essay background information

Page 1

AReportOnTeslaMotors

BackgroundInformation

➢HistoryTeslaMotorswasfoundedin2003byagroupofengineersinSiliconValleythatwanted toprovetotheworldthatelectriccarswerethecarsofthefuture(TeslaMotors,Inc,nd–a)The goalofTeslaMotorswastomakeelectricvehiclesthathadinstanttorque,incrediblepower,and zeroemission(TeslaMotors,Inc,n.d.–a).TeslaMotorsengineersfirstbegandesigningapowertrain sportscarbuiltaroundanACinductionmotor,patentedin1888byNikolaTesla,theinventorwho inspiredthecompany'sname(TeslaMotors,Inc,n.d.–a).In2008,TeslaMotorslaunchedtheTesla Roadster(TeslaMotors,Inc,nd–a)TheRoadsterwasabletotravel245milesperchargeand acceleratefrom0to60in3.7seconds(TeslaMotors,Inc,n.d.–a).TeslaMotorswouldsell2,400 Roadstersinover30countries(TeslaMotors,Inc,n.d.–a).In2012,TeslaMotorsdiscontinuedtheir RoadsterdesignandlaunchedtheirModelSelectricsedanIn2013,theModelSwonMotorTrend's CaroftheYearawardandachieveda5–starsafetyratingfromtheU.S.NationalHighwayTraffic SafetyAdministration(TeslaMotors,Inc,n.d.–a).In2014,anall–wheeldriveconfigurationofthe ModelSthatfurtherincreasedperforceinaccelerationachievinga0to60in3.2seconds(Tesla Motors,Inc,n.d.–a).In2015,TeslaMotorsbegansellingafull–sizeall–electriccrossoverSUV,the ModelXTheModelXhassoldover2,600unitssinceitslaunch(TeslaMotors,Inc,

...Getmorecontent...

Background

InformationWarfareisdefinedas,"theoffensiveanddefensiveuseofinformationandinformation systemstodeny,exploit,corrupt,ordestroy,anadversary'sinformation,information–based processes,informationsystems,andcomputer–basednetworkswhileprotectingone'sownSuch actionsaredesignedtoachieveadvantagesovermilitaryorbusinessadversaries"(Goldberg). Cyber–Terrorismisdefinedas,"theunlawfuluseofforceorviolenceagainstpersonsorpropertyto intimidateorcoerceagovernment,thecivilianpopulation,oranysegmentthereof,infurtheranceof politicalorsocialobjectivesintheworldwidenetworkofcomputerand/orcomputernetworksthat usetheTCP/IPnetworkprotocolstofacilitatedatashowmorecontent

Thegoalwastoattainthehighestlevelciphermachine,theEnigma"(Bamford).Unfortunately detailsontheFishandtheEnigmaarestillabovetopsecretandcan'tbeexplainedindetail. However,Iwillgointomoredetailofinformationwarfareandcyber–terrorismasIintroducethe facts,whichsurroundthesetwoterms.

UnderstandingthesituationofInformationWarfareandCyber–Terrorismrequiresthe acknowledgementanddiscussionofrelevantfacts.TheUnitedStateshasspiedonothercountriesin thepast,currentlyspiesonothercountries,andwillspyonothercountriesforalongtimetocome OneexampleisourcurrentsituationwithChina.AsChinagrowseconomicallyandmilitarilythey presentapossiblefuturethreattotheUnitedStates."Morefundamentally,thereisaquestionabout thelong–termfutureoftheUS–ChinarelationshipasChinaactualizesitsenormouseconomic potentialandbecomesaneverstrongerregionalpower.Therearesomebasicincompatibilities betweenourtwocountries,andtheseareasourceoftension"(Davidson).Anotherfactisthatthe UnitedStatesusesInformationWarfaretechniquestospyonothercountries."Ofallformsof intelligencecollection,aerialsurveillancefrominternationalairspaceisamongthemostbenignand non–intrusiveItisquitedifferentfrombribingofficialsorliterallystealingsecrets"

...Getmorecontent...

EssayaboutBackground

ACC476/726–AuditingDiscussionCaseQuestionsFall2004GeneralInformationTheaudit discussioncasesarereal–worldexamplesofproblemsthatauditorsfaceinpractice.Eachindividual caseisbrief,andeverymemberoftheclassshouldreadthecasepriortoclassandcomepreparedto participateinclassdiscussion.Insteadofthequestionsinthecasebook,wewilldiscussspecific issuesrelatedtothetopiccurrentlybeingdiscussedinclassThequestionscanusuallybeanswered usingyourownopinionsandthecaseinformation.Theissuestobediscussedforthecasesfollow. BerkshireHathaway–Tuesday,September7,2004Background:Thecasecapturesthedynamicsof auditor–clientrelationsTheSEChasshowmorecontent Howcouldshehavehandledthesituation?4.DoyouthinkVaughnshouldhavehandledthe situationdifferently?Explain.5.Doyoubelievethefirm'sresponsetothesituationwasappropriate? Explain.Arethereotherwaysthatthesituationcouldhavebeensuccessfullyresolved?6.Wasit appropriateforthefirmtopromiseWalkeragoodrecommendation?OakIndustries–Thursday, September16,2004Tuesday,September21,2004Background:Auditorshavehistoricallybeen moreconcernedwithoverstatementsthanunderstatementsofearnings.However,recentSECrulings suggestthatauditorsneedtoalsobeconcernedaboutunderstatementsofearnings,particularlywhen theyareusedtomanipulateearningsinfutureperiods.Actors:OakIndustriesCEO,CFO,and controller(Group4–TrineJuliussen,SangUkJung,LauraPlatler)1.Somepeoplewouldargue thatcreating"rainyday"fundsisjustconservativeaccountingWhyshouldinvestorsandtheSEC careaboutunderstatementsofearnings?2.WhydidOakIndustriesintentionallyunderstate earnings?Whatotherfactorsmightmotivatefirmstounderstatetheirearnings?3.Auditorshave generallybeenmoreconcernedaboutoverstatementsofearningsthanunderstatementsAuditors havealsonormallyonlybeenconcernedwhenthoseoverstatementsexceededcertainmateriality limits,suchas5%ofnetincome.Hasthisresponsibilityincreasedto

GeneralInformationEssay
...Getmorecontent...

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.