The independent home of the case method - and a charity. Make an impact and  donate

Product details

Product details
By continuing to use our site you consent to the use of cookies as described in our privacy policy unless you have disabled them.
You can change your cookie settings at any time but parts of our site will not function correctly without them.
Case from journal
-
Reference no. JIACS21-05-26
Published by: Allied Business Academies
Originally published in: "Journal of the International Academy for Case Studies", 2015
Length: 6 pages
Data source: Published sources

Abstract

The primary subject matter of this case concerns the vulnerabilities that poor management can expose an organization to as well as the widespread effects that a hacker attack can have on a business' operations. Secondary issues examined include, auditing frameworks to evaluate internal controls, designing a secure network for small start-up businesses, and addressing legal and marketing concerns of a hacked organization. The case has a difficulty level of three or higher and was designed to be taught in a 30 to 45 minute time period with approximately two hours of outside preparation by students. The case can be approached from five perspectives (business law, forensic accounting, information technology management, management, and marketing), thus the case can be used in multiple 30 to 45 minute classes. Instructor's notes from each of these perspectives have been written to allow for an integrated approach to learning across the curriculum.

About

Abstract

The primary subject matter of this case concerns the vulnerabilities that poor management can expose an organization to as well as the widespread effects that a hacker attack can have on a business' operations. Secondary issues examined include, auditing frameworks to evaluate internal controls, designing a secure network for small start-up businesses, and addressing legal and marketing concerns of a hacked organization. The case has a difficulty level of three or higher and was designed to be taught in a 30 to 45 minute time period with approximately two hours of outside preparation by students. The case can be approached from five perspectives (business law, forensic accounting, information technology management, management, and marketing), thus the case can be used in multiple 30 to 45 minute classes. Instructor's notes from each of these perspectives have been written to allow for an integrated approach to learning across the curriculum.

Related