Reference no: EM131381725 , Length: 3
Assignment : Whistleblowing and the Sarbanes-Oxley Act
Use the Internet or Strayer Library to research instances of whistleblowing in publicly traded companies within the last 3 years.
Write a two to three (2-3) page paper in which you:
Describe the key characteristics of a whistleblower, and briefly summarize one (1) researched instance of whistleblowing in one (1) publicly traded company within the last 3 years. Include the details of the issue that the whistleblower reported and the effect of the whistleblower's actions on both the whistleblower himself and the company.
Decide whether or not the whistleblower was justified in reporting the company's actions. Provide a rationale for your response.
Examine the extent to which the whistleblower would be protected, or not protected, under the Sarbanes-Oxley Act. Justify your response either way and explain and identify SOX and its application.
Use at least two (2) quality resources in this assignment. Note: Wikipedia is not an acceptable reference.
Your assignment must follow these formatting requirements (please see the Attachment with APA rules):
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.
The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Determine the underlying causes for passage of the Sarbanes-Oxley Act and determine protections afforded to whistleblowers.
Use technology and information resources to research issues in law, ethics, and corporate governance.
Write clearly and concisely about law, ethics, and corporate governance using proper writing mechanics.
What is the scope of each act as it concerns us citizens
: The chief information officer (CIO) of the long-term care (LTC) facility is preparing for retirement and considering recommending you to take her place. Before she makes the recommendation to the board of directors, she wants to see how much you k..
|
Role of data mining
: Search for a relevant and/or timely article involving data mining. Describe the role of "data mining" in the story using your own words. Try to identify the type of data analysis method used (association, classification, cluster, outlier, etc.).
|
Network fundamental characteristics and components
: Select an organization you are familiar with, or select one of the Virtual Organizations (Riordan Manufacturing or Kudler Foods), for your project. This project will continue throughout the coming weeks and build upon itself culminating in Week Fi..
|
Write appropriate hypotheses
: Do these figures give evidence of a change in student attendance?
|
Describe the key characteristics of a whistleblower
: Describe the key characteristics of a whistleblower, and briefly summarize one (1) researched instance of whistleblowing in one (1) publicly traded company within the last 3 years. Include the details of the issue that the whistleblower reported a..
|
Security challenges for system administrators
: Bring Your Own Device created security challenges for system administrators. identify potential problem personal devices, share instances or examples of what makes them high risk, and provide potential solutions or advantages of a BYOD policy. you..
|
Infinite number of solutions to puzzle
: There is an infinite number of solutions to this puzzle. Each solution is of the form: number of coconuts = 12495 + 15625 * a, where a=0,1,2,3. . . .
|
Initial steps in creating a security policy
: Choose a company for this project and consider the initial steps in creating a security policy. Develop security goals and components that make up a quality Executive Summary.
|
Create a gui to display the structure
: Read a data file, create the internal data structure, create a GUI to display the structure, and let the user search the structure. Sort the structure, use hash maps to create the structure more efficiently.
|