INTERNATIONAL BUSINESS

Source – Cross Border Commerce – 2nd edition ISBN13: 978-1934748121

 

1.       Conduct an Internet search to find and read at least 3 recent articles that relate to the key term you selected.  Articles may be found in the International section of any reputable website that focuses on international business, such as Wall Street Journal, Financial Times, or the Economist.  Another good source of information is EBSCOhost, accessible through Liberty’s online library.  Websites like about.com, britanica.com, Wikipedia etc. do not constitute scholarly academic articles and references.

2.       Of the 3 articles you’ve read, select the article that you wish to discuss, and write a review of it.  In addition, you must post all 3 (or more) recent articles to the reference section—even though you review only one of them. You may provide additional references, but references do not replace 3 articles that relate to your key term. Actually reference the article you review within the article review. Your review must include the following sections (each section must be structured by a heading for each section):

    1. definition of the key term: this does not count in the 200 word minimum requirement.
    2. summary, in your own words, of the selected article.
    3. discussion, in your own words, of how the article relates to the selected chapter 6  and key term.
    4. The complete citation, in APA format, of each of the 3 articles read and any other additional references; these do not count in the 200-word requirement.
    5. All references must be annotated.

Identify Logical Fallacies In A Text

18 THE SMTURDAY EVENING POST March ’83

THE LJiTE BENJAMIN FRANKLIN

Early to bed and early to rise may make one healthy and wise, yet many a kid

made to measure up to Franklin’s high-falutin’maxims may wish the old inventor had kept his mouth

shut and stuck to flying kites.

by Mark Twain Illustrated by Don Trawin

r*I\ever put off till tomorrow what you can do day after tomorrow just aswell.’^—B.F.}

T his party was one of those per-sons whom they call Philos- ophers. He was twins, being born simultaneously in two different houses in the city of Boston. These houses remain unto this day and have signs upon them worded in ac- cordance with the facts. The signs are considered well enough to have, though not necessary, because the inhabitants point out the two birth- places to the stranger anyhow, and

sometimes as often as several times in the same day. The subject of this memoir was of a vicious disposition and early prostituted his talents to the invention of maxims and apho- risms calculated to inflict suffering upon the rising generation of all subsequent ages. His simplest acts, also, were contrived with a view to their being held up for the emula- tion of boys forever—boys who might otherwise have been happy. It was in this spirit that he became the son of a soap-boiler, and probably for no other reason than that the ef-

forts of all future boys who tried to be anything

might be looked upon with suspicion unless

they were the sons of soap- boilers. With a malevolence which is without parallel in

history, he would work all day, and then sit up

nights, and let on to be studying algebra by the

light of a smoldering fire, so that all other boys might have to do that also or else have Benjamin Franklin thrown up to them. Not satisfied with these proceedings, he had a fashion of living wholly on bread and water and studying as- tronomy at mealtime—a thing which has brought affliction to mil- lions of boys since, whose fathers had read Franklin’s pernicious biography.

His maxims were full of animosi- ty toward boys. Nowadays a boy cannot follow out a single natural instinct without tumbling over some of those everlasting aphorisms and hearing from Franklin on the spot. If he buys two cents’ worth of pea- nuts, his father says, “Remember

what Franklin has said, my son—’A groat a day’s a penny a year’ ” ; and the comfort is all gone out of those peanuts. If he wants to spin his top when he has done work, his father quotes, “Procrastination is the thief of time.” If he does a virtuous ac- tion, he never gets anything for it, because “Virtue is its own reward.” And that boy is hounded to death and robbed of his natural rest, be- cause Franklin said once, in one of his inspired flights of malignity:

Early lo bed and early to rise Makes a man healthy and wealthy

and wise.

As if it were any object to a boy to be healthy and wealthy and wise on such terms. The sorrow that maxim has cost me, through my parents ex- perimenting on me with it, tongue cannot tell. The legitimate result is my present state of general debility, indigence and mental aberration. My parents used to have me up be- fore nine o’clock in the morning sometimes when I was a boy. If they had let me take my natural rest, where would 1 have been now? Keeping store, no doubt, and re- spected by all.

And what an adroit old adventur- er the subject of this memoir was! In order to get a chance to fly his kite on Sunday, he used to hang a key on the string and let on to be fishing for lightning. And a guileless public would go home chirping about the “wisdom” and the “genius” of the hoary Sabbath-breaker. If anybody caught him playing “mumble-peg” by himself, after the age of 60, he would immediately appear to be ciphering out how the grass grew— as if it was any of his business. My grandfather knew him well, and he says Franklin was always fixed— always ready. If a body, during his old age, happened on him unex- pectedly when he was catching flies, or making mud-pies, or sliding on a cellar door, he would immediately look wise, and rip out a maxim, and walk off with his nose in the air and his cap turned wrong side before, trying to appear absent-minded and eccentric. He was a hard lot.

He invented a stove that would smoke your head off in four hours by the clock. One can see the almost devilish satisfaction he took in it by

continued on page 93

 

 

Franklin Humor continued from page 18

his giving it his name. To the subject of this memoir

belongs the honor of recommending the army to go back to bows and ar- rows in place of bayonets and mus- kets. He observed that the bayonet was very well under some circum- stances, but that he doubted whether it could be used with ac- curacy at a long range.

Benjamin Franklin did a great many notable things for his country and made her young name to be honored in many lands as the moth- er of such a son. It is not the idea of this memoir to ignore that or cover it up. No; the simple idea of it is to snub those pretentious maxims of his, which he worked up with a great show of originality out of truisms that had become wearisome plati- tudes as early as the dispersion from Babel; and also to snub his stove and his military inspirations, his unseemly endeavor to make himself conspicuous when he entered Phila- delphia and his flying his kite and

THE SATVRDMY EVENING POST

fooling away his time in all sorts of such ways when he ought to have been foraging for soap-fat or con- structing candles. I merely desired to do away with somewhat of the prevalent calamitous idea among heads of famihes that Franklin ac- quired his great genius by working for nothing, studying by moonlight and getting up in the night instead of waiting till morning; and that this program, rigidly inflicted, will make a Franklin of every father’s fool. It is time these gentlemen were finding out that these execrable eccentric- ities of instinct and conduct are only the evidences of genius, not the creators of it. I wish I had been the father of my parents long enough to make them comprehend this truth and thus prepare them to let their son have an easier time of it. When I was a child, I had to boil soap, not- withstanding my father was wealthy, and I had to get up early and study geometry at breakfast and peddle my own poetry and do everything Just as Franklin did, in the solemn hope that I would be a Franklin some day. And here I am. K

FLAVOR WITHOUT

SALT! Send For The

NEW ANGOSTURA® LO-SODIUM

HEALTH GUIDE & COOKBOOK

Soups

Meats

Salads

Only .16mg Sodium Per Teaspoon

Mail 251 for postage & handling lo: ANGOSTURA, Box 4 ,1745 Elizabeth Ave. Rahway, New Jersey 07065

NAME.

ADDRESS.

CITY

Diet food doesn’t have to be cruel and unusual punishment.

In fact, it can provide unusual enjoyment.

Provided it’s one ot Weight Watchers* 26 delicious Frozen Meals.

For people with a pas- sion for pasta, there’s our zestyZiti. Drenched in tomato sauce, mouth- watering morsels of veal and mozzarella cheese.

There’s crunchy Southern Fried Chicken. Authentic Chinese Ftxid. And even Pizza.

With food like this on your diet, why would you ever want to go off it ?

WEIGHT WATCHERS* 26 FROZEN MEALS. TRY IT YOU’LL DIET.

DIETERS NEVER HAD IT SO GOOD. 1 I ICHT lATl-HtRS IS THE RLUISniRtDTRAJltWARK Oh WhIIiHT WATCMbR^ INTtRNATlONAL, FNC. C WEIUHT WATCHERS FNTtRNATlDNAL. INC. mi

What does COBIT stand for?

Question 1 2.5 / 2.5 points

The use of encryption and digital signatures helps ensure that what was transmitted is the same as what was received. Which of the following is assured?

Question options:

Confidentiality

Availability

Integrity

Nonrepudiation

Question 2 2.5 / 2.5 points

The concept of “need to know” is most closely associated with which of the following?

Question options:

Authentication

Availability

Confidentiality

Integrity

Question 3 2.5 / 2.5 points

What is the primary goal of business process reengineering?

Question options:

To develop new security policies

To improve business processes

To implement an enterprise resource system

To determine management bonuses

Question 4 2.5 / 2.5 points

An unauthorized user accessed protected network storage and viewed personnel records. What has been lost?

Question options:

Confidentiality

Nonrepudiation

Integrity

Availability

Question 5 2.5 / 2.5 points

What does COBIT stand for?

Question options:

Control Objectives for Information and Related Technology

Common Objects for Information and Technology

Common Objectives for Information and Technology

Control Objects for Information Technology

Question 6 2.5 / 2.5 points

What does “tone at the top” refer to?

Question options:

Policies, in relation to standards, procedures, and guidelines

Confidentiality in the C-I-A triad

Regulatory bodies, in relation to security policies and controls

Company leaders

Question 7 2.5 / 2.5 points

Which of the following types of security controls stops incidents or breaches immediately?

Question options:

Preventive

Corrective

Detective

None of the above

Question 8 2.5 / 2.5 points

An encryption system is an example of which type of security control?

Question options:

Technical

Corrective

Physical

Administrative

Question 9 2.5 / 2.5 points

Security controls fall into three design types: preventive, detective, and:

Question options:

effective.

corrective.

quantitative.

qualitative.

Question 10 2.5 / 2.5 points

Which of the following is not a generally accepted principle for implementing a security awareness program?

Question options:

Competency should be measured.

Remind employees of risks.

Leaders should provide visible support.

None of the above.

Question 11 2.5 / 2.5 points

Of the following compliance laws, which focuses most heavily on personal privacy?

Question options:

FISMA

GLBA

HIPAA

SOX

Question 12 2.5 / 2.5 points

To which sector does HIPAA apply primarily?

Question options:

Financial

None of the above

Communications

Medical

Question 13 2.5 / 2.5 points

Which law was challenged by the American Library Association and the American Civil Liberties Union claiming it violated free speech rights of adults?

Question options:

CIPA

FERPA

HIPAA

GLBA

Question 14 2.5 / 2.5 points

To which sector does the Sarbanes-Oxley Act apply primarily?

Question options:

Medical

Publically traded companies

Financial

Communications

Question 15 2.5 / 2.5 points

Which compliance law concept states that only the data needed for a transaction should be collected?

Question options:

Public interest

Limited use of personal data

Full disclosure

Opt-in/opt-out

Question 16 2.5 / 2.5 points

You are on the West Coast but want to connect to your company’s intranet on the East Coast. You use a program to “tunnel” through the Internet to reach the intranet. Which technology are you using?

Question options:

Role-based access control

Elevated privileges

Virtual private networking

Software as a Service

Question 17 2.5 / 2.5 points

Which of the following is not true of segmented networks?

Question options:

By limiting certain types of traffic to a group of computers, you are eliminating a number of threats.

Switches, routers, internal firewalls, and other devices restrict segmented network traffic.

A flat network has more controls than a segmented network for limiting traffic.

Network segmentation limits what and how computers are able to talk to each other.

Question 18 2.5 / 2.5 points

In which domain is virtual private networking a security control?

Question options:

WAN Domain

Remote Access Domain

Both A and B

Neither A nor B

Question 19 0 / 2.5 points

A security policy that addresses data loss protection, or data leakage protection, is an issue primarily in which IT domain?

Question options:

User

Workstation

WAN

System/Application

Question 20 0 / 2.5 points

A nurse uses a wireless computer from a patient’s room to access real-time patient information from the hospital server. Which domain does this wireless connection fall under?

Question options:

System/Application

User

WAN

LAN

Question 21 2.5 / 2.5 points

Regarding security policies, what is a stakeholder?

Question options:

An individual who has an interest in the success of the security policies

A framework in which security policies are formed

A placeholder in the framework where new policies can be added

Another name for a change request

Question 22 0 / 2.5 points

Which personality type tends to be best suited for delivering security awareness training?

Question options:

Pleaser

Performer

Analytical

Commander

Question 23 2.5 / 2.5 points

Which of the following is typically defined as the end user of an application?

Question options:

Data owner

Data manager

Data custodian

Data user

Question 24 0 / 2.5 points

Which of the following is not true of auditors?

Question options:

Report to the leaders they are auditing

Are accountable for assessing the design and effectiveness of security policies

Can be internal or external

Offer opinions on how well the policies are being followed and how effective they are

Question 25 0 / 2.5 points

In an organization, which of the following roles is responsible for the day-to-day maintenance of data?

Question options:

Data owner

Information security office (ISO)

Compliance officer

Data custodian

Question 26 2.5 / 2.5 points

Which of the following include details of how an IT security program runs, who is responsible for day-to-day work, how training and awareness are conducted, and how compliance is handled?

Question options:

Procedures

Guidelines

Standards

Policies

Question 27 0 / 2.5 points

Which of the following are used as benchmarks for audit purposes?

Question options:

Policies

Guidelines

Standards

Procedures

Question 28 2.5 / 2.5 points

What does an IT security policy framework resemble?

Question options:

Narrative document

Cycle diagram

List

Hierarchy or tree

Question 29 0 / 2.5 points

Which of the following is not a control area of ISO/IEC 27002, “Information Technology–Security Techniques–Code of Practice for Information Security Management”?

Question options:

Security policy

Risk assessment and treatment

Asset management

Audit and accountability

Question 30 2.5 / 2.5 points

What is included in an IT policy framework?

Question options:

Procedures

Guidelines

Standards

All of the above

Question 31 0 / 2.5 points

Which of the following is generally not an objective of a security policy change board?

Question options:

Review requested changes to the policy framework

Coordinate requests for changes

Make and publish approved changes to policies

Assess policies and recommend changes

Question 32 2.5 / 2.5 points

When publishing an internal security policy or standard, which role or department usually gives final approval?

Question options:

Audit and Compliance Manager

Senior Executive

Legal

Human Resources

Question 33 0 / 2.5 points

Virus removal and closing a firewall port are examples of which type of security control?

Question options:

Corrective

Recovery

Detective or response

Preventive

Question 34 0 / 2.5 points

Fences, security guards, and locked doors are examples of which type of security control?

Question options:

Technical security

None of the above

Administrative

Physical security

Question 35 0 / 2.5 points

Which principle for developing policies, standards, baselines, procedures, and guidelines discusses a series of overlapping layers of controls and countermeasures?

Question options:

Multidisciplinary principle

Accountability principle

Proportionality principle

Defense-in-depth principle

Question 36 0 / 2.5 points

Who is responsible for data quality within an enterprise?

Question options:

Data steward

Data custodian

CISA

CISO

Question 37 0 / 2.5 points

The core requirement of an automated IT security control library is that the information is:

Question options:

alphabetized.

in a numerical sequence.

in PDF format

searchable.

Question 38 2.5 / 2.5 points

Which security policy framework focuses on concepts, practices, and processes for managing and delivering IT services?

Question options:

ITIL

COBIT

COSO

OCTAVE

Question 39 2.5 / 2.5 points

__________ refers to the degree of risk an organization is willing to accept.

Question options:

Probability

Risk aversion

Risk tolerance

Risk appetite

Question 40 0 / 2.5 points

A fundamental component of internal control for high-risk transactions is:

Question options:

a defense in depth.

a separation of duties.

data duplication.

following best practices.

 

Describe your birth, your mission in life, the villains you must outwit, and your magic powers

Using 200 – 250 words, choose one of these writing assignments to complete.

  • Discuss a modern personality whose life more or less fits the pattern of the rise and fall of the hero, asdescribed in the chapter.
  • Describe your favorite myth. What kind of myth is it? How does it serve? Why do you enjoy this myth?What does it teach you?

 

Part B

 

Using 200-250 words, write your autobiography in mythic terms. Describe your birth, your mission in life, the villains you must outwit, and your magic powers