The securities and exchange commission

The Securities and Exchange Commission (“SEC”) reviews a company’s financial statements to ensure that they conform to U.S. GAAP before allowing the company to conduct an initial public offering and list on a major U.S. stock exchange. As part of its review, the SEC may write letters to the company to ask for justification for its particular accounting choices and policies. The company must write back with satisfactory explanations before it may conduct the initial public offering. In some cases, the company must change its accounting choices and policies to satisfy the SEC’s critique.

In June 2011, Groupon Inc. began the process of conducting an initial public offering by filing a form S-1 with the SEC. (The Form S-1 has the same sections as a 10-K, but in a different order and with some additional disclosure.) The SEC questioned the company’s revenue recognition policy in a series of correspondences. Ultimately, Groupon changed its revenue recognition policy and financial statements in response to these critiques.

In this paper, you will examine Groupon Inc.’s business, its revenue recognition policy, the SEC’s critique, and the change in Groupon Inc.’s revenue recognition policy. Address the following questions:Based on the Business description section (beginning on p. 68 of the S-1 dated June 2, 2011, Groupon S-1 2011-06-01.pdfActions ), describe what product Groupon sells and how the company makes money. Who are its customers? Who are its suppliers? What are the company’s competitive advantages, if any?
Even though the revenue recognition steps we covered in class and in the textbook were integrated in U.S. GAAP in 2016, imagine that these rules were in place in 2011. Based solely on the Business description, how would you apply these rules to recognize revenue for Groupon. Write an ideal revenue recognition policy for Groupon that incorporates the five steps.
Now look at the company’s revenue recognition policy in the financial statements, which begin on page F-1.
Describe how Groupon determined when and how much revenue recognize.
Explain how Groupon’s revenue recognition policy differs from the revenue recognition policy you proposed in answering question 2.
Now look at the SEC’s letter to Groupon, dated June 29, 2011, Groupon SEC letter 2011-06-29.pdfActions . See paragraphs 62 to 67 regarding Groupon’s revenue recognition policy.
What does the SEC question about Groupon’s revenue recognition policy?
What is the relevance of point 63 vis-à-vis point 62?
Finally, look at Groupon’s 10-K for 2011, Groupon 10-K 2011.pdfActions . This 10-K was issued after the company changed its revenue recognition policy, the SEC approved the new accounting policy, and the company conducted its initial public offering.
How does this new revenue recognition policy address the SEC’s critique?
How much did the company’s reported revenue change as compared to what was reported in the S-1?
Which means of accounting manipulation had Groupon used to inflate its revenue?

 

Security and Governmental regulation

 

Ethics, Privacy, Security and Governmental regulation are all hot topics in e-Commerce, and in chapter 8 we have touched upon each of these topics. For this assignment, I would like you to find a current ethical issue in relation to e-commerce or the Internet; then use the process outlined in the book to analyze the ethical issue (pg 491) using two different sets of the ethical principles described in the book (i.e. Descartes’ Rule of Change, The Collective Utilitarian Principle, etc.).

 

 

Security of Internet browsers

 

How are Internet browsers protecting your security – provide 4 examples with a two-sentence supporting explanation for each of the examples?
Provide two examples with two-sentences about how these protections are circumvented/thwarted
Review two Gmail-plugins (or your email provider) available to help manage phishing and inbox overload. Provide the plug-in name, URL, and a two-sentence description
Compare and contrast the browsers “tor browser”, “brave”, and “Chrome, Firefox, or Safari” from an Internet Security perspective.
Create the three-column table. Fill in five additional security – replace Example A-E. I have provided an example of a security feature (JavaScript Blocker) for each browser.
Security Features Tor Brave Chrome, Firefox, or Safari
Example A
Example B
Example C
Example D
Example E
JavaScriptBlocker Yes Default setting – scripts blocked Plug-in required – Example – ScriptBlock
How many cookies are on your computer and provide the contents of a single cookie?
https://www.thewindowsclub.com/cookies-folder-location-windows (Windows)
https://www.intego.com/mac-security-blog/how-to-manage-and-remove-browser-cookies-on-mac-and-ios/ (Apple)
Google Chrome on a Mac -> https://apple.stackexchange.com/questions/232433/where-are-google-chrome-cookies-stored-on-a-mac
http://www.whatarecookies.com/view.asp (Various Browsers)
Review the advanced settings in your browser.
Identify and describe two advanced settings that you were not aware of that were configurable in your browser. Provide a brief tutorial on how to access the settings and what are the positives/negatives of enabling/disabling the setting.
Explore one of the free online cybersecurity learning resources provided by NIST’s National Initiative for Cybersecurity Education (NICE) : https://www.nist.gov/itl/applied-cybersecurity/nic…
Select one of the materials from the Career and Professional Development Section
Provide a five-sentence summary of the resources.
Who’s the provider?
What are the strengths/weaknesses?
What can you learn from the materials? (Be specific – what’s the niche? cybersecurity is too broad of a response)
Explore the specific resource and select a specific training
What training did you select? Why?
What chapter of the textbook aligns with the specific training?
What did you learn from the specific training?
Additionally, provide a two-sentence summary of the content?
Write five questions (and provide the answers) to assure and assess the participant’s reading and understanding of content.
Complete Levels 0 through 10 on Over The Wire’s Bandit https://overthewire.org/wargames/bandit/Submit the codes and your strategies you used to succeed on each level. Hints are provided on each level under Commands you may need to solve this level