Tuesday, 28 March 2017


Credit sale of goods and services gives birth to the term factoring. Factoring can be defined as a method in which the debtor (trade debt) is sold to a factoring company at a discount on a continuing basis. In other words, we can say factoring is a process in which a firm (namely the client) receives the short-term finance whenever required from financial institutions (namely the factor) to manage their short term needs in a better position. Traditionally, this kind of service was very common in western countries but now, it is available all over the world. Initially when factoring service came into existence then it was only bank, the only financial institution which act as a factor and helps in collecting its client debt. But, in today’s scenario the picture of a factor has been changed. In today’s date it is considered as much broader concept. Today, any financial institution can act as a factor, he can administer the sales ledger of the client, provide credit control, help in collection of debt, purchases the client’s trade debt including accounts receivable either with or without recourse insurance against non-payment of debts. Thus, we can say that factoring is a combination of providing finance and management services to its client (firm). To put it simple, factor provides its management skills and finance to the firm for a certain fee or commission that varies with interest rates in force in the money market. Factoring is a special activity in which the firm can convert its credit sale of goods and services into cash by selling them to a factoring organization. Factoring service is termed as boom to manufacturer to a dealer of goods and services. With the help of factoring service, the firm can concentrate on the manufacturing goods, expansion of business, serving more customers etc and need not concern itself with non –profitable control and sales accounting matter. Factoring services can be drawn up normally for an initial period of twelve months, continuing thereafter indefinitely until notice (of about six months) is given. Factoring reduces debt worries and improves the cash flow. Factoring is an alternative source of funding which creates no liabilities. Factoring means financial freedom for your business. Factoring is not just about fast cash but it also helps in growth of the business.

The main types of factoring are:

  Ø  Recourse factoring- In recourse factoring, the factoring company assumes the risk of late payment but the seller retains the credit risk. Upon expiration of the grace period and if a debtor doesn’t pay , the supplier makes payment to the factoring company. The sellers risk is reduced because each customer undergoes a professional verification before hand of its ability to pay. If the factor has given some advance to the supplier then the suppler has to return back the amount received to the factor along with the agreed fees or commission. This type of factoring is also known as pure factoring.

  Ø  Non recourse factoring-In non-recourse factoring the firm sells the receivables to the factor. The factor makes the payment to the firm immediately or after receiving from the debtor. But in such type of factoring risk is born by the factor. If, the debtor fails to pay the amount of receivable or there is a delay in the payment of receivable then this loss is to be borne by the factor. In other words firm does not have any risk of loss due to delay or default of receivable, all the risk is taken by the factor. Therefore, in order to minimize the risk the factor carefully examines the debtor and his creditworthiness. This type of factoring is also known as full factoring.

Dr. Himani Gupta
Associate Professor
Dept. of Management Studies

Monday, 20 March 2017

Reverse Mortgage and Financial Independence of Senior Citizen

The financial services are undergoing transformation in current scenario and there is an upsurge of a whole new set of services one of them being Reverse Mortgage. The service was introduced by the Union Government in 2007 and has been aiming to give quality life to senior citizens. The service not only provides regular stream of income to old age people but also gives them an opportunity to live with dignity without being dependent on their near and dear ones.

This service is primarily the opposite of a traditional home loan. It gives an opportunity to a senior citizen to have regular income from the bank against mortgage of his house property. The borrower receives a fixed income from the mortgage and continues to stay in the house till his death.

The phenomenon initiates when the home even if of illiquid nature pledged by a senior citizen in exchange of regular payment to a bank. The bank evaluates the monetary value of the property by considering the demand for the property, prevailing property price and current condition of the house. The bank then provides a loan amount to the borrower after taking into account a margin for interest cost and price fluctuations over fixed loan tenure. With the payment of every installment of reverse EMI the individuals interest in loan decreases. The settlement of the loan happens on the demise of the borrower and borrower’s spouse. To settle the loan the bank first provides an option to next of kin to repay the loan along with accumulated interest. In case of disinterest or incapability of the individual the bank recovers its due from sale proceeds of the property. The excess amount left after the settlement of the loan with accrued interest and expenses, is passed on to the legal heirs. In case of sale, if sale proceeds are lower than the accrued principal and interest amount, the bank bears the loss of the amount that it could not recover. Such a loss generally arises where the bank makes an incorrect estimation of property valuation at the time of providing the mortgage as compared to the existing real estate market prices. The reverse mortgage interest rates could be fixed or floating and is determined by benchmark set by prevailing interest rates. The amount received through reverse mortgage does not attract taxes as it is considered as loan. Although a borrower is liable to capital gain tax at the time of sale of the mortgaged property by the bank for the purpose of recovering the loan.

Although very promising but the concept has certain issues within that need to be looked into, like the documentation process is lengthy and brings inconvenience to the applicant, besides the monthly payments are in annuity and are not subject to any increase even in case of emergencies. Despite of all its shortcomings, the reverse mortgage is ideal to supplement a senior citizen’s income in the post retirement age.

Dr. Deergha Sharma
Assistant Professor
Dept. of Management Studies

Monday, 6 March 2017

Travails of a Woman Documentation person

Personal is Political
-A well known feminist slogan

Well behaved women rarely makes history
-Eleanor Roosevelt to Marlyn Monroe

It was Mary Wollstonecraft’s first defiant moment in 1792 with the publication of ‘Vindication of Rights of Woman’ that we came across a documented history of Woman’s writing in a journal writing format, and which looked upon women as a political subject. As some of the students of women studies must be reading works of Virginia Woolf to theorists like Adrienne Rich, Judith Butler, Uma Chakravarti, Urvashi Butalia etc. While the writing of these women varied from personal accounts in journal formats to work of fictions, they all found space via libraries, book shops etc. to enter popular cultural imagination. Although books and articles on the history of women have appeared throughout the ages, the practice of creating special collections and archives for women is a relatively recent phenomenon, not quite a century old. It is only in the last few years that historians have become aware that there was a pattern to the establishment of women’s archives in India. This is where I would like to emphasize on the need for archiving and having women archivists. While, we might do formal style of academic writing and documentation but need for archiving and documentation remains quintessential because if we don’t archive now the future generations would not have enough material to look upon to understand their history and source the struggles of the previous generations. I also see that there is a need to broaden and expand the material that is archived because sometimes so much material circulate in a public domain that they don’t end up in an archive.

 I don’t know how many of you have ever been to an archive for research purposes but if you visit Delhi and you end up going to National Archives or for that matter Teen Murti Museum, you would realize that the books or audiovisual records that land up in those shelves are actually the staple of what many mainstream historians or students might deem as something of historical importance or official document of historical value. The documents at times available in these archives at times are so exclusive that they largely forego experiences of women as well as marginalized sections of the society. So, these stories of the margins are somehow never find space in official, public, mainstream, institutional space in which memories is being kept and at times hand woven for the coming generations.

So, one can see that the way we have learned to look at both politics and history is too much with the lens of public space which can be extremely exclusionary. So, how does one feature in history or make sure that one’s heritage find space in history? Even if you look at newspapers, you would notice that the newspaper would be giving you the main headlines which inturn is the index or highlight of that particular day. So, the important stories of history might feature in page 10 or buried in a page between advertisements. So, how does one tells an oppositional or alternative history? Women’s movement in India is one such oppositional or alternative movement in history, where new histories are forged. But where do we find these oppositional or alternative writing, they are usually confined to specific campaigns or fact finding reports, and at times these reports also usually get lost or buried within the archives. Even during various movements one may see generation of various pamphlets, posters distributed to the people, which eventually disappears after event is over. This why there was a constant need for archiving and documenting to create and recreate an alternative narrative.

As an archivist and documentation management person I realised the radical potential of memories of our past but also the need to preserve them for posterity, this made me start my tryst with the camera. If you are interested in photography you would realize that the presence of camera changes your perspective of how you enter a particular situation at the time, it was similar in my case as well. In 2011, I had an opportunity to work as an intern in one of the most prestigious institutions called The Archives and Research Centre for Ethnomusicology of American Institute of Indian Studies, which had been in the field of archiving and documentation for more than 30 years now. The reason for joining such an institution worked in two fold manner firstly my need to learn the basic skills of documentation for long term preservation, and  further find a collective that would work in line of archives like SPARROW (Sound and Pictures Archives on Research on Women) which had come up with alternative measures to document women’s history not only through various women’s movement but also their day to day struggles within an hetero-patriarchal setup.

The archive that I talk about or imagine for the future are not only documenting the history of woman’s movement in India but also that comprise of works of woman filmmakers, writers, voices of dalit women which at times don’t get space within the mainstream. These archives would have women working to rewrite and to co-create history and would be fully managed by them.

Though during my days of being a student of Journalism and Mass Communication I was never interested in seeing how a camera worked, I realised its importance during my stint in ARCE and later documenting movements like anti-rape movement in Delhi, queer movement in Delhi along with student movement etc.

See, with some basic training anyone can be an archivist or documentation personal, there is not always a need for aesthetically designed videos but documentation that is legible enough and can be available for the future. The objective is to never back down by criticism about your work take it constructively, keep yourself abreast with technological innovations. Imagine if you were reporting in the 70s and 80s, you would have to visit the scene of action, interview some people get back and then churn out my story. This however has changed with coming of youtube, snapchat, ustream, livestream apps etc. the technological intervention allowed me to directly post videos on facebook, twitter, myspace to get people’s attention towards issues that was at times not covered by mainstream media.

It is through series of experiences such as these along with my training as an archivist as well as someone who work within the activist circles that I realized how important it is to voice one’s opinion and to make sure that voices of woman even within the activist circle doesn’t get suppressed. I realized that it was extremely hard for me as documentation person to be taken seriously at times people don’t inform you about ongoing protests, give you misleading information.  

I would emphasize on the fact that whenever you find yourself amidst a protest or incident of significant value do step out of your comfort zone. Don’t drive around, instead walk, meet people, talk to them, and ask questions, you may be surprised by the different version of the same story circulating amongst people.

Though there are women pioneers who start things, it is equally important for us in the newer generations to continue these legacies keep them alive. I wish that the different pioneering spirits that created space for us and you to be here today continue to remain alive through each of you. Let your light shine!

Ms. Priyam Ghosh
Assistant Professor
Dept. of Communication Studies

Social Media and Communication
WhatsApp! Follow me on Twitter! Check my status on Facebook page! These are the buzz words of today’s generation. In the age of Information and Communication Technologies whosoever is unaware of these terms is considered illiterate or outdated. Once obsessed with capital intensive mass media technologies, development planners as well as advertisers are finding new means and tools to reach out their tech savvy target audience. Educators are engrossed in new means to use the updated technology in their class rooms. In an age when there are one billion users inter connected through Facebook this is one of the most powerful participatory medium of communication. In this scenario whosoever is educated and is having means to use this simple technology can’t ignore it.

Media has become more interactive in virtual space and there is no sense of place while communicating with others in virtual world. Unlimited media access and interactivity is leading to less social mediated communication in real world. We are moving towards an age of ‘networked individualism’. More interactivity is leading to more divide between haves and have nots as owner of new media is having more sources of multimedia truths. Media technologies have made great impact on how we communicate personally and professionally.  Technological convergence has accelerated the speed of media technologies.  It is important that we understand the different new media technologies that are available today.  This is because our lives and our global economies have become dependent on them.
These contemporary technologies are reshaping and transforming social, cultural, political and economic concept of space and place. Media has always been considered as watchdog of society. New media is acting as “watchdog of watchdogs” in the sense when something controversial does not find space in traditional media, someone from the general public highlights on social media sites or micro blogs and mass media has to cover the issue. The buzz created on social media sites sets the agenda for traditional media.

As there is an economic transmission of information and culture, new media has become new mass culture and every other youth is using it because his friend is also using it. Today’s youth is spending more time on instant chatting rather than communicating to the family and friends sitting in real space. He is living in ‘Communities of choice’ rather than compulsive community in which he was born and brought up. Situation is devastating for him when someone is un-friended on social networking sites. The viewpoint of parents is ambivalent on the virtual reality as it has become a necessity for them but due to lack of parental control it is hard to figure out the dimensions of freedom provided by new media.

 It is disturbing to learn from the findings of a national survey of media conditions among American children aged two through eighteen years that “the average child spent six hours and thirty-two minutes per day exposed to media of all kinds, of which the time spent reading books and magazines— not counting school work—averaged about forty-five minutes”.

Although the new media technologies are more available than ever imagined, the digital divide that we are experiencing today will continue to widen in the next few years. This gap between haves and have nots will lead to disharmony and social disorder amongst communities, age groups and social classes.

(Disclaimer: Some of the content of this article is taken from author’s paper ‘Social Media and Changing Communication Patterns’ published in Global Media Journal, Jan- June, 2014)

Dr. Kiran Bala
Dept. of Communication Studies

Tuesday, 21 February 2017

Impact of Ownership Structure on Financial Performance in India

Family businesses since ancient times are base for building a nation due to their contribution towards the GDP of a country and are also employment opportunities created by these . In a developing nation like India the majority of businesses are in the supreme control of the families. It has been estimated that 90% of the business in India is controlled & managed by families. From 'Mom and Pop' Kirana stores to large corporation, groups and SME's we can see the  family run businesses. Most of the giant business houses like Tatas, Ambanis, Birlas, Godrej, Wadias, Anil Aggarwal – Vedanta, Bajaj, Ruias, Ranbaxy  Munjals, Mahindra, Thapars, Mittals, Shaparji Paollonji, Jindals, Adanis, Times of India and many more are all controlled by families. The role of family and the head of the family is quite important in India.  Many researches have been carried out to study the performance of family business & across the world  superiority in performance of family business has been noticed  but in actually  there is  not much significant difference between the performance of both the groups of companies whether we talk in terms of Net Worth, Capital Employed or  Long Term funds.  In terms of liquidity position both the groups of company almost stood at par & There is no significant difference  in terms of current and liquid ratio. However the only  significant difference is in terms of interest coverage and Financial Charge Coverage ratio. Position of non-family business is much risky in these previousy mentioned criterion as compared to family business.Also in India the position and condition of family business is quite competitive as against non-family business. They have reached at par with public limited companies and state owned companies. The family business mainly need to improve in terms of NPM, DE i.e use of leverage, and investment in terms of current assets.

Ms. Meenakshi Chopra
Assistant Professor
Dept. of Management Studies

Sunday, 12 February 2017

Mobile Apps-Boon and Bane

In recent years, there has been a tremendous growth in the use of mobile phones across the globe. Users are using mobile phones for different purposes. Users want to perform most of their tasks through a mobile phone for shopping, tickets booking etc. According to ITU approx. 77% of the world’s population is online using mobile devices. So this is the reason that most of the companies are opting mobile applications/apps for their business growth. Mobile applications are software applications and developed to run on different devices like Smartphone’s, tablets and other mobile devices.

Companies are providing their mobile apps in play store/App store and a user can download the same from that source. Some of the most popular stores are Apple’s App Store, Google Play, and Windows phone store. According to statista.com there are more than 2.2 million apps in google play store and two billion apps in the apple’s play store.  It is expected that by 2020, 189 billion U.S. dollars revenue would be generated by mobile apps. There are a number of advantages of using mobile apps like Bus/Train/Airplane/ tickets booking there nohassles in booking tickets using a mobile app.

There is no need to stand in long queues in cinema halls. No need to go to shopping for your favorite book, movie or other accessories. No need to go to your bank for transferring fund, or for any other bank services etc. So we can use mobile apps for all types of services. There are many other advantages of mobile apps like a better user experience, worldwide access, client secure login, easy installation, easy update etc. This is the main reason why companies are putting more emphasis on mobile marketing through apps.

So far we have analyzed various advantages of mobiles apps but on the other side, it has many disadvantages as well. Students are concentrating more on games or messaging apps. It may be a situation that after some years we do not know any of our neighbors, yes we do know them only if they are talking to us through some mobile apps. We are trying to do everything from our mobile without any physical efforts thus we are becoming lazy and obese. On a very serious note by using a mobile app, indirectly we are making our private/sensitive information public. Companies are using this information for their personal benefits. Some companies also sell this data to other countries to have profits. Many times mobile applications are being hacked by hackers of other countries.  There are some more points on which we should give some emphasis as far as mobile apps are concern. So think before installing any mobile app.

Mr. Pramod Pandey
Assistant Professor
Dept. of Management Studies

Monday, 6 February 2017

Security issues: A major concern with the Growing Dependency and Usage of Big Data concepts

With the advent of technology in present era all most all organizations, large and small enterprises, private companies, almost all sectors whether Government organizations, private organizations, sector related to healthcare, airlines industry, sensors, Education sectors, Sales and marketing department of almost all companies, various government projects of digital era are using the booming technology related to big data and working rigorously on big data project.

Demonetization is the current source which has generated humongous amount of data. Analytical engineers are working day and night to know the facts and details of black money defaulters. If analytics are not applied on the data on time, data becomes stale. Presently the data is generated by three explosions; cloud Computing Explosions, Data Explosions, and Conversion Explosion.  This exploded data is stored in large repositories which are also increasing every second where Data is stored in peta-bytes, zeta bytes.

Big Data Systems: Big data systems can store very large amounts of data; can manage that data across many systems; and provide some facility for data queries, data consistency, and systems management.

The challenge is not to manage a boatload of data – many platforms can do that. And it’s not just about analysis of very large data sets. Various data management platforms provide the capability to analyze large amounts of data, but their cost and complexity make them non-viable for most applications. The big data revolution is not about new thresholds of scalability for storage and analysis.

Big Data as an specific Technology:

Big Data as a specific technology is not any Hadoop HDFS or Lustre or Google GFS or shard storage system. It is more than managing big data sets. It is not a Map Reduce cluster as its more than how you query large data sets.

Big data is an application with all combined traits of different technologies together which attracts developers, data managers and large scale data analysts. It’s a collection of plethora of cost effective technologies with different attributes and capabilities, works together to give effective and result oriented results.

Big data as any data repository is able to handles large amounts of data stored in distributed and redundant storage. It can perform parallel task processing and easily accessible as a commercial or open source product. It is extensible with basic capabilities which can be augmented and altered easily. Big data revolution is basically built on three pillars, big, cheap and easy data management which enhances its ability to scale data store at greatly reduced cost and analyse data easily, effectively in a faster manner with all complex data type. It provides all characteristics which are not available with traditional databases.

Hadoop Framework: The big data systems uses Hadoop framework i.e. most big data systems actually use one or more Hadoop components, and extend some or all of its basic functionality. The components of Hadoop Framework can be explained through its working and divided into 5 layers:

Layer 1: Data Storage: HDFS
Layer 2: Data Processing: Map Reduce
Layer 3: Task and Resource Management: YARN
Layer 4: Data Access: PIG
Layer 5: Orchestration: HBase

The Hadoop framework is much like a LAMP stack. Normally these pieces are grouped together, but you can mix and match, or add onto the stack, as needed. For example, there are optional data access services like Sqoop and Hive. Lustre, GFS, and GPFS are data storage alternatives to HDFS. Or you can extend HDFS functionality with tools like Scribe. The entire stack can be configured and extended as needed. As this new technology enables all to collect, manage and analyze their data lying in humongous amount in the repositories and take better and efficient decision for their betterment and growth. It has significantly changed the nature of analytics from descriptive analytics to Disruptive Analytics to Predictive Analytics so that this humongous data can be leveraged in global business to improve its economy. As the technology is benefiting the company in terms of growth prospects the repositories are stuffed with sensitive data which emerges the issues of security. It is a matter of big concern as all sensitive information of companies or individuals are stored in repositories which can be misused and can promote to fraudulent. Lots of demographic information of individuals is also stored in big repositories under UIDAI scheme. At the same time as individuals adhaar number is linked with various govt schemes provided for citizens, data is laundering freely. If a small human stupidity get take lace due to unawareness, it’s very easy to get victim.

With the increased adoption of cloud based, web based and mobile based applications sensitive data has become accessible from different types of platforms easily. Especially these platforms are highly vulnerable to hacking, especially if they are low-cost or free.

Hackers and crackers are keeping their eyes on this flow of data, anytime by any means they can catch your personal information and can do all malicious attacks, frauds and can perform mischievous activities which can harm personally or financially. This is the reason the protection of private and confidential information gains more and more attention. Big Data Security is the most highly ranked priority in the IT strategies, in case of big data the way data is exploding protection of information is of crucial importance. Hence we can say a lack of data security can lead to great financial losses and reputational damage for a company. In case of continuously exploding big data losses due to poor IT security can exceed even the worst expectations.

Challenges of Big Data Security:

·         Single level protection in most distributed systems
·         Evolvement of NoSQL without security feature
·         Requirement of additional security measures in automated data transfer
·         Validation of information received, whether it remains trustworthy and accurate.
·         Mining personal information without asking user permission or notifying them.
·         Lack of division of different level of confidentially within the company.
·         Lack of routine audits to be performed on Big Data.
·         Inconsistent monitor and track of origin of big data.

Antivirus industry is working together and continuously from years to deal with malicious attacks and to provide maximum gains. The big data security can be improved by focusing on application Security, rather than device security, should keep isolated devices and servers containing critical data, by introducing real time security information and event management, by providing reactive and proactive protection.

Ms. Arpana Chaturvedi
Assistant Professor
Dept. of Information Technology