Case Name : Currency Crises in the United Kingdom and Hong Kong
Authors : Francis Warnock
Source : Darden School of Business
Case ID : UV5693
Discipline : Finance
Case Length : 20 pages
Solution Sample availability : YES
Plagiarism : NO (100% Original work)
Description for case is given below :
In late December 2010, most emerging markets were struggling to contain the appreciation of their currencies, so perhaps currency crises were not likely in the foreseeable future. But conditions could change quickly. This case reviews different varieties of currency crises and two in particular: United Kingdom in 1992 and Hong Kong in 1998. These were two very different types of crises, and understanding them could serve the protagonist well when future crises occurred.
It was summer of 2013, and the news of cyber-attacks and information security breaches was on the rise in India, as it was worldwide. Incidents such as the Axis bank’s cyber-crime incident and the news of the American National Security Agency’s global e-surveillance were creating consternation and dilemmas in the minds of information security consultants. One such consultant owned and operated an information security company, Percept Softech, a Lakshyaa Technology Lab’s Jaipur franchise. The consultant was bogged down by a number of problems and dilemmas. The first was his marketing and business growth strategy, which was not helping him in promotion of his business. Information security solutions, spying, vulnerability checks, key logging and allied propositions were difficult to promote. Managing young millennial talent was another major problem for him. Apart from the woes of business growth, inefficiency in promotion and talent issues, the consultant was now facing another dilemma. Should he start a new business away from the umbrella of the Lakshyaa Technology Lab? Should he partner with a detective agency? Or should he relocate from Jaipur to a more central location (such as New Delhi) where perhaps people would be more aware of the importance of cyber security and students would be more interested in pursuing cyber security training?