Preview

INTERNATIONAL BUSINESS

Powerful Essays
Open Document
Open Document
4941 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
INTERNATIONAL BUSINESS
INTERNATIONAL BUSINESS

Table of Contents

1.0 Executive Summary……………………………………………………3

2.0 Assignment Question1…………………………………………………4

3.0 Assignment Question2…………………………………………………7

4.0 Assignment Question3…………………………………………………14

5.0 Assignment Question4…………………………………………………18

6.0 Reference………………………………………………………………22

1.0 Executive Summary:

Network Security Consultancy ltd UK based leading information technology organisation which has an active presence across all sector in UK market and have had good revenue since establishment which helps to retain their shareholders trust and maximise shareholders wealth. Due to its tremendous success in local market and pressure from stakeholders company would like to expand its business internationally and as a consultant I have been hired to develop international business strategy and relevant implementation plan.

As consultant I am proposing international business strategy which includes analysis and critical evaluation of target country, influence of culture on business, comparison of culture between countries, environmental influence and implementation approach with proper international market entry.

2.0 Question 1: Brief overview of company and critical evaluation of target country.

Network Security Consultancy ltd is UK based company and it providing different Information technology solution to the client such as:

Core IT designing and implementation
Business process services
Marketing solutions
IT consulting
IT security and risk management
Cloud services
IT infrastructure services
Software platform based solutions
Engineering services
IT helpdesk solutions
IT services
Assurance services

Network Security Consultancy ltd (NSC) in leading IT servicing and solution organisation having presence in all sectors of industry such as



References: Hofstede, G. & Hofstede, G. J. & Minkar, C. M. (2010), ‘Cultures and Organisations software of the Mind, McGraw-Hill’ Daniels, Radenbourgh & Sullivan (2011), ‘International Business’,13th edition, Pearson. Deresky, H. (2008), ‘Organisation Structure and Control Systems, in Deresky, H. International Management: Managing Across Borders and Cultures’, 6th Edition, Upper Saddle River, NJ : Pearson Education, 264 – 285. Eldomiaty, I. T., and Choi, C. J. (2006), ‘Corporate Governance and Strategic Transparency : East Asia in the International Business Systems, Corporate Governance’, 6(3) : 281 – 295 Hambrick, D Hanillan C. and Webster P. (2009), ‘International Business Environment, Oxford University Press.’ Hill W.L Jin, B., and Moon, H. C. (2006), ‘The Diamond Approach to the Competitiveness of Korea’s Apparel Industry, Journal of Fashion Marketing and Management’, 10(2) : 195 – 208 Lewis, R Punnet, B. J. And Withane, S. (1990), ‘Hofstede’s Value Surveys : To Embrace or Abandon ?’ , in : Prasad, S. B. (ed), Advances in International Comparative Management, Vol. 5. Greenwich, CT : JAI Press, 69 – 89 Rugman, AM and Collinson, S Silkin,A. and Bowen, N. (2010), ‘International Business’, Oxford University Press

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is4796 Unit 1 Assignment

    • 370 Words
    • 2 Pages

    My company; RLR Securities Inc., has been in the security service since 2002 we started out with only four (4) people, now we have grown to twenty-two (22) people, RLR Securities Inc. was formed as a small corporation who’s focus was mainly on database performance tuning and security services for database applications. By 2006 we started providing complete security services, including assessments, penetration testing, policy creation, and regulatory compliance assistance.…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    • Select one of the company profiles below to be used for your Information SecurityPolicy…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IT team – provide help regarding the organisations systems e.g. telephones, computers, laptops, date storage and security, networks, aiding customers to use it correctly improving their quality of work.…

    • 1212 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Due in Week One: Give an overview of the company and the security goals to be achieved.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Request for proposal

    • 371 Words
    • 2 Pages

    The Envy firm is currently seeking opportunities to address security-related issues and prepare government agencies and mid-sized organizations to operate in a more secure manner. The organization has grown in size to 22 full time employees, with 8 employees focusing specifically on services and products. Five currently hold CISSP certifications, four hold CISM certifications, four hold GIAC, and six hold other GIAC certifications. The envy firm has won major contracts over the last four years for assessments and penetration testing. Although the firm does not offer services that review source code to assess its security, the envy firm has every belief that it is qualified to address this RFP.…

    • 371 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Smith Systems Consulting has been hired to evaluate and consult on the creation of a new information technology security policy to span the complete enterprise infrastructure. This document will serve as a recommendation for Riordan Manufacturing as it pertains to the enterprise wide information security strategy. Riordan Manufacturing currently has three locations within the United States and one location in Hangzhou, China. All of these locations have been evaluated and are considered part of the enterprise security policy.…

    • 892 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    future competitive environment in the global jetliner industry. This paper will also demonstrate how Boeing and Airbus approach the aircraft marketplace, how they are alike and different (particularly their production processes), where the rivalry is likely to head, and the most probable outcome of their ongoing competition.…

    • 2365 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    This unit is intended for people who want to work in the private security industry and who require an SIA licence to practise. It covers the knowledge and understanding for areas that are relevant to front line roles.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Test

    • 414 Words
    • 2 Pages

    searchsecurity.techtarget.com/.../Learn-from-NIST-Best-practi...This tip gives best practices for implementing such mandates and others. ... challenges behind operational integration of security and network management.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays