Develop Workplace Policy And Procedures For Sustainability

onthly electricity use

Electricty (MWh)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Month Use (MWh) Month Use (MWh) Month Use (MWh) Month Use (MWh) Month Use (MWh) Month Use (MWh)
July 1683 July 1644 July 1614 July 1562 July 1612 July 1505
August 1644 August 1620 August 1587 August 1638 August 1562 August 1522
September 1620 September 1592 September 1532 September 1611 September 1555 September 1498
October 1598 October 1502 October 1498 October 1595 October 1501 October 1476
November 1502 November 1521 November 1453 November 1585 November 1435 November 1432
December 1516 December 1489 December 1426 December 1541 December 1428 December 1401
January 1499 January 1536 January 1399 January 1495 January 1442 January 1445
February 1566 February 1565 February 1487 February 1542 February 1498 February 1435
March 1588 March 1588 March 1452 March 1570 March 1526 March 1488
April 1625 April 1614 April 1487 April 1599 April 1508 April 1492
May 1677 May 1633 May 1521 May 1587 May 1534 May 1534
June 1682 June 1635 June 1528 June 1636 June 1505 June 1495
Total 19200 18939 17984 18961 18106 17723

Monthly electricity use

Electricity useElectricity (MWh)

Monthly water use

Water (kL)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Month Use (kL) Month Use (kL) Month Use (kL) Month Use (kL) Month Use (kL) Month Use (kL)
July 5525 July 5301 July 4592 July 4489 July 5132 July 5825
August 5562 August 5130 August 4603 August 4539 August 5433 August 5603
September 5433 September 5003 September 4348 September 4799 September 5614 September 5312
October 5488 October 4741 October 4487 October 4854 October 5863 October 5237
November 5514 November 4702 November 4362 November 5034 November 5955 November 5322
December 5643 December 4712 December 4588 December 5188 December 6042 December 5403
January 5632 January 4824 January 4573 January 5134 January 6095 January 5376
February 5522 February 4832 February 4615 February 4989 February 6002 February 5242
March 5487 March 4736 March 4507 March 5001 March 6012 March 5277
April 5402 April 4694 April 4489 April 4897 April 5946 April 5280
May 5470 May 4683 May 4427 May 4995 May 5905 May 5090
June 5322 June 4642 June 4409 June 5081 June 6001 June 5033
Total 66000 58000 54000 59000 70000 64000

Monthly gas use

Gas (GJ)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Month Use (GJ) Month Use (GJ) Month Use (GJ) Month Use (GJ) Month Use (GJ) Month Use (GJ)
July 188 July 209 July 201 July 190 July 135 July 143
August 211 August 208 August 208 August 188 August 188 August 138
September 192 September 188 September 209 September 132 September 156 September 132
October 201 October 192 October 192 October 122 October 167 October 135
November 209 November 195 November 211 November 100 November 187 November 117
December 209 December 201 December 195 December 99 December 161 December 111
January 195 January 196 January 207 January 119 January 148 January 128
February 196 February 186 February 198 February 128 February 192 February 142
March 186 March 204 March 200 March 111 March 146 March 126
April 198 April 194 April 194 April 133 April 166 April 136
May 194 May 198 May 195 May 105 May 171 May 141
June 198 June 200 June 206 June 112 June 144 June 146
Total 2377 2371 2416 1539 1961 1595

Annual resource use

Electricy use (MWh)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Actual use 19220 18939 17984 18961 18106 17723
Gas (GJ)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Actual use 2377 2371 2416 1539 1961 1595
Water (ML)
FY06/07 FY07/08 FY08/09 FY09/10 FY10/11 FY11/12
Actual use 66 58 54 59 70 6

What factors contributed to the loss of confidence in the Chipotle brand?

Read “Case 12: Chipotle Mexican Grill’s Strategy in 2018: Will the New CEO Be Able to Rebuild Customer Trust and Revive Sales Growth?” in your Connect textbook.

Write a 350- to 700-word response that addresses the following questions:

  • What factors contributed to the loss of confidence in the Chipotle brand?
  • Do the actions taken to date present a strategy that would improve consumer trust? Why or why not?
  • Consider Chipotle’s competitors. How does Chipotle’s internal environment compare to the internal environment of one of Chipotle’s competitors? Based on this analysis, what is the probability that the strategic moves implemented by Chipotle would lead to a sustainable competitive advantage? Explain.
  • What additional recommendations would you make for Chipotle to gain consumer trust and reclaim a leadership role in the fast food industry? Provide justification for your response.
  • Based on the information presented in this case study, what kind of business strategy would you suggest to help Chipotle achieve a competitive advantage?

Cryptography And Network Security

CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SEVENTH EDITION GLOBAL EDITION

William Stallings

Boston Columbus Indianapolis New York San Francisco Hoboken Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto

Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo

Hiva-Network.Com

 

http://www.hiva-network.com/

 

For Tricia: never dull, never boring, the smartest and bravest person

I know

ISBN 10:1-292-15858-1

ISBN 13: 978-1-292-15858-7

10 9 8 7 6 5 4 3 2 1

British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library

Vice President and Editorial Director, ECS: Marcia J. Horton Executive Editor: Tracy Johnson (Dunkelberger) Editorial Assistant: Kristy Alaura Acquisitions Editor, Global Editions: Abhijit Baroi Program Manager: Carole Snyder Project Manager: Robert Engelhardt Project Editor, Global Editions: K.K. Neelakantan Media Team Lead: Steve Wright R&P Manager: Rachel Youdelman R&P Senior Project Manager: William Opaluch Senior Operations Specialist: Maura Zaldivar-Garcia Inventory Manager: Meredith Maresca

Inventory Manager: Meredith Maresca Senior Manufacturing Controller, Global Editions: Trudy Kimber

Media Production Manager, Global Editions: Vikram Kumar

Product Marketing Manager: Bram Van Kempen Marketing Assistant: Jon Bryant Cover Designer: Lumina Datamatics Cover Art: © goghy73 / Shutterstock Full-Service Project Management: Chandrakala Prakash, SPi Global

Composition: SPi Global

Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook

appear on page 753.

© Pearson Education Limited 2017

The right of William Stallings to be identified as the author of this work has been asserted by him in accordance

with the Copyright, Designs and Patents Act 1988.

Authorized adaptation from the United States edition, entitled Cryptography and Network Security: Principles and Practice, 7th Edition, ISBN 978-0-13-444428-4, by William Stallings published by Pearson Education © 2017.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in

any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without either the prior

written permission of the publisher or a license permitting restricted copying in the United Kingdom issued by the

Copyright Licensing Agency Ltd, Saffron House, 6–10 Kirby Street, London EC1N 8TS.

All trademarks used herein are the property of their respective owners. The use of any trademark in this text does

not vest in the author or publisher any trademark ownership rights in such trademarks, nor does the use of such

trademarks imply any affiliation with or endorsement of this book by such owners.

Pearson Education Limited

Edinburgh Gate

Harlow

Essex CM20 2JE

England

and Associated Companies throughout the world

Visit us on the World Wide Web at:

www.pearsonglobaleditions.com

Typeset by SPi Global

Printed and bound in Malaysia.

 

http://www.pearsonglobaleditions.com

 

3

CONTENTS Notation 10

Preface 12

About the Author 18

PART ONE: BACKGROUND 19

Chapter 1 Computer and Network Security Concepts 19

1.1 Computer Security Concepts 21 1.2 The OSI Security Architecture 26 1.3 Security Attacks 27 1.4 Security Services 29 1.5 Security Mechanisms 32 1.6 Fundamental Security Design Principles 34 1.7 Attack Surfaces and Attack Trees 37 1.8 A Model for Network Security 41 1.9 Standards 43 1.10 Key Terms, Review Questions, and Problems 44

Chapter 2 Introduction to Number Theory 46

2.1 Divisibility and the Division Algorithm 47 2.2 The Euclidean Algorithm 49 2.3 Modular Arithmetic 53 2.4 Prime Numbers 61 2.5 Fermat’s and Euler’s Theorems 64 2.6 Testing for Primality 68 2.7 The Chinese Remainder Theorem 71 2.8 Discrete Logarithms 73 2.9 Key Terms, Review Questions, and Problems 78 Appendix 2A The Meaning of Mod 82

PART TWO: SYMMETRIC CIPHERS 85

Chapter 3 Classical Encryption Techniques 85

3.1 Symmetric Cipher Model 86 3.2 Substitution Techniques 92 3.3 Transposition Techniques 107 3.4 Rotor Machines 108 3.5 Steganography 110 3.6 Key Terms, Review Questions, and Problems 112

Chapter 4 Block Ciphers and the Data Encryption Standard 118

4.1 Traditional Block Cipher Structure 119 4.2 The Data Encryption Standard 129 4.3 A DES Example 131 4.4 The Strength of DES 134

 

 

4 CONTENTS

4.5 Block Cipher Design Principles 135 4.6 Key Terms, Review Questions, and Problems 137

Chapter 5 Finite Fields 141

5.1 Groups 143 5.2 Rings 145 5.3 Fields 146 5.4 Finite Fields of the Form GF( p) 147 5.5 Polynomial Arithmetic 151 5.6 Finite Fields of the Form GF(2n) 157 5.7 Key Terms, Review Questions, and Problems 169

Chapter 6 Advanced Encryption Standard 171

6.1 Finite Field Arithmetic 172 6.2 AES Structure 174 6.3 AES Transformation Functions 179 6.4 AES Key Expansion 190 6.5 An AES Example 193 6.6 AES Implementation 197 6.7 Key Terms, Review Questions, and Problems 202 Appendix 6A Polynomials with Coefficients in GF(28) 203

Chapter 7 Block Cipher Operation 207

7.1 Multiple Encryption and Triple DES 208 7.2 Electronic Codebook 213 7.3 Cipher Block Chaining Mode 216 7.4 Cipher Feedback Mode 218 7.5 Output Feedback Mode 220 7.6 Counter Mode 222 7.7 XTS-AES Mode for Block-Oriented Storage Devices 224 7.8 Format-Preserving Encryption 231 7.9 Key Terms, Review Questions, and Problems 245

Chapter 8 Random Bit Generation and Stream Ciphers 250

8.1 Principles of Pseudorandom Number Generation 252 8.2 Pseudorandom Number Generators 258 8.3 Pseudorandom Number Generation Using a Block Cipher 261 8.4 Stream Ciphers 267 8.5 RC4 269 8.6 True Random Number Generators 271 8.7 Key Terms, Review Questions, and Problems 280

PART THREE: ASYMMETRIC CIPHERS 283

Chapter 9 Public-Key Cryptography and RSA 283

9.1 Principles of Public-Key Cryptosystems 285 9.2 The RSA Algorithm 294 9.3 Key Terms, Review Questions, and Problems 308

 

 

CONTENTS 5

Chapter 10 Other Public-Key Cryptosystems 313

10.1 Diffie-Hellman Key Exchange 314 10.2 Elgamal Cryptographic System 318 10.3 Elliptic Curve Arithmetic 321 10.4 Elliptic Curve Cryptography 330 10.5 Pseudorandom Number Generation Based on an Asymmetric Cipher 334 10.6 Key Terms, Review Questions, and Problems 336

PART FOUR: CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS 339

Chapter 11 Cryptographic Hash Functions 339

11.1 Applications of Cryptographic Hash Functions 341 11.2 Two Simple Hash Functions 346 11.3 Requirements and Security 348 11.4 Hash Functions Based on Cipher Block Chaining 354 11.5 Secure Hash Algorithm (SHA) 355 11.6 SHA-3 365 11.7 Key Terms, Review Questions, and Problems 377

Chapter 12 Message Authentication Codes 381

12.1 Message Authentication Requirements 382 12.2 Message Authentication Functions 383 12.3 Requirements for Message Authentication Codes 391 12.4 Security of MACs 393 12.5 MACs Based on Hash Functions: HMAC 394 12.6 MACs Based on Block Ciphers: DAA and CMAC 399 12.7 Authenticated Encryption: CCM and GCM 402 12.8 Key Wrapping 408 12.9 Pseudorandom Number Generation Using Hash Functions and MACs 413 12.10 Key Terms, Review Questions, and Problems 416

Chapter 13 Digital Signatures 419

13.1 Digital Signatures 421 13.2 Elgamal Digital Signature Scheme 424 13.3 Schnorr Digital Signature Scheme 425 13.4 NIST Digital Signature Algorithm 426 13.5 Elliptic Curve Digital Signature Algorithm 430 13.6 RSA-PSS Digital Signature Algorithm 433 13.7 Key Terms, Review Questions, and Problems 438

PART FIVE: MUTUAL TRUST 441

Chapter 14 Key Management and Distribution 441

14.1 Symmetric Key Distribution Using Symmetric Encryption 442 14.2 Symmetric Key Distribution Using Asymmetric Encryption 451 14.3 Distribution of Public Keys 454 14.4 X.509 Certificates 459

 

 

6 CONTENTS

14.5 Public-Key Infrastructure 467 14.6 Key Terms, Review Questions, and Problems 469

Chapter 15 User Authentication 473

15.1 Remote User-Authentication Principles 474 15.2 Remote User-Authentication Using Symmetric Encryption 478 15.3 Kerberos 482 15.4 Remote User-Authentication Using Asymmetric Encryption 500 15.5 Federated Identity Management 502 15.6 Personal Identity Verification 508 15.7 Key Terms, Review Questions, and Problems 515

PART SIX: NETWORK AND INTERNET SECURITY 519

Chapter 16 Network Access Control and Cloud Security 519

16.1 Network Access Control 520 16.2 Extensible Authentication Protocol 523 16.3 IEEE 802.1X Port-Based Network Access Control 527 16.4 Cloud Computing 529 16.5 Cloud Security Risks and Countermeasures 535 16.6 Data Protection in the Cloud 537 16.7 Cloud Security as a Service 541 16.8 Addressing Cloud Computing Security Concerns 544 16.9 Key Terms, Review Questions, and Problems 545

Chapter 17 Transport-Level Security 546

17.1 Web Security Considerations 547 17.2 Transport Layer Security 549 17.3 HTTPS 566 17.4 Secure Shell (SSH) 567 17.5 Key Terms, Review Questions, and Problems 579

Chapter 18 Wireless Network Security 581

18.1 Wireless Security 582 18.2 Mobile Device Security 585 18.3 IEEE 802.11 Wireless LAN Overview 589 18.4 IEEE 802.11i Wireless LAN Security 595 18.5 Key Terms, Review Questions, and Problems 610

Chapter 19 Electronic Mail Security 612

19.1 Internet Mail Architecture 613 19.2 Email Formats 617 19.3 Email Threats and Comprehensive Email Security 625 19.4 S/MIME 627 19.5 Pretty Good Privacy 638 19.6 DNSSEC 639 19.7 DNS-Based Authentication of Named Entities 643 19.8 Sender Policy Framework 645 19.9 DomainKeys Identified Mail 648

 

 

CONTENTS 7

19.10 Domain-Based Message Authentication, Reporting, and Conformance 654 19.11 Key Terms, Review Questions, and Problems 659

Chapter 20 IP Security 661

20.1 IP Security Overview 662 20.2 IP Security Policy 668 20.3 Encapsulating Security Payload 673 20.4 Combining Security Associations 681 20.5 Internet Key Exchange 684 20.6 Cryptographic Suites 692 20.7 Key Terms, Review Questions, and Problems 694

APPENDICES 696

Appendix A Projects for Teaching Cryptography and Network Security 696

A.1 Sage Computer Algebra Projects 697 A.2 Hacking Project 698 A.3 Block Cipher Projects 699 A.4 Laboratory Exercises 699 A.5 Research Projects 699 A.6 Programming Projects 700 A.7 Practical Security Assessments 700 A.8 Firewall Projects 701 A.9 Case Studies 701 A.10 Writing Assignments 701 A.11 Reading/Report Assignments 702 A.12 Discussion Topics 702

Appendix B Sage Examples 703

B.1 Linear Algebra and Matrix Functionality 704 B.2 Chapter 2: Number Theory 705 B.3 Chapter 3: Classical Encryption 710 B.4 Chapter 4: Block Ciphers and the Data Encryption Standard 713 B.5 Chapter 5: Basic Concepts in Number Theory and Finite Fields 717 B.6 Chapter 6: Advanced Encryption Standard 724 B.7 Chapter 8: Pseudorandom Number Generation and Stream Ciphers 729 B.8 Chapter 9: Public-Key Cryptography and RSA 731 B.9 Chapter 10: Other Public-Key Cryptosystems 734 B.10 Chapter 11: Cryptographic Hash Functions 739 B.11 Chapter 13: Digital Signatures 741

References 744

Credits 753

Index 754

 

 

8 CONTENTS

ONLINE CHAPTERS AND APPENDICES1

PART SEVEN: SYSTEM SECURITY

Chapter 21 Malicious Software

21.1 Types of Malicious Software (Malware) 21.2 Advanced Persistent Threat 21.3 Propagation—Infected Content—Viruses 21.4 Propagation—Vulnerability Exploit—Worms 21.5 Propagation—Social Engineering—Spam E-mail, Trojans 21.6 Payload—System Corruption 21.7 Payload—Attack Agent—Zombie, Bots 21.8 Payload—Information Theft—Keyloggers, Phishing, Spyware 21.9 Payload—Stealthing—Backdoors, Rootkits 21.10 Countermeasures 21.11 Distributed Denial of Service Attacks 21.12 References 21.13 Key Terms, Review Questions, and Problems

Chapter 22 Intruders

22.1 Intruders 22.2 Intrusion Detection 22.3 Password Management 22.4 References 22.5 Key Terms, Review Questions, and Problems

Chapter 23 Firewalls

23.1 The Need for Firewalls 23.2 Firewall Characteristics and Access Policy 23.3 Types of Firewalls 23.4 Firewall Basing 23.5 Firewall Location and Configurations 23.6 References 23.7 Key Terms, Review Questions, and Problems

PART EIGHT: LEGAL AND ETHICAL ISSUES

Chapter 24 Legal and Ethical Aspects

24.1 Cybercrime and Computer Crime 24.2 Intellectual Property 24.3 Privacy 24.4 Ethical Issues 24.5 Recommended Reading 24.6 References 24.7 Key Terms, Review Questions, and Problems 24.A Information Privacy

1Online chapters, appendices, and other documents are at the Companion Website, available via the access card at the front of this book.

 

 

CONTENTS 9

Appendix C Sage Exercises

Appendix D Standards and Standard-Setting Organizations

Appendix E Basic Concepts from Linear Algebra

Appendix F Measures of Secrecy and Security

Appendix G Simplified DES

Appendix H Evaluation Criteria for AES

Appendix I Simplified AES

Appendix J The Knapsack Algorithm

Appendix K Proof of the Digital Signature Algorithm

Appendix L TCP/IP and OSI

Appendix M Java Cryptographic APIs

Appendix N MD5 Hash Function

Appendix O Data Compression Using ZIP

Appendix P PGP

Appendix Q The International Reference Alphabet

Appendix R Proof of the RSA Algorithm

Appendix S Data Encryption Standard

Appendix T Kerberos Encryption Techniques

Appendix U Mathematical Basis of the Birthday Attack

Appendix V Evaluation Criteria for SHA-3

Appendix W The Complexity of Algorithms

Appendix X Radix-64 Conversion

Appendix Y The Base Rate Fallacy

Glossary

 

 

NOTATION

Symbol Expression Meaning

D, K D(K, Y) Symmetric decryption of ciphertext Y using secret key K

D, PRa D(PRa, Y) Asymmetric decryption of ciphertext Y using A’s private key PRa

D, PUa D(PUa, Y) Asymmetric decryption of ciphertext Y using A’s public key PUa

E, K E(K, X) Symmetric encryption of plaintext X using secret key K

E, PRa E(PRa, X) Asymmetric encryption of plaintext X using A’s private key PRa

E, PUa E(PUa, X) Asymmetric encryption of plaintext X using A’s public key PUa

K Secret key

PRa Private key of user A

PUa Public key of user A

MAC, K MAC(K, X) Message authentication code of message X using secret key K

GF(p) The finite field of order p, where p is prime.The field is defined as the set Zp together with the arithmetic operations modulo p.

GF(2n) The finite field of order 2n

Zn Set of nonnegative integers less than n

gcd gcd(i, j) Greatest common divisor; the largest positive integer that

divides both i and j with no remainder on division.

mod a mod m Remainder after division of a by m

mod, K a K b (mod m) a mod m = b mod m

mod, [ a [ b (mod m) a mod m ≠ b mod m

dlog dloga,p(b) Discrete logarithm of the number b for the base a (mod p)

w f(n) The number of positive integers less than n and relatively prime to n. This is Euler’s totient function.

Busines Law, Ethics And Social Responsibility

Discussion Assignment

For this assignment write at least 300 words answering the following.

  • Corporations often “vote      with their feet” in terms of doing business where expenses are lowest      and revenues are highest. Buying low and selling high is a basic economic      formula for success that has motivated international trade in many ways      over the centuries.  This is popularly discussed when governments      consider tax policies and is also applicable when they also consider      the less obvious factor of environmental protections laws. If Mexico has      no ban on DDT (a pesticide used in agriculture) and the USA has banned the      use (but not the manufacture) of DDT, should a corporation buy land in      Mexico, import DDT from the USA, grow larger crops, and export them to the      USA?
  • What ethical duties does the corporation have to the      workers in Mexico, the neighboring landowners, and the USA consumers about      the potential dangers of using DDT?
  • Is there an ethical duty of DDT manufactures related to      their export of DDT to countries that do not ban its use as the USA does?
  • Do you agree that environmental protection laws are      “less obvious” as suggested above? Why/why not?

Discussion Responses

It is your responsibility to respond to three classmates by providing comments, asking questions, or having a conversation about their main post. Feedback should be appropriate, meaningful, and helpful. For instance refer to how your own experience supports/contradicts the opinions developed by your peers. If you think they are too general or not rooted enough in personal experience, you may also ask for more detailed examples supporting these opinions. In particular make sure that the examples provided are properly referenced and that you are able to access them. Overall, your comments should contribute positively to the conversation by broadening or clarifying it. Feedback should be at least 3-4 complete sentences. You should also respond to anyone who has responded to you.

Learning Guide Unit 3

Written Assignment

Use the Instructions for Case Analyses to craft a response to this case, articulating the main issues and ethical dilemma.   Review the assessment criteria below before you begin writing.

Topic: Corporate Social Responsibility

People Involved:

  • Bob,      President
  • John,      Chemical Engineer
  • Henry,      Controller
  • Kirk,      Assistant Controller

Kirk is a bright individual who is being groomed for the Controller’s position in a medium-sized manufacturing firm. After his first year as Assistant Controller, the officers of the firm were starting to include him in major company functions. For instance, today he was attending the monthly financial statement summary given at a prestigious consulting firm. During the meeting, Kirk was intrigued at how all the financial data he had been accumulating was transformed by the consultant into revealing charts and graphs.

Kirk was generally optimistic about the session and the company’s future until the consultant started talking about the new manufacturing plant the company was adding to the current location and the costs per unit of the chemically plated products it produced. At that time, Bob (the President) and John (the chemical engineer) started talking about waste treatment and disposal problems. John mentioned that the current waste facilities were not adequate to handle the waste products that would be created by the “ultramodern” new plant in a manner that would meet the industry’s fairly high standards, although they could still comply with federal standards. Kirk’s boss, Henry, noted that the estimated cost per unit would be increased if the waste treatment facilities were upgraded according to recent industry standards.

While industry standards are presently more stringent than federal regulations, environmentalists are strongly pressuring for more stringent regulations at the federal level. Bob mentioned that since their closest competitor did not have the waste treatment facilities that already existed at their firm, he was not in favor of further expenditure in this area. Most managers at this meeting resoundingly agreed with Bob, and business continued on to another topic.

Kirk did not hear a word during the rest of the meeting. He kept wondering how the company could possibly have such a casual attitude toward the environment. Yet he did not know if, how, or when he could share his opinion. Soon he started reflecting on whether this was the right firm for him. What should Kirk do? Putting Corporate Responsibility first, but recognizing the politics at play, what is the most ethical thing to do? The most practical? What strategy would you suggest to Kirk if he came to you for advice?

Written Assignment Requirements

Submit a written paper which is 2-3 pages in length exclusive of reference page and that is double-spaced. The paper should cite sources to support your ideas. Be sure to review the assessment criteria below before beginning your paper. Cite any reference(s) you use in the preparation of your essay using proper APA format.

Written Assignment Peer Assessment

In the unit following the submission of your written assignment, you will peer assess three (3) of your classmates’ assignments according to the instructions found in the Assessment Form. During this peer assessment period, you are expected to provide details in the feedback section of the Assessment Form, indicating why you awarded the grade that you did to your peer. The written assignment grade is comprised of a combination of your submission (90%) and your peer assessments (10%).

Written Assignment Peer Assessment Rubric

For this assignment, your peers will be evaluating your work with the following criteria.

  • Identifies      all the relevant facts of the case.
  • Articulates      overarching ethical issues including the extent of Kirk’s responsibility      to take action; how the interests of the firm (and stockholders) can be      balanced against the environmental interests; what obligation the company      has to future generations and citizens.
  • Identifies      all stakeholders.
  • Poses      possible alternatives and ethics of each alternative. Paper should explore      the possible alternatives and ethics from the Utilitarian Perspective, the      Rights Perspective,or the Justice Perspective.
  • Identifies      all practical constraints.
  • Recommends      a specific action Kirk should take, which may include leaving the company.
  • Is of high      quality, writing is clear and professional.
  • Conforms to      the structural requirements including APA style guidelines for References.