Discuss the threats posed by cyberterrorism or cyberattacks with an example.
Cyberterrorism and cybercrime are growing threats for businesses. Although still in its infancy, the Internet provides a vehicle for terrorist and criminal attacks by foreign and domestic antagonists wishing to inflict damage on a company with little chance of being caught.
One problem in tracing cyberterrorists and criminals is that it is hard to determine if a cyberattack has been launched by a rogue state, a terrorist, or a hacker as a prank.
Moreover, each wave of viruses gets more damaging and spreads so rapidly that considerable harm is done before it can be stopped. The "Slammer," for example, brought Internet service to a crawl. It doubled its numbers every 8.5 seconds during the first minute of its attack and infected more than 75,000 hosts within 10 minutes.
Whether perpetrated by pranksters or hackers out to do harm, these incidents show that tools for cyberterrorism can be developed to do considerable damage to a company, an entire industry, or a country's infrastructure.
Learn More :
- List the government agencies that are involved in promoting foreign investment and international business.
- Whoville (made up country), as a country, would like to increase its control and ownership of foreign investments in its country. However, Whoville does not want to cut off or discourage foreign investment. Cite and describe a political risk strategy that Whoville could follow that would meet the aforementioned objective.
- What are the conditions under which relations between governments and MNCs are generally positive?
- Briefly discuss the role of PSAs and NGOs.
- List and briefly discuss the various economic risks that international companies must face when they seek to market abroad.
- Discuss and compare the terms confiscation, expropriation, and domestication.
- Describe the concept of nationalism and list some of the ways it manifests.
- Discuss stability of governments and list the main political causes of instability in international markets.
- Describe the characteristics of a sovereign state.
- In the context of business ethics, distinguish between bribery and extortion with examples.
- Why do U.S. multinational companies hesitate to offer women international assignments? Is this prejudice justified?
- Describe the popularity of a marketing orientation as compared to a product orientation.
- Distinguish between the two time systems in the world, as defined by Edward T. Hall - M-time and P-time.
- What is the fundamental notion of Western management practices? Is it universally acceptable?
- Suggest some cautions that an individual from a high context culture should take when dealing with someone from a low-context culture. Do the same for low- to high-context situations.
- Discuss the American manager's attitude toward objectivity in decision-making.
- Briefly describe the different types of business customs.
- How important is adaptation in international marketing? What are the basic criteria to deal with foreign firms?
- In the context of planned and unplanned cultural change, discuss the methods used by marketers to overcome resistance to change in an international marketing scenario.
- How does cultural sensitivity lead to successful foreign marketing?
- In the context of the elements of culture, illustrate the differences in "Asian and Western" thought as discussed by Richard Nisbett.
- In the context of the elements of culture, briefly discuss the concept of linguistic distance.
- Describe the relationship between Uncertainty Avoidance Index scores and stress.
- List the four dimensions of cultural values as given by Hofstede in the book and the 2 other dimensions introduced on the Hofstede website.