Saturday, February 15, 2020

Case Study Analysis Google Inc. in China Term Paper

Case Study Analysis Google Inc. in China - Term Paper Example Compliance to Chinese law conflicts the process of conducting a successful business model for companies such as Google. When attempting to circumvent various govern-ment-sanctioned filters, consumer freedoms are at risk from authorities charged with Web surveillance. Concurrently, defying sanctions that are not aligned or considered appropriate for Western nations such as the United States can lead to significant business disruption if (or when) the government demands complete deconstruction of Internet services such as Google. Thus, personally speaking, the regulatory environment in China creates a conflict of interest within the business model as it pertains to providing excellence in service and maintaining a filtered Web presence that does not sustain revenue growth or even brand reputation. B. State what you are bracketing:5 Â ¶ Personal values associated with a firm belief in the democratic process and consumer independence must be removed to avoid bias when analyzing the case study. The socialist doctrine that has replaced long-standing communist values would, according to various theories, be associated with promoting liberties for consumers and giving them more ownership over business and personal lifestyle. An enduring and genuine distaste for oppressive regimes must be bracketed to avoid incorporation of personal values associated with analysis of the case study. II. The Situation6: A. List the facts7 relevant to the issue(s) identified: Â ¶ Deciding whether to defy regulatory authorities to provide a richer and more liberal Internet experience is conflicted by the high volume of policing officials dispersed throughout China. The sophistication of Chinese filtering poses many risks to a business model that is designed to extend breadth of knowledge to consumers, having built this capacity in a free nation where such issues are not a business risk. From human capital to technologies, non-compliance to regulatory demands is going to be noticed by gov ernment regulatory forces and, thus, businesses providing Internet content cannot avoid these filtering obligations if the business is to remain sustainable in a foreign nation. B. List the facts that comprise the historical context relevant to the issue(s) identified: Â ¶ The physical structure of the Internet in China that was developed since allowing Internet services in 1999 provides ample opportunities for enforcement of laws associated with content sanctions. Furthermore, recruitment of private citizens in the enforcement and reporting processes seriously conflict attempting to avoid establishing government-mandated controls and filtrations and expanded the reach of enforcement against these laws. The totalitarian regime in China is long-standing, developed under previous communist-oriented government frameworks. The Chinese government also was not forthcoming in establishing clear and concise frameworks to define compliance to Internet censoring. Lack of clear language made the process of complying with laws, while also attempting to improve profitability in China, created a need for innovation at Google to satisfy

Sunday, February 2, 2020

Companys Business Foundation and Deliberate Threats to Information Sy Assignment - 8

Companys Business Foundation and Deliberate Threats to Information Systems - Assignment Example These two threats to the foundation of a company are specific in threatening the company’s survival as both a sustainable entity and a competitive rival to other companies as well. In a revelation of these threats, CSOs should be aware that rival companies and/or private groups can use espionage as a means to acquire the company information illegally. While the issue of espionage may be addressed as an external threat, in most cases, CIOs should be aware that internal activities exposing critical information to employees can lead to espionage. This means that through an illegal acquisition of that information, employees in firms can facilitate the damaging of the business foundation of the company by selling the information to rivals. Additionally, information extortion is another area where CSOs should be aware of when it comes to business foundation. In order to secure a company’s business foundation, the CSO should be aware that illegal access to information can lead to corporate blackmail. This process involves a hacker or a holder of sensitive information who agrees to give up information or not to disclose it for a fee. The motive of information extortion is to create value by pointing out the possible losses that would be incurred if the information was accessed by rival companies Information (Security, pp. 103-104). CSOs must be equipped with the information regarding the value of the company data and how such information can be harmful if it was lost or accessed by unauthorized personnel. When CSOs are aware of the information value, two primary corporate cyber threats are considered. Firstly, the CSO should be aware that information loss can result from sabotage and vandalism. Although companies do not have social enemies, they have financial rivals who thrive to push as many of their competitors out of business. By damaging or rendering a company’s information database unusable, a company is unable to move on as it has to accommodate all direct losses, lawsuits, and possible closures (Information Security, pp. 104-105).