SlideShare a Scribd company logo
1 of 15
Download to read offline
MGT 521 Assignment Apply Week 1 Target Case Study
Analysis
FOR MORE CLASSES VISIT
www.mgt521master.com
Assignment Content
Resources: Ch. 1 and 2 of Management: A Practical Introduction
Complete the Target CEO Case Study Analysis.
Submit your analysis.
Center for Writing Excellence
Reference and Citation Generator
Grammar and Writing Guides
Learning Team Toolkit
Case Analysis Questions
Answer the following in 175 words each:
1. Describe the managerial functions that were demonstrated in the
case description. Provide examples of how each function you discuss
was evident in the case study.
2. Assess the success with which the Target management team
handled the management challenges identified in Chapter 1.
3. Describe the primary management viewpoint demonstrated in the
case study. Evaluate your concept of its success in this case. Do you
think another management viewpoint would have been more
appropriate?
Assess your ideas regarding Target’s need and ability to operate as a
Learning Organization in the future.
Target CEO Works to Retain Consumer Trust after the Company Was
Hacked
Minneapolis—Executives settled around a square table inside a Target
Corp. conference room here earlier this month and munched on store-
brand snacks as they chewed over something far less appetizing.
Opinion surveys commissioned by the company found that the massive
cybertheft that waylaid Target late [in 2013] had knocked confidence
and trust in the 51-year-old retailer to an all-time low.
Target was having trouble shaking the fallout from a key decision by
Chief Executive Gregg Steinhafel that made the crisis appear even worse
than it already was.
The initial evidence had indicated that credit and debit card numbers of
about 40 million Target customers had been stolen. But the retailer had
learned later that the hackers gained access to partial names and physical
or e-mail addresses for as many as 70 million people—a breach that
some top executives counseled against disclosing because it was unclear
what kind of fraud danger it posed.
Nevertheless, Mr. Steinhafel insisted on making the bigger number
public, sparking news reports that as many as 110 million Target
customers had been affected.
At the meeting, Chief Marketing Officer Jeffrey Jones groused about the
huge number. The public “keeps hearing that equals one-third of all
Americans,” he said. “That’s hammering us.”
Mr. Steinhafel says he has no regrets about the aggressive disclosure and
other costly decisions in the wake of the crisis. “Target won’t be defined
by the breach, but how we handle the breach,” he says.
The executives acknowledge the crisis has damaged the retailer’s bull’s-
eye brand, while analysts estimate it may cost Target billions of dollars.
During the holiday-shopping season, Target’s sales and store traffic
plummeted. Call-center volume overwhelmed employees. Executives
testified before congressional panels, and the company is facing federal
and state investigations into how the cybercrime occurred from its store
registers and computer network.
Over the two months since the crisis erupted, Mr. Steinhafel, 59 years
old, has lurched from one difficult decision to another.
At one point, he proposed in a meeting that Target would provide free
credit monitoring and identity-theft insurance for one year to all its
customers. Scott Kennedy, a senior executive, asked: “You’re saying we
will give this to any customer who’s ever been in a store, but we aren’t
checking?”
Mr. Steinhafel nodded.
“Then we’re offering this to all Americans,” Mr. Kennedy replied.
Target went ahead with that plan.
The breach could wind up costing Target, which notched $73 billion in
sales in 2012, a few billion dollars, people familiar with the matter say.
New chip technology to replace magnetic strips on credit cards could
cost about $100 million, one executive told Congress. Card-monitoring
services for customers could cost tens of millions, according to one
executive. Hundreds of millions of marketing dollars could be diverted
to repairing the brand. In addition, costs are mounting for reissuing
cards, staffing call centers, forensic and data-security units, and lawyers
for public inquiries and private lawsuits. . . .
The CEO, who likes to say “retail is detail,” is known internally for
paying surprise visits to Target stores—there are about 1,800 in the U.S.
that drew about 32 million customers a week before the crisis. Store
managers say they warn each other to be alert for a man snooping
around the aisles, frequently snacking from a box of animal crackers.
Recently, Mr. Steinhafel says, he stopped a manager who was reading e-
mail on her cellphone as she passed through Target’s downtown
Minneapolis headquarters. “Please be in the present,” he recalls telling
her.
From November 27, the day before Thanksgiving, through December
18, Target executives say, shoppers’ payment-card data was captured
through “malware” installed in Target’s computer network. The hackers
had entered the network through a vendor.
The breach got wide publicity. Shoppers clogged Target phone lines and
stores. Some sent tweets and emails that they would never again shop at
Target. On the last weekend before Christmas, the big crowds at Target
stores had dwindled.
On December 20, Mr. Jones, the chief marketing officer, urged Mr.
Steinhafel to appear in a video on Target’s website. The CEO was
reluctant. He didn’t have a script and was exhausted.
With a camera rolling, Target’s public-relations chief, Dustee Jenkins,
asked him questions. Mr. Steinhafel, clad in Target’s trademark red shirt
and khakis store attire, thanked customers for their trust, provided tips to
monitor their accounts, and promised zero liability to shoppers for any
fraudulent charges.
Mr. Steinhafel began holding twice-daily “status meetings” in a 32nd
floor conference room.
Early this month, prompted by the Target data breach, Congress held
hearings on cyberattacks. As Mr. Mulligan, the CFO, made his
appearances, Mr. Steinhafel and his executive team watched from the
company’s “situation room.”
A Secret Service official testified that the data breach was “highly
technical and sophisticated,” prompting Mr. Steinhafel to remark: “That
shows it’s not just our operation. It would be hard for any retailer to
withstand this.”
At a daily status meeting early this month, Mr. Steinhafel pushed to
accelerate to early next year the timeline for Target to replace magnetic
strips on its payment cards with a new chip technology widely used in
Europe and Canada that is less vulnerable to fraud.
==============================================
MGT 521 Entire Course
FOR MORE CLASSES VISIT
www.mgt521master.com
MGT 521 Week 1 Apply Management And Applications Worksheet
MGT 521 Week 2 Apply Management Planning Worksheet
MGT 521 Week 3 Apply Organizational Culture and Design
MGT 521 Week 4 Apply Leadership Examination
MGT 521 Week 5 Apply Using the Project Planner’s Toolkit
MGT 521 Week 6 Apply Hewlett-Packard Case Study Analysis
MGT 521 Week 1 DQ 1
MGT 521 Week 1 DQ 2
MGT 521 Week 1 DQ 3
MGT 521 Week 1 DQ 4
MGT 521 Week 2 DQ 1
MGT 521 Week 2 DQ 2
MGT 521 Week 2 DQ 3
MGT 521 Week 2 DQ 4
MGT 521 Week 3 DQ 1
MGT 521 Week 3 DQ 2
MGT 521 Week 3 DQ 3
MGT 521 Week 3 DQ 4
MGT 521 Week 4 DQ 1
MGT 521 Week 4 DQ 2
MGT 521 Week 4 DQ 3
MGT 521 Week 4 DQ 4
MGT 521 Week 5 DQ 1
MGT 521 Week 5 DQ 2
MGT 521 Week 5 DQ 3
MGT 521 Week 5 DQ 4
==============================================
MGT 521 Final Exam Guide (New)
FOR MORE CLASSES VISIT
www.mgt521master.com
1. ________ is defined as a business firm’s intention, beyond its legal
and economic obligations, to do the right things and act in ways that are
good for society.
Social screening
Social responsibility
Social obligation
Values-based management
2. The balanced scorecard measures organizational performance against
previously established standards. Which of the four functions of
management relates most closely to setting these standards?
Controlling
Leading
Organizing
Planning
3. Budgets can be used as tools within which two functions of
management?
Controlling and organizing
Planning and leading
Controlling and planning
Organizing and leading
4. Indira Patel has been working in her organization’s computer security
department for the past 10 years. If another employee follows Indira’s
recommendations in a given situation, based on her expertise in
computer security, which source of power is Indira using?
Legitimate power
Coercive power
Expert power
Referent power
==============================================
MGT 521 Final Exam Guide (New, 2019)
FOR MORE CLASSES VISIT
www.mgt521master.com
1. Unlike leaders, managers are those who:
encourage and motivate employees to work together to achieve a
common vision.
implement procedures and processes to ensure the smooth functioning of
an organization.
seek innovation rather than stability in their approach to fulfill
organizational aspiration
develop relationships with employees based on trust and mutual respect.
2. Adopting a __________ involves distributing monetary resources
among divisions to increase financial returns or to spread risks among
different businesses.
differentiation strategy
global strategy
portfolio strategy
multidomestic strategy
3. Which of the following statements is true of a corporate-level
strategy?
It provides the framework within which functional managers operate.
It is the primary responsibility of top managers.
It is used to identify an organization’s strengths and weaknesses.
It outlines a division’s long-term goals.
==============================================
MGT 521 Final Exam Guide
FOR MORE CLASSES VISIT
www.mgt521master.com
1) John writes a memo to his employees. Putting his thoughts onto paper
is an example of
2) Chantel received an invitation to a web meeting that will take place at
3:00 p.m. She accepted the invitation. This is an example of
3) You are doing research on political issues and find that you are on a
conservative leaning site. What type of source credibility issue is this?
4) When reviewing an educational math website, you find the author’s
background is in English. What type of source credibility issue is this?
5) A famous ice cream manufacturer sent workers to a nearby grocery
store to offer shoppers a sample of its new flavor. The workers provided
samples to 300 shoppers and noted that 80% of the sample population
stated they liked the flavor. Based on this scenario, which of the
following is an example of an inference?
6) Persuading or convincing others to accept your argument means the
reasoning must be logical. Which of the following is an example of
logical flaws or fallacies?
==============================================
MGT 521 MASTER Educational Specialist--mgt521master.com

More Related Content

Similar to MGT 521 MASTER Educational Specialist--mgt521master.com

MGT 521 MASTER Introduction Education--mgt521master.com
MGT 521 MASTER Introduction Education--mgt521master.comMGT 521 MASTER Introduction Education--mgt521master.com
MGT 521 MASTER Introduction Education--mgt521master.comGVlaxmi13
 
Mgt 521 Education Organization -- snaptutorial.com
Mgt 521   Education Organization -- snaptutorial.comMgt 521   Education Organization -- snaptutorial.com
Mgt 521 Education Organization -- snaptutorial.comDavisMurphyC5
 
Mistakes made by Target Discussion.docx
Mistakes made by Target Discussion.docxMistakes made by Target Discussion.docx
Mistakes made by Target Discussion.docx4934bk
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersArmstrongsmith
 
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...Dr. Natalie Petouhoff
 
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfCMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfWilheminaRossi174
 
What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?ExpertsConsult
 
The art of nudging
The art of nudgingThe art of nudging
The art of nudgingMarty Mundy
 
Barry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi
 
Six Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemSix Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemFindWhitePapers
 
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New Dynamics
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New DynamicsRe:Engage: Accelerating Sales Pipeline w/ Marketing's New Dynamics
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New DynamicsScott Salkin
 
Insurance analytics brochure
Insurance analytics brochureInsurance analytics brochure
Insurance analytics brochureDaniel Thomas
 
Adapting Your Pipeline to Marketing’s New Dynamics
Adapting Your Pipeline to Marketing’s New DynamicsAdapting Your Pipeline to Marketing’s New Dynamics
Adapting Your Pipeline to Marketing’s New DynamicsScott Salkin
 
BigData_WhitePaper
BigData_WhitePaperBigData_WhitePaper
BigData_WhitePaperReem Matloub
 
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docx
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docxGovernment Impact B (1st paper)PROFESSOR FEEDBACK I thought .docx
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docxwhittemorelucilla
 
Segmentation in B-to-B Markets: The Role of Data
Segmentation in B-to-B Markets: The Role of DataSegmentation in B-to-B Markets: The Role of Data
Segmentation in B-to-B Markets: The Role of DataeMarketing Strategy
 
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIF
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIFTCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIF
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIFTEDCO
 

Similar to MGT 521 MASTER Educational Specialist--mgt521master.com (20)

MGT 521 MASTER Introduction Education--mgt521master.com
MGT 521 MASTER Introduction Education--mgt521master.comMGT 521 MASTER Introduction Education--mgt521master.com
MGT 521 MASTER Introduction Education--mgt521master.com
 
Mgt 521 Education Organization -- snaptutorial.com
Mgt 521   Education Organization -- snaptutorial.comMgt 521   Education Organization -- snaptutorial.com
Mgt 521 Education Organization -- snaptutorial.com
 
Mistakes made by Target Discussion.docx
Mistakes made by Target Discussion.docxMistakes made by Target Discussion.docx
Mistakes made by Target Discussion.docx
 
Iapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And AnswersIapp cipmExact IAPP CIPM Questions And Answers
Iapp cipmExact IAPP CIPM Questions And Answers
 
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
How to Make a Business Case for #Socialmedia Gain Social Media ROI with Crims...
 
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2InfCMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
CMGTCB582 - Security and Ethics - Compt-1 Assessment 2Inf
 
What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?What are the top 5 marketing strategies of cyber security business?
What are the top 5 marketing strategies of cyber security business?
 
The art of nudging
The art of nudgingThe art of nudging
The art of nudging
 
Barry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeapBarry Ooi; Big Data lookb4YouLeap
Barry Ooi; Big Data lookb4YouLeap
 
Six Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid ThemSix Mistakes Companies Are Making Today And How You Can Avoid Them
Six Mistakes Companies Are Making Today And How You Can Avoid Them
 
Course12 2
Course12 2Course12 2
Course12 2
 
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New Dynamics
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New DynamicsRe:Engage: Accelerating Sales Pipeline w/ Marketing's New Dynamics
Re:Engage: Accelerating Sales Pipeline w/ Marketing's New Dynamics
 
Insurance analytics brochure
Insurance analytics brochureInsurance analytics brochure
Insurance analytics brochure
 
Adapting Your Pipeline to Marketing’s New Dynamics
Adapting Your Pipeline to Marketing’s New DynamicsAdapting Your Pipeline to Marketing’s New Dynamics
Adapting Your Pipeline to Marketing’s New Dynamics
 
2017 Forecast: Disruptions Facing the Meetings Industry
2017 Forecast: Disruptions Facing the Meetings Industry2017 Forecast: Disruptions Facing the Meetings Industry
2017 Forecast: Disruptions Facing the Meetings Industry
 
BigData_WhitePaper
BigData_WhitePaperBigData_WhitePaper
BigData_WhitePaper
 
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docx
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docxGovernment Impact B (1st paper)PROFESSOR FEEDBACK I thought .docx
Government Impact B (1st paper)PROFESSOR FEEDBACK I thought .docx
 
Segmentation in B-to-B Markets: The Role of Data
Segmentation in B-to-B Markets: The Role of DataSegmentation in B-to-B Markets: The Role of Data
Segmentation in B-to-B Markets: The Role of Data
 
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIF
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIFTCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIF
TCF.. CIF.. WTF(unding)? How to prepare a winning application for TCF/CIF
 
Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020 Digital transformation guide and checklist 2020
Digital transformation guide and checklist 2020
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

MGT 521 MASTER Educational Specialist--mgt521master.com

  • 1. MGT 521 Assignment Apply Week 1 Target Case Study Analysis FOR MORE CLASSES VISIT www.mgt521master.com Assignment Content Resources: Ch. 1 and 2 of Management: A Practical Introduction Complete the Target CEO Case Study Analysis. Submit your analysis. Center for Writing Excellence Reference and Citation Generator
  • 2. Grammar and Writing Guides Learning Team Toolkit Case Analysis Questions Answer the following in 175 words each: 1. Describe the managerial functions that were demonstrated in the case description. Provide examples of how each function you discuss was evident in the case study.
  • 3. 2. Assess the success with which the Target management team handled the management challenges identified in Chapter 1. 3. Describe the primary management viewpoint demonstrated in the case study. Evaluate your concept of its success in this case. Do you think another management viewpoint would have been more appropriate? Assess your ideas regarding Target’s need and ability to operate as a Learning Organization in the future.
  • 4. Target CEO Works to Retain Consumer Trust after the Company Was Hacked Minneapolis—Executives settled around a square table inside a Target Corp. conference room here earlier this month and munched on store- brand snacks as they chewed over something far less appetizing. Opinion surveys commissioned by the company found that the massive cybertheft that waylaid Target late [in 2013] had knocked confidence and trust in the 51-year-old retailer to an all-time low. Target was having trouble shaking the fallout from a key decision by Chief Executive Gregg Steinhafel that made the crisis appear even worse than it already was.
  • 5. The initial evidence had indicated that credit and debit card numbers of about 40 million Target customers had been stolen. But the retailer had learned later that the hackers gained access to partial names and physical or e-mail addresses for as many as 70 million people—a breach that some top executives counseled against disclosing because it was unclear what kind of fraud danger it posed. Nevertheless, Mr. Steinhafel insisted on making the bigger number public, sparking news reports that as many as 110 million Target customers had been affected. At the meeting, Chief Marketing Officer Jeffrey Jones groused about the huge number. The public “keeps hearing that equals one-third of all Americans,” he said. “That’s hammering us.” Mr. Steinhafel says he has no regrets about the aggressive disclosure and other costly decisions in the wake of the crisis. “Target won’t be defined by the breach, but how we handle the breach,” he says. The executives acknowledge the crisis has damaged the retailer’s bull’s- eye brand, while analysts estimate it may cost Target billions of dollars. During the holiday-shopping season, Target’s sales and store traffic plummeted. Call-center volume overwhelmed employees. Executives testified before congressional panels, and the company is facing federal and state investigations into how the cybercrime occurred from its store registers and computer network.
  • 6. Over the two months since the crisis erupted, Mr. Steinhafel, 59 years old, has lurched from one difficult decision to another. At one point, he proposed in a meeting that Target would provide free credit monitoring and identity-theft insurance for one year to all its customers. Scott Kennedy, a senior executive, asked: “You’re saying we will give this to any customer who’s ever been in a store, but we aren’t checking?” Mr. Steinhafel nodded. “Then we’re offering this to all Americans,” Mr. Kennedy replied. Target went ahead with that plan. The breach could wind up costing Target, which notched $73 billion in sales in 2012, a few billion dollars, people familiar with the matter say. New chip technology to replace magnetic strips on credit cards could cost about $100 million, one executive told Congress. Card-monitoring services for customers could cost tens of millions, according to one executive. Hundreds of millions of marketing dollars could be diverted to repairing the brand. In addition, costs are mounting for reissuing
  • 7. cards, staffing call centers, forensic and data-security units, and lawyers for public inquiries and private lawsuits. . . . The CEO, who likes to say “retail is detail,” is known internally for paying surprise visits to Target stores—there are about 1,800 in the U.S. that drew about 32 million customers a week before the crisis. Store managers say they warn each other to be alert for a man snooping around the aisles, frequently snacking from a box of animal crackers. Recently, Mr. Steinhafel says, he stopped a manager who was reading e- mail on her cellphone as she passed through Target’s downtown Minneapolis headquarters. “Please be in the present,” he recalls telling her. From November 27, the day before Thanksgiving, through December 18, Target executives say, shoppers’ payment-card data was captured through “malware” installed in Target’s computer network. The hackers had entered the network through a vendor. The breach got wide publicity. Shoppers clogged Target phone lines and stores. Some sent tweets and emails that they would never again shop at Target. On the last weekend before Christmas, the big crowds at Target stores had dwindled.
  • 8. On December 20, Mr. Jones, the chief marketing officer, urged Mr. Steinhafel to appear in a video on Target’s website. The CEO was reluctant. He didn’t have a script and was exhausted. With a camera rolling, Target’s public-relations chief, Dustee Jenkins, asked him questions. Mr. Steinhafel, clad in Target’s trademark red shirt and khakis store attire, thanked customers for their trust, provided tips to monitor their accounts, and promised zero liability to shoppers for any fraudulent charges. Mr. Steinhafel began holding twice-daily “status meetings” in a 32nd floor conference room. Early this month, prompted by the Target data breach, Congress held hearings on cyberattacks. As Mr. Mulligan, the CFO, made his appearances, Mr. Steinhafel and his executive team watched from the company’s “situation room.” A Secret Service official testified that the data breach was “highly technical and sophisticated,” prompting Mr. Steinhafel to remark: “That shows it’s not just our operation. It would be hard for any retailer to withstand this.” At a daily status meeting early this month, Mr. Steinhafel pushed to accelerate to early next year the timeline for Target to replace magnetic
  • 9. strips on its payment cards with a new chip technology widely used in Europe and Canada that is less vulnerable to fraud. ============================================== MGT 521 Entire Course FOR MORE CLASSES VISIT www.mgt521master.com MGT 521 Week 1 Apply Management And Applications Worksheet MGT 521 Week 2 Apply Management Planning Worksheet MGT 521 Week 3 Apply Organizational Culture and Design MGT 521 Week 4 Apply Leadership Examination MGT 521 Week 5 Apply Using the Project Planner’s Toolkit MGT 521 Week 6 Apply Hewlett-Packard Case Study Analysis MGT 521 Week 1 DQ 1 MGT 521 Week 1 DQ 2 MGT 521 Week 1 DQ 3 MGT 521 Week 1 DQ 4 MGT 521 Week 2 DQ 1
  • 10. MGT 521 Week 2 DQ 2 MGT 521 Week 2 DQ 3 MGT 521 Week 2 DQ 4 MGT 521 Week 3 DQ 1 MGT 521 Week 3 DQ 2 MGT 521 Week 3 DQ 3 MGT 521 Week 3 DQ 4 MGT 521 Week 4 DQ 1 MGT 521 Week 4 DQ 2 MGT 521 Week 4 DQ 3 MGT 521 Week 4 DQ 4 MGT 521 Week 5 DQ 1 MGT 521 Week 5 DQ 2 MGT 521 Week 5 DQ 3 MGT 521 Week 5 DQ 4 ============================================== MGT 521 Final Exam Guide (New) FOR MORE CLASSES VISIT
  • 11. www.mgt521master.com 1. ________ is defined as a business firm’s intention, beyond its legal and economic obligations, to do the right things and act in ways that are good for society. Social screening Social responsibility Social obligation Values-based management 2. The balanced scorecard measures organizational performance against previously established standards. Which of the four functions of management relates most closely to setting these standards? Controlling Leading Organizing Planning 3. Budgets can be used as tools within which two functions of management? Controlling and organizing Planning and leading Controlling and planning Organizing and leading
  • 12. 4. Indira Patel has been working in her organization’s computer security department for the past 10 years. If another employee follows Indira’s recommendations in a given situation, based on her expertise in computer security, which source of power is Indira using? Legitimate power Coercive power Expert power Referent power ============================================== MGT 521 Final Exam Guide (New, 2019) FOR MORE CLASSES VISIT www.mgt521master.com 1. Unlike leaders, managers are those who: encourage and motivate employees to work together to achieve a common vision. implement procedures and processes to ensure the smooth functioning of an organization. seek innovation rather than stability in their approach to fulfill organizational aspiration
  • 13. develop relationships with employees based on trust and mutual respect. 2. Adopting a __________ involves distributing monetary resources among divisions to increase financial returns or to spread risks among different businesses. differentiation strategy global strategy portfolio strategy multidomestic strategy 3. Which of the following statements is true of a corporate-level strategy? It provides the framework within which functional managers operate. It is the primary responsibility of top managers. It is used to identify an organization’s strengths and weaknesses. It outlines a division’s long-term goals. ============================================== MGT 521 Final Exam Guide FOR MORE CLASSES VISIT www.mgt521master.com
  • 14. 1) John writes a memo to his employees. Putting his thoughts onto paper is an example of 2) Chantel received an invitation to a web meeting that will take place at 3:00 p.m. She accepted the invitation. This is an example of 3) You are doing research on political issues and find that you are on a conservative leaning site. What type of source credibility issue is this? 4) When reviewing an educational math website, you find the author’s background is in English. What type of source credibility issue is this? 5) A famous ice cream manufacturer sent workers to a nearby grocery store to offer shoppers a sample of its new flavor. The workers provided samples to 300 shoppers and noted that 80% of the sample population stated they liked the flavor. Based on this scenario, which of the following is an example of an inference? 6) Persuading or convincing others to accept your argument means the reasoning must be logical. Which of the following is an example of logical flaws or fallacies? ==============================================