Saturday, February 15, 2020

Corporate Communication Strategy-Toyota case Essay

Corporate Communication Strategy-Toyota case - Essay Example The unintended acceleration was attributed to floor mat issues, brakes and sticky gas pedal. The company has since recalled nearly 8 million cars of different models that were deemed to have potential problems with gas pedal mechanism which could lead to unintended acceleration (McKenzie & Scott, 2010). 2. Environmental scanning of the company Toyota has enjoyed an unblemished reputation within the auto industry. In the fast transforming business dynamics, the various environmental factors become crucial paradigms to maintain competitive advantage within the industry. PESTLE and SWOT analysis become vital tools for firms to identify and evaluate elements that can help them compete and succeed in the highly competitive business environment (Burnes, 2009). They promote the wider understanding of socio-political environment within which the firms operate. They were conducted to understand Toyota’s market position prior to the crisis and how it was impacted in post crisis period. (Refer to Appendix A) 2a. PESTLE analysis for America In the current environment of rapid globalization, practice of international businesses is considerably impacted by the different political, economic and legal systems of nations (Hills, 2004). The businesses therefore need to become more flexible and adapt to the changing technologies and work environments. PESTLE analysis of Toyota has been conducted for America because the case focuses on the Toyota’s American market and the performance and quality of its various models in America. PESTLE has emerged as critical issues that need to be incorporated within the business strategy when firms expand across globe. 2a.1 Political environment America is one of the largest democratic states of the world. The public is hugely empowered with information and the socio-political environment promotes proactive participation of people in issues which affect them. Thus, businesses need to be more accountable in their actions and take in to account the expectations of the people at large. The sticky pedal case of Toyota had drawn more public attention towards the firm undermining it’s hitherto brand reputation of quality, dependability and value. 2a.2 Economic It is a very important factor because the market is driven by the demand and supply that is mainly dependent on the buying capacity of the consumers. It has big market in America. Despite the current environment of recession, the networking solutions have become the critical part of industrial success and therefore, an intrinsic part of business strategy. Toyota therefore has huge economic stake in the American market and needed to restore public trust by responding favourably to the crisis situation. 2a.3 Socio-cultural paradigm There is huge socio-cultural diversity amongst the masses. With multi-cultural society, the demographic factors are vital ingredients that have huge cascading effect on the market. The demographic changes vis-a-vis population s ize, age distribution, gender ratio, income group etc. have immense influence on the changing consumer preferences and consequently on the profitability of the firm. Kotler et al (2007) emphasize that in the fast changing global business, demographic compulsions have significant impact on market position and therefore, they need to become intrinsic part of the market strategy of the

Sunday, February 2, 2020

Information and computer security Assignment Example | Topics and Well Written Essays - 1500 words

Information and computer security - Assignment Example e biometric user authentication system whereby the system is able to undertake automated authentication of users based on the biometric traits of their iris. The system particularly combines with use of cryptographic keys with the distinctive biometric traits of iris to develop authentication algorithms that can be used to provide individuals with access permission to an information system or data. As opposed to the use of the traditional passwords and PINs, crypto-biometric systems such as the iris based cryptographic keys are significantly more stable and less susceptible to attacks. For example, the public key infrastructure (PKI) method of generation may use the iris biometric features to enhance the security of Private Key and protect the user authentication systems against potential intruders (Bowyer, Hollingsworth, and Flynn, 2006). This is a significant improvement on the traditional cryptosystems where user authentication primarily relies on the possession of secrete keys wh ich may easily be forgotten, stolen or lost, and thus do not often provide nonrepudiation. Generally, the use of iris may provide a number of advantages and solutions to some of these challenges facing the traditional cryptosystems. For example, iris based key generation method for cryptography together with generation algorithms can be used to effectively bind cryptographic keys with the biometric template of a user in such a way that makes it significantly impossible to reveal the key without a successful biometric authentication. The process of using iris based key generation method for cryptography to develop a user authentication system usually involves a number of steps. Firstly, the biometric data of the iris of an individual is acquired using sensors and then the distinctive features are extracted before enrolling the user for biometric authentication. Next, the data is then used to generate cryptographic keys which can be released whenever an authorized user key presents