTENTS 1. Introduction…….………………………………………………………................... 2 p 2. Overview of Land Securities..…….................................................................... 2 p 3. The market trends, opportunities and risks..…...…………................................ 2 p a. Housing in London 2 p b. Commercial real estate in the UK 3 p 4. Strategy for management and marketing.……………………………………….. 3 p c. Business model .……........................................................................... 3 p d. Performance.……................................................................................ 4 p 5. Specific project analysis …………....…………………........................................ 4 p e. Stakeholders aspirations …………………………………………………... 4 p f. Operational performance …………………………………………………… 5 p 6. Conclusion and recommendation ………………………………………….............. 8 p 7. References …………………………………………………………………………….. 9 p 8. Appendix………………………………………………………..…..............…..…....... 11 p 1. INTRODUCTION This report aspires to critically evaluate the performance of Land Securities and provide enough evidence to allow non-professional investors to understand the Company performance, the market where it operates and decide if investing in Land Securities is...

Words: 6796 - Pages: 28

Premium Essay

Richman Investment Remote Access Security Policy

...Richman Investment’s Remote Access Security Policy 1) Wireless Access At Richman Investment’s when the network is accessed remotely via wireless appropriate wireless security standards will be used. • Wired Equivalency Protocol (WEP) will be used as standard on Wi-Fi connections. • A WEP encryption key will be used. • The network will be configured not to advertise its presence. • The power of access points will be turned down to a minimum that still allows the access point to function. • Due to the possibility of cracking Wireless Encryption Protocol using sniffing software such as AirSnort all wireless access points will be outside the firewall. • Wi-Fi Protected Access (WPA) will be used where it is available. 2) Secure Access via VPN Access from remote users to the corporate network will be via secure IPSEC VPN or SSL VPN connections only. This is necessary to secure the connection from the remote device to the corporate network. 3) Prevention of Data Loss All laptops and PDA’s that are taken off site will have the following security configured, to prevent data loss in the event of theft. • The hardware password will be enabled if available. • All corporate data on the laptop or PDA will be encrypted using appropriate encryption software. • Sensitive documents will be accessed remotely and not downloaded to the laptop or PDA. 4) Remote Device Protection To prevent remote PC’s, laptops, PDA’s etc from compromising...

Words: 349 - Pages: 2

Free Essay

Richmond Investments Security Outline

...Richmond Investments Security Outline User Domain: * Establish an Acceptable Use Policy that clearly defines access rights * Educate and inform your employees of their responsibilities and duties that must be performed * Perform a thorough background investigation on new employees Workstation Domain: * Install current anti-virus protection software * Install the latest software, security patches and system configurations * Make sure logon ID’s and passwords are compliant with company policy LAN Domain: * Apply proper permissions to servers, directories and folders * Use unshielded twisted-pair or comparable wiring that complies with IEEE standards * Make sure switches and routers are properly placed and applied * Use current NIC cards and apply interface security * Use company access rights in management of physical components and wireless access points LAN to WAN: * Apply web content filter * Apply email content filter and quarantine system * Use IPS and IDS security systems * Apply the use of a proxy server and closing ports not in use * Encrypt files and packets when using TCP and UDP * Proper use of IP Stateful Firewalls * Use of SSH for secure encrypted transmission WAN Domain: * Proper router and security appliance management (24x7x365) * Apply dedicated internet access * Observe managed services for customer routers and firewalls * Apply IP Stateful Firewall *......

Words: 315 - Pages: 2