Multinational Firms Face With Security Term Paper

Often knowledge transfer faces the most significant threats in globally distributed MNCs, as the core part of their international property is included in the knowledge they are sharing across networks (Caelli, 2002). Knowledge transfer however is critical for being able to compete effectively on a global basis, as customers increasing a re buying expertise, not just products. This requirement is often exacerbated by local governments in foreign nations who often require disclosure of the data being transmitted in and out of their countries, with China being one of the most aggressive on this issue (Cohen, 2000). Conclusion

The development of effective security strategies for MNCs needs to be predicated on the legacy, 3rd party and enterprise systems' integration requirements of companies as they grow quickly through mergers, acquisitions and global expansion strategies. Being able to unify the entire complex of systems in an MNC and making sure the integration points don't comprise the enterprise system is an ongoing challenge, one that corporate it departments are often struggling with constantly....

...

(2002). Trusted...or...trustworthy: The search for a new paradigm for computer and network security. Computers & Security, 21(5), 413-420.
Cohen, E.A. (2000). International relations and security network. Foreign Affairs, 79(3), 167-167.

Doddrell, G.R. (1995). Security environment reviews. Information Management & Computer Security, 3(4), 3-14.

Fyffe, G. (2008). Managing multinational compliance efforts while addressing corporate security needs. Network Security, 2008(4), 16-18.

Levitsky, M. (2003). Transnational criminal networks and international security. Syracuse Journal of International Law and Commerce, 30(2), 227-240.

Samiee, S. (1984). Transnational data flow constraints: A new challenge for multinational corporations. Journal of International…

Sources Used in Documents:

References

Caelli, W.J. (2002). Trusted...or...trustworthy: The search for a new paradigm for computer and network security. Computers & Security, 21(5), 413-420.

Cohen, E.A. (2000). International relations and security network. Foreign Affairs, 79(3), 167-167.

Doddrell, G.R. (1995). Security environment reviews. Information Management & Computer Security, 3(4), 3-14.

Fyffe, G. (2008). Managing multinational compliance efforts while addressing corporate security needs. Network Security, 2008(4), 16-18.


Cite this Document:

"Multinational Firms Face With Security" (2012, February 29) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/multinational-firms-face-with-security-54676

"Multinational Firms Face With Security" 29 February 2012. Web.25 April. 2024. <
https://www.paperdue.com/essay/multinational-firms-face-with-security-54676>

"Multinational Firms Face With Security", 29 February 2012, Accessed.25 April. 2024,
https://www.paperdue.com/essay/multinational-firms-face-with-security-54676

Related Documents

Multinational Companies and Ethical Theories: Human rights issues in the global supply chain are one of the major challenges that multinational companies face in their operations. While these firms try to support human rights through various initiatives, the also violate these rights through other practices that characterize their operations (Arnold, 2010, p.371). The human rights paradigm has extended to incorporate emerging actors to an extent that the debate on these rights

Multinational Success The author of this report has been asked to speak to a hypothetical company that is ramping up global production of a selected product. For the purposes of this report, the author will focus on consumer electronics. The different facets and issues within the business that will be answered to will include a list of best practices, the key benefits of creating such policies, the major ramifications that could

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

On the other hand customers are attracted to online shopping because it's convenient, offers broader selection of commodities, the prices are competitive and a lot of information is accessed. In conducting business between the consumer and the corporate information needs to be provided especially personal data from the consumer's part. We should be careful with the type of information we provide in that case we reduce the risks when

Security Study Travel and tourism are major industries in European countries such as Greece. The hotel industry is dedicated to making the accommodations for their patrons as enjoyable as possible. This means ensuring that hotel guests, visitors, and staff have a safe and secure environment. It is for this reason that many of the larger hotel chains have their own private security personnel who are entrusted to maintain the safety of

Workers With in Small Firms Chapter I outlines the problems this research aims to address, namely an information gap that may, if filled, enhance employment for potential and existing workers with disabilities. This chapter defines the problem background, purpose of research, theoretical framework through which conclusions will be drawn from survey data gathered in the field, the research questions the survey instrument seeks to answer, the definition of terms those questions