Yeats Valves and Controls Inc.

Author(s):  
Robert F. Bruner ◽  
Sean Carr

Set in May 2000, these cases reflect the separate perspectives of the CEOs as they approach the negotiations of TSE International to acquire Yeats Valves. The task for the student is to complete a valuation analysis of the target and buyer, and to negotiate a price and exchange ratio with the counterparty. Each case contains a financial forecast only for that side; therefore, an important element in the negotiation is to obtain the private information of the other side, analyze it, and successfully negotiate terms of acquisition. The cases are relatively simple, and are offered as a first exercise in the valuation of the firm, and negotiation of an acquisition. They may be taught singly in usual case-discussion fashion, or combined into a joint-negotiation exercise where students are assigned parts to play. Used in a bilateral bargaining exercise, two teams of students are designated, each team representing one side of the negotiation and receiving a case designed for that team. The bargaining exercise provides a particular opportunity for joint teaching among instructors in finance, strategy, human behavior, and negotiation.

Author(s):  
Michael J. Schill

Set in May 2008, this case reflects the separate perspectives of chief executive officers Tom Eliot and Bill Flinder as they approach the negotiations of RSE International Corporation to acquire Flinder Valves and Controls Inc. The task for the student is to complete a valuation analysis of the target and buyer and to negotiate a price and exchange ratio with the counterparty. The intent of the case design is for students to be organized into teams and assigned to play the part of either Flinder Valves or RSE International in the negotiation. The case provides supplementary private information for each side of the transaction. Therefore, a unique element of the case is negotiating the terms of acquisition in an environment of asymmetric information. The case is relatively simple and provides a first exercise in the negotiation of an acquisition. It could also be taught in the usual case-discussion fashion instead of the intended joint-negotiation exercise.


Author(s):  
Robert F. Bruner

Set in May 2000, these cases reflect the separate perspectives of the CEOs as they approach the negotiations of TSE International to acquire Yeats Valves. The task for the student is to complete a valuation analysis of the target and buyer, and to negotiate a price and exchange ratio with the counterparty. Each case contains a financial forecast only for that side; therefore an important element in the negotiation is to obtain the private information of the other side, analyze it, and successfully negotiate terms of acquisition. The cases are relatively simple, and are offered as a first exercise in the valuation of the firm and negotiation of an acquisition. The case may be used to pursue some or all of the following teaching objectives: 1) Exercise valuation skills. 2) Exercise bargaining skills. 3) Illustrate practical concerns about mergers and acquisitions.


Games ◽  
2020 ◽  
Vol 11 (4) ◽  
pp. 44
Author(s):  
Luis Santos-Pinto ◽  
Tiago Pires

We analyze the impact of overconfidence on the timing of entry in markets, profits, and welfare using an extension of the quantity commitment game. Players have private information about costs, one player is overconfident, and the other one rational. We find that for slight levels of overconfidence and intermediate cost asymmetries, there is a unique cost-dependent equilibrium where the overconfident player has a higher ex-ante probability of being the Stackelberg leader. Overconfidence lowers the profit of the rational player but can increase that of the overconfident player. Consumer rents increase with overconfidence while producer rents decrease which leads to an ambiguous welfare effect.


1963 ◽  
Vol 9 (1) ◽  
pp. 1-14 ◽  
Author(s):  
Selden D. Bacon

This article is concerned with the overlapping of two phe nomena, each of which can occur independently of the other. The first is deviation from the specific social custom of drinking. The second, crime, refers to a class of deviations from many different customs of a society—deviations possessing one unique attribute in common, that of eliciting purposeful, negative sanc tions by the government. General knowledge about deviation from custom and about the impact of alcohol upon human behavior must be combined with an understanding of each of these two categories of deviance in order to assess the overlap.


2010 ◽  
Vol 22 (4) ◽  
pp. 239-253 ◽  
Author(s):  
Gustavo Benavides

AbstractResearch on the emergence of the configuration known as “religion” requires tracing the articulation among biological, psychological and social processes. This research must take into account evolutionary approaches; first, in terms of hominid evolution, for it is only by taking into consideration work on symbolization, language development, the capacity to engage in metacognition and cooperation, the tendency to form hierarchies, engage in violence, sexual differentiation, and related topics, that one can hope to trace the emergence of certain relatively stable features of human behavior. But since symbolization and the other capacities mentioned above are exercised in specific social circumstances—which themselves could not have come into existence were it not for the exercise of those capacities—it is essential to consider social evolution, especially insofar as this evolution leads to the appearance of stratified societies and to the kind of labor that prevails in them.


Author(s):  
Masakazu Ohashi ◽  
Nat Sakimura ◽  
Mituo Fujimoto ◽  
Mayumi Hori ◽  
Noriko Kurata

The substantiative study of private information box project of Japanese e-Government proved the effectiveness of the New Authentication Extension Technology to combine different social infrastructures to create new Secure services between Public Sector and Private Sector (Citizen). However, there are still issues to cope with outside of the realm of technology including accountability of each participants and the level of the service, OpenID and SAML are key federated identity protocols. Both SAML and OpenID define mechanisms in support of expressing assurance information on protocol messages, Authentication Context and the Provider Authentication Policy Extension (PAPE), respectively. In deployment scenarios that require proxying from one of the protocols to the other, it becomes necessary to map to and from the corresponding assurance mechanisms. This chapter provides theoretical study of Social and e-Health Data secure exchange methodology on this mapping and related issues.


Author(s):  
Maria Moloney ◽  
Gary Coyle

The evolving model of the Future Internet has, at its heart, the users of the Internet. Web 2.0 and Government 2.0 initiatives help citizens communicate even better with their governments. Such initiatives have the potential to empower citizens by giving them a stronger voice in both the traditional sense and in the digital society. Pressure is mounting on governments to listen to the voice of the public expressed through these technologies and incorporate their needs into public policy. On the other hand, governments still have a duty to protect their citizens' personal information against unlawful and malicious intent. This responsibility is essential to any government in an age where there is an increasing burden on citizens to interact with governments via electronic means. This chapter examines this dual agenda of modern governments to engage with its citizens, on the one hand, to encourage transparency and open discussion, and to provide digitally offered public services that require the protection of citizens' private information, on the other. In this chapter, it is argued that a citizen-centric approach to online privacy protection that works in tandem with the open government agenda will provide a unified mode of interaction between citizens, businesses, and governments in digital society.


2019 ◽  
Vol 88 (1) ◽  
pp. 97-119
Author(s):  
Andrej Angelovski ◽  
Daniela Di Cagno ◽  
Werner Güth ◽  
Francesca Marazzi

Philosophies ◽  
2020 ◽  
Vol 5 (3) ◽  
pp. 12
Author(s):  
Lorenzo Magnani

Research on autonomy exhibits a constellation of variegated perspectives, from the problem of the crude deprivation of it to the study of the distinction between personal and moral autonomy, and from the problem of the role of a “self as narrator”, who classifies its own actions as autonomous or not, to the importance of the political side and, finally, to the need of defending and enhancing human autonomy. My precise concern in this article will be the examination of the role of the human cognitive processes that give rise to the most important ways of tracking the external world and human behavior in their relationship to some central aspects of human autonomy, also to the aim of clarifying the link between autonomy and the ownership of our own destinies. I will also focus on the preservation of human autonomy as an important component of human dignity, seeing it as strictly associated with knowledge and, even more significantly, with the constant production of new and pertinent knowledge of various kinds. I will also describe the important paradox of autonomy, which resorts to the fact that, on one side, cognitions (from science to morality, from common knowledge to philosophy, etc.) are necessary to be able to perform autonomous actions and decisions because we need believe in rules that justify and identify our choices, but, on the other side, these same rules can become (for example, as a result of contrasting with other internalized and approved moral rules or knowledge contents) oppressive norms that diminish autonomy and can thus, paradoxically, defeat agents’ autonomous capacity “to take ownership”.


Sign in / Sign up

Export Citation Format

Share Document