Verified Document

Lessons Learned From Zappos' Security Breach In Essay

Lessons Learned From Zappos' Security Breach in January, 2012 On January 16, 2012 Zappos' experienced its first major security breach through a compromised server at its recently opened Kentucky Distribution Center, with an experienced hacker gaining access to potentially 24 million customer records. The Zappos' internal ordering systems had encrypted passwords for safety as part of its basic architecture, yet the last four digits of credit cards, complete customer histories and contact information were all compromised (Letzing, 2012). Zappos is the world's leading online store selling women's men's, and children's shoes and accessories, and was recently sold by founder and CEO Tony Hsieh to Amazon.com for $800 million (Hsieh, 2010). As part of the sales of this massive website and online business, Tony Hsieh successfully negotiated to retain control over the logistics, supply chain and innovative approaches to warehouse management that drastically reduces the time to complete an order (McDonald, 2011).

Evaluation of the Zappos Website

In evaluating the product information, corporate contact information, customization of products and the use of customer information at purchase, the Zappos' website shows a very high level of coordination and synchronization of each of these strategies. Each of these four areas of the site are entirely...

Parts of this document are hidden

View Full Document
svg-one

The product introduction area of the website features easily navigated views of shows, clothing and accessories. The Zappos' online catalog has actually won design awards for its use of innovative display and navigational applications that have revolutionized e-commerce (McDonald, 2011). Zappos' also has created one of the most advanced online configurators that integrates perfectly into the guided selling application, which gives the customer an opportunity tor averse up and down the level of product complexity as they choose. The Zappos' online configurator is specifically designed to give customers the maximum amount of customization control over their selection of any item in the catalog and supplier base of the company (McDonald, 2011). Zappos does not directly customize any product on their own; they rather rely on a network of several thousand suppliers to enable this aspect of their unique value proposition. In navigating through their website as a registered customer, it is clear that the product information, contact information and customization through catalog choices are all designed form the customer's approach to shopping. It is also noticeable how the website "learns" about what your preferences are and goes…

Sources used in this document:
References

Hsieh, T. (2010, Zappos CEO on going to extremes for customers. Harvard Business Review, 88(7)

Letzing, J. (2012, Jan 16). Zappos says customer database hacked. Wall Street Journal (Online)

McDonald, S. (2011). Delivering happiness: A path to profits, passion and purpose. American Economist, 56(1), 127-128.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Breach Case Scenario 1: Security Breach
Words: 1969 Length: 7 Document Type: Essay

Security Breach Case Scenario 1: Security Breach Hospitals have the opportunity and responsibility to integrate sound policies and procedures in relation to the protection of the confidential client information (Rodwin, 2010). St. John's Hospital in no different to this notion has the organization seeks to enhance the security and confidentiality of the information of its clients. The organization is a role model to other institutions within the geographical area on the essential

Security Breaches Can Occur Either
Words: 623 Length: 2 Document Type: Research Paper

Both types -- qualitative and quantitative -- have their advantages and disadvantages. One of the most well-known of the quantitative risk metrics is that that deals with calculation of annual loss expectancy (ALE) (Bojanc & Jerman-Blazoc, 2008). ALE calculation determines the monetary loss associated form a single occurrence of the risk (popularly known as the single loss exposure (SLE)). The SLE is a monetary amount that is assigned to

Security Breach at Target
Words: 580 Length: 2 Document Type: Essay

Computer Security Breaches Internal Controls and Receivables On December the 19th Target publicly acknowledged they had suffered a data breach, which had resulted in the loss of 40 million customer payment card details, along with their names, expiry dates, and the encrypted security codes (Munson, 2013), At the time this was one of the largest security breaches, with the firm suffering not just because they were targeted by criminals, but as a

E-Mail Security Breach Why Did
Words: 894 Length: 3 Document Type: Research Paper

The next thing is to immediately contact the FOIP Coordinator, Privacy Officer, Responsible Affiliate as well as any other person who is responsible for the organization's it security. Evaluation of the Risks Associated with the Breach There is a need to evaluate the risks associated with the privacy breach. This should be done with a consideration of personal as well as health information (Social Insurance Number, financial information or any other

Zappo's Security Breach Zappos' Security
Words: 1563 Length: 5 Document Type: Research Paper

Today only a General Manager of a distribution center can gain access to the databases where customer records are kept and only by role access privileges can they even see them, which were a requirement of customers who were outraged by the breach (Shine, 2012). Providing Greater Security for Customers: Two Alternatives The most effective security strategy Amazon can take in light of the breach of their confidential data from internally

Information Technology IT Security Breaches
Words: 1851 Length: 5 Document Type: Research Paper

IPad Security Breach Assessing the Impact of the Apple iPad Security Breach Discuss Goatse Security firm possible objectives when they hacked into AT&T's Website. Goatse Security and firms like them are on a mission to expose what they see as lies and misleading claims of companies who claim to have much greater levels of security and stability in their products than they actually do. While the accounts of the iPad incident have been

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now