Search results

1 – 10 of over 1000
Case study
Publication date: 2 February 2022

César Jhonnatan Horna, Leonardo Toro and Otto Regalado-Pezua

The learning outcome of this paper is to identify and interpret the risks linked to cyber-security and their impact on the organization. Analyze business management regarding…

Abstract

Learning outcomes

The learning outcome of this paper is to identify and interpret the risks linked to cyber-security and their impact on the organization. Analyze business management regarding cyber-security and information technology (IT) risk management. Evaluate and propose decision-making strategies for IT projects.

Case overview/synopsis

Silver Bank is a financial entity with broad national coverage. Its growth was directly related to its investments in customer service. The entire organization is focused on satisfying its clients’ needs, improving their experience and making them loyal to the company. However, it did not pay enough attention to a threat that, with time, had become more pronounced: cyber-attacks. Its efforts to fight against this threat were only temporary solutions, as gaps in its IT system made it an easy target for criminals until the arrival of Iván Ramírez, who proposes a holistic solution to decrease the probability and severity of these attacks. However, past experiences, ignorance and budget constraints make it a difficult task to convince the bank’s board of directors to implement the proposed solution.

Complexity academic level

The case can be used as teaching material in upper-level undergraduate and graduate management courses: –undergraduate courses: information technology management, IT project analysis and management – MBA or graduate courses: information technology management, strategic management and security governance.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 11: Strategy.

Details

Emerald Emerging Markets Case Studies, vol. 12 no. 1
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 16 August 2021

Alan Fun-Foo Chan, Keng-Kok Tee, Thanuja Rathakrishnan, Jo Ann Ho and Siew-Imm Ng

After attempting the case, users are able to: analyse issues and problems faced by a call centre in Malaysia. Determine the root causes of the problems faced by call centre…

Abstract

Learning outcomes

After attempting the case, users are able to: analyse issues and problems faced by a call centre in Malaysia. Determine the root causes of the problems faced by call centre employees and generate alternative solutions to solve the problems faced by the company and to ensure the sustainability of the business.

Case overview/synopsis

This case was about the challenges faced by Daniel, the General Manager of an integrated security protection system company, Secure First (SF). Despite investing in the latest security technologies, conducting a major overhaul of the procedures, introducing an enhanced digital system at the call centre and providing training to the call agents, it was on the verge of losing its important long-term client due to its substandard performance. The client experienced major losses due to break-ins. After a thorough investigation, the problem surfaced in their call centre. Most of the staff were not familiar with the newly adopted system. The circumstances worsened when many of the call centre’s senior employees were tendering their resignations. The case discusses the aspect of employee satisfaction, staff performance that led to the turnover issue amongst employees in a call centre. The case explores what short-term and long-term strategies could Daniel suggest to change the call centre’s course to retain SF’s key account in times of desperation.

Complexity academic level

This case has a moderate level of difficulty and may be used in undergraduate students.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 6: Human resource management.

Details

Emerald Emerging Markets Case Studies, vol. 11 no. 3
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 1 May 2009

Benjamin Ngugi, Glenn S Dardick and Gina Vega

In January, 2007, TJX reported that it had suffered from a computer intrusion. The company was sure neither of the identity of the perpetrators nor of how many customers were…

Abstract

In January, 2007, TJX reported that it had suffered from a computer intrusion. The company was sure neither of the identity of the perpetrators nor of how many customers were affected. A deeper analysis revealed that the intrusion had started earlier and affected more customers than previously thought. Ensuing investigation concluded that TJX was collecting unnecessary information, keeping it for too long and employing obsolete and insufficient safeguards. TJX denied any wrongdoing but implemented most of the recommended remedies to strengthen their security.

Details

The CASE Journal, vol. 5 no. 2
Type: Case Study
ISSN: 1544-9106

Case study
Publication date: 26 November 2014

Rahul Thakurta and Umesh Hodeghatta Rao

Information Technology Security.

Abstract

Subject area

Information Technology Security.

Study level/applicability

The case adds value for management students at all levels, as well as for practitioners. Work experience is not a requirement, as the case will expose some of the fundamental concepts pertaining to the scenario described. Assignment questions are designed from the perspective of teaching this case to a business student audience. The case could certainly be adjusted to fit the needs of students in more technical disciplines.

Case overview

Set in October 2008, the case begins with the dilemmas facing Mr Ramanuj as he and his team from E-Infra Solutions prepared to address the damages caused by a major virus attach at OrangeInc headquarter at Bangalore, India. The virus attack destroyed all the important organizational documents residing on the computer systems and brought its business to a standstill. The catastrophe indicated the need for a comprehensive information technology (IT) security solution which was earlier overlooked by OrangeInc's management.

Expected learning outcomes

To teach the basic concepts of information security, in particular malware, and its impact on the business. To introduce the concepts and the importance of security awareness program. To teach the importance of IT infrastructure technology, process and procedures.

Supplementary materials

Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Details

Emerald Emerging Markets Case Studies, vol. 4 no. 7
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 1 May 2023

Sanjay Dhamija and Reena Nayyar

After reading the case, the students shall be able to explain the concept of insider trading and differentiate between illegal insider trading and legal insider trading, business…

Abstract

Learning outcomes

After reading the case, the students shall be able to explain the concept of insider trading and differentiate between illegal insider trading and legal insider trading, business ethics, financial institutions, financial markets and accounting; to interpret the legal framework for prevention of insider trading; to identify the role and significance of the market regulator, Securities and Exchange Board of India (SEBI), in detecting financial crimes such as insider trading; to demonstrate the association between information, stock trading and stock prices within the framework of efficient markets; and to appraise the ethical dilemma in a family-owned firm, where the family members of the promoter group are alleged to have indulged in a financial crime.

Case overview/synopsis

The case revolves around allegations of insider trading against the promoter and the promoter group of the family owned and controlled firm, Lux Industries Limited. On January 24, 2022, the SEBI, the regulator of securities markets in India, accused Udit Todi, the Executive Director of Lux Industries Limited, of engaging in insider trading through a chain of 14 connected parties. Udit Todi was also the son of the Managing Director, Pradip Kumar Todi, and the nephew of the Executive Chairman, Ashok Kumar Todi. In its interim order, SEBI alleged a breach of insider trading regulations by a group of 14 connected entities that had built up long positions starting from May 21, 2021, before the quarterly financial results (Q4) and the annual results of the financial year (FY) 2021 in the equity shares of Lux Industries Limited, with its registered office in Kolkata, India, were announced. Subsequently, they squared off the long positions to make a profit of ₹29.43m. To restore the confidence of the investors, the Executive Chairman, Ashok Kumar Todi, needed to review the matter expeditiously and impartially. Taking into consideration the family ties of the accused, it was not going to be an easy task, yet, it had to be done. The case highlights the role of the regulator, SEBI, in unearthing financial frauds such as insider trading in an emerging market such as India.

Complexity academic level

Postgraduate programs in management, Executive education programs.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 1: Accounting and Finance

Case study
Publication date: 20 January 2017

Mark Jeffery, Ichiro Aoyagi and Ed Kalletta

Quantifying the efficacy of marketing is an age-old challenge. As John Wanamaker said a century ago, “Half the money I spend on advertising is wasted; the trouble is I don't know…

Abstract

Quantifying the efficacy of marketing is an age-old challenge. As John Wanamaker said a century ago, “Half the money I spend on advertising is wasted; the trouble is I don't know which half.” The big difference today, however, is that the Internet enables detailed tracking of marketing campaigns in real time, or near time. Exemplifies how to leverage the Internet to dramatically improve the efficacy of marketing. Centers upon the Microsoft Security Guidance marketing campaign, which was designed to change IT professionals' perception of Microsoft's software product security. The integrated marketing campaign involved print media, analyst relations, and online advertising. The advertising was designed to drive IT professionals to a Web site on security guidance, then sign them up for free in-person security training classes. Illustrates two important best practices for marketing in the Internet age: first, the campaign was designed to be measured, and second, agility was specifically designed into the campaign. In addition to tracking weekly click-through data from the print and online advertising, the campaign also used online pop-up customer perception surveys. Analyzing the click-though data, Microsoft realized it had a problem at the end of the first week of the campaign–there were far fewer signups for the training sessions than anticipated. By the end of the second week the campaign was changed, resulting in a huge improvement in efficacy. Creates a scorecard illustrating the pros and cons of the Microsoft approach compared to a more traditional campaign. Illustrates how, rather than creating big-bang campaigns, high-performing marketing organizations today are continually experimenting. They build flexibility into campaigns and design them to be measured.

To learn how to leverage the Internet in marketing campaigns, analyze click-through data and online survey results acquired in near time, and learn how it is used to fine tune and dramatically improve a campaign. Furthermore, illustrates how nonfinancial metrics can be used to quantify marketing efficacy.

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

Case study
Publication date: 2 November 2018

Ali H. Choucri, Anne Dietterich, Victoria Gillern and Julia Ivy

Expected learning outcomes: To respond to the case question, students would analyze macro- and microeconomic differences to determine HC Securities’ preferred global strategy and…

Abstract

Learning outcomes

Expected learning outcomes: To respond to the case question, students would analyze macro- and microeconomic differences to determine HC Securities’ preferred global strategy and appropriate market entry mode. The case demonstrates how instability in a local market, in this case Egypt, can force a company to go global. It also demonstrates how two superficially similar markets, Singapore and Hong Kong, provide different opportunities for HC Securities and require different global strategies: Singapore provides a jumping-off point to its predominantly Muslim neighbors Malaysia and Indonesia, whereas Hong Kong gives access to China and could provide a new customer base of Asian investors willing to invest in Africa and the Middle East.

Case overview/synopsis

Brief overview of the case: The case introduces the Egyptian investment company HC Securities, which is facing challenges related to Egypt’s political instability and economic slowdown. HC Securities’ CEO, Mr. Choucri, feels expansion to one of the Asia-Pacific countries could help with the company’s growth and stability. He identifies Hong Kong and Singapore as the most compelling locations because of their sophisticated economies and growth potential in the investments industry. This case provides information about each market, allowing students to respond to the question “What should Choucri do to assure a market-based solution for his company?”

Complexity academic level

Student level and proposed courses: The case is appropriate for use in undergraduate courses in international business or strategic management.

Supplementary materials

Teaching Notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Subject code

International Business.

Details

Emerald Emerging Markets Case Studies, vol. 8 no. 4
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 20 January 2017

Daniel Diermeier and Evan Meagher

In 2008 San Francisco International Airport (known by its three-letter airport code, SFO) had announced a $383 million plan to renovate and reopen Terminal 2. Assistant deputy…

Abstract

In 2008 San Francisco International Airport (known by its three-letter airport code, SFO) had announced a $383 million plan to renovate and reopen Terminal 2. Assistant deputy director of aviation security Kim Dickie and her team had selected Quantum Secure's SAFE software suite as the new Terminal 2 credentialing system, but she needed to develop a business case quickly that would convince senior management to give the green light to fund the purchase. The case describes a scenario that occurs frequently in the real world, in which a decision offers some real but qualitative value in ways that are difficult or impossible to quantify. The discussion and analysis gives students the opportunity to consider the factors that will drive the internal rate of return (IRR), net present value (NPV), and discounted payback period calculations without constructing comprehensive spreadsheet models. Analyzing the case suggests the limits of such approaches in cases where perceived value is difficult to quantify. The case prepares students to evaluate and justify purchasing requests when interacting with financial gatekeepers such as CFOs and CEOs by introducing a framework to analyze the quantifiable benefits of a capital expenditure while keeping in mind important intangible benefits.

After analyzing the case, students should be able to: Understand how return on investment (ROI) calculations work, with an emphasis on identifying incremental effects Decide how to use results from similar entities making similar purchases to estimate the incremental benefit of a proposed solution Identify and use the best data available in making assumptions Justify the validity of benefits that are difficult to quantify in conjunction with the presentation of a traditional ROI analysis

Case study
Publication date: 21 March 2017

Namrata Sharma, B.S. Sahay and PRS Sarma

Subject area information and communication technology (ICT) for development.

Abstract

Structured abstract

Subject area information and communication technology (ICT) for development.

Study level/applicability

Master of Business Administration Program’s Management Information Systems courses. Or introductory courses in Masters in ICT for Development.

Case overview

The paper aims to highlight the endeavour of public distribution system (PDS), a food security scheme for under-privileged people in India, towards excellence, using ICT in the state of Chhattisgarh. It presents two important roles of ICT: one, as a system improvement tool, through supply chain integration (in Phase 1) and, the other, as tool for empowerment, by providing choices through computerized online real-time electronic (CORE) PDS (in Phase 2). CORE PDS was intended to provide choices of retail outlets to poor beneficiaries for collecting their food entitlement, breaking the retail outlet’s monopoly. The project was successfully implemented in some urban areas of Chhattisgarh, providing motivation for its mass scale roll-out. But, the contextual differences between rural and urban settings were raising questions on the ultimate value expected to be delivered by the project in rural areas.

Expected learning outcomes

Two major learning outcomes of the case: students will appreciate the multi-faceted role of ICT in improving the performance of a system meant for a financially poor section of the society; students will understand the role of contextual settings in a developing economy in the endeavour of ICT projects for societal development.

Supplementary materials

Teaching notes are available for educators only. Please contact your library to gain login details or email support@emeraldinsight.com to request teaching notes.

Subject code

CSS 10: Public Sector Management.

Details

Emerald Emerging Markets Case Studies, vol. 7 no. 1
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 27 September 2017

Ryan Nelson and Ryan Wright

This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through how to best manage the…

Abstract

This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through how to best manage the remediation project, including the application of best practices such as risk management, stakeholder management, communication plans, outsourcing/procurement management, and cyberattack remediation. The Phoenix Project was a success from multiple perspectives, and as such provides a useful example of how to manage an unplanned, mission-critical project well.

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

1 – 10 of over 1000