This website uses cookies to ensure you have the best experience. Learn more

Trojan Horse Or Workhorse Essay

822 words - 4 pages

‘Trojan Horse’  or ‘ Workhorse’ ?
The evolution of U.S.- Japanese Joint Ventures in the USA

J-F Hennart, Thomas Roehl and Dixie S. Zietlow

Introduction :

← Rapid growth of Japanese FDI in the U.S.A.

← 1st significant investment by a non-Western nation ((Japan)

← Suspicion: Lot of authors suspect that the Japanese firms’ behavior disadvantages their partners (in a J.V.)

← Authors found out that the Japanese partner was:

( Good at learning from their partner (US/EU partner)
( Once the learning is complete
( Japanese partner has no reason to continue the JV
( JV end up by being liquidate/acquire (by buying the US stakes of his partner) by ...view middle of the document...

= the degree to which the knowledge possessed by the firm's employees is open and accessible to the other joint venture partner.

Agreeing with Reich/Mankin, all Western managers interviewed believed that the Japanese were inherently less transparent than themselves.

- Receptivity:

= How you get the information, how receptive you are.

Receptivity is > in Japanese firms than in their Western counterparts.

( Since Hamel found that Japanese firms tend to possess more of these 3 factors than their American partners, he concluded that U.S.-Japanese joint ventures will tend to end up fully acquired by their Japanese partners. 

3) Pucik:


Evolution of JV:

3 possible scenarios:


Analysis :
« Trojan Horse » Hypothesis is verified if:

← Strong version:
The # of cases of U.S.-Japanese J.V. in the USA where the Japanese partner buys full ownership from its U.S. partner is > than those where the Japanese partner sells its share to its U.S. partner or where ownership shares remain unchanged.

← Weak version:
The # of cases of U.S.-Japanese J.V. in the USA where the Japanese partner buys full ownership from its U.S. partner or where the joint venture is liquidated is higher than those where the Japanese partner sells its share to its U.S. partner or where the ownership shares remain unchanged.

This paper attempt to discover whether a Trojan Horse characterisation fits the full population of US-Japanese JV or not.
A lot of JV were taken to see if there were a trend towards acquisition/ liquidation by the Japanese parents.

( Does the Trojan Horse hold in real-life or not:

The analysis of our...

Other Papers Like Trojan Horse or Workhorse

The Myth Of Aeneas: Description Of His Life

704 words - 3 pages of the walls of Troy. I believe that the artist's sympathies lie with the Greeks because all of the Trojan people look angry or clueless, as if they were not worthy of their city due to their foolishness. In my opinion, this episode has become one of the most popular and lasting legends because it demonstrated a simple ending to a complex war. While the Trojans and Greeks were each a great and mighty force, the Trojan war was ended with a giant wooden horse housing Greek men. Such an ending to a great conflict must in principle go into history as legendary.

It's About How One Handles Their Mistakes

1283 words - 6 pages their mistakes is a difficult thing to do, yet still, Achilles manages to do both, thereafter indicating his honor. Since The Iliad is based on the Trojan War which took place in the 11th or 12th century while pride was considered an essential aspect of one’s life, some characters take part in this prideful thinking which leads them to their tragic downfall. After hearing of Achilles’s return to battle to avenge a fallen comrade, Hector, the

Billy Bob

339 words - 2 pages Billy Bob Trapped Doors and Trojan Horses Discussion questions 1. Forensic auditing is basically going through one aspect of an audit with a comb. The auditor will be paying more attention to specifically cases that have fraud. This is mostly done when fraud is suspected. They will do as much as possible for that one aspect to make sure it is acceptable or not. 2. Danny Mays was submitting fake expense forms from employees to

Common Forms of Attacks on Microsoft Systems

600 words - 3 pages even destruction of data and / or the whole network itself. According to Michael Solomon’s book, “Security Strategies in Windows Platforms and Applications”, attackers can use several different forms of attacks in order to accomplish their goals, for example: Trojan horse- which is a computer virus that is a malicious program that allows the attacker to perform actions that have not been authorized by the user, for example: Deleting, Blocking

Ethical It

603 words - 3 pages we’ve seen that the U.S. government is able to use information illegally obtained by international hackers in order to prosecute U.S. citizens. This essay will review the case of a unanimous white-hat hacker from Turkey using a Trojan horse to find individuals with child pornography on their personal computers. In early 2000, an anonymous Turkish citizen was able to utilize a Trojan horse to identify users that frequent and download child

Salesoft Case Analysis

2627 words - 11 pages firms in evaluating which processes to automate, how the functions in various processes to automate are related and which vendors to choose. Currently, SaleSoft does not have any partnerships with consultants. Hence, consultants do not have any role to play during the sale of PROCEED. Trojan Horse: SaleSoft is contemplating introducing a new product called Trojan Horse. Trojan Horse or TH is a system, which enables companies to manage their

Sale Soft Case Study Analysis

2663 words - 11 pages recognizes that a portion of its consumer base wants a product that is based on the completed part of PROCEED (Sales System) but offers greater functionality (Sales Forecasting). This product, called Trojan Horse (TH), if developed will take 3 months and USD 200000 to be completed. It is much cheaper than PROCEED. However, SaleSoft doesn’t have the resources to either develop or market the 2 products simultaneously. Further, it has already spent a

Introduction to Cyber Crime

1950 words - 8 pages destroying data rather than stealing or misusing them is called cyber vandalism. Transmitting virus: These are programs that attach themselves to a file and then circulate . They usually affect the data on a computer, either by altering or deleting it against properties. VIRUS DISSEMINATION: Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc). VIRUS: A computer virus is a

The School of Cheating

1807 words - 8 pages force the machine into a botnet system which is part of DDOS attack. Some attacks that can be unintended or used out of pure intent of being malicious is to crash the victims PC, corrupt data and even format storage disks. Key loggers are often used in Trojan form. Worms are another type of virus that can infect a victim’s computer. The worm virus is designed to cripple computer networks and systems. One of the traits of the worm allows it to

Cio White Paper

1543 words - 7 pages template so that this artifact, if submitted to the system, will produce a match); Trojan horse attacks; and overriding Yes/No response. All of these attacks are well known flaws of existing biometric systems. The biometric module can only output either an ‘accept’ or ‘reject’ decision. If accept, the cryptographic key will be released from the key management module. If reject, the system will not release any key. Here, biometric

Computer Info

731 words - 3 pages ? A virus is malicious code which will lower or stop system performances. A worm on the other hand is a special type of virus that spread through the memory to avoid detection and will consume the computers resources. a Trojan horse is any type of malicious software that uses a trigger to activate, such as opening a certain program or reaching a certain date. 3. Explain the different with regard to power “irregularities” and the

Related Essays

Term Project Essay

1698 words - 7 pages The Workings of Trojan Horse Viruses Name School In Partial Fulfillment of the requirements for Class Professor Due Date Abstract Since the beginning of computer security one form of malware has always been a thorn in everyone’s side, it is one of the oldest and most commonly misunderstood malware and people hardly ever see it coming. It is the Trojan horse; a piece of programming code disguised as another program or file. This

Unit 9 Essay

298 words - 2 pages malicious code terms Term – Trojan horse Program Definition – generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data and possible system harm. How it works – A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer. A computer may hosts a Trojan via a malicious program a user is duped into executing or by drive-by download

Market Place Marketing Plan Essay

5893 words - 24 pages approximately 10 people per sales office and will reduce or increase this number as the economics of each sales office in terms of sales per employee become better understood. Overall, CompuStar is currently in "second place" if you go by sales volume and a balanced score card, but we believe that in the second year we will violently overtake our competition. We feel that we will maintain a firm monopoly on the WorkHorse brand and that we will

Internet Security Essay

1019 words - 5 pages fake return addresses and tailor subject lines and content so the message appears to be from them or another financial institution ‘confirming’ your information. Don’t fall for them. A Trojan horse is a program that is downloaded by a computer user that does not destroy data or files. Instead, a Trojan horse allows files to be accessed by outside parties. The problem begins with a download of a file that seems innocent - perhaps a song or small