India has 3rd highest number of family-owned businesses: report

Agencies
October 27, 2017

New Delhi, Oct 26: India has 108 publicly-listed family-owned businesses, third highest in the world, says a Credit Suisse report.

China tops the tally with 167 such companies followed by the US which has 121.

As per the Credit Suisse Research Institute's (CSRI) latest "CS Family 1000" report, with an average market capitalisation of $ 6.5 billion, India ranks 5th in Asia Pacific, excluding Japan, and 22nd globally, in terms of average m-cap.

Besides China, the US and India, the top 10 countries in terms of the number of family-owned companies include France (4th), Hong Kong (5th), Korea (6th), Malaysia (7th), Thailand (8th), Indonesia (9th), and Mexico (10th).

However, in terms of average size, the ranking changes much more in favour of developed markets, the report said.

Average market capitalisation of family-owned companies is greatest in Spain ($ 30 billion), the Netherlands ($ 30 billion), Japan ($ 24 billion) and Switzerland ($ 22 billion), the report that covered close to 1,000 family-owned, publicly-listed companies by region, sector and size said.

It further said Indian companies surveyed are more mature, with 60% of family businesses in their third generation compared to 30% of Chinese companies.

According to Credit Suisse, the financial performance of family-owned companies is also superior to that of non-family-owned peers. Furthermore, family businesses appear to focus more on long-term growth and they have outperformed peers in terms of share price returns.

"At country-level, Chinese, Indian and Indonesian family-owned companies appear to be the most expensive, trading at high absolute multiples, with a 12-month median price to earnings (P/E) of 15-16 times, compared to around 10 -13 times P/E multiples of companies in Korea, Hong Kong and Singapore," the report said.

The definition used for the database of family or founder-owned companies is a minimum shareholding of 20% and/or minimum voting rights of 20%.

In terms of key concerns and challenges, Chinese family-owned companies rank succession planning as their least important issue and do not envisage a reduction in ownership.

However, they tend to worry much more about the threat of technological disruption (30% said this was very concerning) which may be driven by China's overall greater exposure to disruptive technologies globally and its state of economic development.

On the other hand, challenges seen as most prominent in India include succession planning, followed by greater competition and talent retention.

"Overall, our findings indicate that our Indian family-owned businesses appear to be more optimistic with regard to future revenue growth and have a slightly more conservative approach to funding that growth," the report said.

More than half of the Indian and Chinese family companies that Credit Suisse surveyed generate revenues in excess of $ 500 million, with the majority of these businesses located across sectors of IT, financials and industrials.

India lags slightly behind China not just on the adoption of environment-related issues, but also on social issues, with 35% of companies implementing policies in relation to this compared to 65% for China.

"Our research seems to suggest that investors are not too concerned about the level of ownership but rather how involved the family owners are in the daily running of the business. This seems to be at the core of the success of family-owned companies in our view," said Eugene Klerk, the head analyst of thematic investments at Credit Suisse and the lead author of the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
July 4,2020

Twitter has joined efforts to do away with racially loaded terms such as master, slave and blacklist from its coding language in the wake of the death of African-American George Floyd and ensuing Black Lives Matter protests.

The project started even before the current movement for racial justice escalated following the death of 46-year-old George Floyd in police custody in May.

The use of terms such as "master" and "slave" in programming language originated decades ago. While "master" is used to refer to the primary version of a code, "slave" refers to the replicas. Similarly, the term "Blacklist" is used to refer to items which are meant to be automatically denied.

The efforts to change these terms in favour of more inclusive language at Twitter were initiated by Regynald Augustin and Kevin Oliver and the microblogging platform is now backing their efforts.

"Inclusive language plays a critical role in fostering an environment where everyone belongs. At Twitter, the language we have been using in our code does not reflect our values as a company or represent the people we serve. We want to change that. #WordsMatter," Twitter's engineering team said in a post on Thursday.

As per the recommendations from the team, the term "whitelist" could be replaced by "allowlist" and "blacklist" by "denylist".

Similarly, "master/slave" could be replaced by "leader/follower", "primary/replica" or "primary/standby".

Twitter, however, is not the first to start a project to bring inclusivity in programming language.

According to a report in CNET, the team behind the Drupal online publishing software started using "primary/replica" in place of "master/slave" as early as in 2014.

The use of the terms "master/slave" was also dropped by developers of the Python programming language in 2018.

Now similar efforts are underway at Microsoft's Github and LinkedIn divisions as well, said the report.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 12,2020

Washington D.C., Jan 12: A recent study has claimed that people end up wasting almost an entire day when they take a vacation.

This can happen while standing in a queue or searching for places to visit, people do not keep a count of the time they have actually utilised during the trip. As a result, they end up doing much lesser activities than they originally had planned.

According to a recent report in Fox News, the study has also shared the fact that people try to justify time waste with planning and scheduling activities whereas the truth is that these things can be done well ahead to save time during the trip.

The average time waste according to the study commissioned by Sykes Holiday Cottages also said the people taking a seven days' trip waste a minimum of 17-and-a-half hours to figure out various factors.

But there are other causes involved as well. When one visits any crowded location, the real-time spent to enjoy the location is lesser than the time spent on reaching and trying to get involved. For instance, if one visits an amusement park, the activities take lesser time than the preparatory and other phases.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.