Search results

1 – 10 of 11
Case study
Publication date: 20 January 2017

Russell Walker

In November 2005 Fidelity Homestead, a savings bank in Louisiana, began noticing suspicious charges from Mexico and southern California on its customers' credit cards. More than a…

Abstract

In November 2005 Fidelity Homestead, a savings bank in Louisiana, began noticing suspicious charges from Mexico and southern California on its customers' credit cards. More than a year later, an audit revealed peculiarities in the credit card data in the computer systems of TJX Companies, the parent company of more than 2,600 discount fashion and home accessories retail stores in the United States, Canada, and Europe.

The U.S. Secret Service, the U.S. Justice Department, and the Royal Canadian Mounted Police found that hackers had penetrated TJX's systems in mid-2005, accessing information that dated as far back as 2003. TJX had violated industry security standards by failing to update its in-store wireless networks and by storing credit card numbers and expiration dates without adequate encryption. When TJX announced the intrusion in January 2007, it admitted that hackers had compromised nearly 46 million debit and credit card numbers, the largest-ever data breach in the United States.

After analyzing and discussing the case, students should be able to:

  • Understand imbedded operational risks

  • Analyze how operational risk decisions are made in a firm

  • Understand the challenges in the electronic payment transmission process, which relies on each participant in the process to operate best-in-class safety systems to ensure the safety of the entire process

  • Recognize the sophistication of IT security threats

Understand imbedded operational risks

Analyze how operational risk decisions are made in a firm

Understand the challenges in the electronic payment transmission process, which relies on each participant in the process to operate best-in-class safety systems to ensure the safety of the entire process

Recognize the sophistication of IT security threats

Details

Kellogg School of Management Cases, vol. no.
Type: Case Study
ISSN: 2474-6568
Published by: Kellogg School of Management

Keywords

Case study
Publication date: 1 April 2024

Christopher E. Weilage and Patricia Kraft

This case was developed from a primary source and is based on interviews and personal evaluations.

Abstract

Research methodology

This case was developed from a primary source and is based on interviews and personal evaluations.

Case overview/synopsis

Maria was at a scheduled lunch with her direct manager, John, who inquired about the privacy leak regarding employee data she had found a few months earlier. Upon discovering the issue, Maria took on the task of ensuring the privacy leak was dealt with and resolved. John knew it was a challenging interdepartmental task because other managers did not immediately recognize the seriousness and full impact of the issue on employee privacy. Plus, the belief was that the project to combine two software programs improving CRM functionality, causing the employee data leak, needed immediate release. During the lunch, Maria stated that the privacy problem was fully eliminated and that, in the end, it did impact a lot more than only a few employees. John actively encouraged Maria in the conversation to seek feedback from Richard, the managing director directly involved and responsible for the project, which Maria had already done. When the feedback arrived, Maria felt extremely hurt by the comments and began to question the validity of the company’s values. Now, she must decide what her options are.

This case study is about dealing with feedback, career development and how to receive and provide feedback. It presents a situation that allows for a variety of ways to address negative feedback and shows that different reactions can have broader consequences for career development. At the same time, the case illustrates how feedback is given in international teams and companies, and how intercultural or gender-relevant circumstances may have to be considered.

Complexity academic level

This case study was written for use in BA and MA classes to promote discussion regarding feedback. Relevant courses in business and administration or an international business study program could be organizational behavior, communication training, conflict management, an intercultural competencies course or in line with career management sequences.

Early program BA students, BA students in advanced semesters as well as MA students with work experience are all markets for the case. It has been class-tested with BA international business students. While advanced BA and graduate students are able to and expected to enrich discussions by contributing personal stories, early program BA students benefit from learning how to create feedback and how to read feedback – including from other students, instructors and managers, to use during their first internships.

Details

The CASE Journal, vol. ahead-of-print no. ahead-of-print
Type: Case Study
ISSN: 1544-9106

Keywords

Case study
Publication date: 27 September 2017

Ryan Nelson and Ryan Wright

This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through how to best manage the…

Abstract

This case was designed to facilitate discussion of how a cyberattack was remediated by a major public university. Students are challenged to think through how to best manage the remediation project, including the application of best practices such as risk management, stakeholder management, communication plans, outsourcing/procurement management, and cyberattack remediation. The Phoenix Project was a success from multiple perspectives, and as such provides a useful example of how to manage an unplanned, mission-critical project well.

Details

Darden Business Publishing Cases, vol. no.
Type: Case Study
ISSN: 2474-7890
Published by: University of Virginia Darden School Foundation

Case study
Publication date: 27 May 2021

Emma Marie Fleck and Michael E. Ozlanski

The learning objectives aim to provide an understanding of the changing nature of consumer payments and the impact upon both businesses and consumers. This can be achieved by…

Abstract

Theoretical basis

The learning objectives aim to provide an understanding of the changing nature of consumer payments and the impact upon both businesses and consumers. This can be achieved by examining the case through the lens of stakeholder theory, which posits that businesses are “responsible … to ‘those groups and individuals who can affect or be affected by their actions.’” Collectively, those groups and individuals are known as stakeholders and they commonly include “customers, employees, suppliers, communities and financiers.” In addition to creating value for the owners, businesses should also consider how they can create value for each of their other stakeholders (Freeman et al., 2010, p. 9). In addition, consistent with the theory of management control systems (Chenhall, 2003), the automatic processing of cashless transactions enables businesses to more efficiently record their earnings, commission payments (if applicable) and monitor cash collections. As all data are captured in an electronic format, they can easily understand their sales and profitability through user-friendly and visually appealing dashboards. This, in turn, enables them to obtain a more accurate and timely view of their business and they can appropriately adjust their operations and strategy as a result of this information. Finally, cashless payments enable more accurate and efficient reporting of information to taxing authorities, which decreases the possibility that the affected parties would underreport income and underpay taxes. This is similarly consistent with the theory of management control systems (Chenhall, 2003) because the improved systems of financial reporting assure compliance with tax laws and regulations.

Research methodology

This case was developed using both primary and secondary data sources. The authors interviewed the participants in London and the secondary data collection used relevant sources from appropriate literature and the popular press.

Case overview/synopsis

In London, consumer transactions were as plentiful as the eight million people who lived there. While cash was considered “king” in retail, cash payments dropped by 15% across the UK in 2017, and debit and credit cards became the predominant payment method (Kollewe, 2018). Cash represented only 40% of customer payments and was expected to drop to 21% by 2026 (Lyons et al., 2018). This was likely driven by contactless payments whereby consumers preferred the speed and ease of being able to “tap and go.” As businesses were charged fees to accept credit card payments, many expected that small businesses would insist on cash for small transactions. Instead, some banished cash completely. Insights from two London businesses helped explain why some were dropping cash and completely embracing cards.

Complexity academic level

This case can be used in a variety of undergraduate level courses to discuss trends in customer payment methods and the decisions of some businesses to completely abandon cash. Some example courses and suggested supporting materials include the following: • Consumer behavior • Entrepreneurial finance • Survey of accounting • Introduction to financial accounting.

Case study
Publication date: 12 May 2022

Syeda Maseeha Qumer and Syeda Ikrama

This case is meant for MBA students as a part of their leadership/information technology and system curriculum. It is suitable for classes in both offline and online mode.

Abstract

Study level/applicability

This case is meant for MBA students as a part of their leadership/information technology and system curriculum. It is suitable for classes in both offline and online mode.

Subject area

Human resources management/information technology and systems.

Case overview

The case discusses how Poppy Gustafsson (Gustafsson) (she), Cofounder and Chief Executive Officer of Darktrace plc, one of the world’s largest cyber-AI companies, is reinventing enterprise security by using artificial intelligence (AI) to detect and respond to cyberthreats to businesses and protect the public. Darktrace’s technology leverages the principles of the human immune system to autonomously defend organizations from cyberattacks, insider threats and AI warfare. In addition to leading a cutting-edge cybersecurity company, Gustafsson evangelizes gender diversity at Darktrace where 40% of employees and four C-level executives are women, a number nearly unheard of in the tech sector.The case chronicles the journey of Gustafsson and how she led the company to growth and success. Under her leadership, Darktrace has grown into a market leader in the AI cybersecurity space serving 5,600 customers in 100 countries, as of June 2021. Gustafsson not only redefined the cybersecurity space but also inspired women to pursue a career in the field of cybersecurity. She also collaborated with a social enterprise called WISE to encourage more girls to consider STEM careers.However, along the way, she faced several challenges including growing competition, procuring funds from investors, cybersecurity talent shortage and training personnel. Going forward, some of the challenges before Gustafsson would be to meet the changing cyber protection demands of customers; hire, train and retain highly skilled cybersecurity personnel; beat the competition in a saturated cybersecurity services space; sustain revenue growth; and post profits as Darktrace had incurred losses every year since its inception.

Expected learning outcomes

This case is designed to enable students to: understand the issues and challenges women face in the field of cybersecurity; understand the qualities required for a woman leader to lead a technology firm; study the leadership and management style of Gustafsson; understand the importance of transformational leadership in management; understand the role of Gustafsson in Darktrace’s growth and success; analyze the traits that Gustafsson possesses as a tech leader in an emerging cybersecurity space; understand the importance of gender diversity in cybersecurity; and analyze the challenges faced by Gustafsson going forward and explore ways in which she can overcome them.

Subject code

CSS: 11 Strategy.

Details

The Case For Women, vol. no.
Type: Case Study
ISSN: 2732-4443

Keywords

Case study
Publication date: 4 September 2021

Susan White and Protiti Dastidar

In a typical strategy course, growth strategies like mergers and acquisitions (corporate strategy) are introduced in the second half of the course. To analyze the case, students…

Abstract

Theoretical Basis

In a typical strategy course, growth strategies like mergers and acquisitions (corporate strategy) are introduced in the second half of the course. To analyze the case, students will use strategies such as Porter’s five forces and resource-based view and will discuss why firms pursue mergers as a growth strategy, along with sources of synergies and risks in mergers. Finance theory used includes analyzing a given discounted cash flow analysis and perform a comparable multiples analysis to find the value of a merger target.

Research Methodology

The industry and financial information in the case comes from publicly available sources, including company 10K reports, business press reports and publicly available industry reports. The information about Lockheed Martin’s strategy comes from interviews with Peter Clyne, former vice president for Lockheed Martin’s IS&GS division. He then held the same position for Leidos Holding Corp., after the IS&GS division was divested and incorporated into Leidos.

Case overview/synopsis

This case is an interdisciplinary case containing aspects of strategy and finance. Lockheed Martin made a strategic move in 2016, to divest its Information Systems & Global Strategies Division (IS&GS), which engaged in government consulting, primarily in the defense and aerospace industries. Lockheed wanted to reassess its decision to divest consulting, given the high growth rates expected in this business, particularly in cybersecurity consulting. On the other hand, if Lockheed decided to maintain its hardware focus, it wanted to expand its offerings. In addition to a strategy analysis, two possible target firms can be analyzed: Fortinet and Maxar.

Complexity Academic Level

This case raises a broad set of issues related to the evaluation of M&A transactions across two different industries and corporate strategy, as it relates to strategic fit of the potential targets and LM’s current capabilities. It is appropriate for the core course in strategy at the MBA or senior undergraduate level. It can also be assigned to specialized courses in Mergers and Acquisitions. It is not appropriate for a lower level strategy or finance course, as it requires students to have prior knowledge of basic finance valuation techniques.

Details

The CASE Journal, vol. 17 no. 4
Type: Case Study
ISSN:

Keywords

Case study
Publication date: 2 February 2022

César Jhonnatan Horna, Leonardo Toro and Otto Regalado-Pezua

The learning outcome of this paper is to identify and interpret the risks linked to cyber-security and their impact on the organization. Analyze business management regarding…

Abstract

Learning outcomes

The learning outcome of this paper is to identify and interpret the risks linked to cyber-security and their impact on the organization. Analyze business management regarding cyber-security and information technology (IT) risk management. Evaluate and propose decision-making strategies for IT projects.

Case overview/synopsis

Silver Bank is a financial entity with broad national coverage. Its growth was directly related to its investments in customer service. The entire organization is focused on satisfying its clients’ needs, improving their experience and making them loyal to the company. However, it did not pay enough attention to a threat that, with time, had become more pronounced: cyber-attacks. Its efforts to fight against this threat were only temporary solutions, as gaps in its IT system made it an easy target for criminals until the arrival of Iván Ramírez, who proposes a holistic solution to decrease the probability and severity of these attacks. However, past experiences, ignorance and budget constraints make it a difficult task to convince the bank’s board of directors to implement the proposed solution.

Complexity academic level

The case can be used as teaching material in upper-level undergraduate and graduate management courses: –undergraduate courses: information technology management, IT project analysis and management – MBA or graduate courses: information technology management, strategic management and security governance.

Supplementary materials

Teaching notes are available for educators only.

Subject code

CSS 11: Strategy.

Details

Emerald Emerging Markets Case Studies, vol. 12 no. 1
Type: Case Study
ISSN: 2045-0621

Keywords

Case study
Publication date: 26 June 2019

Pauline Assenza and Michael S. Lewis

The case data were obtained from secondary sources including academic, newspaper and periodical sources.

Abstract

Research methodology

The case data were obtained from secondary sources including academic, newspaper and periodical sources.

Case overview/synopsis

The Founder of Chipotle Mexican Grill, CEO Steve Ells, was a restaurant innovator credited with creating the fast-casual experience. He believed that food, sourced and prepared responsibly, could help “cultivate a better world.” Unfortunately, he had to step down after a continuing series of food contamination events drove away both investors and customers. In 2018, new CEO Brian Niccol was brought in from Taco Bell to reposition the brand and regain confidence. Was it possible to continue with Chipotle’s mission of “food with integrity” or was another strategy necessary?

Complexity academic level

This case was prepared for an undergraduate strategy course. It can be used to illustrate all the key points in Chapter 1 of a traditional undergraduate strategy textbook. This case would be best placed in the first weeks of the course, as a first case to introduce to students the idea of strategy as a process that continuously assesses and revises strategic directions and decisions. It introduces a discussion of the role of mission, vision and values as part of the strategy process, and addresses the responsibility of leadership to do an ongoing evaluation of a firm’s strategic choices.

Details

The CASE Journal, vol. 15 no. 4
Type: Case Study
ISSN: 1544-9106

Keywords

Case study
Publication date: 14 May 2019

Russell Walker

Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial intelligence (AI) voice…

Abstract

Launched in 2014, Amazon's Echo and Echo Dot smart speakers led the category's rapid adoption by households and enabled the penetration of artificial intelligence (AI) voice assistants into the everyday lives of millions of people. By 2019, Alexa the virtual brains behind Amazon's smart speakers was able to play music, create reminders, get weather reports, control lights and other home appliances, shop, and do much more in response to voice commands. Amazon had developed significant new capabilities for Alexa, developed an entire ecosysgtem around it, expanded Alexa's user base to more than 100 million users, and made significant progress in monetizing its digital voice assistant. However, Alexa's progress also created new challenges for Amazon, its Alexa-enabled customers, and society at large. Amazon needed to identify and address these challenges in order to encourage continued consumer acceptance and preclude detrimental government or regulatory action.

Case study
Publication date: 5 March 2020

Susan White

This case focuses on valuation using various methods to price a firm. Students attempting this case should know the basics of how to value a company using discounted cash flow…

Abstract

Theoretical basis

This case focuses on valuation using various methods to price a firm. Students attempting this case should know the basics of how to value a company using discounted cash flow, comparable multiples and comparable transactions. Students will need to calculate the weighted average cost of capital using comparable companies and the capital asset pricing model and determine differences in value created by an acquisition vs a leveraged buyout (LBO). The case also discusses qualitative issues in mergers, such as fit between target and acquirer, integration issues, potential high debt from LBO.

Research methodology

This case was library-researched, using Amazon and Whole Foods public filings and business press papers.

Case overview/synopsis

Whole Foods Markets received a buyout offer from Amazon. Whole Foods could solicit offers from other firms, including firms more directly in the grocery business. Whole Foods also considered a management buyout or purchase by a private equity firm. Whole Foods had underperformed, with a falling stock price and reduced profitability. Amazon’s bid was attractive, a premium of about 40 per cent over Whole Foods’ pre-merger stock price. Whole Foods also wanted to consider issues such as culture. Whole Foods’ strategy was to sell organic foods at premium prices, while Amazon was a retail discounter with a largely online business.

Complexity academic level

This case is appropriate for graduate students at the end of their introductory course or for graduate or undergraduate students in a corporate finance elective, particularly a merger/restructuring elective. The case has been used in an advanced undergraduate finance elective, with a team presenting the case to the class, with remaining students in the class required to write case summaries and questions for the presenting group.

1 – 10 of 11