Preview

Tjx Case Study

Good Essays
Open Document
Open Document
9608 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Tjx Case Study
Communications of the Association for Information Systems
Volume 23 | Number 1 Article 31

11-1-2008

Security Breach: The Case of TJX Companies, Inc.
William Xu
Carleton University, wxu3@connect.carleton.ca

Gerald Grant
Carleton University

Hai Nguyen
Carleton University

Xianyi Dai
Carleton University

Recommended Citation
Xu, William; Grant, Gerald; Nguyen, Hai; and Dai, Xianyi (2008) "Security Breach: The Case of TJX Companies, Inc.," Communications of the Association for Information Systems: Vol. 23, Article 31. Available at: http://aisel.aisnet.org/cais/vol23/iss1/31

This material is brought to you by the Journals at AIS Electronic Library (AISeL). It has been accepted for inclusion in Communications of the Association for Information Systems by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact elibrary@aisnet.org.

Security Breach: The Case of TJX Companies, Inc.

William Xu Gerald Grant Hai Nguyen Xianyi Dai Carleton University, Sprott School of Business wxu3@connect.carleton.ca

TJX Companies Inc. is a leading off-price apparel and home fashions retailer with headquarters situated in the United States. In late 2006, the company discovered it was victim to a massive security breach which compromised millions of customer records. Despite the internal exchanges within the IT department concerning the upgrade of their wireless security standard protocol, the company opted for cost savings rather than increased spending. As the company financials took a hit, the company was faced with pending lawsuits from credit card companies and affected customers; government scrutiny of IT security standards; loss of consumer confidence; among other concerns. Though it has not yet concluded the extent of the financial impact of this incident, analysts estimate the full cost of the breach might amount up to one billion dollars. This case presents a “wake-up call” for retail companies about the importance of IT security.



References: Mergent Online. (2008) “TJX Companies, Inc.”, Company Financials, http://www.mergentonline.com, (accessed March 25, 2008).

You May Also Find These Documents Helpful

  • Good Essays

    tjx company analysi

    • 707 Words
    • 3 Pages

    TJX is the largest international apparel and home fashions off-price department store chain in the United States with 26 million in revenues in 2012. It was founded in 1956 as Zayre and is headquartered in Framingham, Massachusetts. Globally it is one of the top 50 retailers in the world, specializing in cheap apparel and footwear. With over 3,000 stores today, we see the potential to expand our store base by over 50%, up to almost 4,800 stores, with our current chains in our current markets alone. Their target customers are female, middle to upper-middle income, between the ages of 25-54 years that are fashion and value conscious. Beyond our successful brick-and-mortar business, we see expanding our e-commerce presence over time as a great opportunity for TJX and another platform to reach more customers with our great values. According to Forbes it is also #95 on the S&P 500. TJX comprises T.J. Maxx, Marshalls, HomeGoods, Winners, and T.K. Maxx. TJX’s stock price is currently selling at $63.52 significantly hire than the prices we calculated using the Price Earnings Model, Dividend Discount Model, and Discount Cash Flow Model which average out to about $33.39.…

    • 707 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It 205 Week 3 Assignment

    • 667 Words
    • 2 Pages

    And did not properly install another layer of security software it had already purchased .TJX also retained card hold data in its system much longer then stipulated by industry rules for storing such data. This company had very little security controls in place at all. The weakness of having a system that TJX had in place are a hacker can gain unauthorized access by finding weakness in the security protections employed by Web sites and computer systems, often taking advantage of various features of the Internet that make open system that is easy to use another problem is a hacker can install a sniffer which is eavesdropping program that monitors information over the internet so they can find personal information haw they want to.…

    • 667 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    Payton, A. M. (2006). Data security breach: seeking a prescription for adequate remedy. Proceedings of the 3rd annual conference on Information security curriculum development (pp. 162-167). New York: ACM.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data breaches and cyber-attack frequency has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and a company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of a Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident.” (Ponemon Institute, 2013)…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Tk Max Facts

    • 446 Words
    • 2 Pages

    The rise of TK Maxx in the UK has not however been without problems. Hackers stole information of approximately 45 million payment cards from used by customers in the UK, United States, Puerto Rico and Ireland. The hacking started in 2005 and data on transactions conducted between 2002 and 2005 was accessed. The effect of this theft on UK customer has at least been mitigated by the introduction of chip and pin technology.…

    • 446 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Tjx It Security Breach

    • 1174 Words
    • 5 Pages

    In January of 2007 the parent company of TJMaxx and Marshalls known as TJX reported an IT security breach. The intrusion involved the portion of its network that handles credit card, debit card, check, and merchandise return functions. Facts slowly began to emerge that roughly 94 million customers’ credit card numbers were stolen from TJMaxx and Marshalls throughout 2006. It was believed that hackers sat in the parking lots and infiltrated TJX using their wireless network.…

    • 1174 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Checkpoint: Tjx Companies

    • 326 Words
    • 2 Pages

    The cost associated with data breaches can be enormous and infinite. A data breach can have severe repercussions including reputational costs to organization and brand. A data breach can also cause the loss of confidence and apprehension in consumer. This in turn will cause less people to shop with TJX companies which can create a loss in revenue. The consumer can also have charges and unauthorized use of their credit information. Banks and issuers of credit and debit cards were forced to replace the stolen cards and refund any money that was stolen due to fraudulent credit or debit charges.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Dsc340 Hw1

    • 1721 Words
    • 7 Pages

    • Textbook: Information Systems - Version 1.2.1 ($20 - $130) by John Gallaugher. FlatWorld Knowledge, 2011. This text can be viewed online and you may order a printed copy from the publisher (recommended!). To see the text, visit students.flatworldknowledge.com and enter “eren cil ” to “Find Your Class” box. The book and purchase options will appear in the search results. • Software: (Google Docs account, MS Office suite, FileZilla FTP Client, gEdit text editor1 ) All software is available (either in labs or for free download) for student use at no cost.…

    • 1721 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Tjx Security Breach

    • 1008 Words
    • 5 Pages

    1 When TJX first noticed the issue in Dec of 2006, intrusions had been occurring for at least 16 months,…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Breach X

    • 925 Words
    • 4 Pages

    • What practices led to the security breach in TJX and why did such a smart andprofitable organization as TJX face such a situation?…

    • 925 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Kim, J. (2012, January 19). Many security breaches go unreported. Fierce Compliance IT. Retrieved from http://www.fiercecomplianceit.com/story/many-security-breaches-go-unreported/2012-01-19…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Good Essays

    Operation Get Rich or Die Tryin' is just one example in a sea of inadequate security measures that is far too common in today corporations. The fact that TJX failed not only to notice the breach, but also to implement basic security measures is concerning enough. However, this inevitably leads us to ask if such a large corporation had this level of neglect, how pervasive is the lack of security in the industry? To answer the question, all we need to do is take a look at last couple of years in the news. We can see from a quick Google search that we've had hacks on Experian, Yahoo (in which I was personally affected), Sony and Uber, just to name a few. These are companies with which we are all familiar. and with vast amounts of capitol at their disposal. Yet somehow they still failed in their responsibility to safeguard some of our most…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Additional services and information for Journal of Information Science can be found at: Email Alerts: http://jis.sagepub.com/cgi/alerts Subscriptions: http://jis.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://jis.sagepub.com/content/33/2/135.refs.html…

    • 5159 Words
    • 21 Pages
    Good Essays