Target Corporation: Stealing Data Case Case Study

Exclusively available on IvyPanda Available only on IvyPanda

Introduction

The trade corporation Target has managed to establish itself as a successful and popular company providing services to the population in many American states. Nevertheless, the breach that occurred in December of 2013 significantly influenced the authority of the corporation and caused quite a serious public outcry both among the population and the press. It resulted from the situation described by Krebs (2014) who gave a thorough explanation of the incident. Stealing data from credit and debit cards became a real problem, and this hacker attack, according to Lunden (2015), cost the company about 70 million of dissatisfied buyers and more than $ 162 million, which it had to compensate for angry customers.

We will write a custom essay on your topic a custom Case Study on Target Corporation: Stealing Data Case
808 writers online

Company Features and Case Description

Target Corporation is a well-known Western retailer selling products through its stores and the Internet (“Target Corp (TGT),” 2016). The peculiarity of the company was increased attention to the collection and use of information about clients. A wide range of data from the history of purchases to the movement of buyers through the trade halls was checked and analyzed. A significant response was the campaign launched in 2001 to improve the protection of bank cards (“Target quick facts,” 2016).

Target began issuing chip cards that were more resistant to copying than traditional cards with a magnetic stripe. The key mistake of the well-known retailer after the theft of data was, perhaps, a delay in the public recognition of the problem. Several days passed since the discovery of the data leak when the company’s representatives had announced it. The delay in communication with customers was not in favor of the corporation. Target tried to claim some attempts to establish contact with clients, which just exacerbated its situation.

Attempts to Change the Situation

While the top managers of the corporation with a detective company that was hired for this purpose tried to find criminals, they managed to use all the information that they had stolen. According to McGrath (2014), the retailer could not estimate the total amount of the company’s losses. In spite of his public apology, Target’s former director lost his post. The high activity of the new head of the company Brian C. Cornell, who spoke about the tools for securing client accounts, helped to avoid an even greater negative impact on the company’s reputation.

Despite the fact that the leaders of the corporation tried to create collaborative and successful teams, their attempts, as it is known, did not lead to success. The managers of the company sought to obtain full control over the information they had about their clients. Attempts to create a secure database were unsuccessful. It indicates that the leadership did not pay enough attention to ensure data protection. Consequently, this practice can be considered wrong and, possibly, too risky.

The share of customers who are dissatisfied with Target’s activities has grown to a large extent (“Target. Annual report,” 2015). Furthermore, it is quite evident that the company is unlikely to achieve the success that it demonstrated during the last few years. Its popularity among buyers has significantly decreased; besides, the losses suffered by Target are large. Therefore, the business strategy chosen by the leaders was fundamentally wrong.

Perhaps, the higher activity of the corporation in communications and the rapid neutralization of the negative consequences of the incident would have influenced the situation more positively. There had been a chance to avoid significant deterioration in financial performance and a negative impact on the reputation that the company still feels. Nevertheless, no proper measures were taken, and Target’s breach today is considered one of the most scandalous events in sales for the last dozens of years.

1 hour!
The minimum time our certified writers need to deliver a 100% original paper

References

Krebs, B. (2014). . Web.

McGrath, M. (2014). . Web.

Lunden, I. (2015). . Web.

. (2015). Web.

. (2016). Web.

Target quick facts. (2016). Web.

Print
Need an custom research paper on Target Corporation: Stealing Data Case written from scratch by a professional specifically for you?
808 writers online
Cite This paper
Select a referencing style:

Reference

IvyPanda. (2020, November 4). Target Corporation: Stealing Data Case. https://ivypanda.com/essays/target-corporation-stealing-data-case/

Work Cited

"Target Corporation: Stealing Data Case." IvyPanda, 4 Nov. 2020, ivypanda.com/essays/target-corporation-stealing-data-case/.

References

IvyPanda. (2020) 'Target Corporation: Stealing Data Case'. 4 November.

References

IvyPanda. 2020. "Target Corporation: Stealing Data Case." November 4, 2020. https://ivypanda.com/essays/target-corporation-stealing-data-case/.

1. IvyPanda. "Target Corporation: Stealing Data Case." November 4, 2020. https://ivypanda.com/essays/target-corporation-stealing-data-case/.


Bibliography


IvyPanda. "Target Corporation: Stealing Data Case." November 4, 2020. https://ivypanda.com/essays/target-corporation-stealing-data-case/.

Powered by CiteTotal, free reference maker
If you are the copyright owner of this paper and no longer wish to have your work published on IvyPanda. Request the removal
More related papers
Cite
Print
1 / 1