Verified Document

Threats To A Company Is Term Paper

Public disorder and domestic extremism are most likely to affect companies operating in Middle East as compared to the ones operating in Africa

How the threats presented affect operations such as shipping, personnel security, and business continuity.

The threats presented above are most likely to presented affect operations such as shipping, personnel security, and business continuity in various ways. Terrorism for instance is most likely to disrupt supply chain/logistics of the company. It can also threaten the personnel thereby directly interfering with the business continuity of the given business. The level of terrorism could be too high to bear and this might force the company to close shop or relocated to other less risky environments. Crime such as piracy has a more direct influence on the business continuity and operation costs of the company while white-collar crime can affect the profitability and hence business continuity of the business. The effects of a natural disaster may directly affect the security of personnel, supply chain and in some cases the operations (business continuity of the company).

Conclusion

Every business should adopt an enterprise-wide risk management plan aimed at ensuring that the supply chain, personnel and...

Every multinational preparing to expand to Middle east and Africa must employ sound risk management programs in order to ensure that their assets are safe from the threats outline above.
References

Burns, L (2011). Toward a Contemporary Definition of Terrorism.Available online at http://forumonpublicpolicy.com/vol2011no3/archive/burns.pdf

Gunaratna, R (2006). Terrorism in Southeast Asia: Threat and Response. Center for Eurasian Policy Occasional Research Paper Series II (Islamism in Southeast Asia), No. 1.Available online at http://counterterrorismblog.org/site-resources/images/Gunaratna-Terrorism%20in%20Southeast%20Asia-Threat%20and%20Response.pdf

Hubbard, Douglas (2009). The Failure of Risk Management: Why it's Broken and How to Fix it. John Wiley & Sons. p. 46.

Price Waterhouse Coopers (2008). A practical guide to risk assessment*. How principles-based risk assessment enables organizations to take the right risks.Available online at http://www.pwc.com/en_US/us/issues/enterprise-risk management/assets/risk_assessment_guide.pdf'

Wisner, B., Blaikie, P., Cannon, T and Davis, I (2004). At Risk - Natural hazards, people's vulnerability and disasters. Wiltshire: Routledge. ISBN 0-415-25216-4.

Sources used in this document:
References

Burns, L (2011). Toward a Contemporary Definition of Terrorism.Available online at http://forumonpublicpolicy.com/vol2011no3/archive/burns.pdf

Gunaratna, R (2006). Terrorism in Southeast Asia: Threat and Response. Center for Eurasian Policy Occasional Research Paper Series II (Islamism in Southeast Asia), No. 1.Available online at http://counterterrorismblog.org/site-resources/images/Gunaratna-Terrorism%20in%20Southeast%20Asia-Threat%20and%20Response.pdf

Hubbard, Douglas (2009). The Failure of Risk Management: Why it's Broken and How to Fix it. John Wiley & Sons. p. 46.

Price Waterhouse Coopers (2008). A practical guide to risk assessment*. How principles-based risk assessment enables organizations to take the right risks.Available online at http://www.pwc.com/en_US/us/issues/enterprise-risk management/assets/risk_assessment_guide.pdf'
Cite this Document:
Copy Bibliography Citation

Related Documents

Company Issues and Leadership for
Words: 2455 Length: 8 Document Type: Research Paper

Short-term wins creation In this case, the insistence is on the enhancement of credibility for change through demonstrating gains made. In the case of News Corp, those who excel in change related initiatives could be rewarded and recognized going forward. Building on Change/Consolidation of Gains Here, quick wins should be taken as a beginning and not as an end. Hence in a way, victory must not be declared before the whole change process

Company Analysis and Recommendation for
Words: 912 Length: 3 Document Type: Research Proposal

Additionally, not only that it operates in the same direction, it also operates in such a manner that supports the Group in reaching their overall objectives. Sammon VG is in itself a testimony of the great levels of diversification in terms of all products and services offered, as well as working locations. 4. McKinsey 7-S Model Shared value -- a combination of high skills, commitment to customer satisfaction and the usage of

Company Analysis of Yahoo I
Words: 2043 Length: 6 Document Type: Term Paper

Yahoo is definitely facing difficult challenges in the near future. Consumption is probably going down, but that is not something that will only affect Yahoo! The competition will also be seriously shaken. Another aspect that the firm's managers should consider is the more personalized approach proposed by Google. The G-mail service will be tailored to fit the desires of each and every user. The needs of each person, as manifested

Threats to Copyright and Ownership of Intellectual Property
Words: 1406 Length: 4 Document Type: Research Paper

Threats to Ownership and Copyright of Intellectual Property The intellectual property (IP) is defined as an original creative work, which may be tangible or intangible form legally protected by law. (Raman, 2004). The intellectual properties include the rights to scientific, artistic and literary works. Moreover, IP covers the invention of human endeavor, scientific discoveries, and industrial design. A current revolution of information technology has made IPs the greatest assets of assets.

Threats to Online Businesses the
Words: 2846 Length: 11 Document Type: Term Paper

According to an article entitled "Three Vulnerability Assessment Tools Put to the Test" Vulnerability assessment systems scan operating systems and applications for potential problems, such as the use of default passwords or configurations and open ports. This can give administrators a head start in fixing problems and will, hopefully, let IT organizations more effectively beat bad guys to the punch." The above factors are only true when vulnerability systems find all

Company Plan Part I: "How
Words: 852 Length: 3 Document Type: Essay

We are also building relationships with suppliers at this stage, and those relationships need to proceed as smoothly as possible. We will create economies of scale here in Kava. Doing so means stimulating local economies, which is ultimately in our best interest. For instance, a local transportation company will not only truck in raw materials for our company but for other companies on the island and possibly off the island

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now