Nobody downloaded yet

Analyse the possible threats that foreign companies face when investing in China, and discuss the measures that the Chinese authorities are taking to combat some of these threats(1500 words) Please see the second guestion below in assignment criteria box - Essay Example

Comments (0) Cite this document
There have been a variety of entry mode choices in China available since the implementation of the first “open door” policy of 1979, with the continuous momentum of foreign direct investment (FDI) (Charles, 2005). Interestingly, by the end of May 2000, the contractual FDI in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.7% of users find it useful
Analyse the possible threats that foreign companies face when investing in China, and discuss the measures that the Chinese authorities are taking to combat some of these threats(1500 words) Please see the second guestion below in assignment criteria box
Read TextPreview

Extract of sample
"Analyse the possible threats that foreign companies face when investing in China, and discuss the measures that the Chinese authorities are taking to combat some of these threats(1500 words) Please see the second guestion below in assignment criteria box"

Download file to see previous pages developing nations led to the Government driven “Western Development Strategy” as part of the tenth year plan (2001-2005) covering six provinces..
Notwithstanding the economic policies favouring commerce and FDI, the OECD in particular have regular reported on challenges facing FDI in China’s regional development and the focus of this analysis is to critically evaluate the various types of business organisation and entry modes into the Chinese Market. In particular, this paper will evaluate the possible threats faced to foreign businesses in entering the Chinese market.
Whilst foreign investors are ultimately autonomous on the mode of entry into the Chinese Market from equity joint ventures (EJV), wholly foreign owned enterprises (WFOE) and contractual or cooperative joint ventures (including licensing and technology transfer agreements) joint exploration, and co-operative development; it has been submitted that the reality of entry into the market has been challenging in practice (Luo, 2000). Since, the late 1980s the predominant mode has been EJVS and WFOES (Luo, 2000). Until 1996, EJVs were the most popular entry vehicle; however the last decade has seen the proliferation of WFOES (Charles, 2005). Between 1993 and 1997, the actual use of WFOEs in China grew at an annual rate of more than 25 per cent while EJVs grew by only 6 per cent (Rugman & Hodgetts, 2003).
This indicates a fundamentally changing dynamic of the way China is attracting foreign investment, with WFOEs becoming dominant entry mode into the market (Charles, 2005). This is significant in placing a foreign company at a competitive edge in the market. Arguably, the causal effect is the disappointing performance of EJVS in China, the expectation that performance problems will accelerate along with the perception that foreign investors dissatisfaction is unlikely to change unless competitive compromises are given (Charles, 2005).
Various problems have been associated with the Chinese EJVs, ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Analyse the possible threats that foreign companies face when Essay”, n.d.)
Analyse the possible threats that foreign companies face when Essay. Retrieved from
(Analyse the Possible Threats That Foreign Companies Face When Essay)
Analyse the Possible Threats That Foreign Companies Face When Essay.
“Analyse the Possible Threats That Foreign Companies Face When Essay”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document
See assignment criteria the application of regulations in cyberspace environment, which creates the process a very complex one. In this regard, it will be very imperative for the government of Ruritania to consider broadest range of possibilities. For this reason, in order to consider every perspective, it is advisable that the government should share the proposed legislations and strategies with local, as well as international stakeholders, as their approval will be crucial to encourage e-commerce activities in the country, and their discontent may result in adverse outcomes. In other words, consensus of the government officials, as well as the other stakeholders will ensure effectiveness and success of the legalization...
4 Pages(1000 words)Essay
Cyber Threats
...where the traffic is headed. There are some switches which go to hub mode when they become overloaded. Hackers will take advantage of this by ensuring that traffic is overloaded to the switch so that they get access to the traffic and therefore be able to packet sniff the network. This is possible when the switch is in the hub mode (Lindup 2006). Denial of service attack A hacker can maliciously associate an IP address which is very important to a MAC address which is false. An example is that a hacker can send an ARP reply by associating the IP address of the router to a MAC address that ha nor relation or association with any host. With this, the...
4 Pages(1000 words)Assignment
Communications and Technology: The Threats We Face
...this essay to look at the level in which this statement is true or false. In writing the paper, the main sources of information will be secondary sources that include recent books on communication and technology, peer reviewed journals from authors who have a vast experience in communication and technology and the threats facing the sector. In addition, any websites that have information on current issue on communication and technology will come in handy in writing this paper. In researching and writing this paper, I estimate it will take a duration of two week to complete it and hand it in. Below is the schedule of activities that will be involved in...
7 Pages(1750 words)Research Proposal
See 'Assignment Criteria' below
...that it granted the right to the judiciary to quash Acts of Parliament differing from EU law. The European law supersedes UK law and it is a statutory requirement to enforce EU law over UK law and the ECJ is now the highest level of the UK legal system.6 The EU has a unique, complex and highly developed system of law. This law takes precedence over the national laws of its Member States. It has three sources, first, primary legislation or the treaties some of these are The ECSC Treaty of 1951 or the Treaty of Paris, The EEC Treaty of 1957 or the Treaty of Rome, the EURATOM Treaty of 1957, etc; second, secondary legislation which consists of regulations, directives, decisions,...
7 Pages(1750 words)Case Study
Chinas Threats
...that the country's huge population would hardly pose a threat after all (Zhang, 2003). Economic threatChina's economy can be described as one exhibiting an increasingly stable market with rapidly growing trade shares in the worldwide market arena. The country also has obviously large direct investments in foreign nations. These are all proofs that China possesses a considerably rising economy (Hu, 2003). Western countries including the United States view the vast economic growth of China as a threat in their job and market. A loss of greater than 2 million dollars by manufacturing...
8 Pages(2000 words)Essay
See assessment criteria below the area of mental health care. When dealing with elderly patients, primary mental health care personnel are always concerned with the physical wellness of the patient and the treatment that is being undertaken to help them. However, there can be adversities faced and some patients might suffer health complications in a mental health care facility. Surprisingly though, the spirituality and religious beliefs are what many mentally ill elderly patients draw on to sustain themselves. It has been found that they even have health improvements through their spiritual strength such as through daily prayer, fasting, shared compassion, and forgiving themselves of their own errors that...
8 Pages(2000 words)Essay
See Assessment criteria below
...native language, German. He creates new terminology or stretches the meaning of existing words – ‘Dasein’ being a good example as it would translate into ‘existence’ in an every day, non philosophical context, but the two components of the word, ‘Da’ and ‘Sein’ can be translated into a more literal meaning of ‘Being there’, which is the translation used for Heidegger’s philosophical concept of the term. This is just one example of Heidegger’s word creativity which is almost impossible to take across into another language, as the German language allows for several independent words to be connected to form a new word with a different...
12 Pages(3000 words)Essay
''See Assignment Criteria''
...and correct decision to sell off its agricultural equipment business to AGCO Inc. In order to grow, it should follow its current strategy of acquiring companies which are of strategic use to it. It would not be possible for Caterpillar to maintain the growth it had in last few years (except 2009) organically. It will have to look to acquire key resources in geographical areas or business areas where it wants to expand. As a final recommendation, Caterpillar should try to move up in the value chain all the time. Applying Haberberg and Reiple’s VIRUS criteria to check the competence of Caterpillar, we can see that the true core competence of Caterpillar is their ability...
10 Pages(2500 words)Essay
Love please see description below
...Reflection paper: The objective of the company TOMS Shoes is undeniably a very noble objective. It professes that the reasons which lead to charity should be abolished but charity should not be demolished. The concept of charity by starting a company called TOMS Shoes was introduced by Mycoskie who was travelling in Argentina back in 2006 and befriended some poor children there. Mycoskie was touched on seeing that the children he befriended had no shoes to wear but the thing which distinguishes him from others is that on seeing poverty, he did not close his eyes but invented a genius plan to eliminate poverty by starting a charitable organization and...
2 Pages(500 words)Essay
The Human Anatomy and Possible Threats
... The Human Anatomy The Human Anatomy and Possible Threats The body works in similar fashion to a machine (Platzer, Leonhardt, Frotscher, and Kahle, 2004). This is because It has different systems which make up the body thus enabling it to operate effectively. Just like a machine, if one part is faulty, the rest of the parts will not function effectively (Wolfsthal, 2008). The different systems undertake different tasks and encompass various body organs ((Rahl, 2010). This paper aims to undertake an in depth analysis of various body systems and explore how the external conditions affect the functioning of the systems. The paper will also explore the nature and level of organization of some critical body systems. 1. The structure... -Gold,...
12 Pages(3000 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Let us find you another Essay on topic Analyse the possible threats that foreign companies face when investing in China, and discuss the measures that the Chinese authorities are taking to combat some of these threats(1500 words) Please see the second guestion below in assignment criteria box for FREE!
Contact Us