Case Study# 3

 

Using the Case study 2, write a paper addressing all 5 of  the questions. Minimum word count of 900 words. Provide a minimum of one scholarly reference in your paper (cited and referenced in APA format).

-Double space your paper
-The paper must use APA format (6th edition)
-Minimum of 900 words, excluding any cover page.

Please remember this needs to be in your words.  No cut and paste, No turning in other’s work.  No rewriting with SpinBot. Rephraser, or other tools.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

cmpe 3

Assignment 3

You will be modifying a javascript program. Javascript is a powerful computer language which works with browser software to add buttons, menus, etc.

This assignment will be out of 1000 possible points.

Getting started:

  1. Right-click on the link hello_java.html and choose “Save Link As…” Save the link to your desktop.
  2. This will create a file called “hello_java” on your desktop. You can open this in a text editor (such as Notepad or Notepad++ for Windows or Textedit or BBEdit for Mac).
  3. To open the file in a text editor, do not just double-click on “hello_java”. Either right click on the icon and choose your text editor, or open the text editor and open hello_java from there.

Tips:

  • Play with the webpage before editing it.
  • Read through the webpage code before you edit it.
  • Quickly view the website code within the browser by right-clicking on the webpage and selecting “View page source” (or keyboard shortcut Ctrl-U).
  • Pay attention to the comments within the website code.
  • Firefox and Internet Explorer are the recommended browsers (Chrome and Safari sometimes have problems displaying the webpage).
  • Notepad++ for Windows and BBEdit for Mac are better alternatives to Notepad and Textedit. (See Assignment 2 for download links.)

Required Items:

  • Add the current date, which should update to reflect whatever day it is when viewed. (100 points)
    • The script that accomplishes this is already in the file, but as a comment.
    • Read the comments carefully. They will explain what to do.
  • Modify the file so that it is possible to say two more things (other than hello and hate), such as “I like [person’s name]” and “I love [person’s name]”. To accomplish this, you will need to make the appropriate changes in two places:
    • Add two new options to the pull-down menu (100 points, 50 points each). Currently, there are the options Hate and Hello. Add two more, such as Love and Like.
    • Add two new cases to the function my_function (100 points, 50 points each). This means that when the user selects Love or Like, the appropriate response will be displayed when the user clicks the “Greet” button.
  • The pulldown menu only shows one item at a time. Make it so two items are displayed at a time. Note: This only shows up properly in Internet Explorer and Firefox. (100 points)
  • The left edge of the textbox (next to NAME) should be lined up with the left edge of the menu below it. Add spaces to push the textbox to the right. (100 points)
    • Look in the source code. A couple spaces have already been added.
    • The spacing need not be perfect, just closer.
  • There is a hyperlink that goes to the class webpage. It has several problems, which you will fix. The hyperlink says “Place your mouse on and off of this”.
    • Change the background color action:
      • When the mouse first hovers over the text, the background will turn yellow. Make it turn pink instead. (100 points)
      • After the mouse moves off the text, the background remains the same color. Alter this so that moving the mouse off the text changes the background to blue. (100 points) The command for turning the background blue works the same way as the code that changes it to yellow (or pink), except it is “onMouseOut” instead of “onMouseOver”.
    • Change the text and the URL for the hyperlink:
      • Replace “Place your mouse on and off of this” with new text, indicating that the person is going to your personal webpage (Assignment 2). (50 points)
      • Replace the URL with the URL of your personal webpage. If you did not complete Assignment 2, you may use any URL. (50 points)
  • UPLOAD your “hello_java.html” file to your server (in the public_html folder), so it appears at http://people.ucsc.edu/~yourusername/hello_java.html.
  • Extra credit: Add a hyperlink on your personal website (Assignment 2) that links to your javascript website (Assignment 3). Make it easy to find and use the text “HI THERE”. (100 points)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Charts in Excel

The topics for this block are:  

1. Charts in Excel.  

2. GIS  Please watch the video and complete the homework assignment in Excel.

Please answer the questions in the attached worksheet using Excel charts and submit the Excel file to Blackboard.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business continuity and disaster recovery plan

 

  1. Develop a business continuity plan for your organization. Describe the basic activities that must be managed by the BCP.  Develop plans for alternate site relocation, and develop an estimated monthly budget for the alternate site operations.

    ##########################################################################################

    Make sure to follow APA style. Please make sure your submission is 2 – 3 pages in length and meet the minimum APA formatting guidelines:

    •    12-pt, Times New Roman font
    •    Double-spaced
    •    1” margins on all sides
    •    Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
    •    Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
    •    Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10/ (link is external) Be sure to include at least three reference sources.
    •    In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02/ (link is external)

        Your submission should be submitted before 11:59pm on Day 7 of Week 2.

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
  3. I NEEED IT IN 1 HOUR

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

discussion-5

sub:bus control 

please study attached document and do discussion

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Network Security & Managing Information Security

  

                                                Network Security

1) In no less than 250 words, describe the various type os encryption defined by the National Security Agency (NSA). In many cases military applications need type 1 encryption to secure its communications. What does this mean and how does it differ from the other types of encryption.

2) In no less than 250 words, describe what an OCSP server is and what is its purpose in securing a network. Even though the textbook doesn’t mention it, this is a scheme used often when doing certificate-based authentication.

3) In no less than 250 words, explain why a network engineer would enable IEEE802.1X on a Cisco switch port. Give a scenario where this would be relevant. Also write down the IOS configuration to enable it on a switchport.

4) In no less than 250 words, describe why it is advisable to use SSH instead of Telnet to connect remotely to a Cisco router to manage it. Explain the reason why that is and write down the Cisco IOS configuration to enable SSH for remote connectivity. 

5) In no less than 250 words, describe the difference between a fat AP and a thin AP. What is needed to deploy a thin AP? Are there any security considerations to think about between the 2 different APs?

6) In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information. How can a network administrator prevent this type of attach from happening?

7) In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network. How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution? 

8) In no less than 250 words, describe a hacking tool that is used to gain access to a network. Explain how the tool is used, how it works and how a network administrator can prevent this tool from access the network.

9) In no less than 250 words, explain what is meant by an IDS and an IPS. How are they different? How are they connected to a network? List a few examples of IDS/IPS tools that are currently on the market.

10) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls. What similarities do they share?

11) In no less than 250 words, explain the different security measures that each version of SNMP uses. What is the different between SNMPv1, v2c and v3?

  

                          Managing Information Security

1) If you were asked by your employer to develop a new Information Security Policy, where would you turn to find resources to build this policy? List the two most important items you would include in this new policy and explain why you felt these were most important.

2) What do you believe to be the most compelling reason to migrate information to the cloud? What is your biggest security concern about doing so?

3) Many believe that cloud computing can reduce the total cost of computing and enhance “green computing” (environmentally friendly). Why do you believe this to be correct? If you disagree, please explain why?

4) Explain in your own words why you believe planning is important. Select one of the following businesses: a large bank, a government agency, or a hospital, and explain which systems you feel are mission critical. Then explain how the loss of these systems would affect the organization.

5) Have you or someone you know ever received a chain letter, phishing message, or some other fraudulent message via email? If so, please share this experience. Explain what type of message it was and what you did to get rid of it.

6) What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Something else? Discuss this question and provide support for your answer.

7) In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability.

8) Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

9) Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

10) What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

11) A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all these skills are necessary?

12) If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DQ Responses Oct 30

Q. Please read the below paragraph and write your opinion, also by discuss any differences you may see.

Note: 250 words with intext citations and references needed.

Business architecture defines an organization’s capabilities in a structured way. It identifies all kinds of resources a business possesses, such as personnel, infrastructure, and business, them comes up with a strategy to make the most value out of them. The purpose of business architecture is to transform high-level vision into actionable items, so that the company survives and becomes successful in today’s market. In a hierarchical structure, a company’s major concerns might be separated into operation, finance, marketing, information, HR, compliance, and security, which represent the critical components in the architecture. The seamless coordination among those components is critical for the execution of a transformation of vision.

Many of the tech giants have chosen to lay off employees this year due to the slow down of growth. This is part of a bigger move that those companies are making based on their predictions of the situations and strategies to counter them. The layoffs, reorganizations, and other moves mean that companies are adjusting their business architecture to suit the transformation of their visions. Sometimes, the layoff itself is rather a symbolic action to convey the high-level vision to employees and the public, with the hope of showing their responsiveness to stakeholders. The purpose of such organizational transformation is to improve the company’s current stand in the ever changing market.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Create a network topology

    

Contoso is an Oshawa based startup company with 15 employees that sells custom digital artwork through their online store. The company was growing quickly and set up their infrastructure through Google searches and recommendations from friends. As their company gets bigger, they are looking to seek the advice of an expert to examine their current network infrastructure and suggest improvements. Contoso is expected to grow to 700 employees in the next 16 months. They also plan to open a second branch site in Toronto. The company is remarkably busy with their day-to-day operations and has offered you as much detail as they can about their operations. Every device on the network is part of the same IP subnet, 10.32.0.0/16. 

A company have two servers that host the services required to run the business. 

  1. Server A – Multiple virtual machines on it that host their Domain Controller, DNS, File share, and a licensing server for their design software. The owner of the company mentions that only the windows computers need access to this server.
  2. Server B – Hosts their website that is accessed by their customers and their database service for their catalog of artwork

    

Contoso currently has their servers and networking equipment in a far corner of their shared lunchroom space as it was easier for them to get access to the systems. They also only have one locked door to enter their office and the rest of the spaces are considered “open office” and they assumed that meant no locks, only open doors. All employees at the company simply get 5 minutes of IT orientation where     

a member of the IT team simply logs the user into the network and changes their password. There are no other policies or training offered to staff related to IT. 

They also mentioned that currently nobody can work from home because they need access to the file share, and it does not work when they leave the building. 

The owner of the company lets you know they understand security is important but have been too busy to consider implementing any services, programs, or procedures for their company. The owner of the company advises you to assume an unlimited budget in your proposals. They also will not have time to answer any investigative questions you may have before you present your final pitch, and they ask you to write all assumptions down with your report. 

I need help on creating diagram of network topology for the Company by keeping those server into the consideration and another diagram if the company opens 2nd branch in other area. The diagram includes the devices in the network, connection types between devices, the IP addressing scheme, and additional network devices you are proposing. This diagram can be created Visio, Packet Tracer, http://draw.io/.

also please Provide reasoning for the changes to the network topology. Categorize the changes into the four basic characteristics of a network (reliability, scalability, quality of service, and security) 

    

Provide the IPv4 addressing details for the table below. The initial address space provided to you is 10.xx.0.0/16 where “xx” is your group number. Provide a brief explanation for why you chose these subnet sizes 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CBSC 620 Cases

 

VW Cheats on Emissions Testing

Up until late 2015, Volkswagen AG (VW) was the second largest carmaker in the world, with its 590,000 employees producing nearly 41,000 vehicles per day. At that time, the company’s prospects seemed bright, with many of its 12 subsidiaries, such as Audi, Bentley, Bugatti, Ducati, Lamborghini, Volkswagen Passenger Cars, and Volkswagen Commercial Vehicles, performing well.

However, the fortunes of VW changed significantly after a large-scale emissions-test cheating scandal became public in September 2015. VW admitted to installing special software designed to deceive emissions-testing procedures in more than 11 million of its cars, starting as far back as 2005. The software sensed when a car was being tested and then activated equipment that reduced emissions. The software deactivated the equipment during normal driving, resulting in emissions that significantly exceeded legal limits, while also reducing fuel consumption and improving the car’s torque and acceleration. The illegal software was installed in VW, Audi, and Porsche models that employed several different diesel engine designs that went through frequent updates over a 10-year period.

VW’s admissions led to investigations in Germany, the United States, and other countries, as well as dozens of lawsuits filed by customers, shareholders, and car dealerships. The U.S. Department of Justice sued VW in January 2016 on behalf of the Environmental Protection Agency, and in June, VW agreed to a $14.7 billion settlement. This represents the highest fine to date for violations under the Clean Air Act. Additional civil penalties, a criminal settlement, and further state-level fines have not been determined but could add billions more.

Since news of the emissions scandal broke, the company’s stock price has dropped 24 percent, from over $182 per share to under $137 by mid-August 2016. In addition, as a result of diminishing sales and uncertainty over future financial penalties, VW has had to relinquish its goal of surpassing Toyota to become the world’s largest automaker by 2018.

Understanding VW’s history and culture provides background necessary to understanding how this scandal could have occurred. VW was founded in 1937 by the German Labour Front, a national trade union controlled by the Nazi regime, to produce an affordable “people’s car” (eventually known as the VW Beetle) designed by Ferdinand Porsche. However, the breakout of World War II interrupted production of the car, and from 1939 to 1945, VW instead produced vehicles for the German army using laborers from nearby concentration camps.

Following the war, the VW plant was slated to be dismantled because it had been used for military production; however, British officer Major Ivan Hirst convinced his commanders of the great potential of the VW Beetle, and the plant soon began producing cars. In 1949, VW passed back to German control under manager Heinrich Nordoff, and the company became a major component of post-war West German revival.

Over the past two decades, the culture of VW has been primarily shaped by two men: Ferdinand Piëch (grandson of Ferdinand Porsche) who was chief executive from 1993 until 2002 and Martin Winterkorn who was chief executive from 2007 until his resignation in 2015 several days after the emissions testing scandal became public.

According to many employees and industry experts, a success-or-else philosophy has existed at VW at least since the time Piëch became CEO. As an example, early in his tenure, Piëch hosted a group of reporters so they could view a prototype of a new sedan intended to leapfrog all of VW’s competitors. When a reporter asked what would happen if the engineering team said that they were unable to deliver the many new features and technical innovations promised by the prototype, Piëch declared, “Then I will tell them they are all fired and I will bring in a new team. And if they tell me they can’t do it, I will fire them, too.”

Piëch turned VW into a global giant by acquiring luxury car brands such as Lamborghini and Bentley and by reviving brands such as Bugatti. One of the technologies he championed was turbocharged direct injection (TDI), which remains VW’s trademark technology for diesel engines. TDI improved fuel efficiency and acceleration and helped make diesel engines more practical for passenger cars. VW company policy required that Piëch retire in 2002 at age 65, but he remained on its supervisory board and was involved in the company’s strategic decisions until his forced resignation in April 2015.

Winterkorn rose through the ranks under Piëch’s leadership, holding significant management positions, including head of quality control, head of research and development, chief executive of the Audi division, and finally, CEO at VW. Winterkorn’s leadership style was similar to Piëch’s; both were known for publicly berating subordinates. Winterkorn would go so far as to bang car parts on tables to emphasize a point. He strongly urged European regulators not to impose excessive emission targets on the automotive industry because he felt that there was a lack of time to develop fuel-efficient technology and that such a regulation would further the economic downturn. Under his leadership, VW bought Porsche in 2012 to further its ambition to become the world’s biggest carmaker.

Many critics have argued that the autocratic leadership style of both Piëch and Winterkorn produced a corporate culture that has been described by some as confident, cutthroat, and narrow-minded. This, in turn, created an environment in which employees were apprehensive about contradicting their superiors and afraid to admit mistakes. Engineers were encouraged to compete for promotion and the approval of a management team who seemed to know only one way to manage: be aggressive at all times.

A central question of this scandal—whether VW’s top management knew of the deception—remains. However, many critics claim that the multibillion dollar emissions cheating scandal shows that at the very least, the VW engineers who created and installed the software did not believe company management expected them to act with integrity. If they had, VW would not have cheated and would not be in this mess.

  • Open a new Microsoft® Word document and answer the Critical Thinking Questions below.
  • Save the file on your computer with your last name in the file name. (Example: case_1-1 _Jones.doc)
  • Click the Choose File button to find and select your saved document.

Critical Thinking Questions

1. VW has blamed a small group of engineers for the misconduct and claims that members of its management board did not know of the decade-long deception. Within many organizations, including VW, a high value is placed on people who can deliver results and get things done. This can create a problem known as “normalization of deviance,” where something bad is done by a member of the group in order to achieve a goal but nobody says anything because everyone is expecting that someone else will instead. As a result, more and more bad behavior is tolerated. Perhaps, the VW engineers felt they had no other option when they realized that they could not deliver the combination of great performance, high gas mileage, and low emissions that had been promised. Some observers believe that normalization of deviance was perpetuated because VW kept hiring the same type of people with the same views—engineering graduates who are promotion-obsessed workaholics who have been taught not to say “no” to management’s goals. Do you accept this explanation for the emission scandal at VW? Why or why not?

2. VW must bring in a new CEO and a key board member as a result of the forced resignation of Piëch and Winterkorn. Identify three specific actions that their replacements must do to begin to change the corporate culture at VW.

3. At the time of this writing, it has been alleged that Robert Bosch GmbH, Europe’s largest supplier of auto parts, may have had a role in the VW emissions scandal. Bosch supplied the engine control unit that VW programmed to recognize when its diesel vehicles were undergoing emissions tests. However, Bosch states that it is not responsible for how its components are integrated into vehicles by customers. Do research to learn more about what role Bosch may have had in aiding VW in this deception. Do you believe that Bosch should also be sanctioned and/or fined? Why or why not?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

CBSC620 Case 2

 

Toshiba Accounting Scandal

Toshiba Corporation, a Japanese electronics and engineering conglomerate with headquarters in Tokyo, produces a wide range of products, including personal computers, semiconductors, consumer electronics, household appliances, and nuclear power plant systems. The company also provides an array of services, such as those focused on information technology, communications, and nuclear reactor construction and operation.

In May 2015, Toshiba formed an outside panel to investigate potential accounting irregularities at the company. The formation of such an outside panel is an accepted procedure for companies in Japan, where corporate boards of directors are composed primarily of company executives, with few independent outside directors. An outside panel is typically formed to investigate matters that may involve improprieties by senior managers and executives.

Toshiba’s CEO, Hisao Tanaka, resigned in July 2015 when the investigation uncovered that he was aware that Toshiba profits had been overstated by a total of $1.2 billion over a seven-year time period. (Further investigation would determine that the amount of the overstatement was closer to $1.9 billion.) Two former CEOs who held membership on the company’s board of directors were also implicated in the investigation and stepped down. Six other members of the board also eventually resigned, and Toshiba announced it would appoint several new and independent directors to its board to strengthen external oversight of its management.

The investigatory panel found that “Toshiba had a corporate culture in which management decisions could not be challenged. … Employees were pressured into inappropriate accounting by postponing low reports or moving certain costs into later years.” Managers at Toshiba set such challenging profit targets that subordinates couldn’t meet them without exaggerating the financial results of individual business units. Furthermore, the head of the investigatory panel stated that the scope of their probe had been limited by company management. The investigation of Toshiba’s U.S. nuclear business, Westinghouse Electric Co., was initially declared off limits. Months after a review of that portion of the business was completed, Toshiba took a $2.5 billion write-down on its Westinghouse business.

Following the scandal, Toshiba was removed from the JPX Nikkei Index 400, the stock index that includes the top Japanese companies based on operating income, return on equity, and market value. The move dealt yet another blow to the company’s reputation—inclusion in the stock index matters because investors, including the world’s largest pension funds, use the stock gauge as a benchmark.

In the first quarter following the revelations of the accounting scandal, Toshiba’s sales fell to their lowest level in years, and the firm lost $102 million for the quarter. The price of Toshiba stock shares dropped precipitously, reaching a 36-year low in early 2016. For the quarter ended July 2016, Toshiba reported a slight drop in revenue but generated its first quarterly profit since the accounting scandal. Cost savings generated by the cutting of bonuses and laying off of employees helped boost profits.

The rise of third-party panels is a part of a larger move in Japan to improve corporate compliance following a number of scandals at companies such as IHI Corporation, Livedoor Company, Mitsubishi, Nikko Cordial Corporation, Olympus Corporation, and others. Under Prime Minister Shinzo Abe, the government, companies, and the stock exchanges have sought to encourage foreign investors with the promise of more corporate transparency.

There are, however, several issues with the use of third-party panels to investigate potential improprieties. For instance, it is the practice in Japan for the members of such a panel to accept the scope of the investigation as defined by the company board of directors. This means that the board can pressure the panel to stay clear of sensitive areas of the business. In addition, members of the panel are not directors of the company and so do not have a fiduciary duty to shareholders. (Company directors do have such a duty, which requires them to work to advance the interests of the company, keep corporate information confidential, not use their position to further their private interests, and inform themselves of all material reasonably available before making business decisions.) Furthermore, the panel members have no power to force managers to handover documents.

Toshiba is a 140-year-old company and one of Japan’s best-known brands. The magnitude of the scandal at the company caused Japan’s Finance Minister, Taro Aso, to comment that the irregularities were “woefully regrettable” and had dealt a blow to the country’s efforts to regain the confidence of global investors. Aso noted that if Japanese companies failed to implement appropriate corporate governance, they could lose the market’s trust.

  • Open a new Microsoft® Word document and answer the Critical Thinking Questions below.
  • Save the file on your computer with your last name in the file name. (Example: case_1-1 _Jones.doc)
  • Click the Choose File button to find and select your saved document.

Critical Thinking Questions

1. Observers have commented that a scandal of this magnitude, occurring over such a long period of time, must involve collaboration among a large number of managers—reaching from the lowest level to the highest level of an organization. Should investigation of the scandal at Toshiba continue until all involved parties are outed and punished? What are the pros and cons of such an action??

2. Do you think that the practice of appointing outside panels to perform investigations should continue, or can you develop a better solution to enforce corporate compliance with laws and generally accepted accounting principles?

3. Japan is generally considered to be struggling in areas such as transparency and board independence compared to the global standard. What measures do you think should be considered at the national level to improve transparency and gain the trust of foreign investors?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now