Verified Document

Multinational Firms Face With Security Term Paper

Often knowledge transfer faces the most significant threats in globally distributed MNCs, as the core part of their international property is included in the knowledge they are sharing across networks (Caelli, 2002). Knowledge transfer however is critical for being able to compete effectively on a global basis, as customers increasing a re buying expertise, not just products. This requirement is often exacerbated by local governments in foreign nations who often require disclosure of the data being transmitted in and out of their countries, with China being one of the most aggressive on this issue (Cohen, 2000). Conclusion

The development of effective security strategies for MNCs needs to be predicated on the legacy, 3rd party and enterprise systems' integration requirements of companies as they grow quickly through mergers, acquisitions and global expansion strategies. Being able to unify the entire complex of systems in an MNC and making sure the integration points don't comprise the enterprise system is an ongoing challenge, one that corporate it departments are often struggling with constantly....

(2002). Trusted...or...trustworthy: The search for a new paradigm for computer and network security. Computers & Security, 21(5), 413-420.
Cohen, E.A. (2000). International relations and security network. Foreign Affairs, 79(3), 167-167.

Doddrell, G.R. (1995). Security environment reviews. Information Management & Computer Security, 3(4), 3-14.

Fyffe, G. (2008). Managing multinational compliance efforts while addressing corporate security needs. Network Security, 2008(4), 16-18.

Levitsky, M. (2003). Transnational criminal networks and international security. Syracuse Journal of International Law and Commerce, 30(2), 227-240.

Samiee, S. (1984). Transnational data flow constraints: A new challenge for multinational corporations. Journal of International…

Sources used in this document:
References

Caelli, W.J. (2002). Trusted...or...trustworthy: The search for a new paradigm for computer and network security. Computers & Security, 21(5), 413-420.

Cohen, E.A. (2000). International relations and security network. Foreign Affairs, 79(3), 167-167.

Doddrell, G.R. (1995). Security environment reviews. Information Management & Computer Security, 3(4), 3-14.

Fyffe, G. (2008). Managing multinational compliance efforts while addressing corporate security needs. Network Security, 2008(4), 16-18.
Cite this Document:
Copy Bibliography Citation

Related Documents

Multinational Companies and Ethical Theories: Human Rights
Words: 1593 Length: 6 Document Type: Essay

Multinational Companies and Ethical Theories: Human rights issues in the global supply chain are one of the major challenges that multinational companies face in their operations. While these firms try to support human rights through various initiatives, the also violate these rights through other practices that characterize their operations (Arnold, 2010, p.371). The human rights paradigm has extended to incorporate emerging actors to an extent that the debate on these rights

Policies and Procedures for Multinational Companies
Words: 1948 Length: 5 Document Type: Research Paper

Multinational Success The author of this report has been asked to speak to a hypothetical company that is ramping up global production of a selected product. For the purposes of this report, the author will focus on consumer electronics. The different facets and issues within the business that will be answered to will include a list of best practices, the key benefits of creating such policies, the major ramifications that could

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Workers With in Small Firms Chapter I
Words: 5811 Length: 20 Document Type: Introduction Chapter

Workers With in Small Firms Chapter I outlines the problems this research aims to address, namely an information gap that may, if filled, enhance employment for potential and existing workers with disabilities. This chapter defines the problem background, purpose of research, theoretical framework through which conclusions will be drawn from survey data gathered in the field, the research questions the survey instrument seeks to answer, the definition of terms those questions

HRM in an MNE Human Resource Management in an Multinational Enterprises...
Words: 1878 Length: 6 Document Type: Research Paper

Human Resource Management in Multinational Enterprises Similarities and Differences between domestic and international HRM HRM assumes a strategic role in almost all business organizations. It is the core of an organization's corporate strategy because it helps enhance their performance, create a sustainable competitive advantage and guides through enterprise management. This leads to the two similarities between domestic and international HRM. Basic functions such as allocation, procurement, motivation, and utilization are similar whether

International Relations Tradeoffs Regarding Security Political Economy...
Words: 3479 Length: 13 Document Type: Term Paper

Politics International Trade-Offs In international policy, as in the course of daily human life, self-interested actors must carefully weigh competing and often equally valid choices, and make for themselves some compromise between opposed values. It seems that as often as one is able to solve a problem, one notices that the very solution causes problems of its own. An unmitigated good is difficult to find even in one person's individual life, and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now