Text
Boss, i think someone stole our customer data
In this case study, an organization learns that the security of its customer data has been compromised and must decide how to respond. The reader will consider issues such as how to communicate about a security breach to various stakeholders, how to measure the potential damage from such a breach, and how to determine the scope of a data-theft problem. Flayton Electronics is showing up as a common point of purchase for a large number of fraudulent credit card transactions. It's not clear how responsible the company and its less than airtight systems are for the apparent data breach. Law enforcement wants Flayton to stay mute for now, but customers have come to respect this firm for its straight talk and square deals. A hard-earned reputation is at stake, and the path to preserving it is difficult to see. Four experts comment on this fictional case study in R0709A and R0709Z. James E. Lee, of ChoicePoint, offers lessons from his firm's experience with a large-scale fraud scheme..Printed Journal
Call Number | Location | Available |
---|---|---|
PSB lt.dasar - Pascasarjana | 1 |
Penerbit | Harvard Business School Publishing., |
---|---|
Edisi | - |
Subjek | Decision making Electronics industry Computer security Management of crises Customer information files |
ISBN/ISSN | 178012 |
Klasifikasi | - |
Deskripsi Fisik | - |
Info Detail Spesifik | - |
Other Version/Related | Tidak tersedia versi lain |
Lampiran Berkas | Tidak Ada Data |