Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Section A

Answer all the questions in this section.

This section should be completed within this document and submitted online. The questions from this section is based on the following case study. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

PRESCRIBED CASE STUDY: A new age for luxury (by Glacier Research)

Question 1

Traditional luxury retailers, like Gucci, Versace and Louis Vuitton can be described as YNAPs main competitors. Recently many of these luxury retailers also added an eCommerce (online sale) component to their business model. Develop a customer value map for YNAP, using thesethree top competitors. Make sure to explain YNAPs position on the map, and how they have influenced the luxury retail industry.

Question 2

Online shopping has been around for a while, yet it seems that the personal luxury goods market has stubbornly fought the shift to online retailing. Select a theoretical model that explains growth and adoption and apply it to the case of online luxury sales (8 marks). Also provide insight into the next phase of online luxury sales, using the theory you selected.

Section B
Answer all the questions in this section.

This section should be completed within this document and submitted online. Please use examples from the case study to illustrate your answers. Make sure to provide both the relevant theory AND application for each question.

CASE STUDY: LIBERTY REJECTS EXTORTION DEMANDS FROM HACKERS

Financial services group Liberty said on Sunday evening that it has made no concessions to extortion demands from unknown hackers after the firm's IT systems came under attack and the personal information of its clients was compromised.

During a press briefing, Liberty Group CEO David Munro described the attempt by hackers to obtain sensitive data as a "criminal act".Although Munro did not disclose a great deal of information about the identity of the hackers, the amount demanded or the number of affected clients, he did say that emails formed the bulk of the data stolen."It [the compromised information] seems to be emails and attachments. There is no evidence that customers have suffered financial losses ... All policies and contracts remain in force," said Munro.

"We are in full control of our IT environment. We deeply regret this act of criminality."
Munro said specific and sensitive details about the data breach could not be disclosed as a criminal investigation is pending.

He said Liberty was alerted about the data breach on Thursday evening and alerted the authorities. However, Liberty sent out an SMS to its clients only on Saturday evening, informing them of the breach of security and unauthorised access to its IT systems by unknown hackers.Asked why the group informed its clients two days after the initial alert on Thursday, Munro said the data breach was "out of the blue" and that these matters are "difficult to understand."He continued: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."

He said the data breach has been limited to the company's insurance operations in South Africa, and that its money management arm Stanlib has not been affected.

The hackers informed Liberty of vulnerabilities in its systems and demanded payment from the company, failing which they would release sensitive information about the firm's clients to the public."We did engage the external party [the hackers] and we made no concessions to the extortion," said Munro.

Liberty said that since becoming aware of the security and data breach, it had taken immediate steps to secure its computer systems and had launched an investigation into the incident."We are on top of the situation and working hard to protect customers," said Munro. "We have devoted all efforts to protect customers and [their] details. We have assembled a full team of technology specialists that specialise in incidents like this. No money has been spared."

Data breaches are a rising threat across industries, and regulations over personal information have toughened up in recent years. Such regulation includes the Protection of Personal Information Act, which puts the onus on companies to store, protect and safely destroy personal information.A recent report by Australian cybersecurity researcher Troy Hunt along with Tefo Mohapi from iAfrikan Digital revealed that the sensitive personal information of nearly one million (934 000) South Africans who pay their traffic fines online had been publicly leaked. This leak contained identity numbers‚ email addresses‚ full names and passwords.A similar breach of personal information occurred in 2017 when the records of over 60 million South Africans were compromised.

Question 3

With regard to the security breach that took place:
3.1 Which category of security threat took place at Liberty?
3.2 How well did Liberty do in responding to the security breach?

Question 4

Liberty Group CEO David Munro stated: "We can't prepare for this [kind of] event. It took us a couple of days to get to the point where we could inform clients and understand the implications of the extortion attempts."Do you agree with this statement? Propose which steps Liberty can take to deal with future security threats.

Attachment:- Assessment.rar

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M93043893
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question?


Related Questions in Homework Help/Study Tips

Identify specific messages about gender presented in the

Identify specific messages about gender presented in the mass media. Discuss messages about gender you have received from your family or cultural group. Analyze how these messages have influenced your experience with gen ...

Question etiology of personality disorders- chapter

Question: Etiology of Personality Disorders- CHAPTER 10 Choose a personality disorder and discuss factors in a person's life that might contribute to the development of the disorder. Addiction Treatment -CHAPTER 11 Discu ...

Question the workplace is constantly changing as companies

Question: The workplace is constantly changing. As companies grow on a global level, their needs change, as do the needs of employees. Researchers and statisticians often attempt to predict how things will change. Using ...

Assignment piagetsometimes a theory or paradigm can be

Assignment: Piaget Sometimes, a theory or paradigm can be thought of as a lens through which a topic is examined. Theories or paradigm shifts may cast other ways of thinking aside, or they may layer upon one another. In ...

Sociology - sociology of the familyshort answer

Sociology - Sociology of the Family Short Answer Questions Please answer questions in complete sentences on separate paper, typed, double-spaced. Be brief, using 1 - 2 sentences, and to-the-point. Sociological Theories o ...

Question self-assessment surveys and development of

Question: Self-Assessment Surveys and Development of Leadership Talent" Please respond to the following: • Debate the usefulness of self-assessment surveys to determine employees with high potential within the organizati ...

Question choose a topic for your research paper in terms of

Question: Choose a topic for your research paper in terms of health-related state or event (e.g.disease, disability,chronic condition). Remember to describe your chosen population in terms of descriptive epidemiology (pe ...

Question 1 select four people currently in the media and

Question: 1. Select four people currently in the media and discuss their exertion of one of the sources of power. Students must cover all four of the sources of power(Position based power, Relationship-based power, Infor ...

Assignmenta cyber crime is a crime that involves a computer

Assignment A cyber crime is a crime that involves a computer and the Internet. A forensics investigation involves gathering and preserving evidence in a way that is suitable for presentation in a court of law. Use the li ...

Watch two episodes of the documentary series1

Watch two episodes of the documentary series: 1. China'sChallenges: What do the Chinese People believe? 2. China's Challenges: Does China's civilization matter? Answer the following questions in your response paper. The ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As