Business Fraud Case Study: Ipremier Company

962 Words 4 Pages
Ipremier Company is a web-based commerce that it is well-known retail business that sells for its customer’s luxury, unique, and vintage products. It focuses on B2C aspect more than B2B, so their customers are their top priority. They had a security breach into their system which locked their website completely and their customers could not access the website. The support team are getting a dozen of emails every minute and the content of the email are words such as “ha ha?”. They are not sure what causes the breach in the first place, but they assume based on the emails it could be a hacker and their concern is if their customer’s database was compromised. And they believe that the security breach was caused by the “DOS attack”. Also, …show more content…
According to Smith’s ethics and information systems article “ groups typically include stockholders, customers, employees, suppliers, and the local community” (Smith, H. (2004). In Ipremier case, the stakeholders that will be affected by this crisis are their customers who has been using the website for many years and who has their credit card information and their data are already in the website and could be access by the customer’s database. What’s at stake for the customers is that their information will be stolen and there would be a possibility of Identity theft and fraud. Also, their credit card information would be revealed and easily stolen and they would lose a lot of money and trust with the Ipremier company’s website and look for another company. Employees of Ipremier company are at stake as well, because they might lose their job and their information will be disclosed to whoever attacked the website and all their success would go to waste. If we focus on the stakeholder theory then the executives must respect the rights of any individual stakeholder that is involved within the company and affected by this crisis and also consider all the interests of the stakeholders and include them in the decision making process (Smith, H. …show more content…
(2002). The iPremier Company (A): Denial of service attack. Boston, Mass.: Harvard Business School Pub

Smith, H. (2004). But what is the 'right thing? ': Ethics and information systems in the corporate domain (Vol. 3). University of Minnesota

Kayworth, T., & Whitten, D. (2010). Effective information security requires a balance social and technology factors (Vol. 9). University of Minnesota.

Smith, H. (2004). Information privacy and its management (Vol. 3). University of

Related Documents