Essays on Target Data Breach Analysis Case Study

Download full paperFile format: .doc, available for editing

In general, the paper 'Target Data Breach Analysis" is a good example of a management case study.   Target, the second-largest United States’ discount retailer, did experience a heavy blow in relation to its reputation when a 2013 data breach did compromise the personal information of more than 100 million. In December, the company did announce that the credit and debit card information of close to 40 million customers was at risk because of a data hack, which took place around the Black Friday weekend. The purpose of this research essay is to examine the case of Target’ s data breach.

In the course of exploring this incident, the research essay will offer a summary of the event prior to the provision of an analysis of the way in which the company sought to handle the issue. This is through the incorporation of various theories and concepts in understanding the effectiveness and efficiency in relation to the handling of business incidents. Summary of the Incident Around September, a Target Corp contractor, Fazio Mechanical HVAC, did face an infiltration using email-borne malware (Citadel Trojan), thus the platform for the stealing of the credentials applicable in accessing Target Corp online billing system.

In addition, researchers believe that the system applicable to accessing the Target Corporation network did not integrate or utilize Strong Authentication. From this point, it is essential to note that access to the Target network did enable the hacker to access PoS systems prior to the installation of subsequent malware. From late November 27 to December 15, the malware focused on capturing the cardholder data (Weiss & Miller, 2015). During the incident, approximately 40 million credit and debit cards, as well as personal information for 70 million others were stolen.

According to the technological practitioners, this action was not in isolation, thus the potentiality of incorporating six other retail breaches in the same period. In addition to the data loss, as well as required notification, Target Corp had to deal with the consumer action and financial institutions’ lawsuits. Such financial institutions did play a critical role in issuing the cards whose data was among the breach (Weiss & Miller, 2015). Furthermore, Target had to adapt and integrate a plan in the course of handling the issue while seeking to restore its image and reputation in the market and industry of operation. Theoretical Perspective In the course of responding to a diverse business crisis, organizations or companies focus on adoption and implementation of different techniques aiming at saving or restoring their reputation within the industry and market of operation.

In this section, it is valuable to offer a brief description of the issues in relation to the restoration of the image of the companies facing different ethical issues. Benoit’ s Image Restoration Strategies Benoit focused on demonstrating the fact that business entities should respond to the crisis through the adoption and implementation of a diverse approach.

In the first instance, there is a need to integrate a denial strategy, which focuses on the integration of two approaches: simple denial and shifting the blame. Secondly, the organizations need to focus on the integration of the strategy, which seeks to evade the responsibility in relation to the crisis. In this context, there is a need to adopt a provocation strategy, which calls for response to the act of another (Benoit, 1997).

In addition, there is a need to incorporate a defeasibility strategy, which relates to a lack of information or ability in relation to the event or crisis. Similarly, it is valuable to consider an accident strategy, which demonstrates the fact that the crisis was a mishap (Kiambi & Shafer, 2015). Finally, there is a need to convince the target audience on the fact that the crisis was an act of good intentions.

References

List of References

Allen, M. W. & Caillouet, R. H. 1994. Legitimation endeavors: Impression management strategies used by an organization in crisis. Communication Monographs, 61, 44-62.

Bell, A. H., & Smith, D. M. 2010. Management communication. Hoboken, N.J: John Wiley & Sons.

Benoit, W. L. 1997. Image repair discourse and crisis communication. Public Relations Review, 23, 177-186.

Blackmon, G. A. 2014. Problems at the Register: Retail Collection of Personal Information and the Data Breach. Case W. Res. L. Rev., 65, 861.

Bovée, C. L. 2003. Contemporary public speaking. Rowman & Littlefield.

Coombs, W. T. 2006. The protective powers of crisis response strategies: Managing reputational assets during a crisis. Journal of Promotion Management, 12, 240-260.

Dardis, F., & Haigh, M. M. 2009. Prescribing versus describing: Testing image restoration strategies in a crisis. Corporate Communications, 14(1), 101-118.

Gray, D., & Ehoff Jr, C. 2015. Sarbanes-Oxley And Dodd Frank: Then There Was Fraud. Journal of Business & Economics Research (JBER), 13(1), 19-26.

Kiambi, D. M., & Shafer, A. 2015. Corporate Crisis Communication: Examining the Interplay of Reputation and Crisis Response Strategies. Mass Communication and Society, 1-22.

Kim, S., & Sung, K. H. 2014. Revisiting the Effectiveness of Base Crisis Response Strategies in Comparison of Reputation Management Crisis Responses. Journal of Public Relations Research, 26(1), 62-78.

Parker, J. M. 2015. Data Security Law-Who Can Enforce Violations of Data Security Breach Notification Statutes?-In re Target Corp. Data Security Breach Litigation, No. 14- 2522, 2014 WL 7192478 (D. Minn. Dec. 18, 2014). Am. J. Trial Advoc., 38, 631-631.

Weiss, N. E., & Miller, R. S. 2015. The Target and Other Financial Data Breaches: Frequently Asked Questions. In Congressional Research Service, Prepared for Members and Committees of Congress February (Vol. 4, p. 2015).

Download full paperFile format: .doc, available for editing
Contact Us