The ceo of a company based in the usa

Assignment Help Basic Computer Science
Reference no: EM13960809

Submit a 7-to-8 page analysis of the issues that responds to the criteria and questions listed below

Additional research is required. Use the data presented in the case study as well as information provided by course readings, videos, simulations and Discussions.
Address these issues and questions:

  • The CEO of a company based in the USA with subsidiaries in the United Kingdom is contemplating moving some of its operations to China but has read about the GSK bribery scandal in China. The CEO understands that the climate for foreign companies operating in China is not as welcoming as it used to be. The CEO is now asking his manager for international business to assess the GSK case, analyze the issues it presents. In particular the CEO wants to know what lessons his company can learn and how the company can reduce its risks when operating in China. The CEO handed his manager this list of questions:
  • GSK has featured its robust ethics and compliance program, even a "3rd Party Code of Conduct" for suppliers. What went wrong? What are the main external and internal factors that encouraged the GSK bribery scandal in China? Which, in your opinion, are more important? Explain your position.
  • Assess GSK's response so far. Are the initiatives that GSK has implemented to address the bribery problems sufficient or would you suggest further actions? If you were Mark Reilly what would you have done? Explain.
  • Do you think that GSK has been treated unfairly? Was GSK really at fault or was it just unfortunate to have gotten caught given the perception that companies have to resort to bribing to win contracts? Explain.
  • How can we avoid similar situations and how can we reconcile local expectations of questionable payments with the U. S. Foreign Corrupt Practices Act or the U.K. Bribery Act? What do you recommend? Explain your position.
  • What strategic and operational lessons can we take from your analysis?

Reference no: EM13960809

Questions Cloud

What is the wheel average angular acceleration : A car is going around a racetrack at constant speed. The curves around the track have different radii. In which turn is the magnitude of the car's acceleration the greatest?
Calculate the power density of the beam at 100meters : The peak power of a 6ft. diameter antenna is 10 watts and its duty cycle is 0.250. The wave length is 0.03m/cycle. Find the power density in mw/cm2 at 50 meters from the antenna.
Differences between a rea diagram and an er diagram : Differences between a REA diagram and an ER diagram. In a 1-2 page paper, describe at least 3 differences and 3 similaritiesbetween the two diagrams.
Interface has an application change without informing : Choose two hospital application interfaces and discuss what could happen if one interface has an application change without informing other integrated systems of this change.
The ceo of a company based in the usa : Additional research is required. Use the data presented in the case study as well as information provided by course readings, videos, simulations and Discussions.
Fraud and identity theft : "Fraud and Identity Theft" Identity theft / fraud have become one of the fastest-growing crimes in the world because it has no limits, no national borders, and no boundaries. Explain the major ways that criminals use victims’ personal information to ..
Briefly explain why f is a one-to-one function : Define the function f: R-->R by f(x) = x3 + 4. Briefly explain why f is a 1-1 (one-to-one) function. No proof necessary, just an explanation in some detail.
How are the differences attributable to cultural nuances : Choose two multinational companies, each based in a different home country, and visit their respective websites. Peruse these sites for information that is directed at three company stakeholders: What differences and similarity did you find between t..
Identify two different types of addictions : Based on your understanding of the above statement, answer the following: Identify two different types of addictions, and explain how cognitive behavior therapy (CBT) would be effective for those types

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Class encapsulating a singly linked list of website objects

PROGRAM 1Code a class encapsulating a singly linked list of website objects. A website has two attributes: a URL address (a String, you do not need to use the existing URL Java class) and 10 or fewer keywords describeing the topic of the website

  The typical procedures for internet intruders

As a system administrator, how can you protect your system from these attacks? Can you give a complete hacker story (from technical aspect) including the tools employed by them?

  Explain the characteristics of value-type variables

Briefly explain the characteristics of value-type variables that are supported in the C# programming language.

  Security models and cloud operations

"Security Models and Cloud Operations" Please respond to the following: 1.  Analyze the industry researched for each security model would be most applicable, and explain why you believe that to be the case. Identify the security models from your find..

  Prediction for open standards that may change world again

In April of 1990, entire concept of domain was born, and email addresses "opened up". What might be the prediction about more open standards which may change our world again?

  While-loop when the number of iterations

Use a while-loop when the number of iterations is not known before loop execution. Use a for-loop when the number of iterations is known before loop execution.

  Identifying mixed methods research

Identifying Mixed Methods Research.

  Explain nefarious computer activities called ping sweeps

Your boss has just heard about some nefarious computer activities called ping sweeps and port scans. He wants to know more about them and what their impact might be on the company. Write a brief description of what they are, and include your asses..

  Write a program that reads a java source

write a program that reads a java source file and produce index of all identifiers in the file. use the call in.useDelimeter("[^A-Za-zO-9-J]")

  From the e-activity

From the e-Activity, devise a scenario where a user in a business environment is unable to print a document to a printer connected to a Windows Server 2012 print server. Determine at least two (2) troubleshooting steps an IT support technician should..

  The hierarchy of control from most to least preferred

Q1. With regards to the order of hierarchy, what is the best possible scenario in terms of controlling risk?Q2. What is the hierarchy of control from most to least preferred?

  What is the command to list files in a directory

It will move the contents of temp1 from directory temp to temp1 of current directory and when finished it will erase the contents of temp1 of temp directory. What kind of files will be matched

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd