Business Fraud Case Study: Ipremier Company

Improved Essays
Ipremier Company is a web-based commerce that it is well-known retail business that sells for its customer’s luxury, unique, and vintage products. It focuses on B2C aspect more than B2B, so their customers are their top priority. They had a security breach into their system which locked their website completely and their customers could not access the website. The support team are getting a dozen of emails every minute and the content of the email are words such as “ha ha?”. They are not sure what causes the breach in the first place, but they assume based on the emails it could be a hacker and their concern is if their customer’s database was compromised. And they believe that the security breach was caused by the “DOS attack”. Also, …show more content…
According to Smith’s ethics and information systems article “ groups typically include stockholders, customers, employees, suppliers, and the local community” (Smith, H. (2004). In Ipremier case, the stakeholders that will be affected by this crisis are their customers who has been using the website for many years and who has their credit card information and their data are already in the website and could be access by the customer’s database. What’s at stake for the customers is that their information will be stolen and there would be a possibility of Identity theft and fraud. Also, their credit card information would be revealed and easily stolen and they would lose a lot of money and trust with the Ipremier company’s website and look for another company. Employees of Ipremier company are at stake as well, because they might lose their job and their information will be disclosed to whoever attacked the website and all their success would go to waste. If we focus on the stakeholder theory then the executives must respect the rights of any individual stakeholder that is involved within the company and affected by this crisis and also consider all the interests of the stakeholders and include them in the decision making process (Smith, H. …show more content…
(2002). The iPremier Company (A): Denial of service attack. Boston, Mass.: Harvard Business School Pub

Smith, H. (2004). But what is the 'right thing? ': Ethics and information systems in the corporate domain (Vol. 3). University of Minnesota

Kayworth, T., & Whitten, D. (2010). Effective information security requires a balance social and technology factors (Vol. 9). University of Minnesota.

Smith, H. (2004). Information privacy and its management (Vol. 3). University of

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Escalation Policy Pathways Industries Policy Overview This policy provides guidelines for responding to misuse of Pathways Industries IT and network resources either from internal or external sources. This policy will attempt to provide contact information for reporting incidents and when to involve Pathways Industries Executive Team, and or company legal representatives. Attacks on Pathways Industries resources could be considered as theft of intellectual property or other computer network attack. All staff members will receive regular training on acceptable use and incident handling procedures of all Pathways Industries resources.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Decent Essays

    Areas of concern like accounting and auditing matters, ethics and compliance issues, suspected violations of American Red Cross would be the main focus. American Red Cross has seen its fair share of unethical issues in the past so the main goal is to keep from having more unethical issues going forward. Reference: Ferrell, O. C., Fraedrich, J., & Ferrell, L. (2015).Business ethics: Ethical decision making & cases (10th ed.). Mason, OH: Cengage.…

    • 93 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Denial-Of-Service Attack

    • 756 Words
    • 4 Pages

    “Denial-of-Service attacks are the cyber equivalent of vandalism. Rather than seek to break into the target system, the perpetrator simply wishes to render the target system unusable” (Easttom, Taylor, 2011). This type of cybercrime prevents the end users from attaining the resource accessibility. Denial-of-Service is also known as a DOS. An attack was launched in Santa Cruz County website in California that caused “county’s government entities and programs, including Emergency Services, Law Enforcement, the Courts, Social Services, Agricultural Extension, Employment, Surplus Sales, Vendor Registration, and Construction Projects and Proposals”( U.S. Attorney’s Office,2011).…

    • 756 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The three primary ethical issues of the Breakaway project are gambling, violence and sex. The game lured the user in by offering credits to advance in the game. This behavior is very similar to the compulsive gambler. The company was plotting to entice the user to buy more credits to get further in the game just as casinos do luring the gambler in by showing winners receiving millions of dollars. The positive in the game is providing entertainment to the non-compulsive users.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 740 Words
    • 3 Pages

    Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It 1. Who are the stakeholders in the Target breach? The main stakeholders are their shareholders, the clients that had their personal information stolen, and individuals with an ongoing connection with Target organization whose personal information was or might have been compromised. Stakeholders who are affected or worried that they might be harmed start to mistrust the firm and its complacent-sounding promises.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dos Assault

    • 567 Words
    • 3 Pages

    (DoS) assaults have turned into a noteworthy danger to current PC systems. Early DoS assaults were specialized amusements played among underground assailants. For instance, an assailant might need to gain power of an IRC channel by means of performing DoS assaults against the channel proprietor. Aggressors could get acknowledgment in the underground group by means of bringing down well known sites. Since simple to-utilize DoS apparatuses, for example, Trinoo (Dittrich 1999), can be effortlessly downloaded from the Internet, typical PC clients can get to be DoS aggressors also.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Over the last few decades, American Society has rapidly changed due to the prompt development of advanced computer technology. These advancements continue to energize the next generation to push the boundaries of the possible, by challenging the impossible. Throughout the previous decades these boundaries have continued to be extended and defeated, impelling professionals to reanalyze what is truly impossible. However, due to the incredible pace in which these advancements are being achieved, international communities, like America, are left defending against threats and vulnerabilities that are unknown.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    a) The stakeholder theory is a strategy that takes stakeholders into consideration when making decisions to achieve higher business performance. Stakeholders are people who affect and are affected by a business’ performance. Other than shareholders or owners, customers, government, employees, and suppliers are some examples of stakeholders. The theory provides an alternative to the shareholder theory, which states that companies must focus only on maximizing the market value of the equity of its existing shareholders. Edward Freeman, who was the first to completely express the theory in 1984, developed the theory to address that era’s business issues, most of which are related to external pressures (e.g. activism, foreign competition, government…

    • 705 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Week 6: Fraud Case Study Group Project Vanessa Ryan, Juan Caba, Rustin Prentice, Howard Miranda Champlain College Forensic Accounting ACCT-280-45 Nicole Bocra August 14, 2016 On July 31, 2015, Howard Miranda, CFO of Microstuff Inc., contacted the internal auditor Vanessa Ryan in reference to a suspected purchase and receiving scheme within the information technology department. Based on this initial accusation, an examination was conducted—which included reviews of relevant accounting, purchasing, and receiving records and interviews of appropriate personnel. The investigation uncovered a purchase and receiving scheme that was conducted at Microstuff, Inc.…

    • 1707 Words
    • 7 Pages
    Superior Essays
  • Brilliant Essays

    When employees in organizations make decisions to act unethically, they affect not only the company itself, but also its shareholders, employees and customers. Employees make a countless number of choices every day in businesses, if they act unethical, they can damage a company's productivity, profits and…

    • 1804 Words
    • 8 Pages
    • 6 Works Cited
    Brilliant Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Comparing Ethical Approaches Nigel Floyd BA500 Management Dr. Diane Hamilton7/21/2015 Grantham University Comparing Ethical Approaches Ethics is about good or bad, right or wrong for a given situation, decision making or an action. It is difficult to define ethics in a precise way, but can be referred to as "ethics is a code of moral principles and values that governs the behavior of person or group with respect to what is right or wrong" (Daft, 2010). Organizations conduct ethical training programs to inculcate ethical behavior among their employees. The employees who are aware of ethics may not reveal confidential data of the organization. Ethical training seeks to help people understand the ethical aspects of decision making and to incorporate high ethical standards into a daily behavior of employees (Schermerhorn & Bachrach, 2015).…

    • 1152 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays