How could gm use game theory to identify major risks

Assignment Help Computer Engineering
Reference no: EM132322607

Question: Chapters 30, 31, and 34 presented three mini-case studies on ERM and risk. Each one presented a slightly different risk scenario. Suppose General Motors wants to replace one of their traditional lines of vehicles with all electric models. How could GM use game theory to identify and assess the major risks to this decision? Identify two major risks that would result from GM converting an existing line to an all-electric line. Provide a brief discussion of each risk, and your assessment of the levels of inherent, current, and residual risk, using GM's five point scale.

To complete this assignment, you must do the following: Suppose General Motors wants to replace one of their traditional lines of vehicles with all electric models. How could GM use game theory to identify and assess the major risks to this decision? Identify two major risks that would result from GM converting an existing line to an all-electric line. Provide a brief discussion of each risk, and your assessment of the levels of inherent, current, and residual risk, using GM's five point scale.

Instructions: A) Post an answer to the Discussion Question (150-word minimum) by creating a thread. This should be done by Sunday night.

B) Respond to AT LEAST another student's answer and post substantive comments on those threads, evaluating the pros and cons of that student's recommendations. Your comments should extend the conversation started with the thread (also 100-word minimum) by Sunday night.

ALL original posts and comments must be substantive (100-word minimum).

Include at least one reference in your answer to the question. Your reference(s) should be APA compliant.

Reference no: EM132322607

Questions Cloud

Mitigate continuous requirements changes : What are some way to mitigate continuous requirements changes? select three alternatives
Become a member of a csirt : What type of training is required to become a member of a CSIRT?
Analyze data and create reports using given information : Your organization uses Microsoft Excel to maintain its inventory. The company is growing rapidly and has reached the point where an inventory database is needed
Research on one of algorithms : There are several decision tree induction algorithms (e.g., CART, C4.5, CHAID). Do some research on one of these algorithms, and discuss your findings.
How could gm use game theory to identify major risks : How could GM use game theory to identify and assess the major risks to this decision? Identify two major risks that would result from GM converting an existing.
What is a token : What is a token? How does the shell decide where one token ends and another begins? This is a unix/linux class.
Describe benefits of system to include relevant examples : Describe, in detail, the benefits of this system to include relevant examples. The paper must be formatted following proper APA formatting guidelines.
Input into a single cell of a spreadsheet : Using ONLY Excel Functions, convert the following into one Excel formula, which could be input into a single cell of a spreadsheet.
What is the minimum height of the tree : Show the tree What is the inorder,preorder, and postorder traversal

Reviews

Write a Review

Computer Engineering Questions & Answers

  A behavioral verilog implementation for a 8 to 1 multiplexer

Write a behavioral Verilog implementation for a 8 to 1 multiplexer with an active low enable that uses if statements in a procedural block.

  1 the project could fail because the cost of a key

1. the project could fail because the cost of a key component has increased and we could build a product that does not

  Design a combinational logic circuit

DIGITAL LOGIC DESIGN - Explain the Combinational Logic Circuits with block diagram - Design a Combinational Logic Circuit that converts BCD to Gray Code

  Define how do cloud threats differ from traditional threats

How do cloud threats differ from traditional threats. Against which threats are cloud services typically more effective compared to local ones

  Analyze the ip address

Pick one of your favorite websites and find its IP address, then analyze IP address. Develop an unique scenario to describe and contrast each of these response.

  Identify the drawbacks for using cloud computing in your bcp

Identify the drawbacks for using cloud computing in your BCP. Identify an area that you initially struggled in and describe how you overcame it.

  Write a program that prompts the cashier to enter all prices

Write a program that prompts the cashier to enter all prices and names, adds them to two array lists, calls the method that you implemented.

  Create the object then insert to the data structure

Create the object then insert to the data structure -Users can continue inputing until users want to stop.

  Create a web page by using html to format text

Create a web page by using HTML to format text. Use basic elements and attributes in the creation of web pages.

  Why this is basically a disaster recovery plan

How would you approach a backup and administration plan for the hypothetical situation described below. contain  any network administration systems that should be installed for remote access in the event of a network emergency. This is basically a..

  What is the functionality of the utility program trace route

Compare TCP and UDP. What is the functionality of the utility program ping? What is the functionality of the utility program Trace route?

  Write and test a prolog predicate abc which succeeds

Write, run, and test a Prolog predicate abc(L) which succeeds if list L somewhere contains an a, followed directly by a b, followed directly by a c;

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd